background image

GigaX Series L2 Managed Switch User Guide 

4.3.4 Reboot 

 

The 

Reboot

 page contains a 

 button. Clicking the button reboots the 

system. 

 

Rebooting the system stops the network traffic and 
terminates the Web interface connection. 

 

Figure 15.  Reboot 

4.3.5 Firmware 

Upgrade 

The 

Firmware 

page

 

contains the following information: 

Hardware Version: shows the hardware revision number. 

Boot ROM Version: shows the version of the boot code 

Firmware Version: shows the current running firmware version. This 
number will be updated after the firmware update. 

35 

Summary of Contents for GigaX 2024X

Page 1: ...GigaX Series Layer 2 Managed Switch User Guide ...

Page 2: ... or conditions of merchantability or fitness for a particular purpose In no event shall ASUS its directors officers employees or agents be liable for any indirect special incidental or consequential damages including damages for loss of profits loss of business loss of use or data interruption of business and the like even if ASUS has been advised of the possibility of such damages arising from an...

Page 3: ...ipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment to an outlet on a circuit different from that...

Page 4: ...ress 44370 Nobel Drive Fremont CA 94538 USA General Fax 1 502 933 8713 General Email tmd1 asus com Web Site usa asus com Technical Support Support Fax 1 502 933 8713 General Support 1 502 995 0883 Notebook Support 1 510 739 3777 x5110 Support Email tsd asus com ASUS COMPUTER GmbH Germany and Austria Address Harkort Str 25 D 40880 Ratingen BRD Germany General Fax 49 2102 9599 31 General Email sales...

Page 5: ...rdware 17 3 1 1 Installing the switch on a flat surface 17 3 1 2 Mounting the switch on a rack 17 3 2 Part 2 Setting up the switch 18 3 2 1 Connect the console port 18 3 2 2 Connect to the computers or a LAN 18 3 2 3 Attach the RPS module 18 3 2 4 Attach the power adapter 18 3 3 Part 3 Basic switch setting for management 20 3 3 1 Setting up through the console port 20 3 3 2 Setting up through the ...

Page 6: ...tatic Multicast 44 4 5 4 IGMP Snooping 45 4 5 5 Traffic Control 45 4 5 6 Dynamic Addresses 46 4 5 7 Static Addresses 48 4 5 8 Tagged VLAN 49 4 5 9 Default Port VLAN and CoS 52 4 5 10 CoS Queue Mapping 53 4 6 SNMP 55 4 6 1 Community Table 55 4 6 2 Host Table 56 4 6 3 Trap Setting 57 4 6 4 VACM Group 57 4 6 5 VACM View 59 4 6 6 USM User 60 4 7 Security 63 4 7 1 Port Access Control 63 4 7 2 Dial In U...

Page 7: ...ommands 76 5 3 1 System Commands 76 5 3 2 Physical Interface Commands 80 5 3 3 Bridge Commands 80 5 3 4 SNMP 88 5 3 5 Security Commands 95 6 IP Addresses Network Masks and Subnets 101 6 1 IP Addresses 101 6 1 1 Structure of an IP address 101 6 1 2 Network classes 103 6 2 Subnet masks 104 7 Troubleshooting 106 7 1 Diagnosing problems using IP utilities 106 7 1 1 ping 106 7 1 2 nslookup 108 7 2 Repl...

Page 8: ... Configuration manager login screen 25 Figure 9 Home page 26 Figure 10 Top frame 27 Figure 11 Expanded Menu List 28 Figure 12 Management 31 Figure 13 IP Setup 33 Figure 14 Administration 34 Figure 15 Reboot 35 Figure 16 Firmware Upgrade 36 Figure 17 Physical Interface 38 Figure 18 Spanning Tree 40 Figure 19 Link aggregation 42 Figure 20 Mirroring page 43 Figure 21 Static Multicast 44 Figure 22 IGM...

Page 9: ...Figure 35 Port Access Control 64 Figure 36 Dial In user 65 Figure 37 RADIUS 66 Figure 38 Traffic comparison 68 Figure 39 Error group 69 Figure 40 Historical Status 70 Figure 41 Save Configuration 71 Figure 42 CLI interface 73 Figure 43 Boot ROM Command Mode 74 Figure 44 SYS commands 78 Figure 45 Using the ping utility 107 Figure 46 Using the nslookup utility 108 Figure 47 Loosening the thumbscrew ...

Page 10: ...le 1 Front panel labels and LEDs 15 Table 2 Technical specifications 16 Table 3 LED Indicators 20 Table 4 Port color description 27 Table 5 Commonly used buttons and icons 29 Table 6 Boot ROM commands 75 Table 7 IP address structure 102 Table 8 Troubleshooting 111 ...

Page 11: ...r GBIC slots 802 1D 802 1w transparent bridge spanning tree protocol rapid spanning tree protocol 8K MAC address cache with hardware assisted aging 802 3x flow control 802 1Q based tagged VLAN up to 256 VLANs 802 1p class of service 4 queues per port IGMP snooping support 802 3ad link aggregation manual and LACP up to 15 trunk groups Port Mirroring 802 1X port based network access control RADIUS r...

Page 12: ...y Italics are used to present the parameters for the command line interpreter Boldface type text is used for items you select from menus and drop down lists and text strings you type when prompted by the program 1 2 3 Symbols This document uses the following icons to call your attention to specific instructions or explanations Note Provides clarification or additional information on the current to...

Page 13: ...ge comes with the following items GigaX 2024X 26 port L2 managed switch AC Power cord Null modem cable for console interface DB9 Rack installation kit two brackets with six 6 32 screws USB cable for console interface Installation CD ROM User Manual Quick installation guide Figure 1 GigaX L2 managed switch package contents 13 ...

Page 14: ...GigaX Series L2 Managed Switch User Guide 2 2 Front Panel The front panel includes LED indicators that show the system RPS fan and port status Figure 2 Front panel 14 ...

Page 15: ...stem LED is also off RPS does not work properly or not installed system LED is on Green On Both fans are working properly FAN Amber On Both or either one of the fans stopped On Link RJ 45 or SFP is present port is enabled Green Flashing Data is being transmitted received off No Ethernet link On Link is present but port is disabled either manually or by spanning tree 10 100 1000 port status Amber F...

Page 16: ... 2 4 Technical specifications Table 2 Technical specifications Physical Dimensions 43 5mm H X 444 mm W X 265mm D Input Consumption Power 100 240V AC 2 5A 50 60Hz 90 watts Input Output Redundant Power Supply RPS 100 240V AC 1 8A 50 60Hz 12V DC 12 5A Operating Storage Temperature 10 to 50 14 to 122 40 70 40 to 158 Humidity 15 to 90 0 to 95 Environmental Ranges Altitude up to 10 000 ft 3 000m 40 000 ...

Page 17: ...s for the switch Default gateway for the network Network mask for this network 3 1 Part 1 Installing the hardware Connect the device to the power outlet and your computer or network Figure 4 illustrates the hardware connections 3 1 1 Installing the switch on a flat surface The switch should be installed on a level surface that can support the weight of the switches and their accessories Attach fou...

Page 18: ... You can use either the crossover or straight through Ethernet cable to connect computers hubs or switches Use a twisted pair Category 5 Ethernet cable to connect the 1000BASE T port Otherwise the link speed can not reach 1Gbps 3 2 3 Attach the RPS module Connect your RPS module to the RPS jack and make sure the other end of the RPS is connected to the power cord Connect to the power cord to a gro...

Page 19: ...GigaX Series L2 Managed Switch User Guide Console Management RS 232 RPS USB Cat 5 Ethernet cables Expansion hub switch LAN computers Figure 4 Overview of Hardware Connections 19 ...

Page 20: ...ic settings for your switch You can manage the switch using the following methods Web interface the switch has a set of pages to allow to you manage it using Java enabled IE5 0 or higher version Command Line Interface use console port to manage the switch 3 3 1 Setting up through the console port 1 Use the supplied crossover RS 232 cable to connect to the console port on the back of the switch Thi...

Page 21: ... change the password at any time through CLI see section 5 3 1 To protect your switch from unauthorized access you must change the default password as soon as possible 6 Follow these steps to assign an IP address to the switch a Type net interface ip sw0 your ip address your network mask For example if your switch IP is 192 168 10 1 and the network mask is 255 255 255 0 Then you should type net in...

Page 22: ... the first time to use Web interface because the default configuration for Web access authentication is disabled To secure the system configuration please enable the authentication function at the Administration page under System category Skip step 2 if the authentication is disabled 2 At any PC connected to the network that the switch can access open your Web browser Internet Explorer and type th...

Page 23: ...efault gateway then click 4 If your new address is different from the default the browser can not update the switch status window or retrieve any page This is normal You have to retype the new IP address in the address location box and press Enter The WEB link returns 5 To enable authentication for Web access click Administration on the menu list then select Enabled to start the protection A login...

Page 24: ...GigaX Series L2 Managed Switch User s Guide Figure 7 IP Setup 24 ...

Page 25: ...TE Netscape is not supported 4 1 Log into Web user interface 1 From a PC open your web browser type the following in the web address or location box and press Enter http 192 168 1 1 This is the factory default IP address for the switch A login screen displays as shown in Figure 8 Figure 8 Configuration manager login screen Login is not required if you do not enable Web authentication access see 3 ...

Page 26: ...lts the first time you log into the program You can change the password at any time through CLI interface see section 5 3 1 Default User Name admin Default Password no password The home page appears each time you log into the program See Figures 9 Figure 9 Home page 26 ...

Page 27: ...iption Figure 10 Top frame Table 4 Port color description Port Color Description Green port Ethernet link is established Black No Ethernet link Amber port Link is present but port is disabled manually or by spanning tree Clicking on the port icon of the switch displays the port configuration in the lower right frame The left frame a menu frame as shown in Figure 11 contains all the features availa...

Page 28: ...GigaX Series L2 Managed Switch User s Guide Figure 11 Expanded Menu List The right frame displays configuration pages or graphics for the statistics See section 4 3 for details 28 ...

Page 29: ...buttons and icons The following table describes the function for each button and icon used in the application Table 5 Commonly used buttons and icons Button Icon Function Stores any changes you have made on the current page Adds the existing configuration to the system e g a static MAC address or a firewall ACL rule and etc Modifies an existing entry Modifies the existing configuration in the syst...

Page 30: ...n 4 3 1 Management The Management page contains the following information Model Name product name MAC Address switch MAC address System Name user assigned name to identify the system editable System Contact editable System Location editable To save any changes and make it effective immediately click Use to refresh the setting as shown in Figure 12 30 ...

Page 31: ...GigaX Series L2 Managed Switch User Guide Figure 12 Management 31 ...

Page 32: ...o system management interface It is necessary to be within the same VLAN for management usages DHCP Client Enable DHCP to get a dynamic IP address or disable DHCP to specify a static IP address The DHCP server must be reachable within the management VLAN IP Address assign a static IP address to the switch management interface Network Mask Default Gateway To save any changes and make it effective i...

Page 33: ...GigaX Series L2 Managed Switch User Guide Figure 13 IP Setup 33 ...

Page 34: ...d protection The default setting for web access does not require any authentication To save any changes and make it effective immediately click Use to refresh the setting as shown in Figure 14 When you enable the password protection you have to login again immediately You can change the password at any time through the CLI interface Figure 14 Administration 34 ...

Page 35: ...k traffic and terminates the Web interface connection Figure 15 Reboot 4 3 5 Firmware Upgrade The Firmware page contains the following information Hardware Version shows the hardware revision number Boot ROM Version shows the version of the boot code Firmware Version shows the current running firmware version This number will be updated after the firmware update 35 ...

Page 36: ... choose the file name of the firmware from prompt window Click to update the switch firmware See Figure 16 for reference Clicking the upload button loads the assigned firmware to the switch then reboot system after a successful firmware update You have to re login to Web interface again Figure 16 Firmware Upgrade 36 ...

Page 37: ...ing information for each port a Link status the link speed and duplex for an existing link otherwise link is down b State the STP state c Admin the setting value to disable or enable the port d Mode the setting value for link speed and duplex mode e Flow Control the setting value to enable or disable 802 3x flow control mechanism Select the corresponding port number and configure the port setting ...

Page 38: ...GigaX Series L2 Managed Switch User s Guide Figure 17 Physical Interface 38 ...

Page 39: ...on BPDU Max Age a timeout value to be used by all Bridges in the LAN Forward Delay a timeout value to be used by all bridges in the LAN Bridge Priority the switch priority in the LAN The third part is the port setting It contains a display window to show the current configuration for each port You click to change the port setting for STP RSTP The following fields are available Port select the corr...

Page 40: ...int link Otherwise it is a shared link Point to point link may have less convergence time Auto is recommended in most cases Click to make the settings effective Click to refresh the settings to current value Figure 18 Spanning Tree 4 5 2 Link Aggregation The page configures the link aggregation group port trunking The switch can have 15 link aggregation groups Show Trunk Select Add a new Trunk for...

Page 41: ... trunk ports If all the trunk members are in the same speed and full duplex mode then the trunk group is set up successfully If one of the members is not in the same speed or full duplex mode the trunk is not set correctly Check the link partner and change the settings to have the same speed and full duplex mode for all the members of your trunk group All the ports in the link aggregation group MU...

Page 42: ...VLAN of port 2 also changes with port 1 Figure 19 Link aggregation 4 5 3 Mirroring Mirroring together with a network traffic analyzer helps you monitor network traffics You can monitor the selected ports for egress or ingress packets Mirror Mode Enables or disables the mirror function for the selected group 42 ...

Page 43: ...irrored ports The monitor port can not belong to any link aggregation group The monitor port can not operate as a normal switch port It does not switch packets or do address learning Click to make the setting send to the switch HTTP server Click to refresh the settings to current value Figure 20 Mirroring page 43 ...

Page 44: ...e ports in the group will forward the specified multicast packets to other ports in the group Show Group selects Add a new Group to enter a new entry Or select an existing group address to display MAC Address selects the multicast address VLAN selects the vlan group Click to make the setting effective Click to refresh the settings to current value Figure 21 Static Multicast 44 ...

Page 45: ... snoop does not work normally The switch only allows 256 layer 2 multicast group Figure 22 IGMP Snooping 4 5 5 Traffic Control Traffic control prevents the switch bandwidth from flooding packets including broadcast packets multicast packets The limit number is a threshold to limit the total number of the checked type packets For example if broadcast multicast is enabled the traffic amount of each ...

Page 46: ... it will age out from the address table if the address is not learned again during the age time User can set the age time by entering a valid number from 15 to 3825 in seconds Then click on to save the new age value To make the configuration effective please go to Save Configuration page then click on You can look up MAC addresses by checking the port VLAN ID or and MAC address then click on The a...

Page 47: ...GigaX Series L2 Managed Switch User Guide Figure 24 Dynamic Address 47 ...

Page 48: ...entries can be displayed in the address window When you create more than 15 entries the new added entries will display in the next page You can click on First Previous Next or Last to go through the pages of static MAC address or input the page number and then click on Go You can remove the existed address by selecting the entry with the mouse then clicking on The button updates the existed MAC ad...

Page 49: ... feature prevents the switch from malfunctions You can remove any existed VLAN except the default VLAN You can assign the port to be a tagged port or an untagged port by toggling the port button There are three types of button displays U type untagged port that will remove VLAN tags from the transmitted packets T type All packets transmitted from this port will be tagged Blank type This port is no...

Page 50: ...rt VLAN CoS page If you want to assign an untagged port from one VLAN to another you have to remove it from the original VLAN or change it to be tagged in the original VLAN first Show VLAN select the existed VLAN to display or select Add a new VLAN to create a new VLAN group Name the VLAN name VLAN ID this field requires user to enter the VLAN ID when a new VLAN is created Remove VLAN Remove a exi...

Page 51: ...GigaX Series L2 Managed Switch User Guide Figure 26 Tagged VLAN 51 ...

Page 52: ...LAN ID Every untagged packet received from this port will be tagged with this VLAN group ID CoS Class of Service value every untagged packet received from this port will be assigned to this CoS in the VLAN tagged Click on to change the content in the port list window Click on to save the configuration To make the configuration effective go to Save Configuration page then click Figure 27 Default Po...

Page 53: ... weight of the queue relative to other CoS queues WRR scheduling prevents the low priority queues from being completely neglected during periods of high priority traffic The WRR scheduling transmits some packets from each queue in turn The number of packets it sends corresponds to the relative importance of the queue For example if Queue1 has a weight of 1 and Queue2 has a weight of 2 one packet i...

Page 54: ...GigaX Series L2 Managed Switch User s Guide Figure 28 Cos Queue Mapping 54 ...

Page 55: ...Setting To provide more secure management and access control SNMPv3 is supported 4 6 1 Community Table You can type different community names and specify whether the community has the privilege to make a setting write access by checking the box Click to save the configuration permanently or to refresh the page Figure 29 Community Table 55 ...

Page 56: ...le This page links host IP address to the community name that is entered in Community Table page Type an IP address and select the community name from the drop down list Click to save the configuration permanently or to refresh the page Figure 30 Host Table 56 ...

Page 57: ...ent versions v1 or v2c Click to save the configuration permanently or to refresh the page Figure 31 Trap Setting 4 6 4 VACM Group VACM View based Access Control Model Group is used to configure the information of SNMPV3 VACM Group Group Name enter the security group name Read View Name enter the Read View Name that the Group belongs The related SNMP messages are Get GetNext GetBulk 57 ...

Page 58: ...related Security level enter the Security level Name that the Group belongs Only NoAuth AuthNopriv AuthPriv can be chosen Click on the when you create a new VACM group entry by the above information Then you will see the new added entry shows in the group window You can remove the existed group by selecting the entry with the mouse then clicking on The button updates the existed VACM Group entries...

Page 59: ...iew belongs Included or Excluded when View Subtree matches the Oid in the SNMPv3 message View Subtree enter the View Subtree that the View belongs The Subtree is the Oid to match the Oid in the SNMPv3 message The match is good when the subtree is shorter than the Oid in the SNMPv3 message View Mask enter the View Mask that the View belongs Each bit in the mask represents the digit between the dots...

Page 60: ...ry with the mouse then clicking on The button updates the existed VACM View entries Click to save effectively Click to refresh the settings to current value To make the configuration effective please go to Save Configuration page then click on Figure 33 VACM View 4 6 6 USM User USM User based Security Model User is used to configure the information of SNMPV3 USM User Engine Id enter the Engine Id ...

Page 61: ...ngine ID and Name belong Only NoPriv DES can be chosen If the NoPriv is chosen there is no need to enter password Priv Password enter the password that the Priv Protocol belongs The password needs at least 8 characters or digits Click on the when you create a new USM User entry by the above information Then you will see the new added entry shows in the User window You can remove the existed User b...

Page 62: ...GigaX Series L2 Managed Switch User s Guide Figure 34 USM User 62 ...

Page 63: ...Once enabled the switch will try to authenticate the port user again when the re authentication time is up Reauthentication Time If Reauthentication is enabled this is the interval for the switch to re send authentication request to the port user see above Authentication Method RADIUS or Local database can be used to authenticate the port user Quiet Period If authentication failed either from RADI...

Page 64: ...e selected port is forced to be authorized Thus traffic from all hosts is allowed to pass Otherwise if force unauthorized is selected the selected port is blocked and no traffic can go through If Auto is selected the behavior of the selected port is controlled by 802 1x protocol All ports should be set to Auto under normal conditions Guest VLAN Specify a guest VLAN to clients that are not 802 1x c...

Page 65: ...he new user Confirm Password Enter the password again Dynamic VLAN Specify the VLAN ID assigned to the 802 1x authenticated clients Please click to add the new user Click when you have finished the modifications Click when you want to remove the selected user Click to make the settings effective permanently Click to refresh the settings to current value Figure 36 ial In user D 65 ...

Page 66: ...The port number for the RADIUS server is listening to Authentication Server Key The key is used for communications between GigaX and the RADIUS server Confirm Authentication Key Re type the key entered above The VLAN of the RADIUS server connected to the switch must be the same as the VLAN of the system management interface Please click to make the settings permanent Click to refresh the settings ...

Page 67: ... these charts Click Refresh Rate to set the period for retrieving new data from the switch You can differentiate the statistics or ports by selecting Color Finally click on Draw to let the browser to draw the graphic chart Each new Draw will reset the statistics display 4 8 1 Traffic Comparison This page shows the one statistics item for all the ports in one graphic chart Specify the statistics it...

Page 68: ...er s Guide Figure 38 Traffic comparison 4 8 2 Error Group Select the Port and display Color then click the Draw the statistics window shows you all the discards or error counts for the specified port The data is updated periodically 68 ...

Page 69: ...Figure 39 Error group 4 8 3 Historical Status You can display information for different ports and statistics items in this chart Since this shows the history of the statistics information the chart can keep the old data even it is refreshed 69 ...

Page 70: ...GigaX Series L2 Managed Switch User s Guide Figure 40 Historical Status 70 ...

Page 71: ...ive after a successful save Sometimes you may want to reset the switch configuration you can click on to reset the configuration file to factory default Of course a system reboot will follow this restoration process You will lose all the configurations when you choose to restore the factory default configurations Figure 41 Save Configuration 71 ...

Page 72: ...and help messages This is very useful when you are not familiar with the CLI commands The CLI mode times out when idle for 10 minutes You have to login again to enter CLI mode after the timeout All the CLI commands are case sensitive In order to make them easier to use you can enter into different category by typing the full command then this category becomes your working category Thereafter you d...

Page 73: ...ing during the system booting time It tests system memory LED and hardware chips on the switchboard It displays system information as the result of system test and initialization You can ignore the information until the prompt ASUS appears see Figure 43 Figure 42 CLI interface 73 ...

Page 74: ...nd mode by pressing ENTER key as shown in Figure 43 Figure 43 shows dual images in the switch Enter the key to show the help messages for all available commands Although the commands are helpful in some situation we STRONGLY suggest users not to use them if you don t know the command function Figure 43 Boot ROM Command Mode 74 ...

Page 75: ...Configure TFTP client IP address g NONE Load and execute firmware h NONE Display online help m mask Configure network mask p NONE Display current configuration r NONE System reboot s IP address Configure TFTP server IP address t NONE Toggle safe mode u File name Upload boot module firmware via network using TFTP protocol v NONE Display boot rom version w NONE Toggle administrator password reset ...

Page 76: ...to do login again with authorized user name and password 5 3 CLI Commands The switch provides CLI commands for all managed functions The command uses are listed in the categories as the WEB management interface This way you can follow the instructions and set up the switch correctly as easily as using WEB interface to configure the switch save command is used to save the configuration to flash Som...

Page 77: ...e managed node CLI command sys info contact system contact description If you put the contact description in the contact description field the switch contact information will be changed to the new one System Location Displays the physical location of the switch This is an RFC 1213 defined MIB object in System Group and provides the location information on the managed node CLI command sys info loca...

Page 78: ...ddress If you enable DHCP you can renew or release the IP address for the switch and use show command to display the dynamic IP address CLI command net interface dhcp sw0 enable disable renew release show IP Address Displays the static IP address for the switch This IP address is used for manageable purpose i e network applications such as http server SNMP server ftp server telnet server and SSH s...

Page 79: ...s enabled the web interface will request a user name and password authentication while user accesses the switch through the browser CLI command sys web set enable disable New Password Verify Password The default user name is admin By default a password is not required You may set a password by configuring these fields CLI command sys users modify user name admin by default user name old user name ...

Page 80: ...t autoneg port number enable disable CLI command l2 port speed port number 10 100 1000 CLI command l2 port duplex port number full half Flow Control Enable Disable Displays the IEEE802 3x flow control setting of a port Note that this flow control is operating only in full duplex mode CLI command l2 port flow port number enable disable Reload Restores the previous port settings from the configurati...

Page 81: ...Edge Port Point to point Displays the current STP RSTP ports parameters setting CLI command l2 stp port set Port Settings all all select a port number or just type all to iteratively config Port port number Priority 0 240 old port Priority new port Priority Port port number Path Cost 1 200000000 old port Path Cost new port Path Cost Port port number EdgePort yes no old port EdgePort new port EdgeP...

Page 82: ...me LACP mode and port numbers CLI command l2 trunk create trunk id trunk name lacp enable disable port list Add Remove Trunk Trunk group port members can be added to or removed from an existing trunk group CLI command l2 trunk add trunk id port list CLI command l2 trunk remove trunk id port list LACP Action User can enable or disable LACP on a specific trunk group CLI command l2 trunk lacp action ...

Page 83: ...s port list CLI command l2 mirror remove ingress egress port list Reload Restores the previous saved settings from configuration file CLI command l2 mirror retrieve Show Multicast Group Displays the static multicast groups that are presented in the multicast group table CLI command l2 mcast show Set Multicast Group Allows user to add or modify a static multicast group by specifying the MAC address...

Page 84: ...id Reload Restores the previous saved settings from configuration file CLI command l2 mcast retrieve IGMP is Enabled Disabled Layer 2 IGMP snooping can be started or terminated by user if necessary CLI command l2 igmp start stop Reload Restores the previous saved settings from configuration file CLI command l2 igmp retrieve Action Enable Disable Mode Broadcast or Broadcast Multicast or Broadcast M...

Page 85: ...User can set the ARL Address Resolution Logic entries aging time by setting the aging time value CLI command l2 arl age aging time value Query by Port ARL entries existed in ARL table can be queried according to port number CLI command l2 arl port port number Query by VLAN ID ARL entries existed in ARL table can be queried according to VLAN ID CLI command l2 arl vlan vlan id Query by MAC Address A...

Page 86: ... Reload Restores the previous saved settings from configuration file CLI command l2 arl retrieve Show VLAN Displays the existing VLAN information of the switch CLI command l2 vlan show vlan id Name VLAN ID Allows user to config the VLAN settings User may create a new VLAN by giving a unique VLAN ID a VLAN description name and its port member list note that the port member here is indicated as tagg...

Page 87: ... saved settings from configuration file CLI command l2 vlan retrieve Show Port Displays the port configuration CLI command l2 port show port id or for all ports PVID Sets the default VLAN for a port by giving a VLAN ID and its associated port member list CLI command l2 port vlan vlan id 4095 to disable the port based vlan port list CoS Value Sets the Class of Service for a port by assigning it a p...

Page 88: ... file CLI command l2 cos retrieve 5 3 4 SNMP Community Name Set A community entry contains a community description string and a set of privileges Get privilege are turned on by default and user can specify whether to give it the Set Privilege while create a new entry CLI command snmp community add New community string new community string Get privileges y always turn on by default Set privileges y...

Page 89: ... This action will delete all hosts in community string with delete community Are you sure y n y y for yes n for no Reload Restores the previous saved settings from configuration file CLI command snmp community retrieve Host IP Address Community A host entry contains a host IP address network mask and its dedicated community string CLI command snmp host add Host IP Subnet IP address Netmask netmask...

Page 90: ...Trap Version v1 v2c Destination Community for Trap A trap entry contains SNMP version currently support version 1 and version 2c a destination IP address and the remote community string CLI command snmp trap add SNMP version 1 2c 1 by default snmp version Destination IP IP address Community community string User can modify a trap entry in the table by reassigning its SNMP version destination IP ad...

Page 91: ...iew Name Write View Name Notify View Name Security Model Security level A VACM View based Access Control Model Group entry contains a group name read view name write view name notify view name security model security level and context match CLI command snmp snmpv3 access add Gruop Name group name string Security Model 0 1 2 3 any v1 v2c usm security model Security Level 1 2 3 noauth authnopriv aut...

Page 92: ... new security model Security Level 1 2 3 noauth authnopriv authpriv old security level new security level Context Match 0 1 inexact exact old context match new context match Read View Name old read view name string new read view name string Write View Name old write view name string new write view name string Notify View Name old notify view name string new notify view name string Allows user to d...

Page 93: ...ded excluded view type User can modify a VACM View entry in the table by reassigning its allowed view name view type view subtree and view mask CLI command snmp snmpv3 view set View Name old view name string new view name string View Subtree oid old view subtree new view subtree View Mask old view mask new view mask View Type 1 2 included excluded old view type new view type Allows user to delete ...

Page 94: ...neId engine id string Name user name string AuthProtocol oid auth protocol oid string AuthPassword auth password string Priv Protocol oid priv protocol oid string Priv Password priv password string User can modify a USM User entry in the table by reassigning its allowed engine Id name auth protocol auth password priv protocol and priv password CLI command snmp snmpv3 usmuser set EngineId old engin...

Page 95: ...ed settings from configuration file CLI command snmp snmpv3 usmuser retrieve 5 3 5 Security Commands Reauthentication Allows user to open or close periodic reauthentication CLI command security dot1x bridge reauth enable disable Reauthentication Time Allows user to set up the reauthentication time CLI command security dot1x bridge reauthtime reauthentication time 1 4294967295 sec Authentication Me...

Page 96: ...ion attemps 1 10 Multi host Allows user to enable or disable Multi host on some specific ports CLI command security dot1x port multihost enable disable port list Authentication Control Allows user to set up the authentication control of some specific ports CLI command security dot1x port authctrl type 1 force_authorized 2 force_unauthorized 3 auto port list Guest VLAN Allows user to set up the gue...

Page 97: ... Dynamic VLAN dynamic VLAN CLI command security dialinuser remove user name Allows user to delete a user entry from the local database CLI command security dialinuser modify user name Allows user to modify a user entry from the local database It contains a user name password and dynamic VLAN User Name new user name string Password new password string Confirm Password new confirm password string Dy...

Page 98: ...om configuration file CLI command security radius retrieve Generate SSH key Allows user to generate SSH keys SSH Secure SHell is a protocol for remotely logging into a machine via a shell It is very similar in functionality to telnet however unlike telnet all data between the client and server is encrypted The encryption provides protection against various network security risks Currently our swit...

Page 99: ...eries L2 Managed Switch User Guide 99 Show Generating Status Show the SSH key generating status It will display success or SSH keys generated fail or system is generating keys CLI command security sshkey show ...

Page 100: ... settime sets the current time sys files config backup backup configuration files sys files config default restore factory default configuration files sys monitor auto enable or disable fan auto detection sys monitor set Set fan speed command 1 255 sys monitor show Show the status of system environment net ping ping remote host net route show displays the entries in the routing table ...

Page 101: ...imal numbers separated by dots is called dotted decimal notation The IP address 20 56 0 211 is read twenty dot fifty six dot zero dot two eleven 6 1 1 Structure of an IP address IP addresses have a hierarchical design similar to that of telephone numbers For example a 7 digit telephone number starts with a 3 digit prefix that identifies a group of thousands of telephone lines and ends with four di...

Page 102: ...ield2 Field3 Field4 Class A Network ID Host ID Class B Network ID Host ID Class C Network ID Host ID Following are examples of valid IP addresses Class A 10 30 6 125 network 10 host 30 6 125 Class B 129 88 16 49 network 129 88 host 16 49 Class C 192 60 201 11 network 192 60 201 host 11 ...

Page 103: ...e smaller but still quite large each being able to hold over 65 000 hosts There can be up to 16 384 class B networks in existence A class B network might be appropriate for a large organization such as a business or government agency Class C networks are the smallest only able to hold 254 hosts at most but the total possible number of class C networks exceeds 2 million 2 097 152 to be exact LANs c...

Page 104: ...host ID bits For example consider a class C network 192 168 1 To split this into two subnets you would use the subnet mask 255 255 255 128 It s easier to see what s happening if we write this in binary 11111111 11111111 11111111 10000000 As with any class C address all of the bits in field1 through field 3 are part of the network ID but note how the mask specifies that the first bit in field 4 is ...

Page 105: ...ield4 for its host IDs ranging from 0 to 63 Sometimes a subnet mask does not specify any additional network ID bits and thus no subnets Such a mask is called a default subnet mask These masks are Class A 255 0 0 0 Class B 255 255 0 0 Class C 255 255 255 0 These are called default because they are used when a network is initially configured at which time it has no subnets 105 ...

Page 106: ...PC can recognize other computers on your network and the Internet A ping command sends a message to the computer you specify If the computer receives the message it sends messages in reply To use it you must know the IP address of the computer with which you are trying to communicate On Windows based computers you can execute a ping command from the Start menu Click the Start button and then click...

Page 107: ...N IP address 192 168 1 1 or another address you assigned You can also test whether access to the Internet is working by typing an external address such as that for www yahoo com 216 115 108 243 If you do not know the IP address of a particular Internet location you can use the nslookup command as explained in the following section From most other IP enabled operating systems you can execute the sa...

Page 108: ...d computers you can execute the nslookup command from the Start menu Click the Start button then click Run In the Open text box type the following nslookup Clicks A Command Prompt window displays with a bracket prompt At the prompt type the name of the Internet address you are interested in such as www absnews com The window displays the associate IP address you know See Figure 46 Figure 46 Using ...

Page 109: ...ar side of the switch When any one of the switch fans located on the rear panel becomes defective you can easily replace it following these steps 1 Unlock the fan module by loosening the thumbscrew that secures it to the rear panel Figure 47 Loosening the thumbscrew 2 Carefully pull the module out as shown Figure 48 Removing the fan module 109 ...

Page 110: ...e other fan 6 Connects the fan cables to the PCB Make sure that the fan cables are connected to the correct fan connector FAN 1 is on the left side when you are facing the rear panel 7 Inserts the fan module to the switch chassis until it fits in place Make sure that the fan power cables are not caught between the fan module and chassis 8 Secure the fan module to the chassis with the thumbscrew Ch...

Page 111: ... switch hub PC and to the switch Make sure the PC and or hub switch is turned on 2 Verify if your cable is sufficient for your network requirements A 1000 Mbps network 1000BaseTx should use cables labeled Cat 5 10Mbit sec cables may tolerate lower quality cables Network Access PC cannot access another host in the same network 1 Check the Ethernet cabling is good and the LED is green 2 If the port ...

Page 112: ...ported Support for Javascript must be enabled in your browser Support for Java may also be required 2 Ping the switch IP address to see if the link is stable If some ping packets fail check your network setup to make sure a valid setting Changes to Configuration are not being retained Be sure to click on button in the Save Configuration page to save any changes Console Interface Cannot show the te...

Page 113: ...f wiring used by Ethernet networks with a data rate of 1000 Mbps binary The base two system of numbers that uses only two digits 0 and 1 to represent all numbers In binary the number 1 is written as 1 2 as 10 3 as 11 4 as 100 etc Although expressed as decimal numbers for convenience IP addresses in actual use are binary numbers e g the IP address 209 191 4 240 is 11010001 10111111 00000100 1111000...

Page 114: ...to a network ICMP Internet Control Message Protocol An Internet protocol used to report errors and other network related information The ping command makes use of ICMP IGMP Internet Group Management Protocol An Internet protocol that enables a computer to share information about its membership in multicast groups with adjacent routers A multicast group of computers is one whose members have design...

Page 115: ...host ID Bits set to 1 mean select this bit while bits set to 0 mean ignore this bit For example if the network mask 255 255 255 0 is applied to the IP address 100 10 50 1 the network ID is 100 10 50 and the host ID is 1 See also binary IP address subnet IP Addresses Explained section NIC Network Interface Card An adapter card that plugs into your computer and provides the physical interface to you...

Page 116: ...work both ends of the connection have to follow the rules of the protocol remote In a physically separate location For example an employee away on travel who logs in to the company s intranet is a remote user RJ 45 Registered Jack Standard 45 The 8 pin plug used in transmitting data over phone lines Ethernet cabling usually uses this type of connector RMON Remote Monitoring Extensions to SNMP prov...

Page 117: ...remain physically connected to the rest of the parent network but they are treated as though they were on a separate network See also network mask subnet mask A mask that defines a subnet See also network mask TCP See TCP IP TCP IP Transmission Control Protocol Internet Protocol The basic protocols used on the Internet TCP is responsible for dividing data up into packets for delivery and reassembl...

Page 118: ...ime To Live A field in an IP packet that limits the life span of that packet Originally meant as a time duration the TTL is usually represented instead as a maximum hop count each router that receives a packet decrements this field by one When the TTL reaches zero the packet is discarded twisted pair The ordinary copper telephone wiring long used by telephone companies It contains one or more wire...

Page 119: ...audio or video to the user Web browsers use Hyper Text Transfer Protocol HTTP Popular web browsers include Netscape Navigator and Microsoft Internet Explorer See also HTTP web site WWW Web page A web site file typically containing text graphics and hyperlinks cross references to the other pages on that web site as well as to pages on other web sites When a user accesses a web site the first page t...

Reviews: