background image

12

 

 

 

Figure 2-3 

Aggregation 

Port trunk allows multiple links to be bundled together and act as a single 
physical link for increased throughput. It provides load balancing, and 
redundancy of links in a switched inter-network. Actually, the link does not 
have an inherent total bandwidth equal to the sum of its component physical 
links. Traffic in a trunk is distributed across an individual link within the trunk in 
a deterministic method that called a hash algorithm. The hash algorithm 
automatically applies load balancing to the ports in the trunk. A port failure 
within the trunk group causes the network traffic to be directed to the remaining 
ports. Load balancing is maintained whenever a link in a trunk is lost or 
returned to service.   

Aggregation / Trunking Configuration 

To assign a port to a trunk, click the required trunk number, then click Apply. 

 

Figure 2-4 

 

Summary of Contents for IN-16POEGWM

Page 1: ...IN 16POEGWM User Manual 16 Port Gigabit Ethernet 4 Combo Gigabit SFP PoE Web Smart Switch...

Page 2: ...occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encourage...

Page 3: ...Hardware Description 5 Physical Dimensions Weight 5 Front Panel 5 LEDs Indicators 5 Rear Panel 6 Hardware Installation 6 Software Description 7 Login 7 Configuration 8 System 8 Ports 10 Vlan 11 Aggreg...

Page 4: ...II Detailed Statistic 26 LACP Status 27 RSTP Status 28 IGMP Status 30 VeriPHY 30 Ping 31 Maintenance 34 Warm Restart 34 Factory Default 34 Software Upload 34 Configuration File Transfer 34 Logout 35...

Page 5: ...SNMP RMON IGMP Snooping capability via the intelligent software It is suitable for both metro LAN and office application General Features 16 Gigabit Ethernet ports with non blocking wire speed perfor...

Page 6: ...shaping and policing per port in sites Link aggregation support based on layer 2 4 information IEEE Std 802 3ad Security Port based access control support 4 096 VLAN support VLAN awareness on a per po...

Page 7: ...1Q VLAN Tagging IEEE 802 3ad Link Aggregation IEEE 802 1d Spanning tree protocol IEEE 802 1w Rapid Spanning tree protocol IEEE 802 1p Class of service Priority Protocols IEEE 802 3af 2003 Power over...

Page 8: ...4 Package Contents Before you start to install this switch please verify your package that contains the following items One Switch One Power Cord User Manual CD One pair Rack mount kit 8 Screws...

Page 9: ...The LED Indicators present real time information of systematic operation status This table provides description of LED status and the meaning Table 1 1 LED Indicators LED Status Description Power On P...

Page 10: ...ch on a large flat space with a power socket close by The flat space should be clean smooth level and sturdy Make sure there is enough clearance around the switch to allow attachment of cables power c...

Page 11: ...e description to understand the procedure At the first open the web browser and go to 192 168 2 100 site then the user will see the login screen The factory default did not set up the password user ma...

Page 12: ...user login the right side of website shows all functions as Fig 1 2 Figure 1 2 Configuration System System Configuration This page shows system configuration information User can configure informatio...

Page 13: ...o the IP address Fallback Gateway Assign the network gateway for industrial switch The default gateway is 0 0 0 0 Management VLAN ID of a configured VLAN 1 4094 through which you can manage the switch...

Page 14: ...sing a switch port and protects against MAC flooding attacks Port Configuration In Port Configuration you can set and view the operation mode for each port Enable Jumbo Frames This switch provides mor...

Page 15: ...reating a VLAN from a switch is logically equivalent of reconnecting a group of network devices to another Layer 2 switch However all the network devices are still plugged into the same switch physica...

Page 16: ...Traffic in a trunk is distributed across an individual link within the trunk in a deterministic method that called a hash algorithm The hash algorithm automatically applies load balancing to the port...

Page 17: ...must be set to the same value for ports that belong to the same link aggregation group LAG If this administrative key is not set when an LAG is formed i e it has the null value of 0 this key will auto...

Page 18: ...20 Forward Delay The maximum time in seconds the root device will wait before changing states i e discarding to learning to forwarding Number between 4 30 default is 15 Force Version Set and show the...

Page 19: ...d forward it to another remote RADIUS authentication server to verify access rights The EAP packet from the RADIUS server also contain the authentication method to be used The client can reject the au...

Page 20: ...switch to listen in on the IGMP conversation between hosts and routers by processing the layer3 IGMP packets sent in a multicast network When IGMP Snooping is enabled in a switch it analyzes all IGMP...

Page 21: ...ich is responsible for asking hosts if they want to receive multicast traffic Figure 2 7 Mirroring Port Mirroring is used on a network switch to send a copy of network packets seen on one switch port...

Page 22: ...before servicing lower priority queues WRR Weighted Round Robin shares bandwidth at the egress ports by using scheduling weights with default values of 1 2 4 8 for queues 0 through 7 respectively This...

Page 23: ...lues 0 7 When the QoS Mode is set to 802 1p the 802 1p Configuration table appears allowing you to map each of the eight 802 1p values to a local priority queue low normal medium or high The default s...

Page 24: ...CP the DSCP Configuration table is displayed allowing you to map each of the DSCP values to a hardware output queue low normal medium or high The default settings map all DSCP values to the high prior...

Page 25: ...hernet Configuration PoE technology is a system to pass electrical power safely along with data on Ethernet cabling Power is supplied in common mode over two or more of the differential pairs of sires...

Page 26: ...figuration Type of Port You can define the certain port as Policer and Shaper before you set up the rate limit No Limit This drop down menu allows you to specify that the selected port will have no ba...

Page 27: ...o complete halt You can protect your network from broadcast storms by setting a threshold for broadcast traffic for each port Any broadcast packets exceeding the specified threshold will then be dropp...

Page 28: ...settings Web Click PORTS Storm Control This page enables you to set the broadcast storm control parameters for every port on the switch Figure 2 12 2 Monitorning Statistic Overview Statistic Overview...

Page 29: ...ports click one of the linked port numbers for details Clear To renew the details collected and displayed Refresh To reset the details displayed Figure 3 2 LACP Status LACP Aggregation Overview LACP a...

Page 30: ...ttached at the remote end of this LAG link member Operational Port Key Current operational value of the key used by this LAG LACP Port Status Active LACP ports are capable of processing and sending LA...

Page 31: ...uration message becomes the designated port for the attached LAN If it is a root port a new root port is selected from among the device ports attached to the network Fwd Delay The maximum time in seco...

Page 32: ...erridden and the port will instead function as a point to point connection P2P Port Shows if this port is functioning as a Point to Point connection to exactly one other bridge The switch can automati...

Page 33: ...le Status Shows the cable length operating conditions and isolates a variety of common faults that can occur on Category 5 twisted pair cabling Figure 3 6 Ping This command sends ICMP echo request pac...

Page 34: ...does not respond If the host does not respond a timeout appears in ten seconds Destination unreachable The gateway for this destination indicates that the destination is unreachable Network or host un...

Page 35: ...31 Figure 3 7 2 Figure 3 7 3...

Page 36: ...y IP Address will be reset to their factory Figure 4 2 Software upload Select Upgrade Firmware from the Tools drop down list then click on the Browse button to select the firmware file Click the APPLY...

Page 37: ...configuration Use the Browse button to choose a file location on the web management station or to find a saved configuration file Figure43 4 Logout The administrator has write access for all paramete...

Page 38: ...he Web Smart Switch back to the original default Step 1 Turn on the Web Smart Switch Step 2 Press and hold the reset button continuously for 5 seconds and release the reset button Step 3 The switch wi...

Reviews: