Home
3-Slot 24 Fast Ethernet + 2 Gigabit L2 Managed Switch User`s Manual
Contents
1. Prefix Length No of IP matched No of Addressable IP 132 1 31 2 30 4 2 129 8 6 128 16 14 121 32 30 126 64 62 125 128 126 24 256 254 123 512 510 22 1024 1022 21 2048 2046 20 4096 4094 19 8192 8190 18 16384 16382 17 32768 32766 16 65536 65534 Table 2 4 According to the scheme above a subnet mask 255 255 255 0 will partition a network with the class C It means there will have a maximum of 254 effective nodes existed in this sub netted network and is considered a physical network in an autonomous network So it owns a network IP address which may looks like 168 1 2 0 With the subnet mask a bigger network can be cut into small pieces of network If we want to have more than two independent networks in a worknet a partition to the network must be performed In this case subnet mask must be applied Publication date February 2006 Revision A2 25 User Manual For different network applications the subnet mask may look like 255 255 255 240 This means it is a small network accommodating a maximum of 15 nodes in the network Default gateway For the routed packet if the destination is not in the routing table all the traffic is put into the device with the designated IP address known as default router Basically it is a routing policy The gateway setting is used fo
2. Rule 4 When both accept and deny lists exist then it will deny all connections excluding the connection inside of the accepting range Rule 5 When both accept and deny lists exist then it will deny all connections excluding the connection inside of the accepting range and NOT inside of the denying range at the same time p Deny Accept Denyl Acc Deny Acc Deny Publication date February 2006 Revision A2 44 User Manual Function name Management Security Configuration Function description The switch offers Management Security Configuration function With this function the manager can easily control the mode that the user connects to the switch According to the mode users can be classified into two types Those who are able to connect to the switch Accept and those who are unable to connect to the switch Deny Some restrictions also can be placed on the mode that the user connect to the switch for example we can decide that which VLAN VID is able to be accepted or denied by the switch the IP range of the user could be accepted or denied by the switch the port that the user is allowed or not allowed to connect with the switch or the way of controlling and connecting to the
3. 13 2 1 3 1 Cabling Requirements for TP Ports 13 2 1 3 2 Cabling Requirements for 1000SX LX SFP 100FX Module 14 2 1 3 3 Switch Cascading in Topology 15 2 1 4 Configuring the Management Agent of 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch 18 2 1 4 1 Configuring the Management Agent of 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch through the Serial RS 232 Port 19 2 1 4 2 Configuring the Management Agent of 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch through the Ethernet Port 21 2 1 5 IP Address Assignment 22 2 2 TYPICAL APPLICATIONS 27 CHAPTER 3 OPERATION OF WEB BASED MANAGEMENT 29 3 1 WEB MANAGEMENT HOME OVERVIEW 31 3 1 1 System Information 35 3 1 2 IP Configuration 37 3 1 3 Time Configuration 40 3 1 4 Account Configuration
4. 143 3 20 FIRMWARE UPGRADE 145 3 21 REBOOT 146 3 22 LOGOUT 147 CHAPTER 4 OPERATION OF CLI MANAGEMENT 148 4 1 CLI MANAGEMENT 148 4 1 1 Login 148 4 2 COMMANDS OF CLI 150 4 2 1 Global Commands of CLI 151 4 2 2 Local Commands of CLI 157 iii 5 1 RESOLVING No LINK CONDITION 240 5 2 Q amp A 240 APPENDIX A TECHNICAL SPECIFICATIONS 241 APPENDIX B NULL MODEM CABLE SPECIFICATIONS 245 Revision History Release Date Revision 0 90 08 19 2005 A1 2 01 11 24 2005 Al 2 08 02 24 2006 A2 vi Caution Circuit devices are sensitive to static electricity which can damage their delicate electronics Dry weather conditions or walking across a carpeted floor ma
5. Diagnostic LED System LED Power CPURUN ACT LEDSET FDX LEDSET SPD LEDSET Per Port LED 10 100M Port 1 to 8 of 3 Modules LINK ACT FDX SPD 1000M Fiber TP Port 25 26 LINK ACT FDX SPD Power Requirement z AC Line Voltage 100 240 V Frequency gt 50 60 Hz Consumption Max 45W Ambient Temperature 0 to 40 C Humidity 5 to 90 Dimensions 44 H x 442 W x 281 D m Comply with FCC Part 15 Class A amp CE Mark Approval Publication date February 2006 Revision A2 243 User Manual Management Software Specifications System Configuration Management Agent Spanning Tree Algorithm VLAN Function Trunk Function IGMP Bandwidth Control Quality of Service QoS Port Security Internetworking Protocol Network Management Auto negotiation support on 10 100Base TX ports Web browser or console interface can set transmission speed 10 100Mbps and operation mode Full Half duplex on each port enable disable any port set VLAN group set Trunk Connection SNMP support MIB II Bridge MIB RMON MIB IEEE 802 1D Port Base 802 1Q Tagged allowed up to 256 active VLANs in one switch Ports trunk connections allowed IP Multicast Filtering by passively snooping on the IGMP Query Supports by port Egress Ingress rate control Referred as Class of Service CoS by the IEEE 802 1P standard Four queues per port Packe
6. ele Disable 4 E E E E e E E E E oe ol Mell Ward fellel o lo o o e o je jo jo jo o o o Security 1 Disable Bandwitdh 1 1 Disable v Diagnostics 1 Disable v TEIR Sorgen 2 E Disable Log Firmware Upgrade 3 Disable _ Reboot a E Disable v Logout a 1 L Disable v_ a Fig 3 25 Parameter description Port 1 26 Port number PVID This PVID range will be 1 4094 Before you set a number x as PVID you have to create a Tag based VLAN with VID x For example if port x receives an untagged packet the switch will apply the PVID assume as VID y of port x to tag this packet the packet then will be forwarded as the tagged packet with VID y Default Priority It bases on 802 1p QoS and affects untagged packets When the packets enter the switch it would get the priority precedence according to your Default Priority setting and map to 802 1p priority setting in QoS function For example while you set Default Priority of port 2 with 2 and transmit untagged packets to port 2 these packets will own priority 2 precedence due to your default 802 1p Priority Mapping setting in QoS function and be put into Queue 1 Publication date February 2006 Revision A2 73 User Manual Drop Untag Drop untagged frame You can configure a given port to accept all frames Tagged and Untagged or just receive tagged frame If the former is the cas
7. Function name MAC Alias Function description MAC Alias function is used to let you assign MAC address a plain English name This will help you tell which MAC address belongs to which user in the illegal access report At the initial time it shows all pairs of the existed alias name and MAC address There are three MAC alias functions in this function folder including MAC Alias Add MAC Alias Edit and MAC Alias Delete You can click lt Create Edit gt button to add modify a new or an existed alias name for a specified MAC address or mark an existed entry to delete it Alias name must be composed of A Z a z and 0 9 only and has a maximal length of 15 characters Function name MAC Alias Create Edit or Delete Function description In the MAC Alias function MAC Alias Add Edit function is used to let you add or modify an association between MAC address and a plain English name User can click lt Create Edit gt button to add a new record with name As to MAC Alias Delete function is used to let you remove an alias name to a MAC address You can select an existed MAC address or alias name to remove Auto Logout 3 min FEML2 SW26E x System MAC Alias Port SNMP DICE RASE MAC Address S IGMP Snooping foo ao c7 d6 foo foz abc VLAN MAC Table Information Create Edit Maintenance R Static MAC Alias No MAC Address alias GVRP STP Trunk 802 1X Alarm Configuration Security Band
8. Leave All Time A time period for announcement that all registered device is going to be de registered If someone still issues a new join then a registration will be kept in the switch Valid range 1000 5000 unit time Default 1000 unit time Default Applicant Mode The mode here means the type of participant There are two modes normal participant and non participant provided for the user s choice Normal It is Normal Participant In this mode the switch participates normally in GARP protocol exchanges The default setting is Normal Non Participant It is Non Participant In this mode the switch does not send or reply any GARP messages It just listens messages and reacts for the received GVRP BPDU Default Registrar Mode The mode here means the type of Registrar There are three types of parameters for registrar administrative control value normal registrar fixed registrar and forbidden registrar provided for the user s choice Publication date February 2006 Revision A2 85 User Manual Normal It is Normal Registration The Registrar responds normally to incoming GARP messages The default setting is Normal Fixed Itis Registration Fixed The Registrar ignores all GARP messages and all members remain in the registered IN state Forbidden It is Registration Forbidden The Registrar ignores all GARP messages and all members remain in the unregistered EMPTY state Restrict
9. 43 3 1 5 Management Policy 44 3 1 6 Virtual Stack 47 3 2 PORT CONFIGURATION 49 3 2 1 Port Status 49 3 2 2 Port Configuration 55 3 2 3 Simple Counter 57 3 2 4 Detail Counter 59 3 3 SNMP CONFIGURATION 62 3 4 DHCP BOOT 64 3 5 IGMP SNOOPING 65 3 6 VLAN 2 9 2292 nnn nn nn nn nnn nnn nn nnn nn nn ence mene 69 3 6 1 VLAN Mode 69 3 6 2 Tag based Group 71 3 6 3 PVID 73 3 6 4 Port based Group 75 3 7 MAC TABLE 77
10. To add or edit a port based vlan group Argument lt name gt port vlan name lt range gt vlan group members syntax 1 5 7 available from 1 to 26 Possible value lt range gt 1 to 26 Example FEML2 SW26E vlan set port group vian 1 2 5 6 10 Publication date February 2006 Revision A2 234 User Manual set pvid Syntax set pvid lt port_range gt lt pvid gt lt default_priority gt Description To set vlan PVID and port pripority Argument lt port_range gt which port s you want to set PVID s Syntax 1 5 7 available from 1 to 26 lt pvid gt which PVID you want to set available from 1 to 4094 lt default_priority gt which priority you want to set available from 0 to 7 Possible value lt port_range gt 1 to 26 lt pvid gt 1 to 4094 lt default_priority gt 0 to 7 Example FEML2 SW26E vlan set pvid 3 5 6 8 5 6 set tag group Syntax set tag group lt vid gt lt name gt lt member_range gt lt untag_range gt Description To add or edit the tag based vlan group Argument lt vid gt vian id from 1 to 4094 lt name gt tag vlan group name lt member_range gt member port syntax 1 5 7 available from 1 to 26 lt untag_range gt untagged out port syntax 1 5 7 available from 0 to 26 set untag_range to 0 as none of the ports are force untagged Possible value lt vid gt 1 to 4094 lt name gt tag vilan group name lt member_range gt 1 to 26 lt unta
11. You can select the ports that you would like them to be worked and restricted in the management security configuration if Custom had been chosen Access Type The switch supports two kinds of options for managed valid Access Type including Any and Custom Default is Any Http Telnet and SNMP are three ways for the access and managing the switch in case that Custom had been chosen Action The switch supports two kinds of options for managed valid Action Type including Deny and Accept Default is Deny When you choose Deny action you will be restricted and refused to manage the switch due to the Access Type you choose However while you select Accept action you will have the authority to manage the switch Edit Create A new entry of Management Security Configuration can be created after the parameters as mentioned above had been setup and then press lt Edit Create gt button Of course the existed entry also can be modified by pressing this button Delete Remove the existed entry of Management Security Configuration from the management security table Publication date February 2006 Revision A2 46 User Manual 3 1 6 Virtual Stack Function name Virtual Stack Function description Virtual Stack Management VSM is the group management function Through the proper configuration of this function switches in the same LAN wil
12. v Check if the COM of the PC is enabled 4 How to configure the Managed Switch v _ The Hyperterm is the terminal program in Win95 98 NT Users can also use any other terminal programs in Linux Unix to configure the Managed Switch Please refer to the user guide of that terminal program But the COM port parameters baud rate data bits parity bits flow control must be the same as the setting of the console port of the Managed Switch Publication date February 2006 Revision A2 240 User Manual Appendix A Technical Specifications Features Supports 3 8 port 10 100M TP with Nway and auto MDIX function Supports 3 slots of removable and hot swappable 8 port 10 100M TP or 100M fiber module 2 Gigabit dual media ports TP SFP in which 2 slots for removable SFP module supporting 1000M SFP fiber module Supports on line plug unplug SFP transceiver modules Non blocking store and forward and shared memory L2 managed switch Supports auto negotiation for configuring speed duplex mode Supports 802 3x flow control for full duplex ports Supports collision based and carrier based backpressure for half duplex ports 256 entry Multicast Address table Any ports can be in disable mode force mode or auto polling mode Per port ingress egress rate control with 64K 128K 256K up to 100Mbps resolution Supports Head of Line HOL blocking prevention Supports broadcast storm filtering 8K MAC addresses with automatic
13. D Type TOS Function description IP TOS Priority affect TOS fields of IP header you can find it has 8 bit SERVICE TYPE field that specifies how the datagram should be handled The field could be divided into six subfields as follows PRECEDENCE 3 bits D Type Delay Priority 1 bit T Type Throughput Priority 1bit R Type Reliability Priority 1bit M Type Monetary Cost Priority 1bit and UNUSED PRECEDENCE 3 bits can arrange 8 kinds of priorities corresponding to the 0 7 priority in the following priority diagram TOS Delay Priority Mapping works while D TYPE in TOS field of IP header of the packets received by the switch is configured 0 1 2 3 4 5 6 7 Rbi Mbit Precedence MBZ Precedence Vorrangssteuerung MBZ Must Be Zero Parameter description TOS Delay Priority Mapping Each Priority can select any of Queue 0 Queue 3 In Default Priority 0 is mapping to Queue 0 Priority 1 is mapping to Queue 0 Priority 2 is mapping to Queue 1 Priority 3 is mapping to Queue 1 Priority 4 is mapping to Queue 2 Priority 5 is mapping to Queue 2 Priority 6 is mapping to Queue 3 and Priority 0 is mapping to Queue 3 Auto Logout 3 min FEML2 SW26E a System TOS Delay Priority Mapping Port SNMP DHCP Boot Priority o QUeue IGMP Snooping Erra ow ff MAC Table ene GVRP Em iv hs 2 Trunk 802 1x Eem 2 alarm ma 8 Configuration is al Security En Ba Bandwitdh 3x Qos Global VIP
14. Parameter description Model name The model name of this device System description As it is this tells what this device is Here it is 8 Slot 24 Port 10 100 2 Gigabit L2 Managed Switch Location Basically it is the location where this switch is put User defined Contact For easily managing and maintaining device you may write down the contact person and phone here for getting help soon You can configure this parameter through the device s user interface or SNMP Device name The name of the switch User defined Default is FEML2 SW26E System up time The time accumulated since this switch is powered up Its format is day hour minute second Current time Show the system time of the switch Its format day of week month day hours minutes seconds year For instance Wed Apr 23 12 10 10 2004 BIOS version The version of the BIOS in this switch Firmware version The firmware version in this switch Hardware Mechanical version The version of Hardware and Mechanical The figure before the hyphen is the version of electronic hardware the one after the hyphen is the version of mechanical Serial number The serial number is assigned by the manufacturer Publication date February 2006 Revision A2 35 User Manual Host IP address The IP address of the switch Host MAC address It is the Ethernet MAC address of the management agent in this switch Device Port Show all ty
15. STP Trunk 802 1X i Kapy Mar Apply Configuration Security Bandwitdh Qos Global VIP 802 D Type TOS T Type TOS R Type TOS M Type TOS Diagnostics TFTP Server s l amp Fig 3 66 Publication date February 2006 Revision A2 132 User Manual Function name 802 1p Setting Function description This function will affect the priority of VLAN tag Based on priority of VLAN tag it can arrange 0 8 priorities priorities can map to 4 queues of the switch queue 0 3 and possess different bandwidth distribution according to your weight setting Parameter description 802 1p Priority Mapping Each Priority can select any of Queue 0 Queue 3 In Default Priority 0 is mapping to Queue 0 Priority 1 is mapping to Queue 0 Priority 2 is mapping to Queue 1 Priority 3 is mapping to Queue 1 Priority 4 is mapping to Queue 2 Priority 5 is mapping to Queue 2 Priority 6 is mapping to Queue 3 and Priority 0 is mapping to Queue 3 Auto Logout 3 min a 2 oa 2 System 802 1p Priority Mapping Port SNMP DHCP Boot IGMP Snooping N ollo d MAC Table GYRP m lt STP Trunk 802 1 Alarm Configuration Security al N lt W lt wy lt gi Bandwitdh Qos Global VIP 802 1p H D Type S T Type TOS R Type TOS _ M Type TOS Diagnostics TFTP Server Pe lt a Fig 3 67 Publication date February 2006 Revision A2 133 User Manual Function name
16. lt Forward Delay gt Description To set up the parameters of STP Argument lt Bridge Priority gt Priority must be a multiple of 4096 available from O to 61440 lt Hello Time gt available from 1 to 10 lt Max Age gt available from 6 to 40 lt Forward Delay gt available from 4 to 30 Note 2 Forward Delay 1 gt Max Age Max Age gt 2 Hello Time 1 Possible value lt Bridge Priority gt 0 to 61440 lt Hello Time gt 1 to 10 lt Max Age gt 6 to 40 lt Forward Delay gt 4 to 30 Example FEML2 SW26E stp set config 61440 2 20 15 set port Syntax set port lt range gt lt path cost gt lt priority gt lt edge_port gt lt admin p2p gt Description To set up the port information of STP Argument lt range gt syntax 1 5 7 available from 1 to 26 lt path cost gt 0 1 200000000 The value zero means auto status lt priority gt priority must be a multiple of 16 available from 0 to 240 lt edge_port gt Admin Edge Port lt yes no gt lt admin p2p gt Admin point to point lt auto true false gt Possible value lt range gt 1 to 26 lt path cost gt 0 1 200000000 lt priority gt 0 to 240 lt edge_port gt yes no lt admin p2p gt auto true false Example FEML2 SW26E stp set port 1 16 0 128 yes auto set version Syntax set version lt stp rstp gt Description To set up the version of STP Argument lt stp rstp gt stp rstp Possible value lt stp rstp g
17. lt value gt VLAN ID lt ip gt lt value gt IP range lt port gt lt value gt Incoming port lt type gt lt value gt Access type lt action gt lt value gt a ccept or d eny Possible value lt name gt lt value gt No default and it must be set lt vid gt lt value gt The range is 1 4095 and can be set to any lt ip gt lt value gt For example 192 168 1 90 192 168 1 90 or any lt port gt lt value gt For example 1 or 1 8 or 1 3 5 or any lt type gt lt value gt For example h ttp s nmp t elnet or any lt action gt lt value gt No default and it must be set Example FEML2 SW26E management add set name Mary vid 20 ip 192 168 1 1 192 168 1 90 port 2 5 8 type h s action a FEML2 SW26E management add show 1 Name Mary VlanID 20 IP 192 168 1 1 192 168 1 90 Type Http SNMP Action Accept Port 2 3 4 5 8 Publication date February 2006 Revision A2 197 User Manual delete Syntax delete Description To delete a specific record or range Argument a specific or range management security entry s Possible value None Example FEML2 SW26E management show 1 Name Tom VlanID 2 IP Type SNMP Action Deny Port FEML2 SW26E management delete 1 FEML2 SW26E management show Security rule list is empty now Publication date February 2006 Revision A2 198 192 168 1 30 192 168 1 80 1 2
18. 8 9 10 11 12 13 14 15 16 MAT able Isolated Group ENRE 17 18 19 20 21 22 23 24 STP Trunk 25 26 802 1X Alarm Configuration Apply Security Mirror Isolated Group Restricted Grou Bandwitdh Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 60 Publication date February 2006 Revision A2 123 User Manual Function name Restricted Group Function description The function of the Restricted Group can decide the direction of transmitting packets for the specific port The packets received by the port with the Ingress mode of Restricted Group will be sent to the ports with the Egress mode of Restricted Group Parameter description Mode Used for the activation or de activation of Restricted Group function Default is disable Ingress Select the ports that you would like their Restricted Group to set into Ingress mode Just tick the check box beside the port x and valid port is Port 1 26 Egress Select the ports that you would like their Restricted Group to set into Egress mode Just tick the check box beside the port x and valid port is Port 1 26 Auto Logout 3 min FEML2 SW26E System Restricted Group Port SNMP DHCP Boot BET Pisanie IGMP Snooping VLAN 1 2 3 4 5 6 7 8 MAC Table 9 10 ais 12 ia 14 15 16 GRP EEA 18 19 20 Pal 22 23 24 STP Trunk 25 26 big aes a 2 3 4 5 6 8 Alarm Conf
19. D Type TOS hy T Type TOS Diagnostics TFTP Server g g a Fig 3 68 Publication date February 2006 Revision A2 I W 4 User Manual Function name T Type TOS Function description IP TOS Priority affect TOS fields of IP header you can find it has 8 bit SERVICE TYPE field that specifies how the datagram should be handled The field could be divided into six subfields as follows PRECEDENCE 3 bits D Type Delay Priority 1 bit T Type Throughput Priority 1bit R Type Reliability Priority 1bit M Type Monetary Cost Priority 1bit and UNUSED PRECEDENCE 3 bits can arrange 8 kinds of priorities corresponding to the 0 7 priority in the following priority diagram TOS Throughput Priority Mapping works while T TYPE in TOS field of IP header of the packets received by the switch is configured 0 1 2 3 4 5 6 7 Precedence Vorrangssteuerung MBZ Must Be Zero Parameter description TOS Throughput Priority Mapping Each Priority can select any of Queue 0 Queue 3 In Default Priority 0 is mapping to Queue 0 Priority 1 is mapping to Queue 0 Priority 2 is mapping to Queue 1 Priority 3 is mapping to Queue 1 Priority 4 is mapping to Queue 2 Priority 5 is mapping to Queue 2 Priority 6 is mapping to Queue 3 and Priority 0 is mapping to Queue 3 Auto Logout 3min FEML2 SW26E i System Port SNMP cer bost f Priority IGMP Snooping E oo MAC Table at o GVRP EE Ls STP FA
20. Diagnostics Rx Packet 1030 TFTP Server Tx Collision 0 Rx Error Packet 0 Logout Close Log Firmware Upgrade boot a Fig 3 3 port detail information In Fig 3 3 it shows the basic information of the clicked port With this you ll see the information about the port status traffic status and bandwidth rating for egress and ingress respectively Publication date February 2006 Revision A2 32 User Manual Auto Logout OFF System Port SNMP DHCP Boot IGMP Snooping VLAN MAC Table GYRP STP Trunk 802 1X Alarm Configuration Security Bandvwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout v Slot 3 Detail Information Serial Number 1234567890 Hardware Mechanical Version 1 01 1 01 Port Connector Mode _Jribercable Wavelength Distance Speed 17 sc Single Mode Two Wire 18 sc Single Mode Two Wire Single Mode Two Wire Single Mode Two Wire Single Mode Two Wire Single Mode Two Wire Single Mode Two Wire Single Mode Two Wire cise 1310nm 1310nm 1310nm 1310nm 1310nm 1310nm 1310nm 1310nm 20km 20km 20km 20km 20km 20km 20km 20km 100Mbps 100Mbps 100Mbps 100Mbps 100Mbps 100Mbps 100Mbps 100Mbps Fig 3 4 slot detail information In Fig 3 4 it shows the basic information of the clicked fiber module With this you ll see the information about the serial number and hardware mechanical version of the module you selected In fibe
21. Fig 3 23 Delete Group Just press the lt Delete gt button to remove the selected group entry from the Tag based group table Auto Logout 3 min System Tag based Group Port SNMP DHCP Boot No VLAN NAME VID IGMP Snooping 1 default el VLAN U T VLAN Mode B Tag based Group E P ID E Port based Group MAC Table GVRP STP Trunk 802 1X Alarm Configuration Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout EE coral Fig 3 24 Edit a group Just select a group entry and press the lt Edit gt button then you can modify a group s description member and untag settings Publication date February 2006 Revision A2 72 User Manual 3 6 3 PVID Function name PVID Function description In PVID Setting user can input VID number to each port The range of VID number is from 1 to 4094 User also can choose ingress filtering rule Rule 2 to each port The Ingress Filtering Rule 2 is drop untagged frame While Rule 2 is enabled the port will discard all Untagged frames Auto Logout 3 min FEML2 SW26E a System PVID Port SNMP ry DHCP Boot Port No P ID Default Priority Drop Untag IGMP Snooping 1 lo Disable v VLAN VLAN Mode Tag based Group D Disable Disable l Port based Group Disable v MAC Table GYRP STP Trunk 802 1X Alarm Configuration Pye fe yey Disable Disable Disable
22. Input the VLAN name and choose the member by ticking the check box beside the port No then press the lt Apply gt button to have the setting taken effect System Port SNMP DHCP Boot IGMP Snooping VLAN T VLAN Mode Tag based Group E pvp Port based Group MAC Table Auto Logout 3 min Y LLE EEIE YLAN 2 Port based VLAN i 1 9 10 11 T2 13 14 15 16 17 18 19 20 21 22 V 23 V 24 v 25 v 26 GVRP Trunk 802 1X Alarm Configuration Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 27 Delete Group Just press the lt Delete gt button to remove the selected group entry from the Port based group table Auto Logout 3 min System Port SNMP DHCP Boot IGMP Snooping 1 VLAN i VLAN Mode Tag based Group E PYID E Port based Group MAC Table GVRP STP Trunk 802 1X Alarm Configuration Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout J add Port based Group Nop VLAN Name default nS Fig 3 28 Edit a group Just select a group entry and press the lt Edit gt button then you can modify a group s description and member set Publication date February 2006 Revision A2 76 User Manual 3 7 MAC Table MAC Table Configuration gathers many functions i
23. Revision A2 26 User Manual 2 2 Typical Applications The 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch implements 24 Fast Ethernet TP Fiber ports with auto MDIX and 2 Gigabit dual media ports with SFP for removable module supported comprehensive fiber types of connection including LC BiDi LC for SFP For more details on the specification of the switch please refer to Appendix A The switch is suitable for the following applications Central Site Remote site application is used in carrier or ISP See Fig 2 13 Peer to peer application is used in two remote offices See Fig 2 14 Office network See Fig 2 15 FEML2 SW26E na FEML2 SW26E ay Fiber Optic mm or sm fiber Managed Media Converter 7 e Tane Fiber Optic_ Managed Media Converter m SE B FEML2 SW26E Copper Twisted pair Links Fiber Optic Links Fig 2 13 Network Connection between Remote Site and Central Site Fig 2 13 is a system wide basic reference connection diagram This diagram demonstrates how the switch connects with other network devices and hosts Publication date February 2006 Revision A2 User Manual Fig 2 15 Office Network Connection Publication date February 2006 Revision A2 28 User Manual 3 Operation of Web based Management This chapter instructs you how to configure and manage the switch through the web
24. Syntax del port group lt name gt Description To delete the port based vlan group Argument lt name gt which vlan group you want to delete Possible value lt name gt port vlan name Example FEML2 SW26E vlan del port group VLAN 2 del tag group Syntax del tag group lt vid gt Description To delete the tag based vlan group Argument lt vid gt which vlan group you want to delete available from 1 to 4094 Possible value lt vid gt 1 to 4094 Example FEML2 SW26E vlan del tag group 2 disable double tag Syntax disable double tag Description To disable double tag Argument None Possible value None Example FEML2 SW26E vlan disable double tag Publication date February 2006 Revision A2 231 User Manual disable drop untag Syntax disable drop untag lt port_range gt Description To disable drop untag Argument lt port_range gt which port s you want not to drop untagged frames Syntax 1 5 7 available from 1 to 26 Possible value lt port_range gt 1 to 26 Example FEML2 SW26E vlan disable drop untag 2 4 5 7 disable svl Syntax disable svl Description To enable Independent VLAN Learning Argument None Possible value None Example FEML2 SW26E vlan disable svl disable symmetric Syntax disable symmetric Description To Not drop frames from the non member port Argument None Possible value Non
25. Wed Apr Wed Apr Wed Apr Wed Apr upload Syntax Upload Description 0 0 0 0 Disable 13 12 13 27 2005 13 12 13 26 2005 13 11 58 31 2005 13 11 19 45 2005 13 11 19 37 2005 To upload log data through tftp Argument None Possible value None Example FEML2 SW26E log upload Link Up Port 1 Link Down Port 1 Login admin Login admin Logout admin Publication date February 2006 Revision A2 191 User Manual mac table lt lt alias gt gt del Syntax del lt mac gt Description To delete the mac alias entry Argument lt mac gt mac address format 00 02 03 04 05 06 Possible value lt mac gt mac address Example FEML2 SW26E mac table alias del 00 44 33 44 55 44 set Syntax set lt mac gt lt alias gt Description To set up the mac alias entry Argument lt mac gt mac address format 00 02 03 04 05 06 lt alias gt mac alias name max 15 characters Possible value lt mac gt mac address lt alias gt max 15 characters Example FEML2 SW26E mac table alias set 00 44 33 44 55 44 www show Syntax show Description To display the mac alias entry Argument None Possible value None Example FEML2 SW26E mac table alias show MAC Alias List MAC Address Alias 1 00 02 03 04 05 06 aaa 2 00 33 03 04 05 06 ccc Publication date February 2006 Revision A2 192 User Manual lt lt information gt g
26. lt port gt 1 to 26 Example FEML2 SW26E mac table static mac add 00 22 44 55 66 77 1006 Publication date February 2006 Revision A2 195 User Manual del Syntax del lt mac gt Description To remove the static mac entry Argument lt mac gt mac address format 00 02 03 04 05 06 Possible value lt mac gt mac address Example FEML2 SW26E mac table static mac del 00 02 03 04 05 06 show Syntax show Description To display static mac entry Argument None Possible value None Example FEML2 SW26E mac table static mac show MAC VID Priority Drop Policy Port 1 00 22 44 55 66 77 1 0 Static Publication date February 2006 Revision A2 196 User Manual management add Syntax Usage set lt name gt lt value gt lt vid gt lt value gt lt ip gt lt value gt lt port gt lt value gt lt type gt lt value gt lt action gt lt value gt Synopsis set name Mary vid 20 ip 192 168 1 1 192 168 1 90 port 2 5 8 type h s actiona Synopsis set name Mary vid 20 ip 192 168 1 1 192 168 1 90 Description To save the adding management policy records When you don t know how to set the management policy records you can use this command as follows FEML2 SW26E management add set This command will show exhaustive operating explanation for setting the management policy records Argument lt name gt lt value gt ACL entry name lt vid gt
27. piii 12 oK Fail p pn 13 oK Fail SE gt K PAI TFTP Server 15 OK Fail Log 16 OK Fail Firmware Upgrade 17 OK Fail Reboot 18 OK Fail Logout 19 OK Fail 20 OK Fail 21 OK Fail bs Fig 3 74 Publication date February 2006 Revision A2 140 User Manual Function name Ping Test Function description Ping Test function is a tool for detecting if the target device is alive or not through ICMP protocol which abounds with report messages The switch provides Ping Test function to let you know that if the target device is available or not You can simply fill in a known IP address and then click lt Ping gt button After a few seconds later the switch will report you the pinged device is alive or dead in the field of Ping Result Parameter description IP Address An IP address with the version of v4 e g 192 168 1 1 Default Gateway IP address of the default gateway For more details please see the section of IP address in Chapter 2 Auto Logout 3 min FEML2 SW26E System Ping Test Port SNMP r DHCP Boot IP Address 192 168 1 105 R SLURTIL Default Gateway 192 168 1 253 MAC Table Ping Result 192 168 1 105 is alive GYRP STP Trunk pina 802 1X Alarm Input an address to ping ex 192 168 1 1 Configuration Security Bandwitdh Diagnostics iag Loopback I Ping Test TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 75 Publication date February 2006 Revision A2 141 User Manual 3 1
28. set trunk Syntax set trunk lt port range gt lt method gt lt group gt lt active LACP gt Description To set up the status of trunk including the group number and mode of the trunk as well as LACP mode Argument lt port range gt port range syntax 1 5 7 available from 1 to 26 lt method gt static adopt the static link aggregation lacp adopt the dynamic link aggregation link aggregation control protocol lt group gt 1 3 lt active LACP gt active set the LACP to active mode passive set the LACP to passive mode Possible value lt port range gt 1 to 26 lt method gt static lacp lt group gt 1 3 lt active LACP gt active passive Example FEML2 SW26E trunk set trunk 1 4 lacp 1 active show aggtr view Syntax show aggtr view Description To display the aggregator list Argument None Possible value None Example FEML2 SW26E trunk show aggtr view Aggregator 1 Method None Member Ports 1 Ready Ports 1 Aggregator 2 Method LACP Member Ports 2 Ready Ports Publication date February 2006 Revision A2 228 User Manual show lacp config Syntax show lacp config Description To display the value of LACP Priority Argument None Possible value None Example FEML2 SW26E trunk show lacp config LACP System Priority 33333 LACP Hash Method DA show lacp detail Syntax show lacp detail lt aggtr gt Description To display the detaile
29. show Port Ingress Rate Kb Egress Rate Kb 1 102400 102400 2 102400 102400 3 102400 102400 23 102400 102400 24 102400 102400 25 1024000 1024000 26 1024000 1024000 Broadcast Storm Control Type Disable Rate 100 Publication date February 2006 Revision A2 175 User Manual config file export start Syntax export start Description To run the export start function Argument None Possible value None Example FEML2 SW26E config file export start Export successful export user conf Syntax export user conf Description To run the export user conf function Argument None Possible value None Example FEML2 SW26E config file export user conf Export successful import start Syntax import start Description To run the import start function Argument None Possible value None Example FEML2 SW26E config file import start Import successful Publication date February 2006 Revision A2 176 User Manual import user conf Syntax import user conf Description To run the import user conf function Argument None Possible value None Example FEML2 SW26E config file import user conf Import successful set export path Syntax set export path lt filepath gt Description To set up the file path and filename that user would like to export Argument lt filepath gt filepath and filename Possib
30. 1 1 162 public it Pa gt show Syntax show Description The Show here is to display the configuration of SNMP Argument None Possible value None Example FEML2 SW26E snmp show SNMP Enable Get Community public Set Community private Enable Trap Host 1 IP Address 192 168 1 1 Port 162 Community public Trap Host 2 IP Address 0 0 0 0 Port 162 Community public Trap Host 3 IP Address 0 0 0 0 Port 162 Community public Trap Host 4 IP Address 0 0 0 0 Port 162 Community public Trap Host 5 IP Address 0 0 0 0 Port 162 Community public 6 IP Address 0 0 0 0 Port 162 Community public Trap Host Publication date February 2006 Revision A2 217 User Manual stp MCheck Syntax MCheck lt range gt Description To force the port to transmit RST BPDUs Argument lt range gt syntax 1 5 7 available from 1 to 26 Possible value lt range gt 1 to 26 Example FEML2 SW26E stp Mcheck 1 8 disable Syntax disable Description To disable the function of STP Argument None Possible value None Example FEML2 SW26E stp disable enable Syntax enable Description To enable the function of STP Argument None Possible value None Example FEML2 SW26E stp enable Publication date February 2006 Revision A2 218 User Manual set config Syntax set config lt Bridge Priority gt lt Hello Time gt lt Max Age gt
31. 102400 Kb port 25 26 66 1024000 Kb Possible value lt range gt 1 to 26 lt data_rate gt port 1 24 66 102400 Kb port 25 26 66 1024000 Kb Example FEML2 SW26E bandwidth set egress rate 1 16 299 set ingress rate Syntax set ingress rate lt range gt lt data_rate gt Description To set up the ingress rate of the ports Argument lt range gt syntax 1 5 7 available from 1 to 26 lt data_rate gt 66 1024000 Kb port 1 24 66 102400 Kb port 25 26 66 1024000 Kb Possible value lt range gt 1 to 26 lt data_rate gt port 1 24 66 102400 Kb port 25 26 66 1024000 Kb Example FEML2 SW26E bandwidth set ingress rate 1 16 100 Publication date February 2006 Revision A2 174 User Manual set storm rate Syntax set storm rate lt range gt lt data_rate gt Description To set up the storm rate of the ports Argument lt range gt syntax 1 3 5 available from 1 to 5 1 Disable 2 Broadcast Storm Control 3 Multicast Storm Control 4 Unknown Unicast Storm Control 5 Broadcast Multicast Unknown Unicast Storm Control lt data_rate gt 1 100 The value must be the integer The value 100 disables broadcast storm control Possible value lt range gt 1 to 5 lt data_rate gt 1 100 Example FEML2 SW26E bandwidth set storm rate 2 99 show Syntax show Description To display all current settings of the bandwidth Argument None Possible value None Example FEML2 SW26E bandwidth
32. 1x show mode Port Mode Disable Multi host Disable Disable Disable Disable oor wh show parameter Syntax show parameter Description To display the parameter settings of each port Argument None Possible value None Example FEML2 SW26E 802 1x show parameter port 1 port control Auto reAuthMax z2 txPeriod 30 Quiet Period 60 reAuthEnabled ON reAuthPeriod 3600 max Request 2 suppTimeout 30 serverTimeout 30 161 Publication date February 2006 Revision A2 User Manual show security Syntax show security Description To display the authentication status of each port Argument None Possible value None Example FEML2 SW26E 802 1x show security Port Mode Status Disable Multi host Unauthorized Disable Disable Disable Disable O JI AUN show state Syntax show state Description To display the Radius server configuration Argument None Possible value None Example FEML2 SW26E 802 1x show state Radius Server 192 168 1 115 Port Number 1812 Secret Key WinRadius Publication date February 2006 Revision A2 162 User Manual account add Syntax add lt name gt Description To create a new guest user When you create a new guest user you must type in password and confirm password Argument lt name gt new account name Possible value A string must be at least 5 character Ex
33. 2006 Revision A2 113 User Manual 3 12 Alarm Configuration Alarm Configuration Events Configuration Email SMS Configuration Function name Events Configuration Function description The Trap Events Configuration function is used to enable the switch to send out the trap information while pre defined trap events occurred The switch offers 23 different trap events to users for switch management The trap information can be sent out in three ways including email mobile phone SMS short message system and trap The message will be sent while users tick M the trap event individually on the web page shown as below Parameter description Trap Cold Start Warm Start Link Down Link Up Authentication Failure User login User logout STP STP Topology Changed STP Disabled STP Enabled LACP LACP Disabled LACP Enabled LACP Member Added LACP Port Failure GVRP GVRP Disabled GVRP Enabled VLAN Port based VLAN Enabled Tag based VLAN Enabled Module Swap Module Inserted Module Removed Dual Media Swapped Slot Inserted Slot Removed Publication date February 2006 Revision A2 114 User Manual Auto Logout 3min_ System Port SNMP DHCP Boot IGMP Snooping VLAN MAC Table GYRP STP Trunk 802 1X Alarm B Events h Email SiS Configuration Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Function name Trap Events Configuration Ev
34. 3 8 GVRP CONFIGURATION 84 3 9 STP CONFIGURATION 90 3 9 1 STP Status 90 3 9 2 STP Configuration 92 3 9 3 STP Port Configuration 94 3 10 TRUNKING CONFIGURATION 97 3 11 802 1 CONFIGURATION 104 3 12 ALARM CONFIGURATION 114 3 13 CONFIGURATION 117 a 3 1 Save Restore 118 3 13 2 Config File 121 3 14 SECURITY 122 3 15 BANDWIDTH MANAGEMENT 125 3 16 QOS QUALITY OF SERVICE CONFIGURATION 129 3 17 DIAGNOSTICS 139 3 18 TFTP SERVER 142 3 19 LOG
35. Address 0 0 0 0 162 Community public Trunk Trap Host 2 IP Address 0 0 0 0 162 Community public pee Trap Host 3 IP Address 0 0 0 0 162 Community public Configuration Trap Host 4 IP Address 0 0 0 0 162 Community public 7 Bandit Trap Host S1P address ity publ Bandwitdh Trap Host 5 IP Address oaa 162 Community pubie Qos Trap Host 6 IP Address 0 0 0 0 162 Community public Diagnostics z TFTP Server Log Firmware Upgrade boot Logout Fig 3 17 community and trap host setting Publication date February 2006 Revision A2 nN Ww User Manual 3 4 DHCP Boot The DHCP Boot function is used to spread the request broadcast packet into a bigger time frame to prevent the traffic congestion due to broadcast packets from many network devices which may seek its NMS boot server DHCP server and many connections predefined when the whole building or block lose the power and then reboot and recover At this moment a bunch of switch or other network device on the LAN will try its best to find the server to get the services or try to set up the predefined links they will issue many broadcast packets in the network The switch supports a random delay time for DHCP and boot delay for each device This suppresses the broadcast storm while all devices are at booting stage in the same time The maximum user defined delay time is 30 sec If DHCP Broadcasting Suppression function is enabled the delay time is set randomly r
36. Collision Number of collisions transmitting frames experienced Rx Error Packet Number of bad packets received Publication date February 2006 Revision A2 58 User Manual 3 2 4 Detail Counter The function of Detail Counter collects any information and provides the counting about the traffic of the port no matter the packet is good or bad In the Fig 3 16 the window can show only one port counter information at the same time To see another port s counter you have to pull down the list of Select then you will see the figures displayed about the port you had chosen Each data field has 20 digit long If the counting is overflow the counter will be reset and restart counting The data is updated every time interval defined by the user The valid range is 3 to 10 seconds The Refresh Interval is used to set the update frequency Default update time is 3 seconds Auto Logout 3 min FEML2 SW26E s System Detail Counter Port T Status E Configuration Select Port1 Refresh Interval 3 sec v D Simple Counter Time elapsed since last reset 0 Days 0 Hours 18 Mins 55 Secs Detail Counter ry SNMP DHCP Boot Receive Total Transmit Error Counters ieni Snisoning 3949 EET o ke Feb CE 524903 EEEE o G RP Rx Errors Tx Multiple Collision o Eui Rx Unicast Packets 3814 RENESA o Me 190 T Deferred Transmit o Alarm RX Multicast Packets 5LEASISASIE o Configuration Rx Pau
37. Day Light Saving End This is used to set when to stop performing the daylight saving time Mth Range is 1 12 Default 1 Day Range is 1 31 Default 1 Hour Range is 0 23 Default 0 Auto Logout OFF a System System Information IP Time Account Management Securii Virtual Stack Port SNMP DHCP Boot IGMP Snooping VLAN MAC Table Slag ee GYRP STP Trunk 802 1X Alarm Configuration Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade y amp Publication date February 2006 Revision A2 System Time Se Current Time Wed Nov 23 14 Year 2005 2000 2036 Day 23 1 31 Minute 24 0 59 209 81 9 7 USA 137 189 8 174 HK 133 100 9 2 3P 131 188 3 222 Germany O Daylight Saving E Daylight Saving Start Mth 1 Daylight Saving End Mth 1 Frond Fig 3 6 NTP 42 tting 24 30 2005 Month 11 1012 Hour 14 0 23 Second 20 0 59 Time Zone GMT 8 00 5 Day 1 Hour 0 Day 1 Hour 0 ik User Manual 3 1 4 Account Configuration In this function only administrator can create modify or delete the username and password Administrator can modify other guest identities password without confirming the password but it is necessary to modify the administrator equivalent identity Guest equivalent identity can modify his password only Please note that you must confirm administrator guest identity
38. FEML2 SW26E qos set vip 1 6 1 show dscp Syntax show dscp Description To show IP DSCP Qos configuration Argument None Possible value None Example FEML2 SW26E qos show dscp ip diffserv classification Global QoS mode Enable QoS Disable 802 lp Priority Disable ip tos classification Enable ip diffserv classification Scheduling weighted round robin method weight wrr 0 1 wrr 1 1 wrr 2 8 wr 3 16 weighted range 1 55 P0 63 Priority 0 63 Default mode Queue0 PO 15 Queuel P16 31 Queue2 P32 47 Queue3 P4863 Publication date February 2006 Revision A2 209 User Manual DiffServ Queue DiffServ Queue DiffServ Queue DiffServ Queue 0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9 0 10 0 11 0 12 0 13 0 14 0 15 0 16 1 17 1 18 1 19 1 20 1 21 1 22 1 23 1 24 1 25 1 26 1 27 1 28 1 29 1 30 1 31 1 32 2 33 2 34 2 35 2 36 2 37 2 38 2 39 2 40 2 41 2 42 2 43 2 44 2 45 2 46 2 47 2 48 3 49 3 50 3 51 3 52 3 53 3 54 3 55 3 56 3 57 3 58 3 59 3 60 3 61 3 62 3 63 3 show port Syntax show port Description To show VIP port configuration Argument None Possible value None Example FEML2 SW26E qos show port Port Based Priority Global QoS mode Enable QoS Enable 802 lp Priority Disable ip tos classification Disable ip diffserv classification Port No Mode Port No Mode Enable 2 Enable 3 Enable 4 Enable 5 Enable 6 Enable 23 Disable 24 Disable 25 D
39. IGMP Snooping Port Method Group active LACP aonr status VLAN A 1 None ov Active v 1 Read MAC Table HERE None So ee Active x GVRP BEB oe om active w 2 Z STP E None ov Active v 3 Trun d Port Ew None Y o Active Y 4 E Aggregator View BE none v ox active 5 pis igd tt WE none vy ov active _ 6 Alarm None om Active 7 t E nre pa Active 8 Bandwitdh E None v o7 active v 9 Qos None x om Active 10 Diagnostics 7 TFTP Server ET None ov 11 Log 12 None x 12 Firmware Upgrade E 7 Reboot None v z 13 Logout None 14 HEE sone 15 ae an al je Publication date February 2006 Revision A2 100 User Manual Function name Aggregator View Function description To display the current port trunking information from the aggregator point of view Parameter description Aggregator It shows the aggregator ID from 1 to 26 of every port In fact every port is also an aggregator and its own aggregator ID is the same as its own Port No Method Show the method a port uses to aggregate with other ports Member Ports Show all member ports of an aggregator port Ready Ports Show only the ready member ports within an aggregator port Auto Logout 3 min a System Aggregator View Port SNMP DHCP Boot Moorsgator IGMP Snooping None 1 1 VLAN None MAC Table GVRP STP 2 None 3 None 4 Trunk None 5 Port 6 7
40. PAE The Authenticator exchanges the message to authentication server using EAP encapsulation Before successfully authenticating the supplicant can only touch the authenticator to perform authentication message exchange or access the network from the uncontrolled port Supplicant s System Authenticator s System Services Offered by Authenticator Authenticator e g Bridge Relay PAE Supplicant Authentication PAE Server Controlled port Uncontrolled port Port Authorize j a MAC Enable Fig 3 43 In the Fig 3 44 this is the typical configuration a single supplicant an authenticator and an authentication server B and C is in the internal network D is Authentication server running RADIUS switch at the central location acts Authenticator connecting to PC A and Ais a PC outside the controlled port running Supplicant PAE In this case PC A wants to access the services on device B and C first it must exchange the authentication message with the authenticator on the port it connected via EAPOL packet The authenticator transfers the supplicant s credentials to Authentication server for verification If success the authentication server will notice the authenticator the grant PC A then is allowed to access B and C via the switch If there are two switches directly connected together instead of single one for the link connecting two switches it may have to act two port roles at the end of the lin
41. SC SM 5 20 60Km single mode 1310nm Fiber MMEA ST SC multi mode 2Km Single Mode TX Transmit 1310nm 8 port FE fiber module gt Sindi cin i p 20Km RX Receive 1550nm i 2 TX Transmit 1550nm WDM Module 8 port FE fiber module Single Mode 20Km RX Receive 1310nm SEP OBL 621 202 saa TX Transmit 1310nm m RX Receive 1550nm i y TX Transmit 1550nm WDM Module SFP OBL 621 201 Single Mode Transmit 20Km RX Receive 1310nm Table2 1 Publication date February 2006 Revision A2 14 User Manual 2 1 3 3 Switch Cascading in Topology Takes the Delay Time into Account Theoretically the switch partitions the collision domain for each port in switch cascading that you may up link the switches unlimitedly In practice the network extension cascading levels amp overall diameter must follow the constraint of the IEEE 802 3 802 3u 802 3z and other 802 1 series protocol specifications in which the limitations are the timing requirement from physical signals defined by 802 3 series specification of Media Access Control MAC and PHY and timer from some OSI layer 2 protocols such as 802 1d 802 1q LACP and so on The fiber TP cables and devices bit time delay round trip are as follows 1000Base X TP Fiber 100Base TX TP 100Base FX Fiber Round trip Delay 4096 Round trip Delay 512 Cat 5 TP Wire 11 12 m Cat 5 TP Wire 1 0 m Fiber Cable 10 10 m TP to fiber Converter 56 Bit Time unit 1ns 1sec 1000 Mega
42. User Manual edit the specific management policy entry Available range 1 to 65536 Syntax Usage set lt name gt lt value gt lt vid gt lt value gt lt ip gt lt value gt lt port gt lt value gt lt type gt lt value gt lt action gt lt value gt Synopsis set name Mary vid 20 ip 192 168 1 1 192 168 1 90 port 2 5 8 type h s action a Synopsis set name Mary vid 20 ip 192 168 1 1 192 168 1 90 Description To edit management policy record Argument lt name gt lt value gt ACL entry name lt vid gt lt value gt VLAN ID lt ip gt lt value gt IP Range lt port gt lt value gt Incoming port lt type gt lt value gt Access type lt action gt lt value gt a ccept or d eny Possible value lt name gt lt value gt No default and it must be set lt vid gt lt value gt The range is 1 4095 and can be set to any lt ip gt lt value gt For example 192 168 1 90 192 168 1 90 or any lt port gt lt value gt For example 1 or 1 8 or 1 3 5 or any lt type gt lt value gt For example h ttp s nmp t elnet or any lt action gt lt value gt No default and it must be set Example FEML2 SW26E management edit 1 FEML2 SW26E management edit l set name Tom vid 2 ip 192 168 1 30 192 168 1 80 port 1 2 type s action d FEML2 SW26E management edit 1 show 1 Name Tom VlanID 2 IP 192 168 1 30 192 168 1 80 Type SNMP Action De
43. address for the switch With this the switch can translate a mnemonic name address into an IP address There are two ways to specify the IP address of DNS One is fixed mode which manually specifies its IP address the other is dynamic mode which is assigned by DHCP server while DHCP is enabled DNS can help you easily remember the mnemonic address name with the meaningful words in it Default is no assignment of DNS address Default 0 0 0 0 Publication date February 2006 Revision A2 39 User Manual 3 1 3 Time Configuration The switch provides manual and automatic ways to set the system time via NTP Manual setting is simple and you just input Year Month Day Hour Minute and Second within the valid value range indicated in each item If you input an invalid value for example 61 in minute the switch will clamp the figure to 59 NTP is a well known protocol used to synchronize the clock of the switch system time over a network NTP an internet draft standard formalized in RFC 1305 has been adopted on the system is version 3 protocol The switch provides four built in NTP server IP addresses resided in the Internet and an user defined NTP server IP address The time zone is Greenwich centered which uses the expression form of GMT xx hours Function name Time Function description Set the system time by manual input or set it by syncing from Time servers The function also
44. and DSCP and TOS and VIP Choose priorities of VIP and DSCP VIP DSCP gt TOS gt 802 1p Final result Publication date February 2006 Revision A2 130 User Manual Function name QoS Global Setting Function description When you want to use QoS function please enable QoS Mode in advance Then you can use MAC Priority 802 1p Priority IP TOS Priority DiffServ DSCP Priority or VIP Port functions and take effect In this function you can Enable QoS Mode Choose any of Priority Control such as 802 1p TOS DSCP Moreover you can select Scheduling Method of WRR Weighted Round Robin or Strict Priority Next you can arrange Weight values for queue 0 to queue 3 Parameter description QoS Mode You can Enable QoS Mode and let QoS function become effective Default is Disable Priority Control Just tick the check box M of 802 1P TOS or DSCP Qos and click Apply button to be in operation Scheduling Method There are two Scheduling Method WRR and Strict Priority Default is WRR After you choose any of Scheduling Method please click Apply button to be in operation Weight 1 55 Over here you can make an arrangement to Weight values of Queue 0 to Queue 3 The range of Weight you can set is 1 55 In default the weight of Queue 0 is 1 the weight of Queue 1 is 2 the weight of Queue 2 is 4 and the weight of Queue 3 is 8 Auto Logout 3 min FEML2 SW26E a N E E
45. by the Authenticator state machine to define periods of time during when it will not attempt to acquire a Supplicant Argument lt port range gt syntax 1 5 7 available from 1 to 26 lt sec gt timer range 0 65535 Possible value lt port range gt 1 to 26 lt sec gt 0 65535 default is 60 Example FEML2 SW26E 802 1x set quiet period 2 30 set reAuthEnabled Syntax set reAuthEnabled lt port range gt lt ebl gt Description A constant that define whether regular reauthentication will take place on this port Argument lt port range gt syntax 1 5 7 available from 1 to 26 lt ebl gt 0 OFF to disable reauthentication 1 ON to enable reauthentication Possible value lt port range gt 1 to 26 lt ebl gt 0 or 1 default is 1 Example FEML2 SW26E 802 1x set reAuthEnabled 2 1 Publication date February 2006 Revision A2 158 User Manual set reAuthMax Syntax set reAuthMax lt port range gt lt max gt Description The number of reauthentication attempts that are permitted before the port becomes Unauthorized Argument lt port range gt syntax 1 5 7 available from 1 to 26 lt max gt max value range 1 10 Possible value lt port range gt 1 to 26 lt max gt 1 10 default is 2 Example FEML2 SW26E 802 1x set reAuthMax 2 2 set reAuthPeriod Syntax set reAuthPeriod lt port range gt lt sec gt Description Aconstant that defines a nonzero number
46. it and a supplicant PAE The authenticator may request the supplicant to re authenticate itself at a configured time period Once start re authenticating the supplicant the controlled port keeps in the authorized state until re authentication fails A port acting as an authenticator is thought to be two logical ports a controlled port and an uncontrolled port A controlled port can only pass the packets when the authenticator PAE is authorized and otherwise an uncontrolled port will unconditionally pass the packets with PAE group MAC address which has the value of 01 80 c2 00 00 03 and will not be forwarded by MAC bridge at any time Authentication server A device provides authentication service through EAP to an authenticator by using authentication credentials supplied by the supplicant to determine if the supplicant is authorized to access the network resource Publication date February 2006 Revision A2 104 User Manual The overview of operation flow for the Fig 3 43 is quite simple When Supplicant PAE issues a request to Authenticator PAE Authenticator and Supplicant exchanges authentication message Then Authenticator passes the request to RADIUS server to verify Finally RADIUS server replies if the request is granted or denied While in the authentication process the message packets encapsulated by Extensible Authentication Protocol over LAN EAPOL are exchanged between an authenticator PAE and a supplicant
47. learning lt port gt lt num gt Description To set up the maximum amount of MAC that each port can learn Argument lt port gt port range syntax 1 5 7 available form 1 to 24 lt num gt MAC address numbers which can be dynamically learned num range between 0 to 8191 0 for learning disabled Possible value lt port gt 1 to 24 lt num gt 0 to 8191 Example FEML2 SW26E mac table maintain set learning 5 100 show Syntax show Description To display the settings of MAC table ageout time and the learning limit of each port Argument None Possible value None Publication date February 2006 Revision A2 194 User Manual Example FEML2 SW26E mac table maintain show Mac table age out time 300 seconds Port Dynamically learn limit 1 8191 2 8191 3 8191 4 8191 5 8191 21 8191 22 8191 23 8191 24 8191 25 8192 26 8192 lt lt Sstatic mac gt gt add Syntax add lt mac gt lt vid gt lt queue gt lt rule gt lt port gt Description To add the static mac entry Argument lt mac gt mac address format 01 02 03 04 05 06 lt vid gt vlan id from 1 to 4094 lt queue gt which queue you want to set from 0 to 3 lt rule gt forwarding rule from 0 to 2 O static 1 drop destination address matches 2 drop source address matches lt port gt forwarded destination port form 1 to 26 Possible value lt vid gt 1 to 4094 lt queue gt 0 to 3 lt rule gt 0 to 2
48. lt ip gt SMS server ip address or domain name Possible value None Example FEML2 SW26E alarm sms set server 192 168 1 7 set user Syntax set user lt username gt Description To set up user account and password of sms server Argument lt username gt SMS server account Possible value None Example FEML2 SW26E alarm sms set user ABC Publication date February 2006 Revision A2 172 User Manual show Syntax show Description To display the configuration of SMS trap event Argument None Possible value None Example FEML2 SW26E alarm sms show SMS Server 192 168 1 7 Username ABC Password 1k kkk koko koko kk obile Phone 1 0968777777 obile Phone obile Phone obile Phone obile Phone obile Phone oor wh 173 Publication date February 2006 Revision A2 User Manual autologout autologout Syntax autologout lt time gt Description To set up the timer of autologout Argument lt time gt range 1 to 3600 seconds 0 for autologout off current setting is 180 seconds Possible value lt time gt 0 1 3600 Example FEML2 SW26E autologout 3600 Set autologout time to 3600 seconds bandwidth set egress rate Syntax set egress rate lt range gt lt data_rate gt Description To set up the egress rate of the ports Argument lt range gt syntax 1 5 7 available from 1 to 26 lt data_rate gt 66 1024000 Kb port 1 24 66
49. lt times gt Description The maximum number of times that the state machine will retransmit an EAP Request packet to the Supplicant before it times out the authentication session Argument lt port range gt syntax 1 5 7 available from 1 to 26 lt times gt max times range 1 10 Possible value lt port range gt 1 to 26 lt times gt 1 10 default is 2 Example FEML2 SW26E 802 1x set max request 2 2 set mode Syntax set mode lt port range gt lt mode gt Description To set up the 802 1X authentication mode of each port Argument lt port range gt syntax 1 5 7 available from 1 to 26 lt mode gt set up 802 1x mode O disable the 802 1x function 1 set 802 1x to Multi host mode Possible value lt port range gt 1 to 26 lt mode gt 0 or 1 Example FEML2 SW26E 802 1x set mode 2 1 157 Publication date February 2006 Revision A2 User Manual set port control Syntax set port control lt port range gt lt authorized gt Description To set up 802 1X status of each port Argument lt port range gt syntax 1 5 7 available from 1 to 26 lt authorized gt set up the status of each port 0 ForceUnauthorized 1 ForceAuthorized 2 Auto Possible value lt port range gt 1 to 26 lt authorized gt 0 1 or 2 Example FEML2 SW26E 802 1x set port control 2 2 set quiet period Syntax set quiet period lt port range gt lt sec gt Description A timer used
50. of 802 1X for each port In this device it supports only Multi host operation mode Parameter description Port Number Indicate which port is selected to configure the 802 1x operation mode 802 1x Mode 802 1x operation mode There are two options including Disable and Multi host mode Default is Disable Disable It will have the chosen port acting as a plain port that is no 802 1x port access control works on the port 802 1x with Multi host In Multi host mode for the devices connected to this port once a supplicant is authorized the devices connected to this port can access the network resource through this port Auto Logout 3 min FEML2 SW26E a System 802 1X Mode Setting Port SNMP DHCP Boot Port 802 1x Mode IGMP Snooping Disable VLAN Ea Disable ig MAC Table Multi host G RP BE Disable vi STP Disabl i Trunk EE Disab y 802 1 BE Disable State Bi Disab Mode T Security Disable BA Alarm e Disable Configuration T Security 9 l w d aoe HE sable Fi a Diagnostics Ea Coa TFTP Server Eza Disable at Disable Firmware Upgrade E Reboot EH Disable v Logout E Disable v Eo Dise v e 1 w T Q ra N ka Publication date February 2006 Revision A2 110 User Manual Function name Port Security Management Function description Shows each port status In Multihost mode it shows the port number and i
51. of seconds between periodic reauthentication of the supplicant Argument lt port range gt syntax 1 5 7 available from 1 to 26 lt sec gt timer range 1 65535 Possible value lt port range gt 1 to 26 lt sec gt 1 65535 default is 3600 Example FEML2 SW26E 802 1x set reAuthPeriod 2 3600 set serverTimeout Syntax set server Timeout lt port range gt lt sec gt Description A timer used by the Backend Authentication state machine in order to determine timeout conditions in the exchanges between the Authenticator and the Supplicant or Authentication Server The initial value of this timer is either suppTimeout or serverTimeout as determined by the operation of the Backend Authentication state machine Argument lt port range gt syntax 1 5 7 available from 1 to 26 lt sec gt timer range 1 65535 Possible value lt port range gt 1 to 26 lt sec gt 1 65535 default is 30 Example FEML2 SW26E 802 1x set serverTimeout 2 30 Publication date February 2006 Revision A2 159 User Manual set state Syntax set state lt ip gt lt port number gt lt secret key gt Description To configure the settings related with 802 1X Radius Server Argument lt ip gt the IP address of Radius Server lt port numbers gt the service port of Radius Server Authorization port lt secret key gt set up the value of secret key and the length of secret key is from 1 to 31 Possib
52. restricted group Argument None Possible value None Example FEML2 SW26E security restricted group show Restricted group Ingress 5 Egress 8 9 10 Publication date February 2006 Revision A2 215 User Manual snmp disable Syntax disable set community disable snmp Description The Disable here is used for the de activation of snmp or set community Argument None Possible value None Example FEML2 SW26E snmp disable snmp FEML2 SW26E snmp disable set community enable Syntax enable set community enable snmp Description The Enable here is used for the activation snmp or set community Argument None Possible value None Example FEML2 SW26E snmp enable snmp FEML2 SW26E snmp enable set community Publication date February 2006 Revision A2 216 User Manual set Syntax set get community lt community gt set set community lt community gt set trap lt gt lt ip gt port community Description The Set here is used for the setup of get community set community trap host ip host port and trap community Argument lt gt trap number lt ip gt ip address or domain name lt port gt trap port lt community gt community name Possible value lt gt 1 to 6 lt port gt 1 65535 Example EML2 SW26E snmp set get community public EML2 SW26E snmp set set community private EML2 SW26E snmp set trap 1 192 168
53. saving start Day 01 31 lt HH gt daylight saving start Hour 00 23 lt mm gt daylight saving end Month 01 12 lt dd gt daylight saving end Day 01 31 lt hh gt daylight saving end Hour 00 23 Possible value lt hr gt m 5 to 45 lt MM gt 01 12 lt DD gt 01 31 lt HH gt 00 23 lt mm gt 01 12 lt dd gt 01 31 lt hh gt 00 23 Example FEML2 SW26E time set daylightsaving 3 10 12 01 11 12 01 set manual Syntax set manual lt YYYY MM DD gt lt hh mm ss gt Description To set up the current time manually Argument lt YYYY gt Year 2000 2036 lt MM gt Month 01 12 lt DD gt Day 01 31 lt hh gt Hour 00 23 lt mm gt Minute 00 59 lt ss gt Second 00 59 Possible value lt YYYY gt 2000 2036 lt MM gt 01 12 lt DD gt 01 31 lt hh gt 00 23 lt mm gt 00 59 lt ss gt 00 59 Example FEML2 SW26E time set manual 2005 04 21 16 18 50 Publication date February 2006 Revision A2 225 User Manual set ntp Syntax set ntp lt ip gt lt timezone gt Description To set up the current time via NTP server Argument lt ip gt ntp server ip address or domain name lt timezone gt time zone GMT range 12 to 13 Possible value lt timezone gt 12 11 0 1 13 Example FEML2 SW26E time set ntp clock via net 8 Synchronizing 1 Synchronization success show Syntax show
54. show counter of the port Argument lt port gt port number available from 1 to 26 Possible value lt port gt 1 to 26 Example FEML2 SW26E gvrp show counter 2 GVRP Counter port 2 Counter Name Received Transmi tted Total GVRP Packets Invalid GVRP Packets LeaveAll message JoinEmpty message JoinIn message LeaveEmpty message ooooocoo Empty message show group Syntax show group Description To show the gvrp group Argument None Possible value None Example FEML2 SW26E gvrp show group GVRP group information Current Dynamic Group Number 0 VID Member Port oooo eo Publication date February 2006 Revision A2 186 User Manual hostname hostname Syntax hostname lt name gt Description To set up the hostname of the switch Argument lt name gt hostname max 40 characters Possible value lt name gt max 40 characters Example FEML2 SW26E hostname Company Company sigmp set igmp_snooping Syntax set igmp_snooping lt status gt Description To set up the snooping mode of IGMP Argument lt status gt O disable 1 active 2 passive Possible value lt status gt 0 1or 2 Example FEML2 SW26E igmp set igmp snooping 2 show Syntax show Description To display IGMP snooping mode and IP Multicast Table Argument None Possible value None Example FEML2 SW26E igmp show Snoop Mode Active IP Mult
55. supports daylight saving for different area s time adjustment Parameter description Current Time Show the current time of the system Manual This is the function to adjust the time manually Filling the valid figures in the fields of Year Month Day Hour Minute and Second respectively and press lt Apply gt button time is adjusted The valid figures for the parameter Year Month Day Hour Minute and Second are gt 2000 1 12 1 31 0 23 0 59 and 0 59 respectively Input the wrong figure and press lt Apply gt button the device will reject the time adjustment request There is no time zone setting in Manual mode Default Year 2000 Month 1 Day 1 Hour 0 Minute 0 Second 0 Publication date February 2006 Revision A2 40 User Manual NTP NTP is Network Time Protocol and is used to sync the network time based Greenwich Mean Time GMT If use the NTP mode and select a built in NTP time server or manually specify an user defined NTP server as well as Time Zone the switch will sync the time in a short after pressing lt Apply gt button Though it synchronizes the time automatically NTP does not update the time periodically without user s processing Time Zone is an offset time off GMT You have to select the time zone first and then perform time sync via NTP because the switch will combine this time zone offset and updated NTP time to come out the local time otherwise you will not able to get the corr
56. the switch including power up hardware reset and software reset You can press the RESET button in the front panel to reset the switch After upgrading software changing IP configuration or changing VLAN mode configuration then you must reboot to have the new configuration taken effect Here we are discussing is software reset for the reboot in the main menu Function name Reboot Function description Reboot the switch Reboot takes the same effect as the RESET button on the front panel of the switch It will take around thirty 30 seconds to complete the system boot Parameter description Save and Reboot Save the current settings as start configuration before rebooting the switch Reboot Reboot the system directly Auto Logout 3 min FEML2 SW26E System Reboot the System Port SNMP s DHCP Boot Do you want to continue IGMP Snooping aes SSE Saving Configuration and Reboot MAC Table beth erii GYRP st Reboot the System Configuration Security Bandwitdh Qos Diagnostics TFTP Server Firmware Upgrade Reboot Logout Fig 3 79 Publication date February 2006 Revision A2 146 User Manual 3 22 Logout You can manually logout by performing Logout function In the switch it provides another way to logout You can configure it to logout automatically Function name Logout Function description The switch allows you to logout the system to prevent other users from the sy
57. transmission of the packets Auto Logout 3 min System Static MAC Port SNMP peered pac vip Queue Forwarding Rule foals Snooping oo 40 c7 d6 00 01 200 2 Static with Destination Drop Ell MAC Table Information Maintenance Ee oaet Static Po Tac vio uous forwarding rule pare STP Trunk 802 1X Alarm Configuration Security Bandwitdh Qos Diagnostics TFTP Server Firmware Upgrade oot Logout Fig 3 31 Parameter description It is a six byte long Ethernet hardware address and usually expressed by hex and separated by hyphens For example 00 40 C7 D6 00 01 VID VLAN identifier This will be filled only when tagged VLAN is applied Valid range is 1 4094 Publication date February 2006 Revision A2 80 User Manual Queue Set up the priority 0 3 for the MAC Forwarding Rule Static A MAC address is assigned to a specific port all of the switch s traffics sent to this MAC address will be forwarded to this port Static with Destination Drop While the DA of the incoming packets meets the value you set up these packets will be dropped Static with Source Drop While the SA of the incoming packets meets the value you set up these packets will be dropped Port Select the port No you would like to do setup in the switch It is 1 26 Publication date February 2006 Revision A2 amp 1 User Manual
58. user interface it supports to access and manage 3 slots of removable and hot swappable 8 port 10 100M TP or 100M fiber module and 2 Gigabit dual media ports TP SFP management Ethernet switch With this facility you can easily access and monitor through any one port of the switch all the status of the switch including MIBs status each port activity Spanning tree status port aggregation status multicast traffic VLAN and priority status even illegal access record and so on The default values of the managed switch are listed in the table below IP Address 192 168 1 1 Subnet Mask 255 255 255 0 DA EWIREELAVE 192 168 1 254 Username admin Password admin Table 3 1 After the managed switch has been finished configuration in the CLI via the switch s serial interface you can browse it For instance type http 192 168 1 1 in the address row in a browser it will show the following screen see Fig 3 1 and ask you inputting username and password in order to login and access authentication The default username and password are both admin For the first time to use please enter the default username and password then click the lt Login gt button The login process now is completed Just click the link of Forget Password in WebUI See Fig 3 1 or input Ctrl Z in CLI s login screen See Fig 4 1 4 2 in case the user forgets the manager s password Then the system will display a se
59. w sab sab N A F sab N o zoe E 0 BEE are E are E o E e E 0 E ae EE as E are GE are E CC oe BE ar E are EE a E e E o R a t E a y AE e 1 E ae E e e E j n o ion oo 000 09 DOD 0 DO 0D OOD DOD ODO ODDO OD OD OD OD OD TS Ss oS So sab NS O Publication date February 2006 Revision A2 237 User Manual E VS disable Syntax disable Description To disable the virtual stack Argument None Possible value None Example FEML2 SW26E vs disable enable Syntax enable Description To enable the virtual stack Argument None Possible value None Example FEML2 SW26E vs enable set gid Syntax set gid lt gid gt Description To set the group id Argument lt gid gt Group ID Possible value lt gid gt a z A Z 0 9 Example FEML2 SW26E vs set gid groupl Publication date February 2006 Revision A2 238 User Manual set role Syntax set role lt master slave gt Description To set role Argument lt master slave gt master act as master slave act as slave Possible value lt master slave gt master or slave Example FEML2 SW26E vs set role master show Syntax show Description To display the configuration of the virtual stack Argument None Possible value None Example FEML2 SW26E vs show Virtual Stack Config State Enable Role Master Group ID groupl 239 Publi
60. 00Mbps Single Fiber WDM BiDi transceiver is designed with an optic Wavelength Division Multiplexing WDM technology that transports bi directional full duplex signal over a single fiber simultaneously For upgrading firmware please refer to the Section 3 20 or Section 4 2 2 for more details The switch will not stop operating while upgrading firmware and after that the configuration keeps unchanged Publication date February 2006 Revision A2 User Manual e Key Features in the Device Qos Support Quality of Service by the IEEE 802 1P standard There are two priority queue and packet transmission schedule using Weighted Round Robin WRR User defined weight classification of packet priority can be based on either VLAN tag on packets or user defined port priority Spanning Tree Support IEEE 802 1D IEEE 802 1w RSTP Rapid Spanning Tree Protocol standards VLAN Support Port based VLAN and IEEE802 1Q Tag VLAN Support 256 active VLANs and VLAN ID 1 4094 Port Trunking Support static port trunking and port trunking with IEEE 802 3ad LACP Bandwidth Control Support ingress and egress per port bandwidth control Port Security Support allowed denied forwarding and port security with MAC address SNMP RMON SNMP agent and RMON MIB In the device SNMP agent is a client software which is operating over SNMP protocol used to receive the command from SNMP manager server site and echo the corresponded data i e MI
61. 21 22 23 24 802 1X Fh 26 Alarm Configuration 1 2 3 4 5 6 7 8 peii Monitored Egress o 10 at 12 13 14 TS 16 I Mirror Port Isolated Group 17 18 19 20 2A 22 23 24 Restricted Group 25 26 Bandwitdh Qos Diagnostics Ey TFTP Server Firmware Upgrade oot Logout Fig 3 59 Publication date February 2006 Revision A2 122 User Manual Function name Isolated Group Function description Isolated Group function can let the port be independent of other ports in the Isolated group and the communication is also forbidden between these ports But the ports of the Isolated group are still able to communicate with the ports of the non lsolated group With this design it will be helpful to the administrator to immediately find and solve the port that results in the occurrence of looping problems in the network Parameter description Mode Used for the activation or de activation of Isolated Group function Default is disable Isolated Group User can choose any port to be the member of this group Just tick the check box M beside the port x and valid port is Port 1 26 In this group all of these member ports cannot forward packets with each other Thus the switch will not be capable of forwarding any packets in case its all ports become the members of the Isolated group Auto Logout 3 min FEML2 SW26E System Isolated Group Port SNMP DHCP Boot Mode CA Bee SUCH 1 2 3 4 5 6 7
62. 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch User s Manual Release 2 08 Table of Contents CAUTION 222 2 nnn nnn nn nnn nn nn nn nnn nnn nn nn nnn nnn VII ELECTRONIC EMISSION NOTICES VII CHAPTER 1 INTRODUCTION 2 1 1 OVERVIEW OF 3 SLOT 24 FAST ETHERNET 2 GIGABIT L2 MANAGED SWITCH nnn 2 1 2 CHECKLIST 5 1 3 FEATURES 5 1 4 VIEW OF 3 SLOT 24 FAST ETHERNET 2 GIGABIT L2 MANAGED SWITCH 7 1 4 1 User Interfaces on the Front Panel Button LEDs and Plugs 7 1 4 2 User Interfaces on the Rear Panel 9 1 5 VIEW OF THE OPTIONAL MODULES 10 CHAPTER 2 INSTALLATION 11 2 1 STARTING 3 SLOT 24 FAST ETHERNET 2 GIGABIT L2 MANAGED SWITCH UP 11 2 1 1 Hardware and Cable Installation 11 2 1 2 Installing Chassis to a 19 Inch Wiring Closet Rail 13 2 1 3 Cabling Requirements
63. 4 25 26 Fig 3 20 Parameter description IP Range The switch supports two kinds of options for managed valid IP range including Any and Custom Default is Any In case that Custom had been chosen you can assigned effective IP range The valid range is 224 0 0 0 239 255 255 255 VID The switch supports two kinds of options for managed valid VLAN VID including Any and Custom Default is Any When you choose Custom you can fill in VID number The valid VID range is 1 4094 Port The switch supports two kinds of options for managed valid port range including Any and Custom Default is Any You can select the ports that you would like them to be worked and restricted in the allowed group configuration if Custom had been chosen Publication date February 2006 Revision A2 67 User Manual Add A new entry of allowed group configuration can be created after the parameters as mentioned above had been setup and then press lt Add gt button Edit The existed entry also can be modified after pressing lt Edit gt button Delete Remove the existed entry of allowed group configuration from the allowed group Publication date February 2006 Revision A2 68 User Manual 3 6 VLAN The switch supports Tag based VLAN 802 1q and Port based VLAN Support 256 active VLANs and VLAN ID 1 4094 VLAN configuration is used to parti
64. 8 Aggregator View Mong None None None 9 None 10 None 11 None 12 None 13 None 14 None 15 None 16 None 17 None 18 Fig 3 40 LACP System Con 802 1X Alarm Configuration Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Pa Wed Od eed feed elelee ey E ejsjojal s olye Publication date February 2006 Revision A2 10 SN User Manual Function name LACP Detail LACP Aggregator Detailed Information Function description Show the detailed information of the LACP trunking group Parameter description Actor The switch you are watching on Partner The peer system from this aggregator s view System Priority Show the System Priority part of a system ID MAC Address Show the MAC Address part of a system ID Port Show the port number part of an LACP port ID Key Show the key value of the aggregator The key value is determined by the LACP protocol entity and can t be set through management Trunk Status Show the trunk status of a single member port means not ready Auto Logout 3 min System Aggregator 3 Information Port SNMP DHCP Boot SEE een el Maan euraig VLAN 32768 aa bb cc ee ee dd 32768 00 00 00 00 00 00 epee a E Ek Status Port STP a 258 St 3 o Trunk Port E Aggregator View LACP System Config 802 1X Alarm Configuration Security Bandwitdh 0 Diagnostics TFTP Server Log Firmware Upgr
65. 8 TFTP Server Function name TFTP Server Function description Set up IP address of TFTP server Parameter description Specify the IP address where the TFTP server locates Fill in the IP address of your TFTP server then press lt Apply gt button to have the setting taken effect Auto Logout 3 min System TFTP Server Port SNMP DHCP Boot server 0 0 0 0 IGMP Snooping VLAN MAC Table G RP STP Configuration Security Bandwitdh Qos Diagnostics TFTP Server Log b Firmware Upgrade Reboot Logout Fig 3 76 Publication date February 2006 Revision A2 142 User Manual 3 19 Log This function shows the log data The switch provides system log data for users There are 18 private trap logs 5 public trap logs The switch supports total 120 log entries For more details on log items please refer to the section of Trap Alarm Configuration and SNMP Configuration Function name Log Data Function description The Trap Log Data is displaying the log items including all SNMP Private Trap events SNMP Public traps and user logs occurred in the system In the report table No Time and Events are three fields contained in each trap record Auto Logout 3min_ FEML2 SW26E System Log Data Port SNMP TFTP Server 0 0 0 0 DHCP Boot Auto Upload Disabled IGMP Snooping n VLAN I nee ee See ee ae MAC Table 1 Thu Nov 24 09 38 46 2005 Login admin GYRP 2 Thu Nov 24 09 35 34 2005 Login admi
66. Auto Logout 3 min FEML2 SW26E a System MAC Maintenance Port SNMP DHCP Boot Aging time IGMP Snooping Enable 300 Secs 10 1000000 AN MAC Table Information Learning Limit 0 8191 State A J timit f Portno timit MAC Alias BESE ni BEE eni GYRP 8191 8191 STP EE o os 802 1X Alarm e191 M eo configaration gt eer oo Security Bandwitdh 8191 8191 Qos naan ais e191 ma TFTP Server 8191 8191 Firmware Upgrade Bai j Hem Logout oc e Fig 3 30 Publication date February 2006 Revision A2 7 o User Manual Function Name Static Setting Function Description The function of Static is used to configure MAC s real manners inside of the switch Three kinds of manners including static static with destination drop and static with source drop are contained in this function As static is chosen assign a MAC address to a specific port all of the switch s traffics sent to this MAC address will be forwarded to this port As static with destination drop is chosen the packet will be dropped if its DA is equal to the value you set up Due to this setting belongs to the global one so it may affect all ports transmission of the packets As static with source drop is chosen the packet will be dropped if its SA is equal to the value you set up Due to this setting belongs to the global one so it may affect all ports
67. B object Besides SNMP agent will actively issue TRAP information when happened RMON is the abbreviation of Remote Network Monitoring and is a branch of the SNMP MIB The device supports MIB 2 RFC 1213 Bridge MIB RFC 1493 RMON MIB RFC 1757 statistics Group 1 2 3 9 Ethernet like MIB RFC 1643 Ethernet MIB RFC 1643 and so on IGMP Snooping Support IGMP version 2 RFC 2236 The function IGMP snooping is used to establish the multicast groups to forward the multicast packet to the member ports and in nature avoid wasting the bandwidth while IP multicast packets are running over the network Publication date February 2006 Revision A2 User Manual 1 2 Checklist Before you start installing the switch verify that the package contains the following Aset of 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch Modules optional Mounting Accessory for 19 Rack Shelf This User s Manual in CD ROM AC Power Cord RS 232 Cable Please notify your sales representative immediately if any of the aforementioned items is missing or damaged 1 3 Features The 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch a standalone off the shelf switch provides the comprehensive features listed below for users to perform system network administration and efficiently and securely serve your network Hardware e Supports 3 8 port 10 100M TP with Nway and auto MDIX function e Suppor
68. Current Forward Delay sec Hello Time sec STP Topology Change Count Time Since Last Topology Change sec Enabled 00 40 C7 D8 09 1D 61440 00 40 C7 D8 09 1D 61440 0 20 r20 15 2 0 848 221 Publication date February 2006 Revision A2 User Manual system set contact Syntax set contact lt contact gt Description To set the contact description of the switch Argument lt contact gt string length up to 40 characters Possible value lt contact gt A b c d z and 1 2 3 etc Example FEML2 SW26E system set contact Taipei set device name Syntax set device name lt device name string gt Description To set the device name description of the switch Argument lt device name gt string length up to 40 characters Possible value lt device name gt A b c d z and 1 2 3 etc Example FEML2 SW26E system set device name CR 2600 set location Syntax set location lt location gt Description To set the location description of the switch Argument lt location gt string length up to 40 characters Possible value lt location gt A b c d z and 1 2 3 etc Example FEML2 SW26E system set location Taipei Publication date February 2006 Revision A2 222 User Manual show Syntax show Description To display the basic information of the switch Argument None Possible v
69. Description To show the time configuration including Current Time NTP Server Timezone Daylight Saving Daylight Saving Start and Daylight Saving End Argument None Possible value None Example FEML2 SW26E time sho Current Time Wed Apr 21 06 16 22 2005 NTP Server 209 81 9 7 Timezone 8 Day light Saving 4 Hours Day light Saving Start Mth 2 Day 20 Hour 10 Day light Saving End Mth 3 Day 20 Hour 10 Publication date February 2006 Revision A2 226 User Manual trunk del trunk Syntax del trunk lt port range gt Description To delete the trunking port Argument lt port range gt port range syntax 1 5 7 available from 1 to 26 Possible value lt port range gt 1 to 26 Example FEML2 SW26E trunk del trunk 1 set hash Syntax set hash lt method gt Description To set up trunk hash method Argument lt method gt hash method 0 DAand SA 1 SA 2 DA Note This hash method applies to both LACP and static trunk Possible value lt method gt 0 2 Example FEML2 SW26E trunk set hash 2 set priority Syntax set priority lt range gt Description To set up the LACP system priority Argument lt range gt available from 1 to 65535 Possible value lt range gt 1 to 65535 default 32768 Example FEML2 SW26E trunk set priority 33333 Publication date February 2006 Revision A2 227 User Manual
70. K EEE Lv 802 1x S Eem 2 Alarm Configuration Beret 20 Security esa eE Bandwitdh 3w S Global VIP 802 1p D Type TOS T Type TOS M R Type TOS M Type TOS Diagnostics TFTP Server e g gt Fig 3 69 Publication date February 2006 Revision A2 135 User Manual Function name R Type TOS Function description IP TOS Priority affect TOS fields of IP header you can find it has 8 bit SERVICE TYPE field that specifies how the datagram should be handled The field could be divided into six subfields as follows PRECEDENCE 3 bits D Type Delay Priority 1 bit T Type Throughput Priority 1bit R Type Reliability Priority 1bit M Type Monetary Cost Priority 1bit and UNUSED PRECEDENCE 3 bits can arrange 8 kinds of priorities corresponding to the 0 7 priority in the following priority diagram TOS Reliability Priority Mapping works while R TYPE in TOS field of IP header of the packets received by the switch is configured 0 1 2 3 4 5 6 7 Precedence Vorrangssteuerung MBZ Must Be Zero Parameter description TOS Reliability Priority Mapping Each Priority can select any of Queue 0 Queue 3 In Default Priority 0 is mapping to Queue 0 Priority 1 is mapping to Queue 0 Priority 2 is mapping to Queue 1 Priority 3 is mapping to Queue 1 Priority 4 is mapping to Queue 2 Priority 5 is mapping to Queue 2 Priority 6 is mapping to Queue 3 and Priority 0 is mapping to Queue 3 Auto Log
71. LI system After restoring user defined configuration all the changes in the startup configuration would be lost After rebooting the entire startup configuration would replace as user defined one Argument None Possible value None Example FEML2 SW26E restore user Restoring Restore User Configuration Successfully Press any key to reboot system save start Syntax save start Description To save the current configuration as the start one When you enter this command the CLI would save your current configuration into the non volatile FLASH If you want the configuration still works after rebooting save the configuration using the command save stat Argument None Possible value None Example FEML2 SW26E save start Saving start Save Successfully FEML2 SW26E Publication date February 2006 Revision A2 155 User Manual Save user Syntax save user Description To save the current configuration as the user defined configuration When you enter this command the CLI would save your current configuration into the non volatile FLASH as user defined configuration Argument None Possible value None Example FEML2 SW26E save user Saving user Save Successfully FEML2 SW26E Publication date February 2006 Revision A2 156 User Manual 4 2 2 Local Commands of CLI 802 1x set max request Syntax set max request lt port range gt
72. None Example FEML2 SW26E firmware show TFTP Server IP Address 192 168 3 111 Path and Filename cr2326e_FEML2 SW26E _v1 0 img upgrade Syntax upgrade Description To run the software upgrade function Argument None Possible value None Example FEML2 SW26E firmware upgrade Upgrading firmware Publication date February 2006 Revision A2 180 User Manual gvrp disable Syntax disable Description To disable the gvrp function Argument None Possible value None Example FEML2 SW26E gvrp disable enable Syntax enable Description To enable the gvrp function Argument None Possible value None Example FEML2 SW26E gvrp enable group Syntax group lt group number gt Description To enter any of gvrp group for changing gvrp group setting You can change the applicant or registrar mode of existing gvrp group per port Argument lt group number gt enter which gvrp group you had created using value is vid Available range 1 to 4094 Possible value lt group numbers gt 1 4094 Example FEML2 SW26E gvrp show group GVRP group information Current Dynamic Group Number 1 VID Member Port Publication date February 2006 Revision A2 181 User Manual FEML2 SW26E gvrp group 2 FEML2 SW26E gvrp group 2 set applicant 1 6 non participant FEML2 SW26E gvrp group 2 show GVRP group VID 2 Port Appl
73. Port 1 24 ranges from 66 102400 and Port 25 26 ranges from 66 1024000 with the minimum unit of 1 Default value of Port 1 24 is 102400 and Port 25 26 is 1024000 Publication date February 2006 Revision A2 125 User Manual Function name Egress Bandwidth Setting Function description Egress Bandwidth Setting function is used to set up the limit of Egress bandwidth for each port Auto Logout 3 min x FEML2 SW26E a System Egress Bandwidth Control Port SNMP DHCP Boot Port 1 24 66 102400 Kb IGMP Snooping Port 25 26 66 1024000 Kb yon MAC Table Port No Rate Kb ort No ate Kb as EE oo 302400 Trunk Alarm Configuration 102400 EN 202200 Bandwitdh T 102400 102400 Egress fy E 202200 102400 Storm TFTP Server Reboot om Logout 102400 NET 102400 ar be Fig 3 63 Parameter description Choose the port that you would like this function to work on it Valid range of the port is 1 26 Rate Set up the limit of Egress bandwidth for the port you choose Packet transmission will be delayed if the rate exceeds the value you set up in Data Rate field Traffic may be lost if egress buffers run full The format of the packet limits to unicast broadcast and multicast Valid value of Port 1 24 ranges from 66 102400 and Port 25 26 ranges from 66 1024000 with the minimum unit of 1 Default value of Port 1 24
74. RDING 200000 o 128 No Auto canfiquration 11 DISCARDING 200000 o 128 No Auto Security 12 DISCARDING 200000 o 128 No Auto BRANDAN 13 DISCARDING 200000 o 128 No Auto Qos 14 DISCARDING 200000 o 128 No Auto Diagnostics 15 DISCARDING 200000 o 128 No Auto TFTP Server 16 DISCARDING 200000 o 128 No Auto Log 17 DISCARDING 200000 o 128 No Auto Firmware Upgrade 18 DISCARDING 200000 o 128 No Auto Reboot 19 DISCARDING 200000 o 128 No Auto Logout 20 DISCARDING 200000 o 128 No Auto 21 DISCARDING 200000 o 128 No Auto 22 DISCARDING 200000 o 128 No Auto a Fig 3 38 Publication date February 2006 Revision A2 96 User Manual 3 10 Trunking Configuration The Port Trunking Configuration is used to configure the settings of Link Aggregation You can bundle more than one port with the same speed full duplex and the same MAC to be a single logical port thus the logical port aggregates the bandwidth of these ports This means you can apply your current Ethernet equipments to build the bandwidth aggregation For example if there are three Fast Ethernet ports aggregated in a logical port then this logical port has bandwidth three times as high as a single Fast Ethernet port has The switch supports two kinds of port trunking methods LACP Ports using Link Aggregation Control Protocol according to IEEE 802 3ad specification as their trunking method can choose their unique LACP GroupID 1 3 to form a logic trunked port The benefit of usi
75. Rate 1G imple Counter 6 p T Detail C rter J Vendor OUI 00 00 00 SNMP LT a 004007 DHCP Boot 9 vendor PN CT 1250SSP MB4L PA 10 vendorRev OL MAC Table ae COS 5234000061 GVRP 2 13 Date Code 050323 a i Ho 15 vee SSS Alarm 16 Moni Bias mA Second a Mon2 TX PWR Bandwitdh 19 Mon3 RX PWR none Qos 3 20 Diagnostics E 21 close TFTP Server 22 Log 23 Firmware Upgrade 24 Reboot Logout ah Fig 3 12 Parameter description of Port 25 and Port 26 Connector Type Display the connector type for instance UTP SC ST LC and so on Fiber Type Display the fiber mode for instance Multi Mode Single Mode Tx Central Wavelength Display the fiber optical transmitting central wavelength for instance 850nm 1310nm 1550nm and so on Baud Rate Display the maximum baud rate of the fiber module supported for instance 10M 100M 1G and so on Vendor OUI Display the Manufacturer s OUI code which is assigned by IEEE Vendor Name Display the company name of the module manufacturer Vendor P N Display the product name of the naming by module manufacturer Vendor Rev Revision Display the module revision Publication date February 2006 Revision A2 52 User Manual Vendor SN Serial Number Show the serial number assigned by the manufacturer Date Code Show the date this SFP module was made Temperature Show the current temperature of SFP module Vcc Show the working DC voltage of SFP
76. added into all packets Then these packets will be forwarded as Tag based VLAN So the incoming packets with tag will become the double tag ones Auto Logout 3 min PE VLAN Mode DHCP Boot vian mode EN e Port based VLAN Mode symmetric Vian x ia seo Olsoble ear ae SD power A MAC Table S spol Trunk 802 1X Alarm Configuration Security Bandwitdh Qos Diagnostics TFTP Server Firmware Upgrade oot Logout Fig 3 21 Publication date February 2006 Revision A2 70 User Manual 3 6 2 Tag based Group Function name Tag based Group Configuration Function description It shows the information of existed Tag based VLAN Groups You can also easily create edit and delete a Tag based VLAN group by pressing lt Add gt lt Edit gt and lt Delete gt function buttons User can add a new VLAN group by inputting a new VLAN name and VLAN ID after pressing lt Add gt button Parameter description VLAN Name The name defined by administrator is associated with a VLAN group Valid letters are A Z a z 0 9 and _ characters The maximal length is 15 characters VID VLAN identifier Each tag based VLAN group has a unique VID It appears only in tag based and Double tag mode Member This is used to enable or disable if a port is a member of the new added VLAN Enable means it is a member of the VLAN Just tick the check box beside the port x to enable it Auto Log
77. ade Reboot Logout Fig 4 41 Publication date February 2006 Revision A2 102 User Manual Function name LACP System Configuration Function description It is used to set the priority part of the LACP system ID LACP will only aggregate together the ports whose peer link partners are all on a single system Each system supports LACP will be assigned a globally unique System Identifier for this purpose A system ID is a 64 bit field comprising a 48 bit MAC Address and 16 bit priority value Parameter description System Priority The System Priority can be set by the user Its range is from 1 to 65535 Default 32768 Hash Method DA SA DA and SA are three Hash methods offered for the Link Aggregation of the switch Packets will decide the path to transmit according to the mode of Hash you choose Default DA and SA Auto Logout 3 min FEML2 SW26E System LACP System Configuration Port SNMP DHCP Boot System Priority 32768 1765535 IGMP Snooping VLAN a MAC Table Hash Method ETE GVRP Note This hash method applies to both LACP and static STP trunk Trunk E Port Aggregator View LACP System Con 802 1X Alarm Configuration Security Bandwitdh Qos Diagnostics TFTP Server Firmware Upgrade Reboot Logout Fig 3 42 Publication date February 2006 Revision A2 103 User Manual 3 11 802 1x Configuration 802 1x port based network access control prov
78. alue None Example FEML2 SW26E system show Model Name FEML2 SW26E System Description 3 Slot 24 Port 10 100 2 Gigabit L2 Managed Switch Location Contact Device Name FEML2 SW26E System Up Time 0 Days 0 Hours 59 Mins 34 Secs Current Time Thu Feb 23 00 00 20 2006 BIOS Version v1 05 Firmware Version v2 08 Hardware Mechanical Version v0 03 v0 04 Serial Number 123456789012 Host IP Address 192 168 1 1 Host MAC Address AA 00 11 22 33 44 Device Port UART 1 TP 16 Fiber 8 Combo 2 RAM Size 16 M Flash Size 2 M Publication date February 2006 Revision A2 223 User Manual tftp set server Syntax set server lt ip gt Description To set up the IP address of tftp server Argument lt ip gt the IP address of tftp server Possible value lt ip gt tftp server ip Example FEML2 SW26E tftp set server 192 168 3 111 show Syntax show Description To display the information of tftp server Argument None Possible value None Example FEML2 SW26E tftp show Tftp Server 192 168 3 111 Publication date February 2006 Revision A2 224 User Manual time set daylightsaving Syntax set daylightsaving lt hr gt lt MM DD HH gt lt mm dd hh gt Description To set up the daylight saving Argument lt hr gt daylight saving hour range 5 to 5 lt MM gt daylight saving start Month 01 12 lt DD gt daylight
79. ample EML2 SW26E account add aaaaa assword Tj p onfirm Password EML2 SW26E account 37 Q del Syntax del lt name gt Description To delete an existing account Argument lt name gt existing user account Possible value None Example FEML2 SW26E account del aaaaa Account aaaaa deleted 163 Publication date February 2006 Revision A2 User Manual modify Syntax modify lt name gt Description To change the username and password of an existing account Argument lt name gt existing user account Possible value None Example FEML2 SW26E account modify aaaaa username password the length is from 5 to 15 Current username aaaaa bbbbb New password Confirm password Username changed successfully Password changed successfully show Syntax show Description To show system account including account name and identity Argument None Possible value None Example FEML2 SW26E account show Account Name Identity admin Administrator guest guest Publication date February 2006 Revision A2 164 User Manual alarm lt lt email gt gt del mail address Syntax del mail address lt gt Description To remove the configuration of E mail address Argument lt gt email address number range 1 to 6 Possible value lt gt 1to6 Example FEML2 SW26E alarm email del mail address 2 del ser
80. an one ready member ports is a real trunked group An LACP trunk group with only one or less than one ready member ports is not a real trunked group Any Static trunk group is a real trunked group Publication date February 2006 Revision A2 97 User Manual Per Trunking Group supports a maximum of 4 ready member ports Please note that some decisions will automatically be made by the system while you are configuring your trunking ports Trunk Setting Rules are listed below Rule1 Maximum 3 groups are allowed Rule 2 The members of each group cannot exceed more than 4 ports Rule 3 Group 1 and 2 cannot exist member 25 and 26 port Rule 4 Group 3 cannot exist member from 1 to 24 port Publication date February 2006 Revision A2 98 User Manual Function name Port Setting Status Function description Port setting status is used to configure the trunk property of each and every port in the switch system Parameter description Method This determines the method a port uses to aggregate with other ports Group None A port does not want to aggregate with any other port should choose this default setting LACP A port use LACP as its trunk method to get aggregated with other ports also using LACP Static A port use Static Trunk as its trunk method to get aggregated with other ports also using Static Trunk Ports choosing the same trunking method other than None must be as
81. ancy user may configure more than two devices as Master device however the Master device with the smaller MAC value will be the Master one All of these 16 devices can become Master device and back up with each other Publication date February 2006 Revision A2 47 User Manual Auto Logout OFF FEML2 SW26E a System Virtual Stack Configuration System Information IP mba CEE oiae v Management Security Virtual Stack h croun COT Port SNMP DHCP Boot IGMP Snooping VLAN Note You should be logout every time when MAC Table evRP you change the state of Virtual Stack STP Trunk 802 1 Alarm Configuration Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade lt j a Fig 3 9 Parameter description State It is used for the activation or de activation of VSM Default is Enable Role The role that the switch would like to play in virtual stack Two types of roles including master and slave are offered for option Default is Master Group ID It is the group identifier GID which signs for VSM Valid letters are A Z a z 0 9 and _ characters The maximal length is 15 characters ee eE FeML2 sw26e ES System Virtual Stack Configuration System Information E IP PE Enable Master E Time E Account Hefault E Management Securii virtual Stack Port SNMP DHCP Boot IGMP Snooping VLAN Note You should b
82. anging from 0 to 30 seconds because the exactly delay time is computed by the switch itself The default is Disable Auto Logout 3min System DHCP Boot Port SNMP r DHCP Boot DHCP Broadcast Suppression Disable x Delay Time 1 30 seconds IGMP Snooprig VLAN MAC Table Apply GYRP Configuration Security Bandwitdh Qos Diagnostics TFTP Server Firmware Upgrade Reboot Logout Fig 3 18 Publication date February 2006 Revision A2 64 User Manual 3 5 IGMP Snooping The function IGMP Snooping is used to establish the multicast groups to forward the multicast packet to the member ports and in nature avoids wasting the bandwidth while IP multicast packets are running over the network This is because a switch that does not support IGMP or IGMP Snooping can not tell the multicast packet from the broadcast packet so it can only treat them all as the broadcast packet Without IGMP Snooping the multicast packet forwarding function is plain and nothing is different from broadcast packet A switch supported IGMP Snooping with the functions of query report and leave a type of packet exchanged between IP Multicast Router Switch and IP Multicast Host can update the information of the Multicast table when a member port joins or leaves an IP Multicast Destination Address With this function once a switch receives an IP multicast packet it will forward the packet to the members who joined in a spe
83. anual qos disable 1p Syntax disable 1p Description To disable 802 1p qos Argument None Possible value None Example FEML2 SW26E qos disable 1p disable dscp Syntax disable dscp Description To disable IP DSCP qos Argument None Possible value None Example FEML2 SW26E qos disable dscp disable qos Syntax disable qos Description To disable gos function Argument None Possible value None Example FEML2 SW26E qos disable qos Publication date February 2006 Revision A2 205 User Manual disable tos Syntax disable tos Description To disable IP TOS qos Argument None Possible value None Example FEML2 SW26E qos disable tos enable 1p Syntax enable 1p Description To enable 802 1p qos Argument None Possible value None Example FEML2 SW26E qos enable 1p enable dscp Syntax enable dscp Description To enable IP DSCP qos Argument None Possible value None Example FEML2 SW26E qos enable dscp Publication date February 2006 Revision A2 206 User Manual enable gos Syntax enable qos Description To enable gos function Argument None Possible value None Example FEML2 SW26E qos enable gos enable tos Syntax enable tos Description To enable IP TOS qos Argument None Possible value None Example FEML2 SW26E qos enable
84. are Upgrade Host MAC Address A amp 00 11 22 33 44 Reboot Device Port UART 1 TP 16 Fiber 8 Combo 2 Logout Ram size AN Flash Size 2M z Fig 3 2 Publication date February 2006 Revision A2 31 User Manual The Information of Page Layout On the top side it shows the front panel of the switch In the front panel the linked ports will display green as to the ports which are link off they will be dark For the optional modules the slot will show only a cover plate if no module exists and will show a module if a module is present The image of module depends on the one you inserted The same if disconnected the port will show just dark if linked green In this device there are clicking functions on the panel provided for the information of the ports and the TP fiber in 3 module slots These are very convenient functions for browsing the information of a single port or TP fiber module When clicking the port or the edge of TP fiber module on the front panel an information window for them will be pop out See Fig 3 3 3 4 Auto Logout OFF F hitp 192 168 1 1 iconportdetail html Microsoft Internet Exp E FEML2 SW26E i 5 System Port 1 Detail Information Port SNMP DHCP Boot IGMP Snooping N up VLAN Enabled MAC Table ry GYRP Auto Negotiation Enabled STP Speed Duplex 100M Full Trunk Rx Pause ON EE C o Alarm Configuration Tx Byte 429982 Security Rx Byte 130038 Caen Tx Packet 1057 0
85. as well as the examples of the operation for web based interface and command line interface CLI Overview of this user s manual E Chapter 1 Introduction describes the features of 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch Chapter 2 Installation Chapter 3 Operation of Web based Management Chapter 4 Operation of CLI Management Chapter 5 Maintenance Publication date February 2006 Revision A2 User Manual 1 Introduction 1 1 Overview of 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch implemented 24 10 100Mbps TP or 100Mbps fiber 2 Gigabit dual media ports with TP SFP is a standard switch that meets all IEEE 802 3 u x z Gigabit Fast Ethernet and Ethernet specifications The switch can be managed through RS 232 serial port via directly connection or through Ethernet port using Telnet or Web based management unit associated with SNMP agent With the SNMP agent the network administrator can logon the switch to monitor configure and control each port s activity in a friendly way The overall network management is enhanced and the network efficiency is also improved to accommodate high bandwidth applications In addition the switch features comprehensive and useful function such as QoS Quality of Service Spanning Tree VLAN Port Trunking Bandwidth Control Port Security SNMP RMON and IGMP Snooping capability via the
86. ation date February 2006 Revision A2
87. ault community name for GET public Default community name for SET private Default community name for Trap public Default Set function Enable Default trap host IP address 0 0 0 0 Default port number 162 Trap In the switch there are 6 trap hosts supported Each of them has its own community name and IP address is user definable To set up a trap host means to create a trap manager by assigning an IP address to host the trap message In other words the trap host is a network management unit with SNMP manager receiving the trap message from the managed switch with SNMP agent issuing the trap message 6 trap hosts can prevent the important trap message from losing For each public trap the switch supports the trap event Cold Start Warm Start Link Down Link Up and Authentication Failure Trap They can be enabled or disabled individually When enabled the corresponded trap will actively send a trap message to the trap host when a trap happens If all public traps are disabled no public trap message will be sent As to the Enterprise no 6 trap is classified as private trap which are listed in the Trap Alarm Configuration function folder Default for all public traps Enable Auto Logout 3 min FEML2 SW26E System SNMP Configuration Port SNMP DHCP bdot SNMP Enable Disable IGMP Snooping Get Community public VLAN MAC Table Set Community private Enable_ bet Trap Host 1 IP
88. bit Bit Time unit 0 01us 1sec 100 Mega bit Table 2 2 Sum up all elements bit time delay and the overall bit time delay of wires devices must be within Round Trip Delay bit times in a half duplex network segment collision domain For full duplex operation this will not be applied You may use the TP Fiber module to extend the TP node distance over fiber optic and provide the long haul connection Typical Network Topology in Deployment A hierarchical network with minimum levels of switch may reduce the timing delay between server and client station Basically with this approach it will minimize the number of switches in any one path will lower the possibility of network loop and will improve network efficiency If more than two switches are connected in the same network select one switch as Level 1 switch and connect all other switches to it at Level 2 Server Host is recommended to connect to the Level 1 switch This is general if no VLAN or other special requirements are applied Publication date February 2006 Revision A2 15 User Manual Case1 All switch ports are in the same local area network Every port can access each other See Fig 2 3 Fig 2 3 No VLAN Configuration Diagram If VLAN is enabled and configured each node in the network that can communicate each other directly is bounded in the same VLAN area Here VLAN area is defined by what VLAN you are using The switch support
89. ble By the way this also reduces the unnecessary multicast traffic Passive IP Address In Passive Snooping mode the IGMP snooping will not periodically poll the hosts in the groups The switch will send a Membership Query message to all hosts only when it has received a Membership Query message from a router Show all multicast groups IP addresses that are registered on this device VLAN ID Show VLAN ID for each multicast group Member Port Show member ports that join each multicast group Member port may be only or more than one Publication date February 2006 Revision A2 66 User Manual Function name Allowed Group Function description The Allowed Group function allows the IGMP Snooping to set up the IP multicast table based on user s specific conditions IGMP report packets that meet the items you set up will be joined or formed the multicast group Auto Logout 3min_ Y FEML2 SW26E s System Allowed Group Port SNMP DHCP Boot J Se ae IGMP Snooping any any Status Sm Allowed Group ghy O Custom L O custom VLAN br Sige o a ae GVRP STP any Trunk Custom 802 1X 1 2 3 4 5 6 7 8 Alarm Configuration 9 10 11 12 13 14 15 16 Security Ir 18 19 20 i 22 23 24 Bandwitdh Qos 95 26 Diagnostics TFTP Server To ee ecco noma Upgrade 1 2 3 4 5 6 7 8 9 10 11 12 1 Any Any 13 14 15 16 17 18 19 20 21 Logout 22 23 2
90. bnet mask 255 255 0 0 in default in which the first two bytes is with all 1s This means more than 60 thousands of nodes in flat IP address will be at the same network It s too large to manage practically Now if we divide it into smaller network by extending network prefix from 16 bits to say 24 bits that s using its third byte to subnet this class B network Now it has a subnet mask 255 255 255 0 in which each bit of the first three bytes is 1 It s now clear that the first two bytes is used to identify the class B network the third byte is used to identify the subnet within this class B network and of course the last byte is the host number Not all IP address is available in the sub netted network Two special addresses are reserved They are the addresses with all zero s and all one s host number For example an IP address 128 1 2 128 what IP address reserved will be looked like All Os mean the network itself and all 1s mean IP broadcast Network Subnet All Os 128 1 2 128 0000000 All 1s 128 1 2 255 1 1111111 Publication date February 2006 Revision A2 24 User Manual In this diagram you can see the subnet mask with 25 bit long 255 255 255 128 contains 126 members in the sub netted network Another is that the length of network prefix equals the number of the bit with 1s in that subnet mask With this you can easily count the number of IP addresses matched The following table shows the result
91. c GYRE HEB Enable auto Y Symmetric_ Trunk E Enable Auto Symmetric 802 1Xx Enable Auto Symmetric a Alarm z on le z E v x Configuration Enable Auto Symmetric j d Security m Enable Auto Symmetric _ Bandwitdh EEE Enable Auto Symmetric Qos I P Diagnostics EEE Enable auto Symmetric_ TFTP Server EH Enable v Auto Symmetric v Log F 4 4 Firmware Upgrade EEE Enable Auto ymmetric Y Peewee EE Enable v auto symmetric _v Logout EB Enable auto Symmetric a NS aen lone nentn el d Fig 3 14 Function name Port Configuration Function description It is used to set each port s operation mode The switch supports 3 parameters for each port They are state mode and flow control Parameter description State Set the communication capability of the port is Enabled or Disabled When enabled traffic can be transmitted and received via this port When disabled the port is blocked and no traffic can be transferred through this port Port State is configurable by the user There are only two states Enable and Disable able to choose If you set a port s state Disable then that port is prohibited to pass any traffic even it looks Link up Default Enable Publication date February 2006 Revision A2 53 User Manual Speed Duplex Set the speed and duplex of the port In speed 10 100Mbps baud rate is available for Fast Etherne
92. cation date February 2006 Revision A2 User Manual 5 Maintenance 5 1 Resolving No Link Condition The possible causes for a no link LED status are as follows The attached device is not powered on e The cable may not be the correct type or is faulty e The installed building premise cable is faulty e The port may be faulty 5 2 Q amp A 1 Computer A can connect to Computer B but cannot connect to Computer C ena the Managed Switch The network device of Computer C may fail to work Please check the link act status of Computer C on the LED indicator Try another network device on this connection v The network configuration of Computer C may be something wrong Please verify the network configuration on Computer C 2 The uplink connection function fails to work v The connection ports on another must be connection ports Please check if connection ports are used on that Managed Switch v Please check the uplink setup of the Managed Switch to verify the uplink function is enabled 3 The console interface cannot appear on the console port connection v The COM port default parameters are Baud Rate 57600 Data Bits 8 Parity Bits None Stop Bit A Flow Control None Please check the COM port property in the terminal program And if the parameters are changed please set the COM configuration to the new setting v Check the RS 232 cable is connected well on the console port of the Managed Switch and COM port of PC
93. cified IP multicast group before The packets will be discarded by the IGMP Snooping if the user transmits multicast packets to the multicast group that had not been built up in advance Auto Logout 3 min SD IGMP Snooping Port SNMP s i DHCP Boot Disable active O Passive IGMP Snooping mi IP Multicast Table Allowedcroup VLAN MAC Table GYRP STP Trunk EN 802 1X Alarm Configuration Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 19 Function name IGMP Snooping Status Function description IGMP is used to snoop the status of IP multicast groups and display its associated information in both tagged VLAN and non tagged VLAN networks Enabling IGMP with either passive or active mode you can monitor the IGMP snooping information which contains the multicast member list with the multicast groups VID and member port Publication date February 2006 Revision A2 65 User Manual Parameter description IGMP snooping mode selection The switch supports three kinds of IGMP Snooping status including Passive Active and Disable Disable Active Set Disable mode to disable IGMP Snooping function Default Disable In Active mode IGMP snooping switch will periodically issue the Membership Query message to all hosts attached to it and gather the Membership report message to update the database of the Multicast ta
94. configure the switch You can touch them through the following procedures Section 2 1 4 1 Configuring the Management Agent of 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch through the Serial RS 232 Port Section 2 1 4 2 Configuring the Management Agent of 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch through the Ethernet Port Note Please first modify the IP address Subnet mask Default gateway and DNS through RS 232 console and then do the next Publication date February 2006 Revision A2 18 User Manual 2 1 4 1 Configuring the Management Agent of 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch through the Serial RS 232 Port To perform the configuration through RS 232 console port the switch s serial port must be directly connected to a DCE device for example a PC through RS 232 cable with DB 9 connector Next run a terminal emulator with the default setting of the switch s serial port With this you can communicate with the switch In the switch RS 232 interface only supports baud rate 57 6k bps with 8 data bits 1 stop bit no parity check and no flow control RS 232 DB 9 Connector AC Line 100 240V 50 60 Hz 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch Default IP Setting IP address 192 168 1 1 Subnet Mask 255 255 255 0 Default Gateway 192 168 1 254 i P RS 232 cable with female DB 9 connector at both ends Fig 2 7 Terminal or Terminal Emula
95. d information of the LACP trunk group Argument lt aggtr gt aggregator available from 1 to 26 Possible value lt aggtr gt 1 to 26 Example FEML2 SW26E trunk show lacp detail 2 Aggregator 2 Information Actor Partner System Priority MAC Address System Priority MAC Address 32768 00 40 c7 e8 00 02 32768 00 00 00 00 00 00 Port Key Trunk Status Port Key 2 257 2 0 Publication date February 2006 Revision A2 229 User Manual show status Syntax show status Description To display the aggregator status and the settings of each port Argument None Possible value None Example FEML2 SW26E trunk show status Trunk Port Setting Trunk Port Status port Method Group Active LACP Aggtregator Status 1 None 0 Active 1 Ready 2 LACP 1 Active 2 3 LACP 1 Active 3 ama 4 LACP 1 Active 4 as 5 LACP 1 Active 5 ae 6 one 0 Active 6 ae 7 one 0 Active 7 So 8 one 0 Active 8 Sone 9 one 0 Active 9 10 one 0 Active 10 ae 11 one 0 Active 11 Ea 12 one 0 Active 12 ape 13 one 0 Active 13 Je 14 one 0 Active 14 z 15 one 0 Active 15 SS 16 one 0 Active 16 aes 17 one 0 Active 17 18 one 0 Active 18 19 one 0 Active 19 ma 20 one 0 Active 20 es 21 one 0 Active 21 22 one 0 Active 22 ans 23 one 0 Active 23 ad 24 one 0 Active 24 Sa 25 one 0 Active 25 a 26 one 0 Active 26 Se Publication date February 2006 Revision A2 230 User Manual vlan del port group
96. d services DS Under the differentiated services interpretation the first six bits comprise a codepoint which is sometimes abbreviated DSCP and the last two bits are left unused High Priority Packet streams will experience less delay into the switch For handing different priority packets each egress port has designed up to 4 queues Each QoS is influenced by two scheduling WRR Weighted Round Robin and Strict Priority as well When you finish to set the priority mapping to the queue WRR scheduling will distribute the bandwidth according to the weight you set for 4 queues queue 0 to queue 3 Another scheduling is Strict Priority dedicated for the function named VIP Port of QoS While we select some ports as the VIP Port these ports will own the highest transmitting priority in egress queue of the switch Publication date February 2006 Revision A2 129 User Manual The QoS functions as we mentioned above are able to enabled at the same time But the following precedence will decide whether these functions work or not 1 enable both VIP and TOS Choose priorities of VIP and TOS 2 enable both VIP and DSCP Choose priorities of VIP and DSCP 3 enable both TOS and DSCP Choose DSCP 4 enable both VIP and DSCP Choose priorities of VIP and DSCP 5 enable both 802 1p and TOS Choose TOS 6 enable both 802 1p and DSCP Choose DSCP 7 enable both 802 1p and DSCP and TOS Choose DSCP 8 enable both 802 1p
97. d to this port won t be allowed to access the network 10 When the supplicant issue an EAP Logoff message to Authentication server the port you are using is set to be unauthorized Lo Bridge _ E LAN PC Port connect 0 Access blocked EAPOL Start EAPOL EAP Request Identity EAP Response Identity EAP Request EAP Response cred EAP Success EAP Failure EAP Logoff Access allowed Fig 3 45 Publication date February 2006 Revision A2 107 User Manual Only MultiHost 802 1X is the type of authentication supported in the switch In this mode for the devices connected to this port once a supplicant is authorized the devices connected to this port can access the network resource through this port 802 1x Port based Network Access Control function supported by the switch is little bit complex for it just support basic Multihost mode which can distinguish the device s MAC address and its VID The following table is the summary of the combination of the authentication status and the port status versus the status of port mode set in 802 1x Port mode port control state set in 802 1x port setting Here Entry Authorized means MAC entry is authorized Port Mode Port Control Authentication Port Status Disable Don t Care Don t Care Port Uncontrolled Multihost Auto Successful Port Authorized Multihost Auto Failure P
98. de Connector Slot 8 Port FE TP Module 10 100HDX FDX TP 3 Option 8 Port FE SC MM Module 100FDX SC M M 3 Option 8 Port FE SC SM Module 100FDX SC S M 3 Option 8 Port FE ST MM Module 100FDX ST M M 3 Option 8 Port FE SC SM Module 100FDX BiDi SC S M 3 Option Default module Transmission Mode 10 100Mbps support full or half duplex 1000Mbps support full duplex only Transmission Speed 10 100 1000Mbps for TP 10 100Mbps for 8 port FE TP Module 100Mbps for 8 port FE Fiber Module 1000Mbps for SFP Fiber Full Forwarding Filtering Packet Rate PPS packets per second Forwarding Rate Speed 1 488 000PPS 1000Mbps 148 800PPS 100Mbps 14 880PPS 10Mbps MAC Address and Self learning 8K address table entries 256 VLAN table entries 256 IP multicast table entries Buffer Memory Embedded 256KB packet buffers and 128KB control memory Flow Control EEE802 3x compliant for full duplex Backpressure flow control for half duplex Publication date February 2006 Revision A2 242 User Manual Cable and Maximum Length P Cat 5 UTP cable up to 100m 00Base Multi Mode Fiber up to 2Km 00Base Single Mode Fiber up to 5 20 60 80Km METARA PIRR Single Fiber BiDi 20 40 60Km 5 7 Up to 220 275 500 550m 10005 ASE SA SC MEM which depends on Multi Mode Fiber type 1000Base LX SC S M Single Mode Fiber up to10 30 50Km FTAA DPIN RE Single Fiber BiDi 20Km
99. default IP address 192 168 1 1 to 10 1 1 1 and set the subnet mask to be 255 255 255 0 Then choose your default gateway may be it is 10 1 1 254 Default Value 3 Slot 24 Fast Ethernet 2 Your Network Setting Gigabit L2 Managed Switch IP Address 192 168 1 1 10 1 1 1 Subnet 255 255 255 0 255 255 255 0 WACTUIECEMCUEWE 192 168 1 254 10 1 1 254 Table 2 3 After completing these settings in the switch it will reboot to have the configuration taken effect After this step you can operate the management through the network no matter it is from a web browser or Network Management System NMS anaged Switch FEML2 SwW26E Login admin Password FEML2 Sw26E J Fig 2 8 the Login Screen for CLI Publication date February 2006 Revision A2 20 User Manual 2 1 4 2 Configuring the Management Agent of 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch through the Ethernet Port There are three ways to configure and monitor the switch through the switch s Ethernet port They are CLI Web browser and SNMP manager The user interface for the last one is NMS dependent and does not cover here We just introduce the first two types of management interface 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch Default IP Setting IP 192 168 1 1 Subnet Mask 255 255 255 0 Default Gateway 192 168 1 254 Assign a reasonable IP address For example IP 192 168 1 100 Subn
100. duling weighted round robin method lt strict gt scheduling strict method lt wrr_0 to 3 gt weighted for every queue Weighted range 1 55 Possible value lt wrr strict gt wrr or strict lt wrr_0 to 3 gt 1 55 Example FEML2 SW26E qos set sche wrr 1 2 8 16 set tos Syntax set tos lt type_value gt lt q0 gt lt priority gt lt q1 gt lt priority gt lt q2 gt lt priority gt lt q3 gt lt priority gt Description To set IP tos qos weighting for 4 queues Argument lt type_value gt Delay Priority 0 Throughput Priority 1 Reliability Priority 2 Monetary Cost Priority 3 lt q gt queue level q0 queue 0 q1 queue 1 q2 queue 2 q3 queue 3 lt priority gt priority level One queue has been assigned 2 different priorities You don t need to use all of queues but must assign queues in order from low queue to high queue Syntax 1 2 or 2 5 7 available from 0 to 7 Publication date February 2006 Revision A2 208 User Manual Possible value lt lype_value gt 0 3 lt priority gt 0 to 7 Example FEML2 SW26E qos set tos 0 q0 1 q12q24q36 set vip Syntax set vip lt port_range gt lt mode gt Description To set vip port for strict priority Argument lt port_range gt syntax 1 5 7 available from 1 to 26 lt mode gt enable disable vip port for each port 1 enable 0 disable Possible value lt port_range gt 1 to 26 lt mode gt 1 or 0 Example
101. e Fig 3 48 Publication date February 2006 Revision A2 w lI User Manual Function name Param Setting Function description This function is used to configure the parameters for each port in 802 1x port security application Refer to the following parameters description for details Parameter description Port It is the port number to be selected for configuring its associated 802 1x parameters which are Port control reAuthMax txPeriod Quiet Period reAuthEnabled reAuthPeriod max Request suppTimeout serverTimeout and Controlled direction Port Control This is used to set the operation mode of authorization There are three type of operation mode supported ForceUnauthorized ForceAuthorized Auto e ForceUnauthorized The controlled port is forced to hold in the unauthorized state e ForceAuthorized The controlled port is forced to hold in the authorized state e Auto The controlled port is set to be in authorized state or unauthorized state depends on the result of the authentication exchange between the authentication server and the supplicant Default Auto reAuthMax 1 10 The number of authentication attempt that is permitted before the port becomes unauthorized Default 2 txPeriod 1 65535 s Atime period to transmitted EAPOL PDU between the authenticator and the supplicant Default 30 Quiet Period 0 65535 s A period of time during which we will not attempt to access th
102. e Example FEML2 SW26E vlan disable symmetric Publication date February 2006 Revision A2 232 User Manual enable double tag Syntax enable double tag Description To enable double tag Argument None Possible value None Example FEML2 SW26E vlan enable double tag enable drop untag Syntax enable drop untag lt port_range gt Description To enable drop untag Argument lt port_range gt which port s you want to drop untagged frames Syntax 1 5 7 available from 1 to 26 Possible value lt port_range gt 1 to 26 Example FEML2 SW26E vlan enable drop untag 2 4 5 7 enable sv Syntax enable svl Description To enable Shared VLAN Learning Argument None Possible value None Example FEML2 SW26E vlan enable svl Publication date February 2006 Revision A2 233 User Manual enable symmetric Syntax enable symmetric Description To drop frames from the non member port Argument None Possible value None Example FEML2 SW26E vlan enable symmetric set mode Syntax set mode lt port tag gt Description To switch vlan mode between port based and tag based modes Argument lt port tag gt port or tag tag set tag based vlan port set port based vlan Possible value lt port tag gt port or tag Example FEML2 SW26E vlan set mode tag set port group Syntax set port group lt name gt lt range gt Description
103. e then the packets with tagged or untagged will be processed If the later is the case only the packets carrying VLAN tag will be processed the rest packets will be discarded Publication date February 2006 Revision A2 74 User Manual 3 6 4 Port based Group Function name Port based Group Configuration Function description It shows the information of the existed Port based VLAN Groups You can easily create edit and delete a Port based VLAN group by pressing lt Add gt lt Edit gt and lt Delete gt function buttons User can add a new VLAN group by inputting a new VLAN name Parameter description VLAN Name The name defined by administrator is associated with a VLAN group Valid letters are A Z a z 0 9 and _ characters The maximal length is 15 characters Member This is used to enable or disable if a port is a member of the new added VLAN Enable means it is a member of the VLAN Just tick the check box beside the port x to enable it System Port SNMP DHCP Boot IGMP Snooping VLAN VLAN Mode Tag based Group P ID Port based Group t MAC Table STP Trunk Configuration Security Bandwitdh Qos Diagnostics TFTP Server Firmware Upgrade Reboot Logout Auto Logout 3min_ Port based Group Nop VLANNAME O 1 default E Fig 3 26 Publication date February 2006 Revision A2 75 User Manual Add Group Create a new Port based VLAN
104. e is received by the GARP application JoinEmpty Message Packets Number of GARP BPDU with Join Empty message is received by the GARP application JoinIn Message Packets Number of GARP BPDU with Join In message is received by the GARP application Publication date February 2006 Revision A2 87 User Manual LeaveEmpty Message Packets Number of GARP BPDU with Leave Empty message is received by the GARP application Empty Message Packets Number of GARP BPDU with Empty message is received by the GARP application Transmitted Total GVRP Packets Total GARP BPDU is transmitted by the GVRP application Invalid GVRP Packets Number of invalid GARP BPDU is transmitted by the GVRP application LeaveAll Message Packets Number of GARP BPDU with Leave All message is transmitted by the GARP application JoinEmpty Message Packets Number of GARP BPDU with Join Empty message is transmitted by the GARP application JoinIn Message Packets Number of GARP BPDU with Join In message is transmitted by the GARP application LeaveEmpty Message Packets Number of GARP BPDU with Leave Empty message is transmitted by the GARP application Empty Message Packets Number of GARP BPDU with Empty message is transmitted by the GARP application Publication date February 2006 Revision A2 88 User Manual Function name GVRP Group Information Function description To show the dynamic group member and th
105. e logout every time when MAC Table CE you change the state of Virtual Stack STP Trunk 802 1X Alarm Configuration Security Bandwitdh Qos Diagnostics s iv Fig 3 10 Publication date February 2006 Revision A2 48 User Manual 3 2 Port Configuration Four functions including Port Status Port Configuration Simple Counter and Detail Counter are contained in this function folder for port monitor and management Each of them will be described in detail orderly in the following sections Port Configuration Configuration Simple Counter Detail Counter 3 2 1 Port Status The function Port Status gathers the information of all ports current status and reports it by the order of slot number port number media link status port state Auto Negotiation status speed duplex Rx Pause and Tx Pause Extra fiber media type information for the module ports 25 and 26 See Fig 3 12 as well as slots 1 3 are also offered See Fig 3 13 Auto Logout 3min FEML2 SW26E a System Port Current Status Port rr Slot No Port No Media Link state auto Nego Speed Duplex Simple Counter 1 TP On On Up Enabled Enabled 100M Full if Detail Counter 2 TP DownEnabled Enabled SNMP 3 TP DownEnabled Enabled DHCP Boot 1 4 TP DownEnabled Enabled IGMP Snooping 5 TP DownEnabled Enabled VLAN 6 TP DownEnabled Enabled MAC Table 7 TP DownEnabled Enabled GVRP 8 TP DownEnabled Enabled STP 9 TP D
106. e supplicant Deafult 60 seconds Publication date February 2006 Revision A2 112 User Manual reAuthEnabled Choose whether regular authentication will take place in this port Default ON reAuthPeriod 1 65535 s Anon zero number seconds between the periodic re authentication of the supplicant Default 3600 max Request 1 10 The maximum of number times that the authenticator will retransmit an EAP Request to the supplicant before it times out the authentication session The valid range 1 10 Default 2 times suppTimeout 1 65535 s A timeout condition in the exchange between the authenticator and the supplicant The valid range 1 65535 Default 30 seconds serverTimeout 1 65535 s A timeout condition in the exchange between the authenticator and the authentication server The valid range 1 65535 Default 30 seconds Auto Logout 3min_ FEML2 SW26E a System Port Parameter Setting Port SNMP DHCP Boot aaa IGMP Snooping Port Control Auto ij VLAN h MAC Table reAuthMax 1 10 E eS GYRP txPeriod 1 65535 s 30 STP Trunk Quiet Period 0 65535 s 60 i 802 1 reauthEnabled oN x State T Mode reAuthPeriod 1 65535 s 3600 Security max Request 1 10 2 Alarm n Configuration suppTimeout 1 65535 s 30 Spamy serverTimeout 1 65535 s 30 an Bandwitdh J e Qos Diagnostics Ena TFTP Server PAS Log Firmware Upgrade Reboot Logout Fig 3 49 Publication date February
107. ea QoS Global Config Port SNMP DHCP Boot QoS Mode Disable IGMP Snooping VLAN MAC Table Priority Control GYRP 802 1P TOS DSCP STP Trunk 802 1X t Aan Scheduling Method WRR Y Configuration Bidaai Security pelei Peitsi eE EMM E clobal ty Queue 0 Queue Queue 2 Queue 3 VIP fa z 4 Cm 802 1p D Type TOS T Type TOS Apply R Type TOS M Type TOS Diagnostics TFTP Server x s gt Fig 3 65 Publication date February 2006 Revision A2 151 User Manual Function name VIP Port Setting Function description When the port is set as VIP Port the packets enter this port and will have highest transmitting priority For example as you choose port 2 is VIP Port simultaneously transmit packets from port 2 and port 3 to port 3 at speed of 100MB and let congestion happen The packets for port 3 will be dropped because the packets from port 2 owns highest precedence For the sake of this function taking effect you must choose Scheduling Method of Strict Priority ahead Parameter description VIP Port Just tick the check box MI to select any port port 1 26 as the VIP Port Then click the lt Apply gt button to have the setting taken effect Auto Logout 3 min FEML2 SW26E System VIP Port Port SNMP DHCP Boot 3 4 5 6 T 8 Pete ear 9 10 ii 12 13 14 15 16 MAC Table 17 18 19 20 21 22 23 24 CURE 25 26
108. ect time The switch supports configurable time zone from 12 to 13 step 1 hour Default Time zone 8 Hrs Daylight Saving Daylight saving is adopted in some countries If set it will adjust the time lag or in advance in unit of hours according to the starting date and the ending date For example if you set the day light saving to be 1 hour When the time passes over the starting time the system time will be increased one hour after one minute at the time since it passed over And when the time passes over the ending time the system time will be decreased one hour after one minute at the time since it passed over The switch supports valid configurable day light saving time is 5 5 step one hour The zero for this parameter means it need not have to adjust current time equivalent to in act daylight saving You don t have to set the starting ending date as well If you set daylight saving to be non zero you have to set the starting ending date as well otherwise the daylight saving function will not be activated Default for Daylight Saving 0 The following parameters are configurable for the function Daylight Saving and described in detail Day Light Saving Start This is used to set when to start performing the day light saving time Mth Range is 1 12 Default 1 Day Range is 1 31 Default 1 Hour Range is 0 23 Default 0 Publication date February 2006 Revision A2 4 User Manual
109. ed Mode This function is used to restrict dynamic VLAN be created when this port received GVRP PDU There are two modes disable and enable provided for the user s choice Disabled In this mode the switch dynamic VLAN will be created when this port received GVRP PDU The default setting is Normal Enabled In this mode the switch does not create dynamic VLAN when this port received GVRP PDU Except received dynamic VLAN message of the GVRP PDU is an existed static VLAN in the switch this port will be added into the static VLAN members dynamically Publication date February 2006 Revision A2 86 User Manual Function name GVRP Counter Function description All GVRP counters are mainly divided into Received and Transmitted two categories to let you monitor the GVRP actions Actually they are GARP packets Auto Logout 3 min EE GVRP Counter Porti DHCP Boot IGMP Snooping Total GVRP Packets D 0 N Invalid GYRP Packets 0 MAC Table LeaveAll message 0 it GVRP JoinEmpty message 0 o Config JoinIn message 0 0 chit EOM Raa 5 a STP pee a e Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 34 Parameter description Received Total GVRP Packets Total GVRP BPDU is received by the GVRP application Invalid GVRP Packets Number of invalid GARP BPDU is received by the GARP application LeaveAll Message Packets Number of GARP BPDU with Leave All messag
110. eir information Parameter description Current Dynamic Group Number The number of GVRP group that are created currently VID VLAN identifier When GVRP group creates each dynamic VLAN group owns its VID Valid range is 1 4094 Member Port Those are the members belonging to the same dynamic VLAN group Edit Administrative Control When you create GVRP group you can use Administrative Control function to change Applicant Mode and Registrar Mode of GVRP group member Refresh Refresh function can help you to see current GVRP group status Auto Logout 3 min System GVRP VLAN Group Information Port DHCP Boat o IGMP Snooping we MAC Table Ee GVRP contig Counter Group STP b Trunk 802 1X Alarm Configuration Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 35 Publication date February 2006 Revision A2 89 User Manual 3 9 STP Configuration The Spanning Tree Protocol STP is a standardized method IEEE 802 1D for avoiding loops in switched networks When STP is enabled ensure that only one path is active between any two nodes on the network at a time User can enable Spanning Tree Protocol on switch s web management and then set up other advanced items We recommend that you enable STP on all switches to ensure a single active path on the network 3 9 1 STP Status Function name STP Status Function description In the Spann
111. elay Show the current root bridge forward delay time The value of Forward Delay time is set by root The Forward Delay time is defined as the time spent from Listening state moved to Learning state or from Learning state moved to Forwarding state of a port in bridge Hello Time Show the current hello time of the root bridge Hello time is a time interval specified by root bridge used to request all other bridges periodically sending hello message every hello time seconds to the bridge attached to its designated port STP Topology Change Count STP Topology Change Count expresses the time spent in unit of seconds since the beginning of the Spanning Tree Topology Change to the end of the STP convergence Once the STP change is converged the Topology Change count will be reset to 0 The figures showing in the screen may not be the exact time it spent but very close to because the time is eclipsing Time Since Last Topology Change Time Since Last Topology Change is the accumulated time in unit of seconds the STP has been since the last STP Topology Change was made When Topology Change is initiated again this counter will be reset to 0 And it will also count again once STP topology Change is Auto Logout 3 min FEML2 SW26E System STP Status Port SNMP n DHCP Boot STP State Disabled IGMP Snooping Bridge ID AA BB CC EE EE DD VLAN Bridge Priority 32768 MAC Table GYRP Designated Root AA BB CC EE EE DD STP Desig
112. ent Cold Start Link Down Link Up Authentication Failure User Login User Logout STP Topology Changed STP Disabled STP Enabled LACP Disabled i Fig 3 50 Email SMS Configuration Function description Email Select Unselect All SMS Select Unselect All Trap Select Unselect All Eman ee mran v CoB KS KS a i lt Alarm configuration is used to configure the persons who should receive the alarm message via either email or SMS or both It depends on your settings An email address or a mobile phone number has to be set in the web page of alarm configuration See Fig 3 51 Then user can read the trap information from the email or the mobile phone This function provides 6 email addresses and 6 mobile phone numbers at most The 23 different trap events will be sent out to SNMP Manager when trap event occurs After ticking trap events you can fill in your desired email addresses and mobile phone numbers Then please click lt Apply gt button to complete the alarm configuration It will take effect in a few seconds systems 15 Note SMS may not work in your mobile phone system It is customized for different Publication date February 2006 Revision A2 User Manual Parameter description Email Mail Server the IP address of the server transferring your email Username your username
113. er it is 1000Mbps supported only The status of speed duplex mode is determined by 1 the negotiation of both local port and link partner in Auto Speed mode or 2 user setting in Force mode The local port has to be preset its capability In port 1 24 they are supported Fast Ethernet with TP media only so the result will show 100M Full or 100M Half 10M Full and 10M Half duplex In port 25 and port 26 if the media is 1000Mbps with TP SFP media it will show the combinations of 10 100M and Full Half duplex 1000Mbps and Full duplex only If the media is 1000Mbps with fiber media it will show only 1000M Full duplex Default None depends on the result of the negotiation Rx Pause The way that the port adopts to process the PAUSE frame If it shows on the port will care the PAUSE frame otherwise the port will ignore the PAUSE frame Default None Tx Pause It decides that whether the port transmits the PAUSE frame or not If it shows on the port will send PAUSE frame otherwise the port will not send the PAUSE frame Default None Publication date February 2006 Revision A2 5I User Manual 2 2 2 2 si ttp 168 1 1 portfiber htm icrosoft Internet Explorer She A http 192 168 1 1 fiber html Mi ft Expl Auto Loggt jamin M Port 25 Detail Information S ie 5 Connector Type SFP LC stem ih 3 Fiber Type Reserved Status 1 4 Tx Central Wavelength 0 ai 5 Baud
114. er description Port Status It displays the current state of a port We cannot manually set it because it displays the status only There are three possible states according to 802 1w specification DISCARDING state indicates that this port can neither forward packets nor contribute learning knowledge Notice Three other states Disable state BLOCKING state and LISTENING state defined in the 802 1d specification are now all represented as DISCARDING state LEARNING state indicates this port can now contribute its learning knowledge but cannot forward packets still FORWARDING state indicates this port can both contribute its learning knowledge and forward packets normally Path Cost Status It is the contribution value of the path through this port to Root Bridge STP algorithm determines a best path to Root Bridge by calculating the sum of path cost contributed by all ports on this path A port with a smaller path cost value would become the Root Port more possibly Configured Path Cost The range is 0 200 000 000 In the switch if path cost is set to be zero the STP will get the recommended value resulted from auto negotiation of the link accordingly and display this value in the field of Path Cost Status Otherwise it may show the value that the administrator set up in Configured Path Cost and Path Cost Status Publication date February 2006 Revision A2 94 User Manual 802 1w RSTP recommended va
115. et Mask 255 255 255 0 Default Gateway 192 168 1 254 Fig 2 9 Managing 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch through Ethernet Port Before you communicate with the switch you have to finish first the configuration of the IP address or to know the IP address of the switch Then follow the procedures listed below 1 Setup a physical path between the configured the switch and a PC by a qualified UTP Cat 5 cable with RJ 45 connector Note If PC directly connects to the switch you have to setup the same subnet mask between them But subnet mask may be different for the PC in the remote site Please refer to Fig 2 9 about the switch s default IP address information 2 Run CLI or web browser and follow the menu Please refer to Chapter 3 and Chapter 4 Publication date February 2006 Revision A2 21 User Manual Please Input Username amp Password Username admin Password seese A Cancel semester Fig 2 10 the Login Screen for Web 2 1 5 IP Address Assignment For IP address configuration there are three parameters needed to be filled in They are IP address Subnet Mask Default Gateway and DNS IP address The address of the network device in the network is used for internetworking communication Its address structure looks is shown in the Fig 2 11 It is classful because it is split into predefined address classes or categories Each class has its own networ
116. etected later than 512 bit times into the transmission of a frame Tx Excessive Collision Number of frames that are not transmitted because the frame experienced 16 transmission attempts Packets 64 Octets Number of 64 byte frames in good and bad packets received Packets 65 127 Octets Number of 65 127 byte frames in good and bad packets received Packets 128 255 Octets Number of 128 255 byte frames in good and bad packets received Packets 256 511 Octets Number of 256 511 byte frames in good and bad packets received Publication date February 2006 Revision A2 60 User Manual Packets 512 1023 Octets Number of 512 1023 byte frames in good and bad packets received Packets 1024 1522 Octets Number of 1024 1522 byte frames in good and bad packets received Tx Packets The counting number of the packet transmitted TX Octets Total transmitted bytes Tx Unicast Packets Show the counting number of the transmitted unicast packet Tx Broadcast Packets Show the counting number of the transmitted broadcast packet Tx Multicast Packets Show the counting number of the transmitted multicast packet Tx Pause Packets Show the counting number of the transmitted pause packet Rx FCS Errors Number of bad FSC packets received Rx Alignment Errors Number of Alignment errors packets received Rx Fragments Number of short frames lt 64 bytes with invalid CRC Rx Jabbers Number of long frames accordi
117. eters Gigabit Ethernet TP network connection The grade of the cable must be Cat 5 or Cat 5e with a maximum length of 100 meters Cat 5e is recommended Publication date February 2006 Revision A2 13 User Manual 2 1 3 2 Cabling Requirements for 1000SX LX SFP 100FX Module It is more complex and comprehensive contrast to TP cabling in the fiber media Basically there are two categories of fiber multi mode MM and single mode SM The later is categorized into several classes by the distance it supports They are SX LX LHX XD and ZX From the viewpoint of connector type there mainly are LC and BiDi LC Gigabit Fiber with multi mode LC SFP module Gigabit Fiber with single mode LC SFP module Gigabit Fiber with BiDi LC 1310nm SFP module Gigabit Fiber with BiDi LC 1550nm SFP module The following table lists the types of fiber that we support and those else not listed here are available upon request Multi mode Fiber Cable and Modal Bandwidth Multi mode 62 5 125um Multimode 50 125um Modal Modal i Bandwidth Distance Bandwidth Distance 160MHz Km 220m 400MHz Km 500m 200MHz Km 275m 500MHz Km 550m SFP OLC 212 10 30 50 70 B0 Km Single mode Fiber 9 125um LX LHX XD ZX Single mode transceiver 1310nm 10Km Single mode transceiver 1550nm_ 30 50 70 110Km et eee 8 port FE fiber module
118. expansion the following are optional SFP types provided for the switch 1000Mbps LC MM SFP Fiber transceiver SFP OLC 202 1000Mbps LC SM 10km SFP Fiber transceiver SFP OLC 212 10 1000Mbps LC SM 30km SFP Fiber transceiver SFP OLC 212 30 1000Mbps LC SM 50km SFP Fiber transceiver SFP OLC 212 50 1000Mbps BiDi LC type 1 SM 20km SFP Fiber WDM transceiver SFP OBL 621 201 1000Mbps BiDi LC type 2 SM 20km SFP Fiber WDM transceiver SFP OBL 621 202 1000Mbps LC SM 10km SFP Fiber transceiver with DDM SFP DLC 212 10 Fig 1 5 Front View of 1000Base LX BiDi LC SFP Fiber Transceiver Publication date February 2006 Revision A2 10 User Manual 2 Installation 2 1 Starting 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch Up This section will give users a quick start for Hardware and Cable Installation Management Station Installation Software booting and configuration 2 1 1 Hardware and Cable Installation At the beginning please do first Wear a grounding device to avoid the damage from electrostatic discharge Installing Optional 8 port FE TP Fiber Modules and SFP Fiber Transceiver to the L2 Managed Switch Note If you have no modules please skip this section Fig 2 1 Installation of Optional 8 port FE TP Fiber Module and Gigabit SFP Fiber Transceiver Connecting the SFP Module to the Chassis The optional 8 port FE TP Fiber Modules Gigab
119. f Restore Default Configuration included default IP address the IP address will restore to default 192 168 1 1 as you use it The other is the function of Restore Default Configuration without changing current IP address the IP address will keep the same one that you had saved before by performing this function Working Configuration It is the configuration you are using currently and can be changed any time The configurations you are using are saved into this configuration file This is updated each time as you press lt Apply gt button User Configuration It is the configuration file for the specified or backup purposes and can be updated while having confirmed the configuration You can retrieve it by performing Restore User Configuration Auto Logout 3 min System Configuration Port SNMP DHCP Boot IGMP Snooping Save as Start Configuration VLAN MAC Table GYRP Save as User Configuration STP nae Restore Default Configuration including default ip address Alar Configuration Restore Default Configuration without changing current ip address Save Restore M Config file Security Restore User Configuration Bandwitdh Qos Diagnostics TFTP Server Firmware Upgrade Reboot Logout Fig 3 52 Publication date February 2006 Revision A2 117 User Manual 3 13 1 Save Restore Function name Save As Start Configuration Function description Save the current configuration as a start con
120. figuration file in flash memory Auto Logout 3min_ Y Save as Start Configuration Successful System Configuration Port SNMP DHCP Boot IGMP Snooping VLAN MAC Table 7 z GYRP Save User Save as User Configuration STP pil Restore Default Restore Default Configuration including default ip address Alarm Configuration Restore Default Restore Default Configuration without changing current ip address Save Restore Config file Security Restore User Restore User Configuration Save as Start Configuration Ut Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 53 Function name Save As User Configuration Function description Save the current configuration as a user configuration file in flash memory Ern NN rowa NN EEEN a Stee kh a ak Save as User Configuration Successful System Configuration Port SNMP DHCP Boot IGMP Snooping Save as Start Configuration VLAN MAC Table 5 gt GYRP E Save as User Configuration STP ua Restore Default Configuration including default ip address Alarm Configuration Restore Default Configuration without changing current ip address B Save Restore E Config file Security Restore User Configuration Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 54 Publication date February 2006 Revision A2 8 User Manual Function name Restore Defa
121. function tree with web user interface and we will travel it through this chapter Please Input Username amp Password Username admin Password seses Fig 3 1 Publication date February 2006 Revision A2 30 User Manual 3 1 Web Management Home Overview After you login the switch shows you the system information as Fig 3 2 This page is default and tells you the basic information of the system including Model Name System Description Location Contact Device Name System Up Time Current Time BIOS Version Firmware Version Hardware Mechanical Version Serial Number Host IP Address Host Mac Address Device Port RAM Size and Flash Size With this information you will know the software version used MAC address serial number how many ports good and so on This is helpful while malfunctioning Auto Logout 3 min System Information a System Port SNMP Cc EENT DHCP Boot z 3 Slot 24 Port 10 100 2 Gigabit L2 IGMP Snooping System Description Managed Switch WLAN MAC Table oo Trunk 4 Hate CETE o Days 0 Hours 0 Mins 18 Secs Alarm Current Time Fri Feb 24 00 56 38 2006 contigunasion BIOS Version v1 05 Security erat Firmware version ee Qos Hardware Mechanical Version v0 03 v0 04 DEOL Serial Number 112233445566 TFTP Server Log Host IP Address 192 168 1 1 Firmw
122. g page Link Show that if the link on the port is active or not If the link is connected to a working well device the Link will show the link Up otherwise it will show Down This is determined by the hardware on both devices of the connection No default value State Show that the communication function of the port is Enabled or Disabled When it is enabled traffic can be transmitted and received via this port When it is disabled no traffic can be transferred through this port Port State is configured by user Default Enabled Publication date February 2006 Revision A2 50 User Manual Auto Nego Show the exchange mode of Ethernet MAC There are two modes supported in the switch They are auto negotiation mode Enabled and forced mode Disabled When in Enabled mode this function will automatically negotiate by hardware itself and exchange each other the capability of speed and duplex mode with other site which is linked and comes out the best communication way When in Disabled mode both parties must have the same setting of speed and duplex otherwise both of them will not be linked In this case the link result is Down Default Enabled Speed Duplex Display the speed and duplex of all port There are three speeds 10Mbps 100Mbps and 1000Mbps supported for TP media and the duplex supported is half duplex and full duplex If the media is 1Gbps fib
123. g_range gt 0 to 26 Example FEML2 SW26E vlan set tag group 2 vian 2 2 5 6 15 13 0 Publication date February 2006 Revision A2 235 User Manual show config Syntax show config Description To display the current vlan mode Symmetric vlan SVL and Double tag states Argument None Possible value None Example FEML2 SW26E vlan show config Current vlan mode Tag based vlan Global setting Symmetric vlan Disable Asymmetric SVL Disable IVL Double tag Disable show group Syntax show group Description To display vlan mode and vlan group Argument None Possible value None Example FEML2 SW26E vlan show group Vlan mode is tag based 1 Name default VID 1 Member 1 23456789 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Untag 1 23456789 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 2 Name VLAN 2 VID 22 Member 2 3 4 5 6 13 14 15 Untag Publication date February 2006 Revision A2 236 User Manual show pvid Syntax show pvid Description To display pvid priority and drop untag result Argument None Possible value None Example FEML2 SW26E vlan show pvid Port PVID Priority Drop Untag sab sab sab sab sab sab sab or or Ol OT FR OFT FS Ft sab sab sab sab sab sab SS SS a a a sab sab sab sab OAOAONDWONOFHWNHKRK DOAN DN LP WY FE sab sab N sab N N Ne H sab N
124. ghput Priority PO Pl P2 P3 P4 P P6 P7 Queue 0 0 1 1 2 2 3 TOS type Reliability Priority PO PL P2 P3 P4 P P6 P7 Queue 0 0 1 1 2 2 3 TOS type Monetary Cost Priority Publication date February 2006 Revision A2 212 User Manual reboot reboot Syntax reboot Description To reboot the system Argument None Possible value None Example FEML2 SW26E reboot security lt lt isolated group gt gt set Syntax set lt port gt Description To set up the function of the isolated group Argument lt port gt isolated port range syntax 1 5 7 available from 0 to 26 set 0 as disabled Possible value lt port gt 0 to 26 Example FEML2 SW26E security isolated group set 2 3 4 show Syntax show Description To display the current setting status of isolated group Argument None Possible value None Example FEML2 SW26E security isolated group show Isolated group 234 Publication date February 2006 Revision A2 213 User Manual lt lt mirror gt gt disable Syntax disable Description To disable the function of mirror Argument None Possible value None Example FEML2 SW26E security mirror disable enable Syntax enable Description To enable the function of mirror Argument None Possible value None Example FEML2 SW26E security mirror enable set Syntax set lt spy gt lt
125. he version of mechanical Connector for fiber module only Display the connector type for instance UTP SC ST LC and so on Mode for fiber module only Display the fiber mode for instance Multi Mode Single Mode Fiber Cable for fiber module only Display the cable type for instance Two Wires Single Wire Wavelength for fiber module only Display the wavelength of the light transmitted in the fiber for instance 850nm 1310nm Distance for fiber module only Display the maximum distance the port supported for instance 100m 10km 20km and so on Speed for fiber module only Display the maximum speed of the port for instance 1G 100M Publication date February 2006 Revision A2 54 User Manual 3 2 2 Port Configuration Port Configuration is applied to change the setting of each port In this configuration function you can set reset the following functions All of them are described in detail below Auto Logout 3 min FEML2 SW26E amp System Port Configuration Port Status Configuration dy PortNo State Speed Duplex Flow Control Simple Counte Ew Enable Auto Symmetric T Detail Counter Enable Auto Y Symmetric spats E eneve uo symmetric DHCP Boot EB Enable v auto __ symmetric _v e EEE Enovie v auto symmetric MAC Table Ew Enable Auto Symmetri
126. herever the mode you are They are exit end help history logout save start save user restore default and restore user For more details please refer to Section 4 2 1 Command instructions reside in the corresponding modes are local commands The same command with the same command name may occur but perform totally different function in different modes For example show in IP mode performs displaying the IP information however it performs displaying the system information in system mode For more details please refer to Section 4 2 2 Managed Switch FEML2 SW26E Login admin Password IFEML2 SW26E 802 1X Enter into 602 1X mode account Enter into account mode alarm Enter into alarm mode autologout Change autologout time bandwidth Enter into bandwidth mode config file Enter into config file mode dhep hoot Enter into dhep boot mode diag Enter into diag mode firmware Enter into firmware mode gvrp Enter into gvrp mode hostname Change hostname igmp snooping Enter into igmp mode ip Enter into ip mode log Enter into log mode mac table Enter into mac table mode management Enter into management mode port Enter into port mode qos Enter into gos mode Fig 4 3 Publication date February 2006 Revision A2 150 User Manual 4 2 1 Global Commands of CLI end Syntax end Description Back to the top mode When you enter this command your cu
127. his parameter to be Auto it means RSTP will use the duplex mode resulted from the auto negotiation In today s switched networks most links are running in full duplex mode For sure the result may be half duplex in this case the port will not fast transit to Forwarding state If it is set as True the port is treated as point to point link by RSTP and unconditionally transited to Forwarding state If it is set as False fast transition to Forwarding state will not happen on this port Default Auto Publication date February 2006 Revision A2 95 User Manual M Check Migration Check It forces the port sending out an RSTP BPDU instead of a legacy STP BPDU at the next transmission The only benefit of this operation is to make the port quickly get back to act as an RSTP port Click lt M Check gt button to send a RSTP BPDU from the port you specified Auto Logout 3 min Y s System STP Port Configuration Port T Port no Port Status Path Cost Status Configured Path Cost Priority admin Edge Port Admin Point To Point IGMP Snooping 1 FORWARDING 200000 0 128 No Auto VLAN 2 DISCARDING 200000 o 128 No Auto MAC Table 3 DISCARDING 200000 o 128 No Auto GVRP 4 DISCARDING 200000 0 128 No Auto STP 5 DISCARDING 200000 o 128 No Auto E Status 6 DISCARDING 200000 0 128 No Auto T Configuration 7 DISCARDING 200000 o 128 No Auto B Port 8 DISCARDING 200000 o 128 No Auto Trunk 9 DISCARDING 200000 o 128 No Auto paa 10 DISCA
128. icant Registrar 1 on Participant Norma 2 on Participant Norma 3 on Participant Norma 4 on Participant Norma 5 on Participant Norma 6 on Participant Norma 7 orma orma 8 orma orma 12 orma orma 13 orma orma 23 orma orma 24 orma orma 25 orma orma 26 orma orma FEML2 SW26E gvrp group 2 set registrar 1 10 fixed FEML2 SW26E gvrp group 2 show GVRP group VID 2 Port Applicant Registrar 1 on Participant Fixed 2 on Participant Fixed 3 on Participant Fixed 4 on Participant Fixed 5 on Participant Fixed 6 on Participant Fixed 7 ormal Fixed 8 ormal Fixed 9 ormal Fixed 10 ormal Fixed 17 ormal orma 23 ormal orma 24 ormal orma 25 ormal orma 26 ormal orma Publication date February 2006 Revision A2 182 User Manual set applicant Syntax set applicant lt range gt lt normal non participant gt Description To set default applicant mode for each port Argument lt range gt port range syntax 1 5 7 available from 1 to 26 lt normal gt set applicant as normal mode lt non participant gt set applicant as non participant mode Possible value lt range gt 1 to 26 lt normal non participant gt normal or non participant Example FEML2 SW26E gvrp set applicant 1 10 non participant set registrar Syntax set registrar lt range gt lt normal fixed forbidden gt Description To set default registrar mode for each port Argument lt range gt por
129. icast 1 IP Address 224 1 1 1 VLAN ID 0 Member Port 22 Publication date February 2006 Revision A2 187 User Manual m P disable dhcp Syntax disable dhcp Description To disable the DHCP function of the system Argument None Possible value None Example FEML2 SW26E ip disable dhcp DHCP is already stopped enable dhcp Syntax enable dhcp lt manual auto gt Description To enable the system DHCP function and set DNS server via manual or auto mode Argument lt manuallauto gt set DNS by using manual or auto mode Possible value lt manualljauto gt manual or auto Example FEML2 SW26E ip enable dhcp manual set dns Syntax set dns lt ip gt Description To set the IP address of DNS server Argument lt ip gt dns ip address Possible value lt ip gt 168 95 1 1 Example FEML2 SW26E ip set dns 168 95 1 1 Publication date February 2006 Revision A2 188 User Manual set ip Syntax set ip lt ip gt lt mask gt lt gateway gt Description To set the system IP address subnet mask and gateway Argument lt ip gt ip address lt mask gt subnet mask lt gateway gt default gateway Possible value lt ip gt 192 168 1 1 or others lt mask gt 255 255 255 0 or others lt gateway gt 192 168 1 253 or others Example FEML2 SW26E ip set ip 192 168 1 2 255 255 255 0 192 168 1 253 show Syntax show Descripti
130. ides a method to restrict users to access network resources via authenticating user s information This restricts users from gaining access to the network resources through a 802 1x enabled port without authentication If a user wishes to touch the network through a port under 802 1x control he she must firstly input his her account name for authentication and waits for gaining authorization before sending or receiving any packets from a 802 1x enabled port Before the devices or end stations can access the network resources through the ports under 802 1x control the devices or end stations connected to a controlled port send the authentication request to the authenticator the authenticator pass the request to the authentication server to authenticate and verify and the server tell the authenticator if the request get the grant of authorization for the ports According to IEEE802 1x there are three components implemented They are Authenticator Supplicant and Authentication server shown in Fig 3 43 Supplicant It is an entity being authenticated by an authenticator It is used to communicate with the Authenticator PAE Port Access Entity by exchanging the authentication message when the Authenticator PAE request to it Authenticator An entity facilitates the authentication of the supplicant entity It controls the state of the port authorized or unauthorized according to the result of authentication message exchanged between
131. iguration 9 10 11 12 13 14 15 16 il 17 18 19 20 21 22 23 24 Mirror Isolated Group 25 26 Restricted Group Ci Bandwitdh Qos Apply Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 61 Publication date February 2006 Revision A2 124 User Manual 3 15 Bandwidth Management Function name Ingress Bandwidth Setting Function description Ingress Bandwidth Setting function is used to set up the limit of Ingress bandwidth for each port Auto Logout 3 min FEML2 SW26E a System Ingress Bandwidth Control Port SNMP DHCP Boot Port 1 24 66 102400 Kb IGMP Snooping Port 25 26 66 1024000 Kb e _PortNo Rate Kb PortNo Rate Kb MAC Table Port No Rate Kb Port No oo Trunk Alarm I Tanne Configuration 102400 ES 102400 Bandwitdh I Ingress hy EE oo 10200 Storm ans MCE 202000 102400 TFTP Server Reboot S e Logout Gozo E 102400 au d Fig 3 62 Parameter description Choose the port that you would like this function to work on it Valid range of the port is 1 26 Rate Set up the limit of Ingress bandwidth for the port you choose Incoming traffic will be discarded if the rate exceeds the value you set up in Data Rate field Pause frames are also generated if flow control is enabled The format of the packet limits to unicast broadcast and multicast Valid value of
132. il Syntax set email lt range gt Description To enable the email of the events Argument lt range gt set the range of email syntax 1 5 7 Possible value lt range gt 1 23 Example FEML2 SW26E alarm events set email 1 3 Publication date February 2006 Revision A2 168 User Manual set sms Syntax set sms lt range gt Description To enable the sms of the events Argument lt range gt set the range of sms syntax 1 5 7 Possible value lt range gt 1 23 Example FEML2 SW26E alarm events set sms 1 3 set trap Syntax set trap lt range gt Description To enable the trap of the events Argument lt range gt set the range of trap syntax 1 5 7 Possible value lt range gt 1 23 Example FEML2 SW26E alarm events set trap 1 3 Publication date February 2006 Revision A2 169 User Manual show Syntax show Description The Show here is used to display the configuration of alarm event Argument None Possible value None Example FEML2 SW26E alarm events show Events Email SMS Trap Cold Start Warm Start Link Down Link Up Authentication Failure User Login User Logout STP Topology Changed STP Disabled STP Enabled LACP Disabled LACP Enabled LACP Member Added LACP Port Failure GVRP Disabled GVRP Enabled 17 Port based Vlan Enabled 18 Tag based Vlan Enabled 19 Module Inserted 20 Module Removed 21 Moudle Media Swapped 22 S
133. in the field of Authorization in advance before configuring the username and password Only one administrator is allowed to exist and unable to be deleted In addition up to 4 guest accounts can be created The default setting for user account is Username admin Password admin The default setting for guest user account is Username guest Password guest Auto Logout OFF FEML2 SW26E a System Account Configuration System Information IP 3 aa authorization Account admin Administrator 1 Managentent Securit guest Guest Virtual Stack Port SNMP DHCP Boot IGMP Snooping VLAN MAC Table GVRP STP Trunk 802 1X Alarm Configuration Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade amp gt ja Fig 3 7 Publication date February 2006 Revision A2 43 User Manual 3 1 5 Management Policy Through the management security configuration the manager can do the strict setup to control the switch and limit the user to access this switch The following rules are offered for the manager to manage the switch Rule 1 When no lists exists then it will accept all connections Rule 2 When only accept lists exist then it will deny all connections excluding the connection inside of the accepting range Rule 3 When only deny lists exist then it will accept all connections excluding the connection inside of the denying range
134. ing Tree Status user can read 12 parameters to know STP current status The 12 parameters description is listed in the following table Parameter description STP State Show the current STP Enabled Disabled status Default is Disabled Bridge ID Show switch s bridge ID which stands for the MAC address of this switch Bridge Priority Show this switch s current bridge priority setting Default is 32768 Designated Root Show root bridge ID of this network segment If this switch is a root bridge the Designated Root will show this switch s bridge ID Designated Priority Show the current root bridge priority Root Port Show port number connected to root bridge with the lowest path cost Root Path Cost Show the path cost between the root port and the designated port of the root bridge Current Max Age Show the current root bridge maximum age time Maximum age time is used to monitor if STP topology needs to change When a bridge does not receive a hello message from root bridge until the maximum age time is counted down to 0 the bridge will treat the root bridge malfunctioned and issue a Topology Change Notification TCN BPDU to all other bridges Publication date February 2006 Revision A2 90 User Manual All bridges in the LAN will re learn and determine which the root bridge is Maximum Age time is assigned by root bridge in unit of seconds Default is 20 seconds Current Forward D
135. ingress gt lt egress gt Description To set up the monitoring port and monitored ports of the mirror function User can monitor the ports that receive or transmit the packets Argument lt spy gt monitoring port lt ingress gt monitored ingress port range syntax 1 5 7 available from O to 26 lt egress gt monitored egress port range syntax 1 5 7 available from 0 to 26 set ingress egress to 0 as ingress egress disabled Possible value lt ingress gt 0 to 26 lt egress gt 0 to 26 Example FEML2 SW26E security mirror set 1 4 2 3 Publication date February 2006 Revision A2 214 User Manual show Syntax show Description To display the current setting status of mirror Argument None Possible value None Example FEML2 SW26E security mirror show Mirror Monitoring Port 1 Monitored Ingress 4 Monitored Egress 23 lt lt restricted group gt gt set Syntax set lt ingress gt lt egress gt Description To set up the function of restricted group Argument lt ingress gt ingress group port range syntax 1 5 7 available from 0 to 26 lt egress gt egress group port range syntax 1 5 7 available from 0 to 26 set ingress or egress to 0 as disabled Possible value lt ingress gt 0 to 26 lt egress gt 0 to 26 Example FEML2 SW26E security restricted group set 5 8 10 show Syntax show Description To display the current setting status of
136. ink 802 1X Alarm Configuration a config ile dy import File Path Beery Import User Conf Bandwitdh pes oe Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 58 Publication date February 2006 Revision A2 121 User Manual 3 14 Security Function name Mirror Configuration Function description Mirror Configuration is to monitor the traffic of the network For example we assume that Port A and Port B are Monitoring Port and Monitored Port respectively thus the traffic received by Port B will be copied to Port A for monitoring Parameter description Mode Used for the activation or de activation of Port Mirror function Default is disable Monitoring Port Set up the port for monitoring Valid port is Port 1 26 and default is Port 1 Monitored Ingress Port Set up the port for being monitored It only monitor the packets received by the port you set up Just tick the check box MI beside the port x and valid port is Port 1 26 Monitored Egress Port Set up the port for being monitored It only monitor the packets transmitted by the port you set up Just tick the check box MI beside the port x and valid port is Port 1 26 Auto Logout 3 min FEML2 SW26E System Mirror Port SNMP DHCP Boot BT isavie v IGMP Snooping OCU eg Port 1 MAC Table 1 2 3 4 5 6 7 8 te Monitored Ingress 9 10 dite 12 13 14 is 16 Port Trunk 17 18 19 20
137. intelligent software It is suitable for both metro LAN and office application Model Description The switch not only supports 3 slots for removable and hot swappable 8 port 10 100M TP or 100M fiber module respectively but also 2 Gigabit dual media ports TP SFP in which 2 slots for removable SFP module supporting 1000M SFP fiber module only Port 1 26 Configuration 3 slots for removable and hot swappable 8 port 10 100M TP or 100M fiber module 2 Gigabit dual media ports TP SFP fiber Removable 8 port 10 100Mbps TP module Removable 8 port 100Mbps SC multi mode fiber module Removable 8 port 100Mbps SC single mode 5km fiber module Removable 8 port 100Mbps SC single mode 20km fiber module Removable 8 port 100Mbps SC single mode 60km fiber module Removable 8 port 100Mbps ST multi mode fiber module 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch 8 Port FE TP module 8 Port FE SC MM fiber module 8 Port FE SC SM 5km fiber module 8 Port FE SC SM 20km fiber module 8 Port FE SC SM 60km fiber module 8 Port FE ST MM fiber module Default module Publication date February 2006 Revision A2 User Manual 10 100 1000Mbps TP is a standard Ethernet port that meets all IEEE 802 3 u x z Gigabit Fast Ethernet specifications 1000Mbps SFP Fiber transceiver is a Gigabit Ethernet port that fully complies with all IEEE 802 3z and 1000Base SX LX standards 10
138. ion can retrieve the previous confirmed working configuration stored in the flash memory to update start configuration When completing to restore the configuration the system s start configuration is updated and will be changed its system settings after rebooting the system Auto Logout 3min_ System Port SNMP DHCP Boot IGMP Snooping VLAN MAC Table GVRP STP Trunk 802 1X Alarm Configuration Save Restore Config file Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig Publication date February 2006 Revision A2 120 Restore User Configuration Successfully Reboot the system to take effect for the setting 3 57 User Manual 3 13 2 Config File Function name Config File Function description With this function user can back up or reload the config files of Save As Start or Save As User via TFTP Parameter description Export File Path Export Start Export Save As Start s config file stored in the flash Export User Conf Export Save As User s config file stored in the flash Import File Path Import Start Import Save As Start s config file stored in the flash Import User Conf Import Save As User s config file stored in the flash Auto Logout 3 min x z System Configure Export Import File Path Port SNMP DHCP Boot IGMP Snooping LAO ae 0 0 0 0 MAC Table Se Export File Path r
139. ion is present Fiber Port 1 to 8 c LEDSET set on SPD speed mode of 3 module LED Lit when 100Mbps speed is active Off when 10Mbps speed is active 10 100 1000Mbps Gigabit TP Fiber Port 25 26 LED Lit when connection with remote device is LNK Green good Off when cable connection is not good Lit when Fiber port is active FB Off when TP port is active a LEDSET set on ACT active mode Blinks when any traffic is present Green b LEDSET set on FDX full duplex mode ACT EDX SPD Lit when full duplex mode is active Port 25 Blinks when any collision is present 26 LED c LEDSET set on SPD speed mode Lit when 1000Mbps speed is active Off when 10 100Mbps speed is active Table1 1 Publication date February 2006 Revision A2 User Manual 1 4 2 User Interfaces on the Rear Panel One RS 232 DB 9 interface is offered for configuration or management And there is one AC power input socket for having the switch powered on or off AC Line 100 240V 50 60 Hz RS 232 DB 9 Connector Fig 1 3 Rear View of 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch Publication date February 2006 Revision A2 User Manual 1 5 View of the Optional Modules In the switch Port 25 26 includes two types of media TP and SFP Fiber LC BiDi LC this port supports 10 100 1000Mbps TP or 1000Mbps SFP Fiber with auto detected function 1000Mbps SFP Fiber transceiver is used for high speed connection
140. iority 3 is mapping to Queue 1 Priority 4 is mapping to Queue 2 Priority 5 is mapping to Queue 2 Priority 6 is mapping to Queue 3 and Priority 0 is mapping to Queue 3 Auto Logout 3 min s System Port SNMP DHCP Boot IGMP Snooping MAC Table GYRP STP Trunk 802 1X Alarm Configuration Security Bandwitdh Qos o Global VIP 802 1p D Type TOS T Type TOS R Type TOS M Type TOS H Diagnostics TFTP Server e lt a Publication date February 2006 Revision A2 wo N User Manual Function name DSCP Setting Function description In the late 1990s the IETF redefined the meaning of the 8 bit SERVICE TYPE field to accommodate a set of differentiated services DS Under the differentiated services interpretation the first six bits comprise a codepoint which is sometimes abbreviated DSCP and the last two bits are left unused DSCP can form total 64 0 63 kinds of Traffic Class based on the arrangement of 6 bit field in DSCP of the IP packet In the switch user is allowed to set up these 64 kinds of Class that belong to any of queue 0 3 Parameter description DSCP Priority Mapping 64 kinds of priority traffic as mentioned above user can set up any of Queue 0 3 In default Priority 0 15 are mapping to Queue 0 Priority 16 31 are mapping to Queue 1 Priority 32 47 are mapping to Queue 0 Priority 48 63 are mapping to Queue 0 c Auto Logout 3 min Bes DSCP Priority Ma
141. is 102400 and Port 25 26 is 1024000 Publication date February 2006 Revision A2 126 User Manual Function name Storm Setting Function description Bandwidth Management function is used to set up the limit of Ingress and Egress bandwidth for each port Auto Logout 3 min d System Bandwidth Storm Control Port SNMP DHCP Boot Storm Type IGMP Snooping Disable K El MAC Table GVRP Storm Rate STP 100 100 Trunk fiston 802 1X AT Security Bandwitdh Ingress Egress Storm C Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 64 Parameter description Storm Type Disable Disable the function of the bandwidth storm control Broadcast Storm Control Enable the function of bandwidth storm control for broadcast packets Multicast Storm Control Enable the function of bandwidth storm control for multicast packets Unknown Unicast Storm Control Enable the function of bandwidth storm control for unknown unicast packets These packets are the MAC address that had not completed the learning process yet Broadcast Multicast and Unknown Unicast Storm Control Enable the function of bandwidth storm control for all packets in transmission Publication date February 2006 Revision A2 127 User Manual Storm Rate Set up the limit of bandwidth for storm type you choose Valid value of the storm rate ranges from 1 100 with the minimum unit of 1 And on
142. is introduced to solve this problem Subnet mask uses some bits from host address and makes an IP address looked Network address Subnet mask number and host address It is shown in the following figure This reduces the total IP number of a network able to support by the amount of 2 power of the bit number of subnet number 2 bit number of subnet number 32 bits M Network io Network 1D Subnet number Subnet mask is used to set the subnet mask value which should be the same value as that of the other devices resided in the same network it attaches For more information please also see the Section 2 1 5 IP Address Assignment in this manual Default 255 255 255 0 Default gateway Set an IP address for a gateway to handle those packets that do not meet the routing rules predefined in the device If a packet does not meet the criteria for other pre defined path it must be forwarded to a default router on a default path This means any packet with undefined IP address in the routing table will be sent to this device unconditionally Default 192 168 1 254 Publication date February 2006 Revision A2 38 User Manual DNS It is Domain Name Server used to serve the translation between IP address and name address The switch supports DNS client function to re route the mnemonic name address to DNS server to get its associated IP address for accessing Internet User can specify a DNS IP
143. isable 26 Disable Publication date February 2006 Revision A2 210 User Manual show priority tag Syntax show priority tag Description To show 802 1p Qos configuration Argument None Possible value None Example FEML2 SW26E qos show priority tag 802 lp priority Global QoS mode Enable QoS Enable 802 lp Priority Disable ip tos classification Disable ip diffserv classification Scheduling weighted round robin method weight wrr 0 1 wr 1 1 wrr 2 8 wr 3 16 weighted range 1 55 PO 7 Priority 0 7 Default mode QueueO PO P1 Queuel P2 P3 Queue2 P4 P5 Queue3 P6 P7 PO P1 P2 P3 P Ps P6 P7 Queue 0 0 1 1 2 2 3 3 Publication date February 2006 Revision A2 211 User Manual show tos Syntax show tos Description To show IP tos Qos configuration Argument None Possible value None Example FEML2 SW26E qos show tos ip tos classification Global QoS mode Enable QoS Disable 802 lp Priority Enable ip tos classification Disable ip diffserv classification Scheduling weighted round robin method weight wrr 0 1 wrr 1 1 wrr 2 8 wr 3 16 weighted range 1 55 PO 7 Priority 0 7 Default mode Queue0 PO P1 Queuel P2 P3 Queue2 P4 P5 Queue3 P6 P7 PO PI P2 P3 P4 P5 P6 P7 Queue 0 0 1 1 2 2 3 TOS type Delay Priority PO Pl P2 P3 P4 P P6 P7 Queue 0 0 1 1 2 2 3 TOS type Throu
144. it SFP modules are hot swappable so you can plug or unplug it before or after powering on 1 Verify that the 8 port FE TP Fiber Module SFP module is the right model and conforms to the chassis 2 Slide the module along the slot Also be sure that the module is properly seated against the slot socket connector 3 Install the media cable for network connection 4 Repeat the above steps as needed for each module to be installed into slot s 5 Have the power ON after the above procedures are done Publication date February 2006 Revision A2 Il User Manual TP Port and Cable Installation In the switch TP port supports MDI MDI X auto crossover so both types of cable straight through Cable pin outs for RJ 45 jack 1 2 3 6 to 1 2 3 6 in 10 100M TP 1 2 3 4 5 6 7 8 to 1 2 3 4 5 6 7 8 in Gigabit TP and crossed over Cable pin outs for RJ 45 jack 1 2 3 6 to 3 6 1 2 can be used It means you do not have to tell from them just plug it Use Cat 5 grade RJ 45 TP cable to connect to a TP port of the switch and the other end is connected to a network aware device such as a workstation or a server Repeat the above steps as needed for each RJ 45 port to be connected to a Gigabit 10 100 1000 TP device Now you can start having the switch in operation Power On The switch supports 100 240 VAC 50 60 Hz power supply The power supply will automatically convert the local AC power source t
145. k authenticator and supplicant because the traffic is bi directional Publication date February 2006 Revision A2 105 Authentication Server s System User Manual Fig 3 44 Authentication server Supplicant A The Fig 3 45 shows the procedure of 802 1x authentication There are steps for the login based on 802 1x port access control management The protocol used in the right side is EAPOL and the left side is EAP 1 At the initial stage the supplicant A is unauthenticated and a port on switch acting as an authenticator is in unauthorized state So the access is blocked in this stage Initiating a session Either authenticator or supplicant can initiate the message exchange If supplicant initiates the process it sends EAPOL start packet to the authenticator PAE and authenticator will immediately respond EAP Request Identity packet The authenticator always periodically sends EAP Request Identity to the supplicant for requesting the identity it wants to be authenticated If the authenticator doesn t send EAP Request Identity the supplicant will initiate EAPOL Start the process by sending to the authenticator And next the Supplicant replies an EAP Response Identity to the authenticator The authenticator will embed the user ID into Radius Access Request command and send it to the authentication server for confirming its identity After receiving the Radius Access Request the authentication server send
146. k range between the network identifier and host identifier in the 32 bits address Each IP address comprises two parts network identifier address and host identifier address The former indicates the network where the addressed host resides and the latter indicates the individual host in the network which the address of host refers to And the host identifier must be unique in the same LAN Here the term of IP address we used is version 4 known as IPv4 32 bits Ff Oe Network identifier Host identifier Fig 2 11 IP address structure Publication date February 2006 Revision A2 22 User Manual With the classful addressing it divides IP address into three classes class A class B and class C The rest of IP addresses are for multicast and broadcast The bit length of the network prefix is the same as that of the subnet mask and is denoted as IP address X for example 192 168 1 0 24 Each class has its address range described below Class A Address is less than 126 255 255 255 There are a total of 126 networks can be defined because the address 0 0 0 0 is reserved for default route and 127 0 0 0 8 is reserved for loopback function Bit 01 78 31 0 Network address Host address Class B IP address range between 128 0 0 0 and 191 255 255 255 Each class B network has a 16 bit network prefix followed 16 bit host address There are 16 384 2 14 16 networks able to be defined with a maxim
147. l abc com oe wd Publication date February 2006 Revision A2 166 User Manual lt lt events gt gt del all Syntax del all lt range gt Description To disable email sms and trap of events Argument lt range gt del the range of events syntax 1 5 7 Possible value lt range gt 1 23 Example FEML2 SW26E alarm events del all 1 3 del email Syntax del email lt range gt Description To disable the email of the events Argument lt range gt del the range of email syntax 1 5 7 Possible value lt range gt 1 23 Example FEML2 SW26E alarm events del email 1 3 del sms Syntax del sms lt range gt Description To disable the sms of the events Argument lt range gt del the range of sms syntax 1 5 7 Possible value lt range gt 1 23 Example FEML2 SW26E alarm events del sms 1 3 167 Publication date February 2006 Revision A2 User Manual del trap Syntax del trap lt range gt Description To disable the trap of the events Argument lt range gt del the range of trap syntax 1 5 7 Possible value lt range gt 1 23 Example FEML2 SW26E alarm events del trap 1 3 set all Syntax set all lt range gt Description To enable email sms and trap of events Argument lt range gt set the range of events syntax 1 5 7 Possible value lt range gt 1 23 Example FEML2 SW26E alarm events set all 1 3 set ema
148. l be grouped automatically And among these switch one switch will be a master machine and the others in this group will become the slave devices VSM offers a simple centralized management function It is not necessary to remember the address of all devices manager is capable of managing the network with knowing the address of the Master machine Instead of SNMP or Telnet UI VSM is only available in Web UI While one switch become the Master two rows of buttons for group device will appear on the top of its Web UI By pressing these buttons user will be allowed to connect the Web UI of the devices of the group in the same window without the login of these device The most top left button is only for Master device See Fig 3 10 The background color of the button you press will be changed to represent that the device is under your management Note It will remove the grouping temporarily in case that you login the switch via the console The device of the group will be shown as station address the last number of IP Address device name on the button e g 196 FEML2 SW26E otherwise it will show if no corresponding device exists Once the devices join the group successfully then they are merely able to be managed via Master device and user will fail to manage them via telnet console web individually Up to 16 devices can be grouped for VSM however only one Master is allowed to exist in each group For Master redund
149. le 26 20 60 1000 Normal Normal Disable Publication date February 2006 Revision A2 184 User Manual set timer Syntax set timer lt range gt lt join gt lt leave gt lt leaveall gt Description To set gvrp join time leave time and leaveall time for each port Argument lt range gt port range syntax 1 5 7 available from 1 to 26 lt join gt join timer available from 20 to 100 lt leave gt leave timer available from 60 to 300 lt leaveall gt leaveall timer available from 1000 to 5000 Leave Time must equal double Join Time at least Possible value lt range gt 1 to 26 lt join gt 20 to 100 lt leave gt 60 to 300 lt leaveall gt 1000 to 5000 Example FEML2 SW26E gvrp set timer 2 8 25 80 2000 show config Syntax show config Description To display the gvrp configuration Argument None Possible value None Example FEML2 SW26E gvrp show config GVRP state Disable Port Join Time Leave Time LeaveAll Time Applicant Registrar Restricted 20 60 1000 Normal Normal Disable 2 20 60 1000 Normal Normal Disable 20 60 1000 Normal Normal Disable 4 20 60 1000 Normal Normal Disable 23 20 60 1000 Normal Normal Disable 24 20 60 1000 Normal Normal Disable 25 20 60 1000 Normal Normal Disable 26 20 60 1000 Normal Normal Disable Publication date February 2006 185 Revision A2 User Manual show counter Syntax show counter lt port gt Description To
150. le commands history Show a list of previously run commands logout Logout the system restore default Restore default config restore user Restore user config save start Save as start config save user Save as user config Publication date February 2006 Revision A2 152 User Manual history Syntax history Description To show a list of previous commands that you had ever run When you enter this command the CLI would show a list of commands which you had typed before The CLI supports up to 256 records If no argument is typed the CLI would list total records up to 256 If optional argument is given the CLI would only show the last numbers of records given by the argument Argument show last number of history records optional Possible value 1 2 3 256 Example FEML2 SW26E ip history Command history 0 trunk exit FEML2 SW26E trunk 1 2 3 FEML2 SW26E trunk exit 4 FEML2 SW26E 5 6 7 8 trunk exit alarm 9 10 11 12 13 14 events end ip help ip history FEML2 SW26E ip history 3 Command history 13 14 15 ip history history 3 FEML2 SW26E ip 153 Publication date February 2006 Revision A2 User Manual logout Syntax logout Description When you enter this command via Telnet connection you would logout the system and disconnect If you connect the system through direct serial port wi
151. le value lt filepath gt filepath and filename Example FEML2 SW26E config file set export path log 21511 txt set import path Syntax set import path lt filepath gt Description To set up the filepath and filename that user would like to import Argument lt filepath gt filepath and filename Possible value lt filepath gt filepath and filename Example FEML2 SW26E config file set import path log 21511 txt Publication date February 2006 Revision A2 177 User Manual show Syntax show Description To display the information of the config file Argument None Possible value None Example FEML2 SW26E config file show TFTP Server IP Address 192 168 3 111 Export Path and Filename log 21511 txt Import Path and Filename log 21511 txt dhcp boot set dhcp boot Syntax set lt sec gt Description To set up the delay time for DHCP Boot Argument lt sec gt range syntax 0 1 30 The value 0 is to disable dhcp boot delay Possible value lt sec gt 0 30 Example FEML2 SW26E dhcp boot set 30 show Syntax show Description To display the status of DHCP Boot Argument None Possible value None Example FEML2 SW26E dhcp boot show DHCP Boot Enable Second 30 FEML2 SW26E dhcp boot Publication date February 2006 Revision A2 178 User Manual diag diag Syntax diag Description Diag is used to tes
152. le value lt port number gt 1 65535 default 1812 Example FEML2 SW26E 802 1x set state 192 168 1 115 1812 WinRadius set supp Timeout Syntax set suppTimeout lt port range gt lt sec gt Description A timer used by the Backend Authentication state machine in order to determine timeout conditions in the exchanges between the Authenticator and the Supplicant or Authentication Server The initial value of this timer is either suppTimeout or serverTimeout as determined by the operation of the Backend Authentication state machine Argument lt port range gt syntax 1 5 7 available from 1 to 26 lt sec gt timer range 1 65535 Possible value lt port range gt 1 to 26 lt sec gt 1 65535 default is 30 Example FEML2 SW26E 802 1x set suppTimeout 2 30 set txPeriod Syntax set txPeriod lt port range gt lt sec gt Description A timer used by the Authenticator PAE state machine to determine when an EAPOL PDU is to be transmitted Argument lt port range gt syntax 1 5 7 available from 1 to 26 lt sec gt timer range 1 65535 Possible value lt port range gt 1 to 26 lt sec gt 1 65535 default is 30 Example FEML2 SW26E 802 1x set txPeriod 2 30 Publication date February 2006 Revision A2 160 User Manual show mode Syntax show mode Description To display the mode of each port Argument None Possible value None Example FEML2 SW26E 802
153. learning and aging Auto aging with programmable inter age time Supports 802 1p Class of Service with 4 level priority queuing Supports port sniffer function with 3 modes TX Monitor Mode RX Monitor Mode and TX RX pair Monitor Mode Supports port based VLAN 802 1Q tag based VLAN with 256 entries Efficient self learning and address recognition mechanism enables forwarding rate at wire speed Web based management provides the ability to completely manage the switch from any web browser SNMP Telnet interface delivers complete in band management Supports IEEE 802 1d Spanning Tree Protocol Supports IEEE 802 1w Rapid Spanning Trees Supports IEEE 802 1x port based network access control Supports IP Multicasting to implement IGMP Snooping function Supports 802 3ad port trunking with flexible load distribution and failover function Supports ingress port security mode for VLAN Tagged and Untagged frame process Supports SNMP MIB2 and RMON sampling with sampled packet error indication Publication date February 2006 Revision A2 241 User Manual Hardware Specifications Standard Compliance EEE802 3ab 802 3z 802 3u 802 3x 802 3z and 802 3ab compliant Gigabit Ethernet ports Network Interface of Option module SFP 0LC 202 1000FDX LC M M 2 Option SFP OLC 212 XX 1000FDX LCS M 2 Option SFP OBL 621 20X 1000FDX BIDi LC S M 2 Option Default module Model Mo
154. lot Inserted 23 Slot Removed lt lt lt lt lt ANonF o o ae e e O or wonder O ep Publication date February 2006 Revision A2 170 User Manual show alarm Syntax show Description The Show for alarm here is used to display the configuration of Trap SMS or E mail Argument None Possible value None Example EML2 SW26E alarm show email EML2 SW26E alarm show events EML2 SW26E alarm show sms J 5 lt lt sms gt gt del phone number Syntax del phone number lt gt Description To delete sms phone number Argument lt gt mobile phone number range 1 to 6 Possible value lt gt 1to6 Example FEML2 SW26E alarm sms del phone number 3 del server user Syntax del server user Description To delete sms server user account and password Argument None Possible value None Example FEML2 SW26E alarm sms del server user Publication date February 2006 Revision A2 171 User Manual set phone number Syntax set phone number lt gt lt phone number gt Description To add sms phone number Argument lt gt mobile phone number range 1 to 6 lt phone number gt phone number Possible value lt gt 1to6 Example FEML2 SW26E alarm sms set phone number 1 0968777777 set server Syntax set server lt ip gt Description To set up the IP address of sms server Argument
155. lue Valid range 1 200 000 000 10 Mbps 2 000 000 100 Mbps 200 000 1 Gbps 20 000 Default 0 Priority Priority here means Port Priority Port Priority and Port Number are mixed to form the Port ID Port IDs are often compared in order to determine which port of a bridge would become the Root Port The range is 0 240 Default is 128 Admin Edge Port If user selects Yes this port will be an edge port An Edge Port is a port connected to a device that knows nothing about STP or RSTP Usually the connected device is an end station Edge Ports will immediately transit to forwarding state and skip the listening and learning state because the edge ports cannot create bridging loops in the network This will expedite the convergence When the link on the edge port toggles the STP topology keeps unchanged Unlike the designate port or root port though an edge port will transit to a normal spanning tree port immediately if it receives a BPDU Default No Admin Point To Point We say a port is a point to point link from RSTP s view if it is in full duplex mode but is shared link if it is in half duplex mode RSTP fast convergence can only happen on point to point links and on edge ports This can expedite the convergence because this will have the port fast transited to forwarding state There are three parameters Auto True and False used to configure the type of the point to point link If configure t
156. ly integer is acceptable Default is 100 Publication date February 2006 Revision A2 128 User Manual 3 16 QoS Quality of Service Configuration The switch supports 5 kinds of QoS are as follows MAC Priority 802 1p Priority IP TOS Priority and DiffServ DSCP Priority Port Based Priority has a special name called VIP Port in the switch Any packets enter VIP Port will have highest transmitting priority MAC Priority act on the destination address of MAC in packets VLAN tagged Priority field is effected by 802 1p Priority setting IP TOS Priority affects TOS fields of IP header and you can find it has 8 bit SERVICE TYPE field that specifies how the datagram should be handled The field could be divided into six subfields as follows PRECEDENCE 3 bits D Type Delay Priority 1 bit T Type Throughput Priority 1bit R Type Reliability Priority 1bit M Type Monetary Cost Priority 1bit and UNUSED bit User can randomly control these fields to achieve some special QoS goals When bits D T R or M set the D bit requests low delay the T bit requests high throughput the R bit requests high reliability and the M bit requests low cost 0 1 2 3 4 5 6 7 Th Rb Mb Precedence pbit MBZ Precedence Vorrangssteuerung MBZ Must Be Zero DiffServ DSCP Priority act on DSCP field of IP Header In the late 1990s the IETF redefined the meaning of the 8 bit SERVICE TYPE field to accommodate a set of differentiate
157. m Port Properties Menu configure the parameters as below see the next section Baud rate 57600 Stop bits 1 Data bits 8 Parity N Flow control none 4 1 1 Login The command line interface CLI is a text based interface User can access the CLI through either a direct serial connection to the device or a Telnet session The default values of the managed switch are listed below Username admin Password admin After you login successfully the prompt will be shown as if you are the first login person and your authorization is administrator otherwise it may show See the following two figures The former means you behave as an administrator and have the access right of the system As to the latter it means you behave as a guest and are only allowed to view the system without the permission to do any setting for this switch Publication date February 2006 Revision A2 148 User Manual Managed Switch FEML2 SwW26E Login admin Password IF EML2 SW26E Fig 4 1 Managed Switch FEML2 SwW26E Login admin Password IFEML2 SW26ES Fig 4 2 149 Publication date February 2006 Revision A2 User Manual 4 2 Commands of CLI To see the commands of the mode please input after the prompt then all commands will be listed in the screen All commands can be divided into two categories including global commands and local commands Global commands can be used w
158. m designated ports among bridges It decides how long a bridge should send this message to other bridge to tell am alive When the FEML2 SW26E is the root bridge of the LAN for example all other bridges will use the hello time assigned by this switch to communicate with each other The valid value is 1 10 in unit of second Default is 2 seconds Max Age When the FEML2 SW26E is the root bridge the whole LAN will apply this figure set by this switch as their maximum age time When a bridge received a BPDU originated from the root bridge and if the message age conveyed in the BPDU exceeds the Max Age of the root bridge the bridge will treat the root bridge malfunctioned and issue a Topology Change Notification TCN BPDU to all other bridges All bridges in the LAN will re calculate and determine who the root bridge is The valid value of Max Age is 6 40 seconds Default is 20 seconds Publication date February 2006 Revision A2 92 User Manual Forward Delay You can set the root bridge forward delay time This figure is set by root bridge only The forward delay time is defined as the time spent from Listening state moved to Learning state and also from Learning state moved to Forwarding state of a port in bridge The forward delay time contains two states Listening state to Learning state and Learning state to Forwarding state It assumes that forward delay time is 15 seconds then total forward delay time will be 30 seco
159. module Mon1 Bias mA Show the Bias current of SFP module Mon2 TX PWR Show the transmit power of SFP module Mon3 RX PWR Show the receiver power of SFP module Publication date February 2006 Revision A2 53 User Manual Auto Logout 3min gt z a System Slot 3 Detail Information Port Status Configuration Simple Counter Serial Number 1234567890 Detail Counter Hardware Mechanical version PESEATNI SNMP IGMP Snooping Port connector Mode p lEibercable Jwavetenoth Distance Sneed VLAN 17 sc Single Mode Two Wire 1310nm 20km 100Mbps MAC Table te se Single Mode Two Wire 1310nm 20km 100Mbps GYRP 19 sc Single Mode Two Wire 1310nm 20km 100Mbps STP 20 sc Single Mode Two Wire 1310nm 20km 100Mbps Trunk 21 sc Single Mode Two Wire 1310nm 20km 100Mbps 802 1x 22 Sc Single Mode Two Wire 1310nm 20km 100Mbps Alarm 23 SC Single Mode Two Wire 1310nm 20km 100Mbps Configuration oT A Single Mode Two Wire 1310nm 20km 100Mbps Security Bandwitdh Qos Diagnostics close TFTP Server Log Firmware Upgrade Reboot Fiber Down Enabled Enabled Logout Wi 21 Fiber Down Enabled Enabled ERTE E L eee 22 Fiber Down Enabled Enabled D A eeeene a Fig 3 13 Parameter description of slot 1 3 Serial number The serial number is assigned by the manufacturer Hardware Mechanical version The version of Hardware and Mechanical The figure before the hyphen is the version of electronic hardware the one after the hyphen is t
160. mware Upgrade Function description The switch supports TFTP upgrade tool for upgrading software If you assure to upgrade software to a newer version one you must follow two procedures 1 Specifying the IP address where TFTP server locates In this field the IP address of your TFTP server should be filled in 2 Specifying what the filename and where the file is You must specify full path and filename Then press lt Upgrade gt button if your download is not successful the switch will also be back to Software Upgrade and it will not upgrade the software as well When download is completed the switch starts upgrading software A reboot message will be prompted after completing upgrading software At this time you must reboot the switch to have new software worked Note Software upgrade is hazardous if power is off You must do it carefully Parameter description TFTP Server ATFTP server stored the image file you want to upgrade Path and Filename File path and filename stored the image file you want to upgrade Auto Logout 3 min FEML2 SW26E System Firmware Upgrade Port bans Boot TFTP Server 0 0 0 0 VLAN MAC Table GVRP STP Trunk 802 1X Alarm Configuration Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade H Reboot Logout Fig 3 78 Publication date February 2006 Revision A2 145 User Manual 3 21 Reboot We offer you many ways to reboot
161. n STP 3 Thu Nov 24 09 32 53 2005 Link Up Port 1 Trink 4 Thu Nov 24 09 30 49 2005 Link Down Port 1 802 1X 5 Thu Nov 24 09 30 24 2005 Link Up Port 1 I re 6 Thu Nov 24 09 29 59 2005 Slot Inserted Slot 2 Media TP valli 7 Thu Nov 24 09 29 51 2005 Slot Inserted Slot 1 Media TP Configuration 8 Thu Nov 24 09 04 22 2005 Slot Removed Slot 1 Security 9 Thu Nov 24 09 04 16 2005 Slot Removed Slot 2 Bandwitdh 10 Thu Nov 24 08 39 40 2005 Slot Inserted Slot 3 Media Fiber Qos 11 Thu Nov 24 08 39 40 2005 Slot Inserted Slot 2 Media Fiber Diagnostics 12 Thu Nov 24 08 39 40 2005 Slot Inserted Slot 1 Media Fiber TFTP Server 13 Thu Nov 24 08 39 34 2005 Cold Start Log Firmtvare Upgrade Reboot Logout Auto Upload Enable Fig 3 77 Parameter description No Display the order number that the trap happened Time Display the time that the trap happened Events Display the trap event name Auto Upload Enable Switch the enabled or disabled status of the auto upload function Publication date February 2006 Revision A2 143 User Manual Upload Log Upload log data through tftp Clear Log Clear log data Publication date February 2006 Revision A2 144 User Manual 3 20 Firmware Upgrade Software upgrade tool is used to help upgrade the software function in order to fix or improve the function The switch provides a TFTP client for software upgrade This can be done through Ethernet Function name Fir
162. nated Priority 32768 ee o onfig on Port Root Path Cost o Trunk Current Max Age sec 20 802 1x Current Forward Delay sec 15 Alarm Hello Time sec 2 Configuration Security STP Topology Change Count 0 Bandwitdh Time Since Last Topology Change sec 0 Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 36 Publication date February 2006 Revision A2 User Manual 3 9 2 STP Configuration The STP Spanning Tree Protocol actually includes RSTP In the Spanning Tree Configuration there are six parameters open for the user to configure as user s idea Each parameter description is listed below Function name STP Configuration Function description User can set the following Spanning Tree parameters to control STP function enable disable select mode RSTP STP and affect STP state machine behavior to send BPDU in this switch The default setting of Spanning Tree Protocol is Disable Parameter description Spanning Tree Protocol Set 802 1W Rapid STP function Enable Disable Default is Disable Bridge Priority The lower the bridge priority is the higher priority it has Usually the bridge with the highest bridge priority is the root If you want to have the FEML2 SW26E as root bridge you can set this value lower than that of bridge in the LAN The valid value is 0 61440 The default is 32768 Hello Time Hello Time is used to determine the periodic time to send normal BPDU fro
163. ncluding MAC Table Information MAC Table Maintenance Static and MAC Alias which cannot be categorized to some function type They are described below Function name MAC Table Information Function Description Display the static or dynamic learning MAC entry and the state for the selected port Parameter description Port Select the port you would like to inquire Search Set up the MAC entry you would like to inquire The default is 2 22 22 2 MAC Display the MAC address of one entry you selected from the searched MAC entries table Alias Set up the Alias for the selected MAC entry Set Alias Save the Alias of MAC entry you set up Search Find the entry that meets your setup Previous Page Move to the previous page Next Page Move to the next page Alias The Alias of the searched entry MAC Address The MAC address of the searched entry Publication date February 2006 Revision A2 77 User Manual Port The port that exists in the searched MAC Entry VID VLAN Group that MAC Entry exists State Display the method that this MAC Entry is built It may show Dynamic MAC or Static MAC Auto Logout 3 min System MAC Table Information Port SNMP DHCP Boot v12 M3 Ma S56 Y7 vs M9 Y 10 l 11 12 13 IGMP Snooping a i 14 lx 15 lv 16 v 17 l
164. nds This has much to do with the STP convergent time which will be more than 30 seconds because some other factors The valid value is 4 30 seconds default is 15 seconds Force Version Two options are offered for the user s choosing STP algorithm One is RSTP and the other is STP If STP is chosen RSTP will run as a legacy STP The switch supports RSTP 802 1w which is backward compatible with STP 802 1d Auto Logout 3 min FEML2 SW26E 3 Spaten STP Configuration Port SNMP DHCP Boot Spanning Tree Protocol Disable IGMP Snooping Bridge Priority 0 61440 VLAN MAC Table Hello Time 1 10 sec ae ENRE Max Age 6 40 sec STP dae Status pansan Delay 4 30 sec Sean Port Trunk Aes Note 2 Forward Delay 1 gt Max Age jarm A Configuration Max Age gt 2 Hello Time 1 Security Bandwitdh QoS Apply Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 37 Publication date February 2006 Revision A2 User Manual 3 9 3 STP Port Configuration Function name STP Port Setting Function description In the STP Port Setting one item selection and five parameters settings are offered for user s setup User can disable and enable each port by selecting each Port Status item User also can set Path Cost and Priority of each port by filling in the desired value and set Admin Edge Port and Admin Point To Point by selecting the desired item Paramet
165. ng LACP is that a port makes an agreement with its peer port before it becomes a ready member of a trunk group also called aggregator LACP is safer than the other trunking method static trunk The switch LACP does not support the followings Link Aggregation across switches Aggregation with non IEEE 802 3 MAC link Operating in half duplex mode Aggregate the ports with different data rates Static Trunk Ports using Static Trunk as their trunk method can choose their unique Static GroupID also 1 3 this Static groupID can be the same with another LACP groupID to form a logic trunked port The benefit of using Static Trunk method is that a port can immediately become a member of a trunk group without any handshaking with its peer port This is also a disadvantage because the peer ports of your static trunk group may not know that they should be aggregate together to form a logic trunked port Using Static Trunk on both end of a link is strongly recommended Please also note that low speed links will stay in not ready state when using static trunk to aggregate with high speed links As to system restrictions about the port aggregation function on the switch In the management point of view the switch supports maximum 3 trunk groups for LACP and additional 3 trunk groups for Static Trunk But in the system capability view only 3 real trunked groups are supported An LACP trunk group with more th
166. ng tomax_length register with invalid CRC Rx Drop Packets Frames dropped due to the lack of receiving buffer Rx Undersize Packets Number of short frames lt 64 Bytes with valid CRC Rx Oversize Packets Number of long frames according to max_length register with valid CRC Publication date February 2006 Revision A2 61 User Manual 3 3 SNMP Configuration Any Network Management System NMS running the Simple Network Management Protocol SNMP can manage the Managed devices equipped with SNMP agent provided that the Management Information Base MIB is installed correctly on the managed devices The SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity OID of the management Information Base MIB described in the form of SMI syntax SNMP agent is running on the switch to response the request issued by SNMP manager Basically it is passive except issuing the trap information The switch supports a switch to turn on or off the SNMP agent If you set the field SNMP Enable SNMP agent will be started up All supported MIB OIDs including RMON MIB can be accessed via SNMP manager If the field SNMP is set Disable SNMP agent will be de activated the related Community Name Trap Host IP Address Trap and all MIB counters will be ignored Function name SNMP Configuration Function description This function is used to config
167. ny Port 12 Publication date February 2006 Revision A2 199 User Manual show Syntax show Description To show the specific management policy record Argument None Possible value None Example FEML2 SW26E management show 1 Name Tom VlanID 2 Type SNMP Action Deny Publication date February 2006 Revision A2 200 IP Port 192 168 1 30 192 168 1 80 1322 User Manual port clear counter Syntax clear counter Description To clear all ports counter include simple and detail port counter information Argument None Possible value None Example FEML2 SW26E port clear counter disable state Syntax disable state lt range gt Description To disable the communication capability of the port Argument lt range gt port range syntax 1 5 7 available from 1 to 26 Possible value lt range gt 1 26 Example FEML2 SW26E port disable state 12 enable state Syntax enable state lt range gt Description To enable the communication capability of the port Argument lt range gt port range syntax 1 5 7 available from 1 to 26 Possible value lt range gt 1 26 Example FEML2 SW26E port enable state 3 10 Publication date February 2006 Revision A2 201 User Manual set flow control Syntax set flow control lt range gt lt symmetric jasymmetric gt Description To set up the flow control func
168. o DC power It does not matter whether any connection plugged into the switch or not when power on even modules as well After the power is on all LED indicators will light up immediately and then all off except the power LED still Keeps on This represents a reset of the system Firmware Loading After resetting the bootloader will load the firmware into the memory It will take about 30 seconds after that the switch will flash all the LED once and automatically performs self test and is in ready state Publication date February 2006 Revision A2 12 User Manual 2 1 2 Installing Chassis to a 19 Inch Wiring Closet Rail Fig 2 2 Caution Allow a proper spacing and proper air ventilation for the cooling fan at both sides of the chassis Wear a grounding device for electrostatic discharge Screw the mounting accessory to the front side of the switch See Fig 2 2 Place the Chassis into the 19 inch wiring closet rail and locate it at the proper position Then fix the Chassis by screwing it Uy dy 2 1 3 Cabling Requirements To help ensure a successful installation and keep the network performance good please take a care on the cabling requirement Cables with worse specification will render the LAN to work poorly 2 1 3 1 Cabling Requirements for TP Ports gt For Fast Ethernet TP network connection The grade of the cable must be Cat 5 or Cat 5e with a maximum length of 100 m
169. on To display the system s DHCP function state IP address subnet mask default gateway DNS mode DNS server IP address and current IP address Argument None Possible value None Example FEML2 SW26E ip show DHCP Disable IP Address 192 168 1 1 Current IP Address 192 168 1 1 Subnet mask 255 255 255 0 Gateway 192 168 1 253 DNS Setting Manual DNS Server 192 95 1 1 Publication date February 2006 Revision A2 189 User Manual log clear Syntax clear Description To clear the log data Argument None Possible value None Example FEML2 SW26E log clear disable auto upload Syntax disable auto upload Description To disable the auto upload function Argument None Possible value None Example FEML2 SW26E log disable auto upload enable auto upload Syntax enable auto upload Description To enable the auto upload function Argument None Possible value None Example FEML2 SW26E log enable auto upload Publication date February 2006 Revision A2 190 User Manual show Syntax show Description To show a list of trap log events When any of log events happens it will be recorded and using show command in log function to query Up to 120 log records are supported Argument None Possible value None Example FEML2 SW26E log show Tftp Server Auto Upload 1 2 3 4 5 Wed Apr
170. on the mail server Password your password on the mail server Email Address 1 6 email address that would like to receive the alarm message SMS SMS Server the IP address of the server transferring your SMS Username your username in ISP Password your username in ISP Mobile Phone 1 6 the mobile phone number that would like to receive the alarm message Auto Logout 3 min FEML2 SW26E System Alarm Configuration Port SNMP DHCP Boot Mail Server VLAN MAC Table ANRE Email Address 1 B oo E STP Trunk Email Address 2 802 1X Atai Email Address 3 a Events Email Address 4 I Email SMS eenei Email Address 5 Security Email Address 6 Bandwitdh Qos E Diagnostics SMS Server TFTP Server Log jusername Reboot Password Logout Mobile Phone 1 Mobile Phone 2 Mobile Phone 3 f Fig 3 51 Publication date February 2006 Revision A2 x 6 s User Manual 3 13 Configuration The switch supports three copies of configuration including the default configuration working configuration and user configuration for your configuration management All of them are listed and described below respectively Default Configuration This is the ex factory setting and cannot be altered In Web UI two restore default functions are offered for the user to restore to the default setting of the switch One is the function o
171. on the port 5 then you cannot talk to them Each port based VLAN you built up must be assigned a group name This switch can support up to maximal 26 port based VLAN groups Publication date February 2006 Revision A2 69 User Manual Symmetric Vlan This is a Ingress Rule Rule 1 The Ingress Filtering Rule 1 is forward only packets with VID matching this ports configured VID For example if port 1 receives a tagged packet with VID 100 VLAN name VLAN100 and if Symmetric Vlan function is enabled the switch will check if port 1 is a member of VLAN100 If yes the received packet is forwarded otherwise the received packet is dropped Note If Symmetric is enabled and port 1 for example receives an untagged packet the switch will apply the PVID of port 1 to tag this packet the packet then will be forwarded But if the PVID of port 1 is not 100 the packet will be dropped SVL While SVL is enable all VLANs use the same filtering database storing the membership information of the VLAN to learn or look up the membership information of the VLAN While SVL is disable it means learning mode is IVL In this mode different VLAN uses different filtering database storing the membership information of the VLAN to learn or look up the information of a VLAN member Double Tag Double tag mode belongs to the tag based mode however it would treat all frames as the untagged ones which means that tag with PVID will be
172. ort Unauthorized Multihost ForceUnauthorized Don t Care Port Unauthorized Multihost ForceAuthorized Don t Care Port Authorized Table 3 3 Publication date February 2006 Revision A2 108 User Manual Function name 802 1x State Setting Function description This function is used to configure the global parameters for RADIUS authentication in 802 1x port security application Parameter description Radius Server RADIUS server IP address for authentication Default 192 168 1 1 Port Number The port number to communicate with RADIUS server for the authentication service The valid value ranges 1 65535 Default port number is 1812 Secret Key The secret key between authentication server and authenticator It is a string with the length 1 31 characters The character string may contain upper case lower case and 0 9 It is character sense It is not allowed for putting a blank between any two characters Default Radius Auto Logout 3 min System 802 1X State Setting Port SNMP n DHCP Boot 192 168 1 1 aN Port Number 1 65535 pat MAC Fable secrete I Z eL GYRP STP Trunk 802 1X State Mode Security Alarm Configuration Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 46 Publication date February 2006 Revision A2 109 User Manual Function name 802 1x Mode Setting Function description Set the operation mode
173. ounter will be reset and restart counting The data is updated every time interval defined by the user The valid range is 3 to 10 seconds The Refresh Interval is used to set the update frequency Default update time is 3 seconds Auto Logout 3 min FEML2 SW26E a System Simple Counter Port _ Status Configuration Refresh Interval 3sec F simple Counter ty Time elapsed since last reset O Days O Hours 18 Mins 18 Secs Detail Counter SNMP DHCP Boot PortNo TxByte Rx Byte Tx Packet Rx Packet Tx Collision Rx Error Packet ble snoopiat i 1815494 506733 4085 3821 o 0 2 o o 0 o o o pri eee 3 o o o o o o SE 4 o o o o o o Trink 5 o o o o o o 8021x 6 o o o o o o ppan 7 o o 0 o o o Configuration 8 0 0 o 0 0 0 Security 9 0 0 0 0 0 0 Bandwitdh 10 0 0 0 0 0 0 Qos 11 o o o o o o Diagnostics 12 o o o o o o TFTP Server 13 0 0 0 0 0 oO Log 14 o o 0 o o o Firmware Upgrade as o o 0 0 o 0 Reboot 16 o o o o o o enan 17 o o o o o o 18 o o o o o o x Fig 3 15 Function name Simple Counter Function description Display the summary counting of each port s traffic including Tx Byte Rx Byte Tx Packet Rx Packet Tx Collision and Rx Error Packet Parameters description Tx Byte Total transmitted bytes Rx Byte Total received bytes Tx Packet The counting number of the packet transmitted Publication date February 2006 Revision A2 57 User Manual Rx Packet The counting number of the packet received Tx
174. out 3 min FEML2 SW26E System Tag based Group Port SNMP DHCP Boot No VLAN NAME l YTD IGMP Snooping 1 default 4 N VLAN Mode Tag based Group PVID Port based Group MAC Table STP Trunk 802 1X Alarm Configuration Security Bandwitdh Qos Diagnostics TFTP Server Firmware Upgrade o0 Logout EN Fig 3 22 Publication date February 2006 Revision A2 71 User Manual Add Group Input the VLAN name VID and then choose the member by ticking the check box beside the port No to create a new Tag based VLAN As to the parameter of Untag it stands for an egress rule of the port If you tick the check box beside the port No packets with this VID outgoing from this port will be untagged Finally press the lt Apply gt button to have the setting taken effect Auto Logout 3 min System Tag based VLAN Port SNMP DHCP Boot e vLan 1 IGMP Snooping vo E VLAN T VLAN Mode 1 V 2 M 3 M 4 vi 5 V 6 7 8 B Tag based Group gt pvip 9 10 11 12 13 14 15 16 E Port based Group 17 18 19 20 21 22 23 24 MAC Table 25 26 G RP STP 1 2 3 4 5 M 6 Mv 7 8 Trunk 802 1x 9 10 ii 12 13 14 15 16 Alarm 17 18 19 20 21 22 23 24 Configuration 25 26 Security Bandwitdh Qos EA Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout
175. out3 min s System TOS Reliability Priority Mapping Port DHCP Boot Priority o QUeue o IGMP Snooping ow K MAC Table ssi 0 GVRP p zaa 18 STP m Trunk m 1 a 802 1x EE 2 Alarm x Configuration eral 2 Security Ess E Bandwitdh 3E Qos Global Apply VIP 802 1p D Type TOS T Type TOS R Type TOS H M Type TOS Diagnostics TFTP Server E lt a Fig 3 70 Publication date February 2006 Revision A2 User Manual Function name M Type TOS Function description IP TOS Priority affect TOS fields of IP header you can find it has 8 bit SERVICE TYPE field that specifies how the datagram should be handled The field could be divided into six subfields as follows PRECEDENCE 3 bits D Type Delay Priority 1 bit T Type Throughput Priority 1bit R Type Reliability Priority 1bit M Type Monetary Cost Priority 1bit and UNUSED PRECEDENCE 3 bits can arrange 8 kinds of priorities corresponding to the 0 7 priority in the following priority diagram TOS Monetary Cost Priority Mapping works while M TYPE in TOS field of IP header of the packets received by the switch is configured 0 1 2 3 4 5 6 7 Precedence H t Precedence Vorrangssteuerung MBZ Must Be Zero Parameter description TOS Monetary Cost Priority Mapping Each Priority can select any of Queue 0 Queue 3 In Default Priority 0 is mapping to Queue 0 Priority 1 is mapping to Queue 0 Priority 2 is mapping to Queue 1 Pr
176. ownEnabled Enabled Trunk 10 TP DownEnabled Enabled Boze 11 TP DownEnabled Enabled iui 2 12 TP DownEnabled Enabled Security 13 TP DownEnabled Enabled Bandwitdh 14 TP DownEnabled Enabled Qos 15 TP DownEnabled Enabled Diagnostics 16 TP DownEnabled Enabled TFTP Server 17 Fiber Down Enabled Enabled Log 18 Fiber Down Enabled Enabled Firmware Upgrade 19 Fiber Down Enabled Enabled Reboot 3 20 Fiber DownEnabled Enabled Logout 21 Fiber Down Enabled Enabled 22 Fiber Down Enabled Enabled Fig 3 11 K Publication date February 2006 Revision A2 49 User Manual Function name Port Status Function Description Report the latest updated status of all ports in this switch When any one of the ports in the switch changes its parameter displayed in the page it will be automatically refreshed the port current status about every 5 seconds Parameter Description Slot No Port Display the slot number The number is 1 3 No Display the port number The number is 1 26 Both port 25 and 26 are optional modules Media Show the media type adopted in all ports The Port 25 and Port 26 are optional modules which support either fiber or UTP media with either Gigabit Ethernet 1000Mbps or 10 100Mbps Fast Ethernet port They may have different media types and speed Especially fiber port has comprehensive types of connector distance fiber mode and so on The switch describes the module ports with the followin
177. pes and numbers of the port in the switch RAM size The size of the DRAM in this switch Flash size The size of the flash memory in this switch Publication date February 2006 Revision A2 36 User Manual 3 1 2 IP Configuration IP configuration is one of the most important configurations in the switch Without the proper setting network manager will not be able to manage or view the device The switch supports both manual IP address setting and automatic IP address setting via DHCP server When IP address is changed you must reboot the switch to have the setting taken effect and use the new IP to browse for web management and CLI management System Ti Account Virtual Staci Port SNMP DHCP Boot IGMP Snoopi N MAC Table GYRP STP Trunk 802 1X Alarm Security Bandvvitdh Qos Diagnostics TFTP Server lt Auto Logout OFF FEML2 SW26E J System Information IP IP Configuration DHCP Setting Disable 192 168 1 1 OANEI ERER jie address ECG k Subnet Mask 255 255 255 0 x Default Gateway 192 168 1 253 DNS Server 0 0 0 0 ng Configuration Firmware Upgrade Fig 3 5 IP Address configuration Function name IP Co nfiguration Function description Set IP address subnet mask default gateway and DNS for the switch Parameter description DHCP Setting DHCP is the abbreviation of Dynamic Host Configuration Protocol Here DHCP means a
178. pping System Port SNMP Queue Priority Queue Priority Queue Priority Queue DHCP Boot of 1 o ow MEN o IGMP Snooping a a la g om BA o o m EEN 0 ov MAC Table GVRP STP Trunk 802 1 Alarm Configuration Security Bandwitdh o lt KII m lt N N N lt ejo N al la N o A E s mile BE N lt i Qos T Global VIP A wii N Ae N lt N lt wil EMEEN E 802 1p D Type TOS _ T Type TOS R Type TOS _ M Type TOS ys A A Diagnosocs TFTP Server r a e lt o w lt fw Jie aa zr w lt k j w lt uo o u a N N N o a es aju Nfe BIS BIN N w o N e w NI Ney N a S Oloja N lt F w p 2 N N Publication date February 2006 Revision A2 138 User Manual 3 17 Diagnostics Three functions including Diagnostics Loopback Test and Ping Test are contained in this function folder for device self diagnostics Each of them will be described in detail orderly in the following sections Diagnostics Diagnostics Loopback Test Ping Test Function name Diagnostics Function description Diagnostics function provides a set of basic system diagnosis It let users know that whether the system is health or needs to be fixed The basic system check includes EEPROM tes
179. r there are three functions supported including GVRP Config GVRP Counter and GVRP Group explained below Auto Logout 3 min FEML2 SW26E E a System GVRP Configuration Port SNMP DHCP Boot GYRP State Disabled EYTTI IGMP Snooping Ren Port Join Time Leave Time Leaveall Time Default Applicant Mode Default Registrar Mode Restricted Mode ont re Configuration Security Bandwitdh Qos Diagnostics TFTP Server Boe Eee oN ao de wn vr ll k Firmware Upgrade oot Logout B N m w Fig 3 33 Publication date February 2006 Revision A2 84 User Manual Function name GVRP Config Function description In the function of GVRP Config it is used to configure each port s GVRP operation mode in which there are seven parameters needed to be configured described below Parameter description GVRP State Setting This function is simply to let you enable or disable GVRP function You can pull down the list and click the lt Downward gt arrow key to choose Enable or Disable Then click the lt Apply gt button the system will take effect immediately Join Time Used to declare the Join Time in unit of centisecond Valid time range 20 100 centisecond Default 20 centisecond Leave Time Used to declare the Leave Time in unit of centisecond Valid time range 60 300 centisecond Default 60 centisecond
180. r Trap Events Host only in the switch For assigning an IP address to the switch you just have to check what the IP address of the network will be connected with the switch Use the same network address and append your host address to it Auto Logout OFF FEML2 SW26E ij System IP Configuration System Information IP Ti DHCP Setting Disable v Reece IP Address 192 168 1 1 Management Securii Virtual Stack ERIE 255 255 2550 __ 7 Port Default Gateway 192 168 1 253 SNMP lt n DHCP Boot DNS Server 0 0 0 0 IGMP Snooping N MAC Table G RP STP Trunk 802 1X Alarm Configuration Security Bandwitdh Qos Diagnostics TFTP Server Firmware Upgrade amp Fig 2 12 First IP Address as shown in the Fig 2 12 enter 192 168 1 1 for instance For sure an IP address such as 192 168 1 x must be set on your PC Second Subnet Mask as shown in the Fig 2 12 enter 255 255 255 0 Any subnet mask such as 255 255 255 x is allowable in this case DNS The Domain Name Server translates human readable machine name to IP address Every machine on the Internet has a unique IP address A server generally has a static IP address To connect to a server the client needs to know the IP of the server However user generally uses the name to connect to the server Thus the switch DNS client program such as a browser will ask the DNS to resolve the IP address of the named server Publication date February 2006
181. r module the connector mode fiber cable wavelength distance and speed will be displayed as well For more information please refer to Section 3 2 1 about the parameter description of slot 1 3 On the left top corner there is a pull down list for Auto Logout For the sake of security we provide auto logout function to protect you from illegal user as you are leaving If you do not choose any selection in Auto Logout list it means you turn on the Auto Logout function and the system will be logged out automatically when no action on the device 3 minutes later If OFF is chosen the screen will keep as it is Default is ON On the left side the main menu tree for web is listed in the page They are hierarchical menu Open the function folder a sub menu will be shown The functions of each folder are described in its corresponded section respectively When clicking it the function is performed The following list is the full function tree for web user interface 33 Publication date February 2006 Revision A2 User Manual System Port SNMP DHCP Boot IGMP Snooping VLAN MAC Table GVRP STP Trunk 802 1X Alarm Configuration Security Bandwidth QoS Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Publication date February 2006 Revision A2 34 User Manual 3 1 1 System Information Function name System Information Function description Show the basic system information
182. re as follows MAC Priority 802 1p Priority IP TOS Priority and DiffServ DSCP Priority Built in web based management and CLI management providing a more convenient UI for the user Supports port mirror function with ingress egress traffic Supports rapid spanning tree 802 1w RSTP Supports 802 1x port security on a VLAN Supports user management and only first login administrator can configure the device The rest of users can only view the switch SNMP access can be disabled and prevent from illegal SNMP access Supports Ingress Non unicast and Egress Bandwidth rating management The trap event and alarm message can be transferred via e mail and mobile phone short message Supports diagnostics to let administrator knowing the hardware status Supports external loopback test to check if the link is ok TFTP for firmware upgrade system log upload and config file import export Supports remote boot the device through user interface and SNMP Supports network time synchronization and daylight saving Supports 120 event log records in the main memory and display on the local console Publication date February 2006 Revision A2 User Manual 1 4 View of 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch Fig 1 1 Full View of 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch with TP Fiber Modules 1 4 1 User Interfaces on the Front Panel Button LEDs and Plugs There are 3 8 port 10 100M TP Fiber and 2 slot
183. rial No for the user Write down this serial No and contact your vendor the vendor will give you a temporary password Use this new password as ID and Password and it will allow the user to login the system with manager authority temporarily Due to the limit of this new password the user only can login the system one time therefore please modify your password immediately after you login in the system successfully In this login menu you have to input the complete username and password respectively the switch will not give you a shortcut to username automatically This looks inconvenient but safer Publication date February 2006 Revision A2 29 User Manual In the switch it supports a simple user management function allowing only one administrator to configure the system at the same time If there are two or more users using administrator s identity the switch will allow the only one who logins first to configure the system The rest of users even with administrator s identity can only monitor the system For those who have no administrator s identity can only monitor the system There are only a maximum of three users able to login simultaneously in the switch To optimize the display effect we recommend you use Microsoft IE_6 0 above Netscape V7 1 above or FireFox V1 00 above and have the resolution 1024x768 The switch supported neutral web browser interface In Fig 3 2 for example left section is the whole
184. rrent position would move to the top mode If you use this command in the top mode you are still in the position of the top mode Argument None Possible value None Example FEML2 SW26E alarm FEML2 SW26E alarm events FEML2 SW26E alarm events end FEML2 SW26E exit Syntax exit Description Back to the previous mode When you enter this command your current position would move back to the previous mode If you use this command in the top mode you are still in the position of the top mode Argument None Possible value None Example EML2 SW26E trunk EML2 SW26E trunk exit mW Tj Tj EML2 SW26E Publication date February 2006 Revision A2 151 User Manual help Syntax help Description To show available commands Some commands are the combination of more than two words When you enter this command the CLI would show the complete commands Besides the command would help you classify the commands between the local commands and the global ones Argument None Possible value None Example EML2 SW26E ip FEML2 SW26E ip help Commands available Tj T disable dhcp Disable DHCP enable dhcp Enable DHCP and set dns auto or manual set dns Set dns set ip Set ip and gateway show Show IP Configuration SSH lt lt Global commands gt gt end Back to the top mode exit Back to the previous mode help Show availab
185. s Radius Access Challenge to the supplicant for asking for inputting user password via the authenticator PAE The supplicant will convert user password into the credential information perhaps in MD5 format and replies an EAP Response with this credential information as well as the specified authentication algorithm MD5 or OTP to Authentication server via the authenticator PAE As per the value of the type field in message PDU the authentication server knows which algorithm should be applied to authenticate the credential information EAP MD5 Message Digest 5 or EAP OTP One Time Password or other else algorithm Publication date February 2006 Revision A2 106 User Manual 8 If user ID and password is correct the authentication server will send a Radius Access Accept to the authenticator If not correct the authentication server will send a Radius Access Reject 9 When the authenticator PAE receives a Radius Access Accept it will send an EAP Success to the supplicant At this time the supplicant is authorized and the port connected to the supplicant and under 802 1x control is in the authorized state The supplicant and other devices connected to this port can access the network If the authenticator receives a Radius Access Reject it will send an EAP Failure to the supplicant This means the supplicant is failed to authenticate The port it connected is in the unauthorized state the supplicant and the devices connecte
186. s both port based VLAN and tag based VLAN They are different in practical deployment especially in physical location The following diagram shows how it works and what the difference they are Case2a Port based VLAN See Fig 2 4 Fig 2 4 Port based VLAN Diagram 1 The same VLAN members could not be in different switches 2 Every VLAN members could not access VLAN members each other 3 The switch manager has to assign different names for each VLAN groups at one switch Publication date February 2006 Revision A2 16 User Manual Case 2b Port based VLAN See Fig 2 5 Fig 2 5 Port based VLAN Diagram _ VLAN1 members could not access VLAN2 VLAN3 and VLAN4 members 2 VLAN2 members could not access VLAN1 and VLAN3 members but they could access VLAN4 members 3 VLAN3 members could not access VLAN1 VLAN2 and VLAN4 4 VLAN4 members could not access VLAN1 and VLAN3 members but they could access VLAN2 members Case3a The same VLAN members can be at different switches with the same VID See Fig 2 6 aaa Fig 2 6 Attribute based VLAN Diagram Publication date February 2006 Revision A2 17 User Manual 2 1 4 Configuring the Management Agent of 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch We offer you three ways to startup the switch management function They are RS 232 console CLI and Web Users can use any one of them to monitor and
187. s for optional removable modules on the front panel of the switch LED display area locating on the front panel contains a CPURUN Power LED and 26 ports working status of the switch LEDSET Button LEDSET button is used to change the LED display Fiber Port Status Link Power Indication LED NIT tou olo 0 DON our oa DONT aaa oa wall o Wey Coed Ce ey Le VONTA Coy Le WO NNN Med Colaed Ce 0A VA a Media Port SFP TP LED SET Mode ACT FDX SPD Fiber Port Status ACT FDX SPD Fast Ethernet Port RESET Button RESET button is used to reset the management system Fig 1 2 Front View of 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch with Fiber Modules Publication date February 2006 Revision A2 User Manual LED Indicators LED Color Function System LED CPURUN Green Blink when CPU is on and good POWER Green Lit when AC power is on and good ACT Green Lit when LEDSET set on active mode FDX Green Lit when LEDSET set on full duplex mode SPD Green Lit when LEDSET set on speed mode 10 100Mbps Ethernet Port 1 to 8 of 3 Module LED Lit when connection with remote device is LNK Green good Off when cable connection is not good a LEDSET set on ACT active mode Amber Blinks when any traffic is present TP Port1to8 b LEDSET set on FDX full duplex mode of 3 module LED Lit when full duplex mode is active BOT EDA SED Green Blinks when any collis
188. se Packets i Tx Excessive Collision o Security 7 i T i 1 Bandwitdh Qos Packets 64 Octects 2580 eared 4226 Diagnostics Log Reboot k Logout aa A A 273 eae G o Octects PRES CEP TOE See bd Fig 3 16 Function name Detail Counter Function description Display the detailed counting number of each port s traffic In the Fig 3 16 the window can show all counter information of each port at one time Parameter description Rx Packets The counting number of the packet received Rx Octets Total received bytes Rx Errors Number of bad packets received Publication date February 2006 Revision A2 User Manual Rx Unicast Packets Show the counting number of the received unicast packet Rx Broadcast Packets Show the counting number of the received broadcast packet Rx Multicast Packets Show the counting number of the received multicast packet Rx Pause Packets Show the counting number of the received pause packet Tx Collisions Number of collisions transmitting frames experienced Tx Single Collision Number of frames transmitted that experienced exactly one collision Tx Multiple Collision Number of frames transmitted that experienced more than one collision Tx Drop Packets Number of frames dropped due to excessive collision late collision or frame aging Tx Deferred Transmit Number of frames delayed to transmission due to the medium is busy Tx Late Collision Number of times that a collision is d
189. signed a unique Group number i e Group ID valid value is from 1 to 8 in order to declare that they wish to aggregate with each other Active LACP This field is only referenced when a port s trunking method is LACP Active An Active LACP port begins to send LACPDU to its link partner right after the LACP protocol entity started to take control of this port Passive A Passive LACP port will not actively send LACPDU out before it receives an LACPDU from its link partner Publication date February 2006 Revision A2 99 User Manual Aggtr Aggir is an abbreviation of aggregator Every port is also an aggregator and its own aggregator ID is the same as its own Port No We can regard an aggregator as a representative of a trunking group Ports with same Group ID and using same trunking method will have the opportunity to aggregate to a particular aggregator port This aggregator port is usually the port with the smallest Port No within the trunking group Status This field represents the trunking status of a port which uses a trunking method other than None It also represents the management link status of a port which uses the None trunking method means not ready Auto Logout 3min_ v FEML2 SW26E x A System Trunk Port Setting Status setting Rule Port SNMP E DHCP Boot Trunk Port Setting Trunk Port Status
190. ssible value lt gt 1 26 Example FEML2 SW26E port show detail counter 6 show media Syntax show media lt gt Description To display the module 25 or 26 information Argument lt gt 1 2 3 25 or 26 Note 1 2 3 for slot module media 25 26 for sfp module media Possible value lt gt 1 2 3 25 or 26 Example FEML2 SW26E port show media 25 Publication date February 2006 Revision A2 203 User Manual show simple counter Syntax show simple counter Description To display the summary counting of each port s traffic Argument None Possible value None Example FEML2 SW26E port show simple counter show status Syntax show status Description To display the port s current status Argument None Possible value None Example FEML2 SW26E port show status Port Media Link State Auto Nego Speed Duplex Rx Pause Tx Pause 1 TP Down Enable Enable 2 TP Down Enable Enable 3 TP Down Enable Enable 4 TP Down Enable Enable 5 TP Down Enable Enable 6 TP Down Enable Enable 7 TP Down Enable Enable 8 TP Down Enable Enable 9 TP Down Enable Enable 10 TP Down Enable Enable 22 FX Down Enable Enable 23 FX Down Enable Enable 24 FX Down Enable Enable 25 TP Down Enable Enable 26 TP Down Enable Enable Publication date February 2006 Revision A2 204 User M
191. stem without the permission If you do not logout and exit the browser the switch will automatically have you logout Besides this manually logout and implicit logout you can pull down the lt Auto Logouts gt list at the left top corner to explicitly ON OFF this logout function Parameter description Auto Logout Default is ON If it is ON and no action and no key is stroke as well in any function screen more than 3 minutes the switch will have you logout automatically Auto Logout 3 min FEML2 SW26E System Logout Port SNMP r z DHCP Boot Press Logout if you want to quit IGMP Snooping N MAC Table GYRP Configuration Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout H Fig 3 80 Publication date February 2006 Revision A2 147 User Manual 4 Operation of CLI Management 4 1 CLI Management Refer to Chapter 2 for basic installation The following description is the brief of the network connection Locate the correct DB 9 null modem cable with female DB 9 connector Null modem cable comes with the management switch Refer to the Appendix B for null modem cable configuration Attach the DB 9 female connector to the male DB 9 serial port connector on the Management board Attach the other end of the DB 9 cable to an ASCII terminal emulator or PC Com 1 2 port For example PC runs Microsoft Windows HyperTerminal utility At Co
192. switch to turn ON or OFF the function The switch supports DHCP client used to get an IP address automatically if you set this function Enable When enabled the switch will issue the request to the DHCP server resided in the network to get an IP address If DHCP server is down or does not exist the switch will issue the request and show IP address is under requesting until the DHCP server is up Before getting an IP address from DHCP server the device will not continue booting procedures If set this field Disable you ll have to input IP address manually For more details about IP address and DHCP please see the Section 2 1 5 IP Address Assignment in this manual Default Disable Publication date February 2006 Revision A2 37 User Manual IP address Users can configure the IP settings and fill in new values if users set the DHCP function Disable Then click lt Apply gt button to update When DHCP is disabled Default 192 168 1 1 If DHCP is enabled this field is filled by DHCP server and will not allow user manually set it any more Subnet mask Subnet mask is made for the purpose to get more network address because any IP device in a network must own its IP address composed of Network address and Host address otherwise can t communicate with other devices each other But unfortunately the network classes A B and C are all too large to fit for almost all networks hence subnet mask
193. switch via Http Telnet or SNMP Auto Logout OFF System System Information IP Time s FEML2 SW26E pa Management Security Configuration Se eee ey IP Range Account Any any Management Secyhjy O Custom Virtual Stack Custom aif SNMP DHCP Bant Incoming Port Access Type Action IGMP Snooping 1 N any MAC Table custom any E 2 3 4 5 6 T a O Custom g Dany Tank SO ant agi A O aa aS 16 Hep O Accept 802 1X 17 18 19 20 21 22 23 24 pores Alarm ti Y f y ti SNMP Configuration os eee Security ger ee Diagnostics TETP Server eT Firmware Upgrade F pa Fig 3 8 Parameter description A name is composed of any letter A Z a z and digit 0 9 with maximal 8 characters VID The switch supports two kinds of options for managed valid VLAN VID including Any and Custom Default is Any When you choose Custom you can fill in VID number The valid VID range is 1 4094 Publication date February 2006 Revision A2 45 User Manual IP Range The switch supports two kinds of options for managed valid IP Range including Any and Custom Default is Any In case that Custom had been chosen you can assigned effective IP range The valid range is 0 0 0 0 255 255 255 255 Incoming Port The switch supports two kinds of options for managed valid Port Range including Any and Custom Default is Any
194. t search Syntax search lt port gt lt mac gt lt vid gt Description To look for the relative mac information in mac table Argument lt port gt set up the range of the ports to search for syntax 1 5 7 available form 1 to 26 lt mac gt mac address format 01 02 03 04 05 06 can be used lt vid gt vlan id from 1 to 4094 as don t care 0 as untagged Possible value lt port gt 1 to 26 lt vid gt 0 1 4094 Example FEML2 SW26E mac table information search 1 26 2 9 2 MAC Table List Alias MAC Address Port VID State 00 40 c7 88 00 06 1 0 Dynamic show Syntax show Description To display all mac table information Argument None Possible value None Example FEML2 SW26E mac table information show FEML2 SW26E mac table information show MAC Table List Alias MAC Address Port VID State ABC 00 40 c7 d6 00 01 1 2 Static Forwarding ABC123 00 40 c7 d6 00 02 1 3 Static Filtering Publication date February 2006 Revision A2 193 User Manual lt lt maintain gt gt set aging Syntax set aging lt time gt Description To set up the age out time of dynamic learning mac Argument lt time gt Mac table age out time between 10 and 1000000 seconds The value 0 means to disable age out time Possible value lt time gt 10 1000000 seconds or 0 Example FEML2 SW26E mac table maintain set aging 300 set learning Syntax set
195. t Gigabit module in port 25 26 If the media is 1Gbps fiber it is always 1000Mbps and the duplex is full only If the media is TP the Speed Duplex is comprised of the combination of speed mode 10 100 1000Mbps and duplex mode full duplex and half duplex The following table summarized the function the media supports Media type NWay Speed Duplex 100M TP ON OFF _ 10 100M Full Half 1000M TP ON OFF _ 10 100 1000M _ Full for all Half for 10 100 1000M Fiber ON OFF _ 1000M Full In Auto negotiation mode no default value In Forced mode default value depends on your setting Flow Control There are two modes to choose in flow control including Symmetric and Asymmetric If flow control is set Symmetric both parties can send PAUSE frame to the transmitting device s if the receiving port is too busy to handle When it is set Asymmetric this will let the receiving port care the PAUSE frame from transmitting device s but it doesn t send PAUSE frame This is one way flow control Default Symmetric Publication date February 2006 Revision A2 56 User Manual 3 2 3 Simple Counter The function of Simple Counter collects any information and provides the counting about the traffic of the port no matter the packet is good or bad In the Fig 3 15 the window can show all ports counter information at the same time Each data field has 20 digit long If the counting is overflow the c
196. t UART test DRAM test and Flash test Auto Logout 3 min ee Diagnostics Port SNMP DHCP Boot OK seme sasceny ok MAC Table ok GVRP ok STP Trunk 802 1X f Run Alarm Configuration Security Bandwitdh Qos Diagnostics Diag Loopbatk Ping Test TFTP Server Log Firmware Upgrade oot Logout Fig 3 73 Publication date February 2006 Revision A2 139 User Manual Function name Loopback Test Function description In the Loopback Test function there are two different loopback tests One is Internal Loopback Test and the other is External Loopback Test The former test function will not send the test signal outside the switch box The test signal only wraps around in the switch box As to the latter test function it will send the test signal to its link partner If you do not have them connected to active network devices i e the ports are link down the switch will report the port numbers failed If they all are ok it just shows OK Note Whatever you choose Internal Loopback Test or External Loopback Test these two functions will interfere with the normal system working and all packets in sending and receiving also will stop temporarily Auto Logout 3min_ a System Loopback Test Port SNMP IGMP Snooping 1 OK OK VLAN 2 OK Fail MAC Table 3 OK Fail ONRE 4 OK Fail E 5 oK Fail 802 1X 6 OK Fail pen F oK Fail Configuration 8 OK Fail Security 9 OK Fail Bandwitdh 10 OK Fail Qos 11 OK Fail
197. t stp rstp Example FEML2 SW26E stp set version rstp Publication date February 2006 Revision A2 219 User Manual show config Syntax show status Description To display the STP configuration data Argument None Possible value None Example FEML2 SW26E stp show config STP State Configuration Spanning Tree Protocol Enabled Bridge Priority 0 61440 61440 Hello Time 1 10 sec z2 ax Age 6 40 sec 20 Forward Delay 4 30 sec 15 Force Version RSTP show port Syntax show status Description To display the port information of STP Argument None Possible value None Example FEML2 SW26E stp show port Port Port Status Path Cost Priority Admin Edge Port Admin Point To Point 1 DISCARDING 2000000 128 Yes Auto 2 DISCARDING 2000000 128 Yes Auto 3 DISCARDING 2000000 128 Yes Auto 4 DISCARDING 2000000 128 Yes Auto 5 DISCARDING 2000000 128 Yes Auto 23 DISCARDING 200000 128 No Auto 24 DISCARDING 200000 128 No Auto 25 DISCARDING 20000 128 No Auto 26 DISCARDING 20000 128 No Auto Publication date February 2006 Revision A2 220 User Manual show status Syntax show status Description To display of the status of STP Argument None Possible value None Example FEML2 SW26E stp show status STP Status STP State Bridge ID Bridge Priority Designated Root Designated Priority Root Port Root Path Cost Current Max Age sec
198. t range syntax 1 5 7 available from 1 to 26 lt normal gt set registrar as normal mode lt fixed gt set registrar as fixed mode lt forbidden gt set registrar as forbidden mode Possible value lt range gt 1 to 26 lt normallfixed forbidden gt normal or fixed or forbidden Example FEML2 SW26E gvrp set registrar 1 5 fixed set restricted Syntax set restricted lt range gt lt enable disable gt Description To set the restricted mode for each port Argument lt range gt port range syntax 1 5 7 available from 1 to 26 lt enable gt set restricted enabled lt disable gt set restricted disabled Possible value lt range gt 1 to 26 lt enable disable gt enable or disable Publication date February 2006 Revision A2 183 User Manual Example FEML2 SW26E gvrp set restricted 1 10 enable FEML2 SW26E gvrp show config GVRP state Enable Port Join Time Leave Time LeaveAll Time Applicant Registrar Restricted 20 60 000 orma orma Enable 2 20 60 000 orma orma Enable 3 20 60 000 orma orma Enable 4 20 60 000 orma orma Enable 5 20 60 000 orma orma Enable 6 20 60 000 orma orma Enable T 20 60 000 orma orma Enable 8 20 60 000 orma orma Enable 9 20 60 000 orma orma Enable 10 20 60 000 orma orma Enable 22 20 60 1000 Normal Normal Disable 23 20 60 1000 Normal Normal Disable 24 20 60 1000 Normal Normal Disable 25 20 60 1000 Normal Normal Disab
199. t transmission schedule using Weighted Round Robin WRR User defined weight Classification of packet priority can be based on either a VLAN tag on packet or a user defined port priority Limit number of MAC addresses learned per port static MAC addresses stay in the filtering table Bridging 802 1D Spanning Tree IP Multicast IGMP Snooping IP Multicast Packet Filtering Maximum of 256 active VLANs and IP multicast sessions One RS 232 port as local control console Telnet remote control console SNMP agent MIB 2 RFC 1213 Bridge MIB RFC 1493 RMON MIB RFC 1757 statistics Ethernet like MIB RFC 1643 Web browser support based on HTTP Server and CGI parser TFTP software upgrade capability Note Any specification is subject to change without notice Publication date February 2006 Revision A2 244 User Manual Appendix B Null Modem Cable Specifications The DB 9 cable is used for connecting a terminal or terminal emulator to the Managed Switch s RS 232 port to access the command line interface The table below shows the pin assignments for the DB 9 cable Function Carrier Receive Data Transmit Data Mnemonic CD RXD TXD Data Terminal Ready DTR Signal Ground Data Set Ready GND DSR Request To Send RTS Clear To Send CTS 9 Pin Null Modem Cable Reserve 1 6 4 2 3 5 7 8 9 SS ae 245 ONWOINWH f Pin ONOOaARWN Reserve Public
200. t whether UART DRAM Flash and EEPROM is normal or not Argument None Possible value None Example EML2 SW26E diag diag EPROM Test OK ART Test OK RAM Test OK lash Test OK yw Nocd Loopback Syntax loopback Description For Internal External Loopback Test Argument None Possible value None Example FEML2 SW26E diag loopback Internal Loopback Test OK External Loopback Test Port 1 23456789 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Fail ping Syntax ping lt ip gt Description To confirm that whether the remote end station or switch itself is alive or not Argument lt ip gt ip address or domain name Possible value IP address e g 192 168 2 65 or domain name e g tw yahoo com Example FEML2 SW26E diag ping 192 168 1 115 Gateway 192 168 1 253 192 168 1 115 is alive Publication date February 2006 Revision A2 179 User Manual firmware set upgrade path Syntax set upgrade path lt filepath gt Description To set up the image file that will be upgraded Argument lt filepath gt upgrade file path and name Possible value lt filepath gt upgrade file path and name Example FEML2 SW26E firmware set upgrade path cr2326e_FEML2 SW26E _v1 0 img show Syntax show Description To display the information of tftp server and upgrade path and file name Argument None Possible value
201. th RS 232 cable you would logout the system and be back to the initial login prompt when you run this command Argument None Possible value None Example FEML2 SW26E logout restore default Syntax restore default Description When you use this function in CLI the system will show you the information Do you want to restore the default IP address y n If you choose Y or y the IP address will restore to default 192 168 1 1 If you choose N or n the IP address will keep the same one that you had saved before If restoring default successfully the CLI would prompt if reboot immediately or not If you press Y or y the system would reboot immediately otherwise it would be back to the CLI system After restoring default configuration all the changes in the startup configuration would be lost After rebooting the entire startup configuration would reset to factory default Argument None Possible value None Example FEML2 SW26E restore default Restoring Restore Default Configuration Successfully Press any key to reboot system Publication date February 2006 Revision A2 154 User Manual restore user Syntax restore user Description To restore the startup configuration as user defined configuration If restoring default successfully the CLI would prompt if reboot immediately or not If you press Y or y the system would reboot immediately others would back to the C
202. tion of all ports Argument lt range gt port range syntax 1 5 7 available from 1 to 26 lt symmetric gt set its flow control as symmetric lt asymmetric gt set its flow control as asymmetric Possible value lt range gt 1 to 26 lt symmetricjlasymmetric gt symmetric or asymmetric Example FEML2 SW26E port set flow control 3 6 symmetric set speed duplex Syntax set speed duplex lt range gt lt auto gt lt 10 100 1000 gt lt half full gt Description To set up the speed and duplex of all ports Argument lt range gt port range syntax 1 5 7 available from 1 to 26 lt port speed gt auto set auto negotiation mode 10 set speed to 10M 100 set speed to 100M 1000 set speed to 1000M lt port duplex gt half set to half duplex full set to full duplex Possible value lt range gt 1 to 26 lt port speed gt auto 10 100 1000 lt port duplex gt full half Example FEML2 SW26E port set speed duplex 8 100 full Publication date February 2006 Revision A2 202 User Manual show conf Syntax show conf Description To display the each port s configuration about state speed duplex and flow control Argument None Possible value None Example FEML2 SW26E port show conf show detail counter Syntax show detail counter lt gt Description To display the detailed counting number of each port s traffic Argument lt gt port available from 1 to 26 Po
203. tion your LAN into small ones as your demand Properly configuring it you can gain not only improving security and increasing performance but greatly reducing VLAN management 3 6 1 VLAN Mode Function name VLAN Mode Setting Function description The VLAN Mode Selection function includes two modes Port based and Tag based you can choose one of them by pulling down list and pressing the lt Downward gt arrow key Then click lt Apply gt button the settings will take effect immediately Parameter description VLAN Mode Tag based This is the default setting Tag based VLAN identifies its member by VID This is quite different from port based VLAN If there are any more rules in ingress filtering list or egress filtering list the packet will be screened with more filtering criteria to determine if it can be forwarded The switch supports supplement of 802 1q Each tag based VLAN you built up must be assigned VLAN name and VLAN ID Valid VLAN ID is 1 4094 User can create total up to 256 Tag VLAN groups Port based Port based VLAN is defined by port Any packet coming in or outgoing from any one port of a port based VLAN will be accepted No filtering criterion applies in port based VLAN The only criterion is the physical port you connect to For example for a port based VLAN named PVLAN 1 contains port members Port 1 amp 2 amp 3 amp 4 If you are on the port 1 you can communicate with port 2 amp 3 amp 4 If you are
204. tor To configure the switch please follow the procedures below 1 Find the RS 232 DB 9 cable with female DB 9 connector bundled Normally it just uses pins 2 3 and 7 See also Appendix B for more details on Null Modem Cable Specifications 2 Attaches the DB 9 female cable connector to the male serial RS 232 DB 9 connector on the switch 3 Attaches the other end of the serial RS 232 DB 9 cable to PC s serial port running a terminal emulator supporting VT100 ANSI terminal with The switch s serial port default settings For example Windows98 2000 XP HyperTerminal utility Note The switch s serial port default settings are listed as follows Baud rate 57600 Stop bits 1 Data bits 8 Parity N Flow control none 4 When you complete the connection then press lt Enters gt key The login prompt will be shown on the screen The default username and password are shown as below Username admin Password admin Publication date February 2006 Revision A2 19 User Manual Set IP Address Subnet Mask and Default Gateway IP Address Please refer to Fig 2 7 CLI Management for details about the ex factory setting They are default setting of IP address You can first either configure your PC IP address or change IP address of the switch next to change the IP address of default gateway and subnet mask For example your network address is 10 1 1 0 and subnet mask is 255 255 255 0 You can change the switch s
205. tos set dscp Syntax set dscp lt q0 gt lt priority gt lt qi gt lt priority gt lt q2 gt lt priority gt lt q3 gt lt priority gt Description To set IP DSCP gos weighting for 4 queues Argument lt q gt queue level q0 queue 0 q1 queue 1 q2 queue 2 q3 queue 3 lt priority gt priority level One queue has been assigned 2 different priorities You don t need to use all of queue but must assign queue in order Syntax 1 2 or 2 5 7 available from 0 to 63 Possible value lt priority gt 0 to 63 Example FEML2 SW26E qos set dscp q0 2 q1 2 q2 2 q3 3 Publication date February 2006 Revision A2 207 User Manual set pri tag Syntax set pri tag lt q0 gt lt priority gt lt qi gt lt priority gt lt q2 gt lt priority gt lt q3 gt lt priority gt Description To set 802 1p qos weighting for 4 queues Argument lt q gt queue level q0 queue 0 q1 queue 1 q2 queue 2 q3 queue 3 lt priority gt priority level One queue has been assigned 2 different priorities You don t need to use all of queues but must assign queues in order Syntax 1 2 or 2 5 7 available from 0 to 7 Possible value lt priority gt 0 to 7 Example FEML2 SW26E qos set pri tag q0 0 q1 2 q3 4 set sche Syntax set sche lt wrr strict gt lt wrr_O gt lt wrr_1 gt lt wrr_2 gt lt wrr_3 gt Description To set qos schedule and weight for 4 queues Argument lt wrr gt sche
206. ts status authorized or unauthorized Parameter description Port Number The port number to be chosen to show its 802 1X Port Status The valid number is Port 1 26 Disable Mode When selecting Disable mode for a port in the function 802 1X Port Mode Configuration the port is in the uncontrolled port state and does not apply 802 1X authenticator on it Any node attached on this port can access the network without the admittance of 802 1X authenticator The Port Status will show the following screen 802 1x with Multihost mode When selecting 802 1x with Multihost mode for a port in the function 802 1X Port Mode Configuration Devices can access the network through this port once the authenticator is authorized The Port Status will show the following screen If the port is granted to access the network the port status is authorized otherwise unauthorized Port Status The current 802 1X status of the port In Disable mode this field is Disabled Auto Logout 3 min System Port Security Management Port DHCP Boot Port Mode status IGMP Snooping disable AN BE Multi host Authorized oa IS HEM disable STP EE disable Trunk B Multi host Unauthorized 802 1X state EE disable Mode disable pen BE disable Alarm s disable Configuration fes Security E disable Bandwitdh disable 4 Qos BOW disable Diagnostics TFTP Server HEE disable Log E disable Eksa Upgrade E disable Logout E disable disable BE disabl
207. ts 3 slots of removable and hot swappable 8 port 10 100M TP or 100M fiber module 2 Gigabit dual media ports TP SFP in which 2 slots for removable SFP module supporting 1000M SFP fiber module Supports on line pluggable fiber transceiver modules Supports 8K MAC addresses with automatic learning and aging e Supports 256KB packet buffer and 128KB control memory e Maximal packet length can be up to 1536 bytes e Full duplex flow control IEEE802 3x and half duplex backpressure e Extensive front panel diagnostic LEDs System Power CPURUN ACT FDX SPD LEDSET 10 100Mbps port 1 8 of 3 modules LINK ACT FDX SPD 10 100 1000Mbps fiber port 25 26 LINK ACT FDX SPD e Management e Supports concisely the status of port and easily port configuration e Supports per port traffic monitoring counters e Supports a snapshot of the system Information when you login e Supports port mirror function e Supports the static trunk function Publication date February 2006 Revision A2 User Manual Supports 802 1Q VLAN with 256 entries Supports user management and limits three users to login Supports DHCP Broadcasting Suppression to avoid network suspended or crashed Supports to send the trap event while monitored events happened Supports default configuration which can be restored to overwrite the current configuration which is working on via web browser and CLI Supports on line plug unplug SFP modules Supports 5 kinds of QoS a
208. ult Configuration includes default IP address Function description Restore Default Configuration function can retrieve the ex factory setting to replace the start configuration And the IP address of the switch will also be restored to 192 168 1 1 Auto Logout 3 min System Restore Default Configuration Successfully Port SNMP DHCP Boot IGMP Snooping VLAN MAC Table GVRP J Reboot STP Trunk 802 1x Alarm Configuration E Save Restore Config file Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 55 Function name Restore Default Configuration excludes current IP address Function description Restore Default Configuration function can retrieve the ex factory setting to replace the start configuration However the switch s current IP address that the user set up will not be changed and will NOT be restored to 192 168 1 1 as well Auto Logout 3min System Restore Default Configuration Successfully Port SNMP DHCP Boot IGMP Snooping Reboot the system to take effect for the setting VLAN MAC Table GYRP STP Trunk 802 1X Alarm Configuration I Save Restore Config file Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 56 Publication date February 2006 Revision A2 119 User Manual Function name Restore User Configuration Function description Restore User Configuration funct
209. um of 65534 2 16 2 hosts per network Bit 012 15 16 31 10 Network address Host address Class C IP address range between 192 0 0 0 and 223 255 255 255 Each class C network has a 24 bit network prefix followed 8 bit host address There are 2 097 152 2 21 24 networks able to be defined with a maximum of 254 2 8 2 hosts per network Bit 012 3 23 24 31 110 Network address Host address Publication date February 2006 Revision A2 23 User Manual Class D and E Class D is a class with first 4 MSB Most significance bit set to 1 1 1 0 and is used for IP Multicast See also RFC 1112 Class E is a class with first 4 MSB set to 1 1 1 1 and is used for IP broadcast According to IANA Internet Assigned Numbers Authority there are three specific IP address blocks reserved and able to be used for extending internal network We call it Private IP address and list below Class A 10 0 0 0 10 255 255 255 Class B 172 16 0 0 172 31 255 255 Class C 192 168 0 0 192 168 255 255 Please refer to RFC 1597 and RFC 1466 for more information Subnet mask It means the sub division of a class based network or a CIDR block The subnet is used to determine how to split an IP address to the network prefix and the host address in bitwise basis It is designed to utilize IP address more efficiently and ease to manage IP network For a class B network 128 1 2 3 it may have a su
210. ure SNMP settings community name trap host and public traps as well as the throttle of SNMP A SNMP manager must pass the authentication by identifying both community names then it can access the MIB information of the target device So both parties must have the same community name Once completing the setting click lt Apply gt button the setting takes effect Parameters description SNMP The term SNMP here is used for the activation or de activation of SNMP Default is Enable Get Set Trap Community Community name is used as password for authenticating if the requesting network management unit belongs to the same community group If they both don t have the same community name they don t belong to the same group Hence the requesting network management unit can not access the device with different community name via SNMP protocol If they both have the same community name they can talk each other Community name is user definable with a maximum length of 15 characters and is case sensitive There is not allowed to put any blank in the community name string Any printable character is allowable The community name for each function works independently Each function has its own community name Say the community name for GET only works for GET function and can t be applied to other function such as SET and Trap Publication date February 2006 Revision A2 62 User Manual Default SNMP function Enable Def
211. v 18 v 19 20 121 y 22 v 23 24 vi 2526 VEAN Select Unselect All MAC Table E Information fh Eimac 27 ee 27 er 77 vo Maintenance MAC E Static ee MAC alias i GYRP a 802 1X Pann A ae E a a Configuration Security Bandwitdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 29 Publication date February 2006 Revision A2 78 User Manual Function Name MAC Table Maintenance Function Description This function can allow the user to set up the processing mechanism of MAC Table An idle MAC address exceeding MAC Address Age out Time will be removed from the MAC Table The range of Age out Time is 10 1000000 seconds and the setup of this time will have no effect on static MAC addresses In addition the learning limit of MAC maintenance is able to limit the amount of MAC that each port can learn Parameter description Aging Time Delete a MAC address idling for a period of time from the MAC Table which will not affect static MAC address Range of MAC Address Aging Time is 10 1000000 seconds The default Aging Time is 300 seconds Learning Limit To set up the maximum amount of MAC that each port can learn Valid value of learning limit for port 1 24 ranges from 0 8191 As to port 25 port 26 only the fixed value 8192 is assigned to these two ports and user cannot configure this value
212. ver user Syntax del server user Description To remove the configuration of server user account and password Argument None Possible value None Example FEML2 SW26E alarm email del server user set mail address Syntax set mail address lt gt lt mail address gt Description To set up the email address Argument lt gt email address number range 1 to 6 lt mail address gt email address Possible value lt gt 1106 Example FEML2 SW26E alarm email set mail address 1 abc mail abc com Publication date February 2006 Revision A2 165 User Manual set server Syntax set server lt ip gt Description To set up the IP address of the email server Argument lt ip gt email server ip address or domain name Possible value None Example FEML2 SW26E alarm email set server 192 168 1 6 set user Syntax set user lt username gt Description To set up the account of the email server Argument lt username gt email server account Possible value None Example FEML2 SW26E alarm email set user admin show Syntax show Description To display the configuration of e mail Argument None Possible value None Example FEML2 SW26E alarm email show ail Server 192 168 1 6 Username admin Password 2 bloblebkokiobiokiekke Email Address Email Address Email Address Email Address Email Address Email Address 6 abc mai
213. witdh Qos Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 32 Publication date February 2006 Revision A2 82 User Manual Parameter description MAC Address It is a six byte long Ethernet hardware address and usually expressed by hex and separated by hyphens For example 00 40 C7 D6 00 02 Alias MAC alias name you assign Note If there are too many MAC addresses learned in the table we recommend you inputting the MAC address and alias name directly Publication date February 2006 Revision A2 83 User Manual 3 8 GVRP Configuration GVRP is an application based on Generic Attribute Registration Protocol GARP mainly used to automatically and dynamically maintain the group membership information of the VLANs The GVRP offers the function providing the VLAN registration service through a GARP application It makes use of GARP Information Declaration GID to maintain the ports associated with their attribute database and GARP Information Propagation GIP to communicate among switches and end stations With GID information and GIP GVRP state machine maintain the contents of Dynamic VLAN Registration Entries for each VLAN and propagate these information to other GVRP aware devices to setup and update their knowledge database the set of VLANs associated with currently active members and through which ports these members can be reached In GVRP Configuration function folde
214. y cause you to acquire a static electrical charge To protect your device always e Touch the metal chassis of your computer to ground the static electrical charge before you pick up the circuit device e Pick up the device by holding it on the left and right edges only Electronic Emission Notices Federal Communications Commission FCC Statement This equipment has been tested and found to comply with the limits for a class A computing device pursuant to Subpart J of part 15 of FCC Rules which are designed to provide reasonable protection against such interference when operated in a commercial environment European Community CE Electromagnetic Compatibility Directive This equipment has been tested and found to comply with the protection requirements of European Emission Standard EN55022 EN60555 2 and the Generic European Immunity Standard EN50082 1 EMC N55022 1988 CISPR 22 1985 class A EN60555 2 1995 class A EN60555 3 IEC1000 4 2 1995 4K V CD 8KV AD IEC 1000 4 3 1995 3V m IEC1000 4 4 1995 1KV power line 0 5KV signal line vii About this user s manual In this user s manual it will not only tell you how to install and connect your network system but configure and monitor the 3 Slot 24 Fast Ethernet 2 Gigabit L2 Managed Switch through the built in CLI and web by RS 232 serial interface and Ethernet ports step by step Many explanation in detail of hardware and software functions are shown
Download Pdf Manuals
Related Search
Related Contents
Ref. 554901 SVD11225CYB - Clearance Club S.I.C. 改造兵士レベル3 取扱説明書 480.8 KB Coral IPx Office Installation and Hardware Reference Manual EVBUM2084 - NB7L14M Evaluation Board User`s Manual 検証実験の提案 Guia de usuario Geo 5T Español Copyright © All rights reserved.
Failed to retrieve file