Home
User's Manual
Contents
1. EAP Request EAP Success EAP Failure
2. Access allowed Fig 3 51 Publication date May 2005 Revision Al 114 User Manual Only MultiHost 802 1X is the type of authentication supported in the switch In this mode for the devices connected to this port once a supplicant is authorized the devices connected to this port can access the network resource through this port 802 1x Port based Network Access Control function supported by the switch is little bit complex for it just support basic Multihost mode which can distinguish the device s MAC address and its VID The following table is the summary of the combination of the authentication status and the port status versus the status of port mode set in 802 1x Port mode port control state set in 802 1x port setting Here Entry Authorized means MAC entry is authorized Eon WV Foye oon Control A uthentication Port Status Port Uncontrolled Multihost Port Authorized Multihost Port Unauthorized Multihost ForceUnauthorized Port Unauthorized Multihost ForceAuthorized Port Authorized Table 3 3 Publication date May 2005 Revision Al 115 User Manual Function name 802 1x State Setting Function description This function is used to configure the global parameters for RADIUS authentication in 802 1x port security app
3. Fig 3 59 Save the current configuration as a user configuration file in flash memory 0 0 hE S eeoed O lenena m GAS Auto Logout 3min eS gA wilem Pert irror fond width s She IGMP Smeeping TFTP Server Log Firmyr rr Lipgrade Reboot Logos _ ao Mie dt Yew Prin Took Heb T Configuration MEE Sere os start configuration Sere as User Configuration Rettore Cela Configuration ALIN erore ser Coniovetion Fig 3 60 Publication date May 2005 Revision Al 125 User Manual Function name Restore Default Configuration Function description Restore Default Configuration function can retrieve the ex factory setting to replace the start configuration Auto Logout 3 min System Restore Default Configuration Successful Port Mirror Bandwidth QoS Reboot the system to take effect for the setting IGMP Snooping Max Packet Length DHCP Boot VLAN MAC Table GVRP STP Trunk 802 1X Alarm Configuration Save Restore Config file Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 61 Function name Restore User Configuration Function description Restore User Configuration function can retrieve the previous confirmed working configuration stored in the flash memory to update start configuration When completing to restore the configuration the system s start configuration is updated and will be changed its system set
4. Publication date May 2005 Revision Al 185 User Manual Example GSW 2494 gvrp show config GVRP state Enable Port Join Time Leave Time LeaveAll Time Applicant Registrar Restricted 1 20 60 1000 Normal Normal Disable 2 25 80 2000 Normal Normal Disable 3 25 80 2000 Normal Normal Disable 4 25 80 2000 Normal Normal Disable 5 25 80 2000 Normal Normal Disable 6 25 80 2000 Normal Normal Disable T 25 80 2000 Normal Normal Disable 8 25 80 2000 Normal Normal Disable 9 20 60 1000 Normal Normal Disable 10 20 60 1000 Normal Normal Disable 11 20 60 1000 Normal Normal Disable 12 20 60 1000 Normal Normal Disable 13 20 60 1000 Normal Normal Disable 14 20 60 1000 Normal Normal Disable 15 20 60 1000 Normal Normal Disable 16 20 60 1000 Normal Normal Disable 17 20 60 1000 Normal Normal Disable 18 20 60 1000 Normal Normal Disable 19 20 60 1000 Normal Normal Disable 20 20 60 1000 Normal Normal Disable 21 20 60 1000 Normal Normal Disable ion Gre to guit 22 20 60 1000 Normal Normal Disable 23 20 60 1000 Normal Normal Disable 24 20 60 1000 Normal Normal Disable show group Syntax show group Description To show the gvrp group Argument none Possible value none Example GSW 2494 evrp show group GVRP group information VID Member Port Publication date May 2005 Revision Al 186 User Manual stp enable Syntax enable Description To enable the STP function Argument None Possible va
5. Show the trunk status of a single member port means not ready Auto Logout 3min _ System Aggregator 3 Information Port Mirror Bandwidth Partner 0 SNMP i 32768 00 40 c7 d9 12 0a 32768 00 00 00 00 00 00 rA s port Koy Trunk status Port DHCP Boot 3 258 Ready 3 VLAN MAC Table GYRP STP Trunk Port Aggregator View LACP System Priority 802 1X Alarm Configuration Diagnostics TFTP Server Firmware Upgrade Reboot Logout Fig 4 47 Publication date May 2005 Revision Al 109 User Manual Function name LACP System Priority Function description lt is used to set the priority part of the LACP system ID LACP will only aggregate together the ports whose peer link partners are all on a single system Each system supports LACP will be assigned a globally unique System Identifier for this purpose A system ID is a 64 bit field comprising a 48 bit MAC Address and 16 bit priority value The System Priority can be set by the user Its range is from 1 to 65535 Default 32768 Auto Logout3min System Port Mirror Bandwidth Qos SNMP IGMP Snooping Max Packet Length DHCP Boot VLAN MAC Table GVRP Aggregator View LACP Syste riority 802 1X aw Alarm Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Publication date May 2005 Revision Al LACP System Priority System Priority 32768 1 65535 Fig 3 48 110 User Manual 3 15 802 1x Confi
6. Alarm Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 25 Publication date May 2005 Revision Al 76 User Manual Up link Port This function is enabled only when metro mode is chosen in VLAN mode level one System Port Mirror Bandwidth oS SNMP IGMP Snooping DHCP Boot VLAN VLAN Mode Tag Rule MAC Table GYRP Alarm Configuration Diagnostics TFTP Server Log Reboot Logout Up link Port N Max Packet Length W123 amp 24 23 Except Port 23 each port of the switch cannot transmit packets with each other Each port groups a VLAN with Port 23 thus total 23 groups consisting of 2 members are formed 24 Except Port 24 each port of the switch cannot transmit packets with each other Each port groups a VLAN with Port 24 thus total 23 groups consisting of 2 members are formed 23824 Except Port 23 and Port 24 each port of the switch cannot transmit packets with each other Each port groups a VLAN with Port 23 and Port 24 thus total 22 groups consisting of 3 members are formed Auto Logout 3 min E GSW 2494 VLAN Mode ETE Metro mode Tag based Group Port based Group Firmware Upgrade Fig 3 26 Publication date May 2005 Revision Al Ai User Manual 3 10 2 Tag based Group Function name Tag based Group Configuration Function description It shows the information of existed Tag based VLAN Groups You c
7. Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 24 Publication date May 2005 Revision Al 74 User Manual 3 10 VLAN The switch supports Tag based VLAN 802 1q and Port based VLAN Support 256 active VLANs and VLAN ID 1 4094 VLAN configuration is used to partition your LAN into small ones as your demand Properly configuring it you can gain not only improving security and increasing performance but greatly reducing VLAN management 3 10 1 VLAN Mode Function name VLAN Mode Setting Function description The VLAN Mode Selection function includes five modes Port based Tag based Metro Mode Double tag and Disable you can choose one of them by pulling down list and pressing the lt Downward gt arrow key Then click lt Apply gt button the settings will take effect immediately Parameter description VLAN Mode Disable Stop VLAN function on the switch In this mode no VLAN is applied to the switch This is the default setting Port based Port based VLAN is defined by port Any packet coming in or outgoing from any one port of a port based VLAN will be accepted No filtering criterion applies in port based VLAN The only criterion is the physical port you connect to For example for a port based VLAN named PVLAN 1 contains port members Port 1 amp 2 amp 3 amp 4 If you are on the port 1 you can communicate with port 2 amp 3 amp 4 If you are on the port 5 then you
8. Description To set up the Ingress rate of the ports Argument lt range gt syntax 1 5 7 available from 1 to 24 lt data_rate gt 0 1000 Possible value lt range gt 1 to 24 lt data_rate gt 0 1000 Example GSW 2494 bandwidth enable ingress rate 1 16 100 enable storm rate Syntax enable storm rate lt range gt lt data_rate gt Description To set up the storm rate of the ports Argument lt range gt syntax 1 5 7 available from 1 to 24 lt data_rate gt 0 1000 Possible value lt range gt 1 to 24 lt data_rate gt 0 1000 Example GSW 2494 bandwidth enable strom rate 1 16 150 enable egress rate Syntax enable egress rate lt range gt lt data_rate gt Description To set up the egress rate of the port Argument lt range gt syntax 1 5 7 available from 1 to 24 lt data_rate gt 0 1000 Possible value lt range gt 1 to 24 lt data_rate gt 0 1000 Example GSW 2494 bandwidth enable egress rate 1 16 200 Publication date May 2005 Revision Al 160 User Manual disable ingress rate Syntax disable ingress rate lt range gt Description To cancel the Ingress rate of the port Argument lt range gt syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 to 24 Example GSW 2494 bandwidth disable ingress rate 1 8 disable storm rate Syntax disable ingress rate lt range gt Description To cancel the storm rate of the por
9. Disabled When in Enabled mode this function will automatically negotiate by hardware itself and exchange each other the capability of speed and duplex mode with other site which is linked and comes out the best communication way When in Disabled mode both parties must have the same setting of speed and duplex otherwise both of them will not be linked In this case the link result is Down Default Enabled Publication date May 2005 Revision Al 45 User Manual Speed Duplex Mode Display the speed and duplex of all port There are three speeds 10Mbps 100Mbps and 1000Mbps supported for TP media and the duplex supported is half duplex and full duplex If the media is 1Gbps fiber it is 1000Mbps supported only The status of speed duplex mode is determined by 1 the negotiation of both local port and link partner in Auto Speed mode or 2 user setting in Force mode The local port has to be preset its capability Default None depends on the result of the negotiation Flow Control Show each port s flow control status There are two types of flow control in Ethernet Backpressure for half duplex operation and Pause flow control IEEE802 3x for full duplex operation The switch supports both of them Default Disabled Publication date May 2005 Revision Al 46 User Manual E http 192 168 1 24 portfiber html Microsoft Internet Explorer Port 23 Detail Information SFP
10. Example GSW 2494 port clear counter enable state Syntax enable state lt range gt Description To enable the communication capability of the port Argument range syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 24 Example GSW 2494 port enable state 3 12 enable flow control Syntax enable flow control lt range gt Description To enable the flow control function of the port Argument range syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 24 Example GSW 2494 port enable flow control 3 8 Publication date May 2005 Revision Al 156 User Manual disable state Syntax disable state lt range gt Description To disable the communication capability of the port Argument range syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 24 Example GSW 2494 port disable state 12 disable flow control Syntax disable flow control lt range gt Description To disable the flow control function of the port Argument range syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 24 Example GSW 2494 port disable flow control 6 Publication date May 2005 Revision Al 157 User Manual mirror set mirror mode Syntax set mirror mode lt rx disable gt Description To set up the mode of Mirror rx mode or disable Argument lt rx disable gt rx Enable the mode of M
11. IP address of the default gateway For more details please see the section of IP address in Chapter 2 YV Log level one Auto Logout 3min i GSW 2494 System Ping Test Port Mirror ee Bandwidth IP Address 192 168 1 105 SNMP Default Gateway 192 168 1 253 IGMP Snooping Ping Result 192 168 1 105 is alive Max Packet Length DHCP Boot MAC Table GVRP Input an address to ping ex 192 168 1 1 Alarm Configuration Diagnostics Diag Loopback Ping Test TFTP Server Firmware Upgrade Reboot Logout Fig 3 66 Publication date May 2005 Revision Al 130 User Manual 3 19 TFTP Server Function name TFTP Server Function description Set up IP address of TFTP server Parameter description Specify the IP address where the TFTP server locates Fill in the IP address of your TF TP server then press lt Apply gt button to have the setting taken effect System TFTP Server Port Mirror Qos SNMP IGMP Snooping Max Packet Length DHCP Boot VLAN MAC Table GVRP STP Trunk 802 1X Alarm Configuration Diagnostics TFTP Syver Lo Firmware Upgrade Reboot Logout Fig 3 67 Publication date May 2005 Revision Al 131 User Manual 3 20 Log This function shows the log data The switch provides system log data for users There are 19 private trap logs 5 public trap logs The switch supports total 120 log entries For more details on log items please refer to t
12. section 2 1 3 2 Configuring the Management Agent of GSW 2494 through the Ethernet Port Note Please first modify the IP address Subnet mask Default gateway and DNS through RS 232 console and then do the next Publication date May 2005 Revision Al 15 User Manual 2 1 3 1 Configuring the Management Agent of GSW 2494 through the Serial RS 232 Port To perform the configuration through RS 232 console port the switch s serial port must be directly connected to a DCE device for example a PC through RS 232 cable with DB 9 connector Next run a terminal emulator with the default setting of the switch s serial port With this you can communicate with the switch In the switch RS 232 interface only supports baud rate 57 6k bps with 8 data bits 1 stop bit no parity check and no flow control RS 232 DB 9 Connector AC Line 100 240V 50 60 Hz AL Line TTY 1 50 baT Tres dences pompas mtb Den iy ai ta PCE Butea i TLES 24 Gigabit L2 Managed Switch Default IP Setting IP address 192 168 1 1 Subnet Mask 255 255 255 0 Default Gateway 192 168 1 254 RS 232 cable with female DB 9 connector at both ends Fig 2 6 Terminal or Terminal Emulator To configure the switch please follow the procedures below 1 Find the RS 232 DB 9 cable with female DB 9 connector bundled Normally it just uses pins 2 3 and 7 See also Appendix B for more details on Null Modem Cable Specifications 2 Attac
13. show Syntax show Description To display the system s DHCP function state IP address subnet mask default gateway DNS mode DNS server IP address and current IP address Argument None Possible value None Example GSW 2494 ip show DHCP Disable IP Address 192 168 2 65 Subnet mask e200 200 2950 Gateway 192 168 2 252 DNS Setting Manual DNS Server 168 95 1 1 Current IP 192 168 2 65 Publication date May 2005 Revision Al 149 User Manual time set manual Syntax set manual lt YYYY MM DD gt lt hh mm ss gt Description To set up the current time manually Argument lt YYYY MM DD gt lt hh mm ss gt Possible value YYYY Year 2000 2036 MM Month 01 12 DD Day 01 31 hh Hour 00 23 mm Minute 00 59 SS Second 00 59 Example GSW 2494 time set manual 2004 12 23 16 18 00 GSW 2494 time set ntp Syntax set ntp lt ip gt lt timezone gt Description To set up the current time via NTP server Argument ip ntp server ip address or domain name timezone time zone GMT range 12 to 13 Possible value Timezone 12 11 0 1 13 Example GSW 2494 time set ntp 210 59 157 10 8 GSW 2494 time Publication date May 2005 Revision Al 150 User Manual set daylightsaving Syntax set daylightsaving lt hr gt lt s MM DD hh gt lt e MM DD hh gt Description To set up the daylight saving Argument l
14. 61 User Manual Bit O Bit 1 Bit 2 According to the arrangement of VLAN tagged priority it can form 8 kinds of traffics including000 001 010 010 100 101 110 and 11 1 Class 8 kinds of traffic as mentioned above user can set up High Priority or Low Priority for each port respectively Publication date May 2005 Revision Al 62 User Manual Function name IP ToS Classification Function description Another QoS function is the application of Layer 3 on network framework We focus on TOS field of IP header There are three bits in TOS field We means bit 2 4 of TOS field that we will use According to these 3 bits we could arrange 8 traffics 000 001 010 010 100 101 110 111 As long as we change bit 5 7 of TOS field of IP header we will create the 8 traffic packets we meant before Moreover we can set High priority or Low priority for each traffic class For instance if we let TOS 0 0 0 be high priority and TOS 0 0 1 be Low Priority we sent in the packets that have bit 5 7 of TOS Field appears 0 0 0 from the port 2 and the packets that have bit 5 7 of TOS Field appears 0 0 1 from the port 3 We let the two kinds of packets be transmitted for port 1 until the port results in congestion The result is that the packets will be dropped partially from the port 3 because the packets that belong to Low Priority For the use of TOS Priority function please press lt Configure gt button at the right section for setting in advanc
15. DHCP Boot VLAN o z m f MAC Table GVRP i m ia z D z Trunk 802 1X i i Alarm Port based lan Enabled go E al Evapts Tag based Vlan Enabled Eml SMS is P P Configuration Metro mode Vlan Enabled go E E Diagnostics Double tag Vian Enabled TFTP Server B P be D z Firmware Upgrade o L Reboot Logout Dual Media Swapped oO O E v Fig 3 56 Function name Email SMS Configuration Function description Alarm configuration is used to configure the persons who should receive the alarm message via either email or SMS or both It depends on your settings An email address or a mobile phone number has to be set in the web page of alarm configuration See Fig 3 57 Then user can read the trap information from the email or the mobile phone This function provides 6 email addresses and 6 mobile phone numbers at most The 24 different trap events will be sent out to SNMP Manager when trap event occurs After ticking trap events you can fill in your desired email addresses and mobile phone numbers Then please click lt Apply gt button to complete the alarm configuration It will take effect in a few seconds Note SMS may not work in your mobile phone system It is customized for different systems Publication date May 2005 Revision Al 122 User Manual Parameter description Email Mail Server the IP address of the server transferring your email Username your username on the mail server Pass
16. LC Multi mode MM m A 00 0f 99 mini GBIC 0000 4203040299 040329 Vendors 3 3 3 3 oo 8 O 8 29 3 3 3 oo 82 amp ae A wi f Fig 3 8 Parameter description of Port 23 and Port24 Connector Type Display the connector type for instance UTP SC ST LC and so on Fiber Type Display the fiber mode for instance Multi Mode Single Mode Tx Central Wavelength Display the fiber optical transmitting central wavelength for instance 850nm 1310nm 1550nm and so on Baud Rate Display the maximum baud rate of the fiber module supported for instance 10M 100M 1G 10G and so on Vendor OUI Display the Manufacturer s OUI code which is assigned by IEEE Vendor Name Display the company name of the module manufacturer Vendor P N Display the product name of the naming by module manufacturer Vendor Rev Revision Display the module revision Publication date May 2005 Revision Al 47 User Manual Vendor SN Serial Number Show the serial number assigned by the manufacturer Date Code Show the date this SFP module was made Temperature Show the current temperature of SFP module Vcc Show the working DC voltage of SFP module Mon1 Bias mA Show the Bias current of SFP module Mon2 TX PWR Show the transmit power of SFP module Mon3 RX PWR Show the receiver power of SFP module Publication date May 2005 Revision Al 48 User Manual 3 2
17. Network 1D Subnet number Subnet mask is used to set the subnet mask value which should be the same value as that of the other devices resided in the same network it attaches For more information please also see the Section 2 1 4 IP Address Assignment in this manual Default 255 255 255 0 Default gateway Set an IP address for a gateway to handle those packets that do not meet the routing rules predefined in the device If a packet does not meet the criteria for other pre defined path it must be forwarded to a default router on a default path This means any packet with undefined IP address in the routing table will be sent to this device unconditionally Default 192 168 1 254 Publication date May 2005 Revision Al 33 User Manual DNS It is Domain Name Server used to serve the translation between IP address and name address The switch supports DNS client function to re route the mnemonic name address to DNS server to get its associated IP address for accessing Internet User can specify a DNS IP address for the switch With this the switch can translate a mnemonic name address into an IP address There are two ways to specify the IP address of DNS One is fixed mode which manually specifies its IP address the other is dynamic mode which is assigned by DHCP server while DHCP is enabled DNS can help you easily remember the mnemonic address name with the meaningful words in it Default is no assignm
18. Trunk 802 1X Alarm Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 6 Publication date May 2005 Revision Al 38 User Manual 3 1 5 Management Security Through the management security configuration the manager can do the strict setup to control the switch and limit the user to access this switch The following rules are offered for the manager to manage the switch Rule 1 When no lists exists then it will accept all connections Rule 2 When only accept lists exist then it will deny all connections excluding the connection inside of the accepting range Deny Accept __ Deny Rule 3 When only deny lists exist then it will accept all connections excluding the connection inside of the denying range Rule 4 When both accept and deny lists exist then it will deny all connections excluding the connection inside of the accepting range Accept Deny Deny _ Deny Rule 5 When both accept and deny lists exist then it will deny all connections excluding the connection inside of the accepting range and NOT inside of the denying range at the same time Accept Den Accept Deny Acc Deny Acc Deny Publication date May 2005 Revision Al 39 User Manual Function name Management Security Configuration Function description The switch offers Management Security Configuration function With
19. You must do it carefully Parameter description TFTP Server A TFTP server stored the image file you want to upgrade Path and Filename File path and filename stored the image file you want to upgrade level O DURER ee one Auto Logout 3 min System Firmware Upgrade Port Mirror Bandwidth TFTP Server 0 0 0 0 05 SNMP IGMP Snooping Max Packet Length DHCP Boot VLAN MAC Table GVRP STP Trunk 802 1X Alarm Configuration Diagnostics TFTP Server Log Firmwar e Upgrade Reboot P Logout Fig 3 69 Publication date May 2005 Revision Al 134 User Manual 3 22 Reboot We offer you many ways to reboot the switch including power up hardware reset and software reset You can press the RESET button in the front panel to reset the switch After upgrading software changing IP configuration or changing VLAN mode configuration then you must reboot to have the new configuration taken effect Here we are discussing is software reset for the reboot in the main menu Function name Reboot Function description Reboot the switch Reboot takes the same effect as the RESET button on the front panel of the switch It will take around thirty 30 seconds to complete the system boot Parameter description Save and Reboot Save the current settings as start configuration before rebooting the switch Reboot Reboot the system directly Auto Logout 3 min GSW 2494 Syst
20. age timer in seconds 0 10 to 65535 The value zero disables aging Possible value None Example GSW 2494 mac table maintain set aging 300 GSW 2494 mac table maintain set flush Syntax set flush Description To delete all of the MACs that is learned dynamically Argument None Possible value None Example GSW 2494 mac table maintain set flush GSW 2494 mac table maintain show Syntax show Description To display the settings of age timer Argument None Possible value None Example GSW 2494 mac table maintain show age timer 300 seconds GSW 2494 mac table maintain Publication date May 2005 Revision Al 179 User Manual lt lt static mac gt gt add Syntax add lt mac gt lt port gt lt vid gt alias Description To add the static mac entry Argument lt mac gt mac address format 00 02 03 04 05 06 lt port gt 0 24 the value zero means this entry is filtering entry lt vid gt vlan id 0 1 4094 vid must be zero if vlan mode is not tag based alias mac alias name max 15 characters Possible value None Example GSW 2494 mac table static mac add 00 02 03 04 05 06 3 0 aaa GSW 2494 mac table static mac del Syntax del lt mac gt lt vid gt Description To remove the static mac entry Argument lt mac gt mac address format 00 02 03 04 05 06 lt vid gt vlan id 0 1 4094 vid must be zero if vlan mode is not tag based
21. am alive When GSW 2494 is the root bridge of the LAN for example all other bridges will use the hello time assigned by this switch to communicate with each other The valid value is 1 10 in unit of second Default is 2 seconds Max Age When GSW 2494 is the root bridge the whole LAN will apply this figure set by this switch as their maximum age time When a bridge received a BPDU originated from the root bridge and if the message age conveyed in the BPDU exceeds the Max Age of the root bridge the bridge will treat the root bridge malfunctioned and issue a Topology Change Notification TCN BPDU to all other bridges All bridges in the LAN will re calculate and determine who the root bridge is The valid value of Max Age is 6 40 seconds Default is 20 seconds Publication date May 2005 Revision Al 99 User Manual Forward Delay You can set the root bridge forward delay time This figure is set by root bridge only The forward delay time is defined as the time spent from Listening state moved to Learning state and also from Learning state moved to Forwarding state of a port in bridge The forward delay time contains two states Listening state to Learning state and Learning state to Forwarding state It assumes that forward delay time is 15 seconds then total forward delay time will be 30 seconds This has much to do with the STP convergent time which will be more than 30 seconds because some other factors The valid
22. bit time delay and the overall bit time delay of wires devices must be within Round Trip Delay bit times in a half duplex network segment collision domain For full duplex operation this will not be applied You may use the TP Fiber module to extend the TP node distance over fiber optic and provide the long haul connection Typical Network Topology in Deployment A hierarchical network with minimum levels of switch may reduce the timing delay between server and client station Basically with this approach it will minimize the number of switches in any one path will lower the possibility of network loop and will improve network efficiency If more than two switches are connected in the same network select one switch as Level 1 switch and connect all other switches to it at Level 2 Server Host is recommended to connect to the Level 1 switch This is general if no VLAN or other special requirements are applied Publication date May 2005 Revision Al 12 User Manual Case1 All switch ports are in the same local area network Every port can access each other See Fig 2 2 i m 2 oa SS a ae cap Fig 2 2 No VLAN Configuration Diagram If VLAN is enabled and configured each node in the network that can communicate each other directly is bounded in the same VLAN area Here VLAN area is defined by what VLAN you are using The switch supports both port based VLAN and tag based VLAN They are different in pra
23. i a o Fig 2 12 Network Connection between Remote Site and Central Site Fig 2 12 is a system wide basic reference connection diagram This diagram demonstrates how the switch connects with other network devices and hosts Publication date May 2005 Revision Al 24 User Manual Fig 2 13 Office Network Connection Publication date May 2005 Revision Al 23 User Manual 3 Operation of Web based Management This chapter instructs you how to configure and manage GSW 2494 through the web user interface it supports to access and manage the 22 Port 10 100 1000Mbps TP and 2 Port Gigabit TP SFP Fiber management Ethernet switch With this facility you can easily access and monitor through any one port of the switch all the status of the switch including MIBs status each port activity Spanning tree status port aggregation status multicast traffic VLAN and priority status even illegal access record and so on The default values of the managed switch are listed in the table below IP Address 192 168 1 1 RST Eel aeen 255 255 255 0 DAENIREELAYEMI 6 192 168 1 254 Sure admin Password Table 3 1 After the managed switch has been finished configuration in the CLI via the switch s serial interface you can browse it For instance type http 192 168 1 1 in the address row in a browser it will show the following screen see Fig 3 1 and ask you inputting username and password in order to login and
24. the slot will show only a cover plate if no module exists and will show a module if a module is present The image of module depends on the one you inserted The same if disconnected the port will show just dark if linked green In this device there are clicking functions on the panel provided for the information of the ports These are very convenient functions for browsing the information of a single port When clicking the port on the front panel an information window for the port will be pop out See Fig 3 3 i A D _ o SAG Dxeee al lev et t or Auto Loqeut 3min SW FAG A hitpoints Laiviconportdetall itmi bicresoft indernet GSW 7 F p ta 168 1 74 detail i System i a naa Port 11 Detail Information Bandrddti at SNMP tisk o TGMP Snaaping Enabled Mias Packet Length maia DHCP Ront Auto Negotiation Enabled VLAN Speed Cejhes LOOM Full re Tien contrat a GVRP STP Tre k oU IX Alarm Configuration Ungress Sterm Rate Dlegnostics Fores All State sable IETF Server Egress All Rate oM og Firmverare Lpuprade Behantk Lagat Fig 3 3 Port status information In Fig 3 3 it shows the basic information of the clicked port With this you ll see the information about the port status traffic status and bandwidth rating for egress and ingress respectively On the left top corner there is a pull down list for Auto Logout For the sake of security we provide auto logout function to protect you fro
25. 5 Have the power ON after the above procedures are done Publication date May 2005 Revision Al User Manual e TP Port and Cable Installation In the switch TP port supports MDI MDI X auto crossover so both types of cable straight through Cable pin outs for RJ 45 jack 1 2 3 6 to 1 2 3 6 in 10 100M TP 1 2 3 4 5 6 7 8 to 1 2 3 4 5 6 7 8 in Gigabit TP and crossed over Cable pin outs for RJ 45 jack 1 2 3 6 to 3 6 1 2 can be used It means you do not have to tell from them just plug it Use Cat 5 grade RJ 45 TP cable to connect to a TP port of the switch and the other end is connected to a network aware device such as a workstation or a server gt Repeat the above steps as needed for each RJ 45 port to be connected to a Gigabit 10 100 1000 TP device Now you can start having the switch in operation e Power On The switch supports 100 240 VAC 50 60 Hz power supply The power supply will automatically convert the local AC power source to DC power It does not matter whether any connection plugged into the switch or not when power on even modules as well After the power is on all LED indicators will light up immediately and then all off except the power LED still keeps on This represents a reset of the system e Firmware Loading After resetting the bootloader will load the firmware into the memory It will take about 30 seconds after that the switch will flash all the LED once and au
26. Auto Nego Speed Duplex Flow Control Simple Counter 1 TP Down Enabled Enabled 10M Half Disabled Detail Counter 2 TP Down Enabled Enabled 10M Half Disabled Mirror 3 TP Up Enabled Enabled 100M Full Enabled Bandwidth 4 TP Down Enabled Enabled 10M Half Disabled Qos 5 TP Down Enabled Enabled 10M Half Disabled SNMP 6 TP Down Enabled Enabled 10M Half Disabled IGMP Snooping 7 TP Down Enabled Enabled 10M Half Disabled Max Packet Length 8 TP Down Enabled Enabled 10M Half Disabled DHCP Boot 9 TP Down Enabled Enabled 10M Half Disabled VLAN 10 TP Down Enabled Enabled 10M Half Disabled MAC Table 11 TP Down Enabled Enabled 10M Half Disabled ant 12 TP Down Enabled Enabled 10M Half Disabled Trunk 13 TP Down a ae Taa Ser 14 TP Down Enable Enable 10M Ha Disable ene 15 TP Down Enabled Enabled 10M Half Disabled Configuration 16 TP Down Enabled Enabled 10M Half Disabled Diagnostics 17 TP Down Enabled Enabled 10M Half Disabled TFTP Server 18 TP Down Enabled Enabled 10M Half Disabled Log 19 TP Down Enabled Enabled 10M Half Disabled Firmware Upgrade 20 TP Down Enabled Enabled 10M Half Disabled Reboot TP Down Enabled Enabled 10M Half Disabled Logout 22 TP Down Enabled Enabled 10M Half Disabled 23 TP Down Enabled Enabled 10M Half Disabled 24 TP Down Enabled Enabled 10M Half Disabled Ba Fig 3 7 Publication date May 2005 Revision Al 44 User Manual Function name Port Status Function Description Report the latest updated status of all ports in
27. For instance if we choose Down prioritize web browsing e mail FTP and news as the QoS of L4 and enter the Advanced Mode then we can see that some special port number 80 280 443 25 110 20 21 69 119 2009 have been configured already User also has the right to modify these port numbers The display is shown as Fig 3 18 Special TCP UDP class There are two modes for selection including Low and High Default class all other TCP UDP ports There are two modes for selection including Low and High Port User can set up the port 1 24 respectively to let Special TDP UDP class function work on them If you would like to set up all ports at a time user is allowed to choose All selection to simplify the procedure of configuration Special UDP TCP Port Selection The following are port numbers defined by six specific networks in L4 Down prioritize web browsing e mail FTP and news port number 80 280 443 25 110 20 21 69 119 2009 Prioritize IP Telephony VoIP 1718 1719 1720 Prioritize iSCS1I 3225 3260 3420 Prioritize web browsing e mail FTP transfers and news 80 280 443 25 110 20 21 69 119 2009 Prioritize Streaming Audio Video 2979 1755 7070 7071 554 8000 Prioritize Databases Oracle IBM DB2 SQL Microsoft 66 1571 1575 523 118 156 3306 1232 1433 1434 Publication date May 2005 Revision Al 66 User Manual one Auto Logout 3 min System Quality of Servic
28. IBM DB2 SQL Microsoft Example GSW 2494 qos set simple layer4 2 set advance layer4 Syntax set advance layer4 lt port range gt lt gt lt tcp udp port gt lt default gt lt match gt Description To set class of ports on advanced mode of Layer 4 qos Argument lt port range gt port range lt gt tcp udp port number range 1 10 tcp udp port range 0 65535 match special TCP UDP class 1 high 0 low default default class all other TCP UDP ports 1 high 0 low Possible value Valid values are following lt port range gt syntax 1 5 7 available from 1 to 24 lt gt tcp udp port number range 1 10 lt tcp udp port range gt 0 65535 match special TCP UDP class 1 high 0 low default default class all other TCP UDP ports 1 high 0 low Example GSW 2494 qos set advance layer4 5 2 80 1 0 Publication date May 2005 Revision Al 165 User Manual set diffserv Syntax set diffserv lt ds range gt lt class gt Description To set class of ports on IP DiffServe qos Argument lt ds range gt dscp field lt class gt class of service Possible value lt ds range gt syntax 1 5 7 available from 0 to 63 lt class gt 1 high 0 low Example GSW 2494 qos set diffserv 0 20 1 show Syntax show Description To display the information of the mode you choose Argument None Possible value None Example GSW 2494 qos show IP Diffserv Class
29. Manual a P set ip Syntax set ip lt ip gt lt mask gt lt gateway gt Description To set the system IP address subnet mask and gateway Argument lt ip gt ip address lt mask gt Subnet Mask lt gateway gt Default Gateway Possible value lt ip gt 192 168 1 2 or others lt mask gt 255 255 255 0 or others lt gateway gt 192 168 1 253 or others Example GSW 2494 ip set ip 192 168 1 2 255 255 255 0 192 168 1 253 set system IP address 192 168 1 2 subnet mask 255 255 255 0 default gateway 192 168 1 253 set dns Syntax set dns lt ip address gt Description To set the IP address of DNS server Argument lt ip address gt dns ip address Possible value 168 95 1 1 Example GSW 2494 ip set dns 168 95 1 1 set DNS server IP address to 168 95 1 1 enable dhcp Syntax enable dhcp lt manuall auto gt Description To enable the system DHCP function and set DNS server via manual or auto mode Argument lt manuall auto gt set dhcp by using manual or auto mode Possible value Manual or auto Example GSW 2494 ip enable dhcp manual Enabled system DHCP function and set DNS server via manual mode Publication date May 2005 Revision Al 148 User Manual disable dhcp Syntax disable dhcp Description To disable the DHCP function of the system Argument None Possible value None Example GSW 2494 ip disable dhcp Disabled system DHCP function
30. Mode Tag based Group Port based Group _ Tag Rule VLAN 2 a E 2 3 0 4 0 5 E GAE 7 Ej 8 0O 9 10 a4 7 act eea a as Fh 316 0 17 18 oO Flip Geo ar ly oe Fi eee Sr ae Fl Saar IGMP Snooping Max Packet Length MAC Table GYRP STP Trunk 802 1X Alarm Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 31 Delete Group Just press the lt Delete gt button to remove the selected group entry from the Port based group table level one Auto Logout 3 min System Port based Group Port Mirror Bandwidth Nol OOOO VLANNAME O O Qos 1 default SNMP a IGMP Snooping Max Packet Length DHCP Boot YLAN _ VLAN Mode Tag based Group 0 Port based Group Tag Rule MAC Table GV RP STP Trunk 802 1X Alarm Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot EYE A Logout Fig 3 32 Edit a group Just select a group entry and press the lt Edit gt button then you can modify a group s description and member set Publication date May 2005 Revision Al amp 1 User Manual 3 10 4 Tag Rule Function name Tag Rule Function description In VLAN Tag Rule Setting user can input VID number to each port The range of VID number is from 1 to 4094 User also can choose ingress filtering rules to each port There are two ingress filtering rules which can be applied to the switch The Ingress Filtering R
31. Note Whatever you choose Internal Loopback Test or External Loopback Test these two functions will interfere with the normal system working and all packets in sending and receiving also will stop temporarily level one a Auto Logout 3 min A System Loopback Test Port Bandwidth Port No Internal Loopback External Loopback QoS i OK Fail SNMP 2 OK Fail IGMP Snooping 3 OK OK Max Packet Length 4 OK Fail DHCP Boot a VLAN 5 OK Fall MAC Table ak ene GYRP 7 OK Fail STP 8 OK Fail Trunk 9 OK Fail 802 1X 10 OK Fail Alarm 11 OK Fail Configuration 12 OK Fail Diagnostics 13 OK Fail Diag tanpi 14 OK Fail Ping T 15 OK Fail TFTP Server 16 OK Fail Log 17 OK Fail Firmware Upgrade 18 OK Fail Reboot 19 OK Fail Logout 20 OK Fail 21 OK Fail 22 OK Fail z Fig 3 65 Publication date May 2005 Revision Al 129 User Manual Function name Ping Test Function description Ping Test function is a tool for detecting if the target device is alive or not through ICMP protocol which abounds with report messages The switch provides Ping Test function to let you know that if the target device is available or not You can simply fill in a Known IP address and then click lt Ping gt button After a few seconds later the switch will report you the pinged device is alive or dead in the field of Ping Result Parameter description IP Address An IP address with the version of v4 e g 192 168 1 1 Default Gateway
32. Per port shaping policing and Broadcast Storm Control e IEEE802 1Q in Q nested VLAN support e Full duplex flow control IEEE802 3x and half duplex backpressure e Extensive front panel diagnostic LEDs System Power TP Port1 24 LINK ACT 10 100 1000Mbps SFP Port 23 24 SFP LINK ACT e Management e Supports concisely the status of port and easily port configuration e Supports per port traffic monitoring counters e Supports a snapshot of the system Information when you login e Supports port mirror function e Supports the static trunk function Publication date May 2005 Revision Al User Manual e Supports 802 1Q VLAN e Supports user management and limits three users to login e Maximal packet length can be up to 9216 bytes for jumbo frame application e Supports DHCP Broadcasting Suppression to avoid network suspended or crashed e Supports to send the trap event while monitored events happened e Supports default configuration which can be restored to overwrite the current configuration which is working on via web browser and CLI e Supports on line plug unplug SFP modules e Supports Quality of Service QoS for real time applications based on the information taken from Layer 2 to Layer 4 such as VoIP e Built in web based management and CLI management providing a more convenient UI for the user e Supports port mirror function with ingress traffic e Supports rapid spanning tree 802 1w RSTP e Supports 802 1x port
33. Possible value None Example GSW 2494 mac table static mac del 00 02 03 04 05 06 0 GSW 2494 mac table static mac show forward Syntax show forward Description To display the static forward table Argument None Possible value None Example GSW 2494 mac table static mac show forward Static Forwarding Etnry Total 1 item s 1 mac 00 02 03 04 05 06 port 3 vid alias aaa GSW 2494 mac table static mac Publication date May 2005 Revision Al 180 User Manual show filter Syntax show filter Description To display the static filter table Argument None Possible value None Example GSW 2494 mac table static mac show filter Static Filtering Etnry Total 1 item s 1 mac 00 33 03 04 05 06 vid alias ccc GSW 2494 mac table static mac lt lt alias gt gt set Syntax set lt mac gt lt alias gt Description To set up the mac alias entry Argument lt mac gt mac address format 00 02 03 04 05 06 lt alias gt mac alias name max 15 characters Possible value None Example GSW 2494 mac table alias set 00 44 33 44 55 44 www GSW 2494 mac table alias del Syntax del lt mac gt Description To delete the mac alias entry Argument lt mac gt mac address format 00 02 03 04 05 06 Possible value None Example GSW 2494 mac table alias del 00 44 33 44 55 44 GSW 2494 mac table alias Publication date May 2005 Re
34. RTS 7 Clear To Send CTS 8 9 Pin Null Modem Cable CD 1 4 DTR DSR 6 1 CD DTR 4 A E ie 6 DSR RXD 2 3 TXD TXD 3 2 RXD GND 5 5 GND RTS 7 8 CTS CTS 8 7 RTS Reserve 9 9 Reserve Publication date May 2005 Revision Al Zz
35. a registration will be kept in the switch Valid range 1000 5000 unit time Default 1000 unit time Default Applicant Mode The mode here means the type of participant There are two modes normal participant and non participant provided for the user s choice Normal It is Normal Participant In this mode the switch participates normally in GARP protocol exchanges The default setting is Normal Non Participant It is Non Participant In this mode the switch does not send or reply any GARP messages It just listens messages and reacts for the received GVRP BPDU Default Registrar Mode The mode here means the type of Registrar There are three types of parameters for registrar administrative control value normal registrar fixed registrar and forbidden registrar provided for the user s choice Publication date May 2005 Revision Al 92 User Manual Normal It is Normal Registration The Registrar responds normally to incoming GARP messages The default setting is Normal Fixed It is Registration Fixed The Registrar ignores all GARP messages and all members remain in the registered IN state Forbidden It is Registration Forbidden The Registrar ignores all GARP messages and all members remain in the unregistered EMPTY state Restricted Mode This function is used to restrict dynamic VLAN be created when this port received GVRP PDU There are two modes disable and enable provided for
36. access authentication The default username and password are both admin For the first time to use please enter the default username and password then click the lt Login gt button The login process now is completed In this login menu you have to input the complete username and password respectively the switch will not give you a shortcut to username automatically This looks inconvenient but safer In the switch it supports a simple user management function allowing only one administrator to configure the system at the same time If there are two or more users using administrator s identity the switch will allow the only one who logins first to configure the system The rest of users even with administrator s identity can only monitor the system For those who have no administrator s identity can only monitor the system There are only a maximum of three users able to login simultaneously in the switch To optimize the display effect we recommend you use Microsoft IE and have the resolution 1024x768 Here is the whole function tree with web user interface and we will travel it through this chapter Publication date May 2005 Revision Al 26 User Manual O MAG Le SES B m toe vow Fote Tod teh q e Please Input Username amp Password Usermnanne Password Fig 3 1 3 1 Web Management Home Overview After you login the switch shows you the system information as Fig 3 2 This page is default an
37. cannot talk to them Each port based VLAN you built up must be assigned a group name This switch can support up to maximal 24 port based VLAN groups Tag based Tag based VLAN identifies its member by VID This is quite different from port based VLAN If there are any more rules in ingress filtering list or egress filtering list the packet will be screened with more filtering criteria to determine if it can be forwarded The switch supports supplement of 802 1q For more details please see the section VLAN in Chapter 3 Each tag based VLAN you built up must be assigned VLAN name and VLAN ID Valid VLAN ID is 1 4094 User can create total up to 64 Tag VLAN groups Publication date May 2005 Revision Al 79 User Manual Metro Mode The Metro Mode is a quick configuration VLAN environment method on Port based VLAN It will create 22 or 23 Port based VLAN groups Double tag Double tag mode belongs to the tag based mode however it would treat all frames as the untagged ones which means that tag with PVID will be added into all packets Then these packets will be forwarded as Tag based VLAN So the incoming packets with tag will become the double tag ones Auto Logout 3min System VLAN Mode Port Mirror n Bandwidth VLAN Mode Port based X QoS SNMP IGMP Snooping Max Packet Length DHCP Boot VLAN VLAN Mode Tag based Group Port based Group Tag Rule MAC Table GYRP STP Trunk 802 1X
38. config file export start Export sucessful Publication date May 2005 Revision Al Z12 User Manual export user conf Syntax export user conf Description To run the export user conf function Argument None Possible value None Example GSW 2494 config file export user conf Export sucessful import start Syntax import start Description To run the import start function Argument None Possible value None Example GSW 2494 config file import start Export sucessful import user conf Syntax import user conf Description To run the import user conf function Argument None Possible value None Example GSW 2494 config file import user conf Export sucessful Publication date May 2005 Revision Al 213 User Manual show Syntax show Description To display the config file information Argument None Possible value None Example GSW 2494 config file show TFTP Server IP Address 192 168 3 111 Export Path and Filename nmap 123 ts Import Path and Filename user123 txt Publication date May 2005 Revision Al 214 User Manual tftp set server Syntax set server lt ip gt Description To set up the IP address of tftp server Argument lt ip gt tftp server ip Possible value lt ip gt tftp server ip Example GSW 2494 tftp set server 192 168 3 111 show Syntax show Description To display the information of
39. discarded Note If Rule 1 is enabled and port 1 for example receives an untagged packet the switch will apply the PVID of port 1 to tag this packet the packet then will be forwarded But if the PVID of port 1 is not 100 the packet will be dropped Publication date May 2005 Revision Al 82 User Manual Role This is an egress rule of the port Here you can choose Access Trunk or Hybrid Trunk means the outgoing packets must carry VLAN tag header Access means the outgoing packets carry no VLAN tag header If packets have double VLAN tags one will be dropped and the other will still be left As to Hybrid it is similar to Trunk and both of them will tag out When the port is set to Hybrid its packets will be untagged out if the VID of the outgoing packets with tag is the same as the one in the field of Untag VID of this port Untag VID Valid range is 0 4094 It works only when Role is set to Hybrid Auto Logout 3 min a System VLAN Tag Rule Port Mirror Bandwidth Rulel Drop frame from nonmember port QoS Rule2 Drop untagged frame SNMP PortNo PVID Rulei Rule2 Role Untag VID IGMP Snooping 1 1 Disabled Disabled Access Max Packet Length 2 1 Disabled Disabled Access DHCP Boot 3 1 Disabled Disabled Access YLAN 4 1 Disabled Disabled Access VLAN Mode 5 1 Disabled Disabled Access Seinen tai 6 1 Disabled Disabled Access jj Tag Rute 7 1 Disabled Di
40. each dynamic VLAN group owns its VID Valid range is 1 4094 Member Port Those are the members belonging to the same dynamic VLAN group Edit Administrative Control When you create GVRP group you can use Administrative Control function to change Applicant Mode and Registrar Mode of GVRP group member Refresh Refresh function can help you to see current GVRP group status level ki one _ ay Auto Logout 3 min GSW 2494 System GVRP VLAN Group Information Port Mirror Bandwidth Ce Qos SNMP IGMP Snooping Max Packet Length DHCP Boot VLAN Refresh Alarm Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 41 Publication date May 2005 Revision Al 96 User Manual 3 13 STP Configuration The Spanning Tree Protocol STP is a standardized method IEEE 802 1D for avoiding loops in switched networks When STP is enabled ensure that only one path is active between any two nodes on the network at a time User can enable Spanning Tree Protocol on switch s web management and then set up other advanced items We recommend that you enable STP on all switches to ensure a single active path on the network 3 13 1 STP Status Function name STP Status Function description In the Spanning Tree Status user can read 12 parameters to know STP current status The 12 parameters description is listed in the following table Parameter descript
41. full The format of the packet limits to unicast broadcast and multicast Valid range is O 1000 Publication date May 2005 Revision Al 58 User Manual 3 5 QoS Quality of Service Configuration The switch offers powerful 5 kinds of QoS functions There are Per Port Priority that you can assign each port to different precedence VLAN Tag priority that can make precedence of 8 priorities IP TOS Classification IP TCP UDP Port Classification and IP DiffServe Classification In Quality of Service QoS Configuration there is one option named Default Class As you had selected one of the five QoS functions then some packets that did not belong to this QoS setting would be viewed as Default Class For instance if you set QoS function as VLAN Tag Priority mode and then choose Default Class as High finally the priority of the packets with no tag will be considered as High priority precedence The initial value of the Default Class is High Auto Logout 3 min x GSW 2494 System Quality of Service QoS Configuration Port Mirror Bandwidth Borie tesa High v Q S P IGMP Snooping Per Port Priority Max Packet Length soy DHCP Boot LAN Tag Priority Configure VLAN OIP ToS Classification MAC Table GVRP O IP TCP UDP Port Classification Be OIP Diffserv Classification Trunk 802 1X Alarm Configuration Apply Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 14 Publication da
42. function and choose the member by ticking the check box beside the port No then press the lt Apply gt button to have the setting taken effect level on a Auto Logout 3 min System Tag based VLAN Port Mirror Bandwidth Pre VLAN 1 Qos l gt SNMP IGMP Snooping SYM LAN Disable v Sei ep co 1 3 2 D SA D 20 3 YLAN ET r aE Fy ase FAE pals l e SA alll RE El ual Veil es OS e laa eal _ VLAN Mode Tag based Group Port based Group Tag Rule Angiv MAC Table GYRP Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 28 Delete Group Just press the lt Delete gt button to remove the selected group entry from the Tag based group table Auto Logout 3min _ Basta Tag based Group Port Mirror Bandwidth No VLAN NAME vip Qos 1 default 1 ANMP oe a ee IGMP Snooping Max Packet Length DHCP Boot LAN _ Y LAN Mode Tag based Group _ Port based Group Tag Rule MAC Table GY RP STP Trunk 802 1X Alarm Configuration Diagnostics TFTP Server Log Firmware Upgrade i Reboot EYE EA Logout Fig 3 29 Edit a group Just select a group entry and press the lt Edit gt button then you can modify a group s description SYM VLAN and member set Publication date May 2005 Revision Al 79 User Manual 3 10 3 Port based Group Function name Port based Group Configuration Function description It shows
43. hosts attached to it and gather the Membership report message to update the database of the Multicast table By the way this also reduces the unnecessary multicast traffic In Passive Snooping mode the IGMP snooping will not periodically poll the hosts in the groups The switch will send a Membership Query message to all hosts only when it has received a Membership Query message from a router multicast groups IP addresses that are registered on this device LAN ID for each multicast group Member Port Show member ports that join each multicast group Member port may be only or more than one Publication date May 2005 Revision Al 72 User Manual 3 8 Max Packet Length Function name Max Packet Length Function description The switch is capable of dealing with 9k Jumbo Frames which suits the transmission for a large amount of data in the network environment Parameter description Jumbo Frame bytes Set up the maximum length of the packet that each port of the switch can accept Maximum length can be up to 1532 bytes or 9216 bytes The default is 1518 bytes level one Auto Logout3min i GSW 2494 3 System Maximum Packet Length Port 73 Mirror andwith Port No Port No Qos 1518 SNMP Pepa IGMP Snooping 1518 a Max Packet Length 1518 DHCP Boot 1518 VLAN MAC Table 1518 v G
44. hyphens For example 00 11 6B D6 00 01 Alias MAC alias name you assign Note If there are too many MAC addresses learned in the table we recommend you inputting the MAC address and alias name directly Publication date May 2005 Revision Al 90 User Manual 3 12 GVRP Configuration GVRP is an application based on Generic Attribute Registration Protocol GARP mainly used to automatically and dynamically maintain the group membership information of the VLANs The GVRP offers the function providing the VLAN registration service through a GARP application It makes use of GARP Information Declaration GID to maintain the ports associated with their attribute database and GARP Information Propagation GIP to communicate among switches and end stations With GID information and GIP GVRP state machine maintain the contents of Dynamic VLAN Registration Entries for each VLAN and propagate these information to other GVRP aware devices to setup and update their knowledge database the set of VLANs associated with currently active members and through which ports these members can be reached In GVRP Configuration function folder there are three functions supported including GVRP Config GVRP Counter and GVRP Group explained below Auto Logout 3 min v a System GVRP Configuration Port Bandwidth Disabled ETA QoS SNMP rpn r F IGMP Snooping Port Join Time Join Time JE Time Leave
45. lt range gt set email lt range gt set trap lt range gt set all lt range gt Description The Set here is used for the activation of sms email and trap event Argument lt range gt syntax 1 5 7 trap number Possible value available from 1 to 24 Example GSW 2494 alarm events set sms 1 3 GSW 2494 alarm events set email 1 3 GSW 2494 alarm events set trap 1 3 GSW 2494 alarm events set all 1 3 del Syntax del sms lt range gt del email lt range gt del trap lt range gt del all lt range gt Description The Del here is used for the de activation of sms email and trap event Argument lt range gt trap number Possible value available from 1 to 24 Example GSW 2494 alarm events del sms 1 3 GSW 2494 alarm events del email 1 3 GSW 2494 alarm events del trap 1 3 GSW 2494 alarm events del all 1 3 Publication date May 2005 Revision Al 202 User Manual show Syntax show Description The Show here is used to display the configuration of alarm event Argument None Possible value None Example GSW 2494 alarm events show Events Email SMS Trap Cold Start V Warm Start V Link Down V Link Up y Authentication Failure V User Login User Logout STP Topology Changed STP Disabled 10 STP Enabled LACP Disabled LACP Enabled LACP Member Added LACP Port Failure GVRP Disabled GVRP Enabled VLAN Disabled Port based Vlan Enabled Tag based Vlan Enabled Metro
46. mode Vlan Enabled Double tag Vlan Enabled Module Inserted Module Removed Moudle Media Swapped O o yO Ol es OO NO e N BO BO DBD DBD FR RR RR RR eR er A w Ne wo wWeoOnN DOK WD Fe Publication date May 2005 Revision Al 203 User Manual lt lt email gt gt set Syntax set server lt ip gt set user lt username gt set mail address lt gt lt mail address gt Description The Set here is used for the configuration of e mail server username password and address Argument lt ip gt E mail server ip lt username gt email server account and password lt gt email address number range 1 to 6 lt mail address gt email address Possible value lt gt 11to 6 Example GSW 2494 alarm email set server 192 168 1 6 GSW 2494 alarm email set user admin Password Confirm Password GSW 2494 alarm email set mail address 1 abc mail abc com del Syntax del lt gt Description The Del here is used to remove the configuration of E mail address Argument lt gt email address number range 1 to 6 Possible value lt gt 1to6 Example GSW 2494 alarm email del 2 Publication date May 2005 Revision Al 204 User Manual show Syntax show Description The Show here is used to display the configuration of e mail trap event Argument None Possible value None Example GSW 2494 alarm email show Mail Server 192 168 1 6 Username
47. name for GET public Default community name for SET private Default community name for Trap public Default Set function Enable Default trap host IP address 0 0 0 0 Default port number 162 Trap In the switch there are four trap hosts supported Each of them has its own community name and IP address is user definable To set up a trap host means to create a trap manager by assigning an IP address to host the trap message In other words the trap host is a network management unit with SNMP manager receiving the trap message from the managed switch with SNMP agent issuing the trap message 6 trap hosts can prevent the important trap message from losing For each public trap the switch supports the trap event Cold Start Warm Start Link Down Link Up and Authentication Failure Trap They can be enabled or disabled individually When enabled the corresponded trap will actively send a trap message to the trap host when a trap happens If all public traps are disabled no public trap message will be sent As to the Enterprise no 6 trap is classified as private trap which are listed in the Trap Alarm Configuration function folder Default for all public traps Enable level on e a Auto Logout 3 min GSW 2494 System SNMP Configuration Port Mirror Bandwidth EC Enable O Disable Qos Get Community public SN ieee IGM Snooping SEES AniMUney priva
48. range vlan group members syntax 1 5 7 Possible value name port vlan name range available from 1 to 24 Example GSW 2494 vlan set port group VLAN 1 2 5 6 15 13 set mode metro up link Syntax set mode metro up link Description To create metro groups and select a port s as up link port Argument Up link You can choose port 23 as 23 port 24 as 24 or port 23 amp 24 as 23 24 23 24 If you do not choose any up link port system will take port 24 Possible value up link 23 or 24 or 23 24 or 23 24 Example GSW 2494 vlan set mode metro 23 24 set pvid Syntax set pvid lt range gt lt pvid gt Description To set the pvid of vian Argument Range which port s you want to set PVID s syntax 1 5 7 pvid which PVID s you want to set Possible value Range available from 1 to 24 pvid available from 1 to 4094 Example GSW 2494 vlan set pvid 3 5 6 8 5 Publication date May 2005 Revision Al 173 User Manual set port role Syntax set port role lt range gt lt access trunk hybrid gt vid Description To set egress rule configure the port roles Argument range which port s you want to set access Do not tag frames trunk Tag all frames hybrid Tag all frames except a specific VID vid untag vid for hybrid port Possible value range available from 1 to 24 vid available from 1 to 4094 Example GSW 2494 vlan set port
49. security on a VLAN e Supports user management and only first login administrator can configure the device The rest of users can only view the switch e SNMP access can be disabled and prevent from illegal SNMP access e Maximal packet length can be up to 9216 bytes e Supports Ingress Non unicast and Egress Bandwidth rating management with a resolution of 1Mbps e The trap event and alarm message can be transferred via e mail and mobile phone short message e Supports diagnostics to let administrator knowing the hardware status e Supports external loopback test to check if the link is ok e TF TP for firmware upgrade system log upload and config file import export e Supports remote boot the device through user interface and SNMP e Supports network time synchronization and daylight saving e Supports 120 event log records in the main memory and display on the local console Publication date May 2005 Revision Al User Manual 1 4 View of GSW 2494 Fig 1 1 Full View of 24 Gigabit L2 Managed Switch 1 4 1 User Interfaces on the Front Panel Button LEDs and Plugs There are 24 TP Gigabit Ethernet ports and 2 SFP fiber ports for optional removable modules on the front panel of the switch LED display area locating on the left side of the panel contains a Power LED which indicates the power status and 24 ports working status of the switch Gigabit Ethernet Port SFP Fiber Port TP Port Status Indication LEDs F
50. signal over a single fiber simultaneously For upgrading firmware please refer to the Section 3 21 or Section 4 2 2 for more details The switch will not stop operating while upgrading firmware and after that the configuration keeps unchanged Publication date May 2005 Revision Al User Manual e Key Features in the Device Qos Support Quality of Service by the IEEE 802 1P standard There are two priority queue and packet transmission schedule using Weighted Round Robin WRR User defined weight classification of packet priority can be based on either a VLAN tag on packet or a user defined port priority Spanning Tree Support IEEE 802 1D IEEE 802 1w RSTP Rapid Spanning Tree Protocol and IEEE 802 1s MSTP Multiple Spanning Tree Protocol standards VLAN Support Port based VLAN and IEEE802 1Q Tag VLAN Support 256 active VLANs and VLAN ID 1 4094 Port Trunking Support static port trunking and port trunking with IEEE 802 3ad LACP Bandwidth Control Support ingress and egress per port bandwidth control Port Security Support allowed denied forwarding and port security with MAC address SNMP RMON SNMP agent and RMON MIB In the device SNMP agent is a client software which is operating over SNMP protocol used to receive the command from SNMP manager server site and echo the corresponded data i e MIB object Besides SNMP agent will actively issue TRAP information when happened RMON is the abbreviatio
51. status of trunk including the group number and mode of the trunk as well as LACP mode Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt method gt static adopt the static link aggregation lacp adopt the dynamic link aggregation link aggregation control protocol lt group gt 1 8 lt active LACP gt active set the LACP to active mode passive set the LACP to passive mode Possible value None Example GSW 2494 trunk set trunk 1 4 lacp 1 active GSW 2494 trunk del trunk Syntax del trunk lt port range gt Description Delete trunk port Argument lt port range gt syntax 1 5 7 available from 1 to 24 Possible value None Example GSW 2494 trunk del trunk 1 GSW 2494 trunk Publication date May 2005 Revision Al 191 User Manual show status Syntax show status Description To display the aggregator status and the settings of each port Argument None Possible value None Example GSW 2494 trunk show status Trunk Port Setting Trunk Port Status port Method Group Active LACP Aggtregator Status 1 None 0 Active 1 Ready 2 LACP 1 Active 2 aa 3 LACP ji Active maS 4 LACP l Active 4 tS D LACP 1 Active D Soe 6 LACP l Active 6 n T LACP l Active T acini 8 LACP it Active 8 aS 9 LACP l Active 9 Se 10 LACP ji Active 10 a 11 LACP ji Active 11 ae 12 LACP l Active IZ a 13 LACP 1 Active 13 an 14 LACP l Active 14 Baa 15 None 0 Active 15 EE 16 None 0 Active 16 sae 17 None 0 Act
52. that denies the packet forwarding if the packet s MAC Address is listed in the filtering Static Filter table User can very easily maintain the table by filling in MAC Address VID VLAN ID and Alias fields individually User also can delete the existed entry by clicking lt Delete gt button Parameter description MAC It is a six byte long Ethernet hardware address and usually expressed by hex and separated by hyphens For example 00 11 6B D6 00 01 VID VLAN identifier This will be filled only when tagged VLAN is applied Valid range is 1 4094 Alias MAC alias name you assign Auto Logout 3 min GSW 2494 System Static Filtering MAC Port Mirror Bandwidth ST eee ET eS el Qos To E of ow a i SNMP 7 J _ 1 IGMP Snooping Max Packet Length EZE Delete DHCP Boot VLAN MAC tale pac vip alias Information m a Maintenance z Static Forward Static Filt MAC Alias GYRP STP Trunk 802 1X Alarm Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout There is no filtering MAC entry Fig 3 37 Publication date May 2005 Revision Al 8 amp 8 User Manual Function name MAC Alias Function description MAC Alias function is used to let you assign MAC address a plain English name This will help you tell which MAC address belongs to which user in the illegal access report At the initial time it shows all pairs of the existed alias name and MAC add
53. this function the manager can easily control the mode that the user connects to the switch According to the mode users can be classified into two types Those who are able to connect to the switch Accept and those who are unable to connect to the switch Deny Some restrictions also can be placed on the mode that the user connect to the switch for example we can decide that which VLAN VID is able to be accepted or denied by the switch the IP range of the user could be accepted or denied by the switch the port that the user is allowed or not allowed to connect with the switch or the way of controlling and connecting to the switch via Http Telnet or SNMP 5 i a 6 Is ti a d iy Eed Fis dt View Favorites Took Heb an lamya l F B m Auto Logout 3min System Management Security Configuration System Information IP rime ooo Nme jo ae IP Range Account Ga o Any Management Pirliry ee ny Custom Virtual Stack 0 Custam E Port Minor Bandwidth P Tacoming part aeemse type action Dos gt n SNMP apy Any IGMP Snooping Lt Custom J Custom Max Packet Length ao et a cal ee est a Http Deny DHCP Bool J Accept VLAN h in 11 13 13 14 15 16 Telnet MAC Table 17 1A 15 Piin 21 22 aa 24 SAME GVR STP Trunk CdiifCreate An 1x Alarm Configuration Name J ovio IP Range incomingPort Access Type Action Diagnostics TETP Server Log Finnvware Upgrade Reboot Logout Parameter descript
54. to the following parameters description for details Parameter description Port It is the port number to be selected for configuring its associated 802 1x parameters which are Port control reAuthMax txPeriod Quiet Period reAuthEnabled reAuthPeriod max Request supp Timeout server Timeout and Controlled direction Port Control This is used to set the operation mode of authorization There are three type of operation mode supported ForceUnauthorized ForceAuthorized Auto e ForceUnauthorized The controlled port is forced to hold in the unauthorized state e ForceAuthorized The controlled port is forced to hold in the authorized state e Auto The controlled port is set to be in authorized state or unauthorized state depends on the result of the authentication exchange between the authentication server and the supplicant Default Auto reAuthMax 1 10 The number of authentication attempt that is permitted before the port becomes unauthorized Default 2 txPeriod 1 65535 s A time period to transmitted EAPOL PDU between the authenticator and the supplicant Default 30 Quiet Period 0 65535 s A period of time during which we will not attempt to access the supplicant Deafult 60 seconds Publication date May 2005 Revision Al 119 User Manual reAuthEnabled Choose whether regular authentication will take place in this port Default ON reAuthPeriod 1 65535 s A non zero number seconds
55. trunk group also called aggregator LACP is safer than the other trunking method static trunk The switch LACP does not support the followings Link Aggregation across switches Aggregation with non IEEE 802 3 MAC link Operating in half duplex mode Aggregate the ports with different data rates Static Trunk Ports using Static Trunk as their trunk method can choose their unique Static GroupID also 1 8 this Static groupID can be the same with another LACP groupID to form a logic trunked port The benefit of using Static Trunk method is that a port can immediately become a member of a trunk group without any handshaking with its peer port This is also a disadvantage because the peer ports of your static trunk group may not know that they should be aggregate together to form a logic trunked port Using Static Trunk on both end of a link is strongly recommended Please also note that low speed links will stay in not ready state when using static trunk to aggregate with high speed links As to system restrictions about the port aggregation function on the switch In the management point of view the switch supports maximum 8 trunk groups for LACP and additional 8 trunk groups for Static Trunk But in the system capability view only 8 real trunked groups are supported An LACP trunk group with more than one ready member ports is a real trunked group An LACP trunk group with only one or less t
56. types provided for the switch are listed below 1000Mbps LC MM SFP Fiber transceiver SFP OLC 202 1000Mbps LC SM 10km SFP Fiber transceiver SFP OLC 212 10 1000Mbps LC SM 70km SFP Fiber transceiver SFP OLC 212 30 Fig 1 4 Front View of 1000Base SX LX LC SFP Fiber Transceiver Publication date May 2005 Revision Al User Manual 2 Installation 2 1 Starting GSW 2494 Up This section will give users a quick start for Hardware and Cable Installation Management Station Installation Software booting and configuration 2 1 1 Hardware and Cable Installation At the beginning please do first Wear a grounding device to avoid the damage from electrostatic discharge Be sure that power switch is OFF before you insert the power cord to power source e Installing Optional SFP Fiber Transceivers to GSW 2494 Note If you have no modules please skip this section Fig 2 1 Installation of Optional SFP Fiber Transceiver e Connecting the SFP Module to the Chassis The optional SFP modules are hot swappable so you can plug or unplug it before or after powering on 1 Verify that the SFP module is the right model and conforms to the chassis 2 Slide the module along the slot Also be sure that the module is properly seated against the slot socket connector 3 Install the media cable for network connection 4 Repeat the above steps as needed for each module to be installed into slot s
57. with a specified port of a switch is set up by manually inputting MAC address and its alias name When a MAC address is assigned to a specific port all of the switch s traffics sent to this MAC address will be forwarded to this port For adding a MAC address entry in the allowed table you just need to fill in four parameters MAC address associated port VID and Alias Just select the existed MAC address entry you want and click lt Delete gt button you also can remove it Parameter description MAC It is a six byte long Ethernet hardware address and usually expressed by hex and separated by hyphens For example 00 11 6B D6 00 01 Port No Port number of the switch It is 1 24 VID VLAN identifier This will be filled only when tagged VLAN is applied Valid range is 1 4094 Alias MAC alias name you assign level one Auto Logout 3 min z System Static Forwarding MAC Bandwidth E a vip se als of of f E oe im OO I IGMP Snooping Max Packet Length Delete DHCP Boot EA VLAN ee pac porto vip alias Information NS a Maintenance Static Forest Static Filter MAC Alias GYRP 802 1X There is no forwarding MAC entry Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot v Logout a Fig 3 36 Publication date May 2005 Revision Al 87 User Manual Function name Static Filter Function Description Static Filter is a function
58. y the system would reboot immediately others would be back to the CLI system After restoring default configuration all the changes in the startup configuration would be lost After rebooting the entire startup configuration would reset to factory default Argument None Possible value None Example GSW 2494 restore default Restoring Restore Default Configuration Successfully Press any key to reboot system Publication date May 2005 Revision Al 144 User Manual restore user Syntax restore user Description To restore the startup configuration as user defined configuration If restoring default successfully the CLI would prompt if reboot immediately or not If you press Y or y the system would reboot immediately others would back to the CLI system After restoring user defined configuration all the changes in the startup configuration would be lost After rebooting the entire startup configuration would replace as user defined one Argument None Possible value None Example GSW 2494 restore user Restoring Restore User Configuration Successfully Press any key to reboot system Publication date May 2005 Revision Al 145 User Manual 4 2 2 Local Commands of CLI system show Syntax show Description To display the basic information of the switch Argument None Possible value None Example GSW 2494 system show Model Name System Description L
59. 2 168 1 115 Port Number 1812 Secret Key WinRadius GSW 2494 802 1x Publication date May 2005 Revision Al 199 User Manual show mode Syntax show mode Description To display the mode of each port Argument None Possible value None Example GSW 2494 802 1x show mode Port Mode 1 Disable 2 Multi host 3 Disable 4 Disable 5 Disable 6 Disable show security Syntax show security Description To display the authentication status of each port Argument None Possible value None Example GSW 2494 802 1x show security Port Mode Status ji Disable 2 Multi host Unauthorized 3 Disable 4 Disable 5 Disable 6 Disable Publication date May 2005 Revision Al 200 User Manual show parameter Syntax show parameter Description To display the parameter settings of each port Argument None Possible value None Example GSW 2494 802 1x show parameter port 1 port 2 port contro reAuthMax txPeriod Quiet Period reAuthPeriod max Request suppl imeout serverlimeout port control reAuthMax txPeriod Quiet Period reAuthPeriod max Request suppl imeout serverlTimeout Auto a2 30 60 reAuthEnabled 3600 ON 30 30 Auto 30 60 reAuthEnabled 3600 ON 30 30 201 Publication date May 2005 Revision Al User Manual alarm lt lt events gt gt set Syntax set sms
60. 2 3 be in the vlan 2 We sent in the packets that have vilan tagged Field appears 0 0 0 and VID equals 2 from the port 2 and the packets that have vian tagged Field appears O 0 1 and VID equals 2 from the port 3 We let the two kinds of packets be transmitted for port 1 until the port results in congestion The result is that the packets will be dropped partially from the port 3 because the packets that belong to Low Priority For the use of VLAN Tag Priority function please press lt Configure gt button at the right section for setting in advance level on e an Auto Logout 3 min GSW 2494 System VLAN Tag Priority Port Mirror Bandwidth LAN Tag Priority Classes QoS rot ota E 7 oto 7 Class SNMP f j IGMP Snooping Port 1 v 9 4 p He Max Packet Length e 0 0 1 Low DHCP Boot 0 1 o Low F MAC Table 0 1 1 Low GYRP STP 2 B High i Trunk 1 0 1 High 802 1X TE larm 1 1 0 lall Configuration 1 1 1 High Diagnostics a TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 16 Parameter description Quality of Service QoS Vlan Tag Configuration Used for setting up the QoS belongs to Vlan operation Port User can set up the port 1 24 respectively to let Vian Tag QoS function work on them If you would like to set up all ports at a time user is also allowed to choose All in the selection list to simplify the procedure of configuration Publication date May 2005 Revision Al
61. 2 Port Configuration Port Configuration is applied to change the setting of each port In this configuration function you can set reset the following functions All of them are described in detail below Auto Logout 3 min GSW 2494 amp System Port Configuration Port Status Configuratiag BE ed JFiow Control Simple Cownter PE Enable v Auto Enable v Detail Counter iir 2 Enable Y Auto yi Enable Mirror 2l Bandwidth Hy Enable v auto Enable v Qos DE Enable Auto v Enable SNMP maa a aeea a IGMP Snooping HEEB Enable_v auto Enable v Max Packet Length Es Enable v Auto v Enable DHCP Boot E FF a VLAN DED Enable Auto ES Enable _ MAC Table Enable y Auto v Enable GYRP aT v v v STP ES Enable Auto J Enable Trunk ED Enable Auto _ Enable 802 1X Enable Auto v Enable v Alarm o ee Configuration EE Enable Auto Enable Diagnostics ee Enable Auto v Enable TFTP Server Tenable a F Tenable al Log BET Ena le vx Auto i Enable i Firmware Upgrade is Enable Auto Enable Reboot a Dice Logout EE Enable Auto i _Enable be PE Enable v auto o Enable v_ BETE nahio vl anta wl Enahle vl Ya Fig 3 9 Function name Port Configuration Function description It is used to set each port s operation mode The sw
62. 2036 Month 3 1 12 Bandwidth Day 23 1 31 Hour 2 0 23 Seon Minute 34 0 59 Second 26 0 59 IGMP Snooping Max Packet Length DHCP Boot 209 81 9 7 USA VLAN 137 189 8 174 HK MAC Table 133 100 9 2 JP Time Zone GMT 8 00 GVRP 131 188 3 222 Germany STP Trunk 802 1X Ae Configuration Daviight Saving Diagnostics Daylight Saving Start Mth 1 Day 1 Hour 0 TFTP Server m n Log Daylight Saving End Mth 1 Day 1 Hour 0 Firmware Upgrade Reboot Logout bd Fig 3 5 Publication date May 2005 Revision Al 37 User Manual 3 1 4 Account Configuration In this function only administrator can create modify or delete the username and password Administrator can modify other guest identities password without confirming the password but it is necessary to modify the administrator equivalent identity Guest equivalent identity can modify his password only Please note that you must confirm administrator guest identity in the field of Authorization in advance before configuring the username and password Only one administrator is allowed to exist and unable to be deleted In addition up to 5 guest accounts can be created The default setting for user account is Username admin Password admin level one a Auto Logout 3 min System Account Configuration System Information Time Account admin Administrator Port guest Guest Mirror Bandwidth QoS SNMP Mai Bucket Leniti DHCP Boot VLAN MAC Table GVRP STP
63. 28 No Auto Cunkiguvatlon 15 DISCARDING 2000000 o 128 No Auto Diagnostics 16 DISCARDING 2000000 o 128 No Auto TFTP Server 17 DISCARDING 2000000 o 128 No Auto Log 18 DISCARDING 2000000 o 128 No Auto Firmware Upgrade 19 DISCARDING 2000000 0 128 No Auto Reboot 20 DISCARDING 2000000 o 128 No Auto Logout 21 DISCARDING 2000000 o 128 No Auto 22 DISCARDING 2000000 o 128 No Auto 23 DISCARDING 2000000 o 128 No Auto PA DISCARDING 2nnannnn n 17R Nn Auton ha Fig 3 44 Publication date May 2005 Revision Al 103 User Manual 3 14 Trunking Configuration The Port Trunking Configuration is used to configure the settings of Link Aggregation You can bundle more than one port with the same speed full duplex and the same MAC to be a single logical port thus the logical port aggregates the bandwidth of these ports This means you can apply your current Ethernet equipments to build the bandwidth aggregation For example if there are three Fast Ethernet ports aggregated in a logical port then this logical port has bandwidth three times as high as a single Fast Ethernet port has The switch supports two kinds of port trunking methods LACP Ports using Link Aggregation Control Protocol according to IEEE 802 3ad specification as their trunking method can choose their unique LACP GroupID 1 8 to form a logic trunked port The benefit of using LACP is that a port makes an agreement with its peer port before it becomes a ready member of a
64. 3 71 Publication date May 2005 Revision Al 136 User Manual 4 Operation of CLI Management 4 1 CLI Management Refer to Chapter 2 for basic installation The following description is the brief of the network connection Locate the correct DB 9 null modem cable with female DB 9 connector Null modem cable comes with the management switch Refer to the Appendix B for null modem cable configuration Attach the DB 9 female connector to the male DB 9 serial port connector on the Management board Attach the other end of the DB 9 cable to an ASCII terminal emulator or PC Com 1 2 port For example PC runs Microsoft Windows HyperTerminal utility At Com Port Properties Menu configure the parameters as below see the next section Baud rate 57600 Stop bits 1 Data bits 8 Parity N Flow control none 4 1 1 Login The command line interface CLI is a text based interface User can access the CLI through either a direct serial connection to the device or a Telnet session The default values of the managed switch are listed below Username admin Password admin After you login successfully the prompt will be shown as if you are the first login person and your authorization is administrator otherwise it may show See the following two figures The former means you behave as an administrator and have the access right of the system As to the latter it means you behave as a guest and are o
65. 5 255 255 0 Any subnet mask such as 255 255 255 x is allowable in this case DNS The Domain Name Server translates human readable machine name to IP address Every machine on the Internet has a unique IP address A server generally has a static IP address To connect to a server the client needs to know the IP of the server However user generally uses the name to connect to the server Thus the switch DNS client program such as a browser will ask the DNS to resolve the IP address of the named server Publication date May 2005 Revision Al 23 User Manual 2 2 Typical Applications GSW 2494 implements 24 Gigabit Ethernet TP ports with auto MDIX and two slots for the removable module supporting comprehensive fiber types of connection including LC and BiDi LC SFP modules For more details on the specification of the switch please refer to Appendix A The switch is suitable for the following applications Central Site Remote site application is used in carrier or ISP See Fig 2 12 Peer to peer application is used in two remote offices See Fig 2 13 Office network See Fig 2 14 Gigabit Enterprise L2 Managed Switck Converter Chassis eee OOD Oe tie Fess sie GSW 2494 mm orsm fiber Dy Fiber Optic Managed Media Converter Fiber Optic GSW 2494 m a Copper Iwisted pair Links m m m Fiber Optic Links SP EP
66. 55 255 0 PERCEIVES 192 168 1 254 10 1 1 254 Table 2 3 After completing these settings in the switch it will reboot to have the configuration taken effect After this step you can operate the management through the network no matter it is from a web browser or Network Management System NMS L2 Managed Switch iGSwe2494 Login admin Password iGsw 2404 J Fig 2 7 the Login Screen for CLI Publication date May 2005 Revision Al 17 User Manual 2 1 3 2 Configuring the Management Agent of GSW 2494 through the Ethernet Port There are three ways to configure and monitor the switch through the switch s Ethernet port They are CLI Web browser and SNMP manager The user interface for the last one is NMS dependent and does not cover here We just introduce the first two types of management interface 24 Gigabit L2 Managed Switch Default IP Setting IP 192 168 1 1 Subnet Mask 255 255 255 0 Default Gateway 192 168 1 254 Assign a reasonable IP address For example IP 192 168 1 100 Subnet Mask 255 255 255 0 Default Gateway 192 168 1 254 Fig 2 8 e Managing GSW 2494 through Ethernet port Before you communicate with the switch you have to finish first the configuration of the IP address or to know the IP address of the switch Then follow the procedures listed below 1 Setup a physical path between the configured the switch and a PC bya qualified UTP Cat 5 cable with RJ 45 connec
67. B gt V e 1 Ei e EE LevelOne GSW 2494 L2 Managed Switch User s Manual User s Manual Ver 1 00 0507 Table of Contents CAUTION cepa ba ee i coat T E a OE stperea tie oan Aa I LEC LRONIC EEMISSIONNGO TICE S 2 cctessinsesnanw E A A Sls A a a E ai M INTRODUCTION urrera EEE A A E asian eades 2 FI OVERVEW OF OGS W 249 rei e a a a A 2 FoC IB GRAMS anro a aA 4 Ti yout ATOR S p E E T A E A E E T T 4 Ah VIEWOF GS W 2A IA soinen ioa E analy E A A SS E E 6 1 4 1 User Interfaces on the Front Panel Button LEDs and Plugs cccccccceeeee ieee 6 I 4 2 User Interfaces OM ANC Rear Panel yi tsi al eee a ros oth Sak Gael a oan tal Lah a 7 1 5 VIEW OF THE OPTIONAL MODULES seats so coca g cerien eaa e aaka ae a aa e aaar EEEn 8 INSTALLATION eraoo a a a aeaea E e E aeS 9 DM a STARTING GSW 2A94 UP ra EE E EE get ated 9 2 1 1 Hardware and Cable Installation xs es eiotis datecode ob Otte de cesioins Satis cash gods white Set Cebaubis tann boy teehcnds auntie 9 Des C ADNE INCGUIVCINCTIS ccc ote ohidceth ahs ec haite E a E daca una way AE 10 2 1 3 Configuring the Management Agent Of GSW 2494 ccc cece cece cece eee e eee Eee eee 3 Beles AP Address ASSTONMEN riisin a a a a N E a E Jeane 19 2 De CYPICACATPLICA TION ann a E E E A E Seco oriceedoaeanl ae 24 OPERATION OF WEB BASED MANAGEMENT csssssssssssssssssccccsssssssssssssssscssssssessssees 26 3 1 WEB MANAGEMENT HOME OVERVIEW ccccccsescccsscccssccescccessceeecce
68. Example GSW 2494 port set soeed duplex 5 auto show status Syntax show status Description To display the port s current status Argument None Possible value None Example GSW 2494 port show status show simple counter Syntax show simple counter Description To display the summary counting of each port s traffic Argument None Possible value None Example GSW 2494 port show simple counter Publication date May 2005 Revision Al 154 User Manual show detail counter Syntax Show detail counter lt range gt Description To display the detailed counting number of each port s traffic Argument lt range gt syntax 1 5 7 available from 1 to 24 Possible value 1 24 Example GSW 2494 port show detail counter 5 show conf Syntax show conf Description To display the each port s configuration about state soeed duplex and flow control Argument None Possible value None Example GSW 2494 port show conf show Sfp Syntax show sfp lt port gt Description To display the SFP module information Argument lt port gt available 23 24 Possible value 23 24 Example GSW 2494 port show sfp 23 Publication date May 2005 Revision Al 155 User Manual clear counter Syntax clear counter Description To clear all ports counter include simple and detail port counter information Argument None Possible value None
69. Example GSW 2494 vlan del tag group 2 del port group lt name gt Syntax del port group lt name gt Description To delete the port based vian group Argument name which vlan group you want to delete Possible value name port vlan name Example GSW 2494 vlan del port group VLAN 2 show group Syntax show group Description To display the vlan mode and vlan group Argument None Possible value None Example GSW 2494 vlan show group Vlan mode is double tag 1 Vlan Name default Vlan ID 1 Sym vlan Disable Member toll Devoe AD o Tr 26 9 TO Ia iD 13 14 1S 16 2 Vlan Name VLAN 2 Vian ID 2 Sym vlan Disable Member gt 2345613 14 15 GSW 2494 vlan Publication date May 2005 Revision Al 176 Port Rule User Manual Untag Vid show pvid Syntax show pvid Description To display pvid ingress egress rule Argument None Possible value None Example GSW 2494 vlan show pvid Port PVID Rulel Rule2 ji 1 Disable Disable 2 1 Disable Disable 3 5 Disable Disable 4 1 Disable Disable 5 5 Enable Disable 6 5 Enable Disable T 5 Enable Disable 8 5 Enable Disable 9 1 Enable Disable 10 1 Enable Disable 11 1 Disable Disable 12 1 Disable Disable 13 1 Disable Disable 14 1 Disable Disable 15 1 Disable Disable 16 1 Disable Disable 17 1 Disable Disable 18 1 Disable Disable 19 1 Disable Disable 20 1 Disable Disable 21 1 Disable Disable 22 1 Disab
70. IDs are often compared in order to determine which port of a bridge would become the Root Port The range is 0 240 Default is 128 Admin Edge Port If user selects Yes this port will be an edge port An Edge Port is a port connected to a device that knows nothing about STP or RSTP Usually the connected device is an end station Edge Ports will immediately transit to forwarding state and skip the listening and learning state because the edge ports cannot create bridging loops in the network This will expedite the convergence When the link on the edge port toggles the STP topology keeps unchanged Unlike the designate port or root port though an edge port will transit to a normal spanning tree port immediately if it receives a BPDU Default No Admin Point To Point We say a port is a point to point link from RSTP s view if it is in full duplex mode but is shared link if it is in half duplex mode RSTP fast convergence can only happen on point to point links and on edge ports This can expedite the convergence because this will have the port fast transited to forwarding state There are three parameters Auto True and False used to configure the type of the point to point link If configure this parameter to be Auto it means RSTP will use the duplex mode resulted from the auto negotiation In today s switched networks most links are running in full duplex mode For sure the result may be half duplex in this c
71. NG state indicates that this port can neither forward packets nor contribute learning knowledge Notice Three other states Disable state BLOCKING state and LISTENING state defined in the 802 1d specification are now all represented as DISCARDING state LEARNING state indicates this port can now contribute its learning knowledge but cannot forward packets still FORWARDING state indicates this port can both contribute its learning knowledge and forward packets normally Path Cost Status It is the contribution value of the path through this port to Root Bridge STP algorithm determines a best path to Root Bridge by calculating the sum of path cost contributed by all ports on this path A port with a smaller path cost value would become the Root Port more possibly Configured Path Cost The range is 0 200 000 000 In the switch if path cost is set to be zero the STP will get the recommended value resulted from auto negotiation of the link accordingly and display this value in the field of Path Cost Status Otherwise it may show the value that the administrator set up in Configured Path Cost and Path Cost Status Publication date May 2005 Revision Al 101 User Manual 802 1w RSTP recommended value Valid range 1 200 000 000 10 Mbps 2 000 000 100 Mbps 200 000 1 Gbps 20 000 Default O Priority Priority here means Port Priority Port Priority and Port Number are mixed to form the Port ID Port
72. O to 240 lt edge_port gt Admin Edge Port lt yes no gt lt admin p2p gt Admin point to point lt auto true false gt Possible value lt range gt 1 to 24 lt path cost gt 0 1 200000000 lt priority gt 0 to 240 lt edge_port gt yes no lt admin p2p gt auto true false Example GSW 2494 stp set port 1 16 0 128 yes auto show status Syntax show status Description To display the status of STP Argument None Possible value None Publication date May 2005 Revision Al 185 User Manual Example GSW 2494 stp show status STP Status STP State Enabled Bridge ID 00 11 6B D8 09 1D Bridge Priority 61440 Designated Root 00 11 6B D8 09 1D Designated Priority 61440 Root Port 0 Root Path Cost 0 Current Max Age sec 20 Current Forward Delay sec 15 Hello Time sec 2 STP Topology Change Count 0 Time Since Last Topology Change sec 848 show config Syntax show config Description To display the configuration of STP Argument None Possible value None Example GSW 2494 stp show config STP State Configuration Spanning Tree Protocol Enabled Bridge Priority 0 61440 61440 Hello Time 1 10 sec Z Max Age 6 40 sec 20 Forward Delay 4 30 sec 15 Force Version RSTP Publication date May 2005 Revision Al 189 User Manual show port Syntax show port Description To display the port information of STP Argu
73. P and 2 Port Gigabit TP SFP Fiber management Ethernet switch The switch can be managed through RS 232 serial port via directly connection or through Ethernet port using CLI or Web based management unit associated with SNMP agent With the SNMP agent the network administrator can logon the switch to monitor configure and control each port s activity in a friendly way The overall network management is enhanced and the network efficiency is also improved to accommodate high bandwidth applications In addition the switch features comprehensive and useful function such as QoS Quality of Service Spanning Tree VLAN Port Trunking Bandwidth Control Port Security SNMP RMON IGMP Snooping capability via the intelligent software It is suitable for both metro LAN and office application In this switch Port 23 24 includes two types of media TP and SFP Fiber LC BiDi LC this port supports 10 100 1000Mbps TP or 1000Mbps SFP Fiber with auto detected function 1000Mbps SFP Fiber transceiver is used for high speed connection expansion 10 100 1000Mbps TP is a standard Ethernet port that meets all IEEE 802 3 u x z Gigabit Fast Ethernet specifications 1000Mbps SFP Fiber transceiver is a Gigabit Ethernet port that fully complies with all IEEE 802 3z and 1000Base SX LX standards 1000Mbps Single Fiber WDM BiDi transceiver is designed with an optic Wavelength Division Multiplexing WDM technology that transports bi directional full duplex
74. Static A port use Static Trunk as its trunk method to get aggregated with other ports also using Static Trunk Group Ports choosing the same trunking method other than None must be assigned a unique Group number i e Group ID valid value is from 1 to 8 in order to declare that they wish to aggregate with each other Active LACP This field is only referenced when a port s trunking method is LACP Active An Active LACP port begins to send LACPDU to its link partner right after the LACP protocol entity started to take control of this port Passive A Passive LACP port will not actively send LACPDU out before it receives an LACPDU from its link partner Publication date May 2005 Revision Al 106 User Manual Aggtr Aggtr is an abbreviation of aggregator Every port is also an aggregator and its own aggregator ID is the same as its own Port No We can regard an aggregator as a representative of a trunking group Ports with same Group ID and using same trunking method will have the opportunity to aggregate to a particular aggregator port This aggregator port is usually the port with the smallest Port No within the trunking group Status This field represents the trunking status of a port which uses a trunking method other than None It also represents the management link status of a port which uses the None trunking method means not ready level on o i T Auto Log
75. User Manual Rx Low Priority Packets Number of Rx packets classified as low priority Rx Broadcast Show the counting number of the received broadcast packet Rx Multicast Show the counting number of the received multicast packet Tx Packets The counting number of the packet transmitted TX Octets Total transmitted bytes Tx High Priority Packets Number of Tx packets classified as high priority Tx Low Priority Packets Number of Tx packets classified as low priority Tx Broadcast Show the counting number of the transmitted broadcast packet Tx Multicast Show the counting number of the transmitted multicast packet Rx 64 Bytes Number of 64 byte frames in good and bad packets received Rx 65 127 Bytes Number of 65 126 byte frames in good and bad packets received Rx 128 255 Bytes Number of 127 255 byte frames in good and bad packets received Rx 256 511 Bytes Number of 256 511 byte frames in good and bad packets received Rx 512 1023 Bytes Number of 512 1023 byte frames in good and bad packets received Rx 1024 Bytes Number of 1024 max_length byte frames in good and bad packets received Tx 64 Bytes Number of 64 byte frames in good and bad packets transmitted Publication date May 2005 Revision Al 54 User Manual TX 65 127 Bytes Number of 65 126 byte frames in good and bad packets transmitted Tx 128 255 Bytes Number of 127 255 byte frames in good and bad packets transmitted TX 256 511 Byt
76. VRP 1518 STP Book Trunk 1518 802 1X 1518 v Alarm erg Configuration 1518 Diagnostics 1518 TFTP Server isis Log Firmware Upgrade 1518 Reboot Logout Fig 3 23 Publication date May 2005 Revision Al User Manual 3 9 DHCP Boot The DHCP Boot function is used to spread the request broadcast packet into a bigger time frame to prevent the traffic congestion due to broadcast packets from many network devices which may seek its NMS boot server DHCP server and many connections predefined when the whole building or block lose the power and then reboot and recover At this moment a bunch of switch or other network device on the LAN will try its best to find the server to get the services or try to set up the predefined links they will issue many broadcast packets in the network The switch supports a random delay time for DHCP and boot delay for each device This suppresses the broadcast storm while all devices are at booting stage in the same time The maximum user defined delay time is 30 sec If DHCP Broadcasting Suppression function is enabled the delay time is set randomly ranging from O to 30 seconds because the exactly delay time is computed by the switch itself The default is Disable Auto Logout 3 min GSW 2494 System DHCP Boot Port Mirror 5 Bandwidth DHCP Broadcast Suppression Disable Delay Time 1 30 seconds QoS SNMP IGMP Snooping Max Packet Length DHCP Ba VLAN MAC Table
77. abled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled oooooo cooroocoocooqcroo co clcucc_ cmllclClcOlmlUlUcCOlmULUCOUOUCUwO User Manual gos set mode Syntax set mode lt port pri_tag tos layer4 diffserv gt Description To set qos priority mode of the switch Argument port per port priority pri_tag vlan tag priority tos ip tos classification layer4 ip tcp udp port classification diffserv ip diffserv classification Possible value port pri_tag tos layer4 diffserv Example GSW 2494 qos set mode port set default Syntax set default lt class gt Description To set priority class of the packets that qos won t affect Argument class class of service Possible value setting 1 high 0 low Example GSW 2494 qos set default 1 set port Syntax set port lt range gt lt class gt Description To set class of ports on port based qos Argument lt range gt port range lt class gt class of service setting Possible value lt range gt syntax 1 5 7 available from 1 to 24 lt class gt 1 high 0 low Example GSW 2494 qos set port 1 10 1 Publication date May 2005 Revision Al 163 User Manual set pri tag Syntax set pri_tag lt port range gt lt tag range gt lt class gt De
78. admin Password 1 ORS Ree KKK KKK Email Address Email Address Email Address Email Address Email Address Email Address abc mail abc com Mm O1 A W DF lt lt sms gt gt set Syntax set server lt ip gt set user lt username gt set phone number lt gt lt phone number gt Description The Set here is used for the configuration of SMS server username password and phone number Argument lt ip gt SMS server ip lt username gt SMS server account and password lt gt mobile phone number range 1 to 6 lt phone number gt phone number Possible value lt gt 11to 6 Example GSW 2494 alarm sms set server 192 168 1 7 GSW 2494 alarm sms set user ruby Password Confirm Password GSW 2494 alarm sms set phone number 1 0968777777 Publication date May 2005 Revision Al 205 User Manual del Syntax del lt gt Description The Del here is used to remove the configuration of mobile phone number Argument lt gt mobile phone number range 1 to 6 Possible value lt gt 1to6 Example GSW 2494 alarm sms del 3 show Syntax show Description The Show here is to display the configuration of SMS trap event Argument None Possible value None Example GSW 2494 alarm sms show SMS Server 192 168 1 7 Username Password L ELEELE KKK KKK Mobile Phone 1 0968777777 Mobile Phone 2 Mobile Phone 3 Mobile Phone 4 Mobile Phone 5 Mo
79. ain port that is no 802 1x port access control works on the port 802 1x with Multi host In Multi host mode for the devices connected to this port once a supplicant is authorized the devices connected to this port can access the network resource through this port Auto Logout 3 min 2 System 802 1X Mode Setting Port Mirror 802 1X Mode Disable N Disable Multi host Disable Bandwidth QoS SNMP IGMP Snooping Max Packet Length DHCP Boot pT Disable v VLAN ane MAC Table Disable v neice Disable M STP Disable W Trunk Disable __ 802 1X Disable vij State Mode L a Security Disable v v Configuration Ost _ Diagnostics Disable v TFTP Server Disable Log n n Firmware Upgrade Disable mendat Disable vl Logout teie Disable Disable Mieshla v m Hf 8 ee ed eje EE EEE lell Qo Ww o z D bs T S cn oo Publication date May 2005 Revision Al 117 User Manual Function name Port Security Management Function description Shows each port status In Multihost mode it shows the port number and its status authorized or unauthorized Parameter description Disable Mode When selecting Disable mode for a port in the function 802 1X Port Mode Configuration the port is in the uncontrolled port state and does not apply 802 1X authenticator on it Any node attached on this port can acce
80. alll Time Time Default Applicant Mode Applicant Mode Default Registrar Mode Registrar Mode Restricted Mode Mode Max Packet Length 20 60 _ A 000 DHCP Boot 2 I 7 ann LAN MAC Table 3 VRP Conf 2 l Coun 5 Group STP 6 Trunk 7 802 1X m Alarm 8 Configuration 9 Diagnostics TFTP Server 10 L itl JOU rog 11 20 60 1000 Firmware Upgrade L tt lt Reboot 12 Logout 13 14 v Fig 3 39 Publication date May 2005 Revision Al 9 User Manual Function name GVRP Config Function description In the function of GVRP Config it is used to configure each ports GVRP operation mode in which there are seven parameters needed to be configured described below Parameter description GVRP State Setting This function is simply to let you enable or disable GVRP function You can pull down the list and click the lt Downward gt arrow key to choose Enable or Disable Then click the lt Apply gt button the system will take effect immediately Join Time Used to declare the Join Time in unit of centisecond Valid time range 20 100 centisecond Default 20 centisecond Leave Time Used to declare the Leave Time in unit of centisecond Valid time range 60 300 centisecond Default 60 centisecond Leave All Time A time period for announcement that all registered device is going to be de registered If someone still issues a new join then
81. an also easily create edit and delete a Tag based VLAN group by pressing lt Add gt lt Edit gt and lt Delete gt function buttons User can add a new VLAN group by inputting anew VLAN name and VLAN ID Parameter description VLAN Name The name defined by administrator is associated with a VLAN group Valid letter is A Z a z and 0 9 Other special characters will not be accepted The maximal length is 15 characters VID VLAN identifier Each tag based VLAN group has a unique VID It appears only in tag based and Double tag mode SYM VLAN While the SYM VLAN function of the group is enabled all packets with this group VID will be dropped in case they are transmitted from the ports that do not belong to this group Member This is used to enable or disable if a port is a member of the new added VLAN Enable means it is a member of the VLAN Just tick the check box M beside the port x to enable it level ki one 7 Auto Logout 3 min GSW 2494 System Tag based Group Port Mirror Bandwidth No VLANNAME J vio Qos 1 default 1 SNMP IGMP Snooping Max Packet Length DHCP Boot VLAN VLAN Mode nee yn Port base Group Tag Rule MAC Table Configuration Diagnostics TFTP Server Log Firmware Upgrade Robot ETE Fig 3 27 Publication date May 2005 Revision Al 78 User Manual Add Group Create a new Tag based VLAN Input the VLAN name as well as VID configure the SYM VLAN
82. ase the port will not fast transit to Forwarding state If it is set as True the port is treated as point to point link by RSTP and unconditionally transited to Forwarding state If it is set as False fast transition to Forwarding state will not happen on this port Default Auto Publication date May 2005 Revision Al 102 User Manual M Check Migration Check It forces the port sending out an RSTP BPDU instead of a legacy STP BPDU at the next transmission The only benefit of this operation is to make the port quickly get back to act as an RSTP port Click lt M Check gt button to send a RSTP BPDU from the port you specified one Auto Logout 3 min a System STP Port Configuration Port Mirror r e a n n Sandie Port No Port Status Path Cost Status Configured Path Cost Priority Admin Edge Port Admin Point To Point QoS 1 DISCARDING 2000000 o 128 No Auto SNMP 2 DISCARDING 2000000 o 128 No Auto IGMP Snooping 3 DISCARDING 2000000 o 128 No Auto Max Packet Length 4 DISCARDING 2000000 o 128 No Auto DHCP Boot 5 DISCARDING 2000000 o 128 No Auto VLAN 6 DISCARDING 2000000 0 128 No Auto MAC Table 7 DISCARDING 2000000 o 128 No Auto GYRP 8 DISCARDING 2000000 o 128 No Auto m STP 9 DISCARDING 2000000 o 128 No Auto mi i 10 DISCARDING 2000000 o 128 No Auto sac peace 11 DISCARDING 2000000 o 128 No Auto ss iy 12 DISCARDING 2000000 o 128 No Auto MASE 13 DISCARDING 2000000 o 128 No Auto Alarm 14 DISCARDING 2000000 0 1
83. ash a nie hon any chek ole sage aetees Ace 75 Druk OD TAO DAS CA TOUD aire es ae Ceca eee alan ak hls Sa ie Canc ena eae le sh ane tna iets is anaes de anatase 78 21 023 POP DASCA GVOUD welsh ou oh eis olla be all E lal an Be eh lal ed ela edna 80 AOA Taa RUE E T te alg te ne a all E a T 82 SE MAC TABLE maoan aaa TA T A E 84 IZGON RE CONFIGURATION orrea an a E E a ae 91 S EP CONFIGURATION sapiraa en a N 97 SEA E E S A E 121 E EN A A EEA E A S E Ce dass A E aoe cues 97 Del SoZ DLT CON OUOU ON os cat E T cork recast T check tag T saeaite aatsae 99 Del SD SLF OVE ON LOU ALON a akin tiaras ae etnies clita Bins Nin Wats a Due gia Sts Se lati Min ints gene tech te da 101 IAA T RUNING CONFIGURATION 355 cisco seers O arcana so usenet ee eee 104 J Kes end Om V8 Es WI Pd Bi men nnee em seen Ne en ree rome tence SOR eee mere 111 SO PAAR Mi CONG UR AT ON oars a tes css scr arse esse a cess a eo ee 121 CAER EE Ga IN sa a Na acct aa st rea Ne shee daca 124 lS DIAGNOS TICS Gate ive nee MP yO ae CEOS EET moO Oe OOS ERT me ee ese ee ee 128 Be OPP SERVER gochey ois a ose a sea AAE AT A A outa ae 131 E PA E T EEEE neat Ree Ren ere ae ee rR eee ene RN eee nae we ee nen ee EN eae Ree enn ETAT ee are eee eee N een nr eee 132 3 2 IL FIRMWARE LIPGRADE a a a a a a a an eats 134 B22 AIRE BOO I E E E E E I E E ET E E A ETE N eee 135 Da E DE OW ss coca a E A A S A EE acts E E 136 4 OPERATION OF CLI MANAGEMENT ccccccccscccccccccccccccccccccc
84. ast Destination Address With this function once a switch receives an IP multicast packet it will forward the packet to the members who joined in a specified IP multicast group before level one 5 Auto Logout 3 min GSW 2494 System IGMP Snooping Port Mirror E F Bandwidth SE O Disable Active Passive QoS SNMP IGMP Snoop Max Packet ength i DHCP Boot IP Multicast Table VLAN Sons ee IP Address VLAN ID Member Port STP 239 255 255 250 1 3 Trunk 802 1X Alarm Erm Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 22 Function name IGMP Snooping Function description IGMP is used to snoop the status of IP multicast groups and display its associated information in both tagged VLAN and non tagged VLAN networks Enabling IGMP with either passive or active mode you can monitor the IGMP snooping information which contains the multicast member list with the multicast groups VID and member port Publication date May 2005 Revision Al 71 User Manual Parameter description IGMP snooping mode selection The switch supports three kinds of IGMP Snooping status including 13 ll Passive Active and Disable Disable Active Passive IP Address Show al VLAN ID Show V Set Disable mode to disable IGMP Snooping function Default Disable In Active mode IGMP snooping switch will periodically issue the Membership Query message to all
85. ation of Port Mirror function Default is disable Monitoring Port Set up the port for monitoring Valid port is Port 1 24 and default is Port 1 Monitored Port Set up the port for being monitored Just tick the check box M1 beside the port x and valid port is Port 1 24 level one ee sy Auto Logout 3 min GSW 2494 Beacon Mirror Port Disable AGAU GLAS Oy Enable 1 2 Mirror Bandwidth SNMP IGMP Snooping 3 4 F 6 ahs 8 iao ie atic Length Monitored Port 9 10 11 12 13 14 15 16 oo VLAN 17 18 19 20 24 22 23 24 MAC Table GY RP STP Trunk 802 1X Alarm Configuration Diagnostics TFTP Server Firmware Upgrade Reboot Logout Fig 3 12 Publication date May 2005 Revision Al 56 User Manual 3 4 Bandwidth Management Function name Bandwidth Management Function description Bandwidth Management function is used to set up the limit of Ingress and Egress bandwidth for each port level one GSW 2494 System Bandwidth Management Configuration Port Mirror Bandwidth 1 QoS SNMP Ingress Rate Limiting Policing IGMP Snooping elie ees a State _ Data Rate Mbps Description i T Paeahi ee E Incoming traffic is discarded if rate is exceeded Sai poot All Traffic Disable K O ai Pause frames are generated if flow control is enabled Broadcast amp A Sah oe gt Kes Oa Disable Incoming traffic is discarded if rate is excee
86. between the periodic re authentication of the supplicant Default 3600 max Request 1 10 The maximum of number times that the authenticator will retransmit an EAP Request to the supplicant before it times out the authentication session The valid range 1 10 Default 2 times supp Timeout 1 65535 s A timeout condition in the exchange between the authenticator and the supplicant The valid range 1 65535 Default 30 seconds server Timeout 1 65535 s A timeout condition in the exchange between the authenticator and the authentication server The valid range 1 65535 Default 30 seconds level on e ou Auto Logout 3 min GSW 2494 System Port Parameter Setting Port Control Auto i 1 IGMP Snooping reAuthMax 1 10 2 Max Packet Length txPeriod 1 65535 s 30 DHCP Boot VLAN Quiet Period 0 65535 s 60 Mirror N MAC Table reAuthEnabled ON v GYRP j STP re uthPeriod 1 65535 5 3600 Trunk max Request 1 10 2 802 1X suppTimeout 1 65535 s 30 Mode serverTimeout 1 65535 s 30 Security Configuration Diagnostics TFTP Server Lo Firmware Upgrade Reboot Logout Fig 3 55 Publication date May 2005 Revision Al 120 User Manual 3 16 Alarm Configuration Alarm Configuration Events Configuration Email SMS Configuration Function name Events Configuration Function descriptio
87. bile Phone 6 Publication date May 2005 Revision Al 206 User Manual show alarm Syntax show Description The Show for alarm here is used to display the configuration of Trap SMS or E mail Argument None Possible value None Example GSW 2494 alarm show events GSW 2494 alarm show email GSW 2494 alarm show sms Publication date May 2005 Revision Al 207 User Manual diag diag Syntax diag Description Diag is used to test if UART DRAM Flash and EEPROM Argument None Possible value None Example GSW 2494 diag diag EEPROM Test OK UART Test OK DRAM Test OK Flash Test OK Loopback Syntax Loopback Description For Internal External Loopback Test Argument None Possible value None Example GSW 2494 diag loopback Internal Loopback Test OK External Loopback Test Port 123456789 10 11 12 13 14 15 16 17 18 1920 21 22 23 24 Fail ping Syntax ping lt ip gt Description To confirm that whether the remote end station or switch itself is alive or not Argument ip ip address or domain name Possible value IP address e g 192 168 2 65 or domain name e g tw yahoo com Example GSW 2494 diag ping 192 168 1 115 Gateway gt 192 168 1 253 192 168 1 115 is alive Publication date May 2005 Revision Al 208 User Manual log show Syntax show Description To show a list of trap l
88. cance bit set to 1 1 1 0 and is used for IP Multicast See also RFC 1112 Class E is a class with first 4 MSB set to 1 1 1 1 and is used for IP broadcast According to IANA Internet Assigned Numbers Authority there are three specific IP address blocks reserved and able to be used for extending internal network We call it Private IP address and list below Class A 10 0 0 0 10 255 255 255 Class B 172 16 0 0 172 31 255 255 Class C 192 168 0 0 192 168 255 255 Please refer to RFC 1597 and RFC 1466 for more information Subnet mask It means the sub division of a class based network or a CIDR block The subnet is used to determine how to split an IP address to the network prefix and the host address in bitwise basis It is designed to utilize IP address more efficiently and ease to manage IP network For a class B network 128 1 2 3 it may have a subnet mask 255 255 0 0 in default in which the first two bytes is with all 1s This means more than 60 thousands of nodes in flat IP address will be at the same network It s too large to manage practically Now if we divide it into smaller network by extending network prefix from 16 bits to say 24 bits that s using its third byte to subnet this class B network Now it has a subnet mask 255 255 255 0 in which each bit of the first three bytes is 1 It s now clear that the first two bytes is used to identify the class B network the third byte is used to identify the subnet within t
89. cccccccccccccccscccccccccoccees 137 A To MANA a A a aaa 137 Ale br LDO sce a saab tele thao Ue EE E E E oe E E EE 137 Ae ON UNE IN SOs Ce hg Sh fae Sta lal en oes acted oe ala te acta a et as Datta a Geeta 139 4D d GIODAL Commands Of CLL ressasser a aTr T ra Tra 140 422 boca Commands Of CLA airean EEEE E AEE ON TEAS 146 Se I MAINTENANC Eorna A E E E 217 Sst RESOLVING NO LINK CONDITION saraat e E A A E E E ead cat A een 217 EEIE Pe a EEA EE ATE N E A EA EAE A TE A E E A A AE 217 APPENDIX A TECHNICAL SPECIFICATIONS 2 ccccccccccccccccccccccccccccccccccccccccccccccccecs 218 APPENDIX B NULL MODEM CABLE SPECIFICATIONS ccccccccccccccccccccccccccccecs 222 Caution Circuit devices are sensitive to static electricity which can damage their delicate electronics Dry weather conditions or walking across a carpeted floor may cause you to acquire a static electrical charge To protect your device always e Touch the metal chassis of your computer to ground the static electrical charge before you pick up the circuit device e Pick up the device by holding it on the left and right edges only Electronic Emission Notices Federal Communications Commission FCC Statement This equipment has been tested and found to comply with the limits for a class A computing device pursuant to Subpart J of part 15 of FCC Rules which are designed to provide reasonable protection against such interference when operate
90. ce The most top left button is only for Master device See Fig 3 9 The background color of the button you press will be changed to represent that the device is under your management Note It will remove the grouping temporarily in case that you login the switch via the console The device of the group will be shown as station address the last number of IP Address device name on the button e g 196 GSW 2494 otherwise it will show if no corresponding device exists Once the devices join the group successfully then they are merely able to be managed via Master device and user will fail to manage them via telnet console web individually Up to 16 devices can be grouped for VSM however only one Master is allowed to exist in each group For Master redundancy user may configure more than two devices as Master device however the Master device with the smaller MAC value will be the Master one All of these 16 devices can become Master device and back up with each other Publication date May 2005 Revision Al 42 User Manual level one Auto Logout 3 min E System Virtual Stack Configuration _ System Information IP Time SEU Disan v _ Management Policy virtual Stack C heraut Port Mirror Appl Bandwidth QoS SNMP IGMP Snooping Max Packet Length ne Parameter description State It is used for the activation or de activation of VSM Default is Enable Role The role that th
91. ce on this port Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt ebl gt 0 OFF Disable reauthentication 1 ON Enable reauthentication Possible value lt port range gt 1 to 24 lt ebl gt O or 1 default is 1 Example GSW 2494 802 1x set reAuthEnabled 2 1 set reAuthPeriod Syntax set reAuthPeriod lt port range gt lt sec gt Description A constant that defines a nonzero number of seconds between periodic reauthentication of the supplicant Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt sec gt timer range 1 65535 Possible value lt port range gt 1 to 24 lt sec gt 1 65535 default is 3600 Example GSW 2494 802 1x set reAuthPeriod 2 3600 Publication date May 2005 Revision Al 197 User Manual set max request Syntax set max request lt port range gt lt times gt Description The maximum number of times that the state machine will retransmit an EAP Request packet to the Supplicant before it times out the authentication session Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt times gt max times range 1 10 Possible value lt port range gt 1 to 24 lt times gt 1 10 default is 2 Example GSW 2494 802 1x set max request 2 2 set supp Timeout Syntax set supp Timeout lt port range gt lt sec gt Description A timer used by the Backend Authentication state machine in order to determine
92. cond are gt 2000 1 12 1 31 0 23 0 59 and 0 59 respectively Input the wrong figure and press lt Apply gt button the device will reject the time adjustment request There is no time zone setting in Manual mode Default Year 2000 Month 1 Day 1 Hour 0 Minute 0 Second 0 Publication date May 2005 Revision Al 35 User Manual NTP NTP is Network Time Protocol and is used to sync the network time based Greenwich Mean Time GMT If use the NTP mode and select a built in NTP time server or manually specify an user defined NTP server as well as Time Zone the switch will sync the time in a short after pressing lt Apply gt button Though it synchronizes the time automatically NTP does not update the time periodically without user s processing Time Zone is an offset time off GMT You have to select the time zone first and then perform time sync via NTP because the switch will combine this time zone offset and updated NTP time to come out the local time otherwise you will not able to get the correct time The switch supports configurable time zone from 12 to 13 step 1 hour Default Time zone 8 Hrs Daylight Saving Daylight saving is adopted in some countries If set it will adjust the time lag or in advance in unit of hours according to the starting date and the ending date For example if you set the day light saving to be 1 hour When the time passes over the starting time the system time will be inc
93. count Possible value None Example GSW 2494 account del aaaaa Account aaaaa deleted Publication date May 2005 Revision Al 152 modify Syntax modify lt name gt Description To change the username and password of an existing account Argument lt name gt existing user account Possible value None Example GSW 2494 account modify aaaaa username password the length is from 5 to 15 Current username aaaaa bbbbb New password Confirm password Username changed successfully Password changed successfully show Syntax show Description To show system account including account name and identity Argument None Possible value None Example GSW 2494 account show Account Name Identity admin Manager guest guest User Manual Publication date May 2005 153 Revision Al User Manual m port set speed duplex Syntax set speed duplex lt range gt lt auto 10half 10full 100half 100full 1Gfull gt Description To set up the speed and duplex of all ports Argument lt range gt syntax 1 5 7 available from 1 to 24 lt port speed gt auto set auto negotiation mode 10half set soeed duplex 10M Half 10full set soeed duplex 10M Full 100half set soeed duplex 100M Half 100full set soeed duplex 100M Full 1Gfull set soeed duplex 1G Full Possible value lt range gt 1 to 24 lt port speed gt auto 10half 10full 100half 100full 1Gfull
94. cription To configure the settings related with 802 1X Radius Server Argument lt ip gt the IP address of Radius Server lt port number gt the service port of Radius Server Authorization port lt secret key gt set up the value of secret key and the length of secret key is from 1 to 31 Possible value lt port number gt 1 65535 default is 1812 Example GSW 2494 802 1x set state 192 168 1 115 1812 WinRadius GSW 2494 802 1x set mode Syntax set mode lt port range gt lt mode gt Description To set up the 802 1X authentication mode of each port Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt mode gt set up 802 1x mode O disable the 802 1x function 1 set 802 1x to Multi host mode Possible value lt port range gt 1 to 24 lt mode gt 0 or 1 Example GSW 2494 802 1x set mode 2 1 GSW 2494 802 1x Publication date May 2005 Revision Al 195 User Manual set port control Syntax set port control lt port range gt lt authorized gt Description To set up 802 1X status of each port Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt authorized gt Set up the status of each port O ForceUnauthorized 1 ForceAuthorized 2 Auto Possible value lt port range gt 1 to 24 lt authorized gt 0 1 or 2 Example GSW 2494 802 1x set port control 2 2 set reAuthMax Syntax set reAuthMax lt port range gt lt max gt Descrip
95. ctical deployment especially in physical location The following diagram shows how it works and what the difference they are Case2a Port based VLAN See Fig 2 3 Fig 2 3 Port based VLAN Diagram 1 The same VLAN members could not be in different switches 2 Every VLAN members could not access VLAN members each other 3 The switch manager has to assign different names for each VLAN groups at one switch Publication date May 2005 Revision Al User Manual Case 2b Port based VLAN See Fig 2 4 Fig 2 4 Port based VLAN Diagram 1 VLAN1 members could not access VLAN2 VLAN3 and VLAN4 members 2 VLAN2 members could not access VLAN1 and VLAN3 members but they could access VLAN4 members 3 VLAN3 members could not access VLAN1 VLAN2 and VLAN4 4 VLAN4 members could not access VLAN1 and VLAN3 members but they could access VLAN2 members Case3a The same VLAN members can be at different switches with the same VID See Fig 2 5 Fig 2 5 Attribute based VLAN Diagram Publication date May 2005 Revision Al 14 User Manual 2 1 3 Configuring the Management Agent of GSW 2494 We offer you three ways to startup the switch management function They are RS 232 console CLI and Web Users can use any one of them to monitor and configure the switch You can touch them through the following procedures Section 2 1 3 1 Configuring the Management Agent of GSW 2494 through the Serial RS 232 Port
96. d in a commercial environment European Community CE Electromagnetic Compatibility Directive This equipment has been tested and found to comply with the protection requirements of European Emission Standard EN55022 EN60555 2 and the Generic European Immunity Standard EN50082 1 EMC EN55022 1988 CISPR 22 1985 class A EN60555 2 1995 class A EN60555 3 IEC1000 4 2 1995 4K V CD 8KV AD IEC1000 4 3 1995 3V m IEC1000 4 4 1995 1KV power line 0 5KV signal line il About this user s manual In this user s manual it will not only tell you how to install and connect your network system but configure and monitor the GSW 2494 through the built in CLI and web by RS 232 serial interface and Ethernet ports step by step Many explanation in detail of hardware and software functions are shown as well as the examples of the operation for web based interface and command line interface CLI Overview of this user s manual Chapter 1 Introduction describes the features of GSW 2494 Chapter 2 Installation Chapter 3 Operation of Web based Management Chapter 4 Operation of CLI Management Chapter 5 Maintenance Publication date May 2005 Revision Al User Manual 1 Introduction 1 1 Overview of GSW 2494 GSW 2494 24 port Gigabit L2 Managed Switch is a standard switch that meets all IEEE 802 3 u x z Gigabit Fast Ethernet specifications The switch included 22 Port 10 100 1000Mbps T
97. d tells you the basic information of the system including Model Name System Description Location Contact Device Name System Up Time Current Time BIOS Version Firmware Version Hardware Mechanical Version Series Number Host IP Address Host Mac Address Device Port RAM Size and Flash Size With this information you will know the software version used MAC address serial number how many ports good and so on This is helpful while malfunctioning 9 AA PREO A ru che v Foote Toe np ae one Auto Logout I min System System Information Port Mirror ee CCC sw 2108 Qos CRUMLEY 2 Managed Switch sor poom oo IGMP Snooping Max Packet Length asw zasa DHCP Boot VLAN MAC Tablo EULA Coys Hours 12 Mins 17 Secs GVRP E Thu 201 21 06 43 56 2005 s as Cr v 00 007 2 Ce a v2 00 alarm RTCA v2 03 v 01 Configuration rE a 03002000018 Diagnostics vases CELE 192 168 1 24 Loy Host MAC Address 00 40 7 E7 00 11 Firmware Upgrade UART 1 TP 22 Dual Media Port Logout RAM Size 16M Flosh Size 2M Fig 3 2 Publication date May 2005 Revision Al 27 User Manual e The Information of Page Layout On the top side it shows the front panel of the switch In the front panel the linked ports will display green as to the ports which are link off they will be dark For the optional modules
98. ded STP Trunk Egress Rate Limiting Shaping oe P Traffic State Data Rate Mbps Description 5 afii ti All Traffic Disable x f Packet transmission is delayed if rate is exceeded oniguranon L en Traffic may be lost if egress buffers run full Diagnostics TFTP Server Log avoiy Firmware Upgrade Reboot Logout Fig 3 13 Parameter description Port Number Choose the port that you would like this function to work on it Valid range of the port is 1 24 All Traffic for Ingress Rate Limiting Policing Set up the limit of Ingress bandwidth for the port you choose Incoming traffic will be discarded if the rate exceeds the value you set up in Data Rate field Pause frames are also generated if flow control is enabled The format of the packet limits to unicast broadcast and multicast Valid range is 0 1000 Broadcast amp Multicasat for Ingress Rate Limiting Policing Set up the limit of Ingress bandwidth for the port you choose Incoming traffic will be discarded if the rate exceeds the value you set up in Data Rate field The format of the packet limits to broadcast and multicast Valid range is 0 1000 Publication date May 2005 Revision Al a7 User Manual All Traffic for Egress Rate Limiting Shaping Set up the limit of Egress bandwidth for the port you choose Packet transmission will be delayed if the rate exceeds the value you set up in Data Rate field Traffic may be lost if egress buffers run
99. dentifier Host identifier Fig 2 10 IP address structure Publication date May 2005 Revision Al 19 User Manual With the classful addressing it divides IP address into three classes class A class B and class C The rest of IP addresses are for multicast and broadcast The bit length of the network prefix is the same as that of the subnet mask and is denoted as IP address X for example 192 168 1 0 24 Each class has its address range described below Class A Address is less than 126 255 255 255 There are a total of 126 networks can be defined because the address 0 0 0 0 is reserved for default route and 127 0 0 0 8 is reserved for loopback function Bit 01 78 31 Network address Host address Class B IP address range between 128 0 0 0 and 191 255 255 255 Each class B network has a 16 bit network prefix followed 16 bit host address There are 16 384 2 14 16 networks able to be defined with a maximum of 65534 2 16 2 hosts per network Bit 012 15 16 31 a Network address Host address Class C IP address range between 192 0 0 0 and 223 255 255 255 Each class C network has a 24 bit network prefix followed 8 bit host address There are 2 097 152 2421 24 networks able to be defined with a maximum of 254 248 2 hosts per network Bit 012 3 23 24 31 Network address Host address Publication date May 2005 Revision Al User Manual Class D and E Class D is a class with first 4 MSB Most signifi
100. duplex Cable and Maximum Length Cat 5 UTP cable up to 100m Up to 220 275 500 550m eases which depends on Multi Mode Fiber type Single Mode Fiber up to10 30 50Km 1000Base LX WDM BiDi Single Mode Single Fiber up to 20Km Publication date May 2005 Revision Al 219 User Manual Diagnostic LED System LED Per Port LED Power CPU 10 100 1000M TP Port 1 to 24 gt LINK ACT 10 100 1000Mbps 1000M SFP Fiber Port 23 24 SFP LINK ACT Power Requirement Voltage Frequency Consumption Ambient Temperature Humidity Dimensions AC Line 100 240 V 50 60 Hz 30W 0 to 50 C 5 to 90 44 H x 442 W x 209 D mm Comply with FCC Part 15 Class A amp CE Mark Approval Publication date May 2005 Revision Al 220 User Manual Management Software Specifications Auto negotiation support on 10 100 1000 Base TX ports Web browser or console interface can set transmission speed 10 100 1000Mbps and System onriguratlon operation mode Full Half duplex on each port enable disable any port set VLAN group set Trunk Connection Management Agent SNMP support MIB II Bridge MIB RMON MIB Spanning Tree Algorithm IEEE 802 1D Port Base 802 1Q Tagged allowed up to 256 active VLANs in set Trunk Function Ports trunk connections allowed IGMP tt lt sCisd IP Multicast Filtering by passively snooping on the IGMP Query Bandwidth Control Supports by port Egres
101. e level on e an Auto Logout 3 min GSW 2494 System Quality of Service QoS ToS Configuration Port Mirror Bandwidth TCP IP ToS Classes Qos Sy yy Cs ey ey SNMP x z iow fal IGMP Snooping Port 1 Mi ow Max Packet Length o 0 1 Low y DHCP Boot al si o 1 0 Low MAC Table o 1 1 Low y GVRP e sia 1 o 0 High w Trunk 1 0 1 High Yy 802 1X p Alarm 1 1 0 righ w Configuration 1 1 1 High Y Diagnostics e TFTP Server Firmware Upgrade Logout Fig 3 17 Parameter description Quality of Service QoS ToS Configuration Used for setting up the QoS in Layer 3 Port User can set up the port 1 24 respectively to let TOS QoS function work on them If you would like to set up all ports at a time user is also allowed to choose All in the selection list to simplify the procedure of configuration Publication date May 2005 Revision Al 63 User Manual Bit O Bit 1 Bit 2 According to the arrangement of Bit 5 Bit 7 in TOS Field of IP Header it can form 8 kinds of traffics including 000 001 010 010 100 101 110and1 11 Class 8 kinds of traffic as mentioned above user can set up High Priority or Low Priority for each port respectively Publication date May 2005 Revision Al 64 User Manual Function name IP TCP UDP Port Classification Function description In L4 QoS Configuration you can enter one of these special network transmission events for example we us
102. e Down prioritize web browsing e mail FTP and news L4 QoS Configuration and click apply and then click Custom L4 We can find Special TCP UDP port 80 280 443 25 110 20 21 69 119 2009 have already existed and defined for your using but it is fine that you modify this pre defined TCP UDP port with other port number you prefer In Down prioritize web browsing e mail FTP and news L4 QoS Configuration with default setting special defined TCP UDP port possesses lower QoS traffic than Default class all other TCP UDP ports such as port 81 82 83 84 85 etc Giving an example when we transmit TCP packets with port number 80 at each of port 2 and port number 81 at port 3 to port 1 until the congestion happens The packets from port 3 will be dropped by port 1 because the TCP packets have port number 80 is high priority and will have higher precedence to be sent out from port 1 Parameter description Disable IP TCP UDP Port Classification Belong to the QoS in L4 Just tick the option button and press lt Apply gt button to have this function taken affect Then enter Custom L4 to disable IPI TCP UDP port Classification for QoS Down prioritize web browsing e mail FTP and news Belong to the QoS in L4 Just tick the option button and press lt Apply gt button to have this function taken affect Then enter Custom L4 to set up Special TCP UDP port for QoS Prioritize IP Telephony VoIP Belong to the QoS in L4 J
103. e QoS Layer 4 Configuration Port Mirror Bandwidth Disable IP TCP UDP Port Classification et Down prioritize web browsing e mail FTP and news IGMP Snooping Prioritize IP Telephony YoIP Max Packet Length Prioritize iSCSI DHCP Boot VLAN Prioritize web browsing e mail FTP transfers and news ee Prioritize Streaming Audio Video STP Prioritize Databases Oracle IBM DB2 SQL Microsoft Trunk 802 1X T simple lt lt Configuration Diagnostics TFTP Server TCP IP Layer 4 TCP UDP Classes Log Special TCP UDP class High Default class all other TCP UDP ports Firmware Upgrade Reboot Port Special UDP TCP Port Selection Logout Porti wi Custom O Custom 0 Custom 0 Custom 0 Custom 0 o v a Custom 0 Custom 0 Custom ol o Custom Custom Apply Fig 3 18 Advanced Mode one Auto Logout 3min System Quality of Service QoS Layer 4 Configuration Port Mirror Bandwidth Disable IP TCP UDP Port Classification nto Down prioritize web browsing e mail FTP and news IGMP Snooping Prioritize IP Telephony oIP Max EREKEt Ong O Prioritize iSCSI DHCP Boot VLAN Prioritize web browsing e mail FTP transfers and news paramai Prioritize Streaming Audio Video STP Prioritize Databases Oracle IBM DB2 SQL Microsoft Trunk 802 1X ee advance gt gt Configuration Diagnostics TFTP Server Log Apply Firm
104. e SNMP settings community name trap host and public traps as well as the throttle of SNMP A SNMP manager must pass the authentication by identifying both community names then it can access the MIB information of the target device So both parties must have the same community name Once completing the setting click lt Apply gt button the setting takes effect Parameters description SNMP The term SNMP here is used for the activation or de activation of SNMP Default is Enable Get Set Trap Community Community name is used as password for authenticating if the requesting network management unit belongs to the same community group If they both don t have the same community name they don t belong to the same group Hence the requesting network management unit can not access the device with different community name via SNMP protocol If they both have the same community name they can talk each other Community name is user definable with a maximum length of 15 characters and is case sensitive There is not allowed to put any blank in the community name string Any printable character is allowable The community name for each function works independently Each function has its own community name Say the community name for GET only works for GET function and can t be applied to other function such as SET and Trap Publication date May 2005 Revision Al 69 User Manual Default SNMP function Enable Default community
105. e same as its own Port No Method Show the method a port uses to aggregate with other ports Member Ports Show all member ports of an aggregator port Ready Ports Show only the ready member ports within an aggregator port Auto Logout 3 min GSW 2494 a System Aggregator View Port Mirror Bandwidth Aggregator Method Member Ports Ready Ports Qos EET None 1 TOME Sai None 2 IGMP Snooping Max Packet Length ae None 3 3 DHCP Boot DE None 4 sles EEE None 5 able GVRP EE None 6 STP None 7 k E oe e M Agor Aggregator wW None 9 LACP Systen Priority None 10 802 1X EET one 11 confi a 12 Configuration ae None Diagnostics None 13 E TFTP Server None 14 si None 15 Firmware Upgrade Reboot None 16 Logout None 17 E None 18 None 19 Fig 3 46 Publication date May 2005 Revision Al 10 Co User Manual Function name LACP Detail LACP Aggregator Detailed Information Function description Show the detailed information of the LACP trunking group Parameter description Actor The switch you are watching on Partner The peer system from this aggregator s view System Priority Show the System Priority part of a system ID MAC Address Show the MAC Address part of a system ID Port Show the port number part of an LACP port ID Key Show the key value of the aggregator The key value is determined by the LACP protocol entity and can t be set through management Trunk Status
106. e switch would like to play in virtual stack Two types of roles including master and slave are offered for option Default is Master Group ID It is the group identifier GID which signs for VSM Valid letters are A Z a z 0 9 and _ characters The maximal length is 15 characters GR 26_Gsw 269 12_Gsw 129 _ _ 1 one GSW 2494 a System Virtual Stack Configuration System Information BG l ae sas Enable uae EY aster Management Policy Fome Porre SL eror Port Mirror Appl Bandwidth j Qos E SNMP IGMP Snooping Max Packet Length NHCP Annt Publication date May 2005 Revision Al 43 User Manual 3 2 Port Configuration Four functions including Port Status Port Configuration Simple Counter and Detail Counter are contained in this function folder for port monitor and management Each of them will be described in detail orderly in the following sections Port Configuration Status Configuration Simple Counter Detail Counter 3 2 1 Port Status The function Port Status gathers the information of all ports current status and reports it by the order of port number link status port state Auto Negotiation status speed duplex and flow control An extra media type information for the module ports 23 and 24 is also offered See Fig 3 8 Auto Logout 3 min w a System Port Current Status Port Con branon Port No Media Link State
107. e will be removed from the MAC Table The range of Age out Time is 10 800 seconds and the setup of this time will have no effect on static MAC addresses In addition the user also have the right to decide enabling or disabling Stop learning while CPU is busy function based on the usage of the switch This setup will influence the amount of packets flooding inside of the switch while CPU is busy The default age out time is 300 seconds Parameter description Aging Time Delete a MAC address idling for a period of time from the MAC Table which will not affect static MAC address Range of MAC Address Aging Time is 10 800 seconds The default Aging Time is 300 seconds Flush Remove all entries that do not belong to the static Mac Entry from the MAC Table Auto Logout 3 min Syam MAC Maintenance Port Mirror r Bandwidth Aging time 1a Enable 300 Secs 10 65535 SNMP IGMP Snooping Max Packet Length DHCP Boot 7 VLAN Remove all non static mac entry Flush MAC Table Information Maintena Static oly Static Filter MAC Alias GY RP STP Trunk 802 1X Alarm Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 35 Publication date May 2005 Revision Al User Manual Function Name Static Forward Function Description Static Forward is a function that allows the user in the static forward table to access a specified port of the switch Static Forward table associated
108. ed MAC entry Set Alias Save the Alias of MAC entry you set up Search Find the entry that meets your setup Previous Page Move to the previous page Next Page Move to the next page Alias The Alias of the searched entry MAC Address The MAC address of the searched entry Publication date May 2005 Revision Al 84 User Manual Port The port that exists in the searched MAC Entry VID VLAN Group that MAC Entry exists State Display the method that this MAC Entry is built It may show Dynamic MAC or Static MAC one Auto Logout 3 min GSW 2494 System MAC Table Information Port Mirror Bandwidth Moi Moz Mos Mos Mos Mos Mo7 Mos Mos M 10 M 11M 12 QoS eee M13 M 14 M 15 M 16 M 17 M 18 M 19 M20 M21 M22 M23 M24 SNMP V Select Unselect All IGMP Snoopi ar Efi mac 2 e2 27 e e7 J77 vo f Max Packet Length DHCP Boot MAC Table alias J set arias VLAN H Inf n Maintenaice _ Static Forward _ Static Filter mac alias arias O mac Address Port ovo O State GVRP STP Trunk 802 1X Alarm Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 34 Publication date May 2005 Revision Al 85 User Manual Function Name MAC Table Maintenance Function Description This function can allow the user to set up the processing mechanism of MAC Table An idle MAC address exceeding MAC Address Age out Tim
109. em Reboot the System Port Mirror Bandwidth Do you want to continue QoS SWE Save and Reboot Saving Configuration and Reboot IGMP Snooping j i i Max Packet Length DHCP Boot Reboot Reboot the System VLAN MAC Table GVRP STP Trunk 802 1X Alarm Configuration Diagnostics TFTP Server Log Firmware Upgrade b Fig 3 70 Publication date May 2005 Revision Al 135 User Manual 3 23 Logout You can manually logout by performing Logout function In the switch it provides another way to logout You can configure it to logout automatically Function name Logout Function description The switch allows you to logout the system to prevent other users from the system without the permission If you do not logout and exit the browser the switch will automatically have you logout Besides this manually logout and implicit logout you can pull down the lt Auto Logout gt list at the left top corner to explicitly ON OFF this logout function Parameter description Auto Logout Default is ON If it is ON and no action and no key is stroke as well in any function screen more than 3 minutes the switch will have you logout automatically Auto Logout 3 min N I GSW 2494 System Logout Port Bandwidth Qos SNMP Logout IGMP Snooping Max Packet Length DHCP Boot VLAN MAC Table GVRP STP Trunk 802 1X Alarm Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot L aang Fig
110. en it is set Disable there will be no flow control in the port It drops the packet if too much to handle Default Enable Publication date May 2005 Revision Al 50 User Manual 3 2 3 Simple Counter The function of Simple Counter collects any information and provides the counting about the traffic of the port no matter the packet is good or bad In the Fig 3 10 the window can show all ports counter information at the same time Each data field has 12 digit long If the counting is overflow the counter will be reset and restart counting The data is updated every time interval defined by the user The valid range is 3 to 10 seconds The Refresh Interval is used to set the update frequency Default update time is 3 seconds Auto Logout 3 min t System Simple Counter Port Status Configuration Refresh Interval 3 sec Vv Simple lp Time elapsed since last reset O Days 1 Hours 26 Mins 34 Secs Detail Counr Mirror Bandwidth Port No Tx Byte Rx Byte Tx Packet Rx Packet Tx Collision Rx Error Packet Qos 1 0 o 0 o o 0 cue Satie 2 9 S x 2 2 Max BackatEength sn siete Haig aa 5 DHCP Boot VLAN 5 0 0 0 0 0 0 MAC Table 6 0 0 0 0 o o GYRP 7 0 o 0 0 o 0 STP 8 0 0 0 0 0 0 Trunk 9 o o o o o o 802 1X 10 0 0 0 0 0 0 Alarm 11 0 0 0 0 0 0 Configuration 12 0 0 0 Oo 0 0 Diagnostics 13 0 0 o 0 0 0 TFTP Server 14 Oo 0 0 0 0 0 Log 15 0 0 0 0 0 0 Firmware Upgrade 16 fa fa fa o 0 o Reboot 17 o o 0 o o 0 Logou
111. ening state moved to Learning state or from Learning state moved to Forwarding state of a port in bridge Hello Time Show the current hello time of the root bridge Hello time is a time interval specified by root bridge used to request all other bridges periodically sending hello message every hello time seconds to the bridge attached to its designated port STP Topology Change Count STP Topology Change Count expresses the time spent in unit of seconds since the beginning of the Spanning Tree Topology Change to the end of the STP convergence Once the STP change is converged the Topology Change count will be reset to 0 The figures showing in the screen may not be the exact time it spent but very close to because the time is eclipsing Time Since Last Topology Change Time Since Last Topology Change is the accumulated time in unit of seconds the STP has been since the last STP Topology Change was made When Topology Change is initiated again this counter will be reset to 0 And it will also count again once STP topology Change is completed Auto Logout 3 min System STP Status Port Mirror i z Bandwidth Disabled QoS Bridge ID 00 40 C7 D9 12 04A TP State BAME x Bridge Priority 32768 IGMP Snooping nd pant e O NET Max Packet Length Designated Root 00 40 C7 D9 12 04A Root Path Cost DHCP Boot Designated Priority 32768 VLAN Root Port o GvRP S Root Path Cost 0 GYRP STP Current Max Age sec 20 oy C
112. ent of DNS address Default 0 0 0 0 Publication date May 2005 Revision Al 34 User Manual 3 1 3 Time Configuration The switch provides manual and automatic ways to set the system time via NTP Manual setting is simple and you just input Year Month Day Hour Minute and Second within the valid value range indicated in each item If you input an invalid value for example 61 in minute the switch will clamp the figure to 59 NTP is a well known protocol used to synchronize the clock of the switch system time over a network NTP an internet draft standard formalized in RFC 1305 has been adopted on the system is version 3 protocol The switch provides four built in NTP server IP addresses resided in the Internet and an user defined NTP server IP address The time zone is Greenwich centered which uses the expression form of GMT xx hours Function name Time Function description Set the system time by manual input or set it by syncing from Time servers The function also supports daylight saving for different area s time adjustment Parameter description Current Time Show the current time of the system Manual This is the function to adjust the time manually Filling the valid figures in the fields of Year Month Day Hour Minute and Second respectively and press lt Apply gt button time is adjusted The valid figures for the parameter Year Month Day Hour Minute and Se
113. er of GARP BPDU with Join Empty message is received by the GARP application JoinIn Message Packets Number of GARP BPDU with Join In message is received by the GARP application Publication date May 2005 Revision Al 94 User Manual LeaveEmpty Message Packets Number of GARP BPDU with Leave Empty message is received by the GARP application Empty Message Packets Number of GARP BPDU with Empty message is received by the GARP application Transmitted Total GVRP Packets Total GARP BPDU is transmitted by the GVRP application Invalid GVRP Packets Number of invalid GARP BPDU is transmitted by the GVRP application LeaveAll Message Packets Number of GARP BPDU with Leave All message is transmitted by the GARP application JoinEmpty Message Packets Number of GARP BPDU with Join Empty message is transmitted by the GARP application JoinIn Message Packets Number of GARP BPDU with Join In message is transmitted by the GARP application LeaveEmpty Message Packets Number of GARP BPDU with Leave Empty message is transmitted by the GARP application Empty Message Packets Number of GARP BPDU with Empty message is transmitted by the GARP application Publication date May 2005 Revision Al 95 User Manual Function name GVRP Group Information Function description To show the dynamic group member and their information Parameter description VID VLAN identifier When GVRP group creates
114. es Number of 256 511 byte frames in good and bad packets transmitted Tx 512 1023 Bytes Number of 512 1023 byte frames in good and bad packets transmitted Tx 1024 Bytes Number of 1024 max_length byte frames in good and bad packets transmitted Rx CRC Alignment Number of Alignment errors and CRC error packets received Rx Undersize Number of short frames lt 64 Bytes with valid CRC Rx Oversize Number of long frames according to max_length register with valid CRC Rx Fragments Number of short frames lt 64 bytes with invalid CRC Rx Jabber Number of long frames according tomax_length register with invalid CRC Rx Drops Frames dropped due to the lack of receiving buffer Rx Errors Number of the error packet received Tx Collisions Number of collisions transmitting frames experienced Tx Drops Number of frames dropped due to excessive collision late collision or frame aging Tx FIFO Drops Number of frames dropped due to the lack of transmitting buffer Publication date May 2005 Revision Al 23 User Manual 3 3 Mirror Function name Mirror Configuration Function description Mirror Configuration is to monitor the traffic of the network For example we assume that Port A and Port B are Monitoring Port and Monitored Port respectively thus the traffic received by Port B will be copied to Port A for monitoring Parameter description Mode Used for the activation or de activ
115. escription When you enter this command via Telnet connection you would logout the system and disconnect If you connect the system through direct serial port with RS 232 cable you would logout the system and be back to the initial login prompt when you run this command Argument None Possible value None Example None save Start Syntax save start Description To save the current configuration as the start one When you enter this command the CLI would save your current configuration into the non volatile FLASH If you want the configuration still works after rebooting save the configuration using the command save stat Argument None Possible value None Example GSW 2494 save start Saving start Save Successfully GSW 2494 Publication date May 2005 Revision Al 143 User Manual save user Syntax save user Description To save the current configuration as the user defined configuration When you enter this command the CLI would save your current configuration into the non volatile FLASH as user defined configuration Argument None Possible value None Example GSW 2494 save user Saving user Save Successfully GSW 2494 restore default Syntax restore default Description To restore the startup configuration as factory default configuration If restoring default successfully the CLI would prompt if reboot immediately or not If you press Y or
116. escsseseceeesseecsseecseeneseeesenes 27 FAL OVIS NAT OM are DEEE pata cede R OE E T O a 30 FAA EON Oa Oazis s a a a a Agua dacteas Je Silas Me COnN OULALION asispa iorn a a a eaten tiacaiasaw matantadensaxionaniatess 35 JAA ACCOUNT Con onra Oise a a 38 Sh Manae emeni SCCULILY oireen E ENEN AER ER 39 DRO c VUORIA K arn ear A AEE A R A EAR Mane 42 952 POREC ONFIGURA MON asses once seeisa cite oa eE ONA ohn GRIE E E 44 FeAl OPE OAS erena R EE EE 44 Del OFLC ON OUTO OM carea Aer E EE E NR 49 32 OUPO C OUTIICE soria E E E E ath de de artes ee ta 5 32A Deil EC Ounte oense e asl cde ths ks tah tae eshte blanch hac dAteil tase rae Bis ionaclss 53 OL DELS G1 Gaerne manera meee ENP noe rR RT Mcrae eee nen PCT RES ener en E enn ene ene eee ee 56 eae BANDWIDTH MANAGEMENT Seadh a at ca loatut a Sia oan a ana dar eie anid Sina diaw sind ee See 57 3 5 QOS QUALITY OF SERVICE CONFIGURATION sssssssssssesssssssssssssssssssssssssssssssessssssseessessssegaas 59 AOO NIVIP CON GURA TON ice aad leeatia nia rete T dat ae E E dea ead cca onesies dete 69 I IOMP SNOOPIN ersen nrn sees haces AT Soa ee sna rated teaeende iat nian eat 71 ISe MAX PAG Ie NG os gsc aden aati 2 Se cess aa ca et eace Sere ales teas 73 29 DHCP BOO ee ner eee reer ero ty ote re ee reer ero corr ere rte cee tn veer 74 AOV LA N Mame merece irene E Cer meer one rrr emer nT cere are ee ae err tn ratty Creer enn ere at eee 75 IAO VEAN VI OG Cs iris ih itera ites acing Osa E Ceara ee ee Gate atl
117. ged between an authenticator PAE and a supplicant PAE The Authenticator exchanges the message to authentication server using EAP encapsulation Before successfully authenticating the supplicant can only touch the authenticator to perform authentication message exchange or access the network from the uncontrolled port Authentication Server s System Supplicant s System Authenticator s System Services Offered by Authenticator e g Bridge Relay Supplicant PAE Authentication Authenticator PAE Server Controlled port Uncontrolled port s Port Authorize Fig 3 49 In the Fig 3 50 this is the typical configuration a single supplicant an authenticator and an authentication server B and C is in the internal network D is Authentication server running RADIUS switch at the central location acts Authenticator connecting to PC A and Ais a PC outside the controlled port running Supplicant PAE In this case PC A wants to access the services on device B and C first it must exchange the authentication message with the authenticator on the port it connected via EAPOL packet The authenticator transfers the supplicant s credentials to Authentication server for verification If success the authentication server will notice the authenticator the grant PC A then is allowed to access B and C via the switch If there are two switches directly connected together instead of single one for the link connecting t
118. guration 802 1x port based network access control provides a method to restrict users to access network resources via authenticating user s information This restricts users from gaining access to the network resources through a 802 1x enabled port without authentication If a user wishes to touch the network through a port under 802 1x control he she must firstly input his her account name for authentication and waits for gaining authorization before sending or receiving any packets from a 802 1x enabled port Before the devices or end stations can access the network resources through the ports under 802 1x control the devices or end stations connected to a controlled port send the authentication request to the authenticator the authenticator pass the request to the authentication server to authenticate and verify and the server tell the authenticator if the request get the grant of authorization for the ports According to IEEE802 1x there are three components implemented They are Authenticator Supplicant and Authentication server shown in Fig 3 49 Supplicant It is an entity being authenticated by an authenticator It is used to communicate with the Authenticator PAE Port Access Entity by exchanging the authentication message when the Authenticator PAE request to it Authenticator An entity facilitates the authentication of the supplicant entity It controls the state of the port authorized or unauthorized according t
119. han one ready member ports is not a real trunked group Any Static trunk group is a real trunked group Publication date May 2005 Revision Al 104 User Manual Per Trunking Group supports a maximum of 12 ready member ports Please note that some decisions will automatically be made by the system while you are configuring your trunking ports Some configuration examples are listed below a 12 ports have already used Static Trunk Group ID 1 the 13th port willing to use the same Static Trunk Group ID will be automatically set to use the None trunking method and its Group ID will turn to 0 This means the port won t aggregate with other ports b 14 ports all use LACP Trunk Group ID 1 at most 12 ports can aggregate together and transit into the ready state c A port using the None trunking method or Group ID O will be automatically set to use the None trunking method with Group ID 0 Publication date May 2005 Revision Al 105 User Manual Function name Port Setting Status Function description Port setting status is used to configure the trunk property of each and every port in the switch system Parameter description Method This determines the method a port uses to aggregate with other ports None A port does not want to aggregate with any other port should choose this default setting LACP A port use LACP as its trunk method to get aggregated with other ports also using LACP
120. he section of Trap Alarm Configuration and SNMP Configuration Function name Log Data Function description The Trap Log Data is displaying the log items including all SNMP Private Trap events SNMP Public traps and user logs occurred in the system In the report table No Time and Events are three fields contained in each trap record Auto Logout 3min GSW 2494 System Log Data Port Miror TFTP Server 0 0 0 0 Bandwidth E Dis abie a QoS m SNMP pran E r r IGMP Snooping 1 SatMar 26 00 41 35 2005 Link Up Port 3 Max Packet Length 2 Sat Mar 26 00 41 33 2005 Link Down Port 3 DHCP Boot 3 Sat Mar 26 00 24 17 2005 Link Up Port 3 VLAN 4 Sat Mar 26 00 24 16 2005 Link Down Port 3 MAC Table 5 Fri Mar 25 22 25 51 2005 Login admin GYRP 6 Fri Mar 25 22 20 08 2005 Login admin 7 Fri Mar 25 22 19 53 2005 Link Up Port 3 STP 8 Fri Mar 25 22 19 50 2005 Link Down Port 1 Trunk 9 Fri Mar 25 22 19 41 2005 Link Up Port 1 802 1X 10 Fri Mar 25 22 19 40 2005 Link Down Port 1 Alarm 11 Fri Mar 25 22 19 32 2005 Cold Start Configuration Diagnostics TFTP Server L FitAware Upgrade Reboot Logout Fig 3 68 Parameter description No Display the order number that the trap happened Time Display the time that the trap happened Events Display the trap event name Auto Upload Enable Switch the enabled or disabled status of the auto upload function Publication date May 2005 Revision Al 132 User Manual Upload L
121. he swtich due to the Access Type you choose However while you select Accept action you will have the authority to manage the switch Edit Create A new entry of Management Security Configuration can be created after the parameters as mentioned above had been setup and then press lt Edit Create gt button Of course the existed entry also can be modified by pressing this button Delete Remove the existed entry of Management Security Configuration from the management security table Publication date May 2005 Revision Al 41 User Manual 3 1 6 Virtual Stack Function name Virtual Stack Function description Virtual Stack Management VSM is the group management function Through the proper configuration of this function switches in the same LAN will be grouped automatically And among these switch one switch will be a master machine and the others in this group will become the slave devices VSM offers a simple centralized management function It is not necessary to remember the address of all devices manager is capable of managing the network with knowing the address of the Master machine Instead of SNMP or Telnet Ul VSM is only available in Web UI While one switch become the Master two rows of buttons for group device will appear on the top of its Web Ul By pressing these buttons user will be allowed to connect the Web UI of the devices of the group in the same window without the login of these devi
122. hes the DB 9 female cable connector to the male serial RS 232 DB 9 connector on the switch 3 Attaches the other end of the serial RS 232 DB 9 cable to PC s serial port running a terminal emulator supporting VT100 ANSI terminal with The switch s serial port default settings For example Windows98SE 2000 XP HyperTerminal utility Note The switch s serial port default settings are listed as follows Baud rate 57600 Stop bits 1 Data bits 8 Parity N Flow control none 4 When you complete the connection then press lt Enter gt key The login prompt will be shown on the screen The default username and password are shown as below Username admin Password admin Publication date May 2005 Revision Al 16 User Manual e Set IP Address Subnet Mask and Default Gateway IP Address Please refer to Fig 2 6 Console Management for details about the ex factory setting They are default setting of IP address You can first either configure your PC IP address or change IP address of the switch next to change the IP address of default gateway and subnet mask For example your network address is 10 1 1 0 and subnet mask is 255 255 255 0 You can change the switch s default IP address 192 168 1 1 to 10 1 1 1 and set the subnet mask to be 255 255 255 0 Then choose your default gateway may be it is 10 1 1 254 i Default Value Bicsw 2494 i Your Network Setting fj IP Address 192 168 1 1 10 1 1 1 Subnet 255 255 255 0 255 2
123. his class B network and of course the last byte is the host number Not all IP address is available in the sub netted network Two special addresses are reserved They are the addresses with all zero s and all one s host number For example an IP address 128 1 2 128 what IP address reserved will be looked like All OS mean the network itself and all 1s mean IP broadcast Network Subnet All 0s 128 1 2 128 0000000 111111111 All Is 128 1 2 255 Publication date May 2005 Revision Al 21 User Manual In this diagram you can see the subnet mask with 25 bit long 255 255 255 128 contains 126 members in the sub netted network Another is that the length of network prefix equals the number of the bit with 1s in that subnet mask With this you can easily count the number of IP addresses matched The following table shows the result INo of Addressable IP INo of Addressable IP Addressable IP af T E E E E e a E O A A l O A g y e E E O A Ay a e ee E nl 16384 16382 16382 a ee Table 2 4 According to the scheme above a subnet mask 255 255 255 0 will partition a network with the class C It means there will have a maximum of 254 effective nodes existed in this sub netted network and is considered a physical network in an autonomous network So it owns a network IP address which may looks like 168 1 2 0 With the subnet mask a bigger network can be cut into small pieces of network If we want to have m
124. iber Port Status Indication LEDs RESET Button RESET button is used to initialize or reset the Power Indication LED management system Fig 1 2 Front View of 24 Gigabit L2 Managed Switch Publication date May 2005 Revision Al User Manual e LED Indicators LED System LED POWER Lit when 5V DC power is on and good CPU LED Blinks when CPU is activity 10 100 1000Ethernet TP Port 1 to 24 LED Lit when connection with remote device is good LINK ACT Green Blinks when any traffic is present Off when cable connection is not good Green Lit green when 1000Mbps speed is active Lit ember when 100Mbps speed is active OEE EET Off when 10Mbps speed is active 1000SX LX Gigabit Fiber Port 23 24 LED Lit when connection with the remote device is good SFP LINK ACT Green Blinks when any traffic is present Off when module connection is not good Table1 1 1 4 2 User Interfaces on the Rear Panel One RS 232 DB 9 interface is offered for configuration or management AC Line 100 240V 50 60 Hz RS 232 DB 9 Connector Fig 1 3 Rear View of GSW 2494 Publication date May 2005 Revision Al User Manual 1 5 View of the Optional Modules In the switch Port 23 24 includes two types of media TP and SFP Fiber LC BiDi LC this port supports 10 100 1000Mbps TP or 1000Mbps SFP Fiber with auto detected function 1000Mbps SFP Fiber transceiver is used for high speed connection expansion nine optional SFP
125. ification Default Class high DiffServ Class DiffServ Class DiffServ Class DiffServ Class 0 high l high 2 high 3 high 4 high 5 high 6 high high 8 high 9 high 10 high 11 high 12 high 13 high 14 high 15 high 16 high 17 high 18 high 19 high 20 high Zil high 22 high 29 high 24 high 25 high 26 high 2i high 28 high 29 high 30 high 31 high 32 high 33 high 34 high 35 high 36 high 37 high 38 high 39 high 40 high Al high 42 high 43 high 44 high 45 high 46 high 4T high 48 high 49 high 50 high 51 high 52 high bo high 54 high 55 high 56 high 57 high 58 high 59 high 60 high 61 high 62 high 63 high Publication date May 2005 Revision Al 166 User Manual E snmp enable Syntax enable snmp enable set ability Description The Enable here is used for the activation snmp or set community Argument None Possible value None Example GSW 2494 snmp enable snmp GSW 2494 snmp enable set ability disable Syntax disable snmp disable set ability Description The Disable here is used for the de activation of snmp or set community Argument None Possible value None Example GSW 2494 snmp disable snmp GSW 2494 snmp disable set ability Publication date May 2005 Revision Al 167 User Manual set Syntax set get community lt community gt set set community lt community gt set trap lt gt lt ip gt port community Description The Set here is used for the setup of get comm
126. igh so High High v Fig 3 20 Publication date May 2005 Revision Al 68 gt I lt User Manual 3 6 SNMP Configuration Any Network Management System NMS running the Simple Network Management Protocol SNMP can manage the Managed devices equipped with SNMP agent provided that the Management Information Base MIB is installed correctly on the managed devices The SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity OID of the management Information Base MIB described in the form of SMI syntax SNMP agent is running on the switch to response the request issued by SNMP manager Basically it is passive except issuing the trap information The switch supports a switch to turn on or off the SNMP agent If you set the field SNMP Enable SNMP agent will be started up All supported MIB OIDs including RMON MIB can be accessed via SNMP manager If the field SNMP is set Disable SNMP agent will be de activated the related Community Name Trap Host IP Address Trap and all MIB counters will be ignored Function name SNMP Configuration Function description This function is used to configur
127. in GSW 2494 S System Detail Counter Port _ Status os Configuration Select Port1 Refresh Interval 3 sec simple Counter Time elapsed since last reset 0 Days 1 Hours 28 Mins 45 Secs Detail Counter Mirror Bandwidth Receive Total Transmit Total sie Rx Packets Tx Packets SNMP Rx Packets Tx Packets 0 IGMP Snooping Rx Octets M Tx Octets 0 Max Packet Length Rx High Priority Packets f Tx High Priority Packets 0 Sai Boot Rx Low Priority Packets i Tx Low Priority Packets o MAC Table Rx Broadcast OBS Broadcast 0 GVRP RX Multicast FTX Multicast 0 gi k Receive Size Counters Transmit Size Counters run 802 1X Rx 64 Bytes OURS Bytes 0 Alarm RX 65 127 Bytes ITX 65 127 Bytes 0 eae Rx 128 255 Bytes ii Tx 128 255 Bytes o Te aris TFTP Server Rx 256 511 Bytes ii tx 256 511 Bytes 0 Log Rx 512 1023 Bytes fTx 512 1023 Bytes 0 Firmware Upgrade Rx 1024 Bytes Gf Tx 1024 Bytes o aeei Receive Error Counters Transmit Error Counters Rx CRC Aligment Ob Collisions 0 Tx Drops o a Fig 3 11 Function name Detail Counter Function description Display the detailed counting number of each port s traffic In the Fig 3 11 the window can show all counter information of each port at one time Parameter description Rx Packets The counting number of the packet received RX Octets Total received bytes Rx High Priority Packets Number of Rx packets classified as high priority Publication date May 2005 Revision Al
128. ing function Supports 802 1p Class of Service with 2 level priority queuing Supports 802 3ad port trunking with flexible load distribution and failover function Supports ingress port security mode for VLAN Tagged and Untagged frame process Supports SNMP MIB2 and RMON sampling with sampled packet error indication Publication date May 2005 Revision Al 218 User Manual Hardware Specifications Standard Compliance IEEE802 3 802 3ab 802 3z 802 3u 802 3x Network Interface Configuration Mode _ Port 10 100 1000Mbps Gigabit TP NWay TP RJ 45 1 24 1000Base SX Gigabit Fiber 1000 FDX SFP_ 23 24 Option 1000Base LX Gigabit Fiber 1000 FDX SFP_ 23 24 Option 1000Base LX Single Fiber WDM BiDi 1000 FDX _ sFP _ 23 24 Option Port 23 24 are TP SFP fiber dual media ports with auto detected function Optional SFP module supports LC or BiDi LC transceiver Transmission Mode 10 100Mbps support full or half duplex 1000Mbps support full duplex only Transmission Speed 10 100 1000Mbps for TP 1000Mbps for Fiber Full Forwarding Filtering Packet Rate PPS packets per second Forwarding Rate il Speed i 1 488 000PPS 1000Mbps 148 800PPS 100Mbps 14 880PPS 10Mbps MAC Address and Self learning 8K MAC address 4K VLAN table entries Buffer Memory Embedded 400 KB frame buffer Flow Control IEEE802 3x compliant for full duplex Backpressure flow control for half
129. ion Name A name is composed of any letter A Z a z and digit 0 9 with maximal 8 characters VID The switch supports two kinds of options for managed valid VLAN VID including Any and Custom Default is Any When you choose Custom you can fill in VID number The valid VID range is 1 4094 Publication date May 2005 Revision Al 40 User Manual IP Range The switch supports two kinds of options for managed valid IP Range including Any and Custom Default is Any In case that Custom had been chosen you can assigned effective IP range The valid range is 0 0 0 0 255 255 255 255 Incoming Port The switch supports two kinds of options for managed valid Port Range including Any and Custom Default is Any You can select the ports that you would like them to be worked and restricted in the management security configuration if Custom had been chosen Access Type The switch supports two kinds of options for managed valid Access Type including Any and Custom Default is Any Http Telnet and SNMP are three ways for the access and managing the switch in case that Custom had been chosen Action The switch supports two kinds of options for managed valid Action Type including Deny and Accept Default is Deny When you choose Deny action you will be restricted and refused to manage t
130. ion STP State Show the current STP Enabled Disabled status Default is Disabled Bridge ID Show switch s bridge ID which stands for the MAC address of this switch Bridge Priority Show this switch s current bridge priority setting Default is 32768 Designated Root Show root bridge ID of this network segment If this switch is a root bridge the Designated Root will show this switch s bridge ID Designated Priority Show the current root bridge priority Root Port Show port number connected to root bridge with the lowest path cost Root Path Cost Show the path cost between the root port and the designated port of the root bridge Current Max Age Show the current root bridge maximum age time Maximum age time is used to monitor if STP topology needs to change When a bridge does not receive a hello message from root bridge until the maximum age time is counted down to 0 the bridge will treat the root bridge malfunctioned and issue a Topology Change Notification TCN BPDU to all other bridges Publication date May 2005 Revision Al 97 User Manual All bridges in the LAN will re learn and determine which the root bridge is Maximum Age time is assigned by root bridge in unit of seconds Default is 20 seconds Current Forward Delay Show the current root bridge forward delay time The value of Forward Delay time is set by root The Forward Delay time is defined as the time spent from List
131. ion To set default applicant mode for each port Argument range port range normal set applicant as normal mode non participant set applicant as non participant mode Possible value lt range gt syntax 1 5 7 available from 1 to 24 lt normal non participant gt normal or non participant Example GSW 2494 gvrp set applicant 1 10 non participant set registrar Syntax set registrar lt range gt lt normallfixed forbidden gt Description To set default registrar mode for each port Argument range port range normal set registrar as normal mode fixed set registrar as fixed mode forbidden set registrar as forbidden mode Possible value lt range gt syntax 1 5 7 available from 1 to 24 lt normal fixed forbidden gt normal or fixed or forbidden Example GSW 2494 gvrp set registrar 1 5 fixed show counter Syntax show counter Description Usage show counter lt port gt Argument lt port gt port number Possible value lt port gt available from 1 to 24 Publication date May 2005 Revision Al 184 User Manual Example GSW 2494 evrp show counter 2 GVRP Counter port 2 Counter Name Received Transmitted Total GVRP Packets Invalid GVRP Packets LeaveAll message 0 0 0 JoinEmpty message 0 JoinIn message 0 LeaveEmpty message 0 Empty message 0 show config Syntax show config Description To display the gvrp configuration Argument none Possible value none
132. ion Al User Manual Appendix A Technical Specifications Features 22 10 100 1000Mbps Gigabit Ethernet TP switching ports are compliant with IEEE802 3 802 3u 802 3z and 802 3ab 2 Gigabit TP SFP fiber are dual media ports with auto detected function Non blocking store and forward shared memory Web Smart switched Supports auto negotiation for configuring speed duplex mode Supports 802 3x flow control for full duplex ports Supports collision based and carrier based backpressure for half duplex ports Any ports can be in disable mode force mode or auto polling mode Supports Head of Line HOL blocking prevention Supports broadcast storm filtering Auto aging with programmable inter age time Supports 802 1p Class of Service with 2 level priority queuing Supports port sniffer function Programmable maximum Ethernet frame length of range from 1518 to 9216 bytes jumbo frame Supports port based VLAN 802 1Q tag based VLAN Efficient self learning and address recognition mechanism enables forwarding rate at wire speed Web based management provides the ability to completely manage the switch from any web browser SNMP Telnet interface delivers complete in band management Supports IEEE 802 1d Spanning Tree Protocol Supports IEEE 802 1w Rapid Spanning Trees Supports IEEE 802 1x port based network access control Supports IEEE 802 1v protocol based VLAN classification Supports IP Multicasting to implement IGMP Snoop
133. irror Only mirror the packets that is received disable End the function of mirror Possible value None Example GSW 2494 mirror set mirror mode rx GSW 2494 mirror set monitoring port Syntax set monitoring port lt gt Description To set up the monitoring port of the mirror function User can observe the packets that the monitored port received via this port Argument lt gt the monitoring port that is chosen for the mirror function Only one port is allowed to configure Possible value None Example GSW 2494 mirror set monitoring port 2 GSW 2494 mirror set monitored port Syntax set monitored port lt range gt Description To set up the port that will be monitored The packets received by this port will be copied to the monitoring port Argument lt range gt the port that is chosen for monitored port of the mirror function Possible value None Example GSW 2494 mirror set monitored port 3 5 8 10 GSW 2494 mirror Publication date May 2005 Revision Al 158 show Syntax Show Description To display the setting status of Mirror function Argument None Possible value None Example GSW 2494 mirror show Mirror Mode rx Monitoring Port 2 Monitored Port 345 7 10 GSW 2494 mirror 159 User Manual Publication date May 2005 Revision Al User Manual bandwidth enable ingress rate Syntax enable ingress rate lt range gt lt data_rate gt
134. itch supports 3 parameters for each port They are state mode and flow control Parameter description State Set the communication capability of the port is Enabled or Disabled When enabled traffic can be transmitted and received via this port When disabled the port is blocked and no traffic can be transferred through this port Port State is configurable by the user There are only two states Enable and Disable able to choose If you set a port s state Disable then that port is prohibited to pass any traffic even it looks Link up Default Enable Publication date May 2005 Revision Al 49 User Manual Mode Set the speed and duplex of the port In speed if the media is 1Gbps fiber it is always 1000Mbps and the duplex is full only If the media is TP the Speed Duplex is comprised of the combination of speed mode 10 100 1000Mbps and duplex mode full duplex and half duplex The following table summarized the function the media supports Media type NWay Speed Duplex 1000M TP ON OFF 10 100 1000M _ Full for all Half for 10 100 1000M Fiber ON OFF 1000M In Auto negotiation mode no default value In Forced mode default value depends on your setting Flow Control There are two modes to choose in flow control including Enable and Disable If flow control is set Enable both parties can send PAUSE frame to the transmitting device s if the receiving port is too busy to handle Wh
135. ive Le ais 18 None 0 Active 18 Sor 19 None 0 Active 19 as 20 None 0 Active 20 ae 21 None 0 Active 21 SaR 22 None 0 Active De Se Zo None 0 Active 23 ae 24 None 0 Active 24 DE GSW 2494 trunk Publication date May 2005 Revision Al 192 User Manual show aggtr view Syntax show aggtr view Description To display the aggregator list Argument None Possible value None Example GSW 2494 trunk show aggtr view Aggregator 1 Method None Member Ports 1 Ready Ports 1 Aggregator 2 Method LACP Member Ports 2 Ready Ports show lacp detail Syntax show lacp detail lt aggtr gt Description To display the detailed information of the LACP trunk group Argument lt aggtr gt available from 1 to 24 Possible value None Example GSW 2494 trunk show lacp detail 2 Aggregator 2 Information Actor Partner 32768 00 11 6B e8 00 02 32768 00 00 00 00 00 00 Port Key Trunk Status Port Key 2 257 ar 2 0 GSW 2494 trunk Publication date May 2005 Revision Al 193 User Manual Show lacp priority Syntax show lacp priority Description To display the value of LACP Priority Argument None Possible value None Example GSW 2494 trunk show lacp priority LACP System Priority 32768 GSW 2494 trunk Publication date May 2005 Revision Al 194 User Manual 802 1x set state Syntax set state lt ip gt lt port number gt lt secret key gt Des
136. k Test and Ping Test are contained in this function folder for device self diagnostics Each of them will be described in detail orderly in the following sections Diagnostics Diagnostics Loopback Test Ping Test Function name Diagnostics Function description Diagnostics function provides a set of basic system diagnosis It let users know that whether the system is health or needs to be fixed The basic system check includes EEPROM test UART test DRAM test and Flash test Auto Logout 3 min GSW 2494 System Diagnostics Port Mirror Bandwidth OK Se ok SNMP IGMP Snooping OK Max Packet Length OK DHCP Boot VLAN MAC Table Run GVRP STP Trunk 802 1X Alarm Configuration Diagnostics Di can iak Ping Test TFTP Server Log Firmware Upgrade Reboot Logout Publication date May 2005 Revision Al 128 User Manual Function name Loopback Test Function description In the Loopback Test function there are two different loopback tests One is Internal Loopback Test and the other is External Loopback Test The former test function will not send the test signal outside the switch box The test signal only wraps around in the switch box As to the latter test function it will send the test signal to its link partner If you do not have them connected to active network devices i e the ports are link down the switch will report the port numbers failed If they all are ok it just shows OK
137. le DHCP and set dns auto or manual disable dhcp Disable DHCP show Show IP Configuration Se ee lt lt Global comands exit Back to the previous mode end Back to the top mode help Show available commands history Show a list of previously run commands logout Logout the system save start Save as start config Save user Save as user config restore default Restore default config restore user Restore user config GSW 2494 ip Publication date May 2005 Revision Al 141 User Manual history Syntax history Description To show a list of previous commands that you had ever run When you enter this command the CLI would show a list of commands which you had typed before The CLI supports up to 256 records If no argument is typed the CLI would list total records up to 256 If optional argument is given the CLI would only show the last numbers of records given by the argument Argument show last number of history records optional Possible value 1 2 3 256 Example GSW 2494 ip history Command history 0 trunk l exit 2 GSW 2494 trunk 3 GSW 2494 trunk exit 4 GSW 24944 Of 6 trunk T exit 8 alarm 9 events 10 end Il ip 12 help 13 ip 14 history GSW 2494 ip history 3 Command history Ix ip 14 history 15 history 3 GSW 2494 ip Publication date May 2005 Revision Al 142 User Manual logout Syntax logout D
138. le Disable seh to guit 29 1 Disable Disable 24 1 Disable Disable GSW 2494 vlan Access Access Access Access Hybrid Access Access Access Access Access Access Access Access Access Access Access Access Access Access Access Access Access Access Access 77 Publication date May 2005 Revision Al User Manual mac table lt lt information gt gt show Syntax Show Description To display all mac table information Argument None Possible value None Example GSW 2494 mac table information show MAC Table List Alias MAC Address Port VID State GSW 2494 mac table information search Syntax search lt port gt lt mac gt lt vid gt Description To look for the relative mac information in mac table Argument lt port gt set up the range of the ports to search for syntax 1 5 7 available form 1 to 24 lt mac gt mac address format 01 02 03 04 05 06 can be used lt vid gt vid vlan id from 1 to 4094 as don t care 0 as untagged Possible value None Example GSW 2494 mac table information search 1 24 9 2 22 29 22 9 MAC Table List Alias MAC Address Port VID State 00 11 6B 88 00 06 1 0 Dynamic GSW 2494 mac table information Publication date May 2005 Revision Al 178 User Manual lt lt maintain gt gt set aging Syntax set aging lt gt Description To set up the age out time of dynamic learning mac Argument lt gt
139. lication Parameter description Radius Server RADIUS server IP address for authentication Default 192 168 1 1 Port Number The port number to communicate with RADIUS server for the authentication service The valid value ranges 1 65535 Default port number is 1812 Secret Key The secret key between authentication server and authenticator It is a string with the length 1 31 characters The character string may contain upper case lower case and 0 9 It is character sense It is not allowed for putting a blank between any two characters Default Radius Auto Logout 3 min System 802 1X State Setting Port Mirror Bandwidth 192 168 1 1 or Port Number 165595 EE SNMP 2 IGMP Snooping Radius Max Packet Length DHCP Boot VLAN MAC Table GVRP STP Trunk 802 1X Wy Mo Security Alarm Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 52 Publication date May 2005 Revision Al 116 User Manual Function name 802 1x Mode Setting Function description Set the operation mode of 802 1X for each port In this device it supports only Multi host operation mode Parameter description Port Number Indicate which port is selected to configure the 802 1x operation mode 802 1x Mode 802 1x operation mode There are two options including Disable and Multi host mode Default is Disable Disable It will have the chosen port acting as a pl
140. lti mode 50 125um 1000SX 850nm Bandwidth Bandwidth 460MHz Km 400MHz Km 500m Single mode Fiber 9 125um 1000Base LX LHX XD ZX Single mode transceiver 1310nm 10Km ed Single mode transceiver 1550nm 30 50Km Fe Single Mode TX Transmit 1310nm EE hier 20Km RX Receive 1550nm Single Fiber 1101ER 0 Single Mode TX Transmit 1550nm a l 20Km RX Receive 1310nm Table2 1 Publication date May 2005 Revision Al lI User Manual 2 1 2 3 Switch Cascading in Topology e Takes the Delay Time into Account Theoretically the switch partitions the collision domain for each port in switch cascading that you may up link the switches unlimitedly In practice the network extension cascading levels amp overall diameter must follow the constraint of the IEEE 802 3 802 3u 802 3z and other 802 1 series protocol specifications in which the limitations are the timing requirement from physical signals defined by 802 3 series specification of Media Access Control MAC and PHY and timer from some OSI layer 2 protocols such as 802 1d 802 1q LACP and so on The fiber TP cables and devices bit time delay round trip are as follows 4000Base X TP Fiber 100Base TX TP 100Base FX Fiber Cat 5 TP Wire 11 12 m Cat 5 TP Wire 1 12 m Fiber Cable Fiber Cable 10 10 m TP to fiber Converter 56 Bit Time unit 1ns 1sec 1000 Mega bit Bit Time unit 0 01us 1sec 100 Mega bit Table 2 2 Sum up all elements
141. lue None Example GSW 2494 stp enable disable Syntax disable Description To disable the STP function Argument None Possible value None Example GSW 2494 stp disable set config Syntax set config lt Bridge Priority gt lt Hello Time gt lt Max Age gt lt Forward Delay gt Description To set up the parameters of STP Argument lt Bridge Priority gt Priority must be a multiple of 4096 available from 0 to 61440 lt Hello Time gt available from 1 to 10 lt Max Age gt available from 6 to 40 lt Forward Delay gt available from 4 to 30 Possible value lt Bridge Priority gt 0 to 61440 lt Hello Time gt 1 to 10 lt Max Age gt 6 to 40 lt Forward Delay gt 4 to 30 Example GSW 2494 stp set config 61440 2 20 15 Publication date May 2005 Revision Al 187 User Manual set version Syntax set version lt stp rstp gt Description To set up the version of STP Argument lt stp rstp gt stp rstp Possible value lt stp rstp gt stp rstp Example GSW 2494 stp set version rstp set port Syntax set port lt range gt lt path cost gt lt priority gt lt edge_port gt lt admin p2p gt Description To set up the port information of STP Argument lt range gt syntax 1 5 7 available from 1 to 24 lt path cost gt 0 1 200000000 The value zero means auto status lt priority gt priority must be a multiple of 16 available from
142. m illegal user as you are leaving If you do not choose any selection in Auto Logout list it means you turn on the Auto Logout function and the system will be logged out automatically when no action on the device 3 minutes later If OFF is chosen the screen will keep as it is Default is ON On the left side the main menu tree for web is listed in the page They are hierarchical menu Open the function folder a sub menu will be shown The functions of each folder are described in its corresponded section respectively When clicking it the function is performed The following list is the full function tree for web user interface Publication date May 2005 Revision Al 28 System Mirror oS IGMP Snooping DHCP Boot MAC Table o y T 802 1x Configuration TFTP Server Firmware Upgrade Logout 29 User Manual U O Bandwidth SNMP Max Packet Length VLAN GVRP Trunk Alarm Diagnostics Lo Q Reboot Publication date May 2005 Revision Al User Manual 3 1 1 System Information Function name System Information Function description Show the basic system information Parameter description Model name The model name of this device System description As it is this tells what this device is Here it is L2 Managed Switch Location Basically it is the location where this switch is put User defined Contact For easily managing and maintaining device
143. ment None Possible value None Example GSW 2494 stp GSW 2494 stp show port Port Port Status Path Cost Priority Admin Edge Port Admin Point To Point 1 DISCARDING 2000000 128 No Auto 2 DISCARDING 2000000 128 No Auto 3 DISCARDING 2000000 128 No Auto 4 DISCARDING 2000000 128 No Auto D DISCARDING 2000000 128 No Auto 6 DISCARDING 2000000 128 No Auto T DISCARDING 2000000 128 No Auto 8 DISCARDING 2000000 128 No Auto 9 DISCARDING 2000000 128 No Auto 10 DISCARDING 2000000 128 No Auto 11 DISCARDING 2000000 128 No Auto 12 DISCARDING 2000000 128 No Auto 13 DISCARDING 2000000 128 No Auto 14 DISCARDING 2000000 128 No Auto 15 DISCARDING 2000000 128 No Auto 16 DISCARDING 2000000 128 No Auto 17 DISCARDING 2000000 128 No Auto 18 DISCARDING 2000000 128 No Auto 19 DISCARDING 2000000 128 No Auto 20 DISCARDING 2000000 128 No Auto 21 DISCARDING 2000000 128 No Auto 22 DISCARDING 2000000 128 No Auto zsa J EO qguit 23 DISCARDING 2000000 128 No Auto 24 DISCARDING 2000000 128 No Auto Publication date May 2005 Revision Al 190 User Manual trunk set priority Syntax set priority lt range gt Description To set up the LACP system priority Argument lt range gt available from 1 to 65535 Possible value 32768 Example GSW 2494 trunk set priority 33333 GSW 2494 trunk set trunk Syntax set trunk lt port range gt lt method gt lt group gt lt active LACP gt Description To set up the
144. mode mac table mode qvrp mode stp mode trunk mode 802 1x mode Fig 4 3 Publication date May 2005 Revision Al 139 User Manual 4 2 1 Global Commands of CLI exit Syntax exit Description Back to the previous mode When you enter this command your current position would move back to the previous mode If you use this command in the top mode you are still in the position of the top mode Argument None Possible value None Example GSW 2494 trunk GSW 2494 trunk exit GSW 2494 end Syntax end Description Back to the top mode When you enter this command your current position would move to the top mode If you use this command in the top mode you are still in the position of the top mode Argument None Possible value None Example GSW 2494 alarm GSW 2494 alarm events GSW 2494 alarm events end GSW 2494 Publication date May 2005 Revision Al 140 User Manual help Syntax help Description To show available commands Some commands are the combination of more than two words When you enter this command the CLI would show the complete commands Besides the command would help you classify the commands between the local commands and the global ones Argument None Possible value None Example GSW 2494 ip GSW 2494 ip help Commands available set ip Set ip subnet mask and gateway set dns Set dns enable dhcp Enab
145. n The Trap Events Configuration function is used to enable the switch to send out the trap information while pre defined trap events occurred The switch offers 24 different trap events to users for switch management The trap information can be sent out in three ways including email mobile phone SMS short message system and trap The message will be sent while users tick M1 the trap event individually on the web page shown as below Parameter description These trap functions are as they describe The special one is Module Swap It means that when the switch detects a module with the different module ID to be inserted the switch treats it as Module swapped The traps that the switch supports are listed below STP STP Topology Change STP Disabled STP Enabled LACP LACP Disabled LACP Enabled LACP Member Added LACP Port Failure GVRP GVRP Disabled GVRP Enabled VLAN VLAN Disabled Port based VLAN Enable Tag based VLAN Enable Metro mode Vlan Enabled Double tag Vian Enabled Module Swap SEP Inserted SEP Removed Dual media Swapped Trap Cold Start Warm Start Link Down Link Up Authentication Failure User login User logout Publication date May 2005 Revision Al 121 User Manual Auto Logout 3 min System Trap Events Configuration Port Mirror Saniah Email Select Unselect All C1 Qos SMS Select Unselect All C SNMP Trap Select Unselect All C IGMP Snooping E E a Max Packet Length
146. n of Remote Network Monitoring and is a branch of the SNMP MIB The device supports MIB 2 RFC 1213 Bridge MIB RFC 1493 RMON MIB RFC 1757 statistics Group 1 2 3 9 VLAN MIB 802 1Q RFC2674 Ethernet MIB RFC 1643 and so on IGMP Snooping Support IGMP version 2 RFC 2236 The function IGMP snooping is used to establish the multicast groups to forward the multicast packet to the member ports and in nature avoid wasting the bandwidth while IP multicast packets are running over the network Publication date May 2005 Revision Al User Manual 1 2 Checklist Before you start installing the switch verify that the package contains the following A GSW 2494 Gigabit L2 Managed Switch Mounting Accessory for 19 Rack Shelf This User s Manual in CD ROM AC Power Cord RS 232 Cable Please notify your sales representative immediately if any of the aforementioned items is missing or damaged 1 3 Features GSW 2494 a standalone off the shelf switch provides the comprehensive features listed below for users to perform system network administration and efficiently and securely serve your network e Hardware 22 10 100 1000Mbps Auto negotiation Gigabit Ethernet TP ports e 2 10 100 1000Mbps TP or 1000Mbps SFP Fiber dual media auto sense e 400KB on chip frame buffer e Jumbo frame support e Programmable classifier for QoS Layer 4 Multimedia e 8K MAC address and 4K VLAN support IEEE802 1Q e
147. nly allowed to view the system without the permission to do any setting for this switch Publication date May 2005 Revision Al 137 User Manual L2 Managed Switch GSvVWw2494 Fig 4 1 Fig 4 2 Publication date May 2005 Revision Al 138 User Manual 4 2 Commands of CLI To see the commands of the mode please input after the prompt then all commands will be listed in the screen All commands can be divided into two categories including global commands and local commands Global commands can be used wherever the mode you are They are exit end help history logout save start save user restore default and restore user For more details please refer to Section 4 2 1 Command instructions reside in the corresponding modes are local commands The same command with the same command name may occur but perform totally different function in different modes For example show in IP mode performs displaying the IP information however it performs displaying the system information in system mode For more details please refer to Section 4 2 2 system ip time account port mirror bandwidth qos snmp max pkt len igmp dhep boot vlan mac table gvrp stp trunk OUTE system mode ip mode time mode account mode port mode mirror mode bandwidth mode qos mode snmp mode max packet length mode igmp mode dhep boot mode vlan
148. o the result of authentication message exchanged between it and a supplicant PAE The authenticator may request the supplicant to re authenticate itself at a configured time period Once start re authenticating the supplicant the controlled port keeps in the authorized state until re authentication fails A port acting as an authenticator is thought to be two logical ports a controlled port and an uncontrolled port A controlled port can only pass the packets when the authenticator PAE is authorized and otherwise an uncontrolled port will unconditionally pass the packets with PAE group MAC address which has the value of 01 80 c2 00 00 03 and will not be forwarded by MAC bridge at any time Authentication server A device provides authentication service through EAP to an authenticator by using authentication credentials supplied by the supplicant to determine if the supplicant is authorized to access the network resource Publication date May 2005 Revision Al II User Manual The overview of operation flow for the Fig 3 49 is quite simple When Supplicant PAE issues a request to Authenticator PAE Authenticator and Supplicant exchanges authentication message Then Authenticator passes the request to RADIUS server to verify Finally RADIUS server replies if the request is granted or denied While in the authentication process the message packets encapsulated by Extensible Authentication Protocol over LAN EAPOL are exchan
149. ocation Contact Device Name System Up Time Current Time BIOS Version Firmware Version Hardware Mechanical Version Series Number Host IP Address Host MAC Address Device Port 2 RAM Size Flash Size set location Syntax set location lt location string gt Description GSW 2494 L2 Managed Switch gt GSW 2494 0 Days 1 Hours 19 Mins 17 Secs Fri Nov 13 01 26 11 2004 vl 00 v0 95 vl 00 v1 00 123456789012 192 168 1 1 00 11 6B e7 00 04 UART 1 TP 22 Dual Media Port RJ45 SFP 16 M 2M To set the location description of the switch Argument String length up to 32 characters Possible value A b c d z and 1 2 3 etc Example GSW 2494 system set location Taipei Publication date May 2005 Revision Al 146 User Manual set contact Syntax set contact lt contact string gt Description To set the contact description of the switch Argument String length up to 32 characters Possible value A b c d z and 1 2 3 etc Example GSW 2494 system set contact Taipei set device name Syntax set device name lt string gt Description To set the device name description of the switch Argument String length up to 32 characters Possible value A b c d z and 1 2 3 etc Example GSW 2494 system set device name CR 2600 Publication date May 2005 Revision Al 147 User
150. of DHCP Boot Argument None Possible value None Example GSW 2494 DHCP BOOT SHOW DHCP BOOT ENABLE Second 10 Publication date May 2005 Revision Al User Manual m vlan set mode Syntax set mode lt disable port tag metro double tag gt up link Description To switch VLAN mode including disable port based tag based metro and double tag modes Argument disable vlan disable tag set tag based vlan port set port based vlan metro set metro mode vlan double tag enable Q in Q function up link syntax 1 5 7 available from 23 to 24 only for metro mode vlan Possible value lt disable port tag metro double tag gt disable port tag metro double tag up link 23 or 24 or 23 24 Example GSW 2494 vlan set mode metro 23 24 set tag group Syntax set tag group lt vid gt lt name gt lt range gt lt gt Description To add or edit the tag based vlan group Argument vid vlan ID name vlan name range vlan group members syntax 1 5 7 sym asym vlan setting 1 symmetric vlan 0 asymmetric vlan Possible value vid range from 1 to 4094 name tag vian name range from 1 to 24 0 1 Example GSW 2494 vlan set tag group 2 VLAN 2 2 5 6 15 13 0 Publication date May 2005 Revision Al 172 User Manual set port group Syntax set port group lt name gt lt range gt Description To add or edit a port based VLAN group Argument name vlan name
151. og Upload log data through tftp Clear Log Clear log data Publication date May 2005 Revision Al 133 User Manual 3 21 Firmware Upgrade Software upgrade tool is used to help upgrade the software function in order to fix or improve the function The switch provides a TFTP client for software upgrade This can be done through Ethernet Function name Firmware Upgrade Function description The switch supports TFTP upgrade tool for upgrading software If you assure to upgrade software to a newer version one you must follow two procedures 1 Specifying the IP address where TFTP server locates In this field the IP address of your TF TP server should be filled in 2 Specifying what the filename and where the file is You must specify full path and filename Once you press lt Upgrade gt button the switch will prompt the screen for you to reconfirm Then the switch starts downloading software from TFTP server if you choose lt OK gt button It will be just back to Software Upgrade if you choose lt Cancel gt button If your download is not successful the switch will also be back to Software Upgrade and it will not upgrade the software as well When download is completed the switch starts upgrading software A reboot message will be prompted after completing upgrading software At this time you must reboot the switch to have new software worked Note Software upgrade is hazardous if power is off
152. og events When any of log events happens it will be recorded and using show command in log function to query Up to 120 log records are supported Argument None Possible value None Example GSW 2494 log show Tftp Server 0 0 0 0 Auto Upload Disable 1 Wed Apr 13 12 13 27 2005 Link Up Port 1 2 Wed Apr 13 12 13 26 2005 Link Down Port 1 3 Wed Apr 13 11 58 31 2005 Login admin 4 Wed Apr 13 11 19 45 2005 Login admin 5 Wed Apr 13 11 19 37 2005 Logout admin clear Syntax clear Description To clear the log data Argument None Possible value None Example GSW 2494 log clear Publication date May 2005 Revision Al 209 User Manual upload Syntax Upload Description To upload log data through tftp Argument None Possible value None Example GSW 2494 log upload enable auto upload Syntax enable auto upload Description To enable the auto upload function Argument None Possible value None Example GSW 2494 log enable auto upload disable auto upload Syntax disable auto upload Description To disable the auto upload function Argument None Possible value None Example GSW 2494 log disable auto upload Publication date May 2005 Revision Al 210 firmware set upgrade path Syntax set upgrade path lt filepath gt Description To set up the image file that will be upgraded Argument lt filepa
153. onnected is in the unauthorized state the supplicant and the devices connected to this port won t be allowed to access the network When the supplicant issue an EAP Logoff message to Authentication server the port you are using is set to be unauthorized Port connect EAPOL Start EAPOL EAP Request Identity EAP Response Identity EAP Response cred AP Logoff I A
154. ore than two independent networks in a worknet a partition to the network must be performed In this case subnet mask must be applied Publication date May 2005 Revision Al 22 User Manual For different network applications the subnet mask may look like 255 255 255 240 This means it is a small network accommodating a maximum of 15 nodes in the network Default gateway For the routed packet if the destination is not in the routing table all the traffic is put into the device with the designated IP address known as default router Basically it is a routing policy For assigning an IP address to the switch you just have to check what the IP address of the network will be connected with the switch Use the same network address and append your host address to it Q x 2 2 FEE 3s O ople Edt viam Favores Tooke Help Fd evel on S e Auto Logout 3min GSW 2494 IP Configuration Syslew System Information p Account 192 168 41 24 Management Policy Virtual Stack SUI 255 255 255 0 Mirror Qos SNMP IGMP Snooping Apply Max Packet Length DHCP Boot VLAN MAC Table GVRP STP Trunk 802 1x Alarm Canfigurati Diagnast TEIP Serv Log Firmware Upgrade Logout Fig 2 11 First IP Address as shown in the Fig 2 11 enter 192 168 1 1 for instance For sure an IP address such as 192 168 1 x must be set on your PC Second Subnet Mask as shown in the Fig 2 11 enter 25
155. out 3 min GSW 2494 System Trunk Port Setting Status Port Mirror Bandwidth Trunk Port Setting Trunk Port Status Qos por Method crown active tach rate status SNMP 1 None ov v Active B5 1 IGMP Snooping EH Max Packet Length EN None 0 Active Y 2 nis DHCP Boot None lov Active 3 Ready MAC Table None OY Active y 4 e GYRP BEM none v ov Active v 5 P 7 r r z i aian Bs None LO v Active Y 6 Port None lovy Active v 7 Aggregator View E pEr al aor N v i v LACP System Priority EE ste o Active B 802 1X E None Y lov Active Y 9 Alarm None lov Active v 10 Configuration r Diagnostics None om Active Y 1i TFTP Server None v lo v Active y v 12 Log m Firmware Upgrade None x a i Active 2 13 Reboot None 0 w Active 14 iii None lo Active v 15 None ov Active Y 16 Epal Ninne v In 7v rtive v 17 ws Fig 3 45 Publication date May 2005 Revision Al 107 User Manual Function name Aggregator View Function description To display the current port trunking information from the aggregator point of view Parameter description Aggregator It shows the aggregator ID from 1 to 24 of every port In fact every port is also an aggregator and its own aggregator ID is th
156. r C may fail to work Please check the link act status of Computer C on the LED indicator Try another network device on this connection v The network configuration of Computer C may be something wrong Please verify the network configuration on Computer C 2 The uplink connection function fails to work v The connection ports on another must be connection ports Please check if connection ports are used on that Managed Switch v Please check the uplink setup of the Managed Switch to verify the uplink function is enabled 3 The console interface cannot appear on the console port connection v The COM port default parameters are Baud Rate 57600 Data Bits 8 Parity Bits None Stop Bit A Flow Control None Please check the COM port property in the terminal program And if the parameters are changed please set the COM configuration to the new setting v Check the RS 232 cable is connected well on the console port of the Managed Switch and COM port of PC v Check if the COM of the PC is enabled 4 How to configure the Managed Switch v The Hyperterm is the terminal program in Win95 98 NT Users can also use any other terminal programs in Linux Unix to configure the Managed Switch Please refer to the user guide of that terminal program But the COM port parameters baud rate data bits parity bits flow control must be the same as the setting of the console port of the Managed Switch Publication date May 2005 Revis
157. reased one hour after one minute at the time since it passed over And when the time passes over the ending time the system time will be decreased one hour after one minute at the time since it passed over The switch supports valid configurable day light saving time is 5 5 step one hour The zero for this parameter means it need not have to adjust current time equivalent to in act daylight saving You don t have to set the starting ending date as well If you set daylight saving to be non zero you have to set the starting ending date as well otherwise the daylight saving function will not be activated Default for Daylight Saving 0 The following parameters are configurable for the function Daylight Saving and described in detail Day Light Saving Start This is used to set when to start performing the day light saving time Mth Range is 1 12 Default 1 Day Range is 1 31 Default 1 Hour Range is 0 23 Default 0 Publication date May 2005 Revision Al 36 User Manual Day Light Saving End This is used to set when to stop performing the daylight saving time Mth Range is 1 12 Default 1 Day Range is 1 31 Default 1 Hour Range is 0 23 Default O evel one Auto Logout 3 min _ GSW 2494 A i System System Time Setting _ System Information E IP F Tim CG Tue Mar 23 02 34 27 2005 Accuint Port ns Mirat Year 2005 _ 2000
158. ress There are three MAC alias functions in this function folder including MAC Alias Add MAC Alias Edit and MAC Alias Delete You can click lt Create Edit gt button to add modify a new or an existed alias name for a specified MAC address or mark an existed entry to delete it Alias name must be composed of A Z a z and 0 9 only and has a maximal length of 15 characters Function name MAC Alias Create Edit or Delete Function description In the MAC Alias function MAC Alias Add Edit function is used to let you add or modify an association between MAC address and a plain English name User can click lt Create Edit gt button to add a new record with name As to MAC Alias Delete function is used to let you remove an alias name to a MAC address You can select an existed MAC address or alias name to remove level SIRs AAOS pi 1 Hi one 3 Auto Logout 3 min vv GSW 2494 System MAC Alias Port Mirror Bandwidth MAC Address i QoS oo 40 c7 D6 o0 o1 asc SNMP IGMP Snooping Max Packet Length ES Oe DHCP Boot VLAN nAi Po mac address alias Information Maintenance Static Forward Static Filter MAC Alias GVRP Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 38 Publication date May 2005 Revision Al 8 amp 9 User Manual Parameter description MAC Address It is a six byte long Ethernet hardware address and usually expressed by hex and separated by
159. rk manager will not be able to manage or view the device The switch supports both manual IP address setting and automatic IP address setting via DHCP server When IP address is changed you must reboot the switch to have the setting taken effect and use the new IP to browse for web management and CLI management level on e R Auto Logout 3 min GSW 2494 System System Information I i e DHCP Setting Disable Account IP Address 192 168 1 1 Port a Siete Mirror Subnet Mask 255 255 255 0 Bandwidth e 192 168 1 253 k Qos cetera SNMP DNS Server IGMP Snooping Max Packet Length DHCP Boot VLAN MAC Table GVRP STP Trunk 802 1X Alarm Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 4 IP Address Configuration Function name IP Configuration Function description Set IP address subnet mask default gateway and DNS for the switch Parameter description DHCP Setting DHCP is the abbreviation of Dynamic Host Configuration Protocol Here DHCP means a switch to turn ON or OFF the function The switch supports DHCP client used to get an IP address automatically if you set this function Enable When enabled the switch will issue the request to the DHCP server resided in the network to get an IP address lf DHCP server is down or does not exist the switch will issue the request and show IP address is under requesting until the DHCP server is up Before ge
160. role 5 hybrid 6 enable sym vlan lt range gt Syntax enable sym vlan lt range gt Description To drop frames from the non member port Argument range which port s you want to set Syntax 1 5 7 Possible value range available from 1 to 24 Example GSW 2494 vlan enable sym vian 5 10 Publication date May 2005 Revision Al 174 User Manual disable sym vlan Syntax disable sym vlan lt range gt Description To drop frames from the non member port Argument range which port s you want to set Possible value range available from 1 to 24 Example GSW 2494 vlan disable sym vlian 5 10 enable drop untag Syntax enable drop untag lt range gt Description To drop the untagged frames Argument range which port s you want to set Possible value range available from 1 to 24 Example GSW 2494 vlan enable drop untag 5 10 disable drop untag Syntax disable drop untag lt range gt Description Don t drop the untagged frames Argument range which port s you want to set Syntax 1 5 7 Possible value range available from 1 to 24 Example GSW 2494 vlan disable drop untag 5 10 Publication date May 2005 Revision Al 175 User Manual del tag group lt vid gt Syntax del tag group lt vid gt Description To delete the tag based vlan group Argument vid which vlan group you want to delete Possible value vid available from 1 to 4094
161. s Access Request the authentication server sends Radius Access Challenge to the supplicant for asking for inputting user password via the authenticator PAE The supplicant will convert user password into the credential information perhaps in MD5 format and replies an EAP Response with this credential information as well as the specified authentication algorithm MD5 or OTP to Authentication server via the authenticator PAE As per the value of the type field in message PDU the authentication server knows which algorithm should be applied to authenticate the credential information EAP MD5 Message Digest 5 or EAP OTP One Time Password or other else algorithm Publication date May 2005 Revision Al 113 User Manual 10 lf user ID and password is correct the authentication server will send a Radius Access Accept to the authenticator If not correct the authentication server will send a Radius Access Reject When the authenticator PAE receives a Radius Access Accept it will send an EAP Success to the supplicant At this time the supplicant is authorized and the port connected to the supplicant and under 802 1x control is in the authorized state The supplicant and other devices connected to this port can access the network If the authenticator receives a Radius Access Reject it will send an EAP Failure to the supplicant This means the supplicant is failed to authenticate The port it c
162. s Ingress rate control Referred as Class of Service CoS by the IEEE 802 1P standard Four queues per port Packet transmission schedule using Weighted Quality of Service QoS Round Robin WRR User defined weight Classification of packet priority can be based on either a VLAN tag on packet or a user defined port priority f Limit number of MAC addresses learned per port static MAC addresses stay in the filtering table Bridging 802 1D Spanning Tree IP Multicast IGMP Snooping IP Multicast Packet Filtering Maximum of 256 active VLANs and IP multicast sessions One RS 232 port as local control console Telnet remote control console SNMP agent MIB 2 RFC 1213 Network Management RMON MIB RFC 1757 Network Management RMON MIB RFC 1757 statistics VLAN MIB 802 1Q Web browser support based on HTTP Server and CGI parser TFTP software upgrade capability Note Any specification is subject to change without notice Publication date May 2005 Revision Al 221 User Manual Appendix B Null Modem Cable Specifications The DB 9 cable is used for connecting a terminal or terminal emulator to the Managed Switch s RS 232 port to access the command line interface The table below shows the pin assignments for the DB 9 cable Function Mnemonic Pin Carrier CD 1 Receive Data RXD 2 Transmit Data TXD 3 Data Terminal Ready DTR 4 Signal Ground GND 5 Data Set Ready DSR 6 Request To Send
163. sabled ACENSS 2 MAC Ri 8 1 Disabled Disabled Access GYRP 9 1 Disabled Disabled Access STP 10 1 Disabled Disabled Access Trunk at 1 Disabled Disabled Access g02 1X 12 1 Disabled Disabled Anpassa a Alarm 13 if Disabled Disabled Access Configuration 14 cE Disabled Disabled Access Diagnostics 15 1 Disabled Disabled Access garer TFTP Server 16 1 Disabled Disabled Access Log 17 1 Disabled Disabled Access Firmware Upgrade 18 1 Disabled Disabled Access Reboot 19 1 Disabled Disabled Access Logout 20 1 Disabled Disabled Access 21 1 Disabled Disabled Access t 29 4 Nicahlod Nicahlod D ner Soles pi Fig 3 33 Publication date May 2005 Revision Al 83 User Manual 3 11 MAC Table MAC Table Configuration gathers many functions including MAC Table Information MAC Table Maintenance Static Forward Static Filter and MAC Alias which cannot be categorized to some function type They are described below Function name MAC Table Information Function Description Display the static or dynamic learning MAC entry and the state for the selected port Parameter description Port Select the port you would like to inquire Search Set up the MAC entry you would like to inquire The default is 2 22 22 22 2 MAC Display the MAC address of one entry you selected from the searched MAC entries table Alias Set up the Alias for the select
164. scription To set class of ports on vlan tag based qos Argument lt port range gt port range lt tag range gt tag priority level lt class gt class of service Possible value lt port range gt syntax 1 5 7 available from 1 to 24 lt tag range gt priority level syntax 1 5 7 available from O to 7 lt class gt class of service setting 1 high 0 low Example GSW 2494 qos set pri tag 1 15 1 2 1 set tos Syntax set tos lt port range gt lt tos range gt lt class gt Description To set class of ports on IP TOS qos Argument lt port range gt port range lt tos range gt tos precedence field lt class gt class of service Possible value lt port range gt syntax 1 5 7 available from 1 to 24 lt tos range gt syntax 1 5 7 available from 0 to 7 lt class gt 1 high 0 low Example GSW 2494 qos set tos 1 5 0 3 0 Publication date May 2005 Revision Al 164 User Manual set simple layer4 Syntax set simple layer4 lt gt Description To set class of ports on simple mode of Layer 4 qos Argument lt gt layer 4 configuration mode Possible value lt gt valid values are following 0 disable ip tcp udp port classification 1 down prioritize web browsing e mail FTP and news 2 prioritize ip telephony VoIP 3 prioritize iSCSI 4 prioritize web browsing e mail FTP transfers and news 5 prioritize streaming Audio Video 6 prioritize databases Oracle
165. ss the network without the admittance of 802 1X authenticator The Port Status will show the following screen Port Number The port number to be chosen to show its 802 1X Port Status The valid number is Port 1 24 Port Status The current 802 1X status of the port In Disable mode this field is Disabled 802 1x with Multihost mode When selecting 802 1x with Multihost mode for a port in the function 802 1X Port Mode Configuration Devices can access the network through this port once the authenticator is authorized The Port Status will show the following screen If the port is granted to access the network the port status is authorized otherwise unauthorized Auto Logout 3 min GSW 2494 a System Port Security Management Port Mirror Bandwidth Port Mode Status disable disable disable Multi host Authorized disable disable disable disable disable disable disable disable disable disable disable disable disable disable disable x IGMP Snooping Max Packet Length DHCP Boot VLAN MAC Table GVRP STP Trunk 802 1X State Mode Securi Alarm Configuration Diagnostics TFTP Server Lo Py Firmware Upgrade Reboot Logout m f T Q rie Ql Publication date May 2005 Revision Al 118 User Manual Function name Param Setting Function description This function is used to configure the parameters for each port in 802 1x port security application Refer
166. t Argument lt range gt syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 to 24 Example GSW 2494 bandwidth disable storm rate 1 8 disable egress rate Syntax disable egress rate lt range gt Description To cancel the egress rate of the port Argument lt range gt syntax 1 5 7 available from 1 to 24 Possible value lt range gt 1 to 24 Example GSW 2494 bandwidth disable egress rate 1 8 Publication date May 2005 Revision Al 161 User Manual show Syntax show Description To display all current settings of the bandwidth Argument None Possible value None Example GSW 2494 bandwidth show All State All Rate Storm State Storm Rate All state All Rate oD o MON Mm OK WUN ee RO BO DO BD DF RR e SE ee eae A UNa wo WANN Mm OT FP W DO Publication date May 2005 Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Revision Al ooooancncooo cocooocoocoooo coocoo0o0c0 cUwc0OlCUwO Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled 162 oooocoocooocoooqcoooococooqoo ooo co O Dis
167. t 18 o o o 0 o 0 19 0 0 0 0 0 0 Fig 3 10 Function name Simple Counter Function description Display the summary counting of each port s traffic including Tx Byte Rx Byte Tx Packet Rx Packet Tx Collision and Rx Error Packet Parameters description Tx Byte Total transmitted bytes Rx Byte Total received bytes Tx Packet The counting number of the packet transmitted Publication date May 2005 Revision Al 51 User Manual Rx Packet The counting number of the packet received Tx Collision Number of collisions transmitting frames experienced Rx Error Packet Number of bad packets received Publication date May 2005 Revision Al 52 User Manual 3 2 4 Detail Counter The function of Detail Counter collects any information and provides the counting about the traffic of the port no matter the packet is good or bad In the Fig 3 11 the window can show only one port counter information at the same time To see another port s counter you have to pull down the list of Select then you will see the figures displayed about the port you had chosen Each data field has 12 digit long If the counting is overflow the counter will be reset and restart counting The data is updated every time interval defined by the user The valid range is 3 to 10 seconds The Refresh Interval is used to set the update frequency Default update time is 3 seconds level one Auto Logout 3 m
168. t hr gt lt s MM DD hh gt lt e MM DD hh gt Possible value hr daylight saving hour range 5 to 5 S daylight saving start month day hour e daylight saving end month day hour MM Month 01 12 DD Day 01 31 hh Hour 00 23 Example GSW 2494 time set daylightsaving 3 10 12 01 11 12 01 Save Successfully GSW 2494 time show Syntax show Description To show the time configuration including Current Time NTP Server Timezone Daylight Saving Daylight Saving Start and Daylight Saving End Argument None Possible value None Example GSW 2494 time show Current Time Thu Thu 14 15 04 08 2005 NTP Server 209 81 9 7 Timezone GMT 8 00 Day light Saving 0 Hours Day light Saving Start Mth 1 Day 1 Hour 0 Day light Saving End Mth 1 Day 1 Hour 0 GSW 2494 time Publication date May 2005 Revision Al 151 User Manual account add Syntax add guest lt name gt Description To create a new guest user When you create a new guest user you must type in password and confirm password Argument lt name gt new account name Possible value A string must be at least 5 character Example GSW 2494 account add aaaaa Password Confirm Password Save Successfully GSW 2494 account del Syntax del lt name gt Description To delete an existing account Argument lt name gt existing user ac
169. t is the configuration file for the specified or backup purposes and can be updated while having confirmed the configuration You can retrieve it by performing Restore User Configuration Auto Logout 3 min x System Configuration Port Mirror Bandwidth QoS Save as Start Configuration SNMP IGMP Snooping y x Max Packet Length Save as User Configuration DHCP Boot VLAN Restore Default Configuration MAC Table GYRP STP Restore User Configuration Trunk 802 1X Alarm Configuration Save Restore Config file Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 58 Publication date May 2005 Revision Al 124 3 17 1 Save Restore Function name Save As Start Configuration Function description User Manual Save the current configuration as a start configuration file in flash memory 6 O HAG AXE oO B on Auto Logout Imin EEE Tysen Port Mirror Bandwidely Das AMP IGMP Sneoplng Mas Pocket Length DHCP Boot VLAN MAC Tabli VEAP ETE Trunk 0 1 nl rm Comfiquratiqn Save Canilig Mie Diagnostics TETP Serwer Leg Firniveare Upgrade Reboot Legat Function name Save As User Configuration Function description x Pis dae Vee Pavartes Task heb ar Save aa Start Configuration Success Configuration Save Start Sawe as Start Configuration Saveliser Sawn as User Configuration EEE Restore vetovi configuration REC Restore User Configuration
170. t len set len 1 8 9216 show Syntax show Description To show current setting of Maximum Packet Length setting Argument None Possible value None Example GSW 2494 max pkt len show PORT Max Packet Length 1 1518 2 1518 3 1518 4 1518 5 1518 6 1518 T 1518 8 1518 9 1518 10 1518 11 1518 12 1518 13 1518 14 1518 15 1518 16 1518 17 1518 18 1518 19 1518 20 1518 21 1518 22 1518 23 1518 24 1518 Publication date May 2005 Revision Al 169 User Manual igmp set igmp_ snooping Syntax set igmp_ snooping lt status gt Description To set up the mode of IGMP Snooping Argument lt status gt O disable 1 active 2 passive Possible value lt status gt 0 1 2 Example GSW 2494 igmp set igmp snooping 2 show Syntax show Description To display IGMP snooping mode and IP Multicast Table Argument None Possible value None Example GSW 2494 igmp show Snoop Mode Active IP Multicast 1 IP Address 224 1 1 1 VLAN ID 0 Member Port 22 Publication date May 2005 Revision Al 170 User Manual m dhcp boot set dhcp boot Syntax set dhcp boot lt sec gt Description To set up the delay time for DHCP Boot Argument lt sec gt range syntax 0 1 30 The value 0 is to disable dhcp boot delay Possible value lt sec gt 0 30 Example GSW 2494 dhcp boot set dhcp boot 30 show Syntax show Description To display the status
171. te M Enable E Max Packet Length Trap Host 1 IP Address 0 0 0 0 162 community public DHCP Boot eee ee i a VLAN Trap Host 2 IP Address 0 0 0 0 162 Community public oe Trap Host 3 IP Address 0 0 0 0 162 Community public STP Trap Host 4 IP Address 0 0 0 0 162 Community public TNR Trap Host 5 IP Address 0 0 0 0 162 Community public Alarm Trap Host 6 IP Address 0 0 0 0 162 Community public 3 j Configuration Diagnostics TFTP Server Apply Log Firmware Upgrade Reboot Logout Fig 3 21 Community and trap host setting Publication date May 2005 Revision Al N User Manual 3 7 IGMP Snooping The function IGMP Snooping is used to establish the multicast groups to forward the multicast packet to the member ports and in nature avoids wasting the bandwidth while IP multicast packets are running over the network This is because a switch that does not support IGMP or IGMP Snooping can not tell the multicast packet from the broadcast packet so it can only treat them all as the broadcast packet Without IGMP Snooping the multicast packet forwarding function is plain and nothing is different from broadcast packet A switch supported IGMP Snooping with the functions of query report and leave a type of packet exchanged between IP Multicast Router Switch and IP Multicast Host can update the information of the Multicast table when a member port joins or leaves an IP Multic
172. te May 2005 Revision Al 59 User Manual Function name Per Port Priority Function description We can assign QoS Priority including High and Low for each port For example if we transmit IP packets from Port 2 and Port 3 at the speed of 1Gbps to Port 1 and set the Class of Port 2 as High and Port 3 as Low then the packets of Port 3 will be dropped when the congestion happens because Port 2 owns higher precedence of transmitting packets Parameter description Port No User can choose the port 1 24 respectively with Priority Class on Per Port Priority function Class User can set up High Priority or Low Priority for each port respectively Auto Logout 3 min System Port Mirror Bandwidth Port No IGMP Snooping Max Packet Length DHCP Boot VLAN MAC Table GVRP STP Trunk 802 1X Alarm Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout NIN m Hf Fig 3 15 Publication date May 2005 Revision Al 60 User Manual Function name VLAN Tag Priority Function description In vlan tag there are 3 bits belonging to priority According to these 3 bits we could arrange 8 traffics O00 001 010 010 100 101 110 111 We can set High priority or Low priority for each traffic class For instance if we let VLAN tagged priority O O O be high priority and VLAN tagged priority O O 1 be Low Priority and then make port 1
173. tftp server Argument None Possible value None Example GSW 2494 tftp show Tftp Server 192 168 3 111 hostname hostname Syntax hotsname lt range gt lt data_rate gt Description To set up the hostname of the switch Argument lt name gt hostname max 128 characters Possible value lt name gt hostname max 128 characters Example GSW 2494 hostname Company Company Publication date May 2005 Revision Al 215 User Manual autologout autologout Syntax autologout lt time gt Description To set up the timer of autologout Argument lt time gt range 1 to 3600 seconds 0 for autologout off current setting is 180 seconds Possible value lt time gt 0 1 3600 Example GSW 2494 autologout 3600 Set autologout time to 3600 seconds reboot reboot Syntax reboot Description To reboot the system Argument None Possible value None Example GSW 2494 reboot Publication date May 2005 Revision Al 216 User Manual 5 Maintenance 5 1 Resolving No Link Condition The possible causes for a no link LED status are as follows The attached device is not powered on The cable may not be the correct type or is faulty The installed building premise cable is faulty The port may be faulty 5 2 Q amp A 1 Computer A can connect to Computer B but cannot connect to Computer C through the Managed Switch v The network device of Compute
174. th gt upgrade file path Possible value lt filepath gt upgrade file path Example GSW 2494 firmware set upgrade path GSW2494 _v0 96 bin gz upgrade Syntax upgrade Description To run the upgrade function Argument None Possible value None Example GSW 2494 firmware upgrade Upgrading firmware show Syntax show Description To display the information of tftp server and upgrade path Argument None Possible value None Example GSW 2494 firmware show TFTP Server IP Address 192 168 3 111 Path and Filename GSW2494 v0 96 bin gz User Manual Publication date May 2005 211 Revision Al User Manual config file set export path Syntax set export path lt filepath gt Description To set up the filepath and filename that will be exported Argument lt filepath gt filepath and filename Possible value lt filepath gt filepath and filename Example GSW 2494 config file set export path log 21511 txt set import path Syntax set import path lt filepath gt Description To set up the filepath and filename that will be imported Argument lt filepath gt filepath 1 filename Possible value lt filepath gt filepath 1 filename Example GSW 2494 config file set import path log 21511 txt export start Syntax export start Description To run the export start function Argument None Possible value None Example GSW 2494
175. the information of the existed Port based VLAN Groups You can easily create edit and delete a Port based VLAN group by pressing lt Add gt lt Edit gt and lt Delete gt function buttons User can add a new VLAN group by inputting anew VLAN name Parameter description VLAN Name The name defined by administrator is associated with a VLAN group Valid letter is A Z a z and 0 9 Other special characters will not be accepted The maximal length is 15 characters Member This is used to enable or disable if a port is a member of the new added VLAN Enable means it is a member of the VLAN Just tick the check box J beside the port x to enable it level one any Auto Logout 3 min i GSW 2494 System Port based Group Port Mirror Bandwidth Nop VLANNAME O Qos 1 default SNMP IGMP Snooping Max Packet Length DHCP Boot YLAN VLAN Mode Tag based Group Port based Gnaup Tag Rule MAC Table GYRP STP Trunk 802 1X Alarm Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Add Edit Delete Logout Fig 3 30 Publication date May 2005 Revision Al 80 User Manual Add Group Create a new Port based VLAN Input the VLAN name and choose the member by ticking the check box beside the port No then press the lt Apply gt button to have the setting taken effect Auto Logout 3 min System Port based VLAN Port Mirror Bandwidth QoS z DHCP Boot YLAN _ VLAN
176. the user s choice Disabled In this mode the switch dynamic VLAN will be created when this port received GVRP PDU The default setting is Normal Enabled In this mode the switch does not create dynamic VLAN when this port received GVRP PDU Except received dynamic VLAN message of the GVRP PDU is an existed static VLAN in the switch this port will be added into the static VLAN members dynamically Publication date May 2005 Revision Al 93 User Manual Function name GVRP Counter Function description All GVRP counters are mainly divided into Received and Transmitted two categories to let you monitor the GVRP actions Actually they are GARP packets level one zis Auto Logout 3 min System GVRP Counter Port1 Port Bandwidth Qos Total G RP Packets o 0 SNMP Invalid GVRP Packets 0 SS IGMP Snooping Leaveall message 0 oO Max Packet Length JoinEmpty message 0 Oo DHCP Boot JoinIn message 0 0 LeaveEmpty message 0 0 MAC Table Empty message 0 0 GYRP ae Refresh TTW STP Trunk 802 1X aen Diagnostics TFTP Server Firmware Upgrade Reboot Logout Fig 3 40 Parameter description Received Total GVRP Packets Total GVRP BPDU is received by the GVRP application Invalid GVRP Packets Number of invalid GARP BPDU is received by the GARP application LeaveAll Message Packets Number of GARP BPDU with Leave All message is received by the GARP application JoinEmpty Message Packets Numb
177. this switch When any one of the ports in the switch changes its parameter displayed in the page it will be automatically refreshed the port current status about every 5 seconds Parameter Description Port No Display the port number The number is 1 24 Both port 23 and 24 are optional modules Media Link Show the media type adopted in all ports The Port 23 and Port 24 are optional modules which support either fiber or UTP media with either Gigabit Ethernet 1000Mbps or 10 100Mbps Fast Ethernet port They may have different media types and speed Especially fiber port has comprehensive types of connector distance fiber mode and so on The switch describes the module ports with the following page Show that if the link on the port is active or not If the link is connected to a working well device the Link will show the link Up otherwise it will show Down This is determined by the hardware on both devices of the connection No default value State Auto Show that the communication function of the port is Enabled or Disabled When it is enabled traffic can be transmitted and received via this port When it is disabled no traffic can be transferred through this port Port State is configured by user Default Enabled Negotiation Show the exchange mode of Ethernet MAC There are two modes supported in the switch They are auto negotiation mode Enabled and forced mode
178. timeout conditions in the exchanges between the Authenticator and the Supplicant or Authentication Server The initial value of this timer is either suppTimeout or serverTimeout as determined by the operation of the Backend Authentication state machine Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt sec gt timer range 1 65535 Possible value lt port range gt 1 to 24 lt sec gt 1 65535 default is 30 Example GSW 2494 802 1x set suppTimeout 2 30 GSW 2494 802 1x Publication date May 2005 Revision Al 195 User Manual set serverTimeout Syntax set server Timeout lt port range gt lt sec gt Description A timer used by the Backend Authentication state machine in order to determine timeout conditions in the exchanges between the Authenticator and the Supplicant or Authentication Server The initial value of this timer is either suppTimeout or serverTimeout as determined by the operation of the Backend Authentication state machine Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt sec gt timer range 1 65535 Possible value lt port range gt 1 to 24 lt sec gt 1 65535 default is 30 Example GSW 2494 802 1x set serverTimeout 2 30 GSW 2494 802 1x show state Syntax show state Description Show the Radius server configuration Argument None Possible value None Example GSW 2494 802 1x show state Radius Server 19
179. tings after rebooting the system Auto Logout 3 min System Restore User Configuration Successful Port Mirror Bandwidth Qos SNMP IGMP Snooping Max Packet Length DHCP Boot VLAN MAC Table GVRP STP Trunk 802 1X Alarm Configuration Save Restore Config file Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 62 Publication date May 2005 Revision Al 126 User Manual 3 17 2 Config File Function name Config File Function description With this function user can back up or reload the config files of Save As Start or Save As User via TF TP Parameter description Export File Path Export Start Export Save As Start s config file stored in the flash Export User Conf Export Save As User s config file stored in the flash Import File Path Import Start Import Save As Start s config file stored in the flash Import User Conf Import Save As User s config file stored in the flash Auto Logout 3min System Configure Export Import File Path Port sills a aie Gel 0 0 0 0 QoS SNMP IGMP Snooping Max Packet Length Export File Path DHCP Boot z VLAN MAC Table GVRP _ STP import File Path i J ar Alarm Configuration Save Restore Config Diagnosis TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 63 Publication date May 2005 Revision Al 127 User Manual 3 18 Diagnostics Three functions including Diagnostics Loopbac
180. tion The number of reauthentication attempts that are permitted before the port becomes Unauthorized Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt max gt max value range 1 10 Possible value lt port range gt 1 to 24 lt max gt 1 10 default is 2 Example GSW 2494 802 1x set reAuthMax 2 2 set txPeriod Syntax set txPeriod lt port range gt lt sec gt Description A timer used by the Authenticator PAE state machine to determine when an EAPOL PDU is to be transmitted Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt sec gt timer range 1 65535 Possible value lt port range gt 1 to 24 lt sec gt 1 65535 default is 30 Example GSW 2494 802 1x set txPeriod 2 30 Publication date May 2005 Revision Al 196 User Manual set quiet period Syntax set quiet period lt port range gt lt sec gt Description A timer used by the Authenticator state machine to define periods of time during when it will not attempt to acquire a Supplicant Argument lt port range gt syntax 1 5 7 available from 1 to 24 lt sec gt timer range 0 65535 Possible value lt port range gt 1 to 24 lt sec gt 0 65535 default is 60 Example GSW 2494 802 1x set quiet period 2 30 set reAuthEnabled Syntax set reAuthEnabled lt port range gt lt ebl gt Description A constant that define whether regular reauthentication will take pla
181. tomatically performs self test and is in ready state 2 1 2 Cabling Requirements To help ensure a successful installation and keep the network performance good please take a care on the cabling requirement Cables with worse specification will render the LAN to work poorly Publication date May 2005 Revision Al 10 User Manual 2 1 2 1 Cabling Requirements for TP Ports For Fast Ethernet TP network connection The grade of the cable must be Cat 5 or Cat 5e with a maximum length of 100 meters Gigabit Ethernet TP network connection The grade of the cable must be Cat 5 or Cat 5e with a maximum length of 100 meters Cat 5e is recommended 2 1 2 2 Cabling Requirements for 1000SX LX SFP Module It is more complex and comprehensive contrast to TP cabling in the fiber media Basically there are two categories of fiber multi mode MM and single mode SM The later is categorized into several classes by the distance it supports They are SX LX LHX XD and ZX From the viewpoint of connector type there mainly are LC and BIDI LC Gigabit Fiber with multi mode LC SFP module Gigabit Fiber with single mode LC SFP module Gigabit Fiber with BiDi LC 1310nm SFP module Gigabit Fiber with BiDi LC 1550nm SFP module The following table lists the types of fiber that GSW 2494 supports and part of these models are available upon request Multi mode Fiber Cable and Modal Bandwidth Multi mode 62 5 125um Mu
182. tor Note If PC directly connects to the switch you have to setup the same subnet mask between them But subnet mask may be different for the PC in the remote site Please refer to Fig 2 8 about the switch s default IP address information 2 Run CLI or web browser and follow the menu Please refer to Chapter 3 and Chapter 4 Publication date May 2005 Revision Al 18 User Manual 0 0 faa Pree Fila Edt ve Faves Toas Hela g Please Input Username amp Password Usemanme Passwore 2 1 4 IP Address Assignment For IP address configuration there are three parameters needed to be filled in They are IP address Subnet Mask Default Gateway and DNS IP address The address of the network device in the network is used for internetworking communication Its address structure looks is shown in the Fig 2 10 It is classful because it is split into predefined address classes or categories Each class has its own network range between the network identifier and host identifier in the 32 bits address Each IP address comprises two parts network identifier address and host identifier address The former indicates the network where the addressed host resides and the latter indicates the individual host in the network which the address of host refers to And the host identifier must be unique in the same LAN Here the term of IP address we used is version 4 Known as IPv4 32 bits I gt Network i
183. tting an IP address from DHCP server the device will not continue booting procedures If set this field Disable you ll have to input IP address manually For more details about IP address and DHCP please see the Section 2 1 4 IP Address Assignment in this manual Default Disable Publication date May 2005 Revision Al IP Configuration 32 User Manual IP address Users can configure the IP settings and fill in new values if users set the DHCP function Disable Then click lt Apply gt button to update When DHCP is disabled Default 192 168 1 1 If DHCP is enabled this field is filled by DHCP server and will not allow user manually set it any more Subnet mask Subnet mask is made for the purpose to get more network address because any IP device in a network must own its IP address composed of Network address and Host address otherwise can t communicate with other devices each other But unfortunately the network classes A B and C are all too large to fit for almost all networks hence subnet mask is introduced to solve this problem Subnet mask uses some bits from host address and makes an IP address looked Network address Subnet mask number and host address It is shown in the following figure This reduces the total IP number of a network able to support by the amount of 2 power of the bit number of subnet number 24 bit number of subnet number 32 bits Network ID Host
184. ule 1 is forward only packets with VID matching this port s configured VID The Ingress Filtering Rule 2 is drop untagged frame You can also select the Role of each port as Access Trunk or Hybrid Parameter description Port 1 24 Port number PVID Rule Rule This PVID range will be 1 4094 Before you set a number x as PVID you have to create a Tag based VLAN with VID x For example if port x receives an untagged packet the switch will apply the PVID assume as VID y of port x to tag this packet the packet then will be forwarded as the tagged packet with VID y 1 Forward only packets with VID matching this port s configured VID You can apply Rule 1 as a way to a given port to filter unwanted traffic In Rule 1 a given port checks if the given port is a member of the VLAN on which the received packet belongs to to determine forward it or not For example if port 1 receives a tagged packet with VID 100 VLAN name VLAN100 and if Rule 1 is enabled the switch will check if port 1 is a member of VLAN100 If yes the received packet is forwarded otherwise the received packet is dropped 2 Drop untagged frame You can configure a given port to accept all frames Tagged and Untagged or just receive tagged frame If the former is the case then the packets with tagged or untagged will be processed If the later is the case only the packets carrying VLAN tag will be processed the rest packets will be
185. unity set community trap host ip host port and trap community Argument lt gt trap number lt ip gt ip address or domain name lt port gt trap port lt community gt trap community name Possible value trap number 1 to 6 port 1 65535 Example GSW 2494 snmp set get community public GSW 2494 snmp set set community private GSW 2494 snmp set trap 1 192 168 1 1 162 public show Syntax show Description The Show here is to display the configuration of SNMP Argument None Possible value None Example GSW 2494 snmp show SNMP Enable Get Community public Set Community private Enable Trap Host 1 IP Address 192 168 1 1 Port 162 Community public Trap Host 2 IP Address 0 0 0 0 Port 162 Community public Trap Host 3 IP Address 0 0 0 0 Port 162 Community public Trap Host 4 IP Address 0 0 0 0 Port 162 Community public Trap Host 5 IP Address 0 0 0 0 Port 162 Community public Trap Host 6 IP Address 0 0 0 0 Port 162 Community public Publication date May 2005 Revision Al 1685 User Manual max pkt len set len Syntax set len lt range gt lt length gt Description lt range gt port range length bytes 1518 1532 9216 Argument lt range gt Port range lt length gt bytes Maximum Packet Length can be accepted Possible value lt range gt syntax 1 5 7 available from 1 to 24 lt length gt bytes 1518 1532 9216 Example GSW 2494 max pk
186. urrent Forward Delay sec 15 Port uranon Hello Time sec Fe Trunk STP Topology Change Count 0 802 1X Time Since Last Topology Change sec 0 Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 42 Publication date May 2005 Revision Al 98 User Manual 3 13 2 STP Configuration The STP Spanning Tree Protocol actually includes RSTP In the Spanning Tree Configuration there are six parameters open for the user to configure as user s idea Each parameter description is listed below Function name STP Configuration Function description User can set the following Spanning Tree parameters to control STP function enable disable select mode RSTP STP and affect STP state machine behavior to send BPDU in this switch The default setting of Spanning Tree Protocol is Disable Parameter description Spanning Tree Protocol Set 802 1W Rapid STP function Enable Disable Default is Disable Bridge Priority The lower the bridge priority is the higher priority it has Usually the bridge with the highest bridge priority is the root If you want to have GSW 2494 as root bridge you can set this value lower than that of bridge in the LAN The valid value is 0 61440 The default is 32768 Hello Time Hello Time is used to determine the periodic time to send normal BPDU from designated ports among bridges It decides how long a bridge should send this message to other bridge to tell
187. ust tick the option button and press lt Apply gt button to have this function taken affect Then enter Custom L4 to set up Special TCP UDP port for QoS Prioritize iSCSI Belong to the QoS in L4 Just tick the option button and press lt Apply gt button to have this function taken affect Then enter Custom L4 to set up Special TCP UDP port for QoS Prioritize web browsing e mail FTP transfers and news Belong to the QoS in L4 Just tick the option button and press lt Apply gt button to have this function taken affect Then enter Custom L4 to set up Special TCP UDP port for QoS Prioritize Streaming Audio Video Belong to the QoS in L4 Just tick the option button and press lt Apply gt button to have this function taken affect Then enter Custom L4 to set up Special TCP UDP port for QoS Publication date May 2005 Revision Al 65 User Manual Prioritize Databases Oracle IBM DB2 SQL Microsoft Belong to the QoS in L4 Just tick the option button and press lt Apply gt button to have this function taken affect Then enter Custom L4 to set up Special TCP UDP port for QoS Advanced Mode Display the TCP UDP port number in L4 QoS In Disable IP TCP UDP Port Classification mode user can randomly choose TCP UDP port number that L4 QoS will affect As to other special L4 QoS events Special TCP UDP port number will be took action Of course user could be allowed to add or modify the port number at random
188. value is 4 30 seconds default is 15 seconds Force Version Mirror Two options are offered for the user s choosing STP algorithm One is RSTP and the other is STP If STP is chosen RSTP will run as a legacy STP The switch supports RSTP 802 1w which is backward compatible with STP 802 1d level one Auto Logout 3 min GSW 2494 System STP Configuration pean Tree Protocol Disable v Qos SNMP IGMP Snooping DHCP Boot fee GYRP STP Status 1 9X D i Configuratan bi wide able Delay 1 gt Max Age Port ax Age gt 2 Hello Time 1 Trunk 802 1X Alarm Apply Configuration Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout Fig 3 43 Publication date May 2005 Revision Al al 00 User Manual 3 13 3 STP Port Configuration Function name STP Port Setting Function description In the STP Port Setting one item selection and five parameters settings are offered for user s setup User can disable and enable each port by selecting each Port Status item User also can set Path Cost and Priority of each port by filling in the desired value and set Admin Edge Port and Admin Point To Point by selecting the desired item Parameter description Port Status It displays the current state of a port We cannot manually set it because it displays the status only There are three possible states according to 802 1w specification DISCARDI
189. vision Al 181 User Manual show Syntax show Description To display the mac alias entry Argument None Possible value None Example GSW 2494 mac table alias show MAC Alias List MAC Address Alias 1 00 02 03 04 05 06 aaa 2 00 33 03 04 05 06 ccc 3 00 44 33 44 55 66 rrr GSW 2494 mac table alias Publication date May 2005 Revision Al 182 User Manual gvrp enable Syntax enable Description To enable the gvrp function Argument None Possible value None Example GSW 2494 gvrp enable disable Syntax disable Description To disable the gvrp function Argument None Possible value None Example GSW 2494 gvrp disable set timer Syntax set timer lt range gt lt join gt lt leave gt lt leaveall gt Description To set gvrp join time leave time and leaveall time for each port Argument lt range gt port range lt join gt join timer lt leave gt leave timer lt leaveall gt leaveall timer Possible value lt range gt syntax 1 5 7 available from 1 to 24 lt join gt available from 20 to 100 lt leave gt available from 60 to 300 lt leaveall gt available from 1000 to 5000 Leave Time must equal double Join Time at least Example GSW 2494 gvrp set timer 2 8 25 80 2000 Publication date May 2005 Revision Al 183 User Manual set applicant Syntax set applicant lt range gt lt normal non participant gt Descript
190. ware Upgrade Reboot Logout Fig 3 19 Simple Mode Simple Mode Press lt Simple gt button is to return to the screen that all L4 port number will disappear See Fig 3 19 Publication date May 2005 Revision Al 67 User Manual Function name IP Diffserv Classification Function description IP Diffserve Classification function it can form total 64 0 63 kinds of Traffic Class based on the arrangement of 6 bit field in DSCP of the IP packet In the switch user is allowed to set up these 64 kinds of Class that belong to High or Low Priority Parameter description IP Differentiated Services DiffServ Configuration Used for setting up the IP Differentiated Services Configuration QoS Diffserv Display 64 0 63 DiffServ Priority items Class evel 64 kinds of traffic as we mentioned above user can set up High Priority or Low Priority for each port respectively one Auto Logout 3min Syctarn IP Differentiated Services DiffServ Configuration Port Mirror DiffServ os it i High v High v SNMP High High nooping High il High Max Packet Length aes a Eee a DHCP Boot High High VLAN High High MAC Table e SS GVRP High High STP High High v imal E High ca High Alarm High High v Configuration a z Diagnostics High x High w TFTP Server High High Log 44 High 47 High AE T as ihv EEA His Reboot a High High v Logout High High es H
191. wo switches it may have to act two port roles at the end of the link authenticator and supplicant because the traffic is bi directional Publication date May 2005 Revision Al 112 Fig 3 50 User Manual Authentication server Authenticator B Supplicant A The Fig 3 51 shows the procedure of 802 1x authentication There are steps for the login based on 802 1x port access control management The protocol used in the right side is EAPOL and the left side is EAP 1 At the initial stage the supplicant A is unauthenticated and a port on switch acting as an authenticator is in unauthorized state So the access is blocked in this stage Initiating a session Either authenticator or supplicant can initiate the message exchange If supplicant initiates the process it sends EAPOL start packet to the authenticator PAE and authenticator will immediately respond EAP Request Identity packet The authenticator always periodically sends EAP Request Identity to the supplicant for requesting the identity it wants to be authenticated If the authenticator doesn t send EAP Request Identity the supplicant will initiate EAPOL Start the process by sending to the authenticator And next the Supplicant replies an EAP Response Identity to the authenticator The authenticator will embed the user ID into Radius Access Request command and send it to the authentication server for confirming its identity After receiving the Radiu
192. word your password on the mail server Email Address 1 6 email address that would like to receive the alarm message SMS SMS Server the IP address of the server transferring your SMS Username your username in ISP Password your username in ISP Mobile Phone 1 6 the mobile phone number that would like to receive the alarm message evel one Auto Logout 3min_v System Alarm Configuration Port Mirror Bandwidth MailServer ir peman SNMP IGMP Snooping Naseer Email Address 1 DHCP Boot MAC Table z Trunk z 802 1x Email Address5 ae _ Events O Email SHs Diagnostics TFTP Server username d Da Firmware Upgrade Mobile Phone 3 Mobile Phone4 z Fig 3 57 Publication date May 2005 Revision Al User Manual 3 17 Configuration The switch supports three copies of configuration including the default configuration working configuration and user configuration for your configuration management All of them are listed and described below respectively Default Configuration This is the ex factory setting and cannot be altered Working Configuration It is the configuration you are using currently and can be changed any time The configurations you are using are saved into this configuration file This is updated each time as you press lt Apply gt button User Configuration I
193. you may write down the contact person and phone here for getting help soon You can configure this parameter through the device s user interface or SNMP Device name The name of the switch User defined Default is GSW 2494 System up time The time accumulated since this switch is powered up Its format is day hour minute second Current time Show the system time of the switch Its format day of week month day hours minutes seconds year For instance Wed Apr 23 12 10 10 2004 BIOS version The version of the BIOS in this switch Firmware version The firmware version in this switch Hardware Mechanical version The version of Hardware and Mechanical The figure before the hyphen is the version of electronic hardware the one after the hyphen is the version of mechanical Series number The serial number is assigned by the manufacturer Publication date May 2005 Revision Al 30 User Manual Host IP address The IP address of the switch Host MAC address It is the Ethernet MAC address of the management agent in this switch Device Port Show all types and numbers of the port in the switch RAM size The size of the DRAM in this switch Flash size The size of the flash memory in this switch Publication date May 2005 Revision Al 31 User Manual 3 1 2 IP Configuration IP configuration is one of the most important configurations in the switch Without the proper setting netwo
Download Pdf Manuals
Related Search
Related Contents
AWOS III/PTZ - AllWeatherInc User Manual Assembly Schedule メルクミリポア 超純水・純水製造装置 総合カタログ Vol.2 医療機器管理業務指針 - 日本臨床工学技士会 VIVA Notice Montage Tutorial Philips PowerLife Steam iron GC2960/58 Copyright © All rights reserved.
Failed to retrieve file