Home
Userʼs Manual
Contents
1. System QoS Ingress Port Policers Power Reduction Ports Security 5 500 lt gt y a ation par an 1 O 500 kbps y m Spanning Tree A Sd 2 Ja 500 kbps y T IPMC 3 m 500 kbps y F zA 4 m 500 kbps E MAC Table 5 D 500 kbps y la VLANs LF Private VLANs 6 Oo 500 kbps w a VCL Voice VLAN 7 8 500 kbps a ce 3 8 A 500 kbps a ort Classification Port Policing 9 E 500 kbps y T Port Scheduler Port Shaping 10 o 500 kbps A Port Tag Remarking F J aa 11 E 500 kbps y DSCP Based QoS 2 A 500 kbps A DSCP Translation DSCP Classification 13 la 500 kbps la QoS Control List j Storm Control 14 m 500 kbps z m The port number for which the configuration below applies 174 Controls whether the policer is enabled on this switch port Controls the rate for the policer The default value is 500 This value is restricted to 100 1000000 when the Unit is kbps or fps and it is restricted to 1 3300 when the Unit is Mbps or kfps Controls the unit of measure for the policer rate as kbps Mbps fps or kfps The default value is kbps Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 17 3 QoS Port Scheduler This page provides an overview of QoS Egress Port Schedulers for all switch ports
2. Configuration SS peli QoS Port DSCP Configuration Power Reduction Ports Security Aggregation Loop Protection O E E Spanning Tree 1 A Disable y Disable x MR 2 m Disable y Disable x LLDP 3 al Disable y Disable 7 oe Table 4 o Disable y Disable y VLANs 5 al Disable y Disable z Psputiaied 6 D Disable y Disable El Voice VLAN 7 m Disable Disable E er eae s A Disable Disable E E 9 al Disable w Disable E l TA 10 al Disable y Disable 7 Port Tag Remarking F A A E 11 E Disable Disable 2 DSCP Based QoS 12 Oo Disable z Disable x eel gi 3 E Disable y Disable El QoS Control List 14 m Disable y Disable z Storm Control es 5 E Disable y Disable E GS 6 o Disable y Disable z Pd 17 al Disable y Disable i Diagnostics 18 la Disable y Disable Y Maintenance an im Pinnhin TE Dianbla Tal The Port column shows the list of ports for which you can configure DSCP ingress and egress settings In Ingress settings you can change ingress translation and classification settings for individual ports There are two configuration parameters available in Ingress 1 Translate 2 Classify To Enable the Ingress Translation click the checkbox 178 Classification for a port have 4 different values Disabled No Ingress DSCP Classification DSCP 0 Classify if incoming or translated if
3. 4ipnet Configuration lite VLAN Membership Status for Combined users Combined Auto refresh E Refresh System Information Start from VLAN 1 with 20 entries per page I lt lt gt gt CPU Load Detailed Log Port Members Ports VLAN ID 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Security 1 TATATATA TATATA TA TA TATATATA TATA TA TA TA TA TA LACP 20 MMMM Loop Protection 21 MM Spanning Tree 2000 ral Bridge Status Port Status 2001 wA Port Statistics 2002 a R IPMC LLDP PoE MAC Table VLANS VLAN Membership VLAN Port VCL sFlow Diagnostics Maintenance VLAN User module uses services of the VLAN management functionality to configure VLAN memberships and VLAN port configurations such as PVID and UVID Currently we support the following VLAN user types CLI Web SNMP These are referred to as static NAS NAS provides port based authentication which involves communications between a Supplicant Authenticator and an Authentication Server MVRP Multiple VLAN Registration Protocol MVRP allows dynamic registration and deregistration of VLANs on ports on a VLAN bridged network Voice VLAN Voice VLAN is a VLAN configured specially for voice traffic typically originating from IP phones MVR MVR is used to eliminate the need to duplicate multicast traffic for subscribers in each VLAN Multicast traffic for all channels is sent only on a single multicast VLAN M
4. Configuration 7 Seen STP CIST Port Configuration Power Reduction Ports Security oop Protection Spanning Tree 128 e Non Edge 2 Y El E w Forced True Y Bridge Settings MSTI Mapping MSTI Priorities CIST Ports MSTI Ports es 7 lt gt E lt gt E lt gt E Y E E E lt gt PoE m da Auto y 128 Non Edge y EJ H Oo la Auto y MAC Tal VLANs 2 El Auto x 128 Non Edge y El al m m Auto Y Private VLANs VeL 3 El Auto y 128 r Non Edge El a a m Auto ye ON 4 Auto y 128 Non Edge gt El D OG A Auto e Mirong 5 E Auto e 128 y Non Edge El A la Auto Y sFlow 6 El Auto e 128 y Non Edge y m a Auto Y Monitor Danois 7 E Auto e 128 y Non Edge Y a Auto y petriapanea 8 v Auto E 128 Non Edge 2 Y lal ia w Auto 57 This page allows the user to inspect the current STP CIST port configurations and possibly change them as well This page contains settings for physical and aggregated ports The STP port settings relate to the currently selected stack unit as reflected by the page header The switch port number of the logical STP port Controls whether STP is enabled on this switch port Controls the path cost incurred by the port The Auto setting will set the path cost as appropriate by the physical link speed using the 802 1D recommended values Using the Specific setting a user defined value can be ente
5. Voice VLAN Qos Mirroring UPnP sFlow Monitor Diagnostics Maintenance The Configured column is used to view or change the IPv6 configuration The Current column is used to show the active IPv6 configuration Enable IPv6 auto configuration by checking this box If fails the configured IPv6 address is zero The router may delay responding to a router solicitation for a few seconds the total time needed to complete auto configuration can be significantly longer 57 Address Provide the IPv6 address of this switch IPv6 address is in 128 bit records represented as eight fields of up to four hexadecimal digits with a colon separating each field For example fe80 215 c5ff fe03 4dc7 The symbol is a special syntax that can be used as a shorthand way of representing multiple 16 bit groups of contiguous zeros but it can only appear once lt can also represent a legally valid IPv4 address For example 192 1 2 34 Prefix Provide the IPv6 Prefix of this switch The allowed range is 1 to 128 Router Provide the IPv6 gateway address of this switch IPv6 address is in 128 bit records represented as eight fields of up to four hexadecimal digits with a colon separating each field For example fe80 215 c5ff fe03 4dc7 The symbol is a special syntax that can be used as a shorthand way of representing multiple 16 bit groups of contiguous zeros but it can only appear once It can also represent a le
6. The switch port number Controls whether LACP is enabled on this switch port LACP will form an aggregation when 2 or more ports are connected to the same partner LACP can form max 12 LLAGs per switch and 2 GLAGs per stack The Key value incurred by the port range 1 65535 The Auto setting will set the key as appropriate by the physical link speed 10Mb 1 100Mb 2 1Gb 3 Using the Specific setting a user defined value can be entered Ports with the same Key value can participate in the same aggregation group while ports with different keys cannot The Role shows the LACP activity status The Active will transmit LACP packets each second while Passive will wait for a LACP packet from a partner speak if spoken to Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 121 6 Loop Protection This page allows the user to inspect the current Loop Protection configurations and possibly change them as well The loop protection feature is very important to protect the unexpected network loop especially when you install the switch on the internet The incorrect installation failure media or hacker attacking may create network loop The switch supports the Loop Protection feature the port can be shut down or log information per your configuration when the switch do detect the network loop After the port is shutdown it may hard to manually reconnect i
7. Advanced Setting Syntax STP bpduFilter enable disable STP bpduGuard enable disable STP recovery lt timeout gt After recovery timeout time is set the recovery is enabled automatically MSTI Mapping MSTI VLAN Mapping Syntax STP Msti Add lt msti gt lt vid range gt Example STP gt mst add 1 100 Add VLAN 100 to MSTI1 STP gt mst map MSTI VLANs mapped to MSTI MSTI1 100 MSTI2 No VLANs mapped MSTI3 No VLANs mapped MSTI4 No VLANs mapped MSTI5 No VLANs mapped MSTI6 No VLANs mapped MSTI7 No VLANs mapped Port Setting STP Port Mode Syntax STP Port Mode lt port_list gt enable disable STP Port Edge lt port_list gt enable disable STP Port AutoEdge lt port_list gt enable disable STP Port P2P lt port_list gt enable disable auto STP Port RestrictedRole lt port_list gt enable disable STP Port RestrictedTcn lt port_list gt enable disable STP Port bpduGuard lt port_list gt enable disable STP Port Statistics lt port_list gt clear Example STP gt port mode 1 24 dis Disable STP on port 1 24 STP gt port edge 1 24 en Enable Edge port on port 1 24 STP gt port autoedge 1 24 en Enable Auto Edge on P1 24 STP gt port p2p 1 24 en Enable P2P mode on P1 24 STP gt port p2p 1 24 auto Enable Automatic P2P detection STP gt port bpdu 1 24 en Enable BPDUGuard on P1 24 302 Port Path Cost Syntax STP Msti Port Cost lt msti g
8. 25 Buttons Auto refresh Check this box to enable an automatic refresh of the page at regular intervals 21 1 3 System Log Information The switch system log information is provided here 194 Jipnet ca Configuration p Monitor System Log Information Auto refresh E Refresh Clear Gk lt lt gt gt 31 System Information All CPU Load r Log an El Detailed Log Ports The total number of entries is 28 for the given level State Traffic Overview ith i Ceres Start from ID 1 with 20 entries per page QCL Status Detailed Statistics Security 4 Info 1970 01 01T08 00 02 08 00 Switch just made a cold boot LACP 2 Info 1970 01 01T08 00 04 08 00 Link up on port 24 Loop Protection 3 Info 1970 01 02T06 55 21 08 00 Link up on port 10 Spanning Tree 4 Info 1970 01 02T06 59 20 08 00 Link up on port 11 MVR 5 Info 1970 01 02T07 00 01 08 00 Link down on port 11 IPMC 6 info 1970 01 02T07 00 25 08 00 Link up on port 11 LLDP rd Info 1970 01 02T07 00 25 08 00 Link down on port 11 E 8 info 1970 01 02T07 00 35 08 00 Link up on port 11 MAC Table 2 Info 1970 01 02T07 00 35 08 00 Link down on port 11 Is 10 Info 1970 01 02T07 00 44 08 00 Link up on port 11 VCL u Info 1970 01 02T07 00 47 08 00 Link down on port 11 sFlow ard Info 1970 01 02T07 00 52 08 00 Link up on port 11 Diagnostics 13 Info 1970 01 02T07 00 53 08 00 Link down on port 11 Maintenance 14 info 1970 01 02T07 01 18 08 00 Link up on
9. NAS ACL 4 Trusted z 5 6 7 Limit Control UER Trusted w Snooping Relay Trusted y IP Source Guar ARP Inspection Trusted AAA n Tacana T l Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values DHCP Relay Configuration 109 Configure DHCP Relay on this page 4ipnet Configuration gt i ate DHCP Relay Configuration Power Reduction Ports Disabled Security Switch 0 0 0 0 Users Enabled Privilege Levels Auth Method Replace SSH on Access Management SNMP RMON Network Limit Control NAS ACL DHCP Snooping Relay IP Source Guar ARP Inspection m Indicates the DHCP relay mode operation Possible modes are Enabled Enable DHCP relay mode operation When DHCP relay mode operation is enabled the agent forwards and transfers DHCP messages between the clients and the server when they are not in the same subnet domain And the DHCP broadcast message won t be flooded for security considerations Disabled Disable DHCP relay mode operation Indicates the DHCP relay server IP address A DHCP relay agent is used to forward and to transfer DHCP messages between the clients and the server when they are not in the same subnet domain Indicates the DHCP relay information mode option operation The option 82 circuit ID format as vlan_id module_id port_no The first four characters represent
10. Limit Control System Configuration Syntax Security Network Limit Configuration lt port_list gt Security Network Limit Mode enable disable Security Network Limit Aging enable disable Security Network Limit Agetime lt age_time gt Example Security Network gt limit mode enable Security Network gt limit agin enable Security Network gt limit agetim 1000 Result Port Security Limit Control Configuration Mode Enabled Aging Disabled Age Period 3600 293 Limit Control Port Configuration Syntax Security Network Limit Port lt port_list gt enable disable Security Network Limit Limit lt port_list gt lt limit gt Security Network Limit Action lt port_list gt noneltrap shut trap_shut Security Network Limit Reopen lt port_list gt Example Security Network gt limit port 1 enabl Security Network gt limit limit 1 5 Security Network gt limit action 1 trap Network Access Server Configuration also known as IEEE 802 1X NAS System Configuration Syntax Mode Security Network NAS Mode enable disable Security Network NAS Reauthentication enable disable Time Settings Security Network NAS ReauthPeriod lt reauth_period gt Security Network NAS EapolTimeout lt eapol_timeout gt Security Network NAS Agetime lt age_time gt Security Network NAS Holdtime lt hold_time gt Radius Assigned Security Network NAS RADIUS_QoS global lt port
11. Reset Check to delete the entry It will be deleted during the next save 155 The VLAN ID of the entry The MAC address of the entry Checkmarks indicate which ports are members of the entry Check or uncheck as needed to modify the entry Click to add a new entry to the static MAC table Specify the VLAN ID MAC address and port members for the new entry Click Save Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 156 13 VLAN Virtual LAN The VLAN is short of Virtual LAN Local Area Network The VLAN technology allows you to divide the physical ports to different logical groups Each groups is a virtual LAN the clients within the VLAN is a broadcast domain While the clients in different VLANs need to communicate the VLAN Overlapping setting or an additional upper router is needed There are 2 typical types VLAN technology Port Based and Tag Based The Port based VLAN is the simplest approach to LAN implementation The idea is to assign the ports ona switch to different VLANs the settings is only applied to the ports of the switch Tag based VLAN follows IEEE 802 1Q technology to tag VLAN ID to the packets The tagged VID is not only apply to the switch but also can be forwarded to next switch and whole network depends on how you configuring the switch settings 13 1 VLAN Membership Configuration The VLAN membership
12. 1 The SW1024 can obtain IP from an upstream DHCP server Click the Renew button to get an IP address automatically 2 The administrator can manually specify a static IP address IP Mask Subnet Mask IP Router Default Gateway and DNS Server for the system 4ipnet Configuration System Information IP IPv6 NTP Time Log Power Reduction Ports Security Aggregation Loop Protection Spanning Tree MVR IPMC LLDP PoE MAC Table VLANs Private VLANs VCL Voice VLAN Qos Mirroring UPnP sFlow Monitor Diagnostics Maintenance IP Configuration Configured Current DHCP Client Renew IP Address 192 168 2 1 192 168 2 1 IP Mask 255 255 255 0 255 255 255 0 IP Router 0 0 0 0 0 0 0 0 VLAN ID 1 1 DNS Server 0 0 0 0 0 0 0 0 IP DNS Proxy Configuration DNS Proxy Save Reset The Current column shows the present configurations and the factory default values are shown in the above figure Check the DNS Proxy button if you wish to enable the SW1024 s function as a proxy for the configured DNS Server 4 2 3 System Time The SW1024 supports both manual system time configuration option and automatic time synchronization by specifying external NTP servers Configuration path Configuration gt gt System gt gt NTP 27 NTP Configuration Enabled Disabled Enabled Up to 5 NTP Servers IP Address can be saved on the system Configuration path Config
13. CPU Monitoring PoE Specification Per port power supply monitoring with constraints Per port supply priority setting Power device PD monitoring 14 1 3 Package Contents SW1024 x 1 Power Cord x 1 Quick Installation Guide QIG x 1 a User Manual CD x 1 E Rack Mount kit x 1 Console Cable x 1 15 Chapter 2 Hardware This section describes the hardware of the L2 Management Network Switch and gives a physical and functional overview of the switch Front Panel The front panel of the L2 management switch consists of 24 10 100 1000 Base TX RJ 45 ports and 2 gigabit uplink SFP ports The LED Indicators are also located on the front panel LED Display RJ 45 Port SFP Console 4ipnet LED Indicators The LED Indicators present real time information of systematic operation status The following table provides description of LED status and their meaning LED Color Description Power Green On when system is operating normally Link Act Green On when link is on blinks when system is transmitting receiving data PoE Green Indicates that power supply is present SFP Green On when link is on blinks when system is transmitting receiving data 16 LED Color Status Description No of LEDs Power Amber On Power on Power Green On Link Up 10 100 1000M 24 1 24 900200 Green Blinking Data Activating PoE Amber On PD i
14. UPnP 11 Auto w Active v Fast 32768 sFlow TI Onion 12 Auto x Active Fast 32768 Diagnostics 13 Auto e Active e Fast e 32768 Maintenance 14 Auto Active Fast 32768 15 a Auto y Active y Fast y 32768 Use the checkbox to determine which Ports to enable LACP The Key value can be set per port within the 1 65535 range When set in Auto physical link speeds 10Mbps is set as 1 100Mbps Fast Ethernet is set as 2 1000Mbps GbE is set as 3 When set in Specific a user defined 48 value can be entered and ports with the same Key value are in the same aggregation group Status for aggregation can be checked at Configuration path Monitor gt gt LACP gt gt Port Status gipnet Confi tion Monito j LACP Status System Ports Partner System ID System Status Port Status Port Statistics Spanning Tree MVR IPMC LLDP PoE MAC Table VLANs YELE sFlow Diagnostics Maintenance LLAG1 00 90 fb 34 55 Oc LLAG1 00 90 fb 34 55 Oc 49 Chapter 10 Utilities for Maintenance 10 1 Administrator Accounts The SW1024 s root management account is the admin account with full access modification and application privilege and authority There are however 2 tier accounts with less authority which may be created for management personnel to access their designated assigned areas of authority a necessary feature for larg
15. After click on Open then you can see the cipher information in the popup screen Press Yes to accept the Security Alert 23 If you choose Telnet connection there is no such cipher information and window lt goes to next step directly The server s host key is not cached in the registry You have no guarantee that the server is the computer you think it is The server s rsa2 key fingerprint is ssh rsa 1040 dd 15 6b be 26 1d b0 0c ef af 59 f2 83 e7 a7 47 If you trust this host hit Yes to add the key to PuTTY s cache and carry on connecting If you want to carry on connecting just once without adding the key to the cache hit No If you do not trust this host hit Cancel to abandon the connection 3 After the Telnet SSH connection is established login with the same credentials admin admin The command line of Telnet SSH and console are operated the same way A gunos 3 192 168 2 1 PuTTY nee 24 Chapter 4 System Configuration The switch provides abundant software features Once logged in to the switch you may start configuring the settings or monitoring the status The following provides detailed instructions on configuring the SW1024 4 1 Network Planning Before installing the 4ipnet SW1024 Switch careful network planning is required in order to meet the networking needs with the most efficient utilization of network resources IT staff of any organization should assess the availabl
16. Monitor System Information CPU Load Log Detailed Log Security LACP STP Statistics Auto refresh Refresh Clear 24 14 0 0 4 21 16 121879 13 0 0 Loop Protection Spanning Tree Bridge Status Port Status Port Statistics MVR IPMC LLDP PoE MAC Table VLANs VCL sFlow Diagnostics Maintenance The switch port number of the logical STP port The number of MSTP Configuration BPDU s received transmitted on the port The number of RSTP Configuration BPDU s received transmitted on the port The number of legacy STP Configuration BPDU s received transmitted on the port The number of legacy Topology Change Notification BPDU s received transmitted on the port The number of unknown Spanning Tree BPDU s received and discarded on the port The number of illegal Spanning Tree BPDU s received and discarded on the port Buttons Refresh Click to refresh the page immediately Auto refresh Check this box to enable an automatic refresh of the page at regular intervals 243 21 7 MVR Status 21 7 1 Statistics This page provides MVR Statistics information 4ipnet ula Contaurstion MVR Statistics Auto efresh Refresh Clear System Information CPU Load Log No more entries Detailed Log The Multicast VLAN ID The number of Received V1 Reports The number of Received V2 Reports The number of Received V3 Reports The
17. NTP Enable NTP Mode by below command poeswitch IP gt ntp mode en 283 Type the NTP Server address settings by below command Syntax IP NTP Server Add lt server_index gt lt ip_addr_string gt IP NTP Server Ipv6 Add lt server_index gt lt server_ipv6 gt IP NTP Server Delete lt server_index gt Example poeswitch IP gt ntp ser add 1 192 168 100 1 poeswitch IP gt ntp ser add 2 168 95 1 1 Check the NTP Server settings by below command poeswitch IP gt ntp conf IP NTP Configuration NTP Mode Enabled Idx Server IP host address a b c d or a host name string 1 192 168 100 1 2 168 95 1 1 3 4 5 DNS Server Syntax IP DNS lt ip_addr gt Parameters lt ip_addr gt IP address a b c d default Show IP address Example poeswitch IP gt dns 168 95 1 1 DNS Proxy Syntax IP DNS_ Proxy enable disable poeswitch IP gt dns_proxy en IPv6 Configuration IPv6 Commands Syntax IP IPv6 AUTOCONFIG enable disable IP IPv6 Setup lt ipv6_addr gt lt ipv6_prefix gt lt ipv6_router gt IP IPv6 State lt ipv6_addr gt enable disable IP IPv6 Ping6 lt ipv6_addr gt Length lt ping_length gt Count lt ping_count gt Interval lt ping_interval gt Auto Configuration Syntax IP IPv6 AUTOCONFIG enable disable Example poeswitch IP gt ipv6 auto en IPv6 Address Setting Syntax 284 Address Prefix Router IP I
18. Port Configuration Loop Protection Port Syntax l l Loop Protect Port Mode lt port_list gt enable disable Configuration Loop Protect Port Action lt port_list gt shutdown shut_log log Loop Protect Port Transmit lt port_list gt enable disable Example Loop Protect gt port mode 1 en Loop Protect gt port action 1 shut_log Shutdown Port and Log Loop Protect gt port transmit 1 en 7 Spanning Tree Feature Command Line Bridge Configuration Protocol Version Syntax STP Version lt stp_version gt Parameters lt stp_version gt msip rstp stp Example STP gt ver rstp Bridge Priority Syntax STP Msti Priority lt msti gt lt priority gt Example STP gt msti pri MSTI Bridge Priority CIST 32768 STP gt msti pri 4096 The available priority parameter includes 0 4096 8192 12288 16384 20480 24576 28672 32768 36864 40960 45056 49152 53248 57344 61440 Forward Delay Syntax STP FwdDelay lt delay gt Valid values are in the range 4 to 30 seconds 301 Max Age Syntax STP MaxAge lt max_age gt Valid values are in the range 6 to 40 seconds and MaxAge must be lt FwdDelay 1 2 Maximum Hop Count Syntax STP MaxHops lt maxhops gt Valid values are in the range 6 to 40 hops Transmit Hold Count Syntax STP Txhold lt holdcount gt Valid values are in the range 1 to 10 BPDU s per second
19. RMON Statistics Start from Control Index 0 and Sample Index 0 with 20 entries per page History Alarm Event LACP Loop Protection Spanning Tree MVR IPMC LLDP PoE MAC Table VLANs VCL sFlow Diagnostics Maintenance Indicates the index of the event entry Indicates the index of the log entry Indicates Event log time Indicates the Event description Buttons Refresh Click to refresh the page immediately Auto refresh Click this box to enable an automatic refresh of the page at regular intervals 236 21 4 LACP System Status 21 4 1 System Status This page provides a status overview for all LACP instances 4ipnet ua Configuration AARSE LACP System Status Autoxefresh E Refresh System Information CPU Load No ports enabled or no existing partners Log Detailed Log Ports Security LACP System Status Port Status Port Statistics Loop Protection Spanning Tree IPMC LLDP PoE MAC Table VLANs VCL sFlow Diagnostics Maintenance The Aggregation ID associated with this aggregation instance For LLAG the id is shown as isid aggr id and for GLAGs as aggr id The system ID MAC address of the aggregation partner The Key that the partner has assigned to this aggregation ID The time since this aggregation changed Shows which ports are a part of this aggregation for this switch Buttons Refresh Click to ref
20. Valid values are between 30 and 86400 seconds 24 hours Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 7 2 Spanning Tree MSTI Mapping This page allows the user to inspect the current STP MSTI bridge instance priority configurations and possibly change them as well 126 gipnet Configuration MSTI Configuration System Power Reduction Add VLANs separated by spaces or comma Ports Security Unmapped VLANs are mapped to the CIST The default bridge instance Aggregation Loop Protection Spanning Tree Bridge Settings MSTI Mapping MSTI Priorities CIST Ports MSTI Ports IPMC LLDP PoE MAC Table Diagnostics Maintenance Configuration Identification The name identifying the VLAN to MSTI mapping Bridges must share the name and revision see below as well as the VLAN to MSTI mapping configuration in order to share spanning trees for MSTI s Intra region The name is at most 32 characters The revision of the MSTI configuration named above This must be an integer between 0 and 65535 MSTI Mapping The bridge instance The CIST is not available for explicit mapping as it will receive the VLANs not explicitly mapped The list of VLANs mapped to the MSTI The VLANs must be separated with comma and or space A VLAN can only be mapped to one MSTI An u
21. W Current Used mA 1 No PD detected 0 0 0 2 No PD detected 0 0 0 12 MAC Address Table Configuration Feature Command Line MAC Address Table Configuration Aging Time Configuration Syntax MAC Agetime lt age_time gt Parameters lt age_time gt MAC address age time 0 10 1000000 O disable Example 307 MAC gt age 100 change aging time to 100 seconds the aging time range is 10 1000000 MAC gt age 0 0 Disable Aging time MAC Learning Syntax Configuration MAC Learning lt port_list gt auto disable secure Example MAC gt lear 1 8 sec MAC gt lear 9 12 dis MAC gt learn 1 12 auto Static MAC Table Syntax MAC Add lt mac_addr gt lt port_list gt lt vid gt Example MAC gt add 0b16212c3742 1 5 1 This type will be changed to hexadecimal automatically MAC gt add 0b 16 21 2c 37 42 1 10 1 This type is hexadecimal it will not be changed Result Non volatile static VID MAC Address Ports 1 00 10 15 02 25 2a 1 5 1 Ob 16 21 2c 37 42 1 10 13 VLAN Configuration Feature Command Line VLAN Configuration VLAN Membership Syntax VLAN Add lt vid gt lt name gt lt ports_list gt VLAN Name Add lt name gt lt vid gt Example VLAN gt add 3 5 8 Add port 5 8 to VLAN 3 VLAN gt name add vlan33 vlan3 is the name of VLAN 3 Port Configuration Syntax VLAN FrameType lt port_list gt a
22. lt entry gt etc These tags identify parameters for the specific section module and group The lt entry gt tag is used for table entries Configuration parameters are represented as attribute values When saving the configuration from the switch the entire configuration including syntax descriptions is included in the file The file may then be modified using an editor and loaded to a switch The example below shows a small configuration file only including configuration of the MAC address age time and the learning mode per port When loading this file only the included parameters will be changed This means that the age time will be set to 200 and the learn mode will be set to automatic lt xml version 1 0 gt lt configuration gt lt platform gt lt pid val 3 gt lt pid gt lt version val 1 gt lt version gt lt platform gt lt global gt lt mac gt lt age val 200 gt lt age gt gt lt mac gt lt global gt lt switch sid 1 gt lt mac gt 280 lt entry port 1 24 learn mode auto gt lt entry gt lt mac gt lt switch gt lt Iconfiguration gt Save Click to save the configuration file Upload Click to upload the configuration file 281 Appendix B Feature Configuration CLI The Command Line Interface CLI is the user interface to the switch s embedded software system You can view the system information show the status configure the switch and receive a respons
23. oly 0 0 Disabled a pra cbc a ole om ole of Disabled al Mirong 5 ok olz o ofz Disabled a UPnP SEON 16 oi ole o ofz Disabled al Monitor nm Diagnostics T LU oll ola LO lanl Disabled 5 The port number for which the configuration below applies Controls the default QoS class i e the QoS class for frames not classified in any other way There is a one to one mapping between QoS class queue and priority A QoS class of 0 zero has the lowest priority Controls the default Drop Precedence Level e the DP level for frames not classified in any other way Controls the default PCP for untagged frames 173 Controls the default DEI for untagged frames Shows the classification mode for tagged frames on this port Disabled Use default QoS class and DP level for tagged frames Enabled Use mapped versions of PCP and DEI for tagged frames Click on the mode in order to configure the mode and or mapping Click to Enable DSCP Based QoS Ingress Port Classification Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 17 2 QoS Ingress Port Policer Config This page allows you to configure the Policer settings for all switch ports The settings relate to the currently selected stack unit as reflected by the page header The displayed settings are Configuration
24. v Low 15 4 7 PoE v Low 15 4 8 PoE v Low vY 15 4 9 PoE v Low 15 4 10 PoE v Low v 15 4 11 PoE v Low 15 4 12 PoE v Low 15 4 13 PoE v Low 15 4 14 PoE v Low 15 4 15 PoE v Low 15 4 There are 3 PoE modes available on the SW1024 Disabled Port does not supply power PoE Supports IEEE 802 3af up to 15 4W PoE Supports IEEE 802 3at up to 30W There are 3 priority levels that can be set on each port Low High and Critical The Port Priority is used when the power required exceeds the power SW1024 can deliver In this case the port with the lowest priority will be shut down starting from the highest port number 37 Chapter 7 Loop Protection A network loop is caused by switches or hubs being plugged into themselves causing networking packets to be bounced between the ports infinitely Loop protection is a crucial mechanism to maintain network stability on your switch 7 1 General Loop Protection Setting The SW1024 s Loop Protection mechanism allows us to shut down or log information per port when network loop is detected Configuration path Configuration gt gt Loop Protection General Settings Global Configuration Enable Loop Protection Enable Transmission Time 5 seconds Shutdown Time seconds Enable Loop Protection This is the global control for the system Enable Disable Transmission Time A Loop Protection data unit PDU is sent on each port w
25. 1 if the tagged frame has TPID 0x8100 it becomes a double tag frame and is forwarded 2 if the TPID of tagged frame is not 0x8100 ex 0x88A8 it will be discarded C port When the port receives an untagged frame it The TPID of frame obtains a tag based on PVID and is forwarded transmitted by C port will be set to 0x8100 When the port receives a tagged frame 1 if the tagged frame has TPID 0x8100 it is forwarded 2 if the TPID of tagged frame is not 0x8100 ex 0x88A8 it will be discarded S port When the port receives an untagged frame it The TPID of frame obtains a tag based on PVID and is forwarded When the port receives a tagged frame 1 if an tagged frame has TPID 0x88A8 it is forwarded 2 if the TPID of tagged frame is not 0x88A8 ex 0x8100 it will be discarded transmitted by S port will be set to 0x88A8 S custom port When the port receives an untagged frame it obtains a tag based on PVID and is forwarded When the port receives a tagged frame 1 if an tagged frame has TPID 0x88A8 it is forwarded 2 if the TPID of tagged frame is not 0x88A8 ex 0x8100 it will be discarded The TPID of frame transmitted by S custom port will be set to a self determined value which can be set by the user at Ethertype for Custom S ports on top In summary the different Port Type Ingress behaviors can be illustrated as such 31 VLAN 5 Packet Packet TPID 8100
26. 214 3 LACP Stat Stes iii a AA A AA A E ba Coat E 239 ZIDANE TEO A A A a AOA 239 21 6 STP Bridge SEAS A A a daa 240 DILO Bridge SOU A ii a edi idiotas 241 21 6 2 STR POrt Statu A E O ONO 242 21 6 3 STP Poft Statisties ii a ideal 242 DLTAMVR SAUS a ii adas 244 DIAS EOS iii E A T 244 21 7 2 MVR Group Tables eo etera iteratie dae aiete deidad cba tia nidad idoneidad tin 245 21 8 Monitor IPMC IGMP Snooping ococcccnoconocunonanoconanonanocona nono no nono conan con ononon noo nnonnn arco nn oran a ronnnonos 246 21 8 1 IGMP SOOOPIN Oi ssoioiticdad ncicioliticaa dnd dita dnd da dd iiai ea iaiia dadaa aa ai eiii i aaia iia 246 218 2 MLD SNO PING Status citada niir iiaia a a a aa a a aa a a aaia aAa AA AAAA 250 IAE RNV Vo TANEET A H E D EREE E EEEO A E E EI 254 21 9 1 LLDP Neighbour iinne a a a a aa aE 254 219 2 LEDP MED N ighho lS 5 Fisica cs inania ae aa ii aaea aaa iaa aae aa aa ada diada 256 P Ee Ko MB E BI PUE ii A E E aaa 260 ZULIA AED EEE migo a be A E E N Wana bd it i e 261 PA Ee RIER BB EN aa ELA E EAEE A T E A 263 21 10 Power Over Ethernet Status suisid iiinis idia aiii iiit edain iiaa 265 QUEL Dynamit MAC Ta eiii iii araea E a dan ar bade Wiad ina 266 21 12 VLAN Membership Status ccccccccccccessesssscccscsssessssscesecsssessaaecesecsseessasesesecsseeseasesesecseseseasaaeseeses 268 21 13 VCLIMACEBOSCA VLAN StQtuS vias amonei anna sa did 272 DLTAES EW ii OP a EEE CPPPTTOPTETECY OPP TPOYECECE PCLT PT OPT er ECT a P
27. 4 None E Disabled Reopen IP Source Guari ARP Inspection 6 Disabled y 4 None 7 Disabled Reopen ARA gt a nr EL as Controls whether Limit Control is enabled on this port Both this and the Global Mode must be set to Enabled for Limit Control to be in effect Notice that other modules may still use the underlying port security features without enabling Limit Control on a given port The maximum number of MAC addresses that can be secured on this port This number cannot exceed 1024 If the limit is exceeded the corresponding action is taken 88 The switch is born with a total number of MAC addresses from which all ports draw whenever a new MAC address is seen on a Port Security enabled port Since all ports draw from the same pool it may happen that a configured maximum cannot be granted if the remaining ports have already used all available MAC addresses Action If Limit is reached the switch can take one of the following actions None Do not allow more than Limit MAC addresses on the port but take no further action Trap If Limit 1 MAC addresses is seen on the port send an SNMP trap If Aging is disabled only one SNMP trap will be sent but with Aging enabled new SNMP traps will be sent every time the limit gets exceeded Shutdown If Limit 1 MAC addresses is seen on the port shut down the port This implies that all secured MAC addresses will be removed from the port and no new address will be learne
28. 5 10 iccess Management EEE 5 2 10 7 5 10 fx RMON P ls E mof Bo moi Herp ac IPMC_UB 5 i 10 5 El 10 oy IPMC_Snooping 5 y 10 5 10 DHCP LACP 5 y 10 y 5 10 IP Source Guar fe ARP Inspection LLDP 5 x 10 e 5 10 aes LLDP_MED 5 y 10 x 5 e 10 regation Loop Protection Loop_ Protect 5 y 10 5 10 y TS MAC_Table 5 E 0e 5 10 IPMC MVR 5 y 10 y 5 10 y LLDP PoE Maintenance 15 v 15 v 15 x 15v For more detailed configurations on Switch Management please refer to Appendix A 51 10 2 Configuration Backup and Restore This function is used to backup restore the SW1024 settings Configuration path Maintenance gt gt Configuration gt gt Save Upload Click Save Configuration to download an XML file to your local drive Vice Versa to upload an XML configuration file select the file from your local drive and click Upload 10 3 Firmware Upgrade This function is used to backup restore the SW1024 settings Configuration path Maintenance gt gt Software gt gt Upload gipnet Configuration Monitor Software Upload Diagnostics a Maintenance Browser No file selected Upload Restart Device Factory Defaults Software Upload Image Select Configuration The administrator can obtain the latest firmware from 4ipnet s website or 4ipnet s Support Team and upgrade the system
29. A Port VLAN ID PVID is a default VLAN ID that is assigned to a port to designate the virtual LAN segment to which this port is connected The PVID places the port into the set of ports that are connected under the designated VLAN ID Ethertype for Custom S ports 0x 3888 VLAN Port Configuration lo r O lt gt vo le vil 3120 lt gt v 1 C pot vw a All y Specific 3120 Untag pvid y 2 E All v Specific Y 2691 Tag all Y 3 Unaware v E All Y Specific Y 100 Untag pvid 4 S custom port Y O All y Specific Y 1 Untag_pvid Y 5 Cpot v a All v Specific Y 1 Untag_pvid 6 C pot vi O All Specific Y i 1 Untag_pvid 7 C port 7 a All Specific 11 Untag_pvid 8 C port vy O All v Specific Y 3120 Untag_pvid Y 9 C port yl a All v Specific Y 3120 Untag_pvid 10 C port v O All v Specific Y 3220 Untag_pvid Y There are 4 different port types supported on the SW1024 namely Unaware C Port S Port and 30 S Custom Port Each Port Type has its own ingress and egress behavior as such Ingress action Egress action Unaware When the port receives an untagged frame it The TPID of frame obtains a tag based on PVID and is forwarded transmitted by Unaware Used in QinQ port will be set to double tag When the port receives a tagged frame 0x8100
30. Buttons Add new entry Click to add a new access management entry Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values Refresh Refreshes the displayed the table starting from the VLAND ID input fields lt lt Updates the table starting from the first entry in the VALN Table i e the entry with the lowest VLAND 172 17 QoS 17 1 QoS Ingress Port Classification This page allows you to configure the basic QoS Ingress Classification settings for all switch ports The settings relate to the currently selected stack unit as reflected by the page header The displayed settings are Yipnet rope QoS Ingress Port Classification Power Reduction Ports Security _ lt gt oik ek e k a Toop resection 1 of 0 0 0 Disabled al dd 2 ok o oi of Disabled IPMC 3 ofe 0 0 0 Disabled al a 4 ok oly o Ofe Disabled MI anes 5 ok ol o o Disabled A Private VLANs 6e oi ol o o Disabled VOERT 7 oi o o o Disabled a Qos e ol of olz olz Disabled Port Classification z Port Policing 3 oi ok o ofz Disabled F Pon Sharing o ols oi Disabled Pastor he 11 0 y ok o Ofe Disabled A DSCP Based Gos 12 oi ok ok Disabled o DSCP Ti DSCP Classification 3 o
31. Click to undo any changes made locally and revert to previously saved values 4 2 5 IP Source Guard Configuration IP Source Guard Configuration This page provides IP Source Guard related configuration 4ipnet Configuration f e m IP Source Guard Configuration Power Reduction Ports Mode Disabled y Security Switch Translate dynamic to static Users Privilege Levels Auth Method SSH HTTPS Port Mode Configuration Access Management SNMP a RMON l z la Network J 1 Disabled Unlimited Limit Control NAS 2 Disabled Unlimited e T 3 Disabled Unlimited 2 IP Source Guar 4 Disabled w Unlimited m Configuratior sane z alles z Static Table 5 Disabled Unlimited y ARP Inspection AAA 6 Disabled Unlimited 111 Enable the Global IP Source Guard or disable the Global IP Source Guard All configured ACEs will be lost when the mode is enabled Specify IP Source Guard is enabled on which ports Only when both Global Mode and Port Mode on a given port are enabled IP Source Guard is enabled on this given port Specify the maximum number of dynamic clients that can be learned on given port This value can be O 1 2 or unlimited If the port mode is enabled and the value of max dynamic client is equal to O it means only allow the IP packets forwarding that are matched in static entries on the specific port Buttons Save Click to save changes R
32. Disabled Disable Voice VLAN mode operation Indicates the Voice VLAN ID It should be a unique VLAN ID in the system and cannot equal each port PVID It is a conflict in configuration if the value equals management VID MVR VID PVID etc The allowed range is 1 to 4095 Indicates the Voice VLAN secure learning aging time The allowed range is 10 to 1000000 seconds It is used when security mode or auto detect mode is enabled In other cases it will be based on hardware aging time The actual aging time will be situated between the age time 2 age time interval 170 Indicates the Voice VLAN traffic class All traffic on the Voice VLAN will apply this class Port Mode Indicates Voice VLAN port mode Possible modes are Disabled from Voice VLAN Auto Enable auto detect mode It detects whether there is VoIP phone attached to the specific port and configures the Voice VLAN members automatically Forced Force join to Voice VLAN Port Security This is the Voice VLAN port security mode When the function is enabled all non telephonic MAC addresses in the Voice VLAN will be blocked for 10 seconds Possible port modes are Enabled Enable Voice VLAN security mode operation Disabled Disable Voice VLAN security mode operation Port Discovery Protocol Indicates the Voice VLAN port discovery protocol It will only work when auto detect mode is enabled We should enable LLDP feature before configuring discovery protocol to LLDP o
33. LLDP information Disabled The switch will not send out LLDP information and will drop LLDP information received from neighbours Enabled The switch will send out LLDP information and will analyze LLDP information received from neighbours CDP Aware Select CDP awareness The CDP operation is restricted to decoding incoming CDP frames The switch doesn t transmit CDP frames CDP frames are only decoded if LLDP on the port is enabled Only CDP TLVs that can be mapped to a corresponding field in the LLDP neighbours table are decoded All other TLVs are discarded Unrecognized CDP TLVs and discarded CDP frames are not shown in the LLDP statistics CDP TLVs are mapped onto LLDP neighbours table as shown below CDP TLV Device ID is mapped to the LLDP Chassis ID field CDP TLV Address is mapped to the LLDP Management Address field The CDP address TLV can contain multiple addresses but only the first address is shown in the LLDP neighbours table CDP TLV Port ID is mapped to the LLDP Port ID field CDP TLV Version and Platform is mapped to the LLDP System Description field Both the CDP and LLDP support system capabilities but the CDP capabilities cover capabilities that are not part of the LLDP These capabilities are shown as others in the LLDP neighbours table If all ports have CDP awareness disabled the switch forwards CDP frames received from neighbour devices If at least one port has CDP awareness en
34. Low No PD detected Log 0 W 0 W 0 W 0 mA Low No PD detected ll 3 0 0 0 0 mA Low No PD detected Rel 4 ow 0 ow 0 mA Low No PD detected LACP 5 0 0 w 0 W 0 mA Low No PD detected Loop Protection 6 0 W 0 w 0 W 0 mA Low No PD detected Spanning Tree 7 0 W 0 W 0 W 0 mA Low No PD detected Bridge Status 8 ow 0 ow 0 mA Low No PD detected Port Status 9 0 W 0 0 W 0 ma Low No PD detected ae Stalistics 10 ow 0 01 0 mA Low No PD detected IPMC 1 0 0 ow 0 mA Low No PD detected LLDP 12 ow 0 ow 0 mA Low No PD detected PoE 13 0 0 0 0 mA Low No PD detected MAC Table 14 ow 0 om 0 ma Low No PD detected VLANs 15 0 0 0 0 ma Low No PD detected VLAN Membership 16 0 w 0 0 W 0 ma Low No PD detected None 7 0 ow ow 0 ma Low No PD detected sFlow 18 o 0 ow 0 mA Low No PD detected Diagnostics 19 0 0 oW 0 ma Low No PD detected Maintenance 20 0 W 0 w 0 W 0 mA Low No PD detected 21 0 0 0 0 mA Low No PD detected 2 om 0 01 0 mA Low No PD detected 23 0 0 0 0 ma Low No PD detected 24 0 w 0 ow 0 mA Low No PD detected Total 0 0 0 0 mA 21 11 Dynamic MAC Table Entries in the MAC Table are shown on this page The MAC Table contains up to 8192 entries and is sorted first by VLAND ID then by MAC address Navigating the MAC Table Each page shows up to 999 entries from the MAC table default being 20 selected through the entries per page input field Whe
35. MAC based VLAN sFlow Diagnostics Maintenance CLI Web SNMP These are referred to as static NAS NAS provides port based authentication which involves communications between a Supplicant Authenticator and an Authentication Server Indicates the MAC address Indicates the VLAN ID Port members of the MAC based VLAN entry Buttons Refresh Refreshes the displayed table 272 21 14 sFlow This page shows the sFlow Statistics Packet flow sampling refers to arbitrarily choosing some packets out of a specified number reading the first Max Hdr Size bytes and exporting the sampled datagram for analysis The attributes associated with the flow sampling are sampler type sampling rate maximum header size Counter sampling performs periodic time based sampling or polling of counters associated with an interface enabled for sFlow Attribute associated with counter sampling is polling interval List of the port numbers on which sFlow is configured Configured sampler type on the port and could be any of the types None RX TX ALL 273 22 Diagnostic This section provides some convenient tool for user to do switch diagnostic from remote site 22 1 Ping This page allows you to issue ICMP PING packets to troubleshoot IP connectivity issues Type the IP Addree ping length default 56 bytes ping count default 5 and ping interval default 1 Then press Start to start ping remote host After you press
36. Only full duplex ports can join an aggregation and ports must be in the same speed in each group Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 5 2 LACP Dynamic Aggregation This page allows the user to inspect the current LACP port configurations and possibly change them as well 120 Jipnet Configuration system LACP Port Configuration Power Reduction Ports Secuniy 2 A lt gt i lt gt le e amp 32768 Network 1 m Auto e Active y Fasti 32768 AAA Aggregation 2 A Auto y Active y Fast y 32768 Stati FS 3 z Auto e Active Fast gt 32768 O na 4 A Auto e Active Fast 32768 MYR 5 la Auto e Active y Fast y 32768 LLDP 6 A Auto y Active x Fast y 32768 PoE MAC Table 7 A Auto Active y Fast 32768 MAE VLANE 8 A Auto Active Fast gt 32768 veL 9 a Auto y Active y Fast y 32768 Voice VLAN e I E Qos 10 A Auto e Active y Fast y 32768 Mirroring r UPnP 11 A Auto e Active z Fast y 32768 SS 12 A Auto y Active e Fast gt 32768 Diagnostics 13 la Aut Acti Fast 32768 Maintenance a El one El as El 14 A Auto x Actie y Fast y 32768 15 w Auto y Active y Fast 32768
37. Pershaing 9 9 s El PortTag Remarking 10 AF11 10 AF11 10 AF11 10 AF11 as 11 11 y 11 y 1 y DSCP Translation z E 12 AF12 12 AF12 12 4F12 2 12 AF12 QoS Control List 13 13 13 fe 13 ee 14 AF13 14 AF13 14 AF13 e 14 AF13 Maximum number of supported DSCP values are 64 and valid DSCP value ranges from 0 to 63 Ingress side DSCP can be first translated to new DSCP before using the DSCP for QoS class and DPL map There are two configuration parameters for DSCP Translation 1 Translate 2 Classify DSCP at Ingress side can be translated to any of 0 63 DSCP values Click to enable Classification at Ingress side 181 There are the following configurable parameters for Egress side 1 Remap DPO Controls the remapping for frames with DP level 0 2 Remap DP1 Controls the remapping for frames with DP level 1 Select the DSCP value from select menu to which you want to remap DSCP value ranges from 0 to 63 Select the DSCP value from select menu to which you want to remap DSCP value ranges from 0 to 63 Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 17 9 QoS DSCP Classification This page allows you to configure the mapping of QoS class and Drop Precedence Level to DSCP value The settings relate to the currently selected stack unit as reflected by the page header The displayed settings
38. Port13 PVID 3106 PVID 3107 PVID 3108 a 5 5l O gt 5 3 me o lo 9 a 5 2 5 2 1 0 A A so 2 a a T S E DHCP Client Consider the above figure as an example Port 1 is set as the Trunk Port that shares the same VLAN Membership with Port 5 Port 9 and Port 13 33 Ethertype for Custom S ports 0x 9100 VLAN Port Configuration 1 Specific Y 2 Cpot Y Specific Y Tag_all v 3 Unaware Y Specific Y Untag_pvid 4 S custom port Y Specific Y Untag_pvid Cpot Specific Untag_pvid Y Specific Y Untag_pvid Specific Untag_pvid Specific Untag_pvid Y Specific Untag_pvid Specific Y Untag_pvid Specific Untag_pvid 14 C pot O All Specific 2691 Untag_pvid Y 15 C pot O All v Specific Y 2691 Untag_pvid Y A DHCP client is connected to Port 5 We can see that for Port 5 configured as C Port untagged packets will be tagged 3106 according to the PVID The Trunk Port Port 1 has Tx Tag configured as Tag_all hence sends the packet to the DHCP Server with VLAN 3106 ar 5i El A amp i Igo 8 Ol AE WHG og 7 i e BS j Ty Be x 7 Vo Q 7 Y xs a Q Ports Portg PVID 3106 PVID 3107 PVID 3108 ntag DHCP Offer 0 DHCP Offer DHCP Client 34 Port 1 in turn sends
39. RV Ql sec QRI 0 1 sec LLQI 0 1 sec URI sec Delete Y IGMP Auto M 2 125 100 10 1 Add New IGMP VLAN Save Reset VLAN ID The set VLAN ID for the entry Snooping Enabled Check to enable IGMP Snooping per VLAN IGMP Querier Check to enable IGMP Querier in the VLAN The responsibility of the Querier is to send out IGMP group membership queries on a timed interval to retrieve IGMP membership reports from active members and to allow updating of the group membership tables Compatibility Determine the IGMP version on the selected VLAN entry RV The Robustness Variable allows tuning for the expected packet loss on a network The allowed range is 1 to 255 QI sec The Query Interval is the interval between General Queries sent by the Querier The allowed range is 1 to 31744 seconds QRI 0 1sec Query Response Interval The Maximum Response Delay used to calculate the Maximum Response Code inserted into the periodic General Queries The allowed range is 0 to 31744 in tenths of seconds LLQI 0 1sec Last Member Query Interval The Last Member Query Time is the time value represented by the Last Member Query Interval multiplied by the Last Member Query Count The allowed range is 0 to 31744 in tenths of seconds URI sec Unsolicited Report Interval The Unsolicited Report Interval is the time between repetitions of a host s initial report of membership in a group The allowed range is 0 to 31744 seconds 8 1 3
40. Receive Packets I Transmit Packets Responses Malformed Responses Bad Authenticators Unknown Types Packets Dropped 0 Requests 0 Retransmissions 0 Pending Requests 0 Timeouts ecco Other Info IP Address State Round Trip Time 0 0 0 0 1813 Disabled 0 ms RADIUS Authentication Statistics The statistics map closely to those specified in RFC4668 RADIUS Authentication Client MIB Use the server select box to switch between the backend servers to show details for Packet Counters RADIUS authentication server packet counter There are seven receive and four transmit counters Access Accepts Access Rejects Access Challenges Malformed Access Responses RFC4668 Name Description radiusAuthClientExtAccess The number of RADIUS Access Accept packets Accepts valid or invalid received from the server radiusAuthClientExtAccess The number of RADIUS Access Reject packets Rejects valid or invalid received from the server The number of RADIUS Access Challenge radiusAuthClientExtAcc packets valid or invalid received from the essChallenges server The number of malformed RADIUS radiusAuthClientExtMalf Access Response packets received from ormedAccessResponse the server Malformed packets include s packets with an invalid length Bad authenticators or Message Authenticator 226 Bad radiusAuthClientExtBad Authenticators Authenticators radiusAuthClientExtUnk Unknown T
41. SNMPv3 Users Table Idx Engine ID User Name Level Auth Priv 292 1 Local default_user NoAuth NoPriv None None 2 Local orwell NoAuth NoPriv None None 3 Local andy Auth NoPriv MD5 None Number of entries 3 RMON In Security Switch Group the system supports 4 types RMON groups please follow the RMON Syntax to add the entries Syntax Security Switch gt rmon Statistics Security Switch RMON Statistics Add lt stats_id gt lt data_source gt Security Switch RMON Statistics Delete lt stats_id gt Security Switch RMON Statistics Lookup lt stats_id gt Histroy Security Switch RMON History Add lt history_id gt lt data_source gt lt interval gt lt buckets gt Security Switch RMON History Delete lt history_id gt Security Switch RMON History Lookup lt history_id gt Alarm Security Switch RMON Alarm Add lt alarm_id gt lt interval gt lt alarm_vairable gt absolute delta lt rising_threshold gt lt rising_event_index gt lt falling_threshold gt lt falling_event_index gt rising falling both Security Switch RMON Alarm Delete lt alarm_id gt Security Switch RMON Alarm Lookup lt alarm_id gt Event Security Switch RMON Event Add lt event_id gt none log trap log_ trap lt community gt lt description gt Security Switch RMON Event Delete lt event_id gt Security Switch RMON Event Lookup lt event_id gt Security Network Configuration Limit Control
42. Server If the port is set to 0 zero the default port 1812 is used on the RADIUS Authentication Server The secret up to 29 characters long shared between the RADIUS Authentication Server and the switch RADIUS Accounting Server Configuration The table has one row for each RADIUS Accounting Server and a number of columns which are The RADIUS Accounting Server number for which the configuration below applies Enable the RADIUS Accounting Server by checking this box 117 The IP address or hostname of the RADIUS Accounting Server IP address is expressed in dotted decimal notation The UDP port to use on the RADIUS Accounting Server If the port is set to 0 zero the default port 1813 is used on the RADIUS Accounting Server The secret up to 29 characters long shared between the RADIUS Accounting Server and the switch TACACS Authentication Server Configuration The table has one row for each TACACS Authentication Server and a number of columns which are The TACACS Authentication Server number for which the configuration below applies Enable the TACACS Authentication Server by checking this box The IP address or hostname of the TACACS Authentication Server IP address is expressed in dotted decimal notation The TCP port to use on the TACACS Authentication Server If the port is set to O zero the default port 49 is used on the TACACS Authentication Server The secret up to 29 characters
43. Start 5 ICMP packets are transmitted and the sequence number and roundtrip time are displayed upon reception of a reply The page refreshes automatically until responses to all packets are received or until a timeout occurs ICMP Ping Output Result PING server 192 168 2 100 56 bytes of data 64 bytes from 192 168 2 100 icmp_seq 0 time 0ms 64 bytes from 192 168 2 100 icmp_seg 1 time 0ms 64 bytes from 192 168 2 100 icmp_seq 2 time 0ms 64 bytes from 192 168 2 100 icmp_seq 3 time 0ms 64 bytes from 192 168 2 100 icmp_seq 4 time 0ms Sent 5 packets received 5 OK 0 bad The destination IP Address The payload size of the ICMP packet Values range from 2 bytes to 1452 bytes The count of the ICMP packet Values range from 1 time to 60 times The interval of the ICMP packet Values range from 0 second to 30 seconds 22 2 Ping6 This page allows you to issue ICMPv6 PING packets to troubleshoot IPv6 connectivity issues Type the IPv6 Address ping length default 56 bytes ping count default 5 and ping interval default 1 Then press Start to start ping remote host After you press Start 5 ICMPv6 packets are 274 transmitted and the sequence number and roundtrip time are displayed upon reception of a reply The page refreshes automatically until responses to all packets are received or until a timeout occurs ICMPv6 Ping Output PING6 server 10 10 132 20 64 bytes from 10 10 132 20 icmp_seq 0 time 0ms
44. TPID 8100 TPID 8100 VLAN 5 TPID 88A8 Packet Discarded VLAN 5 VLAN 5 TPID 8100 Packet TPID 8100 VLAN 5 TPID 88A8 Discarded PVID Packet Packet Discarded VLAN 5 VLAN 5 TPID 88A8 TPID 88A8 PVID VLAN 5 TPID 8 Discarded VLAN 5 VLAN 5 Packet TPID 88A8 TPID 8888 Egress behavior in the meantime can be configured on the last 3 columns under Port VLAN and 32 Tx Tag Port VLAN When None is selected a VLAN tag with the classified VLAN ID is inserted in frames transmitted on the port This mode is normally used for ports connected to VLAN aware switches When Specific the default value is selected a Port VLAN ID can be configured see below Untagged frames received on the port are classified to the Port VLAN ID If VLAN awareness is disabled all frames received on the port are classified to the Port VLAN ID If the classified VLAN ID of a frame transmitted on the port is different from the Port VLAN ID a VLAN tag with the classified VLAN ID is inserted in the frame Tx Tag This option determines the Egress Behavior of the selected Port Untag_pvid All VLANs except the configured PVID will be tagged Tag_all All VLANs are tagged Untag_all All VLANs are untagged SW1024 3106 DHCP Porta 3106 DHCP Discovery Trunk N Discovery 3106 DHCP Discovery 3106 DHCP Discovery WHG Ports Portg
45. Table Dynamic 1 00 0C 29 20 F5 E2 at VLAN Membership Dynamic 1 90 0C 29 4D 09 17 Z VLAN Port Dynamic 1 00 0C 29 67 73 2D y wets Dynamic 1 00 0C 29 76 3F 8C Fi Diagnostics Dynamic 1 00 0C 29 7D 05 93 y Maintenance Dynamic 41 00 0C 29 BC 9E 41 E Dynamic 1 00 0C 29 C6 3A 9A Y Dynamic 1 00 0C 29 DO 56 30 z Dynamic 1 00 0C 29 DB FC C8 Y Dynamic 1 00 0C 29 E6 AA F4 Y Dynamic 1 00 0C 29 EC 51 D7 Y Dynamic 1 00 0C 29 F4 2D 6E We MAC Table Columns The stack unit where the entry is learned Indicates whether the entry is a static or a dynamic entry The MAC address of the entry The VLAN ID of the entry The ports that are members of the entry Buttons Auto refresh Check this box to enable an automatic refresh of the page at regular intervals Refresh Refreshes the displayed table starting from the Start from MAC address and VLAN input fields Clear Flushes all dynamic entries lt lt Updates the table starting from the first entry in the MAC Table i e the entry with the lowest VLAN ID and MAC address gt gt Updates the table starting with the entry after the last entry currently displayed 267 ly ll 21 12 VLAN Membership Status This page provides an overview of membership status of VLAN users
46. The Current column is used to show the active IP configuration Enable the DHCP client by checking this box If DHCP fails and the configured IP address is zero DHCP will retry If DHCP fails and the configured IP address is non zero DHCP will stop and the configured IP settings will be used The DHCP client will announce the configured System Name as hostname to provide DNS lookup Provide the IP address of this switch in dotted decimal notation Provide the IP mask of this switch dotted decimal notation Provide the IP address of the router in dotted decimal notation 56 Provide the IP address of the DNS Server in dotted decimal notation Provide the managed VLAND ID The allowed range is 1 to 4095 When DNS proxy is enabled the switch will relay DNS requests to the current configured DNS server on the switch and reply as a DNS resolver to the client device on the network Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values Renew Click to renew DHCP This button is only available if DHCP is enabled 1 3 IPv6 Configuration Configure the switch managed IPv6 information on this page 4ipnet Configuration i IPv6 Configuration Information ie Time E 192 168 2 1 Log A Link Local Address fe80 203 ceffe25 4e13 Power Reduction 96 96 Ports Security Aggregation Loop Protection a MVR IPMC LLDP PoE MAC Table
47. The end host will be allowed to forward if the limit is not exceeded Now suppose that the end host logs off or powers down If it wasn t for aging the end host would still take up resources on this switch and will be allowed to forward To overcome this situation enable aging With aging enabled a timer is started once the end host gets secured When the timer expires the switch starts looking for frames from the end host and if such frames are not seen within the next Aging Period the end host is assumed to be disconnected and the corresponding resources are freed on the switch Port Configuration The table allows you to configure the Port Configuration parameters which are The port number to which the configuration below applies 4ipnet Configuration eee A ae Port Security Limit Control Configuration Power Reduction Ports System Configuration Security Switch Disabled y Users A Privilege Levels Auth Method 3600 seconds SSH HTTPS Port Configuration Access Management SNMP RMON o a a lt gt i l oo 1 Enabled 4 Disabled Reopen Alarm z None 5 sel 2 Disabled al Trap Disabled Reopen Network 3 Disabled 4 Shutdown Disabled Reopen Limit Control Trap amp Shutdown m MS 4 Disabled 4 None Disabled Reopen DHCP 5 Disabled
48. Tw for this link Note NOT the link partner The resolved value that is the actual tx wakeup time used for this link based on EEE information exchanged via LLDP The resolved Rx Tw for this link Note NOT the link partner The resolved value that is the actual tx wakeup time used for this link based on EEE information exchanged via LLDP Show if the switch and the link partner have agree upon which wakeup times to use Red Switch and link partner have not agreed upon wakeup time Green Switch and link partner have agreed upon wakeup time Buttons Refresh Click to refresh the page immediately Auto refresh Check this box to enable an automatic refresh of the page at regular intervals 21 9 5 LLDP Statistics This page provides an overview of all LLDP traffic Two types of counters are shown Global counters are counters that refer to the whole switch while local counters refer to per port counters for the currently selected switch 263 4ipnet Ea ion LLDP Global Counters Auto refresh El Refresh Cean System CPU Load Neighbour entries were last changed 1970 01 01T08 00 00 08 00 426160 secs ago Total Neighbours Entries Added 0 Detailed Log Total Neighbours Entries Deleted 0 Ports Total Neighbours Entries Dropped 0 Security Total Neighbours Entries Aged Out 0 Loop Protection Spanning Tree LLDP Statistics Local Counters Bridge Status e Local Port Tx Frames R
49. VLAN Qos Port Classification Port Policing Port Scheduler Port Shaping Port Tag Remarking Port DSCP DSCP Based QoS DSCP Translation DSCP Classification QoS Control List Storm Control Mirroring UPnP sFlow Monitor Diagnostics Maintenance Indicates the index of QCE Indicates Port Indicates the list of ports configured with the QCE Indicates the type of frame to look for incoming frames Possible frame types are Any The QCE will match all frame type Ethernet Only Ethernet frames with Ether Type 0x600 OxFFFF are allowed LLC Only LLC frames are allowed SNAP Only SNAP frames are allowed IPv4 The QCE will match only IPV4 frames IPv6 The QCE will match only IPV6 frames Displays the OUI field of Source MAC address i e first three octet byte of MAC address Specify the type of Destination MAC addresses for incoming frame Possible values are Any All types of Destination MAC addresses are allowed Unicast Only Unicast MAC addresses are allowed Multicast Only Multicast MAC addresses are allowed Broadcast Only Broadcast MAC addresses are allowed The default value is Any 185 Indicates VLAN ID either a specific VID or range of VIDs VID can be in the range 1 4095 or Any Priority Code Point Valid value PCP are specific 0 1 2 3 4 5 6 7 or range 0 1 2 3 4 5 6 7 0 3 4 7 or Any Drop Eligible Indicator Valid value of DEI can be any of values between 0 1 or An
50. Valid values are in the range 1 to 255 190 Advertising Duration The duration carried in SSDP packets is used to inform a control point or control points how often it or they should receive an SSDP advertisement message from this switch If a control point does not receive any message within the duration it will think that the switch no longer exists Due to the unreliable nature of UDP in the standard it is recommended that such refreshing of advertisements to be done at less than one half of the advertising duration In the implementation the switch sends SSDP messages periodically at the interval one half of the advertising duration minus 30 seconds Valid values are in the range 100 to 86400 Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 191 20 sFlow Configuration Sampled Flow sFlow is a traffic monitoring technology mainly used to collect and analyze traffic statistics The switch supports sFlow feature The sFlow software agent collects traffic statistics and packet information from the sFlow enabled interfaces on the switch encapsulates them into sFlow packets The sFlow agent then sends the packet to a specified sFlow collector the IP Address you assigned in the switch Ul The sFlow collector analyzes the sFlow packets and displays the result sFlow has the following two sampling mechanisms Flow sampling Packet based sampling used to
51. applies ae i Authentication Method Configuration Authentication Method can be set to one of the following console 68 telnet values none authentication is disabled and login is not possible local use the local user database on the switch for authentication RADIUS use a remote RADIUS server for authentication TACACS use a remote TACACS server for authentication Fallback Enable fallback to local authentication by checking this box If none of the configured authentication servers are alive the local user database is used for authentication This is only possible if the Authentication Method is set to a value other than none or local Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 4 1 4 Security Switch SSH Configuration With SSH you can remotely connect to the switch by command line interface The SSH connection can secure all the configuration commands you sent to the switch It is also known as secured Telnet console To access the switch by SSH you should install SSH client on your computer such as PuTTy console tool In the switch side the switch acts as SSH server for user login and you can Enable or Disable SSH on this page Please check the chapter 3 3 Preparation for Telnet SSH connection to see how to manage the switch through SSH console 4ipnet Configuration iio S
52. are no EAPOL frames involved in this authentication and therefore MAC based Authentication has nothing to do with the 802 1X standard The advantage of MAC based authentication over 802 1X based authentication is that the clients don t need special supplicant software to authenticate The disadvantage is that MAC addresses can be spoofed by malicious users equipment whose MAC address is a valid RADIUS user can be used by anyone Also only the MD5 Challenge method is supported The maximum number of clients that can be attached to a port can be limited using the Port Security Limit Control functionality RADIUS Assigned QoS Enabled When RADIUS Assigned QoS is both globally enabled and enabled checked on a given port the switch reacts to QoS Class information carried in the RADIUS Access Accept packet transmitted by the RADIUS server when a supplicant is successfully authenticated If present and valid traffic received on the supplicant s port will be classified to the given QoS Class If re authentication fails or the RADIUS Access Accept packet no longer carries a QoS Class or it s invalid or the supplicant is otherwise no longer present on the port the port s QoS Class is immediately reverted to the original QoS Class which may be changed by the administrator in the meanwhile without affecting the RADIUS assigned This option is only available for single client modes i e e Port based 802 1X Single 802 1X0 RADIUS attributes use
53. automatic refresh of the page at regular intervals DHCP Snooping Statistics This page provides statistics for DHCP snooping The statistics show only packet counters when DHCP snooping mode is enabled and relay mode is disabled And it doesn t count the DHCP packets for DHCP client gipnet Configuration Monitor System Information CPU Load Log Detailed Log Ports Security Access Management Statistics Network Port Security NAS ACL Status DHCP Snooping Statistics Relay Statistics ARP Inspection IP Source Guard Switch LACP Loop Protection Spanning Tree MVR IPMC LLDP PoE MAC Table VLANs VCL sFlow Diagnostics Maintenance DHCP Snooping Port Statistics Port 1 Receive Packets Transmit Packets Rx Discover Rx Offer Rx Request Rx Decline Rx ACK Rx NAK Rx Release Rx Inform Rx Lease Query Rx Lease Unassigned Rx Lease Unknown Rx Lease Active sosoocococooco Tx Discover Tx Offer Tx Request Tx Decline Tx ACK Tx NAK Tx Release Tx Inform Tx Lease Query Tx Lease Unassigned Tx Lease Unknown Tx Lease Active oooooocooooooo Receive and Transmit Packets 218 Port 1 a E Auto refresh E Refresh Clear The number of discover option 53 with value 1 packets received and transmitted The number of offer option 53 with value 2 packets received and transmitted The number of request option 53 with value 3 packets received and transmi
54. belong to Possible security models are Any Any security model accepted v1 v2c usm V1 Reserved for SNMPv1 V2c Reserved for SNMPv2c Usm User based Security Model USM Security Level Indicates the security model that this entry should belong to Possible security models are NoAuth NoPriv No authentication and no privacy Auth NoPriv Authentication and no privacy Auth Priv Authentication and privacy Read View Name The name of the MIB view defining the MIB objects for which this request may request the current values The allowed string length is 1 to 32 and the allowed content is ASCII characters from 33 to 126 Write View Name The name of the MIB view defining the MIB objects for which this request may potentially set new values The allowed string length is 1 to 32 and the allowed content is ASCII characters from 33 to 126 Buttons Add new access Click to add a new access entry Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 4 1 8 RMON Statistics Configuration RMON is short of Remote Monitoring On Network An RMON implementation typically operates in a client server model Monitoring device Probe contains RMON software agents that collect information of the system and ports The RMON software agent acts as server and the network management system NMS that communicate with it acts as client The RMON agent of the switch supports 4 group
55. can be used to restrict source subnet when combined with source mask Indicates the SNMP access source address mask Buttons Add new community Click to add a new community entry Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values SNMPv3 User Configuration Configure SNMPv3 user table on this page The entry index keys are Engine ID and User Name 4ipnet Configurati a gel a gt gt SNMPv3 User Configuration Switch ll 800007e5017f000001 default_user NoAuth NoPriv None None None None Users Privilege Levels AROS Add NewEnty Save Reset SSH HTTPS Access Management SNMP System Communities Users Groups Views Access RMON Network Limit Control NAS ACL DHCP IP Source Guar ARP Inspection k Check to delete the entry It will be deleted during the next save An octet string identifying the engine ID that this entry should belong to The string must contain an even number in hexadecimal format with number of digits between 10 and 64 but all zeros and all F s are not allowed The SNMPv3 architecture uses the User based Security Model USM for message security and the View based Access Control Model VACM for access control For the USM entry the usm User Engine ID and usm User Name are the entry s keys In a simple agent usm User Engine ID is always that agent s own snmp Engine ID value The value can also take the
56. client on the port will be allowed network access without authentication Force Unauthorized In this mode the switch will send one EAPOL Failure frame when the port link comes up and any client on the port will be disallowed network access Port based 802 1X In the 802 1X world the user is called the supplicant the switch is the authenticator and the RADIUS server is the authentication server The authenticator acts as the man in the middle forwarding requests and responses between the supplicant and the authentication server Frames sent between the supplicant and the switch are special 802 1X frames known as EAPOL EAP Over LANs frames EAPOL frames encapsulate EAP PDUs RFC3748 Frames sent between the switch and the RADIUS server are RADIUS packets RADIUS packets also encapsulate EAP PDUs together with other attributes like the switch s IP address name and the supplicant s port number on the switch EAP is very flexible in that it allows for different authentication methods like MD5 CHALLENGE PEAP and TLS The important thing is that the authenticator the switch doesn t need to know which authentication method the supplicant and the authentication server are using or how many information exchange frames are needed for a particular method The switch simply encapsulates the EAP part of the frame into the relevant type EAPOL or RADIUS and forwards it When authentication is complete the RADIUS server sends a special packet
57. combination of alphabets a z or A Z and integers 0 9 Note special character and underscore are not allowed Adding a New Group to VLAN mapping entry Click to add a new entry in mapping table An empty row is added to the table Frame Type Value and the Group Name can be configured as needed The button can be used to undo the addition of new entry Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 166 VLC Protocol based VLAN Group Name to VLAN mapping Table gipnet Ci tii ei a Group Name to VLAN mapping Table Auto refresh El Refresh Power Reduction Ports Security Aggregation No Group entries Loop Protection pa es Add New Entry LLDP Save Reset PoE MAC Table gD Private VLANs MAC based VLAN Protocol based VLAN Protocol to Group Group to VLAN IP Subnet based VLAN Voice VLAN Qos Mirroring UPnP sFlow This page allows you to map an already configured Group Name to a VLAN for the switch The displayed settings are To delete a Group Name to VLAN map entry check this box The entry will be deleted on the switch during the next Save A valid Group Name is a string of at most 16 characters which consists of a combination of alphabets a z or A Z and integers 0 9 no special character is allowed Whichever Group name you try map to a VLAN must be present in Protocol to Group mappi
58. configuration for the switch can be monitored and modified here Up to 4096 VLANs are supported This page allows for adding and deleting VLANs as well as adding and deleting port members of each VLAN 4ipnet ua Configuration E E ra VLAN Membership Configuration Refresh _1 lt lt gt gt Power Reduction Ports Start from VLAN 1 with 20 entries per page Security Aggregation Port Members Loop Protection Spanning Tree Delete VLAN ID VLAN Name 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 1 default MIMI YA MIMI Salva IPMC LLDP 20 z0 WA A PoE 21 a 000 o0 MOO OO OO MAC Table VLANs ial 2000 On VLAN Membership Ports 2001 1n I Private VLANs 2002 2n WA VCL Voice VLAN Qos Add New VLAN J Mirroring i UPnP Save Reset sFlow A ere Monitor Diagnostics Maintenance Navigating the VLAN Table Each page shows up to 99 entries from the VLAN table default being 20 selected through the entries per page input field When first visited the web page will show the first 20 entries from the beginning of the VLAN Table The first displayed will be the one with the lowest VLAN ID found in the VLAN Table The VLAN input fields allow the user to select the starting point in the VLAN Table Clicki
59. containing a success or failure indication Besides forwarding this decision to the supplicant the switch uses it to open up or block traffic on the switch port connected to the supplicant Note Suppose two backend servers are enabled and that the server timeout is configured to X seconds using the AAA configuration page and suppose that the first server in the list is currently down but not considered dead Now if the supplicant retransmits EAPOL Start frames at a rate faster than X seconds then it will never get authenticated because the switch will cancel on going backend authentication server requests whenever it receives a new EAPOL Start frame from the supplicant And since the server hasn t yet failed because the X seconds haven t expired the same server will be contacted upon the next backend authentication server request from the switch This scenario will loop forever Therefore the server timeout should be smaller than the supplicant s EAPOL Start frame retransmission rate Single 802 1X In port based 802 1X authentication once a supplicant is successfully authenticated on a port the whole port is opened for network traffic This allows other clients connected to the port for instance through a hub to piggy back on the successfully authenticated client and get network access even though they really aren t authenticated To overcome this security breach use the Single 802 1 X variant Single 802 1X is really not an IEEE sta
60. entry Indicates the index of the data entry associated with the control entry The total number of events in which packets were dropped by the probe due to lack of resources The total number of events in which packets were dropped by the probe due to lack of resources The total number of octets of data including those in bad packets received on the network The total number of packets including bad packets broadcast packets and multicast packets received The total number of good packets received that were directed to the broadcast address 233 The total number of good packets received that were directed to a multicast address The total number of packets received that had a length excluding framing bits but including FCS octets of between 64 and 1518 octets The total number of packets received that were less than 64 octets The total number of packets received that were longer than 1518 octets The number of frames which size is less than 64 octets received with invalid CRC The number of frames which size is larger than 64 octets received with invalid CRC The best estimate of the total number of collisions on this Ethernet segment The best estimate of the mean physical layer network utilization on this interface during this sampling interval in hundredths of a percent Buttons Refresh Click to refresh the page immediately Auto refresh Click this box to enable an automatic refresh of the pag
61. first entry in the MLD SFP Information Table gt gt Updates the table starting with the entry after the last entry currently displayed 21 9 Monitor LLDP 21 9 1 LLDP Neighbour This page provides a status overview for all LLDP neighbours The displayed table contains a row for each port on which an LLDP neighbour is detected The columns hold the following information 4ipnet ws Configuration Monitor Auto refresh C Refresh System Information CPU Load No neighbour information found Log Detailed Log Ports Security LACP Loop Protection Spanning Tree Bridge Status o s Port Statistics IPMC LLDP Neighbours Neighbours PoE EEE Port Statistics PoE MAC Table VLANS VCL sFlow Diagnostics Maintenance 254 The port on which the LLDP frame was received The Chassis ID is the identification of the neighbour s LLDP frames The Remote Port ID is the identification of the neighbour port System Name is the name advertised by the neighbour unit Port Description is the port description advertised by the neighbour unit System Capabilities describes the neighbour unit s capabilities The possible capabilities are a Other Repeater Bridge WAN Access Point Router Telephone DOCSIS cable device Station only oO oo N Do A WO DY Reserved When a capability is enabled the capability is followed by If the capability is disabled the ca
62. gt lt ip_addr_host gt Configuration lt udp_port gt lt datagram_size gt Example sFlow gt receiver 10 192 168 2 100 6343 1400 Result Receiver Configuration Owner lt none gt Receiver 192 168 2 100 UDP Port 6343 Max Datagram 1400 bytes Time left 0 seconds Receiver Release sFlow gt receiver Port Configuration Syntax sFlow Receiver release lt timeout gt lt ip_addr_host gt lt udp_port gt lt datagram_size gt sFlow FlowSampler lt port_list gt lt sampling_rate gt lt max_hdr_size gt sFlow CounterPoller lt port_list gt lt interval gt sFlow Statistics Receiver clear sFlow Statistics Samplers lt port_list gt clear Example sFlow gt flow 1 2 10128 Enable FlowSample on port 1 2 rate 10 max size 128 sFlow gt coun 1 25 Enable CounterPoller of port 1 2 and set interval to 5 sFlow gt statistic sample 1 2 Per Port Statistics 315 21 Diagnostic Commands Feature Command Line Ping Ping Test Syntax IP Ping lt ip_addr_string gt Length lt ping_length gt Count lt ping_count gt Interval lt ping_interval gt Parameters lt ip_addr_string gt IPv4 host address a b c d or a host name string length PING Length keyword lt ping_length gt Ping ICMP data length 2 1452 Default is 56 excluding MAC IP and ICMP headers count PING Count keyword lt ping_count gt Transmit EC
63. igmp enable disable Example IPMC gt leave proxy igmp en Enable IPMC gt leave proxy igmp dis Disable Proxy Enable Syntax IPMC Proxy mld igmp enable disable Example IPMC gt proxy igmp en Enable IPMC gt proxy igmp dis Disable Port Related Configuration Router Port Fast Leave Throttling Syntax IPMC Router mldligmp lt port_list gt enable disable IPMC Fastleave mldligmp lt port_list gt enable disable IPMC Throttling mld igmp lt port_list gt limit_group_number Example IPMC gt router igmp 25 26 en Port 25 26 are router ports IPMC gt Fast igmp 1 24 en Enable IGMP Fast Leave on P1 24 IPMCsthro igmp 1 25 Throtting of Port 1 2 is 5 groups VLAN Configuration Syntax IPMC State mld igmp lt vid gt enable disable IPMC Querier mld igmp lt vid gt enable disable IPMC Compatibility mld igmp lt vid gt auto v1 v2 v3 IPMC Parameter RV mldligmp lt vid gt ipmc_param_rv IPMC Parameter QI mldligmp lt vid gt ipmc_param_qi IPMC Parameter QRI mld igmp lt vid gt ipmc_param_qri IPMC Parameter LLQI mld igmp lt vid gt ipmc_param_llqi IPMC Parameter URI mldligmp lt vid gt ipmc_param_uri Example IPMC gt state igmp 2 en Enable IGMP Snooping on VLAN 2 IPMC gt quer igmp 2 en Enable IGMP Querier on VLAN 2 IPMC gt compa igmp 2 v2 Enable IGMPv2 on VLAN 2 MLD Snooping MLD Snooping Note The MLD Sno
64. is detected on a port The valid values are Shutdown Port Shutdown the port until the Shutdown Time timeout Shutdown Port and Log Shutdown the port and log the status Log Only Only log the status Controls whether the port is actively generating loop protection PDU s or whether it is just passively looking for looped PDU s Button Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 123 7 Spanning Tree The switch supports Multiple Spanning Tree Protocol MSTP Rapid Spanning Tree Protocol RSTP and Legacy Spanning Tree Protocol STP The STP and RSTP is combined and defined in IEEE 802 1D 2004 Rapid Spanning Tree Protocol The RSTP protocol is applied to single network domain no matter how many VLANs in your network In RSTP domain one of the switch acts as the Root Switch and block one of the link with highest path cost to avoid network loop There are maximum 23 level switches within one RSTP domain the network size may be limited Multiple Spanning Tree Protocol MSTP is a direct extension of RSTP It can provide an independent spanning tree for different VLANs With the Spanning Tree and VLAN mapping each VLAN has its own root and blocking path the STP region size becomes lower the convergence time of topology change becomes faster as well There are some important abbreviation as below Common Spanning Tree CST Common Spanning Tree CST inter
65. long shared between the TACACS Authentication Server and the switch Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 118 5 Aggregation Configuration Link Aggregation is also known as Port Trunking It allows user using multiple ports in parallel to increase the link speed beyond the limits of a port and to increase the redundancy for higher availability The switch support both Static and Dynamic link aggregation LACP The switch also supports different Hash mechanism to forward traffic according to the MAC address or IP Protocol Port Number 5 1 Static Aggregation This page is used to configure the Aggregation hash mode and the aggregation group gipnet Configuration A ined Aggregation Mode Configuration Power Reduction Ports Security Source MAC Address Switch Destination MAC Address A IP Address Aggregation TCP UDP Port Number Static LACP Loop Protection Spanning Tree MVR IPMC LLDP PoE MAC Table o 000 9 90 00 00 000 000 OK on 000 O 00000 00000 90 m 00 000 o o y dh 00000 lone e 0000000009 0 0000000 O 0000 0 00 00 a 000000 00 00 000 300 3 O Y 0000 Monitor Diagnostics Maintenance 10000 O 0000000000 000 000 000000000000 O 00000000
66. mode operation Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 4 1 6 Security Switch Access Management Configuration The Access Management mode allows user to limit the switch access with specific range of IP address and disable some remote management service such HTTP HTTPS SNMP Telnet and SSH This feature is important while user installed the switch on network After enabled the Access Management only the pre configured IP address or a range of IP address can access the switch management interface and only the available service can be accessed Configure access management table on this page The maximum entry number is 16 If the application s type match any one of the access management entries it will allow access to the switch Example of the below figure only the IP Addresses range from 192 168 2 101 to 192 168 2 200 can access the switch s management interface The available services are HTTP HTTPS SNMP Telnet and SSH If there is one IP address 192 168 2 201 try to open the web management interface it is not allowed Access Management Configuration Enabled E Indicates the access management mode operation Possible modes are Enable Enable access management mode operation Disabled Disable access management mode operation Check to delete the entry It will be deleted during the nex
67. number The allowed range is 1 to 4095 A frame that hits this ACE matches this VLAN ID value Specify the tag priority for this ACE A frame that hits this ACE matches this tag priority The allowed number range is 0 to 7 The value Any means that no tag priority is specified tag priority is don t care ARP Parameters The ARP parameters can be configured when Frame Type ARP is selected Specify the available ARP RARP opcode OP flag for this ACE 103 Any No ARP RARP OP flag is specified OP is don t care ARP Frame must have ARP RARP opcode set to ARP RARP Frame must have ARP RARP opcode set to RARP Other Frame has unknown ARP RARP Opcode flag Specify the available ARP RARP opcode OP flag for this ACE Any No ARP RARP OP flag is specified OP is don t care Request Frame must have ARP Request or RARP Request OP flag set Reply Frame must have ARP Reply or RARP Reply OP flag Specify the sender IP filter for this ACE Any No sender IP filter is specified Sender IP filter is don t care Host Sender IP filter is set to Host Specify the sender IP address in the SIP Address field that appears Network Sender IP filter is set to Network Specify the sender IP address and sender IP mask in the SIP Address and SIP Mask fields that appear When Host or Network is selected for the sender IP filter you can enter a specific sender IP address in dotted decimal notation When Network is selected f
68. o Loop 9 0 0 0 0 Luis 10 0 0 0 0 MVE 11 0 0 0 0 IME 12 0 0 0 0 ra 13 0 0 0 0 MAC Table sa y 4 0 o 2 15 0 0 0 0 16 0 0 0 0 MER 17 0 0 0 0 SEM 18 0 0 0 0 Diagnostics 19 0 0 0 0 Maintenance ae a o 0 0 21 0 0 0 0 22 0 0 0 0 2 0 0 0 0 24 0 0 0 0 25 0 o 0 0 26 0 0 0 0 The switch port number Shows how many LACP frames have been received at each port Shows how many LACP frames have been sent from each port Shows how many unknown or illegal LACP frames have been discarded at each port Buttons Auto refresh Click this box to enable an automatic refresh of the page at regular intervals Refresh Click to refresh the page immediately Clear Clears the counters for all ports 21 5 Loop Protection This page displays the loop protection port status the ports of theswitch 239 4ipnet ua Configuration Monitor Loop Protection Status Auto refresh System Information CPU Load No ports enabled Log Detailed Log The switch port number of the logical port The currently configured port action The currently configured port transmit mode The number of loops detected on this port The current loop protection status of the port Whether a loop is currently detected on the port The time of the last loop event detected Buttons Refresh Click to refresh the page immediately Auto retresh Check this box to enable an automatic refresh of the page at regular inte
69. over IGMP Snooping VLAN Configuration Refresh lt lt gt gt Start from VLAN 4 with 20 entries per page Add New IGMP VLAN Save Reset IGMP Snooping VLAN Table Columns The VLAN ID of the entry Enable the per VLAN IGMP Snooping Only up to 64 VLANs can be selected Enable the IGMP Querier in the VLAN Compatibility is maintained by hosts and routers taking appropriate actions depending on the versions of IGMP operating on hosts and routers within a network The allowed selection is IGMP Auto Forced IGMPv1 Forced IGMPv2 Forced IGMPv3 default compatibility value is IGMP Auto Robustness Variable The Robustness Variable allows tuning for the expected packet loss on a network The allowed range is 1 to 255 default robustness variable value is 2 Query Interval The Query Interval is the interval between General Queries sent by the Querier The allowed range is 1 to 31744 seconds default query interval is 125 seconds Query Response Interval The Max Response Time used to calculate the Max Resp Code inserted into the periodic General Queries The allowed range is 0 to 31744 in tenths of seconds default query response interval is 100 in tenths of seconds 10 seconds 137 Last Member Query Interval The Last Member Query Time is the time value represented by the Last Member Query Interval multiplied by the Last Member Query Count The allowed range is 0 to 31744 in tenths of
70. port 802 1p IP Precedence IP ToS IP DSCP DiffServ the queue scheduling supports WRR Strict Priority and Hybrid NE Advanced Security supports IEEE 802 1x RADIUS TACAS IP MAC Filter 10 Support Command Line Web Management SNMP V1 V2c V3 RMON Secured Management supports HTTPS SSL and SSHv2 sFlow NTP LLDP Port Mirroring Cable Diagnostic UPnP IPv6 Features 11 1 2 Product Specification Hardware Specification Total Port 26 10 100 1000 Mbps 24 Gigabit SFP 2 Interface Auto negotiation and Auto MDIX Yes Backpressure for half duplex Flow Control 802 3x for full duplex Console RJ 45 Yes System State Color Y LED Port State Link Act Color Y POE State On Color Y CPU 416MHz Flash 16MB SDRAM 128MB Packet Buffer 4MB System Switching Capacity 52Gbps non blocking Forwarding Architecture Store and forward Package Forwarding Rate 38 7Mpps 64bytes MAC Address Table 8K Jumbo Frame 9K Port Volume 24 ea PoE Capability 30W 802 3at Total PSE Power 500W Current Share Power through RJ 45 pin Pair1 2 3 6 AC Input 100 240V AC 50 60Hz Power Requirement onSunpteh Consumption not include PSE 25W Consumption include PSE 500W Current Share Operating Temperature Degree C 0 40 Environment Relative Humidity operating 5 90 non condensing Storage Temperature Degree C 20 80 Relative Humidity stora
71. port_list gt source receiver inactive Example Port 2 Source Port Port 6 7 Receiver Port MVR gt vlan port 2 2 source MVR gt vlan port 2 6 7 rec Immediately Leave Syntax MVR Immediate Leave lt port_list gt enable disable 303 Example MVR gt immedi leave 1 10 en MVR Configuration MVR gt conf View the settings of above configuration MVR Configuration MVR Mode Enabled MVR Interface Setting VID Name Mode Tagging Priority LLQI 2 Source2 Dynamic Tagged 0 5 Port Setting of Source2 VID 2 Source Port 2 Receiver Port 6 7 Inactive Port 1 3 5 8 26 Channel Setting of Source2 VID 2 lt Empty Channel Table gt MVR Immediate Leave Setting Port Immediate Leave Enabled aN Oar WD m 3 D o o a o m 3 D o ed O m 3 D ion o a Disabled Disabled N 9 IPMC Feature Command Line IGMP Snooping Configuration IGMP Snooping Syntax Enable IPMC Mode mldligmp enable disable Example IPMC gt mode igmp en Unregistered IPMCv4 Flooding Enabled Syntax IPMC Flooding mldligmp enable disable Example IPMC gt flood igmp en IGMP SSM Range Source Specific Multicast Syntax IPMC SSM mldligmp Range lt prefix gt lt mask_len gt Example IPMC gt ssm igmp range 239 0 0 0 8 Range from 239 0 0 0 mask length 8 304 Leave Proxy Enable Syntax IPMC Leave Proxy mld
72. suggested that SFP transceivers be purchased with the switch provider to avoid any incompatibility Plug in the SFP fiber transceiver first The SFP transceiver has 2 plugs for the fiber cable one is for TX transmit and the other for RX receive Cross connect the transmit channel at each end to the receive channel at the opposite end Rack mount Installation Attach the brackets to the device by using the screws provided in the Rack Mount kit Mount the device in the 19 rack by using four rack mounting screws provided by the rack manufacturer 18 Chapter 3 Getting Started The switch provides both in band and out band configuration methods Out band Management The switch can be configured via the RS232 console interface when not connected to your network or when connection with the switch is lost In Band Management You can remotely manage the switch via a Web browser such as Microsoft Internet Explorer or Mozilla Firefox and etc to configure and monitor the switch from anywhere on the network 3 1 Access via the Serial Console Interface Included in the package there is a RS 232 console cable Please attach one end of the console cable to your PC COM port the other end to the console port of the switch 1 2 3 4 al Go to Start gt Program gt Accessories gt Communication gt Hyper Terminal Give a name to the new console connection Choose the COM name Select the correct serial sett
73. that hits this ACE matches this TCP UDP source value Specify the TCP UDP destination filter for this ACE Any No TCP UDP destination filter is specified TCP UDP destination filter status is don t care Specific If you want to filter a specific TCP UDP destination filter with this ACE you can enter a specific TCP UDP destination value A field for entering a TCP UDP destination value appears Range If you want to filter a specific range TCP UDP destination filter with this ACE you can enter a specific TCP UDP destination range value A field for entering a TCP UDP destination value appears When Specific is selected for the TCP UDP destination filter you can enter a specific TCP UDP destination value The allowed range is 0 to 65535 A frame that hits this ACE matches this TCP UDP destination value When Range is selected for the TCP UDP destination filter you can enter a specific TCP UDP destination range value The allowed range is 0 to 65535 A frame that hits this ACE matches this TCP UDP destination value Specify the TCP No more data from sender FIN value for this ACE 0 TCP frames where the FIN field is set must not be able to match this entry 107 1 TCP frames where the FIN field is set must be able to match this entry Any Any value is allowed don t care Specify the TCP Synchronize sequence numbers SYN value for this ACE 0 TCP frames where the SYN field is set must not be able to match this entry
74. the DHCP Offer to all ports of the same VLAN Membership And because Ports 5 9 and 13 are all set to Untag_PVID DHCP Offer to Port 5 will become untagged while Ports 9 and 13 will forward packets with the 3106 tag WHG a 3106 DHCP Request Ports PVID 3106 SW1024 Portg PVID 3107 PVID 3108 Port13 Untag DHCP pa 7 DHCP Client Finally the Client connected to Port 5 replies with an untagged DHCP request unicast packet and successfully obtains an IP Address from the DHCP Server WHG 3106 DHCP Ack PVID 3106 SW1024 Portg PVID 3107 PVID 3108 Port13 HCP Ack Untag DHCP Client 35 Chapter 6 Power Over Ethernet The 4ipnet SW1024 is cable of supplying power over Ethernet and is capable of supplying up to 500W of power This chapter provides detailed instructions on how power can be configured and managed on the Web Management Interface Configuration path Configuration gt gt PoE Power reserved for each port can be configured in a variety of ways Power Over Ethernet Configuration Reserved Power determined by Class Allocation LLDP MED Power Management Mode Actual Consumption Reserved Power Reserve Power by Class Power allocated to each port is determined according to the Class configured You may co
75. the guest voice media This application type should not be advertised if all the same network policies apply as those advertised in the Guest Voice application policy 5 Softphone Voice for use by softphone applications on typical data centric devices such as PCs or laptops This class of endpoints frequently does not support multiple VLANs if at all and are typically configured to use an untagged VLAN or a single tagged data specific VLAN When a network policy is defined for use with an untagged VLAN see Tagged flag below then the L2 priority field is ignored and only the DSCP value has relevance 6 Video Conferencing for use by dedicated Video Conferencing equipment and other similar appliances supporting real time interactive video audio services 7 Streaming Video for use by broadcast or multicast based video content distribution and other similar applications supporting streaming video services that require specific network policy treatment Video applications relying on TCP with buffering would not be an intended use of this application type 8 Video Signaling conditional for use in network topologies that require a separate policy for the video signaling than for the video media This application type should not be advertised if all the same network policies apply as those advertised in the Video Conferencing application policy Tag Tag indicating whether the specified application type is using a tagged
76. the maximum time to wait for a reply from a server If the server does not reply within this timeframe we will consider it to be dead 116 and continue with the next enabled server if any RADIUS servers are using the UDP protocol which is unreliable by design In order to cope with lost frames the timeout interval is divided into 3 subintervals of equal length If a reply is not received within the subinterval the request is transmitted again This algorithm causes the RADIUS server to be queried up to 3 times before it is considered to be dead The Dead Time which can be set to a number between 0 and 3600 seconds is the period during which the switch will not send new requests to a server that has failed to respond to a previous request This will stop the switch from continually trying to contact a server that it has already determined as dead Setting the Dead Time to a value greater than 0 zero will enable this feature but only if more than one server has been configured RADIUS Authentication Server Configuration The table has one row for each RADIUS Authentication Server and a number of columns which w gt 2 The RADIUS Authentication Server number for which the configuration below applies Enable the RADIUS Authentication Server by checking this box The IP address or hostname of the RADIUS Authentication Server IP address is expressed in dotted decimal notation The UDP port to use on the RADIUS Authentication
77. the port are discarded By default the field is set to All Configures the Port VLAN Mode The allowed values are None or Specific This parameter affects VLAN ingress and egress processing If None is selected a VLAN tag with the classified VLAN ID is inserted in frames transmitted on the port This mode is normally used for ports connected to VLAN aware switches 159 If Specific the default value is selected a Port VLAN ID can be configured see below Untagged frames received on the port are classified to the Port VLAN ID If VLAN awareness is disabled all frames received on the port are classified to the Port VLAN ID If the classified VLAN ID of a frame transmitted on the port is different from the Port VLAN ID a VLAN tag with the classified VLAN ID is inserted in the frame Configures the VLAN identifier for the port The allowed values are 1 through 4095 The default value is 1 Note The port must be a member of the same VLAN as the Port VLAN ID Determines egress tagging of a port Untag_pvid All VLANs except the configured PVID will be tagged Tag_all All VLANs are tagged Untag_all All VLANs are untagged Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 160 14 Private VLANs The Private VLAN feature provides the ability to extend the capabilities of a standard VLAN The additional concepts Primary VLAN Community VLAN and Isolated
78. thereby a re authentication immediately The clients will transfer to the unauthorized state while the re authentication is in progress Buttons Refresh Click to refresh the page Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 4 2 3 Security Network Access Control List Configuration Configure the ACL parameters ACE of each switch port These parameters will affect frames received on aport unless the frame matches a specific ACE 4ipnet Configuration ACL Ports Configuration System Power Reduction Port Policy ID Action Rate Limiter ID Port Redirect Mirror Logging Shutdown State Counter eae EE Security Poti E Switch Es 0 lt gt v lt gt X lt gt X lt gt le lt gt X lt gt Users Port 2 Privilege Levels Pot 3 7 Auth Method a SSH HTTPS 1 0 Permit v Disabled X Sid Disabled Disabled w Disabled Enabled v 4040 Access Management Port 3 SNMP 3 a r E 7 RMON 2 0 Permit x Disabled X nan Disabled Disabled w Disabled Enabled v 0 History Port 3 gt Alarm Event MO 3 o Permit Disabled ah Disabled Disabled Disabled Enabled gt 0 NAS Pot3 F ACL a Ports Gs Rate Limiters 4 o Permit Disabled x Port1 Bl pisabled Disabled Disabled En
79. three modes for configuring how the ports PDs may reserve power 1 Allocation mode In this mode the user allocates the amount of power that each port may reserve The allocated reserved power for each port PDs specified in the Maximum Power fields 2 Class mode In this mode each port automatically determines how much power to reserve according to the class the connected PD belongs to and reserves the power accordingly Four different port classes exist and one for 4 7 15 4 or 30 Watts In this mode the Maximum Power fields have no effect 3 LLDP MED mode This mode is similar to the Class mode except that each port determine the amount power it reserves by exchanging PoE information using the LLDP protocol and reserves power accordingly If no LLDP information is available for a port the port will reserve power using the class mode In this mode the Maximum Power fields have no effect For all modes If a port uses more power than the reserved power for the port the port is shut down Power Management Mode There are 2 modes for configuring when to shut down the ports 1 Actual Consumption In this mode the ports are shut down when the actual power consumption for all ports exceeds the amount of power that the power supply can deliver or if the actual power consumption for a given port exceeds the reserved power for that port The ports are shut down according to the ports priority If two ports have the same priority the port with t
80. to move up one level or to go to root level System gt System Contact Syntax System Name lt name gt 282 Parameters lt name gt System name string 1 255 Example Contact Name Orwell System gt contact Orwell System Name Syntax System Name lt name gt Parameters lt name gt System name string 1 255 Example Contact Name poeswitch System gt name poeswitch poeswitch gt After given system name the prompt character will be changed automatically System Location Syntax System Location lt location gt Parameters lt location gt System location string 1 255 Example Location Name poeswitch System gt loca fll_01 Time Zone Offset Syntax System Timezone lt offset gt Parameters lt offset gt Time zone offset in minutes 720 to 720 relative to UTC Example Time Zone 100 poeswitch System gt time 100 IP Configuration IP Group Enter the IP Configuration Group poeswitch gt ip Type up to move up one level or to go to root level poeswitch IP gt DHCP Client Syntax IP DHCP enable disable poeswitch IP gt dhcp en IP Setting Address Mask Gateway Managed VID Syntax IP Setup lt ip_addr gt lt ip_mask gt lt ip_router gt lt vid gt Example P 192 168 2 2 Mask 255 255 255 0 Gateway 192 168 2 254 VID 1 poeswitch IP gt setup 192 168 2 2 255 255 255 0 192 168 2 254 1
81. transmit the size counters for receive and transmit and the error counters for receive and transmit gipnet Configuration Monitor System Information Receive Total Transmit Total CPU Load Rx Packets 0 Tx Packets 0 Log Rx Octets 0 Tx Octets 0 Detailed Log Rx Unicast 0 Tx Unicast 0 Ports Rx Multicast 0 Tx Multicast 0 State Rx Broadcast 0 Tx Broadcast 0 Traffic Overview Rx Pause 0_ Tx Pause 0 PAN Receive Size Counters Transmit Size Counters Detailed Statistics Rx 64 Bytes D_ Tx 64 Bytes 0 Security Rx 65 127 Bytes 0 Tx 65 127 Bytes 0 LACP Rx 128 255 Bytes 0 Tx 128 255 Bytes 0 a Rx 256 511 Bytes 0 Tx 256 511 Bytes 0 Spanning Tree Rx 512 1023 Bytes 0 Tx 512 1023 Bytes 0 MVR Rx 1024 1526 Bytes 0 Tx 1024 1526 Bytes 0 PMC Rx 1527 Bytes 0_ Tx 1527 Bytes 0 LLDP Receive Queue Counters Transmit Queue Counters PoE Rx Q0 0 TxQ0 0 MAC Table Rx Q1 0 TxQ1 0 VLANS Rx Q2 0 TxQ2 0 VCL Rx Q3 0 TxQ3 0 sFlow Rx Q4 0 TxQ4 0 Diagnostics Rx Q5 0 TxQ5 0 Maintenance Rx Q6 0 TxQ6 0 Rx Q7 0_TxQ7 0 Receive Error Counters Transmit Error Counters Rx Drops 0 Tx Drops 0 Rx CRC Alignment 0 Tx Late Exc Coll 0 Rx Undersize 0 Rx Oversize 0 Rx Fragments 0 Rx Jabber 0 Rx Filtered 0 Detailed Port Statistics Port 1 Port 1 Auto refresh Refresh Clear 201 Receive Total and Transmit Total The number of received and transmitted good and bad packets The number of received and transmit
82. values are Enabled If a frame is received on the port the port will be disabled Disabled Port shut down is disabled The default value is Disabled Counts the number of frames that match this ACE Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values Refresh Click to refresh the page Any changes made locally will be undone Clear Click to clear the counter ACL Rate Limiters Configuration Configure the rate limiter for the ACL of the switch 97 gipnet papi laser ACL Rate Limiter Configuration Power Reduction Ports sey OO Users 1 1 pps Privilege Level Auth Method 2 SSH HTTPS 3 1 pps E Access A 1 Management SNMP 5 1 pps RMON Statistics 6 1 Hist pry 7 pps Ban 1 Network Limit Control 9 a pps y ACL 0 1 pps el Ports 11 1 pps Rate Limiters poes a Control List DHCP 13 1 IP Source Gu ARP Inspedion 14 1 pps ds 15 1 pps y Loop Protection 61 a Spanning Tree HV The rate limiter ID for the settings contained in the same row The allowed values are 0 3276700 in pps Or 0 100 200 300 1000000 in kbps Specify the rate unit The allowed values are pps packets per second kbps Kbits per second Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values Access Contro
83. y sFlow 9 F a unlimited y Monitor Diagnostics 10 la al unlimited y Maintenance 11 F a unlimited 12 m unlimited Global Configuration Enable the Global IGMP Snooping 135 Enable unregistered IPMCv4 traffic flooding Unregistered IPMCv4 traffic is so called unknown multicast After selected the unregistered multicast stream will be forwarded like normal packets Once you un selected it such stream will be discarded SSM Source Specific Multicast Range allows the SSM aware hosts and routers run the SSM service model for the groups in the address range Enable IGMP Leave Proxy This feature can be used to avoid forwarding unnecessary leave messages to the router side Enable IGMP Proxy This feature can be used to avoid forwarding unnecessary join and leave messages to the router side Port Related Configuration Specify which ports act as router ports A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or MLD querier Normally the router port is the uplink port to the upper L3 Router or IGMP Querier For example in below figure the green port of the 2 switches are Router port _ lt _ lt Ge B Source Router Switch Switch Receiver Router port Multicast packets If an aggregation member port is selected as a router port the whole aggregation will act as a router port Enable the fast leave on the port Multicast snooping Fast Leave
84. 0 seconds Last Listener Query Interval The Last Listener Query Interval is the Maximum Response Delay used to calculate the Maximum Response Code inserted into Multicast Address Specific Queries sent in response to Version 1 Multicast Listener Done messages It is also the Maximum Response Delay used to calculate the Maximum Response Code inserted into Multicast Address and Source Specific Query messages The allowed range is 0 to 31744 in tenths of seconds default last listener query interval is 10 in tenths of seconds 1 second Unsolicited Report Interval The Unsolicited Report Interval is the time between repetitions of a node s initial report of interest in a multicast address The allowed range is 0 to 31744 seconds default unsolicited report interval is 1 second Buttons Refresh Refreshes the displayed table starting from the VLAN input fields lt lt Updates the table starting from the first entry in the VALN Table i e the entry with the lowest 141 VLAND ID gt gt Update the table staring with the entry after the last entry currently displayed 9 2 3 IPMC MLD Snooping Port Group Filtering MLD Snooping Port Group Filtering Configuration Check to delete the entry It will be deleted during the next save The logical port for the settings The IP Multicast Group that will be filtered Click to add a new entry to the Group Filtering table Specify the Port and Filtering Group for the new entry
85. 1 TCP frames where the SYN field is set must be able to match this entry Any Any value is allowed don t care Specify the TCP Reset the connection RST value for this ACE 0 TCP frames where the RST field is set must not be able to match this entry 1 TCP frames where the RST field is set must be able to match this entry Any Any value is allowed don t care Specify the TCP Push Function PSH value for this ACE 0 TCP frames where the PSH field is set must not be able to match this entry 1 TCP frames where the PSH field is set must be able to match this entry Any Any value is allowed don t care Specify the TCP Acknowledgment field significant ACK value for this ACE 0 TCP frames where the ACK field is set must not be able to match this entry 1 TCP frames where the ACK field is set must be able to match this entry Any Any value is allowed don t care Specify the TCP Urgent Pointer field significant URG value for this ACE 0 TCP frames where the URG field is set must not be able to match this entry 1 TCP frames where the URG field is set must be able to match this entry Any Any value is allowed don t care Ethernet Type Parameters The Ethernet Type parameters can be configured when Frame Type Ethernet Type is selected Specify the Ethernet type filter for this ACE Any No EtherType filter is specified EtherType filter status is don t care Specific If you want to filter a s
86. 4i n et for your IP network User s Manual V1 01 Management PoE Switch SW1024 Copyright The contents of this publication may not be reproduced in any part oras a whole stored transcribed in an information retrieval system translated into any language or transmitted in any form or by any means mechanical magnetic electronic optical photocopying manual or otherwise without the prior written permission of 4IPNET INC Disclaimer 4IPNET INC does not assume any liability arising out the application or use of any products or software described herein Neither does it convey any license under its parent rights nor the parent rights of others 4IPNET further reserves the right to make changes in any products described herein without notice The publication is subject to change without notice Trademarks 4IPNET 4ipnet is a registered trademark of 4IPNET INC Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners FCC Caution This Equipment has been tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of the FCC rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy It may cause harmful interference to radio communications if the equipment is not
87. 64 bytes from 10 10 132 20 icmp_seq 1 time 0ms 64 bytes from 10 10 132 20 icmp_seq 2 time 0ms 64 bytes from 10 10 132 20 icmp_seq 3 time 0ms 64 bytes from 10 10 132 20 icmp_seq 4 time 0ms Sent 5 packets received 5 OK 0 bad You can configure the following properties of the issued ICMP packets The destination IP Address The payload size of the ICMP packet Values range from 2 bytes to 1452 bytes The count of the ICMP packet Values range from 1 time to 60 times The interval of the ICMP packet Values range from 0 second to 30 seconds 22 3 VeriPHY Cable Diagnostic This page is used for running the VeriPHY Cable Diagnostics Select the port and then press Start to run the diagnostics This will take approximately 5 seconds If all ports are selected this can take approximately 15 seconds When completed the page refreshes automatically and you can view the cable diagnostics results in the cable status table Note that VeriPHY is only accurate for cables of length 7 140 meters 10 and 100 Mbps ports will be linked down while running VeriPHY Therefore running VeriPHY on a 10 or 100 Mbps management port will cause the switch to stop responding until VeriPHY is complete 275 4ipnet Ea Configuration J gt 1 Monitor VeriPHY Cable Diagnostics Diagnostics Ping All Ping6 VeriPHY Maintenance Star CS ae Sig 3 N a 2 z Ss En 3 2 Es En En En ES AZ Ee PES g 5
88. 8
89. 99 entries from the Dynamic ARP Inspection table default being 20 selected through the entries per page input field When first visited the web page will show the first 20 entries 221 from the beginning of the Dynamic ARP Inspection Table The Start from port address VLAN MAC address and IP address input fields allow the user to select the starting point in the Dynamic ARP Inspection Table Clicking the button will update the displayed table starting from that or the closest next Dynamic ARP Inspection Table match In addition the two input fields will upon a button click assume the value of the first displayed entry allowing for continuous refresh with the same start address The will use the last entry of the currently displayed table as a basis for the next lookup When the end is reached the text No more entries is shown in the displayed table Use the button to start over 4ipnet ale on Dynamic ARP Inspection Table Autosefresh system Information Start from Port 1 VLAN 1 MAC address 00 00 00 00 00 00 and IP address 0 0 0 0 with 20 entries per page CPU Load p5 ss 3 Bi Log Detailed Log Bes ALO Hes Aadress IP a Ports No more entries Security Access Management Statistics Network Port Security NAS ACL Status DHCP ARP Inspection IP Source Guard Refresh lt lt gt gt AAA Switch LACP Loop Protection Spanning Tree MVR IPMC LLDP PoE M
90. AC Table VLANs VCL sFlow Diagnostics Maintenance ARP Inspection Table Columns Switch Port Number for which the entries are displayed 4ipnet Ea Configuration pone Dynamic ARP Inspection Table Auto refresh System A B n o 7 a Start from Por 1 VLAN 1 MAC address 00 00 00 00 00 00 and IP address 0 0 0 0 with 20 entries per page oat r Log too e Rs Pas Ports more entries Port 4 O Port 5 Access Management Port 6 Statistics Network Pon Port Security Port 8 J NAS Port9 ACL Status Port 10 1 DHCP Port 11 ARP Inspection Port 12 IP Source Guard Port 13 ARA Port 14 Switch Port 45 LACP Port 16 Loop Protection Port 17 Spanning Tree Port 18 MVR Port 19 PMC Port 20 LLDP PoE MAC Table VLANs VCL sFlow Diagnostics Maintenance VLAN ID in which the ARP traffic is permitted 222 User MAC address of the entry IP Address User IP address of the entry Buttons Auto refresh Click this box to enable an automatic refresh of the page at regular intervals Refresh Click to refresh the page immediately Clear Flushes all dynamic entries lt lt Updates the table starting from the first entry in the Dynamic ARP Inspection Tables gt gt Updates the table starting with the entry after the last entry currently displayed Network Dynamic IP Source Guard Table Entries in the Dynamic IP Source Guard Table are shown on this page The Dynamic IP Source Guard Ta
91. C ADDRESS TABLE CONFIGURATION sccsssseseceeseeecsseceeeeseeecessaeeecsseeeceesseeeceesaeeeesseeeseesaeeeceeaaeeresaeeeeeey 307 FS VLAN CONFIGURATION esgere neinnar AEAEE ainda 308 TAS PRIVATE VLAN CONFIGURATION atie er etouei edi Denda OEE E iaa abit ia 309 15 VEL CONFIGURA TON rresten reseo aara A AA dai araa ie 309 163 VOICE VLAN CONFIGURATION e raa ea n Eea ripats easi kae EDEA EEEE SASEA Lao A diana cocina Nono bocas dead 310 17 QOS CONFIGURATION ci aaa 311 T8 MIRRORING CONFIGURATION ree n reee eeren Enen Penat or ear SEa NEE TENE DEREAT S NOKTON E NEE dneslesd N PAA S EK E EM I 314 19 UPNP CONFIGURATION NON 314 20 SFLOW CONFIGURATION coc a 315 21 DIAGNOSTIC COMMANDS a esaeren aii aaeei ea LE EOE cassagsestintenssbsedcauseSecvosseiseddbsesensasseced iasteleusugccesseas 316 22 MAINTENANCE COMMANDS reo isror aiT EEEE E EEEE EEE ETE E E 317 Chapter 1 Product Overview The 4ipnet SW1024 is a 26 Port Layer 2 Full Management Gigabit PoE Switch equipped with 24 port 10 100 1000M RJ 45 plus 2 Gigabit SFP Open Slot The Ethernet Ports support standard IEEE 802 3at PoE capable of supplying up to 500W with each port supporting up to 30W The SFP open slots support various SFP transceivers types perfect for extending transmission distance up to a hundred kilometers The 4ipnet SW1024 is capable of providing non blocking wired speeds of up to 52Gbps switch fabric Standard packaging comes with rack mount brackets making the standard 19 f
92. CONFIGULATION cccccceessecessseessecessseessecsssseessecessssessecessssessecessseesssessseees 187 18 MIRRORING CONFIGURATION escoseciosinnacionanrnspo noni coabesnecvatieas aP SEEE E ETP EEO a N EEE aTe PEENE ep 189 T9 UPNP CONFIGURATION eaea aeei AOS OO RN 190 20 SFLOW CONFIGURATION tilda EEE Tea ea Seniai nasaia 192 ZT MONITOR A eves Sate A EOE AAA AA AA EA 193 DUD MONTO SYM ii liada a 193 21 1 1 Monitor System Information ccccccsssceescessssceessecssscesssessssceesseessscessseessscesseesaseessssesseesseees 193 2A TD CPU Lodd nn A A A tdo 194 21 13 SystOm LOG Informati n 2 A A A A d aaa 194 2 TAS ystemy Detailed LO iii ette aa 196 21 2 Monitor Port State cccccccccccccccscsccccessscccsessecccsssseceessssseseusscscssssececssssseeussssesssseeeesssseeeessssecssseeees 196 DUBAAPOESA a bai 196 212 2 Maffie Overview AA A E NN A 197 DUBIADOS EOS iia id tdi 198 DADA QEL at aa 199 2T2 5 Detdiled Port Statistics netoaren aaa ide 201 21 3 MONITO SCOUT A a a a a ad 203 21 3 1 Security Access Management Statistics ccceeecccsssceesseesssceessesssscessssessscessseessscesseesseeessees 203 213 2 Sec rity NetWork n anina oN eat da Shee ia idas di 204 2 Fs Secur SA A ADA A AD 224 21 3 4 Switch SNMP RMON iroa aE A AE A E EA A ARRA 230 21 4 LACP System STATUS ii anaana deaa ia oaaae dea eaaa da canted ea cade AAA Ea iaai da aa iii 237 24 4 1 System StA tU A O NN NON ON INN 237 2Y 4 2 LACP POrt StQtus idad 237
93. Click Save Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 142 10 LLDP Parameters The Link Layer Discovery Protocol LLDP is a vendor neutral link layer protocol LLDP information is sent by devices from each of their interfaces at a fixed interval in the form of an Ethernet Frame Each frame contains one LLDP Data Unit LLDPDU Each LLDPDU is a sequence of Type Length Value TLV structures Each LLDP frame starts with the following mandatory TLVs Chassis ID Port ID and Time to Live The mandatory TLVs are followed by any number of optional TLVs This section allows the user to inspect and configure the current LLDP port settings 10 1 LLDP Configuration ira LLDP Configuration Power Reduction Ports LLDP Parameters Security Aggregation Loop Protection Spanning Tree MVR IPMC VCL lt gt ii m El El El Y Y Voice VLAN Mirroring 2 Enabled y al v7 Yi E Yi E uep 3 Enabled E El 7 El F Y Monitor 4 Enabled v a Y 7 Y E 7 Diagnostics oo 7 a a Maintenance 5 Enabled x w a E a a T 6 Enabled v o a El E v Y 7 Enabled E v Y Y v 7 8 Enabled a Y 2 Y Y W 9 Enabl ed r Y Fl Y Y Y The switch periodically transmits LLDP frames to its neighbours f
94. Click Browse to search for the firmware file on your local drive and click Upload to firmware upgrade It might take a few minutes before the upgrade process completes and the system needs to be restarted afterwards to activate the new firmware 52 Firmware update in progress The uploaded firmware image is being transferred to flash The system will restart after the update Until then do not reset or power off the device Waiting please stand by The system is capable of saving two images and one can be a backup alternate image Software Image Selection Image managed Version PoE standalone dev build by root virtual centos 2012 07 01T15 54 24 08 00 Date 2012 07 01T15 54 24 08 00 Image managed bk Version SMBStaX standalone dev build by uwai Uwai Fedora 2012 11 06T16 35 36 08 00 Config config mk Date 2012 11 06T16 35 36 08 00 Activate Alternate Image Cancel 10 4 System Restart and Reset This function allows the administrator to safely restart the switch and the process might take several minutes to complete Click Yes to restart If the power needs to be turned off it is highly recommended to restart the switch first and then turn off the power after completing the restart process Configuration path Maintenance gt gt Restart Device Restart Device Are you sure you want to perform a Restart Yes No The administrator may reset the system to factory default from the fol
95. Configuration Strom Control Syntax QoS Storm Unicast enable disable lt packet_rate gt 313 QoS Storm Multicast enable disable lt packet_rate gt QoS Storm Broadcast enable disable lt packet_rate gt lt packet_rate gt Rate in fps 1 2 4 8 16 32 64 128 256 512 1k 2k 4k 8k 16k 32k 64k 128k 256k 512k 1024k 2048k 4096k 8192k 16384k 32768k Example QoS Storm gt unic en 32768k QoS Storm gt multi en 4096k QoS Storm gt broad en 4k 18 Mirroring Configuration Feature Mirroring Configuration Mirror Configuration Syntax Mirror Port lt port gt disable Mirror Mode lt port_cpu_list gt enable disable rx tx Example Mirror gt port 5 Mirror gt mode 6 8 en Result Mirror Configuration 1 Disabled 2 Disabled 3 Disabled 4 Disabled 5 Disabled 6 Enabled 7 Enabled 8 Enabled 19 UPnP Configuration UPnP Configuration UPnp Configuration Syntax UPnP Configuration UPnP Mode enable disable UPnP TTL lt ttl gt UPnP AdvertisingDuration lt duration gt 314 Example UPnP gt mode en UPnP gt ttl5 Default 4 UPnP gt adver 200 Default 100 Result UPnP Configuration UPnP Mode Enabled UPnP TTL 15 UPnP Advertising Duration 200 20 sFlow Configuration Feature Command Line sFlow Configuration Receiver Syntax sFlow Receiver release lt timeout
96. DP discovery services defined in TIA 1057 however do not support IP media or act as an end user communication appliance Such devices may include but are not limited to IP Communication Controllers other communication related servers or any device requiring basic services as defined in TIA 1057 Discovery services defined in this class include LAN configuration device location network policy power management and inventory management LLDP MED Media Endpoint Class II The LLDP MED Media Endpoint Class II definition is applicable to all endpoint products that have IP media capabilities however may or may not be associated with a particular end user Capabilities include all of the capabilities defined for the previous Generic Endpoint Class Class l and are extended to include aspects related to media streaming Example product categories expected to adhere to this class include but are not limited to Voice Media Gateways Conference Bridges Media Servers and similar Discovery services defined in this class include media type specific network layer policy discovery LLDP MED Communication Endpoint Class III The LLDP MED Communication Endpoint Class III definition is applicable to all endpoint products that act as end user communication appliances supporting IP media Capabilities include all of the 257 capabilities defined for the previous Generic Endpoint Class 1 and Media Endpoint Class II classes and ar
97. ER 3 GETTING STARTED cc sccscscovesdeccucccs sev avecdhsovetescevcsactectecevascessecsbecsevessseusaccvenceuadevacecSasbactesseats 19 3 1 ACCESS VIA THE SERIAL CONSOLE INTERFACE cessssscecececeecessececececeensseececeeeceeueneececeseceeueneececeseaueneneeceeeeeauenes 19 3 2 PREPARATION FOR WEB INTERRA C Ensas orita des 21 3 3 PREPARATION FOR TELNET SSH INTERFACE ccccssscsescecccssseceescsssceeeesecsessececsessucssssscesuussseseessusessseseeuuaesesseass 23 CHAPTER 4 SYSTEM CONFIGURATION csssccsssccsscccsccccscccsssenssecessccescececcecacccnsecessccescecesessecseeseeessess 25 ATINETWORK PLANNING coat crean 25 Ai 2 SYSTEM INFORMATION codo ona A iii 26 4 2 1 System NAME e a adani iat ascend ac At dia Ca da vine a iia dase datada dia ada datada dido A Caida dada dect 26 AD DAP CONPIQUIALION dd id ais 27 423 SU A A RR RR RAN 27 CHAPTER S VIRTUAL LAN 3 5 2 c2scccccci toxeisctescssescsdoccagescatosscvevectececedesccscececcecscescocgesedacues lt cseebesdecssserostesandes 29 BoD VEAN MEMBERSHIP a A A Ee e a aaee io 29 SVAN PORTS ie e tae a e nt e tie e E ee 30 CHAPTER 6 POWER OVER ETHERNET ccssecceseccsscccsccccscccsssecssecessccescccescecaccessecessceesccessesecsceseeeseees 36 CHAPTER 7 LOOP PROTECTION ccvsesccsscccssicetsaccescevesweodswes ccvcaccudacenvesebsnesvevescoveccesascevassosacvesdsveusebdcvesscses 38 7 1 GENERAL LOOP PROTECTION SETTING ssccccccccccsssscecececeeeessececececeenesecceceeecesueneececese
98. HO_REQUEST packet count 1 60 Default is 5 interval PING Interval keyword lt ping_interval gt Ping interval 0 30 Default is 0 Example Ping IP 192 168 2 100 IP gt ping 192 168 2 100 PING server 192 168 2 100 56 bytes of data 64 bytes from 192 168 2 100 icmp_seq 0 time 0ms 64 bytes from 192 168 2 100 icmp_seq 1 time 0ms 64 bytes from 192 168 2 100 icmp_seq 2 time 0ms 64 bytes from 192 168 2 100 icmp_seq 3 time 0ms 64 bytes from 192 168 2 100 icmp_seq 4 time 0ms Sent 5 packets received 5 OK 0 bad IPv6 Ping Test Syntax IP IPv6 Ping6 lt ipv6_addr gt Length lt ping_length gt Count lt ping_count gt Interval lt ping_interval gt Example poeswitch IP gt ipv6 ping6 2001 DB8 250 8bff fee8 f800 VeriPHY Syntax Port VeriPHY lt port_list gt Example Port gt veriphy 24 Starting VeriPHY please wait Port PairA Length PairB Length PairC Length PairD Length 316 24 oK 0 OK 0 OK OK 0 22 Maintenance Commands Feature Command Line Maintenance Commands Restart Device Syntax System Reboot Example System gt reb System will reboot in a few seconds Factory Defaults Syntax System Restore Default keep_ip Example Software Firmware Syntax Firmware Information Firmware Version Firmware Swap Firmware Update Parameters of Firmware Load string Example Firmware Swapping Firmware gt sw Firmware Upd
99. IGMP Snooping Port Group Filtering Configuration Different IP Multicast Groups can be filtered on selected ports Configuration path Configuration gt gt IPMC gt gt IGMP Snooping gt gt Port Group Filtering 45 IGMP Snooping Port Group Filtering Configuration Delete Port Filtering Groups Add New Fi Group Enter the Filtering Groups for the desired ports and click Save to apply settings 8 2 MLD Snooping MLD Snooping Multicast Listener Discovery Snooping shares the same configuration concept as IGMP Snooping but in IPv6 MLD is a protocol used by IPv6 multicast routers to discover the presence of multicast listeners nodes configured to receive IPv6 multicast packets on its directly attached links and to discover which multicast packets are of interest to neighboring nodes MLD is derived from IGMP MLD version 1 MLDv1 is equivalent to IGMPv2 and MLD version 2 MLDv2 is equivalent to IGMPv3 Configuration path Configuration gt gt IPMC gt gt MLD Snooping For detailed configuration instructions please refer to Chapter 8 1 or Appendix A 46 Chapter 9 Aggregation Link Aggregation is the concept of combining multiple network connections in parallel to increase throughput and also to provide redundancy should one link fail There are two types of aggregation supported on the SW1024 namely Static Aggregation and Dynamic Aggregation 9 1 Static Aggregation Static Aggregation can be done o
100. LAN When unchecked the ability to move to the Guest VLAN is disabled on all ports Guest VLAN ID This is the value that a port s Port VLAN ID is set to if a port is moved into the Guest VLAN It is only changeable if the Guest VLAN option is globally enabled Valid values are in the range 1 4095 Max Reauth Count The number of times the switch transmits an EAPOL Request Identity frame without response before considering entering the Guest VLAN is adjusted with this setting The value can only be changed if the Guest VLAN option is globally enabled Valid values are in the range 1 255 Allow Guest VLAN if EAPOL Seen The switch remembers if an EAPOL frame has been received on the port for the life time of the port Once the switch considers whether to enter the Guest VLAN it will first check if this option is enabled or disabled If disabled unchecked default the switch will only enter the Guest VLAN if an EAPOL frame has not been received on the port for the life time of the port If enabled checked the switch will consider entering the Guest VLAN even if an EAPOL frame has been received on the port for the life time of the port The value can only be changed if the Guest VLAN option is globally enabled Port Configuration The table has number of columns which allows you to configure the port mode based on IEEE 802 1X standard Select the port and configure the settings gipnet Configuration Port Configu
101. Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled EJ EJ O CJI CLJ om CAJA CLJ Com LJ ELJ LJ gt 7 2 Spanning Tree Protocol STP The Spanning Tree Protocol is a network protocol designed to ensure a loop free bridged Ethernet local area network Layer 2 Besides the basic bridge loops protection STP also assigns backup paths should an active link fail Configuration path Configuration gt gt Spanning Tree gt gt Bridge Settings The SW1024 supports 3 types of STP Protocol versions Spanning Tree Protocol STP specified in IEEE 802 1D 1998 Rapid Spanning Tree Protocol RSTP specified in IEEE 802 1w standardized in IEEE 802 1D 2004 Multiple Spanning Tree Protocol MSTP specified in IEEE 802 1s standardized in IEEE 802 1Q 2003 40 Port operation for STP and RSTP are the same except that RSTP provides a faster re convergence time than STP MSTP enables multiple VLANs to be mapped to the same spanning tree instance This is important especially for a network with a large number of VLANs In MSTP all of the interconnected bridge
102. Message Traffic Overview Level Info QoS Statistics Time 1970 01 01T08 00 02 08 00 QCL Status A Detailed Statistics Message Switch just made a cold boot Security LACP Loop Protection Spanning Tree Diagnostics Maintenance detailed log information is provided here The ID gt 1 of the system log entry The detailed message of the system log entry Buttons Refresh Updates the system log entry to the current entry ID lt lt Updates the system log entry to the first available entry ID lt lt Updates the system log entry to the previous available entry ID gt gt Updates the system log entry to the next available entry ID gt gt Updates the system log entry to the last available entry ID 21 2 Monitor Port State 21 2 1 Port State This page provides an overview of the current switch port states 196 4ipnet Configuration Monitor System Information CPU Load Log Detailed Log Ports State Traffic Overview QoS Statistics QCL Status Detailed Statistics Security LACP Loop Protection Spanning Tree MVR IPMC LLDP PoE MAC Table VLANs VCL sFlow Diagnostics Maintenance Port State Overview The port states are illustrated as follows RJ45 ports SFP ports State Buttons Auto refresh regular intervals d O Ml Disabled Down m al Link Check this box to refresh the page automatically Automatic refresh occurs at Refresh Click to refr
103. N 1 with 20 entries per page lt gt gt CPU Load TA Detailed Lo Port Members edLog Ports VLAN ID 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Security 1 MIMI MIM MIM w MMMM LACP 20 MIMI Loop Protection 21 MEMO Spanning Tree 2000 Fal Bridge Status 2001 A Port Status Port Statistics 2002 YA MVR IPMC LLDP PoE MAC Table VLANs VLAN Membership Port VCL sFlow Diagnostics Maintenance Using the above illustration as an example there are 6 VLANs configured on the SW1024 Ports 1 9 and 15 26 are members of VLAN 1 Ports 10 12 are members of VLAN 20 and VLAN 21 Port 13 is a member of VLAN 20 Port 14 is a member of VLAN 21 Port 2 is a member of VLAN 1 VLAN 2000 VLAN 2001 and VLAN 2002 29 VLAN Membership Configuration Start from VLAN 1 with 20 entries per page default COMMMMMO DOOR MAMA IneVLAN HO DIOMMMOODOOD DOOM OOOO OOOO Employee HOODIA OOOO Add New VLAN Save Reset When adding a VLAN enter the desired VLAN ID VLAN Name and check the port members for the VLAN Click Save to save settings Up to 4096 VLANs are supported on the system 5 2 VLAN Ports Once VLAN membership is set we shall configure the different Port Types and switch port VLANs PVID Configuration path Configuration gt gt VLANs gt gt Ports
104. N Port Mode lt port_list gt disable auto force Voice VLAN Security lt port_list gt enable disable Voice VLAN Discovery Protocol lt port_list gt oui lldp both Example Voice VLAN gt port mode 1 4 auto Voice VLAN gt security 1 4 en Voice VLAN gt disco pro 1 4 both Result Voice VLAN Port Configuration Port Mode Security Discovery Protocol 1 Auto Enabled Both 2 Auto Enabled Both 3 Auto Enabled Both 4 Auto Enabled Both OUI Configuration Syntax Voice VLAN OUI Add lt oui_addr gt lt description gt Voice VLAN OUI Delete lt oui_addr gt Voice VLAN OUI Clear Voice VLAN OUI Lookup lt oui_addr gt Example Voice VLAN gt oui add 00 12 08 hello Result Voice VLAN gt oui lookup Voice VLAN OUI Table 00 01 E3 Siemens AG phones 00 03 6B Cisco phones 00 0F E2 H3C phones 00 60 B9 Philips and NEC AG phones 00 DO 1E Pingtel phones 00 E0 75 Polycom phones 00 E0 BB 3Com phones 00 12 77 e10 00 12 08 hello 17 QoS Configuration Feature Command Line QoS Configuration 311 Port Classification Syntax QoS Port Classification Class lt port_list gt lt class gt QoS Port Classification DPL lt port_list gt lt dpl gt QoS Port Classification PCP lt port_list gt lt pcp gt QoS Port Classification DEI lt port_list gt lt dei gt QoS Port Classification Tag lt port_list gt enable disable QoS Port Classification Map lt po
105. N infrastructure for LLDP MED Endpoint Devices An LLDP MED Network Connectivity Device is a LAN access device based on any of the following technologies LAN Switch Router IEEE 802 1 Bridge IEEE 802 3 Repeater included for historical reasons IEEE 802 11 Wireless Access Point Any device that supports the IEEE 802 1AB and MED extensions defined by TIA 1057 and can relay a e oO N IEEE 802 frames via any method 256 LLDP MED Endpoint Device Definition LLDP MED Endpoint Devices as defined in TIA 1057 are located at the IEEE 802 LAN network edge and participate in IP communication service using the LLDP MED framework Within the LLDP MED Endpoint Device category the LLDP MED scheme is broken into further Endpoint Device Classes as defined in the following Each LLDP MED Endpoint Device Class is defined to build upon the capabilities defined for the previous Endpoint Device Class For example will any LLDP MED Endpoint Device claiming compliance as a Media Endpoint Class II also support all aspects of TIA 1057 applicable to Generic Endpoints Class I and any LLDP MED Endpoint Device claiming compliance as a Communication Device Class III will also support all aspects of TIA 1057 applicable to both Media Endpoints Class II and Generic Endpoints Class LLDP MED Generic Endpoint Class l The LLDP MED Generic Endpoint Class 1 definition is applicable to all endpoint products that require the base LL
106. OK 00000000 000000 00 09000 0900 The aggregation hash mode settings are global whereas the aggregation group relate to the currently selected stack unit as reflected by the page header Hash Code Contributors The Source MAC address can be used to calculate the destination port for the frame Check to enable the use of the Source MAC address or uncheck to disable By default Source MAC Address is enabled The Destination MAC Address can be used to calculate the destination port for the frame Check to enable the use of the Destination MAC Address or uncheck to disable By default Destination MAC Address is disabled 119 The IP address can be used to calculate the destination port for the frame Check to enable the use of the IP Address or uncheck to disable By default IP Address is enabled The TCP UDP port number can be used to calculate the destination port for the frame Check to enable the use of the TCP UDP Port Number or uncheck to disable By default TCP UDP Port Number is enabled Aggregation Group Configuration Indicates the group ID for the settings contained in the same row Group ID Normal indicates there is no aggregation Only one group ID is valid per port Each switch port is listed for each group ID Select a radio button to include a port in an aggregation or clear the radio button to remove the port from the aggregation By default no ports belong to any aggregation group
107. OP RCE EPEC CraPT 273 22 DIQQNOStICi i siceceshuntinsacleccssarenaadedtacnsdectetusddeandancesuausdatectadestleuadddndssaaubacdudveddadentalucdtuneccadeavatesdds 274 DDD SPUN Gasca ciate RN 274 BRIDA A A E Are 274 22 3 VeriPHY Cable Did GNOSEIC niant irinta aint sia nda dada dada dant ea tainai adaini daadaa ian 275 23 MOINTCNONCE sii orenean id at it diia dediaida 277 23D Restare Device raae tached easiness vdeanaed Ra AA E A A AA aia 277 23 2 F ctor DEA Sii sees tee 277 233 SoftWare UDIOOG iii a Fala iaa sd TELA sends 278 23 3 1 FIPMWOTE Ut ia aaa 278 23 3 2 AINAGC Select NANO 279 ZA ICON IQUITOS A A aT gE aE 280 APPENDIX B FEATURE CONFIGURATION Cll o ooooccccncnnonononncccnnnnnnonononcnnononnanonononcnnanannnnonsoncnnonnnnananose 282 T SYSTEM AS A AO NOT NO 282 Z POWER REDUCTION cai didas 286 4 SECURITY CONFIGURATION coo scanner dentada anida eco 289 5 AGGREGATION CONFIGURATION A traviraseierde ktive nn Esiste ri taret E asas dEr EEEn East E NADENKE da AE EEs Ewas EESE 300 6r EOOP PROTEC ON ornoen eeoe e etori E A O E A 300 VESPANNING TREE oseanen A ae E a aaee E Narone Seetee Ne Tes 301 SIMI A NEE EEA E A E EE T EA E 303 SIAM e e a la ela E 304 10 ELDP CONFIGURATION 3ifeceeescdecite sce coo tengobae shee Suettebadius lees E Er EE ede Eee a ceases dodasvobvech dee Sncnasaltesoe 305 11 POWER OVER ETHERNET CONFIGURATION cssececeessecesssececeesseeecessaeeecsseeeceesaeeeceesaeescseeeseesaeeeceeaaeesesseeeeees 306 12 MA
108. On changing the Frame type field valid value of the following text field will vary depending on the new frame type you selected Value Valid value that can be entered in this text field depends on the option selected from the preceding Frame Type selection menu Below is the criteria for three different Frame Types For Ethernet Values in the text field when Ethernet is selected as a Frame Type is called etype Valid values for etype ranges from 0x0600 Oxffff For LLC Valid value in this case is comprised of two different sub values a DSAP 1 byte long string 0x00 Oxff b SSAP 1 byte long string 0x00 Oxff For SNAP Valid value in this case also is comprised of two different sub values a OUI OUI Organizationally Unique Identifier is value in format of xx xx xx where each pair xx in string is a hexadecimal value ranges from 0x00 Oxff b PID If the OUI is hexadecimal 000000 the protocol ID is the Ethernet type EtherType field value for the protocol running on top of SNAP if the OUI is an OUI for a particular organization the protocol ID is a value assigned by that organization to the protocol running on top of SNAP In other words if value of OUI field is 00 00 00 then value of PID will be etype 0x0600 Oxffff and if value of OUI is other than 00 00 00 then valid value of PID will be any value from 0x0000 to Oxffff Group Name A valid Group Name is a unique 16 character long string for every entry which consists of a
109. Policing Port Scheduler y Port Shaping X Port Tag Remarking SES o Port DSCP DscP Basedaos cla DSCP Translation F DSCP Classification 10 AF10 ofe QoS Control List stor 1 0 ofe N 12 AF12 0 of sFlow 13 0 0 Fdo o o Diagnostics 14 AF13 ofe of Maintenance Maximum number of supported DSCP values are 64 Controls whether a specific DSCP value is trusted Only frames with trusted DSCP values are mapped to a specific QOs class and Drop Precedence Level Frames with un trusted DSCP values are treated as a non IP frame QoS class value can be any of 0 7 Drop Precedence Level 0 1 Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 180 17 8 QoS DSCP Translation This page allows you to configure the basic QoS DSCP Translation settings for all switches DSCP translation can be done in Ingress or Egress The displayed settings are 4ipnet c ti pter dead DSCP Translation Power Reduction Security Aggregation o Hilo E Loop Protection Spanning Tree 06E 065 k owe gt 065 fr MVR 1 1 1 1 pe OD LS a 2 y LLDP 2 2 x a 2 i 2 7 por 3 3 3 z MAC Table VLANs 4 4 y al 4 la 4 Voice VLAN 6 6 6 x 6 x Pol Gassion m w la Port Policing a cs1 8 CS1 8 CS1 8 CS1
110. Ports VLAN ID Groups 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Security No more entries LACP Loop Protection Spanning Tree Bridge Status Port Status Port Statistics MVR IPMC IGMP Snooping Status Groups Information IPv4 SFM Information MLD Snooping Status Groups Information IPv6 SFM Information LLDP PoE MAC Table VLANs VCL sFlow Diagnostics Maintenance Navigating the MLD Group Table entries per page Auto refresh Refresh 1 lt lt gt gt Each page shows up to 99 entries from the MLD Group table default being 20 selected through the entries per page input field When first visited the web page will show the first 20 entries from the beginning of the MLD Group Table The Start from VLAN and group input fields allow the user to select the starting point in the MLD Group Table Clicking the Refresh button will update the displayed table starting from that or the next closest MLD Group Table match In addition the two input fields will upon a Refresh button click assume the value of the first displayed entry allowing for continuous refresh with the same start address The gt gt will use the last entry of the currently displayed as a basis for the next lookup When the end is reached the text No more entries is shown in the displayed table Use the lt lt button to start over Buttons Auto refresh Check this box to enable an a
111. Privilege gt level group VLANs 10 10 10 10 cro 10 crw 10 sro 10 srw 10 Privilege Level Configuration Table Security Switch gt pri level conf Privilege Level Configuration Privilege Current Level 15 Group Name Privilege Level CRO CRW SRO SRW Aggregation 5 10 5 10 Debug 15 15 15 15 Diagnostics 5 10 5 10 Authentication Syntax Security Switch Auth Method console telnet ssh web Method none local radius tacacs enable disable Example Configure Telnet Authentication method to Radius Enable Security Switch gt auth method telnet radius en Authentication Security Switch gt auth conf Configuration Auth Configuration Client Authentication Method Local Authentication Fallback console local Disabled telnet local Disabled ssh local Disabled web local Disabled SSH Syntax Security Switch SSH Mode enable disable Example Security Switch gt ssh mode en Security Switch gt ssh mode dis HTTPS Syntax Security Switch HTTPS Mode enable disable Security Switch gt https mode en Security Switch gt https mode dis Security Switch HTTPS Redirect enable disable Security Switch gt https mode en Must enabled HTTPS 290 Security Switch gt https redi en Result Security Switch gt https conf HTTPS Configuration HTTPS Mode Enabled HTTPS Redirect Mode Enabled Access Management Syntax Security Switch Access Add lt access_id gt lt start_ip_addr gt lt end_ip_addr gt we
112. Pv6 Setup lt ipv6_addr gt lt ipv6_prefix gt lt ipv6_router gt Example poeswitch IP gt ipv6 setup 2001 DB8 250 8bff fee8 f800 48 2001 DB8 250 8bff fee8 feff IPv6 Ping Test Syntax IP IPv6 Ping6 lt ipv6_addr gt Length lt ping_length gt Count lt ping_count gt Interval lt ping_interval gt Example poeswitch IP gt ipv6 ping6 2001 DB8 250 8bff fee8 f800 NTP NTP Mode Enable NTP Mode by below command poeswitch IP gt ntp mode en NTP Server Address Syntax Setting Type the NTP Server address settings by below command IP NTP Server Add lt server_index gt lt ip_addr_string gt IP NTP Server Ipv6 Add lt server_index gt lt server_ipv6 gt IP NTP Server Delete lt server_index gt Example poeswitch IP gt ntp ser add 1 192 168 100 1 poeswitch IP gt ntp ser add 2 168 95 1 1 NTP Setting Status Check the NTP Server settings by below command poeswitch IP gt ntp conf IP NTP Configuration NTP Mode Enabled Idx Server IP host address a b c d or a host name string 1 192 168 100 1 2 168 95 1 1 3 4 5 System Log Server Mode Syntax System Log Server Mode enable disable Example poeswitch System gt log server mode en Server Address Syntax System Log Server Address lt ip_addr_string gt Example poeswitch System gt log server add 192 168 2 100 285 Syslog Level Syntax System Log Level info warning err
113. RBABEA 5 E AAAAAARA EEE is a power saving option that reduces the power usage when there is very low traffic utilization or no traffic EEE works by powering down circuits when there is no traffic When a port gets data to be transmitted all circuits are powered up The time it takes to power up the circuits is named wakeup time The default wakeup time is 17 us for 1Gbit links and 30 us for other link speeds EEE devices must agree upon the value of the wakeup time in order to make sure that both the receiving and transmitting device has all circuits powered up when traffic is transmitted The devices can exchange information about the devices wakeup time using the LLDP protocol For maximizing the power saving the circuit isn t started at once transmit data are ready for a port but is instead queued until 3000 bytes of data are ready to be transmitted For not introducing a large delay in case that data less than 3000 bytes shall be transmitted data are always transmitted after 48 us giving a maximum latency of 48 us the wakeup time If desired it is possible to minimize the latency for specific frames by mapping the frames to a specific queue done with QOS and then mark the queue as an urgent queue When an urgent queue gets data to be transmitted the circuits will be powered up at once and the latency will be reduced to the wakeup time The switch port number of the logical EEE port Contro
114. RP request packets Allowed Source IP address in ARP request packets Click to add a new entry to the Static ARP Inspection table Specify the Port VLAN ID MAC address and IP address for the new entry Click Save Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 4 3 Security AAA Authentication Server Configuration This page allows you to configure the Authentication Servers Common Server Configuration These setting are common for all of the Authentication Servers gipnet Configuration eee i a Authentication Server Configuration Power Reduction Ports Common Server Configuration Security Switch 15 seconds on 300 seconds Aggregation Loop Protection RADIUS Authentication Server Configuration Spanning Tree MVR IPMC 5 1812 LLDP PoE 2 1812 AAA 3 1812 Private VLANs 40 1812 VCL r Voice VLAN 5 E 1812 Qos Mirroring RADIUS Accounting Server Configuration UPnP sFlow Monitor F Diagnostics k Uae Maintenance 2 E 1813 3 1813 4 1813 5 F 1813 TACACS Authentication Server Configuration 49 49 las 3 0 o g 49 sa nun The Timeout which can be set to a number between 3 and 3600 seconds is
115. SH Configuration Power Reduction Ports Mode Enabled y Security pppd Save Reset Privilege Levels Auth Method SSH HTTPS Access Management SNMP RMON Network Limit Control NAS ACL DHCP IP Source Guar ARP Inspection AAA m 69 Indicates the SSH mode operation Possible modes are Enable Enable SSH mode operation Disabled Disable SSH mode operation Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 4 1 5 Security Switch HTTPS Configuration The web management page also provides secured management HTTPS login All the configuration commands will be secured and will be hard for the hackers to sniff the login password and configuration commands This page allows you to configure HTTPS mode 4ipnet Configuration System Power Reduction Ports Security Switch Users Privilege Levels Auth Method SSH HTTPS Access Management SNMP RMON Network Limit Control NAS ACL DHCP IP Source Guar ARP Inspection Indicates the HTTPS mode operation Possible modes are Enable Enable HTTPS mode operation Disabled Disable HTTPS mode operation Indicates the HTTPS redirect mode operation Automatically redirect web browser to HTTPS when HTTPS mode is enabled Possible modes are HTTPS Configuration Enabled Disabled y Enable Enable HTTPS redirect mode operation Disabled Disable HTTPS redirect
116. ST Ports ac aia A LAA BAL MSTI Ports Add New MVR VLAN J MVR IPMC LLDP PoE Immediate Leave Setting MAC Table VLANs Port Immediate Leave Private VLANs 1 Disabled y VCL Voice VLAN z Disabled ii QoS 3 Disabled Mirroring UPnP 4 Disabled w sFlow 5 Disabled Monitor Diagnostics 6 Disabled Maintenance 7 aE Most of the settings are global whereas the Router Port configuration is related to the currently selected stack unit as reflected by the page header The MVR feature enables multicast traffic forwarding on the Multicast VLAN In a multicast television application a PC or a television with a set top box can receive the multicast stream Multiple set top boxes or PCs can be connected to one subscriber port which is a switch port configured as an MVR receiver port When a subscriber selects a channel the set top box or PC sends an IGMP join message to Switch A to join the appropriate multicast Uplink ports that send and receive multicast data to and from the multicast VLAN are called MVR source ports MVR Mode Enable Disable the Global MVR Specify the Multicast VLAN ID Enable MVR on the port Specify the MVR port type on the port Enable the fast leave on the port Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 134 9 IPMC IP Multicast IPMC is short of IP Mu
117. STP The 802 1s Multiple Spanning Tree protocol MSTP uses VLANs to create multiple spanning trees in a network which significantly improves network resource utilization while maintaining a loop free environment Port Members A row of check boxes for each port is displayed for each VLAN ID 268 If a port is included in a VLAN an image will be displayed If a port is included in a Forbidden port list an image will be displayed If a port is included in a Forbidden port list and dynamic VLAN user register VLAN on same Forbidden port then conflict port will be displayed as gt VLAN Membership The VLAN Membership Status Page shall show the current VLAN port members for all VLANs configured by a selected VLAN User selection shall be allowed by a Combo Box When ALL VLAN Users are selected it shall show this information for all the VLAN Users and this is by default VLAN membership allows the frames classified to the VLAN ID to be forwarded on the respective VLAN member ports Navigating the VLAN Monitor page Each page shows up to 99 entries from the VLAN table default being 20 selected through the entries per page input field When first visited the web page will show the first 20 entries from the beginning of the VLAN Table The first displayed will be the one with the lowest VLAN ID found in the VLAN Table The VLAN input fields allow the user to select the starting point in the VLAN Table Clicking the button will upd
118. STP bridge The delay used by STP Bridges to transit Root and Designated Ports to Forwarding used in STP compatible mode Valid values are in the range 4 to 30 seconds The maximum age of the information transmitted by the Bridge when it is the Root Bridge Valid values are in the range 6 to 40 seconds and MaxAge must be lt FwdDelay 1 2 This defines the initial value of remaining Hops for MSTI information generated at the boundary of an MSTI region It defines how many bridges a root bridge can distribute its BPDU information to Valid values are in the range 6 to 40 hops 125 The number of BPDU s a bridge port can send per second When exceeded transmission of the next BPDU will be delayed Valid values are in the range 1 to 10 BPDU s per second Advanced Seitings This section descript the advanced settings of the Spanning Tree Protocol Control whether a port explicitly configured as Edge will transmit and receive BPDUs Control whether a port explicitly configured as Edge will disable itself upon reception of a BPDU The port will enter the error disabled state and will be removed from the active topology Control whether a port in the error disabled state automatically will be enabled after a certain time If recovery is not enabled ports have to be disabled and re enabled for normal STP operation The condition is also cleared by a system reboot The time to pass before a port in the error disabled state can be enabled
119. Spanning Tree MVR IPMC LLDP PoE MAC Table VLANs VCL sFlow Diagnostics Maintenance RADIUS Authentication Servers 224 The RADIUS server number Click to navigate to detailed statistics for this server The IP address and UDP port number in lt IP Address gt lt UDP Port gt notation of this server The current state of the server This field takes one of the following values Disabled The server is disabled Not Ready The server is enabled but IP communication is not yet up and running Ready The server is enabled IP communication is up and running and the RADIUS module is ready to accept access attempts Dead X seconds left Access attempts were made to this server but it did not reply within the configured timeout The server has temporarily been disabled but will get re enabled when the dead time expires The number of seconds left before this occurs is displayed in parentheses This state is only reachable when more than one server is enabled RADIUS Accounting Servers The RADIUS server number Click to navigate to detailed statistics for this server The IP address and UDP port number in lt IP Address gt lt UDP Port gt notation of this server The current state of the server This field takes one of the following values Disabled The server is disabled Not Ready The server is enabled but IP communication is not yet up and running Ready The server is enabled IP communication is up and runnin
120. Ss m mm m P er a e a z z 7 n m i Er a rs En dE E Sar Ens 9 10 SS SS a CE ae a S E AZ SS ES CS os sa 14 z a S E a se ah de a E E E 5 ES m Q s os s o o El ae EJES Ss ES a 19 o E A en a oy ES oe a 2 a a gt 2 ee ES gt SS The port where you are requesting VeriPHY Cable Diagnostics Port Port number Pair The status of the cable pair The status of the cable pair OK Correctly terminated pair Open Open pair Short Shorted pair Short A Cross pair short to pair A Short B Cross pair short to pair B Short C Cross pair short to pair C Short D Cross pair short to pair D Cross A Abnormal cross pair coupling with pair A Cross B Abnormal cross pair coupling with pair B Cross C Abnormal cross pair coupling with pair C Cross D Abnormal cross pair coupling with pair D Length The length in meters of the cable pair 276 23 Maintenance The section allows user to maintain the switch such as Reset Factory Default Firmware upgrading Configuration Save Restore and Restart the device 23 1 Restart Device You can restart the switch on this page After restart the switch will boot normally Restart Device Are you sure you want to perform a Restart Yes No Yes Click to restart device No Click to return to the Port State page without restarting 23 2 Factory Defaults You can reset the c
121. TP MSTI port configurations and possibly change them as well 4ipnet Confi tio pi log Ls MSTI Port Configuration Power Reduction Ports Security Aggregation msT1 y Get Loop Protection Spanning Tree Bridge Settings MSTI Mapping MSTI Priorities CIST Ports MSTI Ports MVR IPMC LLDP PoE MAC Table VLANs Private VLANs VCL Voice VLAN Qos Mirroring UPnP sFlow Monitor Diagnostics Maintenance An MSTI port is a virtual port which is instantiated separately for each active CIST physical port for each MSTI instance configured on and applicable to the port The MSTI instance must be selected before displaying actual MSTI port configuration options This page contains MSTI port settings for physical and aggregated ports Apart from the selected MSTI the STP MSTI port settings also relate to the currently selected stack unit as reflected by the page header Port The switch port number of the corresponding STP CIST and MSTI port Path Cost Controls the path cost incurred by the port The Auto setting will set the path cost as appropriate by the physical link speed using the 802 1D recommended values Using the Specific setting a user defined value can be entered The path cost is used when establishing the active topology of the network Lower path cost ports are chosen as forwarding ports in favor of higher path cost ports Valid values are in the range 1 to 200000000 131 Controls the por
122. The displayed table contains a row for each port The columns hold the following information The port on which LLDP frames are received or transmitted The link partner s maximum time that transmit path can hold off sending data after deassertion of LPI The link partner s time that receiver would like the transmitter to hold off to allow time for the receiver to wake from sleep The link partner s fallback receive Tw A receiving link partner may inform the transmitter of an alternate desired Tw_sys_tx Since a receiving link partner is likely to have discrete levels for savings this provides the transmitter with additional information that it may use for a more efficient allocation Systems that do not implement this option default the value to be the same as that of the Receive Tw_sys_tx The link partner s Echo Tx Tw value The respective echo values shall be defined as the local link partner s reflection echo of the remote link partners respective values When a local link partner receives its echoed values from the remote link partner it can determine whether or not the remote link partner has received registered and 262 processed its most recent values For example if the local link partner receives echoed parameters that do not match the values in its local MIB then the local link partner infers that the remote link partners request was based on stale information The link partner s Echo Rx Tw value The resolved Tx
123. The number of frames which size is less than 64 octets received with invalid CRC The number of frames which size is larger than 64 octets received with invalid CRC The best estimate of the total number of collisions on this Ethernet segment The total number of packets including bad packets received that were 64 octets in length The total number of packets including bad packets received that were between 65 to 127 octets in oO 5 Q The total number of packets including bad packets received that were between 128 to 255 octets in oO 5 Q A gt The total number of packets including bad packets received that were between 256 to 511 octets in oO 5 Q 5 The total number of packets including bad packets received that were between 512 to 1023 octets in oO 5 Q gt The total number of packets including bad packets received that were between 1024 to 1588 octets in Refresh Click to refresh the page immediately Auto refresh Click this box to enable an automatic refresh of the page at regular intervals 232 RMON History Overview This page provides an overview of RMON history entries 4ipnet ca gt Configuration g Monitor RMON History Overview Auto refresh E Refresh iss System Start from Control Index 0 and Sample Index 0 with 20 entries per page The displayed fields are Indicates the index of History control
124. The ports belong to the currently selected stack unit as reflected by the page header The displayed settings are 4ipnet Configuration bt QoS Egress Port Schedulers Power Reduction Ports Security Aggregation 1 Strict Priority Loop Protection 2 Strict Priority ro Tree 3 Strict Priority IPMO 4 Strict Priority LLDP 5 Strict Priority MAC Table Z Strict Priority VLANs 8 Strict Priority Private VLANs 9 Strict Priority VCL 10 Strict Priority Voice VLAN 114 Strict Priority Port Classification scram iit Port Policing 13 Strict Priority Port Scheduler 14 Strict Priority Port Shaping 15 Strict Priority Port Tag Remarking 16 Strict Priority Port DSCP Pra DSCP Based QoS eee ee DSCP Translation 18 Strict Priority DSCP Classification 19 Strict Priority QoS Control List 20 Strict Priority Storm Control 21 Strict Priority q 22 Strict Priority sFlow 23 Strict Priority Monitor 24 Strict Priority Diagnostics 25 Strict Priority Maintenance 26 Strict Priori The logical port for the settings contained in the same row Click on the port number in order to configure the schedulers Shows the scheduling mode for this port Shows the weight for this queue and port 17 4 QoS Egress Port Shapers This page provides an overview of QoS Egress Port Shapers for all switch ports The ports belong to the currently selected stack unit as reflected by the page header The displayed settings are 4ipnet one QoS Egress Port Shap
125. VCL ProtoVlan gt vlan add 1 8 E4 10 Protocol VLAN Result VCL ProtoVlan gt conf Configuration Protocol Type Protocol Value Group ID Ethernetll ETYPE 0x808 E4 LLC_Other DSAP 0xff SSAP 0xff L3 LLC_SNAP OUI 00 e0 2b PID 0x1 S2 Ethernetll ETYPE 0x800 E1 Group ID VID Ports E4 10 1 8 E1 10 5 8 IP Subnet based VLAN Configuration IP Subnet based Syntax VCL IPVlan Add lt vce_id gt lt ip_addr_mask gt lt vid gt VLAN Configuration lt port_list gt Parameters lt vce_id gt Unique VCE ID for each VCL entry lt ip_addr_mask gt Source IP address and mask Format a b c d n lt vid gt VLAN ID 1 4095 lt port_list gt Port list or all default All ports Example VCL IPVlan gt add 1 192 168 10 0 24 10 1 10 Result VCE ID IP Address Mask Length VID Ports 1 192 168 10 0 24 10 1 10 16 Voice VLAN Configuration Feature Command Line Voice VLAN Configuration Voice VLAN Syntax Voice VLAN Mode enable disable Voice VLAN ID lt vid gt Voice VLAN Agetime lt age_time gt Voice VLAN Traffic Class lt class gt Example Voice gt vlan mode en Voice gt vlan id 100 Voice gt vlan age 86400 Voice gt vlan traff class 7 Result Voice VLAN Configuration Configuration 310 Voice VLAN Mode Enabled Voice VLAN VLAN ID 100 Voice VLAN Age Time seconds 86400 Voice VLAN Traffic Class 7 Port Configuration Syntax Voice VLA
126. VLAN Table The VLAN input fields allow the user to select the starting point in the VLAN Table Clicking the button will update the displayed table starting from that or the next closest VLAN Table match The will use the last entry of the currently displayed entry as a basis for the next lookup When the end is reached the text No more entries is shown in the displayed table Use the button to start over 140 MLD Snooping VLAN Table Columns The VLAN ID of the entry Enable the per VLAN MLD Snooping Only up to 64 VLANs can be selected Enable the IGMP Querier in the VLAN Compatibility is maintained by hosts and routers taking appropriate actions depending on the versions of MLD operating on hosts and routers within a network The allowed selection is MLD Auto ForcedMLDv1 Forced MLDv2 default compatibility value is MLD Auto Robustness Variable The Robustness Variable allows tuning for the expected packet loss on a link The allowed range is 1 to 255 default robustness variable value is 2 Query Interval The Query Interval variable denotes the interval between General Queries sent by the Querier The allowed range is 1 to 31744 seconds default query interval is 125 seconds Query Response Interval The Maximum Response Delay used to calculate the Maximum Response Code inserted into the periodic General Queries The allowed range is 0 to 31744 in tenths of seconds default query response interval is 100 in tenths of seconds 1
127. VLAN are introduced in Private VLAN The Primary VLAN can be considered the master in the master slave relationship with the other 2 sub types Community VLAN and Isolated VLAN The switch Ports assigned with the primary VLAN are able to access the ports in the 2 sub types Both the Community VLN and Isolated VLAN can be considered slaves in the master slave relationship with the primary VLAN The switch ports assigned to a Community VLAN can see traffic from all other devices in the same Community The switch ports assigned to an Isolated VLAN can send traffic to the primary VLAN but CANNOT see traffic from other devices in the same Isolated VLAN In this section the switch allows you to assign Private VLAN Member Configuration and Port Isolation Configuration 14 1 Private VLAN Membership Configuration The Private VLAN membership configurations for the switch can be monitored and modified here Private VLANs can be added or deleted here Port members of each Private VLAN can be added or removed here Private VLANs are based on the source port mask and there are no connections to VLANs This means that VLAN IDs and Private VLAN IDs can be identical Aport must be a member of both a VLAN and a Private VLAN to be able to forward packets By default all ports are VLAN unaware and members of VLAN 1 and Private VLAN 1 A VLAN unaware port can only be a member of one VLAN but it can be a member of multiple Private VLANs 4ipnet C
128. VLAN ingress processing If ingress filtering is enabled and the ingress port is not a member of the classified VLAN the frame is discarded Shows whether the port accepts all frames or only tagged frames This parameter affects VLAN ingress processing If the port only accepts tagged frames untagged frames received on that port are discarded Shows egress filtering frame status whether tagged or untagged Shows UVID untagged VLAN ID Port s UVID determines the packet s behavior at the egress side Shows status of Conflicts whether exists or not When a Volatile VLAN User requests to set VLAN membership or VLAN port configuration the following conflicts can occur Functional Conflicts between features Conflicts due to hardware limitation Direct conflict between user modules Buttons z Select VLAN Users from this drop down list 271 Auto refresh Check this box to enable an automatic refresh of the page at regular intervals Refresh Click to refresh the page immediately 21 13 VCL MAC Based VLAN Status This page shows MAC based VLAN entries configured by various MAC based VLAN users Currently we support following VLAN User types 4ipnet c MAC based VLAN Membership Status for User Static ar Bl Amtosetesh E E System Information CPU Load No data exists for the user Log Detailed Log Ports Security P Loop Protection VLANS VLAN Membership VLAN Port VeL
129. _list gt enable disable Security Network NAS RADIUS_VLAN global lt port_list gt enable disable Guest VLAN Security Network NAS Guest_VLAN global lt port_list gt enable disable lt vid gt lt reauth_max gt lt allow_if_eapol_seen gt Example Guest_VLAN Global Enabled Guest VLAN ID 100 Max Re Authentication Count 10 Allow Guest VLAN if EAPOL See Enable Security Network gt nas gues glob en 100 10 en NAS Port Configuration Syntax Security Network NAS State lt port_list gt auto authorized unauthorized single multi macbased auto Port based 802 1X authorized Force Authorized unauthorized Force Unauthorized single Single 802 1X multi Multi 802 1X macbased MAC Based Authentication Example Security Network gt nas state 2 auto 294 ACL Access Control List ACL Port Syntax Security Network ACL Action lt port_list gt permit deny Configuration lt rate_limiter gt lt port_redirect gt lt mirror gt lt logging gt lt shutdown gt Parameters lt port_list gt Port list or all default All ports permit Permit forwarding default deny Deny forwarding lt rate_limiter gt Rate limiter number 1 15 or disable lt port_redirect gt Port list for copy of frames or disable lt mirror gt Mirror of frames enable disable lt logging gt System logging of frames log log_disable lt shutdown gt Shu
130. able as a basis for the next lookup When the end is reached the text No more entries is shown in the displayed table Use the lt lt button to start over IGMP SFM Information Table Columns VLAN ID VLAN ID of the group Group 249 Group address of the group displayed Switch port number Indicates the filtering mode maintained per VLAN ID port number Group Address basis It can be either Include or Exclude IP Address of the source Currently system limits the total number of IP source addresses for filtering to be 128 Indicates the Type It can be either Allow or Deny Buttons Auto refresh Check this box to enable an automatic refresh of the page at regular intervals Refresh Refreshes the displayed table starting from the input fields lt lt Updates the table starting from the first entry in the IGMP SFM Information Table gt gt Updates the table starting with the entry after the last entry currently displayed 21 8 2 MLD Snooping Status This page provides MLD Snooping status 4ipnet Configuration MLD Snooping Status Auto refresh C Refresh Clear Monitor m System Statistics Information CPU Load Log Detailed Log Ports Router Port Security p Port Status Loop Protection E Spanning Tree 2 Bridge Status Port Status a Port Statistics 4 R 5 IPMC IGMP Snooping 7 E Status Groups Ss Information 9 IPv4 SEM 10 Information 11 MLD Snoopin
131. abled 0 Access Port 2 Control List Port 3 X DHCP a IP Source Guari i ARP Inspection 5 0 Permit w Disabled X a Disabled w Disabled w Disabled Enabled 0 AAA Port 2 Aggregation Pot3 The settings relate to the currently selected stack unit as reflected by the page header Port 96 The logical port for the settings contained in the same row Select the policy to apply to this port The allowed values are 0 through 255 The default value is 0 Select whether forwarding is permitted Permit or denied Deny The default value is Permit Select which rate limiter to apply on this port The allowed values are Disabled or the values 1 through 16 The default value is Disabled Select DisabledPort Copy Select which port frames are copied on The allowed values are Disabled or a specific port number The default value is Disabled Specify the mirror operation of this port The allowed values are Enabled Frames received on the port are mirrored Disabled Frames received on the port are not mirrored The default value is Disabled Specify the logging operation of this port The allowed values are Enabled Frames received on the port are stored in the System Log Disabled Frames received on the port are not logged The default value is Disabled Please note that the System Log memory size and logging rate is limited Specify the port shut down operation of this port The allowed
132. abled all CDP frames are terminated by the switch Note When CDP awareness on a port is disabled the CDP information isn t removed immediately but gets removed when the hold time is exceeded 144 Optional TLV When checked the port description is included in LLDP information transmitted Optional TLV When checked the system name is included in LLDP information transmitted Optional TLV When checked the system description is included in LLDP information transmitted Optional TLV When checked the system capability is included in LLDP information transmitted Optional TLV When checked the management address is included in LLDP information transmitted Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 10 2 LLDP Media Configuration This page allows you to configure the LLDE MED This function applies to VoIP devices which support LLDP MED 4ipnet Configurator LLDP MED Configuration Power Re tion nonce eae Fast Start Repeat Count Security Aagregaton Fastsarepeat count Loop Protection panning Tree Coordinates Location IPMC mue E LLDP LLDP MED Civic Address Location MAC Table P
133. ame format and as such does not include a tag header as defined by IEEE 802 1Q 2003 Tagged The device is using the IEEE 802 1Q tagged frame format VLAN ID is the VLAN identifier VID for the port as defined in IEEE 802 1Q 2003 A value of 1 through 4094 is used to define a valid VLAN ID A value of 0 Priority Tagged is used if the device is using priority tagged frames as defined by IEEE 802 1Q 2003 meaning that only the IEEE 802 1D priority level is significant and the default PVID of the ingress port is used instead 259 Priority is the Layer 2 priority to be used for the specified application type One of the eight priority levels 0 through 7 DSCP is the DSCP value to be used to provide Diffserv node behavior for the specified application type as defined in IETF RFC 2474 Contain one of 64 code point values 0 through 63 Buttons Refresh Click to refresh the page immediately Auto refresh Check this box to enable an automatic refresh of the page at regular intervals 21 9 3 LLDP PoE This page provides a status overview for all LLDP PoE neighbours The displayed table contains a row for each port on which an LLDP PoE neighbour is detected The columns hold the following information 1 F 4ipnet Ea O LLDP Neighbour Power Over Ethernet Information Auto etrosh eimai System Information Eees Eor Peier Tips Pasersouree Poser Priorin _ Maximum Poser CPU Load No PoE neighbour inf
134. arded This situation is known as Too Many Neighbours in the LLDP standard LLDP frames require a new entry in the table when the Chassis ID or Remote Port ID is not already contained within the table Entries are removed from the table when a given port s link is down an LLDP shutdown frame is received or when the entry ages out Each LLDP frame can contain multiple pieces of information known as TLVs TLV is short for Type Length Value If a TLV is malformed it is counted and discarded The number of well formed TLVs but with an unknown type value The number of organizationally received TLVs Each LLDP frame contains information about how long time the LLDP information is valid age out time If no new LLDP frame is received within the age out time the LLDP information is removed and the Age Out counter is incremented Buttons Refresh Click to refresh the page immediately Clear Clears the local counters All counters including global counters are cleared upon reboot Auto refresh Check this box to enable an automatic refresh of the page at regular intervals 21 10 Power Over Ethernet Status This page provides an overview on the current PoE status for all ports 265 4ipnet Configuration Monitor Power Over Ethernet Status Auto refresh El Refresh N Local Port PD class Power Requested Power Allocated Power Used Current Used Priority Port Status CPU Load 1 0 0 0 0 mA
135. are 182 DSCP Classification oft O a O a Oa Ona Oa Ona O 0 0 a 1 2 2 3 3 4 4 5 5 6 6 y 7 0 BE Actual QoS class Actual Drop Precedence Level 183 gipnet Configuration Seen DSCP Classification Power Reduction Ports Security Aggregation Loop Protection Spanning Tree MVR IPMC LLDP PoE MAC Table VLANs Private VLANs VCL Voice VLAN Qos Port Classification Port Policing Port Scheduler Port Shaping Port Tag Remarking Port DSCP DSCP Based QoS DSCP Translation DSCP Classification QoS Control List Storm Control Mirroring UPnP lr Reset Diagnostics Maintenance Select the classified DSCP value 0 63 12 AF12 13 14 AF13 15 16 CS2 17 a O a O a O a O al Oma Oal O 2 O 0 0 1 1 2 2 3 3 4 4 5 5 6 6 Ui 7 Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 17 10 QoS Control List Configuration QoS Control List Configuration This page shows the QoS Control List QCL which is made up of the QCEs Each row describes a QCE that is defined The maximum number of QCEs is 256 on each switch Click on the lowest plus sign to add a new QCE to the list 184 gipnet Configurati men as QoS Control List Configuration Power Reduction Ports Security Aggregation IIS A Loop Protection Spanning Tree MVR IPMC LLDP PoE Private VLANs VCL Voice
136. are not under the full control of the administrator This feature is also known as Root Guard If enabled causes the port not to propagate received topology change notifications and topology changes to other ports If set it can cause temporary loss of connectivity after changes in a spanning tree s active topology as a result of persistently incorrect learned station location information It is set by a network administrator to prevent bridges external to a core region of the network causing address flushing in that region possibly because those bridges are not under the full control of the administrator or the physical link state of the attached LANs transits frequently If enabled causes the port to disable itself upon receiving valid BPDU s Contrary to the similar bridge setting the port Edge status does not effect this setting A port entering error disabled state due to this setting is subject to the bridge Port Error Recovery setting as well Controls whether the port connects to a point to point LAN rather than to a shared medium This can be automatically determined or forced either true or false Transition to the forwarding state is faster for point to point LANs than for shared media Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 130 7 5 Spanning Tree MSTI Ports STP MSTI Port Configuration This page allows the user to inspect the current S
137. ased VLAN Voice VLAN Qos Mirroring UPnP To delete an IP subnet based VLAN entry check this box and press save The entry will be deleted in the stack Indicates the index of the entry It is user configurable lts value ranges from 0 256 If a VCE ID is 0 application will auto generate the VCE ID for that entry Deletion and lookup of IP subnet based VLAN are based on VCE ID Indicates the IP address Indicates the network mask length 168 Indicates the VLAN ID VLAN ID can be changed for the existing entries A row of check boxes for each port is displayed for each IP subnet based VLAN entry To include a port in an IP subnet based VLAN check the box To remove or exclude the port from the IP subnet based VLAN make sure the box is unchecked By default no ports are members and all boxes are unchecked Click Add New Entry to add a new IP subnet based VLAN entry An empty row is added to the table and the IP subnet based VLAN entry can be configured as needed Any IP address mask can be configured for the IP subnet based VLAN entry Legal values for a VLAN ID are 1 through 4095 The IP subnet based VLAN entry is enabled when you click on Save The Delete button can be used to undo the addition of new IP subnet based VLANs Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values Auto refresh Check this box to refresh the page automatically Autom
138. ased VLAN a aa ab 165 15 3 VCL IP Subnet based VLAN iccccccccccccsssssccsessssccesssccscssssccecssssesesssecscssseceessssecesssssessssecessssseeeeses 168 16 VOICE VEAN CONFIGURATION enrere ene a Ena a Enea ob EA EE EAE AE EKE A Eee ER EA KEE aaa RESETA ERA ie 170 16 1 Voice VLAN Co fig ration cssc snanta a a aaa ae aiii 170 16 2 Voice VLAN OUI Configur tioni nnana a n a a eia 171 V7 QOS EAEE ET E E 173 17 1 QoS Ingress Port CIASSIFICOTION cccccccscccessseessecessseessccsssseesseesssseessecessssessecessseesaecessseeseseessses 173 17 2 QOS Ingress Port Policer Config sscceeccsesssceesssessecessssessecessseessecessseessecessssessecssseessecssseeesseeeaes 174 17 3 QOS POESIA aaas 175 17 4 005 Egress POrt SNOPES s esisets cess Sseloe tecesecaclcenvasides da decidida 176 17 5 QOS Port Tag Remarking ccceccesssccessseessecessseessecessseessecssssesssecssseesaecssssesseceasssenseeessssesseeesseees 177 17 6 QOS Port DSCP Configuration cccccsceessecessseessecessseessecesssecssccssseessecessssessecessseessecessseesssessseees 178 17 7 QoS DSCP based QoS Ingress Classification ccccscceessecessseessecessseessecesssessecessseessecessecsseeesseees 179 KIAR OONA DSCP Transition AEE 181 17 9 QOS DSCP ClassifiCOtION EERE EERE E EA EE EEN 182 17 10 QoS Control List CONfIQUrUtiON oooococononononnnoconanonnonononnnn nono nocnnn nooo nnonon noo nncnnn nooo nnononnronnnonos 184 17 11 QoS Storm Control
139. at can be used as a shorthand way of representing multiple 16 bit groups of contiguous zeros but it can only appear once It can also represent a legally valid IPv4 address For example 192 1 2 34 Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 1 5 System Log Configuration System Log is useful to provide system administrator monitor switch events history The switch supports syslog server mode User can install the syslog server in one computer then configure the server address and event types in the switch s system log configuration When the events occur the switch will send information or warning message to the syslog server 59 The administrator can analysis the system logs recorded in the syslog server to find out the cause of the issues The switch Web Ul allows you to Enable the Syslog Server assign the IP address and assign the syslog level Jipnet Configuration A ea i System Log Configuration Information IP Disabled Y IPv6 NTP Time Log Power Reduction Ports Security Aggregation Loop Protection Spanning Tree MVR IPMC LLDP PoE MAC Table VLANs Private VLANs VCL Voice VLAN Qos Mirroring UPnP sFlow Monitor Diagnostics Maintenance Indicates the server mode operation When the mode operation is enabled the syslog message will send out to syslog server The syslog protocol is based on UDP
140. at hits this ACE is granted permission for the ACE operation Deny The frame that hits this ACE is dropped Specify the rate limiter in number of base units The allowed range is 1 to 16 Disabled indicates that the rate limiter operation is disabled Select Port Copy Frames that hit the ACE are copied to the port number specified here The allowed range is the same as the switch port number range Disabled indicates that the port copy operation is disabled Specify the mirror operation of this port Frames matching the ACE are mirrored to the destination mirror port The allowed values are Enabled Frames received on the port are mirrored Disabled Frames received on the port are not mirrored The default value is Disabled Specify the logging operation of the ACE The allowed values are Enabled Frames matching the ACE are stored in the System Log Disabled Frames matching the ACE are not logged Please note that the System Log memory size and logging rate is limited Specify the port shut down operation of the ACE The allowed values are Enabled If a frame matches the ACE the ingress port will be disabled Disabled Port shut down is disabled for the ACE The counter indicates the number of times the ACE was hit by a frame MAC Parameters Only displayed when the frame type is Ethernet Type or ARP Specify the source MAC filter for this ACE Any No SMAC filter is specified SMAC filter status is don t care S
141. ata entries associated this History control entry stored in RMON The range is from 1 to 3600 default value is 50 The number of data shall be saved in the RMON Buttons Add new entry Click to add a new community entry Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values RMON Alarm Configuration Configure RMON Alarm table on this page The entry index key is ID 83 4ipnet Configuration a een y RMON Alarm Configuration Power Reduction Ports Security Switch Users Add New Ent Privilege Levels Y saw Auth Method SSH HTTPS Access Management SNMP RMON Statistics History Alarm Event Network Limit Control NAS ACL DHCP IP Source Guar ARP Inspection Check to delete the entry It will be deleted during the next save Indicates the index of the entry The range is from 1 to 65535 Indicates the interval in seconds for sampling and comparing the rising and falling threshold The range is from 1 to 2431 1 Indicates the particular variable to be sampled the possible variables are InOctets The total number of octets received on the interface including framing characters InUcastPkts The number of uni cast packets delivered to a higher layer protocol InNUcastPkts The number of broad cast and multi cast packets delivered to a higher layer protocol InDiscards The number of inbound packets that are discarded even the packets are normal InE
142. ate Erasing image Programming image Note 1 your firewall lt file_name gt Firmware file name Erase from 0x40fd0000 0x40faffff Program from 0x87ff0000 0x88000000 to 0x40fd0000 Program from 0x8 7ff000a 0x87ff000c to 0x40fd000a Alternate image activated now rebooting Firmware Swapping Firmware Load lt ip_addr_string gt lt file_name gt lt ip_addr_string gt IP host address a b c d or a host name Firmware gt load 192 168 2 100 SMBStaX dat Downloaded SMBStaX dat 3415213 bytes Master initiated software updating starting Waiting for firmware update to complete Starting flash update do not power off device The switch process the firmware upgrading through TFTP protocol When running firmware upgrading please open the TFTP tool as TFTP server for the switch For example TFTPd32 is a freeware TFTP server you can download it from the internet Browse the directory of the firmware file and select correct server interface If you failed to upload file remember to shut down the firewall of your computer The process may be terminated by Current Directory MEA y Browse Server interface 192 168 2 100 y Show Dir Tftp Server Tftp Client DHCP server Syslog server Log viewer start time progress Settings Help Note 2 While firmware uploading process is started please don t shutdown the switch P N V10120140507 31
143. ate the displayed table starting from that or the closest next VLAN Table match The will use the last entry of the currently displayed VLAN entry as a basis for the next lookup When the end is reached the text No more entries is shown in the displayed table Use the button to start over Navigating the VLAN Monitor page Each page shows up to 99 entries from the VLAN table default being 20 selected through the entries per page input field When first visited the web page will show the first 20 entries from the beginning of the VLAN Table The first displayed will be the one with the lowest VLAN ID found in the VLAN Table The VLAN input fields allow the user to select the starting point in the VLAN Table Clicking the button will update the displayed table starting from that or the closest next VLAN Table match The will use the last entry of the currently displayed VLAN entry as a basis for the next lookup When the end is reached the text No more entries is shown in the displayed table Use the button to start over Buttons E Select VLAN Users from this drop down list Auto refresh Check this box to enable an automatic refresh of the page at regular intervals Refresh Click to refresh the page immediately 269 VLAN Port Status This page provides VLAN Port Status gipnet Configuration Monitor VLAN Port Status for Static user Static E Auto refresh E Refresh een Port PVID Port Type I
144. atic refresh occurs every 3 seconds Refresh Refreshes the displayed table 169 16 Voice VLAN Configuration 16 1 Voice VLAN Configuration The Voice VLAN feature enables voice traffic forwarding on the Voice VLAN then the switch can classify and schedule network traffic It is recommended that there be two VLANs on a port one for voice one for data Before connecting the IP device to the switch the IP phone should configure the voice VLAND ID correctly lt should be configured through its own interface gipnet Configuration E7 ie Voice VLAN Configuration Power Reduction Ports Disabled y Security hoo ion 1000 Loop Protection 7 86400 seconds Spanning Tree A a MR S TH E IPMC LLDP PoE MAC Table Port Configuration VLANS Private VLANS VCL lt gt z o x lt gt 2 Voice VLAN Rin 1 Disabled y Disabled x OUI 7 a 2 Disabled x Disabled y OUI z Mirroring 3 Disabled y Disabled OUI E UPnP sFlow 4 Disabled Disabled OUI z Monitor 5 Disabled y Disabled x OUI E Diagnostics Maintenance 6 Disabled x Disabled OUI x 7 Disabled y Disabled x OUI 2 Indicates the Voice VLAN mode operation We must disable MSTP feature before we enable Voice VLAN lt can avoid the conflict of ingress filtering Possible modes are Enabled Enable Voice VLAN mode operation
145. ation lt ip_addr_string gt Security Switch SNMP Trap IPv6 Destination lt ipv6_addr gt Example Security Switch SNMP Trap gt mode ena Security Switch SNMP Trap gt version 2c Security Switch SNMP Trap gt community public Security Switch SNMP Trap gt destination 192 168 2 100 Result Trap Mode Enabled Trap Version 2c Trap Community public Trap Destination 192 168 2 100 Trap IPv6 Destination ES SNMP Trap Event Setting Syntax Security Switch SNMP Trap Authentication Failure enable disable Security Switch SNMP Trap Link up enable disable Security Switch SNMP Trap Inform Mode enable disable Security Switch SNMP Trap Inform Timeout lt timeout gt Security Switch SNMP Trap Inform Retry Times lt retries gt Example Security Switch SNMP gt trap auth fai en Security Switch SNMP gt trap link up en Security Switch SNMP gt trap info mode en Security Switch SNMP gt trap info time 5 Security Switch SNMPstrap info ret times 5 Result Trap Authentication Failure Enabled Trap Link up and Link down Enabled Trap Inform Mode Enabled Trap Inform Timeout seconds 5 Trap Inform Retry Times 0 SNMPv3 User Syntax Security Switch SNMP User Add lt engineid gt lt user_name gt MD5 SHA lt auth_password gt DES lt priv_password gt Example Security Switch SNMP gt user add 800007e5017f000001 orwell Security Switch SNMP gt user add 800007e5017f000001 andy md5 andy123 Result
146. atively assigned name for this managed node By convention this is the node s fully qualified domain name A domain name is a text string drawn from the alphabet A Za z digits 0 9 minus sign No space characters are permitted as part of a name The first character must be an alpha character And the first or last character must not be a minus sign The allowed string length is 0 to 255 The physical location of this node e g telephone closet 3rd floor The allowed string length is O to 255 and the allowed content is the ASCII characters from 32 to 126 Provide the time zone offset relative to UTC GMT The offset is given in minutes east of GMT The valid range is from 720 to 720 minutes 55 Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 1 2 IP Configuration Configure the switch managed IP information on this page 4ipnet gis le IP Configuration Information es T Renew Time 192 168 2 1 192 168 2 1 Li Power Reduction 255 255 255 0 255 255 255 0 Ports Security 0 0 0 0 0 0 0 0 Aggregation 1 1 Loop Protection S Spanning Tree 0 0 0 0 0 0 0 0 MVR IPMC IP DNS Proxy Configuration LLDP POE MAC Table VLANs Reset Private VLANs VCL Voice VLAN Qos Mirroring UPnP sFlow Monitor Diagnostics Maintenance The Configured column is used to view or change the IP configuration
147. b snmp telnet Example Limit the IP range from the 192 168 2 1 to 192 168 2 10 can access the web UI Security Switch gt access add 1 192 168 2 1 192 168 2 10 web SNMP System Configuration Mode Version Read Write Community Syntax Security Switch SNMP Mode enable disable Security Switch SNMP Version 1 2c 3 Security Switch SNMP Read Community lt community gt Security Switch SNMP Write Community lt community gt Example Security Switch gt snmp mode en Security Switch gt snmp ver 2c Security Switch SNMP gt read com abc Security Switch SNMP gt write com orwell Result SNMP Configuration SNMP Mode Enabled SNMP Version 2c Read Community abc Write Community orwell SNMP Community Syntax Security Switch SNMP Community Add lt community gt lt ip_addr gt lt ip_mask gt Security Switch SNMP Community Delete lt index gt Security Switch SNMP Community Lookup lt index gt Example Security Switch gt snmp commu add abc Security Switch gt snmp commu add test 192 168 2 100 255 255 255 0 SNMP Trap Server Enter the SNMP Trap Configuration Group Setting Security Switch SNMP gt trap 291 Type up to move up one level or to go to root level Security Switch SNMP Trap gt Syntax Security Switch SNMP Trap Mode enable disable Security Switch SNMP Trap Version 1 2c 3 Security Switch SNMP Trap Community lt community gt Security Switch SNMP Trap Destin
148. ble is sorted first by port then by VLAN ID then by IP address and then by MAC address 4ipnet Configuration is Monitor Dynamic IP Source Guard Table Auto refresh E Refresh lt lt gt gt System Information Start from Port 1 y VLAN 1 and IP address 0 0 0 0 with 20 entries per page CPU Load Detailed Log Port VLAN ID IP Address MAC Address Ports No more entries Security Access Management Statistics Network Port Security NAS ACL Status DHCP ARP Inspection IP Source Guard AAA Switch CP Loop Protection Spanning Tree MVR IPMC LLDP PoE MAC Table VLANs VCL SFlow Diagnostics Maintenance Navigating the IP Source Guard Table Each page shows up to 99 entries from the Dynamic IP Source Guard table default being 20 selected through the entries per page input field When first visited the web page will show the first 20 entries from the beginning of the Dynamic IP Source Guard Table The Start from port address VLAN and IP address input fields allow the user to select the starting point in the Dynamic IP Source Guard Table Clicking the button will update the displayed table starting from that or the closest next Dynamic IP Source Guard Table match In addition the two input fields will upon a button click assume the value of the first displayed entry allowing for continuous refresh with the same start address The will use the last entry of the curr
149. can be configured here This page allows for adding and deleting MAC based VLAN entries and assigning the entries to different ports This page shows only static entries 4ipnet Ea Configuration System MAC based VLAN Membership Configuration Auto refresh Refresh iss gt Power Reduction Ports zf ge S Currently no entries present Spanning Tree MVR Add New Entry LLDP Save Reset PoE MAC Table VLANs Private VLANs CL MAC based VLAN Protocol based VLAN IP Subnet based VLAN Diagnostics Maintenance To delete a MAC based VLAN entry check this box and press save The entry will be deleted in the stack Indicates the MAC address Indicates the VLAN ID A row of check boxes for each port is displayed for each MAC based VLAN entry To include a port in a MAC based VLAN check the box To remove or exclude the port from the MAC based VLAN make sure the box is unchecked By default no ports are members and all boxes are unchecked Click to add a new MAC based VLAN entry An empty row is added to the table and the MAC based VLAN entry can be configured as needed Any unicast MAC address can be configured for the MAC based VLAN entry No broadcast or multicast MAC addresses are allowed Legal values for a VLAN ID are 1 through 4095 The MAC based VLAN entry is enabled when you click on Save A MAC based VLAN without any port members will be deleted when you
150. cconsaceseess 55 1 SYSTEM CONFIGURATION wists eaea Goda ch bide Sues bochce tis ovation Pode ck Hive ceaueebnohee nite N AERES e EAE tadas 55 1 1 SYSTEM INFORMATION A cosseesvevsidedectesenveutaecessbnseedeettededheaeversecdas 55 1 2 IP CONFIGURATION ion mooiiocnionosacnenoosicnnanodedocinniocacodade E EEE RENAK ESP En E aaan ESTESA EATE R ERAEN E eai 56 1 3 IPV6 CONFIGURATION eniinn ie iii e eaii ri eei iier iieii 57 1 4 NTP CONFIGURATION cccccscccesseececeeseeecseneececseneeceesaeeeceeaaececeeeecseaeeeceesaeeecenseceesaeeeceeaeeeseeneees 58 1 5 SYSTEM LOG CONFIGURATION coooooccccononcnononononononcnononononononononoonnnnc nono nnnnnnnnnonnnnnn nn nono nn iai r ina 59 2 POWER REDUCTION EEA ATAT E E A 61 2 1 EEE CONFIGURATION cnr riii iain iie ie iii e i ian e iiia 61 3 PORT CONFIGURATION Go e aaa a shades E aa Ea e a code ae ube gn e eian 63 A SECURITY CONFIGURATION ro ae rd 65 BL SECURITY ES vase ae e Gated vets dts essen eaten aa Heaven tet wa 65 4 1 1 Security Switch Users CONfiQuratiOn ccsccccsssceesssessecessseessecessssessseessesessecessssessseessssesssenseeees 65 4 1 2 Security Switch Privilege Levels Configuration oooococcononononanonanoconnnonanoonon cora no ron nonanocnnn nono 66 4 1 3 Security Switch Auth Method ccscccessseessessssseessecssseessecsssceessecsasseessecsseeessessseeessecnsseeenseenes 68 4 1 4 Security Switch SSH Configuration coooncccccconononnnonanocnnnnonanocnnn non
151. ce address MAC based SIP Static trunk Static and 802 3ad LACP Loop Protection Shutdown of ports when network loops are detected Spanning tree IEEE 802 1D Legacy Spanning Tree IEEE 802 1w Rapid Spanning Tree IEEE 802 15 Multiple Spanning Tree BPDU guard and filtering support 13 Multicast IGMP Snooping v1 v2 v3 MLD IPv6 Snooping v1 v2 Up to 8K Multicast Groups IGMP MLD Querier Router Port Proxy Immediate Leave messages Traffic Mirroring Port Mirroring 1 to 1 1 to N N to 1 sFlow MAC Address Table Dynamic MAC address management Static MAC address support Security Port Security MAC Port P MAC Port Binding 802 1x authentication MAC based port based Username password permission control User accounts with 15 permission levels Management IP address listing IP Source Guard RADIUS TACACS Authentication Guest VLAN DoS protection SSHv1 SSHv2 SSLv2 SSLv3 TLSv1 Access Control List L2 L3 L4 Management Browser based Command line interface management Console Telnet SSH DHCP Client Snooping Relay Option 82 BOOTP SNMP V1 V2c V3 Trap RMON Firmware upgrades by TFTP HTTP Configuration backup and restoration IPv4 IPv6 Link Layer Discovery Protocol LLDP Event logging NTP Maintenance VeriPHY Diagnostics IPv4 v6 Ping
152. ceegeneececessauenaseeceeeesaqenes 38 7 2 SPANNING TREE PROTOCOL STP rieien irite aE NEE ata E E E Ei a ai iit 40 CHAPTER 8 IP MULTICASTING zoini neiseis easan isores doaia enean e aa a eaaa E Es aoaia 43 8 1 IGMP SNOOPING asriar i eie iiiar e e iaei ei ie e a iei iii iii 43 8 1 1 Basic Configuratie ii ii died ias 43 8 1 2 IGMP Snooping VLAN Configuration ccccccccccceessssscssscccsessssecsessessesseecsessssecssssesseassecsesssseesaues 44 8 1 3 IGMP Snooping Port Group Filtering Configuration cccccceesssseeessceceessssecsesceceesssseceesssseeesnes 45 3 2 MLEDSNOOPING cit A A a buen dusters odeasnede audi 46 CHAPTER 9 AGGREGATION 6c ceesc cess cuss sccssicecsssccsdccsewesccwes ccveeccessecnussescdnes cevescovoedesccevascovasvecveucevebecvesseews 47 9 1 STATIC AGGREGATION ua cas 47 9 2 DYNAMIC AGGREGATION sisi da e teebebsvdevseeeebuet es 48 CHAPTER 10 UTILITIES FOR MAINTENANCE cccccocccccococcccccccconoconocccocnccnccncncccncccnconnnonnoccnoconononoconoccnonons 50 10 1 ADMINISTRATOR ACCOUNTS a AAA da 50 10 2 CONFIGURATION BACKUP AND RESTORE s scceceeeeeeseaececececeeneaaececececeeseauececececeseeaucaeceeeceseeaucaeeeeeeeseeenaaes 52 10 3 FIRMWARE UPGRADE Asahi oreore ia td 52 104 SYSTEM RESTART AND RESET ar er coed hen raa ar aa am toad a aa aa a E AE tench hive aa A aS AE A AKEE ra TAS 53 APPENDIX A ULREFERENCE INDEX cccccssesscccvesscsccsscsssscncccseseesessscccccsecsssvecasensstesesecevceccecsessesesine
153. cified Floors Representing altitude in a form more relevant in buildings which have different floor to floor dimensions An altitude 0 0 is meaningful even outside a building and represents ground level at the given latitude and longitude Inside a building 0 0 represents the floor level associated with ground level at the main entrance 146 The Map Datum is used for the coordinates given in these options WGS84 Geographical 3D World Geodesic System 1984 CRS Code 4327 Prime Meridian Name Greenwich NAD83 NAVD88 North American Datum 1983 CRS Code 4269 Prime Meridian Name Greenwich The associated vertical datum is the North American Vertical Datum of 1988 NAVD88 This datum pair is to be used when referencing locations on land not near tidal water which would use Datum NAD83 MLLW NAD83 MLLW North American Datum 1983 CRS Code 4269 Prime Meridian Name Greenwich The associated vertical datum is Mean Lower Low Water MLLW This datum pair is to be used when referencing locations on water sea ocean Civic Address Location IETF Geopriv Civic Address based Location Configuration Information Civic Address LCl The two letter ISO 3166 Country code in capital ASCII letters Example DK DE or US National subdivisions state canton region province prefecture County perish gun Japan district City township shi Japan Example Copenhagen City division borough city district ward c
154. cify the source IP address in the SIP Address field that appears Network Source IP filter is set to Network Specify the source IP address and source IP mask in the SIP Address and SIP Mask fields that appear When Host or Network is selected for the source IP filter you can enter a specific SIP address in dotted decimal notation When Network is selected for the source IP filter you can enter a specific SIP mask in dotted decimal notation Specify the destination IP filter for this ACE Any No destination IP filter is specified Destination IP filter is don t care Host Destination IP filter is set to Host Specify the destination IP address in the DIP Address field that appears Network Destination IP filter is set to Network Specify the destination IP address and destination IP mask in the DIP Address and DIP Mask fields that appear When Host or Network is selected for the destination IP filter you can enter a specific DIP address in dotted decimal notation When Network is selected for the destination IP filter you can enter a specific DIP mask in dotted decimal notation ICMP Parameters Specify the ICMP filter for this ACE Any No ICMP filter is specified ICMP filter status is don t care Specific If you want to filter a specific ICMP filter with this ACE you can enter a specific ICMP value A field for entering an ICMP value appears When Specific is selected for the ICMP filter you can ente
155. ckend servers to show details for 4ipnet Configuration Monitor System Information CPU Load Log Detailed Log Ports Security Access Management Statistics Network AAA RADIUS Overview RADIUS Details Switch LACP Loop Protection Spanning Tree MVR IPMC LLDP PoE MAC Table VLANs VCL sFlow Diagnostics Maintenance RADIUS Authentication Statistics for Server 1 Receive Packets Transmit Packets Server 2 Access Accepts Access Rejects Access Challenges Malformed Access Responses Bad Authenticators Unknown Types Packets Dropped osooooo Access Requests Access Retransmissions Pending Requests Timeouts Server 3 Server 4 ecco Server 5 _ IP Address State Round Trip Time 0 0 0 0 1812 Disabled Oms RADIUS Accounting Statistics for Server 1 Receive Packets Transmit Packets Responses Malformed Responses Bad Authenticators Unknown Types Packets Dropped ocoooo Requests Retransmissions Pending Requests Timeouts ooo Other Info IP Address State Round Trip Time 0 0 0 0 1813 Disabled Oms Packet Counters RADIUS accounting server packet counter There are five receive and four transmit counters 228 Server 1 jAuto refresh E Refresh Clear Server 1 radiusAccClientExtRespons The number of RADIUS packets valid or Responses es invalid received from the server The number of malformed RADIUS pa
156. ckets received from the server Malformed Malformed radiusAccClientExtMalform packets include packets with an invalid Responses edResponses length Bad authenticators or unknown types are not included as malformed access responses The number of RADIUS packets containing Bad radiusAcctClientExtBadAut invalid authenticators received from the Authenticators henticators server The number of RADIUS packets of unknown radiusAccClientExtUnknow Unknown Types types that were received from the server on nTypes the accounting port The number of RADIUS packets that were Packets radiusAccClientExtPackets received from the server on the accounting Dropped Dropped port and dropped for some other reason The number of RADIUS packets sent to the radiusAccClientExtRequest Requests server This does not include s retransmissions The number of RADIUS packets radiusAccClientExtRetrans Retransmissions retransmitted to the RADIUS accounting missions server The number of RADIUS packets destined for the server that have not yet timed out or Pending radiusAccClientExtPending received a response This variable is Requests Requests incremented when a Request is sent and decremented due to receipt of a Response timeout or retransmission The number of accounting timeouts to the server After a timeout the client may retry to the same server send to a different radiusAccClientExtTimeout Timeouts server or give up A retry to the
157. click Save 164 The button can be used to undo the addition of new MAC based VLANs Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values Refresh Refreshes the displayed the table starting from the VLAND ID input fields lt lt Updates the table starting from the first entry in the VALN Table i e the entry with the lowest VLAND ID gt gt Update the table staring with the entry after the last entry currently displayed 15 2 VCL Protocol based VLAN Protocol to Group Mapping Table This page allows you to add new protocols to Group Name unique for each Group mapping entries as well as allow you to see and delete already mapped entries for the switch The displayed settings are gipnet Ci ti oua e Protocol to Group Mapping Table Power Reduction Ports Security No Group entry found Aggregation Loop Protection Add New Entry Spanning Tree j MVR IPMC Save Reset LLDP PoE MAC Table VLANs Private VLANs VCL MAC based VLAN Protocol based VLAN Protocol to Group Group to VLAN IP Subnet based VLAN Voice VLAN Qos Mirroring UPnP sFlow Auto refresh To delete a Protocol to Group Name map entry check this box The entry will be deleted on the switch during the next Save Frame Type can have one of the following values 1 Ethernet 165 Refresh 2 LLC 3 SNAP Note
158. communication and received on UDP port 514 and the syslog server will not send acknowledgments back sender since UDP is a connectionless protocol and it does not provide acknowledgments The syslog packet will always send out even if the syslog server does not exist Possible modes are Enable server mode operation Disable server mode operation Indicates the IPv4 host address of syslog server If the switch provide DNS feature it also can be a host name Indicates what kind of message will send to syslog server Possible modes are Info Send information warnings and errors Warning Send warnings and errors Error Send errors Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 60 2 Power Reduction 2 1 EEE Configuration This page allows the user to inspect and configure the current EEE port settings gipnet Configuration System EEE Configuration Power Reduction EEE Ports eee E BAAAOAAAD Aggregation 4 DODDaDan Loop Protection pa Spanning Tree 2 o 0000000 MVR 3 F AHABAAARB i 4 BD AAAAAAAD PoE 5 E 202000000 MAC Table 6 DODODODO O 7 E A000000 rivate s em VCL 8 al n000000O Voice VLAN 9 a na aaa a a E ae 0 AAAAAAAR Mirroring p UPnP 11 Mm new ft A A sFlow 2 DODADODO Monitor 13 Mm DO0O0DO0D0OoOoDOoO Diagnostics ea ase 40 4 BABA
159. connects all adjacent MST regions and acts as a virtual bridge node for communications with STP or RSTP nodes in the global network Common and Internal Spanning Tree CIST MSTP connects all bridges and LAN segments with a single Common and Internal Spanning Tree CIST The CIST is formed as a result of the running spanning tree algorithm between switches that support the STP RSTP MSTP protocols MSTI Multiple Spanning Tree Instance One VLAN can be mapped to a MSTI Each instance has its own root switch forwarding path blocking path and table An MST Region may contain multiple MSTI 7 1 Spanning Tree Bridge Setting This page allows you to configure STP system settings The settings are used by all STP Bridge instances in the Switch 124 4ipnet qurton STP Bridge Configuration Power Reduction Ports Security Aggregation Loop Protection Spanning Tree Bridge Settings MVR IPMC LLDP PoE MAC Table VLANs Private VLANs VCL Voice VLAN Qos i i Basic Settings The STP protocol version setting Valid values are STP RSTP and MSTP Controls the bridge priority Lower numeric values have better priority The bridge priority plus the MSTI instance number concatenated with the 6 byte MAC address of the switch forms a Bridge Identifier For MSTP operation this is the priority of the CIST Otherwise this is the priority of the STP R
160. control of the device But others value need to refer to each group privilege level User s privilege should be same or greater than the group privilege level to have the access of that group By default setting privilege level 5 has read only access and privilege level 10 has read write access And system maintenance software upload factory defaults and etc requires a user privilege level of 15 Generally privilege level 15 is used for an administrator account privilege level 10 for a standard user account and privilege level 5 for a guest account Check the next section to see how privilege level can be configured Buttons Add new user Click to add a new user 4 1 2 Security Switch Privilege Levels Configuration This page provides an overview of privilege levels 66 4ipnet Configuration a sees Privilege Level Configuration Power Reduction Ports Privilege Levels Security Group Name Configuration Configuration Execute Status Statistics Status Statistics Switch Read o Read write Read o Read write Users E la Privilege Levels Aggregation 5 10 5 a 10 Auth Method Deb
161. curity Network gt ip source guard port mode 1 10 en Port 1 10 Security Network gt ip source guard limit 1 10 2 limit 2 MAC Address IP Source Guard Static Table Syntax Security Network IP Source Guard Entry lt port_list gt add delete lt vid gt lt allowed_ip gt lt allowed_mac gt Example Security Network gt ip source guard entry 5 add 2 192 168 2 101 001122334455 Result IP Source Guard Entry Table Type Port VLAN IP Address MAC Address Static 1 1 192 168 2 10 11 22 33 44 55 66 Static 5 2 192 168 2 101 00 0b 16 21 2c 37 ARP Inspection ARP Inspection Syntax Security Network ARP Inspection Configuration Security Network ARP Inspection Mode enable disable Security Network ARP Inspection Port Mode lt port_list gt enable disable Security Network ARP Inspection Entry lt port_list gt add delete lt vid gt lt allowed_mac gt lt allowed_ip gt Security Network ARP Inspection Status lt port_list gt Security Network ARP Inspection Translation Example Security Network gt arp inspection mode en Security Network gt arp inspection port mode 1 10 en Security Network gt arp inspection entry 1 add 10 112233445566 192 168 2 10 Security Network gt arp inspection status ARP Inspection Entry Table Static 1 10 Ob 16 21 2c 37 42 192 168 2 10 Security AAA Configuration Common Server Configuration Syntax Security AAA Timeout lt timeout gt Security AAA Deadtime lt dead_time g
162. cy protocol that this entry should belong to Possible privacy protocols are None No privacy protocol DES An optional flag to indicate that this user uses DES authentication protocol A string identifying the privacy password phrase The allowed string length is 8 to 32 and the allowed content is ASCII characters from 33 to 126 Buttons Add new user Click to add a new user entry Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values SNMPv3 Group Configuration Configure SNMPv3 group table on this page The entry index keys are Security Mode and Security Name 77 gipnet Configuration s ean SNMPv3 Group Configuration Power Reduction Ports Security Switch Users Privilege Levels Auth Method SSH HTTPS Access Management SNMP 3 System Add New Entry Save Reset Communities Users Groups Views Access RMON Network Limit Control NAS ACL DHCP IP Source Guar ARP Inspection AAA Check to delete the entry It will be deleted during the next save public default_ro_group private default_rw_group public default_ro_group private default_rw_group default_user default_rw_group Indicates the security model that this entry should belong to Possible security models are v1 Reserved for SNMPv1 v2c Reserved for SNMPv2c usm User based Security Model USM A string identifying the secu
163. d Even if the link is physically disconnected and reconnected on the port by disconnecting the cable the port will remain shut down There are three ways to re open the port 1 Boot the switch 2 Disable and re enable Limit Control on the port or the switch 3 Click the Reopen button Trap amp Shutdown If Limit 1 MAC addresses is seen on the port both the Trap and the Shutdown actions described above will be taken State This column shows the current state of the port as seen from the Limit Control s point of view The state takes one of four values Disabled Limit Control is either globally disabled or disabled on the port Ready The limit is not yet reached This can be shown for all actions Limit Reached Indicates that the limit is reached on this port This state can only be shown if Action is set to None or Trap Shutdown Indicates that the port is shut down by the Limit Control module This state can only be shown if Action is set to Shutdown or Trap amp Shutdown Re open Button If a port is shut down by this module you may reopen it by clicking this button which will only be enabled if this is the case For other methods refer to Shutdown in the Action section Note that clicking the reopen button causes the page to be refreshed so non committed changes will be lost Buttons Refresh Click to refresh the page Note that non committed changes will be lost Save Click to save changes Reset C
164. d automatically Otherwise the ID specified in this field is used The string must contain an even number in hexadecimal format with number of digits between 10 and 64 but all zeros and all F s are not allowed Indicates the SNMP trap security name SNMPv3 traps and informs using USM for authentication and privacy A unique security name is needed when traps and informs are enabled Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 74 SNMPv3 Community Configuration In SNMP V3 it is start to support User Name and its privilege You can configure SNMPv3 community table on this page The entry index key is Community 4ipnet ppp hed pias SNMPv3 Community Configuration Power Reduction Ports Security Switch Users Privilege Levels en HTTPS Access Management SNMP System Communities Users Groups Views Access RMON Network Limit Control NAS ACL DHCP IP Source Guar ARP Inspection AAA Check to delete the entry It will be deleted during the next save Indicates the community access string to permit access to SNMPv3 agent The allowed string length is 1 to 32 and the allowed content is ASCII characters from 33 to 126 The community string will be treated as security name and map a SNMPv1 or SNMPv2c community string Indicates the SNMP access source address A particular range of source addresses
165. d disabled disabled disabled disabled disabled Port Shaping 17 disabled disabled disabled disabled disabled disabled disabled disabled disabled Port Tag Remarking 18 disabled disabled disabled disabled disabled disabled disabled disabled disabled drena daos 19 disabled disabled disabled disabled disabled disabled disabled disabled disabled DSCP Translation 20 disabled disabled disabled disabled disabled disabled disabled disabled disabled DSCP Classification 21 disabled disabled di disabled disabled disabled disabled disabled disabled QoS Control List 22 disabled disabled di disabled disabled disabled disabled disabled disabled Storm Control 23 disabled disabled disabled disabled disabled disabled disabled disabled disabled Mirroring 24 disabled disabled disabled disabled disabled disabled disabled disabled disabled UPnP 25 disabled disabled disabled disabled disabled disabled disabled disabled disabled sFlow 26 disabled disabled disabled disabled disabled disabled disabled disabled disabled Monitor Diagnostics Maintenance The logical port for the settings contained in the same row Click on the port number in order to configure the shapers 176 Shows disabled or actual queue shaper rate e g 800 Mbps Shows disabled or actual port shaper rate e g 800 Mbps 17 5 QoS Port Tag Remarking This page provides an overview of QoS Egress Port Tag Remarking for all switch ports The ports belong to the currently selected stack unit as r
166. d in identifying a QoS Class The User Priority Table attribute defined in RFC4675 forms the basis for identifying the QoS Class in an Access Accept packet Only the first occurrence of the attribute in the packet will be considered and to be valid it must follow this rule All 8 octets in the attribute s value must be identical and consist of ASCII characters in the range 0 3 which translates into the desired QoS Class in the range 0 3 RADIUS Assigned VLAN Enabled When RADIUS Assigned VLAN is both globally enabled and enabled checked for a given port the switch reacts to VLAN ID information carried in the RADIUS Access Accept packet transmitted by the RADIUS server when a supplicant is successfully authenticated If present and valid the port s Port VLAN 94 ID will be changed to this VLAN ID the port will be set to be a member of that VLAN ID and the port will be forced into VLAN unaware mode Once assigned all traffic arriving on the port will be classified and switched on the RADIUS assigned VLAN ID If re authentication fails or the RADIUS Access Accept packet no longer carries a VLAN ID or it s invalid or the supplicant is otherwise no longer present on the port the port s VLAN ID is immediately reverted to the original VLAN ID which may be changed by the administrator in the meanwhile without affecting the RADIUS assigned This option is only available for single client modes i e e Port based 802 1X e Si
167. ddress of the attached supplicant For MAC based Auth this column holds the MAC address of the attached client Clicking the link causes the client s Backend Server counters to be shown in the Selected Counters table If no clients are attached it shows No clients attached This column holds the VLAN ID that the corresponding client is currently secured through the Port Security module The client can either be authenticated or unauthenticated In the authenticated state it is allowed to forward frames on the port and in the unauthenticated state it is blocked As long as the backend 214 server hasn t successfully authenticated the client it is unauthenticated If an authentication fails for one or the other reason the client will remain in the unauthenticated state for Hold Time seconds Shows the date and time of the last authentication of the client successful as well as unsuccessful 4ipnet Ea Configuration oe Monitor NAS eee PEEN Pon 1 E Autoreftesh E Refresh tem x Stee Port State Pot 2 a CPU Load a 3 ra Detailed Log Globally Disabled aad bouts Port 6 Security eit Access Management coe Statistics ais Network Port Security Port 10 NAS Port 11 Switch Port 12 Port Port 13 ACL Status Port 14 pee Port 15 ARP Inspection Port 16 IP Source Guard Port 17 AMA Port 18 Swen Port 19 eee Port 20 Loop Protection Spanning Tree MVR IPMC LLDP PoE MAC Table VLANS VCL sF
168. dicates the ACL user Indicates the ingress port of the ACE Possible values are All The ACE will match all ingress port Port The ACE will match a specific ingress port Indicates the frame type of the ACE Possible values are Any The ACE will match any frame type EType The ACE will match Ethernet Type frames Note that an Ethernet Type based ACE will not get matched by IP and ARP frames ARP The ACE will match ARP RAPP frames 216 IPv4 The ACE will match all IPv4 frames IPv4 ICMP The ACE will match IPv4 frames with ICMP protocol IPv4 UDP The ACE will match IPv4 frames with UDP protocol IPv4 TCP The ACE will match IPv4 frames with TCP protocol IPv4 Other The ACE will match IPv4 frames which are not ICMP UDP TCP IPv6 The ACE will match all IPv6 standard frames Indicates the forwarding action of the ACE Permit Frames matching the ACE may be forwarded and learned Deny Frames matching the ACE are dropped Indicates the rate limiter number of the ACE The allowed range is 1 to 16 When Disabled is displayed the rate limiter operation is disabled Indicates the port copy operation of the ACE Frames matching the ACE are copied to the port number The allowed values are Disabled or a specific port number When Disabled is displayed the port copy operation is disabled Specify the mirror operation of this port The allowed values are Enabled Frames received on the port are mirrored Disabled Frames
169. dicates the value of sysUp Time at the time this event entry last generated an event Buttons Add new entry Click to add a new community entry Save Click to save changes 86 Reset Click to undo any changes made locally and revert to previously saved values 4 2 Security Network 4 2 1 Port Security Limit Control Configuration This page allows you to configure the Port Security Limit Control system and port settings 4ipnet Configuration Port Security Limit Control Configuration System Power Reduction Ports System Configuration Security Switch Mode Disabled Pa Privilege Levels Auth Method Aging Period 3600 seconds SSH HTTPS Port Configuration Access Management Mode Aton State Manac Por Limit State Re open RMON a lt gt bA 4 lt gt X Poma 1 Disabled 4 None Disabled Reopen Sam 2 Disabled x 4 None Disabled Reopen Event Network 3 Disabled 4 None Disabled Reopen Limit Control NAS 4 Disabled x 4 None Disabled Reopen ACL DHCP 5 Disabled 4 None Disabled Reopen IP Source Guar ARP Inspection 6 Disabled v 4 None Disabled Reopen AAA Aggregation 7 Disabled m 4 None Disabled Reopen Loop Proteciion 8 Disabled 4 None Disabled Reopen Spanning Tree MVR 9 Disabled x 4 None Disabled Reopen Limit Control allows for limiting the number of us
170. e Refer to NAS Admin State for a description of possible values The current state of the port Refer to NAS Port state for a description of the individual states The QoS class assigned by the RADIUS server The field is blank if no QoS class is assigned The VLAN ID that NAS has put the port in The field is blank if the Port VLAN ID is not overridden by NAS If the VLAN ID is assigned by the RADIUS server RADIUS assigned is appended to the VLAN ID Read more about RADIUS assigned VLANs here If the port is moved to the Guest VLAN Guest is appended to the VLAN ID Read more about Guest VLANs here Port Counters These supplicant frame counters are available for the following administrative states e Force Authorized e Force Unauthorized e Port based 802 1X e Single 802 1X e Multi 802 1X 209 EAPOL Counters rectos mame tE nome Temen Total Response ID Responses Invalid Type Invalid Length Request ID Requests dot1xAuthEapolFramesRx dot1xAuthEapolRespldFramesRx dot1xAuthEapolRespFramesRx dot1xAuthEapolStartFramesRx dot1 xAuthEapolLogoffFramesRx dot1 xAuthInvalidEapolFramesRx dot1 xAuthEapLengthErrorFramesRx dot1 xAuthEapolFramesTx dot1xAuthEapolReqldFramesTx dot1xAuthEapolRegFramesTx 210 The number of valid EAPOL frames of any type that have been received by the switch The number of valid EAPOL Response Identity frames that have been received by the s
171. e beginning of the IGMP Group Table The Start from VLAN and group input fields allow the user to select the starting point in the IGMP Group Table Clicking the Refresh button will update the displayed table starting from that or the closest next IGMP Group Table match In addition the two input fields will upon a Refresh button click assume the value of the first displayed entry allowing for continuous refresh with the same start address The gt gt will use the last entry of the currently displayed table as a basis for the next lookup When the end is reached the text No more entries is shown in the displayed table Use the lt lt button to start over IGMP Group Table Columns VLAN ID of the group Group address of the group displayed Ports under this group Buttons Auto refresh Check this box to enable an automatic refresh of the page at regular intervals Refresh Refreshes the displayed table starting from the input fields lt lt Updates the table starting with the first entry in the IGMP Group Table gt gt Updates the table starting with the entry after the last entry currently displayed 248 IGMP SFM Information Table Entries in the IGMP SFM Information Table are shown on this page The IGMP SFM Source Filtered Multicast Information Table also contains the SSM Source Specific Multicast information This table is sorted first by VLAN ID then by group and then by Port No Different sourc
172. e addresses belong to the same group are treated as single entry 4ipnet ele Configuration 5 A A Monitor IGMP SFM Information Auto refresh Refresh Gee gt System Information Start from VLAN 1 and Group 224 0 0 0 with 20 entries per page CPU Load VLAN ID Group Port Mode Source Address Type Hardware Filter Switch No more entries Detailed Log Ports Security LACP Loop Protection Spanning Tree Bridge Status Port Status Port Statistics MVR IPMC IGMP Snooping Status Groups Information IPv4 SFM Information MLD Snooping LLDP PoE MAC Table VLANs VCL sFlow Diagnostics Maintenance Navigating the IGMP SFM Information Table Each page shows up to 99 entries from the IGMP SFM Information table default being 20 selected through the entries per page input field When first visited the web page will show the first 20 entries from the beginning of the IGMP SFM Information Table The Start from VLAN and group input fields allow the user to select the starting point in the IGMP SFM Information Table Clicking the Refresh button will update the displayed table starting from that or the closest next IGMP SFM Information Table match In addition the two input fields will upon a Refresh button click assume the value of the first displayed entry allowing for continuous refresh with the same start address The gt gt will use the last entry of the currently displayed t
173. e announces that the firmware update is initiated After about a minute the firmware is updated and the switch restarts Warning While the firmware is being updated Web access appears to be defunct The front LED flashes Green Off with a frequency of 10 Hz while the firmware update is in progress Do not restart or power off the device at this time or the switch may fail to function 278 23 3 2 Image Select There are 2 image saved within the switch This page provides information about the active and alternate backup firmware images in the device and allows you to revert to the alternate image The web page displays two tables with information about the active and alternate firmware images Software Image Selection Image managed Version PoE standalone dev build by root virtual centos 2012 07 01T15 54 24 08 00 2012 07 01T15 54 24 08 00 managed bk SMBStaX standalone dev build by uwai Uwai Fedora 2012 11 06T16 35 36 08 00 Config config mk 2012 11 06T16 35 36 08 00 Note 1 Incase the active firmware image is the alternate image only the Active Image table is shown In this case the Activate Alternate Image button is also disabled 2 Ifthe alternate image is active due to a corruption of the primary image or by manual intervention uploading a new firmware image to the device will automatically use the primary image slot and activate this 3 The firmware version and date information may be empty for olde
174. e at regular intervals RMON Alarm Overview This page provides an overview of RMON alarm entries The displayed fields are 234 4ipnet Ea Configuration Monitor RMON Alarm Overview Auto refresh El Refresh lt gt gt System Information Start from Control Index 0 with 20 entries per page CPU Load Log Detailed Log z e moren vara pe vawe Si resto ae est Traer Security No more entries Indicates the index of Alarm control entry Indicates the interval in seconds for sampling and comparing the rising and falling threshold Indicates the particular variable to be sampled The method of sampling the selected variable and calculating the value to be compared against the thresholds possible sample types are Rising threshold value Rising event index Falling threshold value Falling event index Buttons Refresh Click to refresh the page immediately Auto refresh Click this box to enable an automatic refresh of the page at regular intervals 235 RMON Event Overview This page provides an overview of RMON event entries The displayed fields are 4ipnet Ea Configuration Monitor RMON Event Overview Auto refresh E Refresh Is lt System Information CPU Load Log Detailed Log ESE Sec No more entries curity Access Management Statistics Network AAA Switch
175. e back from the system by keying in a command After login the switch through console CLI you can see the gt mark You can type the command after it There are some useful command such as Type lt group gt to enter command group e g port to the port configuration Type lt group gt to get list of group commands e g port You can follow the instruction step by step to finish the command Type lt command gt to get help on a command e g port mode 7 Type up to move up one level or to go to root level Type logout in root level to leave the command line interface Click Enter key after finish the command Click Up key to repeat the previous commands Commands may be abbreviated e g por co instead of port configuration For quick configuration the abbreviated typo is helpful Example Configure the System Contact to Orwell You can go to system group or type the full name in root level Both of the methods can meet your need In system group mode System gt contact Orwell In root level gt sys contact Orwell Note This chapter just lists the relevant command lines of the feature settings for your reference You can see the detail explanation of the commands and features through the chapter 4 1 System Configuration Feature Command Line System Information System Group Enter the System Configuration Group to do further configuration gt system Type up
176. e extended to include aspects related to end user devices Example product categories expected to adhere to this class include but are not limited to end user communication appliances such as IP Phones PC based softphones or other communication appliances that directly support the end user Discovery services defined in this class include provision of location identifier including ECS E911 information embedded L2 switch support inventory management LLDP MED Capabilities LLDP MED Capabilities describes the neighbour unit s LLDP MED capabilities The possible capabilities are _ LLDP MED capabilities Network Policy Location Identification Extended Power via MDI PSE Extended Power via MDI PD Inventory No oO fF DN Reserved Application Type Application Type indicating the primary function of the application s defined for this network policy advertised by an Endpoint or Network Connectivity Device The possible application types are shown below 1 Voice for use by dedicated IP Telephony handsets and other similar appliances supporting interactive voice services These devices are typically deployed on a separate VLAN for ease of deployment and enhanced security by isolation from data applications 2 Voice Signaling for use in network topologies that require a different policy for the voice signaling than for the voice media 3 Guest Voice to support a separate limited feature set voice serv
177. e network resources at hand and design a suitable network topology with resiliency capacity and survivability in mind The following are simple graphical illustrations of how the SW1024 can be deployed with the 4ipnet WHG Controllers xDSL Cable Modem Internet VLAN 1 r x e on os e IS for Guests for Employees Graphical Illustration of Layer 2 Topology 25 4ipnet Tunna QS Access Point A WAN gt AO Controller Modem te LAN Wired Traffic DTF jauuny E gt Service Zone Professor 5 4ipnet ess Poimt L2 Switch SD Staff S sso Z 4ipnet Access Point VA 4i x y D ipnet j LS 1 Access Poin 3 j L3 Router Oy D i p N 4 S NSN G Student A i SSID Professor Service Zone SSID Convention Center Service Zone Staff Service Zone Student Graphical Illustration of Layer 3 Topology 4 2 System Information 4 2 1 System Name It is important to determine a mnemonic System Name and also enter System Location for your system This comes in handy for easy future references Configuration path Configuration gt gt System gt gt Information System Information Configuration 26 4 2 2 IP Configuration The SW1024 switch requires an IP address for management and there are a couple options to determine its IP address Configuration path Configuration gt gt System gt gt IP
178. e scale deployment requiring multiple management personnel Configuration path Configuration gt gt Security gt gt Switch gt gt Users There is only one management account under default status Group Permission Settings will allow you to customize the accessible Web Interface pages for a particular management group and in turn create management accounts for that group 4ipnet Configuration System Users Configuration Power Reduction Ports Privilege Level Security admin 15 Switch Users Add New User Privilege Levels Auth Method SSH HTTPS Access Management SNMP RMON Network AAA To add a new Admin Account click Add New User determine the Account Username Password and the corresponding admin Privilege Level 50 gipnet Configuration pis da Add User Power Reduction Ports Security Switch Users Privilege Levels Auth Method SSH HTTPS Access RMON Network AAA There are 15 Privilege Levels for the system Different Privilege Levels on different pages of the management interface can be set for each Admin Account All Admin Accounts can be configured with different read only or read write access gipnet Configuration pr gt S ree y Privilege Level Configuration Power Reduction Ports Security Switch Users Privilege Levels 5 y Aut Mood Debug 15 15 15 15 Hades Diagnostics 5 y 10
179. e there is a risk of an LLDP frame being lost during transmission between neighbours it is recommended to repeat the fast start transmission multiple times to increase the possibility of the neighbours receiving the LLDP frame With Fast start repeat count it is possible to specify the number of times the fast start transmission would be repeated The recommended value is 4 times given that 4 LLDP frames with a 1 second interval will be transmitted when an LLDP frame with new information is received It should be noted that LLDP MED and the LLDP MED Fast Start mechanism is only intended to run on links between LLDP MED Network Connectivity Devices and Endpoint Devices and as such does not apply to links between LAN infrastructure elements including Network Connectivity Devices or other types of links Coordinates Location Latitude Latitude should be normalized to within 0 90 degrees with a maximum of 4 digits It is possible to specify the direction to either North of the equator or south of the equator Longitude Longitude should be normalized to within 0 180 degrees with a maximum of 4 digits It is possible to specify the direction the either East of the prime meridian or West of the prime meridian Altitude Altitude SHOULD be normalized to within 32767 to 32767 with a maximum of 4 digits It is possible to select between two altitude types floors or meters Meters Representing meters of Altitude defined by the vertical datum spe
180. ed No MAC addresses can be learned on the port until it is administratively re opened on the Limit Control configuration Web page MAC Count Current Limit The two columns indicate the number of currently learned MAC addresses forwarding as well as blocked and the maximum number of MAC addresses that can be learned on the port respectively If no user modules are enabled on the port the Current column will show a dash If the Limit Control user module is not enabled on the port the Limit column will show a dash Buttons Refresh Click to refresh the page immediately Auto refresh Click this box to enable an automatic refresh of the page at regular intervals Port Security Port Status This page shows the MAC addresses secured by the Port Security module Port Security is a module with no direct configuration Configuration comes indirectly from other modules the user modules When a user module has enabled port security on a port the port is set up for software based learning In this mode frames from unknown MAC addresses are passed on to the port security module which in turn asks all user modules whether to allow this new MAC address to forward or block it For a MAC address to be set in the forwarding state all enabled user modules must unanimously agree on allowing the MAC address to forward If only one chooses to block it it will be blocked until that user module decides otherwise 206 4ipnet Ea Confi
181. ed Discarding Ports 4 Disabled Discarding Security 5 Disabled Discarding LACP 6 Disabled Discarding Loop Protection 7 Disabled Discarding Spanning Tree 8 Disabled Discarding Bridge Status 9 Disabled Discarding Port Status 10 Disabled Discarding Port Statistics 11 Disabled Discarding MVR 12 Disabled Discarding IPMC 13 Disabled Discarding LLDP 14 Disabled Discarding PoE 15 Disabled Discarding MAC Table 16 Disabled Discarding VLANs 17 Disabled Discarding VeL 18 Disabled Discarding sFlow 19 Disabled Discarding Diagnostics 20 Disabled Discarding Maintenance 21 Disabled Discarding 22 Disabled Discarding 23 Disabled Discarding 24 RootPort Forwarding 2d 19 40 28 25 Disabled Discarding 26 Disabled Discarding The switch port number of the logical STP port The current STP port role of the CIST port The port role can be one of the following values AlternatePort BackupPort RootPort DesignatedPort Disabled The current STP port state of the CIST port The port state can be one of the following values Discarding Learning Forwarding The time since the bridge port was last initialized Buttons Refresh Click to refresh the page immediately Auto refresh Check this box to enable an automatic refresh of the page at regular intervals 21 6 3 STP Port Statistics This page displays the STP port statistics counters of bridge ports in the switch 242 The STP port statistics counters are Jipnet Aa Configuration
182. eeaaececeeeeceesueeeceeaaeesenneeees 139 9 2 1 BASIC CONFIQUIQLION aia aada 139 9 2 2 MLD Snooping VLAN Configuration cccccccccceesssccceesseseessssecsessesecsseeseesssecessssseeeesseseessseeeees 140 9 2 3 IPMC MLD Snooping Port Group Filtering cccccccsceessessssceessesssscessseensscesseessscesseessseesssees 142 TO VELDP PARAMETERS cortada AA E E Vendetta A AA AA SAA 143 10 1 LEDP C nfigurati N a ia lidia 143 10 2 LLDP Media Configuration cccccccccccesccceessssecesssssesscsecesssssecsessessesussecsesssseceesseseeasseceesssseceases 145 TI POE CONFIGURATION ici a ri 152 12 MAC ADDRESS TABLE CONFIGURATION sccececeeeeeeseeeecececeseeueaecececeseesucaecececeseesucaececeeeseeeaaeceeeeeseeeeaaees 154 EN ON 157 13 1 VLAN Membership Configuration ccccccccscsccceesscsccsesceceessssecssssessesssecsessssecsesseseesasseceessssecesaes 157 13 2 VLAN Port Configuration pisinisi aAA EE AE Aaaa eE AARAA rira Ri 159 TA PRIVATE MEANS o iein a iai da cede San e a ae i E o e E E aS 161 14 1 Private VLAN Membership Configuration cccccccccsescccessssseceessscesssscecsessssecsesseseessseceessssecesnes 161 14 2 Port Isolation CONMPIQUIATION cccccccceesccceesssceceessessssscecessssseceessessesuseeceessssecessecseusseceesssseceeaes 162 A E A E E E T A E OE 164 15 1 VCL MAC Based VLAN Configuration cccccccssccessseessecessseesecesseessecessssessecessseessecessssessecesssees 164 45 2 VCES Proto ol b
183. ef mk Software Date 2013 09 13T10 52 58 08 00 Acknowledgments Details The system contact configured in Configuration System Information System Contact The system name configured in Configuration System Information System Name The system location configured in Configuration System Information System Location The MAC Address of this switch The Chip ID of this switch The current GMT system time and date The system time is obtained through the configured NTP Server if any 193 The period of time the device has been operational The software version of this switch The date when the switch software was produced Buttons Auto refresh Check this box to enable an automatic refresh of the page at regular intervals Refresh Click to refresh the page any changes made locally will be undone 21 1 2 CPU Load This page displays the CPU load using an SVG graph The load is measured as averaged over the last 100ms 1sec and 10 seconds intervals The last 120 samples are graphed and the last numbers are displayed as text as well 4ipnet Ea Configuration a Monitor CPU Load Auto refresh Y 1 System A e 100ms 0 1sec 0 10sec 0 all numbers running average fa Ports State Traffic Overview QoS Statistics QCL Status 7 5 Detailed Statistics y Security LACP Loop Protection Spanning Tree MVR IPMC LLDP Poe 50 MAC Table VLANs VCL sFlow Diagnostics Maintenance
184. eflected by the page header The displayed settings are 4ipnet ae ay re QoS Egress Port Tag Remarking Power Reduction Ports Security 1 Classified Aggregation 2 Classified Loop Protection 3 Classified Spanning Tree 4 Classified MVR 5 Classified IPMC 6 Classified LLDP 17 Classified PoE 8 Classified MAC Table 9 Classified VLANs 10 Classified Private VLANs 11 Classified VCL 12 Classified Voice VLAN 13 Classified Qos 14 Classified Port Classification 15 Classified Port Policing 16 Classified Port Scheduler 17 Classified Port Shaping 18 Classified Port Tag Remarking 19 Classified PortDSCP 20 Classified ES ral n P DSCP Classification S QoS Control List 24 Classified Storm Control 25 Classified Mirroring e a UPnP Classified sFlow Monitor Diagnostics Maintenance The logical port for the settings contained in the same row Click on the port number in order to configure tag remarking Shows the tag remarking mode for this port Classified Use classified PCP DEI values Default Use default PCP DEI values Mapped Use mapped versions of QoS class and DP level 177 QoS DSCP 17 6 QoS Port DSCP Configuration This page allows you to configure the basic QoS Port DSCP Configuration settings for all switch ports The settings relate to the currently selected stack unit as reflected by the page header The displayed settings are 4ipnet
185. elect mirror mode Rx only Frames received on this port are mirrored on the mirror port Frames transmitted are not mirrored Tx only Frames transmitted on this port are mirrored on the mirror port Frames received are not mirrored 189 Disabled Neither frames transmitted nor frames received are mirrored Enabled Frames received and frames transmitted are mirrored on the mirror port Note For a given port a frame is only transmitted once It is therefore not possible to mirror Tx frames on the mirror port Because of this mode for the selected mirror port is limited to Disabled or Rx only Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 19 UPnP Configuration Configure UPnP on this page gipnet pt end UPnP Configuration Power Reduction Ports Disabled w Security z Aggregation Loop Protection 100 Spanning Tree MVR IPMC LLDP PoE MAC Table VLANs Private VLANs VCL Voice VLAN Qos Mirroring UPnP sFlow Monitor Diagnostics Maintenance Indicates the UPnP operation mode Possible modes are Enabled Enable UPnP mode operation Disabled Disable UPnP mode operation When the mode is enabled two ACEs are added automatically to trap UPNP related packets to CPU The ACEs are automatically removed when the mode is disabled The TTL value is used by UPnP to send SSDP advertisement messages
186. enabled DSCP is 0 Selected Classify only selected DSCP for which classification is enabled as specified in DSCP Translation window for the specific DSCP All Classify all DSCP Egress Port Egress Rewriting can be one of Disabled No Egress rewrite Enable Rewrite enabled without remapping Remap DP Unaware DSCP from analyzer is remapped and frame is remarked with remapped DSCP value The remapped DSCP value is always taken from the DSCP Translation gt Egress Remap DPO table Remap DP Aware DSCP from analyzer is remapped and frame is remarked with remapped DSCP value Depending on the DP level of the frame the remapped DSCP value is either taken from the DSCP Translation gt Egress Remap DP0 table or from the DSCP Translation gt Egress Remap DP1 table Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 17 7 QoS DSCP based QoS Ingress Classification This page allows you to configure the basic QoS DSCP based QoS Ingress Classification settings for all switches The displayed settings are 179 4ipnet Configuration System DSCP Based QoS Ingress Classification Power Reduction Ports Security lt gt lt gt a ek ck Loop Protection 0 BE oe of Spanning Tree MVR 1 0 ofe IPMC LLDP 2 ok of PoE MAC Table 3 o y ofe VLANs Private VLANs 4 o e VCL Voice VLAN Qos F Port Classification o Port
187. enance 12 Dom Auto y x x 9600 Discard Disabled y 13 Down Auto x x x la 9600 Discard Disabled y 14 Dom Auto Y x x E 9600 Discard Disabled 15 Down Auto E x x ial 9600 Discard y Disabled y This is the port number for this row The current link state is displayed graphically Green indicates the link is up and red that it is down Provides the current link speed of the port Ex 1Gfdx 1G indicates the Gigabit Speed fdx indicates the Full Duplex Mode Select any available link speed for the given switch port Auto Speed selects the highest speed that is compatible with a link partner Disabled disables the switch port operation Configure speed for fiber port Note Port speed for the Copper ports will automatically be set to Auto when dual media is selected Disable SFPs Copper port only SFP Auto automatically determines the speed at the SFP Note There is no standardized way to do SFP auto detect so here it is done by reading the SFP rom Due to the missing standardized way of doing SFP auto detect some SFPs might not be detectable 1000 X force SFP speed to 1000 X 63 100 FX force SFP speed to 100 FX When Auto Speed is selected on a port this section indicates the flow control capability that is advertised to the link partner When a fixed speed setting is selected that is what is used The Current Rx column indicates wh
188. entication Security Switch SSH Secure Shell Security Switch HTTPS Hypertext Transfer Protocol over Secure Socket Layer Security Switch Access Access management Security Switch SNMP Simple Network Management Protocol Security Switch RMON Remote Network Monitoring User Configuration Security Switch gt user Available Commands Security Switch Users Configuration Security Switch Users Add lt user_name gt lt password gt lt privilege_level gt Security Switch Users Delete lt user_name gt Add New User Syntax Security Switch Users Add lt user_name gt lt password gt lt privilege_level gt Example Add New User Name Password with highest privilege Name Orwell Password possword Privilege 15 Security Switch gt users add Orwell password 15 Delete the User Syntax Security Switch Users Delete lt user_name gt Example Delete the User Orwell from User Name database Security Switch gt users del Orwell User Name Database Security Switch gt users conf Users Configuration User Name Privilege Level admin 15 Orwell 15 Privilege Level Syntax 289 Security Switch Privilege Level Group lt group_name gt lt cro gt lt crw gt lt sro gt lt srw gt cro Configuration Read Only crw Configuration Excute Read Write sro Status Statistics Read Only srw Status Statistics Read Write Example Set Privilege level of VLAN Group Security Switch
189. ently displayed table as a basis for the next lookup When the end is reached the text No more entries is shown in the displayed table Use the button to start over 223 IP Source Guard Table Columns Switch Port Number for which the entries are displayed VLAN ID in which the IP traffic is permitted User IP address of the entry Source MAC address Buttons Auto refresh Click this box to enable an automatic refresh of the page at regular intervals Refresh Click to refresh the page immediately Clear Flushes all dynamic entries lt lt Updates the table starting from the first entry in the Dynamic IP Source Guard Tables gt gt Updates the table starting with the entry after the last entry currently displayed 21 3 3 Security AAA This page provides an overview of the status of the RADIUS servers configurable on the Authentication configuration page Jipnet Ea Configuratio nee a RADIUS Authentication Server Status Overview Auto refresh Refresh System Information CPU Load 1 0 0 0 0 1812 Disabled Log 2 0 0 0 0 1812 Disabled Detailed Log 3 0 0 0 0 1812 Disabled Ports 4 0 0 0 0 1812 Disabled Security 5 0 0 0 0 1812 Disabled Access Management Statistics RADIUS Accounting Server Status Overview Network AAA RADIUS Overview 4 0 0 0 0 1813 Disabled SS 2 0 0 0 0 1813 Disabled a 3 0 0 0 0 1813 Disabled LACP A 4 0 0 0 0 1813 Disabled Seep Seed 5 0 0 0 0 1813 Disabled
190. entry s view type is excluded there should be another view entry existing with view type as included and it s OID sub tree should overstep the excluded view entry The OID defining the root of the sub tree to add to the named view The allowed OID length is 1 to 128 The allowed string content is digital number or asterisk Buttons Add new view Click to add a new view entry 79 Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values SNMPv3 Access Configuration Configure SNMPv3 access table on this page The entry index keys are Group Name Security Model and Security Level 4ipnet Configuration 2 yen 7 SNMPV3 Access Configuration Power Reduction Ports i Security default_ro_group any NoAuth NoPriv default_view i None i Users default_rw_group any NoAuth NoPriv default_view z default_view z Privilege Levels Amono Add New Enty Save Reset HTTPS Access Management SNMP System Communities Users Groups Views Access RMON Network Limit Control NAS ACL DHCP IP Source Guar ARP Inspection Check to delete the entry It will be deleted during the next save A string identifying the group name that this entry should belong to The allowed string length is 1 to 32 and the allowed content is ASCII characters from 33 to 126 Indicates the security model that this entry should
191. ers Power Reduction Ports Security Aggregation 1 disabled disabled disabled disabled disabled disabled disabled disabled disabled Loop Protection 2 disabled disabled disabled disabled disabled disabled disabled disabled disabled Spanning Tree 3 disabled disabled disabled disabled disabled disabled disabled disabled disabled MVR 4 disabled disabled disabled disabled disabled disabled disabled disabled disabled IPMC 5 disabled disabled disabled disabled disabled disabled disabled disabled disabled LLDP 6 disabled disabled disabled disabled disabled disabled disabled disabled disabled PoE 7 disabled disabled disabled disabled disabled disabled disabled disabled disabled MAC Table 8 disabled disabled disabled disabled disabled disabled disabled disabled disabled VLANs 9 disabled disabled disabled disabled disabled disabled disabled disabled disabled Private VLANs 10 disabled disabled disabled disabled disabled disabled disabled disabled disabled VCL 11 disabled disabled disabled disabled disabled disabled disabled disabled disabled Voice VLAN 12 disabled disabled disabled disabled disabled disabled disabled disabled disabled Qos 13 disabled disabled disabled disabled disabled disabled disabled disabled disabled Port Classification 14 disabled disabled disabled disabled disabled disabled disabled disabled disabled Port Policing 15 disabled disabled disabled disabled disabled disabled disabled disabled disabled Port Scheduler 16 disabled disabled disabled disable
192. ers on a given port A user is identified by a MAC address and VLAN ID If Limit Control is enabled on a port the limit specifies the maximum number of users on the port If this number is exceeded an action is taken The action can be one of the four different actions as described below The Limit Control module utilizes a lower layer module Port Security module which manages MAC addresses learnt on the port The Limit Control configuration consists of two sections a system and a port wide System Configuration Mode Indicates if Limit Control is globally enabled or disabled on the switch If globally disabled other modules may still use the underlying functionality but limit checks and corresponding actions are disabled 87 If checked secured MAC addresses are subject to aging as discussed under Aging Period If Aging Period is checked then the aging period is controlled with this input If other modules are using the underlying port security for securing MAC addresses they may have other requirements to the aging period The underlying port security will use the shorter requested aging period of all modules that use the functionality The Aging Period can be set to a number between 10 and 10 000 000 seconds To understand why aging may be desired consider the following scenario Suppose an end host is connected to a 3rd party switch or hub which in turn is connected to a port on this switch on which Limit Control is enabled
193. eset Click to undo any changes made locally and revert to previously saved values Translate dynamic to static Click to translate all dynamic entries to static entries Static IP Source Guard Table Check to delete the entry It will be deleted during the next save The logical port for the settings The VLAN ID for the settings Allowed Source IP address used MAC address Allowed Source MAC address Click to add a new entry to the Static IP Source Guard table Specify the Port VLAN ID IP address and IP Mask for the new entry Click Save Buttons Save Click to save changes 112 Reset Click to undo any changes made locally and revert to previously saved values gipnet Confi i a pene leony m Static IP Source Guard Table Power Reduction Ports Delete Port VLAN ID IP Address MAC address Security Switch Users Privilege Levels Auth Method SSH HTTPS Access Management SNMP RMON Network a Limit Control NAS ACL DHCP IP Source Guar Configuratior Static Table ARP Inspection AAA 4 2 6 ARP Inspection ARP Inspection 113 This page provides ARP Inspection related configuration gipnet a Configuration System Power Reduction Ports Users Privilege Levels Auth Method SSH HTTPS Access Management SNMP RMON Network Limit Control IP Source Guar Configuratior Static Table ARP Inspection Configuratior Static Table AAA Static ARP Inspection Table gipnet C
194. esh the page any changes made locally will be undone 21 2 2 Traffic Overview This page provides an overview of general traffic statistics for all switch ports The displayed counters are 197 4ipnet ca Configuration Monitor Port Statistics Overview Auto refresh C Refresh Clear Information CPU Load Log 1 0 0 0 0 0 0 0 0 0 Detailed Log 2 0 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 0 0 0 AO 4 0 0 0 0 0 o 0 0 o 5 0 0 0 0 0 0 0 0 0 oes Sa 6 o 0 0 0 0 o 0 o 0 ean 1 0 0 0 0 0 0 0 0 0 security A 0 0 0 0 0 o 0 o 0 3 0 0 0 0 0 0 0 0 0 10 840 755 97788 o o 0 o 367 ed 1 3 917 50091 87534 4 0 0 0 4 eat 2 o 0 0 o 0 o 0 o 0 ete E 0 0 0 0 0 0 0 0 0 LLDP 14 0 11 0 14289 0 o 0 0 0 a 15 0 0 0 0 0 0 0 0 0 16 o 0 o 0 0 o 0 o 0 ES 17 0 0 0 0 0 0 0 0 0 8 0 0 o 0 o 0 0 0 0 Mee 19 0 o 0 0 0 0 0 0 0 eats 20 o 0 o 0 0 o 0 o 0 21 0 0 0 0 0 0 0 0 0 menange 22 0 0 o 0 0 o 0 o 0 2 0 0 0 0 0 0 0 0 0 24 3325206 18767 274062704 4178893 14 o 230 0O 1322104 25 0 0 0 0 0 0 0 0 26 0 o o 0 o o 0 o 0 The logical port for the settings contained in the same row The number of received and transmitted packets per port The number of received and transmitted bytes per port The number of frames received in error and the number of incomplete transmissions per port The number of frames discarded due to ingress or egress congestion The number of received frames filtered by the forwarding proces
195. est priority queue The number of received and transmitted packets per queue Buttons Refresh Click to refresh the page immediately Clear Clears the counters for all ports Auto refresh Check this box to enable an automatic refresh of the page at regular intervals 21 2 4 QCL Status This page shows the QCL status by different QCL users Each row describes the QCE that is defined It is a conflict if a specific QCE is not applied to the hardware due to hardware limitations The maximum number of QCEs is 256 on each switch 199 Jipnet Ea Configuration Monitor QoS Control List Status Combined 2 Auto oresh EI ResoveGonfict Rafesh System Information CPU Load Log No entries Detailed Log Ports State Traffic Overview QoS Statistics QCL Status Detailed Statistics Security LACP Loop Protection Spanning Tree MVR PMC MAC Table VCL sFlow Maintenance Indicates the QCL user Indicates the index of QCE Indicates the type of frame to look for incoming frames Possible frame types are Any The QCE will match all frame type Ethernet Only Ethernet frames with Ether Type 0x600 0xF FFF are allowed LLC Only LLC frames are allowed NAP Only SNAP frames are allowed IPv4 The QCE will match only IPV4 frames IPv6 The QCE will match only IPV6 frames Indicates the list of ports configured with the QCE Indicates the classification action take
196. ether pause frames on the port are obeyed and the Current Tx column indicates whether pause frames on the port are transmitted The Rx and Tx settings are determined by the result of the last Auto Negotiation Check the configured column to use flow control This setting is related to the setting for Configured Link Speed Enter the maximum frame size allowed for the switch port including FCS The switch supports up to 9K Jumbo Frame Configure port transmit collision behavior Discard Discard frame after 16 collisions default Restart Restart back off algorithm after 16 collisions The Usage column shows the current percentage of the power consumption per port The Configured column allows for changing the power savings mode parameters per port Disabled All power savings mechanisms disabled ActiPHY Link down power savings enabled PerfectReach Link up power savings enabled Enabled Both link up and link down power savings enabled Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values Refresh Click to refresh the page Any changes made locally will be undone 64 4 Security Configuration The Security Configuration feature includes 3 sub titles Switch Network and AAA 4 1 Security Switch The switch settings includes User Database Privilege Levels Authentication Method SSH HTTPS Access Management SNMP and RMON setting Following are the t
197. eviously saved values 188 18 Mirroring Configuration Configure port Mirroring on this page To debug network problems selected traffic can be copied or mirrored on a mirror port where a frame analyzer can be attached to analyze the frame flow The traffic to be copied on the mirror port is selected as follows All frames received on a given port also known as ingress or source mirroring All frames transmitted on a given port also known as egress or destination mirroring Port to mirror on Port to mirror also known as the mirror port Frames from ports that have either source rx or destination tx mirroring enabled are mirrored on this port Disabled disables mirroring Mirror Port Configuration The following table is used for Rx and Tx enabling 4ipnet Configuration System Mirror Configuration Power Reduction Ports Port to mirror to Disabled v Security Aggregation Mirror Port Configuration Loop Protection Spanning Tree Bor Mode MVR IPMC LLDP 1 Disabled x PoE MAC Table Ea Disabled VLANs 3 Disabled Private VLANs VCL 4 Disabled w Voice VLAN 5 Disabled x Ses 6 Disabled Mirroring UPnP 7 Disabled sFlow Monitor 8 Disabled Diagnostics 9 Disabled v Maintenance 10 Disabled Port The logical port for the settings contained in the same row Mode S
198. f the RADIUS server configuration has changed It does not involve communication between the switch and the client and therefore doesn t imply that a client is still present on a port see Aging Period below 90 Re authentication Period Determines the period in seconds after which a connected client must be re authenticated This is only active if the Re authentication Enabled checkbox is checked Valid values are in the range 1 to 3600 seconds EAPOL Timeout Determines the time for retransmission of Request Identity EAPOL frames Valid values are in the range 1 to 65535 seconds This has no effect for MAC based ports Aging Period This setting applies to the following modes e modes using the Port Security functionality to secure MAC addresses e Single 802 1X e Multi 802 1X MAC Based Auth When the NAS module uses the Port Security module to secure MAC addresses the Port Security module needs to check for activity on the MAC address in question at regular intervals and free resources if no activity is seen within a given period of time This parameter controls exactly this period and can be set to a number between 10 and 1000000 seconds If re authentication is enabled and the port is in an 802 1 X based mode this is not so critical since supplicants that are no longer attached to the port will get removed upon the next re authentication which will fail But if re authentication is not enabled the only way to free re
199. fe80 215 c5ff fe03 4dc7 The symbol is a special syntax that can be used as a shorthand way of representing multiple 16 bit groups of contiguous zeros but it can only appear once It can also represent a legally valid IPv4 address For example 192 1 2 34 Indicates that the SNMP entity is permitted to generate authentication failure traps Possible modes are Enable SNMP trap authentication failure Disabled Disable SNMP trap authentication failure Indicates the SNMP trap link up and link down mode operation Possible modes are Enable Enable SNMP trap link up and link down mode operation Disabled Disable SNMP trap link up and link down mode operation Indicates the SNMP trap inform mode operation Possible modes are Enable Enable SNMP trap inform mode operation Disabled Disable SNMP trap inform mode operation Indicates the SNMP trap inform timeout The allowed range is 0 to 2147 Indicates the SNMP trap inform retry times The allowed range is 0 to 255 Indicates the SNMP trap probe security engine ID mode of operation Possible values are Enable Enable SNMP trap probe security engine ID mode of operation Disabled Disable SNMP trap probe security engine ID mode of operation Indicates the SNMP trap security engine ID SNMPv3 sends traps and informs using USM for authentication and privacy A unique engine ID for these traps and informs is needed When Trap Probe Security Engine ID is enabled the ID will be probe
200. frames Extra fields for defining TCP parameters will appear These fields are explained later in this help file When Specific is selected for the IP protocol value you can enter a specific value The allowed range is 0 to 255 A frame that hits this ACE matches this IP protocol value Specify the Time to Live settings for this ACE zero IPv4 frames with a Time to Live field greater than zero must not be able to match this entry non zero Pv4 frames with a Time to Live field greater than zero must be able to match this entry Any Any value is allowed don t care Specify the fragment offset settings for this ACE This involves the settings for the More Fragments MF bit and the Fragment Offset FRAG OFFSET field for an IPv4 frame No IPv4 frames where the MF bit is set or the FRAG OFFSET field is greater than zero must not be able to match this entry 105 Yes Pv4 frames where the MF bit is set or the FRAG OFFSET field is greater than zero must be able to match this entry Any Any value is allowed don t care Specify the options flag setting for this ACE No IPv4 frames where the options flag is set must not be able to match this entry Yes Pv4 frames where the options flag is set must be able to match this entry Any Any value is allowed don t care Specify the source IP filter for this ACE Any No source IP filter is specified Source IP filter is don t care Host Source IP filter is set to Host Spe
201. g and the RADIUS module is ready to accept accounting attempts Dead X seconds left Accounting attempts were made to this server but it did not reply within the configured timeout The server has temporarily been disabled but will get re enabled when the dead time expires The number of seconds left before this occurs is displayed in parentheses This state is only reachable when more than one server is enabled Buttons Auto refresh Click this box to enable an automatic refresh of the page at regular intervals Refresh Click to refresh the page immediately 225 RADIUS Authentication Statistics This page provides detailed statistics for a particular RADIUS server gipnet Configuration Monitor System Information CPU Load Log Detailed Log Ports Security Access Management Statistics Network AAA RADIUS Overview RADIUS Details Switch LACP Loop Protection Spanning Tree MVR IPMC LLDP PoE MAC Table VLANs VCL sFlow Diagnostics Maintenance Server 1 y Auto refresh RADIUS Authentication Statistics for Server 1 Receive Packets Transmit Packets Access Accepts Access Requests Access Rejects Access Challenges Malformed Access Responses Bad Authenticators Unknown Types Packets Dropped 0 0 Access Retransmissions 0 Pending Requests 0 Timeouts 0 0 0 econo IP Address State Round Trip Time 0 0 0 0 1812 Disabled 0 ms RADIUS Accounting Statistics for Server 1
202. g 42 Status Groups 13 Information 14 IPv6 SFM 15 Information 16 LLDP 17 POE 18 MAC Table VLANs ke VCL 2 sFlow 21 Diagnostics 22 Maintenance 23 250 Ea The VLAN ID of the entry Working Querier Version currently Working Host Version currently Show the Querier status is ACTIVE or IDLE DISABLE denotes the specific interface is administratively disabled The number of Transmitted Queries The number of Received Queries The number of Received V1 Reports The number of Received V2 Reports The number of Received V1 Leaves Display which ports act as router ports A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or IGMP querier Static denotes the specific port is configured to be a router port Dynamic denotes the specific port is learnt to be a router port Both denotes the specific port is configured and learnt to be a router port Buttons Refresh Click to refresh the page immediately Clear Clears all Statistics counters Auto refresh Check this box to enable an automatic refresh of the page at regular intervals 251 MLD Group Table Entries in the MLD Group Table are shown on this page The MLD Group Table is sorted first by VLAN 1D and then by group 4ipnet Configuration 2 A MIO MLD Snooping Group Information System Information Start from VLAN 1 and group address ff00 CPU Load Log Detailed Log Port Members
203. gally valid IPv4 address For example 192 1 2 34 Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values Renew Click to renew IPv6 AUTOCONF This button is only available if IPv6 AUTOCONF is enabled 1 4 NTP Configuration NTP is short of Network Time Protocol Network Time Protocol NTP is used to synchronize time clocks on the internet You can configure NTP Servers IP address here to synchronize the clocks of the remote time server on the network This page indicates the NTP mode operation 58 gipnet Configuration System NTP Configuration Information IP IPv6 NTP Time Log Power Reduction Ports Security Aggregation Loop Protection Spanning Tree WR 3 Save Reset IPMC LLDP PoE MAC Table VLANs Private VLANs VCL Voice VLAN Qos Mirroring UPnP sFlow Monitor Diagnostics Maintenance Disabled y Mode The Possible modes are Enable NTP mode operation When NTP mode operation is enabled the agent forwards NTP messages between the clients and the server when they are not on the same subnet domain Disable NTP mode operation Server Provide the NTP IPv4 or IPv6 address of this switch IPv6 address is in 128 bit records represented as eight fields of up to four hexadecimal digits with a colon separating each field For example fe80 215 c5ff fe03 4dc7 The symbol is a special syntax th
204. ge 5 90 non condensing Mechanical Dimension H W D 45mm x 220mm x 40mm Weight 3 0kg Regular Compliance CE FCC Part 15 Class A Yes 12 Software Specification Standard IEEE 802 3 10Base T IEEE 802 3u 100Base TX IEEE 802 3ab 1000Base T IEEE 802 3z 1000Base SX LX IEEE 802 3x Flow Control IEEE 802 1Q VLAN IEEE 802 1p Class of Service IEEE 802 1D Spanning Tree IEEE 802 1w Rapid Spanning Tree IEEE 802 1s Multiple Spanning Tree IEEE 802 3ad Link Aggregation Control Protocol LACP IEEE802 1v Protocol VLAN IEEE 802 1AB LLDP Link Layer Discovery Protocol IEEE 802 1X Access Control IEEE 802 3at Power over Ethernet IEEE 802 3af Power over Ethernet Port Configuration Link Status Speed Duplex automatic negotiation flow control Rate control limit VLAN Port based and 802 1Q tag based VLAN Maximum 4K VLAN Groups 4096 VLANs 802 1Q in Q Private MAC Based IP Subnet Voice 802 1v Protocol VLAN Multicast VLAN Registration MVR QoS 4 physical priority queues Scheduling WRR Strict WRR SP Class of Service Port based 802 1p DSCP TCP UDP Port based Storm control over broadcast multicast and or unicast traffic Link Aggregation Max 13 groups LAG up to 16 ports group Hashing Algorithms destination and or sour
205. guration Repl Port Security Port Status Port 1 Por 1 E Autorefesh ES Refiesh System Information CPU Load No MAC addresses attached Log Detailed Log Ports Security Access Management Statistics NAS ACL Status DHCP ARP Inspection IP Source Guard Switch LACP Loop Protection Spanning Tree MVR IPMC LLDP sFlow Diagnostics Maintenance The MAC address and VLAN ID that is seen on this port If no MAC addresses are learned a single row stating No MAC addresses attached is displayed Indicates whether the corresponding MAC address is blocked or forwarding In the blocked state it will not be allowed to transmit or receive traffic Shows the date and time when this MAC address was first seen on the port If at least one user module has decided to block this MAC address it will stay in the blocked state until the hold time measured in seconds expires If all user modules have decided to allow this MAC address to forward and aging is enabled the Port Security module will periodically check that this MAC address still forwards traffic If the age period measured in seconds expires and no frames have been seen the MAC address will be removed from the MAC table Otherwise a new age period will begin If aging is disabled or a user module has decided to hold the MAC address indefinitely a dash will be shown Buttons Refresh Click to refresh the page immediately Auto refresh Cl
206. he highest port number is shut down 152 2 Reserved Power In this mode the ports are shut down when total reserved powered exceeds the amount of power that the power supply can deliver In this mode the port power is not turned on if the PD requests more power than available from the power supply PoE Power Supply Configuration The valid range of power supply for the SW1024 is from 0 to 500W PoE Port Configuration This is the logical port number for this row Ports that are not PoE capable are grayed out and thus impossible to configure PoE for The PoE Mode represents the PoE operating mode for the port Disabled PoE disabled for the port PoE Enables PoE IEEE 802 3af Class 4 PDs limited to 15 4W PoE Enables PoE IEEE 802 3at Class 4 PDs limited to 30W The Priority represents the ports priority There are three levels of power priority named Low High and Critical The priority is used in the case where the remote devices requires more power than the power supply can deliver In this case the port with the lowest priority will be turn off starting from the port with the highest port number The Maximum Power value contains a numerical value that indicates the maximum power in watts that can be delivered to a remote device The maximum allowed value is 30 W Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 153 12 MAC Address Table C
207. he number of Received V2 Leaves Display which ports act as router ports A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or IGMP querier Static denotes the specific port is configured to be a router port Dynamic denotes the specific port is learnt to be a router port Both denotes the specific port is configured and learnt to be a router port Buttons Refresh Click to refresh the page immediately Clear Clears all Statistics counters Auto refresh Check this box to enable an automatic refresh of the page at regular intervals IGMP Group Information Entries in the IGMP Group Table are shown on this page The IGMP Group Table is sorted first by VLAN ID and then by group 247 Jipnet Ea Configuration e Monitor IGMP Snooping Group Information Auto refresh El System Information Start from VLAN 1 and group address 224 0 0 0 with 20 entries per page CPU Load Log Ports Security No more entres LACP Loop Protection Spanning Tree Bridge Status Port Status Port Statistics R IPMC IGMP Snooping Status Groups Information IPv4 SFM Information MLD Snooping LLDP PoE MAC Table VLANS VCL sFlow Diagnostics Maintenance Navigating the IGMP Group Table Each page shows up to 99 entries from the IGMP Group table default being 20 selected through the entries per page input field When first visited the web page will show the first 20 entries from th
208. he page at regular intervals Refresh Click to refresh the page immediately Clear Clears the counters for the selected server The Pending Requests counter will not be cleared by this operations 21 3 4 Switch SNMP RMON RMON Statistics Overview This page provides an overview of RMON statistics entries 230 la gipnet na RMON Statistics Status Overview Autosetesh El Basta sissa leas Information Start from Control Index 0 with 20 entries per page CPU Load Log Detailed Log Ports Security Access Management No more entries Statistics The displayed counters are The port ID which wants to be monitored The total number of events in which packets were dropped by the probe due to lack of resources The total number of octets of data including those in bad packets received on the network The total number of packets including bad packets broadcast packets and multicast packets received The total number of good packets received that were directed to the broadcast address The total number of good packets received that were directed to a multicast address The total number of packets received that had a length excluding framing bits but including FCS octets of between 64 and 1518 octets The total number of packets received that were less than 64 octets 231 The total number of packets received that were longer than 1518 octets
209. hen Loop Protection is enabled The interval between each PDU can be configured 1 10 seconds Shutdown Time The time period for which the port will be shut down in case a loop is detected Valid shutdown time values are from 0 to 604800 seconds where 0 will disable the port until system restarts 38 Port Configuration Y 1 Y Shutdown Port and Log Y Enable vY 2 Y Shutdown Port and Log Y Enable Y 3 Y Shutdown Port and Log Y Enable Y 4 Y Shutdown Port and Log Y Enable 5 Y Shutdown Port and Log Enable vY 6 w Shutdown Port and Log Y Enable Y 7 4 Shutdown Port and Log Enable 8 e Shutdown Port and Log Enable Y 9 Y Shutdown Port and Log Enable vY 10 4 Shutdown Port and Log Enable 11 Y Shutdown Port and Log Enable 12 Y Shutdown Port and Log Y Enable v 13 Y Shutdown Port and Log Enable vY 14 e Shutdown Port and Log Y Enable Y 15 Y Shutdown Port and Inna v Fnahle v We are able to determine if the loop protection mechanism is to be applied for each port and also the corresponding action when loop is detected The administrator can also determine if each port is to generate loop protection PDUs or just passively listen for these PDUs We may check the status for Loop Protection in Monitor gt gt Loop Protection 39 Loop Protection Status Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown Log Enabled Shutdown
210. hou Japan Neighbourhood block Street Example Poppelvej Leading street direction Example N Trailing street suffix Example SW 147 Street suffix Example Ave Platz House number Example 21 House number suffix Example A 1 2 Landmark or vanity address Example Columbia University Additional location info Example South Wing Name residence and office occupant Example Flemming Jahn Postal zip code Example 2791 Building structure Example Low Library Unit Apartment suite Example Apt 42 Floor Example 4 Room number Example 450F Place type Example Office Postal community name Example Leonia Post office box P O Box Example 12345 148 Additional code Example 1320300003 Emergency Call Service Emergency Call Service e g E911 and others such as defined by TIA or NENA Emergency Call Service Emergency Call Service ELIN identifier data format is defined to carry the ELIN identifier as used during emergency call setup to a traditional CAMA or ISDN trunk based PSAP This format consists of a numerical digit string corresponding to the ELIN to be used for emergency calling Policies Network Policy Discovery enables the efficient discovery and diagnosis of mismatch issues with the VLAN configuration along with the associated Layer 2 and Layer 3 attributes which apply for a set of specific protocol appl
211. ications on that port Improper network policy configurations are a very significant issue in VolP environments that frequently result in voice quality degradation or loss of service Policies are only intended for use with applications that have specific real time network policy requirements such as interactive voice and or video services The network policy attributes advertised are 1 Layer 2 VLAN ID IEEE 802 1Q 2003 2 Layer 2 priority value IEEE 802 1D 2004 3 Layer 3 Diffserv code point DSCP value IETF RFC 2474 This network policy is potentially advertised and associated with multiple sets of application types supported on a given port The application types specifically addressed are This network policy is potentially advertised and associated with multiple sets of application types supported on a given port The application types specifically addressed are Voice Guest Voice Soft phone Voice Video Conferencing Streaming Video Control Signaling Conditionally support a separate network policy for the media types above DIAONA A large network may support multiple VolP policies across the entire organization and different policies per application type LLDP MED allows multiple policies to be advertised per port each corresponding to a different application type Different ports on the same Network Connectivity Device may advertise different sets of policies based on the authenticated user identity
212. ice for guest users and visitors with their own IP Telephony handsets and other similar appliances supporting interactive voice services 4 Guest Voice Signaling for use in network topologies that require a different policy for the guest voice signaling than for the guest voice media 258 5 Softphone Voice for use by softphone applications on typical data centric devices such as PCs or laptops 6 Video Conferencing for use by dedicated Video Conferencing equipment and other similar appliances supporting real time interactive video audio services 7 Streaming Video for use by broadcast or multicast based video content distribution and other similar applications supporting streaming video services that require specific network policy treatment Video applications relying on TCP with buffering would not be an intended use of this application type 8 Video Signaling for use in network topologies that require a separate policy for the video signaling than for the video media Policy indicates that an Endpoint Device wants to explicitly advertise that the policy is required by the device Can be either Defined or Unknown Unknown The network policy for the specified application type is currently unknown Defined The network policy is defined TAG is indicative of whether the specified application type is using a tagged or an untagged VLAN Can be Tagged or Untagged Untagged The device is using an untagged fr
213. ick this box to enable an automatic refresh of the page at regular intervals 207 Security Network NAS This page provides an overview of the current NAS port states 4ipnet Configuration iii Network Access Server Switch Status Auto refresh Refresh System Information CPU Load 1 Force Authorized Globally Disabled Log 2 Force Authorized Globally Disabled Detailed Log 3 Force Authorized Globally Disabled Ports 4 Force Authorized Globally Disabled Security Force Authorized Globally Disabled Access Management amp Force Authorized Globally Disabled Statistics 7 Force Authorized Globally Disabled Network 8 Force Authorized Globally Disabled Port Security 9 Force Authorized Globally Disabled a 10 Force Authorized Globally Disabled Port 41 Force Authorized Globally Disabled ACL Status 12 Force Authorized Globally Disabled DHCP 13 Force Authorized Globally Disabled ARP Inspection 14 Force Authorized Globally Disabled IP Source Guard 15 Force Authorized Globally Disabled AAA 16 Force Authorized Globally Disabled Switch 17 Force Authorized Globally Disabled LACP 18 Force Authorized Globally Disabled Loop Protection 19 Force Authorized Globally Disabled Spanning Tree 20 Force Authorized Globally Disabled 21 Force Authorized Globally Disabled IPMC 22 Force Authorized Globally Disabled LLDP 23 Force Authorized Globally Disabled PoE 24 Force Authorized Globally Disabled MAC Table 25 Force Authorized Globally D
214. ignments use the Monitor gt VLANs gt VLAN Membership and VLAN Port pages These pages show which modules have temporarily overridden the current Port VLAN configuration Guest VLAN Operation When a Guest VLAN enabled port s link comes up the switch starts transmitting EAPOL Request Identity frames If the number of transmissions of such frames exceeds Max Reauth Count and no EAPOL frames have been received in the meanwhile the switch considers entering the Guest VLAN The interval between transmission of EAPOL Request Identity frames is configured with EAPOL Timeout If Allow guest VLAN if EAPOL Seen is enabled the port will now be placed in the Guest VLAN If disabled the switch will first check its history to see if an EAPOL frame has previously been received on the port this history is cleared if the port link goes down or the port s Admin State is changed and if not the port will be placed in the Guest VLAN Otherwise it will not move to the Guest VLAN but continue transmitting EAPOL Request Identity frames at the rate given by EAPOL Timeout Once in the Guest VLAN the port is considered authenticated and all attached clients on the port are allowed access on this VLAN The switch will not transmit an EAPOL Success frame when entering the Guest VLAN While in the Guest VLAN the switch monitors the link for EAPOL frames and if one such frame is received the switch immediately takes the port out of the Guest VLAN and start
215. imit Control NAS ACL DHCP IP Source Guar ARP Inspection SNMP System Configuration Enabled SNMP v2c public private 800007e5017f000001 SNMP Trap Configuration Disabled SNMP v1 public Enabled Enabled AAA Enabled Aggregation 1 Loop Protection Spanning Tree 5 MVR IPMC LLDP Reset PoE 72 Indicates the SNMP mode operation Possible modes are Enable Enable SNMP mode operation Disabled Disable SNMP mode operation Indicates the SNMP supported version Possible versions are SNMPv1 Set SNMP supported version 1 SNMPv2c Set SNMP supported version 2c SNMPv3 Set SNMP supported version 3 Indicates the community read access string to permit access to SNMP agent The allowed string length is 0 to 255 and the allowed content is the ASCII characters from 33 to 126 The field is applicable only when SNMP version is SNMPv1 or SNMPv2c If SNMP version is SNMPv3 the community string will be associated with SNMPv3 communities table It provides more flexibility to configure security name than a SNMPv1 or SNMPv2c community string In addition to community string a particular range of source addresses can be used to restrict source subnet Indicates the community write access string to permit access to SNMP agent The allowed string length is 0 to 255 and the allowed content is the ASCII charac
216. ings The serial settings of the switch are as below Baud Rate 115200 Parity None Data Bit 8 Stop Bit 1 When connected a Login prompt will appear Login to the switch The default username is admin password admin 115200 peter E File Edit View Call Transfer Help DS slaaf IPHC MLD IGHP Snooping sFlow sFlow Agent YCL VLAN Control List Debug Switch debug facilities Type lt group gt to enter command group e g port Type lt group gt to get list of group commands e g port Type lt command gt to get help on a command e g port mode Commands may be abbreviated e g por co instead of port configuration gt logout gt Username Password Login in progress Invalid username or password Username admin Password Login in progress Welcome to Command Line Interface v1 0 Type help or to get help There are 19 error entries in the syslog Type debug syslog show to display th em gt Connected 00 00 19 Auto detect 115200 8 N 1 Figure 3 1 Hyper Terminal Console Screen 19 NOTE 1 Microsoft Win 7 or later OS versions do not provide Console Terminal tools Please download the tool Hyper Terminal from Microsoft web site or other terminal tools such as PuTTY for console connection 8 PUTTY Configuration megan Basic options for your PUTTY session Logging Specify
217. installed and used in accordance with the instructions However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help CE Mark Warning This is a Class A product In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures Table of Contents CHAPTER 2 PRODUCT OVERVIEW sscsecsccsscceccincsccccscdicsccdsescicdsstcessdesssdeccueeccscccesasvaestedecscassuscetesdstectesesees 10 1 1 MAJOR MANAGEMENT FEATURES sscecececcessseececececeessseccecececeenseececeseaeensseeceeeseaueesscecesseeaueneseecesecsagageneess 10 1 2 PRODUCT SPECIFICATION 8 222628 Ce REA ROAR As AR CAS eas ME ER A RE 12 1 3 PACKAGE CONTENTS ss vive ceive scevavidevncsev vs seuveuien dhs Sue s e caca diia 15 CHAPTER 2 HARDWARE 25 cescesssececscodesccievacdeossscndeccscicescccdectetesonSectesseoveseseosoecesdeseeseces specasesvadeavsscvsads 16 CHAPT
218. isabled VLANS 26 Force Authorized Globally Disabled VCL sFlow Diagnostics Maintenance The switch port number Click to navigate to detailed NAS statistics for this port The port s current administrative state Refer to NAS Admin State for a description of possible values The current state of the port Refer to NAS Port State for a description of the individual states The source MAC address carried in the most recently received EAPOL frame for EAPOL based authentication and the most recently received frame from a new client for MAC based authentication The user name supplicant identity carried in the most recently received Response Identity EAPOL frame for EAPOL based authentication and the source MAC address from the most recently received frame from a new client for MAC based authentication QoS Class assigned to the port by the RADIUS server if enabled The VLAN ID that NAS has put the port in The field is blank if the Port VLAN ID is not overridden by NAS If the VLAN ID is assigned by the RADIUS server RADIUS assigned is appended to the VLAN ID 208 Read more about RADIUS assigned VLANs here If the port is moved to the Guest VLAN Guest is appended to the VLAN ID Read more about Guest VLANs here Buttons Refresh Click to refresh the page immediately Auto refresh Click this box to enable an automatic refresh of the page at regular intervals Port State The port s current administrative stat
219. it easily into your rack The 4ipnet SW1024 comes packed with powerful Layer 2 software supporting Web Management SNMP IPv4 v6 IEEE 802 1Q VLAN Private VLAN Protocol VLAN Voice VLAN up to 4 priority queue QoS up to 13 Link Aggregation groups Multiple Spanning Tree Protocol IGMPv4 v6 IP Multicast Forwarding and Filtering MVR Bandwidth control Loop Protection LLDP PoE Configuration and abundant security features such as IEEE 802 1X AAA IP Source Guard Port Security and Access Management With these advanced L2 management features the switch works in perfect complement with the 4ipnet Gateway and is ideal for medium or large network environments 1 1 Major Management Features 24 10 100 1000Base Ru 45 plus 2 1000Base SFP 24 10 100 1000Base RJ 45 are all built with PoE functionality Up to 52Gbps switching capacity 8K MAC Address Table Up to 500W PoE Power each port supports up to 30W per IEEE 802 3af at Per Port Power Management Feature supports Enable Disable Priority Setting Overloading Protection and Power Level settings IEEE 802 1D STP and IEEE 802 1w RSTP IEEE 802 1Q VLAN up to 4K VLAN Group Port Based VLAN MAC Based VLAN Protocol Based VLAN MVRP and QinQ IEEE 802 2ad LACP Static Trunk support up to 13 trunks up to 16 ports per trunk IGMP Snooping V1 V2 V3 and Querier port Up to 9K Jumbo Frame Rate Control and Strom Control for Broadcast Multicast Un known Unicast QoS supports up to 8 priority queues per
220. ivilege level for the following sub groups configuration read only configuration execute read write status statistics read only status statistics read write e g for clearing of statistics User Privilege should be same or greater than the authorization Privilege level to have the access to that group Insufficient Privilege Level If you login with lower level privilege and try to access the high privilege level configuration feature the following message Insufficient Privilege Level will appear If you want continue be sure that you have the privilege 67 Insufficient Privilege Level The web page is non accessable Please use the valid privilege level Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 4 1 3 Security Switch Auth Method This page allows you to configure how a user is authenticated when he logs into the switch via one of the management client interfaces The table has one row for each client type and a number of columns which are 4ipnet Configuration 2 System Power Reduction Ports Authentication Method Configuration console Users telnet Privilege Levels Auth Method SSH HTTPS Access Management SNMP RMON Network Limit Control NAS ACL DHCP IP Source Guar ARP Inspection AAA ssh web The management client for which the configuration below
221. l List Configuration This page shows the Access Control List ACL which is made up of the ACEs defined on this switch Each row describes the ACE that is defined The maximum number of ACEs is 256 on each switch Jipnet ce Configuration E ao Access Control List Configuration Auto refresh C Refresh Clear Remove All Power Reduction Ports Security Switch 1 Users Privilege Levels SSH HTTPS Management SNMP E Statistics History larm Event letwork Limit Control NAS ACL Ports 1 Rate Limiters Access Control List DHCP IP Source Guar ARP Inspection Click on the lowest plus sign to add a new ACE to the list The reserved ACEs used for internal protocol cannot be edited or deleted the order sequence cannot be changed and the priority is highest Indicates the ingress port of the ACE Possible values are All The ACE will match all ingress port Port The ACE will match a specific ingress port Indicates the policy number and bitmask of the ACE Indicates the frame type of the ACE Possible values are Any The ACE will match any frame type EType The ACE will match Ethernet Type frames Note that an Ethernet Type based ACE will not get matched by IP and ARP frames ARP The ACE will match ARP RARP frames IPv4 The ACE will match all IPv4 frames IPv4 ICMP The ACE will match IPv4 frames with ICMP protocol IPv4 UDP The ACE will match IPv4 frames with UDP pro
222. l response time 2 Check the security amp firewall settings of your computer 3 Try different Web browser such as Mozilla Firefox 22 3 3 Preparation for Telnet SSH Interface If you are operating Win XP Win 2000 or earlier you may access the Telnet console by the default command If your OS version is Window 7 or later please download the terminal tool such as HyperTeminal or Putty The switch supports both Telnet and SSH console The SSH console can be treated as a secured Telnet connection Telnet Connection 1 Go to Start gt Run gt cmd And then press Enter 2 Type the Telnet 192 168 2 1 or the IP address of the switch And then press Enter Access Telnet or SSH by Terminal tool Putty 1 Open Telnet SSH Client PuTTY In the Session tab choose Telnet SSH in the Protocol field In the Session tab enter the Host Name IP Address of your switch and Port number default Telnet 23 SSH 22 Then click on Oper to start the SSH session console BN PUTTY Configuration Category B Session Basic options for your PUTTY session Logging Specify your connection by host name or IP address Host Name or IP address Port 192 168 2 1 22 Protocol Raw Telnet Rlogin 9 SSH Load save or delete a stored session Saved Sessions Default Settings Connection toaa Proxy Telnet Rlogin Close window on exit Always Never 9 Only on clean exit _omen_ _coca_ 2
223. l value that indicates the maximum power in watts required by a PD device from a PSE device or the minimum power a PSE device is capable of sourcing over a maximum length cable based on its current configuration The maximum allowed value is 102 3 W If the device indicates value higher than 102 3 W it is represented as reserved Buttons Auto refresh Check this box to refresh the page automatically Automatic refresh occurs every 3 seconds Refresh Click to refresh the page 21 9 4 LLDP EEE By using EEE power savings can be achieved at the expense of traffic latency This latency occurs due to that the circuits EEE turn off to save power need time to boot up before sending traffic over the link This time is called wakeup time To achieve minimal latency devices can use LLDP to exchange information about their respective tx and rx wakeup time as a way to agree upon the minimum wakeup time they need This page provides an overview of EEE information exchanged by LLDP 261 4ipnet En O LLDP Neighbors EEE Information Antosefesh MN System Information CPU Load No LLDP EEE information found Log Detailed Log Ports Security LACP Loop Protection Spanning Tree Bridge Status Port Status Port Statistics MVR LLDP Neighbours LLDP MED Neighbours PoE EEE Port Statistics PoE MAC Table VLANs VCL sFlow Diagnostics Maintenance LLDP Neighbours EEE Information
224. le and the VLAN can be configured as needed Legal values for a VLAN ID are 1 through 4095 The VLAN is enabled when you click on Save A VLAN without any port members will be deleted when you click Save Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values Refresh Refreshes the displayed the table starting from the VLAND ID input fields lt lt Updates the table starting from the first entry in the VALN Table i e the entry with the lowest VLAND ID gt gt Update the table staring with the entry after the last entry currently displayed 158 13 2 VLAN Port Configuration This page is used for configuring the selected stack switch unit port VLAN This page is used for configuring the switch port VLAN 4ipnet Configuration System Ethertype for Custom S ports 0x 88A8 Auto refresh El Refresh Power Reduction Ports VLAN Port Configuration Security Aggregation Loop Protection te pee ka Ba E lt gt z lt gt 1H 2 IPMC 1 Unaware ad E All Specific 1 Untag_pvid PoE 2 Unaware 7 El All Specific v 1 Untag_pvid WE Tane 3 Unaware cs A All zm Specific y 1 Untag_pvid En Membership 4 Unaware e a All Specific x 1 Untag_
225. le with no direct configuration Configuration comes indirectly from other modules the user modules When a user module has enabled port security on a port the port is set up for software based learning In this mode frames from unknown MAC addresses are passed on to the port security module which in turn asks all user modules whether to allow this new MAC address to forward or block it For a MAC address to be set in the forwarding state all enabled user modules must unanimously agree on allowing the MAC address to forward If only one chooses to block it it will be blocked until that user module decides otherwise The status page is divided into two sections one with a legend of user modules and one with the actual port status 204 gipnet uG Configuration Monitor Port Security Switch Status Auto refresh C Refresh Information User Module Legend CPU Load Log Detailed Log Limit Control L Ports 802 1X 8 Security DHCP Snooping D Access Management Voice VLAN v Statistics Network Port Status Port Security Switch Port Disabled ACL Status ES ARP Inspection 3 Disabled IP Source Guard 4 Disabled AAA Disabled Switch 6 Disabled LACP 7 Disabled Loop Protection soso Spanning Tree 9 Disabled MVR 40 Disabled IPMC 14 Disabled LLDP 12 Disabled PoE 13 Disabled MAC Table 14 Disabled VLANs 15 Disabled VCL 167 gt Di sFlow 47 Disab
226. lease refer to Appendix A 42 Chapter 8 IP Multicasting The SW1024 supports both IPv4 and IPv6 multicast forwarding and filtering IGMP Snooping defines how IPv4 multicast traffic is managed while MLD defines how IPv6 multicast traffic is managed 8 1 IGMP Snooping Internet Group Management Protocol Snooping IGMP Snooping is a multicast constraining mechanism that runs on Layer 2 devices to manage and control multicast groups By listening to conversations between the router and the hosts the switch maintains a map of which links need which IP multicast streams Multicasts may be filtered from the links which do not need them and thus controls which ports receive specific multicast traffic 8 1 1 Basic Configuration Configuration path Configuration gt gt IPMC gt gt IGMP Snooping gt gt Basic Configuration IGMP Snooping Configuration Global Configuration Snooping Enabled Unregistered IPMCv4 Flooding Enabled IGMP SSM Range 232 0 0 0 Leave Proxy Enabled Proxy Enabled Snooping Enabled The global Enable Disable switch for IGMP Snooping Unregistered IPMCv4 Flooding Enabled Unregistered IPMCv4 traffic is unknown multicast traffic The flooding control takes effect only when IGMP Snooping is enabled IGMP SSM Range SSM Source Specific Multicast Range allows the SSM aware hosts and routers run the SSM service model for the groups in the address range Leave Proxy Enable Enable to avoid unnecessary leave
227. led Diagnostics 18 Disabled Maintenance 19 Disabled an Rinablnd User Module Legend The legend shows all user modules that may request Port Security services The full name of a module that may request Port Security services A one letter abbreviation of the user module This is used in the Users column in the port status table Port Status The table has one row for each port on the switch and a number of columns which are The port number for which the status applies Click the port number to see the status for this particular port Each of the user modules has a column that shows whether that module has enabled Port Security or not A means that the corresponding user module is not enabled whereas a letter indicates that the user module abbreviated by that letter see Abbr has enabled port security Shows the current state of the port It can take one of four values 205 Disabled No user modules are currently using the Port Security service Ready The Port Security service is in use by at least one user module and is awaiting frames from unknown MAC addresses to arrive Limit Reached The Port Security service is enabled by at least the Limit Control user module and that module has indicated that the limit is reached and no more MAC addresses should be taken in Shutdown The Port Security service is enabled by at least the Limit Control user module and that module has indicated that the limit is exceed
228. lick to undo any changes made locally and revert to previously saved values 89 4 2 2 Security Network Network Access Server Configuration This page allows you to configure the IEEE802 1X and MAC based authentication system and port settings 4ipnet Configuration System Power Reduction Ports Network Access Server Configuration System Configuration So Mode ooo Disabled M Users Reauthentication Enabled As iar Reauthentication Period 3600 seconds SSH EAPOL Timeout 30 seconds HTTPS ey Access Aging Period 300 seconds Management oe SNMP Hold Time 10 seconds RMON ies PRADIUS Assigned QoS Enabled History RADIUS Assigned VLAN Enabled Alarm Guest VLAN Enabled al Bets Guest VLAN ID 1 Network Limit Control Max Reauth Count 2 hee Allow Guest VLAN if EAPOL Seen DHCP IP Source Guary Port Configuration ARP Inspection AAA Admin Stat RADIUS Assigned RADIUS Assigned Guest Aggregation deal QoS Enabled VLAN Enabled VLAN Enabled Port State eset ggreg Loop Protection leo a O al Spanning Tree MVR 1 Force Authorized x Globally Disabled Reauthenticate Reinitialize IPMC LLDP 2 Force Authorized v Globally Disabled Reinitialize FOr Tabe 3 Force Authorized w Globally Disabled Reinitialize VLANS gt 4 Force Authorized m Globally Disabled Reinitialize The IEEE 802 1X standard defines a port based access control procedu
229. ll tagged untagged VLAN IngressFilter lt port_list gt enable disable VLAN tx_tag lt port_list gt untag_pvid untag_all tag_all VLAN PortType lt port_list gt unaware c port s port s custom port Example VLAN gt framety 1 3 all VLAN gt ingr 1 3 en VLAN gt tx_t 1 3 untag_pvid VLAN gt portty 1 3 un 308 14 Private VLAN Configuration PVLAN Configuration PVLAN Configuration Syntax PVLAN Configuration lt port_list gt PVLAN Add lt pvlan_id gt lt port_list gt PVLAN Delete lt pvlan_id gt PVLAN Lookup lt pvlan_id gt PVLAN Isolate lt port_list gt enable disable Example PVLAN gt add 10 9 12 PVLAN gt add 10 1 2 PVLAN gt add 20 1 2 PVLAN gt add 20 13 18 PVLAN gt iso 9 18 en Enable Isolated Ports Result PVLAN ID Ports 1 1 8 17 26 10 1 2 20 13 18 MAC based VLAN Configuration Syntax VCL Macvlan Add lt mac_addr gt lt vid gt lt port_list gt Example VCL Macvlan gt add 001122334455 10 1 4 Result VCL Macvlan gt conf MAC Address VID Ports 00 0b 16 21 2c 37 10 1 4 Protocol based VLAN Configuration Protocol to Group Syntax VCL ProtoVlan Protocol Add Eth2 lt ether_type gt arp ip ipx at lt group_id gt Example VCL ProtoVlan gt protocol add Eth2 0x0808 E4 Group to VLAN Syntax VCL ProtoVlan Vian Add lt port_list gt lt group_id gt lt vid gt 309 Example
230. llows the SSM aware hosts and routers run the SSM service model for the groups in the address range Enable MLD Leave Proxy This feature can be used to avoid forwarding unnecessary leave messages to the router side Enable MLD Proxy This feature can be used to avoid forwarding unnecessary join and leave messages to the router side Specify which ports act as router ports A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or MLD querier Normally the router port is the uplink port to the upper L3 Router or IGMP Querier For example in below figure the green port of the 2 switches are Router port Source Router Switch Switch Receiver Router port Multicast packets If an aggregation member port is selected as a router port the whole aggregation will act as a router port Enable the fast leave on the port Enable to limit the number of multicast groups to which a switch port can belong Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 9 2 2 MLD Snooping VLAN Configuration Navigating the MLD Snooping VLAN Table Each page shows up to 99 entries from the VLAN table default being 20 selected through the entries per page input field When first visited the web page will show the first 20 entries from the beginning of the VLAN Table The first displayed will be the one with the lowest VLAN ID found in the
231. low Diagnostics Maintenance Buttons The port select box determines which port is affected when clicking the buttons Autosetresh Check this box to enable an automatic refresh of the page at regular intervals Click to refresh the page immediately This button is available in the following modes Force Authorized e Force Unauthorized e Port based 802 1X e Single 802 1X Click to clear the counters for the selected port This button is available in the following modes e Multi 802 1X e MAC based Auth X Click to clear both the port counters and all of the attached client s counters The Last Client will not be cleared however This button is available in the following modes 215 e Multi 802 1X MAC based Auth X Click to clear only the currently selected client s counters Network ACL Status This page shows the ACL status by different ACL users Each row describes the ACE that is defined It is a conflict if a specific ACE is not applied to the hardware due to hardware limitations The maximum number of ACEs is 256 on each switch gipnet Ea Configuration a Monitor ACL Status Combined Auto refresh El Refresh tem Information S CPU Load No entries Log Detailed Log Ports rity Access Management tistics Network Port Security NAS ACL Status DHCP ARP Inspection IP Source Guard AAA Switch LACP Loop Protection Spanning Tree MVR Diagnostics Maintenance In
232. lowing configuration path 53 Configuration path Maintenance gt gt Factory Defaults Factory Defaults Are you sure you want to reset the configuration to Factory Defaults Yes No Note that the IP address is retained after a reset to factory default 54 Appendix A Ul Reference Index The switch provides abundant software features Once logged on to the switch you may start configuring the settings or monitoring the status The following provides a detailed Web Ul configuration guide 1 System Configuration 1 1 System Information This page shows the system information and allows you to configure the new settings gipnet Configuration ee System Information System Information CPU Load Contact Log Name Detailed Log Location Ports Security MAC Address 00 03 ce 25 4e 13 N Chip ID VSC7427 Loop Protection Spanning Tree System Date 1970 01 01T00 29 04 00 00 MR System Uptii Od 00 29 04 IPMC Bab gt LLDP PoE Software Version PoE standalone dev build by root virtual centos 2013 09 13T10 52 58 08 00 Config smb_switch_sparxlll_26_126_ref mk MAC Table Software Date 2013 09 13710 52 58 08 00 VLANS Acknowledgments i VCL sFlow Diagnostics Maintenance The textual identification of the contact person for this managed node together with information on how to contact this person The allowed string length is 0 to 255 and the allowed content is the ASCII characters from 32 to 126 An administr
233. ls whether EEE is enabled for this switch port Queues set will activate transmission of frames as soon as any data is available Otherwise the queue will postpone the transmission until 3000 bytes are ready to be transmitted Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 62 3 Port Configuration This page displays current port configurations and link status Some of the Ports settings can also be configured here Jipnet Ea P N Port Configuration T Power Reduction Poris Secun e H w e de H Loop Protection 1 10tx Auto E x x 9600 Discard Disabled x Spans ice 2 Dom Auto x x a 9600 Discard Disabled ee 3 Down Auto E x x 9600 Discard y Disabled y PoE 4 Dom Auto e x ye 9600 Discard y Disabled y Moc Tane 5 Down Auto E x x 9600 Discard y Disabled y Private VLANs 6 Down Auto e ve be tal 9600 Discard Disabled y erin 7 Down Auto El x x 9600 Discard Disabled a 8 Dom Auto y x x 9600 Discard y Disabled y UPnP 9 Dom Auto BH x x E 9600 Discard y Disabled x pepsi 10 Dom Auto Y x x la 9600 Discard Disabled y Diagnostics 1 0 Down Auto Y x i 9600 Discard y Disabled y Maint
234. lt arp_flags gt ARP flags request smac tmac len ip ether 0 1 any ip IP keyword lt protocol gt IP protocol number 0 255 or any lt ip_flags gt IP flags ttlloptions fragment 0 1 any icmp ICMP keyword lt icmp_type gt ICMP type number 0 255 or any lt icmp_code gt ICMP code number 0 255 or any udp UDP keyword lt sport gt Source UDP TCP port range 0 65535 or any lt dport gt Destination UDP TCP port range 0 65535 or any tcp TCP keyword lt tcp_flags gt TCP flags fin syn rst psh ack urg 0 1 any permit Permit forwarding default deny Deny forwarding lt rate_limiter gt Rate limiter number 1 15 or disable lt port_redirect gt Port list for copy of frames or disable lt mirror gt Mirror of frames enable disable lt logging gt System logging of frames log log_disable lt shutdown gt Shut down ingress port shut shut_disable 296 Example Add one ACE Security Network ACL gt add 2 port 6 10 policy 3 8 ip ACE ID 2 added last Edit one ACE Security Network ACL gt add 1 port 1 5 policy 2 8 any ACE ID 1 modified last Result ID Type Port Policy Frame Action Rate L PortC Mirror Counter 1 User 1 5 2 0x8 Any Permit Disabled Disabled Disabled 0 2 User 6 10 3 0x8 IP Permit Disabled Disabled Disabled 0 DHCP DHCP Snooping Syntax Security Network DHCP Snooping Mode enable disable Security Network DHCP Snoo
235. lted in errors while being sent to clients The number of packets received from server The number of packets received without agent information options The number of packets received with the Circuit ID option missing The number of packets received with the Remote ID option missing The number of packets whose Circuit ID option did not match known circuit ID 220 The number of packets whose Remote ID option did not match known Remote ID Client Statistics The number of relayed packets from server to client The number of packets that resulted in error while being sent to servers The number of received packets from server The number of received packets with relay agent information option The number of packets which were replaced with relay agent information option The number of packets whose relay agent information was retained The number of packets that were dropped which were received with relay agent information Buttons Auto refresh Click this box to enable an automatic refresh of the page at regular intervals Refresh Click to refresh the page immediately Clear Clears statistics Network Dynamic ARP Inspection Table Entries in the Dynamic ARP Inspection Table are shown on this page The Dynamic ARP Inspection Table contains up to 1024 entries and is sorted first by port then by VLAN ID then by MAC address and then by IP address Navigating the ARP Inspection Table Each page shows up to
236. lticast the switch support IPv4 and IPv6 multicast forwarding and filtering The IGMP Snooping defines how to manage IPv4 multicast traffic the MLD defines how to manage IPv6 multicast traffic 9 1 IGMP Snooping Configuration Internet Group Management Protocol Snooping IGMP Snooping is a multicast constraining mechanism that runs on Layer 2 devices to manage and control multicast groups By listening to and analyzing IGMP messages a Layer 2 device running IGMP Snooping establishes mappings between ports and multicast MAC addresses and forwards multicast data based on these mappings 9 1 1 Basic Configuration This page provides IGMP Snooping related configuration 4ipnet Configuration System IGMP Snooping Configuration Power Reduction Ports Security Snooping Enabled Aggregation Unregistered IPMCv4 Flooding Enabled v Loop Protection Spanning Tree IGMP SSM Range MVR Leave Proxy Enabled IPMC Proxy Enabled IGMP Snooping Basic Port Related Configuration Configuration VLAN Configuration z Port Group ia lx Filtering 1 F a unlimited MLD Snooping ee LLDP z E Lal unlimited y PoE 3 A ll unlimited y MAC Table VLAN 4 E unlimited Pilea V1 ANa 5 E unlimited z Voice VLAN 6 a A unlimited QoS 7 la p unlimited y Mirroring UPnP 8 al a unlimited
237. mes LACPDUs down all links that have the protocol enabled If it finds a device on the other end of the link that also has LACP enabled it will also independently send frames along the same links enabling the two units to detect multiple links between themselves and then combine them into a single logical link LACP can be configured in Active Mode or Passive Mode In Active Mode it will always send frames along the configured links Whereas in Passive Mode it acts as a standby speak when spoken to role and is used as a way of controlling accidental loops Configuration path Configuration gt gt Aggregation gt gt LACP 4ipnet Configuration A ae LACP Port Configuration Power Reduction Port LACP Enabled Key Role Timeout Prio Security lt gt X lt gt M lt gt 32768 Switch Network 1 P Auto Active v Fast w 32768 AAA Aggregation 2 Auto Active m Fast 32768 Static TJ 7 TI LACP 3 Auto Active v Fast 32768 Loop Protection Te Spanning Tree 4 Auto xj Active Fast 32768 MVR 5 Auto w Active v Fast w 32768 IPMC LLDP 6 Auto xj Active Fast 32768 PoE MAC Table 7 Auto S Active m Fast 32768 VLANS 1 E Private VLANs 8 Auto Active Fast 32768 VCL 9 Auto Active r Fast y 32768 Voice VLAN Qos 10 Auto x Active v Fast 32768 Mirroring
238. messages to the router Proxy Enabled Enable to avoid forwarding unnecessary join and leave messages to the router 43 Port Related Configuration Port Router Port FastLeave Throttling lt gt Y 1 unlimited Y 2 unlimited Y 3 unlimited Y 4 unlimited Y 5 unlimited Y 6 unlimited Y 7 unlimited Y 8 unlimited Y 9 unlimited Y 10 unlimited Y 11 unlimited 12 unlimited 13 unlimited 14 unlimited Y 15 unlimited Y 16 unlimited Y 17 unlimited Y 18 unlimited Determine the Router Ports Fast Leave and Throttling function on the SW1024 A Router Port is a port on the SW1024 that connects to the Layer 3 multicast device L3 Router or IGMP Querrier Fast Leave enables the software to remove the group state when it receives an IGMP Leave report without sending an IGMP query message Throttling can be used to limit the number of multicast groups to which a switch port can belong 8 1 2 IGMP Snooping VLAN Configuration VLAN can be enabled for IGMP Snooping up to 64 VLANs This feature registers multiple hosts on different VLANs to one single multicast VLAN which eliminates the need for the router to send 44 out multiple packets to hosts on different VLANs Configuration path Configuration gt gt IPMC gt gt IGMP Snooping gt gt VLAN Configuration IGMP Snooping VLAN Configuration Start from VLAN 1 with 20 entries per page Delete VLAN ID Snooping Enabled IGMP Querier Compatibility
239. n Parameters class_con Class Actual Consumption class res Class Reserved Power al_con Allocation Actual Consumption al_res Allocation Reserved Power lldp_con LLDP MED Actual Consumption lldp_res LLDP MED Reserved Power Example PoE gt mgmt class_con 306 PoE Power Supply Configuration Warning The default value is for reference only If the value is not comfort to your product specification please give the correct value before you start using PoE function Syntax PoE Maximum_Power lt port_list gt lt port_power gt Parameters lt port_list gt Port list or all default All ports lt port_power gt PoE maximum power for the port 0 15 4 Watt for PoE mode 0 30 0 Watt for PoE mode Example PoE gt max 1 24 10 PoE gt max 1 24 15 4 Max power of Port 1 24 to 10Watt Max power of Port 1 24 to 15 4 Watt PoE Port Configuration Syntax PoE Mode lt port_list gt disabled poe poe Parameters lt port_list gt Port list or all default All ports disables Disable PoE poe Enables PoE IEEE 802 3af Class 4 limited to 15 4W poe Enables PoE IEEE 802 3at Class 4 limited to 30W default Show PoE s mode Example Set Port 1 24 ro PoE mode PoE gt mode 1 24 poe PoE Status Primary Power Supply PoE gt prim Primary Power Supply 200 W Port Status PoE gt sta Port PD Class Port Status Power Used
240. n first visited the web page will show the first 20 entries from the beginning of the MAC Table The first displayed will be the one with the lowest VLAN ID and the lowest MAC address found in the MAC Table The Start from MAC address and VLAN input fields allow the user to select the starting point in the MAC Table Clicking the button will update the displayed table starting from that or the closest next MAC Table match In addition the two input fields will upon a button click assume the value of the first displayed entry allowing for continuous refresh with the same start address The will use the last entry of the currently displayed VLAN MAC address pairs as a basis for the next lookup When the end is reached the text No more entries is shown in the displayed table Use the button to start over 266 4ipnet Ea Configuration Monitor MAC Address Table Auto vetieah Refresh Clear 1s lt System Li pcs a Start from VLAN 1 and MAC address 00 00 00 00 00 00 with 20 entries per page oa Log Detailed Log Ports Security Dynamic 1 00 01 29 60 20 2C E iy pes Protection Epam 1 00 03 CE 12 CO 84 Ad Spanning Tree Dynamic 1 00 08 9B CE C0 55 Y Bridge Status i 00 08 98 D4 7D 13 Port Status paame i Y Port Statistics Dynamic 1 00 0C 29 01 CE E2 Y MVR Dynamic 1 00 0C 29 06 62 D1 e na Dynamic 1 00 0C 29 13 69 38 Y PoE Dynamic 1 00 0C 29 13 69 42 MAC
241. n on ingress frame if parameters configured are matched with the frame s content There are three action fields Class DPL and DSCP Class Classified QoS class if a frame matches the QCE it will be put in the queue Drop Precedence Level if a frame matches the QCE then DP level will set to value displayed under DPL column DSCP If a frame matches the QCE then DSCP will be classified with the value displayed under DSCP column 200 Displays Conflict status of QCL entries As H W resources are shared by multiple applications It may happen that resources required to add a QCE may not be available in that case it shows conflict status as Yes otherwise it is always No Please note that conflict can be resolved by releasing the H W resources required to add QCL entry on pressing Resolve Conflict button Buttons I Select the QCL status from this drop down list Auto refresh Check this box to refresh the page automatically Automatic refresh occurs at regular intervals Resolve Conflict Click to release the resources required to add QCL entry incase conflict status for any QCL entry is yes Refresh Click to refresh the page any changes made locally will be undone 21 2 5 Detailed Port Statistics This page provides detailed traffic statistics for a specific switch port Use the port select box to select which switch port details to display The displayed counters are the totals for receive and
242. n the current selected SW1024 unit by allocating ports to Groups Up to 13 Groups The below example gives a clear illustration on how ports can be assigned to different groups for aggregation Configuration path Configuration gt gt Aggregation gt gt Static Aggregation Mode Configuration Hash Code Contributors Source MAC Address Y Destination MAC Address IP Address Y TCP UDP Port Number Y E AAA ANS pID 2 3 4 5 6 7 8 9 10 44 12 43 14 15 16 17 18 19 20 21 22 23 24 25 26 Save Reset Port 1 Port 2 and Port 3 are allocated for link aggregation Group 1 Port 4 and Port 5 are allocated for link aggregation Group 2 Port 6 and Port 7 are allocated for link aggregation Group 3 Port 8 and Port 9 are allocated for link aggregation Group 4 The remaining ports Port 10 to Port 26 are set in normal mode 47 Clicking Save applies the configured settings while clicking Reset removes all aggregations and set all ports to Normal Mode Hash Code Contributors are global parameters for the system used to calculate the destination port for the frame Hash Code Contributors include Source MAC Address Destination MAC Address IP Address and TCP IP Port Number 9 2 Dynamic Aggregation LACP Link Aggregation Control Protocol can be enabled on the SW1024 for dynamic bundling of several physical ports to form one port channel LACP works by sending fra
243. ndard but features many of the same characteristics as does port based 802 1X In Single 802 1X at most one supplicant can get authenticated on the port at a time Normal EAPOL frames are used in the communication between the supplicant and the switch If more than one supplicant is connected to a port the one that comes first when the port s link comes up will be the first one considered If that supplicant doesn t provide valid credentials within a certain amount of time another supplicant will get a chance Once a supplicant is successfully authenticated only that supplicant will be allowed access This is the most secure of all the supported modes In this mode the Port Security module is used to secure a supplicant s MAC address once successfully authenticated 93 Multi 802 1X Multi 802 1X is like Single 802 1X not an IEEE standard but a variant that features many of the same characteristics In Multi 802 1X one or more supplicants can get authenticated on the same port at the same time Each supplicant is authenticated individually and secured in the MAC table using the Port Security module In Multi 802 1X it is not possible to use the multicast BPDU MAC address as destination MAC address for EAPOL frames sent from the switch towards the supplicant since that would cause all supplicants attached to the port to reply to requests sent from the switch Instead the switch uses the supplicant s MAC address which is obtained from the fi
244. nean ea eni NEn anaa 120 6 LOOP PROTECTION A eee a s 122 de SPANNING TREE as c ocuocates conzeac yeas cx eens NO cxvSe metanntensertaneten o codes O De 124 7 1 SPANNING TREE BRIDGE SETTING csccesscssccssecseecseesscecessecesesessceasceasceaecasecaeecseecseseateeseeeeees 124 7 2 SPANNING TREE MSTI MAPPING cccesccssccssecssecseecssessceeecseeseseseesceasceasceascasecaeecaeeesesesesnssensees 126 7 3 SPANNING TREE MSTI PRIORITIES csccesccssccssecseecssessceeeseseseseseseceescessceascesecaeecsescseseaeseeeensees 128 7 4 SPANNING TREE CIST PORTS anrea eaaa ataa earran araa aaa R EAE a o A EE Oa RE RENEE RE Eoi 129 7 5 SPANNING TREE MSTI PORTS cccsssccecsesececssececeeseeeceeeaececseeeeceeaeeeceeaaeceseeeeceesaeeeceeaaeeeeeeeeeeees 131 8 MVR MULTICAST VLAN REGISTRATION ssccceesceceessscecsessececsssseceesseeecsesaececsseeceessseeceesaeesceeseceesaeeeceeaas 133 9 IPMG IP MULTICAST isis dada 135 9 1 IGMP SNOOPING CONFIGURATION c sccecsecceceeseececeeeeececseeeeceeueeeceeaaececeeeeceeaeeeceeaaeeeseeeeeeees 135 9 1 L BOsiC CONTIGUA ION aid idas 135 9 1 2 IGMP Snooping VLAN Configuration cccccccceesssccseesseceessssecsessesecsessecsesssecsessessceesseceessssecees 137 9 1 3 IGMP Snooping Port Group Filtering cccccccccssssceessessssceesseesssceesseesscessssessscessecssecessecsseeeesees 138 9 2 MLD SNOOPING CONFIGURATION c sccecseececeeseececeeneececseeeeceesueeec
245. ng table and must not be used by any other existing mapping entry on this page Indicates the ID to which Group Name will be mapped A valid VLAN ID ranges from 1 4095 A row of check boxes for each port is displayed for each Group Name to VLAN ID mapping To include a port in a mapping check the box To remove or exclude the port from the mapping make sure the box is unchecked By default no ports are members and all boxes are unchecked Click to add a new entry in mapping table An empty row is added to the table the Group Name VLAN ID and port members can be configured as needed Legal values for a VLAN ID are 1 through 4095 The button can be used to undo the addition of new entry 167 Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 15 3 VCL IP Subnet based VLAN The IP subnet based VLAN entries can be configured here This page allows for adding updating and deleting IP subnet based VLAN entries and assigning the entries to different ports This page shows only static entries 4ipnet Configuration IP Subnet based VLAN Membership Configuration Auto refresh Refresh System Power Reduction Ports Security Currently no entries present Aggregation Loop Protection Spanning Tree MVR Add New Entry LLDP Save Reset based VLAN Protocol based Protocol to Group Group to VLAN IP Subnet b
246. ng the button will update the displayed table starting from that or the closest next VLAN Table match The will use the last entry of the currently displayed VLAN entry as a basis for the next lookup When the end is reached the text No more entries is shown in the displayed table Use the button to start over Delete To delete a VLAN entry check this box The entry will be deleted during the next Save VLAN ID 157 Indicates the ID of this particular VLAN VLAN Name Indicates the name of the VLAN Maximum length of the VLAN Name String is 32 VLAN Name can only contain alphabets or numbers VLAN name should contain at least one alphabet VLAN name can be edited for the existing VLAN entries or it can be added to the new entries Port Members A row of check boxes for each port is displayed for each VLAN ID To include a port in a VLAN check the box as Y To include a port in a forbidden port list check the box as shown lt To remove or exclude the port from the VLAN make sure the box is unchecked as shown By default no ports are members and for every new VLAN entry all boxes are unchecked Managed GigaBit Ethernet Switch VLAN Memberstip Configuration Start hom WLAN 1 wen 20 entries per page Port Members TL ELE 41S 6 FS 9 fos x2 99 14 25 17 18 18 29 28 2a 2526 1 smi VOM MMM Vie ie Mie i ill ieee Adding a New VLAN Click to add a new VLAN ID An empty row is added to the tab
247. ng to secure learning mode otherwise the management link is lost and can only be restored by using another non secure port or by connecting to the switch via the serial interface Static MAC Table Configuration The static entries in the MAC table are shown in this table The static MAC table can contain 64 entries gipnet Configuration a het tes MAC Address Table Configuration Power Reduction a Ports Aging Configuration Security Loop Protection 300 d Spanning Tree Boo seconds R MAC Table Learning LLDP PoE MAC Table VLANs Auto Private VLANs Disable VCL Secure Voice VLAN Qos Static MAC Table Configuration Mirroring UPnP sFlow Monitor Diagnostics Add New Static Entry Maintenance Save Reset The table is sorted first by VLAN ID and then by MAC address gipnet po MAC Address Table Configuration Power Reduction k Ports Aging Configuration Security Aggregation R Bo seconds ee MAC Table Learning LLDP PoE Voice VLAN Qos Static MAC Table Configuration Mirroring UPnP sFlow Monitor Diagnostics Maintenance 3 3 3 Y Y E El El E J J 7 7 E El Y E 7 El J J J 3 3 3 3 Delete 1 00 00 00 00 00 00 Add New Static Ent Save
248. ngle 802 1X For trouble shooting VLAN assignments use the Monitor gt VLANs gt VLAN Membership and VLAN Port pages These pages show which modules have temporarily overridden the current Port VLAN configuration RADIUS attributes used in identifying a VLAN ID RFC2868 and RFC3580 form the basis for the attributes used in identifying a VLAN ID in an Access Accept packet The following criteria are used The Tunnel Medium Type Tunnel Type and Tunnel Private Group ID attributes must all be present at least once in the Access Accept packet e The switch looks for the first set of these attributes that have the same Tag value and fulfil the following requirements if Tag 0 is used the Tunnel Private Group ID does not need to include a Tag Value of Tunnel Medium Type must be set to IEEE 802 ordinal 6 Value of Tunnel Type must be set to VLAN ordinal 13 Value of Tunnel Private Group ID must be a string of ASCII chars in the range 0 9 which is interpreted as a decimal string representing the VLAN ID Leading 0 s are discarded The final value must be in the range 1 4095 Guest VLAN Enabled When Guest VLAN is both globally enabled and enabled checked for a given port the switch considers moving the port into the Guest VLAN according to the rules outlined below This option is only available for EAPOL based modes i e e Port based 802 1X e Single 802 1X e Multi 802 1X For trouble shooting VLAN ass
249. ngress Filtering Frame Type Tx Tag UVID Conflicts CPU Load 1 UnAware Disabled All Untag_this 1 No Log 1 UnAware Disabled All Untag this 1 No Detailed Log 3 1 UnAware Disabled All Untag this 4 No Ports 4 1 UnAware Disabled All Untag_this 1 No Security 5 1 UnAware Disabled All Untag_this 1 No LACP 6 1 UnAware Disabled All Untag this 1 No Loop Protection 7 1 UnAware Disabled All Untag_this 1 No Spanning Tree 8 1 UnAware Disabled All Untag_this 1 No Bridge Status 9 1 UnAware Disabled All Untag_this 1 No Port Status 10 20 C Port Disabled All Untag this 20 No Port Statistics 11 20 C Port Disabled All Untag_this 20 No IVR 12 20 C Port Disabled All Untag this 20 No IPMC 13 20 UnAware Disabled All Untag_this 20 No LLDP 14 21 UnAware Disabled All Untag_this 21 No PoE 15 1 UnAware Disabled All Untag_this 1 No MAC Table 16 1 UnAware Disabled All Untag_this 1 No VLANs 17 1 UnAware Disabled All Untag_this 1 No VLAN Membership 18 1 UnAware Disabled All Untag this 1 No Sano 19 1 UnAware Disabled All Untag_this 1 No 20 1 UnAware Disabled All Untag_this if No sFlow 21 1 UnAware Disabled All Untag this 1 No Diagnostics 22 1 UnAware Disabled All Untag_this 1 No Maintenance 23 1 UnAware Disabled All Untag_this 1 No 24 1 UnAware Disabled All Untag_this 1 No 25 1 UnAware Disabled All Untag_this 1 No 26 1 UnAware Disabled All Untag this 1 No VLAN USER VLAN User module uses services of the VLAN management functionality to configure VLAN membershi
250. not equal to Ethernet 0x06 or the PLN is not equal to IPv4 0x04 1 ARP RARP frames where the HLN is equal to Ethernet 0x06 and the PLN is equal to IPv4 0x04 Any Any value is allowed don t care Specify whether frames can hit the action according to their ARP RARP hardware address space HRD settings 0 ARP RARP frames where the HLD is not equal to Ethernet 1 1 ARP RARP frames where the HLD is equal to Ethernet 1 Any Any value is allowed don t care Specify whether frames can hit the action according to their ARP RARP protocol address space PRO settings 0 ARP RARP frames where the PRO is not equal to IP 0x800 1 ARP RARP frames where the PRO is equal to IP 0x800 Any Any value is allowed don t care IP Parameters The IP parameters can be configured when Frame Type IPv4 is selected Specify the IP protocol filter for this ACE Any No IP protocol filter is specified don t care Specific If you want to filter a specific IP protocol filter with this ACE choose this value A field for entering an IP protocol filter appears ICMP Select ICMP to filter IPv4 ICMP protocol frames Extra fields for defining ICMP parameters will appear These fields are explained later in this help file UDP Select UDP to filter IPv4 UDP protocol frames Extra fields for defining UDP parameters will appear These fields are explained later in this help file TCP Select TCP to filter IPv4 TCP protocol
251. nsider the different classes to be different allocated groups There are four port classes for the administrator to select from 4W 7W 15 4W or 30W Reserve Power by Allocation Power allocated to each port is determined manually by the administrator When the Allocation option is selected and only in this mode the administrator will be able to enter the desired Maximum Power W in the table below Reserve Power by LLDP MED Power allocated to each port is determined according to the LLDP Protocol The port exchanges PoE information using the LLDP protocol to determine the amount of power reserved There are 2 modes for Power Management for the system namely Actual Consumption and Reserved Power Actual Consumption The system calculates the total actual power consumed for the system When this value exceeds 500W the ports begin to shut down beginning from the ports with the lowest priority When 2 ports have the same priority level the higher port number is shut down When a port s actual power consumption is higher than the set reserved Maximum Power this also triggers the port to shut down 36 Reserved Power In this mode when the total reserved power exceeds 500W the ports are shut down PoE Power Supply Configuration Pi Power Supply W 500 PoE Port Configuration 1 PoE v Low 15 4 2 PoE Low 15 4 3 PoE v Low 15 4 4 PoE Low 15 4 5 PoE v Low 15 4 6 PoE
252. number of Received V2 Leaves Buttons Refresh Click to refresh the page immediately Clear Clears all Statistics counters Auto refresh Check this box to enable an automatic refresh of the page at regular intervals 244 21 7 2 MVR Group Table Entries in the MVR Group Table are shown on this page The MVR Group Table is sorted first by VLAN ID and then by group 4ipnet 914 Configuration a onitor MVR Channels Groups Information Auto refresh E System Information Start from VLAN 1 and Group Address with 20 entries per page CPU Load Log Detailed Log Ports Security No more entries LACP Loop Protection Spanning Tree MVR Diagnostics Maintenance Navigating the MVR Group Table Each page shows up to 99 entries from the MVR Group table default being 20 selected through the entries per page input field When first visited the web page will show the first 20 entries from the beginning of the MVR Group Table The Start from VLAN and group input fields allow the user to select the starting point in the MVR Group Table Clicking the Refresh button will update the displayed table starting from that or the closest next MVR Group Table match In addition the two input fields will upon a Refresh button click assume the value of the first displayed entry allowing for continuous refresh with the same start address The gt gt will use the last entry of the currently displayed table as a ba
253. nused MSTI should just be left empty l e not having any VLANs mapped to it Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 127 7 3 Spanning Tree MSTI Priorities This page allows the user to inspect the current STP MSTI bridge instance priority configurations and possibly change them as well gipnet pa MSTI Configuration Power Reduction Ports Security Aggregation Loop Protection Spanning Tree Bridge Settings MSTI Mapping MSTI Priorities CIST Ports MSTI Ports MVR IPMC LLDP PoE MAC Table VLANs Private VLANs VCL Voice VLAN Qos Mirroring UPnP sFlow Monitor Diagnostics Maintenance The bridge instance The CIST is the default instance which is always active Controls the bridge priority Lower numeric values have better priority The bridge priority plus the MSTI instance number concatenated with the 6 byte MAC address of the switch forms a Bridge Identifier MSTI Priority Configuration Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 128 7 4 Spanning Tree CIST Ports 4ipnet
254. o noonnnn ron nn ononnrnn no ronnnonan ron n nono 69 4 1 5 Security Switch HTTPS Configuration ccccccccceessccsssseessecsssseessecsssseessecsssceessecssseeessecssssessseeaes 70 4 1 6 Security Switch Access Management Configuration ooococcccnonononnonanocnonnnnnnoconn nora nocnnn conan 71 41 7 Security SWIteh SNMP rinnan dida iia 72 4 1 8 RMON Statistics CONPIQUIATION ccccccccceessssecesssesessssseceesssseceessesscaseecsesssseceessessesasseceesssseessaes 81 4 2 SECURE OR E e ess 87 4 2 1 Port Security Limit Control CONfIQUIATION ccsccccceeccceesssseeeessssssnseeceessssecsessesecusseceesssseessaes 87 4 2 2 Security Network Network Access Server Configuration oooonncocooonoonnccoanononno cano ononacrnnonon 90 4 2 3 Security Network Access Control List Configuration coonoonconononooanonanocnonnonanoconn nora nocnnnnonnns 96 4 4 2 4 Switch Network DHCP Configuration ccccccccccssssceessessssceessesssscessssenssceesseessscessseesseeseeees 109 4 2 5 IP Source Guard Configuration cccecsscceesssccceessssesessseceessssecsessessceseeceesssseesesseseessseceesseecees 111 4 26 ARP INS DOCCION ii da diaria idad ici i 113 4 3 SECURITY AAA AUTHENTICATION SERVER CONFIGURATION ccccesccesscsecssecssecseecseeeseeersees 116 5 AGGREGATION CONFIGURATION o sas coe 119 5 IESTATICAGGREGATION ci A di ai 119 5 2 LACP DYNAMIC AGGREGATION aeaea eean eae paa aee aE R aera ee
255. obtain packet content information Counter sampling Time based sampling used to obtain port traffic statistics gipnet Configuration System Power Reduction Ports Security Aggregation Loop Protection Spanning Tree MVR IPMC LLDP PoE MAC Table VLANs Private VLANs VCL Voice VLAN Qos Mirroring UPnP sFlow Monitor Diagnostics Maintenance sFlow Configuration Receiver Configuration lt none gt Release 0 0 0 0 6343 0 seconds 1400 bytes Port Configuration Flow Sampler Counter Poller Enabled Sampling Rate Max Header Enabled Interval 128 128 128 E 128 128 128 128 o an bh y N a SO S O DO GQ D O Oj S S D CQ D O Type the IP address of sFlow collector in the Receiver Configuration The sFlow agent will send the collected information to it 192 21 Monitor 21 1 Monitor System 21 1 1 Monitor System Information The switch system information is provided here 4ipnet Configuration Monitor System Information Information CPU Load Contact QA Test SW Log Name SW1024 13AT2M00048 Detailed Log Location Lab R3 Top State 00 1 d4 03 04 ad We RE Ia Chip yous VSC7427 E QoS Statistics QCL Status Detailed Statistics System Date 1970 01 06T05 01 10 08 00 stem Uptime 4d 21 01 10 Software Version PoE standalone dev build by root virtual centos 2013 09 13T10 52 58 08 00 Config smb_switch_sparxlll_26_126_r
256. on Configuration Static Aggregation Configuration Aggregation Group Configuration Syntax Aggr Add lt pont_list gt lt aggr_id gt Example Add port 5 8 to Group 1 gt aggr add 5 8 1 gt aggrdel1 Delete the group 1 Hash Code Contributors Syntax Aggr Mode smac dmaclip port enable disable smac Source MAC Address dmac Destination MAC Address ip IP Address port TCP UDP Port Number Example Only the Source MAC Hash is enabled The rest mode are disabled gt agg mode smac en gt agg mode dmac dis gt agg mode ip dis gt agg mode port dis LACP LACP Port Configuration Syntax LACP Configuration lt port_list gt LACP Mode lt port_list gt enable disable LACP Key lt port_list gt lt key gt LACP Role lt port_list gt active passive LACP Status lt port_list gt LACP Statistics lt port_list gt clear Example Configure port 5 8 to a LACP group gt lacp mode 5 8 en Mode Enable gt lacp key 5 8 100 Key 100 gt lacp role 5 8 act Role Enable 6 Loop Protection General Settings Enable Loop Syntax Loop Protect Mode enable disable 300 Protection Loop Protect Transmit lt transmit time gt Loop Protect Shutdown lt shutdown time gt Example gt loop protect mode en Transmission Time gt loop protect trans 10 10 seconds Shutdown Time gt loop protect shut 200 200 seconds
257. onfiguration System Private VLAN Membership Configuration Pi Ri pome Reduclion O Security Delete PVLANID 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 24 22 25 24 25 26 Aggregation 1 MEME EE EEE EEE E Ea EM EE ME EE E E Loop Protection Spanning Tree UR Add New Private VLAN IPMC LLDP Save Reset PoE MAC Table VLANs Private VLANs PVLAN Membership Port Isolation VCL Voice VLAN Qos Mirroring UPnP sFlow Monitor Diagnostics Maintenance 161 Private VLANs do not work across the stack To delete a private VLAN entry check this box The entry will be deleted during the next save Indicates the ID of this particular private VLAN A row of check boxes for each port is displayed for each private VLAN ID To include a port in a Private VLAN check the box To remove or exclude the port from the Private VLAN make sure the box is unchecked By default no ports are members and all boxes are unchecked Click to add a new private VLAN ID An empty row is added to the table and the private VLAN can be configured as needed The allowed range for a private VLAN ID is the same as the switch port number range Any values outside this range are not accepted and a warning message appears Click OK to discard the incorrect entry or click Cancel to return to the editing and make a correction The Private VLAN is enabled when you click Save The button can be used to undo
258. onfiguration The MAC Address Table is configured on this page Set timeouts for entries in the dynamic MAC Table and configure the static MAC table here gipnet Configurati pelin as MAC Address Table Configuration Power Reduction Ports Aging Configuration Security Aggregation i D oi 300 seconds Spanning Tree pe PMG MAC Table Learning LLDP Voice VLAN Qos Static MAC Table Configuration Mirroring UPnP sFlow Monitor Diagnostics Add New Static Entry Maintenance Saz Aging Configuration By default dynamic entries are removed from the MAC table after 300 seconds This removal is also called aging Configure aging time by entering a value here in seconds for example Age dma seconds The allowed range is 10 to 1000000 seconds Disable the automatic aging of dynamic entries by checking Disable automatic aging MAC Table Learning If the learning mode for a given port is greyed out another module is in control of the mode so that it cannot be changed by the user An example of such a module is the MAC Based Authentication under 802 1X Each port can do learning based upon the following settings Learning is done automatically as soon as a frame with unknown SMAC is received No learning is done Only static MAC entries are learned all other frames are dropped 154 Note Make sure that the link used for managing the switch is added to the Static Mac Table before changi
259. onfiguration System Power Reduction Ports Security Switch Users Privilege Levels Auth Method SSH Access Management SNMP RMON Network Limit Control NAS ACL DHCP IP Source Guar Configuratior Static Table ARP Inspection Configuratior Static Table AAA A ARP Inspection Configuration Translate dynamic to static Port Mode Configuration lt gt y Disabled y Disabled y Disabled y Disabled x Disabled Disabled y Disabled x DO nm 2 WwW Na 114 Specify ARP Inspection is enabled on which ports Only when both Global Mode and Port Mode on a given port are enabled ARP Inspection is enabled on this given port Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values Translate dynamic to static Click to translate all dynamic entries to static entries Static ARP Inspection Table gipnet pares cea 7 Static ARP Inspection Table Power Reduction Ports Delete Port VLAN ID MAC Address IP Address Security Users Privilege Levels Auth Method SSH HTTPS Access Management SNMP RMON Network Limit Control NAS ACL DHCP IP Source Guar Configuratior Static Table ARP Inspection Configuratior Static Table Check to delete the entry It will be deleted during the next save The logical port for the settings The VLAN ID for the settings 115 Allowed Source MAC address in A
260. onfiguration of the switch on this page Only the IP configuration is retained The new configuration is available immediately which means that no restart is necessary Factory Defaults Are you sure you want to reset the configuration to Factory Defaults Yes No Yes Click to reset the configuration to Factory Defaults No Click to return to the Port State page without resetting the configuration 277 Note Restoring factory default can also be performed by making a physical loopback between port 1 and port 2 within the first minute from switch reboot In the first minute after boot loopback packets will be transmitted at port 1 If a loopback packet is received at port 2 the switch will do a restore to default 23 3 Software Upload 23 3 1 Firmware Update This page facilitates an update of the firmware controlling the switch gipnet ih daa Software Upload Diagnostics EE as Browser No file selected Upload Restart Device Factory Defaults Software Upload Image Select Configuration Browse to the location of a software image you can see the file name in the right of the Browse command Click Upload to start the process Firmware update in progress The uploaded firmware image is being transferred to flash The system will restart after the update Until then do not reset or power off the device Waiting please stand by After the software image is uploaded a pag
261. opic and configuration guide 4 1 1 Security Switch Users Configuration This page provides an overview of the current users Currently the only way to login as another user on the web server is to close and reopen the browser 4ipnet Configuration System Users Configuration Power Reduction Ports User Name Privilege Level Security admin 15 Switch o Users Add New User Privilege Levels Auth Method SSH HTTPS Access Management SNMP RMON Network AAA This page configures a user This is also a link to Add User amp Edit User Add New User Edit User Click Add New User the configuration page goes to Add User screen You can see the User Setting table follow the below instruction to fill the table Click the created User Name the page goes to Edit User screen you can change the settings on it 65 4ipnet Configuration i de Add User Power Reduction Ports Security Switch Users Privilege Levels Auth Method SSH HTTPS Access RMON Network 1 l A string identifying the user name that this entry should belong to The allowed string length is 1 to 32 The valid user name is a combination of letters numbers and underscores The password of the user The allowed string length is O to 32 The privilege level of the user The allowed range is 1 to 15 If the privilege level value is 15 it can access all groups i e that is granted the fully
262. oping is applied to IPv6 Multicast The commands are the same as above IGMP Snooping IPv4 Commands Just chooses mid instead of igmp when seeing mld igmp in the syntax The IP Address should be IPv6 format for sure 10 LLDP Configuration 305 Feature Command Line LLDP Parameters LLDP Timers Syntax LLDP Interval lt interval gt LLDP Hold lt hold gt LLDP Delay lt delay gt LLDP Reinit lt reinit gt Example LLDP gt interval 30 LLDP gt hold 4 LLDP gt delay 2 LLDP gt reini 2 LLDP Mode Syntax LLDP Mode lt port_list gt enable disable rx tx rx RX Only tx TX Only Example Enable LLDP on Ports LLDP gt mode 1 10en Port 1 10 are enabled LLDP gt mode 1 26 en _ Port 1 26 are enabled CDP aware Syntax LLDP cdp_aware lt port_list gt enable disable Example Enable CDP on Port 1 5 LLDP gt cdp a 1 5en CDP on Port 1 5 are enabled LLDP Optional_TLV Parameters Syntax LLDP optional_TLV lt port_list gt port_descr sys_name sys_descr sys_capa mgmt_addr enable disable Example LLDP gt option 1 3 port en LLDP gt option 1 3 sys_name en LLDP gt option 1 3 sys_desc en LLDP gt option 1 3 sys capa en LLDP gt option 1 3 mgmt_add en 11 Power over Ethernet Configuration Feature Command Line PoE Configuration PoE Configuration Syntax PoE Mgmt_mode class_con class_res al_conl al_res lldp_res lldp_co
263. or Information poeswitch System gt log level inf Warning poeswitch System gt log level war Error poeswitch System gt log level err Clear Syslog Syntax System Log Clear alllinfo warning error poeswitch System gt log clear all System Log Configuration poeswitch System gt log conf System Log Configuration System Log Server Mode Enabled System Log Server Address 192 168 2 100 System Log Level Error 2 Power Reduction Feature Command Line LED Power Reduction LED Intensity Times Syntax led_power timers lt hour gt lt intensity gt Parameters lt hour gt The hour 0 24 at which to change LEDs intensity lt intensity gt The LED intensity in 0 100 Example Time 2 00 Intensity 30 led_power gt timer 2 30 Maintenance Syntax led_power maintenance lt maintenance_time gt on_at_errors leave_at_errors Parameters lt maintenance_time gt Time in seconds 0 65535 that the LEDs shall be turned on when any port changes link state on_at_errors leave_at_errors on_at_error if LEDs shall be turned on if any errors has been detected leave_at_errors if no LED change shall happen when errors have been detected Example led_power gt main 20 286 led_power gt main 20on 20 sec on_ad_errors enabled EEE Configuration EEE Port Syntax EEE Mode lt port_list gt enable disable Configuration Pa
264. or an untagged VLAN Untagged indicates that the device is using an untagged frame format and as such does not include a tag header as defined by IEEE 802 1Q 2003 In this case both the VLAN ID and the Layer 2 priority fields are ignored and only the DSCP value has relevance Tagged indicates that the device is using the IEEE 802 1Q tagged frame format and that both the VLAN ID and the Layer 2 priority values are being used as well as the DSCP value The tagged format 150 includes an additional field known as the tag header The tagged frame format also includes priority tagged frames as defined by IEEE 802 1Q 2003 VLAN identifier VID for the port as defined in IEEE 802 1Q 2003 L2 Priority is the Layer 2 priority to be used for the specified application type L2 Priority may specify one of eight priority levels 0 through 7 as defined by IEEE 802 1D 2004 A value of 0 represents use of the default priority as defined in IEEE 802 1D 2004 DSCP value to be used to provide Diffserv node behavior for the specified application type as defined in IETF RFC 2474 DSCP may contain one of 64 code point values 0 through 63 A value of 0 represents use of the default DSCP value as defined in RFC 2475 Click to add a new policy Specify the Application type Tag VLAN ID L2 Priority and DSCP for the new policy Click Save Port Policies Configuration Every port may advertise a unique set of network policies or different attribute
265. or having the network discovery information up to date The interval between each LLDP frame is determined by the Tx Interval value Valid values are restricted to 5 32768 seconds Each LLDP frame contains information about how long the information in the LLDP frame shall be considered valid The LLDP information valid period is set to Tx Hold multiplied by Tx Interval seconds Valid values are restricted to 2 10 times If some configuration is changed e g the IP address a new LLDP frame is transmitted but the time between the LLDP frames will always be at least the value of Tx Delay seconds Tx Delay cannot be larger than 1 4 of the Tx Interval value Valid values are restricted to 1 8192 seconds 143 When a port is disabled LLDP is disabled or the switch is rebooted an LLDP shutdown frame is transmitted to the neighbouring units signaling that the LLDP information isn t valid anymore Tx Reinit controls the amount of seconds between the shutdown frame and a new LLDP initialization Valid values are restricted to 1 10 seconds LLDP Port Configuration The LLDP port settings relate to the currently selected stack unit as reflected by the page header Port The switch port number of the logical LLDP port Mode Select LLDP mode Rx only The switch will not send out LLDP information but LLDP information from neighbour units is analyzed Tx only The switch will drop LLDP information received from neighbours but will send out
266. or port configuration It should be noted that LLDP MED is not intended to run on links other than between Network Connectivity Devices and Endpoints and therefore does not need to advertise the multitude of network 149 policies that frequently run on an aggregated link interior to the LAN Delete Check to delete the policy It will be deleted during the next save Policy ID ID for the policy This is auto generated and shall be used when selecting policies that shall be mapped to the specific ports Application Type Intended use of the application types 1 Voice for use by dedicated IP Telephony handsets and other similar appliances supporting interactive voice services These devices are typically deployed on a separate VLAN for ease of deployment and enhanced security by isolation from data applications 2 Voice Signaling conditional for use in network topologies that require a different policy for the voice signaling than for the voice media This application type should not be advertised if all the same network policies apply as those advertised in the Voice application policy 3 Guest Voice support a separate limited feature set voice service for guest users and visitors with their own IP Telephony handsets and other similar appliances supporting interactive voice services 4 Guest Voice Signaling conditional for use in network topologies that require a different policy for the guest voice signaling than for
267. or the sender IP filter you can enter a specific sender IP mask in dotted decimal notation Specify the target IP filter for this specific ACE Any No target IP filter is specified Target IP filter is don t care Host Target IP filter is set to Host Specify the target IP address in the Target IP Address field that appears Network Target IP filter is set to Network Specify the target IP address and target IP mask in the Target IP Address and Target IP Mask fields that appear When Host or Network is selected for the target IP filter you can enter a specific target IP address in dotted decimal notation When Network is selected for the target IP filter you can enter a specific target IP mask in dotted decimal notation Specify whether frames can hit the action according to their sender hardware address field SHA settings 0 ARP frames where SHA is not equal to the SMAC address 1 ARP frames where SHA is equal to the SMAC address Any Any value is allowed don t care Specify whether frames can hit the action according to their target hardware address field THA settings 0 RARP frames where THA is not equal to the DMAC address 1 RARP frames where THA is equal to the DMAC address Any Any value is allowed don t care 104 Specify whether frames can hit the action according to their ARP RARP hardware address length HLN and protocol address length PLN settings 0 ARP RARP frames where the HLN is
268. ormation found og Detailed Log Ports Security LACP Loop Protection Spanning Tree Bridge Status Port Status Port Statistics MVR IPMC LLDP Neighbours Neighbours PoE EEE Port Statistics PoE MAC Table VLANS VCL sFlow Maintenance The port for this switch on which the LLDP frame was received The Power Type represents whether the device is a Power Sourcing Entity PSE or Power Device PD If the Power Type is unknown it is represented as Reserved 260 Power Source The Power Source represents the power source being utilized by a PSE or PD device If the device is a PSE device it can either run on its Primary Power Source or its Backup Power Source If it is unknown whether the PSE device is using its Primary Power Source or its Backup Power Source itis indicated as Unknown If the device is a PD device it can either run on its local power supply or it can use the PSE as power source lt can also use both its local power supply and the PSE If it is unknown what power supply the PD device is using it is indicated as Unknown Power Priority Power Priority represents the priority of the PD device or the power priority associated with the PSE type device s port that is sourcing the power There are three levels of power priority The three levels are Critical High and Low If the power priority is unknown it is indicated as Unknown Maximum Power The Maximum Power Value contains a numerica
269. owing administrative states e Port based 802 1X e Single 802 1X e Multi 802 1X e MAC based Auth Last Supplicant Client Info wens eee name IT O MAC Address dot1xAuthLastEapolFrameSource The MAC address of the last supplicant client The VLAN ID on which the last frame from the last VLAN ID supplicant client was received 802 1X based The protocol version number carried in the most Version dot1xAuthLastEapolFrameVersion recently received EAPOL frame MAC based Not applicable 213 802 1X based The user name supplicant identity carried in the most recently received Response Identity EAPOL Identity frame MAC based Not applicable Selected Counters The Selected Counters table is visible when the port is in one of the following administrative states e Multi 802 1X e MAC based Auth The table is identical to and is placed next to the Port Counters table and will be empty if no MAC address is currently selected To populate the table select one of the attached MAC Addresses from the table below Attached MAC Addresses Shows the identity of the supplicant as received in the Response Identity EAPOL frame Clicking the link causes the supplicant s EAPOL and Backend Server counters to be shown in the Selected Counters table If no supplicants are attached it shows No supplicants attached This column is not available for MAC based Auth For Multi 802 1X this column holds the MAC a
270. pability is followed by Management Address is the neighbour unit s address that is used for higher layer entities to assist discovery by the network management This could for instance hold the neighbour s IP address Buttons Refresh Click to refresh the page immediately Auto refresh Check this box to enable an automatic refresh of the page at regular intervals 255 21 9 2 LLDP MED Neighbours This page provides a status overview of all LLDP MED neighbours The displayed table contains a row for each port on which an LLDP neighbour is detected This function applies to VoIP devices which support LLDP MED The columns hold the following information gipnet Configuration a i Monitor LLDP MED Neighbour Information Auto refresh System Port Information CPU Load No LLDP MED neighbour information found Refresh ol Detailed Log Ports Security LACP Loop Protection Spanning Tree Bridge Status Port Status Port Statistics IPMC LLDP Neighbours LLDP MED Neighbours oE EEE Port Statistics E ol MAC Table VLANs VCL sFlow Diagnostics Maintenance Port The port on which the LLDP frame was received Device Type LLDP MED Devices are comprised of two primary Device Types Network Connectivity Devices and Endpoint Devices LLDP MED Network Connectivity Device Definition LLDP MED Network Connectivity Devices as defined in TIA 1057 provide access to the IEEE 802 based LA
271. pecific If you want to filter a specific source MAC address with this ACE choose this value A field for entering an SMAC value appears 102 When Specific is selected for the SMAC filter you can enter a specific source MAC address The legal format is XX XX XX XX XX XX A frame that hits this ACE matches this SMAC value Specify the destination MAC filter for this ACE Any No DMAC filter is specified DMAC filter status is don t care MC Frame must be multicast BC Frame must be broadcast UC Frame must be unicast Specific If you want to filter a specific destination MAC address with this ACE choose this value A field for entering a DMAC value appears When Specific is selected for the DMAC filter you can enter a specific destination MAC address The legal format is xx xx xx xx xx xx A frame that hits this ACE matches this DMAC value VLAN Parameters Specify whether frames can hit the action according to the 802 1Q tagged The allowed values are Any Any value is allowed don t care Enabled Tagged frame only Disabled Untagged frame only The default value is Any Specify the VLAN ID filter for this ACE Any No VLAN ID filter is specified VLAN ID filter status is don t care Specific If you want to filter a specific VLAN ID with this ACE choose this value A field for entering a VLAN ID number appears When Specific is selected for the VLAN ID filter you can enter a specific VLAN ID
272. pecific EtherType filter with this ACE you can enter a specific EtherType value A field for entering a EtherType value appears When Specific is selected for the EtherType filter you can enter a specific EtherType value The allowed range is 0x600 to OxFFFF but excluding 0x800 IPv4 Ox806 ARP and 0x86DD IPv6 A frame that hits this ACE matches this EtherType value Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values Cancel Return to the previous page 108 4 4 2 4 Switch Network DHCP Configuration DHCP Snooping Configuration Configure DHCP Snooping on this page Indicates the DHCP snooping mode operation Possible modes are Enabled Enable DHCP snooping mode operation When DHCP snooping mode operation is enabled the DHCP request messages will be forwarded to trusted ports and only allow reply packets from trusted ports Disabled Disable DHCP snooping mode operation Indicates the DHCP snooping port mode Possible port modes are Trusted Configures the port as trusted source of the DHCP messages Untrusted Configures the port as untrusted source of the DHCP messages 4ipnet pr als 7 DHCP Snooping Configuration Power Reduction Ports Disabled x Security Switch Users Privilege Levels Port Mode Configuration Auth Method SSH HTTPS Access ha Management SNMP 1 Trusted RMON 2 Trusted Network 3 Trusted
273. ping Port Mode lt port_list gt trusted untrusted Security Network DHCP Snooping Statistics lt port_list gt clear Example Security Network gt dhcp snooping mode en Security Network gt dhcp snooping port mode 1 tru Port 1 Security Network gt dhcp snooping port mode 1 10 tru Port 1 10 DHCP Relay Syntax Security Network DHCP Relay Mode enable disable Security Network DHCP Relay Server lt ip_addr gt Security Network DHCP Relay Information Mode enable disable Security Network DHCP Relay Information Policy replace keep drop Example Security Network gt dhcp relay server 192 168 2 100 Security Network gt dhcp relay mode en Assign one Server IP before enable the Relay mode Security Network gt dhcp rel info mode en Security Network gt dhcp rel info policy keep IP Source Guard IP Source Guard Configuration Syntax Security Network IP Source Guard Configuration Security Network IP Source Guard Mode enable disable Security Network IP Source Guard Port Mode lt port_list gt enable disable Security Network IP Source Guard limit lt port_list gt lt dynamic_entry_limit gt unlimited Security Network IP Source Guard Entry lt port_list gt add delete lt vid gt lt allowed_ip gt lt allowed_mac gt Security Network IP Source Guard Status lt port_list gt 297 Security Network IP Source Guard Translation Example Security Network gt ip source guard mode en Se
274. port 11 15 Info 1970 01 02T07 01 21 08 00 Link down on port 11 16 Info 1970 01 02T07 01 25 08 00 Link up on port 11 1 Info 1970 01 02T07 09 27 08 00 Link down on port 11 18 Info 1970 01 02T07 09 31 08 00 Link up on port 11 19 Info 1970 01 02T07 10 59 08 00 Link down on port 11 20 Info__1970 01 02T07 18 51 08 00 Link down on port 10 The level of the system log entry The following level types are supported Info Information level of the system log Warning Warning level of the system log Error Error level of the system log All All levels The time of the system log entry The message of the system log entry Buttons Auto refresh Check this box to enable an automatic refresh of the page at regular intervals Refresh Updates the system log entries starting from the current entry ID Clear Flushes all system log entries lt lt Updates the system log entries starting from the first available entry ID lt lt Updates the system log entries ending at the last entry currently displayed gt gt Updates the system log entries starting from the last entry currently displayed gt gt Updates the system log entries ending at the last available entry ID 195 21 1 4 System Detailed Log The switch system e i 4ipnet Ea Cl Detailed System Log Information Refresh k lt lt lt gt gt gt gt System Information o 1 CPU Load Detailed Log Ports Sul
275. processing allows the switch to remove an interface from the forwarding table entry without first sending out group specific queries to the interface The VLAN interface is pruned from the multicast tree for the multicast group specified in the original leave message Fast leave processing ensures optimal bandwidth management for all hosts on a switched network even when multiple multicast groups are in use simultaneously This processing applies to IGMP and MLD Enable to limit the number of multicast groups to which a switch port can belong Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 136 9 1 2 IGMP Snooping VLAN Configuration Navigating the IGMP Snooping VLAN Table Each page shows up to 99 entries from the VLAN table default being 20 selected through the entries per page input field When first visited the web page will show the first 20 entries from the beginning of the VLAN Table The first displayed will be the one with the lowest VLAN ID found in the VLAN Table The VLAN input fields allow the user to select the starting point in the VLAN Table Clicking the button will update the displayed table starting from that or the next closest VLAN Table match The will use the last entry of the currently displayed entry as a basis for the next lookup When the end is reached the text No more entries is shown in the displayed table Use the button to start
276. ps and VLAN port configuration such as PVID UVID Currently we support following VLAN User types CLI Web SNMP These are referred to as static NAS NAS provides port based authentication which involves communications between a Supplicant Authenticator and an Authentication Server MVRP Multiple VLAN Registration Protocol MVRP allows dynamic registration and deregistration of VLANs on ports on a VLAN bridged network Voice VLAN Voice VLAN is a VLAN configured specially for voice traffic typically originating from IP phones MVR MVR is used to eliminate the need to duplicate multicast traffic for subscribers in each VLAN Multicast traffic for all channels is sent only on a single multicast VLAN MSTP The 802 1s Multiple Spanning Tree protocol MSTP uses VLANs to create multiple spanning trees in a network which significantly improves network resource utilization while maintaining a loop free environment Port 270 The logical port for the settings contained in the same row Shows the VLAN identifier for that port The allowed values are 1 through 4095 The default value is 1 Shows the Port Type Port type can be any of Unaware C port S port Custom S port If Port Type is Unaware all frames are classified to the Port VLAN ID and tags are not removed C port is Customer Port S port is Service port Custom S port is S port with Custom TPID Shows the ingress filtering on a port This parameter affects
277. pvid z or a e a e Private VLANs 5 Unaware Y a An w Specific 1 Untag_pvid AN Gil Unaware iw E An El Speci e 1 Untag_pvid gt 7 Unaware Y a All Specific 1 Untag_pvid Mirroring PnP 8 Unaware m All B Specific v 1 Untag _pvid y a 9 Unaware EA la All Specific EA 1 Untag_pvid E Diagnostics 10 C port gt E All 2 Specific x 20 Untag_pvid y Maintenances 11 C pon A Al E Specific 20 Untag_pvid gt 12 C port Y E All Specific r 20 Untag_pvid This field specifies the ether type used for Custom S ports This is a global setting for all the Custom S ports This is the logical port number of this row Port can be one of the following types Unaware Customer port C port Service port S port Custom Service port S custom port If Port Type is Unaware all frames are classified to the Port VLAN ID and tags are not removed Enable ingress filtering on a port by checking the box This parameter affects VLAN ingress processing If ingress filtering is enabled and the ingress port is not a member of the classified VLAN of the frame the frame is discarded By default ingress filtering is disabled no checkmark Determines whether the port accepts all frames or only tagged untagged frames This parameter affects VLAN ingress processing If the port only accepts tagged frames untagged frames received on
278. r Both Changing the discovery protocol to OUI or LLDP will restart the auto detect process Possible discovery protocols are OUI Detect telephony device by OUI address LLDP Detect telephony device by LLDP Both Both OUI and LLDP Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 16 2 Voice VLAN OUI Configuration Configure VOICE VLAN OUI table on this page The maximum entry number is 16 Modifying the OUI table will restart auto detection of OUI process 171 gipnet ge e Voice VLAN OUI Table Power Reduction Ports Security Aggregation Loop Protection Spanning Tree MVR IPMC 00 01 e3 Siemens AG phones 00 03 6b Cisco phones 00 0f e2 H3C phones 00 60 b9 Philips and NEC AG phones 00 d0 1e Pingtel phones 00 e0 75 Polycom phones 00 e0 bb 3Com phones o A F o Private VLANs VCL Voice VLAN Configuration Save Reset oul Qos Mirroring UPnP sFlow Monitor Diagnostics Maintenance Check to delete the entry It will be deleted during the next save Atelephony OUI address is a globally unique identifier assigned to a vendor by IEEE It must be 6 characters long and the input format is xx xx xx x is a hexadecimal digit The description of OUI address Normally it describes which vendor telephony device it belongs to The allowed string length is 0 to 32
279. r a specific ICMP value The allowed range isO to 255 A frame that hits this ACE matches this ICMP value 106 Specify the ICMP code filter for this ACE Any No ICMP code filter is specified ICMP code filter status is don t care Specific If you want to filter a specific ICMP code filter with this ACE you can enter a specific ICMP code value A field for entering an ICMP code value appears When Specific is selected for the ICMP code filter you can enter a specific ICMP code value The allowed range is 0 to 255 A frame that hits this ACE matches this ICMP code value TCP UDP Parameters Specify the TCP UDP source filter for this ACE Any No TCP UDP source filter is specified TCP UDP source filter status is don t care Specific If you want to filter a specific TCP UDP source filter with this ACE you can enter a specific TCP UDP source value A field for entering a TCP UDP source value appears Range If you want to filter a specific TCP UDP source range filter with this ACE you can enter a specific TCP UDP source range value A field for entering a TCP UDP source value appears When Specific is selected for the TCP UDP source filter you can enter a specific TCP UDP source value The allowed range is 0 to 65535 A frame that hits this ACE matches this TCP UDP source value When Range is selected for the TCP UDP source filter you can enter a specific TCP UDP source range value The allowed range is 0 to 65535 A frame
280. r firmware releases This does not constitute an error Image Information The flash index name of the firmware image The name of primary preferred image is image the alternate image is named image bk The version of the firmware image The date where the firmware was produced Buttons 279 Activate Alternate Image Click to use the alternate image This button may be disabled depending on system state Cancel Cancel activating the backup image Navigates away from this page 23 4 Configuration You can save view or load the switch configuration The configuration file is in XML format with a hierarchy of tags Header tags lt xml version 1 0 gt and lt configuration gt These tags are mandatory and must be present at the beginning of the file Section tags lt platform gt lt global gt and lt switch gt The platform section must be the first section tag and this section must include the correct platform ID and version The global section is optional and includes configuration which is not related to specific switch ports The switch section is optional and includes configuration which is related to specific switch ports Module tags lt ip gt lt mac gt lt port gt etc These tags identify a module controlling specific parts of the configuration Group tags lt port table gt lt vlan table gt etc These tags identify a group of parameters typically a table Parameter tags lt mode gt
281. ral Components checked are used by thiscon You can get IP settings assigned automatically if your network supports NWLink NetBIOS this capability Otherwise you need to ask your network administrator for batt the appropriate IP settings Y NWLink IPX SPX NetBIOS Compe 7 Internet Protocol TCP IP JKK C Obtain an IP address automatically m Use the following IP address Install ENA IP address 192 168 2 30 nstall Uninstall Description Subnet mask 25520 2550 50 Transmission Control Protocol Internet P Default gateway Aa wide area network protocol that provides across diverse interconnected networks Obtain DNS server address automatically IV Show icon in taskbar when connected Use the following DNS server addresses Preferred DNS server Altemate DNS server Advanced Cancel Launch the web browser and Login 21 Launch the web browser Internet Explorer or Mozilla Firefox on the PC Type http 192 168 2 1 or the IP address of the switch And then press Enter The login screen will appear ONO Enter the username and password The default user name and password are both admin If you cannot login to the switch the following steps can help you to identify the problem 1 Switch to DOS command mode and type the ipconfig to check the NIC s setting Type the ping 192 168 2 1 to verify a norma
282. rameters lt port_list gt Port list or all default All ports enable Enable EEE disable Disable EEE Example Enable Port 1 5 EEE gt mode 1 5 en Urgent Queue of Port Syntax EEE Urgent_queues lt port_list gt lt queue_list gt Parameters lt port_list gt Port list or all default All ports lt queue_list gt List of queues to configure as urgent queues 1 8 or none Example Enable Urgent_Queue on Port 1 5 EEE gt urge 1 5 2 3 Port Configuration Feature Command Line Port Configuration Port Group poeswitch gt port Type up to move up one level or to go to root level poeswitch Port gt Link State Syntax Port State lt port_list gt enable disable Example Enable Disable Port 1 State After port 1 disabled the port can t access the switch Port gt state 1 en Port gt state 1 dis Link Speed and Duplex Flow Control Syntax Port Mode lt port_list gt auto 1 Ohdx 1 Ofdx 100hdx 1 00fdx 1000fdx sfp_auto_ams 100 0Ox_ams 100fx_ams 1000x 1 0Ofx Example Port gt mode 2 1000fdx Configure port 2 to 1000 Full Duplex Port gt mode 1 4 1000fdx Configure port 1 4 to 1000 Full Duplex Syntax Port Flow Control lt port_list gt enable disable 287 Example Port gt flow cont 1 en Enable Flow Control on Port 1 Port gt flow cont 1 dis Disable Flow Control on Port 2 Maximum Frame Size Syntax Port Ma
283. ration System Power Reduction A RADIUS Assigned RADIUS Assigned Guest Ports Port We QoS Enabled VLAN Enabled VLAN Enabled Port State Restart Security TP a Switch J ie ae 1 Force Authorized x Globally Disabled Reauthenticate Reinitialize ivi T J Force Authorized Auth Method Reauthe Re alize sa eino EE Force Unauthorized Globally Disabled Reauthent Reinitializ HTTPS 3 Port based 802 1X Globally Disabled Reauthenticate Reinitialize Access Single 802 1X Management 4 Multi 802 1X Globally Disabled Reauthenticate Reinitialize SNMP MAC based Auth RMON 5 Force Authorized Globally Disabled Reauthenticate Reinitialize tic ee 6 Force Authorized Globally Disabled Reauthent Reinitialize aa 7 Force Authorized w Globally Disabled Reinitialize Event a y Network oinitializo Limit Control 8 Force Authorized lr Globally Disabled Reinitialize bite 9 Force Authorized Globally Disabled Reinitialize Droe 10 Force Authorized _ y Globally Disabled Reinitialize IP Source Guar 7 ARP Inspection 11 Force Authorized w Globally Disabled Reauthenticate Reinitialize AAA un F mars 92 Port The port number for which the configuration below applies Admin State If NAS is globally enabled this selection controls the port s authentication mode The following modes are available Force Authorized In this mode the switch will send one EAPOL Success frame when the port link comes up and any
284. re that prevents unauthorized access to a network by requiring users to first submit credentials for authentication One or more central servers the backend servers determine whether the user is allowed access to the network These backend RADIUS servers are configured on the Configuration Security gt AAA page The IEEE802 1X standard defines port based operation but non standard variants overcome security limitations as shall be explored below MAC based authentication allows for authentication of more than one user on the same port and doesn t require the user to have special 802 1 X supplicant software installed on his system The switch uses the user s MAC address to authenticate against the backend server Intruders can create counterfeit MAC addresses which makes MAC based authentication less secure than 802 1 X authentication The NAS configuration consists of two sections a system and a port wide System Configuration Mode Indicates if NAS is globally enabled or disabled on the switch If globally disabled all ports are allowed forwarding of frames Re authentication Enabled If checked successfully authenticated supplicants clients are re authenticated after the interval specified by the Re authentication Period Re authentication for 802 1X enabled ports can be used to detect if a new device is plugged into a switch port or if a supplicant is no longer attached For MAC based ports re authentication is only useful i
285. received on the port are not mirrored The default value is Disabled Forward packet that matched the specific ACE to CPU Forward first packet that matched the specific ACE to CPU The counter indicates the number of times the ACE was hit by a frame Indicates the hardware status of the specific ACE The specific ACE is not applied to the hardware due to hardware limitations 217 gipnet Configuration Monitor System Ports Security Access Management Statistics Network Port Security Switch Port ACL Status DHCP ARP Inspection IP Source Guard AAA Switch RMON LACP Loop Protection Spanning Tree MVR IPMC LLDP PoE MAC Table VLANS VCL sFlow Diagnostics Maintenance Buttons D ACL Status Combined Auto refresh Refresh User Ingress Port Frame Type Action Rate Limiter Port Redirect Mirror CPU CPU Once Counter Conflict Loop Protect 9 12 EType 0x9003 Deny Disabled Disabled Disabled Yes No 2 No DHCP All IPv4 UDP 67 DHCP Client Deny Disabled Disabled Disabled Yes No 1266 No DHCP All IPv4 UDP 68 DHCP Server Deny Disabled Disabled Disabled Yes No 877 No ARP Inspection All ARP Deny Disabled Disabled Disabled Yes No 1400084 No IP Source Guard _9 11 12 IPv4 Deny Disabled Disabled Disabled No No 440 No z Select the ACL status from this drop down list Refresh Click to refresh the page immediately Auto refresh Click this box to enable an
286. red The path cost is used when establishing the active topology of the network Lower path cost ports are chosen as forwarding ports in favor of higher path cost ports Valid values are in the range 1 to 200000000 Controls the port priority This can be used to control priority of ports having identical port cost See above 129 Operational flag describing whether the port is connecting directly to edge devices No Bridges attached Transition to the forwarding state is faster for edge ports havingoperEdge true than for other ports The value of this flag is based on AdminEdge and AutoEdge fields This flag is displayed as Edge in Monitor gt Spanning Tree gt STP Detailed Bridge Status Controls whether the operEdge flag should start as set or cleared The initial operEdge state when a port is initialized Controls whether the bridge should enable automatic edge detection on the bridge port This allows operEdge to be derived from whether BPDU s are received on the port or not If enabled causes the port not to be selected as Root Port for the CIST or any MSTI even if it has the best spanning tree priority vector Such a port will be selected as an Alternate Port after the Root Port has been selected If set it can cause lack of spanning tree connectivity It can be set by a network administrator to prevent bridges external to a core region of the network influence the spanning tree active topology possibly because those bridges
287. resh the page immediately Auto refresh Click this box to enable an automatic refresh of the page at regular intervals 21 4 2 LACP Port Status This page provides a status overview for LACP status for all ports 237 4ipnet Ea Configuration Monitor LACP Status Auto refresh Refresh Information CPU Load Log Detailed Log The switch port number Yes means that LACP is enabled and the port link is up No means that LACP is not enabled or that the port link is down Backup means that the port could not join the aggregation group but will join if other port leaves Meanwhile its LACP status is disabled The key assigned to this port Only ports with the same key can aggregate together The Aggregation ID assigned to this aggregation group The partner s System ID MAC address The partner s port number connected to this port Buttons Refresh Click to refresh the page immediately Auto refresh Click this box to enable an automatic refresh of the page at regular intervals 238 21 4 3 LACP statistics This page provides an overview for LACP statistics for all ports 4ipnet EE Configuration Monitor LACP Statistics Auto refresh C Refresh Clear System Information ere rem ect mransmtnea FUninesa pa Log 1 0 0 0 0 Detailed Log 2 0 0 0 0 3 0 0 0 0 Security 4 0 0 0 0 com 5 0 0 0 0 Status 6 o 0 0 0 pon Seams fl 0 0 0 0 ooo
288. rity name that this entry should belong to The allowed string length is 1 to 32 and the allowed content is ASCII characters from 33 to 126 A string identifying the group name that this entry should belong to The allowed string length is 1 to 32 and the allowed content is ASCII characters from 33 to 126 Buttons Add new group Click to add a new group entry Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values SNMPv3 View Configuration Configure SNMPv3 view table on this page 4ipnet Configuration 2 System Power Reduction Ports Security Switch Users Privilege Levels Auth Method SSH HTTPS Access Management SNMP System Communities Users Groups Views Access RMON Network Limit Control NAS ACL DHCP IP Source Guar ARP Inspection AAA SNMPv3 View Configuration default_view 4 Add New Enty The entry index keys are View Name and OID Sub tree Check to delete the entry It will be deleted during the next save A string identifying the view name that this entry should belong to The allowed string length is 1 to 32 and the allowed content is ASCII characters from 33 to 126 Indicates the view type that this entry should belong to Possible view types are Included An optional flag to indicate that this view sub tree should be included Excluded An optional flag to indicate that this view sub tree should be excluded In general if a view
289. rivate VLANs CL Voice VLAN Qos Mirroring UPnP sFlow Monitor Diagnostics Maintenance Emergency Call Service Policies No entries present _Add New Policy Save Reset 145 Fast start repeat count Fast start repeat count Rapid startup and Emergency Call Service Location Identification Discovery of endpoints is a critically important aspect of VoIP systems in general In addition it is best to advertise only those pieces of information which are specifically relevant to particular endpoint types for example only advertise the voice network policy to permitted voice capable devices both in order to conserve the limited LLDPU space and to reduce security and system integrity issues that can come with inappropriate knowledge of the network policy With this in mind LLDP MED defines an LLDP MED Fast Start interaction between the protocol and the application layers on top of the protocol in order to achieve these related properties Initially a Network Connectivity Device will only transmit LLDP TLVs in an LLDPDU Only after an LLDP MED Endpoint Device is detected will an LLDP MED capable Network Connectivity Device start to advertise LLDP MED TLVs in outgoing LLDPDUs on the associated port The LLDP MED application will temporarily speed up the transmission of the LLDPDU to start within a second when a new LLDP MED neighbour has been detected in order share LLDP MED information as fast as possible to new neighbours Becaus
290. rol Configuration Power Reduction Ports Security Unicast Aggregation Loop Protection Spanning Tree Broadcast MVR IPMC LLDP PoE MAC Table VLANs Private VLANs VCL Voice VLAN Qos Port Classification Port Policing Port Scheduler Port Shaping Port Tag Remarking Port DSCP DSCP Based QoS DSCP Translation DSCP Classification QoS Control List Storm Control Mirroring UPnP sFlow Monitor Diagnostics Maintenance Multicast There is a unicast storm rate control multicast storm rate control and a broadcast storm rate control These only affect flooded frames e frames with a VLAN ID DMAC pair not present on the MAC 187 Address table The configuration indicates the permitted packet rate for unicast multicast or broadcast traffic across the switch Note Frames which are sent to the CPU of the switch are always limited to approximately 4 kpps For example broadcasts in the management VLAN are limited to this rate The management VLAN is configured on the IP setup page The settings in a particular row apply to the frame type listed here Unicast Multicast or Broadcast Enable or disable the storm control status for the given frame type The rate unit is packets per second pps Valid values are 1 2 4 8 16 32 64 128 256 512 1K 2K 4K 8K 16K 32K 64K 128K 256K 512K 1024K 2048K 4096K 8192K 16384K or 32768K Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to pr
291. roup Filtering table Specify the Port and Filtering Group of the new entry Click Save Warning message about the Filtering Group The range of the IP Multicast is 224 0 0 0 239 255 255 255 0 Ue 192 168 2 1 OR mei The value of Group IPv4 Address must be a valid IP address in dotted decimal notation x y z w The following restrictions apply 1 x must be a decimal number between 224 and 239 2 y z and w must be decimal numbers between 0 and 255 Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 9 2 MLD Snooping Configuration This section provides MLD Snooping related configuration The MLD is for IPv6 Multicast Snooping The difference between the 2 IGMP and MLD is that the IGMP is applied to IPv4 Multicast stream the MLD is applied to IPv6 Multicast stream While configuring the MLD Snooping configuration the only thing you need to understand is the IPv6 packet format 9 2 1 Basic Configuration This basic configuration of the MLD IPv6 Multicast Routing Most of the settings are global whereas the Router Port configuration is related to the currently selected stack unit as reflected by the page header Enable the Global MLD Snooping Enable unregistered IPMCv 6 traffic flooding Please note that disabling unregistered IPMCv6 traffic flooding may lead to failure of Neighbour Discovery 139 SSM Source Specific Multicast Range a
292. rrors The number of inbound packets that contained errors preventing them from being deliverable to a higher layer protocol InUnknownProtos The number of the inbound packets that were discarded because of the unknown or un support protocol OutOctets The number of octets transmitted out of the interface including framing characters OutUcastPkts The number of unicast packets that request to transmit OutNUcastPkts The number of broad cast and multi cast packets that request to transmit OutDiscards The number of outbound packets that are discarded event the packets is normal OutErrors The number of outbound packets that could not be transmitted because of errors OutQlen The length of the output packet queue in packets 84 The method of sampling the selected variable and calculating the value to be compared against the thresholds possible sample types are Absolute Get the sample directly Delta Calculate the difference between samples default The value of the statistic during the last sampling period The method of sampling the selected variable and calculating the value to be compared against the thresholds possible sample types are Rising Trigger alarm when the first value is larger than the rising threshold Falling Trigger alarm when the first value is less than the falling threshold RisingOrFalling Trigger alarm when the first value is larger than the rising threshold or less than the falling threshold defa
293. rs QoS Port Scheduler gt wei 1 2 130 Port 1 2 Q1 30 QoS Port Scheduler gt wei 1 2 230 Port 1 2 Q2 30 312 Enable Rate Unit Excess Weight Percent Enable Rate Unit E O 10 10 mo 30 30 1 05 30 30 no 10 10 O ne 10 10 E O 10 10 O Port Shaping Syntax Port Shaper QoS Port Shaper Mode lt port_list gt enable disable QoS Port Shaper Rate lt port_list gt lt bit_rate gt Queue Shaper QoS Port QueueShaper Mode lt port_list gt lt queue_list gt enable disable QoS Port QueueShaper Rate lt port_list gt lt queue_list gt lt bit_rate gt QoS Port QueueShaper Excess lt port_list gt lt queue_list gt enable disable Parameters lt port_list gt Port list or all default All ports lt bit_rate gt Rate in kilo bits per second 100 3300000 Example QoS Port Shaper gt rate 1 2 1000 QoS Port QueueShaper gt mode 1 2 allen Queue Shaper QoS Port QueueShapersrate 1 2 all600 Queue Shaper DSCP Syntax Configuration QoS Port DSCP Translation lt port_list gt enable disable QoS Port DSCP Classification lt port_list gt none zero selected all QoS Port DSCP EgressRemark lt port_list gt disable enable remap_dp_unaware remap_dp_aware Note DSCP is an advanced QoS setting please follow the DSCP table of upper access core switch to configure the table The table of the whole network must be unified Storm
294. rst EAPOL Start or EAPOL Response Identity frame sent by the supplicant An exception to this is when no supplicants are attached In this case the switch sends EAPOL Request Identity frames using the BPDU multicast MAC address as destination to wake up any supplicants that might be on the port The maximum number of supplicants that can be attached to a port can be limited using the Port Security Limit Control functionality MAC based Auth Unlike port based 802 1X MAC based authentication is not a standard but merely a best practices method adopted by the industry In MAC based authentication users are called clients and the switch acts as the supplicant on behalf of clients The initial frame any kind of frame sent by a client is snooped by the switch which in turn uses the client s MAC address as both username and password in the subsequent EAP exchange with the RADIUS server The 6 byte MAC address is converted to a string on the following form xx ocxexx xx Xx that is a dash is used as separator between the lower cased hexadecimal digits The switch only supports the MD5 Challenge authentication method so the RADIUS server must be configured accordingly When authentication is complete the RADIUS server sends a success or failure indication which in turn causes the switch to open up or block traffic for that particular client using the Port Security module Only then will frames from the client be forwarded on the switch There
295. rt_list gt lt pcp_list gt lt dei_list gt lt class gt lt dpl gt QoS Port Classification DSCP lt port_list gt enable disable Range of the Value lt class gt QoS class 0 7 lt dpl gt Drop Precedence Level 0 1 lt pcp gt Priority Code Point 0 7 lt dei gt Drop Eligible Indicator 0 1 Example QoS Port Classification gt clas 1 2 7 QoS Port Classification gt dpl 1 2 1 QoS Port Classification gt pcp 1 2 7 QoS Port Classification gt dei 1 2 1 QoS Port Classification gt tag 1 2 en QoS Port Classification gt dscp 1 2 en QoS Ingress Port Tag Classification Syntax QoS Port Classification Map lt port_list gt lt pcp_list gt lt dei_list gt lt class gt lt dpl gt Port Policing Syntax QoS Port Policer Mode lt port_list gt enable disable QoS Port Policer Rate lt port_list gt lt rate gt QoS Port Policer Unit lt port_list gt kbps fps QoS Port Policer FlowControl lt port_list gt enable disable lt rate gt Rate in kbps or fps 100 3300000 Example QoS Port Policer gt mode 1 2 en QoS Port Policer gt rate 1 2 300 QoS Port Policer gt unit 1 2 kbps QoS Port Policer gt flow 1 2 en Port Scheduler Syntax Syntax QoS Port Scheduler Mode lt port_list gt strictl weighted Example QoS Port Scheduler gt mode 1 2 stric Strict Priority QoS Port Scheduler gt mode 1 2 wei Weighted QoS Egress Port Scheduler and Shape
296. rvals 21 6 STP Bridge Status This page provides a status overview of all STP bridge instances 240 21 6 1 Bridge Status The displayed table contains a row for each STP bridge instance where the column displays the following information El 4ipnet Configuration Monitor STP Bridges Auto refresh C Refresh System tog CIST 32768 00 1F D4 03 04 AD 16384 24 BE 05 55 77 40 24 320000 Steady 2d 19 39 59 Detailed Log Ports The Bridge Instance This is also a link to the STP Detailed Bridge Status The Bridge ID of this Bridge instance The Bridge ID of the currently elected root bridge The switch port currently assigned the root port role Root Path Cost For the Root Bridge it is zero For all other Bridges it is the sum of the Port Path Costs on the least cost path to the Root Bridge The current state of the Topology Change Flag of this Bridge instance The time since last Topology Change occurred Buttons Refresh Click to refresh the page immediately Auto refresh Check this box to enable an automatic refresh of the page at regular intervals 241 21 6 2 STP Port Status This page displays the STP CIST port status for physical ports of the switch STP port status is gipnet Ea Configuration Monitor STP Port Status Auto refresh C Refresh System Information CPU Load 1 Disabled Discarding Log 2 Disabled Discarding Detailed Log 3 Disabl
297. rver is counted as a retransmit as well as a timeout A send to a different server is counted as a Request as well as a timeout This section contains information about the state of the server and the latest round trip time 227 Round Trip Time Radius AuthClientExtRoundTrip Time RADIUS Accounting Statistics Shows the state of the server It takes one of the following values Disabled The selected server is disabled Not Ready The server is enabled but IP communication is not yet up and running Ready The server is enabled IP communication is up and running and the RADIUS module is ready to accept access attempts Dead X seconds left Access attempts were made to this server but it did not reply within the configured timeout The server has temporarily been disabled but will get re enabled when the dead time expires The number of seconds left before this occurs is displayed in parentheses This state is only reachable when more than one server is enabled The time interval measured in milliseconds between the most recent Access Reply Access Challenge and the Access Request that matched it from the RADIUS authentication server The granularity of this measurement is 100 ms A value of 0 ms indicates that there hasn t been round trip communication with the server yet The statistics map closely to those specified in RFC4670 RADIUS Accounting Client MIB Use the server select box to switch between the ba
298. s Buttons The port select box determines which port is affected by clicking the buttons Refresh Click to refresh the page immediately Clear Clears the counters for the selected port Auto refresh Check this box to enable an automatic refresh of the page at regular intervals 21 3 Monitor Security 21 3 1 Security Access Management Statistics This page provides statistics for access management 203 4ipnet ca Configuration Monitor Access Management Statistics Auto refresh El System Information CPU Load HTTP 0 0 0 Log HTTPS 0 0 0 Detailed Log SNMP 0 0 0 Ports TELNET 0 0 0 Security SSH 0 0 0 Access Management Statistics Network AAA Switch LACP Loop Protection Spanning Tree MVR IPMC LLDP PoE MAC Table VLANS VCL sFlow Diagnostics Maintenance The interface type through which the remote host can access the switch Number of received packets from the interface when access management mode is enabled Number of allowed packets from the interface when access management mode is enabled Number of discarded packets from the interface when access management mode is enabled Buttons Auto refresh Click this box to enable an automatic refresh of the page at regular intervals Refresh Click to refresh the page immediately Clear Clear all statistics 21 3 2 Security Network Port Security Switch Status This page shows the Port Security status Port Security is a modu
299. s Buttons Refresh Click to refresh the page immediately Clear Clears the counters for all ports Auto refresh Check this box to enable an automatic refresh of the page at regular intervals 21 2 3 QoS Statistics This page provides statistics for the different queues for all switch ports 198 The displayed counters are gipnet Ea Configuration Monitor Queuing Counters Auto efresh E Refresh Clear System Information CPU Load Log 1 o 0 0 0 0 0 0 0 0 GF 0 0 0 0 9 0 Detailed Log 2 OOO OE CEN Oa OE OE ONO LO OOO MEN 0 Ports 3 o o 0 0 0 0 0 0 60 0 0 60 0 0 0 0 A 4 AAA ANN 0 5 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 apart 6 IAN NN ANA Detailed Statistics 1 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ite 3 PENA A A OA EEE OO A 0 Lace i ow 4 0 0 0 0 0 6 0 8 8 8 8 Seer he u 5477 0 0 0 0 0 0 0 0 0 0 0 0 0 44g MVR 2 ORO HERO NETO NINO EOI OEE OE OO O TOO O EE 0 IPMC 3 o o o 0 0 0 0 0 0 0 0 0 0 0 0 0 LLDP 4 E HE EN REG A A NNO EDEN ONO A PoE 15 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MAC Table 16 WAN IAN 0 VLANS 17 o 0 6 6 6 8 p 0 0 0 0 0 0 VCL 18 A A A PA JE IA A A IA 0 Sos 19 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 posos 20 E A E AL OT TOT 0 eS 21 o o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 A A OO 0 23 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 12433257 A A A A 25 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 26 PA EE PE E A A EA A 0 The logical port for the settings contained in the same row There are 8 QoS queues per port QO is the low
300. s Delete ID Data Source Security Switch Users Privilege Levels Auth Method SSH HTTPS Access Management SNMP RMON Statistics History Alarm Event Check to delete the entry It will be deleted during the next save Indicates the index of the entry The range is from 1 to 65535 Indicates the port ID which wants to be monitored If in stacking switch the value must add 1000 switch ID 1 for example if the port is switch 3 port 5 the value is 2005 Buttons Add new entry Click to add a new community entry Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values RMON History Configuration Configure RMON History table on this page The entry index key is ID gipnet Configuration en RMON History Configuration Power Reduction Ports Security Switch Users Add New Entry Privilege Levels Auth Method SSH HTTPS Access Management SNMP RMON Statistics History Alarm Event i i Check to delete the entry It will be deleted during the next save Indicates the index of the entry The range is from 1 to 65535 Indicates the port ID which wants to be monitored If in stacking switch the value must add 1000 switch ID 1 for example if the port is switch 3 port 5 the value is 2005 Indicates the interval in seconds for sampling the history statistics data The range is from 1 to 3600 default value is 1800 seconds Indicates the maximum d
301. s such as the Statistics History Alarm and Event RMON Group Function Elements Statistics Contains statistics measured Packets dropped packets sent bytes by the probe for each sent octets broadcast packets monitored interface on this multicast packets CRC errors undersize device packets oversize packets fragments jabbers collisions and counters for packets ranging from 64 65 to 127 128 to 255 256 to 511 512 to 1023 and 1024 to 1518 bytes Real time LAN statistics e g utilization collisions CRC errors History Records periodic statistical History of above Statistics samples from a network and stores for retrieval Alarm Definitions for RMON SNMP Interval for sampling particular variable traps to be sent when statistics sample type value of statistics during the exceed defined thresholds last sampling period startup alarm rising threshold rising index falling threshold falling index Events Controls the generation and Event index log index event log time notification of events from this event description device The NMS can get the above information through remotely polling The information from the switch can be collected analyzed and displayed as table or graphic etc 81 RMON Statistics Configuration Configure RMON Statistics table on this page The entry index key is ID gipnet poa a RMON Statistics Configuration Power Reduction Port
302. s authenticating the supplicant according to the port mode If an EAPOL frame is received the port will never be able to go back into the Guest VLAN if the Allow Guest VLAN if EAPOL Seen is disabled Port State 95 The current state of the port It can undertake one of the following values Globally Disabled NAS is globally disabled Link Down NAS is globally enabled but there is no link on the port Authorized The port is in Force Authorized or a single supplicant mode and the supplicant is authorized Unauthorized The port is in Force Unauthorized or a single supplicant mode and the supplicant is not successfully authorized by the RADIUS server X Auth Y Unauth The port is in a multi supplicant mode Currently X clients are authorized and Y are unauthorized Restart Two buttons are available for each row The buttons are only enabled when authentication is globally enabled and the port s Admin State is in an EAPOL based or MAC based mode Clicking these buttons will not cause settings changed on the page to take effect Reauthenticate Schedules a re authentication whenever the quiet period of the port runs out EAPOL based authentication For MAC based authentication re authentication will be attempted immediately The button only has effect for successfully authenticated clients on the port and will not cause the clients to get temporarily unauthorized Reinitialize Forces a re initialization of the clients on the port and
303. s connected 24 1 24 SFP Green On linked to Power Device 25 26 Green Blinking Data Activating 25 26 Rear Panel The 3 pronged power plug is placed at the rear panel on the switch s right as shown below QU la Hardware Installation The switch is usually mounted on a 19 rack installed in the IT room or in a secured place The switch supports AC power input PoE delivery and rack mount mounting Make sure all the power cables Ethernet cables screws and heat dissipation are well prepared and installed as described below AC Power Input Attach the power cord to the AC power input connector the available AC power input ranges from 100 264VAC There are 2 power modules in the switch each of them supports up to 250W With the current sharing technology the 2 modules can deliver power up to 500W Ethernet cable Request The wiring cable types are as below 10 Base T 2 pair UTP STP Cat 3 4 5 cable EIA TIA 568 100 ohm Max 100m 100 Base TX 2 pair UTP STP Cat 5 cable EIA TIA 568 100 ohm Max 100m 1000 Base T 4 pair UTP STP Cat 5 cable EIA TIA 568 100 ohm Max 100m PoE For optimized performance the Cat 5e and Cat 6 cable is suggested Higher quality Ethernet cable reduces loss during power transmission 17 SFP Installation While installing the SFP transceiver make sure the SFP type of the 2 ends are the same and the transmission distance wavelength fiber cable can meet your requirements It is
304. s for the same network policies based on the authenticated user identity or port configuration The port number to which the configuration applies The set of policies that shall apply to a given port The set of policies is selected by check marking the checkboxes that corresponds to the policies Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 151 11 PoE Configuration This section allows the user to inspect and configure the current port settings 4ipnet Configuration System Power Over Ethernet Configuration Power Reduction Ports Reserved Power determined by Class Allocation LLDP MED Security Power Management Mode Actual Consumption Reserved Power Aggregation Loop Protection PoE Power Supply Configuration Spanning Tree MVR Primary Power Supply W IPMC LLDP PoE i MAC Table PoE Port Configuration VLANs Private VLANs Port PoE Mode Priority Maximum Power W VCL a lt gt X lt gt X 15 4 Voice VLAN Qos 1 PoE w Low m 15 4 Mirroring 154 UPnP 2 PoE Low 5 sFlow 3 PoE x Low v 15 4 Monitor 7 Diagnostics 4 PoE j Low m 15 4 Maintenance 5 PoE Low e 15 4 6 PoE X Low x 15 4 7 PoE X Low m 15 4 8 PoE 2 Low m 15 4 Power Over Ethernet Configuration Reserved Power determined by There are
305. s that have the same MSTP configuration comprise of an MST region An MSTP configuration consists of the configuration name the configuration revision and the mapping of VLANs to MSTIs Multiple Spanning Tree Instance General STP Bridge Settings STP Bridge Configuration Basic Settings Forward Delay Maximum Hop Count 20 Transmit Hold Count Advanced Settings Edge Port BPDU Filtering eee Port BPDU Guard Port Error Port Error Recovery Port Error Recovery Timeout 30 Save Reset Bridge Priority Consists of 16 sets of numeric values The lower the Bridge Priority number the higher the priority Forward Delay The time spent between 4 30 seconds in the listening and learning states Max Age The default max age timer is 20 seconds The max age timer is how long a BPDU Bridge Protocol Data Unit is stored before it is flushed If this timer expires before the interface receives a new BPDU the interface transitions to the listening state An expired max age parameter is usually caused by a link failure Maximum Hop Count In the MSTP protocol this value is used for the IST Internal Spanning Tree and the MSTI Multiple Spanning Tree Instance topology as a hop count limit on how far the 41 Spanning Tree protocol packet can propagate inside of a MSTP Region Transmit Hold Count The number of BPDU s a bridge port can send per second For guide on Advanced Settings and MSTI for MSTP configurations p
306. same server i is counted as a retransmit as well as a timeout A send to a different server is counted as a Request as well as a timeout Other Info 229 This section contains information about the state of the server and the latest round trip time Shows the state of the server It takes one of the following values Not Ready Disabled The selected server is disabled Not Ready The server is enabled but IP communication is not yet up and running aReady The server is enabled IP communication is up and running and the RADIUS module is ready to accept accounting attempts Dead X seconds left Accounting attempts were made to this server but it did not reply within the configured timeout The server has temporarily been disabled but will get re enabled when the dead time expires The number of seconds left before this occurs is displayed in parentheses This state is only reachable when more than one server is enabled The time interval measured in milliseconds between the most recent Response and the Request that matched it from the Round Trip radiusAccClientExtRoun RADIUS accounting server The granularity of this measurement is Time dTripTime 100 ms A value of 0 ms indicates that there hasn t been round trip communication with the server yet Buttons The server select box determines which server is affected by clicking the buttons Auto refresh Click this box to enable an automatic refresh of t
307. seconds default last member query interval is 10 in tenths of seconds 1 second Unsolicited Report Interval The Unsolicited Report Interval is the time between repetitions of a host s initial report of membership in a group The allowed range is 0 to 31744 seconds default unsolicited report interval is 1 second Buttons Refresh Refreshes the displayed table starting from the VLAN input fields lt lt Updates the table starting from the first entry in the VALN Table i e the entry with the lowest VLAND ID gt gt Update the table staring with the entry after the last entry currently displayed Save To save the configuration Reset Click to undo any changes made locally and revert to previously saved values 9 1 3 IGMP Snooping Port Group Filtering IGMP Snooping Port Group Filtering Configuration 4ipnet Configuration System IGMP Snooping Port Group Filtering Configuration Power Reduction Ports Delete Port Filtering Groups Security Aggregation Add New Filtering Group Loop Protection eg be IPMC IGMP Snooping Basic Configuration VLAN Configuration Port Group Filtering MLD Snooping LLDP PoE MAC Table VLANs Private VLANs VCL Voice VLAN Qos Mirroring UPnP sFlow Check to delete the entry lt will be deleted during the next save The logical port for the settings 138 The IP Multicast Group that will be filtered Click to add a new entry to the G
308. sis for the next lookup When the end is reached the text No more entries is shown in the displayed table Use the lt lt button to start over MVR Group Table Columns VLAN ID of the group Group ID of the group displayed Ports under this group Buttons Auto refresh Check this box to enable an automatic refresh of the page at regular intervals Refresh Refreshes the displayed table starting from the input fields lt lt Updates the table starting from the first entry in the MVR Group Table 245 gt gt Updates the table starting with the entry after the last entry currently displayed 21 8 Monitor IPMC IGMP Snooping 21 8 1 IGMP Snooping IGMP Snooping Status This page provides IGMP Snooping status e es 4ipnet Ea Configuration IGMP Snooping Status Auto refresh E Refresh Clear Information Statistics CPU Load Log Sesto 118 Verion vereion Siue vanamitoa Receives Receted Receves Resrved Receives Security Router Port T The VLAN ID of the entry Working Querier Version currently Working Host Version currently Shows the Querier status is ACTIVE or IDLE DISABLE denotes the specific interface is administratively disabled The number of Transmitted Queries The number of Received Queries 246 The number of Received V1 Reports The number of Received V2 Reports The number of Received V3 Reports T
309. sources is by aging the entries For ports in MAC based Auth mode re authentication doesn t cause direct communication between the switch and the client so this will not detect whether the client is still attached or not and the only way to free any resources is to age the entry Hold Time This setting applies to the following modes i e modes using the Port Security functionality to secure MAC addresses e Single 802 1X e Multi 802 1X e MAC Based Auth If a client is denied access either because the RADIUS server denies the client access or because the RADIUS server request times out according to the timeout specified on the Configuration Security gt AAA page the client is put on hold in the Unauthorized state The hold timer does not count during an on going authentication In MAC based Auth mode the switch will ignore new frames coming from the client during the hold time The Hold Time can be set to a number between 10 and 1000000 seconds RADIUS Assigned QoS Enabled RADIUS assigned QoS provides a means to centrally control the traffic class to which traffic coming from a successfully authenticated supplicant is assigned on the switch The RADIUS server must be configured to transmit special RADIUS attributes to take advantage of this feature see RADIUS Assigned QoS Enabled below for a detailed description The RADIUS Assigned QoS Enabled checkbox provides a quick way to globally enable disable RADIUS server a
310. specified policy filter status is don t care Specific If you want to filter a specific policy with this ACE choose this value Two field for entering an policy value and bitmask appears When Specific is selected for the policy filter you can enter a specific policy value The allowed range is 0 to 255 When Specific is selected for the policy filter you can enter a specific policy bitmask The allowed range is 0x0 to Oxff Select the switch to which this ACE applies This parameter is reserved to the Stacking model If the switch doesn t support stacking the parameter will not display here Any The ACE applies to any port Switch n The ACE applies to this switch number where n is the number of the switch Select the frame type for this ACE These frame types are mutually exclusive Any Any frame can match this ACE Ethernet Type Only Ethernet Type frames can match this ACE The IEEE 802 3 describes the value of 101 Length Type Field specifications to be greater than or equal to 1536 decimal equal to 0600 hexadecimal ARP Only ARP frames can match this ACE Notice the ARP frames won t match the ACE with ethernet type IPv4 Only IPv4 frames can match this ACE Notice the IPv4 frames won t match the ACE with ethernet type IPv6 Only IPv6 frames can match this ACE Notice the IPv6 frames won t match the ACE with ehternet type Specify the action to take with a frame that hits this ACE Permit The frame th
311. ssigned QoS Class functionality When checked the individual ports ditto setting determine whether RADIUS assigned QoS Class is enabled on that port When unchecked RADIUS server assigned QoS Class is disabled on all ports RADIUS Assigned VLAN Enabled RADIUS assigned VLAN provides a means to centrally control the VLAN on which a successfully authenticated supplicant is placed on the switch Incoming traffic will be classified to and switched on the RADIUS assigned VLAN The RADIUS server must be configured to transmit special RADIUS attributes to take advantage of this feature see RADIUS Assigned VLAN Enabled below for a detailed description 91 The RADIUS Assigned VLAN Enabled checkbox provides a quick way to globally enable disable RADIUS server assigned VLAN functionality When checked the individual ports ditto setting determine whether RADIUS assigned VLAN is enabled on that port When unchecked RADIUS server assigned VLAN is disabled on all ports Guest VLAN Enabled A Guest VLAN is a special VLAN typically with limited network access on which 802 1 X unaware clients are placed after a network administrator defined timeout The switch follows a set of rules for entering and leaving the Guest VLAN as listed below The Guest VLAN Enabled checkbox provides a quick way to globally enable disable Guest VLAN functionality When checked the individual ports ditto setting determines whether the port can be moved into Guest V
312. st table 802 1X based Counts the number of times that the Other switch sends an dot1xAuthBackendOtherRequests ToSupplicant Requests EAP Request packet following the first to the supplicant 211 Auth dot1xAuthBackendAuthSuccesses Successes Auth dot1xAuthBackendAuthFails Failures Responses dotixAuthBackendResponses 212 Indicates that the backend server chose an EAP method MAC based Not applicable 802 1X and MAC based Counts the number of times that the switch receives a success indication Indicates that the supplicant client has successfully authenticated to the backend server 802 1X and MAC based Counts the number of times that the switch receives a failure message This indicates that the supplicant client has not authenticated to the backend server 802 1X based Counts the number of times that the switch attempts to send a supplicant s first response packet to the backend server Indicates the switch attempted communication with the backend server Possible retransmissions are not counted MAC based Counts all the backend server packets sent from the switch towards the backend server for a given port left most table or client right most table Possible retransmissions are not counted Last Supplicant Client Info Information about the last supplicant client that attempted to authenticate This information is available for the foll
313. t RADIUS Syntax Security AAA RADIUS lt server_index gt enable disable 298 Authentication Server lt ip_addr_string gt lt secret gt lt server_port gt Example Security gt aaa radi 1 en 192 168 2 200 password 1812 RADIUS Accounting Server Syntax Security AAA ACCT_RADIUS lt server_index gt enable disable lt ip_addr_string gt lt secret gt lt server_port gt Example Security gt aaa ACCT_radi 1 en 192 168 2 200 password 1813 TACACS Authentication Server Syntax Security AAA TACACS lt server_index gt enable disable lt ip_addr_string gt lt secret gt lt server_port gt Example Security gt aaa tacacs 1 en 192 168 2 200 password 49 AAA Configuration Security gt aaa con AAA Configuration Server Timeout 15 seconds Server Dead Time 300 seconds RADIUS Authentication Server Configuration Server Mode IP Address Secret Port 1 Enabled 192 168 2 200 1315 2 Disabled 182 3 Disabled isi 4 Disabled pa 5 Disabled E RADIUS Accounting Server Configuration Server Mode IP Address Secret Port 1 Enabled 192 168 2 200 fe 2 Disabled isis 3 Disabled dE 4 Disabled deis 5 Disabled ints TACACS Authentication Server Configuration Server Mode IP Address Secret Port 1 Enabled 192 168 2 200 i 2 Disabled is 3 Disabled ie 4 Disabled 48 5 Disabled de Security gt 299 5 Aggregati
314. t lt dip gt lt sport gt lt dport gt lt ip_flags gt tcp lt sip gt lt dip gt lt sport gt lt dport gt lt ip_flags gt lt tcp_flags gt permit deny lt rate_limiter gt lt port_redirect gt lt mirror gt lt logging gt lt shutdown gt Parameters lt ace_id gt ACE ID 1 256 default Next available ID lt ace_id_next gt Next ACE ID 1 256 default Add ACE last port Port ACE keyword lt port_list gt Port list or all default All ports policy Policy ACE keyword lt policy gt Policy number 0 255 lt policy_bitmask gt Policy number bitmask 0x0 0xFF lt tagged gt Tagged of frames any enable disable lt vid gt VLAN ID 1 4095 or any lt tag_prio gt VLAN tag priority 0 7 or any lt dmac_type gt DMAC type any unicast multicast broadcast etype Ethernet Type keyword lt etype gt Ethernet Type 0x600 OxFFFF or any but excluding 0x800 IPv4 Ox806 ARP and 0x86DD IPv6 lt smac gt Source MAC address XX XX XX XX XX XX Or XX XX XX XX XX XX OF XXXXXXXXXXXX X iS a hexadecimal digit or any lt dmac gt Destination MAC address XX XX XX XX XX XX Or XX XX XX XX XX XX OL XXXXXXXXXXXX X S a hexadecimal digit or any arp ARP keyword lt sip gt Source IP address a b c d n or any lt dip gt Destination IP address a b c d n or any lt arp_opcode gt ARP operation code any arp rarp other
315. t lt port_list gt lt path_cost gt Parameters lt msti gt STP bridge instance no 0 7 CIST 0 MSTI1 1 lt port_list gt Port list or all Port zero means aggregations lt path_cost gt STP port path cost 1 200000000 or auto Example Configure CIST 0 Port Path Cost STP gt msti port cost 0 all auto Path cost auto STP gt msti port cost 0 all 100000 Path cost 100000 Port Priority Syntax STP Msti Port Priority lt msti gt lt port_list gt lt priority gt Parameters lt msti gt STP bridge instance no 0 7 CIST 0 MSTI1 1 lt port_list gt Port list or all Port zero means aggregations lt priority gt STP port priority 0 16 32 48 224 240 Example Configure CIST 0 Port Priority STP Msti Port Priority lt msti gt lt port_list gt lt priority gt STP gt msti port priority 0 5 240 Port 5 Priority 240 STP gt msti port priority O all 128 All Ports priority 128 Example Configure MSTI 1 Port Priority STP gt msti port priority 1 5 240 MSTI1 port 5 priority 240 8 MVR Interface Setting Feature Command Line MVR Configuration MVR Mode Syntax MVR Mode enable disable MVR VLAN Syntax MVR VLAN Setup lt mvid gt add del upd Name lt mvr_name gt Example MVR VLAN 2 MVR Name Source2 MVR gt vlan setup 2 add Name Source2 MVR Port Role Syntax MVR VLAN Port lt vid gt lt mvr_name gt lt
316. t so that there is a shutdown time timeout design can help re enable the port link automatically With the Loop Protection feature it can help you to avoid the failure and protect your network General Settings gipnet Configuration System Power Reduction Ports Security Aggregation Loop Protection 2 om Spanning Tree 180 seconds MVR z IPMC LLDP PoE MAC Table VLANS u gt kl gt El agg on 1 Shutdown Port Enable y Voice VLAN 2 Y Shutdown Port x Enable sS e 3 v Shutdown Port i Enable 2 PE 4 Shutdown Port Enable y sFlow S ne Monitor 5 Shutdown Port Enable Diagnostics anena 6 Shutdown Port Enable y 7 Y Shutdown Port 2 Enable Controls whether loop protections is enabled as a whole The interval between each loop protection PDU sent on each port Valid values are 1 to 10 seconds The period in seconds for which a port will be kept disabled in the event of a loop is detected and the port action shuts down the port Valid values are 0 to 604800 seconds 7 days A value of zero will keep a port disabled until next device restart 122 Port Configuration The switch port number of the port Controls whether loop protection is enabled on this switch port Configures the action performed when a loop
317. t down ingress port shut shut_disable Example Security Network ACL gt Action 1 permit 10 dis en log shut Result ACL Configuration Port Policy Action RateL PortC Mirror Logging Shutdown Counter 1 0 Permit 10 Disabled Enabled Enabled Enabled 0 Rate Limiter Syntax ae l Security Network ACL Rate lt rate_limiter_list gt lt rate_unit gt lt rate gt Parameters lt rate_limiter_list gt Rate limiter list 1 16 default All rate limiters lt rate_unit gt IP flags pps kbps default pss lt rate gt Rate in pps 0 100 or kbps 0 100 2 100 3 100 1000000 Example Rate Limiter ID 10 Rate 300kbps Security Network ACL gt rate 10 kbps 300 Result Rate Limiter Rate dll JPS 10 300 KBPS ACL Policy Syntax Security Network ACL Policy lt port_list gt lt policy gt Example Security Network ACL gt policy 1 2 Access Control List Syntax Security Network ACL Add lt ace_id gt lt ace_id_next gt port lt port_list gt policy lt policy gt lt policy_bitmask gt lt tagged gt lt vid gt lt tag_prio gt lt dmac_type gt etype lt etype gt lt smac gt lt dmac gt 295 arp lt sip gt lt dip gt lt smac gt lt arp_opcode gt lt arp_flags gt ip lt sip gt lt dip gt lt protocol gt lt ip_flags gt icmp lt sip gt lt dip gt lt icmp_type gt lt icmp_code gt lt ip_flags gt udp lt sip g
318. t priority This can be used to control priority of ports having identical port cost See above Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 132 8 MVR Multicast VLAN Registration MVR is shot of Multicast VLAN Registration The MVR is a protocol for layer 2 network that enables multicast traffic from a source VLAN to be shared with client subscriber VLANs MVR is typically used for IPTV like service In non MVR environment the IPTV source to different VLAN would be copied multiple copies based on how many client subscriber VLANs it would deliver The IPTV actually delivers the same source with multiple the same content IP streams the duplicated traffic occupies the bandwidth of the uplink port Once the traffic is heavy some unexpected lost or lag appears However after MVR enabled the client subscriber VLANs are registered to the same source VLAN then there is only one source stream will be delivered to the registered VLANs This page provides MVR related configurations 4ipnet Configuration System MVR Configurations Power Reduction Ports MVR Mode Disabled Security Aggregation Loop Protection Spanning Tree VLAN Interface Setting Role I Inactive S Source R Receiver Bridge Settings MSTI Mapping Delete MVR VID MVR Name Mode Taggii Prio LLQI Interface Channel Setti MSTI Priorities CI
319. t save Indicates the start IP address for the access management entry Indicates the end IP address for the access management entry With the Start and End IP address you can assign a range of IP addresses Indicates that the host can access the switch from HTTP HTTPS interface if the host IP address matches the IP address range provided in the entry 71 Indicates that the host can access the switch from SNMP interface if the host IP address matches the IP address range provided in the entry Indicates that the host can access the switch from TELNET SSH interface if the host IP address matches the IP address range provided in the entry Buttons Add New Entry Click to add a new group entry Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 4 1 7 Security Switch SNMP Simple Network Management Protocol SNMP is a protocol used for exchanging management information between network devices The switch supports SNMP and equips lots of OIDs for remote management All the OIDs are unique and corresponding to one feature command The switch can support SNMP V1 V2c and V3 The following commands show how to configure SNMP and its related parameters 4ipnet Configuration A System Power Reduction Ports Security Switch Users Privilege Levels Auth Method SSH HTTPS Access Management SNMP E System Communities Users Groups Views Access RMON Network L
320. ted through the entries per page input field When first visited the web page will show the first 20 entries from the beginning of the MLD SFM Information Table The Start from VLAN and group input fields allow the user to select the starting point in the MLD SFM Information Table Clicking the button will update the displayed table starting from that or the closest next MLD SFM Information Table match In addition the two input fields will upon a button click assume the value of the first displayed entry allowing for continuous refresh with the same start address The will use the last entry of the currently displayed as a basis for the next lookup When the end is reached the text No more entries is shown in the displayed table Use the button to start over MLD SFM Information Table Columns VLAN ID VLAN ID of the group Group Group address of the group displayed 253 Switch port number Indicates the filtering mode maintained per VLAN ID port number Group Address basis It can be either Include or Exclude IP Address of the source Currently system limits the total number of IP source addresses for filtering to be 128 Indicates the Type It can be either Allow or Deny Buttons Auto refresh Check this box to enable an automatic refresh of the page at regular intervals Refresh Refreshes the displayed table starting from the input fields lt lt Updates the table starting from the
321. ted good and bad bytes Includes FCS but excludes framing cg The number of received and transmitted good and bad unicast packets The number of received and transmitted good and bad multicast packets The number of received and transmitted good and bad broadcast packets Acount of the MAC Control frames received or transmitted on this port that have an opcode indicating a PAUSE operation Receive and Transmit Size Counters The number of received and transmitted good and bad packets split into categories based on their respective frame sizes Receive and Transmit Queue Counters The number of received and transmitted packets per input and output queue Receive Error Counters The number of frames dropped due to lack of receive buffers or egress congestion The number of frames received with CRC or alignment errors The number of short frames received with valid CRC 202 The number of long frames received with valid CRC The number of short frames received with invalid CRC The number of long frames received with invalid CRC The number of received frames filtered by the forwarding process 1Short frames are frames that are smaller than 64 bytes 2Long frames are frames that are longer than the configured maximum frame length for this port Transmit Error Counters The number of frames dropped due to output buffer congestion The number of frames dropped due to excessive or late collision
322. ters from 33 to 126 The field is applicable only when SNMP version is SNMPv1 or SNMPv2c If SNMP version is SNMPv3 the community string will be associated with SNMPv3 communities table It provides more flexibility to configure security name than a SNMPv1 or SNMPv2c community string In addition to community string a particular range of source addresses can be used to restrict source subnet Indicates the SNMPv3 engine ID The string must contain an even number in hexadecimal format with number of digits between 10 and 64 but all zeros and all F s are not allowed Change of the Engine ID will clear all original local users SNMP Trap Configuration Configure SNMP trap on this page Indicates the SNMP trap mode operation Possible modes are Enable Enable SNMP trap mode operation Disabled Disable SNMP trap mode operation Indicates the SNMP trap supported version Possible versions are SNMPv1 Set SNMP trap supported version 1 SNMPv2c Set SNMP trap supported version 2c SNMPv3 Set SNMP trap supported version 3 Indicates the community access string when sending SNMP trap packet The allowed string length is 0 to 255 and the allowed content is ASCII characters from 33 to 126 Indicates the SNMP trap destination address Provide the trap destination IPv6 address of this switch IPv6 address is in 128 bit records represented as eight fields of up to four hexadecimal digits with a colon separating each field For example
323. the VLAN ID the fifth and sixth characters are the module ID in standalone device it always equal 0 in stackable device it means switch ID and the last two characters are the port number For example 00030108 means the DHCP message receive form VLAN ID 3 switch ID 1 port No 8 And the option 82 remote ID value is equal the switch MAC address Possible modes are Enabled Enable DHCP relay information mode operation When DHCP relay information mode operation is enabled the agent inserts specific information option 82 into a DHCP 110 message when forwarding to DHCP server and removes it from a DHCP message when transferring to DHCP client It only works when DHCP relay operation mode is enabled Disabled Disable DHCP relay information mode operation Relay Information Policy Indicates the DHCP relay information option policy When DHCP relay information mode operation is enabled if agent receives a DHCP message that already contains relay agent information it will enforce the policy And it only works under DHCP if relay information operation mode is enabled Possible policies are Replace Replace the original relay information when a DHCP message that already contains it is received Keep Keep the original relay information when a DHCP message that already contains it is received Drop Drop the package when a DHCP message that already contains relay information is received Buttons Save Click to save changes Reset
324. the addition of new Private VLANs Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 14 2 Port Isolation Configuration Overview This page is used for enabling or disabling port isolation on ports in a Private VLAN 162 gipnet spectacle Hon Port Isolation Configuration Power Reduction Ports Security Aggregation Loop Protection Spanning Tree MVR IPMC LLDP PoE MAC Table VLANs Private VLANs PVLAN Membership Port Isolation VCL Voice VLAN Qos Mirroring UPnP sFlow Monitor Diagnostics Maintenance A port member of a VLAN can be isolated to other isolated ports on the same VLAN and Private VLAN The port settings relate to the currently selected stack unit as reflected by the page header This feature works across the stack Configuration A check box is provided for each port of a private VLAN When checked port isolation is enabled on that port When unchecked port isolation is disabled on that port By default port isolation is disabled on all ports Buttons Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 163 15 VCL 15 1 VCL MAC Based VLAN Configuration The MAC based VLAN entries
325. the destination you want to connect to Terminal Keyboard Bell Features Ine e Window Rlogin SSH Esa Appearance Load save or delete a stored session Behaviour Translation Saved Sessions Selection Colours Default Settings Connection Close window on exit Always Never Only on clean exit Figure 3 2 Putty Configuration EP COM3 PuTTY Figure 3 3 Putty Login Screen 20 3 2 Preparation for Web Interface The web management interface allows you to use a standard web browser such as Microsoft Internet Explorer Google Chrome or Mozilla Firefox to configure and monitor the switch from anywhere on the network Before you attempt to use the web user interface to manage switch operation verify that your switch is properly installed on your network and that every PC on this network can access the switch via the web browser 1 Verify that your network interface card NIC is operational and that your operating system supports TCP IP protocol 2 Power on the switch and connect your computer to the switch 3 The default IP address for the switch is 192 168 2 1 The Switch and the connected PC should be within the same IP Subnet 4 Change your computer s IP address to 192 168 2 XX or another IP address on the 192 168 2 x For example IP Address 192 168 2 30 Subnet Mask 255 255 255 0 subnet 21x General Connect using E rys LNETOOTK S Fast Errore ME z Gene
326. tically Automatic refresh occurs at regular intervals Refresh Click to refresh the page Note that non committed changes will be lost Clear Click to clear the counter Remove All Click to remove all ACEs ACE Configuration Configure an ACE Access Control Entry on this page An ACE consists of several parameters These parameters vary according to the frame type that you select First select the ingress port for the ACE and then select the frame type Different parameter options are displayed depending on the frame type selected A frame that hits this ACE matches the configuration that is defined here 100 e 4ipnet Configuration System Power Reduction ACE Configuration Users Privilege Levels Auth Method SSH HTTPS Access Management SNMP RMON Statistics History Alarm Event Network Limit Control NAS ACL Ports Rate Limiters Access Control List DHCP IP Source Guar agra Inspedion Save Reset Cancel Disabled y Disabled y Disabled y 0 VLAN Parameters Select the ingress port for which this ACE applies All The ACE applies to all port Port n The ACE applies to this port number where nis the number of the switch port You can select one port or select multiple ports for the entry Specify the policy number filter for this ACE The policy ID should be the same when you want apply it to the ACL or Port Any No policy filter is
327. tocol IPv4 TCP The ACE will match IPv4 frames with TCP protocol IPv4 Other The ACE will match IPv4 frames which are not ICMP UDP TCP IPv6 The ACE will match all IPv6 standard frames Indicates the forwarding action of the ACE Permit Frames matching the ACE may be forwarded and learned Deny Frames matching the ACE are dropped 99 Indicates the rate limiter number of the ACE The allowed range is 1 to 16 When Disabled is displayed the rate limiter operation is disabled Indicates the port copy operation of the ACE Frames matching the ACE are copied to the port number The allowed values are Disabled or a specific port number When Disabled is displayed the port copy operation is disabled Specify the mirror operation of this port Frames matching the ACE are mirrored to the destination mirror port The allowed values are Enabled Frames received on the port are mirrored Disabled Frames received on the port are not mirrored The default value is Disabled The counter indicates the number of times the ACE was hit by a frame You can modify each ACE Access Control Entry in the table using the following buttons O Inserts a new ACE before the current row Edits the ACE row Moves the ACE up the list Moves the ACE down the list Deletes the ACE O The lowest plus sign adds a new entry at the bottom of the ACE listings Buttons Auto refresh Check this box to refresh the page automa
328. tted The number of decline option 53 with value 4 packets received and transmitted The number of ACK option 53 with value 5 packets received and transmitted The number of NAK option 53 with value 6 packets received and transmitted The number of release option 53 with value 7 packets received and transmitted The number of inform option 53 with value 8 packets received and transmitted The number of lease query option 53 with value 10 packets received and transmitted The number of lease unassigned option 53 with value 11 packets received and transmitted The number of lease unknown option 53 with value 12 packets received and transmitted The number of lease active option 53 with value 13 packets received and transmitted Buttons Auto refresh Click this box to enable an automatic refresh of the page at regular intervals Refresh Click to refresh the page immediately Clear Clears the counters for the selected port 219 DHCP Relay Statistics This page provides statistics for DHCP relay 4ipnet ca Configuration Monitor DHCP Relay Statistics Auto refresh E Refresh Clear Server Statistics Information Log Detailed Log Ports 0 0 0 0 0 0 0 0 rity Access Management Client Statistics Network Port Security NAS e 0 0 0 0 0 0 0 Server Statistics The number of packets that are relayed from client to server The number of packets that resu
329. ug 15 gt 15 15 l 1515 SSH HTTPS Diagnostics 5 lz 10 5 x 10 Access Management EEE 5 10 5 x 10 SNMP Pann IP 5 e 10 y 5 y 10 Network E IPMC_LIB 5 x 10 x 5 x 10 Limit Control NAS IPMC_Snooping 5 10 5 m 10 ACL DHCP LACP 5 r 10 x 5 v 10 IP Source Guari ARP Inspection Dg 5 am 10 5 v 10 AAA LLDP_MED 5 a 10 5 10 Aggregation Loop Protection Loop_Protect 5 x 10 5 y 101 Spanning Tree MVR MAC_Table 5 10 5 10 IPMC MVR 5 lim 10 5 10 LLDP PoE Maintenance 15 15 15 v 15 Group Name The name identifying the privilege group In most cases a privilege level group consists of a single module e g LACP RSTP or QoS but a few of them contains more than one The following description defines these privilege level groups in details System Contact Name Location Time zone Log Security Authentication System Access Management Port contains Dot1x port MAC based and the MAC Address Limit ACL HTTPS SSH ARP Inspection and IP source guard IP Everything except ping Port Everything except VeriPHY Diagnostics ping and VeriPHY Maintenance CLI System Reboot System Restore Default System Password Configuration Save Configuration Load and Firmware Load Web Users Privilege Levels and everything in Maintenance Debug Only present in CLI Privilege Levels Every group has an authorization Pr
330. ult Rising threshold value 2147483648 2147483647 Rising event index 1 65535 Falling threshold value 2147483648 2147483647 Falling event index 1 65535 Buttons Add new entry Click to add a new community entry Save Click to save changes Reset Click to undo any changes made locally and revert to previously saved values RMON Event Configuration Configure RMON Event table on this page The entry index key is ID 85 4ipnet Configuration System RMON Event Configuration Power Reduction Ports Delete ID Desc Type Community Event Last Time Security sers Privilege Levels Auth Method SSH HTTPS Access Management SNMP RMON Statistics History Alarm Event Check to delete the entry It will be deleted during the next save Indicates the index of the entry The range is from 1 to 65535 Indicates this event the string length is from 0 to 127 default is a null string Indicates the notification of the event the possible types are None The total number of octets received on the interface including framing characters Log The number of unicast packets delivered to a higher layer protocol SNMPtrap The number of broad cast and multi cast packets delivered to a higher layer protocol LogAndTrap The number of inbound packets that are discarded even the packets are normal Specify the community when trap is sent the string length is from 0 to 127 default is public In
331. uration gt gt System gt gt Time Time Zone Configuration None v 0 16 characters Daylight Saving Time Configuration Disabled M 1 1440 Minutes Select the appropriate time zone for your region from the drop down list Recurring or Non recurring Daylight Saving can also be enabled for the system 28 Chapter 5 Virtual LAN VLAN Virtual Local Area Network is a Layer 2 network partitioned to create multiple distinct broadcast domains which are mutually isolated so that packets can only pass between them There are two concepts of VLAN namely Port Based and Tag Based Port Based VLAN is the idea of assigning ports on the switch to different VLANs Tag Based VLAN follows the IEEE 802 1Q standard which tags a VLAN ID to the packets The tagged VLAN ID does not only apply to the switch but also to the whole network 5 1 VLAN Membership You can configure a port to belong to a VLAN by assigning a membership mode that specifies the kind of traffic the port carries and the VLANSs to which it can belong on the SW1024 Configuration path Configuration gt gt VLANs gt gt VLAN Membership 4ipnet Ea Configuration A x Monitor VLAN Membership Status for Combined users Combined y Auto refresh Refresh System Information Start from VLA
332. utomatic refresh of the page at regular intervals Refresh Refreshes the displayed table starting from the input fields lt lt Updates the table starting from the first entry in the MLD Group Table gt gt Updates the table starting with the entry after the last entry currently displayed 252 MLD SFM Information Table Entries in the MLD SFM Information Table are shown on this page The MLD SFM Source Filtered Multicast Information Table also contains the SSM Source Specific Multicast information This table is sorted first by VLAN ID then by group and then by Port No Different source addresses belong to the same group are treated as single entry with 20 entries per page 4ipnet Configurati ree MLD SFM Information System Information Start from VLAN 1 and Group 00 CPU Load Log Detailed Log VLAN ID Group Port Mode Source Address Type Hardware Filter Switch Powe No more entries Security LACP Loop Protection Spanning Tree Bridge Status Port Status Port Statistics MVR IPMC IGMP Snooping Status Groups Information IPv4 SFM Information MLD Snooping Status Groups Information IPV6 SFM Information LLDP PoE MAC Table VLANs VCL sFlow Diagnostics Maintenance Navigating the MLD SFM Information Table Auto refresh Refresh lt lt gt gt Each page shows up to 64 entries from the MLD SFM Information table default being 20 selec
333. value of the snmp Engine ID of a remote SNMP engine with which this user can communicate In other words if user engine ID equal system engine ID then it is local user otherwise it s remote user A string identifying the user name that this entry should belong to The allowed string length is 1 to 32 and the allowed content is ASCII characters from 33 to 126 Indicates the security model that this entry should belong to Possible security models are NoAuth NoPriv No authentication and no privacy 76 Auth NoPriv Authentication and no privacy Auth Priv Authentication and privacy The value of security level cannot be modified if entry already exists That means it must first be ensured that the value is set correctly Indicates the authentication protocol that this entry should belong to Possible authentication protocols are None No authentication protocol MD5 An optional flag to indicate that this user uses MD5 authentication protocol SHA An optional flag to indicate that this user uses SHA authentication protocol The value of security level cannot be modified if entry already exists That means must first ensure that the value is set correctly A string identifying the authentication password phrase For MD5 authentication protocol the allowed string length is 8 to 32 For SHA authentication protocol the allowed string length is 8 to 40 The allowed content is ASCII characters from 33 to 126 Indicates the priva
334. witch The number of valid EAPOL response frames other than Response Identity frames that have been received by the switch The number of EAPOL Start frames that have been received by the switch The number of valid EAPOL Logoff frames that have been received by the switch The number of EAPOL frames that have been received by the switch in which the frame type is not recognized The number of EAPOL frames that have been received by the switch in which the Packet Body Length field is invalid The number of EAPOL frames of any type that have been transmitted by the switch The number of EAPOL Request Identity frames that have been transmitted by the switch The number of valid EAPOL Request frames other than Request Identity frames that have been transmitted by the switch Backend Server Counters These backend RADIUS frame counters are available for the following administrative states e Port based 802 1X e Single 802 1X e Multi 802 1X e MAC based Auth Direction Name EE Wome peserpton 802 1X based Counts the number of times that the switch receives the first request from the backend server following the first response from the supplicant Indicates that the Access dot1xAuthBackendAccessChallenges backend server has Challenges communication with the switch MAC based Counts all Access Challenges received from the backend server for this port left most table or client right mo
335. x Frames Rx Errors Frames Discarded TLVs Discarded TLVs Unrecognized Org Discarded Age Outs wee 1 0 0 0 0 0 0 0 0 IPMG 2 0 0 0 0 0 0 0 0 LLDP 3 0 0 0 0 0 0 0 0 Neighbours 4 0 0 0 0 0 0 0 0 LLDP 5 0 0 0 0 0 0 0 0 Nelghtboure 6 0 0 0 0 0 0 0 0 ae E 0 0 0 0 0 0 0 0 Port Statistics 8 0 0 0 0 0 0 0 0 PoE 9 0 0 0 0 0 0 0 0 MAC Table 10 47 0 0 0 0 0 0 0 VLANs 1 25 0 0 0 0 0 0 0 ee 12 0 o 0 0 0 o o o 13 0 0 0 0 0 0 0 0 pen 14 6 0 0 0 o 0 0 0 piama 15 0 0 0 0 0 0 0 0 16 0 0 0 0 0 0 0 0 17 0 0 0 0 0 0 0 0 18 0 0 0 0 0 0 0 0 19 0 0 0 0 0 0 0 0 Global Counters It also shows the time when the last entry was last deleted or added It also shows the time elapsed since the last change was detected Shows the number of new entries added since switch reboot Shows the number of new entries deleted since switch reboot Shows the number of LLDP frames dropped due to the entry table being full Shows the number of entries deleted due to Time To Live expiring Local Counters The displayed table contains a row for each port The columns hold the following information The port on which LLDP frames are received or transmitted The number of LLDP frames transmitted on the port 264 The number of LLDP frames received on the port The number of received LLDP frames containing some kind of error If an LLDP frame is received on a port and the switch s internal table has run full the LLDP frame is counted and disc
336. xFrame lt port_list gt lt max_frame gt Example Set port 1 24 s maximum frame size to 9K jumbo frame Port gt maxf 1 24 9600 Port Status Port Status Port gt conf 1 2 Port Configuration Port State Mode Flow Control MaxFrame Power Excessive Link 1 Enabled Auto Disabled 9600 Disabled Discard Down 2 Enabled Auto Disabled 9600 Disabled Discard 1Gfdx Port Mode Port gt mode 2 Port Mode Link 2 Auto 1Gfdx Port Status All Information poeswitch Port gt config Port Configuration Port State Mode Flow Control MaxFrame Power Excessive Link 1 Enabled Auto Disabled 9600 Disabled Discard Down 2 Enabled Auto Disabled 9600 Disabled Discard 1Gfdx 3 Enabled Auto Disabled 9600 Disabled Discard Down Status of Link UP ports poeswitch Port gt conf all up Port Configuration Port State Mode Flow Control MaxFrame Power Excessive Link 2 Enabled Auto Disabled 9600 Disabled Discard 1Gfdx Port Statistic poeswitch Port gt statistic 1 Port 1 Statistics Rx Packets O Tx Packets 0 Rx Octets 0 Tx Octets 0 Rx Unicast 0 Tx Unicast 0 288 4 Security Configuration Feature Command Line Security Switch Configuration Security Switch Group gt securi swi Type up to move up one level or to go to root level Security Switch gt Command Groups Security Switch Users User management Security Switch Privilege Privilege level Security Switch Auth Auth
337. y Displays QCE status It may happen that resources required to add a QCE may not available in that case it shows conflict status as Yes otherwise it is always No Please note that conflict can be resolved by releasing the resource required by the QCE and pressing Refresh button 4ipnet Configuration QoS Control List Configuration Port Classification Port Policing Port Scheduler Port Shaping Port Tag Remarking Port DSCP DSCP Based QoS DSCP Translation DSCP Classification QoS Control List Storm Control Mirroring UPnP sFlow Monitor Diagnostics Maintenance Indicates the classification action taken on ingress frame if parameters configured are matched with the frame s content There are three action fields Class DPL and DSCP Class Classified QoS class DPL Classified Drop Precedence Level DSCP Classified DSCP value You can modify each QCE QoS Control Entry in the table using the following buttons 186 O Inserts a new QCE before the current row Edits the QCE Moves the QCE up the list Moves the QCE down the list Deletes the QCE O The lowest plus sign adds a new entry at the bottom of the QCE listings Buttons Refresh Click to refresh the page This will help to check the latest conflict status after releasing the resources 17 11 QoS Storm Control Configuration Storm control for the switch is configured on this page gipnet Configuration eel Storm Cont
338. ypes nownTypes Radius Auth Client Packets Dropped Ext Packets Dropped Radius Access Requests AuthClientExtAccess Requests Access radiusAuthClientExtAcc Retransmission essRetransmissions s Pending radiusAuthClientExtPen Requests dingRequests radiusAuthClientExtTimeou Timeouts ts Other Info attributes or unknown types are not included as malformed access responses The number of RADIUS Access Response packets containing invalid authenticators or Message Authenticator attributes received from the server The number of RADIUS packets that were received with unknown types from the server on the authentication port and dropped The number of RADIUS packets that were received from the server on the authentication port and dropped for some other reason The number of RADIUS Access Request packets sent to the server This does not include retransmissions The number of RADIUS Access Request packets retransmitted to the RADIUS authentication server The number of RADIUS Access Request packets destined for the server that have not yet timed out or received a response This variable is incremented when an Access Request is sent and decremented due to receipt of an Access Accept Access Reject Access Challenge timeout or retransmission The number of authentication timeouts to the server After a timeout the client may retry to the same server send to a different server or give up A retry to the same se
Download Pdf Manuals
Related Search
Related Contents
。 取扱説明書をご熟読のうえ、正しく安全にお使いください。 ご 仕様書別添資料(PDF:695KB) User`s Manual Nortec Industries MES ElectrodeSteam Humidifiers User's Manual 「レッツゴーアウト」 取扱説明書 TEG-424WS Quick Installation Guide Fujitsu 8000 SERIES User's Manual チャレンジする企業群(5)浜松合同株式会社 DP163 / DP163G - Détendeur-régulateur de pression Copyright © All rights reserved.
Failed to retrieve file