background image

78 | 

P a g e

 

 

 

 

 

 

 

 

 

 

 

 

11. Appendix 2 FAQ 

1. Why is it not normal to display a page through a WEB browsing configuration?

 

A: Before accessing the WEB, remove the cache and COOKIES of IE. Otherwise, it may 

cause the abnormal. 

2. Forget the Password? 

A: Forgetting the login password can be used to initialize the password by restoring the 

factory settings. Press the button at 10s.Initial 

user name "admin" and password "system”.

 

3. Would be both working if configure by web or CLI? 

A: Yes, both ways are working. 

4. Why 

can’t

 increase bandwidth after configuring Trunking

 

A: Please check if the information of Trunking set port is the same, including rate, duplex 

mode and VLAN etc. 

5. How to deal with the problem of partial ports of switch? 

A: When some ports are blocked on the switch, it may be the network cable fault, the 

network card failure or the switch port failure, users can test by following steps: 

Test the failure:  

a.

 The connection of the computer and switch ports remains unchanged and replace other 

Summary of Contents for JTD-2886

Page 1: ...24 PORT POE SWITCH JTD 2886 JTECH NSP24 48 PORT POE SWITCH JTD 2887 JTECH NSP48 USER MANUAL J TECH DIGITAL INC 9807 EMILY LANE STAFFORD TX 77477 TEL 1 888 610 2818 E MAIL SUPPORT JTECHDIGITAL COM...

Page 2: ...ement 10 2 1 IP Configuration 10 2 2 NTP Configuration 11 2 3 Time Zone 12 2 4 SNMP Configuration 13 2 4 1 SNMP System Configuration 14 2 4 2 SNMP Trap Configuration 15 2 4 3 Communities 16 2 4 4 User...

Page 3: ...1 5 1 VLAN 31 5 2 Port Isolation 35 5 2 1 Port Group 35 5 2 2 Port Isolation 36 5 3 STP 36 5 3 1 STP Bridge Settings 36 5 3 2 MSTI Mapping 38 5 3 3 MSTI Priorities 39 5 3 4 STP Bridge Port 40 5 3 5 MS...

Page 4: ...Configuration 56 7 Security Configuration 57 7 1 Password 57 7 2 802 1X 57 7 3 DHCP Snooping 59 7 3 1 DHCP Overview 59 7 3 2 About DHCP Snooping 60 7 3 3 DHCP Snooping Configuration 61 7 4 IP MAC Sou...

Page 5: ...72 9 1 Restart Device 72 9 2 Factory Default 72 9 3 Firmware Upgrade 73 9 4 Firmware Select 73 9 4 1 Download Configuration File 74 9 4 2 Upload Configuration File 75 9 4 3 Activate Configuration 76 9...

Page 6: ...function attack prevention function ensuring secure management The series complies with FCC and CE standards and support 1 channel ac power input Using the mute fan can adapt to work environment tempe...

Page 7: ...tion can be managed configured and monitored via embedded Web based HTML interface By a standard browser you can manage switch at any remote site in the network The browser as a universal access tool...

Page 8: ...8 P a g e Default User Name admin Default Password system 1 5 Web based User Interface After entering the username and password the main screen appears as shown in Figure 1 2...

Page 9: ...ifferent states they are illustrated as follows 1 6 Main Menu Using the onboard Web agent you can define system parameters manage and control the Managed Switch and all its ports or monitor network co...

Page 10: ...P a g e 2 Network Management 2 1 IP Configuration Note IP address of switch is 192 168 2 1 by default and the default subnet mask is 255 255 255 0 24 Click Network Admin IP and the screen will show a...

Page 11: ...fault If user needs to use other VLAN for switch management please first add VLAN in the VLAN module and add the relevant port to the VLAN 2 2 NTP Configuration NTP is an acronym for Simple Network Ti...

Page 12: ...er configuration was set please click Save to save the setting 2 3 Time zone Time zone is to set the time of the switch users can set the time according to their locations You can get into the time zo...

Page 13: ...d and solve network problems and plan for network growth This switch support SNMPv1 v2c v3 Different versions of SNMP provide different security level for management stations and network devices In SN...

Page 14: ...al trap includes authentication failure networking changes and cold hot start trap MIB MIB is a collection of managed objects residing in a virtual information store Collections of related managed obj...

Page 15: ...a g e Configuration object and description is 2 4 2 SNMP Trap Configuration User can enable or disable SNMP Trap function and set configuration Click Network Admin SNMP Trap then this screen will sho...

Page 16: ...ntication mechanism The administrator can set authentication and Encryption function The authentication is to verify the validity of a message sender and to avoid illegal user access Encryption is for...

Page 17: ...17 P a g e Configuration Instruction 2 4 5 Views Users can set the visit view of SNMPv3 Click Network Admin SNMP View As below...

Page 18: ...18 P a g e 2 4 6 Access Uses can set an Access to load a built Views Click Network Admin SNMP Access as below Figure 2 4 6 SNMPv3 Access Load Set...

Page 19: ...19 P a g e 2 4 7 Groups Users can set Groups to load built Users and Access Click Network Admin SNMP Groups as below Figure 2 4 7 SNMPV3 Groups Load Setting...

Page 20: ...0 P a g e Configuration Instruction 2 5 System Log Configuration Users can configure switch s system log via following screen after clicking Network Admin Syslog Configuration object and description i...

Page 21: ...21 P a g e 3 Port Configuration 3 1 Port Configuration This page is for configuring port specifications of switch After clicking Port Configure Ports this screen will appear as...

Page 22: ...This switch supports up to 13 groups Link Aggregation 2 to 8 ports as one group Note If any port in the link aggregation group is disconnected data packet that sent to disconnected port will share lo...

Page 23: ...23 P a g e Configuration object and description is Click Save to store and active settings Note It allows a maximum of 8 ports to be aggregated as 1 static trunk group at the same time...

Page 24: ...ion lets you group up to eight consecutive ports into a single dedicated connection This feature can expand bandwidth to a device on the network LACP operation requires full duplex mode For more detai...

Page 25: ...des monitoring of network traffic that forwards a copy of each incoming or outgoing packet from one port of a network switch to another port where the packet can be studied It enables the manager to k...

Page 26: ...nation port should have equal or higher speed comparing to source port Besides source port and destination port should not be same one 3 4 Thermal Protection Configuration Thermal protection is for de...

Page 27: ...ver Ethernet PoE means Ethernet network power supply via 100BASE TX 1000BASE T Its maximum power distance is 100 meters By PoE power system based on Ethernet wiring network of UTP Cat5 or higher Cable...

Page 28: ...it will go to next step 2 PD Classification After detecting PDs PSE will classify them and recognize what is the power that PD required 3 Power up When above 2 steps finished PSE start feeding requir...

Page 29: ...29 P a g e 4 1 PoE Setting After clicking PoE PoE Setting user can make PoE settings in following screen Configuration object and description is...

Page 30: ...user can check and look PoE status of all ports after clicking PoE PoE Status 4 3 PoE Scheduling This series supports PoE scheduling users can set timing PoE reboot and enable disable PoE on time sche...

Page 31: ...ation technology that logically divide one physical LAN into multiple broadcast area network multiple VLAN Hosts within a VLAN can communicate directly But VLAN groups can not directly communicate wit...

Page 32: ...32 P a g e Configuration object and description is...

Page 33: ...33 P a g e...

Page 34: ...34 P a g e...

Page 35: ...h support port groups Members of port group can forward date Note port can belong to multiple port groups Data can be forwarded among any port that belong to one port group After clicking Advanced Con...

Page 36: ...settings 5 3 STP The Spanning Tree Protocol STP can be used to detect and disable network loops and to provide backup links between switches bridges or routers This allows the switch to interact with...

Page 37: ...37 P a g e Configuration object and description is...

Page 38: ...38 P a g e Click Save to store and active settings 5 3 2 MSTI Mapping Users can set the mapping Click Advanced Configure Spanning Tree MSTI Mapping Configuration Instruction...

Page 39: ...e and configuration revision of all switches in the looped network when set MSTP 5 3 3 MSTI Priorities Users can set MSTI priorities click advanced configure Spanning Tree MSTI Priorities Note The pri...

Page 40: ...40 P a g e 5 3 4 STP Bridge Port After clicking Advanced Configure Spanning Tree Bridge Ports following screen will appear Configuration object and description is...

Page 41: ...41 P a g e Click Save to store and active setting 5 3 5 MSTI Ports Users can set MSTI ports click Advanced Configure Spanning Tree MSTI Ports Configuration Instruction...

Page 42: ...P a g e 5 4 MAC Address Table This page allows you to configure Mac address table settings After clicking Advanced Configure Mac Table following screen will appear Configuration object and description...

Page 43: ...rs the exchange of IGMP messages and copies them to the CPU for feature processing The overall purpose of IGMP Snooping is to limit the forwarding of multicast frames to only ports that are a member o...

Page 44: ...nfiguration object and description is 5 5 2 IGMP Snooping VLAN Configuration After clicking Advanced Configure IGMP Snooping VLAN Configuration following screen will appear Configuration object and de...

Page 45: ...45 P a g e 5 5 3 Port Filtering Profile Set Port filtering profile click Advanced Configure IGMP Snooping Port Filtering Profile...

Page 46: ...C Profile Users can set the filter multicast list click Advanced Configure IPMC Profile Address Entry Configuration Instruction Click Save to enable your setting Bind the filter multicast list click A...

Page 47: ...control mechanism working on the Layer 2 Ethernet switch When enable IPV6 MLD Snooping switch receives the IPV6 MLD message by listening for each interface to exchange interface and multicast group ad...

Page 48: ...48 P a g e 5 7 1 Basic Configuration Click Advanced Configure IPv6 MLD Snooping Basic Configuration to check the configuration information of IPv6 MLD Snooping Configuration Instruction...

Page 49: ...onfiguration information of IPv6 MLD Snooping Configuration Instruction 5 8 ERPS ERPS Ethernet Ring Protection Switching it integrates OAM function and APS protocol If the ring network was interrupted...

Page 50: ...le ERPS STP of ring port should be disabled After clicking Advanced Configure ERPS following screen will appear Configuration object and description is Click Add New Ring Group to create a new ERPS ri...

Page 51: ...e number under Ring ID it will go to the page for Ring Configuration as following screen Configuration object and description is After clicking VLAN config it will go the page of Rapid Ring VLAN Confi...

Page 52: ...t uses periodic broadcasts to advertise information about the sending device Advertised information is represented in Type Length Value TLV format according to the IEEE 802 1ab standard and can includ...

Page 53: ...uration object and description is 5 10 Loop Protection Loop protection is to avoid broadcast loops After clicking Advanced Configure Loop Protection following screen will appear Configuration object a...

Page 54: ...s you to assign various grades of network service to different types of traffic such as multi media video protocol specific time critical and file backup traffic This function n can not only reserve b...

Page 55: ...55 P a g e Configuration object and description is 6 2 Port Policing After clicking QoS Configure Port Policing following screen will appear...

Page 56: ...56 P a g e Configuration object and description is 6 3 Storm Control Configuration After clicking QoS Configure Storm Control following screen will appear...

Page 57: ...sword Figure 7 1 System Password Configuration Screen Click Save to store and active settings 7 2 802 1X In the 802 1X world the user is called the supplicant the switch is the authenticator and the R...

Page 58: ...d forwards it When authentication is complete the RADIUS server sends a special packet containing a success or failure indication Besides forwarding this decision to the supplicant the switch uses it...

Page 59: ...a period of time it will resend DHCP DISCOVER message After received DHCP DISCOVER message DHCP Server will assign sources IP address for example to client and then send DHCP OFFER message to DHCP cl...

Page 60: ...When DHCP snooping is enabled globally and enabled on a VLAN interface DHCP messages received on an untrusted interface from a device not listed in the DHCP snooping table will be dropped Table entri...

Page 61: ...Security Configure DHCP Snooping Setting following screen will appear Configuration object and description is Click Save to store and active settings 7 4 IP MAC Source Guard IP MAC Source Guard is a...

Page 62: ...ps prevent IP spoofing attacks when a host tries to spoof and use the IP address of another host 7 4 1 Port Configuration In this page user can make IP MAC Source Guard Port Configuration After clicki...

Page 63: ...nually set Static Table of IP MAC Guard to fulfill controlling function to port After clicking Security Configure IP MAC Source Guard Static Table followed screen will appear Configuration object and...

Page 64: ...o block such attacks Only valid ARP requests and responses can go through DUT A Dynamic ARP prevents the untrust ARP packets based on the DHCP Snooping Database This page provides ARP Inspection relat...

Page 65: ...65 P a g e 7 5 2 VLAN Configuration After clicking Security Configure ARP Inspection VLAN Configuration following screen will appear...

Page 66: ...description is 7 5 3 Static Table User can manually configure ARP Inspection Static Table to control port After clicking Security Configure ARP Inspection Static Table following screen will appear Con...

Page 67: ...object access rights ACL implementations can be quite complex for example when the ACEs are prioritized for the various situation In networking the ACL refers to a list of service ports or network ser...

Page 68: ...68 P a g e 7 6 2 Rate Limiter Configuration User can make ACL Rate limiter configuration in this page After clicking Security Configure ACL Rate Limiter following screen will appear...

Page 69: ...ve to store and active settings 7 6 3 Access Control List Configuration User can make Access Control List Configuration in this page After clicking Security Configure ACL Access Control List following...

Page 70: ...kets to the IP address you defined Destination node will respond to those packets sent from switch So Ping test is to troubleshoot IP connectivity issues After clicking Diagnostics Ping followed scree...

Page 71: ...ngth and operating conditions and to isolate a variety of common faults that can occur on the Cat5 twisted pair cabling After clicking Diagnostics Cable Diagnostics following screen will appear Click...

Page 72: ...fter clicking Maintenance Restart Device following screen will appear 9 2 Factory Default This page is for making all settings to factory defaults After clicking Maintenance Factory Defaults following...

Page 73: ...enance Firmware Upgrade following screen will appear Please click Browse to select the firmware that needed to upgrade And then click Upload to start upgrading 9 4 Firmware Select This page is for upg...

Page 74: ...Activate Alternate Image to select the firmware In this page user can download upload activated or delete configuration files 9 4 1 Download Configuration File After clicking Maintenance Download foll...

Page 75: ...lease choose a file and then click Download Configuration button to download 9 4 2 Upload Configuration File After clicking Maintenance Upload following screen will appear Then user can upload Configu...

Page 76: ...fter clicking Maintenance Activate following screen will appear Then user can activate Configuration File 9 4 4 Delete Configuration File After clicking Maintenance Delete following screen will appear...

Page 77: ...77 P a g e 10 Appendix 1 Term List...

Page 78: ...password system 3 Would be both working if configure by web or CLI A Yes both ways are working 4 Why can t increase bandwidth after configuring Trunking A Please check if the information of Trunking s...

Page 79: ...your product does not work properly because of a defect in materials of workmanship our company referred to as the warrantor will for the length of the period indicated as below Parts and Labor 18 Mon...

Page 80: ...on faulty installation set up adjustments mis adjustment of consumer controls improper maintenance power line surge lightning damage modification or service by anyone other than a Factory Service cent...

Page 81: ...81 P a g e WWW JTECHDIGITAL COM PUBLISHED BY J TECH DIGITAL INC 9807 EMILY LANE STAFFORD TX 77477 TEL 1 888 610 2818 E MAIL SUPPORT JTECHDIGITAL COM...

Reviews: