background image

33

 

 

Ping 

This command sends ICMP echo request packets to another node on the 

network. 

Ping Parameters 

 

Target IP Address: IP address of the host 

 

Count: Number of packets to send. Four type of number can choose (1, 

5, 10 and 20). Default : 1   

 

Time Out: setting the time period of host will be Ping. Four type of 

number can choose (1, 5, 10 and 20). Default : 1   

Use the ping command to see if another site on the network can be 

reached. 

The following are some results of the 

ping 

command: 

 

Normal response: The normal response occurs in one to ten seconds, 

depending on network traffic. 

 

Destination does not respond: If the host does not respond, a 

“timeout” appears in ten seconds. 

 

Destination unreachable: The gateway for this destination indicates 

that the destination is unreachable. 

 

Network or host unreachable: The gateway found no corresponding 

entry in the route table. 

Press <Esc> to stop pinging. 

 

Figure 3-7 

Summary of Contents for ALL-SG4816CW

Page 1: ... ALLNET GmbH Computersysteme 2014 Alle Rechte vorbehalten 0 ALL SG4816CW Smart managed 16 Port Gigabit Combo TP SFP Switch 2 SFP Slots User Manual ...

Page 2: ...r there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation betwe...

Page 3: ...sions Weight 7 Front Panel 7 LED Indicators 8 Rear Panel 8 Hardware Installation 8 Software Description 9 Login 9 Configuration 10 System 10 Ports 11 VLAN 13 Aggregation 14 LACP 15 RSTP 16 802 1X 18 IGMP Snooping 19 Mirroring 20 Quality of Service QoS 21 Filter Configuration 23 Rate Limit Configuration 24 Storm Control 25 Monitorning 26 Statistics Overview 26 Detailed Statistics 26 LACP Status 27 ...

Page 4: ... ALLNET GmbH Computersysteme 2014 Alle Rechte vorbehalten 3 VeriPHY 32 Ping 33 Maintenance 34 Warm Restart 34 Factory Default 34 Software upload 35 Configuration File Transfer 35 Logout 36 ...

Page 5: ...kgroups It provides smooth network migration and is easy to upgrade the network capacity In addition the switch features comprehensive and useful function such as QoS Quality of Service Spanning Tree VLAN Port Trunking Bandwidth Control Port Security SNMP IGMP Snooping capability via the intelligent software It is suitable for both metro LAN and office application Web Management Features Port Mana...

Page 6: ...regation IEEE 802 1d Spanning tree protocol IEEE 802 1w Rapid Spanning tree protocol IEEE 802 1p Class of service Priority Protocols Number of Port 16 10 100 1000BaseT X UTP SFP combo ports 2 Gigabit SFP Open Slots Mechanical LED Indicator Per Port LINK ACT 1000 Per Unit Power Power Input 100 240V AC 50 60HZ Product Dimensions Weight 44 440 220 mm H W D 3kg Performance MAC Address 8K Buffer Memory...

Page 7: ...teme 2014 Alle Rechte vorbehalten 6 Package Contents Before you start to install this switch please verify your package that contains the following items One Gigabit Ethernet Switch One Power Cord CD User Manual Rack mount kit ...

Page 8: ... physical dimensions and functional overview would be described Physical Dimensions Weight 44 440 220 mm H W D 3kg Front Panel The front Panel of the web smart Switch consists of 16 10 100 1000BaseT X UTP SFP combo ports 2 Gigabit SFP Open Slots All of LED Indicators are also located on the front panel LED Display RJ 45 Port SFP Port SFP Port ...

Page 9: ...g Data activating SFP 1 18 Link ACT 1 18 On Link Flashing Data activating ACT 1 16 On Link Flashing Data activating Rear Panel The 3 pronged power plug is placed at the rear panel which is on the right side of the switch shown as below Hardware Installation Set the switch on a large flat space with a power socket close by The flat space should be clean smooth level and sturdy Make sure there is en...

Page 10: ... to understand the procedure At the first open the web browser and go to 192 168 2 1 site then the user will see the login screen Key in the password to pass the authentication then clicks the Apply The login process is completed and comes out the sign Password successfully entered Login Password admin Figure 1 1 After the user login the right side of website shows all functions as Fig 1 2 Figure ...

Page 11: ...ser can configure lots of information as below Figure 2 1 MAC Address Displays the unique hardware address assigned by manufacturer default S W Version Displays the switch s firmware version H W Version Displays the switch s Hardware version DHCP Enabled Click the box to enable DHCP Fallback IP address Manually assign the IP address that the network is ...

Page 12: ...ur management station SNMP Read Community A community string that acts like a password and permits access to the SNMP database on this switch SNMP Trap Community Community string sent with the notification operation Ports Port Security ensures access to a switch port based on MAC address limits the total number of devices from using a switch port and protects against MAC flooding attacks Port Conf...

Page 13: ... ALLNET GmbH Computersysteme 2014 Alle Rechte vorbehalten 12 Figure 2 2 ...

Page 14: ...me VLAN Basically creating a VLAN from a switch is logically equivalent of reconnecting a group of network devices to another Layer 2 switch However all the network devices are still plugged into the same switch physically Port Segmentation VLAN Configuration VLAN ID ID of configured VLAN 1 4094 no leading zeroes VLAN Configuration List Lists all the current VLAN groups created for this system Up ...

Page 15: ... component physical links Traffic in a trunk is distributed across an individual link within the trunk in a deterministic method that called a hash algorithm The hash algorithm automatically applies load balancing to the ports in the trunk A port failure within the trunk group causes the network traffic to be directed to the remaining ports Load balancing is maintained whenever a link in a trunk i...

Page 16: ...ce for uplink connections LACP Port Configuration Port The port number Enabled Enables LACP on the associated port Key Value Configures a port s LACP administration key The port administrative key must be set to the same value for ports that belong to the same link aggregation group LAG If this administrative key is not set when an LAG is formed i e it has the null value of 0 this key will automat...

Page 17: ... MAC address will then become the root device Number between 0 61440 in increments of 4096 Therefore there are 16 distinct values Hello Time Interval in seconds at which the root device transmits a configuration message BPDU frame Number between 1 10 default is 2 Max Age The maximum time in seconds a device can wait without receiving a configuration message before attempting to reconfigure That al...

Page 18: ...for the port Edge Expect the port to be an edge port linking to an end station or a link to another STP device Path Cost This parameter is used by the STP to determine the best path between devices Therefore lower values should be assigned to ports attached to faster media and higher values assigned to ports with slower media Set the RSTP path cost on the port Number between 0 200000000 0 means au...

Page 19: ...ess control PNAC ensures all users are authorized before being granted access to the network User authentication is carried out using any standard based RADIUS server 802 1X Configuration Mode Enables or disables 802 1X globally for all ports on the switch The 802 1X protocol must be enabled globally for the switch before the port settings are active Default Disabled RADIUS IP Address of authentic...

Page 20: ...an IGMP Leave it removes the host s port from the table entry Prevents flooding of IP multicast traffic and limits bandwidth intensive video traffic to only the subscribers IGMP Configuration IGMP Enabled When enabled the switch will monitor network traffic to determine which hosts want to receive multicast traffic Router Ports Set if ports are connecting to the IGMP administrative routers Unregis...

Page 21: ...s that require monitoring of network traffic such as an intrusion detection system Mirroring Configuration Port to Mirror to The port that will duplicate or mirror the traffic on the source port Only incoming packets can be mirrored Packets will be dropped when the available egress bandwidth is less than ingress bandwidth Ports to Mirror Select the ports that you want to mirror from this section o...

Page 22: ...This is the default selection Note WRR can only be selected if Jumbo Frame mode is disabled on the Port Configuration page Figure 2 10 1 QoS Mode QoS Disabled When the QoS Mode is set to QoS Disabled the following table is displayed QoS Mode 802 1p Packets are prioritized using the 802 1p field in the VLAN tag This field is three bits long representing the values 0 7 When the QoS Mode is set to 80...

Page 23: ...3 When QoS Mode is set to DSCP the DSCP Configuration table is displayed allowing you to map each of the DSCP values to a hardware output queue low normal medium or high The default settings map all DSCP values to the high priority egress queue User can use the Prioritize Traffic drop down list to quickly set values into the DSCP Configuration table which is a common priority queue Use Custom if y...

Page 24: ...taining the configured source network address are not filtered and can be forwarded by the switch Note In this mode the received packets are filtered except the IP packets with configured source network address For examples 1 IP Address 192 168 3 2 IP Mask 255 255 255 0 Network address 192 168 3 x 254 IP Addresses can be forwarded on the port 2 IP Address 192 168 3 2 IP Mask 255 255 255 255 Only I...

Page 25: ...the value you set up in Data Rate field Pause frames are also generated if flow control is enabled The format of the packet limits to unicast broadcast and multicast Valid value of Port 1 18 ranges is from 128 3968 kbps Default No Limit Shaper Set up the limit of Egress bandwidth for the port you choose Outgoing traffic will be discarded if the rate exceeds the value you set up in Data Rate field ...

Page 26: ...c for each port Any broadcast packets exceeding the specified threshold will then be dropped Storm Control Configuration Storm Control is used to block unnecessary multicast and broadcast frames that reduce switch s performance When the function is enabled and Storm Control rate settings are detected as exceeded the unnecessary frames would be dropped There are five types of traffic which can be r...

Page 27: ...istics Overview Statistic Overview for all ports User can mirror traffic from any source port to a target port for real time analysis the following figures shows clearly the statistics overview Figure 3 1 Detailed Statistics Display the detailed counting number of each port s traffic In the list the window can show all counter information each port at one time ...

Page 28: ... 3 3 1 Port The port number Port Active Shows if the port is a member of an active LACP group Partner Port Number A list of the ports attached at the remote end of this LAG link member Operational Port Key Current operational value of the key used by this LAG ...

Page 29: ...28 LACP Port Status Figure 3 3 2 RSTP Status RSTP VLAN Bridge Overview Figure 3 4 1 ...

Page 30: ...he device ports attached to the network Fwd Delay The maximum time in seconds the root device will wait before changing states i e discarding to learning to forwarding This delay is required because every device must receive information about topology changes before it starts to forward frames In addition each port needs time to listen for conflicting information that would make it return to a dis...

Page 31: ...if the switch detects another bridge connected to this port the manual setting for Edge Port will be overridden and the port will be instead of function as a point to point connection P2P Port Shows if this port is functioning as a Point to Point connection to exactly one other bridge The switch can automatically determine if the interface is attached to a point to point link or to shared media If...

Page 32: ... Queries transmitted Show the number of transmitted Query packets Queries received Show the number of received Query packets v1 Reports Show the number of received v1 Report packets v2 Reports Show the number of received v2 Report packets v3 Reports Show the number of received v2 Report packets v3 Leave Show the number of v3 leave packets received Figure 3 5 ...

Page 33: ...ults short open etc and feedback a distance to the fault Cable Diagnostics Cable diagnostics is performed on a per port basis Select the port number from the drop down list Cable Status Shows the cable length operating conditions and isolates a variety of common faults that can occur on Category 5 twisted pair cabling Figure 3 6 ...

Page 34: ... Use the ping command to see if another site on the network can be reached The following are some results of the ping command Normal response The normal response occurs in one to ten seconds depending on network traffic Destination does not respond If the host does not respond a timeout appears in ten seconds Destination unreachable The gateway for this destination indicates that the destination i...

Page 35: ...d here is software reset Warm Restart Press Yes button to restart the switch the reset will be complete when the power lights stop blinking Figure 4 1 Factory Default Factory Default provides the function to retrieve default settings and replace current configuration Except the IP address setting all settings will be restored to the factory default values when Factory Default function is performed...

Page 36: ...er Figure 4 3 Configuration File Transfer Configuration file transfer allows you to save the current configuration of the switch or restore a previously saved configuration back to the device Configuration files can be saved to any location on the web management station To upload the configuration file to save a configuration or click Download to restore a configuration Use the Browse button to ch...

Page 37: ...administrator has the authority to write and access for all parameters governing the onboard agent User should therefore assign a new administrator password as soon as possible and store it in a safe place Figure 4 5 ...

Page 38: ...37 ...

Reviews: