Home
SGR24i USER MANUAL
Contents
1. Fig 3 124 Tag Priority Function name ACE Configuration Function description The switch ACL function support up to 128 Access Control Entries ACEs using the shared 128 ACEs for ingress classification You can create an ACE and assign this ACE for each port with lt Any gt or assign this ACE for a policy or assign this ACE for a port There are 8 policies each port can select one of policy then decides which of the Permit Deny Rate Limitation and Port Copy actions would take according to the ACL configuration packets IPv4 EtherType ARP Protocol MAC Parameters and VLAN parameters Parameter description Ingress Port Range Any Policy 1 8 Port 1 24 Any Apply this ACE rule for each port ingress classification Policy 1 8 Apply this ACE rule for specific policy Port 1 24 Apply this ACE rule for specific port ingress classification IP Protocol Filter Range Any Ethernet Type ARP IPv4 Any It is including all frame type Ethernet Type It is including all Ethernet frame type ARP It is including all ARP protocol frame type IPv4 It is including all IPv4 protocol frame type MAC Parameters When Frame Type Any 125 DMAC Filter Range Any MC BC UC Any It is including all destination MAC address MC It is including all Multicast MAC address BC It is including all Broadcast MAC address UC It is including all Unicast MAC address MAC Parameters When Frame Type Ethernet Type SMAC Filter
2. Mobile Phone 1 6 the mobile phone number that would like to receive the alarm message Alarm Configuration Mail Server User Name Password Email Adress 1 Email Adress 2 Email Adress 3 Email Adress 4 Email Adress 5 Email Adress 6 Fig 3 166 187 3 17 Configuration The switch supports three copies of configuration including the default configuration working configuration and user configuration for your configuration management All of them are listed and described below respectively Default Configuration This is ex factory setting and cannot be altered In Web UI two restore default functions are offered for the user to restore to the default setting of the switch One is the function of Restore Default Configuration included default IP address the IP address will restore to default 192 168 1 1 as you use it The other is the function of Restore Default Configuration without changing current IP address the IP address will keep the same one that you had saved before by performing this function Working Configuration It is the configuration you are using currently and can be changed any time The configurations you are using are saved into this configuration file This is updated each time as you press lt Apply gt button User Configuration It is the configuration file for the specified or backup purposes and
3. 2 1 4 1 Configuring the Management Agent of SGR24i through the Serial RS 232 Port To perform the configuration through RS 232 console port the switch s serial port must be directly connected to a DCE device for example aPC through RS 232 cable with DB 9 connector Next run a terminal emulator with the default setting of the switch s serial port With this you can communicate with the switch In the switch RS 232 interface only supports baud rate 115200 bps with 8 data bits 1 stop bit no parity check and no flow control RS 232 DB 9 Connector SGR24i L2 Managed Switch Default IP Setting IP address 192 168 1 1 Subnet Mask 255 255 255 0 Default Gateway 192 168 1 254 RS 232 cable with female DB 9 connector at both ends Fig 2 7 Terminal or Terminal Emulator To configure the switch please follow the procedures below 1 Find the RS 232 DB 9 cable with female DB 9 connector bundled Normally it just uses pins 2 3 and 7 See also Appendix B for more details on Null Modem Cable Specifications 2 Attaches the DB 9 female cable connector to the male serial RS 232 DB 9 connector on the switch 3 Attaches the other end of the serial RS 232 DB 9 cable to PC s serial port running a terminal emulator supporting VT100 ANSI terminal with The switch s serial port default settings For example Windows98 2000 XP HyperTerminal utility Note The switch s serial port default settings are li
4. Tag Priority Any Fig 3 67 Ingress Port Access Control List Configuration Ingress Port Frame Type Action Rate Limiter Port Copy Counters on oO 2 2202 OOOO O O O Any IPv4 Permit Any Disabled Any ARP Permit Any Disabled Any EType Permit Any Disabled ja i OOG OG o Any Any Permit Any Disabled Fig 3 68 107 Parameter description Frame Type Range Any Ethernet Type ARP IPv4 Any It is including all frame type Ethernet Type It is including all Ethernet frame type ARP It is including all ARP protocol frame type IPv4 It is including all IPv4 protocol frame type ACE Configuration Frame Type Any Disabled Any Port Copy Disabled Ethernet Type Counter ARP Counter IPv4 MAC Parameters VLAN Parameters DMAC Filter Any Y VLAN ID Filter Tag Priority Fig 3 69 Frame Type 108 ACE Configuration Ingress Port Ethernet Type MAC Parameters SMAC Filter Any DMAC Filter Any Ethernet Type Parameters EtherType Filter Any yl Apply Fig 3 70 109 Disabled 7 Port Copy Disabled VLAN Parameters VLAN ID Filter Tag Priority MAC Parameters Specific 00 00 00 00 00 01 wi Fig 3 71 Ethernet Type Parameters DEEEF Fig 3 72 ACE Configuration MAC Parameters VLAN Parameters ARP Parameters Fig 3 73 ARP Fig 3 74 ARP 110 ARP Parameters Other Fig 3 75 ARP A
5. lt mac gt mac address lt port gt 0 24 lt vid gt 0 1 4094 alias mac alias name Example SGR24i mac table static mac add 00 02 03 04 05 06 3 0 aaa SGR24i mac table static mac del Syntax del lt mac gt lt vid gt Description To remove the static mac entry Argument lt mac gt mac address format 00 02 03 04 05 06 lt vid gt vlan id 0 1 4094 VID must be zero if vlan mode is not tag based Possible value lt mac gt mac address lt vid gt 0 1 4094 Example SGR24i mac table static mac del 00 02 03 04 05 06 0 SGR24i mac table static mac 247 show filter Syntax show filter Description To display the static filter table Argument None Possible value None Example SGR24i mac table static mac show filter Static Filtering Etnry Total 1 item s 1 mac 00 33 03 04 05 06 vid alias SGR24i mac table static mac show forward Syntax show forward Description To display the static forward table Argument None Possible value None Example SGR24i mac table static mac show forward Static Forwarding Etnry Total 1 item s 1 mac 00 02 03 04 05 06 port 3 wid SGR24i mac table static mac 248 ccc alias aaa management add Syntax Usage set lt name gt lt value gt lt vid gt lt value gt lt ip gt lt value gt lt port
6. sssssesssrsererererrerrrrere 50 3 2 3 Simple G nter s ioeina ei a ia i DEN CUE ES E A eens SEKTE EEDE Ei 53 3724r Detal COUM OT l Va ee a a e N aaa 55 Bae WEAN E tere n ea e a a a e a d a a neat 59 3 3 1 VLAN M d es e A A E eee 59 3 3 2 Tag based Gro pr srn sianar eaa A aA Aaa AET PERA EAKA TA 60 3 3 3 Port based Groups riea nebrani i ed Te ee a ole an EEN 62 Se SEA PA L0 A ESEE E T E E E E Nunlanaices ease 64 323 5 Managemen Eserden noero aea E AA AAAA anan 66 BHA MAG erao A REA AAS R AEEA T A ARAE E EATA EE aE 67 3 4 1 Mac Address Table aea eee Ai in ee vee ee ote 67 32422 Static E EEEE Giese Lele nc acted Petaloes cavaspaeeeabeaee Saaha Derdmlortvions 69 324 3 Static Forward ve S4 cee Gana Gas ahve eee ees ie eae 70 32424 IMAG ALIAS oai aae ao e Sea eae et eee Oh vacates tu ev ees an ted cea A NETA 71 3 4 5 MAC Table wa sient teases esau rat aE E E eee aed lon A Sea eater es 72 BOs GVRP AEE sits crete E EAT ES acvadscadopss edt E ERE E E ES 73 ARE oae EE E a E a a A E A 74 9252r COUNTE E in E aa AA Ta ANE AES Aa Ta AA A N a DTA 76 9943n GROUP er EA SAS R E Sea a a a E DANAN 78 3 6 QOS QUALITY OF SERVICE CONFIGURATION 2 0cccceceeeeeneeceeeeeceaeeeeaaeseneeeseaeeesaeeneneeenaees 79 S262 POMS iuiaiidonancnathbeatis lau wnas Relautnaadaany cis iaiae iu rad E E 80 3 6 24 QOS Control Liste kaina dagans e dee wadanant waa a waka ed a eaweemeneaans 82 326 3 Rate M ES Baise citkaa Matin atetal vad Shadi ead ditea a dedu
7. Accept Port 2 3 47 573 249 delete Syntax delete Description To delete a specific record or range Argument lt gt a specific or range management security entry s Possible value None Example SGR24i management show 1 Name Tom VlanID Type SNMP Action SGR24i management delete 1 SGR24i management show Security rule list is empty now 2 Deny 250 LP Port 192 168 1 30 192 168 1 80 1 2 edit the specific management policy entry Available range 1 to 65536 Syntax Usage set lt name gt lt value gt lt vid gt lt value gt lt ip gt lt value gt lt port gt lt value gt lt type gt lt value gt lt action gt lt value gt Synopsis set name Mary vid 20 ip 192 168 1 1 192 168 1 90 port 2 5 8 type h s actiona Synopsis set name Mary vid 20 ip 192 168 1 1 192 168 1 90 Description To edit management policy record Argument lt name gt lt value gt ACL entry name lt vid gt lt value gt VLAN ID lt ip gt lt value gt IP Range lt port gt lt value gt Incoming port lt type gt lt value gt Access type lt action gt lt value gt a ccept or d eny Possible value lt name gt lt value gt No default and it must be set lt vid gt lt value gt The range is 1 4095 and can be set to any lt ip gt lt value gt For example 192 168 1 90 192 168 1 90 or any lt port gt lt value gt For example 1
8. Group ports into several types according to different QCL policies Set up Typical Network Application Rules Set up the specific QCL for different typical network application quality control Set up TOS Precedence Mapping Set up the traffic class mapping to the precedence part of TOS 3 bits when receiving IPv4 IPv6 packets Set up VLAN Tag Priority Mapping Set up the traffic class mapping to the user priority value 3 bits when receiving WLAN tagged packets To continue click Next Fig 3 45 Parameter description Please select an Action User need to select one of action from following items then click on lt Next gt to finish QCL configuration Setup Port Policies Set up Typical Network Application Rules Set up TOS Precedence Mapping Set up VLAN Tag Priority Mapping Next Go to next step Cancel Abort current configuration back to previous step Back Back to previous screen 91 Set up Policy Rules Group ports into several types according to different QCL policies Port Members QcLID 123 45 6 7 8 9 101112131415 1617 18 19 20 21 22 23 24 DOOD OOPOODOOOAODOOQOOOOOQOOOSO a a ai lal ia a a Ca Lal a a OOO0D90000000 Io Li a a 19 Lai LY 0606 00O 008006 OOOOD9D0900000 6606 6086866 Fig 3 46 Set up Port Policies Parameter description QCL ID QoS Control List QCL 1 24 Port Member Port Member 1 24 Finished The QCL confi
9. Range Any Specific Any It is including all source MAC address Specific It is according to SMAC Value specific the source MAC address DMAC Filter Range Any MC BC UC Specific Any It is including all destination MAC address MC It is including all Multicast MAC address BC It is including all Broadcast MAC address UC It is including all Unicast MAC address Specific It is according to DMAC Value specific the destination MAC address MAC Parameters When Frame Type ARP SMAC Filter Range Any Specific Any It is including all source MAC address Specific It is according to SMAC Value specific the source MAC address DMAC Filter Range Any MC BC UC Any It is including all destination MAC address MC It is including all Multicast MAC address BC It is including all Broadcast MAC address UC It is including all Unicast MAC address MAC Parameters When Frame Type IPv4 DMAC Filter Range Any MC BC UC Any It is including all destination MAC address MC It is including all Multicast MAC address BC It is including all Broadcast MAC address UC It is including all Unicast MAC address Ether Type Parameters When Frame Type Ethernet Type EtherType Filter 126 Range Any Specific Any It is including all Ethernet frame type Specific It is according to specific Ethernet Type Value Ethernet Type Value The Ethernet Type Range 0x600 0xFFFF ARP Parameters When Frame Type
10. Restoring Restore User Configuration Successfully Press any key to reboot system save start Syntax save start Description To save the current configuration as the start one When you enter this command the CLI would save your current configuration into the non volatile FLASH If you want the configuration still works after rebooting save the configuration using the command save stat Argument None Possible value None Example SGR24i save start Saving start Save Successfully SGR24i 204 save user Syntax save user Description To save the current configuration as the user defined configuration When you enter this command the CLI would save your current configuration into the non volatile FLASH as user defined configuration Argument None Possible value None Example SGR24i save user Saving user Save Successfully SGR24i 205 4 2 2 Local Commands of CLI 802 1X set max request Syntax set max request lt port range gt lt times gt Description The maximum number of times that the state machine will retransmit an EAP Request packet to the Supplicant before it times out the authentication session Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt times gt max times range 1 10 Possible value lt port range gt 1 to 24 lt times gt 1 10 default is 2 Example SGR24i 802 1X set max request 2 2 set mode
11. SMTP TELNET TFTP Instant Messaging Google Talk MSN Messenger Yahoo Messenger User Definition Ethernet Type UDP Port TCP Port Others TCP Port ICMP Multicast IP Stream NetBIOS Ping Request Ping Reply SNMP SNMP Traps Ingress Port Any Policy1 8 Port1 24 Action Permit Deny 140 Rate Limiter ID Disabled 1 16 Welcome to the ACL Configuration Wizard Please select an action Set up Policy Rules Set up the default policy rules for Client ports Server ports Network ports and Guest ports Set up Port Policies Group ports into several types according to different ACL policies Set up Typical Network Application Rules Set up the specific ACL for different typical network application access control et up Source MAC and Source IP Binding Strictly control the network traffic by only allowing incoming frames that match the source MAC and source IP on specific ports To continue click Next Fig 3 139 Set up Source MAC and Source IP Binding Set up Source MAC and Source IP Binding Strictly control the network traffic by only allowing incoming frames that mate the source MAC and source IP on specific port Binding Port Enabled Source MAC Address Source IP Address 00 00 00 00 00 10 192 168 1 1 1 2 J 4 5 6 T 8 9 k ERataGpatsasSs Fig 3 140 Set up Source MAC and Source IP Binding 141 Finished The ACL con
12. STP Configuration Spanning Tree Protocol Disable v Bridge Priority 0 61440 Hello Time 1 10 sec Max Age 6 40 sec Forward Delay 4 30 sec Force Version Note 2 Forward Delay 1 gt Max Age Max Age gt 2 Hello Time 1 Note You will lose connection with this device for a while if you enable STP Fig 3 152 166 3 12 3 STP Port Configuration Function name STP Port Setting Function description In the STP Port Setting one item selection and five parameters settings are offered for user s setup User can disable and enable each port by selecting each Port Status item User also can set Path Cost and Priority of each port by filling in the desired value and set Admin Edge Port and Admin Point To Point by selecting the desired item Parameter description Port Status It displays the current state of a port We cannot manually set it because it displays the status only There are three possible states according to 802 1w specification DISCARDING state indicates that this port can neither forward packets nor contribute learning knowledge Notice Three other states Disable state BLOCKING state and LISTENING state defined in the 802 1d_ specification are now all represented as DISCARDING state LEARNING state indicates this port can now contribute its learning knowledge but cannot forward packets still FORWARDING state indicates th
13. The controlled port is set to be in authorized state or unauthorized state depends on the result of the authentication exchange between the authentication server and the supplicant 152 Default Auto reAuthMax 1 10 The number of authentication attempt that is permitted before the port becomes unauthorized Default 2 txPeriod 1 65535 s A time period to transmitted EAPOL PDU between the authenticator and the supplicant Default 30 Quiet Period 0 65535 s A period of time during which we will not attempt to access the supplicant Deafult 60 seconds reAuthEnabled Choose whether regular authentication will take place in this port Default ON reAuthPeriod 1 65535 s Anon zero number seconds between the periodic re authentication of the supplicant Default 3600 max Request 1 10 The maximum of number times that the authenticator will retransmit an EAP Request to the supplicant before it times out the authentication session The valid range 1 10 Default 2 times supp Timeout 1 65535 s A timeout condition in the exchange between the authenticator and the supplicant The valid range 1 65535 Default 30 seconds serverTimeout 1 65535 s A timeout condition in the exchange between the authenticator and the authentication server The valid range 1 65535 Default 30 seconds 153 802 1X Port Configuration Mode Port Control reAuthMax txPeriod quietPeriod reAuthEnabled reAu
14. 6 25 80 2000 ormal ormal Disable 7 25 80 2000 ormal ormal Disable 8 25 80 2000 ormal ormal Disable 23 20 60 1000 ormal ormal Disable 24 20 60 1000 ormal ormal Disable 236 show counter Syntax show counter lt port gt Description To display the counter number of the port Argument lt port gt port number Possible value lt port gt available from 1 to 24 Example SGR24i gvrp show counter 2 GVRP Counter port 2 Counter Name Received Transmitted Total GVRP Packets Invalid GVRP Packets LeaveAll messag JoinEmpty message JoinIn message caveEmpty message Empty message O O O OGG OO show group Syntax show group Description To show the gvrp group Argument None Possible value None Example SGR24i gvrp show group GVRP group information VID Member Port OOO OD 237 hostname hostname Syntax hostname lt name gt Description To set up the hostname of the switch Argument lt name gt hostname max 40 characters Possible value lt name gt hostname max 40 characters Example SGR24i hostname Company Company igmp snooping add allowed group Syntax add allowed group lt ip multicast gt lt vid gt lt port range gt Description To add the entry of allowed IP multicast group Argument lt ip multicast gt the range of IP multicast lt vid gt vlan ID 0 4094 or any 0 value means tag based vlan di
15. ARP ARP RARP Range Any ARP RARP Other Any Including all ARP RARP protocol frame types ARP Including all ARP protocol frame types RARP Including all RARP frame types Other Including other frame types except ARP RARP protocol Request Reply Range Any Request Reply Any Including all ARP RARP Request and Reply Request Including all ARP RARP request frames Reply Including all ARP RARP reply frames Sender IP Filter Range Any Host Network Any Including all sender IP address Host Only one specific sender host IP address Network A specific IP subnet segment under the sender IP mask Sender IP Address Default 192 168 1 1 Sender IP Mask Default 255 255 255 0 Target IP Filter Range Any Host Network Any Including all target IP address Host Only one specific target host IP address Network A specific IP subnet segment under the target IP mask Target IP Address Default 192 168 1 254 Target IP Mask Default 255 255 255 0 ARP SMAC Match Range Any 0 1 Any Both 0 and 1 0 The ingress ARP frames where the source MAC address is not equal SMAC under MAC parameter setting 127 The ingress ARP frames where the source MAC address is equal SMAC address under MAC parameter setting RARP DMAC Match Range Any 0 1 Any Both 0 and 1 0 The ingress RARP frames where the Destination MAC address is not equal DMAC address under MAC parameter setting The ingress RARP frames where the Dest
16. Description To set up the current time via NTP server Argument 274 lt ip gt ntp server ip address or domain name lt timezone gt time zone GMT range 12 to 13 Possible value lt timezone gt 12 11 0 1 13 Example SGR24i time set ntp clock via net 8 Synchronizing 1 Synchronization success show Syntax show Description To show the time configuration including Current Time NTP Server Timezone Daylight Saving Daylight Saving Start and Daylight Saving End Argument None Possible value None Example SGR24i time show Current Time Thu Thu 14 15 04 03 2005 NTP Server 209 6459 27 Timezone GMT 8 00 Day light Saving QO Hours Day light Saving Start Mth 1 Day 1 Hour 0 Day light Saving End Mth 1 Day 1 Hour 0 SGR24i time 275 trunk del trunk Syntax del trunk lt port range gt Description To delete the trunking port Argument lt port range gt port range syntax 1 5 7 available from 1 to 24 Possible value lt port range gt 1 to 24 Example SGR24i trunk del trunk 1 set priority Syntax set priority lt range gt Description To set up the LACP system priority Argument lt range gt available from 1 to 65535 Possible value lt range gt 1 to 65535 default 32768 Example SGR24i trunk set priority 33333 set trunk Syntax set trunk lt port range gt
17. Fig 3 42 84 Parameter description QCL QCL number 1 24 QCE Type Ethernet Type VLAN ID UDP TCP Port DSCP ToS Tag Priority Ethernet Type Value The configurable range is Ox600 OxFFFF Well known protocols already assigned EtherType values The commonly used values in the EtherType field and corresponding protocols are listed below Ethertype Hexadecimal 0x0800 0x0801 0x0802 0x0803 0x0804 0x0805 0x0806 0x0808 0x6559 0x8035 0x8037 0x809B 0x80D5 Ox 80F3 0x8100 0x8137 Ox 814C 0x86DD 0x880B Ox 880C Frame Relay ARP RFC1701 Raw Frame Relay RFC1701 DRARP Dynamic RARP RARP Reverse Address Resolution Protocol Novell Netware IPX EtherTalk AppleTalk over Ethernet IBM SNA Services over Ethernet AARP AppleTalk Address Resolution Protocol IEEE Std 802 1Q Customer VLAN Tag Type IPX Internet Packet Exchange SNMP Simple Network Management Protocol IPv6 Internet Protocol version 6 PPP Point to Point Protocol GSMP General Switch Management a 0x8847 MPLS Multi Protocol Label Switching unicast MPLS Multi Protocol Label Switching multicast PPPoE PPP Over Ethernet Discovery Stage PPPoE PPP Over Ethernet PPP Session Stage 0x88BB LWAPP Light Weight Access Point Protocol 0x88CC LLDP Link Layer Discovery Protocol 0x8848 0x8863 0x8864 0x8E88 EAPOL EAP over LAN 0x9000 Loopback Configuration Test Protoco
18. Function description It is used to set each port s operation mode The switch supports 3 parameters for each port They are state mode and flow control Parameter description Speed Set the speed and duplex of the port In speed if the media is 1Gbps fiber it is always 1000Mbps and the duplex is full only If the media is TP the Soeed Duplex is comprised of the combination of speed mode 10 100 1000Mbps and duplex mode full duplex and half duplex The following table summarized the function the media supports Media type WEN Speed Duplex 1000M TP ON OFF _ 10 100 1000M _ Full for all Half for 10 100 1000M Fiber ON OFF 1000M Full In Auto negotiation mode no default value In Forced mode default value depends on your setting 47 Flow Control There are two modes to choose in flow control including Enable and Disable If flow control is set Enable both parties can send PAUSE frame to the transmitting device s if the receiving port is too busy to handle When it is set Disable there will be no flow control in the port It drops the packet if too much to handle Maximum Frame This module offer 1518 9600 Bytes length to make the long packet Excessive Collision Mode There are two modes to choose when excessive collision happen in half duplex condition as below Discard The Discard mode determines whether the MAC drop frames after an excessive collision has occurred If
19. ICMP Code Value Range 0 255 IP Parameters Frame Type IPv4 and IP Protocol Filter UDP Source Port Filter Range Any Specific Range Any Including all UDP source ports Specific According to following Source Port No setting for ingress classification Range According to following Source Port Range setting for ingress classification Source Port No Range 0 65535 Source Port Range Range 0 65535 Dest Port Filter Range Any Specific Range Any Including all UDP destination ports Specific According to following Dest Port No setting for ingress classification Range According to following Dest Port Range setting for ingress classification Dest Port No Destination Port Number Range 0 65535 Dest Port Range Destination Port Range Range 0 65535 IP Parameters Frame Type IPv4 and IP Protocol Filter TCP Source Port Filter Range Any Specific Range 130 Any Including all TCP source ports Specific According to following Source Port No setting for ingress classification Range According to following Source Port Range setting for ingress classification Source Port No Range 0 65535 Source Port Range Range 0 65535 Dest Port Filter Range Any Specific Range Any Including all TCP destination ports Specific According to following Dest Port No setting for ingress classification Range According to following Dest Port Range setting for ingress clas
20. Proper configuration of MSTP in an 802 1Q VLAN environment can ensure a loop free data path for a group of vlans within an MSTI Redundant path and load balancing in vlan environment is also achieved via this feature A spanning tree instance called CIST Common and Internal Spanning Tree always exists Up to 64 more spanning tree instances MSTIs can be provisioned 3 13 1 Status Function name MSTP State Function description To enable or disable MSTP And to select a version of Spanning Tree protocol which MSTP should operate on Parameter description Multiple Spanning Tree Protocol Disabled Enabled Force Version STP RSTP MSTP MSTP State Multiple Spanning Tree 1 MsTP v Fig 3 154 170 3 13 2 Region Config Function name MSTP Region Config Function description To configure the basic identification of a MSTP bridge Bridges participating in a common MST region must have the same Region Name and Revision Level Parameter description Region Name 0 32 characters A variable length text string encoded within a fixed field of 32 octets conforming to RFC 2271 s definition of SnmpAdminString Revision Level 0 65535 MSTP Region Config Region Name 0 32 characters mstpRegion1 Revision Level 0 65535 0 Fig 3 155 171 3 13 3 Instance View Fig 3 156 Function name MSTP Instance Config Function description Providing an MST instance t
21. The serial number is assigned by the manufacturer 32 Host IP address The IP address of the switch Host MAC address It is the Ethernet MAC address of the management agent in this switch Device Port Show all types and numbers of the port in the switch RAM size The size of the DRAM in this switch Flash size The size of the flash memory in this switch System Information CCT en SGR24i Current Time Sat Mar 09 21 02 00 2002 IOS Yersion Firmware Version CeCe aoe 1 2 1 0 Serial Number 123456789 TES tt 192 168 3 33 CESS Er 00 0 1 c1 00 00 00 Device Port 24 RAM Size 512 GEE a 120 Fig 3 4 33 3 1 2 Account Configuration In this function only administrator can create modify or delete the username and password Administrator can modify other guest identities password without confirming the password but it is necessary to modify the administrator equivalent identity Guest equivalent identity can modify his password only Please note that you must confirm administrator guest identity in the field of Authorization in advance before configuring the username and password Only one administrator is allowed to exist and unable to be deleted In addition up to 4 guest accounts can be created The default setting for user account is Username admin Password admin Account Configuration admin Admin guest Guest os ED oo Fig 3 5 34 3 1 3 Time Configuration The switch
22. Tx FIFO Drops Number of frames dropped due to the lack of transmitting buffer Auto refresh The detail counts will be refreshed automatically on the UI screen Refresh The detail counts will be refreshed manually when user use mouse to click on Refresh button Clear 57 The detail counts will be reset to zero when user use mouse to click on Clear button 58 3 3 VLAN The switch supports Tag based VLAN 802 1Q and Port based VLAN Support 4094 active VLANs and VLAN ID 1 4094 VLAN configuration is used to partition your LAN into small ones as your demand Properly configuring it you can gain not only improving security and increasing performance but greatly reducing VLAN management 3 3 1 VLAN Mode Function name VLAN Mode Setting Function description The VLAN Mode Selection function includes five modes Port based Tag based Metro Mode Double tag and Disable you can choose one of them by pulling down list and selecting an item Then click lt Apply gt button the settings will take effect immediately Parameter description VLAN Mode Port based Port based VLAN is defined by port Any packet coming in or outgoing from any one port of a port based VLAN will be accepted No filtering criterion applies in port based VLAN The only criterion is the physical port you connect to For example for a port based VLAN named PVLAN 1 contains port members Port 1 amp 2 amp 3 amp 4 If you are on the port
23. lt mac gt mac address format 00 02 03 04 05 06 Possible value lt mac gt mac address Example SGR24i mac table alias del 00 44 33 44 55 44 set Syntax set lt mac gt lt alias gt Description To set up the mac alias entry Argument lt mac gt mac address format 00 02 03 04 05 06 lt alias gt mac alias name max 15 characters Possible value None Example SGR24i mac table alias set 00 44 33 44 55 44 www show Syntax show Description To display the mac alias entry Argument None Possible value None Example SGR24i mac table alias show MAC Alias List MAC Address Alias 1 00 02 03 04 05 06 aaa 2 00 33 03 04 05 06 ccc 3 00 44 33 44 55 44 www lt lt information gt gt 244 search Syntax search lt port gt lt mac gt lt vid gt Description To look for the relative mac information in mac table Argument lt port gt set up the range of the ports to search for syntax 1 5 7 available form 1 to 24 lt mac gt mac address format 01 02 03 04 05 06 can be used lt vid gt vlan id from 1 to 4094 as don t care 0 as untagged Possible value lt port gt 1 to 24 lt vid gt 0 1 4094 Example SGR24i mac table information search 1 24 MAC Table List Alias MAC Address Port VID State 00 40 c7 88 00 06 1 0 Dynamic show Syntax show Description To display all mac table information Argumen
24. lt method gt lt group gt lt active LACP gt Description To set up the status of trunk including the group number and mode of the trunk as well as LACP mode Argument lt port range gt port range syntax 1 5 7 available from 1 to 24 lt method gt static adopt the static link aggregation lacp adopt the dynamic link aggregation link aggregation control protocol lt group gt 1 8 lt active LACP gt active set the LACP to active mode passive set the LACP to passive mode Possible value lt port range gt 1 to 24 lt method gt static lacp lt group gt 1 8 lt active LACP gt active passive Example SGR24i trunk set trunk 1 4 lacp 1 active 276 show aggir view Syntax show aggtr view Description To display the aggregator list Argument None Possible value None Example SGR24i trunk show aggtr view Aggregator 1 Method None Member Ports 1 Ready Ports 1 Aggregator 2 Method LACP Member Ports 2 Ready Ports show lacp detail Syntax show lacp detail lt aggtr gt Description To display the detailed information of the LACP trunk group Argument lt aggtr gt aggregator available from 1 to 24 Possible value lt aggtr gt 1 to 24 Example SGR24i trunk show lacp detail 2 Aggregator 2 Information Actor Partner System Priority MAC Address System Priority MAC Address 32768 00 40 c7 e8 00 02 32768 00 00 00 00 00 00 Port Key Trunk Stat
25. port Ready Ports Show only the ready member ports within an aggregator port Aggregator View Agaregator Method Member Ports Ready Ports 1 None 1 None None None None None None None won onunk WN None en m None N None w None None iy on None t None Eee es Sa Bae as ees BE None Fig 3 149 161 3 11 3 ACP System Priority Function name LACP System Priority Function description It is used to set the priority part of the LACP system ID LACP will only aggregate together the ports whose peer link partners are all on a single system Each system supports LACP will be assigned a globally unique System Identifier for this purpose A system ID is a 64 bit field comprising a 48 bit MAC Address and 16 bit priority value The System Priority can be set by the user Its range is from 1 to 65535 Default 32768 Parameter description System Priority Show the System Priority part of a system ID 1 65535 LACP System Priority System Priority 32768 1765535 Fig 3 150 162 3 12 STP Configuration The Spanning Tree Protocol STP is a standardized method IEEE 802 1D for avoiding loops in switched networks When STP is enabled ensure that only one path is active between any two nodes on the network at a time User can enable Spanning Tree Protocol on switch s web management and then set up other advanced items We recommend that you ena
26. system log upload and configuration file import export e Supports remote boot the device through user interface and SNMP e Supports NTP network time synchronization and daylight saving Supports 120 event log records in the main memory and display on the local console 1 4 Full View of SGR24i Fig 1 1 Full View of SGR24i 1 4 1 User Interfaces on the Front Panel Button LEDs and Plugs There are 24 TP Gigabit Ethernet ports and 2 SFP fiber ports for optional removable modules on the front panel of the switch LED display area locating on the left side of the panel contains a Power LED which indicates the power status and 24 ports working status of the switch One RS 232 DB 9 interface is offered for configuration or management Gigabit Ethernet Port SFP Fiber Port RS 232 DB 9 Connector RESET Button RESET button is used Power Indication LED to reset the Fiber Port Status Indication LEDs management system Fig 1 2 Front View of SGR24i LED Indicators LED Color Function System LED POWER Green Lit when 5V DC power is on and good 10 100 1000Ethernet TP Port 1 to 24 LED Lit when connection with remote device is good LINK ACT Green Blinks when any traffic is present Off when cable connection is not good Lit green when 1000Mbps speed is active Lit ember when 100Mbps speed is active Off when 10Mbps speed is active 1000SX LX Gigabit Fiber Port 21 24 LED Lit when connect
27. 0 0 255 255 255 255 Incoming Port The switch supports two kinds of options for managed valid Port Range including Any and Custom Default is Any You can select the ports that you would like them to be worked and restricted in the management security configuration if Custom had been chosen Access Type The switch supports two kinds of options for managed valid Access Type including Any and Custom Default is Any Http Telnet and SNMP are three ways for the access and managing the switch in case that Custom had been chosen Action The switch supports two kinds of options for managed valid Action Type including Deny and Accept Default is Deny When you choose Deny action you will be restricted and refused to manage the switch due to the Access Type you choose However while you select Accept action you will have the authority to manage the switch 44 3 1 7 System Log The System Log provides information about system logs including information when the device was booted how the ports are operating when users logged in when sessions timed out as well as other system information System Log SS Fig 3 11 Function name System Log Function description The Trap Log Data is displaying the log items including all SNMP Private Trap events SNMP Public traps and user logs occurred in the system In the report tabl
28. 19 20 21 22 23 24 1 Disable Add new VLAN J Delete Fig 3 18 Add new VLAN 60 Please click on lt Add new VLAN gt to create a new Tag based VLAN Input the VLAN name as well as VID configure the SYM VLAN function and choose the member by ticking the check box beside the port No then press the lt Apply gt button to have the setting taken effect Create VLAN Group LAN ID 100 STE NET LAN 1 EA Cenable ETN wal Aa ea aa aa al a 8 0 9010011 012 0 13 0 14 0 15 0 16 0 17 0 18 0 19 0 20 0 21 0 22 0 23 0 24 00 Fig 3 19 Delete Group Just press the lt Delete gt button to remove the selected group entry from the Tag based group table Tag Based VLAN Memberships Configuration VLAN Name Port Members Delete VLAN ID IGMP Proxy Z 2 3 4 5 6 2 8 S 20 Pa 42 ra 14 S 16 a7 Ve 19 20 21 22 23 24 Default lL oeue ie 2 3 4 6 amp F 8 9 10 14 12 139 14 18 16 17 16 19 2 21 2 29 24 VLAN 1 Add new VLAN Delete Fig 3 20 61 3 3 3 Port based Group Function name Port based Group Configuration Function description It shows the information of the existed Port based VLAN Groups You can easily create edit and delete a Port based VLAN group by pressing lt Add gt lt Edit gt and lt Delete gt function buttons User can add a new VLAN group by inputting a new VLAN name Parameter description VLAN Name The name defined by ad
29. Default 255 255 255 0 Default gateway Set an IP address for a gateway to handle those packets that do not meet the routing rules predefined in the device If a packet does not meet the criteria for other pre defined path it must be forwarded to a default router on a default path This means any packet with undefined IP address in the routing table will be sent to this device unconditionally Default 192 168 1 254 39 DNS It is Domain Name Server used to serve the translation between IP address and name address The switch supports DNS client function to re route the mnemonic name address to DNS server to get its associated IP address for accessing Internet User can specify a DNS IP address for the switch With this the switch can translate a mnemonic name address into an IP address There are two ways to specify the IP address of DNS One is fixed mode which manually specifies its IP address the other is dynamic mode which is assigned by DHCP server while DHCP is enabled DNS can help you easily remember the mnemonic address name with the meaningful words in it Default is no assignment of DNS address Default 0 0 0 0 40 3 1 5 Loop Detection The loop detection is used to detect the presence of traffic When switch receives packet s looping detection frame MAC address the same as oneself from port show Loop detection happens The port will be locked when it received the looping detection frames If you want to re
30. E R E E E E E E i ES LS ES S Ls 20 60 1000 Normal Normal Fig 3 31 Disabled v E 75 3 5 2 Counter Function name GVRP Counter Function description All GVRP counters are mainly divided into Received and Transmitted two categories to let you monitor the GVRP actions Actually they are GARP packets GVRP Counter port1 v Total G RP Packets 0 Invalid GYRP Packets Fig 3 32 Parameter description Received Total GVRP Packets Total GVRP BPDU is received by the GVRP application Invalid GVRP Packets Number of invalid GARP BPDU is received by the GARP application LeaveAll Message Packets Number of GARP BPDU with Leave All message is received by the GARP application JoinEmpty Message Packets Number of GARP BPDU with Join Empty message is received by the GARP application JoinIn Message Packets Number of GARP BPDU with Join In message is received by the GARP application LeaveEmpty Message Packets Number of GARP BPDU with Leave Empty message is received by the GARP application Empty Message Packets 76 Number of GARP BPDU with Empty message is received by the GARP application Transmitted Total GVRP Packets Total GARP BPDU is transmitted by the GVRP application Invalid GVRP Packets Number of invalid GARP BPDU is transmitted by the GVRP application LeaveAll Message Packets Number of GARP BPDU with Leave All message is tra
31. IP fragment case Yes The ingress frame is fragmented packet No The ingress frames is not fragmented packet IP Option A list of optional specifications for security restrictions route recording and source routing Not every datagram specifies an options field Range Any Yes No Any Including all IP option case Yes The ingress frame is specified IP options No The ingress frame is not specified IP options SIP Filter SIP Source IP Address Range Any Host Network Any Including all source IP address Host Only one specific source host IP address Network A specific IP subnet segment under the source IP mask SIP Address Default 192 168 1 1 SIP Mask Default 255 255 255 0 DIP Filter DIP Destination IP Address Range Any Host Network Any Including all destination IP address Host Only one specific destination host IP address Network A specific IP subnet segment under the destination IP mask DIP Address Default 192 168 1 254 DIP Mask Default 255 255 255 0 IP Parameters Frame Type IPv4 and IP Protocol Filter ICMP ICMP Type Filter Range Any Specific 129 Any Including all types of ICMP type values Specific According to following ICMP type value setting for ingress classification ICMP Type Value Range 0 255 ICMP Code Filter Range Any Specific Any Including all of ICMP code values Specific According to following ICMP code value setting for ingress classification
32. Membership Query message from a router IP Address Show all multicast groups IP addresses that are registered on this device VLAN ID Show VLAN ID for each multicast group Member Port Show member ports that join each multicast group Member port may be only or more than one 183 3 15 2 Group Membership Function name Group Membership Function description To show the IGMP group members information the you can edit the parameters for IGMP groups and members in the web user interface IGMP Group Membership Fig 3 164 Parameter description IP Range VID Port Add Edit The switch supports two kinds of options for managed valid IP range including Any and Custom Default is Any In case that Custom had been chosen you can assigned effective IP range The valid range is 224 0 0 0 239 255 255 255 The switch supports two kinds of options for managed valid VLAN VID including Any and Custom Default is Any When you choose Custom you can fill in VID number The valid VID range is 1 4094 The switch supports two kinds of options for managed valid port range including Any and Custom Default is Any You can select the ports that you would like them to be worked and restricted in the allowed group configuration if Custom had been chosen A new entry of allowed group configuration can be created after the parameters as mentione
33. PAE E E AEAEE EE EAEE EEEE A 195 3420 1 Reset Devica anere e woe RE tree A N A E ee es 195 3 20 2 SoftWare Upload ira aa ig ae ota A a E A via 195 F 2V LOGOUT aane a na a a a a a a O a aa aa 196 OPERATION OF CLI MANAGEMENT eessesesssecsscseessoceesseceessecssooeessooeeseceecsecsssoeesseceessee 197 4 1 CEIMANAGEMEN T aaan na naa a a a a a a a a a Aaka 197 Aa Ve LOGI srna riara ne E A AE a E ye Ea a E AE 197 4 2 GCGOMMANDS OF Ghlearm a a a a aa 199 4 2 1 Global Commands of CLl ssusssssrsrssssrrnrererrrrrrrnrnrrrrrerurrrrinnrrnrrirururrrrrn 200 4 222 Local Commands OF CLM erpen a a ees i aa a pa a Pend 206 MAINTENANCE iiesis cccscnssssssassssssccstesessscscoacedsensavsscssscssevecsosdevedscosbsessestencsoevscdassou s oesdenscsesosseassseses 287 5 1 RESOLVING NO LINK CONDITION oo cccccccccceeeeececcseseceseeecececeeeeuseaueesucsesseseaueeseeeseeeeananeaeees 287 Be OCA ete ct i a a te eee Mee ta roe atthe that ee oot a 287 APPENDIX A TECHNICAL SPECIFICATIONS cccccccsssssssssccsssssssecccsssssssseccccssssssssceccccsseees 288 APPENDIX B NULL MODEM CABLE SPECIFICATIONS cssscsssscsssssssececcccccssssscceceesees 292 vi Caution Circuit devices are sensitive to static electricity which can damage their delicate electronics Dry weather conditions or walking across a carpeted floor may cause you to acquire a static electrical charge To protect your device always e Touch the metal chassis of your
34. Server MSN Messenger Phone Yahoo Messenger Phone Napster Real Audio Games Blizzard Battlenet Diablo2 and StarCraft Fighter Ace Il Quake2 Quake3 MSN Game Zone User Definition Ethernet Type VLAN ID UDP TCP Port DSCP Ethernet Type Value Type Range 0x600 0xFFFF VLAN ID VLAN ID Range 1 4094 UDP TOP Port Two Mode Range Specific UDP TCP Port Range Port Range 0 65535 UDP TCP Port No Port Range 0 65535 DSCP Value DSCP Value Range 0 63 94 Set up Typical Network Application Rules According to your selection on the previous page this wizard will create specific QCEs QoS Control Entries automatically First select the QCL ID for these QCEs and then select the traffic class Different parameter options are displayed depending on your selection QcL ID 1 M Traffic Class Low Fig 3 52 Set up Typical Network Application Rules Parameter description QCL ID QCL ID Range 1 24 Traffic Class There are four classes Low Normal Medium High Finished The QCL configuration wizard is finished and the new configuration is ready for use Click Finish to get more information Click Wizard Again to start the wizard again Fig 3 53 Set up Typical Network Application Rules 95 QoS Control List Configuration QCL 1v QCE Type Type Value Traffic Class UDP TCP Part 6970 QuickTime 4 Server Low UDP TCP Part 6901 MSN Messenger Phone L
35. Syntax disable drop untag lt range gt Description Don t drop the untagged frames Argument lt range gt which port s you want to set syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 to 24 Example SGR24i vlan disable drop untag 5 10 279 disable sym vlan Syntax disable sym vlan lt range gt Description To drop frames from the non member port Argument lt range gt which port s you want to set syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 to 24 Example SGR24i vlan disable sym vlan 5 10 enable drop untag Syntax enable drop untag lt range gt Description To drop the untagged frames Argument lt range gt which port s you want to set syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 to 24 Example SGR24i vlan enable drop untag 5 10 enable sym vlan Syntax enable sym vlan lt range gt Description To drop frames from the non member port Argument lt range gt which port s you want to set syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 to 24 Example SGR24i vlan enable sym vlan 5 10 280 set mode Syntax set mode lt disable port tag metro double tag gt up link Description To switch VLAN mode including disable port based tag based metro and double tag modes Argument lt disable gt vlan disable lt tag gt set tag based vlan
36. Syntax set mode lt port range gt lt mode gt Description To set up the 802 1X authentication mode of each port Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt mode gt set up 802 1X mode O disable the 802 1X function 1 set 802 1 X to Multi host mode Possible value lt port range gt 1 to 24 lt mode gt 0 or 1 Example SGR24i 802 1X set mode 2 1 SGR24i 802 1X 206 set port control Syntax set port control lt port range gt lt authorized gt Description To set up 802 1X status of each port Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt authorized gt Set up the status of each port 0 ForceUnauthorized 1 ForceAuthorized 2 Auto Possible value lt port range gt 1 to 24 lt authorized gt 0 1 or 2 Example SGR24i 802 1X set port control 2 2 set quiet period Syntax set quiet period lt port range gt lt sec gt Description A timer used by the Authenticator state machine to define periods of time during when it will not attempt to acquire a Supplicant Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt sec gt timer range 0 65535 Possible value lt port range gt 1 to 24 lt sec gt 0 65535 default is 60 Example SGR24i 802 1X set quiet period 2 30 set reAuthEnabled Syntax set reAuthEnabled lt port range gt lt ebl gt Description A constant that define whether regular reauthentica
37. Zone o User Definition Ethernet Type UDP TCP Part Fig 3 49 Set up Typical Network Application Rules Set up Typical Network Application Rules Set up the specific QCL for different typical network application quality control by selecting the network application type for your rule o Audio and Video C QuickTime 4 Server MSN Messenger Phone Yahoo Messenger Phone Napster Real Audio o Games M Blizzard Battlenet Diablo2 and StarCraft Fighter Ace II o User Definition C Ethernet Type UDP TCP Port Fig 3 50 Set up Typical Network Application Rules 93 Set up Typical Network Application Rules Set up the specific QCL for different typical network application quality control by selecting the network application type for your rule o Audio and Video QuickTime 4 Server MSN Messenger Phone Yahoo Messenger Phone Napster Real Audio o Games Blizzard Battlenet Diablo2 and StarCraft Fighter Ace II Quake2 Quake3 MSN Game Zone o User Definition V Ethernet Type Ox fff VLAN ID 4095 DSCP 63 Fig 3 51 Set up Typical Network Application Rules Parameter description Audio and Video QuickTime 4
38. a a aa a a aa E eae A T A 170 313 2 Region Config ooi rerng ten e TEA E ai een E E ERE E REA 171 3 13 3 instance VIEW iseci a A aE Youn EAE 172 3 14 MIRROR daiat a at a a a a a aa re N tua 180 3 15 IGMP SNOOP NG niinn a aa leaden ably Oued anii 182 Ba TDL PrOXY eniai a a E a a AEE EN 182 3 15 2 Group Memb rshipinces irc enm e y E a ieee E E 184 3 16 ALARM CONFIGURATION a e a a TE a ea ea ara e ae a anai dai aaaea 185 3A LO EVENTS naea n aa an A NaN e a e E as OAA N A aa a a ain Taan oA a ISA 186 321622 EMail e adie S44 Sok San a bi dale a a bid outa boats e aa 187 El 7 CONBIGURATION cisvinss Gonves oiccucviraduavsdaaelsvaved Giavesavecevavaudcadl sacctvvaveacepuddvanduauatanelurartadentey 188 3 17 12 Factory Defaults sic cick a eet oee awed A Seed N A E lend nap cena 189 3 17 2 Save Start rasara arae tate e ee tdaceei a aetmie aad MOTs TORE RON ESS ARTE TOTES 189 BEd y Ao SAVES USO AE A E ota had tiated Pattee ad sn A E EEA AS 189 BaD 724 MRESCORS IU SEM Fates s E EEE TE AE afeataes AE 190 3 18 CONFIG FILE ngne vadveddadstu Peed iatediavecudats cisvcdvdda a dias lage doth 191 93219 DIAGNOSTICS iiin i cat ei soctnyi nantes a a diteds wanes Maseectee auton avads dyes 192 B 1921 DidlissscevastiszeseravegaydeatanesestacyeuetShacneresbancurstharyeesrhaats chose chines seneeeesas 192 3 192 2 A NO EE ict vantanis beets vate etwas vata E eit weet tian peta 193 321 922 VEriPAY OEE EPA EA E ceca oteteak each S S abiedaatuie SE 194 3220 VAINEN TANO E
39. bridge CIST EXTERNAL ROOT PATH COST Root path cost value from the point of view of the bridge s MST region CIST ROOT PORT ID The port ID of the bridge s root port In MSTP peer port of a root port may reside in defferent MST region or in the same MST region The first case indicates that the root port s owner is the CIST regional root bridge CIST REGIONAL ROOT PRIORITY Spanning tree priority value of the CIST regional root bridge Note that CIST Regional Root bridge is different from CIST Root bridge One exception is that when a bridge belonging to an MST region happens to be the root bridge of the CST Common Spanning Tree An MST Region in the CST can be regarded as a common RSTP bridge The IST Internal Spanning Tree and MSTIs are transparent to bridges outside this region CIST REGIONAL ROOT MAC Mac Address of the CIST regional root bridge CIST INTERNAL ROOT PATH COST Root path cost value from the point of view of the bridges inside the IST CIST CURRENT MAX AGE Max Age of the CIST Root bridge CIST CURRENT FORWARD DELAY Forward Delay of the CIST Root bridge 177 TIME SINCE LAST TOPOLOGY CHANGE SECs Time Since Last Topology Change is the elapsed time in unit of seconds fora bunch of Topology Change and or Topology Change Notification receiving to occur When new series of Topology Changes occur again this counter will be reset to 0 TOPOLOGY CHANGE COUNT SECs The per spanning tree instanc
40. commands history Show a list of previously run commands logout Logout the system save start Save as start config save user Save as user config restore default Restore default config restore user Restore user config 201 history Syntax history Description To show a list of previous commands that you had ever run When you enter this command the CLI would show a list of commands which you had typed before The CLI supports up to 256 records If no argument is typed the CLI would list total records up to 256 If optional argument is given the CLI would only show the last numbers of records given by the argument Argument show last number of history records optional Possible value 1 2 3 256 Example SGR24i ip history Command history 0 trunk 1 exit 2 SGR24i trunk 3 SGR24i trunk exit 4 SGR24i hind 2 6 trunk 7 exit 8 alarm 9 events 10 end 11 ip 12 help 13 ip 14 history SGR24i ip history 3 Command history 13 IP 14 history 15 history 3 SGR24i ip 202 logout Syntax logout Description When you enter this command via Telnet connection you would logout the system and disconnect If you connect the system through direct serial port with RS 232 cable you would logout the system and be back to the initial login prompt when you run this command Argument None Possible value None Example SGR24i logout restore def
41. connector on the Management board Attach the other end of the DB 9 cable to an ASCII terminal emulator or PC Com 1 2 port For example PC runs Microsoft Windows HyperTerminal utility At Com Port Properties Menu configure the parameters as below see the next section Baud rate 115200 Stop bits 1 Data bits 8 Parity N Flow control none 4 1 1 Login The command line interface CLI is a text based interface User can access the CLI through either a direct serial connection to the device or a Telnet session The default values of the managed switch are listed below Username admin Password admin After you login successfully the prompt will be shown as if you are the first login person and your authorization is administrator otherwise it may show See the following two figures The former means you behave as an administrator and have the access right of the system As to the latter it means you behave as a guest and are only allowed to view the system without the permission to do any setting for this switch 197 Managed Switch Login admin Passuord x nx SGR24i 8 Fig 4 1 Managed Switch Login admin Passuord x xx SGR24i Fig 4 2 198 4 2 Commands of CLI To see the commands of the mode please input after the prompt then all commands will be listed in the screen All commands can be divided into two categories including global commands and local
42. for ingress classification you can assign a policy for each port the policy number is 1 8 however each policy can be applied to any port This makes it very easy to determine what type of ACL policy you will be working with 3 8 1 Ports Function name ACL Port Configuration Function description The switch ACL function support up to 128 Access Control Entries ACEs using the shared 128 ACEs for ingress classification You can create an ACE and assign this ACE for each port with lt Any gt or assign this ACE for a policy or assign this ACE for a port There are 8 policies each port can select one of policy then decides which of the following actions would take according to the packet s IPv4 EtherType ARP Protocol MAC Parameters and VLAN parameters Packet Deny or Permit Rate Limiter Unit pps Port Copy 1 24 Parameter description Port Port number 1 24 Policy ID Policy ID range 1 8 Action Permit or Deny forwarding the met ACL packets Rate Limiter ID Disabled Disable Rate Limitation Rate Limiter ID Range 1 16 To select one of rate limiter ID for this port it will limit met ACL packets by rate limiter ID configuration Port Copy Disabled Disable to copy the met ACL packets to specific port Port number 1 24 Copy the met ACL packets to the selected port Counter The counter will increase from initial value 0 when this port received one of 103 the met ACL packet the counter value will in
43. information Connector Type SPRY LC Fiber Type Multi mode MM Tx Central Wavelength 850 Baud Rate IG Vendor OUI 00 40 c7 Vendor Name APAC Opto Vendor PN KM28 C3S TC N Vendor Rev 0000 Vendor SN 5425010708 Date Code 050530 Temperature none Vcc none Monl Bias mA none Mon2 TX PWR none Mon3 RX PWR none show simple counter Syntax show simple counter Description To display the summary counting of each port s traffic Argument None Possible value None Example SGR24i port show simple counter show status Syntax show status Description To display the port s current status Argument None Possible value None Example SGR24i port show status 259 qos set advance layer4 Syntax set advance layer4 lt port range gt lt gt lt tcp udp port gt lt default gt lt match gt Description To set class of ports on advanced mode of Layer 4 qos Argument lt port range gt port range syntax 1 5 7 available from 1 to 24 lt gt special UDP TCP port selection range 1 10 lt tcp udp port range gt 0 65535 lt default gt default class all other TCP UDP ports 1 high 0 low lt match gt special TCP UDP class 1 high 0 low Possible value lt port range gt 1 to 24 lt gt 1 10 lt tcp udp port range gt 0 65535 lt default gt 1 or 0 lt match gt 1 or 0 Example SGR24i qos set advance layer4 5 2 8
44. login e Maximal packet length can be up to 9600 bytes for jumbo frame application e Supports DHCP Broadcasting Suppression to avoid network suspended or crashed e Supports to send the trap event while monitored events happened e Supports default configuration which can be restored to overwrite the current configuration which is working on via web browser and CLI e Supports on line plug unplug SFP modules e Supports Quality of Service QoS for real time applications based on the information taken from Layer 2 to Layer 4 such as VoIP e Built in web based management and CLI management providing a more convenient UI for the user e Supports port mirror function with ingress egress traffic e Supports rapid spanning tree 802 1w RSTP Supports multiple spanning tree 802 1s MSTP Supports 802 1X port security on a VLAN e Supports IP MAC Port Binding for LAN security e Supports user management and only first login administrator can configure the device The rest of users can only view the switch e SNMP access can be disabled and prevent from illegal SNMP access e Supports Ingress Non unicast and Egress Bandwidth rating management with a resolution of 1Mbps e The trap event and alarm message can be transferred via e mail e Supports diagnostics to let administrator knowing the hardware status e Supports loop detection to protect the switch crash when the networking has looping issue e HTTP and TFTP for firmware upgrade
45. mask SIP Address Default 192 168 1 1 SIP Mask Default 255 255 255 0 DIP Filter DIP Destination IP Address Range Any Host Network Any Including all destination IP address Host Only one specific destination host IP address Network A specific IP subnet segment under the destination IP mask DIP Address Default 192 168 1 254 DIP Mask Default 255 255 255 0 VLAN Parameters VLAN ID Filter Range Any Specific Any Including all VLAN IDs 133 Specific According to following VLAN ID and Tag Priority setting for ingress classification VLAN ID Range 1 4094 Tag Priority Range Any 0 7 Any Including all Tag Priority values 0 7 The Tag Priority Value is one of number 0 7 Action Parameters When the ingress frame meet above ACL ingress classification rule you can do the following actions Action Range Permit Deny Permit Permit the met ACL ingress classification rule packets forwarding to other ports on the switch Deny Discard the met ACL ingress classification rule packets Rate Limiter Range Disabled 1 16 Disable Disable Rate Limiter function 1 16 Apply the Rate Limiter Number setting for met ACL ingress rule packtes Port Copy Range Disabled 1 24 Disable Disable the Port Copy function 1 24 The packets will be copied to the selected port when they met ACL ingress rule 3 8 4 Wizard Function name Wizard Function description The wizard function
46. of the ports Argument lt range gt syntax 1 5 7 available from 1 to 24 lt data_rate gt 0 1000 Possible value lt range gt 1 to 24 lt data_rate gt 0 1000 Example SGR24i bandwidth enable strom rate 1 16 150 show 224 Syntax show Description To display all current settings of the bandwidth Argument None Possible value None Example SGR24i bandwidth show Ingress Egress Port All State All Rate Storm State Storm Rate All state All Rate 1 Disabled 0 Disabled 0 Disabled 2 Disabled 0 Disabled 0 Disabled 3 Disabled 0 Disabled 0 Disabled 4 Disabled 0 Disabled 0 Disabled 5 Disabled 0 Disabled 0 Disabled 6 Disabled 0 Disabled 0 Disabled 7 Disabled 0 Disabled 0 Disabled 8 Disabled 0 Disabled 0 Disabled 9 Disabled 0 Disabled 0 Disabled 10 Disabled 0 Disabled 0 Disabled 11 Disabled 0 Disabled 0 Disabled 12 Disabled 0 Disabled 0 Disabled 13 Disabled 0 Disabled 0 Disabled 14 Disabled 0 Disabled 0 Disabled RS Disabled 0 Disabled 0 Disabled 16 Disabled 0 Disabled 0 Disabled 17 Disabled 0 Disabled 0 Disabled 18 Disabled 0 Disabled 0 Disabled 19 Disabled 0 Disabled 0 Disabled 20 Disabled 0 Disabled 0 Disabled q to quit 21 Disabled 0 Disabled 0 Disabled 22 Disabled 0 Disabled 0 Disabled 23 Disabled 0 Disabled 0 Disabled 24 Disabled 0 Disabled 0 Disabled 225 DOCOCOCOCOCOCOCOOCOOCOOCOOCOCO0O oO OOOO config file export start Syntax expo
47. or 1 8 or 1 3 5 or any lt type gt lt value gt For example h ttp s nmp t elnet or any lt action gt lt value gt No default and it must be set Example SGR24i management edit 1 SGR24i management edit 1 set name Tom vid 2 ip 192 168 1 30 192 168 1 80 port 1 2 type s action d SGR24i management edit 1 show 3 1 Name Tom VlanID 2 TP 92 31 68 1 30 1923168 1 30 Type SNMP Action Deny Port 1 2 251 show Syntax show Description To show the specific management policy record Argument None Possible value None Example SGR24i management show 1 Name Tom VlanID 2 IP Type SNMP Action Deny Port 252 192 168 1 30 192 168 1 80 Ly 2 a max pkt len set len Syntax set len lt range gt lt length gt Description To set up the maximum length of the packet that each port of the switch can accept Argument lt range gt port range syntax 1 5 7 available from 1 to 24 lt length bytes gt maximum packet length Possible value lt range gt 1 to 24 lt length bytes gt 1518 1532 9216 Example SGR24i max pkt len set len 1 8 9216 show Syntax show Description To show current setting of maximum packet length setting Argument None Possible value None Example SGR24i max pkt len show PORT Max Packet Length 1 1532 2 1532 3 1532 4 1532 5 1532 6 1532 7 1532 8 1532 9 1532 10 1532 11 1532 12 1532 13 1532 14 15
48. other end is connected to a network aware device such as a workstation or a server Repeat the above steps as needed for each RJ 45 port to be connected to a Gigabit 10 100 1000 TP device Now you can start having the switch in operation Power On The switch supports 100 240 VAC 50 60 Hz power supply The power supply will automatically convert the local AC power source to DC power It does not matter whether any connection plugged into the switch or not when power on even modules as well After the power is on all LED indicators will light up immediately and then all off except the power LED still keeps on This represents a reset of the system Firmware Loading After resetting the bootloader will load the firmware into the memory It will take about 30 seconds after that the switch will flash all the LED once and automatically performs self test and is in ready state 2 1 2 Installing Chassis to a 19 Inch Wiring Closet Rail Fig 2 2 Caution Allow a proper spacing and proper air ventilation for the cooling fan at both sides of the chassis Wear a grounding device for electrostatic discharge Screw the mounting accessory to the front side of the switch See Fig 2 2 Place the Chassis into the 19 inch wiring closet rail and locate it at the proper position Then fix the Chassis by screwing it Uy dy 2 1 3 Cabling Requirements To help ensure a successful installation and keep the network performance go
49. ports cannot create bridging loops in the network This will expedite the convergence When the link on the edge port toggles the STP topology keeps unchanged Unlike the designate port or root port though an edge port will transit to a normal spanning tree port immediately if it receives a BPDU Default No Admin Point To Point We say a port is a point to point link from RSTP s view if it is in full duplex mode but is shared link if it is in half duplex mode RSTP fast convergence can only happen on point to point links and on edge ports This can expedite the convergence because this will have the port fast transited to forwarding state There are three parameters Auto True and False used to configure the type of the point to point link If configure this parameter to be Auto it means RSTP will use the duplex mode resulted from the auto negotiation In today s switched networks most links are running in full duplex mode For sure the result may be half duplex in this case the port will not fast transit to Forwarding state If it is set as True the port is treated as point to point link by RSTP and unconditionally transited to Forwarding state If it is set as False fast transition to Forwarding state will not happen on this port Default Auto 168 M Check Migration Check It forces the port sending out an RSTP BPDU instead of a legacy STP BPDU at the next transmission The only benefit of this operation is to make
50. priority must be a multiple of 16 available from 0 to 240 lt edge_port gt Admin Edge Port lt yes no gt lt admin p2p gt Admin point to point lt auto true false gt Possible value lt range gt 1 to 24 lt path cost gt 0 1 200000000 lt priority gt 0 to 240 lt edge_port gt yes no lt admin p2p gt auto true false Example SGR24i stp set port 1 16 0 128 yes auto 267 set version Syntax set version lt stp rstp gt Description To set up the version of STP Argument lt stp rstp gt stp rstp Possible value lt stp rstp gt stp rstp Example SGR24i stp set version rstp show config Syntax show config Description To display the configuration of STP Argument None Possible value None Example SGR24i stp show config STP State Configuration Spanning Tree Protocol Enabled Bridge Priority 0 61440 61440 Hello Time 1 10 sec 32 Max Age 6 40 sec 20 Forward Delay 4 30 sec 15 Force Version RSTP 268 show port Syntax show port Description To display the port information of STP Argument None Possible value None Example SGR24i stp SGR24i stp show port Port Port Status Path Cost Priority Admin Edge Port Admin Point To Point 1 DISCARDING 2000000 128 o Auto 2 DISCARDING 2000000 128 o Auto 3 DISCARDING 2000000 128 Auto 4 DISCARDING 2000000 128 Auto 5 DISCARDING 2000000 128 o Auto 6 DISCARDING 2000000 128 o Au
51. provides manual and automatic ways to set the system time via NTP Manual setting is simple and you just input Year Month Day Hour Minute and Second within the valid value range indicated in each item If you input an invalid value for example 61 in minute the switch will clamp the figure to 59 NTP is a well known protocol used to synchronize the clock of the switch system time over a network NTP an internet draft standard formalized in RFC 1305 has been adopted on the system is version 3 protocol The switch provides four built in NTP server IP addresses resided in the Internet and an user defined NTP server IP address The time zone is Greenwich centered which uses the expression form of GMT xx hours Function name Time Function description Set the system time by manual input or set it by syncing from Time servers The function also supports daylight saving for different area s time adjustment Parameter description Current Time Show the current time of the system Manual This is the function to adjust the time manually Filling the valid figures in the fields of Year Month Day Hour Minute and Second respectively and press lt Apply gt button time is adjusted The valid figures for the parameter Year Month Day Hour Minute and Second are gt 2000 1 12 1 31 0 23 0 59 and 0 59 respectively Input the wrong figure and press lt Apply gt button the device will reject the
52. range of trap syntax 1 5 7 Possible value lt range gt 1 24 Example SGR24i alarm events del trap 1 3 set all Syntax set all lt range gt Description To enable email sms and trap of events Argument lt range gt set the range of events syntax 1 5 7 Possible value lt range gt 1 24 Example SGR24i alarm events set all 1 3 set email Syntax set email lt range gt Description To enable the email of the events Argument lt range gt set the range of email syntax 1 5 7 Possible value lt range gt 1 24 Example SGR24i alarm events set email 1 3 217 set sms Syntax set sms lt range gt Description To enable the sms of the events Argument lt range gt set the range of sms syntax 1 5 7 Possible value lt range gt 1 24 Example SGR24i alarm events set sms 1 3 set trap Syntax set trap lt range gt Description To enable the trap of the events Argument lt range gt set the range of trap syntax 1 5 7 Possible value lt range gt 1 24 Example SGR24i alarm events set trap 1 3 show Syntax show Description To display the configuration of alarm event Argument None Possible value None 218 Example SGR24i alarm events show Events Email SMS Trap Cold Start Warm Start Link Down Link Up Authentication Failure User Login User Logout STP Topology Changed STP Disabled STP Enabled L
53. set a frame is dropped after excessive collisions This is IEEE Std 802 3 half duplex flow control operation Restart The Restart mode determines whether the MAC retransmits frames after an excessive collision has occurred If set a frame is not dropped after excessive collisions but the backoff sequence is restarted This is a violation of IEEE Std 802 3 but is useful in non dropping half duplex flow control operation Description Description of device ports can not include amp 48 3 2 2 Port Status The function Port Status gathers the information of all ports current status and reports it by the order of port number media link status port state Auto Negotiation status speed duplex Rx Pause and Tx Pause An extra media type information for the module ports 21 and 24 is also offered See Fig 3 14 Port Status up 1Gfdx x down Down down Down down Down down Down down Down down Down down Down won Oo amp WN down Down down Down down Down down Down down Down down Down x x x x x x x x x x x x x x KKK KKK KKK KKK KK XK down Down Fig 3 13 Function name Port Status Function Description Report the latest updated status of all ports in this switch When any one of the ports in the switch changes its parameter displayed in the page it will be automatically refreshed the port current status about every 5 seconds Parameter Description Port Display
54. the port quickly get back to act as an RSTP port Click lt M Check gt button to send a RSTP BPDU from the port you specified STP Port Configuration port No Port status Path Cost tatus Configured Path cost Priority Admin Port Type Admin Point To Point FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto FORWARDING 2000000 128 Normal Auto 1 a a 4 i 6 7 8 9 eoeoececoecoeoeceoeoeoeoeoaoooaoeea Fig 3 153 169 3 13 MSTP The implementation of MSTP is according to IEEE 802 1Q 2005 Clause 13 Multiple Spanning Tree Protocol MSTP allows frames assigned to different VLANs to follow separate paths each based on an independent Multiple Spanning Tree Instance MSTI within Multiple Spanning Tree MST Regions composed of LANs and or MST Bridges
55. time adjustment request There is no time zone setting in Manual mode Default Year 2000 Month 1 Day 1 Hour 0 Minute 0 Second 0 35 NTP NTP is Network Time Protocol and is used to sync the network time based Greenwich Mean Time GMT If use the NTP mode and select a built in NTP time server or manually specify an user defined NTP server as well as Time Zone the switch will sync the time in a short after pressing lt Apply gt button Though it synchronizes the time automatically NTP does not update the time periodically without user s processing Time Zone is an offset time off GMT You have to select the time zone first and then perform time sync via NTP because the switch will combine this time zone offset and updated NTP time to come out the local time otherwise you will not able to get the correct time The switch supports configurable time zone from 12 to 13 step 1 hour Default Time zone 8 Hrs Daylight Saving Daylight saving is adopted in some countries If set it will adjust the time lag or in advance in unit of hours according to the starting date and the ending date For example if you set the day light saving to be 1 hour When the time passes over the starting time the system time will be increased one hour after one minute at the time since it passed over And when the time passes over the ending time the system time will be decreased one hour after one minute at the time since it passed ove
56. with the switch or the way of controlling and connecting to the switch via Http Telnet or SNMP Management Policy List Name IP Range Access Type Action Port Members 1 Any No Fig 3 9 Create Management Policy name O O IP Range O Access Type Q Any Any Custom O Custom l i O HTTP C TELNET CO SNMP Incoming Port ction Any O Deny 1 2 3 4 5 6 a 8 9 10 11 12 Accept iai 14 15 16 27 18 1 19 1 20 _ 21 1 22 _ 93 1 24 Fig 3 10 Parameter description Add A new entry of Management Security Configuration can be created after the parameters as mentioned above had been setup and then press lt Add gt button Of course the existed entry also can be modified by pressing this button Delete Remove the existed entry of Management Security Configuration from the management security table Name Aname is composed of any letter A Z a z and digit 0 9 with maximal 8 characters 43 VID The switch supports two kinds of options for managed valid VLAN VID including Any and Custom Default is Any When you choose Custom you can fill in VID number The valid VID range is 1 4094 IP Range The switch supports two kinds of options for managed valid IP Range including Any and Custom Default is Any In case that Custom had been chosen you can assigned effective IP range The valid range is 0 0
57. 0 1 0 set default Syntax set default lt class gt Description To set priority class of the packets that qos won t affect Argument lt class gt class of service setting 1 high 0 low Possible value lt class gt 1 or 0 Example SGR24i gos set default 1 260 set diffserv Syntax set diffserv lt ds range gt lt class gt Description To set class of ports on IP DiffServe qos Argument lt ds range gt dscp field syntax 1 5 7 available from 0 to 63 lt class gt class of service setting 1 high 0 low Possible value lt ds range gt 0 to 63 lt class gt lor 0 Example SGR24i qos set diffserv 0 20 1 set mode Syntax set mode lt port pri_tag tos layer4 diffserv gt Description To set qos priority mode of the switch Argument lt port gt per port priority lt pri_tag gt vlan tag priority lt tos gt ip tos classification lt layer4 gt ip tcp udp port classification lt diffserv gt ip diffserv classification Possible value port pri_tag tos layer4 diffserv Example SGR24i gos set mode port set port Syntax set port lt range gt lt class gt Description To set class of ports on port based qos Argument lt range gt port range syntax 1 5 7 available from 1 to 24 lt class gt class of service setting 1 high 0 low Possible value lt range gt 1 to 24 lt class gt 10r 0 Example SGR24i qos set port 1 10 1 261 set pri t
58. 0 1000 ormal ormal Enable 4 20 60 1000 ormal ormal Enable 5 20 60 1000 ormal ormal Enable 6 20 60 1000 ormal ormal Enable oh 20 60 1000 ormal ormal Enable 8 20 60 1000 ormal ormal Enable 9 20 60 1000 ormal ormal Enable 10 20 60 1000 ormal ormal Enable 22 20 60 1000 Normal Normal Disable 23 20 60 1000 Normal Normal Disable 24 20 60 1000 Normal Normal Disable 235 set timer Syntax set timer lt range gt lt join gt lt leave gt lt leaveall gt Description To set gvrp join time leave time and leaveall time for each port Argument lt range gt port range syntax 1 5 7 available from 1 to 24 lt join gt join timer available from 20 to 100 lt leave gt leave timer available from 60 to 300 lt leaveall gt leaveall timer available from 1000 to 5000 Leave Time must equal double Join Time at least Possible value lt range gt 1 to 24 lt join gt 20 to 100 lt leave gt 60 to 300 lt leaveall gt 1000 to 5000 Example SGR24i gvrp set timer 2 8 25 80 2000 show config Syntax show config Description To display the gvrp configuration Argument None Possible value None Example SGR24i gvrp show config GVRP state Enable Port Join Time Leave Time LeaveAll Time Applicant Registrar Restricted T 20 60 1000 ormal ormal Disable 2 25 80 2000 ormal ormal Disable 3 25 80 2000 ormal ormal Disable 4 25 80 2000 ormal ormal Disable 5 25 80 2000 ormal ormal Disable
59. 1 Global Commands of CLI end Syntax end Description Back to the top mode When you enter this command your current position would move to the top mode If you use this command in the top mode you are still in the position of the top mode Argument None Possible value None Example SGR24i alarm SGR24i alarm events SGR24i alarm events end SGR24i exit Syntax exit Description Back to the previous mode When you enter this command your current position would move back to the previous mode If you use this command in the top mode you are still in the position of the top mode Argument None Possible value None Example SGR24i trunk SGR24i trunk exit SGR24i 200 help Syntax help Description To show available commands Some commands are the combination of more than two words When you enter this command the CLI would show the complete commands Besides the command would help you Classify the commands between the local commands and the global ones Argument None Possible value None Example SGR24i ip SGR24i ip help Commands available set ip Set ip subnet mask and gateway set dns Set dns enable dhcp Enable DHCP and set dns auto or manual disable dhcp Disable DHCP show Show IP Configuration rales ei ieee aaa lt lt Global commands gt gt exit Back to the previous mode end Back to the top mode help Show available
60. 1 you can communicate with port 2 amp 3 amp 4 If you are on the port 5 then you cannot talk to them Each port based VLAN you built up must be assigned a group name This switch can support up to maximal 24 port based VLAN groups Tag based Tag based VLAN identifies its member by VID This is quite different from port based VLAN If there are any more rules in ingress filtering list or egress filtering list the packet will be screened with more filtering criteria to determine if it can be forwarded The switch supports supplement of 802 1q For more details please see the section VLAN in Chapter 3 Each tag based VLAN you built up must be assigned VLAN name and VLAN ID Valid VLAN ID is 1 4094 User can create total up to 4094 Tag VLAN groups VLAN Mode COUNT Ta0 based v Tag based GPort based Fig 3 17 59 3 3 2 Tag based Group Function name Tag based Group Configuration Function description It shows the information of existed Tag based VLAN Groups You can also easily create edit and delete a Tag based VLAN group by pressing lt Add gt lt Edit gt and lt Delete gt function buttons User can add a new VLAN group by inputting a new VLAN name and VLAN ID Parameter description VLAN Name The name defined by administrator is associated with a VLAN group Valid letters are A Z a z 0 9 and _ characters The maximal length is 15 characters VLAN ID VLAN identifier Each tag based VL
61. 1000 Mbps Policer Unit There are two units for ingress policer rate limit kbps Mbps 87 Shaper Enabled Shaper enabled to limit egress bandwidth by shaper rate Shaper Rate The configurable shaper rate range 500 Kbps 1000000 Kbps 1 Mbps 1000 Mbps Shaper Unit There are two units for egress shaper rate limit kops Mbps 88 3 6 4 Storm Control Function name Storm Control Configuration Function description The switch support storm ingress policer control function to limit the Flooded Multicast and Broadcast to prevent storm event happen Parameter description Frame Type There three frame types of storm can be controlled Flooded unicast Multicast Broadcast Status Enable Disable Selection means enabled _ means disabled Rate pps Refer to the following rate configurable value list the unit is Packet Per Second pps 1 2 4 8 16 32 64 128 256 512 1K 2K 4K 8K 16K 32K 64K 128K 256K 512K 1024K Storm Control Configuration Frame Type Status Rate pps Flooded unicast Multicast Broadcast 89 Fig 3 44 90 3 6 5 Wizard Function name Wizard Function description The QCL configuration Wizard is targeted on user can easy to configure the QCL rules for QoS configuration The wizard provide the typical network application rules user can apply these application easily Welcome to the QCL Configuration Wizard Please select an action Set up Port Policies
62. 125 Wizard Welcome to the ACL Configuration Wizard Please select an action et up Policy Rules Set up the default policy rules for Client ports Server ports Network ports and Guest ports Set up Port Policies Group ports into several types according to different ACL policies Set up Typical Network Application Rules Set up the specific ACL for different typical network application access control Set up Source MAC and Source IP Binding Strictly control the network traffic by only allowing incoming frames that match the source MAC and source IP on specific ports To continue click Next Fig 3 126 Set up Policy Rules 135 Set up Policy Rules Set up the default policy rules for Client ports Server ports Network ports and Guest ports Policy 2 for client ports Limit the allowed rate of broadcast and multicast frames Policy 3 for server ports Common server access only DHCP FTP Mail and WEB server Policy 4 for network ports Limit the allowed rate of TCP SYN flooding and ICMP flooding Policy 5 for guest ports Internet access only To continue click Next Fig 3 127 Set up Policy Rules Finished The ACL configuration wizard is finished and the new configuration is ready for use Click Finish to get more information Click Wizard Again to start the wizard again Fig 3 128 Set up Policy Rules Access Control List Configuration Ingress Port Frame Type Action Rate Limiter Po
63. 1643 Ethernet MIB RFC 1648 and so on IGMP Snooping Support IGMP version 2 RFC 2236 The function IGMP snooping is used to establish the multicast groups to forward the multicast packet to the member ports and in nature avoid wasting the bandwidth while IP multicast packets are running over the network IGMP Proxy The implementation of IP multicast processing The switch supports IGMP version 1 and IGMP version 2 efficient use of network bandwidth and fast response time for channel changing IGMP version 1 IGMPv1 is described in RFC1112 and IGMP version 2 IGMPv2 is described in RFC 2236 Hosts interact with the system through the exchange of IGMP messages Similarly when you configure IGMP proxy the system interacts with the router on its upstream interface through the exchange of IGMP messages However when acting as the proxy the system performs the host portion of the IGMP task on the upstream interface as follows e When queried sends group membership reports to the group e When one of its hosts joins a multicast address group to which none 2 of its other hosts belong sends unsolicited group membership reports to that group When the last of its hosts in a particular multicast group leaves the group sends an unsolicited leave group membership report to the all routers group 244 0 0 2 1 2 Checklist Before you start installing the switch verify that the package contains the following SGR24i 24
64. 2 1X Port Configuration Function description This function is used to configure the parameters for each port in 802 1X port security application Refer to the following parameters description for details Parameter description Port It is the port number to be selected for configuring its associated 802 1X parameters which are Port control reAuthMax txPeriod Quiet Period reAuthEnabled reAuthPeriod max Request suppTimeout serverTimeout and Controlled direction Mode Range Disable Normal Advanced Clientless Disable Disable IEEE 802 1X for this port Normal All clients under this port will be authorized when one of the client do 802 1X authentication successfully Advanced Each clients under this port have to do 802 1X authentication by himself Clientless The clients don t need to install 802 1X client function that means the client PC for example WINDOW XP does not need to enable 802 1 X client function also can do 802 1X authentication But the network maintainer need to configure the Radius server using each clients MAC address for Radius account ID and password Port Control This is used to set the operation mode of authorization There are three type of operation mode supported ForceUnauthorized ForceAuthorized Auto e ForceUnauthorized The controlled port is forced to hold in the unauthorized state e ForceAuthorized The controlled port is forced to hold in the authorized state e Auto
65. 24i bandwidth disabl gress rate 1 8 disable ingress rate Syntax disable ingress rate lt range gt Description To cancel the Ingress rate of the port Argument lt range gt syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 to 24 Example SGR24i bandwidth disable ingress rate 1 8 disable storm rate Syntax disable storm rate lt range gt Description To cancel the storm rate of the port Argument lt range gt syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 to 24 Example SGR24i bandwidth disable storm rate 1 8 223 enable egress rate Syntax enable egress rate lt range gt lt data_rate gt Description To set up the egress rate of the port Argument lt range gt syntax 1 5 7 available from 1 to 24 lt data_rate gt 0 1000 Possible value lt range gt 1 to 24 lt data_rate gt 0 1000 Example SGR24i bandwidth enabl gress rate 1 16 200 enable ingress rate Syntax enable ingress rate lt range gt lt data_rate gt Description To set up the Ingress rate of the ports Argument lt range gt syntax 1 5 7 available from 1 to 24 lt data_rate gt 0 1000 Possible value lt range gt 1 to 24 lt data_rate gt 0 1000 Example SGR24i bandwidth enable ingress rate 1 16 100 enable storm rate Syntax enable storm rate lt range gt lt data_rate gt Description To set up the storm rate
66. 3 When only deny lists exist then it will accept all connections excluding the connection inside of the denying range Rule 4 When both accept and deny lists exist then it will deny all connections excluding the connection inside of the accepting range Rule 5 When both accept and deny lists exist then it will deny all connections excluding the connection inside of the accepting range and NOT inside of the denying range at the same time Accept Accept Deny Deny Acc Deny Acc Deny 42 Function name Management Security Configuration Function description The switch offers Management Security Configuration function With this function the manager can easily control the mode that the user connects to the switch According to the mode users can be classified into two types Those who are able to connect to the switch Accept and those who are unable to connect to the switch Deny Some restrictions also can be placed on the mode that the user connect to the switch for example we can decide that which VLAN VID is able to be accepted or denied by the switch the IP range of the user could be accepted or denied by the switch the port that the user is allowed or not allowed to connect
67. 32 15 1532 16 1532 17 1532 18 1532 19 1532 20 1532 21 1532 22 1532 23 1532 24 1532 253 mirror set mirror mode Syntax set mirror mode lt rx disable gt Description To set up the mode of mirror rx mode or disable Argument lt rx disable gt rx enable the mode of mirror Only mirror the packets that is received disable end the function of mirror Possible value lt rx disable gt rx or disable Example SGR24i mirror set mirror mode rx set monitored port Syntax set monitored port lt range gt Description To set up the port that will be monitored The packets received by this port will be copied to the monitoring port Argument lt range gt the port that is chosen for monitored port of the mirror function syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 to 24 Example SGR24i mirror set monitored port 3 5 8 10 set monitoring port Syntax set monitoring port lt gt Description To set up the monitoring port of the mirror function User can observe the packets that the monitored port received via this port Argument lt gt the monitoring port that is chosen for the mirror function Only one port is allowed to configure available from 1 to 24 Possible value lt gt 1 to 24 Example SGR24i mirror set monitoring port 2 show 254 Syntax show Description To display the setting status of Mirror function Argumen
68. 7 5 Enable Disable Access 8 D Enable Disable Access 9 1 Enable Disable Access 10 i Enable Disable Access Lal 1 Disable Disable Access a 23 il Disable Disable Access a 24 1 Disable Disable Access 284 E yS disable Syntax disable Description To disable the virtual stack Argument None Possible value None Example SGR24i vs disable enable Syntax enable Description To enable the virtual stack Argument None Possible value None Example SGR24i vs enable set gid Syntax set gid lt gid gt Description To set the group id Argument lt gid gt Group ID Possible value lt gid gt a z A Z 0 9 Example SGR24i vs set gid groupl 285 set role Syntax set role lt master slave gt Description To set role Argument lt master slave gt master act as master slave act as slave Possible value lt master slave gt master or slave Example SGR24i vs set role master show Syntax show Description To display the configuration of the virtual stack Argument None Possible value None Example SGR24i vs show Virtual Stack Config State Enable Role Master Group ID groupl 286 5 Maintenance 5 1 Resolving No Link Condition The possible causes for a no link LED status are as follows e The attached device is not powered on e The cable may not be the correct type or is faulty e The installed b
69. 777777 set server Syntax set server lt ip gt Description To set up the IP address of sms server Argument lt ip gt SMS server ip address or domain name Possible value None Example SGR24i alarm sms set server 192 168 1 7 set user Syntax set user lt username gt Description To set up user account and password of sms server Argument lt username gt SMS server account Possible value None Example SGR24i alarm sms set user ABC 221 show Syntax show Description To display the configuration of SMS trap event Argument None Possible value None Example SGR24i alarm sms show SMS Server z 192 168 1207 Username ABC Password kkkxkxkxkxkxkxk xkxkxkxkxk kxx xx k obile Phone 0968777777 obile Phone obile Phone obile Phone obile Phone obile Phone 0 T FP WNE autologout autologout Syntax autologout lt time gt Description To set up the timer of autologout Argument lt time gt range 1 to 3600 seconds 0 for autologout off current setting is 180 seconds Possible value lt time gt 0 1 3600 Example SGR24i autologout 3600 Set autologout time to 3600 seconds 222 a bandwidth disable egress rate Syntax disable egress rate lt range gt Description To cancel the egress rate of the port Argument lt range gt syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 to 24 Example SGR
70. 92 168 2 252 DNS Setting Manual DNS Server 168 95 1 1 241 a log clear Syntax clear Description To clear the log data Argument None Possible value None Example SGR24i log clear disable auto upload Syntax disable auto upload Description To disable the auto upload function Argument None Possible value None Example SGR24i log disable auto upload enable auto upload Syntax enable auto upload Description To enable the auto upload function Argument None Possible value None Example SGR24i log enable auto upload 242 show Syntax show Description To show a list of trap log events When any of log events happens it will be recorded and using show command in log function to query Up to 120 log records are supported Argument None Possible value None Example SGR24i log show Tftp Server 0 0 0 0 Auto Upload Disable Wed Apr 13 12 13 27 2005 Link Up Port 1 Wed Apr 13 12 13 26 2005 Link Down Port 1 Wed Apr 13 11 58 31 2005 Login admin Wed Apr 13 11 19 45 2005 Login admin Wed Apr 13 11 19 37 2005 Logout admin OP WNER upload Syntax upload Description To upload log data through tftp Argument None Possible value None Example SGR24i log upload 243 mac table lt lt alias gt gt del Syntax del lt mac gt Description To delete the mac alias entry Argument
71. ACP Disabled ACP Enabled LACP Member Added LACP Port Failure GVRP Disabled GVRP Enabled VLAN Disabled Port based Vlan Enabled Tag based Vlan Enabled Metro mode Vlan Enabled Double tag Vlan Enabled Module Inserted Module Removed Moudle Media Swapped e a DAYTNAHAUHRWNEHE ie PRR NFO bh w erer oe PRR Oo won T N O NN NH DWN EP 219 show alarm Syntax show Description The Show for alarm here is used to display the configuration of Trap SMS or E mail Argument None Possible value None Example SGR24i alarm show events SGR24i alarm show email SGR24i alarm show sms lt lt sms gt gt del phone number Syntax del phone number lt gt Description To delete sms phone number Argument lt gt mobile phone number range 1 to 6 Possible value lt gt 1106 Example SGR24i alarm sms del phone number 3 del server user Syntax del server user Description To delete sms server user account and password Argument None Possible value None Example SGR24i alarm sms del server user 220 set phone number Syntax set phone number lt gt lt phone number gt Description To add sms phone number Argument lt gt mobile phone number range 1 to 6 lt phone number gt phone number Possible value lt gt 1 to 6 Example SGR24i alarm sms set phone number 1 0968
72. AN group has a unique VID It appears only in tag based and Double tag mode IGMP Proxy IGMP proxy enables the switch to issue IGMP host messages on behalf of hosts that the system discovered through standard IGMP interfaces The system acts as a proxy for its hosts This switch can be set IGMP function Enable or Disable by VLAN group If the VLAN group IGMP proxy is disabled the switch will stop the exchange of IGMP messages in the VLAN group members If the VLAN group IGMP proxy is enabled the switch will support the exchange of IGMP messages in the VLAN group members and follow up IGMP proxy router port configuration which connects to a router closer to the root of the tree This interface is the upstream interface The router on the upstream interface should be running IGMP You enable IGMP on the interfaces that connect the system to its hosts that are farther away from the root of the tree These interfaces are known as downstream interfaces Please refer to 3 15 1 for detail IGMP Proxy function description Member Port This is used to enable or disable if a port is a member of the new added VLAN Enable means it is a member of the VLAN Just tick the check box MI beside the port x to enable it Tag Based VLAN Memberships Configuration VLAN Name Port Members Delete LAN ID IGMP Proxy 12 3 eA 50 ei 7 gico 20 Ar t2 aa wa PS e 17e a9 20 20 22 23 24 Default 123 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
73. Description To display the config file information Argument None Possible value None Example SGR24i config file show TFTP Server IP Address 192 168 3 111 Export Path and Filename nmap 123 ts Import Path and Filename userl123 txt 228 dhcp boot set dhcp boot Syntax set dhcp boot lt sec gt Description To set up the delay time for DHCP Boot Argument lt sec gt range syntax 0 1 30 The value 0 is to disable dhcp boot delay Possible value lt sec gt 0 30 Example SGR24i dhcp boot set dhcp boot 30 show Syntax show Description To display the status of DHCP Boot Argument None Possible value None Example SGR24i dhcp boot show dhcp boot Enable Second 10 229 diag diag Syntax diag Description Diag is used to test whether UART DRAM Flash and EEPROM is normal or not Argument None Possible value None Example SGR24i diag diag EEPROM Test OK UART Test DRAM Test OK s OK Flash Test OK loopback Syntax Loopback Description For Internal External Loopback Test Argument None Possible value None Example SGR24i diag loopback Internal External Loopback Loopback Test Test 19 20 21 22 23 24 Fail ping Syntax ping lt ip gt Description To confirm that whether the remote end station or switch itself is alive or not Argumen
74. Disabled Disabled Permit Disabled Disabled SO te CO Be OC ie CO ie O fe CO ie CO he lt Fig 3 133 Set up Port Policies Finish Welcome to the ACL Configuration Wizard Please select an action Set up Policy Rules Set up the default policy rules for Client ports Server ports Network ports and Guest ports Set up Port Policies Group ports into several types according to different ACL policies et up Typical Network Application Rules Set up the specific ACL for different typical network application access control Set up Source MAC and Source IP Binding Strictly control the network traffic by only allowing incoming frames that match the source MAC and source IP on specific ports To continue click Next Fig 3 134 Set up Typical Network Application Rules 138 Set up Typical Network Application Rules Set up the specific ACL for different typical network application access control by selecting the network application type for your rule o Common Servers DHCP DNS FTP TELNET o Instant Messaging Google Talk MSN Messenger Yahoo Messenger o User Definition V Ethernet Type Ox UDP Port Specific TCP Port Specific Specific Specific Range o Others OOHTTPS ClCMP C Multicast IP Stream C NetBIOS Ping Request C Ping Re
75. ENTAITON IN TERMS OF CORRECTNESS ACCURACY RELIABILITY OR OTHERWISE CONSEQUENTIAL DAMAGES IN NO EVENT SHALL AMER COM OR ITS AUTHORIZED RESELLER BE LIABLE TO LICENSEE OR ANY THIRD PARTY FOR A ANY MATTER BEYOND ITS REASONABLE CONTROL OR B ANY CONSEQUENTIAL SPECIAL INDIRECT OR INCIDENTAL DAMAGES ARISING OUT OF THIS LICENSE OR USE OF THE SOFTWARE PROVIDED BY AMER COM EVEN IF AMER COM HAS BEEN NOTIFIED OF THE POSSIBILITY OF SUCH DAMAGES IN ADVANCE IN NO EVENT SHALL THE LIABILITY OF AMER COM IN CONNECTION WITH THE SOFTWARE OR THIS AGREEMENT EXCEED THE PRICE PAID TO AMER COM FOR THE LICENSE TERM AND TERMINATION The License is effective until terminated however all of the restrictions in regard to AMER com s copyright in the Software and related documentation will cease being effective at the date of expiration Notwithstanding the termination or expiration of the term of this agreement it is acknowledged and agreed that those obligations relating to use and disclosure of AMER com s confidential information shall survive Licensee may terminate this License at any time by destroying the software together with all copies thereof This License will be immediately terminated if Licensee fails to comply with any term and condition of the Agreement Upon any termination of this License for any reason Licensee shall discontinue to use the Software and shall destroy or return all copies of the Software and the related documentation GENERAL This Lic
76. ER WHICH AMER COM WILL PERMIT YOU TO USE THE SOFTWARE If you do not accept these provisions and conditions please immediately return the unused software manual and the related product Written approval is NOT a prerequisite to the validity or enforceability of this Agreement and no solicitation of any such written approval by or on behalf of AMER com shall be deemed as an inference to the contrary LICENSE GRANT The end user hereinafter referred to as Licensee of the Software is granted a personal non sub licensable nonexclusive nontransferable license by AMER com Corporation AMER com 1 To use the America s software Software in object code form solely on a single central processing unit owned or leased by Licensee or otherwise embedded in the equipment offered by AMER com 2 To copy the Software only for backup purposes in support of authorized use of the Software 3 To use and copy the documentation related to the Software solely in support of authorized use of the Software by Licensee The License applies to the Software only except other America s software or hardware products Without the prior written consent of AMER com Licensee has no right to receive any source code or design documentation with respect to the Software RESTRICTIONS ON USE RESERVATION OF RIGHTS The Software and related documentation are protected under copyright laws AMER com and or its licensors retain all title and ownership in both the S
77. Flash test Diagnostics UART Test DRAM Test Fig 3 172 192 3 19 2 Ping Function name Ping Test Function description Ping Test function is a tool for detecting if the target device is alive or not through ICMP protocol which abounds with report messages The switch provides Ping Test function to let you know that if the target device is available or not You can simply fill in a known IP address and then click lt Ping gt button After a few seconds later the switch will report you the pinged device is alive or dead in the field of Ping Result Parameter description IP Address An IP address with the version of v4 e g 192 168 1 1 Default Gateway IP address of the default gateway For more details please see the section of IP address in Chapter 2 ICMP Ping IP Address Ping size 64 Fig 3 173 193 3 19 2 VeriPHY Function name VeriPHY Function description The switch device includes a comprehensive suite of cable diagnostic function that are available using SMI reads and writes These functions enable a variety of cable operating conditions and status to be accessed and checked The VeriPHY suite has the ability to identify the cable and operating conditions and to isolate a variety of common faults that can occur the Cat5 twisted pair cabling Note If a link is established on the twisted pair interface in 1000BASE T mode VeriPHY can run without disruption of the link or disruption of any
78. G8100343 cic 070202 close Fig 3 14 Parameter description of Port 21 Port 24 Connector Type Display the connector type for instance UTP SC ST LC and so on Fiber Type Display the fiber mode for instance Multi Mode Single Mode Tx Central Wavelength Display the fiber optical transmitting central wavelength for instance 850nm 1310nm 1550nm and so on Baud Rate Display the maximum baud rate of the fiber module supported for instance 10M 100M 1G and so on Vendor OUI Display the Manufacturer s OUI code which is assigned by IEEE Vendor Name Display the company name of the module manufacturer Vendor P N Display the product name of the naming by module manufacturer Vendor Rev Revision Display the module revision 51 Vendor SN Serial Number Show the serial number assigned by the manufacturer Date Code Show the date this SFP module was made Temperature Show the current temperature of SFP module Vcc Show the working DC voltage of SFP module Mon1 Bias mA Show the Bias current of SFP module Mon2 TX PWR Show the transmit power of SFP module Mon3 RX PWR Show the receiver power of SFP module 52 3 2 3 Simple Counter The function of Simple Counter collects any information and provides the counting about the traffic of the port no matter the packet is good or bad In the Fig 3 15 the window can show all ports counter information at the same ti
79. IEEE 802 1s Multiple Spanning Trees Supports IEEE 802 1X port based network access control Supports ACL to classify the ingress packets to do permit deny rate limit actions Supports QCL to classify the ingress packets for priority queues assignment Supports IP MAC Binding function to prevent spoofing attack Supports IP Multicasting to implement IGMP Snooping function Supports 802 1p Class of Service with 4 level priority queuing Supports 802 3ad port trunking with flexible load distribution and failover function Supports ingress port security mode for VLAN Tagged and Untagged frame process Supports SNMP MIB2 and RMON sampling with sampled packet error indication 288 Hardware Specifications Standard Compliance IEEE802 3 802 3ab 802 3z 802 3u 802 3x Network Interface 10 100 1000Mbps Gigabit TP NWay TP RJ 45 1 24 1000Base SX Gigabit Fiber 1000 FDX SFP 21 24 Option 1000Base LX Gigabit Fiber 1000 FDX SFP 21 24 Option 1000Base LX Single Fiber WDM BiDi 1000 FDX SFP 21 24 Option Port 21 24 are TP SFP fiber dual media ports with auto detected function Optional SFP module supports LC or BiDi LC transceiver Transmission Mode 10 100Mbps support full or half duplex 1000Mbps support full duplex only Transmission Speed 10 100 1000Mbps for TP 1000Mbps for Fiber Full Forwarding Filtering Packet Rate PPS packets per second Forwarding Rate Speed 1 488 000PPS 148 800
80. IP protocol value is 0 1 The IP protocol value is 1 IP Parameters Frame Type IPv4 and IP Protocol Filter Other IP Protocol Value Default 255 IPTTL Time To Live How many routers a datagram can pass through Each router decrements this value by 1 until it reaches 0 when the datagram is discarded This keeps misrouted datagrams from remaining on the Internet forever Range Any Non zero Zero Any Including all conditions for IPTTL 132 Non Zero Including IPTTL is Non Zero Zero Including IPTTL is zero IP Fragment IP Fragmentation Flag Controls datagram fragmentation together with the identification field The flags indicate whether the datagram may be fragmented whether the datagram is fragmented and whether the current fragment is the final one Range Any Yes No Any Including all IP fragment case Yes The ingress frame is fragmented packet No The ingress frames is not fragmented packet IP Option A list of optional specifications for security restrictions route recording and source routing Not every datagram specifies an options field Range Any Yes No Any Including all IP option case Yes The ingress frame is specified IP options No The ingress frame is not specified IP options SIP Filter SIP Source IP Address Range Any Host Network Any Including all source IP address Host Only one specific source host IP address Network A specific IP subnet segment under the source IP
81. LELE S ELELE Instance Config Port Config Instance Status Port Status Fig 3 156 MSTP Create MSTI Add Vlan Mapping Instance ID Me Vlan Mapping ID STRING hye ag 2 5 7 100 200 301 303 1000 1500 Valid VID Range 1 4094 Fig 3 157 Edit MSTI Vlan Parameter description Vlan Mapping VID STRING VID STRING Example 2 5 7 100 200 301 303 1000 1500 Valid VID Range 1 4094 173 Instance Configuration ID 0 CC 20 ox Hops 6 40 500 Note 2 Forward Delay 1 gt Max Age Max Age available from 6 to 40 Recommended value is 20 Forward Delay sec available from 4 to 30 Recommended value is 15 Max Hops available from 6 to 40 Recommended value is 20 Fig 3 158 Instance Config Parameter description Priority The priority parameter used in the CIST Common and Internal Spanning Tree connection 0 4096 8192 12288 16384 20480 24576 28672 32768 36864 40960 45056 49152 53248 57344 61440 MAX Age 6 40sec The same definition as in the RSTP protocol Forward Delay 4 30sec The same definition as in the RSTP protocol MAX Hops 6 40sec It s a new parameter for the multiple spanning tree protocol It is used in the internal spanning tree instances CIST Remaining Hops or MSTI Remaining Hops in the Spanning tree protocol message would decreased by one when the message is propagated to the neighboring bridge If the Remaining Hops in
82. MAC Address is listed in the filtering Static Filter table User can very easily maintain the table by filling in MAC Address VID VLAN ID and Alias fields individually User also can delete the existed entry by clicking lt Delete gt button Parameter description MAC It is a six byte long Ethernet hardware address and usually expressed by hex and separated by hyphens For example 00 40 C7 D6 00 02 VID VLAN identifier This will be filled only when tagged VLAN is applied Valid range is 1 4094 Alias MAC alias name you assign Static Filter 00 40 C7 D6 00 02 EC a vo T alias 1 Fig 3 27 69 3 4 3 Static Forward Function Name Static Forward Function Description Static Forward is a function that allows the user in the static forward table to access a specified port of the switch Static Forward table associated with a specified port of a switch is set up by manually inputting MAC address and its alias name When a MAC address is assigned to a specific port all of the switch s traffics sent to this MAC address will be forwarded to this port For adding a MAC address entry in the allowed table you just need to fill in four parameters MAC address associated port VID and Alias Just select the existed MAC address entry you want and click lt Delete gt button you also can remove it Parameter description MAC It is a six byte long Ethernet hardware address and usually
83. PPS 100Mbps 14 880PPS 10Mbps MAC Address and Self learning 8K MAC address 4K VLAN table entries Buffer Memory Embedded 1392 KB frame buffer Flow Control IEEE802 3x compliant for full duplex Backpressure flow control for half duplex Cable and Maximum Length 1000Base SX Cat 5 UTP cable up to 100m Up to 220 275 500 550m which depends on Multi Mode Fiber type 1000Base LX Single Mode Fiber up to10 30 50Km 1000Base LX WDM BiDi Single Mode Single Fiber up to 20Km 289 Diagnostic LED System LED Power Per Port LED 10 100 1000M TP Port 1 to 24 LINK ACT 10 100 1 000Mbps 1000M SFP Fiber Port 21 to 24 SFP LINK ACT Power Requirement AC Line Voltage 100 240 V Frequency 50 60 Hz Consumption 30W Ambient Temperature 0 to 40 C Humidity 5 to 90 Dimensions 44 H x 442 W x 209 D m Comply with FCC Part 15 Class A amp CE Mark Approval 290 Management Software Specifications Auto negotiation support on 10 100 1000 Base TX ports Web browser or console interface can set transmission speed 10 100 1000Mbps and operation mode Full Half duplex on each port enable disable any port set VLAN group set Trunk Connection SNMP support MIB II Bridge MIB RMON MIB IEEE 802 1D Port Base 802 1Q Tagged allowed up to 256 active VLANs in one switch Ports trunk connections allowed IP Multicast Filteri
84. RP Parameters Any Request Repl Fig 3 76 ARP ARP Parameters Fig 3 77 ARP ARP Parameters Fig 3 78 ARP 111 ARP Parameters 192 168 1 1 255 255 255 0 Any Fig 3 79 ARP ARP Parameters Apply Fig 3 80 ARP ARP Parameters 192 168 1 254 Fig 3 81 ARP ARP Parameters 192 168 1 254 255 259 255 0 Fig 3 82 ARP 112 Fig 3 83 ARP Fig 3 84 ARP Fig 3 85 ARP Fig 3 87 ARP 113 ACE Configuration Permit IPv4 E MAC Parameters VLAN Parameters IP Parameters Fig 3 88 IPv4 IP Parameters Fig 3 89 IPv4 ICMP Parameters Any Any we Fig 3 90 IPv4 114 ICMP Parameters Any Fig 3 91 IPv4 ICMP Parameters Specific v Fig 3 92 IPv4 ICMP Parameters Any Any Any Fig 3 93 IPv4 ICMP Parameters Fig 3 94 IPv4 UDP Parameters Any Any Fig 3 95 IPv4 115 UDP Parameters Fig 3 96 IPv4 UDP Parameters Fig 3 97 IPv4 UDP Parameters Fig 3 98 IPv4 UDP Parameters Fig 3 99 IPv4 UDP Parameters oT Fig 3 100 IPv4 116 UDP Parameters Fig 3 101 IPv4 TCP Parameters Fig 3 102 IPv4 TCP Parameters Any Any Range Any M Fig 3 103 IPv4 117 TCP Parameters Fig 3 104 IPv4 TCP Parameters Fig 3 105 IPv4 TCP Parameters 118 Fig 3 106 IPv4 TCP Parameters Fig 3 107 IPv4 IP Paramete
85. SGR241 User s Manual 24 Port Gigabit L2 Plus Managed Switch Release 1 2 01 2009 AMER com Corporation All rights reserved All brand and product names are trademarks or registered trademarks of their respective companies The information in this document is subject to change without notice Unless the explicit written permission of AMER com Corporation this document in whole or in part shall not be replicated or modified or amended or transmitted in any from or by any means manual electric electronic electromagnetic mechanical optical or otherwise for any purpose DURATION OF HARDWARE WARRANTY HARDWARE In accordance with the provisions described under AMER com Corporation hereinafter called AMER com warrants its hardware products hereinafter referred to as Product specified herein to be for a period of twelve 12 months from the date of shipment Should a Product fail to perform during the effective warranty period as described above AMER com shall replace the defective Product or part or delivering a functionally equivalent Product or part in receipt of customer s request provided that the customer complies with the return material authorization RMA procedures and returns all defective Product prior to installation of the replacements to AMER com All defective Products must be returned to AMER com with issuance of a Return Material Authorization number RMA number assigned to the reseller from whom the end
86. WH oO O 0O O 0 Fi oO d a 0 l O o 0 o OOOOOOO0O00000000 Fig 3 162 181 3 15 IGMP Snooping The function IGMP Snooping is used to establish the multicast groups to forward the multicast packet to the member ports and in nature avoids wasting the bandwidth while IP multicast packets are running over the network This is because a switch that does not support IGMP or IGMP Snooping can not tell the multicast packet from the broadcast packet so it can only treat them all as the broadcast packet Without IGMP Snooping the multicast packet forwarding function is plain and nothing is different from broadcast packet A switch supported IGMP Snooping with the functions of query report and leave a type of packet exchanged between IP Multicast Router Switch and IP Multicast Host can update the information of the Multicast table when a member port joins or leaves an IP Multicast Destination Address With this function once a switch receives an IP multicast packet it will forward the packet to the members who joined in a specified IP multicast group before The packets will be discarded by the IGMP Snooping if the user transmits multicast packets to the multicast group that had not been built up in advance 3 15 1 Proxy Function name IGMP Proxy Configuration Function description IGMP proxy enables the switch to issue IGMP host messages on behalf of hosts that the system discovered through standard IGMP interfa
87. a message is zero the message BPDU would be regarded as invalid Max Hops is used to specify the initial value of the Remaining Hops for Regional Root Bridge Either CIST Regional Root or MSTI Regional Root 174 Port Config of Instance 0 Migration Port Config Check Hello Admin Admin Restricted Restricted Mcheck PASUESE et in Edge Role i oe Meheck 128 v Yes Auto No 128 2 Yes Auto No 128 v 2 Yes Auto lt 128 M 2 Yes Auto 128 v 2 Yes Auto 128 2 Yes Auto 7 128 v 2 Yes Auto 128 v 2 Yes Auto 128 2 Yes Auto 128 v 2 Yes Auto S S IS S S IES S LS Is vi vi vv vv vv 128 M 2 M Yes M Auto M v vv v vi v S S S S S LS S ILS 4 G S S S S LS IS ILS e E 10 EN 128 2 Yes Auto Fig 3 159 Port Config Parameter description Port 1 24 Path Cost 1 200 000 000 The same definition as in the RSTP specification But in MSTP this parameter can be respectively applied to ports of CIST and ports of any MSTI Priority 0 16 32 48 64 80 96 112 128 144 160 176 192 208 224 240 The same definition as in the RSTP specification But in MSTP this parameter can be respectively applied to ports of CIST a
88. able which include information vian membership of a MSTI of all spanning instances provisioned in the particular MST region which the bridge belongs to Through this table additional MSTP configuration data can be applied and MSTP status can be retrieved Parameter description Instance ID Every spanning tree instance need to have a unique instance ID within 0 4095 Instance 0 CIST always exists and can not be deleted Additional spanning instances MSTIs can be added or deleted At least one vlan must be provisioned for an MSTI to declare the need for the MSTI to be existent Corresponding Vlans 0 4095 Multiple vians can belong to an MSTI All vlans that are not provisioned through this will be automatically assigned to Instance 0 CIST Edit MSTI Vlan Fig 3 157 To add an MSTI and provide its vlan members or modify vlan members for a specific MSTI Del MSTI To delete an MSTI Del All MSTI Deleting all provisioned MSTIs at a time Instance Configuration Fig 3 158 To provision spanning tree performance parameters per instance Port Config Fig 3 159 To provision spanning tree performance parameters per instance per port Instance Status Fig 3 160 To show the status report of a particular spanning tree instance Port Status Fig 3 161 To show the status report of all ports regarding a specific spanning tree instance 172 MSTP Instance Config Corresponding Vlans 0 4095 __EditMSTI Vlan
89. ag Syntax set pri_tag lt port range gt lt tag range gt lt class gt Description To set class of ports on vian tag based qos Argument lt port range gt port range syntax 1 5 7 available from 1 to 24 lt tag range gt tag priority level syntax 1 5 7 available from 0 to 7 lt class gt class of service setting 1 high 0 low Possible value lt port range gt 1 to 24 lt tag range gt 0 to 7 lt class gt lor 0 Example SGR24i gos set pri tag 1 15 1 2 1 set simple layer4 Syntax set simple layer4 lt gt Description To set class of ports on simple mode of Layer 4 qos Argument lt gt layer 4 configuration mode valid values are as follows disable ip tcp udp port classification down prioritize web browsing e mail FTP and news prioritize ip telephony VoIP prioritize iSCSI prioritize web browsing e mail FTP transfers and news prioritize streaming Audio Video prioritize databases Oracle IBM DB2 SQL Microsoft Possible value lt gt 0 6 Example SGR24i qos set simple layer4 2 OoahRWNM O 262 set tos Syntax set tos lt port range gt lt tos range gt lt class gt Description To set class of ports on IP TOS qos Argument lt port range gt port range syntax 1 5 7 available from 1 to 24 lt tos range gt tos precedence field syntax 1 5 7 available from 0 to 7 lt class gt class of service setting 1 high 0 low Possibl
90. anagement Agent of SGR24i through the Ethernet Port There are three ways to configure and monitor the switch through the switch s Ethernet port They are CLI Web browser and SNMP manager The user interface for the last one is NMS dependent and does not cover here We just introduce the first two types of management interface SGR24i L2 Managed Switch Default IP Setting IP 192 168 1 1 Subnet Mask 255 255 255 0 Default Gateway 192 168 1 254 Assign a reasonable IP address For example oon IP 192 168 1 100 Subnet Mask 255 255 255 0 Default Gateway 192 168 1 254 Fig 2 9 Managing SGR24i through Ethernet Port Before you communicate with the switch you have to finish first the configuration of the IP address or to know the IP address of the switch Then follow the procedures listed below 1 Setup a physical path between the configured the switch and a PC by a qualified UTP Cat 5 cable with RJ 45 connector Note If PC directly connects to the switch you have to setup the same subnet mask between them But subnet mask may be different for the PC in the remote site Please refer to Fig 2 9 about the switch s default IP address information 2 Run CLI or web browser and follow the menu Please refer to Chapter 3 and Chapter 4 Username amp Password Username admin Password sese ETN cornet password Fig 2 10 the Login Screen for Web 2 1 5 IP Address Assignment For IP address co
91. and a supplicant PAE The Authenticator exchanges the message to authentication server using EAP encapsulation Before successfully authenticating the supplicant can only touch the authenticator to perform authentication message exchange or access the network from the uncontrolled port Authentication Authenticator s System Server s System Services Offered by Authenticator Authenticator Authentication Server e g Bridge Relay PAE Controlled port Uncontrolled port Port Authorize J a MAC Enable Fig 3 53 In the Fig 3 54 this is the typical configuration a single supplicant an authenticator and an authentication server B and C is in the internal network D is Authentication server running RADIUS outside t services Switch at the central location acts Authenticator connecting to PC A and Ais a PC he controlled port running Supplicant PAE In this case PC A wants to access the on device B and C first it must exchange the authentication message with the authenticator on the port it connected via EAPOL packet The authenticator transfers the supplicant s credentials to Authentication server for verification If success the authentication server will notice the authenticator the grant PC A then is allowed to access B and C via the switch If there are two switches directly connected together instead of single one for the link connecting two switches it may have to act two port roles at the en
92. are the Leave Time in unit of centisecond Valid time range 60 300 centisecond Default 60 centisecond Leave All Time A time period for announcement that all registered device is going to be de registered If someone still issues a new join then a registration will be kept in the switch Valid range 1000 5000 unit time Default 1000 unit time Default Applicant Mode The mode here means the type of participant There are two modes normal participant and non participant provided for the user s choice Normal It is Normal Participant In this mode the switch participates normally in GARP protocol exchanges The default setting is Normal Non Participant It is Non Participant In this mode the switch does not send or reply any GARP messages It just listens messages and reacts for the received GVRP BPDU Default Registrar Mode The mode here means the type of Registrar There are three types of parameters for registrar administrative control value normal registrar fixed registrar and forbidden registrar provided for the user s choice 74 Normal It is Normal Registration The Registrar responds normally to incoming GARP messages The default setting is Normal Fixed It is Registration Fixed The Registrar ignores all GARP messages and all members remain in the registered IN state Forbidden It is Registration Forbidden The Registrar ignores all GARP messages and all members remain in th
93. ation Contact Device Name System Up Time Current Time BIOS Version Firmware Version Hardware Mechanical Version Serial Number Host IP Address Host Mac Address Device Port RAM Size and Flash Size With this information you will know the software version used MAC address serial number how many ports good and so on This is helpful while malfunctioning or o System opor System Information avian a MAC a GVRP Qos SNMP SACL SIP MAC Binding 5802 1X o Trunk a syp a MSTP Mirroring a IGMP 2 Alarm a Save Restore Exportimport a Diagnostics a Maintenance Logout Model Name System Description Contact 2i Device Name Se eee ee ee System Up Time Current Time Sot Mor 09 20 57 34 2002 123456789 192 168 3 33 00 01 c1 00 00 00 Fig 3 2 29 The Information of Page Layout On the top side it shows the front panel of the switch In the front panel the linked ports will display green as to the ports which are link off they will be dark For the optional modules the slot will show only a cover plate if no module exists and will show a module if a module is present The image of module depends on the one you inserted The same if disconnected the port will show just dark if linked green See Fig 3 3 System Information Model Name SGR24i System Description SGR24 Location C
94. ation Function Description This function can allow the user to set up the processing mechanism of MAC Table An idle MAC address exceeding MAC Address Age out Time will be removed from the MAC Table The range of Age out Time is 10 1000000 seconds and the setup of this time will have no effect on static MAC addresses In addition the learning limit of MAC maintenance is able to limit the amount of MAC that each port can learn Parameter description Aging Time Delete a MAC address idling for a period of time from the MAC Table which will not affect static MAC address Range of MAC Address Aging Time is 10 1000000 seconds The default Aging Time is 300 seconds Disable automatic aging Stop the MAC table aging timer the learned MAC address will not age out automatically Auto Enable this port MAC address dynamic learning mechanism Disable Disable this port MAC address dynamic learning mechanism only support static MAC address setting Secure Disable this port MAC address dynamic learning mechanism and copy the dynamic learning packets to CPU Save Save MAC Address Table configuration Reset Reset MAC Address Table configuration 67 MAC Address Table Configuration Aging Configuration Disable automatic aging O MAC Table Learning 68 3 4 2 Static Filter Function name Static Filter Function Description Static Filter is a function that denies the packet forwarding if the packets
95. ault Syntax restore default Description When you use this function in CLI the system will show you the information Do you want to restore the default IP address y n If you choose Y or y the IP address will restore to default 192 168 1 1 If you choose N or n the IP address will keep the same one that you had saved before If restoring default successfully the CLI would prompt if reboot immediately or not If you press Y or y the system would reboot immediately otherwise it would be back to the CLI system After restoring default configuration all the changes in the startup configuration would be lost After rebooting the entire startup configuration would reset to factory default Argument None Possible value None Example SGR24i restore default Restoring Restore Default Configuration Successfully Press any key to reboot system 203 restore user Syntax restore user Description To restore the startup configuration as user defined configuration If restoring default successfully the CLI would prompt if reboot immediately or not If you press Y or y the system would reboot immediately others would back to the CLI system After restoring user defined configuration all the changes in the startup configuration would be lost After rebooting the entire startup configuration would replace as user defined one Argument None Possible value None Example SGR24i restore user
96. ble STP on all switches to ensure a single active path on the network 3 12 1 Status Function name STP Status Function description In the Spanning Tree Status user can read 12 parameters to know STP current status The 12 parameters description is listed in the following table Parameter description STP State Show the current STP Enabled Disabled status Default is Disabled Bridge ID Show switch s bridge ID which stands for the MAC address of this switch Bridge Priority Show this switch s current bridge priority setting Default is 32768 Designated Root Show root bridge ID of this network segment If this switch is a root bridge the Designated Root will show this switch s bridge ID Designated Priority Show the current root bridge priority Root Port Show port number connected to root bridge with the lowest path cost Root Path Cost Show the path cost between the root port and the designated port of the root bridge Current Max Age Show the current root bridge maximum age time Maximum age time is used to monitor if STP topology needs to change When a bridge does not receive a hello message from root bridge until the maximum age time is counted down to 0 the bridge will treat the root bridge malfunctioned and issue a Topology Change Notification TCN BPDU to all other bridges 163 All bridges in the LAN will re learn and determine which the root bridge is Maximum Age time i
97. can be updated while having confirmed the configuration You can retrieve it by performing Restore User Configuration 188 3 17 1 Factory Defaults Function name Restore Default Configuration includes default IP address Function description Restore Default Configuration function can retrieve ex factory setting to replace the start configuration And the IP address of the switch will also be restored to 192 168 1 1 Factory Defaults Are you sure you want to reset the configuration to Factory Default Fig 3 167 3 17 2 Save Start Function name Save As Start Configuration Function description Save the current configuration as a start configuration file in flash memory Save as Start Configuration Are you sure you want to save the current setting as Start Configuration Fig 3 168 3 17 3 Save User Function name Save As User Configuration Function description Save the current configuration as a user configuration file in flash memory Save as User Configuration Are you sure you want to save the current setting as User Configuration Fig 3 169 3 17 4 Restore User Function name Restore User Configuration Function description Restore User Configuration function can retrieve the previous confirmed working configuration stored in the flash memory to update start configuration When completing to restore the configuration the system s start configuration is updated and will be chang
98. ces The switch acts as a proxy for its hosts You enable IGMP proxy on the switch which connects to a router closer to the root of the tree This interface is the upstream interface The router on the upstream interface should be running IGMP IGMP Proxy Configuration IGMP Proxy Enable Oo Unregister IPMC Flooding Enable NCR Kcimes 3 16 Last Member Query Interval seconds 1 25 Last Member Query Max Response Time seconds 1 25 Update Interval of Router Ports 1800 seconds 1 3600 Router Ports 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 al fal fal ak Jia ill ll ll i la a lal il il al Fig 3 163 IGMP Proxy 182 Parameter description IGMP snooping mode selection The switch supports three kinds of IGMP Snooping status including Passive Active and Disable Disable Set Disable mode to disable IGMP Snooping function Default Disable Active In Active mode IGMP snooping switch will periodically issue the Membership Query message to all hosts attached to it and gather the Membership report message to update the database of the Multicast table By the way this also reduces the unnecessary multicast traffic Passive In Passive Snooping mode the IGMP snooping will not periodically poll the hosts in the groups The switch will send a Membership Query message to all hosts only when it has received a
99. ces alltetalitaty 87 326 4 SCOMM CONTO iiris taana aami ae fai a e a aa Aa A e oPenvlie a late 89 23 6 5 WiZar d ireira a a enaa aa aara aaaeeeaa 91 37 SNMP CONFIGURATO N a aaa a a En a Arar E n aA A aAa ea a AA AAEE AA EAEEREN 101 ONG EE E A E ce cada AE A E A E A AA E EN 103 3 8 1 POTS sa aa a a a aa a AAA A E a Aya Gated be 103 378 2 RAGS LIMILORS rardan aa a e a aaa aa a vat aa A EA 105 3 8 3 ACCess CONtFO MEISE eas eased irea e a E N E ENAN 106 3 8 4 WIZA A eia e a a Vaan E A AE AAE a TAA eV aA 134 3 9 IP MAC BINDING ninnan aana aaa A aait 143 3 10 802 1X CGONFIGURATION ricn atan a i e adadda 145 3 10 r Sere a a a a a a a A a a a a 150 3 10 2 Port Config ratio N ances ereire en aeai EEE EEO PET EEA ae A 152 SA OHS eSI Ka LEDS A A E T a ET E EAE EEA 154 E Ta KO E KSA Ka E E A E E E unk E BA Suda San E E E E EEEE 156 3 11 TRUNKING CONFIGURATION 0cccccecececceecececeeecececeeeeeceaeseceacaeeeseaueeeceaaeeeeaueneeesaueeeeeanens 157 321124 POPE a a a aA a Aa A T AAAA AE 159 3 1122 Aggregator VieWsorisirsnserra nni manane ETa a AAA TOAN SOCIS 161 3211 3 ACP System Priority iei nenea na ean n A e TTE id 162 3212 S T P CONFIGURATION PAA E AA BE NAE AEA E AEEA A AA EE 163 SEPE ds SACU RAE EENE E A E ENA A E E 163 3 12 2 C nfigurati g Miesies acetates ta e Ea A A a ESTAA 165 3 12 3 STP Port Configuration rpe e r a A A ENE OEA AEA 167 Bai MSP at tate et NA AANS SE AE AA ma Si ERA E E FEEDER AT ARARE TEY 170 Be Se Stat Sm a a N a a a E a
100. commands Global commands can be used wherever the mode you are They are exit end help history logout save start save user restore default and restore user For more details please refer to Section 4 2 1 Command instructions reside in the corresponding modes are local commands The same command with the same command name may occur but perform totally different function in different modes For example show in IP mode performs displaying the IP information however it performs displaying the system information in system mode _For more details please refer to Section 4 2 2 Managed Switeh Login admin Passuard xxxxx SGRZ24i 7 882 1 Enter into 862 1 node account Enter into account mode acl Enter into acl mode alarn Enter into alarm node autologout Change autologout time config file Enter into config file node debug Enter into debug node firmware Enter into firmware mode gurp Enter into gurp mode hostname Change hostnane igmp Enter into ignp mode ip Enter into ip node ip_nac_binding Enter into ip nac binding node loop detection Enter into Loop Detection LD mode mac Enter into mac mode nirror Enter into mirror node nstp Enter into mstp mode policy Enter into Managenent Policy mode port Enter into port mode qos Enter into qos mode reboot Reboot the system snmp Enter into snmp mode stp Enter into stp mode system Enter into system node Fig 4 3 199 4 2
101. computer to ground the static electrical charge before you pick up the circuit device e Pick up the device by holding it on the left and right edges only Electronic Emission Notices Federal Communications Commission FCC Statement This equipment has been tested and found to comply with the limits for a class A computing device pursuant to Subpart J of part 15 of FCC Rules which are designed to provide reasonable protection against such interference when operated in a commercial environment European Community CE Electromagnetic Compatibility Directive This equipment has been tested and found to comply with the protection requirements of European Emission Standard EN55022 EN60555 2 and the Generic European Immunity Standard EN50082 1 EMC N55022 1988 CISPR 22 1985 class A EN60555 2 1995 class A EN60555 3 IEC1000 4 2 1995 4K V CD 8KV AD IEC 1000 4 3 1995 3V m IEC 1000 4 4 1995 1KV power line 0 5KV signal line vii 1 Introduction 1 1 Overview of SGR24i SGR24i a 24 port Layer 2 Gigabit Managed Switch is a standard switch that meets all IEEE In 802 3 u x z Gigabit Fast Ethernet specifications The switch included 20 Port 10 100 1000Mbps TP and 4 Port Gigabit TP SFP Fiber management Ethernet switch The switch can be managed through RS 232 serial port via directly connection or through Ethernet port using CLI or Web based management unit associated with SNMP agent With the SNMP agent the
102. crease 1 ACL Ports Configuration Port Policy ID Action Rate Limiter ID Port Copy Counter Permit Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Fig 3 64 F lt Permit lt Permit lt Permit Permit lt Permit LS Permit lt Permit 1 2 3 4 5 1 6 f 8 9 lt Permit L Permit lt Permit Permit Ls lt Permit Ls Permit lt Permit 9 2 SL Sd EA EAER EIEI SSL 1 i Permit 104 3 8 2 Rate Limiters Function name ACL Rate Limiter Configuration Function description There are 16 rate limiter ID You can assign one of the limiter ID for each port The rate limit configuration unit is Packet Per Second pps Parameter description Rate Limiter ID ID Range 1 16 Rate pps 1 2 4 8 16 32 64 128 256 512 1K 2K 4K 8K 16K 32K 64K 128K 256K 512K 1024K ACL Rate Limiter Configuration Rate Limiter ID Rate pps 1 2 3 4 5 6 7 8 9 h ah h h Ww N O MEI EIEI EIEI EI EEIE MESEI EIEI EIE m ek
103. cription Argument None Possible value None Example 210 SGR24i 802 1X show security Port Mode Status Disable Multi host Unauthorized Disable Disable Disable Disable Nu BP WNE show state Syntax show state Description Show the Radius server configuration Argument None Possible value None Example SGR24i 802 1X show state Radius Server 192 168 1 115 Port Number a Lele Secret Key WinRadius account add Syntax add lt name gt Description To create a new guest user When you create a new guest user you must type in password and confirm password Argument lt name gt new account name Possible value Astring must be at least 5 character Example SGR24i account add aaaaa Password Confirm Password Save Successfully SGR24i account del Syntax del lt name gt Description To delete an existing account Argument lt name gt existing user account Possible value 211 None Example SGR24i account del aaaaa Account aaaaa deleted 212 modify Syntax modify lt name gt Description To change the username and password of an existing account Argument lt name gt existing user account Possible value None Example SGR24i account modify aaaaa username password the length is from 5 to 15 Current username aaaaa bbbbb New password Confirm password Username changed successfully Pass
104. customer originally purchased the Product The reseller is responsible for ensuring the shipments are insured with the transportation charges prepaid and the RMA number clearly marked on the outside of the package AMER com will not accept collect shipments or those returned without an RMA number AMER com shall not be responsible for any software firmware information or memory data contained in stored on or integrated with any Product returned to AMER com pursuant to any warranty EXCLUSIONS The warranty as mentioned above does not apply to the following conditions in AMER com s judgment it contains 1 customer does not comply with the manual instructions offered by AMER com in installation operation repair or maintenance 2 Product fails due to damage from unusual external or electrical stress shipment storage accident abuse or misuse 3 Product is used in an extra hazardous environment or activities 4 any serial number on the Product has been removed or defaced 5 this warranty will be of no effect if the repair is via anyone other than AMER com or the approved agents or 6 In the event of any failures or delays by either party hereto in the performance of all or any part of this agreement due to acts of God war riot insurrection national emergency strike embargo storm earthquake or other natural forces or by the acts of anyone not a party to this agreement or by the inability to secure materials or transportation then
105. d above had been setup and then press lt Add gt button The existed entry also can be modified after pressing lt Edit gt button Delete Remove the existed entry of allowed group configuration from the allowed group 184 3 16 Alarm Configuration Alarm Configuration Events Configuration Email SMS Configuration Function name Events Configuration Function description The Trap Events Configuration function is used to enable the switch to send out the trap information while pre defined trap events occurred The switch offers 24 different trap events to users for switch management The trap information can be sent out in three ways including email mobile phone SMS short message system and trap The message will be sent while users tick M the trap event individually on the web page shown as below Parameter description Trap Cold Start Warm Start Link Down Link Up Authentication Failure User login User logout STP STP Topology Changed STP Disabled STP Enabled LACP LACP Disabled LACP Enabled LACP Member Added LACP Port Failure GVRP GVRP Disabled GVRP Enabled VLAN VLAN Disabled Port based VLAN Enabled Tag based VLAN Enabled Metro mode Vlan Enabled Double tag Vian Enabled Module Swap Module Inserted Module Removed Dual Media Swapped 185 3 16 1 Events Function name Email SMS Configuration Function description Alarm configuration is used to configure the persons who shoul
106. d for the activation snmp or set community Argument None Possible value None Example SGR24i snmp enable snmp SGR24i snmp enable set ability 264 set Syntax set get community lt community gt set set community lt community gt set trap lt gt lt ip gt port community Description The Set here is used for the setup of get community set community trap host ip host port and trap community Argument lt gt trap number lt ip gt ip address or domain name lt port gt trap port lt community gt trap community name Possible value lt gt 1106 lt port gt 1 65535 Example SGR24i snmp set get community public SGR24i snmp set set community private SGR24i snmp set trap 1 192 168 1 1 162 public show Syntax show Description The Show here is to display the configuration of SNMP Argument None Possible value None Example SGR24i snmp show SNMP Enable Get Community public Set Community private Enable Trap Host 1 IP Address 192 168 1 1 Port 162 Community public Trap Host 2 IP Address 0 0 0 0 Port 162 Community public Trap Host 3 IP Address 0 0 0 0 Port 162 Community public Trap Host 4 IP Address 0 0 0 0 Port 162 Community public Trap Host 5 IP Address 0 0 0 0 Port 162 Community public Trap Host 6 IP Address 0 0 0 0 Port 162 Community public 265 stp MCheck Syntax MCheck lt range gt Description To
107. d of the link authenticator and supplicant because the traffic is bi directional 146 Fig 3 54 Authentication server a P Authenticator Supplicant A The Fig 3 55 shows the procedure of 802 1X authentication There are steps for the login based on 802 1X port access control management The protocol used in the right side is EAPOL and the left side is EAP 1 At the initial stage the supplicant A is unauthenticated and a port on switch acting as an authenticator is in unauthorized state So the access is blocked in this stage Initiating a session Either authenticator or supplicant can initiate the message exchange If supplicant initiates the process it sends EAPOL start packet to the authenticator PAE and authenticator will immediately respond EAP Request Identity packet The authenticator always periodically sends EAP Request Identity to the supplicant for requesting the identity it wants to be authenticated If the authenticator doesn t send EAP Request Identity the supplicant will initiate EAPOL Start the process by sending to the authenticator And next the Supplicant replies an EAP Response Identity to the authenticator The authenticator will embed the user ID into Radius Access Request command and send it to the authentication server for confirming its identity After receiving the Radius Access Request the authentication server sends Radius Access Challenge to the supplicant for asking for inp
108. d receive the alarm message via either email or SMS or both It depends on your settings An email address or a mobile phone number has to be set in the web page of alarm configuration See Fig 3 61 Then user can read the trap information from the email or the mobile phone This function provides 6 email addresses and 6 mobile phone numbers at most The 24 different trap events will be sent out to SNMP Manager when trap event occurs After ticking trap events you can fill in your desired email addresses and mobile phone numbers Then please click lt Apply gt button to complete the alarm configuration It will take effect in a few seconds Note SMS may not work in your mobile phone system It is customized for different systems Trap Events Configuration Email Select Unselect All C Trap Select Unselect All J ee eee Trap Cold Start Warm Start Link Down Link Up Authentication Failure Login Logout Module Inserted Module Removed Dual Media Swapped Looping Detected STP Disabled TH TH Fig 3 165 186 3 16 2 Email Parameter description Email Mail Server the IP address of the server transferring your email Username your username on the mail server Password your password on the mail server Email Address 1 6 email address that would like to receive the alarm message SMS SMS Server the IP address of the server transferring your SMS Username your username in ISP Password your username in ISP
109. data transfer However if a link is established in 100Base TX or 10Base T VeriPHY will cause the link to drop while the diagnostics are running After the diagnostics are finished the link will be re established The fillowing diagnostic functions are part of the VeriPHY suite Detection of coupling between cable pairs Detection of cable pair termination Determination of cable length VeriPHY Cable Diagnostics pone AN Cable Status Port PairA LengthA PairB LengthB Pairc LengthC PairD Length D o0 NoAA wh Fig 3 174 Parameter description Port Range 1 24 All You can select one port or all ports to do cable diagnostics function 194 3 20 Maintenance This chapter will introduce the reset and firmware upgrade function for the firmware upgrade and key parameters change system maintenance requirements 3 20 1 Reset Device Function name Reset Device Function description We offer you many ways to reset the switch including power up hardware reset and software reset You can press the RESET button in the front panel to reset the switch After upgrading software changing IP configuration or changing VLAN mode configuration then you must reboot to have the new configuration taken effect Here we are discussing is software reset for the reboot in the main menu Warm Reset Are you sure you want to perform a Warm Restart Yes Fig 3 175 3 20 2 Software Upload Function name Soft
110. determines the method a port uses to aggregate with other ports None A port does not want to aggregate with any other port should choose this default setting LACP A port use LACP as its trunk method to get aggregated with other ports also using LACP Static A port use Static Trunk as its trunk method to get aggregated with other ports also using Static Trunk Group Ports choosing the same trunking method other than None must be assigned a unique Group number i e Group ID valid value is from 1 to 8 in order to declare that they wish to aggregate with each other Active LACP This field is only referenced when a port s trunking method is LACP Active An Active LACP port begins to send LACPDU to its link partner right after the LACP protocol entity started to take control of this port Passive A Passive LACP port will not actively send LACPDU out before it receives an LACPDU from its link partner 159 Aggtr Aggir is an abbreviation of aggregator Every port is also an aggregator and its own aggregator ID is the same as its own Port No We can regard an aggregator as a representative of a trunking group Ports with same Group ID and using same trunking method will have the opportunity to aggregate to a particular aggregator port This aggregator port is usually the port with the smallest Port No within the trunking group Status This field represents the trunking status of a port which
111. e No Time and Events are three fields contained in each trap record Parameter description No Display the order number that the trap happened Time Display the time that the trap happened Desc Displays a description event recorded in the System Log Clear Clear log data 45 3 2 Port Configuration Four functions including Port Status Port Configuration Simple Counter and Detail Counter are contained in this function folder for port monitor and management Each of them will be described in detail orderly in the following sections Port Configuration Configuration Simple Counter Detail Counter 46 3 2 1 Port Configuration Port Configuration is applied to change the setting of each port In this configuration function you can set reset the following functions All of them are described in detail below Port Configuration Maximum Excessive F 9600 Auto S Discard Auto 960 Discard v 960 960 960 960 960 960 960 960 960 960 960 f f Auto Discard Auto Discard Auto Discard Auto Discard x Auto Discard Auta Discard 1 2 3 4 5 6 7 8 9 Auto Discard Auto Discard Auto Discard Auto Discard w o ee ee ee eee 50 5 55 5 15 5 15 5 Auto Discard Fig 3 12 Function name Port Configuration
112. e delay of wires devices must be within Round Trip Delay bit times in a half duplex network segment collision domain For full duplex operation this will not be applied You may use the TP Fiber module to extend the TP node distance over fiber optic and provide the long haul connection Typical Network Topology in Deployment A hierarchical network with minimum levels of switch may reduce the timing delay between server and client station Basically with this approach it will minimize the number of switches in any one path will lower the possibility of network loop and will improve network efficiency If more than two switches are connected in the same network select one switch as Level 1 switch and connect all other switches to it at Level 2 Server Host is recommended to connect to the Level 1 switch This is general if no VLAN or other special requirements are applied Case1 All switch ports are in the same local area network Every port can access each other See Fig 2 3 d gt 2 gt y Fig 2 3 No VLAN Configuration Diagram If VLAN is enabled and configured each node in the network that can communicate each other directly is bounded in the same VLAN area Here VLAN area is defined by what VLAN you are using The switch supports both port based VLAN and tag based VLAN They are different in practical deployment especially in physical location The following diagram shows how it works and what the differe
113. e unregistered EMPTY state Restricted Mode This function is used to restrict dynamic VLAN be created when this port received GVRP PDU There are two modes disable and enable provided for the user s choice Disabled In this mode the switch dynamic VLAN will be created when this port received GVRP PDU The default setting is Normal Enabled In this mode the switch does not create dynamic VLAN when this port received GVRP PDU Except received dynamic VLAN message of the GVRP PDU is an existed static VLAN in the switch this port will be added into the static VLAN members dynamically GVRP Configuration GYRP State Disabled v EIJ ER Leaveall Time Default Applicant Mode Default Registrar Mode Restricted Mode 1000 Normal Normal Disabled v 20 60 1000 Normal Normal 5 Disabled v Disabled v 20 60 1000 Normal _ Normal 20 60 1000 Normal Disabled v KE Normal 20 60 1000 Normal Normal Disabled is 20 60 1000 Normal Normal Disabled v 20 60 11000 Normal Normal Disabled v 20 60 1000 Normal Normal Disabled v 1 2 3 4 5 6 7 8 9 E RE 20 60 1000 Normal Normal Disabled 7 Disabled v 20 60 1000 Normal Normal 20 60 1000 Normal Normal Disabled v 20 60 1000 Normal Normal Disabled v 20 60 1000 Normal Normal Disabled v E E E R R
114. e value lt port range gt 1 to 24 lt tos range gt 0 to 7 lt class gt lor 0 Example SGR24i qos set tos 1 5 0 3 0 show Syntax show Description To display the information of the mode you choose Argument None Possible value None Example SGR24i qos show IP Diffserv Classification Default Class high DiffServ Class DiffServ Class DiffServ Class DiffServ Class 0 high 1 high 2 high J high 4 high 5 high 6 high 7 high 8 high 9 high 10 high 11 high 12 high 13 high 14 high 15 high 16 high 17 high 18 high 19 high 20 high 21 high 22 high 23 high 24 high 25 high 26 high 27 high 28 high 29 high 30 high 31 high 32 high 3D high 34 high 35 high 36 high 37 high 38 high 39 high 40 high 41 high 42 high 43 high 44 high 45 high 46 high 47 high 48 high 49 high 50 high Sil high 52 high 53 high 54 high 55 high 56 high Hi high 58 high 59 high 60 high 61 high 62 high 63 high 263 reboot reboot Syntax reboot Description To reboot the system Argument None Possible value None Example SGR24i reboot a snmp disable Syntax disable set ability disable snmp Description The Disable here is used for the de activation of snmp or set community Argument None Possible value None Example SGR24i snmp disable snmp SGR24i snmp disable set ability enable Syntax enable set ability enable snmp Description The Enable here is use
115. eTopology Change Count expresses the time spent in unit of seconds since the beginning of the Spanning Tree Topology Change to the end of the STP convergence Once there is no topology change occurring and no more topology change notification received the Topology Change count will be reset to 0 Port Status of Instance 0 Port naf Status A restricted Role Restricted Ton FORWARDING DSGN 20000 DISCARDING dsbl 2000000 a rie DISCARDING dsbl 2000000 128 2 2 DISCARDING dsbl 2000000 128 2 2 DISCARDING dsbl 2000000 128 2 2 DISCARDING dsbl 2000000 128 2 2 DISCARDING dsbl 2000000 128 2 2 DISCARDING dsbl 2000000 128 2 2 DISCARDING dsbl 2000000 128 2 2 DISCARDING dsbl 2000000 128 2 2 DISCARDING dsbl 2000000 128 2 2 DISCARDING dsbl 2000000 128 2 2 it a 3 4 a 6 7 8 9 eeceecccec ccc Fig 3 161 Port Status Parameter description Port No 1 24 Status The forwarding status Same definition as of the RSTP specification Possible values are FORWARDING LEARNING DISCARDING Status The role that a port plays in the spanning tree topology Possible values are dsbl disable port alt alternate port bkup backup port ROOT root port DSGN designated port MSTR master port The last 3 are possible port roles for a port to transit to FORWARDING state Path Cost Display currently resolved port path cost value for each port in a particular spanning tree instance P
116. eaes 8 INSTALLATION sccccsscssscssccscsscncssscncsssssccsescsscnsssssncssnssssessesssssessescsssssncssesssssessssoessesocsseses 9 2 1 1 Hardware and Cable Installation cece eee eee eee eee 9 2 1 2 Installing Chassis to a 19 Inch Wiring Closet Rail cceceeeeeee erene 11 2 1 3 Cabling Requirement 2 cece cece cece eee ene eee tates 11 2 1 4 Configuring the Management Agent of SGR24i cece eee e eee eee eae 16 2 1 5 IP Address Assignments sarrit cece eect eee een enter AEA 20 OPERATION OF WEB BASED MANAGEMENT scsssssssssssssssssscssseseesscesesssecsscesecesoees 27 3 1 WEB MANAGEMENT HOME OVERVIEW ccccccccececececececeecececcceccuccececeeeeeueueueeeueeeeeeeeeeeeesenes 29 3 1 1 System Information cece eect eee eee Ea a aE aa Naoi EEEE ip iei 32 3 1 2 Account Config ratig Mg seves n aa i e nents 34 3 1 3 Time Configuratio sesioa p a a A A A AA AERAR A 35 3 1 4 P Config rati Nieren aeaa EE A EAE OPRANE EDN ATTA 38 e o Keroro DA aao a E E ate ae ee ott ol 41 3 1 6 Management POliCy 0 nents 42 321217 SYS tE LOG aia nau avinuntc Hud AEE E eee erage haat ar octet 45 3 2 PORT CONFIGURATION vi csc04 2scevasscdgarksseaneviag iaiia wi nei iia Sean adevansctvasthatadaenssstagehtapenaeeetee 46 3 2 17 Port Configuration car e Ae E E E va ei A ee 47 3 2 2 Port StatUS ver a a a ves E A E AA AAA 49 network managers provide a description of device ports
117. ed its system settings after rebooting the system Restore User Configuration Are you sure you want to restore the User Configuration Fig 3 170 190 3 18 Config File Function name Config File Function description With this function user can back up or reload the configuration files of Save As Start or Save As User via TFTP Parameter description Export File Path Export Start Export Save As Start s config file stored in the flash Export User Conf Export Save As User s config file stored in the flash Import File Path Import Start Import Save As Start s config file stored in the flash Import User Conf Import Save As User s config file stored in the flash Export Configuration File Export Current Configuration File Import Start Configuration File Ea en Import User Configuration File Browse Import Fig 3 171 191 3 19 Diagnostics Three functions including Diagnostics Loopback Test and Ping Test are contained in this function folder for device self diagnostics Each of them will be described in detail orderly in the following sections Diagnostics Ping Test VeriPHY 3 19 1 Diag Function name Diagnostics Function description Diagnostics function provides a set of basic system diagnosis It let users know that whether the system is health or needs to be fixed The basic system check includes EEPROM test UART test DRAM test and
118. ense shall be governed by and construed pursuant to the laws of Taiwan If any portion hereof is held to be invalid or unenforceable the remaining provisions of this License shall remain in full force and effect Neither the License nor this Agreement is assignable or transferable by Licensee without AMER com s prior written consent any attempt to do so shall be void This License constitutes the entire License between the parties with respect to the use of the Software LICENSEE ACKNOWLEDGES THAT LICENSEE HAS READ THIS AGREEMENT UNDERSTANDS IT AND AGREES TO BE BOUND BY ITS TERMS AND CONDITIONS LICENSEE FURTHER AGREES THAT THIS AGREEMENT IS THE ENTIRE AND EXCLUSIVE AGREEMENT BETWEEN AMER COM AND LICENSEE DA Amer com Table of Contents GAUTIONS aie shee st oe E ee At etl ee Sh AAC te ale bee ea VII ELECTRONIC EMISSION NOTICES fantisera tati arita eaa a aE aE iE VII INTRODUCTION wiissccscasiiccissccssckcanssctceseasect cceicetasessesssacducetoncestatecbebcavaass kese esnetan esiosa 1 TT OVERVIEW OF SGR24 konnaa le natin aa aa aa ieee 1 LEANE EE EE TA A E E A nace ca aN 4 1 4 FULL VIEW OF SGR24 Iiiannai idian ievai kadia idrar eiii aaia eel eet ie da 6 1 4 1 User Interfaces on the Front Panel Button LEDs and Plugs 008 6 1 4 2 AC Power Input on the Rear Panel c ceceeeee eee eee eee teeter nates 7 1 5 VIEW OF THE OPTIONAL MODULES c cceeseeceeeeeceeeeeceaeeeeaeeseeeeeceaeeeeaaeeseaeeseeeeessaeeesaees
119. er the port you are using is set to be unauthorized Bridge _ LA ee i AN maa Pe Ga Radius Server i mm PC Port connect Access blocked EAPOL Start EAPOL Radius Authenticator EAP Request Identity Radius Access Request EAP Response ldentity Radius Access Challenge EAP Request Radius Access Request EAP Response cred EAP Success Radius Access Accept EAP Failure EAP Logoff Access allowed Fig 3 55 148 Only MultiHost 802 1X is the type of authentication supported in the switch In this mode for the devices connected to this port once a supplicant is authorized the devices connected to this port can access the network resource through this port 802 1 X Port based Network Access Control function supported by the switch is little bit complex for it just support basic Multihost mode which can distinguish the device s MAC address and its VID The following table is the summary of the combination of the authentication status and the port status versus the status of port mode set in 802 1X Port mode port control state set in 802 1X port setting Here Entry Authorized means MAC entry is authorized Port Mode Port Control Authentication Port Status Disable Don t Care Don t Care Port Uncontrolled Multihost Auto Successful Port Authorized Multihost Auto Failure Port Unauthorized Multihost ForceUnauthorized Don t Care Port Unautho
120. ess and DHCP please see the Section 2 1 5 IP Address Assignment in this manual Default Disable 38 IP address Users can configure the IP settings and fill in new values if users set the DHCP function Disable Then click lt Apply gt button to update When DHCP is disabled Default 192 168 1 1 If DHCP is enabled this field is filled by DHCP server and will not allow user manually set it any more Subnet mask Subnet mask is made for the purpose to get more network address because any IP device in a network must own its IP address composed of Network address and Host address otherwise can t communicate with other devices each other But unfortunately the network classes A B and C are all too large to fit for almost all networks hence subnet mask is introduced to solve this problem Subnet mask uses some bits from host address and makes an IP address looked Network address Subnet mask number and host address It is shown in the following figure This reduces the total IP number of a network able to support by the amount of 2 power of the bit number of subnet number 2 bit number of subnet number 32 bits Mh Host 1D Subnet number Subnet mask is used to set the subnet mask value which should be the same value as that of the other devices resided in the same network it attaches For more information please also see the Section 2 1 5 IP Address Assignment in this manual
121. et Trap Community Community name is used as password for authenticating if the requesting network management unit belongs to the same community group If they both don t have the same community name they don t belong to the same group Hence the requesting network management unit can not access the device with different community name via SNMP protocol If they both have the same community name they can talk each other Community name is user definable with a maximum length of 15 characters and is case sensitive There is not allowed to put any blank in the community name string Any printable character is allowable The community name for each function works independently Each function has its own community name Say the community name for GET only works for GET function and can t be applied to other function such as SET and Trap 101 Default SNMP function Enable Default community name for GET public Default community name for SET private Default community name for Trap public Default Set function Enable Default trap host IP address 0 0 0 0 Default port number 162 Trap In the switch there are 6 trap hosts supported Each of them has its own community name and IP address is user definable To set up a trap host means to create a trap manager by assigning an IP address to host the trap message In other words the trap host is a network management unit with SNMP manager receiving the trap message from the managed s
122. evices equipped with SNMP agent provided that the Management Information Base MIB is installed correctly on the managed devices The SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity OID of the management Information Base MIB described in the form of SMI syntax SNMP agent is running on the switch to response the request issued by SNMP manager Basically it is passive except issuing the trap information The switch supports a switch to turn on or off the SNMP agent If you set the field SNMP Enable SNMP agent will be started up All supported MIB OIDs including RMON MIB can be accessed via SNMP manager If the field SNMP is set Disable SNMP agent will be de activated the related Community Name Trap Host IP Address Trap and all MIB counters will be ignored Function name SNMP Configuration Function description This function is used to configure SNMP settings community name trap host and public traps as well as the throttle of SNMP A SNMP manager must pass the authentication by identifying both community names then it can access the MIB information of the target device So both parties must have the same community name Once completing the setting click lt Apply gt button the setting takes effect Parameters description SNMP The term SNMP here is used for the activation or de activation of SNMP Default is Enable Get S
123. expressed by hex and separated by hyphens For example 00 40 C7 D6 00 01 Port No Port number of the switch Itis 1 24 VID VLAN identifier This will be filled only when tagged VLAN is applied Valid range is 1 4094 Alias MAC alias name you assign Static Forward OO o e O CT S aas E Prop vac pot VID alos Bi 1 00 40 C7 D6 00 01 2 guest Fig 3 28 70 3 4 4 MAC Alias Function name MAC Alias Function description MAC Alias function is used to let you assign MAC address a plain English name This will help you tell which MAC address belongs to which user in the illegal access report At the initial time it shows all pairs of the existed alias name and MAC address There are three MAC alias functions in this function folder including MAC Alias Add MAC Alias Edit and MAC Alias Delete You can click lt Create Edit gt button to add modify a new or an existed alias name for a specified MAC address or mark an existed entry to delete it Alias name must be composed of A Z a z and 0 9 only and has a maximal length of 15 characters MAC Alias Create Edit se 00 40 C7 D6 00 02 admin 00 40 C7 D6 00 01 quest 00 40 C7 D6 00 03 john Fig 3 29 Parameter description MAC Address It is a six byte long Ethernet hardware address and usually expressed by hex and separated by hyphens For example 00 40 C7 D6 00 01 Alias MAC alias name y
124. fe e eeaeee reee en e 105 3 8 3 Access Control List Function name ACL Rate Limiter Configuration Function description The switch ACL function support up to 128 Access Control Entries ACEs using the shared 128 ACEs for ingress classification You can create an ACE and assign this ACE for each port with lt Any gt or assign this ACE for a policy or assign this ACE for a port There are 8 policies each port can select one of Permit Deny Rate Limitation and Port Copy actions would take according to the ACL configuration packet s IPv4 EtherType ARP Protocol MAC Parameters and VLAN parameters Parameter description Ingress Port Configurable Range Any Policy 1 8 Port 1 24 Any Apply this ACE rule for each port ingress classification Policy 1 8 Apply this ACE rule for specific policy Port 1 24 Apply this ACE rule for specific port ingress classification Access Control List Configuration Ingress Port Frame Type Action Port 1 Permit Any Any Permit Any Policy 1 Permit Any Insert an entry Edit this entry Rate Limiter Port Copy Auto refresh Counters Disabled Disabled Disabled 106 w oO a oO OOOO OO amp Move up this entry Move down this entry policy then decides which of the Refresh Clear ACE Config Ingress Port Rate Limiter Disabled v Port Copy Disabled Counter VLAN Parameters n Finer Ay
125. figuration 2 1 1 Hardware and Cable Installation At the beginning please do first Wear a grounding device to avoid the damage from electrostatic discharge Be sure that power switch is OFF before you insert the power cord to power source Installing Optional SFP Fiber Transceivers to the SGR24i Note If you have no modules please skip this section Fig 2 1 Installation of Optional SFP Fiber Transceiver Connecting the SFP Module to the Chassis The optional SFP modules are hot swappable so you can plug or unplug it before or after powering on 1 Verify that the SFP module is the right model and conforms to the chassis 2 Slide the module along the slot Also be sure that the module is properly seated against the slot socket connector 3 Install the media cable for network connection 4 Repeat the above steps as needed for each module to be installed into slot s 5 Have the power ON after the above procedures are done TP Port and Cable Installation gt In the switch TP port supports MDI MDI X auto crossover so both types of cable straight through Cable pin outs for RJ 45 jack 1 2 3 6 to 1 2 3 6 in 10 100M TP 1 2 3 4 5 6 7 8 to 1 2 3 4 5 6 7 8 in Gigabit TP and crossed over Cable pin outs for RJ 45 jack 1 2 3 6 to 3 6 1 2 can be used It means you do not have to tell from them just plug it Use Cat 5 grade RJ 45 TP cable to connect to a TP port of the switch and the
126. figuration wizard is finished and the new configuration is ready for use Click Finish to get more information Click Wizard Again to start the wizard again Fig 3 141 Set up Source MAC and Source IP Binding Access Control List Configuration Auto refresh Refresh Clear Ingress Port Frame Type Action Rate Limiter Port Copy Counters Port 2 SMAC SIP Binding 192 168 1 1 Permit Any Disabled Port 2 SMAC SIP Binding 00 00 00 00 00 10 Permit Any Disabled Any Any Permit Any Disabled Fig 3 142 Set up Source MAC and Source IP Binding Finish Parameter description Port 1 24 Binding Enabled Use the switch ACL function to support IP MAC Binding function the maximum is up to 128 entries Source MAC Address xx xx XX XX XX XX For example 00 40 c7 00 00 01 Source IP Address xxx xxx XXX XXX For example 192 168 1 100 142 3 9 IP MAC Binding The IP network layer uses a four byte address The Ethernet link layer uses a six byte MAC address Binding these two address types together allows the transmission of data between the layers The primary purpose of IP MAC binding is to restrict the access to a switch to a number of authorized users Only the authorized client can access the Switch s port by checking the pair of IP MAC Addresses and port number with the pre configured database If an unauthorized user tries to access an IP MAC binding enabled port the system will block the access by droppin
127. force the port to transmit RST BPDUs Argument lt range gt syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 to 24 Example SGR24i stp Mcheck 1 8 disable Syntax disable Description To disable the STP function Argument None Possible value None Example SGR24i stp disable enable Syntax enable Description To enable the STP function Argument None Possible value None Example SGR24i stp enable 266 set config Syntax set config lt Bridge Priority gt lt Hello Time gt lt Max Age gt lt Forward Delay gt Description To set up the parameters of STP Argument lt Bridge Priority gt priority must be a multiple of 4096 available from 0 to 61440 lt Hello Time gt available from 1 to 10 lt Max Age gt available from 6 to 40 lt Forward Delay gt available from 4 to 30 Note 2 Forward Delay 1 gt Max Age Max Age gt 2 Hello Time 1 Possible value lt Bridge Priority gt 0 to 61440 lt Hello Time gt 1 to 10 lt Max Age gt 6 to 40 lt Forward Delay gt 4 to 30 Example SGR24i stp set config 61440 2 20 15 set port Syntax set port lt range gt lt path cost gt lt priority gt lt edge_port gt lt admin p2p gt Description To set up the port information of STP Argument lt range gt syntax 1 5 7 available from 1 to 24 lt path cost gt 0 1 200000000 The value zero means auto status lt priority gt
128. g its packet Function name IP MAC Binding Configuration Function description The switch has client and server two classes of IP MAC Binding table The maximum number of IP MAC binding client table is 512 entries The maximum number of IP MAC Binding server table is 64 entries The creation of authorized users can be manually The function is global this means a user can enable or disable the function for all ports on the switch Parameters description State Disabled Enabled Time Interval Range 10 20 30 Time interval is for ARP echo the switch will according to server table entries to send ARP echo Server Client The maximum number of IP MAC binding client table is 512 entries The maximum number of IP MAC Binding server table is 64 entries MAC Six byte MAC Address xx xx xXx xX XX XX For example 00 40 c7 00 00 01 Four byte IP Address xxx Xxx XXX XXX For example 192 168 1 100 Port No Port no 1 24 VID VLAN ID 1 4094 Add Input MAC IP Port and VID then click on lt Add gt to create a new entry into the IP MAC Binding table Delete 143 Select one of entry from the table then click on lt Delete gt to delete this entry IP MAC Binding Configuration State Disabled seconds Apply Serer v TC f oeno o ovo PE Add Prop mace ort vi Fig 3 143 144 3 10 802 1X Configuration 802 1 X port based netwo
129. gt lt value gt lt type gt lt value gt lt action gt lt value gt Synopsis set name Mary vid 20 ip 192 168 1 1 192 168 1 90 port 2 5 8 type h s actiona Synopsis set name Mary vid 20 ip 192 168 1 1 192 168 1 90 Description To save the adding management policy records When you don t know how to set the management policy records you can use this command as follows SGR24i management add set This command will show exhaustive operating explanation for setting the management policy records Argument lt name gt lt value gt lt vid gt lt value gt lt ip gt lt value gt lt port gt lt value gt lt type gt lt value gt lt action gt lt value gt Possible value lt name gt lt value gt lt vid gt lt value gt lt ip gt lt value gt lt port gt lt value gt lt type gt lt value gt lt action gt lt value gt Example ACL entry name VLAN ID IP range Incoming port Access type a ccept or d eny No default and it must be set The range is 1 4095 and can be set to any For example 192 168 1 90 192 168 1 90 or any For example 1 or 1 8 or 1 3 5 or any For example h ttp s nmp t elnet or any No default and it must be set SGR24i management add set name Mary vid 20 ip 192 168 1 1 192 168 1 90 port 2 5 8 type h s action a SGR24i management add show 1 Name Mary Type Http SNMP VlanID 20 IP 192 168 1 1 192 168 1 90 Action
130. guration wizard is finished and the new configuration is ready for use Click Finish ta get more information Click Wizard Again to start the wizard again Fig 3 47 Set up Port Policies Parameter description Wizard Again Click on the lt Wizard Again gt back to QCL Configuration Wizard Finish When you click on lt Finish gt the parameters will be set according to the wizard configuration and shown on the screen then ask you to click on lt Apply gt for changed parameters confirmation 92 Port QoS Configuration Number of Classes 4 Port Default Class cole i User Priority Queuing Mode Queue Weighted Low Normal Medium High Low Strict Priority lt lt Low Strict Priority Y Strict Priority Strict Priority Strict Priority Strict Priority Y SSS aaa Strict Priority Strict Priority x TEMAS EASES lo Strict Priority v is Fig 3 48 Set up Port Policies Finish Set up Typical Network Application Rules Set up the specific QCL for different typical network application quality control by selecting the network application type for your rule o Audio and Video QuickTime 4 Server MSN Messenger Phone Yahoo Messenger Phone Napster Real Audio o Games Blizzard Battlenet Diablo2 and StarCraft Fighter Ace II MSN Game
131. h support four QoS queues per port with strict or weighted fair queuing scheduling There are 24 QoS Control Lists QCL for advance programmable QoS classification based on IEEE 802 1p Ether Type VID IPv4 IPv6 DSCP and UDP TCP ports and ranges QoS Control List Configuration QCL fi x QCE Type Type Value Traffic Class Ethernet Type Oxffff Low VLAN ID 1 UDP TCP Port 0 65535 DSCP 63 DSCP ToS Tag Priority SOE Fig 3 35 Insert an entry Move up this entry Delete this entry Edit this entry Move down this entry QCE Configuration The QCL consists of 12 QoS Control Entries QCEs that are searched from the top of the list to the bottom of the list for a match The first matching QCE determines the QoS classification of the frame The QCE ordering is therefore 82 important for the resulting QoS classification algorithm If no matching QCE is found the default QoS class is used in the port QoS configuration QCE Configuration QCE Type Ethernet Type Ethernet Type Value Ox Traffic Class Fig 3 36 QCE Configuration QCE Type VLAN ID Traffic Class QCE Configuration o less Fig 3 38 QCE Configuration QCE Type UDP TCP Port UDP TCP Port Specific Y TCP UDP Port No Traffic Class Fig 3 39 83 QCE Configuration Fig 3 40 QCE Configuration Fig 3 41 QCE Configuration Normal Low v Medium Y
132. he administrator or the status of MAC operation for the attached LANs transitions frequently Mcheck The same definition as in the RSTP specification for the CIST ports Instance Status ID 0 Enabled RSTP 20 Bridge Forward Delay Bridge Max Hops Instance Priority Bridge Mac Address CIST ROOT PRIORITY CIST ROOT MAC T EXTERNAL ROOT PATH COST CIST ROOT PORT ID CIST REGIONAL ROOT PRIORITY CIST REGIONAL ROOT MAC CIST INTERNAL ROOT PATH COST CIST CURRENT MAX AGE CIST CURRENT FORWARD DELAY TIME SINCE LAST TOPOLOGY CHANGE SECs O olni z mi alel nw alz foi en sej zju ES E l3 ball 9 Nd gt ele 15 20 32768 00 40 c7 01 02 33 32768 00 40 c7 01 02 33 0 0 32768 00 40 c7 01 02 33 0 20 15 0 TOPOLOGY CHANGE COUNT SECs Fig 3 160 Instance Status Parameter description MSTP State MSTP protocol is Enable or Disable Force Version It shows the current spanning tree protocol version configured 176 Bridge Max Age It shows the Max Age setting of the bridge itself Bridge Forward Delay It shows the Forward Delay setting of the bridge itself Bridge Max Hops It shows the Max Hops setting of the bridge itself Instance Priority Spanning tree priority value for a specific tree instance CIST or MSTI Bridge Mac Address The Mac Address of the bridge itself CIST ROOT PRIORITY Spanning tree priority value of the CIST root bridge CIST ROOT MAC Mac Address of the CIST root
133. he function providing the VLAN registration service through a GARP application It makes use of GARP Information Declaration GID to maintain the ports associated with their attribute database and GARP Information Propagation GIP to communicate among switches and end stations With GID information and GIP GVRP state machine maintain the contents of Dynamic VLAN Registration Entries for each VLAN and propagate these information to other GVRP aware devices to setup and update their knowledge database the set of VLANs associated with currently active members and through which ports these members can be reached In GVRP Configuration function folder there are three functions supported including GVRP Config GVRP Counter and GVRP Group explained below 73 3 5 1 Config Function name GVRP Configuration Function description In the function of GVRP Config it is used to configure each ports GVRP operation mode in which there are seven parameters needed to be configured described below Parameter description GVRP State This function is simply to let you enable or disable GVRP function You can pull down the list and click the lt Downward gt arrow key to choose Enable or Disable Then click the lt Apply gt button the system will take effect immediately Join Time Used to declare the Join Time in unit of centisecond Valid time range 20 100 centisecond Default 20 centisecond Leave Time Used to decl
134. he initial value of this timer is either suppTimeout or serverTimeout as determined by the operation of the Backend Authentication state machine Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt sec gt timer range 1 65535 Possible value lt port range gt 1 to 24 lt sec gt 1 65535 default is 30 Example SGR24i 802 1X set serverTimeout 2 30 set state Syntax set state lt ip gt lt port number gt lt secret key gt Description To configure the settings related with 802 1 X Radius Server 208 Argument lt ip gt the IP address of Radius Server lt port number gt the service port of Radius Server Authorization port lt secret key gt set up the value of secret key and the length of secret key is from 1 to 31 Possible value lt port number gt 1 65535 default is 1812 Example SGR24i 802 1X set state 192 168 1 115 1812 WinRadius set suppTimeout Syntax set suppTimeout lt port range gt lt sec gt Description A timer used by the Backend Authentication state machine in order to determine timeout conditions in the exchanges between the Authenticator and the Supplicant or Authentication Server The initial value of this timer is either suppTimeout or serverTimeout as determined by the operation of the Backend Authentication state machine Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt sec gt timer range 1 65535 Possible val
135. ination MAC address is equal DMAC address under MAC parameter setting IP Ethernet Length Range Any 0 1 Any Both 0 and 1 0 The ingress ARP PARP frames where the Hardware size is not equal 0x6 or the Protocol size is not equal 0x4 The ingress ARP PARP frames where the Hardware size is equal 0x6 and the Protocol size is 0x4 IP Range Any 0 1 Any Both 0 and 1 0 The ingress ARP PARP frames where Protocol type is not equal 0x800 1 The ingress ARP PARP frames where Protocol type is equal 0x800 Ethernet Range Any 0 1 Any Both 0 and 1 0 The ingress ARP PARP frames where Hardware type is not equal 0x100 The ingress ARP PARP frames where Hardware type is equal 0x100 IP Parameters When Frame Type IPv4 and IP Protocol Filter Any IPTTL Time To Live How many routers a datagram can pass through Each router decrements this value by 1 until it reaches 0 when the datagram is discarded This keeps misrouted datagrams from remaining on the Internet forever 128 Range Any Non zero Zero Any Including all conditions for IPTTL Non Zero Including IPTTL is Non Zero Zero Including IPTTL is zero IP Fragment IP Fragmentation Flag Controls datagram fragmentation together with the identification field The flags indicate whether the datagram may be fragmented whether the datagram is fragmented and whether the current fragment is the final one Range Any Yes No Any Including all
136. iod the media may be returned to AMER com and then AMER com will replace the media AMER com shall not be responsible for the replacement of media if the failure of the media results from accident abuse or misapplication of the media EXCLUSIONS The warranty as mentioned above does not apply to the Software which 1 customer does not comply with the manual instructions offered by AMER com in installation operation or maintenance 2 Product fails due to damage from unusual external or electrical stress shipment storage accident abuse or misuse 3 Product is used in an extra hazardous environment or activities 4 any serial number on the Product has been removed or defaced or 5 this warranty will be of no effect if the repair is via anyone other than AMER com or the authorized agents The maximum liability of AMER com under this warranty is confined to the purchase price of the Product covered by this warranty DISCLAIMER EXCEPT AS PROVIDED ABOVE THE SOFTWARE IS PROVIDED AS IS AND AMER COM AND ITS LICENSORS MAKE NO WARRANTIES EXPRESS OR IMPLIED WITH REPSECT TO THE SOFTWARE AND DOCUMENTAITON AMER COM AND ITS LICENSORS DISCLAIM ALL OTHER WARRANTIES INCLUSIVE OF WITHOUT LIMITATION IMPLIED WARRANTIES OR MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT FURTHER AMER COM DOES NOT WARRANT GUARANTEE OR MAKE ANY REPRESENTATIONS REGARDING THE USE OR THE RESULTS OF THE USE OF THE SOFTWARE OR RELATED WRITTEN DOCUM
137. ion Multiplexing WDM technology that transports bi directional full duplex signal over a single fiber simultaneously For upgrading firmware please refer to the Section 3 21 or Section 4 2 2 for more details The switch will not stop operating while upgrading firmware and after that the configuration keeps unchanged e Key Features in the Device Qos Support Quality of Service by the IEEE 802 1P standard There are two priority queue and packet transmission schedule Spanning Tree Support IEEE 802 1D IEEE 802 1w RSTP Rapid Spanning Tree Protocol standards VLAN Support Port based VLAN and IEEE802 1Q Tag VLAN Support 256 active VLANs and VLAN ID 1 4094 Port Trunking Support static port trunking and port trunking with IEEE 802 3ad LACP Bandwidth Control Support ingress and egress per port bandwidth control Port Security Support allowed denied forwarding and port security with MAC address SNMP RMON SNMP agent and RMON MIB In the device SNMP agent is a client software which is operating over SNMP protocol used to receive the command from SNMP manager server site and echo the corresponded data i e MIB object Besides SNMP agent will actively issue TRAP information when happened RMON is the abbreviation of Remote Network Monitoring and is a branch of the SNMP MIB The device supports MIB 2 RFC 1213 Bridge MIB RFC 1493 RMON MIB RFC 1757 statistics Group 1 2 3 9 Ethernet like MIB RFC
138. ion with the remote device is good SFP LINK ACT Green Blinks when any traffic is present Off when module connection is not good Table1 1 Green 10 100 1000Mbps Amber 1 4 2 AC Power Input on the Rear Panel One socket on the rear panel is for AC power input AC Line 100 240V 50 60 Hz Fig 1 3 Rear View of SGR24i 1 5 View of the Optional Modules In the switch Port 21 24 includes two types of media TP and SFP Fiber LC BiDi LC this port supports 10 100 1000Mbps TP or 1000Mbps SFP Fiber with auto detected function 1000Mbps SFP Fiber transceiver is used for high speed connection expansion the following are optional SFP types provided for the switch 1000Mbps LC MM SFP Fiber transceiver SFP OLC 202 1000Mbps LC SM 10km SFP Fiber transceiver SFP OLC 212 10 1000Mbps LC SM 30km SFP Fiber transceiver SFP OLC 212 30 1000Mbps LC SM 50km SFP Fiber transceiver SFP OLC 212 50 1000Mbps BiDi LC type 1 SM 20km SFP Fiber WDM transceiver SFP OBL 621 201 1000Mbps BiDi LC type 2 SM 20km SFP Fiber WDM transceiver SFP OBL 621 202 1000Mbps LC SM 10km SFP Fiber transceiver with DDM SFP DLC 212 10 Fig 1 5 Front View of 1000Base LX BiDi LC SFP Fiber Transceiver 2 Installation 2 1 Starting SGR24i Up This section will give users a quick start for Hardware and Cable Installation Management Station Installation Software booting and con
139. is port can both contribute its learning knowledge and forward packets normally Path Cost Status It is the contribution value of the path through this port to Root Bridge STP algorithm determines a best path to Root Bridge by calculating the sum of path cost contributed by all ports on this path A port with a smaller path cost value would become the Root Port more possibly Configured Path Cost The range is 0 200 000 000 In the switch if path cost is set to be zero the STP will get the recommended value resulted from auto negotiation of the link accordingly and display this value in the field of Path Cost Status Otherwise it may show the value that the administrator set up in Configured Path Cost and Path Cost Status 167 802 1w RSTP recommended value Valid range 1 200 000 000 10 Mbps 2 000 000 100 Mbps 200 000 1 Gbps 20 000 Default 0 Priority Priority here means Port Priority Port Priority and Port Number are mixed to form the Port ID Port IDs are often compared in order to determine which port of a bridge would become the Root Port The range is 0 240 Default is 128 Admin Edge Port If user selects Yes this port will be an edge port An Edge Port is a port connected to a device that knows nothing about STP or RSTP Usually the connected device is an end station Edge Ports will immediately transit to forwarding state and skip the listening and learning state because the edge
140. is provide 4 type of typical application for user easy to configure their application with ACL function Parameter description Please select an Action Set up Policy Rules Set up Port Policies Set up Typical Network Application Rules Set up Source MAC and Source IP Binding Next 134 Click on lt Next gt to confirm current setting and go to next step automatically Cancel Cancel current setting back to top layer in the ACL wizard function Back Click on lt Back gt to back to previous step Wizard Again Click on lt Wizard Again gt the UI will back to top layer in the wizard function Finish Click in lt Finish gt to finish the ACL Wizard setting it will according the selection items to change the related parameters then you have to click on lt Apply gt to confirm the all changed parameters setting Welcome to the ACL Configuration Wizard Please select an action Set up Policy Rules Set up the default policy rules for Client ports Server ports Network ports and Guest ports Set up Port Policies Group ports into several types according to different ACL policies Set up Typical Network Application Rules Set up the specific ACL for different typical network application access control Set up Source MAC and Source IP Binding Strictly control the network traffic by only allowing incoming frames that match the source MAC and source IP on specific ports To continue click Next Fig 3
141. k or a CIDR block The subnet is used to determine how to split an IP address to the network prefix and the host address in bitwise basis It is designed to utilize IP address more efficiently and ease to manage IP network For a class B network 128 1 2 3 it may have a subnet mask 255 255 0 0 in default in which the first two bytes is with all 1s This means more than 60 thousands of nodes in flat IP address will be at the same network It s too large to manage practically Now if we divide it into smaller network by extending network prefix from 16 bits to say 24 bits that s using its third byte to subnet this class B network Now it has a subnet mask 255 255 255 0 in which each bit of the first three bytes is 1 It s now clear that the first two bytes is used to identify the class B network the third byte is used to identify the subnet within this class B network and of course the last byte is the host number Not all IP address is available in the sub netted network Two special addresses are reserved They are the addresses with all zero s and all one s host number For example an IP address 128 1 2 128 what IP address reserved will be looked like All OS mean the network itself and all 1s mean IP broadcast Network Subnet All Os 128 1 2 128 0000000 All 1s 128 1 2 255 1 9111111 22 In this diagram you can see the subnet mask with 25 bit long 255 255 255 128 contains 126 members in the sub netted network A
142. l VLAN ID The configurable VID range 1 4094 UDP TCP Port To select the UDP TCP port classification method by Range or Specific UDP TCP Port Range The configurable ports range 0 65535 You can refer to following UDP TCP port numbers information http Awww iana org assignments port numbers UDP TCP Port No The configurable specific port value 0 65535 DSCP Value The configurable DSCP value 0 63 Traffic Class Low Normal Medium High 86 3 6 3 Rate Limiters Function name Rate Limit Configuration Function description Each port includes an ingress policer and an egress shaper which can limit the bandwidth of received and transmitted frames Ingress policer or egress shaper operation is controlled per port in the Rate Limit Configuration Rate Limit Configuration Policer Policer Policer Shaper Shaper Shaper Port Enabled Rate Unit Enabled Rate Unit oo nwronket WN S S SNS SSNS SSS SNL SH SSS SS SNS SH SS LS GRR atatsaaats dl O O Ei oO 0 oO 0 O Fi oO Pi oO ad Fig 3 43 Parameter description Port Port number Policer Enabled Policer enabled to limit ingress bandwidth by policer rate Policer Rate The configurable policer rate range 500 Kbps 1000000 Kbps 1 Mbps
143. le SGR24i port enable state 3 12 set speed duplex Syntax set speed duplex lt range gt lt auto 1Ohalf 1 Ofull 1 0Ohalf 1 0Ofull 1 Gfull gt Description To set up the speed and duplex of all ports Argument lt range gt syntax 1 5 7 available from 1 to 24 lt port speed gt auto set auto negotiation mode 10half set soeed duplex 10M Half 10full set speed duplex 10M Full 100half set soeed duplex 100M Half 100full set speed duplex 100M Full 1Gfull set soeed duplex 1G Full Possible value lt range gt 1 to 24 lt port speed gt auto 10half 10full 100half 100full 1Gfull Example SGR24i port set speed duplex 5 auto 257 show conf Syntax show conf Description To display the each port s configuration about state soeed duplex and flow control Argument None Possible value None Example SGR24i port show conf show detail counter Syntax show detail counter lt gt Description To display the detailed counting number of each port s traffic Argument lt gt port available from 1 to 24 Possible value lt gt 1 24 Example SGR24i port show detail counter 5 show sfp Syntax show sfp lt port gt Description To display the SFP module information Argument lt port gt SFP port of the switch available from 21 24 Possible value lt port gt 21 22 23 24 Example SGR24i port show sfp 23 258 Port 23 SFP
144. le from 1 to 24 lt normal gt set applicant as normal mode lt non participant gt set applicant as non participant mode Possible value lt range gt 1 to 24 lt normal non participant gt normal or non participant Example SGR24i gvrp set applicant 1 10 non participant set registrar Syntax set registrar lt range gt lt normal fixed forbidden gt Description To set default registrar mode for each port Argument lt range gt port range syntax 1 5 7 available from 1 to 24 lt normal gt set registrar as normal mode lt fixed gt set registrar as fixed mode lt forbidden gt set registrar as forbidden mode Possible value lt range gt 1 to 24 lt normal fixed forbidden gt normal or fixed or forbidden Example SGR24i gvrp set registrar 1 5 fixed 234 set restricted Syntax set restricted lt range gt lt enable disable gt Description To set the restricted mode for each port Argument lt range gt port range syntax 1 5 7 available from 1 to 24 lt enable gt set restricted enabled lt disable gt set restricted disabled Possible value lt range gt 1 to 24 lt enable disable gt enable or disable Example SGR24i gvrp set restricted 1 10 enabl SGR24i gvrp show config GVRP state Enable Port Join Time Leave Time LeaveAll Time Applicant Registrar Restricted 1 20 60 1000 ormal ormal Enable 2 20 60 1000 ormal ormal Enable 3 20 6
145. lt port gt set port based vlan lt metro gt set metro mode vian lt double tag gt enable Q in Q function lt up link gt syntax 1 5 7 available from 23 to 24 only for metro mode vlan Possible value lt disable port tag metro double tag gt disable port tag metro double tag up link 21 22 23 or 24 or 23 24 Example SGR24i vlan set mode port set port group Syntax set port group lt name gt lt range gt Description To add or edit a port based VLAN group Argument lt name gt port vlan name lt range gt syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 to 24 Example SGR24i vlan set port group VLAN 1 2 5 6 15 13 281 set port role Syntax set port role lt range gt lt access trunk hybrid gt vid Description To set egress rule configure the port roles Argument lt range gt which port s you want to set syntax 1 5 7 available from 1 to 24 lt access gt Do not tag frames lt trunk gt Tag all frames lt hybrid gt Tag all frames except a specific VID lt vid gt untag vid for hybrid port Possible value lt range gt 1 to 24 lt vid gt 1 to 4094 Example SGR24i vlan set port role 5 hybrid 6 set pvid Syntax set pvid lt range gt lt pvid gt Description To set the pvid of vlan Argument lt range gt which port s you want to set PVID s syntax 1 5 7 available from 1 to 24 lt pvid gt which PVID s you want t
146. m VLAN GVRP SNMP IP MAC Binding Trunk MSTP IGMP Save Restore Diagnostics Logout Port MAC QoS ACL 802 1X STP Mirroring Alam Export Import Maintenance 3 1 1 System Information Function name System Information Function description Show the basic system information Parameter description Model name The model name of this device System description As it is this tells what this device is Here it is L2 Plus Managed Switch Location Basically it is the location where this switch is put User defined Contact For easily managing and maintaining device you may write down the contact person and phone here for getting help soon You can configure this parameter through the device s user interface or SNMP Device name The name of the switch User defined Default is SGR24i System up time The time accumulated since this switch is powered up Its format is day hour minute second Current time Show the system time of the switch Its format day of week month day hours minutes seconds year For instance Wed Apr 23 12 10 10 2004 BIOS version The version of the BIOS in this switch Firmware version The firmware version in this switch Hardware Mechanical version The version of Hardware and Mechanical The figure before the hyphen is the version of electronic hardware the one after the hyphen is the version of mechanical Serial number
147. me Each data field has 20 digit long If the counting is overflow the counter will be reset and restart counting The data is updated every time interval defined by the user The Refresh Interval is used to set the update frequency Port Statistics Overview Auto refresh 0 e Receive Transmit Receive Transmit Receive Transmit Receive Transmit 11778 5038 1951926 1544509 ko eo IN A a le w N e ji IN cooocoocoocoecoocoecoocecoeoce oooooooocoocoeccoooocoosn cooooooooccooocococooeococoosn goooeceooeeccoeecoeoceecoeos 0 0 0 0 0 0 0 0 0 ii 0 0 0 0 0 0 0 0 0 0 cooocoeoooooceoocooecocoeocae cooooccooceceooecoccooeece goooeocoeoooeoeccoeoooeccoeeca dl meld lel mel eel nell ad Biki ll Ie Fig 3 15 Function name Simple Counter Function description Display the summary counting of each port s traffic including Tx Byte Rx Byte Tx Packet Rx Packet Tx Collision and Rx Error Packet Parameters description Packet Transmit The counting number of the packet transmitted Receive The counting number of the packet received Bytes Transmit Total transmitted bytes Receive Total received bytes 53 Error Transmit Number of bad packets transmitted Receive Number of bad packets received Drops Transmit Number of packets transmitted drop Receive Number of packets received drop Auto refresh The simple counts will be refreshed automa
148. ment point of view the switch supports maximum 8 trunk groups for LACP and additional 8 trunk groups for Static Trunk But in the system capability view only 8 real trunked groups are supported An LACP trunk group with more than one ready member ports is a real trunked group An LACP trunk group with only one or less than one ready member ports is not a real trunked group Any Static trunk group is a real trunked group 157 Per Trunking Group supports a maximum of 12 ready member ports Please note that some decisions will automatically be made by the system while you are configuring your trunking ports Some configuration examples are listed below a 12 ports have already used Static Trunk Group ID 1 the 13th port willing to use the same Static Trunk Group ID will be automatically set to use the None trunking method and its Group ID will turn to 0 This means the port won t aggregate with other ports b 14 ports all use LACP Trunk Group ID 1 at most 12 ports can aggregate together and transit into the ready state c A port using the None trunking method or Group ID 0 will be automatically set to use the None trunking method with Group ID 0 158 3 11 1 Port Function name Trunk Port Setting Status Function description Port setting status is used to configure the trunk property of each and every port in the switch system Parameter description Port Port Number 1 24 Method This
149. ministrator is associated with a VLAN group Valid letters are A Z a z 0 9 and _ characters The maximal length is 15 characters Member Port This is used to enable or disable if a port is a member of the new added VLAN Enable means it is a member of the VLAN Just tick the check box MI beside the port x to enable it Port Based VLAN Memberships Configuration VLAN Name Port Members Delete Group A E 4 S66 F 8 PO S e ae E e E e e e FAE 18 19 20 21 22 23 24 123 4 6 7 6 7 8 9 AG 11 12 13 TA 1516 17 18 19 20 21 22 23 24 Fig 3 21 Add new VLAN Create a new Port based VLAN Input the VLAN name and choose the member by ticking the check box beside the port No then press the lt Apply gt button to have the setting taken effect Create VLAN Group 2 VLAN Name 2 ear as lsh edl SF ful Shia ei la cla S aid 13 0 14 0 15 0 16 0 17 0 18 0 19 0 20 0 21 4 22 4 23 24 Fig 3 22 Delete Group 62 Just press the lt Delete gt button to remove the selected group entry from the Port based group table Port Based VLAN Memberships Configuration VLAN Name Port Members Delete Group 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 en Detant 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 21 22 23 24 Fig 3 23 63 3 3 4 Ports Function name VLAN Port Configuration Function description In VLAN Tag Rule Setting user ca
150. mode Fiber 9 125um Single mode transceiver 1310nm 10Km 1000Base LX LHX XD ZX Single mode transceiver 1550nm 30 50Km TX Transmit 1310nm Single Mode 1000Base LxX 20Km RX Receive 1550nm Single Fiber 21101 K0 Single Mode TX Transmit 1550nm 20Km RX Receive 1310nm Table2 1 2 1 3 3 Switch Cascading in Topology Takes the Delay Time into Account Theoretically the switch partitions the collision domain for each port in switch cascading that you may up link the switches unlimitedly In practice the network extension cascading levels amp overall diameter must follow the constraint of the IEEE 802 3 802 3u 802 3z and other 802 1 series protocol specifications in which the limitations are the timing requirement from physical signals defined by 802 3 series specification of Media Access Control MAC and PHY and timer from some OSI layer 2 protocols such as 802 1d 802 1q LACP and so on The fiber TP cables and devices bit time delay round trip are as follows 1000Base X TP Fiber 100Base TX TP 100Base FX Fiber Round trip Delay 512 1 12 m Fiber Cable TP to fiber Converter 56 Round trip Delay 4096 Cat 5 TP Wire 11 12 m Cat 5 TP Wire Fiber Cable 10 10 m Bit Time unit 1ns 1sec 1000 Mega bit Bit Time unit 0 01us 1sec 100 Mega bit Table 2 2 Sum up all elements bit time delay and the overall bit tim
151. n input VID number to each port The range of VID number is from 1 to 4094 User also can choose ingress filtering rules to each port There are two ingress filtering rules which can be applied to the switch The Ingress Filtering Rule 1 is forward only packets with VID matching this ports configured VID The Ingress Filtering Rule 2 is drop untagged frame You can also select the Role of each port as Access Trunk or Hybrid Parameter description Port 1 24 Port number VLAN Aware Based on IEEE 802 1Q VLAN tag to forward packet Ingress Filtering Discard other VLAN group packets only forward this port joined VLAN group packets Frame Type All Forward all tagged and untagged packets Tagged Forward tagged packets only and discard untagged packets PVID This PVID range will be 1 4094 Before you set a number x as PVID you have to create a Tag based VLAN with VID x For example if port x receives an untagged packet the switch will apply the PVID assume as VID y of port x to tag this packet the packet then will be forwarded as the tagged packet with VID y Role This is an egress rule of the port Here you can choose Access Trunk or Hybrid Trunk means the outgoing packets must carry VLAN tag header Access means the outgoing packets carry no VLAN tag header If packets have double VLAN tags one will be dropped and the other will still be left As to Hybrid it is similar to Trunk and both of them will tag ou
152. nce they are Case2a Port based VLAN See Fig 2 4 Fig 2 4 Port based VLAN Diagram 1 The same VLAN members could not be in different switches 2 Every VLAN members could not access VLAN members each other 3 The switch manager has to assign different names for each VLAN groups at one switch Case 2b Port based VLAN See Fig 2 5 Fig 2 5 Port based VLAN Diagram _ VLAN1 members could not access VLAN2 VLAN3 and VLAN4 members 2 VLAN2 members could not access VLAN1 and VLAN3 members but they could access VLAN4 members 3 VLAN3 members could not access VLAN1 VLAN2 and VLAN4 4 VLAN4 members could not access VLAN1 and VLAN3 members but they could access VLAN2 members Case3a The same VLAN members can be at different switches with the same VID See Fig 2 6 Fig 2 6 Attribute based VLAN Diagram 2 1 4 Configuring the Management Agent of SGR24i We offer you three ways to startup the switch management function They are RS 232 console CLI and Web Users can use any one of them to monitor and configure the switch You can touch them through the following procedures Section 2 1 4 1 Configuring the Management Agent of SGR24i through the Serial RS 232 Port Section 2 1 4 2 Configuring the Management Agent of SGR24i through the Ethernet Port Note Please first modify the IP address Subnet mask Default gateway and DNS through RS 232 console and then do the next
153. nd ports of any MSTI Hello Time 1 2 In contrast with RSTP Hello Time in MSTP is a per port setting for the CIST Admin Edge Yes No The same definition as in the RSTP specification for the CIST ports Admin P2P Auto True False The same definition as in the RSTP specification for the CIST ports Restricted Role 175 Yes No If Yes causes the Port not to be selected as Root Port for the CIST or any MSTI even it has the best spanning tree priority vector Such a Port will be selected as an Alternate Port after the Root Port has been selected This parameter is No by default If set it can cause lack of spanning tree connectivity It is set by a network administrator to prevent bridges external to a core region of the network influencing the spanning tree active topology possibly because those bridges are not under the full control of the administrator Restricted TCN Yes No If Yes causes the Port not to propagate received topology change notifications and topology changes to other Ports This parameter is No by default If set it can cause temporary loss of connectivity after changes in a spanning trees active topology as a result of persistent incorrectly learned station location information It is set by a network administrator to prevent bridges external to a core region of the network causing address flushing in that region possibly because those bridges are not under the full control of t
154. network administrator can logon the switch to monitor configure and control each port s activity in a friendly way The overall network management is enhanced and the network efficiency is also improved to accommodate high bandwidth applications In addition the switch features comprehensive and useful function such as ACL IP MAC Binding DHCP Option 82 QoS Quality of Service Spanning Tree VLAN Port Trunking Bandwidth Control Port Security SNMP RMON IGMP Snooping capability via the intelligent software It is suitable for both metro LAN and office application this switch Port 21 and Port 24 include two types of media TP and SFP Fiber LC BiDi LC this port supports 10 100 1000Mbps TP or 1000Mbps SFP Fiber with auto detected function 1000Mbps SFP Fiber transceiver is used for high speed connection expansion 1000Mbps LC Multi Mode SFP Fiber transceiver 1000Mbps LC 10km SFP Fiber transceiver 1000Mbps LC 30km SFP Fiber transceiver 1000Mbps LC 50km SFP Fiber transceiver 1000Mbps BiDi LC 20km 1550nm SFP Fiber WDM transceiver 1000Mbps BiDi LC 20km 1310nm SFP Fiber WDM transceiver 10 100 1000Mbps TP is a standard Ethernet port that meets all IEEE 802 3 u x z Gigabit Fast Ethernet specifications 1000Mbps SFP Fiber transceiver is a Gigabit Ethernet port that fully complies with all IEEE 802 3z and 1000Base SX LX standards 1000Mbps Single Fiber WDM BiDi transceiver is designed with an optic Wavelength Divis
155. nfiguration there are three parameters needed to be filled in They are IP address Subnet Mask Default Gateway and DNS IP address The address of the network device in the network is used for internetworking communication Its address structure looks is shown in the Fig 2 11 It is classful because it is split into predefined address classes or categories Each class has its own network range between the network identifier and host identifier in the 32 bits address Each IP address comprises two parts network identifier address and host identifier address The former indicates the network where the addressed host resides and the latter indicates the individual host in the network which the address of host refers to And the host identifier must be unique in the same LAN Here the term of IP address we used is version 4 known as IPv4 32 bits q_ Network identifier Host identifier Fig 2 11 IP address structure 20 With the classful addressing it divides IP address into three classes class A class B and class C The rest of IP addresses are for multicast and broadcast The bit length of the network prefix is the same as that of the subnet mask and is denoted as IP address X for example 192 168 1 0 24 Each class has its address range described below Class A Address is less than 126 255 255 255 There are a total of 126 networks can be defined because the address 0 0 0 0 is reserved for default
156. ng by passively snooping on the IGMP Query Supports by port Egress Ingress rate control Referred as Class of Service CoS by the IEEE 802 1P standard Classification of packet priority can be based on either a VLAN tag on packet or a user defined Per port QoS Two queues per port IP TOS Classification TCP UDP Port Classification IP DiffServe Classification Limit number of MAC addresses learned per port static MAC addresses stay in the filtering table Bridging 802 1D Spanning Tree IP Multicast IGMP Snooping IP Multicast Packet Filtering Maximum of 256 active VLANs and IP multicast sessions One RS 232 port as local control console Telnet remote control console SNMP agent MIB 2 RFC 1213 Bridge MIB RFC 1493 RMON MIB RFC 1757 statistics Ethernet like MIB RFC 1643 Web browser support based on HTTP Server and CGI parser TFTP software upgrade capability Note Any specification is subject to change without notice 291 Appendix B Null Modem Cable Specifications The DB 9 cable is used for connecting a terminal or terminal emulator to the Managed Switch s RS 232 port to access the command line interface The table below shows the pin assignments for the DB 9 cable Function Mnemonic Pin Carrier CD 1 Receive Data RXD 2 Transmit Data TXD 3 Data Terminal Ready DTR 4 Signal Ground GND 5 Data Set Ready DSR 6 Request To Send RTS 7 Clear To Send CTS 8 9 Pin Null M
157. nking methods LACP Ports using Link Aggregation Control Protocol according to IEEE 802 3ad specification as their trunking method can choose their unique LACP GroupID 1 8 to form a logic trunked port The benefit of using LACP is that a port makes an agreement with its peer port before it becomes a ready member of a trunk group also called aggregator LACP is safer than the other trunking method static trunk The switch LACP does not support the followings Link Aggregation across switches Aggregation with non IEEE 802 3 MAC link Operating in half duplex mode Aggregate the ports with different data rates Static Trunk Ports using Static Trunk as their trunk method can choose their unique Static GroupID also 1 8 this Static groupID can be the same with another LACP grouplD to form a logic trunked port The benefit of using Static Trunk method is that a port can immediately become a member of a trunk group without any handshaking with its peer port This is also a disadvantage because the peer ports of your static trunk group may not know that they should be aggregate together to form a logic trunked port Using Static Trunk on both end of a link is strongly recommended Please also note that low speed links will stay in not ready state when using static trunk to aggregate with high speed links As to system restrictions about the port aggregation function on the switch In the manage
158. nother is that the length of network prefix equals the number of the bit with 1s in that subnet mask With this you can easily count the number of IP addresses matched The following table shows the result Prefix Length No of IP matched No of Addressable IP 132 1 31 2 30 4 2 129 8 6 128 16 14 27 32 30 126 64 62 25 128 126 24 256 254 123 512 510 22 1024 1022 21 2048 2046 20 4096 4094 19 8192 8190 18 16384 16382 17 32768 32766 16 65536 65534 Table 2 4 According to the scheme above a subnet mask 255 255 255 0 will partition a network with the class C It means there will have a maximum of 254 effective nodes existed in this sub netted network and is considered a physical network in an autonomous network So it owns a network IP address which may looks like 168 1 2 0 With the subnet mask a bigger network can be cut into small pieces of network If we want to have more than two independent networks in a worknet a partition to the network must be performed In this case subnet mask must be applied 23 For different network applications the subnet mask may look like 255 255 255 240 This means it is a small network accommodating a maximum of 15 nodes in the network Default gateway For the routed packet if the destination is not in the routing table all the traffic is
159. nsmitted by the GARP application JoinEmpty Message Packets Number of GARP BPDU with Join Empty message is transmitted by the GARP application Joinin Message Packets Number of GARP BPDU with Join In message is transmitted by the GARP application LeaveEmpty Message Packets Number of GARP BPDU with Leave Empty message is transmitted by the GARP application Empty Message Packets Number of GARP BPDU with Empty message is transmitted by the GARP application 77 3 5 3 Group Function name GVRP Group VLAN Information Function description To show the dynamic group member and their information Parameter description VID VLAN identifier When GVRP group creates each dynamic VLAN group owns its VID Valid range is 1 4094 Member Port Those are the members belonging to the same dynamic VLAN group Edit Administrative Control When you create GVRP group you can use Administrative Control function to change Applicant Mode and Registrar Mode of GVRP group member GVRP VLAN Group Information VID Member Port 1 Fig 3 33 78 3 6 QoS Quality of Service Configuration The switch support four QoS queues per port with strict or weighted fair queuing scheduling There are 24 QoS Control Lists QCL for advance programmable QoS classification based on IEEE 802 1p Ethertype VID IPv4 IPv6 DSCP and UDP TCP ports and ranges High flexibility in the classification of incoming frames to a Q
160. o set available from 1 to 4094 Possible value lt range gt 1 to 24 lt pvid gt 1 to 4094 Example SGR24i vlan set pvid 3 5 6 8 5 282 set tag group Syntax set tag group lt vid gt lt name gt lt range gt lt gt Description To add or edit the tag based vlan group Argument lt vid gt vlan ID range from 1 to 4094 lt name gt tag vlan name lt range gt vlan group members syntax 1 5 7 available from 1 to 24 lt gt sym asym vlan setting 1 symmetric vlan 0 asymmetric vlan Possible value lt vid gt 1 to 4094 lt range gt 1 to 24 lt gt 0or 1 Example SGR24i vlan set tag group 2 VLAN 2 2 5 6 15 13 0 show group Syntax show group Description To display the vlan mode and vlan group Argument None Possible value None Example SGR24i vlan show group Vlan mode is double tag 1 Vlan Name default Vlan ID cI Sym vlan Disable Member fo 12 Be O e E a O 12 135 E ES 2 Vlan Name VLAN 2 Vlan ID ane Sym vlan Disable Member sy 2a 3 AS 6 132 LA T5 283 show pvid Syntax show pvid Description To display pvid ingress egress rule Argument None Possible value None Example SGR24i vlan s how pvid Port PVID Rulel Rule2 Port Rule Untag Vid al 1 Disable Disable Access a 2 1 Disable Disable Access 3 5 Disable Disable Access 4 d Disable Disable Access 5 5 Enable Disable Hybrid 6 6 5 Enable Disable Access
161. oS class The QoS classification looks for information up to Layer 4 including IPv4 and IPv6 DSCP IPv4 TCP UDP port numbers and user priority of tagged frames This QoS classification mechanism is implemented in a QoS control list QCL The QoS class assigned to a frame is used throughout the device for providing queuing scheduling and congestion control guarantees to the frame according to what was configured for that specific QoS class The switch support advanced memory control mechanisms providing excellent performance of all QoS classes under any traffic scenario including jumbo frame A super priority queue with dedicated memory and strict highest priority in the arbitration The ingress super priority queue allows traffic recognized as CPU traffic to be received and queued for transmission to the CPU even when all the QoS class queues are congested 79 3 6 1 Ports Function name Port QoS Configuration Function description To configure each port QoS behavior Four QoS queue per port with strict or weighted fair queuing scheduling There are 24 QoS Control Lists QCL for advance programmable QoS classification based on IEEE 802 1p Ethertype VID IPv4 IPv6 DSCP and UDP TCP ports and ranges Parameter description Number of Classes 1 2 4 Port User can choose the port 1 24 respectively with Priority Class on Per Port Priority function Default Class User can set up High Priority or Low Priority for each port res
162. od please take a care on the cabling requirement Cables with worse specification will render the LAN to work poorly 2 1 3 1 Cabling Requirements for TP Ports For Fast Ethernet TP network connection The grade of the cable must be Cat 5 or Cat 5e with a maximum length of 100 meters gt Gigabit Ethernet TP network connection The grade of the cable must be Cat 5 or Cat 5e with a maximum length of 100 meters Cat 5e is recommended 2 1 3 2 Cabling Requirements for 1000SX LX SFP Module It is more complex and comprehensive contrast to TP cabling in the fiber media Basically there are two categories of fiber multi mode MM and single mode SM The later is categorized into several classes by the distance it supports They are SX LX LHX XD and ZX From the viewpoint of connector type there mainly are LC and BIDI LC Gigabit Fiber with multi mode LC SFP module Gigabit Fiber with single mode LC SFP module Gigabit Fiber with BiDi LC 1310nm SFP module Gigabit Fiber with BiDi LC 1550nm SFP module The following table lists the types of fiber that we support and those else not listed here are available upon request Multi mode Fiber Cable and Modal Bandwidth Multi mode 62 5 125um Multi mode 50 125um Per cress Modal Modal Gigabit Ethernet Bandwidth Distance Bandwidth Distance 1000SX 850nm ae ar 160MHz Km 220m 400MHz Km 500m 200MHz Km 275m 500MHz Km 550m Single
163. odem Cable CD 1 4 DTR DSR 6 1 CD DTR 4 ma 33 6 DSR RXD 2 3 TXD TXD 3 2 RXD GND 5 5 GND RTS 7 8 CTS CTS 8 7 RTS Reserve 9 9 Reserve 292 293
164. oftware and its related documentation including any revisions made by AMER com The copyright notice must be reproduced and included with any copy of any portion of the Software or related documentation Except as expressly authorized above Licensee shall not copy or transfer the Software or related documentation in whole or in part Licensee also shall not modify translate decompile disassemble use for any competitive analysis reverse compile or reverse assemble all or any portion of the Software related documentation or any copy The Software and related documentation embody AMER com s confidential and proprietary intellectual property Licensee is not allowed to disclose the Software or any information about the operation design performance or implementation of the Software and related documentation that is confidential to AMER com to any third party Software and related documentation may be delivered to you subject to export authorization required by governments of Taiwan and other countries You agree that you will not export or re export any Software or related documentation without the proper export licenses required by the governments of affected countries LIMITED SOFTWARE WARRANTY AMER com warrants that any media on which the Software is recorded will be free from defects in materials under normal use for a period of twelve 12 months from date of shipment If a defect in any such media should occur during the effective warranty per
165. onds Age When the SGR24i is the root bridge the whole LAN will apply this figure set by this switch as their maximum age time When a bridge received a BPDU originated from the root bridge and if the message age conveyed in the BPDU exceeds the Max Age of the root bridge the bridge will treat the root bridge malfunctioned and issue a Topology Change Notification TCN BPDU to all other bridges All bridges in the LAN will re calculate and determine who the root bridge is The valid value of Max Age is 6 40 seconds Default is 20 seconds 165 Forward Delay You can set the root bridge forward delay time This figure is set by root bridge only The forward delay time is defined as the time spent from Listening state moved to Learning state and also from Learning state moved to Forwarding state of a port in bridge The forward delay time contains two states Listening state to Learning state and Learning state to Forwarding state It assumes that forward delay time is 15 seconds then total forward delay time will be 30 seconds This has much to do with the STP convergent time which will be more than 30 seconds because some other factors The valid value is 4 30 seconds default is 15 seconds Force Version Two options are offered for the user s choosing STP algorithm One is RSTP and the other is STP If STP is chosen RSTP will run as a legacy STP The switch supports RSTP 802 1w which is backward compatible with STP 802 1d
166. onfiguration IP configuration is one of the most important configurations in the switch Without the proper setting network manager will not be able to manage or view the device The switch supports both manual IP address setting and automatic IP address setting via DHCP server When IP address is changed you must reboot the switch to have the setting taken effect and use the new IP to browse for web management and CLI management IP Configuration pee i Enable 192 168 3 210 255 255 255 0 Default Gateway 192 168 3 253 DNS Server 0 0 0 0 Fig 3 7 IP Address Configuration Function name IP Configuration Function description Set IP address subnet mask default gateway and DNS for the switch Parameter description DHCP Setting DHCP is the abbreviation of Dynamic Host Configuration Protocol Here DHCP means a switch to turn ON or OFF the function The switch supports DHCP client used to get an IP address automatically if you set this function Enable When enabled the switch will issue the request to the DHCP server resided in the network to get an IP address If DHCP server is down or does not exist the switch will issue the request and show IP address is under requesting until the DHCP server is up Before getting an IP address from DHCP server the device will not continue booting procedures If set this field Disable you ll have to input IP address manually For more details about IP addr
167. ontact Device Name System Up Time _ Fod 01 49 09 Current Time Sat Mar 09 20 57 34 2002 BIOS Version Firmvere Version SNMP OACL OP MAC Binding 0802 1X 2 Trunk ogyp 2 MSTP Mirroring o0MP a Alarm a Gave Restore Exportimport a Diagnostics oO Maintenance Logout Serial Number 123456789 Host IP Address 192 168 3 33 Host MAC Address 00 01 c1 00 00 00 Device Port 2 RAM Size 512 Size 128 See Fig 3 3 port detail information In Fig 3 3 it shows the basic information of the clicked port With this you ll see the information about the port status traffic status and bandwidth rating for egress and ingress respectively On the left top corner there is a pull down list for Auto Logout For the sake of security we provide auto logout function to protect you from illegal user as you are leaving If you do not choose any selection in Auto Logout list it means you turn on the Auto Logout function and the system will be logged out automatically when no action on the device 3 minutes later If OFF is chosen the screen will keep as it is Default is ON On the left side the main menu tree for web is listed in the page They are hierarchical menu Open the function folder a sub menu will be shown The functions of each folder are described in its corresponded section respectively When clicking it the function is performed The following list is the full function tree for web user interface 30 Syste
168. ou assign Note If there are too many MAC addresses learned in the table we recommend you inputting the MAC address and alias name directly 71 3 4 5 MAC Table Function name Dynamic MAC Table Function Description Display the static or dynamic learning MAC entry and the state for the selected port Parameter description Type Dynamic or Static VLAN VLAN identifier This will be filled only when tagged VLAN is applied Valid range is 1 4094 MAC address Display the MAC address of one entry you selected from the searched MAC entries table Port The port that exists in the searched MAC Entry Refresh Refresh function can help you to see current MAC Table status Clear To clear the selected entry Previous Page Move to the previous page Next Page Move to the next page Dynamic MAC Table Port Members Type VLAN MAC Address 1234567 8 9101112131415 16 17 18 19 20 21 22 23 24 Dynamic Dynamic 1 00 02 B3 B1 01 C1 1 1 00 06 29 D5 80 35 1 Dynamic 1 00 0D 60 EC 68 74 1 Dynamic 1 00 40 C7 EA 50 57 1 Dynamic 1 00 40 C EE 00 DE 21 Dynamic 1 00 60 6E CF 1F 94 1 Dynamic 1 88 62 37 89 52 36 1 Static 1 LSS ess 2 3 tly ry Get ale ih Gee ee he abs alee ee 1818 2021 22232A Fig 3 30 72 3 5 GVRP GVRP is an application based on Generic Attribute Registration Protocol GARP mainly used to automatically and dynamically maintain the group membership information of the VLANs The GVRP offers t
169. ow UDP TCP Part 5055 Yahoo Messenger Phone Low OD OD OD OH PEPE O amp amp UDP TCP Port 6699 Napster Low UDP TCP Port 7170 Real Audio Low OOG OO 6 Fig 3 54 Set up Typical Network Application Rules Finish QoS Control List Configuration QCL 1 v QCE Type Type Value Traffic Class UDP TCP Port 6112 6112 Blizzard Battlenet Low UDP TCP Port 50000 50100 Fighter Ace Il Low UDP TCP Port 27910 27910 Quake2 Low UDP TCP Port 27660 27662 Quake3 Low UDP TCP Port 28800 29000 MSN Game Zone Low Fig 3 55 Set up Typical Network Application Rules Finish 96 QoS Control List Configuration QcL QCE Type Type Value Traffic Class UDP TCP Port 6970 6970 QuickTime 4 Server Low OOD UDP TCP Port 6112 6112 Blizzard Battlenet Low OO OG 6 Ethernet Type Oxffif Low VLAN ID 4 Low OOOOH amp UDP TCP Part Low amp DSCP Low DOQ OOOO 6 Fig 3 56 Set up Typical Network Application Rules Finish Parameter description QCL QoS Control List QCL 1 24 Set up TOS Precedence Mapping Set up the traffic class mapping to the precedence part of TOS 3 bits when receiving IPv4 IPv6 packets QCL ID TOS Precedence 2 Class Low v TOS Precedence 4 Class Low v TOS Precedence 5 Class Low TOS Precedence 7 Class Low Gs Gi Ss LS eh Se ESIE Fig 3 57 Set up TOS Precedence Mapping Parameter de
170. pecification of the switch please refer to Appendix A The switch is suitable for the following applications Central Site Remote site application is used in carrier or ISP See Fig 2 13 Peer to peer application is used in two remote offices See Fig 2 14 Office network See Fig 2 15 m m EP S P csn HL SGR24i Converter Chassis SO Sided Adi dud oa eee Copper Twisted poif a SGR24 lt p Fiber Optic mm or sm fiber Managed Media Converter a ES TAP Fiber Optic Managed Media famae er A 59 Fiber Optic SGR24 ay ane SSO oi 5 gt a _ ema mma ie i i i i H 1 i km E gt Copper Twisted pair Links Fiber Optic Links fi Fig 2 13 Network Connection between Remote Site and Central Site Fig 2 13 is a system wide basic reference connection diagram This diagram demonstrates how the switch connects with other network devices and hosts 25 Fig 2 15 Office Network Connection 26 3 Operation of Web based Management This chapter instructs you how to configure and manage the SGR24i through the web user interface it supports to access and manage the 22 Port 10 100 1000Mbps TP and 2 Port Gigabit TP SFP Fiber management Ethernet switch With this facility you can easily access and monitor through any one port of the switch all the status of the switch including MIBs status each port activity Soanning t
171. pectively Low Normal Medium High QCL The number of QCL rule 1 24 each port have to apply one of the QCL rule for QoS behavior User priority The user priority value 0 7 3 bits is used as an index to the eight QoS class values for VLAN tagged or priority tagged frames Queuing Mode There are two Scheduling Method Strict Priority and Weighted Fair Default is Strict Priority After you choose any of Scheduling Method please click Apply button to be in operation Queue Weighted There are four queues per port and four classes weighted number 1 2 4 8 for each queues you can select the weighted number when the scheduling method be set to Weighted Fair mode 80 Port QoS Configuration Number of CI Port Default Class User Priority Queuing Mode Queue Weighted Low Normal Medium High Strict Priority 4 8 Strict Priority Strict Priority Strict Priority Strict Priority Strict Priority Strict Priority Strict Priority Strict Priority Strict Priority Strict Priority Strict Priority Strict Priority Strict Priority Fig 3 34 lt 1 2 a 4 5 6 ri 8 9 o ololololololol ololo lolo lo SNS S NS HESS S SEIKI SESS ESS RSIS EIEI EIEI SIS ISH Say SILLS 81 3 6 2 Qos Control List Function name Qos Control List Configuration Function description The switc
172. ply LJSNMP CI SNMP Traps Cancel lt Back Next gt Fig 3 135 Set up Typical Network Application Rules Set up Typical Network Application Rules According to your decision on the previous page this wizard will create specific ACEs Access Control Entries automatically First select the ingress port for these ACEs and then select the action and rate limiter ID Different parameter options are displayed depending on your selections eet i Limiter ID Disabled v Fig 3 136 Set up Typical Network Application Rules 139 Finished The ACL configuration wizard is finished and the new configuration is ready for use Click Finish to get more information Click Wizard Again to start the wizard again Fig 3 137 Set up Typical Network Application Rules Access Control List Configuration Autoctafresh Ingress Port Frame Type Action Rate Limiter Port Copy Counters IPy4 DHCP Client In Deny Disabled Ey OO IPv4 DHCP Client Out Deny Disabled o o IPv4 Google Talk In Deny Disabled IPv4 Google Talk Out Deny Disabled o 010100100100 BREE Oo O amp EType Deny Disabled o oO O COCK IPv4 HTTPS In Deny Disabled o amp IPv4 HTTPS Out Deny Disabled amp Fig 3 138 Set up Typical Network Application Rules Finish Parameter description Common Server DHCP DNS FTP HTTP IMAP NFS POP3 SAMBA
173. port Layer 2 Gigabit Managed Switch SFP Modules optional Mounting Accessory for 19 Rack Shelf This User s Manual in CD ROM AC Power Cord RS 232 Cable Please notify your sales representative immediately if any of the aforementioned items is missing or damaged 1 3 Features The SGR24i a standalone off the shelf switch provides the comprehensive features listed below for users to perform system network administration and efficiently and securely serve your network Hardware e 20 10 100 1000Mbps Auto negotiation Gigabit Ethernet TP ports e 4 10 100 1000Mbps TP or 1000Mbps SFP Fiber dual media auto sense e 1392KB on chip frame buffer e Support jumbo frame up to 9600 bytes e Programmable classifier for QoS Layer 4 Multimedia 8K MAC address and 4K VLAN support IEEE802 1Q e Per port shaping policing and Broadcast Storm Control e IEEE802 1Q Q in Q nested VLAN support e Full duplex flow control IEEE802 3x and half duplex backpressure e Extensive front panel diagnostic LEDs System Power TP Port1 24 LINK ACT 10 100 1000Mbps SFP Port 21 24 SFP LINK ACT Management e Supports concisely the status of port and easily port configuration Supports per port traffic monitoring counters e Supports a snapshot of the system Information when you login e Supports port mirror function e Supports the static trunk function Supports 802 1Q VLAN e Supports user management and limits three users to
174. put into the device with the designated IP address known as default router Basically it is a routing policy The gateway setting is used for Trap Events Host only in the switch For assigning an IP address to the switch you just have to check what the IP address of the network will be connected with the switch Use the same network address and append your host address to it IP Configuration Poy Ce eee 192 168 3 171 Csr a 255 255 255 0 192 168 3 253 Fig 2 12 First IP Address as shown in the Fig 2 12 enter 192 168 1 1 for instance For sure an IP address such as 192 168 1 x must be set on your PC Second Subnet Mask as shown in the Fig 2 12 enter 255 255 255 0 Any subnet mask such as 255 255 255 x is allowable in this case DNS The Domain Name Server translates human readable machine name to IP address Every machine on the Internet has a unique IP address A server generally has a static IP address To connect to a server the client needs to know the IP of the server However user generally uses the name to connect to the server Thus the switch DNS client program such as a browser will ask the DNS to resolve the IP address of the named server 24 2 2 Typical Applications The SGR24i implements 24 Gigabit Ethernet TP ports with auto MDIX and two slots for the removable module supporting comprehensive fiber types of connection including LC and BiDi LC SFP modules For more details on the s
175. r The switch supports valid configurable day light saving time is 5 5 step one hour The zero for this parameter means it need not have to adjust current time equivalent to in act daylight saving You don t have to set the starting ending date as well If you set daylight saving to be non zero you have to set the starting ending date as well otherwise the daylight saving function will not be activated Default for Daylight Saving 0 The following parameters are configurable for the function Daylight Saving and described in detail Day Light Saving Start This is used to set when to start performing the day light saving time Mth Range is 1 12 Default 1 Day Range is 1 31 Default 1 Hour Range is 0 23 Default 0 36 Day Light Saving End This is used to set when to stop performing the daylight saving time Mth Range is 1 12 Default 1 Day Range is 1 31 Default 1 Hour Range is 0 23 Default 0 System Time Setting Current Time Mon Jan 01 02 16 43 2002 Year 2000 2036 Month 112 Day 1 31 Hour 0 23 Minute 0 59 Second 0 59 NTP 209 81 9 7 USA 137 189 8 174 HK 133 100 9 2 5P Time Zone GMT 8 00 131 188 3 222 Germany 209 81 9 7 Daylight Saving ov Daylight Saving Start Daylight Saving End Fig 3 6 37 3 1 4 IP C
176. rd immediately after you login in the system successfully In this login menu you have to input the complete username and password respectively the switch will not give you a shortcut to username automatically This looks inconvenient but safer 27 In the switch it supports a simple user management function allowing only one administrator to configure the system at the same time If there are two or more users using administrator s identity the switch will allow the only one who logins first to configure the system The rest of users even with administrator s identity can only monitor the system For those who have no administrator s identity can only monitor the system There are only a maximum of three users able to login simultaneously in the switch To optimize the display effect we recommend you use Microsoft IE_6 0 above Netscape V7 1 above or FireFox V1 00 above and have the resolution 1024x768 The switch supported neutral web browser interface In Fig 3 2 for example left section is the whole function tree with web user interface and we will travel it through this chapter Fig 3 1 Username amp Password Username admin Password sss RETIN cornet rossword 28 3 1 Web Management Home Overview After you login the switch shows you the system information as Fig 3 2 This page is default and tells you the basic information of the system including Model Name System Description Loc
177. received Rx 256 511 Bytes Number of 256 511 byte frames in good and bad packets received Rx 512 1023 Bytes Number of 512 1023 byte frames in good and bad packets received Rx 1024 Bytes Number of 1024 max_length byte frames in good and bad packets received Tx 64 Bytes Number of 64 byte frames in good and bad packets transmitted 56 Tx 65 127 Bytes Number of 65 126 byte frames in good and bad packets transmitted Tx 128 255 Bytes Number of 127 255 byte frames in good and bad packets transmitted Tx 256 511 Bytes Number of 256 511 byte frames in good and bad packets transmitted Tx 512 1023 Bytes Number of 512 1023 byte frames in good and bad packets transmitted Tx 1024 Bytes Number of 1024 max_length byte frames in good and bad packets transmitted Rx CRC Alignment Number of Alignment errors and CRC error packets received Rx Undersize Number of short frames lt 64 Bytes with valid CRC Rx Oversize Number of long frames according to max_length register with valid CRC Rx Fragments Number of short frames lt 64 bytes with invalid CRC Rx Jabber Number of long frames according tomax_length register with invalid CRC Rx Drops Frames dropped due to the lack of receiving buffer Rx Errors Number of the error packet received Tx Collisions Number of collisions transmitting frames experienced Tx Drops Number of frames dropped due to excessive collision late collision or frame aging
178. ree status port aggregation status multicast traffic VLAN and priority status even illegal access record and so on The default values of the managed switch are listed in the table below IP Address 192 168 1 1 Subnet Mask 255 255 255 0 priimericena 192 168 1 254 Username admin Password admin Table 3 1 After the managed switch has been finished configuration in the CLI via the switch s serial interface you can browse it For instance type http 192 168 1 1 in the address row ina browser it will show the following screen see Fig 3 1 and ask you inputting username and password in order to login and access authentication The default username and password are both admin For the first time to use please enter the default username and password then click the lt Login gt button The login process now is completed Just click the link of Forget Password in WebUI See Fig 3 1 or input Ctrl Z in CLI s login screen See Fig 4 1 4 2 in case the user forgets the manager s password Then the system will display a serial No for the user Write down this serial No and contact your vendor the vendor will give you a temporary password Use this new password as ID and Password and it will allow the user to login the system with manager authority temporarily Due to the limit of this new password the user only can login the system one time therefore please modify your passwo
179. riority Display port priority value for each port in a particular spanning tree instance Hello per port Hello Time display It takes the following form 178 Current Hello Time Hello Time Setting Oper Edge Whether or not a port is an Edge Port in reality Oper P2P Whether or not a port is a Point to Point Port in reality Restricted Role Same as mentioned in Port Config Restricted Ten Same as mentioned in Port Config 179 3 14 Mirror Function name Mirror Configuration Function description Mirror Configuration is to monitor the traffic of the network For example we assume that Port A and Port B are Monitoring Port and Monitored Port respectively thus the traffic received by Port B will be copied to Port A for monitoring Note When configure the mirror function you should avoid setting a port to be a sniffer port and aggregated port at the same time It will cause something wrong Parameter description Port to mirror to Range Disabled Port 1 24 Set the monitoring port Port Range 1 24 Select the monitored ports Source Enable The source enable means the monitored port ingress traffic will be copied to monitoring port Destination Enable The destination enable means the monitored port egress traffic will be copied to monitoring port 180 Mirror Configuration Port to mirror to Disabled v Port Source Enable Destination Enable Soon ont
180. rized Multihost ForceAuthorized Don t Care Port Authorized Table 3 3 149 3 10 1 Server Function name 802 1X Server Configuration Function description This function is used to configure the global parameters for RADIUS authentication in 802 1X port security application Parameter description Authentication Server Server IP Server Server IP address for authentication Default 192 168 1 1 UDP Port Default port number is 1812 Secret Key The secret key between authentication server and authenticator It is a string with the length 1 31 characters The character string may contain upper case lower case and 0 9 It is character sense It is not allowed for putting a blank between any two characters Default Radius Accounting Server Server IP Server Server IP address for authentication Default 192 168 1 1 UDP Port Default port number is 1812 Secret Key The secret key between authentication server and authenticator It is a string with the length 1 31 characters The character string may contain upper case lower case and 0 9 It is character sense It is not allowed for putting a blank between any two characters Default Radius 150 802 1X Server Configuration Authentication Server t te d ee tliat ta 192 169 1 1 UDP Port Secret Key Accounting Server tittle tliat ta 192 169 1 1 UDP Port Secret Key Fig 3 144 151 3 10 2 Port Configuration Function name 80
181. rk access control provides a method to restrict users to access network resources via authenticating user s information This restricts users from gaining access to the network resources through a 802 1 X enabled port without authentication If a user wishes to touch the network through a port under 802 1X control he she must firstly input his her account name for authentication and waits for gaining authorization before sending or receiving any packets from a 802 1 X enabled port Before the devices or end stations can access the network resources through the ports under 802 1X control the devices or end stations connected to a controlled port send the authentication request to the authenticator the authenticator pass the request to the authentication server to authenticate and verify and the server tell the authenticator if the request get the grant of authorization for the ports According to IEEE802 1X there are three components implemented They are Authenticator Supplicant and Authentication server shown in Fig 3 53 Supplicant It is an entity being authenticated by an authenticator It is used to communicate with the Authenticator PAE Port Access Entity by exchanging the authentication message when the Authenticator PAE request to it Authenticator An entity facilitates the authentication of the supplicant entity It controls the state of the port authorized or unauthorized according to the result of authentication mes
182. rminal program But the COM port parameters baud rate data bits parity bits flow control must be the same as the setting of the console port of the Managed Switch 287 Appendix A Technical Specifications Features 20 10 100 1000Mbps Gigabit Ethernet TP switching ports are compliant with IEEE802 3 802 3u 802 3z and 802 3ab 4 Gigabit TP SFP fiber are dual media ports with auto detected function Non blocking store and forward shared memory Web Smart switched Supports auto negotiation for configuring speed duplex mode Supports 802 3x flow control for full duplex ports Supports collision based and carrier based backpressure for half duplex ports Any ports can be in disable mode force mode or auto polling mode Supports Head of Line HOL blocking prevention Supports broadcast storm filtering Auto aging with programmable inter age time Supports 802 1p Class of Service with 2 level priority queuing Supports port sniffer function Programmable maximum Ethernet frame length of range from 1518 to 9600 bytes jumbo frame Supports port based VLAN 802 1Q tag based VLAN Efficient self learning and address recognition mechanism enables forwarding rate at wire speed Web based management provides the ability to completely manage the switch from any web browser SNMP Telnet interface delivers complete in band management Supports IEEE 802 1d Spanning Tree Protocol Supports IEEE 802 1w Rapid Spanning Trees Supports
183. route and 127 0 0 0 8 is reserved for loopback function Bit 01 78 31 0 Network address Host address Class B IP address range between 128 0 0 0 and 191 255 255 255 Each class B network has a 16 bit network prefix followed 16 bit host address There are 16 384 2 14 16 networks able to be defined with a maximum of 65534 2 16 2 hosts per network Bit 012 15 16 31 10 Network address Host address Class C IP address range between 192 0 0 0 and 223 255 255 255 Each class C network has a 24 bit network prefix followed 8 bit host address There are 2 097 152 2 21 24 networks able to be defined with a maximum of 254 2 8 2 hosts per network Bit 012 3 23 24 31 110 Network address Host address 21 Class D and E Class D is a class with first 4 MSB Most significance bit set to 1 1 1 0 and is used for IP Multicast See also RFC 1112 Class E is a class with first 4 MSB set to 1 1 1 1 and is used for IP broadcast According to IANA Internet Assigned Numbers Authority there are three specific IP address blocks reserved and able to be used for extending internal network We call it Private IP address and list below Class A 10 0 0 0 10 255 255 255 Class B 172 16 0 0 172 31 255 255 Class C 192 168 0 0 192 168 255 255 Please refer to RFC 1597 and RFC 1466 for more information Subnet mask It means the sub division of a class based networ
184. rs Fig 3 108 IPv4 IP Parameters Any Any Non zero Zero Fig 3 109 IPv4 119 IP Parameters Fig 3 110 IPv4 IP Parameters Fig 3 111 IPv4 IP Parameters Fig 3 112 IPv4 120 IP Parameters Fig 3 113 IPv4 IP Parameters 192 168 1 1 255 255 255 0 An M Fig 3 114 IPv4 IP Parameters Fig 3 115 IPv4 121 IP Parameters 192 168 1 254 Fig 3 116 IPv4 IP Parameters 192 168 1 254 255 255 255 0 Fig 3 117 IPv4 ACE Configuration er MAC Parameters DAC iter ans iv Fig 3 118 Action 122 ACE Configuration CO Rate Limiter Port Copy Disabled Counter MAC Parameters _DMAC Filter Fig 3 119 Rate Limiter MAC Parameters DMAC Filter Any v Fig 3 120 Port Copy 123 ACE Configuration Frame Type Port Copy Disabled MAC Parameters VLAN Parameters VLAN ID Filter Tag Priority Fig 3 121 DMAC Filter ACE Configuration Frame Type Disabled Port Copy Disabled MAC Parameters VLAN Parameters DMAC Filter VLAN ID Filter l Tag Priority ANY Specific Fig 3 122 VLAN ID Filter VLAN Parameters Fig 3 123 VLAN ID Filter 124 ACE Configuration Any E Action Permit Frame Type Any Disabled Port Copy Disabled 0 MAC Parameters VLAN Parameters DMAC Filter Any VLAN ID Filter Any Tag Priority Any 0 1 2 3 4 5 6
185. rt Copy Counters Policy 2 Permit 1 Disabled amp Policy 2 Permit 1 Disabled OA OOOOOO Policy 3 Perrnit Disabled Policy 3 IPv4 FTP Control Port In Permit Disabled oO o O amp Policy 3 IPv4 FTP Control Port Out Permit Disabled Policy 3 IPv4 FTP Data Port In Permit Disabled r s amp Policy 3 IPv4 FTP Date Port Out Permit Disabled Q H o0 0 RBo HO H Q 9 Policy 3 IPy4 POP3 In Permit Disabled i ODOM OH O O amp Policy 3 IPv4 POP3 Out Permit Disabled o Fig 3 129 Set up Policy Rules Finish 136 Welcome to the ACL Configuration Wizard Please select an action Set up Policy Rules Set up the default policy rules for Client ports Server ports Network ports and Guest ports Set up Port Policies Group ports into several types according to different ACL policies Set up Typical Network Application Rules Set up the specific ACL for different typical network application access control Set up Source MAC and Source IP Binding Strictly control the network traffic by only allowing incoming frames that match the source MAC and source IP on specific ports To continue click Next Fig 3 130 Set up Port Policies Set up Port Policies Group ports into several categories according to different ACL policies for example Client ports work stations laptops Server ports DHCP Web file server Network ports routers switches and Guest port
186. rt start Description To run the export start function Argument None Possible value None Example SGR24i config file export start Export successful export user conf Syntax export user conf Description To run the export user conf function Argument None Possible value None Example SGR24i config file export user conf Export successful import start Syntax import start Description To run the import start function Argument None Possible value None Example SGR24i config file import start Import successful 226 import user conf Syntax import user conf Description To run the import user conf function Argument None Possible value None Example SGR24i config file import user conf Import successful set export path Syntax set export path lt filepath gt Description To set up the filepath and filename that will be exported Argument lt filepath gt filepath and filename Possible value lt filepath gt filepath and filename Example SGR24i config file set export path log 21511 txt set import path Syntax set import path lt filepath gt Description To set up the filepath and filename that will be imported Argument lt filepath gt filepath and filename Possible value lt filepath gt filepath and filename Example SGR24i config file set import path log 21511 txt 227 show Syntax show
187. s laptops with Internet access only Port Members Policy ID 1 2 3 4 5 6 7 8 9 10111213 1415 16 17 18 19 20 21 22 23 24 PODODDDOO OH HOHHHOHHHHHHOOHO o00000000000 o0o0o0 o000 C0000 o000 oo0oo0000000000 9 19 9 19 9 1a 9 9 1a a OO00000000 a 9 Lala La Wa la ta ai la O O GOGO OOO 9 tal eo Lo a oly OO00000000 OCOOCCODDDOCCCCOCOCOCOCOCOONO O O 12 O O Fig 3 131 Set up Port Policies Finished The ACL configuration wizard is finished and the new configuration is ready for use Click Finish to get more information Click Wizard Again to start the wizard again Fig 3 132 Set up Port Policies 137 ACL Ports Configuration Port Policy ID Action Rate Limiter ID Port Copy Counter Permit Disabled Disabled Permit Disabled Disabled Permit Disabled Disabled ee ee Permit Disabled Disabled Permit Disabled Disabled Permit Disabled Disabled Permit Disabled Disabled Permit Disabled Disabled el ee Permit Disabled Disabled Permit Disabled Disabled Permit Disabled Disabled Permit Disabled Disabled v v v Permit Disabled Disabled Disabled A v F N lt uw lt ta lt D lt J lt co lt 1 z 3 4 5 5g 6 l 5 9 lt aeea lt Permit
188. s 2 Tx 1024 1526 Bytes 120 Rx 1527 Bytes 0 Tx 1527 Bytes 0 Rx Drops Tx Drops 0 Rx CRC Alignment Tx Late Exc Coll 0 Rx Undersize Rx Oversize Rx Fragments Rx Jabber Fig 3 16 Function name Detail Counter Function description Display the detailed counting number of each port s traffic In the Fig 3 14 the window can show all counter information of each port at one time Parameter description Rx Packets The counting number of the packet received RX Octets Total received bytes Rx High Priority Packets Number of Rx packets classified as high priority 55 Rx Low Priority Packets Number of Rx packets classified as low priority Rx Broadcast Show the counting number of the received broadcast packet Rx Multicast Show the counting number of the received multicast packet Tx Packets The counting number of the packet transmitted TX Octets Total transmitted bytes Tx High Priority Packets Number of Tx packets classified as high priority Tx Low Priority Packets Number of Tx packets classified as low priority Tx Broadcast Show the counting number of the transmitted broadcast packet Tx Multicast Show the counting number of the transmitted multicast packet Rx 64 Bytes Number of 64 byte frames in good and bad packets received Rx 65 127 Bytes Number of 65 126 byte frames in good and bad packets received Rx 128 255 Bytes Number of 127 255 byte frames in good and bad packets
189. s assigned by root bridge in unit of seconds Default is 20 seconds Current Forward Delay Show the current root bridge forward delay time The value of Forward Delay time is set by root The Forward Delay time is defined as the time spent from Listening state moved to Learning state or from Learning state moved to Forwarding state of a port in bridge Hello Time Show the current hello time of the root bridge Hello time is a time interval specified by root bridge used to request all other bridges periodically sending hello message every hello time seconds to the bridge attached to its designated port STP Topology Change Count STP Topology Change Count expresses the time spent in unit of seconds since the beginning of the Spanning Tree Topology Change to the end of the STP convergence Once the STP change is converged the Topology Change count will be reset to 0 The figures showing in the screen may not be the exact time it spent but very close to because the time is eclipsing Time Since Last Topology Change Time Since Last Topology Change is the accumulated time in unit of seconds the STP has been since the last STP Topology Change was made When Topology Change is initiated again this counter will be reset to 0 And it will also count again once STP topology Change is completed STP Status STP State Disabled Bridge ID 00 40 C7 01 02 33 Bridge Priority 32768 Designated Root 00 40 C7 01 02 33 Designated Priori
190. sable lt port range gt syntax 1 5 7 available from 1 to 24 Possible value lt ip multicast gt ex 224 1 1 1 225 2 3 3 or any lt vid gt 0 4094 or any lt port range gt 1 to 24 Example SGR24i igmp snooping add allowed group 224 1 1 1 225 2 3 3 100 1 10 del allowed group Syntax del allowed group lt index gt Description To remove the entry of allowed ip multicast group Argument lt index gt the index of the allowed group Possible value lt index gt the index of the allowed group Example SGR24i igmp snooping del allowed group 1 238 set mode Syntax set mode lt status gt Description To set up the mode of IGMP Snooping Argument lt status gt O disable 1 active 2 passive Possible value lt status gt 0 1or 2 Example SGR24i igmp snooping set mode 2 show igmp snooping Syntax show igmp snooping Description To display IGMP snooping mode and allowed IP multicast entry Argument None Possible value None Example SGR24i igmp snooping show igmp snooping Snoop Mode Active IP Multicast 1 IP Address PIZZA le Lae VLAN ID g 0 Member Port 22 show multicast Syntax show multicast Description To display IP multicast table Argument None Possible value None Example SGR24i igmp snooping show multicast IP Multicast None 239 a P disable dhcp Syntax disable dhcp Description To disable the DHCP func
191. sage exchanged between it and a supplicant PAE The authenticator may request the supplicant to re authenticate itself at a configured time period Once start re authenticating the supplicant the controlled port keeps in the authorized state until re authentication fails A port acting as an authenticator is thought to be two logical ports a controlled port and an uncontrolled port A controlled port can only pass the packets when the authenticator PAE is authorized and otherwise an uncontrolled port will unconditionally pass the packets with PAE group MAC address which has the value of 01 80 c2 00 00 03 and will not be forwarded by MAC bridge at any time Authentication server A device provides authentication service through EAP to an authenticator by using authentication credentials supplied by the supplicant to determine if the supplicant is authorized to access the network resource 145 Supplicant s System Supplicant PAE m er The overview of operation flow for the Fig 3 53 is quite simple When Supplicant PAE issues a request to Authenticator PAE Authenticator and Supplicant exchanges authentication message Then Authenticator passes the request to RADIUS server to verify Finally RADIUS server replies if the request is granted or denied While in the authentication process the message packets encapsulated by Extensible Authentication Protocol over LAN EAPOL are exchanged between an authenticator PAE
192. scription QCL ID QoS Control List QCL 1 24 97 TOS Precedence 0 7 Class Low Normal Medium High Finished The QCL configuration wizard is finished and the new configuration is ready for use Click Finish to get more information Click Wizard Again to start the wizard again Fig 3 58 Set up TOS Precedence Mapping QoS Control List Configuration eee 1 ie QCE Type Type Value Traffic Class OC Fig 3 59 Set up TOS Precedence Mapping Finish 98 Set up VLAN Tag Priority Mapping Set up the traffic class mapping to the user priority value 3 bits when receiving VLAN tagged packets QcL ID Tag Priority 0 Class Normal v Nomai Medium Hon v Fig 3 60 Set up VLAN Tag Priority Mapping Parameter description QCL ID QoS Control List QCL 1 24 Tag Priority 0 7 Class Low Normal Medium High Finished The QCL configuration wizard is finished and the new configuration is ready for use Click Finish to get more information Click Wizard Again to start the wizard again Fig 3 61 Set up VLAN Tag Priority Mapping 99 QoS Control List Configuration QCL 1 v QCE Type Type Value Traffic Class Tag Priority oe Fig 3 62 Set up VLAN Tag Priority Mapping Finish 100 3 7 SNMP Configuration Any Network Management System NMS running the Simple Network Management Protocol SNMP can manage the Managed d
193. sification Dest Port No Range 0 65535 Dest Port Range Range 0 65535 TCP FIN TCP Control Bit FIN Means No more data from sender Range Any 0 1 Any Including all TCP FIN case 0 The TCP control bit FIN is 0 1 The TCP control bit FIN is 1 TCP SYN TCP Control Bit SYN Means Synchronize sequence numbers Range Any 0 1 Any Including all TCP SYN case 0 The TCP control bit SYN is 0 1 The TCP control bit SYN is 1 TCP RST TCP Control Bit RST Means Reset the connection Range Any 0 1 Any Including all TCP RST case 0 The TCP control bit RST is 0 131 1 The TCP control bit RST is 1 TCP PSH TCP Control Bit PSH Means Push Function Range Any 0 1 Any Including all TCP PSH case 0 The TCP control bit PSH is 0 1 The TCP control bit PSH is 1 TCP ACK TCP Control Bit ACK Means Acknowledgment field significant Range Any 0 1 Any Including all TCP ACK case 0 The TCP control bit ACK is 0 1 The TCP control bit ACK is 1 TCP URG TCP Control Bit URG Means Urgent Pointer field significant Range Any 0 1 Any Including all TCP URG case 0 The TCP control bit URG is 0 1 The TCP control bit URG is 1 IP Protocol Value The IP Protocol Value is TCP options may occupy space at the end of the TCP header and are a multiple of 8 bits in length Currently defined options include kind indicated in octal 0 End of option list 1 No Operation Range Any 0 1 Any Including all IP protocol value case 0 The
194. sted as follows Baud rate 115200 Stop bits 1 Data bits 8 Parity N Flow control none 4 When you complete the connection then press lt Enter gt key The login prompt will be shown on the screen The default username and password are shown as below Username admin Password admin Set IP Address Subnet Mask and Default Gateway IP Address Please refer to Fig 2 7 CLI Management for details about ex factory IP setting They are default setting of IP address You can first either configure your PC IP address or change IP address of the switch next to change the IP address of default gateway and subnet mask For example your network address is 10 1 1 0 and subnet mask is 255 255 255 0 You can change the switch s default IP address 192 168 1 1 to 10 1 1 1 and set the subnet mask to be 255 255 255 0 Then choose your default gateway may be it is 10 1 1 254 Default Value SGR24i Your Network Setting IP Address 192 168 1 1 10 1 1 1 Subnet 255 255 255 0 255 255 255 0 PIACUURCCIOUEWEE 192 168 1 254 10 1 1 254 Table 2 3 After completing these settings in the switch it will reboot to have the configuration taken effect After this step you can operate the management through the network no matter it is from a web browser or Network Management System NMS Hanaged Switch Login admin Password SGR24i H _ Fig 2 8 the Login Screen for CLI 2 1 4 2 Configuring the M
195. sume the locked port please find out the looping path and take off the looping path then select the resume the locked port and click on Resume to turn on the locked ports Detection Port Fig 3 8 Function name Loop Detection Function description Display whether switch open Loop detection Parameter description Port No Display the port number The number is 1 24 Detection Port Enable When Port No is chosen and enable port s Loop detection the port can detect loop happens When Port No is chosen enable port s Loop detection and the port detects loop happen port will be Locked If Loop did not happen port maintains Unlocked Locked Port Resume When Port No is chosen enable port s Loop detection and the port detects loop happen the port will be Locked When choosing Resume port locked will be opened and turned into unlocked If not choosing Resume Port maintains locked 41 3 1 6 Management Policy Through the management security configuration the manager can do the strict setup to control the switch and limit the user to access this switch The following rules are offered for the manager to manage the switch Rule 1 When no lists exists then it will accept all connections Rule 2 When only accept lists exist then it will deny all connections excluding the connection inside of the accepting range Rule
196. t OK 2 POre 2 34 SO BG LO Ts 22 V3 14S Oy LE 18 lt ip gt ip address or domain name Possible value IP address e g 192 168 2 65 or domain name e g tw yahoo com Example SGR24i diag ping 192 168 1 115 192 168 1 253 Gateway 192 168 1 115 is alive 230 firmware set upgrade path Syntax set upgrade path lt filepath gt Description To set up the image file that will be upgraded Argument lt filepath gt upgrade file path Possible value lt filepath gt upgrade file path Example SGR24i firmware set upgrade path gs2224L_ SGR24i_v2 03 img show Syntax show Description To display the information of tftp server and upgrade path Argument None Possible value None Example SGR24i firmware show TFTP Server IP Address 192 168 3 111 Path and Filename gt 9S2224L_ SGR241i_v2 03 img upgrade Syntax upgrade Description To run the upgrade function Argument None Possible value None Example SGR24i firmware upgrade Upgrading firmware 231 m gvrp disable Syntax disable Description To disable the gvrp function Argument None Possible value None Example SGR24i gvrp disable enable Syntax enable Description To enable the gvrp function Argument None Possible value None Example SGR24i gvrp enable group Syntax group lt group number gt Description To enter any of gvrp gro
197. t None Possible value None Example SGR24i mac table information show MAC Table List Alias MAC Address Port VID State 00 10 db 1d c5 a0 16 0 Dynamic 00 40 f4 89 c9 7f T6 0 Dynamic 00 e0 18 2b 9d e2 16 0 Dynamic 00 40 c7 d8 00 02 16 0 Dynamic 245 lt lt maintain gt gt set aging Syntax set aging lt gt Description To set up the age out time of dynamic learning mac Argument lt gt age timer in seconds 0 10 to 65535 The value 0 means to disable aging Possible value lt gt 0 10 to 65535 Example SGR24i mac table maintain set aging 300 set flush Syntax set flush Description To delete all of the MACs that is learned dynamically Argument None Possible value None Example SGR24i mac table maintain set flush show Syntax show Description To display the settings of age timer Argument None Possible value None Example SGR24i mac table maintain show age timer 300 seconds SGR24i mac table maintain 246 lt lt static mac gt gt add Syntax add lt mac gt lt port gt lt vid gt alias Description To add the static mac entry Argument lt mac gt mac address format 00 02 03 04 05 06 lt port gt 0 24 The value 0 means this entry is filtering entry lt vid gt vlan id 0 1 4094 VID must be zero if vlan mode is not tag based alias mac alias name max 15 characters Possible value
198. t None Possible value None Example SGR24i mirror show Mirror Mode rx Monitoring Port 2 Monitored Port 3 4 5 7 10 255 port clear counter Syntax clear counter Description To clear all ports counter include simple and detail port counter information Argument None Possible value None Example SGR24i port clear counter disable flow control Syntax disable flow control lt range gt Description To disable the flow control function of the port Argument lt range gt syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 24 Example SGR24i port disable flow control 6 disable state Syntax disable state lt range gt Description To disable the communication capability of the port Argument lt range gt syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 24 Example SGR24i port disable state 12 256 enable flow control Syntax enable flow control lt range gt Description To enable the flow control function of the port Argument lt range gt syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 24 Example SGR24i port enable flow control 3 8 enable state Syntax enable state lt range gt Description To enable the communication capability of the port Argument lt range gt syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 24 Examp
199. t When the port is set to Hybrid its packets will be untagged out if the VID of the outgoing packets with tag is the same as the one in the field of Untag VID of this port Untag VID Valid range is 1 4094 It works only when Role is set to Hybrid 64 VLAN Port Configuration Port VLAN Aware Ingress Filtering Frame Type Role Untag YID Access Access Access ralicallicaliics Access Access LS LS ILS ILS ILS ILS EJIE Access Access Access omOmon oot OUN Access SIE ILS Access Access EJIE Access Access Access EJE Access O Fi l O Oo d l Pi l O O Oo Oo Oo Oo Oo fe ec i oOVFyoOYyo o o o o yoyoyolyoyo o oo oa LS S HLS SESS NLS LSS ILS js Access Fig 3 24 65 3 3 5 Management Function name Management Function description To assign a specific VLAN for management purpose Parameter description VID Specific Management VLAN ID Management VLAN vano E Fig 3 25 66 3 4 MAC MAC Table Configuration gathers many functions including MAC Table Information MAC Table Maintenance Static Forward Static Filter and MAC Alias which cannot be categorized to some function type They are described below 3 4 1 Mac Address Table Function name MAC Address Table Inform
200. t and password of the email server Argument lt username gt email server account and password Possible value None Example SGR24i alarm email set user admin show Syntax show Description To display the configuration of e mail Argument None Possible value None Example SGR24i alarm email show ail Server 192 168 1 6 Username admin Password kkkxkxkxkxkxkxk xkxkxkxkxk kxx xx k Email Address abc mail abc com Email Address Email Address Email Address Email Address Email Address DoF WNE 215 lt lt events gt gt del all Syntax del all lt range gt Description To disable email sms and trap of events Argument lt range gt del the range of events syntax 1 5 7 Possible value lt range gt 1 24 Example SGR24i alarm events del all 1 3 del email Syntax del email lt range gt Description To disable the email of the events Argument lt range gt del the range of email syntax 1 5 7 Possible value lt range gt 1 24 Example SGR24i alarm events del email 1 3 del sms Syntax del sms lt range gt Description To disable the sms of the events Argument lt range gt del the range of sms syntax 1 5 7 Possible value lt range gt 1 24 Example SGR24i alarm events del sms 1 3 216 del trap Syntax del trap lt range gt Description To disable the trap of the events Argument lt range gt del the
201. thPeriod maxReg 1 10 1 65535 sec 0 65535 sec 1 65535 sec 1 10 suppTimeout 1 255 sec serverTimeout 1 255 sec Fig 3 145 3 10 3 Status Function name 802 1X Status Function description Show the each port IEEE 802 1X authentication current operating mode and status Parameter description Port Port number 1 24 Mode Show this port IEEE 802 1X operating mode There are four modes Disable Normal Advance and Clientless Status Show this port IEEE 802 1X security current status Authorized or Unauthorized 154 802 1X Status Port Mode Status Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable i 2 3 4 5 6 7 8 Fig 3 146 155 3 10 4 Statistics Function name 802 1X Port Statistics Port1 Function description Show the IEEE 802 1X authentication related counters for manager monitoring authenticator status Parameter description Port Port Number 1 24 Auto refresh Refresh the authenticator counters in the web UI automatically Refresh Click on the lt Refresh gt to update the authenticator counters in the web Ul Clear Click on the lt Clear gt to clear all authenticator counters in the web UI 802 1X Port Statistics Port 1 Port Auto refresh O Authenticator Counters authEntersConnecting authEapLogoffsWhileConnecting authEntersAu
202. the party so affected shall be executed from any further performance for a period of time after the occurrence as may reasonably be necessary to remedy the effects of that occurrence but in no event more than sixty 60 days If any of the stated events should occur Party A shall promptly notify Party B in writing as soon as commercially practicable but in no event more than twenty 20 business days and provide documentation evidencing such occurrence In no event shall the maximum liability of AMER com under this warranty exceed the purchase price of the Product covered by this warranty DISCLAIMER EXCEPT AS SPECIFICALLY PROVIDED ABOVE AS REQUIRED AS IS AND THE WARRANTIES AND REMEDIES STATED ABOVE ARE EXCLUSIVE AND IN LIEU OF ALL OTHERS ORAL OR WRITTEN EXPRESS OR IMPLIED ANY AND ALL OTHER WARRANTIES INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR THIRD PARTY RIGHTS ARE EXPRESSLY EXCLUDED AMER COM SOFTWARE LICENSE AGREEMENT NOTICE Please carefully read this Software License Agreement hereinafter referred to as this Agreement before copying or using the accompanying software or installing the hardware unit with pre enabled software or firmware each of which is referred to as Software in this Agreement BY COPYING OR USING THE SOFTWARE YOU ACCEPT ALL OF THE PROVISIONS AND CONDITIONS OF THIS AGREEMENT THE PROVISIONS EXPRESSED IN THIS AGREEMENT ARE THE ONLY PROVISION UND
203. the port number The number is 1 24 Both port 21 24 are optional modules Link Show that if the link on the port is active or not If the link is connected to a working well device the Link will show the link Up otherwise it will show Down 49 This is determined by the hardware on both devices of the connection No default value Speed Duplex Mode Display the speed and duplex of all port There are three speeds 10Mbps 100Mbps and 1000Mbps supported for TP media and the duplex supported is half duplex and full duplex If the media is 1Gbps fiber it is 1000Mbps supported only The status of speed duplex mode is determined by 1 the negotiation of both local port and link partner in Auto Speed mode or 2 user setting in Force mode The local port has to be preset its capability Default None depends on the result of the negotiation Flow Control Show each port s flow control status There are two types of flow control in Ethernet Backpressure for half duplex operation and Pause flow control IEEE802 3x for full duplex operation The switch supports both of them Default None depends on the result of the negotiation Description network managers provide a description of device ports 50 Port 21 Detail Information Connector Type Fiber Type SFP LC EAEAN Mutti mode MM Baud Rate 850 Vendor OUI 1G CITC 00 40 7 Vendor PN AMER COM Vendor SN Date Code IFO006
204. thenticating authAuthSuccessesWhileauthenticating authAuthTimeouts WhileAuthenticating authAuthFailWhileAuthenticating authAuthEapStarts Whileauthenticating authAuthEapLogoffWhileAuthenticating authAuthReauths Whileauthenticated authAuthEapStarts WhileAuthenticated authAuthEapLogoffWhileAuthenticated jauthentersConnecting a JauthEapLogoffswhileConnecting Jauthentersauthenticating JauthauthSuccesseswhileauthenticating jauthauthTimeoutswhileauthenticating JauthauthFailWhileauthenticating JauthauthEapStartswhileauthenticating JauthauthEapLogoffWhileauthenticating jauthauthReauthswhileauthenticated JauthauthEapStartswhileauthenticated JauthauthEapLogoffWhileauthenticated a Backend Authenticator Counters ackendResponses ackendAccessChallenges ackendOtherRequestsToSupplicant ackendAuthSuccesses ackendAuthFails eooocoe Fig 3 147 156 3 11 Trunking Configuration The Port Trunking Configuration is used to configure the settings of Link Aggregation You can bundle more than one port with the same speed full duplex and the same MAC to be a single logical port thus the logical port aggregates the bandwidth of these ports This means you can apply your current Ethernet equipments to build the bandwidth aggregation For example if there are three Fast Ethernet ports aggregated in a logical port then this logical port has bandwidth three times as high as a single Fast Ethernet port has The switch supports two kinds of port tru
205. tically on the UI screen Refresh The simple counts will be refreshed manually when user use mouse to click on Refresh button Clear The simple counts will be reset to zero when user use mouse to click on Clear button 54 3 2 4 Detail Counter The function of Detail Counter collects any information and provides the counting about the traffic of the port no matter the packet is good or bad In the Fig 3 16 the window can show only one port counter information at the same time To see another port s counter you have to pull down the list of Select then you will see the figures displayed about the port you had chosen Each data field has 20 digit long If the counting is overflow the counter will be reset and restart counting The data is updated every time interval defined by the user The valid range is 3 to 10 seconds The Refresh Interval is used to set the update frequency Default update time is 3 seconds Detailed Port Statistics Port 1 Port 1 Y Auto refresh o Receive Total Transmit Total Rx Packets 17438 Tx Packets 5463 Rx Octets 2456877 Tx Octets 1730395 Rx Unicast 9361 Tx Unicast 5461 Rx Multicast 1035 Tx Multicast 0 Rx Broadcast 7042 Tx Broadcast 2 Rx Pause 0 Tx Pause 0 Rx 64 Bytes 10611 Tx 64 Bytes 1080 Rx 65 127 Bytes 2066 Tx 65 127 Bytes ily Rx 128 255 Bytes 1659 Tx 128 255 Bytes 2878 Rx 256 511 Bytes 3065 Tx 256 511 Bytes 216 Rx 512 1023 Bytes 35 Tx 512 1023 Bytes 1152 Rx 1024 1526 Byte
206. tion of the system Argument None Possible value None Example SGR24i ip disable dhcp enable dhcp Syntax enable dhcp lt manual auto gt Description To enable the system DHCP function and set DNS server via manual or auto mode Argument lt manuallauto gt set dhcp by using manual or auto mode Possible value lt manuallauto gt manual or auto Example SGR24i ip enable dhcp manual set dns Syntax set dns lt ip gt Description To set the IP address of DNS server Argument lt ip gt dns ip address Possible value 168 95 1 1 Example SGR24i ip set dns 168 95 1 1 240 set ip Syntax set ip lt ip gt lt mask gt lt gateway gt Description To set the system IP address subnet mask and gateway Argument lt ip gt ip address lt mask gt subnet mask lt gateway gt default gateway Possible value lt ip gt 192 168 1 2 or others lt mask gt 255 255 255 0 or others lt gateway gt 192 168 1 253 or others Example SGR24i ip set ip 192 168 1 2 255 255 255 0 192 168 1 253 show Syntax show Description To display the system s DHCP function state IP address subnet mask default gateway DNS mode DNS server IP address and current IP address Argument None Possible value None Example SGR24i ip show DHCP Disable IP Address 192 168 2 237 Current IP Address 192 168 2 237 Subnet mask 7 259129929940 Gateway e 1
207. tion will take place on this port Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt ebl gt 0 OFF Disable reauthentication 1 ON Enable reauthentication Possible value lt port range gt 1 to 24 lt ebl gt 0 or 1 default is 1 Example SGR24i 802 1X set reAuthEnabled 2 1 set reAuthMax 207 Syntax set reAuthMax lt port range gt lt max gt Description The number of reauthentication attempts that are permitted before the port becomes Unauthorized Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt max gt max value range 1 10 Possible value lt port range gt 1 to 24 lt max gt 1 10 default is 2 Example SGR24i 802 1X set reAuthMax 2 2 set reAuthPeriod Syntax set reAuthPeriod lt port range gt lt sec gt Description A constant that defines a nonzero number of seconds between periodic reauthentication of the supplicant Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt sec gt timer range 1 65535 Possible value lt port range gt 1 to 24 lt sec gt 1 65535 default is 3600 Example SGR24i 802 1X set reAuthPeriod 2 3600 set serverTimeout Syntax set serverTimeout lt port range gt lt sec gt Description A timer used by the Backend Authentication state machine in order to determine timeout conditions in the exchanges between the Authenticator and the Supplicant or Authentication Server T
208. to 7 DISCARDING 2000000 128 o Auto 8 DISCARDING 2000000 128 o Auto 9 DISCARDING 2000000 128 o Auto 10 DISCARDING 2000000 128 o Auto 11 DISCARDING 2000000 128 o Auto 12 DISCARDING 2000000 128 o Auto 13 DISCARDING 2000000 128 o Auto 14 DISCARDING 2000000 128 o Auto 15 DISCARDING 2000000 128 Auto 16 DISCARDING 2000000 128 o Auto 17 DISCARDING 2000000 128 Auto 18 DISCARDING 2000000 128 o Auto 19 DISCARDING 2000000 128 o Auto 20 DISCARDING 2000000 128 Auto 21 DISCARDING 2000000 128 Auto 22 DISCARDING 2000000 128 Auto q to quit 23 DISCARDING 2000000 128 Auto 24 DISCARDING 2000000 128 o Auto 269 show status Syntax show status Description To display the status of STP Argument None Possible value None Example SGR24i stp show status STP Status STP State Bridge ID Bridge Priority Designated Root Designated Priority Root Port Root Path Cost Current Max Age sec Current Forward Delay sec Hello Time sec STP Topology Change Count Time Since Last Topology Change sec Enabled 00 40 C7 D8 09 1D 61440 00 40 C7 D8 09 1D 61440 0 0 20 T5 2 0 848 270 m system set contact Syntax set contact lt contact string gt Description To set the contact description of the switch Argument lt contact gt string length up to 40 characters Possible value lt contact gt A b c d z and 1 2 3 etc Example SGR24i s
209. ty 32768 o o 20 15 2 o o Fig 3 151 164 3 12 2 Configuration The STP Spanning Tree Protocol actually includes RSTP In the Spanning Tree Configuration there are six parameters open for the user to configure as user s idea Each parameter description is listed below Function name STP Configuration Function description User can set the following Spanning Tree parameters to control STP function enable disable select mode RSTP STP and affect STP state machine behavior to send BPDU in this switch The default setting of Spanning Tree Protocol is Disable Parameter description Spanning Tree Protocol Set 802 1W Rapid STP function Enable Disable Default is Disable Bridge Priority The lower the bridge priority is the higher priority it has Usually the bridge with the highest bridge priority is the root If you want to have the SGR24i as root bridge you can set this value lower than that of bridge in the LAN The valid value is 0 61440 The default is 32768 Hello Time Max Hello Time is used to determine the periodic time to send normal BPDU from designated ports among bridges It decides how long a bridge should send this message to other bridge to tell am alive When the SGR24i is the root bridge of the LAN for example all other bridges will use the hello time assigned by this switch to communicate with each other The valid value is 1 10 in unit of second Default is 2 sec
210. ue lt port range gt 1 to 24 lt sec gt 1 65535 default is 30 Example SGR24i 802 1X set suppTimeout 2 30 set txPeriod Syntax set txPeriod lt port range gt lt sec gt Description A timer used by the Authenticator PAE state machine to determine when an EAPOL PDU is to be transmitted Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt sec gt timer range 1 65535 Possible value lt port range gt 1 to 24 lt sec gt 1 65535 default is 30 Example SGR24i 802 1X set txPeriod 2 30 show mode Syntax show mode Description To display the mode of each port Argument None Possible value None 209 Example SGR24i 802 1X POLt Mode Disable Multi host Disabl Disabl Disabl Disabl Nu PB WNE show parameter Syntax show parameter Description e e e e show mode To display the parameter settings of each port Argument None Possible value None Auto 2 30 60 ON 3600 2 30 30 Auto 30 60 ON 3600 30 30 To display the authentication status of each port Example SGR24i 802 1X show parameter port 1 port control reAuthMax txPeriod Quiet Period reAuthEnabled reAuthPeriod max Request suppTimeout serverTimeout port 2 port control reAuthMax txPeriod Quiet Period reAuthEnabled reAuthPeriod max Request suppTimeout serverTimeout show security Syntax show security Des
211. uilding premise cable is faulty e The port may be faulty 5 2 Q amp A 1 Computer A can connect to Computer B but cannot connect to Computer C through the Managed Switch v The network device of Computer C may fail to work Please check the link act status of Computer C on the LED indicator Try another network device on this connection v The network configuration of Computer C may be something wrong Please verify the network configuration on Computer C 2 The uplink connection function fails to work v The connection ports on another must be connection ports Please check if connection ports are used on that Managed Switch v Please check the uplink setup of the Managed Switch to verify the uplink function is enabled 3 The console interface cannot appear on the console port connection v The COM port default parameters are Baud Rate 115200 Data Bits 8 Parity Bits None Stop Bit A Flow Control None Please check the COM port property in the terminal program And if the parameters are changed please set the COM configuration to the new setting v Check the RS 232 cable is connected well on the console port of the Managed Switch and COM port of PC v Check if the COM of the PC is enabled 4 How to configure the Managed Switch v The Hyperterm is the terminal program in Win95 98 NT Users can also use any other terminal programs in Linux Unix to configure the Managed Switch Please refer to the user guide of that te
212. ument lt ip gt the IP address of tftp server Possible value lt ip gt tftp server ip Example SGR24i tftp set server 192 168 3 111 show Syntax show Description To display the information of tftp server Argument None Possible value None Example SGR24i tftp show Tftp Server 192 168 3 111 273 time set daylightsaving Syntax set daylightsaving lt hr gt lt MM DD HH gt lt mm dd hh gt Description To set up the daylight saving Argument hr daylight saving hour range 5 to 5 M daylight saving start Month 01 12 DD daylight saving start Day 01 31 HH daylight saving start Hour 00 23 mm daylight saving end Month 01 12 dd daylight saving end Day 01 31 hh daylight saving end Hour 00 23 Possible value hr 35 stot M 01 12 DD 01 31 HH 00 23 mm 01 12 dd z lt O4 gt 31 hh gt 00 23 Example SGR24i time set daylightsaving 3 10 12 01 11 12 01 Save Successfully set manual Syntax set manual lt YYYY MM DD gt lt hh mm ss gt Description To set up the current time manually Argument YYYY Year 2000 2036 MM Month 01 12 DD Day 01 31 hh Hour 00 23 mm Minute 00 59 ss Second 00 59 Possible value YYYY 2000 2036 MM 01 12 DD 01 31 hh 00 23 mm 00 59 ss 00 59 Example SGR24i time set manual 2004 12 23 16 18 00 set ntp Syntax set ntp lt ip gt lt timezone gt
213. up for changing gvrp group setting You can change the applicant or registrar mode of existing gvrp group per port Argument lt group number gt enter which gvrp group you had created using value is vid Available range 1 to 4094 Possible value lt group number gt 1 4094 Example SGR24i gvrp show group GVRP group information Current Dynamic Group Number 1 VID Member Port 2 5 232 SGR24i gvrp group 2 SGR24i gvrp group 2 set applicant 1 6 non participant SGR24i gvrp group 2 show GVRP group VID 2 Port Applicant Registrar Non Participant Normal Non Participant Normal Non Participant Normal Non Participant Normal Non Participant Normal Non Participant Normal Normal Normal Normal Normal Normal Normal Normal Normal PrRFOoOaNAUBWNE Wh 23 Normal Normal 24 Normal Normal SGR24i gvrp group 2 set registrar 1 10 fixed SGR24i gvrp group 2 show GVRP group VID 2 Port Applicant Registrar 1 Non Participant Fixed 2 Non Participant Fixed 3 Non Participant Fixed 4 Non Participant Fixed 5 Non Participant Fixed 6 Non Participant Fixed 7 Normal Fixed 8 Normal Fixed 9 Normal Fixed 10 Normal Fixed 17 Normal Normal 23 Normal Normal 24 Normal Normal 233 set applicant Syntax set applicant lt range gt lt normal non participant gt Description To set default applicant mode for each port Argument lt range gt port range syntax 1 5 7 availab
214. us Port Key 2 257 Sa 2 0 show lacp priority Syntax show lacp priority Description To display the value of LACP Priority 277 Argument None Possible value None Example SGR24i trunk show lacp priority LACP System Priority 32768 show status Syntax show status Description To display the aggregator status and the settings of each port Argument None Possible value None Example SGR24i trunk show status Trunk Port Setting Trunk Port Status port Method Group Active LACP Aggtregator Status 1 None 0 Active 1 Ready 2 LACP T Active 2 ase 3 LACP 1 Active 3 S 4 LACP d Active 4 T73 5 LACP 1 Active 5 Soz 6 LACP 1 Active 6 oat 7 LACP d Active 7 ae 19 None 0 Active 19 20 None 0 Active 20 gt 21 None 0 Active 21 ke 22 None 0 Active 22 eae ae 23 None 0 Active 23 SES 24 None 0 Active 24 see 278 a vlan del port group Syntax del port group lt name gt Description To delete the port based vlan group Argument lt name gt which vlan group you want to delete Possible value lt name gt port vlan name Example SGR24i vlan del port group VLAN 2 del tag group Syntax del tag group lt vid gt Description To delete the tag based vlan group Argument lt vid gt which vlan group you want to delete available from 1 to 4094 Possible value lt vid gt 1 to 4094 Example SGR24i vlan del tag group 2 disable drop untag
215. uses a trunking method other than None It also represents the management link status of a port which uses the None trunking method means not ready Trunk Port Setting Status Trunk Port Setting Trunk Port Status COETIR crave Tacit ace neni states None Active v Ready Active v Active v Active Active Active Active Active Active Active Active Active Active Active Active Fig 3 148 lt None None 1 None None None None SeVyoVyo oyoyoyo won non amp WN None SS ISIS SIS SNE None None N None m w None m None Em En Ez EH ET Ea None E EH E E EE EH SSN SS IS SS SSN SSS SS oeVoVyo o o SIS ISN NSE SSN SNS INS S SS SSNS IS jb j on None 160 3 11 2 Aggregator View Function name Aggregator View Function description To display the current port trunking information from the aggregator point of view Parameter description Aggregator It shows the aggregator ID from 1 to 24 of every port In fact every port is also an aggregator and its own aggregator ID is the same as its own Port No Method Show the method a port uses to aggregate with other ports Member Ports Show all member ports of an aggregator
216. utting user password via the authenticator PAE The supplicant will convert user password into the credential information perhaps in MD5 format and replies an EAP Response with this credential information as well as the specified authentication algorithm MD5 or OTP to Authentication server via the authenticator PAE As per the value of the type field in message PDU the authentication server knows which algorithm should be applied to authenticate the credential information EAP MD5 Message Digest 5 or EAP OTP One Time Password or other else algorithm 147 8 If user ID and password is correct the authentication server will send a Radius Access Accept to the authenticator If not correct the authentication server will send a Radius Access Reject 9 When the authenticator PAE receives a Radius Access Accept it will send an EAP Success to the supplicant At this time the supplicant is authorized and the port connected to the supplicant and under 802 1X control is in the authorized state The supplicant and other devices connected to this port can access the network If the authenticator receives a Radius Access Reject it will send an EAP Failure to the supplicant This means the supplicant is failed to authenticate The port it connected is in the unauthorized state the supplicant and the devices connected to this port won t be allowed to access the network 10 When the supplicant issue an EAP Logoff message to Authentication serv
217. ware Upload Function description Click on lt Browse gt to select a specific SGR24i firmware file from the Web management PC then click on lt Upload gt to confirm the upgrade firmware action The new firmware will be uploaded into the switch and write into flash memory You have to reboot the switch for new firmware take effect after the firmware upgrade successfully Firmware Update Upload Fig 3 176 195 3 21 Logout You can manually logout by performing Logout function In the switch it provides another way to logout You can configure it to logout automatically Function name Logout Function description The switch allows you to logout the system to prevent other users from the system without the permission If you do not logout and exit the browser the switch will automatically have you logout in five minutes Besides this manually logout Parameter description Logout Click on lt Logout gt to leave the web UI management function Logout Press Logout if you want to quit Fig 3 177 196 4 Operation of CLI Management 4 1 CLI Management Refer to Chapter 2 for basic installation The following description is the brief of the network connection Locate the correct DB 9 null modem cable with female DB 9 connector Null modem cable comes with the management switch Refer to the Appendix B for null modem cable configuration Attach the DB 9 female connector to the male DB 9 serial port
218. witch with SNMP agent issuing the trap message 6 trap hosts can prevent the important trap message from losing For each public trap the switch supports the trap event Cold Start Warm Start Link Down Link Up and Authentication Failure Trap They can be enabled or disabled individually When enabled the corresponded trap will actively send a trap message to the trap host when a trap happens If all public traps are disabled no public trap message will be sent As to the Enterprise no 6 trap is classified as private trap which are listed in the Trap Alarm Configuration function folder Default for all public traps Enable SNMP Configuration ISNMP o Enable Disable private Enable v 0 0 0 0 162 Community public 0 0 0 0 162 Community public 0 0 0 0 162 Community public 0 0 0 0 162 Community public 0 0 0 0 162 Community public 0 0 0 0 162 Community public Fig 3 63 Community and trap host setting 102 3 8 ACL The SGR24i switch access control list ACL is probably the most commonly used object in the IOS It is used for packet filtering but also for selecting types of traffic to be analyzed forwarded or influenced in some way The ACLs are divided into EtherTypes IPv4 ARP protocol MAC and VLAN parameters etc Here we will just go over the standard and extended access lists for TCP IP As you create ACEs
219. word changed successfully show Syntax show Description To show system account including account name and identity Argument None Possible value None Example SGR24i account show Account Name Identity admin Administrator guest guest 213 alarm lt lt email gt gt del mail address Syntax del mail address lt gt Description To remove the configuration of E mail address Argument lt gt email address number range 1 to 6 Possible value lt gt 1106 Example SGR24i alarm email del mail address 2 del server user Syntax del server user Description To remove the configuration of server user account and password Argument None Possible value None Example SGR24i alarm email del server user set mail address Syntax set mail address lt gt lt mail address gt Description To set up the email address Argument lt gt email address number range 1 to 6 lt mail address gt email address Possible value lt gt 1106 Example SGR24i alarm email set mail address 1 abc mail abc com 214 set server Syntax set server lt ip gt Description To set up the IP address of the email server Argument lt ip gt email server ip address or domain name Possible value None Example SGR24i alarm email set server 192 168 1 6 set user Syntax set user lt username gt Description To set up the accoun
220. ystem set contact Taipei set device name Syntax set device name lt device name string gt Description To set the device name description of the switch Argument lt device name gt string length up to 40 characters Possible value lt device name gt A b c d z and 1 2 3 etc Example SGR24i system set device name CR 2600 set location Syntax set location lt location string gt Description To set the location description of the switch Argument lt location gt string length up to 40 characters Possible value lt location gt A b c d z and 1 2 3 etc Example SGR24i system set location Taipei 271 show Syntax show Description To display the basic information of the switch Argument None Possible value None Example SGR24i system show Model Name System Description Location Contact Device Name System Up Time Current Time BIOS Version Firmware Version Hardware Mechanical Version Serial Number Host IP Address Host MAC Address Device Port 2 RAM Size Flash Size SGR24i L2 Managed Switch SGR24i 0 Days 0 Hours 4 Mins 14 Secs Tue Jan 17 16 28 46 2006 v1 05 v2 08 vl 01 v1 01 030C02000003 192 168 1 1 00 40 c7 e7 00 10 UART 1 TP 22 Dual Media Port RJ45 SFP 16 M 2M 272 tftp set server Syntax set server lt ip gt Description To set up the IP address of tftp server Arg
Download Pdf Manuals
Related Search
Related Contents
Demande de prêt de matériel Electrolux EDI 96150 W User's Manual Fujitsu LIFEBOOK E780 取扱説明書 ご使用前に必ずご確認ください Genius Pen Mouse ー 卿 -` - 自転車協会 User Manual 取扱説明書=本体表示などの注意書き狂こ従った使用状態で保証期間内 Sony IC Diktafon ICD-SX46 Copyright © All rights reserved.
Failed to retrieve file