background image

GigaX Series L2 Managed Switch User Guide 

List of Figures 

Figure 1.

 

GigaX L2 managed switch package contents................ 16

 

Figure 2.

 

Front panel (GigaX 2048)............................................... 17

 

Figure 3.

 

Front panel (GigaX 2024)............................................... 17

 

Figure 4.

 

Rear panel...................................................................... 19

 

Figure 5.

 

Overview of Hardware Connections .............................. 23

 

Figure 6.

 

Login and IP setup Screen............................................. 25

 

Figure 7.

 

Login Screen .................................................................. 26

 

Figure 8.

 

IP Setup (GigaX 2048) ................................................... 28

 

Figure 9.

 

IP Setup (GigaX 2024) ................................................... 28

 

Figure 10.

 

Configuration manager login screen .............................. 29

 

Figure 11.

 

Home page (GigaX 2048) .............................................. 30

 

Figure 12.

 

Home page (GigaX 2024) .............................................. 31

 

Figure 13.

 

Top frame (GigaX 2048) ................................................ 32

 

Figure 14.

 

Top frame (GigaX 2024) ................................................ 32

 

Figure 15.

 

Expanded Menu List ...................................................... 33

 

Figure 16.

 

Management .................................................................. 36

 

Figure 17.

 

IP Setup… ...................................................................... 38

 

Figure 18.

 

Administration ................................................................ 39

 

Figure 19.

 

Reboot…. ....................................................................... 40

 

Figure 20.

 

Firmware Upgrade ......................................................... 41

 

Figure 21.

 

Physical Interface........................................................... 43

 

Figure 22.

 

Spanning Tree................................................................ 45

 

Figure 23.

 

Link aggregation (GigaX 2048) ...................................... 47

 

Figure 24.

 

Link aggregation (GigaX 2024) ...................................... 48

 

Figure 25.

 

Mirroring page (GigaX 2048) ......................................... 49

 

Figure 26.

 

Mirroring page (GigaX 2024) ......................................... 50

 

Figure 27.

 

Static Multicast (GigaX 2048) ........................................ 51

 

Summary of Contents for GIGAX 2048

Page 1: ...GigaX Series L2 Managed Switch User Guide GigaX Series Layer 2 Managed Switch User Guide ...

Page 2: ...rchantability or fitness for a particular purpose In no event shall ASUS its directors officers employees or agents be liable for any indirect special incidental or consequential damages including damages for loss of profits loss of business loss of use or data interruption of business and the like even if ASUS has been advised of the possibility of such damages arising from any defect or error in...

Page 3: ...ment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment to an outlet on a circuit different from that t...

Page 4: ... Fremont CA 94538 USA General Fax 1 502 933 8713 Web Site usa asus com Technical Support Support Fax 1 502 933 8713 General Support 1 502 995 0883 Notebook Support 1 510 739 3777 x5110 Online Support http vip asus com eservice techserv aspx ASUS COMPUTER GmbH Germany and Austria Address Harkort Str 25 D 40880 Ratingen BRD Germany General Fax 49 2102 9599 31 General Email sales asuscom de for marke...

Page 5: ...1 Installing the switch on a flat surface 21 3 1 2 Mounting the switch on a rack 21 3 2 Part 2 Setting up the switch 22 3 2 1 Connect the console port 22 3 2 2 Connect to the computers or a LAN 22 3 2 3 Attach the RPS module 22 3 2 4 Attach the power adapter 22 3 3 Part 3 Basic switch setting for management 24 3 3 1 Setting up through the console port 24 3 3 2 Setting up through the Web interface ...

Page 6: ...ntrol 53 4 5 6 Dynamic Addresses 54 4 5 7 Static Addresses 56 4 5 8 Tagged VLAN 57 4 5 9 Default Port VLAN and CoS 60 4 5 10 DHCP Snooping 61 4 6 SNMP 62 4 6 1 Community Table 62 4 6 2 Host Table 64 4 6 3 Trap Setting 65 4 6 4 VACM Group 65 4 6 5 VACM View 67 4 6 6 USM User 68 4 7 Filters 70 4 7 1 Filter Set 70 4 7 2 Filter Attach 73 4 8 Security 75 4 8 1 Port Access Control 75 4 8 2 Dial In User ...

Page 7: ...ommand Mode 105 5 1 2 Boot ROM Commands 106 5 2 Login and Logout 108 5 3 CLI Commands 108 5 3 1 System Commands 108 5 3 2 Physical Interface Commands 111 5 3 3 Bridge Commands 112 5 3 4 SNMP 122 5 3 5 Filters Commands 130 5 3 6 Security Commands 134 5 3 7 QoS Commands 139 5 4 Miscellaneous Commands 144 6 IP Addresses Network Masks and Subnets 145 6 1 IP Addresses 145 6 1 1 Structure of an IP addre...

Page 8: ...7 1 2 nslookup 151 7 2 Replacing defective fans 153 7 3 Simple fixes 155 8 Glossary 157 9 Index 166 ...

Page 9: ...onfiguration manager login screen 29 Figure 11 Home page GigaX 2048 30 Figure 12 Home page GigaX 2024 31 Figure 13 Top frame GigaX 2048 32 Figure 14 Top frame GigaX 2024 32 Figure 15 Expanded Menu List 33 Figure 16 Management 36 Figure 17 IP Setup 38 Figure 18 Administration 39 Figure 19 Reboot 40 Figure 20 Firmware Upgrade 41 Figure 21 Physical Interface 43 Figure 22 Spanning Tree 45 Figure 23 Li...

Page 10: ...38 Community Table 63 Figure 39 Host Table 64 Figure 40 Trap Setting 65 Figure 41 VACM Group 66 Figure 42 VACM View 68 Figure 43 USM User 69 Figure 44 Filter Set 71 Figure 45 Filter Rule in MAC mode 72 Figure 46 Filter Rule in IP mode 72 Figure 47 Filter Attach GigaX 2048 74 Figure 48 Filter Attach GigaX 2024 74 Figure 49 Port Access Control 77 Figure 50 Dial In user 78 Figure 51 RADIUS 80 Figure ...

Page 11: ...ison GigaX 2024 99 Figure 64 Error group 100 Figure 65 Historical Status 101 Figure 66 Save Configuration 102 Figure 67 CLI interface 104 Figure 68 Boot ROM Command Mode 106 Figure 69 SYS commands 109 Figure 70 Using the ping utility 151 Figure 71 Using the nslookup utility 152 Figure 72 Loosening the thumbscrew 153 Figure 73 Removing the fan module 153 Figure 74 Detaching the fan from the module ...

Page 12: ...able 2 Rear panel labels 19 Table 3 Technical specifications 20 Table 4 LED Indicators 24 Table 5 Port color description 32 Table 6 Commonly used buttons and icons 34 Table 7 Boot ROM commands 107 Table 8 IP address structure 146 Table 9 Troubleshooting 155 ...

Page 13: ...t Ethernet switching ports Two small form factor SFP Gigabit interface converter GBIC slots Automatic MDI MDIX support for 10 100BASE TX and 10 100 1000BASE T ports Compliant with 802 3u 802 3z and 802 3ab specifications 802 1D transparent bridge spanning tree protocol 802 1w RSTP Rapid Spanning Tree Protocol 802 1X port based network access control RADIUS remote authentication dial in user servic...

Page 14: ...otations Acronyms are defined the first time they appear in text and in the glossary For brevity the GigaX switch is referred to as the switch The terms LAN and network are used interchangeably to refer to a group of Ethernet connected computers at one site The illustrations and web interface screens refer to both the GigaX 2048 and GigaX 2024 models except otherwise indicated 1 2 2 Typography Ita...

Page 15: ...tructions or explanations Note Provides clarification or additional information on the current topic Definition Explains terms or acronyms that may be unfamiliar to many readers These terms are also included in the Glossary WARNING Provides messages of high importance including messages relating to personal safety or system integrity ...

Page 16: ...items GigaX 2048 48 port or GigaX 2024 24 port L2 managed switch AC Power cord Null modem cable for console interface DB9 Rack installation kit two brackets with six 6 32 screws USB cable for console interface Installation CD ROM Quick installation guide Figure 1 GigaX L2 managed switch package contents ...

Page 17: ...gaX Series L2 Managed Switch User Guide 2 2 Front Panel The front panel includes LED indicators that show the system RPS fan and port status Figure 2 Front panel GigaX 2048 Figure 3 Front panel GigaX 2024 ...

Page 18: ...operly Amber On Both or either one of the fans stopped 10 100 ports Green On Ethernet link is established Flashing Data is being transmitted received Off No Ethernet link Amber On Link is present but port is disabled either manually or by spanning tree Flashing Port is in one of the STP blocking listening and learning state 10 100 1000 port status Green On Link RJ 45 or SFP is present port is enab...

Page 19: ...power connections Figure 4 Rear panel Table 2 Rear panel labels No Label Description 1 Power Connector Connects to the supplied power cord 2 FAN1 FAN2 Replaceable system fans 3 Console USB USB port for console management 4 Console RS232 RS 232 serial port for console management 5 RPS Redundant Power Supply connector ...

Page 20: ... 2 5A 50 60Hz 90 watts Redundant Power Input Output Supply RPS 100 240V AC 1 8A 50 60Hz 12V DC 12 5A Environmental Ranges Operating Storage Temperature 10 to 50 14 to 40 70 122 40 to 158 Humidity 15 to 90 0 to 95 Altitude up to 10 000 ft 40 000 ft 3 000m 12 000m Dimensions Voltage and Current Speed Replaceable Fans 40 x 40 x 20 mm 12VDC 0 13A 8200RPM ...

Page 21: ...for the switch Default gateway for the network Network mask for this network 3 1 Part 1 Installing the hardware Connect the device to the power outlet and your computer or network Figure 5 illustrates the hardware connections 3 1 1 Installing the switch on a flat surface The switch should be installed on a level surface that can support the weight of the switches and their accessories Attach four ...

Page 22: ...les You can use either the crossover or straight through Ethernet cable to connect computers hubs or switches Use a twisted pair Category 5 Ethernet cable to connect the 1000BASE T port Otherwise the link speed can not reach 1Gbps 3 2 3 Attach the RPS module Connect your RPS module to the RPS jack and make sure the other end of the RPS is connected to the power cord Connect to the power cord to a ...

Page 23: ...GigaX Series L2 Managed Switch User Guide Figure 5 Overview of Hardware Connections Console Management Expansion hub switch LAN computers RPS RS 232 USB Cat 5 Ethernet cables ...

Page 24: ... the basic settings for your switch You can manage the switch using the following methods Web interface the switch has a set of pages to allow you to manage it using Java enabled IE5 0 or higher version Command Line Interface use console port to manage the switch 3 3 1 Setting up through the console port 1 Use the supplied crossover RS 232 cable to connect to the console port on the back of the sw...

Page 25: ... Enter You can change the password at any time through CLI see section 5 3 1 To protect your switch from unauthorized access you must change the default password as soon as possible 6 Follow these steps to assign an IP address to the switch a Type net interface ip sw0 your ip address your network mask For example if your switch IP is 192 168 10 1 and the network mask is 255 255 255 0 Then you shou...

Page 26: ...me to use Web interface because the default configuration for Web access authentication is disabled To secure the system configuration please enable the authentication function at the Administration page under System category Skip step 2 if the authentication is disabled 2 At any PC connected to the network that the switch can access open your Web browser Internet Explorer and type the following U...

Page 27: ...e the new IP address in the address location box and press Enter The WEB link returns 5 To enable authentication for Web access click Administration on the menu list then select Enabled to start the protection Note that the GigaX 2048 and 2024 models have the same web interface except for the front panel image on top of the screen see figures on the next page The following sections show only one s...

Page 28: ...GigaX Series L2 Managed Switch User s Guide 28 Figure 8 IP Setup GigaX 2048 Figure 9 IP Setup GigaX 2024 ...

Page 29: ...owing in the web address or location box and press Enter http 192 168 1 1 This is the factory default IP address for the switch A login screen displays as shown in Figure 10 Figure 10 Configuration manager login screen Note Log in is not required if you do not enable web access authentication see 3 3 2 2 Enter your user name and password then click Use the following defaults the first time you log...

Page 30: ...GigaX Series L2 Managed Switch User s Guide 30 The home page appears each time you log into the program See the following figures Figure 11 Home page GigaX 2048 ...

Page 31: ...GigaX Series L2 Managed Switch User Guide Figure 12 Home page GigaX 2024 ...

Page 32: ...ure 13 Top frame GigaX 2048 Figure 14 Top frame GigaX 2024 Table 5 Port color description Port Color Description Green port Ethernet link is established Black No Ethernet link Amber port Link is present but port is disabled manually or by spanning tree Clicking on the port icon of the switch displays the port configuration in the lower right frame The left frame a menu frame as shown in Figure 15 ...

Page 33: ...GigaX Series L2 Managed Switch User Guide Figure 15 Expanded Menu List The above frame displays configuration pages or graphics for the statistics See section 4 3 for details ...

Page 34: ...sed buttons and icons The following table describes the function for each button and icon used in the application Table 6 Commonly used buttons and icons Button Icon Function Stores any changes you have made on the current page Adds the existing configuration to the system e g a static MAC address or a firewall ACL rule and etc Modifies an existing entry Modifies the existing configuration in the ...

Page 35: ...on 4 3 1 Management The Management page contains the following information Model Name product name MAC Address switch MAC address System Name user assigned name to identify the system editable System Contact editable System Location editable To save any changes and make it effective immediately click Use to refresh the setting as shown in Figure 16 ...

Page 36: ...GigaX Series L2 Managed Switch User s Guide 36 Figure 16 Management ...

Page 37: ... IP Setup page contains the following editable information VLAN ID Specify a VLAN ID to system management interface It is necessary to be within the same VLAN for management IP Address Assign a static IP address to the switch management interface Network Mask Default Gateway To save any changes and make it effective immediately click Use to refresh the setting as shown in Figure 17 ...

Page 38: ...GigaX Series L2 Managed Switch User s Guide 38 Figure 17 IP Setup ...

Page 39: ...ord protection The default setting for web access does not require any authentication To save any changes and make it effective immediately click Use to refresh the setting as shown in Figure 18 When you enable the password protection you have to login again immediately You can change the password at any time through the CLI interface Figure 18 Administration ...

Page 40: ...ton to reboot the system Figure 19 Reboot Rebooting the system stops the network traffic and terminates the Web interface connection 4 3 5 Firmware Upgrade The Firmware page contains the following information Hardware Version shows the hardware revision number Boot ROM Version shows the version of the boot code ...

Page 41: ...ware location into the firmware space directly or click to choose the file name of the firmware from prompt window Click to update the switch firmware See Figure 20 for reference Clicking the upload button loads the assigned firmware to the switch then reboot system after a successful firmware update You have to re login to Web interface again Figure 20 Firmware Upgrade ...

Page 42: ...llowing information for each port a Link status the link speed and duplex for an existing link otherwise link is down b State the STP state c Admin the setting value to disable or enable the port d Mode the setting value for link speed and duplex mode e Flow Control the setting value to enable or disable 802 3x flow control mechanism Select the corresponding port number and configure the port sett...

Page 43: ...ble the feature in runtime This page consists of three parts The first part shows the root information It tells user the STP setting about the root switch The second part is the STP setting The following options are available Disable STP Enabled RSTP Enabled Turn the STP RSTP off on When you turn the STP RSTP on STP RSTP will use the following settings if the switch is the root switch Hello Time t...

Page 44: ... high priority The port with lower priority is more likely to be blocked by STP if a network loop is detected The valid value is from 0 to 240 Path Cost the valid value is from 1 to 200000000 The higher cost is more likely to be blocked by STP if a network loop is detected Edge Port All ports are set to be edge ports by default Edge port becomes STP port when BPDU is received Also it takes very sh...

Page 45: ...t Add a new Trunk for a new created group Or select an existed group to display on the following fields and port icons Port Selection Criterion the algorithm to distribute packets among the ports of the link aggregation group according to source MAC address destination MAC address source and destination MAC address source IP address destination IP address or source and destination IP address Name ...

Page 46: ... status window for the trunk ports If all the trunk members are in the same speed and full duplex mode then the trunk group is set up successfully If one of the members is not in the same speed or full duplex mode the trunk is not set correctly Check the link partner and change the settings to have the same speed and full duplex mode for all the members of your trunk group All the ports in the lin...

Page 47: ...ged Switch User Guide attribute the others will change too For example a trunk group consists of port 1 and 2 If the VLAN of port 1 changes the VLAN of port 2 also changes with port 1 Figure 23 Link aggregation GigaX 2048 ...

Page 48: ...s the mirror group Each group consists of 24 Fast Ethernet ports and one Gigabit port for GigaX 2048 only Mirror Mode Enables or disables the mirror function for the selected group Monitor Port Receives the copies of all the traffics in the selected mirrored ports GigaX 2048 has two monitor ports Each port can monitor 24 Fast Ethernet ports and one Gigabit port GigaX 2024X has only one monitor por...

Page 49: ...to any link aggregation group The monitor port can not operate as a normal switch port It does not switch packets or do address learning Click to make the setting send to the switch HTTP server Click to refresh the settings to current value Figure 25 Mirroring page GigaX 2048 ...

Page 50: ...GigaX Series L2 Managed Switch User s Guide 50 Figure 26 Mirroring page GigaX 2024 ...

Page 51: ... forward the specified multicast packets to other ports in the group Show Group selects Add a new Group to enter a new entry or select an existing group address to display MAC Address selects the multicast address VLAN selects the VLAN group CoS assigns the priority for Class of Service Click to make the setting effective Click to refresh the settings to current value Figure 27 Static Multicast Gi...

Page 52: ...e multicast traffics on the network by allowing the IGMP snooping function to be turned on or off When turned on the switch snoops the IGMP packets and puts the new group into the multicast table However if the static entries occupy all 256 spaces the IGMP snoop does not work normally The switch only allows 256 layer 2 multicast group ...

Page 53: ...ets and the unicast packets because of destination address lookup failure The limit number is a threshold to limit the total number of the checked type packets For example if broadcast and multicast are enabled the total traffic amount for those two types will not exceed the limit value Click to save the new configuration To make the configuration effective go to Save Configuration page then click...

Page 54: ... it will age out from the address table if the address is not learned again during the age time User can set the age time by entering a valid number from 10 to 1 000 000 in seconds Then click on to save the new age value To make the configuration effective please go to Save Configuration page then click on You can look up MAC addresses by checking the port VLAN ID or and MAC address then click on ...

Page 55: ...GigaX Series L2 Managed Switch User Guide Figure 31 Dynamic Address ...

Page 56: ...by this way will not age out from the address table We call it static address MAC Address enter the MAC address VLAN ID enter the VLAN ID that the MAC belongs Port Selection select the port to which the MAC belongs Discard you can do packet filtering when the MAC address appears in the packets as destination address source address or either of them ...

Page 57: ...lue To make the configuration effective please go to save configuration page then click Figure 32 Static Address 4 5 8 Tagged VLAN You can set up to 255 VLAN groups and show VLAN group in this page There is a default VLAN created by the switch It cannot be removed at all This feature prevents the switch from malfunction You can remove any existed VLAN except the default VLAN You can assign the por...

Page 58: ...and configured in the Default Port VLAN CoS page If you want to assign an untagged port from one VLAN to another you have to remove it from the original VLAN or change it to be tagged in the original VLAN first Show VLAN select the existed VLAN to display or select Add a new VLAN to create a new VLAN group Name the VLAN name DHCP Snoop Enable or disable DHCP snooping on this VLAN VLAN ID this fiel...

Page 59: ...GigaX Series L2 Managed Switch User Guide Figure 33 Tagged VLAN GigaX 2048 Figure 34 Tagged VLAN GigaX 2024 ...

Page 60: ...d VLAN ID Every untagged packet received from this port will be tagged with this VLAN group ID CoS Class of Service value every untagged packet received from this port will be assigned to this CoS in the VLAN tagged Click on to change the content in the port list window Click on to save the configuration To make the configuration effective go to Save Configuration page then click Figure 35 Default...

Page 61: ... messages and by building and maintaining a DHCP binding table You can assign some ports to be trusted ports The selected trusted port forwards the DHCP packets as a normal port but the DHCP ACK packets will be dropped when the unselected untrusted port receives the packets DHCP Snooping enable or disable DHCP snooping Figure 36 DHCP Snooping GigaX 2048 ...

Page 62: ...ommunity Table Host Table and Trap Setting To provide more secure management and access control SNMPv3 is supported 4 6 1 Community Table You can type different community names and specify whether the community has the privilege to make setting write access by checking the box Click to save the configuration permanently or to refresh the page ...

Page 63: ...GigaX Series L2 Managed Switch User Guide Figure 38 Community Table ...

Page 64: ...Table This page links host IP address to the community name that is entered in Community Table page Type an IP address and select the community name from the drop down list Click to save the configuration permanently or to refresh the page Figure 39 Host Table ...

Page 65: ...uration permanently or to refresh the page Figure 40 Trap Setting 4 6 4 VACM Group VACM View based Access Control Model Group is used to configure the information of SNMPV3 VACM Group Group Name enter the security group name Read View Name enter the Read View Name that the Group belongs The related SNMP messages are Get GetNext GetBulk Write View Name enter the Write View Name that the Group belon...

Page 66: ...t the Group belongs Only NoAuth AuthNopriv AuthPriv can be chosen Click on the when you create a new VACM group entry by the above information Then you will see the new added entry shows in the group window You can remove the existed group by selecting the entry with the mouse then clicking on The button updates the existed VACM Group entries Click to save effectively Click to refresh the settings...

Page 67: ... when the subtree is shorter than the Oid in the SNMPv3 message View Mask enter the View Mask that the View belongs Each bit in the mask represents the digit between the dots of View Subtree from left side Bit 0 means don t care Click on the when you create a new VACM View entry by the above information Then you will see the new added entry shows in the view window You can remove the existed views...

Page 68: ... should match the ID in the Manager Name enter Name combined with Engine ID that should match the Name and Engine ID in the Manager Auth Protocol enter the Auth Protocol that Engine ID and Name belong Only NoAuth MD5 SHA1 can be chosen If the NoAuth is chosen there is no need to enter password Auth Password enter the password that the Auth Protocol belongs The password needs at least 8 characters ...

Page 69: ...s at least 8 characters or digits Click on the when you create a new USM User entry by the above information Then you will see the new added entry shows in the User window You can remove the existed User by selecting the entry with the mouse then clicking on The button updates the existed USM User entries Click to save effective Click to refresh the settings to current value To make the configurat...

Page 70: ...e rule to filter FTP packets When you click on the Filter Set the Filter Set page appears Figure 44 First create a filter set by typing a name and ID then clicking on Second click on the button to select the set you want to edit or remove Third click on to enter the rule page as Figure 45 or click on to remove the filter set You have to follow the rules to make a valid filter set One set consists ...

Page 71: ...in the blank box it means the rule doesn t care the MAC value In IP rule setup you can enter any of the 5 tuples source IP destination IP protocol source application port and destination application port The Action field determines if the packet should be dropped or forwarding when it matches the rule If a packet matches two rules with different action the packet will follow the rule showed first ...

Page 72: ...GigaX Series L2 Managed Switch User s Guide 72 Figure 45 Filter Rule in MAC mode Figure 46 Filter Rule in IP mode ...

Page 73: ...ingress ports and egress port to be applied Detach from all ports remove all the filters from the attached ports You may not detach certain ports after issuing an Attach All command If you wish to detach ports use the Detach All command Once the filter set is attached to the ingress ports and egress ports it will filter the packets according to the ingress port egress port and the packet fields in...

Page 74: ...GigaX Series L2 Managed Switch User s Guide 74 Figure 47 Filter Attach GigaX 2048 Figure 48 Filter Attach GigaX 2024 ...

Page 75: ...oes not forward with source addresses outside the group of defined addresses 4 8 1 Port Access Control Port Access Control is used to configure various 802 1x parameters 802 1x uses either RADIUS server or local database to authenticate port users The first part is the Bridge Global settings Reauthentication Once enabled the switch will try to authenticate the port user again when the re authentic...

Page 76: ...disabled only ONE host among other hosts passed the authentication is allowed to use the port Authentication Control If force_authorized is selected the selected port is forced authorized Thus traffic from all hosts is allowed to pass Otherwise if force_unauthorized is selected the selected port is blocked and no traffic can go through If Auto is selected the behavior of the selected port is contr...

Page 77: ...GigaX Series L2 Managed Switch User Guide Figure 49 Port Access Control ...

Page 78: ... Password for the new user Confirm Password Enter the password again Dynamic VLAN Specify the VLAN ID assigned to the 802 1x authenticated clients Click to add the new user Click when you re done with the modifications Click when you want to remove the selected user Click to make the settings permanent Click to refresh the settings to current value Figure 50 Dial In user ...

Page 79: ...Server Port The port number for the RADIUS server is listening to Authentication Server Key The key is used for communications between GigaX and the RADIUS server Confirm Authentication Key Re type the key entered above The VLAN of the RADIUS server connected to the switch must be the same as the VLAN of the system management interface Click to make the settings permanent Click to refresh the sett...

Page 80: ...GigaX Series L2 Managed Switch User s Guide 80 Figure 51 RADIUS ...

Page 81: ... Protect In this mode you are not notified that a security violation has occurred b Restrict In this mode you are notified that a security violation has occurred Specifically an SNMP trap is sent a syslog message is logged and the violation counter increments c Shutdown In this mode a port security violation causes the interface to become blocking state immediately It also sends an SNMP trap logs ...

Page 82: ...address for the specified time period Select the corresponding port number and configure the port setting then click on the button The content of the display window will update automatically as you make changes Click on to make the setting effective Click on to refresh the settings to the current value Figure 52 Port Configuration 4 8 4 2 Port Status This page displays the port security informatio...

Page 83: ...own Restart whether to restart the port in shutdown status Yes No TotalMacAddrCount the total numbers of current static and dynamic secure MAC addresses StaticMacAddrCount the total numbers of current static secure MAC addresses ViolationCount the total numbers of secure violation Port security status on the port is SecureDown when one of the following situations occur The port is link down Admini...

Page 84: ...resses Users can add a MAC address into the secure MAC address table of one port The MAC address added in this way will not age out from the secure MAC address table We call it static secure MAC address MAC Address enter the MAC address Port Selection select the port to which the MAC belongs ...

Page 85: ...tion then click on You will see the current total secure MAC addresses of the port shown in the address window Users can remove the existed address by selecting the entries with the mouse then click on to remove them When you want to select multi entries please press Shift key on the keyboard and selecting the entries with the mouse Click or to make the configuration effective immediately Figure 5...

Page 86: ...ld Port select the port to make configuration State set the trust state Three types of state are supported for each port a No No trust state to classify ingress packets b CoS Classifies ingress packets with the packet CoS values For tagged IP packets the DSCP value of the packet is modified based on the CoS to DSCP map For untagged IP packets the DSCP value of the packet is modified based on the d...

Page 87: ...eviously configured trust state and all the incoming CoS values are assigned to default port CoS value If an incoming packet is tagged the CoS value of the packet is modified with the default port CoS Select the corresponding port number and configure the port setting then click on the button The field you changed will update the content of the display window Click on to save the configuration Cli...

Page 88: ...incoming packets to a DSCP value that QoS uses internally to represent the priority of the traffic Map DSCP to CoS each DSCP value can map into one of the CoS value Users can use the DSCP to CoS map to map DSCP values in incoming packets to a CoS value which is used to select one of the four egress queues Click on to save the configuration Click on to refresh the settings to current value To make ...

Page 89: ...gh corresponding policy set The switch only can have 56 classes The following fields are available Class Name input a class name The Class names can not be duplicate Match select a match mode Filter Set ID if the match mode is Filter users must select an existed filter set ID DSCP if the match mode is DSCP users must input DSCP values Click on after you create a new class by the above information ...

Page 90: ...GigaX Series L2 Managed Switch User s Guide 90 Figure 57 Class Set ...

Page 91: ...ic is out of traffic rate and burst size Users can create a policy by giving a name The policy names cannot be duplicate The switch only can have 56 policies and 256 policy rules Firstly you have to create a policy by giving a name and click on Secondly just click on to select the policy that you want to edit or remove And then click on to enter the Policy Edit page or click on to remove the polic...

Page 92: ...ll be multiplied by 8 For example set traffic rate to 10 Then the traffic rate of Fast Ethernet ports is 10 Mbps but for Gigabit Ethernet ports the traffic rate is 80Mbps Traffic Burst Size select a traffic burst size The minimum size of Fast Ethernet ports is 4K For Gigabit Ethernet ports traffic burst size will be multiplied by 8 For example set traffic burst size to 4K Then the burst size of Fa...

Page 93: ...action list Click on to select the policy action that you want to modify Editing the policy action then click on You will see the modified entry shown in the policy action list Click on to select the policy action that you want to remove then click on to remove it To make the configuration effective please go to Save Configuration page then click on Figure 59 Policy Edit ...

Page 94: ...icy Click on to save the configuration Click on to refresh the settings to current value To make the configuration effective please go to Save Configuration page then click on There are a few ways to attach a policy to ports Attach to all ports the policy will apply to all the ports of the system Attach to certain ports you can specify the ingress ports to be applied Detach all remove the policy f...

Page 95: ...GigaX Series L2 Managed Switch User Guide Figure 60 Policy Attach ...

Page 96: ...WRR scheduling prevents the low priority queues from being completely neglected during periods of high priority traffic The WRR scheduling transmits some packets from each queue in turn The number of packets it sends corresponds to the relative importance of the queue For example if one queue has a weight of 3 and another has a weight of 4 three packets are sent from the first queue for every four...

Page 97: ...art You can monitor the network traffic amount in different graphic chart by these pages Most MIB II counters are displayed in these charts Click Refresh Rate to set the period for retrieving new data from the switch You can differentiate the statistics or ports by selecting Color Finally click on Draw to let the browser to draw the graphic chart Each new Draw will reset the statistics display ...

Page 98: ... Comparison This page shows the one statistics item for all the ports in one graphic chart Specify the statistics item to display and click Draw the browser will show you the update data and refresh the graphic periodically Figure 62 Traffic comparison GigaX 2048 ...

Page 99: ...GigaX Series L2 Managed Switch User Guide Figure 63 Traffic comparison GigaX 2024 ...

Page 100: ...ser s Guide 100 4 10 2 Error Group Selecting the Port and display Color then clicking Draw the statistics window shows you all the discards or error counts for the specified port The data is updated periodically Figure 64 Error group ...

Page 101: ...0 3 Historical Status You can display information for different ports and statistics items in this chart Since this shows the history of the statistics information the line chart keeps the old data even it is refreshed Figure 65 Historical Status ...

Page 102: ...effective after a successful save Sometimes you may want to reset the switch configuration you can click on to reset the configuration file to factory default Of course a system reboot will follow this restoration process You will lose all the configurations when you choose to restore the factory default configurations Figure 66 Save Configuration ...

Page 103: ...gin again to enter CLI mode after the timeout All the CLI commands are case sensitive In order to make them easier to use you can enter into different category by typing the full command then this category becomes your working category Thereafter you don t have to type sys before any sub commands For example sys is a command category including a lot of sub commands You don t have to type sys for t...

Page 104: ...GigaX Series L2 Managed Switch User s Guide 104 Figure 67 CLI interface ...

Page 105: ...68 Figure 68 shows dual images in the switch One firmware is in Slot 0 and the other firmware is in Slot 1 The later version will be selected to boot the system automatically Enter the key to show the help messages for all available commands Although the commands are helpful in some situation we STRONGLY suggest users not to use them if you don t know the command function ...

Page 106: ...GigaX Series L2 Managed Switch User s Guide 106 Figure 68 Boot ROM Command Mode 5 1 2 Boot ROM Commands Type in the boot mode to display the valid commands list ...

Page 107: ...it back to auto select mode after successfully updating the firmware s 0 1 2 3 Set the console baud rate 0 9600bps 1 38400bps 2 57600bps 3 115200bps You have to set up the terminal emulator with the same baud rate to make the work x NONE Upload firmware to the switch It is slow to update firmware by the console port If you lost network connection to switch you can still update firmware in this way...

Page 108: ...The next user has to do login again with authorized user name and password 5 3 CLI Commands The switch provides CLI commands for all managed functions The command uses are listed in the categories as the WEB management interface This way you can follow the instructions and set up the switch correctly as easily as using WEB interface to configure the switch Always use to get the available commands ...

Page 109: ...contact description field the switch contact will change to the new one System Location Displays the physical location of the switch This is an RFC 1213 defined MIB object in System Group and provides the location information on the managed node CLI command sys info location system location description Type in the location description in the location description field to change the location Figure...

Page 110: ...k applications such as http server SNMP server ftp server telnet server and SSH server of the switch are all using this IP address CLI command net interface ip sw0 IP address netmask Network Mask Displays the subnet mask for the switch CLI command l3 interface ip sw0 IP address netmask Default Gateway Displays the IP address of the default gateway This field is necessary if the switch network cont...

Page 111: ... command sys reboot Upload No CLI command for this function Refer to Boot ROM commands for this function 5 3 2 Physical Interface Commands Admin Enable Disable Displays the port admin status allow user to turn the port on or off CLI command l2 port admin port number enable disable Mode Auto 10M Half 10M Full 100M Half 100M Full 1G Full Displays the current speed and duplex mode of the port The spe...

Page 112: ...eve 5 3 3 Bridge Commands Spanning Tree is STP Enabled RSTP Enabled Disabled Allows user to specify whether the switch participates in the Spanning Tree Protocol STP RSTP CLI command l2 stp start stp rstp CLI command l2 stp stop Hello Time Forward Delay Max Age Bridge Priority Displays the current STP RSTP bridge parameters setting CLI command l2 stp start stp rstp CLI command l2 stp stop Hello Ti...

Page 113: ...ort Path Cost new port Path Cost Port port number EdgePort yes no old port EdgePort new port EdgePort Port port number Point to Point yes no auto old port Point to Point new port Point to Point Retrieve Restores the previous saved settings from configuration file CLI command l2 stp retrieve CLI command l2 stp bridge retrieve CLI command l2 stp port retrieve Show Trunk Displays a specific trunk gro...

Page 114: ...ort by destination IP 6 select port by source and destination IP CLI command l2 trunk create trunk id rtag 1 6 trunk name lacp enable disable port list Add Remove Trunk Trunk group port members can be added to or removed from an existing trunk group CLI command l2 trunk add trunk id port list CLI command l2 trunk remove trunk id port list LACP Action User can enable or disable LACP on a specific t...

Page 115: ...D 1 is dedicated to SoC 0 and mirror ID 2 is dedicated to SoC 1 Therefore only port number 1 24 can be assigned to mirror ID 1 as monitor port ingress port s or egress port 2 Only ports 25 48 can be assigned to mirror ID 2 as mirroring ports CLI command l2 mirror create mirror id 1 or 2 monitor port no enable disable CLI command l2 mirror ingress mirror id 1 or 2 port list CLI command l2 mirror eg...

Page 116: ...multicast group by specifying the MAC address VLAN ID Class of Service VLAN port members and its untagged port members Note that MAC address and VLAN ID combination is formed as an unique entry in multicast group table CLI command l2 mcast set mac address format xx xx xx xx xx xx multicast mac address vlan id 1 by default vlan id cos 0 7 0 by default Class of Service port list format 1 2 3 4 50 fo...

Page 117: ...he previous saved settings from configuration file CLI command l2 igmp retrieve Broadcast Enabled Disabled Multicast Enabled Disabled Destination Lookup Failure Enabled Disabled User can limit the broadcast multicast and flooding due to destination lookup failed traffic rate by turning the traffic control on CLI command l2 rate set 1 bcast 2 mcast 3 dlf enable disable Limit Displays the current ra...

Page 118: ... to port number CLI command l2 arl port port number Query by VLAN ID ARL entries existed in ARL table can be queried according to VLAN ID CLI command l2 arl vlan vlan id Query by MAC Address ARL entries existed in ARL table can be queried according to MAC address CLI command l2 arl mac mac address vlan id MAC Address VLAN ID Port Selection Discard none source destination source destination User ca...

Page 119: ...ngs User may create a new VLAN by giving a unique VLAN ID a VLAN description name and its port member list note that the port member here is indicated as tagged port member To specify a VLAN port member as untagged port CLI command utportadd can achieve this purpose User may use CLI command add or remove to further add some port members to a VLAN or exclude some existing port members from a VLAN C...

Page 120: ... command l2 port vlan vlan id 4095 to disable the port based vlan port list CoS Value Sets the Class of Service for a port by assigning it a priority with range of 0 7 criteria value CLI command l2 port priority CoS port list Retrieve Restores the previous saved settings from configuration file CLI command l2 port retrieve Priority CoS Queue Allows user to map the CoS priority with range of 0 7 fo...

Page 121: ...oop enable vlan id list CLI command l2 dhcpsnoop disable vlan id list Add Remove Trusted Port Allows user to add or remove specific ports for DHCP snooping CLI command l2 dhcpsnoop add port list CLI command l2 dhcpsnoop remove port list Retrieve Restores the previous saved settings from configuration file CLI command l2 dhcpsnoo ...

Page 122: ...ser can modify a community entry in the table by reassigning its community string and privileges Community entry table index entry id to config Community string old community string new community string This action will modify all hosts with community string from old community to new community Are you sure y n y y for yes n for no Get privileges y always turn on by default Set privileges y n n set...

Page 123: ...ity string CLI command snmp host set User can modify a host entry in the table by reassigning its allowed IP address network mask and community string Host table entry table index entry id to config Host IP Subnet old IP address new IP address Netmask old netmask new netmask Community old community string new community string CLI command snmp host delete Allows user to delete a host entry from hos...

Page 124: ...ommand snmp trap set User can modify a trap entry in the table by reassigning its SNMP version destination IP address and community string Trap table entry table index entry id to config SNMP version 1 2c old snmp version new snmp version Destination IP old IP address new IP address Community old community string new community string CLI command snmp trap delete Allows user to delete a trap entry ...

Page 125: ...2 3 noauth authnopriv authpriv security level Context Match 0 1 inexact exact context match Read View Name read view name string Write View Name write view name string Notify View Name notify view name string CLI command snmp snmpv3 access set User can modify a VACM entry in the Group by reassigning its allowed group name read view name write view name notify view name security model security leve...

Page 126: ...nmp snmpv3 access delete Allows user to delete a VACM entry from VACM group Access entry entry id to delete Retrieve Restores the previous saved settings from configuration file CLI command snmp snmpv3 access retrieve View Name View Type View Subtree View Mask VACM View based Access Control Model View is used to view the information of SNMPV3 VACM Group A VACM View entry contains a view name view ...

Page 127: ...sk View Type 1 2 included excluded old view type new view type CLI command snmp snmpv3 view delete Allows user to delete a VACM View entry View entry entry id to delete Retrieve Restores the previous saved settings from configuration file CLI command snmp snmpv3 view retrieve Engine Id Name Auth Protocol Auth Password Priv Protocol Priv Password USM User based Security Model User is used to config...

Page 128: ...password priv protocol and priv password EngineId old engine id string new engine id string Name old user name string new user name string AuthProtocol oid old auth protocol oid string new auth protocol oid string AuthPassword old auth password string new auth password string Priv Protocol oid old priv protocol oid string new priv protocol oid string Priv Password old priv password string new priv...

Page 129: ...GigaX Series L2 Managed Switch User Guide CLI command snmp snmpv3 usmuser retrieve ...

Page 130: ...mit Deny Source MAC Destination MAC Add User can add a new MAC address rule associated to a filter set These filter rule works with ICMP TCP or UDP protocols with the action of permit or deny User can also specify the MAC address source or destination of the filter rule by using CLI command dstmac and srcmac CLI command filter rule new set id rule id protocol ICMP TCP UDP any action permit deny CL...

Page 131: ... permit or deny options User can also specify the IP address source or destination and port number of the filter rule using the CLI command dstip srcip and dstport srcport respectively CLI command filter rule new set id rule id protocol ICMP TCP UDP any action permit deny CLI command filter rule dstip set id rule id type any ip subnet CLI command filter rule srcip set id rule id type any ip subnet...

Page 132: ...rmit deny CLI command filter rule dstmac set id rule id type any mac address CLI command filter rule srcmac set id rule id type any mac address Rule Mode IP Rule Action Permit Deny Source IP Type IP Mask Destination IP Type IP Mask Source Port Type Port Destination Port Type Port Protocol ICMP TCP UDP ANY Modify Allows user to modify the IP filter rule CLI command filter rule modify set id rule id...

Page 133: ... srcport set id rule id type any port Rule Mode MAC Rule Action Permit Deny Source MAC Destination MAC Delete Allows user to delete the MAC filter rule CLI command filter rule delete set id rule id Rule Mode IP Rule Action Permit Deny Source IP Type IP Mask Destination IP Type IP Mask Source Port Type Port Destination Port Type Port Protocol ICMP TCP UDP ANY Delete Allows user to delete the MAC fi...

Page 134: ...er set to an ingress port CLI command filter apply ingress filter set id any none port number Egress Port Applies a filter set to an egress port CLI command filter apply egress filter set id any none port number Retrieve Restores the previous saved settings from configuration file CLI command filter retrieve 5 3 6 Security Commands Reauthentication Allows user to enable or disable periodic reauthe...

Page 135: ...r to set up the retransmission time CLI command security dot1x bridge retxtime retransmission time 1 65535 sec Max Reauthentication Attempts Allows user to set up the max number of the reauthentication attemps CLI command security dot1x bridge reauthmax max reauthentication attemps 1 10 Multi host Allows user to enable or disable Multi host on some specific ports CLI command security dot1x port mu...

Page 136: ... 1x authentication A user entry contains a user name password and dynamic VLAN CLI command security dialinuser create User Name user name string Password password string Confirm Password confirm password string Dynamic VLAN dynamic VLAN CLI command security dialinuser remove user name Allows user to delete a user entry from the local database CLI command security dialinuser modify user name Allows...

Page 137: ... key none server key confirm authentication key key none confirm server key Retrieve Restores the previous saved settings from configuration file CLI command security radius retrieve Generate SSH key Allows user to generate SSH keys SSH Secure SHell is a protocol for remotely logging into a machine via a shell It is very similar in functionality to telnet however unlike telnet all data between the...

Page 138: ... Violation Mode Protect Restrict Shutdown Allows user to set up the secure violation mode of some particular ports CLI command security portsecu violation violation mode 1 protect 2 restrict 3 shutdown port list Max MAC Addresses Allows user to set up maximum number of secure MAC addresses CLI command security portsecu maxaddr max number of addresses port no Aging Time Allows user to set up the ag...

Page 139: ...rt CLI command security portsecu mac add mac address port no Remove Removes a secure MAC address from a port by giving a MAC the VID and a port number or clear all of the secure MAC addresses of some particular ports CLI command security portsecu mac delete mac address vid port no CLI command security portsecu mac clear port list Retrieve Restores the previous saved settings from configuration fil...

Page 140: ...e Filter DSCP Filter Set ID DSCP 0 8 10 16 18 24 26 32 34 40 46 48 56 Add Creates a new class by specifying a unique class name and match mode If the match mode is Filter users must input an existed filter set ID If the match mode is DSCP users must input DSCP values If users input dscp list acl id will not display and acl id force to 0 CLI command qos class new class name CLI command qos class ma...

Page 141: ...ies by inputting CLI command qos class remove policy id 1 56 for all policies Edit Class ID DSCP Traffic Rate Traffic Burst Size Exceed Action None Drop DSCP Exceed DSCP Add Allows users to add a new policy action by specifying a policy ID and class ID A policy only can have 6 policy actions If users do not input traffic rate all of below prompts will not display If users input none or drop in exc...

Page 142: ...a policy action by specifying a policy ID and class ID Users can remove all policy actions of a policy by specifying a policy ID and CLI command qos policy remove policy id 1 56 class id for all classes Policy ID Attach Detach To attach or detach a policy to ingress ports CLI command qos policy attach policy id 1 56 port list CLI command qos policy detach policy id 1 56 port list Retrieve Restores...

Page 143: ...X Series L2 Managed Switch User Guide Priority CoS Queue Allows user to map the CoS priority with range of 0 7 for a buffer queue total of 4 with queue ID of 1 4 CLI command l2 cos map queue id 1 4 cos 0 7 ...

Page 144: ...boot up sys time date show the current date and time sys time settime set the current time sys files config backup backup configuration files sys files config default restore factory default configuration files sys baud set console baud rate net ping ping remote host net route show display the entries in the routing table ...

Page 145: ...ecimal numbers separated by dots is called dotted decimal notation The IP address 20 56 0 211 is read twenty dot fifty six dot zero dot two eleven 6 1 1 Structure of an IP address IP addresses have a hierarchical design similar to that of telephone numbers For example a 7 digit telephone number starts with a 3 digit prefix that identifies a group of thousands of telephone lines and ends with four ...

Page 146: ...ield2 Field3 Field4 Class A Network ID Host ID Class B Network ID Host ID Class C Network ID Host ID Following are examples of valid IP addresses Class A 10 30 6 125 network 10 host 30 6 125 Class B 129 88 16 49 network 129 88 host 16 49 Class C 192 60 201 11 network 192 60 201 host 11 ...

Page 147: ...smaller but still quite large each being able to hold over 65 000 hosts There can be up to 16 384 class B networks in existence A class B network might be appropriate for a large organization such as a business or government agency Class C networks are the smallest only able to hold 254 hosts at most but the total possible number of class C networks exceeds 2 million 2 097 152 to be exact LANs con...

Page 148: ...ese host ID bits For example consider a class C network 192 168 1 To split this into two subnets you would use the subnet mask 255 255 255 128 It s easier to see what s happening if we write this in binary 11111111 11111111 11111111 10000000 As with any class C address all of the bits in field1 through field 3 are part of the network ID but note how the mask specifies that the first bit in field 4...

Page 149: ... field4 for its host IDs ranging from 0 to 63 Sometimes a subnet mask does not specify any additional network ID bits and thus no subnets Such a mask is called a default subnet mask These masks are Class A 255 0 0 0 Class B 255 255 0 0 Class C 255 255 255 0 These are called default because they are used when a network is initially configured at which time it has no subnets ...

Page 150: ...our PC can recognize other computers on your network and the Internet A ping command sends a message to the computer you specify If the computer receives the message it sends messages in reply To use it you must know the IP address of the computer with which you are trying to communicate On Windows based computers you can execute a ping command from the Start menu Click the Start button and then c...

Page 151: ...ng systems you can execute the same command at a command prompt or through a system administration utility 7 1 2 nslookup You can use the nslookup command to determine the IP address associated with an Internet site name You specify the common name and the nslookup command looks up the name on your DNS server usually located with your ISP If that name is not an entry in your ISP s DNS table the re...

Page 152: ...nown See Figure 71 Figure 71 Using the nslookup utility There may be several addresses associated with an Internet name This is common for web sites that receive heavy traffic they use multiple redundant servers to carry the same information To exit from the nslookup utility type exit and press Enter at the command prompt ...

Page 153: ...rear side of the switch When any one of the switch fans located on the rear panel becomes defective you can easily replace it following these steps 1 Unlock the fan module by loosening the thumbscrew that secures it to the rear panel Figure 72 Loosening the thumbscrew 2 Carefully pull the module out as shown Figure 73 Removing the fan module ...

Page 154: ...e the other fan 6 Connect the fan cables to the PCB Make sure that the fan cables are connected to the correct fan connector FAN 1 is on the left side when you are facing the rear panel 7 Insert the fan module to the switch chassis until it fits in place Make sure that the fan power cables are not caught between the fan module and chassis 8 Secure the fan module to the chassis with the thumbscrew ...

Page 155: ...nd to the switch Make sure the PC and or hub switch is turned on 2 Verify if your cable is sufficient for your network requirements A 100 Mbps network 100BaseTx should use cables labeled Cat 5 10Mbit sec cables may tolerate lower quality cables Network Access PC cannot access another host in the same network 1 Check the Ethernet cabling is good and the LED is green 2 If the port LED is amber check...

Page 156: ...port for Javascript must be enabled in your browser Support for Java may also be required 2 Ping the switch IP address to see if the link is stable If some ping packets fail check your network setup to make sure a valid setting Changes to Configuration are not being retained Be sure to click on button in the Save Configuration page to save any changes Console Interface Cannot show the texts on the...

Page 157: ...at uses only two digits 0 and 1 to represent all numbers In binary the number 1 is written as 1 2 as 10 3 as 11 4 as 100 etc Although expressed as decimal numbers for convenience IP addresses in actual use are binary numbers e g the IP address 209 191 4 240 is 11010001 10111111 00000100 11110000 in binary See also bit IP address network mask bit Short for binary digit a bit is a number that can ha...

Page 158: ...of data the a routing device will accept and or reject Filtering rules are defined to operate on an interface or multiple interfaces and in a particular direction upstream downstream or both FTP File Transfer Protocol A program used to transfer files between computers connected to the Internet Common uses include uploading new or updated files to a web server and downloading files from a web serve...

Page 159: ... group Internet The global collection of interconnected networks used for both private and business communications intranet A private company internal network that looks like part of the Internet users access information using web browsers but is accessible only by employees IP See TCP IP IP address Internet Protocol address The address of a host computer on the Internet consisting of four numbers...

Page 160: ...address of a device assigned by its manufacturer MAC addresses are expressed as six pairs of characters mask See network mask Multicast To send data to a group of network devices Mbps Abbreviation for Megabits per second or one million bits per second Network data rates are often expressed in Mbps Monitor Also called Roving Analysis allow you to attach a network analyzer to one port and use it to ...

Page 161: ...rnet RJ 45 packet Data transmitted on a network consists of units called packets Each packet contains a payload the data plus overhead information such as where it came from source address and where it should go destination address ping Packet Internet or Inter Network Groper A program used to verify whether the host associated with an IP address is online It can also be used to reveal the IP addr...

Page 162: ...rnet on the most efficient route based on the data s destination IP address and current network conditions A device that performs routing is called a router SNMP Simple Network Management Protocol The TCP IP protocol used for network management STP Spanning Tree Protocol The bridge protocol to avoid packet looping in a complicate network subnet A subnet is a portion of a network The subnet is dist...

Page 163: ...ccess a remote computer While HTTP the web protocol and FTP only allow you to download files from a remote computer Telnet SSH allows you to log into and use a computer from a remote location TFTP Trivial File Transfer Protocol A protocol for file transfers TFTP is easier to use than File Transfer Protocol FTP but not as capable or secure Trunk Two or more ports are combined as one virtual port al...

Page 164: ... a country or continent With respect to the SL 1000 WAN refers to the Internet Web browser A software program that uses Hyper Text Transfer Protocol HTTP to download information from and upload to web sites and displays the information which may consist of text graphic images audio or video to the user Web browsers use Hyper Text Transfer Protocol HTTP Popular web browsers include Netscape Navigat...

Page 165: ...users through web browsers A web site typically consists of web pages that contain text graphics and hyperlinks See also hyperlink web page WWW World Wide Web Also called the Web Collective term for all web sites anywhere in the world that can be accessed via the Internet ...

Page 166: ...mands 108 Community Commands 122 Community Table page 62 Configuration Manager troubleshooting 155 Console Interface 103 Default Port VLAN and CoS page 60 download 158 Dynamic Address page 54 Error Group page 100 Ethernet defined 158 Filter Attach Commands 134 Filter Set 71 Filter Set Commands 130 Filtering rule 158 Filters Commands 130 134 Filters pages 70 Firmware Upgrade page 40 FTP 158 Hardwar...

Page 167: ...5 IP Setup page 37 ISP 160 LAN 160 LAN IP Address Configuration 110 LEDs 160 troubleshooting 155 Link Aggregation page 45 Login and Logout 108 MAC addresses 160 Management page 35 Mask See Network mask Mbps 160 Mirroring page 48 Network See LAN Network classes 147 Network ID 145 Network mask 161 Network mask 148 NIC 161 nslookup 151 Packet 161 Password default 27 29 recovering 156 Physical Interfa...

Page 168: ...P 162 SNMP Commands 122 SNMP pages 62 Spanning Tree Commands 112 Spanning Tree page 43 Static Address page 56 Static Multicast page 51 Statistics Chart pages 97 STP 162 Subnet 162 Subnet mask See Network mask Subnet masks 148 System Commands 108 Tagged VLAN page 57 TCP IP 163 Telnet 163 TFTP 163 Traffic Comparison page 98 Traffic Control page 53 Trap Setting Commands 124 Trap Setting page 65 Troub...

Page 169: ...igaX Series L2 Managed Switch User Guide Upstream 164 Username default 27 29 WAN 164 Web browser 164 Web function layout 32 Web Interface 26 Web page 164 Web site 164 Web top frame 32 World Wide Web 165 ...

Reviews: