3onedata IPS7112G-4GS-8GPOE User Manual Download Page 69

                                                                                                   

User manual

 

63

                                                                   

www.3onedata.com

 

 

(Figure 6.6.2.3) 

 

6.6.3 SNMP configuration 

Introduction of SNMP 

SNMP (Simple Network Management Protocol) is an internet-standard protocol for managing devices on 

IP networks. It is used mostly in network management systems to monitor network-attached devices for 

conditions that warrant administrative attention.   

 

Work Mechanism of SNMP 

SNMP includes 2 parts: NMS and Agent:   

NMS: Network Management Station. Software runs on the manager. The common management 

platforms are "Quid View", "Sun Net Manager" and "IBM Net View". Agent is the software of the server 

running in the network device.   

NMS can send "Get Request", "Get Next Request" and "Set Request" message to Agent. After Agent 

gets those messages, it will read or write according to the message type to create Response message 

and send the Response message back to NMS. Agent will also send Trap message to NMS when the 

device is abnormal. 

 

SNMP supports 3 kinds of basic operating in total:   

Get: 

Manager can use this to get some variable value of Agent.   

Set: 

Manager can use this to set up some variable value of Agent.   

Trap: 

Agent uses this to send an alarm to manager.   

 

SNMP Version 

Currently SNMP Agent of the device supports SNMP V3 and it is also compatible with SNMP V1and 

SNMP V2C. It is authenticated by user name and password in SNMP V3.   

SNMP V1 and SNMP V2C adopt authentication of Community Name. The SNMP message of the 

community name which is not authenticated will be discarded. SNMP community name defines the 

relationship of SNMP NMS and SNMP Agent. User can choose the following one or more features related 

to community name.   

1. Defines MIB view of community name.   

Summary of Contents for IPS7112G-4GS-8GPOE

Page 1: ...IPS7112G 4GS 8GPOE Managed Industrial Ethernet Switch User manual Version 1 0 0 Jun 2017 www 3onedata com ...

Page 2: ...al belong to their respective manufacturers Agreement As the product version upgrades or other reasons this document is subject to change without notice Unless other agreement this document only as a guide to use All statement information and suggestion in this document without warranty of any kind either expressed or implied Revision History Version No Date Reason V1 0 0 Jun 2017 Document creatio...

Page 3: ... 4 Packing List 9 Chapter 5 Network Configuration 10 5 1 Configure PC s IP Address 10 Chapter 6 WEB Management 11 6 1 Configurate preparing 11 6 2 System Configuration 13 6 2 1 System information 13 6 2 2 Configuration network 15 6 2 3 User configuration 16 6 2 4 Device log message 16 6 2 5 SSHD configuration 17 6 2 6 Telnet configuration 18 6 2 7 HTTPS configuration 19 6 2 8 Diagnosis 19 6 2 8 1 ...

Page 4: ...n 37 6 4 2 1 MAC configuration 37 6 4 2 2 Static MAC 38 6 4 3 Spanning tree 39 6 4 3 1 Bridge setting 39 6 4 3 2 Instance setting 40 6 4 3 3 Bridge port 41 6 4 3 4 Instance port configuration 42 6 4 4 IGMP Snooping 43 6 4 4 1 IGMP Snooping 43 6 4 4 2 Static Multicast 44 6 4 5 SW Ring 45 6 4 5 1 Global configuration 45 6 4 5 2 Node configuration 45 6 4 6 GMRP configuration 49 6 4 6 1 GMRP global co...

Page 5: ...ical 67 6 6 4 3 History 68 6 6 4 4 Alarm 69 6 6 5 DHCP Server configuration 70 6 6 5 1 DHCP Server configuration 70 6 6 5 2 DHCP pool configuration 70 6 6 5 3 Leases list 71 6 6 5 4 Static leases configuration 72 6 6 5 5 Port binding configuration 72 6 6 6 DHCP snooping 73 6 6 6 1 Global configuration 73 6 6 6 2 Static binding 74 6 6 7 DNS configuration 75 6 6 8 NTP configuration 76 6 7 System man...

Page 6: ...User manual 5 www 3onedata com Appendix 1 Glossary table 81 Appendix 2 Treatment of common problem 83 ...

Page 7: ...king temperature can meet all kinds of Industrial environment requirement and provide the solution of the economy 1 2 Features Support IEEE802 3 IEEE802 3u IEEE802 3z ab IEEE802 3x IEEE802 1Q IEEE802 1p IEEE802 1W D IEEE802 1s IEEE802 3ad IEEE802 1X Support 8 10 100 1000Base T X RJ45 PoE ports and 4 Gigabit SFP slot SW Ring ring network patent technology Fault recovery time 20ms Support STP RSTP M...

Page 8: ...e view 1 Ground screw 2 Terminal block for relay output 3 Console port 4 Terminal block for power input PWR1 PWR2 5 DIP switches 6 DIN Rail mounting kit 7 System running indicator 8 Relay alarm indicator 9 Power input P1 P2 LED 10 PoE port Link ACT indicator 11 Ethernet port Link ACT indicator 12 Gigabit PoE port 13 Gigabit SFP port ...

Page 9: ...the terminal block please take care of operation sequence 2 3 DIP Switch Top panel provided 4 bits DIP switch to do function configure ON to enable effective 1 and 4 keep for future function 2 is recovery default factory 3 is for upgrade Please power off and power on when you change the status of DIP switch 2 4 Relay connection Relay access terminals in the top panel of the device Between the two ...

Page 10: ...PC Server Converter and HUB Pin 1 2 3 4 5 6 7 8 Corresponding connections in MDI 1 3 2 6 3 1 4 7 5 8 6 2 7 4 8 5 are used as cross wiring in the MDI X port of Converter and HUB In MDI MDI X 100 1000Base TX PIN defines is as follows PIN MDI MDI X 1 BI_DA TX BI_DB RX 2 BI_DA TX BI_DB RX 3 BI_DB RX BI_DA TX 4 BI_DC BI_DD 5 BI_DC BI_DD 6 BI_DB RX BI_DA TX 7 BI_DD BI_DC 8 BI_DD BI_DC Note 10Base T 100B...

Page 11: ...nterface is used SFP optical module communication through optical fiber transmission can choice different SFP module according to different transfer distance Fiber interface must use for pair TX port is transmit side must connect to RX receive side The fiber interface support loss line indicator Suppose If you make your own cable we suggest labeling the two sides of the same line with the same let...

Page 12: ... 12 ON Port connection is active Blinking Data transmitted OFF Port connection is not active POE 1 8 ON The PoE device is connected by IEEE802 3af at standard OFF No PoE power output or no PoE connected PoE devices 2 8 Installation Before installation confirm that the work environment meet the installation require including the power needs and abundant space Whether it is close to the connection e...

Page 13: ...direction and laying position need to match construction requirements and cable length depends on actual position 4 All the cable cannot have break down and terminal in the middle 5 Cables should be straight in the hallways and turning 6 Cable should be straight in the groove and cannot beyond the groove in case of holding back the inlet and outlet holes Cables should be banded and fixed when they...

Page 14: ...User manual 8 www 3onedata com Chapter 3 Appearance and Dimension 3 1 Appearance 3 2 Dimension Unit mm ...

Page 15: ...ur first using Please inform us or our distributor if your equipments have been damaged or lost any accessories we will try our best to satisfy you Description Quantity Industrial PoE switch 1 User manual 1 Documentation and software CD 1 Warranty card 1 Certificate of quality 1 DIN Rail mounting kit 1 ...

Page 16: ...PC s IP address 192 168 1 X X is less than 254 from 2 to 253 Click OK IP address modifies successfully Method 2 Modify the switch IP address through Blue_eyes manager software Install Blue_eyes manager software on the PC Enter into Blue_eyes management interface click Search to search the device After searching the device move mouse to the device click right key modify the device s IP address Plea...

Page 17: ...t IP address configuration please refer to 5 1 if need local configuration Computers and switches must be routed reach if for remote configuration How to log on to Web Server Please type in the default IP of switch on the browser s address bar and then will pop up a window by clicking the enter key which shows you have to enter your user name and password The default username and password is admin...

Page 18: ...ate Port rate limit Set port input rate and output rate Mirror Set source port and destination port Alarm setting Set relay alarm PoE Config PoE port power setting Port channel Config Static and LACP configuration Isolate port Config Set isolation port Port statistic Port data statistics Layer 2 Configuration VLAN Configuration Displays the list of the current VLAN and the configuration and manage...

Page 19: ...agement Management File Switch software upgrade access save or restore the configuration of the switch Save Save the current configuration Reboot reboot device Restore Restore factory settings Firmware System upgrade Web Timeout Treatment The system timeout will cancel the login if the user did not login for a long time The configuration of this login will be remained in the Web interface If user ...

Page 20: ...ce management Hardware Version Current hardware version Firmware Version Current firmware version Running time Current device usage time CPU usage Current device using CPU information Memory usage Current devices use memory size information CPU MAC Hardware address of the device It is a unique address which is made up of hexadecimal number with 48 bits 6 bytes in length Language switching Figure 6...

Page 21: ...pe Address range Available IP network range A 0 0 0 0 126 255 255 255 1 0 0 0 126 0 0 0 B 128 0 0 0 191 255 255 255 128 0 0 0 191 254 0 0 C 192 0 0 0 223 255 255 255 192 0 0 0 223 255 254 0 D 224 0 0 0 239 255 255 255 Non E 240 0 0 0 246 255 255 255 Non Others 255 255 255 255 255 255 255 255 A B C class address is unicast address D class address is multicast address E class address is reserved to ...

Page 22: ...sword does not contain the spaces and etc characters the length of the character is not more than 31 characters Privilege The visitor s permission is 1 15 If you forget the user name and password please contact the company s technical support in the home page in order to get help 6 2 4 Device log message Log configuration of the main functions of the role to view the device log information history...

Page 23: ...ayer and transport layer SSH is currently more reliable designed for remote login sessions and other network services to provide security protocols Using SSH protocol can effectively prevent the process of remote management of information leakage problem but also to prevent the DNS and IP There is also an additional advantage is that the transmission of the data is compressed so you can speed up t...

Page 24: ...e IP address of the switch equipment can be modified to obtain in the system management view can use the IP command 3 if connected to the PC terminal and the switch port within the same local area network LAN the IP address must be set in the same segment otherwise terminal and the switch must cross the router Meet the above three points you can use the Telnet command to log on to the switch and t...

Page 25: ...S configuration enter the HTTPS configuration interface Figure 6 2 7 1 Enable HTTP access to the format HTTP 192 168 1 254 Enable HTTPS access to the format HTTPS 192 168 1 254 HTTPS configuration steps Step 1 check the box in the HTTP check box to enable Step 2 check the box in the HTTPS check box to enable Step 3 in the port of the text box to fill in the port number the default port number is 8...

Page 26: ...r in order to click on the main menu system configuration diagnostic traceroute enter the traceroute interface Figure 6 2 6 2 Traceroute configuration steps Step 1 fill in the destination IP address in the IP address text box Step 2 click test to see the results 6 2 8 3 Port loopback Port loopback is a common method for the maintenance and troubleshooting communication port line The receiving end ...

Page 27: ...tep 2 click the Apply button 6 3 Port Configuration 6 3 1 Port Settings The port configuration interface mainly includes port type Electric port or optical port setup speed mode and duplex mode flow control Only when the port is enabled for the port speed duplex flow control will work Select auto negotiation speed and duplex auto negotiation Figure 6 3 1 ...

Page 28: ... requirements in particular 1000Base Tx Gigabit Ethernet connection at least to use cat5e Port Speed Port speed shows the connecting speed of the port It includes 3 kinds of speed 10M 100M and auto negotiation 10M uses 10base T standard and UTP cable for connection When the port is in 10M speed Link Act indicator will blink continuously while data transmitting and status indicator of 10M 100Mbps w...

Page 29: ...ol to control the data flow between the sending and receiving nodes can prevent packet loss Polarity MDI MDIX auto negotiation MDI II Medium Dependent Interface II mode is a kind of standard built by IEEE for RJ 45 UTP cable of fast Ethernet 100BASE T II stands for parallel configuration MDI X Media Dependent Interface x mode and MDI II is a kind of standard built by IEEE for RJ 45 UTP cable of fa...

Page 30: ...DoS attack broadcast storm If the storm control function is enabled this attack can be prevented For the type of storm we test the three types of packets Broadcast packets data frame of the destination address of FF FF FF FF FF FF Multicast packets destination address is XX XX XX XX XX XX data frames second x is odd numbers such as 1 3 5 7 9 b d and f x represents any digit Unknown unicast packet ...

Page 31: ...he device provides a rate limit of two directions in which the inlet velocity is the actual rate of flow from the PC and other devices to the switch port Exit speed is the actual speed between the switch port and the flow of the device If at the same time limit the inlet velocity and outlet velocity between the two devices the actual speed is smaller Port speed limit configuration step Step 1 in t...

Page 32: ...of monitored message such as only monitoring of transmitted messages of appointed port The device configures port mirroring function through port mirroring group Each group includes a monitored port and a group of mirror ports Total bandwidth of mirroring is not more than that of monitored port It is good to monitor and manage its internal network data when using port mirroring in a company It is ...

Page 33: ... IGMP snooping mirroring only FCS treatment normal package cannot handle the wrong data frame 6 3 5 Alarm setting Alarm is divided into power supply alarm port alarm Its main function is when the equipment is in abnormal state can promptly notify the administrator and quickly repair the equipment status avoid excessive losses Power alarm Power alarm is the main power outage alarm enabling power al...

Page 34: ...ponding operation view the work status current value current total power current power but also can set its maximum power POE total power 1 120W the corresponding port power values are 10W 15W 30W Each port output maximum power of 30W 6 3 6 1 Global configuration In the menu bar click Main Menu Port Config POE Config Global Config to enter the global configuration interface ...

Page 35: ...ed into a logical link to achieve the purpose of increasing the link bandwidth At the same time these bundled links can effectively improve the reliability of the link by inter dynamic backup Based on an IEEE802 3ad standard LACP link aggregation control protocol protocol is an implementation of dynamic link aggregation protocol operation equipment of the agreement between the mutual LACPDU link a...

Page 36: ...c configuration enter the Static configuration interface Figure 6 3 7 1 Load balance mode of the aggregation group there are 3 kinds of Src Mac according to the source MAC address of the message to share the load when the source MAC address phase at the same time the message in the same port through otherwise the message from different ports through Dst Mac according to the purpose of the message ...

Page 37: ...ly the speed and duplex properties are the same and the ports that are connected to the same device and have the same basic configuration can be dynamically converged Even if only one port can also create dynamic convergence this time for single port aggregation In dynamic convergence the LACP protocol of the port is in the state of enable In the menu bar click on the main menu port configuration ...

Page 38: ... need to add the port to the isolation group you can achieve isolation between the two layer of data between the port data Port isolation provides a more secure and flexible networking solution for the user In the menu bar click on the main menu port configuration isolate port enter the port isolation configuration interface Figure 6 3 8 Configuration port isolation step Step 1 check the port isol...

Page 39: ... 9 2 Detail port state In the menu bar click the main menu port configuration Port Statistics Detail port state enter the port with statistics interface In the interface we can view to every port of different kinds of packet reception and transmission ...

Page 40: ...ate the security of broadcast information 3 Flexible management Change users belong to the network does not have to change the port and connection only to change the software configuration on it That is in the same VLAN can communicate with each other in a different VLAN cannot communicate with each other A VLAN with VLAN ID to identify with the same VLAN ID is the same VLAN 6 4 1 1 PVlan configur...

Page 41: ...th transmit and receive message Type Receive message Message did not take Tag Message take Tag Access Put the VLAN tag point to Port default VLAN ID for message Put the VLAN tag point to Port default VLAN ID for message Trunk Put the VLAN tag point to Port default VLAN ID for message Keep up VLAN ID no need replace Type Transmit message Unmodify Did not modify when transmit the data packet is the ...

Page 42: ...1 fill Vid in the text box in the Vlan ID Step 2 fill in the description of the text box to fill in the description of the vlan Step 3 select Flood all Flood unknow or drop in the multicast drop down box Step 4 click the add modify button 6 4 1 4 MAC VLAN Based on MAC partition VLAN is another method of VLAN It defines the VLAN member in accordance with the source MAC address of the message and se...

Page 43: ...he switch to achieve fast forwarding 6 4 2 1 MAC configuration Each port of the switch has the function of automatically learning the address and the source address the source MAC address and the switch port number of the transmitting and receiving frame of the port will be stored in the address table Aging time is a parameter that affects the learning process of the switch The default is 300 seco...

Page 44: ... and the corresponding table entry is required when the port changes The multicast address table is displayed in the IGMP listener table entry The aging time of the MAC address is 300 seconds After the port is disconnected the upper level program clears all the corresponding port list items 6 4 2 2 Static MAC Static MAC manually set by the user not aging In the menu bar in order to click on the ma...

Page 45: ... protocol STP Spanning Tree Protocol RSTP Rapid Spanning Tree Protocol and MSTP Multiple Spanning Tree Protocol There are two main functions of the spanning tree protocol one is to use the spanning tree algorithm in the Ethernet network to create a port for the root of a switch to generate a tree to avoid loop Two is in the Ethernet topology changes through the spanning tree protocol to achieve th...

Page 46: ...n name in MST domain Bridge configuration steps Step 1 check the Spanning tree in the check box Step 2 select STP RSTP or MSTP in the mode selection Step 3 the priority of the text box to fill in the value of the priority Step 4 fill in the values of Max age Hello time Forward delay Max hop Revision and Name Step 5 click the Apply button 6 4 3 2 Instance setting In the menu bar click on the main m...

Page 47: ...he text box for the Vlan Mapped Step 4 click the add button 6 4 3 3 Bridge port In the menu bar click main menu layer 2 configuration spanning tree bridge port to enter the bridge port configuration interface the interface can be enabled ports in spanning tree configuration port type link type and BPDU protection function Figure 6 4 3 3 Configuration item meaning BPDU Guard Configuration BPDU prot...

Page 48: ... enable check box Step 2 check the BPDU Guard check box to enable port BPDU protection function Step 3 select automatic Force True or Force False in the Edge drop down box Step 4 select automatic Force True or Force False in the Point to Point drop down box Step 5 click the Apply button 6 4 3 4 Instance port configuration In the menu bar in order to click on the main menu layer 2 configuration spa...

Page 49: ...d did not receive BPDU Listening Can receive packets after the connection to it switches stay max age 20s in the blocking so judge whether switch port can become root port or designated port the port state will convert listening the state remains 15 ms if it works receive and forward packets during this time to achieve the selection of root for RST structure and the direction of port The decision ...

Page 50: ... 4 4 1 IGMP Snooping configuration steps Step 1 in the IGMP Snooping configuration to enable the check box to enable IGMP Step 2 in the host aging time of the text box to fill in the aging time Step 3 click the Apply button 6 4 4 2 Static Multicast The main function of the static multicast some ports will be added to a multicast group when data is sent to the multicast address the data can be rece...

Page 51: ...m the network The switch supports maximum 4 ring groups Each group set up 2 ports as Ring Port and a port cannot belong to several rings Hello_time setting is time interval of sending detecting packet to network at regular time The unit is ms Its main purpose is to detect network connection It sends a detecting packet to next door devices by CPU If they receive it then reply a confirm packet to en...

Page 52: ...e is Single Configure other switches the same as this switch reboot these switches then connect port 4 and port 5 through network cable use BlueEyes software search the switches the topology of the ring network is as below figure Dual ring configuration Double ring as shown below figure we can send dual ring is 2 rings combining the point is number 105 switch ...

Page 53: ... method 1 Enable Ring Group 1 and Ring Group 2 Hello_time can be disable too if it enable time of sending Hello packet could not be very fast or it will influence CPU dealing speed 2 Set up Port 1 and 2 of Device 105 106 to be Ring Ports in Ring Group 1 Network ID is 1 Ring Type Single Set up Port 4 of device to be Coupling Port in Ring Group 2 Coupling Control Port is 2 Network ID is 3 and Ring T...

Page 54: ...Port in Ring Group 1 Network ID is1 Ring Type is Single Set up Port 7 and 8 of Device 107 108 and 109 to be Ring Ports in Ring Group 2 Network ID is 2 Ring Type is Chain 3 Use a wire to connect Port 7 and 8 of Device 107 109 in turn to make a chain Use a wire to connect Port 7 and 8 of Device 100 103 in turn to make a Single Ring Then use a wire to connect Port 8 of Device 107 and Port 7 of Device...

Page 55: ...to constrain multicasts at Layer 2 without the need to install or configure software on hosts When a host wants to join an IP multicast group it sends an IGMP join message which spawns a GMRP join message Upon receipt of the GMRP join message the switch adds the port through which the join message was received to the appropriate Multicast group The switch propagates the GMRP join message to all ot...

Page 56: ...ration item meaning ForwardAll forward Join Time In the first time sent the Join message did not get a reply the second time will send Join messages Time interval between two Join messages Leave Time When the switch wants other switches to write off their own attribute information the Leave message will be sent to the outside LeaveAllTime When the switch is started the LeaveAll timer will be start...

Page 57: ...Registration drop down box Step 7 click the Settings button 6 4 6 3 GMRP group In the menu bar in order to click on the main menu layer 2 configuration GMRP configuration GMRP group access to view the GMRP group interface the interface can view the information of the GMRP group Figure 6 4 6 2 6 5 Network security 6 5 1 Access control In the menu bar click on the main menu network security access c...

Page 58: ...ng to a predetermined policy 6 5 2 1 ACL group configuration In the menu bar click main menu network security ACL configuration ACL group configuration into ACL group configuration interface the interface can port setting MAC access list ID and IP access list ID Figure 6 5 2 1 ACL GROUP configuration step Step 1 fill in the port of the MAC ACL list ID or IP ACL list ID Step 2 click the Settings bu...

Page 59: ...te time or cycle time Step 5 if the absolute time in the start time and end time of the text box to fill in the time and date If the cycle time fill in the time at the time of the text box and select the checkbox in the week number of cycles Step 6 click the add button 6 5 2 3 MAC ACL configuration MAC ACL is used to identify the message flow in the purpose of MAC address access control settings i...

Page 60: ...to fill in the value of the group ID Step 2 click the add button Step 3 fill in the added group ID in the text box of the group ID of the configuration rule Step 4 fill in the value of rule ID in the text box of rule ID Step 5 select deny or permit in the action drop down box Step 6 fill in the blank in the source MAC address or MAC source text box Step 7 fill in the blank in the destination MAC a...

Page 61: ... in the configuration of the IP access list of the group ID in the text box to fill in the value of the group ID Step 2 click the add button Step 3 fill in the added group ID in the text box of the group ID of the configuration rule Step 4 fill in the value of rule ID in the text box of rule ID Step 5 select deny or permit in the action drop down box Step 6 select the any IGMP IP TCP or UDP in the...

Page 62: ...hieve the separation of business and certification After the user passed the authentication business stream and certification flow should separate no special requirements on the follow up packet processing the business can be very flexible in particular have a great advantage in carrying out the business of broadband multicast all business are not subject to certification way limit 802 1X authenti...

Page 63: ...authentication server which is used for authentication and the IP address domain name that the devices can access the default Port is 1812 Authenticate the Shared Password For device access the shared secret string of authentication server Global configuration step Step 1 select enable or disable 802 1x authentication Step 2 select the Radius server remote or local fill in the authentication updat...

Page 64: ...et loss rate and other core needs to provide support for the assessment of the service capabilities 6 6 1 1 Global configuration QoS provides four internal queues each queue supports four different levels of traffic shorter persistence time of high priority data packets in the switch supports lower latency for certain delay sensitive traffic According to 802 1p priority tags and IP TOS equipment c...

Page 65: ...3 COS in the Queue drop down box to select the value of 0 3 Queue and then click the apply button Step 3 configure DSCP queue mapping in the DSCP drop down box to select the 0 63 value DSCP in the DSCP New drop down box to select the DSCP 0 63 value New in the Cos drop down box to select the Cos value 0 3 and then click the apply button 6 6 1 2 Port configuration In the menu bar in order to click ...

Page 66: ...vices to send updated information to that neighbor devices will be the information stored in the standard SNMP MIB library Network management system can query from the SNMP MIB Library of the current second layer connection It should be noted that LLDP is only a remote device status information discovery protocol it can t complete the network device configuration and port control and other functio...

Page 67: ... to 2 5 seconds LLDP global configuration step Step 1 select enabled or disabled in the radio buttons in LLDP Step 2 fill in the value of the sending period in the text box of the send cycle Step 3 the value of the retransmission time in the text box of the retransmission time Step 4 fill in the value of the sending interval in the text box of the sending interval Step 5 fill in the re enable dela...

Page 68: ... it is conducive to the network topology network management network management The management address is encapsulated in the Management Address TLV field of the LLDP message and is sent to the neighbor node LLDP port configuration step Step 1 check the port in the sent check box Step 2 check the port in the received check box Step 3 fill in the IP address in the text box of the management address ...

Page 69: ... will read or write according to the message type to create Response message and send the Response message back to NMS Agent will also send Trap message to NMS when the device is abnormal SNMP supports 3 kinds of basic operating in total Get Manager can use this to get some variable value of Agent Set Manager can use this to set up some variable value of Agent Trap Agent uses this to send an alarm...

Page 70: ...ist of the community name 6 6 3 1 System information Select enable or disable SMNP features Figure 6 6 3 1 SNMP system configuration steps Step 1 select the checkbox to enable or disable in the mode of the Step 2 click the Apply button 6 6 3 2 View Fill in the name of the view as well as the mode node OID Figure 6 6 3 2 View configuration steps Step 1 fill in the name of the view Step 2 select mod...

Page 71: ...l in the name of the view Step 4 click add 6 6 3 4 V3 User SNMPv3 using USM User Based Security Model certification mechanism Network administrators can set the authentication and encryption functions Certification for verify the message sender s legitimacy and avoid the illegal user access encryption is to encrypt the transmission message between NMS and agent so as not to be tapped Using authent...

Page 72: ...MIB information specific to the device is uses as device connector These network devices can be monitored or controlled through the agent When trap event happens a message is transmitted by SNMP Trap an available trap receiver can get this trap information Figure 6 6 3 5 Trap configuration steps Step 1 fill in the trap event occurs when the message is sent to the destination IP address Step 2 clic...

Page 73: ...s Step 1 in the serial number of the text box to fill in the event group number Step 2 fill in the description of the text box for the description of the event group Step 3 select none log log trap and in the action drop down box Step 4 click the add button 6 6 4 2 Statistical In the menu bar followed by click on the main menu advanced configuration and RMON configuration Statistics in RMON statis...

Page 74: ...erface the interface can add delete history group and view the configuration information for a group of history Set a physical port as the receiving end of the monitoring information serial number is used to identify a specific application interface when the serial number and the serial number of the application interface before setting the same the previous configuration will be replaced Figure 6...

Page 75: ...vious index MIB point corresponds to OID Alarm type adopt absolute to monitor the value of MIB target Adopt delta to monitor the change of MIB target value when get sample two times When monitor MIB value reach or pass the rising threshold value will occur event correspond to rising event index When monitor MIB value reach or pass the falling threshold value will occur event correspond to falling ...

Page 76: ...n to network environment host dynamics and can promote the rate of use of address 6 6 5 1 DHCP Server configuration DHCP Server enabled the device is used as a DHCP server by setting the static allocation address table to achieve the device can be connected to other devices connected to the device IP address In the menu bar in order to click on the main menu advanced configuration DHCP Server conf...

Page 77: ... pool configuration Step 1 fill in the name of the address pool in the text box of the name of the address pool Step 2 fill in the IP address in the text box of the subnet mask Step 3 configure the DHCP client automatically at the lease time to get to the address of the valid time Step 4 fill in the IP address in the text box of the default gateway Step 5 fill in the IP address in the text box of ...

Page 78: ...n steps Step 1 select the address pool name in the drop down box in the DHCP Pool Step 2 fill in the IP address of the text box to be assigned to the client s IP address Step 3 in the MAC address of the text box to fill in the MAC address of the client Step 4 click the add button 6 6 5 5 Port binding configuration In the menu bar in order to click on the main menu advanced configuration DHCP Serve...

Page 79: ...ent s IP address Step 4 click the add button 6 6 6 DHCP snooping DHCP Snooping that is the layer 2 of DHCP service monitoring function open the DHCP Snooping function the device can be extracted from the received DHCP ACK and DHCP REQUEST messages and record the IP address and MAC address information 6 6 6 1 Global configuration In the menu bar click main menu advanced configuration DHCP snooping ...

Page 80: ...e MAC address in the MAC text box Step 2 fill in the Vlan Id text box Vlan Id Step 3 fill in the IP address in the IP address text box Step 4 write the Tftp server box to fill in the Tftp server IP address Step 5 write the Tftp file name box to fill in the appropriate file name Step 6 select the port in the port selection bar Step 7 click the add button 6 6 6 3 Port configuration DHCP Snooping tru...

Page 81: ...rt after the Trust IPSG check box check box Step 4 in the corresponding port after the Policy Op82 drop down box selection Step 5 select the Circuit type drop down box at the end of the corresponding port Step 6 fill in ID in the Circuit id text box in the corresponding port Step 7 select the Remote type drop down box at the end of the corresponding port Step 8 fill in ID in the Remote id text box...

Page 82: ...veral clock source web site to provide users with timing services and between these sites should can compare improve the time accuracy In the menu bar in order to click on the main menu advanced configuration NTP settings to enter the NTP settings interface Figure 6 6 8 NTP server configuration step Step 1 select the checkbox to enable or disable in the mode of the Step 2 in the time interval of t...

Page 83: ...anagement file view launch configuration to enter the start configuration interface the interface can view the current configuration information Figure 6 7 1 1 6 7 1 2 Management file In the menu bar in order to click on the main menu system management management file management file into the configuration file management interface the interface can be downloaded uploaded profile ...

Page 84: ... upload Step 4 click the Upload button After the completion of the update will automatically open a new page to the system state 6 7 2 Save In the menu bar click on the main menu system management save to enter the storage configuration interface Figure 6 7 2 6 7 3 Reboot In the menu bar click on the main menu system management Reboot to reset the settings interface Figure 6 7 3 6 7 4 Restore In t...

Page 85: ...e 6 7 5 Online upgrade steps Step 1 click on the select file tab Step 2 click the Browse button select the location of the file to upload Step 3 click the Upload button 1 The upgrade process is prohibited without power after the confirmation began to burn and write flash 2 After the completion of the upgrade will automatically open a new page to the system state ...

Page 86: ... the following ways Internet service Make a call to our technical office Return or replace product 7 1 Internet Service Please visit http www 3onedata com 7 2 Make a call to our technical office You can call our technical support office the company has professional technical engineers to answer your questions and help you resolve your problems at the first time Free Service Hotline 400 600 4496 7 ...

Page 87: ... bit domain can classify packets into 64 level with the value 0 63 range E Ethernet Ethernet uses a bus or star shaped topology and supports transmission rates up to 10Mbps orders of magnitude A new version called fast Ethernet speeds of up to 100Mbps F Flow Control Flow control allows low rate devices communicate with high rate the flow control can match high rate port contracting speed with low ...

Page 88: ...group tied up a group of ports together to increase bandwidth and improve the connection reliability ToS Type of Service Packaged in IP packet header of 8 bit domain to perform the different priority packets U UDP User Datagram Protocol Face to disconnected unreliable transmission layer protocol UTP Unshielded Twisted Pair Not shielded media out of twisted pair ...

Page 89: ...host will continue to make alarm sound when got alarm information 5 Why cannot increase the bandwidth after configured trunking Check the Trunking Port s properties are coincident including rate duplex mode VLAN etc 6 How to deal the problem that some of ports cannot access When some of ports cannot access that may be line fault network card failure and switch port failure by the following test to...

Reviews: