Home

Planet Technology WGD-800 User's Manual

image

Contents

1. 902 1X through 802 1X Switch Switch Clients 1 Enter 802 1X Port Status Configuration there are 3 Authenticate authorization states 802 1X Port status Port status Configuration Port List e g 1 3 7 Authenticate Status maximum account numbeari 1 32 Force Authorized Force Unauthorized Port status port Authenticate Status maximum account number current account number port 1 Auto 1 O part 2 Anto 0 port 3 Auto 1 O port 4 Auto 1 O port 5 Anto 1 O part 6 Auto 1 O part 7 Auto 1 O m um prt8 Auto 1 A9 RU GN c M part 3 Auto m c Auto enables 802 1X authentication and causes the port to begin in the unauthorized state allowing only EAPOL frames to be sent and received through the port It s a default status Force authorized disables 802 1X authentication and causes the port to transition to the authorized state without any authentication exchange required The port transmits and receives normal traffic without 802 1X based authentication of the client This is the default setting Force unauthorized causes the port to remain in the unauthorized state ignoring all attempts by the client to authenticate The switch cannot provide authentication services to the client through the interface Maximum account number the biggest user s quantity of passing authentication under this port
2. 2 The Switch supports Port based VLAN and IEEE 802 1Q VLAN The port untagging function can be used to remove the 802 1 tag from packet headers to maintain compatibility with devices that are tag unaware 3 The Switch s default is to assign all ports to a single 802 1Q VLAN named DEFAULT VLAN As new VLAN is created the member ports assigned to the new VLAN will be removed from the TEETER EEEE a E E a qu qu sa we e e O O O O oe 5 i O A o i i i o i i o c c we i i ow ow Hu ow ow A EA E 4 Port based VLAN Port based VLAN limit traffic that flows into and out of switch ports Thus all devices connected to a port are members of the VLAN s the port belongs to whether there is a single computer directly connected to a switch or an entire department On port based VLAN NIC do not need to be able to identify 802 1Q tags in packet headers NIC send and receive normal Ethernet packets If the packet s destination lies on the same segment communications take place using normal Ethernet protocols Even though this is always the case when the destination for a packet lies on another switch port VLAN considerations come into play to decide if the packet is dropped by the Switch or delivered IEEE 802 1Q VLANs IEEE 802 1Q tagged VLAN are implemented on the Switch 802 1Q VLAN require tagging which enables them to span the entire network assuming all switches on the network are IEEE 802 1Q compliant VLAN allow a network to be seg
3. Management status Enable v 00000 Management mode mese Client IP Stacking group System priority IPStacking MAC 06 50 F1 44 40 06 8 Enter a string in the IP Stacking Group field the default string of the WGSW 2840 5240 is planet_switch This string must be the same with the Master switch that to be assigned to the same IP Stack group IP Stacking Management status Enable Management mode Client IP Stacking group planet_switth System a IP Stacking MACIDE SE FI AM ACOB 00 Stack name Switch 9 Modify the System priority and Stack name if necessary At this sample we change the Stack name of the Client to Switch 2 10 Click OK if the configuration is down 11 Please use a UTP cable to uplink together through its Ethernet interface 12 Back to login the WEB main screen of Master switch then you can see two WGSW 2840 stacks together from its web interface The following screen appears ee Aha AA Ve Ds BW 2 Ro Seiko se Sd A Homage eerie dez CDPLANET ree pa Pegar pm oma m Ea nz E Home les AS IP Stacking yam E El Fon Managamami 4 zare TE more pass E Redundancy Sarai Harare anar stat is Ena da 9 Security m a a Manage pl Mora mm i Dico oov 4 CCAA In Shoe irg arae pl ner E catch Mulet castam prin Ey HOO
4. or power cord However if the Switch powers off after running for a while check for loose power connections power losses or surges at power outlet IF you still cannot resolve the problem contact your local dealer for assistance 5 2 1 Cabling RJ 45 ports use unshielded twisted pair UTP or shield twisted pair STP cable for RJ 45 connections 1000 Category 3 4 or 5 cable for 10Mbps connections or 100Q Category 5 cable for 100Mbps connections Also be sure that the length of any twisted pair connection does not exceed 100 meters 328 feet 6 APPENDIX 6 1 Console Port Pin Assignments The DB 9 serial port on the front panel is used to connect to the switch for out of band console configuration The console menu driven configuration program can be accessed from a terminal or a PC running a terminal emulation program The pin assignments used to connect to the serial port are provided in the following tables DB 5 DB 9 Console Port Pin Numbers DB 9 Port Pin Assignments CCITT Switch s DB9 DTE PC DB9 EIA Circuit Description Signal Pin DTE Pin BB 104 RxD Received Data 2 2 BA 103 TxD Transmitted Data 3 3 AB 102 SGND Signal Ground 5 5 Console Port to 9 Pin DTE Port on PC Switch s 9 Pin Serial Port CCITT Signal PC s 9 Pin DTE Port 2 RXD lt RXD 3 TxD 3TXD TXD gt 2 RxD 5SGND SGND 5 SGND Cable Types and Specifications Cable T
5. 255 255 255 0 Default Gateway 192 168 0 254 User Name admin Password admin 4 3 System Login 1 Launch the Internet Explorer 2 Enter the IP address of the switch 3 When the login screen appears use admin admin as the default username password respectively to login 4 The main web page of the Web based management appears As shows in the following screen GQ PLANET Networking 4 Communication Welcome to PLANET WSW 2401A Port Management Redundancy 24 Port 10 100Mbps 1 Fiber Slot Managed Ethernet Switch 4 Port Analysis PLANET Technology Corporation E 11F No 96 Min Chuan Road Hsin Tien Taipei Taiwan R O C Tel 886 2 2219 9518 Fax 886 2 2219 9528 Email Support planet com tw Copyright c 2005 Planet Technology Corp all rights reserved WSD 800 Web Management Interface 4 4 System 4 4 1 IP Configuration The switch can be managed by the Web Telnet SNMP interfaces Administrators can access the management interface via the IP address of the switch The default IP address of the switch is 192 168 0 100 You can change the IP address to be in the same IP segment as your LAN network for convinence To change the IP address click on the System IP Address menu button The IP address configuration screen then shows in the main page on the web Enter the new IP address Submask and Gateway then click on the OK button to change IP Address IP Address Configuration IP Address 192 1
6. 280x173x44 mm 802 1d 802 1w 4 groups up to 4 ports per group 802 1p Class of Service 4 Queues RX TX Both Yes per port per 64kbps up to 80Mbps Per 64kbps up to 80Mbps v1 v2 Yes Port Based 802 1q 4K VLAN ID 256 groups Yes Yes 802 1X Port Based Authentication Management Interface SNMP Version Support MIB Standard Compliance Network Standard EMI Console Web Telnet SNMP v1 v2c Support SNMP MIB II RFC 1213 Bridge MIB RFC 1493 RMON group 1 2 3 9 Enterprise private MIB IEEE802 3 10Base T IEEE802 3u 100Base TX IEEE802 3x Flow Control and Back pressure IEEE802 3ad Port trunk with LACP IEEE802 1d Spanning tree protocol IEEE802 1w Rapid Spanning Tree IEEE802 1p Class of service IEEE802 1Q VLAN Tagging IEEE802 1X Network Access Control FCC Class A CE 2 INSTALLATION This section describes the functionalities of the Switch s components and guides how to install it on the desktop or shelf Basic knowledge of networking is assumed Please read this chapter completely before continuing 2 1 Product Description 2 1 1 Product Overview With 8 Port 10 100Mbps TP the PLANET WSD 800 boasts a high performance switch architecture that is capable of providing non blocking switch fabric and wire speed throughput as high as 1 6Gbps The IEEE 802 standard based firmware provides a rich set of features and ensures interoperability with equipment from other vendors Additionally the firmware includes
7. For more information please see the Cabling Specification in Appendix A Step5 Supply power to the switch A Connect one end of the power cable to the switch B Connect the power plug of the power cable to a standard wall outlet When the switch receives power the Power LED should remain solid Green 2 2 2 Rack Mounting To install the switch in a 19 inch standard rack please follows the instructions described below Step1 Place the switch on a hard flat surface with the front panel positioned towards the front side Step2 Attach the rack mount bracket to each side of the switch with supplied screws attached to the package Figure 2 5 shows how to attach brackets to one side of the switch Figure 2 5 Attach brackets to the switch Caution You must use the screws supplied with the mounting brackets Damage caused to the parts by using incorrect screws would invalidate the warranty Step3 Secure the brackets tightly Step4 Follow the same steps to attach the second bracket to the opposite side Step5 After the brackets are attached to the Switch use suitable screws to securely attach the brackets to the rack as shown in Figure 2 6 0000000 Figure 2 6 Mounting the Switch in a Rack Step6 Proceeds with the steps 4 and steps 5 of session 2 2 1 Desktop Installation to connect the network cabling and supply power to the switch 3 CONSOLE MANAGEMENT 3 1 Connecting to the Switch The console p
8. MAC Address Part Delete MAC Address Bind Bind New MAC Address MAC Address Port Po Port Add Show Mac Address Table MAC Address Port Delete O0 E0 4F 46 34 E Portl Delete 4 7 3 MAC Address Filtering MAC address filtering allows the switch to drop unwanted traffic Traffic is filtered based on the destination addresses To filter the MAC Address click on the Security MAC Address Filtering menu button the main web page then shows the MAC Address Filtering function table 1 Fill the MAC Address field with MAC address in the format XX XX XX XX XX XX 2 Click on the Add button to add 3 To remove the MAC Address filtered by the port Simply click on the Delete button of the MAC Address in the Current Filtering MAC Table MAC Address Filtering MAC Address no E 0 4P 48 34 7E Add MAC Address Delete MAC Address Filtering MAC Address MAC Address Delete O0 E0 4F 48 34 7E Delete 4 7 4 MAC Address Learning The switch is able to disable MAC Address learning function on ports 1 Fill the Port List field in the MAC Address Learning table and select Enable Disable in the MAC Address Learning field 2 Click on the OK button to save MAC Address Learning MAC Address Learning 2 ss Port List e g 1 3 7 MAC Address Learning SS 42 Disable Show Port Table MAC Address Learning Enable Enab
9. Switch gt enable Please input password Swi tch enable gt Module Module Module Module Module Module Module Module Module Module Module Module Module Module Module Module Module Module Snmp Module Snmp Rmon Module STP STP JVlan HwQVlan PVlan HwPY lan Hirror Hirror mac table new mac table driver Counter HwCounter Ruby oS Ruby QoS IGHP Snooping IGHP Snooping Driver Rate Shaping Rate Shaping Driver Command Line Console login screen 3 3 Console Management Entering a question mark at the prompt displays the list of commands available for command mode As shows in the following screen manage 1p mirror monitored port egress mirror monitored port ingress multicast router port counters port rate shaping port port port strom limit spantree portcost spantree portpri manage 1p address egress monitored port for mirror Ingress monitored port for mirror router port Clear port statistics counter Clear rate shaping of all ports Hestore spanning tree port cost to default value Restore spanning tree port priority to default value Clear strom limit of all ports Clear Clear Clear Clear qos map cos queue map qos map dotip cos map qos map mac cos map qos map vlan cos map security f1lter HAC security static HAC snmp community snmp trap spantree root trunk Reset cos queue map to default Reset dotlp cos map to default Clear
10. choose Port based VLAN Click on the OK button YLAN Configuration VLAN Typed Por based WLAN K Ej 2 The main page then change to Port base VLAN table click on the Add Modify button to create a new VLAN group Port based YLAN ss RR Current Configuration VLAN VLAN NAME VID vlani 1 Adamo city Show WLAN Member 3 The Port base VLAN Confirutation table then pops up enter the VLAN group ID VLAN name and select the member ports for the VLAN 4 Click the OK button to add the VLAN 5 Select the ports in the Port List field and click on the Add button to add the member ports to the VLAN The selected VLAN member then shows in the VLAN Member field Port based YLAN Configuration VID 1 429 2 VLAN Name VLAN2 EE REMEEENNNNNMNMN Set Port based VI AN Member Port Port Lis VLAN Member P 5 Delete 6 Click on the Close button and back to the Port based VLAN main page The Show VLAN Member button is to list the valid VLANs You can also remove the added VALN by click on this button Port based YLAWN Current Configuration VLAN VLAM NAME VID vlani 1 Adamo city Show WLAN Member 802 1Q VLAN Configuration There are up to 256 configurable VLAN groups By default when 802 1Q is enabled all ports on the switch
11. lt lt LAN 2 lt lt LAN 3 9 After Applying the STA Rules The switch with the lowest Bridge ID switch C was elected the root bridge and the ports were selected to give a high port cost between switches B and C The two optional Gigabit ports default port cost 4 on switch A are connected to one optional Gigabit port on both switch B and C The redundant link between switch B and C is deliberately chosen as a 100 Mbps Fast Ethernet link default port cost 19 Gigabit ports could be used but the port cost should be increased from the default to ensure that the link between switch B and switch C is the blocked link 4 6 2 Spanning Tree Configuration The Spanning Tree Protocol STP operates on two levels On the switch level the settings are globally implemented On the port level the settings are implemented on a per user defined Group of ports 1 Spanning Tree Configuration The Rapid Spanning Tree Bridge Configure table allows configuring the spanning tree parameters Rapid Spanning Tree Status The spanning tree function of the switch is default disabled This field enables to turn on the spanning tree on the switch Force Protocol Version 0 for IEEE 802 1D Spanning Tree 2 for IEEE 802 1W Rapid Spanning Tree Max Age 6 40 sec the default setting is 20 Hello Time 1 10sec the default setting is 2 Forward Delay 4 30 sec the default setting is 15 Bridge Priori
12. p up 3553 4 5 3 Port Band Restrict The function provides the In Band and Out Band connection speed restriction on the ports The Band of the connection speed rangs from 64Kbps to 80000Kbps Ingress Port List Egress Port List field can be filled in distinct number or a port range For example you can fill with 1 3 for port 1 and port 3 and 3 5 for port 3 to port 5 Band 64 80000Kbps field can be filled with any number between 64 and 80000 Port Band Restrict In Band Restrict Ingress Port List Band Soo 80000Kbps kbps Out Band Restrict Egress Port List Band 54 80000Ebps kbps Port 5tatus i Port In Band Restrict Kbps Out Band Restrich Kbps Delete 1 500 64 2 500 54 Delete 3 500 64 4 NA N A s VA T T Due to the Chipset limition set the band rate large then 500Kbps at In Band Restrict field NOTICE f this value is less than 500Kbps and the packet will drop on that time And please also be remined enable flow control at specific port is required 4 6 Redundancy 4 6 1 Spanning Tree 1 Spanning Tree Protocol The IEEE 802 1D Spanning Tree Protocol and IEEE 802 1W Rapid Spanning Tree Protocol allow for the blocking of links between switches that form loops within the network When multiple links between switches are detected a primary link is established Duplicated links are blocked from use and become standby links The protocol allows for the duplicate links to be used in the e
13. show snmp rmon show spantree show syntax show system show trunk show version show vlan show vlan type Show port security status Show static mac table information Show snmp information Show snmp rmon state Show spanning tree information Show basic help infomation Show system information Show trunk information Get last software version Show vlan information Show current vian type 4 WEB BASED MANAGEMENT This section introduces the configuration and functions of the Web Based management 4 1 About Web based Management The switch offers management features that allow users to manage the switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer The Web Based Management supports Internet Explorer 5 0 It is based on Java Applets with an aim to reduce network bandwidth consumption enhance access speed and present an easy viewing screen Note By default IE5 0 or later version does not allow Java Applets to open sockets The user has to explicitly modify the browser setting to enable Java Applets to use network ports 4 2 Preparing for Web Management Before use web management you can use console to login the Switch checking the default IP of the Switch Please refer to Console Management Chapter for console login If you need change IP address in first time you can use console mode to modify it The default value is as below IP Address 192 168 0 100 Subnet Mask
14. the server s frame header is removed leaving the EAP frame which is then encapsulated for Ethernet and sent to the client a Authentication Initiation and Message Exchange The switch or the client can initiate authentication If you enable authentication on a port by using the dot1x port control auto interface configuration command the switch must initiate authentication when it determines that the port link state transitions from down to up It then sends an EAP request identity frame to the client to request its identity typically the switch sends an initial identity request frame followed by one or more requests for authentication information Upon receipt of the frame the client responds with an EAP response identity frame However if during bootup the client does not receive an EAP request identity frame from the switch the client can initiate authentication by sending an EAPOL start frame which prompts the switch to request the client s identity If 802 1X is not enabled or supported on the network access device any EAPOL frames from the client are authentication the client transmits frames as if the port is in the authorized state A port in the authorized state effectively means that the client has been successfully authenticated When the client supplies its identity the switch begins its role as the intermediary passing EAP frames between the client and the authentication server until authenti
15. 2094 field in the VLAN CoS Mapping Table Fill the mapping number in the CoS 0 7 field Click on the OK button to save To remove the VLAN CoS mapping item simply click on the Delete button in the Show VLAN CoS Mapping table VLAN CoS MApping oo 0 OVLAN CoS Mapping VID 1 408984 fers les 255 VID VLAN Name Cos Delete YLAN CoS MApping VID 1 4094 Cos 0 7 VIB VLA Name Cos Delete 3 802 1p CoS Mapping QoS settings allow customization of packet priority in order to facilitate delivery of data traffic that might be affected by latency problems The IEEE 802 1p Priority specification uses 8 priority levels to classify data packets In 802 1p compliant devices a tag inserted into the packet header is used to identify the priority level of data packets 1 Fill the 802 1p Priority 0 7 field in the 802 1p priority CoS Mapping Configuration Table 2 Fill the mapping number in the CoS 0 7 field 3 Click on the OK button to save 802 1p priority Cos Configuration 802 1p Priority 0 7 Cos 0 7 UAU l 802 10 Priority C CI ow D D 1 1 E E 3 3 o 08 n O gH 0 5 EH EAN Smee eee A A 802 1p priority Cos O o0 902 0 7 B uz ip Priority Cos 4 Port COS Mapping QoS settings allow customization of VLAN ID to Traffic classifiers 1 Fill the Port List e g 1 3 7 field
16. LAN and switch services Because the switch acts as the proxy the authentication service is transparent to the client In this release the Remote Authentication Dial In User Service RADIUS security system with Extensible Authentication Protocol EAP extensions is the only supported authentication server it is available in Cisco Secure Access Control Server version 3 0 RADIUS operates in a client server model in which secure authentication information is exchanged between the RADIUS server and one or more RADIUS clients Switch 802 1X device controls the physical access to the network based on the authentication status of the client The switch acts as an intermediary proxy between the client and the authentication server requesting identity information from the client verifying that information with the authentication server and relaying a response to the client The switch includes the RADIUS client which is responsible for encapsulating and decapsulating the Extensible Authentication Protocol EAP frames and interacting with the authentication server When the switch receives EAPOL frames and relays them to the authentication server the Ethernet header is stripped and the remaining EAP frame is re encapsulated in the RADIUS format The EAP frames are not modified or examined during encapsulation and the authentication server must support EAP within the native frame format When the switch receives frames from the authentication server
17. Stack name Ewitzh 1 e Management Mode Client Manage Station IP Address 182 158 0 101 IP Stacking Group planet switch Slack name Switz Mane genent Mode Cllent IP address 102 1588 0 102 IP Stecking Group planet switch Sack name Sudch 3 Management Mode Client IP Address 132 163 0 103 IP Stacking Group planet swrch Stack name Switch l 4 12 2 IP Stacking Configuration Before the IP Stacking Configuration the network manager have to identify the roles of the stackable switches the Master mode and Client mode At a IP stacking group domain there is only one Master switch and many Client switches If there re more than one switch be configured to the Master mode the it will depends on the System Priority to elect a active Master The others with Master mode would be Backup Master To join a IP Stack group both the Master and Client have to be assigned with the same string at IP Stacking Group filed Once the switch be assigned as a Client switch it s not allowed to management the Client switch with its original system IP address That is the administrator has to configure the Client switch via the Master switch mamagement UI The following fields can be set for IP Stacking configuration Current mode Display the current mode of IP Stacking there re three possible statuses e Disable The IP Stacking function is disabled e Master The IP Stacking Management
18. When STP is enabled using the default parameters the path between source and destination stations in a switched network might not be ideal For instance connecting higher speed links to a port that has a higher number than the current root port can cause a root port change STP Port States The BPDUs take some time to pass through a network This propagation delay can result in topology changes where a port that transitioned directly from a Blocking state to a Forwarding state could create temporary data loops Ports must wait for new network topology information to propagate throughout the network before starting to forward packets They must also wait for the packet lifetime to expire for BPDU packets that were forwarded based on the old topology The forward delay timer is used to allow the network topology to stabilize after a topology change In addition STP specifies a series of states a port must transition through to further ensure that a stable network topology is created after a topology change Each port on a switch using STP exists is in one of the following five states Blocking the port is blocked from forwarding or receiving packets Listening the port is waiting to receive BPDU packets that may tell the port to go back to the blocking state Learning the port is adding addresses to its forwarding database but not yet forwarding packets Forwarding the port is forwarding packets Disabled the port only responds to ne
19. aaa 7 2 INSTALLATION oo waccallcsutuaguves AEE Na aa A 9 ZV RODUCT DESC RIP TION aaa 9 VN BIN OU R1 I QUI at 9 2 1 2 OWNER FLOR AN ii ds 9 2 9 LE DANOIS eddie ao eii tai 9 2 1 4 A A aa In A 10 LLANS TALL HE SWITCH endi dta te aed Optat ddl ipu muda rade ipae D iet did abes 10 2A NM BI Ci Tolo INS ANQUON esc c 10 ZLA TRACK IVIOUNUNG ct 11 S CONSOLE MANAGEMENT iii 12 91 CONNECTINGTO THE SWITCH asistan 12 3 2 LOGININ THE CONSOLE INTERFACES A AAA AA 12 9 3 CONSOLE MANAGEMENT sarna 13 A NE ene Ins A DuEUE 14 3 9 COMMANDS istic EE 14 80 IIS IE VE Feo licite 14 O02 PINVIICGEO CONAN A o 15 4 WEB BASED MANAGEMENU o cre ER nn dE 22 4 1 ABOUT WEB BASED MANAGEMENT Tona 22 4 2 PREPARING FOR WEB MANAGEMENT 0ccccccccccccccecccccceeeeseseaueeeececeeeeecccceeeeeeeeseeeeeeesaaaaeeeeeeeeeens 22 i OY STEN LOG MT 22 qu A eee E mM oM ME AMI A MEL EM AE A E mere a E OA 23 d EN CONTO AO e bct ates care E T A MM 23 A IN 24 dud TOU ee RR a d e MEE LE LER D A LE Md M MM LL E d ee 24 44 DAS S WONG uds tu Tn Mida AR Lain eames ta I etait is 27 ARAGON LION ccr 28 TAS Y EN UD GIAO A ORE 28 4241 6 SAVING P AMICS AS A A A A A a 29 4 47 Parameters Back p amp T16COVOty jack dora d DAA EA ipM UR ead 29 LE Mua a DA o e bed ce ces 30 ATAC oca 30 4 5 PORT MANAGEMEN Lct id ie 30 TL cocto sd IA AA A A AA AA E A 30 4 5 2 POROS OS A A A iia 31 Ao FON Band es Misa diia 31 ATG ISEDISNISANG a es
20. advanced features such as IGMP snooping broadcast storm control and MAC address filtering to enhance security and bandwidth utilization With its built in web based management the PLANET WSD 800 offers an easy to use platform independent management and configuration facility The PLANET WSD 800 supports standard Simple Network Management Protocol SNMP and can be managed via any standard based management software For text based management the WSD 800 can also be accessed via Telnet and the console port 2 1 2 Switch Front Panel Figure 2 1 shows the front panel of the switch 2 4 6 8 3 PLANET INGACT i il kii B i 8 Port 10 100Mbps oF ds eae Managed Ethernet Switch 13 5 7 O O O O INKACT O O O O FDX COL JL JE JL oe 1 3 5 z Figure 2 1 WSD 800 front panel O SYS WSD 800 O PWR 2 1 3 LED Indications Network LED Color Function PWR Lights to indicate that the Switch is powered on SYS Lights to indicate the system is working LNK ACT Orange Blink to indicate that the switch is actively sending or receiving data over that port FDX COL Lights to indicate the link through that port is in duplex mode 100 Lights to indicate the port is acting in 100Mbps speed 2 1 4 Switch Rear Panel Figure 2 2 shows the rear panel of the switch 100 240V AC CONSOLE 9600 N 8 1 50 60Hz Figure 2 2 WSD 800 rear panel Power Notice 1 The device is a power req
21. devices execute management applications that monitor and control network elements Physically NMSs are usually engineering workstation caliber computers with fast CPUs megapixel color displays substantial memory and abundant disk space At least one NMS must be present in each managed environment Agents Agents are software modules that reside in network elements They collect and store management information such as the number of error packets received by a network element Management information base MIB A MIB is a collection of managed objects residing in a virtual information store Collections of related managed objects are defined in specific MIB modules network management protocol A management protocol is used to convey management information between agents and NMSs SNMP is the Internet community s de facto standard management protocol SNMP Operations SNMP itself is a simple request response protocol NMSs can send multiple requests without receiving a response Get Allows the NMS to retrieve an object instance from the agent Set Allows the NMS to set values for object instances within an agent Trap Used by the agent to asynchronously inform the NMS of some event The SNMPv2 trap message is designed to replace the SNMPv1 trap message SNMP community An SNMP community is the group that devices and management stations running SNMP belong to It helps define where information is sent The community name is used to i
22. in the port based QoS Configuration Table 2 Fillthe mapping number in the CoS 0 7 field 3 Click on the OK button to save Port based Qos 5 COS Queue Mapping 1 Fill the CoS 0 7 field in the CoS Queue Mapping Configuration Table 2 Fill the mapping number in the Queue 0 3 field 3 Click on the OK button to save CoS Queue Mapping 0 S Queue Mapping Configuration Cos 0 7 Queue 0 3 6 Queue Management There are two rules for the Priority Queue Weighted Round Robin WRR and Always Hight To configure Queue Rule select the Queue Policy drop down menu in the Queue Rule Configuration table And Click on the OK button to save Queue Policy WRR ok If the WRR was chosen as the Queue Policy the page would show in the main page Queue Management Queue Rule Configuration o o Queue Policy WPR EH Show Queue Weight o o o y o Queue Weight QUEUE 3 B QUEUE z Queue 1 z Queue O 1 4 9 Multicast 4 9 1 IGMP Snooping Theory Computers and network devices that want to receive multicast transmissions need to inform nearby routers that they will become members of a multicast group The Internet Group Management Protocol IGMP is used to communicate this information IGMP is also used to p
23. qos map mac cos map Clear qos map vlan cos map Clear HAC filter entry Clear static HAC entry Clear snmp community entry Clear snmp trap management host Restore spanning tree parameters Clear trunk port from vlans Clear member from vlan The question mark command 3 4 Telnet login The switch also supports telnet for remote management The switch asks for user name and password for remote login when using telnet please use admin for username and admin for password 3 5 Commands There are two levels for console commands The first level provides commands to show system informations and current configurations The second level privileged mode provides commands to set clear and show the configuration 3 5 1 First level commands The follow table lists the first commands and the equivalent usages Command enable show channel show console info show dow1x local userlnfo show dot1x state show igmp snooping group number show igmp snooping group policy show igmp snooping info show igmp snooping policy deny show ip http server show ip telnet server show ipstack info show mirror show multicast router show port counter show port dot1x show port mac learning show port rate shaping show port rstp extension show port spantree Description Enable privileged mode Show channel information Show console info Show dot1x local user information Show dot1x information show igmp snoopi
24. set 1 gt Only one user can pass this authentication gt The second user is unable to carry on authentication on this port The max value is 32 Current account number show the current user who passed authentication under one port 2 Enter 802 1X Local Authenticate to set legitimate user information In the local server model the need for each port through the establishment of the legitimate user authentication information available As Figure2 45 802 1 Local Authenticate Local Authenticate Configuration usemame 0000000 portiexpress all port as rf password confirm password Add Mlodify delete user username delete Local Authenticate Information part Username 3 Other configuration only choose Local Authenticate mode is available If you not have good experiences please keep the default value other Configuration Re Authenticatian Enable Dotis MaxReq 1 10 b o Dotis re amp uthMax 1 10 b Supplicant Timeout 1 255 fo 1 Re Authentication Period 10 655351 300 Quiet Period 0 65535 fo o Server Timeouti 1 255 o Tx Period 0 65535 B o ooo O Radius Server In this situation need a Radius server in the network the normal topologies as below Authentication E server mee switch RADIUS Workstations E clients E 1 Select the Radius Server mode
25. status is enabled and the current switch is a Master switch at this IP Stack Group e Client The IP Stacking Management status is enabled and the current switch is a Client switch at this IP Stack Group Manamement status This filed is to Enable or Disable the IP Stack function Management mode Identify the management mode of the current switch There re two possible selections e Master The switch plays as a Master of the IP Stack Group e Client The switch plays as a Client of the IP Stack Group IP Stacking group This filed effects if the switches be joined to the same IP Stack group With the same string entry both the Master and Client will be assigned to the same IP Stack group If not the switches will not be the IP Stack group members System priority If there re more than one switch be configured to the Master mode the it will depends on the System Priority to elect a active Master The others with Master mode would be Backup Master If there is no other Master switch it s no need to modify this value IPStacking MAC The Master will base on the MAC address to find out the Cleint switches Generally the entry would be the burn in MAC address of the switch Stack name Identify the name at a IP Stack group The entry will be displayed at the Master switch management Ul for Master and Client switches identify Following we ll show you how to configure the Master switch and Client switch e Master Swit
26. turn off the port Link Status Up to indicate the port is linked while Down to indicate the port is not connectd Speed Shows the negotiation mode and the running speed on the port Duplex Displays full duplex or half duplex mode Flow Control Display Flow status of port Enable or Disable Disable indicates Flow control is off Auto Display which mode the port is auto negotiated Config configured Displays the state defined by the user Atual Displays the negotiation result Port Configuration Port List e g 1 3 7 E BE Status Speed Duplex Flow Control Enable Auto Disable mdp MM LEO mM E E ok atus Speed Duplex Flo Flow Control els Status config Actual Config im config Actual Down xs MA Auto Disable A Enable Dower A NA Aut a NA Enable Down n MA Auto M Disable FA Enable Down Aut NA Auto NA Disable NA Enable Down Auto NA auto MA Disable As Enable Up exa inom Auto Full Disable Disable 4 5 2 Port Statistics The Port Statistics page provides a view of the current status of every port on the Switch Pressing the Reset button will reset all port counters to zero Port Statistics o E Porti Enable 3 Down E Porta Enable Down Porta Enable Down lalo A Port Enable Down Ports Enable Down ETT Port Enable
27. 2 The RADIUS Server configuration table includes the following fields 802 1 802 1 Configuration Enable 802 1 Mode 9 Radius Server Local Authenticate Radius Server Configuration Radius Server IP Address 192 168 0 51 Authentication Port 1 65535 012 Account Porti 1 655535 1813 Share Key 12345670 e RADIUS Server IP The IP address of the RADIUS server being added Address e Authentication The UDP port used by this server The valid range is O 65535 Port 1 65535 The default UDP Port No is 1812 The UDP port used by accounting server The valid range is O 65535 e Account Port 1 65535 The default UDP Port No is 1813 e Share Key Indicates if the shared secret for this server has been configured 3 Setup the RADIUS server and assign the client IP address to the Web Smart switch In this case field in the default IP Address of the Web Smart switch with 192 168 0 100 And also make sure the shared secret key is as same as the one you had set at the switch RADIUS server 12345678 at this case Add RADTUS Client ox Chert lrfoimatian ve peci information regarding the client Cliert addiess IP or DNS 192 168 0100 Verte Lenbvendor RADIUS Standard T Cbenk must alas ond the signature akribule in bo toques Shared secrel n Confirma hated Geet amp 4 Configure ports attribute of 802 1X the same as 802 1X Port Status Configuration 802 1X Por
28. 68 0 100 Submask 255 255 255 0 Gateway 192 168 0 254 IP Address Configuration 1 The Switch s factory default IP address is 192 168 0 100 with Submask 255 255 255 0 and a default gateway of 192 168 0 254 2 The changed IP address take effect immediately after click on the OK button you need to use the new IP address to access the Web interface 3 The changed IP address remains the original after reboot the switch unless the configuration is saved To save the changed IP address please move to System Saving Parameters menu me o o i i c eee eee m i c e ee ee eee eee ee ee eee ee ew ew e e ew ew ew ew osm e o e ew ew ew ew eee ew ew ew ew c e ew ew e ew ewe ew i e oam ew ew ew ew ew e ew ew e ew em ew e ew ew e sm ew e ew ew sm ew ew sm sm ew ew ew am ew ewe ew ew o g 4 4 2 SNMP 4 4 2 1 Theory The Simple Network Management Protocol SNMP is an application layer protocol that facilitates the exchange of management information between network devices It is part of the Transmission Control Protocol Internet Protocol TCP IP protocol suite SNMP enables network administrators to manage network performance find and solve network problems and plan for network growth An SNMP managed network consists of three key components Network management stations NMSs SNMP agents Management information base MIB and network management protocol Network management stations NMSs Sometimes called consoles these
29. 802 1X enabled client connects to a port that is not running the 802 1X protocol the client initiates the authentication process by sending the EAPOL start frame When no response is received the client sends the request for a fixed number of times Because no response is received the client begins sending frames as if the port is in the authorized state If the client is successfully authenticated receives an Accept frame from the authentication server the port state changes to authorized and all frames from the authenticated client are allowed through the port If the authentication fails the port remains in the unauthorized state but authentication can be retried If the authentication server cannot be reached the switch can retransmit the request If no response is received from the server after the specified number of attempts authentication fails and network access is not granted When a client logs off it sends an EAPOL logoff message causing the switch port to transition to the unauthorized state If the link state of a port transitions from up to down or if an EAPOL logoff frame is received the port returns to the unauthorized state 4 7 6 2 802 1X Configuration This switch has two 802 1X Mode Radius Server amp Local Authenticate choose one you need Local Authenticate n this situation do not need Radius server in the network all authentication completed by 802 1x Switch the normal topologies as below
30. ETTING SAMPLE 1 ccecececececececececececececauauaeaceees 1 INTRODUCTION 1 1 Packet Contents Check the contents of your package for following parts o Ethernet Switch x1 CD ROM user s manual x1 Quick installation guide x1 19 rack mounting kit x1 Power cord x1 a Rubber feet x 4 If any of these are missing or damaged please contact your dealer immediately if possible retain the carton including the original packing material and use them against to repack the product in case there is a need to return it to us for repair 1 2 How to Use This Manual This User Manual is structured as follows Chapter 2 INSTALLATION The chapter explains the functions of the Switch and how to physically install the Switch Chapter 3 CONSOLE MANAGEMENT The chapter explains how to manage the switch by Console interface Chapter 4 WEB BASED MANAGEMENT The chapter explains how to manage the switch by Web interface Chapter 5 TROUBLE SHOOTING The chapter explains how to trouble shooting of the Switch Chapter 6 APPENDIX The chapter contains cable information of the Switch In the following section terms SWITCH with upper case denotes the WSD 800 Ethernet switch Terms with lower case switch means any Ethernet switches 1 3 Product Feature o 8 Port 10 100Mbps TP interfaces n Complies with IEEE802 3 10Base T IEEE802 3u 100Base Tx o High back plane bandwidth 1 6Gbps Console Web SNMP management Configur
31. P Snooping Status field and click on the OK button to save IGMP Snooping IGMP Snooping status Disable ok Multicast VIB Port 4 9 2 Static Routing Port This function is to configure ports to be the member of IGMP Groups in VLANs To do this fill the Port List field and the VID field for the static routing and click on the Add button to save Static Routing Port Static Routing Port Configuration Port Listle g 1 3 7 VIOCVLAN O means All Lan Add Port ID VLAN Name Type Delete Ports 2 Vlan 2 Static Delete 4 10 Port Analysis 4 10 1 Port Analysis This function shows the statistical information of each port it helps to diagnose the network malfunction The following example shows the statistic table of port 6 Port Analysis Port Selecting Port Port amp jos Show Statistic Table Statistic Item Total Average Max Tx bytes 6577715 468836 468836 Tx packets 22561 1518 1818 x bytes 1357570 06069 06069 Rx packets 11529 830 a30 Rx Unicast packets 11493 820 820 x Multicast packets O O lo Rx Broadcast packets 136 E E Te Ro packets of 64 bytes 22853 15398 p 1539 Ir T RX packets of 65 127 bytes 2 2594 1 185 p 185 Tx Ras packets of 128 255 bytes 2110 150 150 Te Paz packets of 256 511 bytes 11056 139 138 Te Ros packets of 512 1023 bytes 2444 1174 174 Ir Tu RX packets of 1024 1518 b
32. Port 2 and Port 3 VLAN configuration Although Port 2 and Port 3 are VLAN 1 members with different PVID setting the two ports are not able to access each other But they all can access with the server AP Printer which connect to the Port 1 now Part No 2081 A92310 001 C C
33. able Disable mirror function Set a port to capture traffic Capture egress traffic Capture ingress traffic Set multicst router port Set the password for telnet Disable a port Set port transmission type Enable a port Set port traffic flowcontrol Set port mcheck Set port point to point admin value Set port egress rate shaping rate Set port ingress rate shaping rate Set port egress rate shaping rate Set port ingress rate shaping rate Set spanning tree port cost Set spanning tree PortFast feature Set spanning tree port priority Set port transmission speed Set port storm limit mode Set port storm limit rate Set port vlan type set gos map cos queue map set qos map dot1p cos map set qos map mac cos map set qos map port cos map set qos map vlan cos map set qos queue egress policy set radius key set radius server set rstp force version set security MAC aging set security filter MAC set security mac learning set security static MAC set snmp set snmp community set snmp rmon set snmp trap set spantree disable set spantree enable set spantree fwddelay set spantree hello set spantree maxage set spantree priority set system contact set system default gateway set system ip set system location set system mac set system management vlan set system name set trunk set vlan vid name set vlan vlan id lt portlist gt set vlan port mode set vlan type port based set vlan type dot1q based set
34. access the same server AP Printer But the two VLAN groups are separated and can t access to each other The graphic in Figure 7 1 appears a IIg Bey UO PES j Urtueesd Untagged Tupped I VLAN 2 X i i l i 1 i a eee PEE Un VLAN 3 7 LL I I l l PC 5 Untagged Untagged Tagged I VLAN 3 i l E Figure 7 1 Overlap VLAN graphic The next will be a configure sample how to setup the WGSW 2840 802 1Q VLAN with a multiple untagged port 1 2 At the menu bar click Security gt VLAN After the VLAN configuration page appear select 802 1Q VALN and clink OK to apply Then the following screen in Figure 7 2 appears 802 10 VLAN Port Link Type PID Egress Policy Figure 7 2 802 1Q VLAN page screen 3 Move the mouse course to the port which had be assigned to be connect to the server AP printer then click on the port For this case we set the Port 1 to be the multiple untagged port The screen in Figure 7 3 appears 4 Atthe Link Type select Always Untag at the draw bar Click OK to apply 802 1Q VLAN Port Configuration Port 1 i Link Type Access v Access Access M FID i Access ok Veris tas LAN NAME default vlan vlaNName 0000000 O O AddiMadify close Figure 7 3 802 1Q VLAN Port Configuration Port1 screen 5 Click the Add Modify butto
35. ackup amp Recovery Backup the system s parameters Parameters Recovery The backup file s name Browse Recovering Status To backup the running configuration click on the Backup the system s parameters link and a pop up window shows to save the configuration of the switch to your workstation To recover a saved configuration click on the Browse button in the Parameters Recovery table A pop up window would direct you to upload the configuration file 4 4 8 Load Default This function is to reset the configuration of switch to the factory default Click on the System Load Default menu button and the following table shows in the web main page Load Default Returns the switch configuration to the factory default settings A After this operation you should reboot the Switch When the Switch has rebooted tt will have the same configuration as when it was delivered from the factory ox 4 4 9 Reboot This function is to reboot the system Reboot session will be last When you click the reboot button the switch If you do not save the system parameters all changes made in this will reboot automatically Reboot 4 5 Port Management 4 5 1 Port Configuration This function is to configure and to view the configured port management status port negotiation mode and the port flow control function Management Status Display port status Enable or Disable Disable is to
36. and found to comply with the limits for a Class A digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the Instruction manual may cause harmful interference to radio communications Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at whose own expense CE Mark Warning This is a Class A product In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures WEEE Warning To avoid the potential effects on the environment and human health as a result of the presence of hazardous substances in electrical and electronic equipment end users of electrical and electronic equipment should understand the meaning of the crossed out wheeled bin symbol Do not dispose of WEEE as unsorted municipal waste and have to collect such WEEE separately Revision PLANET Ethernet Switch User s Manual FOR MODEL WSD 800 Part No 2081 A92310 001 Table of Contents TANTRODUCTION illa 6 Tad IPACKET CONTENTS 2 oa 6 12 TOW GO USE THIS MANUAL iaa 6 1 9 PRODUCT FEATURE ao 6 ica PROBUGT SPECIFICATION
37. ation backup and recovery Per port Ingress Egress bandwidth restriction 802 1d Spanning tree 802 1w Rapid Spanning Tree Configurable spanning tree aging time STP port configuration 4 trunk groups up to 4 ports per trunk Port based 802 1Q VLAN with 4K VLAN ID MAC Binding Filtering Learning configurable MAC Aging time 8 mappings ID to 4 priority queues Support MAC VLAN 802 1p Port to CoS mapping IGMP snooping and IGMP Query mode for Multi media application Statistic Routing Port 1 to many Ingress Egress Port mirror and Port analysis Broadcast Multicast Flooded storm control o 802 1X Port Based Authentication n IP Stack Technology supports up to 8unit switch stack for centralize management Hardware Specification Network Connector RS 232 connector Switch architecture Switch Fabric MAC address Shared Buffer Power requirement Operating environment Storage environment Dimension W x D x H Switch Specification Spanning Tree Link Aggregation Priority Queue Port Mirror Bandwidth Control Strom Control IGMP Snooping MAC Filtering VLAN Port Analysis Static Routing Port Security Management Function 1 4 Product Specification 8 Port RJ 45 for 10 100Base TX One RS 232 DB 9 male connector for switch management Store and forward switch architecture Back plan up to 1 6Gbps 8K MAC address table with Auto learning function 512K byte 90 240V AC 50 60Hz 0 50 degree C 5 90 RH 20 70 degree C 5 90 RH
38. ation port cables or disable the link aggregation ports before removing a port link aggregation to avoid creating a data loop It allows a maximum of four ports to be aggregated at the same time and up to 4 groups If the group is defined as a LACP static link aggregationing group then any extra ports selected are placed in a standby mode for redundancy if one of the other ports fails If the group is defined as a local static link aggregationing group then the number of ports must be the same as the group member ports Link Aqgregation Configuration One aggregation group can accommodate up to 8 members Aggregation Group Port25 Port List Member Ports Add Delete 4 7 Security 4 7 1 VLAN 4 7 1 1 Theory Understanding IEEE 802 1p Priority Priority tagging is a function defined by the IEEE 802 1p standard designed to provide a means of managing traffic on a network where many different types of data may be transmitted simultaneously It is intended to alleviate problems associated with the delivery of time critical data over congested networks The quality of applications that are dependent on such time critical data such as video conferencing can be severely and adversely affected by even very small delays in transmission Network devices that are in compliance with the IEEE 802 1p standard have the ability to recognize the priority level of data packets These devices can also assign a priority label or tag t
39. ave an 802 1Q VLAN tag the port will not alter the packet Thus all packets received by and forwarded by an untagging port will have no 802 1Q VLAN information Untagging is used to send packets from an 802 1Q compliant network device to a non compliant network device Ports with Access mode belong to a single untagged VLAN Trunk Ports with tagging enabled will put the VID number priority and other VLAN information into the header of all packets that out of those ports If a packet has previously been tagged the port will not alter the packet thus keeping the VLAN information intact The VLAN information in the tag can then be used by other 802 1Q compliant devices on the network to make packet forwarding decisions Always Untag The port belongs to VLANs and each VLAN is user defined as tagged or untagged full 802 1Q mode Ports will strip the 802 1Q tag from all packets that out of those ports Untagged Belongs to a single untagged VLAN Tag PVID be removed Allowed to belongs to multiple untagged Untagged Always Untag VLANs at the same time Tag PVID be removed Allowed to belongs to multiple Tagged Tagged Trunk VLANs at the same time Tag PVID or Original VID be remained Port VID PVID Set the port VLAN ID that will be assigned to untagged traffic on a given port This feature is useful for accommodating devices that you want to participate in the VLAN but that don t support tagging The Switch allows each port to set o
40. belong to default VLAN VID 1 The default VLAN cannot be deleted Understand nomenclature of the Switch Tagging and Untagging Every port on an 802 1Q compliant switch can be configured as tagging or untagging Tagging Ports with tagging enabled will put the VID number priority and other VLAN information into the header of all packets that flow into those ports If a packet has previously been tagged the port will not alter the packet thus keeping the VLAN information intact The VLAN information in the tag can then be used by other 802 1Q compliant devices on the network to make packet forwarding decisions Untagging Ports with untagging enabled will strip the 802 1Q tag from all packets that flow into those ports If the packet doesn t have an 802 1Q VLAN tag the port will not alter the packet Thus all packets received by and forwarded by an untagging port will have no 802 1Q VLAN information Remember that the PVID is only used internally within the Switch Untagging is used to send packets from an 802 1Q compliant network device to a non compliant network device Frame Income Income Frame is tagged Income Frame is untagged Frame Leave Leave port is tagged Frame remains tagged Tag is inserted Leave port is untagged Frame remain untagged 33 3 Here pay attention to the explainion of Access Always Untag and Trunk Access Ports will strip the 802 1Q tag from all packets that out of those ports If the packet doesn t h
41. ble command is to exit the privileged mode and back to the first level of command line interface Command Disable 3 5 2 4 Reboot command Description Disable privileged mode Reboot command is to reboot the switch please beware to check if the configuration is saved Command Reboot 3 5 2 5 Set command Description Reboot system Set command is to change the parameter of the switch functions The follow table lists the set commands and the equivalent usages Command set channel set default set dot1x auth mode set dot1x auth ctrl disable set dot1x auth ctrl enable set dot1x local userlnfo set dot1x max req set dot1x quiet period set dot1x reauth max set dot1x reauth mode set dot1x reauth period set dot1x servertimeout set dot1x supptimeout set dot1x tx period set enable password set igmp snooping disable set igmp snooping enable set igmp snooping forward all leave Description Set ports to be channel Set system load default parameters Set dot1x auth mode Disable dot1x Enable dot1x Set dot1x local user information Max times of re transmit EAP request to Supplicant Quiet period in secondst Max times of re transmit Request ID before port become Unauthorized Enable or Disable reauthentication Period for automatic re authentication Authentication server timeout Timeout for supplicant Set dot1x server timeout Set the password for the privileged level of the CLI Disable igmp snoo
42. cation The system location of the switch which would show in the SNMP software Contact The contact person of the switch which would show in the SNMP software Fill the fileds and click on the OK button to save System Options System Name Wws0 800 System Location TAIPEI Contact SYSTEM ADMINISTRATOR 3 Community Configuration Use this table to configure the SNMP community strings and define the policy of the relative string The community string acts like a password to permit access to the agent on the Switch One or more of the following characteristics can be associated with the community string Add Community enter private or public Chooses community strings for the Switch management access read only or read write Read only Enables requests accompanied by this string to display MIB object information E Read Write Enables requests accompanied by this string to display MIB object information and to set MIB objects Complete the above steps and click on the Add button Community Configuration Add Add Community Current Communities Communities private Read Only C Read Write Read Read Only C Read Write O Read Write o pe qme The added string then shows in the Current Communities field e Current Communities show the list in input field Community Configuration Add Community Current Communities private Head Only Read Only Read Wri
43. cation succeeds or fails If the authentication succeeds the switch port becomes authorized For more information see the Ports in Authorized and Unauthorized States section The specific exchange of EAP frames depends on the authentication method being used Figure 2 43 shows a message exchange initiated by the client using the One Time Password OTP authentication method with a RADIUS server Authentication Client SETVET 302 1X Switch RADIUS EAPOL Start EAP Request Identity FE AP Response ldentity RADIUS Access Request EAP Request OTP RADIUS Access Challenge EAP Response OTP RADIUS Access Request EAP Success RADIUS Access Accept Port Authorized EAPOL Logoff Port Unauthorized E Ports in Authorized and Unauthorized States The switch port state determines whether or not the client is granted access to the network The port starts in the unauthorized state While in this state the port disallows all ingress and egress traffic except for 802 1X protocol packets When a client is successfully authenticated the port transitions to the authorized state allowing all traffic for the client to flow normally If a client that does not support 802 1X is connected to an unauthorized 802 1X port the switch requests the client s identity In this situation the client does not respond to the request the port remains in the unauthorized state and the client is not granted access to the network In contrast when an
44. ch configuration 1 Please enter into switch web main screen and choose Enable in Management status field It will enable the stack function of the switch and the following screen appears IP Stacking Current mode Digable Management status Disable Management mode IP Stacking group plan System priority 100 IPStacking MAC 08 DA 71 57 2D D1 Stack name Switch 2 Then assign a role to the WGSW 2840 as Master in Management mode field the following screen appears IP Stacking Current made Master Management status Enable v Management mode Master i IF Stacking group planet switch System priority hoo oo IPStacking MAC 08 07 FO F7 D 17 Stack name Swith 3 Enter a string in the IP Stacking Group field the default string of the WGSW 2840 5240 is planet_switch This string must be the same with the Client switches that to be assigned to the same IP Stack group 4 Modify the System priority and Stack name if necessary At this sample we change the Stack name of the Master to Switch 1 5 Click OK if the configuration is down e Client Switch configuration 6 Please enter into Client switch web main screen and choose Enable in Management status field It will enable the stack function of the switch 7 Then assign a role to the WGSW 2840 as Client in Management mode field the following screen appears IP Stacking
45. d File System Domain Controller Security Policy Domain Security Policy Event Viewer Licensing Local Security Policy Performance Routing and Remote Access Services Telnet Server Administration Enter Active Directory Users and Computers create legal user data the next right click a user what you created to enter properties and what to be noticed TsInternetUser Properties 3 2 x 1 Active Dire 1g console Memberor Diin Emme Sessions Action Yer Remote control Teminal Services Profile lA mer General Address Account Profie Telephones Organization 3 User logon nar Active Direct E wireless Test Planet com tw Buti jeer logon name pre Windows 2000 gi Dom MYA Tsirtemetisor w Fore AGS does eed ey Accourt optiore Log On To 6 Thelast run your 802 1X Client 4 7 6 3 802 1X Client Configuration Windows XP is originally 802 1X support As to other operating systems windows 98SE ME 2000 an 802 1X client utility is needed The following procedures show how to configure 802 1X Authentication in Windows XP Please note that if you want to change the 802 1x authentication type of a wireless client i e switch to EAP TLS from EAP MD5 you must remove the current existing wireless network from your preferred connection first and add it in again e Configure Sample EAP MD5 Authentication 1 Goto Start Contro
46. dentify the group ASNMP device or agent may belong to more than one SNMP community It will not respond to requests from management stations that do not belong to one of its communities SNMP default communities are Write private Read public 4 2 2 2 SNMP Configuration To configure SNMP management click on System SNMP menu button and the web main page changes to the SNMP Management function as shows in the following SNMP Management SNMP Agent Status Configuration SNMP Agent Status Enable Ok System Options System Name Switch System Location Contact Community Configuration Add community Current Communities Management Station Configuration Add Management Station Current Management Stations IP Address The followings are the description of the sub table 1 SNMP Agent Status Configuration This block enables to turn on SNMP Agent Enabled Disabled To turn on or turn off the SNMP function on the Switch SNMP Agent Status Configuration SNMP Agent Status Enable 2 System Options This table is to define the system name system location and the contact person of the switch These informations show in the SNMP software of the management workstation which helps to identify the switch that is looking into There are three fields in the system options configuration block System Name The system name of the switch which would show in the SNMP software System Lo
47. e des o ace io 32 AO ODADDIng TIGG uti o e eno cl 32 4 6 2 S0anning Tree CORNOUI AON usas cauere hated pas ipa ia 38 EOS EMG AOOl CO AION NEM RM 40 uc ECU RM Nr E 41 AS MEAN M 41 ARE MACS AQU SS DIO ERES 50 ARS MAS Aodress FIlterHlleb A as 51 AA MAG ADOOS LEANING ta 52 4 759 MAG AodlessAgihno TIMO a di tie ae 53 4 7 6 802 1X Port Based Network Access Control essei seen 54 BAO T NNI ERRAT CREAN E E HERNDONEN 67 AB Understand QOS usato ete and d UO Eu A A a noh Gau uad 67 4e RO pudoris elie 68 4 9 ETC AGM si AA ias T3 T9 MGM SOO DING ld 73 BPD 2 Suc HOUUIBO F ON aasate secede tenes dd ita cato adds 75 210 RORTANA GIS aa 75 ALO RON ANAL SS AA es 75 AOL ORIO rar 76 TTL STORM CONTRO ir 17 AA SS TAC ce LEE 78 5 gt TROUBLE SHOOTIN Giotto t 83 SA INCORRECT CONNEGTIONS ats nias etc cado cia 83 Di lal daulty OO OSO CA OS IA AS AA t i ours aes 83 o 2 NON ES tanda ra Cables telum dd ta 83 5 1 3 Improper Network TODOIOGIGS aoi dai a ead eoa dua ad eau o ve on a di 83 9 2 DIAGNOSING LED INDICATORS 83 A ar ee a oe ee et ee ee oe eee ee 83 6 APPENDIX ue 85 oO CONSOLE PORT PINJASSIONMENTSs Sisi Dive lo 85 6 2 100BASE 7 APPENDIX B TX 10BASE T PIN ASSIGNMENTS 53 7 visi ioe nt DEO IG FUR dae da ai 802 1Q VLAN MULTI UNTAGGED VLAN S
48. e source MAC address Their presence is indicated by a value of 0x8100 in the Ether Type field When a packet s Ether Type field is equal to 0x8100 the packet carries the IEEE 802 1Q 802 1p tag The tag is contained in the following two octets and consists of 3 bits of user priority 1 bit of Canonical Format Identifier CFI used for encapsulating Token Ring packets so they can be carried across Ethernet backbones and 12 bits of VLAN ID VID The 3 bits of user priority are used by 802 1p The VID is the VLAN identifier and is used by the 802 1Q standard Because the VID is 12 bits long 4094 unique VLAN can be identified The tag is inserted into the packet header making the entire packet longer by 4 octets All of the information originally contained in the packet is retained 802 1Q Tag User Priority CFI VLAN ID VID 3 bits 1 bits 12 bits TPID Tag Protocol Identifier TCI Tag Control Information 2 bytes 2 bytes Preamble Destination Source VLAN TAG Ethernet Data FCS Address Address Type 6 bytes 6 bytes 4 bytes 2 bytes 46 1517 bytes 4 bytes The Ether Type and VLAN ID are inserted after the MAC source address but before the original Ether Type Length or Logical Link Control Because the packet is now a bit longer than it was originally the Cyclic Redundancy Check CRC must be recalculated Adding an IEEE802 1Q Tag Dest Addr Src Addr Length E type Old CRC Original Ethernet Dest Addr Src Addr E
49. eriodically check the multicast group for members that are no longer active In the case where there is more than one multicast router on a sub network one router is elected as the queried This router then keeps track of the membership of the multicast groups that have active members The information received from IGMP is then used to determine if multicast packets should be forwarded to a given sub network or not The router can check using IGMP to see if there is at least one member of a multicast group on a given subnet work If there are no members on a sub network packets will not be forwarded to that sub network IGMP Versions 1 and 2 Multicast groups allow members to join or leave at any time IGMP provides the method for members and multicast routers to communicate when joining or leaving a multicast group IGMP version 1 is defined in RFC 1112 It has a fixed packet size and no optional data The format of an IGMP packet is shown below IGMP Message Format Octets 0 8 1 6 31 Group Address all zeros if this is a query The IGMP Type codes are shown below Type Meaning 0x11 Membership Query if Group Address is 0 0 0 0 0x11 Specific Group Membership Query if Group Address is Present 0x16 Membership Report version 2 0x17 Leave a Group version 2 0x12 Membership Report version 1 IGMP packets enable multicast routers to keep track of the membership of multicast groups on their respective sub networks T
50. ght consecutive ports into a single dedicated connection This feature can expand bandwidth to a device on the network LACP operation requires full duplex mode more detail information refer to the IEEE 802 3ad standard Link aggregation can be used to increase the bandwidth of a network connection or to ensure fault recovery Link aggregation lets you group up consecutive ports into a single dedicated connection between any two of the Switches or other Layer 2 switches However before making any physical connections between devices use the Link Aggregation menu to specify the link aggregation on the devices at both ends When using a port link aggregation note that The ports used in a link aggregation must all be of the same media type RJ 45 100 Mbps fiber The ports that can be assigned to the same link aggregation have certain other restrictions see below Ports can only be assigned to one link aggregation The ports at both ends of a connection must be configured as link aggregation ports None of the ports in a link aggregation can be configured as a mirror source port or a mirror target port All of the ports in a link aggregation have to be treated as a whole when moved from to added or deleted from a VLAN The Spanning Tree Protocol will treat all the ports in a link aggregation as a whole Enable the link aggregation prior to connecting any cable between the switches to avoid creating a data loop Disconnect all link aggreg
51. h has memory in its VLAN table to store them Because some devices on a network may be tag unaware a decision must be made at each port on a tag aware device before packets are transmitted should the packet to be transmitted have a tag or not If the transmitting port is connected to a tag unaware device the packet should be untagged If the transmitting port is connected to a tag aware device the packet should be tagged Default VLANs The Switch initially configures one VLAN VID 1 called default The factory default setting assigns all ports on the Switch to the default As new VLAN are configured in Port based mode their respective member ports are removed from the default VLAN and Trunk Groups In order to use VLAN segmentation in conjunction with port trunk groups you can first set the port trunk group s and then you may configure VLAN settings If you wish to change the port trunk grouping with VLAN already in place you will not need to reconfigure the VLAN settings after changing the port trunk group settings VLAN settings will automatically change in conjunction with the change of the port trunk group settings 4 7 1 2 VLAN Configuration Port based VLAN Configuration Packets can only be broadcast among other members of the same VLAN group Note all unselected ports are treated as belonging to the default system VLAN If port based VLAN are enabled then VLAN tagging is ignored 1 On VLAN Configuration table
52. h has the lowest Bridge Identifier it will become the Root Bridge Forward Delay Timer The Forward Delay can be from 4 to 30 seconds This is the time any port on the Switch spends in the listening state while moving from the blocking state to the forwarding state once Observe the following formulas when setting the above parameters Max Age _ 2 x Forward Delay 1 second eee ee l o ee o X ee eee ee ee eee o l X ee ee o l l o i X o X i X X ee ee ee ee ee ee ee ee ee ee l l ee ee o s l ee ee eee ee ee ee eee ee ee ee ee ee ee ee ee eee c Port Priority A Port Priority can be from 0 to 255 The lower the number the greater the probability the port will be chosen as the Root Port Port Cost A Port Cost can be set from 0 to 65535 The lower the number the greater the probability the port will be chosen to forward packets 3 Illustration of STP A simple illustration of three switches connected in a loop is depicted in Figure 5 7 In this example you can anticipate some major network problems if the STP assistance is not applied If switch A broadcasts a packet to switch B switch B will broadcast it to switch C and switch C will broadcast it to back to switch A and so on The broadcast packet will be passed indefinitely in a loop potentially causing a network failure In this example STP breaks the loop by blocking the connection between switch B and C The decision to block a particular connect
53. he following outlines what is communicated between a multicast router and a multicast group member using IGMP A host sends an IGMP report to join a group A host will never send a report when it wants to leave a group for version 1 A host will send a leave report when it wants to leave a group for version 2 Multicast routers send IGMP queries to the all hosts group address 224 0 0 1 periodically to see whether any group members exist on their sub networks If there is no response from a particular group the router assumes that there are no group members on the network The Time to Live TTL field of query messages is set to 1 so that the queries will not be forwarded to other sub networks IGMP version 2 introduces some enhancements such as a method to elect a multicast queried for each LAN an explicit leave message and query messages that are specific to a given group The states a computer will go through to join or to leave a multicast group are shown below Non Member Leave Group Stop Timer Join Group Send Report Start Timer Leave Group Query Received Start Timer Delaying Member Idle Member Report Received Stop Timer E y Timer Expried C Send report IGMP State Transitions IGMP Snooping Configuration The default status of the IGMP Snooping function is disabled To turn on the IGMP Snooping select Enable of the IGM
54. he priority queue settings on the Switch are for all ports and all devices connected to the Switch will be affected This priority queuing system will be especially beneficial if your network employs switches with the capability of assigning priority tags VLAN Description A Virtual Local Area Network VLAN is a network topology configured according to a logical scheme rather than the physical layout VLAN can be used to combine any collection of LAN segments into an autonomous user group that appears as a single LAN VLAN also logically segment the network into different broadcast domains so that packets are forwarded only between ports within the VLAN Typically a VLAN corresponds to a particular subnet although not necessarily VLAN can enhance performance by conserving bandwidth and improve security by limiting traffic to specific domains A VLAN is a collection of end nodes grouped by logic instead of physical location End nodes that frequently communicate with each other are assigned to the same VLAN regardless of where they are physically on the network Logically a VLAN can be equated to a broadcast domain because broadcast packets are forwarded to only members of the VLAN on which the broadcast was initiated LL cree ile No matter what basis is used to uniquely identify end nodes and assign these nodes VLAN membership packets cannot cross VLAN without a network device performing a routing function between the VLAN
55. i A lt JC Bras dl Metworking amp Communication WGD 800 8 Port 10 100Mbps Managed Ethernet Switch A Trademarks Copyright PLANET Technology Corp 2005 Contents subject to which revision without prior notice PLANET is a registered trademark of PLANET Technology Corp All other trademarks belong to their respective owners Disclaimer PLANET Technology does not warrant that the hardware will work properly in all environments and applications and makes no warranty and representation either implied or expressed with respect to the quality performance merchantability or fitness for a particular purpose PLANET has made every effort to ensure that this User s Manual is accurate PLANET disclaims liability for any inaccuracies or omissions that may have occurred Information in this User s Manual is subject to change without notice and does not represent a commitment on the part of PLANET PLANET assumes no responsibility for any inaccuracies that may be contained in this User s Manual PLANET makes no commitment to update or keep current the information in this User s Manual and reserves the right to make improvements to this User s Manual and or to the products described in this User s Manual at any time without notice If you find information in this manual that is incorrect misleading or incomplete we would appreciate your comments and suggestions FCC Warning This equipment has been tested
56. ic MAC clear snmp community clear snmp trap clear spantree root clear trunk clear vlan 3 5 2 2 Copy command Clear ingress monitored port for mirror Clear router port Clear port statistics counter Clear rate shaping of all ports Restore spanning tree port cost to default value Restore spanning tree port priority to default value Clear strom limit of all ports Reset cos queue map to default Reset dot1p cos map to default Clear qos map mac cos map Clear qos map vlan cos map Clear radius share key Clear MAC filter entry Clear static MAC entry Clear snmp community entry Clear snmp trap management host Restore spanning tree parameters Clear trunk port from vlans Clear member from vlan Copy system configuration parameters to default value Clear strom limit of all ports Reset cos queue map to default Reset dot1p cos map to default Clear qos map mac cos map Clear qos map vlan cos map Clear MAC filter entry Clear static MAC entry Clear snmp community entry Clear snmp trap management host Restore spanning tree parameters Clear trunk port from vlans Clear member from vlan Once the configuration is changed it remains the original after a reboot unless the configuration is saved Copy command is to save the current configuration to the flash this saves the configuration to next reboot Command Description copy config flash 3 5 2 3 Disable command Copy system configuration parameters to flash Disa
57. in page of the web Console Information Data bits Bo Stop hits NEN Parity check none 0 0 Flow control Jnone Baud rate bps ETS 4 4 5 System Upgrade This function allows performing firmware update from the web interface Click on the System System Upgrade menu button and the following table shows in the main page of the web Click on the Browse button of the main page the system would pop up the file selection menu to choose firmware Select on the firmware and the Update Status would show the file upload status System Upgrade The File s Name Browse Update Status a ae 4 4 6 Saving Parameters It takes effect immediately when you change the parameters of the management function when the switch is running But the parameters would not be saved after reboot the swith To keep the changed parameters Click on the System Saving Parameters menu button and click on the Save button on the web main page as show in the following Parameters Saving D This operation will save all your parameters on the switch After reboot the switch all the parameters are still valid Save 4 4 7 Parameters Backup amp Recovery This function is to backup the running configuration to the workstation and to restore the configuration you had saved in the workstation Click on the System Backup amp Recovering menu button and the following table shows in the web main page Parameters B
58. ion is based on the STP calculation of the most current Bridge and Port settings Now if switch A broadcasts a packet to switch C then switch C will drop the packet at port 2 and the broadcast will end there Setting up STP using values other than the defaults can be complex Therefore you are advised to keep the default factory settings and STP will automatically assign root bridges ports and block loop connections Influencing STP to choose a particular switch as the root bridge using the Priority setting or influencing STP to choose a particular port to block using the Port Priority and Port Cost settings is however relatively straight forward LAN 1 Portcast 19 N gt Port 3 x Bridge ID 15 Port 2 E Portcast 4 A SSS Port 1 CES lt Portcast 4 Portcast 4 Portcast 4 N 1 pae B Port 1 C Pod Bridge ID 30 Bridge ID 20 Port 2 y Portcast 19 Portcast 19 gt Port 2 Port 3 A Portcast 19 _ LAN 2 lt lt LAN 3 9 Before Applying the STA Rules In this example only the default STP values are used LAN 11 A Port 3 Bo Root Bridge AA A Port 1 Port 2 lee Designated Port Designated Port Root Port Root Port gt B rons C Pott Designated Bridge Port2 Pota e Blocked LS Port 2 Port 3 1 P
59. l Panel double click on Network Connections 2 Right click on the Local Network Connection 3 Click Properties to open up the Properties setting window 4 3COM 3C940 Status General Support Connection Status Connected Duration 03 35 37 Speed 100 0 Mbps Acctrvity Received 146 938 760 110 212 126 Select Authentication tab Select Enable network access control using IEEE 802 1X to enable 802 1x authentication 4_ 3COM 3C940 Properties EJE3 General Authentication Advanced Select this option to provide authenticated network access for Ethernet networks Enable IEEE 802 1 authentication Far this network EAP type Protected EAP PEAP J MD5 Challenge Protected EAP FEAF Smart Card or other Certificate Authenticate as computer when computer information Is available Authenticate as quest when user or computer information is unavailable Select MD 5 Challenge from the drop down list box for EAP type Click OK When wireless client has associated with WGSW 2840 5240 a user authentication notice appears in system tray Click on the notice to continue LL Wireless Network Connection x Chck hereto enter your user name and password For the network PLANET AP TES 9 Enter the user name password and the logon domain that your account belongs 10 Click OK to complete the validation process Wireless Hetwork Connection User name test Password Logon d
60. le Enable Enable E c E e a 4 7 5 MAC Address Aging Time The Aging Time affects the learning process of the Switch Dynamic forwarding table entries which are made up of the source and destination MAC addresses and their associated port numbers are deleted from the table if they are not accessed within the aging time The aging time can be from 30 to 1 000 000 seconds with a default value of 300 seconds A very long aging time can result in dynamic forwarding table entries that are out of date or no longer exist This may cause incorrect packet forward indecisions by the Switch If the Aging Time is too short however many entries may be aged out too soon This will result in a high percentage of received packets whose source addresses cannot be found in the forwarding table in which case the switch will broadcast the packet to all ports negating many of the benefits of having a switch Static forwarding entries are not affected by the aging time To set the Aging Time enter the number in the MAC Address Aging Time field and click on the OK button to save The valid range is 30 1000 seconds Default is 300 seconds MAC Address Aging Time Configuration MAC Address Aging Timec30 10005 300 ox 4 7 6 802 1X Port Based Network Access Control 4 7 6 1 Theory Understanding IEEE 802 1X Port Based Authentication The IEEE 802 1X standard defines a client server based access control and authentication protocol
61. main page 5 5 Click on the Show VLAN Members button to show the VLAN members a ShowVLANMembers l 5 6 As shows in the following screen Show YLAN Member vin VLAN Name VLAN Member Delete Ports PEortS Port Porte Porti Port2 Port4 Port Delete Close 4 7 2 MAC Address Bind This function is based upon for the switch security When you add one MAC Address is bind with one port It remains in the switch s address table regardless of whether the device is physically connected to the switch This saves the switch from having to re learn a device s MAC address after it has been disconnected or powered off from the network and then reconnected at some time later If the Network station is connected with one port want to control the switch the station s MAC Address must be the same as one MAC Address To bind the MAC Address click on the Security MAC Address Binding menu button the main web page then shows the MAC Address Bind function table 1 Fill the MAC Address field with MAC address in the format xx xx xx Xx xx xx and choose the port to bind the MAC Address in the Port field 2 Click on the Add button 3 To remove the MAC Address binded by the port Simply click on the Delete button of the MAC Address in the Show MAC Address Table MAC Address Bind Bind New MAC Address MAC Address Port no E ll AF 48 3A 7E Partl Add Show Mac Address Table
62. mented in order to reduce the size of broadcast domains All packets entering a VLAN will only be forwarded to the stations over IEEE 802 1Q enabled switches that are members of that VLAN and this includes broadcast multicast and unicast packets from unknown sources VLAN can also provide a level of security to your network IEEE 802 1Q VLAN will only deliver packets between stations that are members of the VLAN Any port can be configured as either tagging or untagging The untagging feature of IEEE 802 1Q VLAN allows VLAN to work with legacy switches that don t recognize VLAN tags in packet headers The tagging feature allows VLAN to span multiple 802 1Q compliant switches through a single physical connection and allows Spanning Tree to be enabled on all ports and work normally Any port can be configured as either tagging or untagging The untagging feature of IEEE 802 1Q VLAN allow VLAN to work with legacy switches that don t recognize VLAN tags in packet headers The tagging feature allows VLAN to span multiple 802 1Q compliant switches through a single physical connection and allows Spanning Tree to be enabled on all ports and work normally Some relevant terms Tagging The act of putting 802 1Q VLAN information into the header of a packet Untagging The act of stripping 802 1Q VLAN information out of the packet header 802 1Q VLAN Tags The figure below shows the 802 1Q VLAN tag There are four additional octets inserted after th
63. n table 1 Fill the Port List field in the Broadcast Storm Restricting table select the type in the Restricting Type drop down menu and enter the packet size in the Flow field 2 Click on the OK button to save 3 To remove the Storm Restricting function on the port simpy click on the Delete button in the Show Port Restricting Table table Storm Restricting Broadcast Storm Restricting Port Listle g 1 3 7 Restricting Type Flowl6h4 80000Kbps Broadcast Add Show Port Restricting Table Restricting Type Flo ye Delete Broadcast only Delete Delete Broadcast only Delete Delete Broadcast Multicast And Flooded Delete Delete 4 12 IP Stacking 4 12 1 About IP Stacking IP Stacking function enables you to use a single IP address and standard network cabling to manage a group of up to 8 PLANET WSW 2401A WGSW 2840 5240 switches in the same IP subnet broadcast domain Once one switch had been operated as the Master of a stack additional switches can join the IP stack by manual methods to setting with the same group name After a switch becomes a Client and stack group member you can work through the Master switch to further configure the Member switch as necessary for all of the IP Stack features available in the switch IP Stack Group Management Made Master IP Address 1090 182 0 100 IP Slacking Group planel_switen M ster
64. n to create new VLAN groups with VID 2 and VID 3 6 T 8 9 At the Port 1 VLAN Port configuration page select VLAN 2 and VLAN 3 to add to the Port 1 The right information window at this table shows the status The screen in Figure 7 4 appears 802 10 VLAN Port Configuration Port 1 Link Type Always Untag FID Set Trunk Port for VLAN Lan Table VLAM with The Trunk Port LAN MAME Set VLAN s VID E Name p VLANName 0 Add Modify Figure 7 4 Assign Port 1 to be VLAN 2 and VLAN 3 member After the down the Port 1 VLAN configuration press close to back to the 802 1Q VLAN main screen And check if the setting be applied to Port 1 at the Egress Policy column The screen in Figure 7 5 appears 802 10 VLAN Port Link rome NN AG Policy IS A Figure 7 5 Port 1 VLA N status Assign the VLAN 2 and VLAN 3 group member At this case Port 2 had been assigned to as VLAN 2 group member and Port 3 be assigned to as VLAN 3 group member Repeat step 2 to step 7 expect that e Configure the Port 2 with PVID 2 Port 3 with PVID 3 e The link type of both Port 2 and Port 3 are Always Untag e And both Port 2 and Port 3 are VLAN 1 members 10 After properly configure the 802 1Q VLAN per port setting it should be as the screen in Figure 7 6 appears 802 10 VLAN port e u MU lt lt Untagqed 1 Port Link Type FID Egress Policy Figure 7 6 Port 1
65. ne PVID the range is 1 255 default PVID is 1 The PVID must be the same as the VLAN ID that the port was defined as belonging to in the VLAN group or the untagged traffic will be dropped 1 Select 802 1Q VLAN in the VLAN Type field and click on the OK button YLAN Configuration VLAN Typed 802 10 VLAN ok The main page then changes to the 802 1Q VLAN table which displays the VLAN configuration of each port 802 10 VLAN Part Link Type PID Egress Policy Porti Access Untageed 1 meet SS Ea Access Untazaed I Porta Access Untazaed I 2 If you want to configure port 2 to be in a VLAN other than default VLAN Double click on port2 to enter into VLAN port configuration window 802 10 YLAN Port Configuration Port 2 Link Type Access y E PTE i DR ee Trunk Port me VLAN SS ie eee Vv LAN VLAN with The Trunk Port The Trunk Part LAN MAME LAN MAME detault lan Delete Set VLAN s VID Name VID VLAM Name Add Mod Delete 3 Choose the Link Type in the drop drop down menu Access Always Untag or Trunk Note that if the Access type is chosen it will strip the 802 1Q tag from all packets that out of this port On the other hand if the Trunk type is chosen it will put the VID number priority and other VLAN information into the header of all packets that out of this port And if the Always Untag type is chosen i
66. nfo show igmp snooping policy deny show igmp snooping show ip http server show ip telnet server show ipstack info show mirror show multicast router show port counter show port dot1x show port mac learning show port rate shaping show port spantree show port state show port storm limit show qos map cos queue map show qos map dot1p cos map show qos map mac cos map show qos map port cos map show qos map vlan cos map show qos queue egress policy show radius show security MAC aging show security filter MAC Description Show channel information Show console info Show dot1x local user information Show dot1x information Show igmp snooping group limit Show igmp snooping group policy Show igmp snooping information Show igmp snooping policy deny Show igmp snooping information Show http server information Show telnet server information Show ipstack info Show mirror information Show multicast router port information Show port counter information Show dot1x information Show MACs on certain port Show port ingress and egress rate shaping Show spantree information on ports Show port infomation Show port storm limit mode and rate Show qos map cos queue map Show qos map cos queue map Show qos map mac cos map Show each port s cos Show qos map vlan cos map Show qos queue egress policy Show radius information Show MAC aging time Show MAC filter entry show security mac learning show security static MAC show snmp
67. ng group limit Show igmp snooping group policy Show igmp snooping information Show igmp snooping policy deny Show http server information Show telnet server information Show ip stack information Show mirror information Show multicast router port information Show port counter information Show port dot1x information Show MACs on certain port Show port ingress and egress rate shaping Show port RSTP port role and protocol mode Show spantree information on ports show port state show port storm limit show qos map cos queue map show qos map dot1p cos map show qos map mac cos map show qos map port cos map show gos map vlan cos map show qos queue egress policy show radius show security MAC aging show security filter MAC show security mac learning show security static MAC show snmp show snmp rmon show spantree show syntax show system show trunk show version show vlan show vlan type Show port infomation Show port storm limit mode and rate Show qos map cos queue map Show qos map cos queue map Show qos map mac cos map Show each port s cos Show qos map vian cos map Show qos queue egress policy Show radius information Show MAC aging time Show MAC filter entry Show port security status Show static mac table information Show snmp information Show snmp rmon state Show spanning tree information Show basic help infomation Show system information Show trunk information Get last software version Sho
68. o packets Compliant devices can also strip priority tags from packets This priority tag determines the packet s degree of expeditiousness and determines the queue to which it will be assigned Priority tags are given values from 0 to 7 with O being assigned to the lowest priority data and 7 assigned to the highest The highest priority tag 7 is generally only used for data associated with video or audio applications which are sensitive to even slight delays or for data from specified end users whose data transmissions warrant special consideration The Switch allows you to further tailor how priority tagged data packets are handled on your network Using queues to manage priority tagged data allows you to specify its relative priority to suit the needs of your network There may be circumstances where it would be advantageous to group two or more differently tagged packets into the same queue Generally however it is recommended that the highest priority queue Queue 1 be reserved for data packets with a priority value of 7 Packets that have not been given any priority value are placed in Queue O and thus given the lowest priority for delivery A weighted round robin system is employed on the Switch to determine the rate at which the queues are emptied of packets The ratio used for clearing the queues is 4 1 This means that the highest priority queue Queue 1 will clear 4 packets for every 1 packet cleared from Queue 0 Remember t
69. omar FAE LOCAL 4 8 QoS 4 8 1 Understand QOS Quality of Service QoS is an advanced traffic prioritization feature that allows you to establish control over network traffic QOS enables you to assign various grades of network service to different types of traffic such as multi media video protocol specific time critical and file backup traffic QoS reduces bandwidth limitations delay loss and jitter It also provides increased reliability for delivery of your data and allows you to prioritize certain applications across your network You can define exactly how you want the switch to treat selected applications and types of traffic You can use QoS on your system to Control a wide variety of network traffic by Classifying traffic based on packet attributes Assigning priorities to traffic for example to set higher priorities to time critical or business critical applications Applying security policy through traffic filtering Provide predictable throughput for multimedia applications such as video conferencing or voice over IP by minimizing delay and jitter Improve performance for specific types of traffic and preserve performance as the amount of traffic grows Reduce the need to constantly add bandwidth to the network Manage network congestion QoS Terminology Classifier classifies the traffic on the network Traffic classifications are determined by protocol application source destination and so on Y
70. oot Port and the Designated Ports The following are the user configurable STP parameters for the switch level Parameter Description Default Value Bridge Identifier Not user A combination of the User set priority and 32768 MAC configurable the switch s MAC address except by setting priority The Bridge Identifier consists of two parts below a 16 bit priority and a 48 bit Ethernet MAC address 32768 MAC Priority A relative priority for each switch lower 32768 numbers give a higher priority and a greater chance of a given switch being elected as the root bridge Hello Time The length of time between broadcasts of 2 seconds the hello message by the switch Maximum Age Timer Measures the age of areceived BPDU fora 20 seconds port and ensures that the BPDU is discarded when its age exceeds the value of the maximum age timer Forward Delay Timer The amount time spent by a port in the 15 seconds learning and listening states waiting for a BPDU that may return the port to the blocking state The following are the user configurable STP parameters for the port or port group level Variable Description Default Value Port Priority A relative priority for each 32768 port lower numbers give a higher priority and a greater chance of a given port being elected as the root port Port Cost A value used by STP to evaluate paths 19 100Mbps Fast Ethernet ports STP calculates path costs and selects the 4 1000Mbps Gigabit Ethernet po
71. ort is a female DB 9 connector that enables a connection to a PC or terminal for monitoring and configuring the Switch Use the supplied RS 232 cable with a male DB 9 connector to connect a terminal or PC to the Console port The Console configuration out of band allows you to set Switch for remote terminal as if the console terminal were directly connected to it 3 2 Login in the Console Interface When the connection between Switch and PC is ready turn on the PC and run a terminal emulation program or Hyper Terminal and configure its communication parameters to match the following default characteristics of the console port Baud Rate 9600 bps Pole SOM ee Data Bits 8 Bits per second Parity none Stop Bit 1 Data bits Flow control None Parity Stop bits Flow contrat Restore Defaults coa o The settings of communication parameters After finished the parameter settings click OK When the prompt shows switch gt type for help or type enable for further configuration The system needs password for further configuration After the enable command the system asks for password please enter admin for the default password As shows in the following screen Module Module Protocol Protocol Protocol Hardware Protocol Hardware Protocol Hardware Protocol Hardware Protocol Hardware Protocol Hardware Protocol Hardware Protocol Hardware Protocol Hardware Protocol
72. ou can create and modify classifications The Switch then groups classified traffic in order to schedule them with the appropriate service level DiffServ Code Point DSCP is the traffic prioritization bits within an IP header that are encoded by certain applications and or devices to indicate the level of service required by the packet across a network Service Level defines the priority that will be given to a set of classified traffic You can create and modify service levels Policy comprises a set of rules that are applied to a network so that a network meets the needs of the business That is traffic can be prioritized across a network according to its importance to that particular business type QoS Profile consists of multiple sets of rules classifier plus service level combinations The QoS profile is assigned to a port s Rules comprises a service level and a classifier to define how theSwitch will treat certain types of traffic Rules are associated with a QoS Profile see above To implement QoS on your network you need to carry out the following actions 1 Define a service level to determine the priority that will be applied to traffic 2 Apply a classifier to determine how the incoming traffic will be classified and thus treated by the Switch 3 Create a QoS profile which associates a service level and a classifier 4 Apply a QoS profile to a port s 4 8 2 QOS Configuration QoS settings allow cu
73. ping Enable igmp snooping Disable Enable forward all leave when fastleave is disabled set igmp snooping group number set igmp snooping group policy set igmp snooping immediate leave set igmp snooping policy deny set ip http server disable set ip http server enable set ip telnet server disable set ip telnet server enable set ipstack enable set ipstack disable set ipstack group set ipstack mac addr set ipstack mode set ipstack system priority set mirror set mirror capture port set mirror monitored port egress set mirror monitored port ingress set multicast router set password set port disable set port duplex set port enable set port flow control set port mcheck rstp set port point to point set port rate shaping egress set port rate shaping ingress set port rate shaping egress set port rate shaping ingress set port spantree port num portco set port spantree port num portfa set port spantree port num portpr set port speed set port storm limit mode set port storm limit rate set port vlan type Set number of goups that a port can join in Set igmp snooping group policy Disable amp Enable igmp snooping immediate leave Set igmp snooping policy deny Disable http server Enable http server Disable telnet server Enable telnet server Set ipstack enable Set ipstack disable Set ipstack group STR Set ipstack mac addr Set ipstack mode master client Set ipstack system priority En
74. rk using Bridge Protocol Data Units BPDUs Each BPDU contains the following information The unique identifier of the switch that the transmitting switch currently believes is the root switch The path cost to the root from the transmitting port The port identifier of the transmitting port The switch sends BPDUs to communicate and construct the spanning tree topology All switches connected to the LAN on which the packet is transmitted will receive the BPDU BPDUs are not directly forwarded by the switch but the receiving switch uses the information in the frame to calculate a BPDU and if the topology changes initiates a BPDU transmission The communication between switches via BPDUs results in the following One switch is elected as the root switch The shortest distance to the root switch is calculated for each switch A designated switch is selected This is the switch closest to the root switch through which packets will be forwarded to the root A port for each switch is selected This is the port providing the best path from the switch to the root switch Ports included in the STP are selected Creating a Stable STP Topology It is to make the root port a fastest link If all switches have STP enabled with default settings the switch with the lowest MAC address in the network will become the root switch By increasing the priority lowering the priority number of the best switch STP can be forced to select the best switch as the root switch
75. rts path with the minimum cost as the active path Default Spanning Tree Configuration Feature Default Value Enable state STP enabled for all ports Port priority 128 Port cost 19 Bridge Priority 32 768 User Changeable STA Parameters The Switch s factory default setting should cover the majority of installations However it is advisable to keep the default settings as set at the factory unless it is absolutely necessary The user changeable parameters in the Switch are as follows Priority A Priority for the switch can be set from O to 65535 0 is equal to the highest Priority Hello Time The Hello Time can be from 1 to 10 seconds This is the interval between two transmissions of BPDU packets sent by the Root Bridge to tell all other Switches that it is indeed the Root Bridge If you set a Hello Time for your Switch and it is not the Root Bridge the set Hello Time will be used if and when your Switch becomes the Root Bridge e e e o e e e s o o s o o i o o e i o o i o o i i o i i o i o o i s o s s X e s s o i o ee s o o s o o o s o s s o o s s o ee ee e s ee e s l o i l o o i l i i o o o i X o s o o o o o o i o o o o o M 4 Max Age The Max Age can be from 6 to 40 seconds At the end of the Max Age if a BPDU has still not been received from the Root Bridge your Switch will start sending its own BPDU to all other Switches for permission to become the Root Bridge If it turns out that your Switc
76. snmp rmon Set the queue number of each cos Set the cos value of each dot1p priority Set MAC based qos Set port s cos Set vlan based qos Set the egress policy Set share key for radius server Set radius server parameters Set RSTP force version Set MAC aging time Create MAC filter entry Set port leanrning MAC enableldisable Create static MAC entry Enable Disable snmp agent Set snmp community string Enable Disable rmon state Set snmp trap receive host Disable spanning tree Enable spaning tree Set the forward delay for the spanning tree Set the hello interval for the spanning tree Set the max age interval for the spanning Set the bridge priority for the spanning tree Set system contact Set default gateway Set system ip mask Set system location Set system mac address Specify a vlan for system management Set system name Set vlan trunk port Set vlan name Set vlan members Set vlan port mode Set system be port based vlan Set system be dot1q based vlan Enable Disable rmon state set snmp trap set spantree disable 3 5 2 6 Show command Set snmp trap receive host Disable spanning tree Show command is to display the current parameter of the switch functions The follow table lists the show commands and the equivalent usages Command show channel show console info show dot1x local userlnfo show dot1x state show igmp snooping group number show igmp snooping group policy show igmp snooping i
77. stomization of packet priority in order to facilitate delivery of data traffic that might be affected by latency problems The IEEE 802 1p Priority specification uses 8 priority levels to classify data packets In 802 1p compliant devices a tag inserted into the packet header is used to identify the priority level of data packets The Switch supports four kinds of Traffic classifiers 802 1P Por MAC VLANs and four queues Do COS Priority classifiers of the Switch forward packet COS range is from 0 to 7 Seven is the i high class Zero is the less class The user may configure the mapping between COS and Traffic classifiers 1 MAC COS Mapping QoS settings allow customization of MAC address to Traffic classifiers 1 Fill the MAC Address field in the MAC CoS Mapping Configuration Table in the In the format XX XX XX XX XX XX 2 Fillthe mapping number in the CoS 0 7 field 3 Click on the OK button to save 4 Toremove the MAC CoS mapping item simply click on the Delete button in the Show MAC CoS Mapping table MAC CoS5 Mapping MAC Co5 Mapping Configuration MAC Address Cos 0 7 TETAI E L Foo e o SS Show MAC Co5 Mapping MAC Address Cos Delete MAC Cos Mapping MAC Address Cos 0 77 Mac Address Cas Delete OPIS Siete 2d E 7 Delete 2 VLAN COS Mapping QoS settings allow customization of VLAN ID to Traffic classifiers 1 2 3 4 Fill the VID 1
78. t status Port status Configuration Port List e g 1 3 7 Authenticate Status maximum account number 1 32 A Auto z j Auto Force Authorized Force Unauthorized Port status port Authenticate Status maximum account number current account number port 1 Auto 1 O port 2 Auto port 3 Auto port 4 Auto port 5 Auto port 6 Auto port y Auto port 8 Auto port Y Auto e Ooyo o Dor Set the Ports Authenticate Status to Force Authorized if the port is connected to the RADIUS server or the port is a uplink port that is connected to another switch Or once the 802 1X stat to work the switch might not be able to access the RADIUS server ooo ooo ooo ooo X X l ol ol olo X X l ooo ooo ooo ooo ooo 5 Create user data That step are different of Local Authenticate the establishment of the user data needs to be created on the Radius Server PC For example the Radius Server founded on Win2000 Server and then y Documents Programs Documents Settings Search Help Run Shut Down Accessories Administrative Tools Snagit 7 Startup winkt AF corn Internet Explorer Outlook Express y im ES p gii Ta a A Active Directory Domains and Trusts Active Directory Users and Computers Component Services Computer Management Configure Your Server Data Sources ODBC Distribute
79. t will strip the 802 1Q tag from all packets that out of the port But the port can be assigned to more than one VLAN group 4 Define the PVID for the port Set the port VLAN ID that will be assigned to untagged traffic on a given port This feature is useful for accommodating devices that you want to participate in the VLAN but that don t support tagging Link Type Access 5 Trunk configuration If the Trunk type is chosen please follow the steps to set the Trunk of the port 5 1 Add and define the names and VIDs for new VLANs The VID number ranges from 2 to 4094 Fill the VID field and the VLAN Name field in the Set VLAN s VID amp Name table and click on the Add Modify button to save Set LAN s VID amp Name LAN Name LANZ Add Modity Delete 5 2 The added new VLAN then shows the the VLAN Table field in the Set Trunk Port for VLAN table q Trunk Port for YLAN VLAN Table LAN with The Trunk Port LAN NAME LAN MAME etault vlan r LAN _ Delete 5 3 Select on the VLAN chich you want to tag with in the VLAN Table field and click on the Add button to add This will add the VLAN in to the VLAN with The Trunk Port field Trunk Port for v LAN Lan Table Lan with The Trunk Port r LAN NAME LAN MAME afault vlan Delete 5 4 Click on the close button to close the VLAN port configuration table of port 2 and back to the 802 1Q
80. te Delete 4 Management Station Configuration A trap manager is a management station SNMP application that receives traps the system alerts generated by the switch If no trap manager is defined no traps are issued Create a trap manager by entering the IP address of the station and a community string Enter Network management stations IP address 192 168 0 53 for example Trap Community must be the same string as Add community Then click on Add button Management Station Configuration Add Management Station Current Management Stations IP Address 192 168 0 53 m Community private Delete The Current Management Stations field shows the trap list Management Station Configuration Add Management Station Current Management Stations 192 160 0 53 private IP Address rap Community Add Delete 4 4 3 Password The Password management menu is to set or change the password of the Web Management Interface Click on System Password menu button and the Modify Password table shows in the main web page Enter old password new password confirm password Click OK to change the password Modify Password Old Password Mew Password Confirm Password 4 4 4 CONSOLE This function shows the connection parameters for the Console Management Interface Click on the System CONSOLE menu button and the following table shows in the ma
81. ted cable If the RJ 45 connector is not correct pin on right position then the link will fail For fiber connection please notice that fiber cable mode and fiber module should be match 5 1 1 Faulty or loose cables Look for loose or obviously faulty connections If they appear to be OK make sure the connections are snug IF that does not correct the problem try a different cable 5 1 2 Non standard cables Non standard and miss wired cables may cause numerous network collisions and other network problem and can seriously impair network performance A category 5 cable tester is a recommended tool for every 100Base T network installation 5 1 3 Improper Network Topologies It is important to make sure that you have a valid network topology Common topology faults include excessive cable length and too many repeaters hubs between end nodes In addition you should make sure that your network topology contains no data path loops Between any two ends nodes there should be only one active cabling path at any time Data path loops will cause broadcast storms that will severely impact your network performance 5 2 Diagnosing LED Indicators The Switch can be easily monitored through panel indicators to assist in identifying problems which describes common problems you may encounter and where you can find possible solutions IF the power indicator does turn on when the power cord is plugged in you may have a problem with power outlet
82. that restricts unauthorized clients from connecting to a LAN through publicly accessible ports The authentication server authenticates each client connected to a switch port before making available any services offered by the switch or the LAN Until the client is authenticated 802 1X access control allows only Extensible Authentication Protocol over LAN EAPOL traffic through the port to which the client is connected After authentication is successful normal traffic can pass through the port This section includes this conceptual information e Device Roles e Authentication Initiation and Message Exchange e Ports in Authorized and Unauthorized States H Device Roles With 802 1X port based authentication the devices in the network have specific roles as shown below E Sri server T switch Aja 2 Workstations ic c E clients m Ol p A Authentication r 0 A e Client the device workstation that requests access to the LAN and switch services and responds to requests from the switch The workstation must be running 802 1X compliant client software such as that offered in the Microsoft Windows XP operating system The client is the supplicant in the IEEE 802 1X specification Authentication server performs the actual authentication of the client The authentication server validates the identity of the client and notifies the switch whether or not the client is authorized to access the
83. twork management messages and must return to the blocking state first A port transitions from one state to another as follows From initialization switch boot to blocking From blocking to listening or to disabled From listening to learning or to disabled From learning to forwarding or to disabled From forwarding to disabled From disabled to blocking Switch Blocking o Cusen Disable d Learning Lu Fowardng STP Port State Transitions You can modify each port state by using management software When you enable STP every port on every switch in the network goes through the blocking state and then transitions through the states of listening and learning at power up If properly configured each port stabilizes to the forwarding or blocking state No packets except BPDUs are forwarded from or received by STP enabled ports until the forwarding state is enabled for that port 2 STP Parameters STP Operation Levels The Switch allows for two levels of operation the switch level and the port level The switch level forms a spanning tree consisting of links between one or more switches The port level constructs a spanning tree consisting of groups of one or more ports The STP operates in much the same way for both levels Q oce On the switch level STP calculates the Bridge Identifier for each switch and then sets the Root Bridge and the Designated Bridges On the port level STP sets the R
84. ty 0 61440 the default setting is 32768 Rapid Spanning Tree Bridge Configuration Rapid Spanning Tree Status Enable Force Protocol Version 2 Max Age 6 40s Po Hello Time 105 2 Forward Delay 4 30s TES Bridge Priority 0 61440 Bza o ox 2 Bridge Information The informations of the STP Root show in the Bridge Information table Bridge Information Bridge Priority 32768 Bridge Mac oo 00 01 01 02 02 Path Cost o Port MA Bridge MAX age al Bridge Hello Time Bridge Forward Delay 3 STP Port Configuration On the STP port configuration the settings are implemented on a per user defined Group of ports RSTP Port Configuration Path Casti de Port List e g 1 3 7 Edge Port ver Status 200000000 0 means ds a Auta o gt The following fields can be set for STP port configuration Edge Port Defines if this port connected directly to a single workstation or this port that is directly connected to a LAN segment where a loop cannot be created For example this port is connected to a PC Print Server IP camera or any other network end node device Since end nodes cannot cause forwarding loops they can pass directly through to the spanning tree forwarding state There are two selections for this function True This port connected directly to a end node device or LAN segment where a loop cannot be created False This port connected to one or more LAN segments ma
85. type Length E type New CRC New Tagged Packet Wg NJ CFI VLAN ID Port VLAN ID Packets that are tagged are carrying the 802 1Q VID information can be transmitted from one 802 1Q compliant network device to another with the VLAN information intact This allows 802 1Q VLAN to span network devices and indeed the entire network if all network devices are 802 1Q compliant Every physical port on a switch has a PVID 802 1Q ports are also assigned a PVID for use within the switch If no VLAN are defined on the switch all ports are then assigned to a default VLAN with a PVID equal to 1 Untagged packets are assigned the PVID of the port on which they were received Forwarding decisions are based upon this PVID in so far as VLAN are concerned Tagged packets are forwarded according to the VID contained within the tag Tagged packets are also assigned a PVID but the PVID is not used to make packet forwarding decisions the VID is Tag aware switches must keep a table to relate PVID within the switch to VID on the network The switch will compare the VID of a packet to be transmitted to the VID of the port that is to transmit the packet If the two VID are different the switch will drop the packet Because of the existence of the PVID for untagged packets and the VID for tagged packets tag aware and tag unaware network devices can coexist on the same network A switch port can have only one PVID but can have as many VID as the switc
86. uired device it means it will not work till it is powered If your networks should active all the time please consider using UPS Uninterrupted Power Supply for your device It will prevent you from network data loss or network downtime 2 n some area installing a surge suppression device may also help to protect your switch from being damaged by unregulated surge or current to the Switch or the power adapter 2 2 Install the Switch This section describes how to install the Ethernet Switch and make connections to it Please read the following topics and perform the procedures in the order being presented 2 2 1 Desktop Installation To install the Switch on desktop or shelf please follows these steps Step1 Attach the rubber feet to the recessed areas on the bottom of the switch Step2 Place the switch on the desktop or the shelf near an AC power source Step3 Keep enough ventilation space between the switch and the surrounding objects Note When choosing a location please keep in mind the environmental restrictions discussed in Chapter 1 Section 4 in Specification Step4 Connect the Switch to network devices A Connect one end of a standard network cable to the 10 100 1000 RJ 45 ports on the front of the Switch B Connect the other end of the cable to the network devices such as printer servers workstations or routers etc BS Note Connection to the Switch requires UTP Category 5 network cabling with RJ 45 tips
87. vent of a failure of the primary link Once the Spanning Tree Protocol is configured and enabled primary links are established and duplicated links are blocked automatically The reactivation of the blocked links at the time of a primary link failure is also accomplished automatically without operator intervention This automatic network reconfiguration provides maximum uptime to network users However the concepts of the Spanning Tree Algorithm and protocol are a complicated and complex subject and must be fully researched and understood It is possible to cause serious degradation of the performance of the network if the Spanning Tree is incorrectly configured Please read the following before making any changes from the default values The Switch STP performs the following functions Creates a single spanning tree from any combination of switching or bridging elements Creates multiple spanning trees from any combination of ports contained within a single switch in user specified groups Automatically reconfigures the spanning tree to compensate for the failure addition or removal of any element in the tree Reconfigures the spanning tree without operator intervention Bridge Protocol Data Units For STP to arrive at a stable network topology the following information is used The unique switch identifier The path cost to the root associated with each switch port The por tidentifier STP communicates between switches on the netwo
88. w vlan information Show current vlan type 3 5 2 Privileged Command To access to the second level enter the enable command in the first level The sysem then prompt for a password Please enter password for the password The promt then changes to Switch enable gt Entering a question mark at the prompt displays the list of commands available for command mode 3 5 2 1 Clear command Clear command is to clear the parameter The follow table lists the clear commands and the equivalent usages Command clear channel clear dot1x local userlnfo clear igmp snooping policy deny clear mirror monitored port egress Description Clear member from channel Clear igmp snooping group policy Clear igmp snooping policy deny Clear egress monitored port for mirror clear mirror monitored port ingress clear multicast router clear port counters clear port rate shaping clear port spantree portcost clear port spantree portpri clear port storm limit clear qos map cos queue map clear qos map dot1p cos map clear qos map mac cos map clear qos map vlan cos map clear radius key clear security filter MAC clear security static MAC clear snmp community clear snmp trap clear spantree root clear trunk clear vlan copy config flash clear port storm limit clear qos map cos queue map clear qos map dot1p cos map clear qos map mac cos map clear qos map vlan cos map clear security filter MAC clear security stat
89. ybe a ethernet switch or HUB that a loop might be occured P2P Status Enables or disables the device to establish a point to point link or specifies for the device to automatically establish a point to point link A P2P port is also capable of rapid transition P2P ports may be used to connect to other bridges Under RSTP all ports operating in full duplex mode are considered to be P2P ports unless manually overridden through configuration The link type attached to this port could be selected as following Auto The switch automatically determines if the interface is attached to a point to point link or to shared media True A connection to exactly one other bridge False A connection to two or more bridges Port Priority Defines if this port is more or less likely to become the root port The range is from O to 255 the default setting is 128 The lower number has the highest priority Path Cost Specifies the path cost of the port The switch uses this parameter to help determine which port will become a forwarding port Lower numbers will be used as forwarding ports first The range is from O to 65535 The default values based on IEEE802 1D are 10Mb s 50 600 100Mb s 10 60 1000Mb s 3 10 4 6 3 Link Aggregation The Link Aggregation Control Protocol LACP provides a standardized means for exchanging information between Partner Systems that require high speed redundant links Link aggregation lets you group up to ei
90. ype Max Length Connector 10BASE T Cat 3 4 5100 ohm UTP 100 m 328 ft RJ 45 100BASE TX Cat 5 100 ohm UTP 100 m 328 ft RJ 45 50 125 or 62 5 125 micron 100BASE FX core multimode fiber MMF 2 km 1 24 miles SC or ST 6 2 100BASE TX 10BASE T Pin Assignments With 100BASE TX 10BASE T cable pins 1 and 2 are used for transmitting data and pins 3 and 6 for receiving data RJ 45 Pin Assignments Pin Number Assignment 1 Tx 2 Tx 3 Rx 6 Rx Note and signs represent the polarity of the wires that make up each wire pair All ports on this switch support automatic MDI MDI X operation you can use straight through cables for all network connections to PCs or servers or to other switches or hubs In straight through cable pins 1 2 3 and 6 at one end of the cable are connected straight through to pins 1 2 3 and 6 at the other end of the cable The table below shows the 10BASE T 100BASE TX MDI and MDI X port pin outs Pin MDI X Signal Name MDI Signal Name 1 Receive Data plus RD Transmit Data plus TD 2 Receive Data minus RD Transmit Data minus TD 3 Transmit Data plus TD Receive Data plus RD 6 Transmit Data minus TD Receive Data minus RD 7 APPENDIX B B 802 1Q VLAN Multi Untagged VLAN setting sample 1 The version V 1 4 27 of WGSW 2840 had added the multiple untagged VLAN function on a port The function could be applied at if the members of two or more different VLAN groups all have to
91. ytes pe Rx correct packets of less than 64 bytes Rx correct packets of exceed 1518 bytes Rx error packets of less than 64 bytes Rx error packets of exceed 1518 T n 0 bytes Retresh 4 10 2 Port Mirror Port Mirroring is a method of monitoring network traffic that forwards a copy of each incoming and or outgoing packet from one port of a network switch to another port where the packet can be studied It enables the manager to keep close track of switch performance and alter it if necessary Configuring the port mirroring by assigning a source port from which to copy all packets and a sniffer port where those packets will be sent Capture Port Use this option to select the destination port for monitored traffic This is the port that your network analyzer would be connected to Ingress Port Duplicate the date transmitted from the source port and forward it to the Capture port Egress Port Duplicate the data sent to the source and forward it to the Capture port Port Mirror Flow Capture Configuration Capture Port Port Capture Status Enable OK Mirror Port Configuration Ingress Port Listle g 1 3 7 Egress Port Listi e g 1 3 7 es ee 4 11 Storm Control This function is to control the Braodcast Storm Multicast Storm and Flooded Storm packet on each port To configure the Storm Control click on the Storm Control menu button The web main page then shows the Strom Restricting functio
92. zu al t y IFX A k n Ma Eee be ECL i dels EM Camel PT Stacking Sack fame Sei ne 13 After setup complete please go to system and choose Saving parameters to save current configuration The following screen appears Td Be PEs AR ALEA eh geuwer Co alo en oo oa mae E lione a p Uo aramaeters Saving Sym cR TE ECCE SOR Ruanda TP A dimen a i i i his naeretar wil sase all nur paa ebar on Use sed Alter SOB a arn ra sete ell tha parameters sre stil valo Term l bills CONSOLE sy J Morageract Het p Pra Upgrade E map E E pigmeo Jeki E Ris NEY Lost Deft gro rere ET ea aT Redundancy aS Ese m Mirarse er Fon Analysis RED a a gm I E A A e E E E E E E E TRT Dor Please do not assign role for whole stack member Switch as client it cannot detect the Master device with minimum MAC address ew o o o o o o o o o o o ooo ooo cc o m o o sooo o o 5 TROUBLE SHOOTING This section is intended to help you solve the most common problems on the WSD 800 Managed Ethernet Switch 5 1 Incorrect connections The switch port can auto detect straight or crossover cable when you link switch with other Ethernet device For the RJ 45 connector should use correct UTP or STP cable 10 100Mbps port use 2 pairs twis

Download Pdf Manuals

image

Related Search

Related Contents

GUIA DO USUÁRIO - Support  第2章 情報公開制度の運用について  Manuel d`utilisation  be.ez 11" LA robe Air Chic Marine  DS-100A Durasensor® - Frank`s Hospital Workshop  Aimetis E-Series™ Physical Security Appliance Installation and User  Le journal - spssnl.qc.ca  Page 1 home performance cosmeceutical solution by mesoeste`nc    Descargar ficha técnica  

Copyright © All rights reserved.
Failed to retrieve file