background image

User’s Guide

 

Page 29 of 33 

Dos is short for Denial of Service, what causes DoS problem is DoS attacks, which will 

block the normal network service. The most common DoS attacks are computer network 

bandwidth  attack  and  connectivity  attack.  Please  configure  DoS  information  in  above 

pages. 

5.5    STP Configuration 

Picture 5.5.1    STP    Global configuration 

Picture 5.5.2    STP    Port configuration 

http://www.kst-bg.com

Summary of Contents for HT-8G-2F

Page 1: ...User s Guide Page 1 of 33 L2 Managed Switch User s Guide HT 8G 2F http www kst bg com...

Page 2: ...OGIN 11 CHAPTER 2 SWITCH STATUS 12 2 1 System Information 12 2 2 Logging Message 12 2 3 Port Counters 13 2 4 Port Status Port Bandwidth Statistics 13 2 5 Link Aggregation 14 2 6 LLDP Statistics 14 2 7...

Page 3: ...TY 26 5 1 Port Limit Configuration 26 5 2 Storm Control 27 5 3 Port Isolation 28 5 4 DoS configuration 28 5 5 STP Configuration 29 CHAPTER 6 SYSTEM MAINTENANCE 30 6 1 Reboot Switch 30 6 2 Factory Rese...

Page 4: ...f 33 Packaging list The L2 Managed Switch x1 Power Cord x1 User Guide CD x1 Warranty card x1 Installation accessories kit x1 Please contact local reseller or distributor if any accessories are missing...

Page 5: ...rating the HT 8G 2F Managed Switch 1 2 Front Panel 1 HT 8G 2F Managed 8 10 100 1000M Base T ports 2 1000 Base X SFP 1 Console port refer to Picture 1 2 2 Picture 1 2 1 H T 8 G 2 F M a n a g e d Front...

Page 6: ...Preparations before Instruction 2 1 Precautions Please read the following precautions carefully before operation to avoid damaging the device or causing body injuries 1 Please remove the power socket...

Page 7: ...op 2 3 Installation Tools 1 Flathead screw driver 2 Cross screw driver 3 Anti static wrist strap Chapter 3 Installation 3 1 Install the Switch 3 1 1 Install the switch on a 19 inch standard cabinet 1...

Page 8: ...one please connect one end of power cord to the power jack on the switch rear panel Connect the other end to the AC power socket Step two check the power indicator PWR on the front panel if the LED i...

Page 9: ...ged Protocol and Standards IEEE 802 3 10 BASE T Ethernet IEEE 802 3ad Static or Dynamic Link Aggregation IEEE 802 3u 100 BASE TX IEEE 802 3ab 1000 BASE T IEEE 802 3z 1000 BASE X IEEE 802 3x Full Duple...

Page 10: ...known cast and broadcast Storm suppression based on bandwidth adjustment storm filtering and ACL Supports attack against strategy against Land attack Blat attack Ping attack and TCL control led Flag a...

Page 11: ...five parts which are switch status basic configuration advanced configuration network security system maintenance Picture 1 1 1 Login Page Enter user password in the above login page the default passw...

Page 12: ...ge which contains Device Model number equipment type PCB HW Version MAC Address Serial Number System Object ID Firmware Version Firmware Updated Date System Running Time System Up Time 2 2 Logging Mes...

Page 13: ...as very poor working performance the user need to examine the connection of network cable or the partner network card The current software version doesn t support real time statistics refresh please c...

Page 14: ...aggregation information Like aggregator group LAG link state aggregator group member state active standby 2 6 LLDP Statistics Picture 2 6 1 LLDP Statistics LLDP information can be checked in above pag...

Page 15: ...istics When the IGMP snooping function is enabled IGMP information can be checked in above page 2 8 STP Statistics Picture 2 8 1 STP Statistics In above STP statistics page users can check the BPDU pa...

Page 16: ...Picture 3 1 1 IP configuration The above IP address configuration page can be used to configure the IP address of device management interface Interface Vlan 1 The default IP address subnet mask and ga...

Page 17: ...ure 3 2 1 Account configuration Login password can be revised in this page please remember the new password for future login 3 3 Logging Setting Picture 3 3 1 Logging Setting System log configuration...

Page 18: ...can be configured Auto negotiation 10 Half 10 Full 100 Half 100 Full and1000 Full Default mode is Auto negotiation can be changed in pull down list Flow Control This function is defaulted closed open...

Page 19: ...ort is Mirroring Port This is commonly used for network appliances that require monitoring of network traffic without influencing the normal working of every port it s a convenient online monitoring f...

Page 20: ...vices interactively gather information through LACP According to the parameters and status of each device automatically receive and dispatch Data of matchable link aggregation When the Aggregation is...

Page 21: ...ill be received Membership type tag refers to the port will receive tagged packets and the VLAN ID in for tagged packet is not 0 untag refers to the port receive untagged packets only 4 4 Voice VLAN 4...

Page 22: ...onfiguration Picture 4 5 1 Multicast Configuration MLD Snooping is short for Multicast Listener Discovery Snooping which is IPv6 multicast control mechanism for Layer 2 devices The function is used to...

Page 23: ...rame Configuration Picture 4 7 1 Jumbo Frame Configuration Generally the max frame size for packet is 1518 Bytes when packet is larger than this size it will be processed in batch 1518 Bytes as a unit...

Page 24: ...and port tags as different TLV type length value and save them in LLDPDU Link Layer Discovery Protocol Data Unit These information will be released to the direct connected neighbor device neighbor dev...

Page 25: ...a and a set of data objects SNMP is used mostly in network management systems to monitor network attached devices for conditions that warrant administrative attention 4 11 2 SNMP Community configurati...

Page 26: ...User s Guide Page 26 of 33 SNMP manager Chapter 5 Network Security 5 1 Port Limit Configuration Picture 5 1 1 Ingress Bandwidth Control Picture 5 1 2 egress Bandwidth Control http www kst bg com...

Page 27: ...ontrol priority class 5 2 Storm Control Picture 5 2 1 Storm control Picture 5 2 2 Storm control Port Configuration After enable the global situation storm control please continue with function configu...

Page 28: ...t Isolation Configuration In above port isolation page isolated ports can be configured Applying port isolation function to ensure port security 5 4 DoS configuration Picture 5 4 1 Global Dos Configur...

Page 29: ...which will block the normal network service The most common DoS attacks are computer network bandwidth attack and connectivity attack Please configure DoS information in above pages 5 5 STP Configura...

Page 30: ...rs can choose from STP and RSTP modes according to different network requirements Chapter 6 System Maintenance 6 1 Reboot Switch Picture 6 1 1 Reboot Switch Above page is used to reboot switch When ma...

Page 31: ...on can be checked in this page and new software upgrade can be made 6 4 Ping Test Picture 6 4 1 Ping Test Configuration Ping test is to check if a specified Client can be reached the function is the s...

Page 32: ...IP addresses of switch and PC must be in same network segment 6 6 Network Cable Test Picture 6 6 1 Network Cable Test Users can test the twisted pair cable working status Please select test ports then...

Page 33: ...no data transmitting from PD and the switch can t learn a new address to do communication Waiting for 120s the swith will get auto updated address or transmitting data from the PD the switch will get...

Reviews: