Cisco Cisco Small Business Unmanaged Switch SR2016 User Manual Download Page 37

Chapter 5

Advanced Configuration

30

WebView Switches

Statistics > RMON History

The 

RMON  History

  screen  contains  information  about 

samples of data taken from ports. For example, the samples 
may include interface definitions or polling periods. 

Statistics > RMON History

The 

RMON  History  Control

  screen  is  divided  into  RMON 

History and Log Table.

Source Interface 

Displays the interface from which the 

history samples were taken. The possible field values are: 

Port 

 

Specifies  the  port  from  which  the  RMON 

information was taken.

LAG 

 

Specifies  the  port  from  which  the  RMON 

information was taken.

Sampling  Interval 

Indicates  (in  seconds)  the  time 

that samplings are taken from the ports. The field range 
is 

1–3600

.  The  default  is 

1800

  seconds  (equal  to  30 

minutes).

Max  No 

of  Samples  to  Keep.  Indicates  the  number  of 

samples to save.

Owner 

Displays  the  RMON  station  or  user  that 

requested the RMON information. The field range is 

0–20

 

characters.

The 

Add  to  List

  button  adds  the  configured  RMON 

sampling to the Log Table at the bottom of the screen.

Log Table

Source Interface 

Displays the interface from which the 

history samples were taken. 

Sampling  Interval 

Indicates  the  time  in  seconds  that 

samplings are taken from the port.

Sampling Requested 

Displays the number of samples to 

be saved. The field range is 

1–65,535

. The default value is 

50

.

Current  Number  of  Samples 

Displays  the  current 

number of samples taken.

View History Table button 

This button opens the 

RMON 

History

 screen.

RMON History

The 

RMON  History

  screen  contains  interface-specific 

statistical network samplings. Each table entry represents 
all counter values compiled during a single sample. 

RMON History Table

History  Entry  No 

Displays  the  history  table  entry 

number.

Owner 

Displays the RMON station or user that requested 

the RMON information. The field range is 0–20 characters.

Sample No 

Indicates the sample number from which the 

statistics were taken.

Drop Events 

Displays the number of dropped events that 

have occurred on the interface since the device was last 
refreshed. This option is not available on the SRW224G4 
and SRW248G4.

Received Bytes (Octets) 

Displays the number of octets 

received  on  the  interface  since  the  device  was  last 
refreshed.  This  number  includes  bad  packets  and  FCS 
octets, but excludes framing bits.

Received  Packets 

Displays  the  number  of  packets 

received  on  the  interface  since  the  device  was  last 
refreshed, including bad packets, Multicast and Broadcast 
packets.

Broadcast  Packets 

Displays  the  number  of  good 

Broadcast  packets  received  on  the  interface  since  the 
device was last refreshed. This number does not include 
Multicast packets. 

Multicast Packets 

Displays the number of good Multicast 

packets received on the interface since the device was last 
refreshed.

CRC Align Errors 

Displays the number of CRC and Align 

errors that have occurred on the interface since the device 
was last refreshed.

Summary of Contents for Cisco Small Business Unmanaged Switch SR2016

Page 1: ...USER GUIDE BUSINESS SERIES WebView Switches Model SRW2048 SRW2024 SRW2016 SRW248G4 SRW224G4 ...

Page 2: ...website address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Ne...

Page 3: ...l 6 LEDs 6 Back Panel 6 Chapter 3 Connecting the Switch 8 Overview 8 Placement Options 8 Desktop Placement 8 Rack Mount Placement 8 Hardware Installation 9 Configuring the Switch 9 Chapter 4 Configuration Using the Console Interface 10 Overview 10 Configuring the HyperTerminal Application 10 Connecting to the Switch through a Telnet Session 10 Configuring the Switch through the Console Interface 1...

Page 4: ...24 Port Management Link Aggregation 25 Link Aggregation Detail 25 Port Management LACP 26 VLAN Management Create VLAN 26 Single VLAN 26 VLAN Range 26 VLAN Table 26 VLAN Management Port Setting 27 VLAN Management Ports to VLAN 27 VLAN Management VLAN to Ports 28 VLAN Management GVRP 28 Statistics RMON Statistics 29 Statistics RMON History 30 Log Table 30 RMON History 30 Statistics RMON Alarm 31 Sta...

Page 5: ...e New Aggregate Policer 43 Spanning Tree 43 Spanning Tree STP Status 44 Spanning Tree Global STP 44 Global Setting 44 Bridge Settings 45 Spanning Tree STP Port Settings 45 Spanning Tree RSTP Port Settings 46 Spanning Tree MSTP Properties 47 Spanning Tree MSTP Instance Settings 48 Spanning Tree MSTP Interface Settings 48 Multicast IGMP Snooping 49 Multicast Bridge Multicast 50 Multicast Bridge Mult...

Page 6: ...bout Gigabit Ethernet and Fiber Optic Cabling 62 Gigabit Ethernet 62 Fiber Optic Cabling 62 Appendix B Windows Help 63 TCP IP 63 Shared Resources 63 Network Neighborhood My Network Places 63 Appendix C Downloading using Xmodem 64 Startup Menu Procedures 64 Appendix D Glossary 66 Appendix E Specifications 70 Appendix F Warranty Information 75 Limited Warranty 75 Exclusions and Limitations 75 Obtain...

Page 7: ...d by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 78 Appendix H Software License Agreement 82 Software in Linksys Products 82 Software Licenses 82 Schedule 1 Linksys Software License Agreement 82 Schedule 2 83 Schedule 3 86 Appendix I Contact Information 89 ...

Page 8: ...using MAC based filtering Extensive QoS features makes the solution ideal for real time applications like Voice and Video The 4 priority queues together with the Weighted Round Robin and Strict Priority scheduling techniques facilitate efficient coexistence of real time traffic with data traffic allowing them each to meet their QoS needs Individual users or applications can be prioritized above ot...

Page 9: ...logy enables each port to automatically detect the speed of the device connected to it 10 Mbps 100 Mbps or 1000 Mbps and adjust its speed and duplex accordingly MiniGBIC 1 4 The miniGBIC gigabit interface converter port is a connection point for a miniGBIC expansion module so the Switch can be uplinked via fiber to another switch The MiniGBIC port provides a link to a high speed network segment or...

Page 10: ...ch is equipped with 24 auto sensing Ethernet network ports which use RJ 45 connectors The Fast Ethernet ports supportnetworkspeeds TheFastEthernetports support network speeds of 10 Mbps 100 Mbps or 1000 Mbps They can operate in half and full duplex modes Auto sensing technology enables each port to automatically detect the speed of the device connected to it 10 Mbps 100 Mbps or 1000 Mbps and adjus...

Page 11: ...lex modes Auto sensing technology enables each port to automatically detect the speed of the device connected to it 10 Mbps 100 Mbps or 1000 Mbps and adjust its speed and duplex accordingly MiniGBIC 1 2 The miniGBIC gigabit interface converter port is a connection point for a miniGBIC expansion module so the Switch can be uplinked via fiber to another switch The MiniGBIC port provides a link to a ...

Page 12: ... automatically detect the speed of the device connected to it 10 Mbps or 100 Mbps and adjust its speed and duplex accordingly ETHERNET G1 G4 The Switch is equipped with 4 auto sensing Gigabit Ethernet network ports whichuseRJ 45connectors TheGigabitEthernet ports support network speeds of 10 Mbps 100 Mbps or 1000 Mbps They can operate in half and full duplex modes Auto sensing technology enables e...

Page 13: ...hed device ETHERNET 1 24 The Switch is equipped with 24 auto sensing Ethernet network ports which use RJ 45 connectors The Fast Ethernet ports support network speeds of 10 Mbps 100 Mbps or 1000 Mbps They can operate in half and full duplex modes Auto sensing technology enables each port to automatically detect the speed of the device connected to it 10 Mbps 100 Mbps or 1000 Mbps and adjust its spe...

Page 14: ...switch that allows you to connect to a computer s serial port for configuration purposes using the provided serial cable You can use HyperTerminal to manage the Switch using the console port Refer to Chapter 4 Configuration Using the Console Interface for more information NOTE If you need to reset the Switch unplug the power cord from the back of the Switch Wait a few seconds and then reconnect it...

Page 15: ...om of the Switch Place the Switch on a desktop near an AC power source Keep enough ventilation space for the switch and check the environmental restrictions mentioned in the Specifications Appendix as you are placing the Switch Connect the Switch to network devices according to the Hardware Installation instructions below Rack Mount Placement When rack mounting the Switch please observe the follow...

Page 16: ...ps 2 and 3 to connect additional devices 4 If you are using the miniGBIC port then connect the 5 miniGBIC module to the miniGBIC port For detailed instructions refer to the module s documentation If you will use the Switch s console interface to 6 configure the Switch then connect the supplied serial cable to the Switch s Console port and tighten the captiveretainingscrews Connecttheotherendtoyour...

Page 17: ...n Select 2 Programs Accessories Communications HyperTerminal Start Programs Accessories Communications HyperTerminal Enter a name for this connection In this example the 3 name of connection is SRW2048 Select an icon for the application then click OK HyperTerminal Connection Description Screen Select a port to communicate with the Switch 4 COM1 COM2 or TCP IP HyperTerminal Connect To Screen Set th...

Page 18: ...e left or right Use the Enter key to select a menu option and use the Esc key to return to the previous selection Menu options and any values entered or present will be highlighted The bottom of the screen lists the actions available Switch Main Menu The System Main Menu screen displays these choices System Configuration Information Menu 1 Port Status 2 Port Configuration 3 Help 4 Logout 5 Switch ...

Page 19: ...e Enter key to save your changes To exit select Quit and press the Enter key Management Settings From the Management Settings screen you can set the following options Serial Port Session Configuration Telnet Session Configuration Secure Telnet SSH Configuration Management Settings Menu Serial Port Configuration The Serial Port Configuration screen displays the Switch s baud rate Serial Port Config...

Page 20: ...SH Server Status SSH Crypto Key Generation SSH Keys Fingerprints SSH Configuration SSH Server Configuration On the SSH Server Configuration screen you can enable or disable the SSH Server by navigating to the SSH Server option and using the SPACE bar to toggle the option The SSH Server Port can be modified by entering in the value SSH Server Configuration Select Edit and press the Enter key to mak...

Page 21: ...ave been generated Keys Fingerprints Select Refresh to update the screen if necessary To exit select Quit and press the Enter key Username Password Settings From the Username Password Settings screen you can administer the user names and passwords of those accessing the Switch Username Password Settings Select Edit and press the Enter key to make changes When your changes are complete press the Es...

Page 22: ...ame Specifies the country name Range 2 2 Validity Term Specifies number of days certification is valid Range 30 3650 Show Certificate Use the Show Certificate screen to display the internal certificate SSL Certificate Disable Active Management Profile To disable the active management profile selecting Disable Active Management Profile from the Security Settings screen You are prompted for confirma...

Page 23: ... the Switch then enter the IP settings and select DISABLE Select Edit to make changes When your changes are complete press the Esc key to return to the Action menu and select Save to save your changes HTTP The HTTP screen lets you configure the status and port number of the HTTP Server HTTP Select Edit and press the Enter key to make changes When your changes are complete press the Esc key to retu...

Page 24: ... your changes are complete press the Esc key to return to the Action menu Select Save and press the Enter key to save your changes To exit select Quit and press the Enter key TraceRoute The TraceRoute screen displays the IP address of the address whose route you want to trace TraceRoute Test Select Edit to change the IP address and select Execute to begin the traceroute test After the traceroute t...

Page 25: ...back to the factory default settings select Restore System Default Settings and press the Enter key You will be asked if you want to continue Press the y key to restore the Switch s default settings or press the n key to cancel Reboot System Reboot System Select Reboot System and press the Enter key if you want to restart the Switch You will be asked if you want to continue Press the y key to rebo...

Page 26: ...speed and duplex mode and status of flow control which is the flow of packet transmissions Port Configuration Select Edit and press the Enter key to make changes When your changes are complete press the Esc key to return to the Action menu Select Save and press the Enter key to save your changes To exit select Quit and press the Enter key Help Select Help and press the Enter key if you want to vie...

Page 27: ...curity purposes it is recommended that you set a new password on the System Password screen the System Password screen NOTE After configuring values using the Web based Utility you may be required to refresh the page to see the updated configuration The first screen that appears is the Setup Summary screen Twelve main tabs are accessible from the Web based Utility Setup Port Management VLAN Manage...

Page 28: ...gs screen System Up Time Displays the length of time that has elapsed since the Switch was last reset Current Time Displays the current time This setting can be configured from the Setup tab s Time screen Setup Network Settings The Network Settings screen allows you to assign DHCP or static IP settings to interfaces and assign default gateways Setup Network Settings Identification System Name Spec...

Page 29: ... EU daylight savings then select European If it should use another kindofdaylightsavings thenselectCustomandcomplete the From and To fields Time Set Offset For non US and European countries specify the amount of time for daylight savings The default is 60 minutes The range is 1 1440 From IfyouselectedOtherfortheDaylightSavingsetting enter the date and time when daylight savings begins To If you se...

Page 30: ... brief description of the port To enter or modify the description click the Detail button Administrative Status The port s administrative status To take the port offline select the Down option To allow normal access to the port select Up Link Status The port s operational status Up indicates a port has an active connection Down indicates there is no active connection or the port has been taken off...

Page 31: ...dule select Disable Current Auto Negotiation Read only The port s current Auto Negotiation status Admin Advertisement Specifies the capabilities to be advertised by the port Multiple options may be selected or Max Capability can be selected to cover all of the options The available options are Max Capability The port advertises all speeds and duplex mode settings 10 Half The port advertises 10 Mbp...

Page 32: ... column to display the Link Aggregation detail screen Link Aggregation Detail Link Aggregation Detail LAG Configuration LAG The LAG number 1 8 To display or edit another LAG select the number from the drop down menu Description The user defined LAG description of up to 64 characters This field is blank by default LACP Select the checkbox to enable Link Aggregation Control Protocol LACP LAG Type Re...

Page 33: ... Administrative LACP timeout A short or long timeout value can be selected Long is the default Admin Key A channel will only be formed between ports having the same admin key This only applies to ports located on the same switch VLAN Management CreateVLAN The Create VLAN screen provides information and global parameters for configuring and working with VLANs VLAN Management Create VLAN SingleVLAN ...

Page 34: ...rd VLAN are dropped Ingress Filtering Enables or disables Ingress filtering on the port Ingress filtering discards packets which do not include an ingress port LAG Indicates the LAG to which the VLAN is defined VLAN Management Ports toVLAN The Ports to VLAN screen contains fields for configuring ports to a VLAN The port default VLAN ID PVID is configured on the Create VLAN screen All untagged pack...

Page 35: ...figured to a VLAN VLAN Management GVRP GARP VLAN Registration Protocol GVRP is specifically provided for automatic distribution of VLAN membership information among VLAN aware bridges GVRP allows VLAN aware bridges to automatically learn VLANs to bridge ports mapping without having to individually configure each bridge and register VLAN membership VLAN Management GVRP The Global System LAG informa...

Page 36: ...Displays the number of good broadcast packets received on the interface since the device was last refreshed This number does not include Multicast packets Multicast Packets Received Displays the number of good Multicast packets received on the interface since the device was last refreshed CRC Align Errors Displays the number of CRC and Align errors that have occurred on the interface since the dev...

Page 37: ...er of Samples Displays the current number of samples taken View History Table button This button opens the RMON History screen RMON History The RMON History screen contains interface specific statistical network samplings Each table entry represents all counter values compiled during a single sample RMON History Table History Entry No Displays the history table entry number Owner Displays the RMON...

Page 38: ...values directly with the thresholds at the end of the sampling interval Delta Subtracts the last sampled value from the current value The difference in the values is compared to the threshold Rising Threshold Displays the rising counter value that triggers the rising threshold alarm The rising threshold is presented on top of the graph bars Each monitored variable is designated a color RisingEvent...

Page 39: ...vent Table at the bottom of the screen The Event Table area contains the following additional field Time Displays the time that the event occurred RMON Events Log RMON Events Events Log Event Displays the RMON events log entry number Log No Displays the log number Log Time Displays the time the log entry was entered Description Displays the log entry description Statistics Port Utilization ThePort...

Page 40: ...tistics GVRP Statistics The GVRP Statistics screen is divided into two areas GVRP Statistics Table and GVRP Error Statistics Table The following fields are relevant for both tables Interface Specifies the interface type for which the statistics are displayed Port Indicates port statistics are displayed LAG Indicates LAG statistics are displayed Refresh Rate Indicates the amount of time that passes...

Page 41: ...n Protocol Creates an Access Control Entry ACE based on a specific protocol Select from List Selects from a protocols list on which ACE can be based The possible field values are Any Matches the protocol to any protocol EIGRP Indicates that the Enhanced Interior GatewayRoutingProtocol EIGRP isusedtoclassify network flows ICMP Indicates that the Internet Control Message Protocol ICMP is used to cla...

Page 42: ...rtheDSCPvalueortheIPPrecedence value is used to match packets to ACLs The possible field range is 0 7 The Add to List button adds the configured IP Based ACLs to the IP Based ACL Table at the bottom of the screen ACL MAC Based ACL The MAC Based ACL screen allows a MAC based ACL to be defined ACEs can be added only if the ACL is not bound to an interface ACL Mac Based ACL ACL Name Displays the user...

Page 43: ...ere 1 is the highest value The RADIUS Server priority is used to configure the server query order Authentication Port Identifies the authentication port The authentication port is used to verify the RADIUS server authentication The authenticated port default is 1812 Number of Retries Defines the number of transmitted requests sent to RADIUS server before a failure occurs The possible field values ...

Page 44: ... port 49 Timeout for Reply Displays the amount of time that passes before the connection between the device and the TACACS server times out The field range is 1 30 seconds Status Displays the connection status between the device and the TACACS server The possible field values are Connected There is currently a connection between the device and the TACACS server Not Connected There is not currently...

Page 45: ...at lapses before the switch resends a request to the authentication server The default is 30 seconds Security Port Security Network security can be increased by limiting access on a specific port only to users with specific MAC addresses MAC addresses can be dynamically learned or statically configured Locked port security monitors both received and learned packets that are received on specific po...

Page 46: ... Enables traps when a packet is received on a locked port Trap Frequency The amount of time in seconds between traps The default value is 10 seconds Security Multiple Hosts The Multiple Hosts screen allows network managers to configure advanced port based authentication settings for specific ports and VLANs Security Multiple Hosts Port Displays the port number for which advanced port based authent...

Page 47: ...ed on an attribute including The ingress interface Packet content A combination of these attributes Providing various mechanisms for determining the allocation of network resources to different handling classes including The assignment of network traffic to a particular hardware queue The assignment of internal resources Traffic shaping The terms Class of Service CoS and QoS are used in the follow...

Page 48: ...splays the queue for which the queue settings are displayed The range is 1 4 Strict Priority Indicates that traffic scheduling for the selected queue is based strictly on the queue priority WRR Indicates that traffic scheduling for the selected queue is based strictly on weighted round robin WRR WRR Weight Displays the WRR weights to queues ofWRRBandwidth Displays the amount of bandwidth assigned ...

Page 49: ...ssible values are CoS Sets trust mode to CoS on the device The CoS mapping determines the packet queue DSCP Sets trust mode to DSCP on the device The DSCP mapping determines the packet queue QoS Advanced Mode Advanced QoS mode provides rules for specifying flow classification and assigning rule actions that relate to bandwidth management The rules are based on the ACLs see Access Control Tab This ...

Page 50: ...e CIR Defines the CIR in bits per second This field is only relevant when the Police value is Single Ingress Committed Burst Size CBS Defines the CBS in bytes per second This field is only relevant when the Police value is Single Exceed Action Action assigned to incoming packets exceeding the CIR This field is only relevant when the Police value is Single Possible values are Drop Drops packets exc...

Page 51: ...orward delay time The Forward Delay Time indicates the amount of time in seconds a bridge remains in a listening and learning state before forwarding packets The default is 15 seconds The range is 4 30 seconds Topology Changes Counts Indicates the total amount of STP state changes that have occurred Last Topology Change Indicates the amount of time that has elapsed since the bridge was initialized...

Page 52: ...ore forwarding packets The default is 15 seconds The range is 4 30 seconds SpanningTree STP Port Settings Network administrators can assign STP settings to specific interfaces using the STP Interface Settings screen Spanning Tree STP Port Settings The STP Interface Settings page contains the following fields Interface Indicates the port or LAG on which STP is enabled STP Indicates if STP is enable...

Page 53: ...30 60 seconds This time may delay detecting possible loops and propagating status topology changes Rapid Spanning Tree Protocol RSTP detects and uses network topologies that allow a faster STP convergence without creating forwarding loops Spanning Tree RSTP Port Settings Interface Displays the port or LAG on which Rapid STP is enabled Role IndicatestheportroleassignedbytheSTPalgorithm in order to ...

Page 54: ...xplicit LCP or NCP packets close the link or until some external event occurs This is the actual switch port link type It may differ from the administrative state Disabled Disables point to point link Point to Point Oper Status Indicates the Point to Point operating state Activate Protocol Migration Test This option sends Link Control Protocol LCP packets to test if a data link is enabled Spanning...

Page 55: ...ion SpanningTree MSTP Interface Settings NetworkAdministratorscanassignMSTPInterfacesettings using the MSTP Interface Settings screen Spanning Tree MSTP Interface Settings The MSTP Interface Settings screen contains the following fields Instance ID Lists the MSTP instances configured on the device Possible field range is 0 15 Interface Displays the interface for which the MSTP settings are display...

Page 56: ...maining Hops Indicates the hops remaining to the next destination Multicast IGMP Snooping When Internet Group Management Protocol IGMP Snooping is enabled globally all IGMP packets are forwarded to the CPU The CPU analyzes the incoming packets and determines Which ports want to join which Multicast groups Which ports have Multicast routers generating IGMP queries Which routing protocols are forwar...

Page 57: ...st service Bridge Multicast Address Identifies the Multicast group MAC address IP address Bridge IP Multicast Displays the port that can be added to a Multicast service Interface or LAG Displays LAG that can be added to a Multicast service The configuration options are as follows Static The port is user defined Dynamic The port is configured dynamically Forbidden Forbidden ports are not included t...

Page 58: ...ets MAC address of the device SNMP Notifications Indicates if the device can send SNMP notifications Authentication Notifications Indicates if SNMP Authentication failure notification is enabled on the device SNMP Views SNMP Views provide access or block access to device features or feature aspects For example a view can be defined that states that SNMP Group A has Read Only R O access to Multicas...

Page 59: ...is read write and changes can be made to the assigned SNMP view Notify Sends traps for the assigned SNMP view SNMP Group Membership The Group Membership screen provides information for assigning SNMP access control privileges to SNMP groups SNMP Group Membership User name Provides a user defined local user list EngineID IndicateseitherthelocalorremoteSNMPentity to which the user is connected Chang...

Page 60: ...MP Communities SNMP Management Station Defines the management station IP address for which the advanced SNMP community is defined There are two definition options Define the management station IP address All Includes all management station IP addresses Community String Defines the password used to authenticate the management station to the device Basic EnablesSNMPBasicmodeforaselectedcommunity and...

Page 61: ... OID is linked to a device feature or a feature aspect The Notification Filter screen also allows network managers to filter notifications SNMP Notification Filter Filter Name Contains a list of user defined notification filters New Object Identifier Subtree Displays the OID for which notifications are sent or blocked If a filter is attached to an OID traps or informs are generated and sent to the...

Page 62: ...time If SNMPv3is enabled the User Name and Security Level fields are enabled for configuration User Name Defines the user to whom SNMP notifications are sent Security Level Defines the means by which the packet is authenticated The possible field values are No Authentication The packet is neither authenticated nor encrypted Authentication The packet is authenticated Privacy Indicates the packet is...

Page 63: ...Static addresses are bound to the assigned interface and cannot be moved When a static address is seen on another interface the address will be ignored and will not be written to the address table Admin Static Address Interface Displays the interface to which the entry refers Port Thespecificportnumbertowhichtheforwarding database parameters refer LAG ThespecificLAGnumbertowhichtheforwarding datab...

Page 64: ... MAC Address table before it times out if no traffic from the source is detected The default value is 300 seconds Clear Table If checked clears the MAC address table Query Port Specifies the interface for which the table is queried There are two interface types from which to select Port The specific port number LAG The specific LAG number MAC Address Specifies the MAC address for which the table i...

Page 65: ...ing ports This is the default value TxOnly Defines the port mirroring on transmitting ports Both Defines the port mirroring on both receiving and transmitting ports Target Port Defines the port from which traffic is mirrored Admin CableTest The Cable Test screen shows you results from performance tests on copper cables The maximum cable length that can be tested is 120 meters Cables are tested whe...

Page 66: ...o backup the configuration to the local hard drive NOTE When downloading a configuration file be sure that it is a valid configuration file If you have edited the file ensure that only valid entries have been configured Admin Firmware Upgrade After you download a new image file the device should be rebooted If you are downloading a new boot image please follow these steps Download the new boot cod...

Page 67: ... and the log severity sent to each server Admin Server Logs Server Specifies the server to which logs can be sent UDP Port Defines the UDP port to which the server logs are sent The possible range is 1 65 535 The default value is 514 Facility Defines a user defined application from which system logs are sent to the remote server Only one facility can be assigned to a single server If a second faci...

Page 68: ...plays the log severity Description Displays the log message text Admin Flash Logs The Flash Log screen contains information about log entries saved to the Log File in FLASH including the time the log was generated the log severity and a description of the log message The Message Log is available after reboot Admin Flash Logs Log Index Displays the log number Log Time Displays the time at which the...

Page 69: ...e of carrying terabits of data per second the signaling hardware currently on the market can handle no more than a few gigabits of data per second Fiber cables come with two main connector types The most commonly used fiber optic cable is multi mode fiber cable MMF with a 62 5 micron fiber optic core Single mode fiber cabling is somewhat more efficient than multi mode but far more expensive due to...

Page 70: ...ol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without havingTCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shared resources Netwo...

Page 71: ...tion UsingtheConsoleInterface to configure HyperTerminal to connect to the Switch Power on the Switch and watch for the auto boot 4 message Autobootin2seconds pressRETURNorEsc toabortand enter prom Auto Boot Message When the auto boot message appears press the 5 Enter key to access the Startup menu Startup Menu NOTE If a selection is not made within 35 seconds default the device times out and you ...

Page 72: ...65 Downloading using Xmodem WebView Switches Appendix C Press 9 Send and the software is downloaded Download After the software has been downloaded the device will reboot automatically ...

Page 73: ...gned to the lowest priority queue and packet delivery is not guaranteed Bit A binary digit Boot To start a device and cause it to start executing instructions Browser An application program that provides a way to look at and interact with all the information on the World Wide Web Bridge A device that connect two networks Bridges are hardwarespecific howevertheyareprotocolindependent Bridges operat...

Page 74: ...ice refraining from sending packets FTP File Transfer Protocol A protocol used to transfer files over a TCP IP network Full Duplex The ability of a networking device to receive and transmit data simultaneously GARP General Attributes Registration Protocol Registers client stations into a multicast domain Gateway A device that interconnects networks with different incompatible communications protoc...

Page 75: ...decide how and what network traffic is forwarded according to priorities application types and source and destination addresses RADIUS Remote Authentication Dial In User Service A protocol that uses an authentication server to control network access RJ 45 Registered Jack 45 An Ethernet connector that holds up to eight wires RMON Remote Monitoring Provides network information to be collected from a...

Page 76: ... Rate UDP User Data Protocol Communication protocol that transmits packets but does not guarantee their delivery Upgrade To replace existing software or firmware with a newer version Upload To transmit a file over a network URL Uniform Resource Locator The address of a file located on the Internet VLAN Virtual Local Area Networks Logical subgroups that constitute a Local Area Network LAN This is d...

Page 77: ...stics alarms and events for enhanced traffic management monitoring and analysis Firmware Upgrade Web Browser upgrade HTTP and TFTP CLI via console or Telnet TFTP upgrade Port Mirroring Traffic on a port can be mirrored to another port for analysis with a network analyzer or RMON probe Other Management RFC854 Telnet Menu driven configuration Secure Shell SSH and Telnet Management Telnet Client SSL ...

Page 78: ...ng Temperature 32 to 104 F 0 to 40 C Storage Temperature 4 to 158 F 20 to 70 C Operating Humidity 10 to 90 Storage Humidity 10 to 95 SRW2016 SRW2024 Standards IEEE 802 3 802 3u 802 3ab 802 3x 802 1p 802 1q Ports 16 or 24 10 100 1000 RJ 45 ports and 2 shared SFP miniGBIC slots Cabling Type Cat5e or better LEDs System Link Activity Gigabit Performance Switching Capacity 32 or 48 Gbps non blocking MA...

Page 79: ...ority Queueing and Weighted Round Robin WRR Class of Service Port based 802 1p VLAN priority based IP TOS DSCP based IPv4 IPv6 Traffic Class based COS MAC Address port security VLAN ID MAC Address IP Address Subnet Mask Service Type Protocol TCP UDP Port Rate Limiting Ingress Policer Egress Shaper Layer 2 VLAN Port based and 802 1q based VLANs Private VLAN Edge PVE Management VLAN HOL Blocking Hea...

Page 80: ...re agent supports four RMON groups history statistics alarms and events for enhanced traffic management monitoring and analysis Firmware Upgrade Web Browser upgrade HTTP TFTP upgrade Port Mirroring Traffic on a port can be mirrored to another port for analysis with a network analyzer or RMON probe Other Management RFC854 Telnet Menu driven configuration Secure Shell SSH and Telnet Management Telne...

Page 81: ...ng Head of line blocking prevention Mini jumbo frame Supports frames up to 1600 bytes Dynamic VLAN GVRP Dynamic VLAN Registration Standards 802 3i 10BASE T Ethernet 802 3u 100BASE TX Fast Ethernet 802 3ab 1000BASE T Gigabit Ethernet 802 3z Gigabit Ethernet 802 3x Flow Control Denotes features found in only version 1 1 or later of the hardware Environmental Dimensions SRW224G4 430 x 44 x 203 mm H x...

Page 82: ...n calling A DATED PROOF OF ORIGINAL PURCHASE IS REQUIREDTO PROCESS WARRANTY CLAIMS If you are requested to return your product you will be given a Return Materials Authorization RMA number You are responsible for properly packaging and shipping your Appendix F Warranty Information LimitedWarranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under norm...

Page 83: ...s outside of the United States of America and Canada are responsible for all shipping and handling charges custom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys curren...

Page 84: ...not expressly approved by the party responsible for compliance could void your authority to operate the equipment Safety Notices Caution To reduce the risk of fire use only No 26 AWG or larger telecommunication line cord Do not use this product near water for example in a wet basement or near a swimming pool Avoid using this product during an electrical storm There may be a remote risk of electric...

Page 85: ... 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úřady Správ...

Page 86: ...οράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ménages Il e...

Page 87: ...éseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietmagwordeninge...

Page 88: ...rániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenčina Slovene Okoljske informacije za stranke v Evropski uniji Evropska direktiva 2002 96 EC prepoveduje odlaganje opreme...

Page 89: ...AFFILIATES CISCO SYSTEMS LINKSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFT...

Page 90: ...ut notice from Linksys if You fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES ...

Page 91: ... patent licenses in effect making the program proprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMSANDCONDITIONSFORCOPYING DISTRIBUTION AND MODIFICATION 0 This License applies to any program or other work which contains a notice placed ...

Page 92: ...allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means the preferred form of the work for making modifications to it For an executable work complete source code means all the source code for all modules it contains plus any associated interface definitio...

Page 93: ...y the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation 10 If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different write to the author to ask for permission For software which is copyrighted by the Free Software Foundation wr...

Page 94: ...cludes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright C 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This library is fr...

Page 95: ...INESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenceanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simply be copied and put under...

Page 96: ...ite http www linksys com Support Site http www linksys com support FTP Site ftp linksys com Advice Line 800 546 5797 LINKSYS Support 800 326 7114 RMA Return Merchandise Authorization http www linksys com warranty NOTE Details on warranty and RMA issues can be found in the Warranty section of this Guide 8050610A IN ...

Reviews: