Home
        Amer Networks SGR24W4 network switch
         Contents
1.             i SGP24VWV4 Converter Chassis  Copper Twisted  poit   _ Fiber Optic          SGR24W4       Fiber Optic     Lar a Naar    ee eee d S    oe q     Liber Opie A a k i    ii A AP a    Managed Media Converter a     rer Lg       o    br       Fiber ptic  oGR24Wv4       Copper Iwisted pair Links     Fiber Optic Links       Fig  2 10 Network Connection between Remote Site and Central Site    Fig  2 10 illustrates how the switches and the various devices form the  network infrastructure in a large scale network     21    User Manual        as    DE     cept The          Fig  2 12 Office Network Connection    22    User Manual    3  Basic Concept and  Management    This chapter will tell you the basic concept of features to manage this switch  and how they work     3 1  What s the Ethernet    Ethernet originated and was implemented at Xerox in Palo Alto  CA in 1973  and was successfully commercialized by Digital Equipment Corporation  DEC   Intel  and Xerox  DIX  in 1980  In 1992  Grand Junction Networks unveiled a new high  speed Ethernet with the same characteristic of the original Ethernet but operated at  100Mbps  called Fast Ethernet now  This means Fast Ethernet inherits the same  frame format  CSMA CD  software interface  In 1998  Gigabit Ethernet was rolled  out and provided 1000Mbps  Now 10G s Ethernet is under approving  Although  these Ethernet have different speed  they still use the same basic functions  So they  are compatible in software and can connect each o
2.         carat MAC Address  00 40 c7 3c 00 00  RSTP    Serial Number 031801000001  802 1X   Active IP Address 192 168 1 1  IGMP Snooping IN Active Subnet Mask 255 255 255 0  EEN       Active Gateway 1192 168 1 254  Filter DHCP Server ENE  Rate Limit Lease Time Left 0 secs  Storm Control O an es  SNMP  Detailed Statistics        LACP Status DHCP Enabled O  SEIS Fallback IP Address  192 168 1 1  IGMP Status      Ping UN Fallback Subnet Mask  255 255 255 0           Warm Restart     pai             Factorv Default   y Management VLAN 1     lt    iut  gt       eat  Fig  2 9    First  IP Address  as shown in the Fig  2 9  enter    192 168 1 1     for instance   For sure  an IP address such as 192 168 1 x must be set on your PC     Second  Subnet Mask  as shown in the Fig  2 9  enter    255 255 255 0     Any  subnet mask such as 255 255 255 x Is allowable in this case     20    al      lt     User Manual    2 2  Typical Applications    The 24 Port GbE Web Smart Switch provides auto MDIX on its TP ports and  supports fiber types like  LC and BiDi LC SFP for removable modules on its four  slots  For more details on the specification of the switch  please refer to Appendix A     The switch is suitable for the following applications         Central Site Remote site application is used in carrier or ISP  See Fig  2 10       Peer to peer application is used in two remote offices  See Fig  2 11       Office network See Fig  2 12                 SGR24VW4       m m       e    A    Y      e  
3.    Ping l high ov  z PE SR in 8    Fig  4 23 DSCP Setting    74    User Manual  4 2 12 Filter    Function name   Filter Configuration  Function description     This function lets administrators easily set management source IP addresses  to the ports on the switch  After completing the settings  please press  lt Apply gt   button to make this function take effect     Parameter description     Source IP Filter     Mode   There are three types of mode in this drop down menu  Default is  disabled   Disabled    Allow all IP Address login to this switch and manage it   Static     Just allow the IP Address which set by administrator to login to this  switch and manage it      DHCP     Allow the IP Address get from DHCP server can login to this switch  and manage it     IP Address   Setting up the IP Address  it can be one IP Address or a LAN   IP Mask   Setting up the IP Subnet Mask related with the IP Address   DHCP Server Allowed     Just tick the check box  MI  under the port x to allow the DHCP Server  on this port and valid port is Port 1 24     Default  enable    79    User Manual  Filter Configuration    Source IP Filter DHCP Server    Allowed    ai 0  Aire MEN   ma E       Fig  4 24 Filter Configuration    76    User Manual  4 2 13 Rate Limit    Function name   Ingress and Egress Bandwidth Setting  Function description     Ingress and Egress Bandwidth Setting function are used to set up the limit of  Ingress or Egress bandwidth for each port     Parameter description   Ingre
4.   Port 23      IGMP Status d Port 12  i  j  Po 24 lo    Ping    Select All Apply    Warm Restart          Fig  4 8 Add or Remove VLAN Member    Delete Group     Just tick the check box  E  beside the ID  then press the  lt Delete gt   button to delete the group     Configuration A     System Information a  Port Based VLAN Configuration    Add a VLAN    VLAN Group    pr o E  Ada    VLAN Configuration List    Rate Limit   ee  Stacie Contrai lO E  1 2 3 4 5 6 7 8 9 10  11 12 13 14 15 16 17 18 19 20 21 22 23 24    sto lo   2  4 5 6 7 8  Monitoring    SIAR  Fig  4 9 Port Based VLAN Configuration          58    User Manual  4 2 5  Aggregation    The Aggregation  Port Trunking  Configuration is used to configure the  settings of Link Aggregation  You can bundle ports by same speed  MAC  and full  duplex to be a single logical port  thus the logical port can aggregate the bandwidth  of these ports  This means you can apply your current Ethernet equipments to build  the bandwidth aggregation  For example  if three Fast Ethernet ports are  aggregated into a logical port  then this logical port s bandwidth would be as three  times high as a single Fast Ethernet port s     Function name   Aggregation Configuration  Function description     Display the current setup of Aggregation Trunking  With this function  user is  allowed to add a new trunking group or modify the members of an existed  trunking group     Parameter description     Normal   Set up the ports that do not join any aggrega
5.   Ports  Porto      Port10  Port11   Port12  Port13   Port14   Port15  Port 16       lauthEntersConnecting  5 lauthEapLogoffsWhileConnecting lo  lauthEntersAuthenticating lo lauthAuthSuccessesWhileAuthenticating lo  lauthAuthTimeoutsWhileAuthenticating E authAuthFailWhileAuthenticating lo  lauthAuthEapStartsWhileAuthenticating lo lauthAuthEapLogoffWhileAuthenticating lo  authAuthReauths WhileAuthenticated lo lauthAuthEapStartsWhileAuthenticated lo   Sse    EE      Port 17 Port 18  Port19  Port20   Port21  Port22  Port23  Port 24                           authAuthEapLogoffWhileAuthenticated  0    lbackendResponses lo lbackendAccessChallenges lo  lbackendOtherRequestsToSupplicant la lbackendAuthSuccesses lo  backendAuthFails lo        dotixAuthEapolFramesRz lo   dot1xAuthEapolFramesTx 7   dot1xAuthEapolStartFramesRx lo   dot1xAuthEapolLogoffframesRx lo  dot1xAuthEapolRespIdFramesRx lo dot1xAuthEapolRespFramesRx lo  dot1xAuthEapolReqIdFramesTx la ldotixAuthEapolReqFramesTx lo  dot1xAuthInvalidEapolFramesRx lo  dot1xAuthEapLengthErrorFramesRx lo  ldotixAuthLastEapolFrameYersion lo  dotixAuthLastEapolFrameSource      Last Supplicant identity                      Fig  4 17 802 1X Statistics  Function name   802 1x Parameters  Function description     In here  user can enable or disable Reauthentication function and specify how  often a client has to re enter his or her username and password to stay  connected to the port     Parameter description   Reauthentication Enabled   Choose
6.   e Force Authorized    The controlled port is forced to hold in the authorized state   e Auto     The controlled port is set to be in authorized state or unauthorized  state depends on the result of the authentication exchange between  the authentication server and the supplicant     Default  Force Authorized  Port State   Show the port status of authorization   Re authenticate     Specify if subscriber has to periodically re enter his or her username and  password to stay connected to the port     Re authenticate All   Re authenticate for all ports in at once   Force Reinitialize   Force the subscriber has to reinitialize connected to the port     Force Reinitialize All     67    User Manual  Force Reinitialize for all ports in at once     802 1X Configuration    RADIUS UDP Port  1812  RADIUS Secret    eot Admin State Port State        Force Authorized     EE Down  Re authenticate authenticate  Force Reinitialize Reinitialize  Statistics     Force Authorized z  Force Authorized     Link Down Re authenticate authenticate  Force Reinitialize Reinitialize  Statistics     Force Authorized    Force Authorized z   Link Down  Re authenticate authenticate  Force Reinitialize Reinitialize  Statistics     Force Authorized    Force  Force Authorized        Link Down Re authenticate authenticate Force Reinitialize Reinitialize  Statistics     Force Authorized z  Force Authorized     Link Down Re authenticate authenticate Force Reinitialize  Statistics     Force Authorized    Force Auth
7.  1000Mbps LC  Multi Mode  SFP Fiber transceiver      1000Mbps LC  10km  SFP Fiber transceiver      1000Mbps LC  30km  SFP Fiber transceiver      1000Mbps LC  50km  SFP Fiber transceiver        1000Mbps BiDi SC  20km  1550nm SFP Fiber WDM transceiver  1000Mbps BiDi SC  20km  1310nm SFP Fiber WDM transceiver    10 100 1000Mbps TP is a standard Ethernet port that meets all IEEE  802 3 u x z Gigabit  Fast Ethernet specifications  1000Mbps SFP Fiber transceiver  is a Gigabit Ethernet port that fully complies with all IEEE 802 3z and 1000Base   SX LX standards     1000Mbps Single Fiber WDM  BiDi  transceiver is designed with an optic  Wavelength Division Multiplexing  WDM  technology that transports bi directional  full duplex signal over a single fiber simultaneously     e Key Features in the Device  Qos     The switch offers powerful QoS function  This function supports 802 1p  VLAN tag priority and DSCP on Layer 3 of network framework     VLAN     Supports Port based VLAN  IEEE802 1Q Tag VLAN  And supports 24 active  VLANs and VLAN ID 1 4094     Port Trunking     Allows one or more links to be aggregated together to form a Link  Aggregation Group by the static setting     User Manual    1 2  Checklist    Before you start installing the switch  verify that the package contains the  following         A24 Port GbE Web Smart Switch       Modules  optional        Mounting Accessory  for 19    Rack Shelf       This User s Manual in CD ROM       AC Power Cord    Please notify your sale
8.  Mirror   Qos   Filter z   Rate Limit H Down Port link down  Storm Control o Blocked Port Blocked by RSTP  Number is Partner port number if other switch has LACP enabled    SNMP      Monitoring si o Learning Port Learning by RSTP    Statistics Overview    Forwarding   Port link up and forwarding frames    Legend    RSTP Status LACP enabled    IGMP Status   Ping 1   Warm Restart LACP Port Status  Factorv Default w    Detailed Statistics z  gt  z   F  TACP Status o Forwarding Port link up and forwarding by RSTP  Number is Partner port number if other switch has    Fig  4 30 LACP Status    87    User Manual    4 3 4  RSTP Status    Function name   RSTP Status  Function description     Display RSTP status  Fig  4 28 shows you that RSTP window can present  VLAN bridge information and the status of all ports     Parameter description   RSTP VLAN Bridge Overview   VLAN Id   Show the VLAN Id   Bridge ld     Show this switch   s current bridge priority setting and bridge ID  which stands for the MAC address of this switch     Hello Time     Show the current hello time of the root bridge  Hello time is a time  interval specified by root bridge  used to request all other bridges   periodically sending hello message every    hello time    seconds to   the bridge attached to its designated port     Max Age    Show the root bridge   s current max age time   Fwd Delay    Show the root bridge s forward delay time   Topology    Show the root bridge   s spanning tree topology   Root Id     Sho
9.  Password     Set a password for this switch  Up to 16 characters are allowed in this  parameter  Any alphanumeric character is acceptable     Default  admin  Inactivity Timeout secs      Set the auto logout timer  The valid value is O   60 in the unit of minute  and a decimal point is not allowed  The value 0 means auto logout timer  is disabled     Default  O    53    User Manual    4 2 2  Port Configuration    Function name     Port Configuration    Function description   Port Configuration is applied for the settings of the ports on the switch  By this  function  you can set or reset the values for Mode and Flow Control   Parameter description   Enable Jumbo Frames     This function support jumbo frames of up to 9600 bytes  Just tick the  check box  M  to enable it     Default  disable  Link   Show link status of this port   Mode     Set the speed and duplex of the port  If the media is 1Gbps fiber  there  are three modes to choose  Auto Speed  1000 Full and Disable  If the  media is TP  the Speed Duplex is comprised of the combination of speed  mode  10 100 1000Mbps  and duplex mode  full duplex and half duplex   The following table summarized the function the media supports     Media type   NWay   Speed   Duplex       1000M TP ON OFF  10 100 1000M __  Full for all  Half for 10 100  1000M Fiber  ON OFF   1000M    In Auto Speed mode  no default value  In Forced mode  default value  depends on your setting     Flow Control     You can Just tick the check box  MM  to enable
10.  byte frames in good and bad packets transmitted   Tx 65 127 Bytes    Number of 65   126 byte frames in good and bad packets transmitted   Tx 128 255 Bytes    Number of 127   255 byte frames in good and bad packets transmitted   Tx 256 511 Bytes    Number of 256   511 byte frames in good and bad packets transmitted   Tx 512 1023 Bytes    Number of 512   1023 byte frames in good and bad packets transmitted   Tx 1024 Bytes     Number of 1024 max_length byte frames in good and bad packets  transmitted     Rx CRC Alignment    Number of Alignment errors and CRC error packets received   Rx Undersize    Number of short frames   lt 64 Bytes  with valid CRC   Rx Oversize     Number of long frames according to max_length register  with valid CRC     85    User Manual    Rx Fragments     Number of short frames   lt  64 bytes  with invalid CRC     Rx Jabber     Number of long frames according tomax_length register  with invalid    CRC   Rx Drops     Frames dropped due to the lack of receiving buffer     Tx Collisions     Number of collisions transmitting frames experienced     Tx Drops     Number of frames dropped due to excessive collision  late collision  or  frame aging     Tx Overflow     Number of frames dropped due to the lack of transmitting buffer     a  System Information  Ports  VLANs    VLAN Mode    VLAN Group    IGMP Snooping  Mirror   Qos   Filter   Rate Limit  Storm Control  SNMP    Monitoring O  Statistics Overview   LACP Status   RSTP Status   IGMP Status   Ping y  Warm R
11.  can be total bandwidth  types of service of a  port with many steps  The switch supports by port Ingress and Egress total  bandwidth rate control capacity  The bandwidth rate resolution is 0 1 Mbps   100Kbps  and ranges from 0 to 100Mbps     38    User Manual    3 5  Virtual LAN  What is a VLAN     It is a subset of a LAN  Before we discuss VLAN  we must understand what  LAN is  In general  a LAN is composed of different physical network segments  bridged by switches or bridges which attach to end stations in the same broadcast  domain  The traffic can reach any station on the same LAN  Beyond this domain   the traffic cannot go without router   s help  This also implies that a LAN is limited  If  you need to communicate with the station outside the LAN  a router is needed  which always lies on the edge of the LAN     For a layer 2 VLAN  it assumes it is a logical subset of a physical LAN  separated by specific rules such as tag  port  MAC address and so on  In other  words  they can communicate with each other between separated small physical  LANs within a LAN but can not be between any two separated logical LANs             a         ini Frame               Mini Computer    Ethernet Sw tC       _ tees BACKBONE        itch        Switch       Ethernt          ES     ery       et Switck      ler       a    a Jr Printer    Y   gt    gt    gt          a     P    Printer g ma  m       O O    au AREA  gt     Workstation          Fig  3 7    In the figure above  all stations are
12.  flow control  If flow control  is set Enable  both parties can send PAUSE frame to the transmitting  device s  if the receiving port is too busy to handle  When it is set  Disable  there will be no flow control in the port  It drops the packet if too  much to handle     Default  Disable    54    User Manual  ADE  Port Configuration    System Information    Enable Jumbo Frames        fs support jumbo frames of up to 9600 bytes        VLAN Group  Aggregation  LACP  RSTP Ru Flow Control  IGMP Snooping j      Rate Limit   Storm Control  SNMP   Statistics Overview  Detailed Statistics  LACP Status   RSTP Status    IGMP Status ed Auto Speed o Speed Y          11 MA auto speed v  Auto Speed    Warm Restart   Auto Speed       Factorv Default i o Domn   Auto Speed        Fig  4 4 Port Configuration    1  2      4  5  6     8  9    pal  al       ojololojololojolojolojola       4 2 3  VLAN Mode Configuration    Web Smart Switch supports Port based VLAN and Tag based VLAN  802 1q    Its VLAN mode supports 24 active VLANs and the available VLAN ID range is from  1 4094  VLAN configuration is used to divide a LAN into smaller ones  With proper  configuration  you can gain not only improved security and increased performance   but also save a lot of VLAN management effort     Function name   VLAN Mode Setting  Function description     The VLAN Mode Selection function includes four modes  Port based  Tag   based  Metro mode or Disable  you can choose one of them by pulling down  list and pr
13.  non zero VID for the incoming packets  then  assign the PVID to the incoming packets as VID for the classification of  the VLAN group    2  If the VID is not a null VID  VID40   then use the value to classify the VLAN group     Egress Rule     An egress list is used to make the tagging and forwarding decision on an  outgoing port  It specifies the VLANs whose packets can be transmitted out and  specifies if the packet should be tagged or not  It can be configured for port   s VLAN  membership  and tagged or untagged for a transmitted packet  When a packet is  transmitted out  the VLAN bridge checks the port   s egress list  If the VLAN of the  packet is on the egress list of the port on which the packet transmits out  the packet  will be transmitted with the priority accordingly  If enabled  an egress port will  transmit out a tagged packet if the port is connected to a 802 1Q compliant device   If an egress port is connected to a non 802 1Q device or an end station  VLAN  bridge must transmit out an untagged packet  i e  the tag has been stripped off in an  egress port  Egress rule can be set by per port     Independent VLAN Learning  IVL      It specifies the mode how to learn MAC address  For a specified VLAN  it will  use an independent filtering database  FID  to learn or look up the membership  information of the VLAN and decide where to go     Shared VLAN Learning  SVL      It specifies the mode how to learn MAC address  In this mode  some VLAN  or all VLANs use the s
14.  one sends the frame first  and the second sends the frame  in worst   case  just before the frame from the first device arrives  The collision happens and  will be detected by the second device immediately  Because of the medium delay   this corrupted signal needs to spend some time to propagate back to the first device   The maximum time to detect a collision is approximately twice the signal  propagation time between the two most distant devices  This maximum time is  traded off by the collision recovery time and the diameter of the LAN     In the original 802 3 specification  Ethernet operates in half duplex only   Under this condition  when in 10Mbps LAN  it s 2500 meters  in 100Mbps LAN  it   s  approximately 200 meters and in 1000Mbps  200 meters  According to the theory  it  should be 20 meters  But it s not practical  so the LAN diameter is kept by using to  increase the minimum frame size with a variable length non data extension bit field  which is removed at the receiving MAC  The following tables are the frame format  suitable for 10M  100M and 1000M Ethernet  and some parameter values that shall  be applied to all of these three types of Ethernet     Actually  the practice Gigabit Ethernet chips do not feature this so far  They  all have their chips supported full duplex mode only  as well as all network vendors   devices  So this criterion should not exist at the present time and in the future   The switch   s Gigabit module supports only full duplex mode     4
15.  port can access the network  If  the authenticator receives a Radius Access Reject  it will send an  EAP Failure to the supplicant  This means the supplicant is failed to  authenticate  The port it connected is in the unauthorized state  the  supplicant and the devices connected to this port won t be allowed  to access the network     When the supplicant issue an EAP Logoff message to    65    User Manual  Authentication server  the port you are using is set to be  unauthorized     Port connect       Access blocked  FAPOL Mart EAPOL  Authenticator  EAP Requestidentity    Radius 4ccess Request  EAP Response ldentity    Radius 4ccess Challenge  EAP Request          S   SS_   a_   Sa 5_                EAP Response  cred  Radius  4ccess Request    Sho EEEE Radius 4ccess Accept    EAP Fallure    EAP Logotff     _   _   _   _      MMMMXMM  M  M  M  M  M  M  M  M  M  M  M  M       lt    lt    lt    lt    lt    lt  XK        Access allowed       Fig  4 15    The 802 1X    Enabled    is the type of authentication supported in the switch  In  this mode  for the devices connected to this port  once a supplicant is authorized   the devices connected to this port can access the network resource through this  port     802 1x Port based Network Access Control function supported by the switch  is little bit complex  for it just support basic    Enabled    mode  which can distinguish  the device s MAC address and its VID  The following table is the summary of the  combination of the authenti
16.  render the LAN to work poorly     User Manual    2 1 2 1  Cabling Requirements for TP Ports      gt  For Fast Ethernet TP network connection      The grade of the cable must be Cat  5 or Cat  5e with a maximum length of  100 meters     Gigabit Ethernet TP network connection      The grade of the cable must be Cat  5 or Cat  5e with a maximum length of  100 meters  Cat  5e is recommended     2 1 2 2  Cabling Requirements for 1000SX LX SFP Module    It is more complex and comprehensive contrast to TP cabling in the fiber  media  Basically  there are two categories of fiber  multi mode  MM  and single  mode  SM   The later is categorized into several classes by the distance it supports   They are SX  LX  LHX  XD  and ZX  From the viewpoint of connector type  there  mainly are LC and BIDI SC         Gigabit Fiber with multi mode LC SFP module      Gigabit Fiber with single mode LC SFP module      Gigabit Fiber with BiDi SC 1310nm SFP module      Gigabit Fiber with BiDi SC 1550nm SFP module    The following table lists the types of fiber that we support and those else not  listed here are available upon request     Multi mode Fiber Cable and Modal Bandwidth  Multi mode 62 5 125um Multi mode 50 125um    Modal Distance Modal Distance  Bandwidth Bandwidth  160MHz Km 400MHz Km 500m  200MHz Km 500MHz Km 550m    Single mode Fiber 9 125um    Single mode transceiver 1310nm 10Km  Single mode transceiver 1550nm 30  50Km    Single Mode X Transmit  1310nm   20Km RX Receive  1550nm   Single F
17.  set by per port  When  receiving a packet  VLAN bridge examines if the VID in the frame   s header presents     If the VID of the received packet presents  the VID of the packet is used  And  VLAN bridge will check its MAC address table to see if the destination ports are  members of the same VLAN  If both are members of the tagged VLAN  then the  packet will be forwarded     If the packet is an untagged or a null tag packet  the ingress ports PVID is  applied to the packet  VLAN bridge will then look up the MAC address table and  determine to which ports the packet should be forwarded  Next  it will check to see if  the destination ports belong to the same VLAN with that PVID  If the destination  ports are members of the VLAN used by ingress port  the packet will be forwarded     Note  VID can not be 0 or 4095     42    User Manual    Ingress Rule     Each packet received by a VLAN aware bridge will be classified to a VLAN   The classification rule is described as follows     1  If the VID of the packet is null VID  VID 0 or this packet is an untagged packet    a  If there are still some other ways e g  protocol  MAC address  application   IP subnet  etc   to classify the incoming packets beside port based  classification in implement and these approaches can offer non zero VID   then  use the value of VID offered by other classifications for VLAN s  classification    b  If there is only port based classification in implement or other classification  approaches cannot offer
18.  the nature of the LAN  So it can operate over other different LAN technology such  as Token Ring  FDDI and so on  Likewise  for the interface to the MAC layer  LLC  defines the services with the interface independent of the medium access  technology and with some of the nature of the medium itself     User Manual    DSAP SS AP  address address Control Information       DSAP address   Destination service access point address field  SSAP address   Source service access point address field   Control   Control field  16 bits for formats that include  sequence numbering  and   bits for formats that  do not  see 5 2       Infrmation field    Information  a Multiplication    An integer value equal to or greater than 0    Upper bound of Mis a function of the medium  access control methodology used      Ml    Table 3 1 LLC Format    The table 3 1 is the format of LLC PDU  It comprises four fields  DSAP  SSAP   Control and Information  The DSAP address field identifies the one or more service  access points  in which the l G bit indicates it is individual or group address  If all bit  of DSAP is 1s  it s a global address  The SSAP address field identifies the specific  services indicated by C R bit  command or response   The DSAP and SSAP pair  with some reserved values indicates some well known services listed in the table  below     0xo606 IP  ARP       Table 3 2    LLC type 1 connectionless service  LLC type 2 connection oriented service  and LLC type 3 acknowledge connectionless s
19.  whether regular authentication will take place in this port   Default  disable  Reauthentication Period  1 65535 s      A non zero number seconds between the periodic re authentication of  the supplicant     Default  3600  EAP timeout   1 255 s      A timeout condition in the exchange between the authenticator and the  supplicant  The valid range  1    255     Default  30 seconds    802 1X Parameters    Reauthentication Enabled   TT Enabled  Reauthentication Period  E 00    EAP timeout  30   1   255 seconds        Fig  4 18 802 1X Parameters    69    User Manual  4 2 9 IGMP Snooping    Function name   IGMP Snooping Configuration  Function description     IGMP Snooping lets administrators configure a switch to constrain multicast  traffic by listening to Internet Group Management Protocol  IGMP   After finishing  the settings  please press  lt Apply gt  button to start up the function     Parameter description    IGMP Enabled   Just tick the check box  M  to enable this function   Default  disable   Router Ports     Just tick the check box  IM  beside the port x to enable router ports  then  press the  lt Apply gt  button to start up     Default  none    Unregistered IGMP Flooding enabled   Just tick the check box  IM  to enable this function     Default  enable  VLAN ID    At the IGMP Enable mode being selected  it will list the VLAN ID number   IGMP Snooping Enabled     After IGMP Enabled function start up then user can tick the check box  IM  to  enable this function     D
20.  within the same broadcast domain  For  these stations  it is obviously that the traffic is getting congested while adding more  stations on it  With the more and more users joining the LAN  broadcast traffic will  rapidly decrease the performance of the network  Finally  the network may get down     39    User Manual                                        HUA         1 2a  Router     i Gmm B  J   p      gt  m  ABADE      AA  gt     a    5 k  AA                                  El       _R OR  a 4   Ethernet Switch       lt     SESeesciet sg eam BACKBON     iti    vo   Etherne itch Switch a       _ Siti 1d       ernet owitck  Sa on 3  A   o gt  2 a Po   gt  AS AS AS AAA AS s      Fig  3 8    Now we apply VLAN technology to configure the system shown as the figure  above  We can partition the users into the different logical networks which have their  own broadcast domain  The traffic will not disturb among these logical networks   The users 1x  x denotes a   d  are members of VLAN 1  Any traffic within VLAN 1  does not flow to VLAN 2 and others  This helps us configure the network easily  according to the criteria needed  for example  financial  accounting  R amp D and  whatever you think it necessary  You can also easily move a user to a different  location or join a new user somewhere in the building to VLAN  Without VLAN  it is  very hard to do  Basically  VLAN can afford offering at least 3 benefits  move and  change users  reduce broadcast traffic and increase performanc
21. 000SX LX Gigabit Fiber Port 21  22  23  24 LED    Lit when SFP connection with remote device is  SFP LINK ACT   Green   good    Blinks when any traffic is present       Table1 1  e RESET Button    RESET button is used to restore the system default setting     1 4 2  User Interfaces on the Rear Panel    AC Input  100   240V  50   60Hz       Fig  1 3 Rear View of the Switch    User Manual    1 5  View of the Optional Modules  In the switch  Port 21 24 include two types of media     TP and SFP Fiber    LC  BiDi SC      they support 10 100 1000Mbps TP or 1000Mbps SFP Fiber with  auto detected function  1000Mbps SFP Fiber transceiver is used for high speed  connection expansion  nine optional SFP types provided for the switch are listed  below        1000Mbps LC  MM  SFP Fiber transceiver  SFP OLC 202        1000Mbps LC  SM 10km  SFP Fiber transceiver  SFP OLC 212 10        1000Mbps LC  SM 30km  SFP Fiber transceiver  SFP OLC 212 30        1000Mbps LC  SM 50km  SFP Fiber transceiver  SFP 0LC 212 50        1000Mbps LC  SM 70km  SFP Fiber transceiver  SFP OLC 212 70        1000Mbps LC  SM 110km  SFP Fiber transceiver  SFP 0LC 212 B0         1000Mbps BiDi SC  type 1  SM 20km  SFP Fiber WDM transceiver   SFP 0BS 621 201         1000Mbps BiDi SC  type 2  SM 20km  SFP Fiber WDM transceiver   SFP 0BS 621 202         1000Mbps LC  SM 10km  SFP Fiber transceiver with DDM   SFP DLC 212 10        Fig  1 4 Front View of 1000Base SX LX LC  SFP Fiber Transceiver       Fig  1 5 Front View of 1000
22. 16 bytes for 1000Basa A  520 bytes for 1000Base T       64 bytes    Fig  3 4 Gigabit Ethernet Frame    30    User Manual    Parameter  _vatcencan MC eee Ee    Max  collision  domain DTE to iso meters 100 meters for UTP 100 meters for UTP  DTE 412 meters for fiber   316 meters for fiber    Max  collision  domain with 2500 meters 205 meters 200 meters  repeater    Slot time 512 bit times 512 bit times 512 bit times    96us_    096us      Interframe Gap  AttemptLimit  BackoffLimit  JamSize  MaxFrameSize  MinFrameSize    BurstLimit Not applicable Not applicable 65536 bits    Table 3 4 Ethernet parameters for half duplex mode            Preamble   SFD   DA   SA   Typellenath   Data PAD   FCS   Extension      ai minFramesize                 slott ime              _   _____    m FCS Coverage                         1    e ate collision threshold  slotTime         e     Duration of Carrier Event    MHH    Y   Y_            In full duplex operation mode  both transmitting and receiving frames are  processed simultaneously  This doubles the total bandwidth  Full duplex is much  easier than half duplex because it does not involve media contention  collision   retransmission schedule  padding bits for short frame  The rest functions follow the  specification of IEEE802 3  For example  it must meet the requirement of minimum  inter frame gap between successive frames and frame format the same as that in  the half duplex operation     Because no collision will happen in full duplex operati
23. 4 2 14 Storm Control    Function name   Storm Control  Function description     Storm Control is used to block unnecessary multicast and broadcast  frames that reduce switch   s performance  When the function is enabled  and Storm Control rate settings are detected as exceeded  the  unnecessary frames would be dropped     ETT      System Information g 2  Ports Storm Control Configuration    VLANs     VLAN Mode Storm Control     VLAN Group Number of frames per second  Aggregation ICMP Rate   No Limit Y    Learn Frames Rate     No Limit Y    Broadcast Rate   No Limit Y       Multicast Rate w      Flooded unicast Rate    Rate Limit   Apply      Storm Control  SNMP   Statistics Overview  Detailed Statistics    LACP Status   RSTP Status   IGMP Status   Ping   Warm Restart   Factory Default 25        Fig 4 26 Storm Control Configuration    Parameter description   ICMP Rate     To enable the ICMP Storm capability  User can use drop down menu to  select number of frames  Default is No Limit  The setting range is  1k 1024k per second     Learn Frames Rate     To enable the Learn Frames Storm capability  User can use drop down  menu to select number of frames  Default is No Limit  The setting range  is 1k 1024k per second     Broadcast Rate     To enable the Broadcast Storm capability  User can use drop down menu  to select number of frames  Default is No Limit  The setting range is  1k 1024k per second   Multicast Rate   78    User Manual    To enable the Multicast Storm capability  U
24. Base LX BiDi SC SFP Fiber Transceiver    User Manual    2  Installation    2 1  Starting 24 Port GbE Web Smart Switch Up    This section describes how to install the Web Smart Switch and its components   and it includes the following information       Hardware and Cable Installation    Management Station Installation      Software booting and configuration    2 1 1  Hardware and Cable Installation  At the beginning  please do first     Wear a grounding device to avoid the damage from electrostatic discharge     gt  Be sure that power switch is OFF before you insert the power cord to power  source    e Installing Optional SFP Fiber Transceivers to the 24 Port GbE Web Smart  Switch    Note  If you have no modules  please skip this section        Fig  2 1 Installation of Optional SFP Fiber Transceiver    e Connecting the SFP Module to the Chassis     The optional SFP modules are hot swappable  so you can plug or unplug it  before or after powering on     1  Verify that the SFP module is the right model and conforms to the chassis    2  Slide the module along the slot  Also be sure that the module is properly  seated against the slot socket connector    3  Install the media cable for network connection    4  Repeat the above steps  as needed  for each module to be installed into  slot s     5  Have the power ON after the above procedures are done    User Manual    e TP Port and Cable Installation     gt  In the switch  TP port supports MDI MDI X auto crossover  so both types of  
25. ENTERPRISE GESM SW24LProductld  VARIABLES   iflndex    DESCRIPTION   Send this trap when the number of the Rx bad packet over the Rx Error  Threshold  The OID value means the port number       2    GESM SW24LTxErrorThreshold TRAP TYPE   ENTERPRISE GESM SW24LProductld   VARIABLES   iflndex     DESCRIPTION    Send this trap when the number of the Tx bad packet over the Tx Error  Threshold    The OID value means the port number           END    104    
26. FICATIONS                     csssccccssssssccssssssccsssssscccsssssscesesssnees 100  APPENDIX B MIB SPECIFICATIONS  ui ii 104    Revision History    Release   Date   Revision    ee TI 02 10 2007  a 03 13 2007        102 A EPIA   A  po ES OOT E  pO OB ae E SI       Caution    Circuit devices are sensitive to static electricity  which can damage their delicate  electronics  Dry weather conditions or walking across a carpeted floor may cause you to  acquire a static electrical charge     To protect your device  always     e Touch the metal chassis of your computer to ground the static electrical charge before  you pick up the circuit device     e Pick up the device by holding it on the left and right edges only     Electronic Emission Notices  Federal Communications Commission  FCC  Statement    This equipment has been tested and found to comply with the limits for a class A  computing device pursuant to Subpart J of part 15 of FCC Rules  which are designed to  provide reasonable protection against such interference when operated in a commercial  environment     European Community  CE  Electromagnetic Compatibility Directive    This equipment has been tested and found to comply with the protection requirements  of European Emission Standard EN55022 EN60555 2 and the Generic European Immunity  Standard EN50082 1     EMC  EN55022 1988  CISPR 22 1985  class A    EN60555 2 1995  class A  EN60555 3   IEC 1000 4 2 1995  4K V CD  8KV  AD  IEC 1000 4 3 1995  3V m    1EC1000 4 4 1995  1
27. Factory Default    Configuration Download       Fig  4 37 Configuration Upload Download    97    User Manual  4 4 5  Logout    In addition to auto logout function we just mentioned in system configuration  section  the switch also allows administrators to logout manually by Logout function     Function name   Logout  Function description     The switch allows you to logout the system to prevent other users from the  system without the permission  If you do not logout and exit the browser  the  switch will automatically have you logout  Besides this manually logout and  implicit logout  you can set up the parameter of Auto Logout Timer in system  configuration function to explicitly ON OFF this logout function     Parameter description   Auto Manual Logout     If no action and no key is stroke as well in any function screen more than  the minutes you set up in Auto Logout Timer  the switch will have you  logout automatically  Or press the  lt Logout gt  button in Logout function to  exit the system manually           Maintenance    Warm Restart  Factory Default  Software Upgrade    ome File Transfer    Fig  4 38    98    User Manual    5  Trouble Shooting    5 1  Resolving No Link Condition    The possible causes for a no link LED status are as follows   e The attached device is not powered on     The cable may not be the correct type or is faulty      The installed building premise cable is faulty      The port may be faulty    5 2  Q amp A    1  Computer A can connect to Com
28. Gigabit TP SFP fiber are dual media ports with auto detected function   Non blocking store and forward shared memory Web Smart switched   Supports auto negotiation for configuring speed  duplex mode    Supports 802 3x flow control for full duplex ports    Supports collision based and carrier based backpressure for half duplex ports   Any ports can be in disable mode  force mode or auto polling mode    Supports Head of Line  HOL  blocking prevention    Supports broadcast storm filtering    Web based management provides the ability to completely manage the switch  from any web browser    Supports Port based VLAN and Tag based  IEEE802 1Q  VLAN    Auto aging with programmable inter age time    Supports 802 1p Class of Service with 2 level priority queuing    Supports port trunking with flexible load distribution and failover   function    Supports port sniffer function   Programmable maximum Ethernet frame length of range from 1518 to 9600  bytes jumbo frame    Supports port based VLAN  802 1Q tag based VLAN    Efficient self learning and address recognition mechanism enables forwarding  rate at wire speed     100    Hardware Specifications    User Manual       Standard Compliance  IEEE802 3 802 3ab   802 3z   802 3u   802 3x      Network Interface     Configuration      Mode   Connector   Port       10 100 1000Mbps Gigabit TP    NWay  TP RJ 45    1 24    1000Base SX Gigabit Fiber 1000 FDX   SFP 21 22 23 24   Option     1000Base LX Gigabit Fiber 1000 FDX   SFP 21 22 23 24   Opti
29. KV      power line   0 5KV      signal line     vi    About this user   s manual    This user   s manual provides instructions on how to install your Web Smart Switch     This guide also covers management options and detailed explanation about  hardware and software functions     Overview of this user   s manual    Chapter 1    Introduction    describes the features of 24 Gigabit Web  Smart Switch   Chapter 2    Installation      Chapter 3    Operating Concept and Management      Chapter 4    Operation of Web based Management      Chapter 5    Maintenance       Publication date  Septembery  2007  Revision A3    User Manual    1  Introduction  1 1  Overview of 24 Port GbE Web Smart Switch    The 24 port Gigabit Web Smart Switch is a standard switch that meets all IEEE  802 3 u x z Gigabit  Fast Ethernet specifications  The switch has 20  10 100 1000Mbps TP ports and 4 Gigabit TP SFP transceiver slots  It supports  console  telnet  http and SNMP interface for switch management  The network  administrator can logon the switch to monitor  configure and control each port s  activity  In addition  the switch implements the QoS  Quality of Service   VLAN  and  Trunking  It is suitable for office application     In this switch  Port 21  22  23  24 includes two types of media     TP and SFP  Fiber  LC  BiDi SC      this port supports 10 100 1000Mbps TP or 1000Mbps SFP  Fiber with auto detected function  1000Mbps SFP Fiber transceiver is used for high   speed connection expansion      
30. N ON  gt  N ON    According to the scheme above  a subnet mask 255 255 255 0 will partition a  network with the class C  It means there will have a maximum of 254 effective  nodes existed in this sub netted network and is considered a physical network in an  autonomous network  So it owns a network IP address which may looks like  168 1 2 0     With the subnet mask  a bigger network can be cut into small pieces of  network  If we want to have more than two independent networks in a worknet  a  partition to the network must be performed  In this case  subnet mask must be  applied     19    User Manual    For different network applications  the subnet mask may look like  259 255 255 240  This means it is a small network accommodating a maximum of  15 nodes in the network     Default gateway     For the routed packet  if the destination is not in the routing table  all the  traffic is put into the device with the designated IP address  known as default router   Basically  it is a routing policy     For assigning an IP address to the switch  you just have to check what the IP  address of the network will be connected with the switch  Use the same network  address and append your host address to it        Sey TY TT  EEC ii                                                            COTA  System Configuration  System Information  Ports E 24 Port Gigabit Web Smart Switch  VLANs System Description  4 Dual Media with SFP    VLAN Mode Firmware Version vo            A CTE v1 01  regation
31. NMP Configuration  Function description     This function is used to configure SNMP settings  community name  trap host  and public traps as well as the throttle of SNMP  A SNMP manager must pass the  authentication by identifying both community names  then it can access the MIB  information of the target device  So  both parties must have the same community  name  Once completing the setting  click  lt Apply gt  button  the setting takes effect     Parameters description   SNMP enable     The term SNMP enable here is used for the activation or de activation of  SNMP  Default is Disable     Get Set Trap Community     Community name is used as password for authenticating if the  requesting network management unit belongs to the same community  group  If they both don t have the same community name  they don t  belong to the same group  Hence  the requesting network management  unit can not access the device with different community name via SNMP  protocol  If they both have the same community name  they can talk each  other     Community name is user definable with a maximum length of 15  characters and is case sensitive  There is not allowed to put any blank in  the community name string  Any printable character is allowable     The community name for each function works independently  Each  function has its own community name  Say  the community name for  Read only works for Read function and can t be applied to other function  such as Write and Trap     Default SNMP functio
32. SGR24W4    24 port Gigabit Web Smart Switch with 4 combo  RJ45 SFP ports    User   s Guide    Release 1 05    A  PIN    Amer com        Trademarks  Copyright 02007 Amer com   Contents subject to change without prior notice     Copyright Statement   No part of this publication may be reproduced in any form or by any means or used to make  any derivative such as translation  transformation  or adaptation without permission  as  stipulated by the United States Copyright Act of 1976     Technical Support Contact  www amer com support    support amer com  info amer com    Table of Contents    A O aecar A see aecliee tees AAE E VI  ELECTRONIC EMISSION NOTICE S irte VI  1  INTRODUCTION circa ia 2  1 1  OVERVIEW OF 24 PORT GBE WEB SMART SWITCH          ccscccsessscseseeeessecessseeeeseeeessesessseeessaeeens 2  FA AA oo A acetate 3  A taal eel eine etal acces eee eee ea aa aed 3  1 4  VIEW OF 24 PORT GBE WEB SMART SWITCH         ccccccessscssssecseseecseseecssseecseseecseseecseeeesseeeesseeseess 5  1 4 1  User Interfaces on the Front Panel  Button  LEDs and Plugs                             5  1 4 2  User Interfaces on the Rear Panel          ccccccsscccccssseeeceseeeeesaneeeesaneneesaneesessaenessnes 6   159  VIEW OF THE OP TIONALIMODULES tua a l  2  INSTALLATION eccunumia 8  2 1  STARTING 24 PORT GBE WEB SMART SWITCH UP   ooooocccocccccoccnononcnononnnoononoconononononcnnncnconnnncnnnos 8  2 1 1  Hardware and Cable Installation                   ooocccoconccoccnnncconinocononononono
33. a single port in the LAN  This single port possesses the features of a  normal port but loading balance  This is a great feature for the port needing more  bandwidth but cannot afford paying much cost for high bandwidth port     36    User Manual    100Mb s       1000Mb s E  100Mb s    Fig  3 6    22332    is Pra  gt                  10Mb s    How does a switch operate     A Layer 2 switch uses some features of the Data Link layer in OSI model to  forward the packet to the destination port s   Here we introduce some important  features of a switch and how they work     MAC address table    When a packet is received on a port of switch  the switch first checks if the  packet good or bad and extracts the source MAC address  SA  and destination  MAC address  DA  to find 1  if SA is existed in the MAC address table  if no  puts it  in the MAC address table  if yes  2  looks up DA and its associated port to which the  traffic is forwarded  If DA does not exist  have the packet broadcasted     Due to the size of the MAC address limited  MAC address aging function is  applied  When the MAC address has resided and keeps no update in the table for a  long time  this means the traffic using that entry has yet come for a while  If this time  period is more than the aging time  the entry will be marked invalid  The vacancy is  now available for other new MAC     Both learning and forwarding are the most important functions in a switch   Besides that  VLAN can be one of the rules to forwa
34. a vale from the drop down list box     The lower the numeric value you assign  the higher the priority for this  system     Default  32768  Hello Time     This is the time interval in seconds between BPDU configuration  message generations by the root switch  The allowed range is 1 to 10  seconds     Default  2  Max Age     This is the maximum time a switch can wait without receiving a BPDU  before attempting to reconfigure  The allowed range is 6 to 40 seconds     Default  20  Forward Delay     This is the maximum time  in seconds  a switch will wait before changing  states  The general rule  2    Forward Delay     1   gt   Max Age  gt   2     Hello Time   1     Default  15  Force version   Select RSTP or STP protocol from the drop down list box   Function name     61    User Manual  RSTP Port Configuration  Function description     Enable or disable RSTP protocol on the ports that are selected and set path  cost   Parameter description     Protocol Enabled     Just tick the check box  IM  beside the port x to enable RSTP protocol   then press the  lt Apply gt  button to apply     Edge   Just tick the check box  IM  beside the port x to enable edge function     Path Cost     Path cost is the cost of transmitting a frame on to a LAN through that port   It is assigned according to the speed of the bridge  The slower the media   the higher the cost  user can select auto or set the rage from 1 to  200000000     RSTP System Configuration    Sy  tem Priority  22768  gt     Hello T
35. ame filtering database storing the membership information of  the VLAN to learn or look up the membership information of the VLAN  In 24 Port  GbE Web Smart Switch  you can choose a VID for sharing filtering database in  Shared VID field if you wish to use the existed filtering database  For a specified  VLAN  when a MAC address is learned by a switch  VLAN will use this formation to  make forwarding decision     Filtering Database     Referred to as FID  It can provide the information where the packet will be  sent to  Filtering database will supply the outgoing port according to the request  from forwarding process with VID and DA  When a packet is received  if it has a  non zero VID  then FID will offer the associated outgoing ports information to the  packet     In SVL  VLANs use the same Filtering Database  In IVL  VLANs use different  FIDs  Any VID can be assigned to the same FID by administrator     43    User Manual  How does a Tagged VLAN work     If the ingress filtering is enabled and when a packet is received  VLAN bridge  will first check if the VID of the packet presents     1   If the packet has a non zero VID  VLAN bridge will apply this VID as the VLAN  ID of the packet in the network     2   For a packet with null tag or no VLAN tag  if VLAN bridge provides rules to  decide its VID  then apply this VID to the packet     If VLAN bridge does not support any rule for VID  then apply the PVID of the  port to the packet which came from that port  VLAN bridge chec
36. are five functions contained in the maintenance function     Maintenance    Warm Restart  Factory Default    Software Upgrade    Configuration File Transfer    Logout    93    User Manual  4 4 1  Warm Restart    Web Smart Switch offers many approaches to reboot your switch  such as   power up  hardware reset and software reset  You can press RESET button in the  front panel of your switch to reset the device and to retrieve default settings  After  upgrading software  you have to reboot the device to have new configuration take  effect  The function being discussed here is software reset     Function name   Warm Restart  Function description     Reboot the switch  Reboot takes the same effect as the RESET button on the  front panel of the switch  Press  lt Yes gt  button to confirm warm restart function   and it will take around thirty  30  seconds to complete the system boot       VLAN Group Warm Restart  Aggregation  LACP  RSTP  UR Are you sure you want to perform a Warm Restart  Yes    IGMP Snooping  Mirror    Storm Control  SNMP       Statistics Overview  Detailed Statistics    Factory Default   Software Upgrade  Configuration File Transfer  Logout y       Fig  4 34 Warm Restart    94    User Manual    4 4 2  Factory Reset    Function name   Factory Default  Function description     Factory Default provides the function to retrieve default settings and replace  current configuration  Except the IP address setting  all settings will be  restored to the factory default valu
37. ata queued in the buffer and waits for a random period of time   known as backoff time with the following formula  When backoff time expires  the  device goes back to the state of attempting to transmit frame  The backoff time is  determined by the formula below  When the times of collision is increased  the  backoff time is getting long until the collision times excess 16  If this happens  the  frame will be discarded and backoff time will also be reset     where  k   min  n  10     32    User Manual    Frame Reception    In essence  the frame reception is the same in both operations of half duplex  and full duplex  except that full duplex operation uses two buffers to transmit and  receive the frame independently  The receiving node always    listens    if there is  traffic running over the medium when it is not receiving a frame  When a frame  destined for the target device comes  the receiver of the target device begins  receiving the bit stream  and looks for the PRE  Preamble  pattern and Start of   Frame Delimiter  SFD  that indicates the next bit is the starting point of the MAC  frame until all bit of the frame is received     For a received frame  the MAC will check     1     If it is less than one slotTime in length  i e  short packet  and if  yes  it will be discarded by MAC because  by definition  the valid  frame must be longer than the slotTime  If the length of the frame  is less than one slotTime  it means there may be a collision  happened somewhere or an in
38. bit in the SA  field is always O       Length Type     This field indicates either the number of the data  bytes contained in the data field of the frame  or the Ethernet type of  data  If the value of first two bytes is less than or equal to 1500 in  decimal  the number of bytes in the data field is equal to the  Length Type value  i e  this field acts as Length indicator at this  moment  When this field acts as Length  the frame has optional fields  for 802 3 802 2 SNAP encapsulation  802 3 802 2 encapsulation and  Netware 802 3 RAW encapsulation  Each of them has different fields  following the Length field      lf the Length Type value is greater than 1500  it means the  Length Type acts as Type  Different type value means the frames  with different protocols running over Ethernet being sent or received     For example     0x0800 IP datagram  0x0806 ARP   0x0835 RARP  0x8137 IPX datagram  0x86DD  IPv6      Data     Less than or equal to 1500 bytes and greater or equal to 46  bytes  If data is less than 46 bytes  the MAC will automatically extend  the padding bits and have the payload be equal to 46 bytes  The  length of data field must equal the value of the Length field when the  Length Type acts as Length       Frame check sequence  FCS      This field contains a 32 bit cyclic  redundancy check  CRC  value  and is a check sum computed with  DA  SA  through the end of the data field with the following  polynomial    G x    xi   Og ee ly le lO ete      It is created by th
39. c Port Trunk     When physical links are changed  administrator needs to manually  configure the switches one by one       Dynamic Port Trunk     When physical links are changed  LACP takes over and automatically  reconfigure  Administrator does not have to do anything and may see the  trap message of LACP changed in NMS             db 2 x 1000Mb s 4x100Mb s    A O    SER  qP 2x 1000Mb s  qD 2 x 1000Mb s        ees _2x 100Mb s  qp 2 x 100Mb s E       4x 100Mb s    C 5  HO  Y                   E    ON E  2x 100Mb s HP    i 2 x 100Mb s  D  IPA ens   e    D2 x 100Mb s    10Mb s    25    Ee ae A AS AS        10Mb s 10Mb s    12395 228888    Ee  gt  SEES REE SS EEE SS EEE SS                Fig  3 10 Example of Link Aggregation Application    46    User Manual  4  Operation of  Web based Management    This chapter would introduce how to manage your Web Smart Switch and  how to configure the 10 100 1000Mbps TP Ports and Gigabit TP SFP Fiber dual  media ports on the switch via web user interfaces  Web Smart Switch provides 20  fixed Gigabit Ethernet TP ports and 4 optional Gigabit dual media ports  With this  facility  you can easily access and monitor the status like MIBs  port activity  and  multicast traffic through any ports on the switch     The default values of 24 Port GbE Web Smart Switch are listed in the table    below   IP Address 192 168 1 1  Subnet Mask 255 255 255 0    Default Gateway 192 168 1 254    Table 4 1       When the configuration of your Web Smart Switch is fi
40. cable  straight through  Cable pin outs for RJ 45 jack 1  2  3  6 to 1  2  3  6 in  10 100M TP  1 2 3 4 5 6 7 8to 1  2  3  4  5  6  7  8 in Gigabit TP  and  crossed over  Cable pin outs for RJ 45 jack 1  2  3  6 to 3  6  1  2  can be used   It means you do not have to tell from them  just plug it      gt  Use Cat  5 grade RJ 45 TP cable to connect to a TP port of the switch and the  other end is connected to a network aware device such as a workstation or a  server      gt  Repeat the above steps  as needed  for each RJ 45 port to be connected to a  Gigabit 10 100 1000 TP device     Now  you can start having the switch in operation     e Power On    The switch supports 100 240 VAC  50 60 Hz power supply  The power  supply will automatically convert the local AC power source to DC power  lt does not  matter whether any connection plugged into the switch or not when power on  even  modules as well  After the power is on  all LED indicators will light up and then all off  except the power LED still keeps on  This represents a reset of the system     e Firmware Loading    After resetting  the bootloader will load the firmware into the memory  It will  take about 30 seconds  after that  the switch will flash all the LED once and  automatically performs self test and is in ready state     2 1 2  Cabling Requirements    To help ensure a successful installation and keep the network performance  good  please take a care on the cabling requirement  Cables with worse  specification will
41. cation status and the port status versus the status of port  mode  set in 802 1x Port mode  port control state  set in 802 1x port setting  Here  Entry Authorized means MAC entry is authorized     Port Mode Port Control Authentication Port Status    Port Uncontrolled  Enabled Port Authorized    Enabled Port Unauthorized  Enabled ForceUnauthorized Port Unauthorized  Enabled ForceAuthorized Port Authorized       Function name   802 1X Configuration  Function description     This function is used to configure the global parameters for RADIUS  66    User Manual  authentication in 802 1x port security application Parameter description     Mode   Enable or disable 802 1X function    RADIUS IP   RADIUS server IP address for authentication   Default  0 0 0 0   RADIUS UDP Port     The port number to communicate with RADIUS server for the  authentication service  The valid value ranges 1 65535     Default port number is 1812   RADIUS Secret     The secret key between authentication server and authenticator  It is a  string with the length 1     15 characters  The character string may contain  upper case  lower case and 0 9  It is character sense  It is not allowed for  putting a blank between any two characters     Default  None  Admin State     This is used to set the operation mode of authorization  There are three  type of operation mode supported  Force Unauthorized  Force  Authorized  Auto     e Force Unauthorized    The controlled port is forced to hold in the unauthorized state 
42. ceived     Tx Errors   82    User Manual  Number of bad packets transmitted     Rx Errors     Number of bad packets received     A Statistics Overview for all ports  System Information    ports f Refresh    VLANs     VLAN Mode  Port   txmytes   TxFrames   RxBytes   RxFrames   TxErrors    a 5083670 21357 3365327   32968  Aggregation o   o  0   0   Ol  o  o  o  ol  o  o   0   0   o   0   o   o   0   o          IGMP Snooping    2  00000000000000 0 0 0 0 0    Rate Limit  Storm Control    COON AU AN im       pd pad     O       a  W    Detailed Statistics   LACP Status   RSTP Status   IGMP Status   Ping   Warm Restart   Factorv Default bai        E      pub   pu  au    9 9 9 90 9 090 090 0 090  0 0 090  090 0  0  0    j     jt  on    e o olelel  ololelelelelelololelololele    pa  w         lol  lolelolololelolololelolololololelo    o  o  0  o  al  0  at  0  0  0  12 0  0  o  0  0  o  0  0  aT       000    N  o          Fig  4 28 Statistics Overview for all ports    83    User Manual  4 3 2  Detailed Statistics    Function name   Detailed Statistics  Function description     Display the detailed counting number of each port s traffic  In the Fig  4 26  the  window can show all counter information each port at one time     Parameter description     Rx Packets   The counting number of the packet received   RX Octets   Total received bytes   Rx High Priority Packets   Number of Rx packets classified as high priority   Rx Low Priority Packets   Number of Rx packets classified as low pri
43. date network topologies of the desired physical  extent  Carrier Extension provides a means by which the slotTime can be increased  to a sufficient value for the desired topologies  without increasing the minFrameSize  parameter  as this would have deleterious effects  Nondata bits  referred to as  extension bits  are appended to frames that are less than slotTime bits in length so  that the resulting transmission is at least one slotTime in duration  Carrier Extension  can be performed only if the underlying physical layer is capable of sending and  receiving symbols that are readily distinguished from data symbols  as is the case in  most physical layers that use a block encoding decoding scheme     34    User Manual    The maximum length of the extension is equal to the quantity  slotTime    minFrameSize   The MAC continues to monitor the medium for collisions while it is  transmitting extension bits  and it will treat any collision that occurs after the  threshold  slotTime  as a late collision     3 4  How does a switch work     The switch is a layer 2 Ethernet Switch equipped with 24 Fast Ethernet ports  and 2 optional modules which support Gigabit Ethernet or 100M Ethernet  Each port  on it is an independent LAN segment and thus has 26 LAN segments and 26  collision domains  contrast to the traditional shared Ethernet HUB in which all ports  share the same media and use the same collision domain and thus limit the  bandwidth utilization  With switch   s separated colli
44. dwidth to the targeted  device  There is more than one Link Aggregation technology in many vendors   switch products already  which may cause the problem of interoperability  This is the  reason why now we have 802 3ad Link Aggregation Control Protocol  LACP      Why 802 3ad  LACP      Network is varying  For example  if a port malfunctioned or unplugged  accidentally in a static trunk port  administrator has to reconfigure it  or the network  will get trouble  Therefore  offering a tool with automatic recovery capability is  necessary for an administrator  LACP is a protocol that allows a switch able to know  whether its partner has the capability to co setup a trunk between them     Usually  if administrator wishes to increase the bandwidth of a specific link   he may     1  Buy new network equipments with higher throughput  or  2  Aggregate the bandwidth of more than one port to a logical link     If the item 1 is the case  you will pay much more cost beyond your budget   and the solution caused by the limitation of hardware performance may not be  scalable     If the item 2 is the case  now you do not have to pay much more extra cost  and can keep flexible according to the demand of bandwidth because ll  equipments are there already  And what s more  you can avoid worrying about the  interoperability issue  Applying LACP in your network  you will not only gain benefits  below to improve the performance of your network but also have these investments  usable to future new 
45. e  Security     Besides  VLAN can highly reduce the traffic congestion and increase total  performance because there are no more too many users in the same broadcast  domain     40    User Manual    There are many types of VLAN applied  Most popular is port based VLAN   tag based VLAN and protocol based VLAN       Port based VLAN   Some physical ports are configured as members of a VLAN  All stations  attached on these ports can communicate with each other      Tag based VLAN    It identifies the membership by VLAN ID  no matter where the packet  comes from  It is also referred to as 802 1Q VLAN       Protocol based VLAN    It identifies the VLAN membership by layer 3 protocol types  for example  IPX  Appletalk  IP  etc     Other VLAN technologies not mentioned above are MAC based VLAN  IP   based VLAN and so on     Terminology    Tagged Frame     A frame  carrying a tag field following the source MAC address  is four bytes  long and contains VLAN protocol ID and tag control information composed of user  priority  Canonical Format Indicator  CFI  and optional VLAN identifier  VID    Normally  the maximal length of a tagged frame is 1522 bytes     802 1Q VLAN tagged Ethernet frame  6 6 2 2 2    DA   SA VLAN Protocol  Tag Control Length  ID Information    Type  VLAN Protocol ID   mm 0      0x8100 User Priority  CFI VLAN identifier    Fig 3 9 Tag Format  VLAN Protocol ID  8100 is reserved for VLAN tagged frame   User Priority  3 bits long  User priority is defined to 7     0  0 
46. e sending MAC and recalculated by the receiving  MAC to check if the packet is damaged or not     28    User Manual    How does a MAC work   The MAC sub layer has two primary jobs to do     1  Receiving and transmitting data  When receiving data  it parses frame to  detect error  when transmitting data  it performs frame assembly     2  Performing Media access control  lt prepares the initiation jobs for a  frame transmission and makes recovery from transmission failure     Frame transmission    As Ethernet adopted Carrier Sense Multiple Access with Collision Detect   CSMA CD   it detects if there is any carrier signal from another network device  running over the physical medium when a frame is ready for transmission  This is  referred to as sensing carrier  also    Listen     If there is signal on the medium  the  MAC defers the traffic to avoid a transmission collision and waits for a random  period of time  called backoff time  then sends the traffic again     After the frame is assembled  when transmitting the frame  the preamble   PRE  bytes are inserted and sent first  then the next  Start of frame Delimiter  SFD    DA  SA and through the data field and FCS field in turn  The followings summarize  what a MAC does before transmitting a frame     1  MAC will assemble the frame  First  the preamble and Start of   Frame delimiter will be put in the fields of PRE and SFD  followed  DA  SA  tag ID if tagged VLAN is applied  Ethertype or the value  of the data length  and pay
47. e two major forms of Ethernet frame  type encapsulation and length  encapsulation  both of which are categorized as four frame formats 802 3 802 2  SNAP  802 3 802 2  Ethernet Il and Netware 802 3 RAW  We will introduce the  basic Ethernet frame format defined by the IEEE 802 3 standard required for all  MAC implementations  It contains seven fields explained below     Type Length Pad bit if any  FCS  7   7   6    6   2 46 1500    Fig  3 3 Ethernet frame structure      Preamble  PRE     The PRE is 7 byte long with alternating pattern of  ones and zeros used to tell the receiving node that a frame is coming   and to synchronize the physical receiver with the incoming bit stream   The preamble pattern is     10101010 10101010 10101010 10101010 10101010 10101010 10101010       Start of frame delimiter  SFD      The SFD is one byte long with  alternating pattern of ones and zeros  ending with two consecutive  1 bits  It immediately follows the preamble and uses the last two  consecutive 1s bit to indicate that the next bit is the start of the data  packet and the left most bit in the left most byte of the destination  address  The SFD pattern is 10101011     User Manual      Destination address  DA      The DA field is used to identify which  network device s  should receive the packet  lt is a unique address   Please see the section of MAC addressing       Source addresses  SA      The SA field indicates the source node   The SA is always an individual address and the left most 
48. eceipt and discard the flow control  information  Symmetric flow control allows both two ports to transmit PASUE frames  each other simultaneously     Inter frame Gap time    After the end of a transmission  if a network node is ready to transmit data  out and if there is no carrier signal on the medium at that time  the device will wait  for a period of time known as an inter frame gap time to have the medium clear and  stabilized as well as to have the jobs ready  such as adjusting buffer counter   updating counter and so on  in the receiver site  Once the inter frame gap time  expires after the de assertion of carrier sense  the MAC transmits data  In  IEEE802 3 specification  this is 96 bit time or more     Collision    Collision happens only in half duplex operation  When two or more network  nodes transmit frames at approximately the same time  a collision always occurs  and interferes with each other  This results the carrier signal distorted and un   discriminated  MAC can afford detecting  through the physical layer  the distortion of  the carrier signal  When a collision is detected during a frame transmission  the  transmission will not stop immediately but  instead  continues transmitting until the  rest bits specified by jamSize are completely transmitted  This guarantees the  duration of collision is enough to have all involved devices able to detect the  collision  This is referred to as Jamming  After jamming pattern is sent  MAC stops  transmitting the rest d
49. efault  enable  IGMP Querying Enabled     After IGMP Enabled function start up then user can tick the check box  IM  to  enable this function     Default  enable   Configuration    System Information    IGMP Configuration    o    VLAN Group  Aggregation Router Ports aaa Stl eel wt er  91  101     o 120  13  14   50 16 0   110 180 190 20 20 20 20 240    Unregistered IPMC Flooding enabled  Mirror  Qos   VLAN ID   IGMP Snooping Enabled   IGMP Querying Enabled    Filter  Rate Limit    Storm Control      SNMP  apply   Refresh         Fig  4 19 IGMP Configuration    70    User Manual  4 2 10  Mirror Configuration    Function name   Mirror Configuration  Function description     Mirror Configuration is provided to monitor the traffic in the network  This  switch supports one port mirror multi ports  For example  we assume that Port  A and Port B are Source Ports  and Port C is Mirror Port respectively  thus  the  traffic passing through Port A and Port B will be copied to Port C for monitor  purpose     Parameter description     Source Port     Set up the port for being monitored  Just tick the check box  WM  beside the  port x and valid port is Port 1 24     Mirror Port     Use the drop down menu to select a mirror port     Mirroring Configuration     Port   Mirror Source    Wl aint any Ul  amp    Wi  Ny  m       O  O  d  a        O  Ol  O  O  O  O  Ol  O     Fig  4 20 Mirror ports configuration    71    User Manual  4 2 11  QoS Quality of Service  Configuration    The switch offer
50. eir format is as the following table and normally written in  the form as aa bb cc dd ee ff  a 12 hexadecimal digits separated by hyphens  in  which the aa bb cc is the OUI code and the dd ee ff is the serial number assigned  by manufacturer     26    User Manual    Bit 47 bit O    1st byte 2nd byte 3rd byte 4th byte oth byte 6th byte  OUI code    Table 3 3 Ethernet MAC address    The first bit of the first byte in the Destination address  DA  determines the  address to be a Unicast  0  or Multicast frame  1   known as l G bit indicating  individual  0  or group  1   So the 48 bit address space is divided into two portions   Unicast and Multicast  The second bit is for global unique  0  or locally unique  address  The former is assigned by the device manufacturer  and the later is usually  assigned by the administrator  In practice  global unique addresses are always  applied     A unicast address is identified with a single network interface  With this  nature of MAC address  a frame transmitted can exactly be received by the target  an interface the destination MAC points to     A multicast address is identified with a group of network devices or network  interfaces  In Ethernet  a many to many connectivity in the LANs is provided  It  provides a mean to send a frame to many network devices at a time  When all bit of  DA is 1s  it is a broadcast  which means all network device except the sender itself  can receive the frame and response     Ethernet Frame Format    There ar
51. ele e ea  eee e 4  e   OSO oe  rome qpooo o   ooo o ry    Assign a reasonable IP address   For example   IP   192 168 1 100    se Subnet Mask   255 255 255 0  ald Default Gateway   192 168 1 254   f        Fig  2 6    e Managing the Web Smart Switch through Ethernet Port    Before start using the switch  the IP address setting of the switch should be  done  then perform the following steps     1  Setup a physical path between the configured the switch and a PC  by a qualified UTP Cat  5 cable with RJ 45 connector     Note  If PC directly connects to the switch  you have to setup the  same subnet mask between them  But  subnet mask may be  different for the PC in the remote site  Please refer to Fig  2 6 about  the 24 Port GbE Web Smart Switch default IP address information     2  Run web browser and follow the menu  Please refer to Chapter 4     15    User Manual    Please enter password to login     lt   St    Fig  2 7 the Login Screen for Web    2 1 4  IP Address Assignment    For IP address configuration  there are three parameters needed to be filled  in  They are IP address  Subnet Mask  Default Gateway and DNS     IP address     The address of the network device in the network is used for internetworking  communication  lts address structure looks is shown in the Fig  2 8  It is    classful     because it is split into predefined address classes or categories     Each class has its own network range between the network identifier and  host identifier in the 32 bits addr
52. erify  Finally  RADIUS server  replies if the request is granted or denied     63    User Manual    While in the authentication process  the message packets  encapsulated  by Extensible Authentication Protocol over LAN  EAPOL   are exchanged  between an authenticator PAE and a supplicant PAE  The Authenticator  exchanges the message to authentication server using EAP  encapsulation  Before successfully authenticating  the supplicant can  only touch the authenticator to perform authentication message  exchange or access the network from the uncontrolled port     supplicant s uthentication  System rver s System       gt     Services Offered       Controlled port Uncontrolled port    I   I   I   I       1   1       t       Pon Authorize    I       1   az    MAC Enable    LAN    1 i l    i 1 l      i l 1  i i   i  i I 1   I i      Supplicant i y   by Authenticator Authenticator         Authentication i    PAE      8 9 Bridge Relay  PAE Server i   i I 1  l i l 1    i  i i l i  7                   3 3    Fig  4 13    In the Fig  4 14  this is the typical configuration  a single supplicant  an  authenticator and an authentication server  B and C is in the internal network  D is  Authentication server running RADIUS  switch at the central location acts  Authenticator connecting to PC A and A is a PC outside the controlled port  running  Supplicant PAE  In this case  PC A wants to access the services on device B and C   first  it must exchange the authentication message with the authe
53. ervice are three types of LLC frame  for all classes of service  In Fig 3 2  it shows the format of Service Access Point   SAP   Please refer to IEEE802 2 for more details     25    User Manual    DS AP S5AP    addrass field address field           LSB of address 5    Least sig nificant bit    Least significant bit of address fields delivered to     received from the MAC sublayer    VWG 0 Individual DSAP   G 1 Group DSAP Fig  3 2 SAP Format  GIR  0 Command   CR 1 Response    XODDDODO OSAP address  ROSSSSSS SSAP address    MIDCDDDDD Reserved for  SO definition  MISSSS85 Reserved for  SO definition    3 2  Media Access Control  MAC     MAC Addressing    Because LAN is composed of many nodes  for the data exchanged among  these nodes  each node must have its own unique address to identify who should  send the data or should receive the data  In OSI model  each layer provides its own  mean to identify the unique address in some form  for example  IP address in  network layer     The MAC is belonged to Data Link Layer  Layer 2   the address is defined to  be a 48 bit long and locally unique address  Since this type of address is applied  only to the Ethernet LAN media access control  MAC   they are referred to as MAC  addresses     The first three bytes are Organizational Unique Identifier  OUI  code  assigned by IEEE  The last three bytes are the serial number assigned by the  vendor of the network device  All these six bytes are stored in a non volatile  memory in the device  Th
54. es when    Factory Default    function is  performed  If you want to restore all configurations including the IP address  setting to the factory default  please press the    RESET    button on the front  panel     Note for    RESET    button     You must press the    RESET    button over 3 seconds to restore the factory  default setting       VLAN Group Factory Default  Aggregation    Are you sure you want to perform a Factory Default     Storm Control  SNMP    Statistics Overview  Detailed Statistics    IGMP Status  Ping    Warm Restart    Software Upgrade  Configuration File Transfer e   Logout v       Fig  4 35    95    User Manual  4 4 3  Software Upgrade    Function name   Software Upgrade  Function description     You can just click Browse button to retrieve the file you want in your system to  upgrade your switch     Software Upgrade       Fig  4 36 Software Upgrade    96    User Manual    4 4 4  Configuration File Transfer  Function name     Configuration File Transfer  Function description     You can backup your switch s configuration file into your computer folder in  case accident happens  In addition  uploading backup configuration file into a  new or a crashed switch can save much time and avoid mistakes     VLANS    VLAN Mode    VLAN Group Configuration Upload  Aggregation  LACP  RSTP  802 1X  IGMP Snooping  Mirror  00S  Filter  Rate Limit  Storm Control  SNMP  Statistics Overview  Detailed Statistics  LACP Status  RSTP Status  IGMP Status  Ping  Warm Restart  
55. ess  Each IP address comprises two parts  network  identifier  address  and host identifier  address   The former indicates the network  where the addressed host resides  and the latter indicates the individual host in the  network which the address of host refers to  And the host identifier must be unique  in the same LAN  Here the term of IP address we used is version 4  known as IPv4      32 bits  D E    Network identifier Host identifier    Fig  2 8 IP address structure    16    User Manual    With the classful addressing  it divides IP address into three classes  class A   class B and class C  The rest of IP addresses are for multicast and broadcast  The  bit length of the network prefix is the same as that of the subnet mask and is  denoted as IP address X  for example  192 168 1 0 24  Each class has its address  range described below     Class A     Address is less than 126 255 255 255  There are a total of 126 networks can  be defined because the address 0 0 0 0 is reserved for default route and  127 0 0 0 8 is reserved for loopback function     Bit  01 78 31  Network address Host address  Class B     IP address range between 128 0 0 0 and 191 255 255 255  Each class B  network has a 16 bit network prefix followed 16 bit host address  There are 16 384   2214  16 networks able to be defined with a maximum of 65534  216    2  hosts  per network     Bit  012 15 16 31  o  Network address Host address  Class C     IP address range between 192 0 0 0 and 223 255 255 255  Eac
56. essing the  lt Downward gt  arrow key  Then  click  lt Apply gt  button  the  settings will take affect immediately     Parameter description   VLAN Mode   Port based     Port based VLAN is defined by port  Any packet coming in or  outgoing from any one port of a port based VLAN will be accepted   No filtering criterion applies in port based VLAN  The only criterion  is the physical port you connect to  For example  for a port based  VLAN named PVLAN 1 contains port members Port 1 amp 2 amp 3 amp 4  If  you are on the port 1  you can communicate with port 2 amp 3 amp 4  If you  are on the port 5  then you cannot talk to them  Each port based  VLAN you built up must be assigned a group name  This switch can  support up to maximal 24 port based VLAN groups     55    User Manual  Tag based     Tag based VLAN identifies its member by VID  This is quite  different from port based VLAN  If there are any more rules in  ingress filtering list or egress filtering list  the packet will be  screened with more filtering criteria to determine if it can be  forwarded  The switch supports supplement of 802 1q  For more  details  please see the section VLAN in Chapter 3     Each tag based VLAN you built up must be assigned VLAN name  and VLAN ID  Valid VLAN ID is 1 4094  User can create total up to  24 Tag VLAN groups     Double tag     Double tag mode belongs to the tag based mode  however  it would  treat all frames as the untagged ones  which means that tag with  PVID will be added into a
57. estart    Factorv Default vi    ill   E       Statistics for Port 1       aoe    it   Pon    Bona   pon ie   Poa  Port             Port 15 Batte  22   Port23   Po  33215 ea 21520  as   3390475 AS 5121779   Rx High Priority Packets _  pl Tx High Priority Packets _    Rx Low Priority Packets   ANO    Rx Broadcast     Tx Broadcast      AA  RST     1021 ELL  BE  Error Packets    CEL   ERIC  Rx 65 127 Bytes   os z   Rx 128 255 Bytes    Tx 128 255 Bytes   3  Rx 256 511 Bytes   sr 256 514 Bytes      13 1073 ayes     1x 512 1023 Bytes      Rx 1024 Bytes   Tx 1024  Bytes   yt SC    CS ee     Rx CRC Aligment   Tx Collisions                                                             Fig  4 29 Detailed Statistics for each port    86       User Manual  4 3 3  LACP Status    Function name   LACP Status  Function description     Display LACP status  Fig  4 30 illustrates that LACP Status window can show  LACP information and status for all ports in the same time     Parameter description   LACP Aggregation Overview     Show the group port status  Default will set to red sign for port link down   user can check legend table below for all reference     LACP Port Status   Group Port   Show the port number   Normal   as Legend   Configuration E    System Information   a  Ports LACP Aggregation Overview  VLANs      VLAN Mode a 212131 415 6 7 8 9 10   11 12 13  14 15  16 17 18  19   20   21   22   23    VLAN Group    raoreaton Perm TTiTiiii  O O O O O O i  LACP i  RSTP   802 1X   IGMP Snooping  
58. g    and    Maintenance     The functions of each  folder are described in its corresponded section respectively  As to the function  names in normal type are the sub functions  When clicking it  the function is  performed  The following list is the main function tree for web user interface        Configuration    Monitoring         Maintenance    49    User Manual  4 2  Configuration  Configuration includes the following functions  System Configuration  Ports    Configuration  VLAN Mode Configuration  VLAN Group Configuration  Aggregation   LACP  RSTP  802 1X  IGMP Snooping  Mirror  QoS  Filter  Rate Limit  Storm Control    and SNMP   Configuration    System Configuration  Ports Configuration   VLAN Mode Configuration  VLAN Group Configuration  Aggregation   LACP   RSTP   802 1X   IGMP Snooping    Mirror    O  O  o     Filter    Rate Limit    Storm Control    SNMP    User Manual    4 2 1  System Configuration    System configuration is one of the most important functions  Without a proper  setting  network administrator would not be able to manage the device  The switch  supports manual IP address setting     DHCP Enabled   O    Fallback IP Address 192 168 1      Fallback Subnet Mask  255 255 255 0    Fallback Gateway  192 168 1 254       Management VLAN ho    O  e O    Inactivity Timeout  secs     pply                                                             Fig  4 3    Function name   System Configuration  Function description     Show system description  firmware versi
59. h class C  network has a 24 bit network prefix followed 8 bit host address  There are  2 097 152  2421  24 networks able to be defined with a maximum of 254  248    2   hosts per network     Bit  012 3 23 24 31  Network address Host address    User Manual    Class D and E     Class D is a class with first 4 MSB  Most significance bit  set to 1 1 1 0 and  is used for IP Multicast  See also RFC 1112  Class E is a class with first 4 MSB set  to 1 1 1 1 and is used for IP broadcast     According to IANA  Internet Assigned Numbers Authority   there are three  specific IP address blocks reserved and able to be used for extending internal  network  We call it Private IP address and list below     Class A 10 0 0 0     10 255 255 255  Class B 172 16 0 0     172 31 255 255  Class C 192 168 0 0     192 168 255 255    Please refer to RFC 1597 and RFC 1466 for more information   Subnet mask     It means the sub division of a class based network or a CIDR block  The  subnet is used to determine how to split an IP address to the network prefix and the  host address in bitwise basis  It is designed to utilize IP address more efficiently and  ease to manage IP network     For a class B network  128 1 2 3  it may have a subnet mask 255 255 0 0 in  default  in which the first two bytes is with all 1s  This means more than 60  thousands of nodes in flat IP address will be at the same network  It   s too large to  manage practically  Now if we divide it into smaller network by extending network  
60. iber     5  1B  E9103  Single Mode TX Transmit  1550nm     20Km RX Receive  1310nm    Table2 1       10    User Manual    2 1 2 3  Switch Cascading in Topology    e Takes the Delay Time into Account    Theoretically  the switch partitions the collision domain for each port in switch  cascading that you may up link the switches unlimitedly  In practice  the network  extension  cascading levels 4 overall diameter  must follow the constraint of the  IEEE 802 3 802 3u 802 3z and other 802 1 series protocol specifications  in which  the limitations are the timing requirement from physical signals defined by 802 3  series specification of Media Access Control  MAC  and PHY  and timer from some  OSI layer 2 protocols such as 802 1d  802 1q  LACP and so on     The fiber  TP cables and devices  bit time delay  round trip  are as follows     1000Base X TP  Fiber   100Base TX TP   100Base FX Fiber    Round trip Delay  4096 Round trip Delay  512    Cat  5 TP Wire  11 12 m Cat  5 TP Wire  11 12 m   Fiber Cable   Fiber Cable   10 10 m TP to fiber Converter  56    Bit Time unit   1ns  1sec  1000 Mega bit    Bit Time unit  0 01us  1sec  100 Mega bit        Table 2 2    Sum up all elements    bit time delay and the overall bit time delay of  wires devices must be within Round Trip Delay  bit times  in a half duplex network  segment  collision domain   For full duplex operation  this will not be applied  You  may use the TP Fiber module to extend the TP node distance over fiber optic and  prov
61. ide the long haul connection     e Typical Network Topology in Deployment    A hierarchical network with minimum levels of switch may reduce the timing  delay between server and client station  Basically  with this approach  it will  minimize the number of switches in any one path  will lower the possibility of  network loop and will improve network efficiency  If more than two switches are  connected in the same network  select one switch as Level 1 switch and connect all  other switches to it at Level 2  Server Host is recommended to connect to the Level  1 switch  This is general if no VLAN or other special requirements are applied     11    User Manual    Casel  All switch ports are in the same local area network  Every port can access  each other  See Fig  2 2                  Fig  2 2 No VLAN Configuration Diagram    If VLAN is enabled and configured  each node in the network that can  communicate each other directly is bounded in the same VLAN area     Here VLAN area is defined by what VLAN you are using  The switch  supports both port based VLAN and tag based VLAN  They are different in practical    deployment  especially in physical location  The following diagram shows how it  works and what the difference they are     CaseZa  Port based VLAN  See Fig 2 3         Fig  2 3 Port based VLAN Diagram    1  The same VLAN members could not be in different switches   2  Every VLAN members could not access VLAN members each other     3  The switch manager has to assign diffe
62. ime  2  Mas Age  20    Forvrard Delay hs  Force version  ES       RSTP Port Configuration    Protocol Enabled   Edge   Ci  PSH ace    A  e    ES                  continue   N    CTO    317    ttt        ay  E       Oy poy       Fig  4 12 RSTP Configuration    62    User Manual  4 2 8  802 1X    802 1x port based network access control provides a method to restrict users  to access network resources via authenticating user s information  This restricts  users from gaining access to the network resources through a 802 1x enabled port  without authentication  If a user wishes to touch the network through a port under  802 1x control  he  she  must firstly input his  her  account name for authentication  and waits for gaining authorization before sending or receiving any packets from a  802 1x enabled port     Before the devices or end stations can access the network resources through  the ports under 802 1x control  the devices or end stations connected to a controlled  port send the authentication request to the authenticator  the authenticator pass the  request to the authentication server to authenticate and verify  and the server tell  the authenticator if the request get the grant of authorization for the ports     According to IEEE802 1x  there are three components implemented  They  are Authenticator  Supplicant and Authentication server shown in Fig  4 13     Supplicant     It is an entity being authenticated by an authenticator  It is used to  communicate with the Authe
63. ion name   Ping Status  Function description     To set up target IP address for ping function and display ping status  In Fig  4   30  the window shows the ping information     Parameter description   Ping Parameters   Target IP address   Set up a Target IP address to ping   Count     Use drop down menu to set number of echo requests to send   Four type of number can choose  there are 1  5  10 and 20     Default  1  Time Out  in secs      Use drop down menu to set number of echo requests time out in  second  Four type numbers can choose  there are 1 5 10 and 20     Default  1    NOTE  All the functions should press  lt Apply gt  button to start up  after you set up the parameters     Ping Results     Target IP address   91    User Manual  Show the active target IP address     Status   Show the result of the ping status   Received replies   Show the received replies number of times   Request timeouts   Show the timeout of request   Average Response times  In ms      Show the average response time in milliseconds     VLANs    VLAN Mode    VLAN Group Ping Parameters    Target IP address      om EU  Time Out  in sec  ENE                         Statistics Overview Target IP address  0 0 0 0  a AAA ve com  LACP Status A  RSTP Status Received replies  o   IGMP Status Request timeouts lo    Average Response Time  in ms   o    Warm Restart   Factory Default   Software Upgrade  Configuration File Transfer  Logout Y       Fig  4 33 Ping    92    User Manual  4 4  Maintenance    There 
64. is the lowest  priority    CFI  Canonical Format Indicator  1 bit long  It is used to encapsulate a   token ring packet to let it travel across the Ethernet  Usually  it is   set to 0   VLAN ID  12 bits long  0 means no VLAN ID is present  1 means default VLAN    4095 reserved     41    User Manual    VLAN tagged frame     An Ethernet frame  carrying VLAN tag field  contains VLAN identification  without the value of O and 4095  and priority information     Priority tagged frame     An Ethernet frame  carrying VLAN tag field  contains VLAN identification with  the value of O and priority information     Untagged frame     An Ethernet frame carries no VLAN tag information     VLAN Identifier     Also referred to as VID  It is used to identify a member whether it belongs to  the VLAN group with the VID  The assignable number is 1  4094  If VID 0  the  tagged frame is a priority packet  Both the value of 0 and 4095 also cannot be  assigned in VLAN management     Port VLAN Identifier     VLAN identifier of a port  It also can be referred to as PVID  When an  untagged frame or a priority tagged frame is received  the frame will be inserted the  PVID of that port in the VLAN tag field  The frame with VID assigned by a port is  called PVID  Each port can only be assigned a PVID  The default value for PVID is  1  the same as VID     Ingress filtering     The process to check a received packet and compare its VID to the VLAN  membership of the ingress port  The ingress filtering can be
65. ks to see if the  ingress port and the received packet are on the same VLAN  If not  drops it  If yes   forwards it to the associated ports  Meanwhile  this VLAN must be applied to the  egress port  or the packet will be dropped     If ingress filtering is disabled  VLAN bridge will only check the MAC address  table to see if the destination VLAN exists  If VLAN does not exist  then drop the  packet  and if both DA and VLAN do not exist  forwards the packet  If just knows  VLAN existed  then floods the packet to all the ports the VLAN covers     If we plan to deploy four VLANs in an office and use a switch to partition  them  we should check which ports belong to which VLAN first  Assuming a 24 port  switch is applied     NETS   VID   Port Members  Marketing 2 2 1123145      Service   3   6 7 20 21 22  8 9 10 11 12 13 14 15 16  Administration 17 18 19 23 24    Table 3 6    Next  assigns IP address to each VLAN  Usually  we use 10 x x x as internal  IP block  Because there are total four VLANs in the network  we must assign 4 IP  blocks to each of them     NETS   VID   Network Address    Marketing 10 1 2 0 24       10 1 3 0 24  Sales   4   10 1 4 0 24  Administration 10 1 1 0 24       Table 3 7    Here we apply the subnet mask 255 255 255  and each VLAN is capable of  supporting 254 nodes     44    User Manual    3 6  Link Aggregation    Basically  Link Aggregation is to aggregate the bandwidth of more than one  port to an assigned logical link  This highly increases total ban
66. lete gt  function buttons  or click the  Group ID directly to edit it     Parameter description     ID  Group ID      When you want to edit a VLAN group  you must select the Group ID field   Then  you will enter Tag Base VLAN Group Setting or Port Base VLAN  Group Setting page  which depends on your VLAN mode selection     VID     VLAN identifier  Each tag based VLAN group has a unique VID  It  appears only in tag based mode     Member     In modify function this is used to enable or disable if a port is a member  of the new added VLAN     Enable    means it is a member of the VLAN     Just tick the check box  IM  beside the port x to enable it      configuration    is    System Information    Port Based VLAN Configuration    Add a VLAN    e       Add    VLAN Configuration List    DEA Member    Coal        1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    SNMP       Statistics Overview    Fig  4 7 Port Based VLAN Configuration    Add Group     Create a new port based VLAN or tag based VLAN  which depends on  the VLAN mode you choose in VLAN mode function     57    User Manual      Configuration fie    System Information    VLANs    VLAN Mode    VLAN Group  Aggregation    LACP  ome mrz ENN   802 1X la 7  IGMP Snooping Port3 O  Port a      Mirror   meee  Port 16 jo      Qos Er     Filter          ns Oa r        SNMP     om  Port 20  z      Statistics Overview      Port 9 E  Detailed Statistics i         LACP Status       _ E    RSTP Status        Port 11 la E 
67. ll packets  Then  these packets will be  forwarded as Tag based VLAN  So  the incoming packets with tag  will become the double tag ones     Metro Mode     The Metro Mode is a quick configuration VLAN environment  method on Port based VLAN  It will create 21  22  23 or 24 Port   based VLAN groups     ESTA  VLAN Mode  System Information  Ports    VLANs    VLAN Mode         VLAN Group  Aggregation  LACP  RSTP  802 1X  IGMP Snooping       Fig  4 5 Select VLAN Mode    Sri    VLAN Mode   System Information   Ports   VLANs A    VLAN Mode 20 20 230 40      VLAN Group    Aggregation  Apply      LACP    RSTP  202 1X  IGMP Snooping       Fig  4 6 Metro mode  4 2 4  VLAN Group Configuration    56    User Manual  Function name     VLAN Group Configuration  Function description     It shows the information of VLAN Groups  and allows administrators to  maintain them by modifying and deleting each VLAN group  User also can add  a new VLAN group by inputting a new VLAN name and VLAN ID     If you are in port based VLAN  it will just show the ID   Member of the existed  port based VLAN group  If you are in tag based VLAN  it will show the ID  gt   VID  gt    Member of the existed tag based VLAN group  The switch can store the  configuration of port based VLAN and tag based VLAN separately  When you  choose one of VLAN mode  the switch will bring you the responded VLAN  configuration which keeps the default data  You can easily create and delete a  VLAN group by pressing  lt Add gt  and  lt De
68. load data field  and finally put the FCS  data in order into the responded fields     2  Listen if there is any traffic running over the medium  If yes  wait     3  If the medium is quiet  and no longer senses any carrier  the  MAC waits for a period of time     e  inter frame gap time to have  the MAC ready with enough time and then start transmitting the  frame     4  During the transmission  MAC keeps monitoring the status of the  medium  If no collision happens until the end of the frame  it  transmits successfully  If there is a collision happened  the MAC  will send the patterned jamming bit to guarantee the collision  event propagated to all involved network devices  then wait for a  random period of time  i e  backoff time  When backoff time  expires  the MAC goes back to the beginning state and attempts  to transmit again  After a collision happens  MAC increases the  transmission attempts  If the count of the transmission attempt  reaches 16 times  the frame in MAC   s queue will be discarded     29    User Manual    Ethernet MAC transmits frames in half duplex and full duplex ways  In half   duplex operation mode  the MAC can either transmit or receive frame at a moment   but cannot do both jobs at the same time     As the transmission of a MAC frame with the half duplex operation exists  only in the same collision domain  the carrier signal needs to spend time to travel to  reach the targeted device  For two most distant devices in the same collision  domain  when
69. longs   The host then sets a timer  with a value less than the Max Response  Time field in the query  for each group to which it belongs  lt Calculate  the number of times of IGMPV1 report     V2 Reports     When a host receives a group membership query  it identifies the groups  associated with the query and determines to which groups it belongs   The host then sets a timer  with a value less than the Max Response  Time field in the query  for each group to which it belongs  It Calculate  the number of times of IGMPV2 report     V3 Reports     When a host receives a group membership query  it identifies the groups  associated with the query and determines to which groups it belongs   The host then sets a timer  with a value less than the Max Response  Time field in the query  for each group to which it belongs  It Calculate  the number of times of IGMPV3 report     V2 Leaves     When a host leaves a group  it sends a leave group membership  message to multicast routers on the network  it show the leaves number     90    User Manual  Configuration       System Information    IGMP Status    LAN Grou zo    queer  i snsmtted  received   Reports  Reports  Reports   Leaves    VLAN Group transmitted   received   Reports   Reports   Reports   Leaves  Aggregation     Idle 0 0 0 0 0 0  LACP   RSTP   802 1X EF   IGMP Snooping   Mirror   Qos   Filter   Rate Limit   Storm Control   SNMP   Statistics Overview   Detailed Statistics       Fig  4 32 IGMP Status    4 3 6  Ping Status    Funct
70. n  Disable    Default community name for Get  public    80    User Manual  Default community name for Set  private    Default community name for Trap  public    Configuration de     System Information 7  Ports SNMP Configuration    VLANs        VLAN Mode CI 1    VLAN Group f   renee Shu Trap destination OER        SNMP Get Community  ME                        002 1 Mom     IGMP Snooping    Qos  Filter   Apply  Rate Limit   Apply      Storm Control                      Fig  4 27 SNMP Configuration    81    User Manual  4 3  Monitoring    There are six functions contained in the monitoring function         Monitoring    Statistics Overview    Detailed Statistics    LACP Status  RSTP Status    IGMP Status        Ping    4 3 1  Statistics Overview    The function of Statistics Overview collects any information and provides the  counting summary about the traffic of the port  no matter the packet is good or bad     In the Fig  4 25  the window can show all ports    counter information at the  same time  If the counting is overflow  the counter will be reset and restart counting     Function name   Statistics Overview    Function description     Display the summary counting of each port s traffic  including Tx Bytes  Tx  Frames  Rx Bytes  Rx Frames  Tx Errors and Rx Errors     Parameters description     Tx Bytes   Total transmitted bytes   Tx Frames   The counting number of the packet transmitted   Rx Bytes   Total received bytes   Rx Frames     The counting number of the packet re
71. nished  you can  browse it by the IP address you set up  For instance  type http   192 168 1 1 in the  address row in a browser  then the following screen  see Fig 4 1  would show up  and ask for your password input for login and access authentication  The default  password is    admin     For the first time access  please enter the default password   and click  lt Apply gt  button  The login process now would be completed     Web Smart Switch supports a simplified user management function which  allows only one administrator to configure the switch at one time     To optimize the display effect  we recommend Microsoft IE and 1024x768  display resolution     47    User Manual    Please enter password to login     lt      Apply       Fig  4 1    4 1  Web Management Home Overview    After login  System Information would be displayed as Fig  4 2 illustrated   This page lists default values and shows you the basic information of the switch   including    Switch Status        TP Port Status        Fiber Port Status        Aggregation         VLAN        Mirror        SNMP     and    Maximum Packet Length     With this information  you  will Know the software version  MAC address  ports available and so on  It would be  helpful while malfunction occurred  For more details  please refer to Section 4 4 1       Configuration  amp     System Information      VLAN Mode    VLAN Group  Aggregation    Rate Limit  Storm Control  SNMP     Monitoring O    Statistics Overview   Detailed Statis
72. nonononononanonnns 8  2 1 2  Cabling REQUITEIMGNUS A ai 9  2 1 3  Configuring the Management Agent Of the SwitCH           ccococcccoccnoconinocononoconos   14  2 1 4  IP Address ASSIQUINON Dat ii A A ai A 16   A SN O A arenes ohana a A 21  3  BASIC CONCEPT AND MANAGEMENT                    cccssssssssssssccssssccssssssssssssssssssssssssssees 23  3 1  WHATS THE ETHERNE T nlsulaiiid idilio lias 23  3 2  MEDIA ACCESS  CONTROL  MAC iaa a 26  J9 F EOW CONTROL taii T 32  3 4  HOW DOES A SWITCH WORK ascii 35  Os MI A A a sae Te adeace aessstaas bode aaae ne 39  BAO AMIN A 45  4  OPERATION OF WEB BASED MANAGEMENT                  sssccccssssssssccsssssseccsssssscscssssssesssses 47  4 1  WEB MANAGEMENT HOME OVERVIEW      ccccccccccsssscccceessscecceesseeccesessseeeceessseeeeeeessseeeceeensaeeeeeens 48  APD CONFIGURATION ao Tei ca tease ad o E 50  4 2 1 Y SOM CONQUE TO sita 51  4 2 2  POM CONNOUTA ION nate seed hae ne dR cin 54  4 2 3  VLAN Mode Configuration         cooocccoconnnccnonococonocanonononnoconononononconononanonenanonenanoss 55  4 2 4  VLAN Group Configuration       cooocccccocnnoconnnoconnonononononononononnonnnonononononononaninonanons 56   A ZDAJE JAO A a tara a vats tous ane eas a ees 59  A A aie eae he cated Cantal te facets T 60  ray GM S ge CNT aoe aE E E Ren eee 61  O A EEA ERE eR Ea eRe ee er nee 63  12 EMIR SNOOP e ds 70  FIAT IGMP CONT OUNAUON iors his Sates acond  70  4 2 10  Mirror Configuration        occcococcccconnoconononononononononononnnnnnnnonnononnnon
73. nticator PAE  Port Access Entity  by  exchanging the authentication message when the Authenticator PAE  request to it     Authenticator     An entity facilitates the authentication of the supplicant entity  It controls  the state of the port  authorized or unauthorized  according to the result  of authentication message exchanged between it and a supplicant PAE   The authenticator may request the supplicant to re authenticate itself at a  configured time period  Once start re authenticating the supplicant  the  controlled port keeps in the authorized state until re authentication fails     A port acting as an authenticator is thought to be two logical ports  a  controlled port and an uncontrolled port  A controlled port can only pass  the packets when the authenticator PAE is authorized  and otherwise  an  uncontrolled port will unconditionally pass the packets with PAE group  MAC address  which has the value of 01 80 c2 00 00 03 and will not be  forwarded by MAC bridge  at any time     Authentication server     A device provides authentication service  through EAP  to an  authenticator by using authentication credentials supplied by the  supplicant to determine if the supplicant is authorized to access the  network resource     The overview of operation flow for the Fig  4 13 is quite simple  When  Supplicant PAE issues a request to Authenticator PAE  Authenticator and  Supplicant exchanges authentication message  Then  Authenticator  passes the request to RADIUS server to v
74. nticator on the port  it connected via EAPOL packet  The authenticator transfers the supplicant   s  credentials to Authentication server for verification  If success  the authentication  server will notice the authenticator the grant  PC A  then  is allowed to access B and  C via the switch  If there are two switches directly connected together instead of  single one  for the link connecting two switches  it may have to act two port roles at  the end of the link  authenticator and supplicant  because the traffic is bi directional        Ssupplicant A     Fig  4 14    The Fig  4 15 shows the procedure of 802 1x authentication  There are steps  for the login based on 802 1x port access control management  The protocol used    64    User Manual    in the right side is EAPOL and the left side is EAP     1     10     At the initial stage  the supplicant A is unauthenticated and a port  on switch acting as an authenticator is in unauthorized state  So the  access is blocked in this stage     Initiating a session  Either authenticator or supplicant can initiate  the message exchange  If supplicant initiates the process  it sends  EAPOL start packet to the authenticator PAE and authenticator will  immediately respond EAP Request Identity packet     The authenticator always periodically sends EAP Request Identity  to the supplicant for requesting the identity it wants to be  authenticated     lf the authenticator doesnt send EAP Request Identity  the  supplicant will initiate EAPOL S
75. o negotiation support on 10 100Base TX   ports  Web browser can set transmission speed  m nfiauration  10 100Mbps  and operation mode  Full Half   system Contiguratlo duplex  on each port  enable disable any port    set VLAN group  set Trunk Connection      Port Base   802 1Q Tagged  allowed up to 24   VLAN Function active VLANs in one switch     Trunk Function Ports trunk connections allowed  Bandwidth Control Supports by port Egress Ingress rate control  Referred as Class of Service  CoS  by the    Quality of Service  QoS  IEEE 802 1P standard  Two queues per port        Network Management Web browser support based on HTTP Server                   Note  Any specification is subject to change without notice     103    User Manual    Appendix B  MIB Specifications    MIB Il Enterprise MIB brief description is listed as below     PRIVATE GESM SW24L MIB DEFINITIONS     BEGIN    IMPORTS  mib 2  DisplayString  iflndex FROM RFC1213 MIB  enterprises Counter  TimeTicks  Gauge lpAddress FROM RFC1155 SMI  OBJECT TYPE FROM RFC 1212  TRAP TYPE FROM RFC 1215   privatetech OBJECT IDENTIFIER       enterprises 5205      switch OBJECT IDENTIFIER       privatetech 2    GESM SW24LProductld OBJECT IDENTIFIER       switch 7      GESM SW24LProduces OBJECT IDENTIFIER       GESM SW24LProductld  1     GESM SW24LIllegalLogin TRAP TYPE  ENTERPRISE GESM SW24LProductld  DESCRIPTION   Send this trap when the illegal user try to login the Web management UI       1    GESM SW24LRxErrorThreshold TRAP TYPE  
76. on        1000Base LX Single Fiber WDM  BiDi  1000 FDX e    eee a     Port 21 22 23  24 are TP SFP fiber dual media ports with auto detected function   Optional SFP module supports LC or BiDi SC transceiver        Transmission Mode  10 100Mbps support full or half duplex  1000Mbps support full duplex only      Transmission Speed  10 100 1000Mbps for TP  1000Mbps for Fiber      Full Forwarding Filtering Packet Rate  PPS  packets per second       Forwarding Rate   Speed    _1 488 000PPS___   1000Mbps            14 880PPS      MAC Address and Self learning  8K MAC address      Buffer Memory  Embedded 400 KB frame buffer      Flow Control  IEEE802 3x compliant for full duplex  Backpressure flow control for half duplex      Cable and Maximum Length     1000Base SX  1000Base LX    Cat  5 UTP cable  up to 100m   Up to 220 275 500 550m    which depends on Multi Mode Fiber type  Single Mode Fiber  up to10 30 50Km       1000Base LX WDM  BiDi        Single Mode Single Fiber  up to 20Km    101    User Manual      Diagnostic LED     System LED   Power  Per Port LED   10 100 1000M TP Port 1 to 24   LINK ACT  10 100 1000Mbps  1000M SFP Fiber Port 21 22 23 24    SFP LINK ACT     Power Requirement AC Line  Voltage 100 240 V  Frequency 50 60 Hz  Consumption 20W    Ambient Temperature   0   to 40  C    Humidity   10  to 90     Dimensions 44 H  x 442 W  x 170 3 D  mm    Comply with FCC Part 15 Class A  amp  CE Mark Approval    102    User Manual    Management Software Specifications          Aut
77. on  for sure  there is no  mechanism to tell all the involved devices  What will it be if receiving device is busy  and a frame is coming at the same time  Can it use    backpressure    to tell the  source device  A function flow control is introduced in the full duplex operation     31    User Manual    3 3  Flow Control    Flow control is a mechanism to tell the source device stopping sending frame  for a specified period of time designated by target device until the PAUSE time  expires  This is accomplished by sending a PAUSE frame from target device to  source device  When the target is not busy and the PAUSE time is expired  it will  send another PAUSE frame with zero time to wait to source device  After the  source device receives the PAUSE frame  it will again transmit frames immediately   PAUSE frame is identical in the form of the MAC frame with a pause time value and  with a special destination MAC address 01 80 C2 00 00 01  As per the specification   PAUSE operation can not be used to inhibit the transmission of MAC control frame     Normally  in 10Mbps and 100Mbps Ethernet  only symmetric flow control is  supported  However  some switches  e g  24 Port GbE Web Smart Switch  support  not only symmetric but asymmetric flow controls for the special application  In  Gigabit Ethernet  both symmetric flow control and asymmetric flow control are  supported  Asymmetric flow control only allows transmitting PAUSE frame in one  way from one side  the other side is not but r
78. on  hardware version  MAC address   serial number  active IP address  active subnet mask  active gateway  DHCP  server and Lease time left     Set device name  DHCP enable  fallback IP address  fallback subnet mask   fallback gateway  management VLAN  password and inactivity timeout     Parameter description   System Description   The simple description of this switch   Firmware Version   The firmware version of this switch   Hardware Version   The hardware version of this switch   MAC Address   It is the Ethernet MAC address of the management agent in this switch   Serial Number   The serial number is assigned by the manufacturer   Active IP Address     Show the active IP address of this switch   51    User Manual  Active Subnet Mask     Show the active subnet mask of this switch   Active Gateway    Show the active gateway of this switch   DHCP Server    Show the IP address of the DHCP server    Default  0 0 0 0  Lease Time Left    Show the lease time left of DHCP client   Device Name     Set a special name for this switch  Up to 16 characters are allowed in  this parameter  Any alphanumeric character and null are acceptable     Default  Giga Switch  DHCP Enabled   Enable DHCP snooping  Just tick the check box  M  to enable it   Default  disable  Fallback IP Address     Users can configure the IP settings and fill in new values  Then  click   lt Apply gt  button to update     Default  192 168 1 1  Fallback Subnet Mask     Subnet mask is made for the purpose to get more netwo
79. ononononononaninonanons 71  4 2 11  QOS Quality Of Service  Configuration              ooocococccononononnnnnononocononononononanonans 72  A E O 75   Fig  4 24 Filter Configuration          ooooccccoccnocononocononeconononanononnononoononononononononanononaninenanons 76  AL RAS AO ct 77   Fig  4 25 Rate Limit CONFIQUIatiON        oocccccoccnocononocononononocoononnonnnononononononononononaninonanons 17  A2 SOM CONW ON sik actions  a a hat sche ou as ata ae E E EA peat 78  Fig 4 26 Storm Control Configuration         ooccccconnnoconinocononoconocoononononnonononononononaninonanonos 78  ADV ISIN AE eria a kites A RAE E A sied tea aL ota cle Nasi E a ia ela 80   AS MONITORING a aa 82  4 3 1  Statistics OVOIVICW        c cccccccscccseescnsnesenensneneuscseusecseusensaesensnenenenscsuauseseesensnanenss 82  4 3 2 GTA od SlAUSUCS e e Es 84    Aa 3o O A E acdsee E urueteednad tats 87    A A 88   AS IOMP US sia 90   da O SA A E A 91   AMIA IN TENAN O aa i   a caen 93  SA e a lester ders tie aerate EE 94   ARAN ACI AROS ette 95   AA SOWAS DU DOI a o assi 96   4 4 4  Configuration File TransTer       ooooccccocncccocnnocononoconnononononononononnnnononononononanncnaninnns 97   Fig  4 37 Configuration Upload Download        oocccccooncccccncccccnnncoconoconononononnonononaninononoss 97   De Trouble  Hood  ti id data 99  9 1  RESOLVING  NO LINK CONDITION nda ds cds 99  O Scat rece ssn tease Sear orcad a ota eased tele dtestdaat otis na teaclae tad aeaettabhs 99  APPENDIX A TECHNICAL SPECI
80. ority   Rx Broadcast   Show the counting number of the received broadcast packet   Rx Multicast   Show the counting number of the received multicast packet   Rx Broad  and Multicast     Show the counting number of the received broadcast with multicast  packet     Rx Error Packets   Show the counting number of the received error packets   Tx Packets   The counting number of the packet transmitted   TX Octets   Total transmitted bytes   Tx High Priority Packets   Number of Tx packets classified as high priority   Tx Low Priority Packets   Number of Tx packets classified as low priority   Tx Broadcast   Show the counting number of the transmitted broadcast packet   Tx Multicast     Show the counting number of the transmitted multicast packet   84    User Manual  Tx Broad  and Multicast     Show the counting number of the transmitted broadcast with multicast  packet     Tx Error Packets    Show the counting number of the received error packets   Rx 64 Bytes    Number of 64 byte frames in good and bad packets received   Rx 65 127 Bytes    Number of 65   126 byte frames in good and bad packets received   Rx 128 255 Bytes    Number of 127   255 byte frames in good and bad packets received   Rx 256 511 Bytes    Number of 256   511 byte frames in good and bad packets received   Rx 512 1023 Bytes    Number of 512   1023 byte frames in good and bad packets received   Rx 1024 Bytes     Number of 1024 max_length byte frames in good and bad packets  received     Tx 64 Bytes    Number of 64
81. ority  All Normal Priority  All  Medium Priority  or All High Priority     Port Number    When Custom is selected for Prioritize Traffic  you may assign specific  Port Number for 802 1p Configuration     802 1p Configuration     Each Priority can select any of Queue  In Default  Priority O is mapping to  Queue normal  Priority 1 is mapping to Queue low  Priority 2 is mapping  to Queue low  Priority 3 is mapping to Queue normal  Priority 4 is  mapping to Queue medium  Priority 5 is mapping to Queue medium   Priority 6 is mapping to Queue high  and Priority O is mapping to Queue                   high   Configuration es  System Information z  gt   Ports QoS Configuration  YLANS    VLAN Mode QoS Mode   802 1p  v      LAN Group     as  Aggregation Prioritize Traffic   Custom v  LACP Port Number   Port 1 Mi  RSTP     802 1X    IGMP Snooping  Mirror             QoS 802 1p Configuration  Filter 802 1p 802 1p  802 1p 802 ip  Storm Control 0 low v  1 low   normal     3 normal x     SNMP    4 medium v  5 p 6  high  v  7  high      Detailed Statistics    Monitoring  LACP Status Cancel    Fig  4 22 802 1p Setting       73    User Manual    Function name   DSCP QoS Mode  Function description     In the late 1990s  the IETF redefined the meaning of the 8 bit SERVICE TYPE  field to accommodate a set of differentiated services  DS   Under the  differentiated services interpretation  the first six bits comprise a codepoint   which is sometimes abbreviated DSCP  and the last two bits are left 
82. orized     Link Down   Re authenticate authenticate  Force Reinitialize Reinitialize  Statistics     Force Authorized    Force  Force Authorized        AMOS do Re authenticate authenticate  Force Reinitialize Reinitialize  Statistics      Force Authorized     Link Down Re authenticate authenticate Force Reinitialize    Statistics     Force authorized    Force Authorized     Link Down  Re authenticate authenticate Force Reinitialize Reinitialize  Statistics     Force Authorized    Force  Force Authorized        Link Down  Re authenticate  Force Reinitialize    Statistics    11   Force Authorized        Link Down Re authenticate Force Reinitialize    Statistics    12   Force Authorized       Link Down  Re authenticate  Force Reinitialize  Statistics    A A A        amp   w         Ch  an       D  0      23   Force Authorized       Link Down Re authenticate Force Reinitialize Statistics    24   Force Authorized bal   Link Down Re authenticate Force Reinitialize Statistics    Re authenticate All Force Reinitialize All         apoly J Refresh    Fig  4 16 802 1X Configuration    Statistics     Choose the port which you want to show of 802 1X statistics  the screen  include Authenticator counters  backend Authenticator counters  dot1x  MIB counters and Other statistics     Press the  lt Refresh gt  button will fresh the screen and see the newer  counters     68    User Manual                            802 1X Statistics for Port 1  Pott   Port2   Port3  Porta   Port5  Porte   Portz
83. ppened    Supports default configuration which can be restored to overwrite the current  configuration which is working on via Web UI and Reset button of the switch    Supports on line plug unplug SFP modules    Supports Quality of Service  QoS  for real time applications based on the  information taken from Layer 2 to Layer 3     Built in web based management instead of using CLI interface  providing a more  convenient GUI for the user    User Manual    1 4  View of 24 Port GbE Web Smart Switch       Fig  1 1 Full View of the Switch    1 4 1  User Interfaces on the Front Panel  Button  LEDs and Plugs     There are 24 TP Gigabit Ethernet ports and 4 SFP fiber ports for optional  removable modules on the front panel of the switch  LED display area  locating on  the left side of the panel  contains a Power LED  which indicates the power status  and 24 ports working status of the switch     Reset Button       RJ45 ports ae  Status LED i Gigabit RJ45 Ports SFP Ports  SFP ports    Power LED Status LED    Fig  1 2 Front View of the Switch    e LED Indicators    LED Color Function  System LED    POWER Lit when  3 3V power is coming up    10 100 1000Ethernet TP Port 1 to 24 LED    LINK ACT Cor Lit when connection with remote device is good  Blinks when any traffic is present    Lit Green when TP link on 1000Mbps speed  Green    Lit Amber when TP link on 100Mbps speed  10 100 1000Mbps   Amber   Off when 10Mbps or no link occur    Blinks when any traffic is present       User Manual  1
84. prefix from 16 bits to  say 24 bits  that   s using its third byte to subnet this class B  network  Now it has a subnet mask 255 255 255 0  in which each bit of the first  three bytes is 1  It   s now clear that the first two bytes is used to identify the class B  network  the third byte is used to identify the subnet within this class B network and   of course  the last byte is the host number     Not all IP address is available in the sub netted network  Two special  addresses are reserved  They are the addresses with all zero s and all one s host  number  For example  an IP address 128 1 2 128  what IP address reserved will be  looked like  All Os mean the network itself  and all 1s mean IP broadcast     Network Subnet    All 0s   128 1 2 128       All 1s  128 1 2 255 111111111    18    User Manual    In this diagram  you can see the subnet mask with 25 bit long   255 255 255 128  contains 126 members in the sub netted network  Another is that  the length of network prefix equals the number of the bit with 1s in that subnet mask   With this  you can easily count the number of IP addresses matched  The following  table shows the result     refix Length  No  of IP matched  No  of Addressable      a  a  a  a  a  at  a        12   12   12   12   12                5    U    ON    ON Uy            Mb O E N         NO  00       NO  ON    2  1  0  9  8  T  6  5  4  3  2  1  0  19  18  17  16    N  NO    N              MIS    Table 2 3       ON   GN  gt        u         UI NO N   O
85. products     1  Public standardized specification   2  No interoperability issue   3  No change to IEEE 802 3 frame format  no change in software and  management    Increased bandwidth and availability   Load sharing and redundancy   Automatic configuration   Rapid configuration and reconfiguration   Deterministic behavior   Low risk of duplication or mis ordering   Support existing IEEE 802 3 MAC Clients   Backwards compatibility with aggregation unaware devices     gt      o    ON 991        ek    There are also some constraints when applying LACP     1  LACP does not support inter switch bandwidth aggregation    2  The ports aggregated must operate in full duplex mode    3  The ports in the same Link Aggregation Group must have the same  speed  for example  all with 100Mbps or all 1000Mbps  You cannot  aggregate a 1000Mbps and two 100Mbps for a 1 2Gbps trunk port     45    User Manual    Terminology  Link Aggregation     It is a method to have multiple physical links with the same media and speed  bundled to be a logical link forming a Link Aggregation Group with a group ID  With  the viewpoint of MAC client  each Link Aggregation Group is an independent link     There are three cases of link used in the network  which are switch to switch   switch to station and station to station  Here station may be a host or a router     Link Aggregation  called port trunking sometimes  has two types of link  configuration  including static port trunk and dynamic port trunk       Stati
86. puter B  but cannot connect to Computer C  through the 24 Port GbE Web Smart Switch    v The network device of Computer C may fail to work  Please check the  link act status of Computer C on the LED indicator  Try another network  device on this connection    v The network configuration of Computer C may be something wrong  Please  verify the network configuration on Computer C     2  The uplink connection function fails to work   v The connection ports on another must be connection ports  Please check if  connection ports are used on that 24 Port GbE Web Smart Switch   v Please check the uplink setup of the 24 Port GbE Web Smart Switch to  verify the uplink function is enabled     3  The console interface cannot appear on the console port connection    v  24 Port GbE Web Smart Switch has no console port  so you cannot use  console interface to connect with 24 Port GbE Web Smart Switch     4  How to configure the 24 Port GbE Web Smart Switch     v User can use IE browser program in window series of computer to control  the web smart functions in 24 Port GbE Web Smart Switch  First  choose  any port in 24 Port GoE Web Smart Switch  Then  use IE and type default IP  address  192 168 1 1  to connect to 24 Gigabit with RJ45 network line   Finally  the login screen will appear at once     99    User Manual    Appendix A  Technical Specifications    Features    20  10 100 1000Mbps  Gigabit Ethernet  TP  switching ports are compliant with  IEEE802 3  802 3u  802 3z and 802 3ab    4 
87. rd the packet  There are ingress  rule and egress rule applied  The ingress rule is used to filter the incoming packet  by VLAN ID and so on and to decide whether the packet is allowed to enter the  switch or not  The egress rule is used to forward the packet to the proper port     37    User Manual    Mac address aging    There is a field in MAC address table used to put the entry s Age time which  determines how long a MAC entry can reside in a switch  The age time is refreshed  when a packet with that SA  Usually  the age time is programmable     Transmission schedule    In most layer 2 switches  the QoS is supported  QoS in a switch must  associate a transmission schedule to transmit the packet  This function is much to  do with the priority level a packet has  With the given priority  the scheduler will do  the proper action on it  The scheduler has many ways to implement  and different  chips may support different schedule algorithms  Most common schedulers are     FCFS  First Come First Service   Strictly Priority  All High before Low   Weighted Round Robin     Set a weight figure to the packet with a priority level  say 5 7  and next  set  another weight to the packet with a priority level  say 2 4 and so on  The WRR will  transmit the packet with the weight  So the packet of each priority level can be  allocated a fixed bandwidth     Bandwidth rating    Bandwidth rating is the limitation set by administrator  and it can be applied  to those with SLA  Bandwidth rating
88. rent names for each VLAN groups  at one switch     12    User Manual    Case 2b  Port based VLAN  See Fig 2 4               Fig  2 4 Port based VLAN Diagram       Dz      VLAN1 members could not access VLAN2  VLAN3 and VLAN4 members    2  VLAN2 members could not access VLAN1 and VLAN3 members  but they could  access VLAN4 members    3  VLAN3 members could not access VLAN1  VLAN2 and VLAN4     4  VLAN4 members could not access VLAN1 and VLAN3 members  but they could  access VLAN2 members     Case3a  The same VLAN members can be at different switches with the same VID   See Fig  2 5         Fig  2 5 Attribute based VLAN Diagram    13    User Manual    2 1 3  Configuring the Management Agent of the Switch    In the way of web  user is allowed to startup the switch management function   Users can use any one of them to monitor and configure the switch  You can touch  them through the following procedures     Section 2 1 3 1  Configuring Management Agent of the Switch through Ethernet  Port    14    User Manual    2 1 3 1  Management through Ethernet Port    There are two ways to configure and monitor the switch through the switch s  Ethernet port  They are Web browser and SNMP manager  We just introduce the  first type of management interface  Web based Ul for the switch is an interface in a  highly friendly way     24 PORT GBE WEB SMART SWITCH  Default IP Setting    IP   192 168 1 1   Subnet Mask   255 255 255 0  Default Gateway   192 168 1 254            eeeeeeeneeneee      cie
89. rk address  because any IP device in a network must own its IP address  composed  of Network address and Host address  otherwise can   t communicate with  other devices each other  But unfortunately  the network classes A  B   and C are all too large to fit for almost all networks  hence  subnet mask  is introduced to solve this problem  Subnet mask uses some bits from  host address and makes an IP address looked Network address  Subnet  mask number and host address  It is shown in the following figure  This  reduces the total IP number of a network able to support  by the amount  of 2 power of the bit number of subnet number  2  bit number of subnet  number       52    User Manual    32 bits      NeworkiD     Hostio            Subnet number    Subnet mask is used to set the subnet mask value  which should be the  same value as that of the other devices resided in the same network it  attaches     For more information  please also see the Section 2 1 4    IP Address  Assignment    in this manual     Default  255 255 255 0  Fallback Gateway     Set an IP address for a gateway to handle those packets that do not  meet the routing rules predefined in the device  If a packet does not meet  the criteria for other pre defined path  it must be forwarded to a default  router on a default path  This means any packet with undefined IP  address in the routing table will be sent to this device unconditionally     Default  192 168 1 254  Management VLAN   Show the management VLAN number  
90. rmation are different in  comparison with the basic Ethernet frame  The rest fields are the same     The first two bytes is VLAN type ID with the value of 0x8100 indicating the  received frame is tagged VLAN and the next two bytes are Tag Control Information   TCI  used to provide user priority and VLAN ID  which are explained respectively in  the following table        User Priority 7 0  0 is lowest priority  CFI  Canonical Format Indicator   1  RIF field is present in the tag header  0  No RIF field is present    VID  VLAN Identifier    0x000  Null VID  No VID is present and only user  priority is present    0x001  Default VID   OxFFF  Reserved       Table 3 5    Note  RIF is used in Token Ring network to provide source routing and comprises  two fields  Routing Control and Route Descriptor     When MAC parses the received frame and finds a reserved special value  0x8100 at the location of the Length Type field of the normal non VLAN frame  it will  interpret the received frame as a tagged VLAN frame  If this happens in a switch   the MAC will forward it  according to its priority and egress rule  to all the ports that  is associated with that VID  If it happens in a network interface card  MAC will  deprive of the tag header and process it in the same way as a basic normal frame   For a VLAN enabled LAN  all involved devices must be equipped with VLAN  optional function     At operating speeds above 100 Mbps  the slotlime employed at slower  speeds is inadequate to accommo
91. s powerful QoS function  This function supports VLAN tagged  priority that can make precedence of 8 priorities  and DSCP  Differentiated Services  Code Point  on Layer 3 of network framework         System Information g   Ports QoS Configuration   VLANs    VLAN Mode   QoS Disabled Y    VLAN Group mE   Aggregation i   LACP   RSTP   3802 1X   IGMP Snooping   Mirror   gos   Filter   Rate Limit   Storm Control   SNMP       Fig  4 21 QoS Configuration    Function name   QoS Configuration  Function description     While setting QoS function  please select QoS Mode in drop down menu at  first  Then you can use 802 1p Priority and DSCP Priority functions  In this  function  you can enable disable QoS Mode and set Priority Control  such as   802 1p and DSCP  The switch only supports Strict Priority  High priority queue  is always passed first     12    User Manual    Function name   802 1p QoS Mode  Function description     This function will affect the priority of VLAN tag  Based on priority of VLAN tag   it can arrange 0 7 priorities  priorities can map to 4 queues of the switch  low   normal  medium  high  and possess different bandwidth distribution according  to your weight setting     Parameter description     Prioritize Traffic    Five Prioritize Traffic values are provided  Custom  All Low Priority  All  Normal Priority  All Medium Priority  and All High Priority     The QoS setting would apply to all ports on the switch if one of the  following values is selected  All Low Pri
92. s representative immediately if any of the aforementioned  items is missing or damaged     1 3  Features    The 24 Port GbE Web Smart Switch  a standalone off the shelf switch   provides the comprehensive features listed below for users to perform system  network administration and efficiently and securely serve your network     e Hardware   20 10 100 1000Mbps Auto negotiation Gigabit Ethernet TP ports   4 10 100 1000Mbps TP or 1000Mbps SFP Fiber dual media auto sense  400KB on chip frame buffer    Jumbo frame support    Programmable classifier for QoS  Layer 2 Layer 3    8K MAC address and support VLAN ID  1 4094    Per port shaping  policing  and Broadcast Storm Control  IEEE802 1Q in Q nested VLAN support   Full duplex flow control  IEEE802 3x  and half duplex backpressure    Extensive front panel diagnostic LEDs  System  Power  TP Port1 24  LINK ACT   10 100 1000Mbps  SFP Port 21  22  23 24  SFP LINK ACT     Management    e Supports concisely the status of port and easily port configuration  e Supports per port traffic monitoring counters    e Supports a snapshot of the system Information when you login  e Supports port mirror function    e Supports the static trunk function    User Manual    Supports 802 1Q VLAN   Supports user management and limits one user to login   Maximal packet length can be up to 9600 bytes for jumbo frame application  Supports Broadcasting Suppression to avoid network suspended or crashed  Supports to send the trap event while monitored events ha
93. ser can use drop down menu  to select number of frames  Default is No Limit  The setting range is  1k 1024k per second     Flooded unicast Rate     To enable the Flooded unicast Storm capability  User can use drop down  menu to select number of frames  Default is No Limit  The setting range  is 1k 1024k per second     NOTE     After completing the function s setting  press  lt Apply gt  button to have this  function taken effect     79    User Manual  4 2 15 SNMP    Any Network Management System  NMS  running the Simple Network  Management Protocol  SNMP  can manage the Managed devices equipped with  SNMP agent  provided that the Management Information Base  MIB  is installed  correctly on the managed devices  The SNMP is a protocol that is used to govern  the transfer of information between SNMP manager and agent and traverses the  Object Identity  OID  of the management Information Base  MIB   described in the  form of SMI syntax  SNMP agent is running on the switch to response the request  issued by SNMP manager     Basically  it is passive except issuing the trap information  The switch  supports a switch to turn on or off the SNMP agent  If you set the field SNMP     Enable     SNMP agent will be started up  All supported MIB OIDs  including RMON  MIB  can be accessed via SNMP manager  If the field SNMP is set    Disable     SNMP  agent will be de activated  the related Community Name  Trap Host IP Address   Trap and all MIB counters will be ignored     Function name   S
94. sion domain  it can extend the  LAN diameter farther than the shared HUB does and highly improve the efficiency  of the traffic transmission     Due to the architecture  the switch can provide full duplex operation to  double the bandwidth per port and many other features  such as VLAN  bandwidth  aggregation and so on  not able to be supported in a shared hub     Terminology  Separate Access Domains     As per the description in the section of    What   s the Ethernet     Ethernet  utilizes CSMA CD to arbitrate who can transmit data to the station s  attached in the  LAN  When more than one station transmits data within the same slot time  the  signals will collide  referred to as collision  The arbitrator will arbitrate who should  gain the media  The arbitrator is a distributed mechanism in which all stations  contend to gain the media  Please refer to    What s the Ethernet    for more details     In Fig 3 5  assumed in half duplex  you will see some ports of the switch are  linked to a shared HUB  which connects many hosts  and some ports just are  individually linked to a single host  The hosts attached to a shared hub will be in the  same collision domain  separated by the switch  and use CSMA CD rule  For the  host directly attached to the switch  because no other host s  joins the traffic  contention  hence it will not be affected by CSMA CD  These LAN segments are  separated in different access domains by the switch     Micro segmentation     To have a port of the s
95. ss     Set up the limit of Ingress bandwidth for the port you choose  Incoming  traffic will be discarded if the rate exceeds the value you set up in Data  Rate field  Pause frames are also generated if flow control is enabled   The format of the packet limits to unicast  broadcast and multicast  Valid  value of Port 1 24 ranges from 128 3968 kbps     Default  No Limit  Egress     Set up the limit of Egress bandwidth for the port you choose  Outgoing  traffic will be discarded if the rate exceeds the value you set up in Data  Rate field  Pause frames are also generated if flow control is enabled   The format of the packet limits to unicast  broadcast and multicast  Valid  value of Port 1 24 ranges from 128 3968 kbps     Default  No Limit   Configuration    System Information os X  Rate Limit Configuration      VLAN Mode    VLAN Group            No Limit            No Limit          No Limit          IGMP Snooping  Mirror   Qos   Filter   Rate Limit   Storm Control  SNMP   Monitoring    Statistics Overview  Detailed Statistics  LACP Status   RSTP Status   IGMP Status   Ping    Warm Restart  Factorv Default      tli       Fig  4 25 Rate Limit Configuration    11      No Limit          No Limit            No Limit Y       No Limit    x          No Limit    b             No Limit                   No Limit Y    v       No Limit              No Limit    v            No Limit    3           No Limit    v            No Limit    al            No Limit       v            User Manual  
96. ss the   lt Apply gt  button to apply     Key Value     It s key for an aggregation  This must be an integer value between 1 and  255 or auto select by switch     configuration      System Information    LACP Port Configuration      Key Value    VLAN Group Port  Protocol Enabled    9 1255   1 O    Aggregation    auto    auto    0 00     K     Rate Limit  Storm Control  SNMP    K   K K    Statistics Overview  Detailed Statistics  LACP Status   RSTP Status   IGMP Status   Ping   Warm Restart  Factorv Default    CEE CTER YE             O    Fig  4 11 LACP Port Configuration    60    User Manual  4 2 7  RSTP    RSTP detects and resolves network loops  and provides backup links  between switches  bridges and routers  The protocol allows a switch to  communicate with other RSTP compliant switches  and to ensure only one path  existing between two stations in your network environment     The switch allows you to create multiple STP configurations and assign ports  to a specific tree     Function name   RSTP System Configuration  Function description   This screen is used to display the RSTP system configuration and set the  need of parameters   Parameter description   system Priority     System priority is used in determining the root switch  root port and  designated port  The switch with the highest priority  lowest numeric  value  becomes the STP root switch  If all switches have the same  priority  the switch with the lowest MAC address will then become the  root switch  Select 
97. tart the process by sending to the  authenticator     And next  the Supplicant replies an EAP Response Identity to the  authenticator  The authenticator will embed the user ID into Radius   Access Request command and send it to the authentication server  for confirming its identity     After receiving the Radius Access Request  the authentication  server sends Radius Access Challenge to the supplicant for asking  for inputting user password via the authenticator PAE     The supplicant will convert user password into the credential  information  perhaps  in MD5 format and replies an EAP Response  with this credential information as well as the specified  authentication algorithm  MD5 or OTP  to Authentication server via  the authenticator PAE  As per the value of the type field in message  PDU  the authentication server knows which algorithm should be  applied to authenticate the credential information  EAP MD5   Message Digest 5  or EAP OTP  One Time Password  or other  else algorithm     lf user ID and password is correct  the authentication server will  send a Radius Access Accept to the authenticator  If not correct   the authentication server will send a Radius Access Reject     When the authenticator PAE receives a Radius Access Accept  it  will send an EAP Success to the supplicant  At this time  the  supplicant is authorized and the port connected to the supplicant  and under 802 1x control is in the authorized state  The supplicant  and other devices connected to this
98. terface malfunctioned in the LAN   When detecting the case  the MAC drops the packet and goes  back to the ready state     If the DA of the received frame exactly matches the physical  address that the receiving MAC owns or the multicast address  designated to recognize  If not  discards it and the MAC passes  the frame to its client and goes back to the ready state     If the frame is too long  If yes  throws it away and reports frame  Too Long     If the FCS of the received frame is valid  If not  for 10M and 100M  Ethernet  discards the frame  For Gigabit Ethernet or higher  speed Ethernet  MAC has to check one more field  i e  extra bit  field  if FCS is invalid  If there is any extra bits existed  which  must meet the specification of IEEE802 3  When both FCS and  extra bits are valid  the received frame will be accepted   otherwise discards the received frame and reports  frameCheckError if no extra bits appended or alignmentError if  extra bits appended     If the length type is valid  If not  discards the packet and reports  lengthError     If all five procedures above are ok  then the MAC treats the frame  as good and de assembles the frame     33    User Manual    What if a VLAN tagging is applied     VLAN tagging is a 4 byte long data immediately following the MAC source  address  When tagged VLAN is applied  the Ethernet frame structure will have a  little change shown as follows     VLAN   Tag control   Length         Only two fields  VLAN ID and Tag control info
99. ther almost without limitation   The transmission media may be the only problem     Application    Presentation        Session Upper layer  protocols    Transport    Network T MAC dient IEEE 802 spacific    Data link Media Access  MAC  IEEE 602  3 specific    Physical Physical  PHY  Media specific    Fig  3 1 IEEE 802 3 reference model vs  OSI reference mode    In Fig  3 1  we can see that Ethernet locates at the Data Link layer and  Physical layer and comprises three portions  including logical link control  LLC    media access control  MAC   and physical layer  The first two comprises Data link  layer  which performs splitting data into frame for transmitting  receiving  acknowledge frame  error checking and re transmitting when not received correctly  as well as provides an error free channel upward to network layer     23    User Manual             Coaxial STP UTP Fiber       This above diagram shows the Ethernet architecture  LLC sub layer and  MAC sub layer  which are responded to the Data Link layer  and transceivers  which  are responded to the Physical layer in OSI model  In this section  we are mainly  describing the MAC sub layer     Logical Link Control  LLC     Data link layer is composed of both the sub layers of MAC and MAC client   Here MAC client may be logical link control or bridge relay entity     Logical link control supports the interface between the Ethernet MAC and  upper layers in the protocol stack  usually Network layer  which is nothing to do with 
100. tics   LACP Status   RSTP Status   IGMP Status   Ping   Warm Restart    Eii Default    Jit       System Configuration    System Description P ca presage pir rt Switch    v0 91    v1 01    00 40 c7 3c 00 00    031801000001   192 168 1 1   255 255 255 0    1192 168 1 254 7  0 0 0 0    Firmware Version  Hardware Version  MAC Address    DHCP Server  Lease Time Left       GESM SW24L  DHCP Enabled a       Device Name             Fallback IP Address 192 168 1 1          Fallback Subnet Mask       255 255 255 0       192 168 1 254       Fallback Gateway             Management VLAN    Firmware Version         Hardware Version         MAC Address  DHCP Server  Lease Time te    Device Name    DHCP Enabled    Fallback YP Address    Fallback Subnet Mask    Fallback Gateway    Management VLAN    48    User Manual    e The Information of Page Layout    On the top part of the information page  it shows the front panel of the switch   Linked ports will be displayed in green color  and linked off ones will be in black   For the optional modules  the slots with no module will only show covered plates   the other slots with installed modules would present modules  The images of  modules would depend on the ones you insert  Vice versa  if ports are  disconnected  they will show just in black     On the left side  the main menu tree for web is listed in the page  According to  the function name in boldface  all functions can be divided into three parts   including    Configuration        Monitorin
101. tion trunking group   Group 1 8     Group the ports you choose together  Up to 12 ports can be selected for  each group     SEE Aggregation Trunking Configuration    System Information    coats Group Port  1  2  3   4   5  6   7   8   9  10 11 12 13 14  15 16 17  18  19  20  2122 23  24    VLAN   a ERE Normal              olololololololololololololololo  a crow   1 lolololo olololololololololololololololo  LACP    Group 2  RSTP    802 1X Group 3    IGMP Snooping   Mirror 3 Group 4  Qos   Filter Group 5  Rate Limit   Storm Control Group 6    SNMP  Group 7    Statistics Overview Group 8  Detailed Statistics    LACP Status  RSTP Status Refresh         Fig  4 10 Aggregation Trunking Configuration    59    User Manual  4 2 6  LACP    Smart Web Switch supports link aggregation IEEE802 3ad standard  The  standard describes Link Aggregate Control Protocol  LACP  which dynamically  creates and manages trunk groups     When you enable LACP link aggregation on a port  the port can automatically  negotiate with the ports at the remote end of a link to establish trunk groups  LACP  also allows port redundancy  that is  if an operational port fails  then one of the     standby    ports become operational without user intervention    Function name   LACP Port Configuration  Function description     Enable or disable LACP protocol  user is allowed to set the aggregation key  value     Parameter description     Protocol Enabled     Just tick the check box  IM  to enable LACP protocol then pre
102. unused     DSCP can form total 64  0 63  kinds of Traffic Class based on the  arrangement of 6 bit field in DSCP of the IP packet  In the switch  user is  allowed to set up these 64 kinds of Class that belong to any of queue  low   normal  medium  high      Parameter description     Prioritize Traffic    Five Prioritize Traffic values are provided  Custom  All Low Priority  All  Normal Priority  All Medium Priority  and All High Priority     The QoS setting would apply to all ports on the switch if one of the  following values is selected  All Low Priority  All Normal Priority  All  Medium Priority  or All High Priority     Port Number    When Custom is selected for Prioritize Traffic  you may assign specific  Port Number for DSCP Configuration     DSCP Configuration     64 kinds of priority traffic as mentioned above  user can set up any of  Queue  low  normal  medium  high   In default  Priority 0 63 are mapping  to Queue high                                   Configuration 2 QoS Configuration   System Information   Ports QoS Mode  DSCP v    VLANs       an    YLAN Mode OS All High Priority        LAN Group teehee Port 1 Mi   Aggregation   LACP   RSTP   802 1X PP      IGMP Snooping   DSCP Configuration   Mio  DSCP Value 0  63    Qos   high Y   Filter   a a   Rate Limit a high     Storm Control 3       SNMP   high Y             high ov       Detailed Statistics   T   A         lt z  LACP Status    high Y  RSTP Status Poo                            Whigh      IGMP Status   e  
103. w root bridge ID of this network segment  If this switch is a root  bridge  the    This switch is Root    will show this switch s bridge ID     88    User Manual  CATA      System Information    Ports RSTP VLAN Bridge Overview  VLANs    VLAN Mode wg  oes ha Tin    VLAN Group   1  32769 00 40 c7 3c 00 01 2 120 15   Steady This switch is Root     IGMP Snooping RSTP Port Status  Mirror    Qos 7 Port Group    vian Id Mai Cost ias Port       Port  Protocol Port State    Filter   Porti    Non STP  Rate Limit    Storm Control I     t i crac  ds  SNMP Port 3   Non STP    COC  ron  non STP  Statistics Overview ports       Non STP  Detailed Statistics ena O           gar cues Port 7   Non STP  Tent eiiie A XA S   Non STP  Ping 5 ECIN Porto   p         Non STP  ronio O NSP  Warm Restart Port 11 Non STP    factory Default paez OO NSP    Fig  4 31 RSTP Status                               89    User Manual    4 3 5  IGMP Status    Function name   IGMP Status  Function description     Display IGMP status  In Fig  4 29  the window shows VLAN ID for each  multicast group     Parameter description    VLAN ld    Show VLAN ld for each multicast group   Querier    Show the group membership queries status   Queries transmitted    To count the group membership queries transmitted   Queries received    To count the group membership queries received   V1 Reports     When a host receives a group membership query  it identifies the groups  associated with the query and determines to which groups it be
104. witch connected to a single host is referred to as  micro segmentation  lt has the following interesting characteristics       There is no need the access contention  e g Collision   They  have their own access domain  But  collision still could happen  between the host and the switch port       When performing the full duplex  the collision vanishes     The host owns a dedicated bandwidth of the port     The switch port can run at different soeed  such as 10Mbps  100Mbps or  1000Mbps  A shared hub cannot afford this     35    User Manual             Collision domain 2             Collision domain 1          Fig 3 5 Collision Domain         A jaca       m     _       LS  gt  AO  gt  Pa 2 S       Collision Collision Collision  domain3 domain4 domain 5    Extended Distance Limitations     The diameter of a half duplex LAN segment is determined by its maximum  propagation delay time  For example  in 10M LAN  the most distance of a LAN  segment using yellow cable is 2500 meters and 185 meters when using coaxial  cable  The switch with its per port per collision domain can extend the distance like  a bridge does  And what s more  when operating in full duplex mode  the distance  can reach farther than half duplex because it is not limited by the maximum  propagation delay time  512 bits time   If fiber media is applied  the distance can be  up to tens of kilometers     Traffic Aggregation     Traffic aggregation is to aggregate the bandwidth of more than one port and  treat it as 
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
ASUS Z87-K T8191 User's Manual  Samsung GT-S5750E Priručnik za korisnike    アシスト・スイングM.D.取扱説明書PDF  AVT MP3 SOUND MODULES SERIES 100  OMD 201 - Inelmatec  クオリティーの高い仕事領域へ。 ビジネス専用のVAIO  2883 compleet - S.K. Handels GmbH    Copyright © All rights reserved. 
   Failed to retrieve file