background image

 

 

 
   

Notice According to GNU General Public License Version 2 

 

This product includes software that is subject to the GNU General Public License version 2. The program is free software 
and distributed without any warranty of the author. We offer, valid for at least three years, to give you, for a charge no 
more than the costs of physically performing source distribution, a complete machine-readable copy of the 

corresponding source code. 
 
Das Produkt beinhaltet Software, die den Bedingungen der GNU/GPL-Version 2 unterliegt. Das Programm ist eine sog. 

„Free Software“, der Autor stellt das Programm ohne irgendeine Gewährleistungen zur Verfügung. Wir bieten Ihnen für 
einen Zeitraum von drei Jahren an, eine vollständige maschinenlesbare Kopie des Quelltextes der Programme zur 
Verfügung zu stellen – zu nicht höheren Kosten als denen, die durch den physikalischen Kopiervorgang anfallen. 

 

GNU GENERAL PUBLIC LICENSE 

Version 2, June 1991 

 
Copyright (C) 1989, 1991 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA 
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. 

 

Preamble 

 

The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU 
General Public License is intended to guarantee your freedom to share and change free software--to make sure the 
software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software 

and to any other program whose authors commit to using it. (Some other Free Software Foundation software is 
covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too. 
 

When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to 

make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that 
you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free 

programs; and that you know you can do these things. 

 
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to 

surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the 

software, or if you modify it. 
 

For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the 

rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them 
these terms so they know their rights. 

 

We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal 
permission to copy, distribute and/or modify the software. 

 
Also, for each author’s protection and ours, we want to make certain that everyone understands that there is no 
warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to 

know that what they have is not the original, so that any problems introduced by others will not reflect on the original 
authors’ reputations. 
 

Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors 
of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we 
have made it clear that any patent must be licensed for everyone’s free use or not licensed at all. 

 
The precise terms and conditions for copying, distribution and modification follow. 
 

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 

 
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it 

may be distributed under the terms of this General Public License. The ‘“Program’“, below, refers to any such program 
or work, and a ‘“work based on the Program’“ means either the Program or any derivative work under copyright law: 
that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated 

into another language. (Hereinafter, translation is included without limitation in the term ‘“modification’“.) Each 
licensee is addressed as ‘“you’“. 
 

Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. 
The act of running the Program is not restricted, and the output from the Program is covered only if its contents 

constitute a work based on the Program (independent of having been made by running the Program). Whether that is 

true depends on what the Program does. 

Summary of Contents for GS-5208P

Page 1: ...ES 5208P User Manual 10 2015 v1 0 Questo manuale d istruzione fornito da trovaprezzi it Scopri tutte le offerte per Edimax GS 5208PLG o cerca il tuo prodotto tra le migliori offerte di Switch...

Page 2: ...t Interfaces 6 1 6 Device Startup 6 1 6 1 Check Before Power On 6 1 6 2 Powering On the Device 7 1 7 Device Upgrade 7 Chapter 2 Web Configuration and Management 8 2 1 Preparation Before Login 8 2 2 Lo...

Page 3: ...2 9 Security 25 2 9 1 MAC Address Binding 25 2 9 2 TCP UDP Filter 26 2 10 Spanning Tree 27 2 10 1 STP Bridge Settings 27 2 10 2 STP Port Settings 28 2 10 3 Loopback Detection 29 2 11 Trunking 30 2 12...

Page 4: ...ckets allow for integration with the most widely used mounting systems on the market 1 2 Features Supports 8 10 100Mbps Fast Ethernet PoE ports and 2 10 100 1000Mbps combo ports Support IEEE 802 3af a...

Page 5: ...ess down the button for about 5 seconds The system restores the factory default settings The following table describes the twenty seven LED indicators of the PF108C Power Green LED Off power off or fa...

Page 6: ...C 100 240V 50 60Hz 1 4 Package Contents Preparation Before Installation 1 4 1 Package Contents Before you start using this product please check if there is anything missing in the package and contact...

Page 7: ...face After placing the ES 5208P to a flat and stable surface insert the supplied power cable to the power socket and connect the other end of the cable to the power interface of ES 5208P 1 5 2 Setting...

Page 8: ...ator turns on the system starts to initialize When other indicators blink three times and the Power indicator is always on in green the power works normally 1 7 Device Upgrade You can upgrade software...

Page 9: ...aration Before Login Before accessing the switch ensure the communication between PC and switch is normal Check the communication as follows 1 Set the IP address of the PC to 192 168 2 X 2 1 254 and t...

Page 10: ...ss The default IP address is 192 168 2 1 Your computer s IP address must be in the same subnet as the switch For the default IP address this is any IP address in the range 192 168 2 x x 2 254 You can...

Page 11: ...3 1 Authentication Configuration Choose Administrator Authentication Configuration and the following page appears Read the Note in the page and change the user name and password After proper configur...

Page 12: ...and then Reboot the device for the changes to take effect 2 3 3 System Status Choose Administrator System Status and the following page appears In this page you can view the MAC address number of port...

Page 13: ...p up page will appear asking you to select new file for updating the firmware Caution When firmware update is in progress do not shut down the switch 2 3 6 Reboot the Device Choose Administrator Reboo...

Page 14: ...tatus Choose PoE PoE Status and the following page appears 2 4 2 PoE Setting Choose PoE PoE Setting and the following page appears 2 4 3 PoE Power Delay Choose PoE PoE Power Delay and the following pa...

Page 15: ...2 4 4 PoE Scheduling Choose PoE PoE Scheduling and the following page appears 2 4 5 NTP Setting Choose PoE NTP Setting and the following page appears...

Page 16: ...enus of Port Management are shown as below 2 5 1 Port Configuration Choose Port Management Port Configuration and the following page appears In this page you can set Tx Rx Ability Auto Negotiation Spe...

Page 17: ...ou can enable port mirroring service The packets from source port transmit to destination port 2 5 3 Bandwidth Control Choose Port Management Bandwidth Control and the following page appears After pro...

Page 18: ...vice at Layer 2 by using VLANs to organize any group of network nodes into separate broadcast domains VLANs confine broadcast traffic to the originating group and can eliminate broadcast storms in lar...

Page 19: ...is Port Based VLAN Click Change VLAN mode to change the VLAN mode Once Change VLAN mode is selected a warning message will appear Select Continue to change the mode or select Back to keep the existin...

Page 20: ...2 6 2 2 VLAN Based on Tag When the VLAN mode is tag the VLAN Member Setting page is shown as the following figure The following figure displays the VLAN configuration in the tag mode...

Page 21: ...Now select Add button to add vlan entry to the table Vlan entry can be modified by selecting VID from the list and then select Update button To delete an entry from the vlan table select VID from the...

Page 22: ...er and the following page appears In this page you can view the packet quantity Field Description Counter Mode Selection Select it from the drop down list Click Update to view the corresponding packet...

Page 23: ...to the network edge so that core switches and routers are not overloaded Switches and routers along the path can use class information to prioritize the resources allocated to different traffic classe...

Page 24: ...it 15 13 are 100 111 map to higher priority Based on IP DS For IPv4 packets the priority is determined according to the value of TOS 5 0 in the header Packets in which values of TOS 5 0 are 101110 001...

Page 25: ...he drop down list User_Define Port The valid range is 1 65535 Mask The valid range is 0 255 TCP UDP port QoS function Override When the override item is selected the Port_based Tag based IP TOS_based...

Page 26: ...s can communicate through the port A port can be bound to a maximum of three MAC addresses If MAC address binding is enabled address learning is automatically disabled and RSTP STP is affected It is r...

Page 27: ...d TELNET The configuration procedure 1 Select Enable from the drop down list to enable the TCP UDP filter service 2 Select port filtering rule Negative means the selected protocol will be dropped and...

Page 28: ...2 10 Spanning Tree Choose Spanning Tree and the sub menus of Spanning Tree are shown as below 2 10 1 STP Bridge Settings Choose Spanning Tree STP Bridge Settings and the following page appears...

Page 29: ...second It is the longest waiting time of the listening state turning into learning state or the learning state turning into forwarding state 2 Forward Delay 1 Max Age After proper configuration click...

Page 30: ...s In the mean time you can view the STP port status 2 10 3 Loopback Detection Choose Spanning Tree Loopback Detection to configure loopback detection on an interface When loopback detection is enabled...

Page 31: ...s You can create multiple links between devices that work as one virtual aggregate link A port trunk offers a dramatic increase in bandwidth for network segments where bottlenecks exist as well as pro...

Page 32: ...ng ports 5 6 7 8 Link Group 3 It includes the following ports 9 10 State You can select Disable or Enable Type You can select it from the drop down list Operation Key When the type is LACP there are s...

Page 33: ...Enable or Disable to start or Stop the DHCP relay agent respectively DHCP relay Hop count limit Sets the maximum allowed number in the hops field of the BOOTP DHCP header DHCP relay option 82 State S...

Page 34: ...apply the settings Click Refresh to refresh the state of link group 2 13 Configuration Backup and Recovery Choose Backup Recovery and the following page appears In this page you can download the swit...

Page 35: ...2 14 Miscellaneous Configuration Choose Miscellaneous and the following page appears In this page you can enable Aging VLAN striding and set VLAN uplink...

Page 36: ...n this page you can configure SNMP related parameters Field Description Community Name The community name used by SNMP Access Right The right of community name System Description System Contact System...

Page 37: ...2 16 Logout Choose Logout and the following page appears In this page the system asks you whether to logout Click Accept to logout Click Back to return to the previous page...

Page 38: ...lution The Power indicator is not ON after the system is started Check whether the power is correctly connected Check whether the power switch is turned on The Power indicator is ON but the Ethernet i...

Page 39: ...the core protocols of the Internet Protocol Suite TCP is one of the two original components of the suite complementing the Internet Protocol IP and therefore the entire suite is commonly referred to a...

Page 40: ...the capability of a network to provide better service to selected traffic flows using features such as data prioritization queuing congestion avoidance and traffic shaping These features effectively p...

Page 41: ...ld or licensed as is Should the programs prove defective following their purchase the buyer and not this company its distributor or its dealer assumes the entire cost of all necessary servicing repair...

Page 42: ...sure limits human proximity to the antenna shall not be less than 2 5cm 1 inch during normal operation Federal Communications Commission FCC RF Exposure Requirements SAR compliance has been establishe...

Page 43: ...en gem den Richtlinien 1995 5 EC 2009 125 EC 2006 95 EC 2011 65 EC Espa ol El presente equipo cumple los requisitos esenciales de la Directiva 1995 5 EC 2009 125 EC 2006 95 EC 2011 65 EC Italiano Ques...

Page 44: ...n followed Directives 1999 5 EC EMC EN55022 2010 AC 2011 Class A EN55024 2010 EN61000 3 2 2014 Class A EN61000 3 3 2013 IEC 61000 4 2 2008 IEC 61000 4 3 2006 A1 2007 A2 2010 IEC 61000 4 4 2012 IEC 610...

Page 45: ...surrender the rights These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of such a progr...

Page 46: ...ht to control the distribution of derivative or collective works based on the Program In addition mere aggregation of another work not based on the Program with the Program or with a work based on the...

Page 47: ...nse 8 If the distribution and or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Program under this Li...

Page 48: ......

Reviews: