Hardened Managed Switch
Web Operation Manual
V1.0.0
Page 1: ...Hardened Managed Switch Web Operation Manual V1 0 0...
Page 2: ...erprints and license plate number You need to be in compliance with your local privacy protection laws and regulations to protect the legitimate rights and interests of other people by implementing me...
Page 3: ...eader software or try other mainstream reader software if the manual in PDF format cannot be opened All trademarks registered trademarks and company names in the manual are properties of their respect...
Page 4: ...away from dampness dust and soot Put the device in a well ventilated place and do not block its ventilation Use an adapter or cabinet power supply provided by the manufacturer The power supply must co...
Page 5: ...Do not drop or splash liquid onto the device and make sure that there is no object filled with liquid on the device to prevent liquid from flowing into it Operating temperature 30 C to 65 C 22 F to 1...
Page 6: ...wing Log Information 7 3 7 Status Monitoring 8 3 8 Viewing Diagnosis 8 3 9 Mirroring 9 4 Network Settings 10 4 1 configuring Ports 10 4 2 Configuring VLAN 11 4 2 1 VLAN Definition 11 4 2 2 VLAN Functi...
Page 7: ...A Certificate 26 6 2 1 Installing Device Certificate 26 6 2 2 Installing Trusted CA Certificates 27 6 3 Configuring Attack Defense 27 6 3 1 Configuring Firewall 27 6 3 2 Configuring Anti DoS Attack 28...
Page 8: ...ch in the address bar of the web browser and then press the Enter key Step 2 Enter the username and password The username and the password are admin and admin123 by default Step 3 Click Login Figure 1...
Page 9: ...nly and might differ from the actual pages 2 1 General Select Quick Config General you can view the device name IP address subnet mask and default gateway of the switch Figure 2 1 General information...
Page 10: ...connected Down The port is not connected or the connection fails Speed Duplexing Online Displays the port rate and the duplex mode Offline Displays Down VLAN VLAN port VLAN 1 by default RX usage Displ...
Page 11: ...4 Figure 2 3 Onvif information 2 4 IPC and NVR Select Quick Config IPC NVR you can view the information on the IPC NVR and other devices connected to the switch...
Page 12: ...ct Maintenance Legal Info you can view the Software License Agreement Privacy Policy and Open Source Software Notice 3 3 Changing Password You can modify the password The username is admin by default...
Page 13: ...vice update system and restart device Restore Factory Default Click Restore Now to restore all the device parameters to the factory defaults Update Software Click Browse to import the update file and...
Page 14: ...n System Software Hardware and Time Figure 3 4 Device information 3 6 Viewing Log Information You can view log information on the device operations Step 1 Select Maintenance Log Step 2 Configure Start...
Page 15: ...ched logs Encrypt Log Backup Click the checkbox to encrypt the back up logs 3 7 Status Monitoring Select Maintenance Status Monitoring and then you can view the CPU usage Figure 3 6 Status monitoring...
Page 16: ...ring Step 1 Select Maintenance Mirror Step 2 Click Add Step 3 In Add Mirroring Grouppage select Mirroring Group No Destination Port and TX RX and Both according to the actual situation Step 4 Click OK...
Page 17: ...Port Displays all ports of the switch Description Enter the description of the port The description cannot exceed 64 characters Only numbers letters and the following special characters are allowed _...
Page 18: ...e in the VLAN which can effectively control the network broadcast storm reduce network bandwidth and enhance network processing ability Enhance the network security The switches in different VLANs can...
Page 19: ...Settings VLAN Add VLAN Step 2 Click Add enter the VLAN ID and Description in the Add VLAN window Step 3 Click OK VLAN1 cannot be deleted Figure 4 2 Add VLAN Step 4 Click Save 4 2 5 Configuring Port V...
Page 20: ...with PVID the tag will be peeled Tag All All data will be tagged Untag All All data will not be tagged Allowed VLAN Configure the allowed VLAN 4 3 Configuring IGMP Snooping IGMP Snooping Internet Gro...
Page 21: ...STP function Step 3 Select Working Mode Step 4 Click Advanced and then configure the advanced parameters Figure 4 4 Configure STP Table 4 3 Description of the advanced parameters Parameter Descriptio...
Page 22: ...tiple links in the same group can be regarded as a logical link with a larger bandwidth Through aggregation the ports in the same group can share the communication flow to make a larger bandwidth Besi...
Page 23: ...Mode from Static LACP Active LACP Passive and Close Step 5 Set the Operational Key You can only configure link aggregation when the Aggregation Group Mode is set as LACP The value ranges from 1 to 65...
Page 24: ...ole in SNMP network and it receives and handles the request packet from NMS In some emergency circumstances for example if the port status changes Agent can send alarm packet to NMS proactively 4 6 1...
Page 25: ...parameters Step 4 Click OK Figure 4 8 SNMP V3 Table 4 5 Description of SNMP parameters Parameter Description Read community For description of these parameters see Table 4 4 Write community Trap addre...
Page 26: ...MAC Media Access Control Table records the relationship between the MAC address and the port and the information including the VLAN that the port belongs to When the device is forwarding the packet it...
Page 27: ...t MAC After enabling port MAC filtering the following two MAC devices can communicate with the port Devices in MAC allowlist Static MAC devices changing from the dynamic MAC devices After enabling por...
Page 28: ...21 Figure 4 11 Add MAC...
Page 29: ...nd reserved power Step 3 In Port Status and Control select from the list below the PoE Management to enable or disable PoE of the corresponding port Step 4 Click OK Figure 5 1 PoE settings Table 5 1 D...
Page 30: ...l amount of the power consumption of all ports exceeds the maximum power of PSE the system considers the PSE is overloaded 5 2 Configuring Long Distance PoE After you enable long distance PoE the maxi...
Page 31: ...n Time and PoE Off Time Step 3 Click to enable the green PoE Step 4 Click OK Figure 5 2 Green PoE 5 5 Configuring Legacy Support Enable Legacy Support in case of non standard powered device Non standa...
Page 32: ...e status of PD devices every 60 s If there is no data transmission the PoE port will be automatically powered off and restarted You can only use one between Legacy Support and PD Alive each time Step...
Page 33: ...nd the page will turn to CA Certificate page For details see 6 2 Configuring CA Certificate Step 6 Click OK Figure 6 1 Configure HTTPS 6 2 Configuring CA Certificate A device certificate is a proof of...
Page 34: ...Procedure Step 1 Select Security CA Certificate Trusted CA Certificates Step 2 Click Install Trusted Certificate Step 3 Click Browse and then Click OK Figure 6 3 Install Trusted Certificate Step 4 Opt...
Page 35: ...gure 6 5 Add to allowlist Click Not in Allowlist and the listed corresponding source host of IP addresses MAC is prohibited from visiting the corresponding ports of the device by network connection an...
Page 36: ...te the layer 2 data between the ports in the isolation group The port isolation function provides users a safer and more flexible networking solution Procedure Step 1 Select Security Port Isolation St...
Page 37: ...Click OK Figure 7 1 Configure port priority 7 2 Configuring Priority Mapping Table Step 1 Select Control Policy Priority Mapping Table Step 2 Select DSCP Local Priority or 802 1p Local Priority Step 3...
Page 38: ...4 Click OK 7 5 Configure Storm Control The broadcast frames on the network are forwarded continuously which affects the proper communications and greatly reduces the network performance The storm con...
Page 39: ...32 Figure 7 3 Add storm control...
Page 40: ...to the Mode to enable NAS Network Attached Storage Step 3 Select from Port Status The status includes Auto Force unAuthorized and Force Authorized Figure 8 1 Configure 802 1x Table 8 1 Description of...
Page 41: ...ines the RADIUS packet format and the message transmission mechanism It stipulates that using UDP as transport layer protocol to encapsulate the RADIUS packet At the beginning RADIUS is the AAA protoc...
Page 42: ...uggest that you download and use the latest version of client software Nice to have recommendations to improve your equipment network security 1 Physical Protection We suggest that you perform physica...
Page 43: ...er encrypted transmission will cause some loss in transmission efficiency 11 Secure Auditing Check online users we suggest that you check online users regularly to see if the device is logged in witho...