background image

 

 

40 

 
 

 

 

Now we apply VLAN technology to configure the system shown as the figure 

above. We can partition the users into the different logical networks which have their  
own broadcast domain. The traffic will not disturb among these logical networks. 
The users 1x (x denotes a ~ d) are members of VLAN 1. Any traffic within VLAN 1 
does not flow to VLAN 2 and others. This helps us configure the network easily 
according to the criteria needed, for example, financial, accounting, R&D and 
whatever you think it necessary. You can also easily move a user to a different 
location or join a new user somewhere in the building to VLAN. Without VLAN, it is 
very hard to do. Basically, VLAN can afford offering at least 3 benefits: move and 
change users, reduce broadcast traffic and increase performance, Security. 

Besides, VLAN can highly reduce the traffic congestion and increase total 

performance because there are no more too many users in the same broadcast 
domain. 

Fig. 3-8 

Summary of Contents for KGS-2404

Page 1: ...KGS 2404 Web Smart 24 Port Gigabit Ethernet Switch U Us se er r s s M Ma an nu ua al l DOC 080711 ...

Page 2: ......

Page 3: ...Web Smart 24 Port Gigabit Ethernet Switch User s Manual Release 1 02 ...

Page 4: ...3 Basic Concept and Management 23 3 1 What s the Ethernet 23 3 2 Media Access Control MAC 26 3 3 Flow Control 32 3 4 How does a switch work 35 3 5 Virtual LAN 39 3 6 Link Aggregation 45 4 Operation of Web based Management 47 4 1 Web Management Home Overview 48 4 2 Configuration 50 4 2 1 System Configuration 51 4 2 2 Ports Configuration 54 4 2 3 VLAN Mode Configuration 55 4 2 4 VLAN Group Configura...

Page 5: ...5 4 4 2 Factory Default 96 4 4 3 Software Upgrade 97 4 4 4 Configuration File Transfer 98 4 4 5 Logout 99 5 Maintenace 100 5 1 Resolving No Link Condition 100 5 2 Q A 100 Appendix A Technical Specifications 101 Appendix B MIB Specifications 105 ...

Page 6: ...ces Federal Communications Commission FCC Statement This equipment has been tested and found to comply with the limits for a class A computing device pursuant to Subpart J of part 15 of FCC Rules which are designed to provide reasonable protection against such interference when operated in a commercial environment European Community CE Electromagnetic Compatibility Directive This equipment has bee...

Page 7: ...overs management options and detailed explanation about hardware and software functions Overview of this user s manual Chapter 1 Introduction describes the features of 24 Gigabit Web Smart Switch Chapter 2 Installation Chapter 3 Operating Concept and Management Chapter 4 Operation of Web based Management Chapter 5 Maintenance ...

Page 8: ...eiver 1000Mbps LC 10km SFP Fiber transceiver 1000Mbps LC 30km SFP Fiber transceiver 1000Mbps LC 50km SFP Fiber transceiver 1000Mbps BiDi 20km 1550nm SFP Fiber WDM transceiver 1000Mbps BiDi 20km 1310nm SFP Fiber WDM transceiver 10 100 1000Mbps TP is a standard Ethernet port that meets all IEEE 802 3 u x z Gigabit Fast Ethernet specifications 1000Mbps SFP Fiber transceiver is a Gigabit Ethernet port...

Page 9: ...00 1000Mbps Auto negotiation Gigabit Ethernet TP ports 4 10 100 1000Mbps TP or 1000Mbps SFP Fiber dual media auto sense 400KB on chip frame buffer Jumbo frame support Programmable classifier for QoS Layer 2 Layer 3 8K MAC address and support VLAN ID 1 4094 Per port shaping policing and Broadcast Storm Control IEEE802 1Q in Q nested VLAN support Full duplex flow control IEEE802 3x and half duplex b...

Page 10: ...vent while monitored events happened Supports default configuration which can be restored to overwrite the current configuration which is working on via Web UI and Reset button of the switch Supports on line plug unplug SFP modules Supports Quality of Service QoS for real time applications based on the information taken from Layer 2 to Layer 3 Built in web based management instead of using CLI int...

Page 11: ...display area locating on the left side of the panel contains a Power LED which indicates the power status and 24 ports working status of the switch Fig 1 1 Full View of 24 PORT GBE WEB SMART SWITCH Fig 1 2 Front View of 24 PORT GBE WEB SMART Power Indication LED Gigabit Ethernet Port TP Port Status Indication LEDs RESET Button RESET button is used to restore the system default setting SFP Fiber Po...

Page 12: ...0Mbps Green Amber Lit Green when TP link on 1000Mbps speed Lit Amber when TP link on 100Mbps speed Off when 10Mbps or no link occur Blinks when any traffic is present 1000SX LX Gigabit Fiber Port 21 22 23 24 LED SFP LINK ACT Green Lit when SFP connection with remote device is good Blinks when any traffic is present Table1 1 1 4 2 User Interfaces on the Rear Panel Fig 1 3 Rear View of 24 PORT GBE W...

Page 13: ... 1000Mbps LC MM SFP Fiber transceiver 1000Mbps LC SM 10km SFP Fiber transceiver 1000Mbps LC SM 30km SFP Fiber transceiver 1000Mbps LC SM 50km SFP Fiber transceiver 1000Mbps LC SM 70km SFP Fiber transceiver 1000Mbps LC SM 110km SFP Fiber transceiver 1000Mbps BiDi type 1 SM 20km SFP Fiber WDM transceiver 1000Mbps BiDi type 2 SM 20km SFP Fiber WDM transceiver 1000Mbps LC SM 10km SFP Fiber transceiver...

Page 14: ...rce Installing Optional SFP Fiber Transceivers to the 24 Port GbE Web Smart Switch Note If you have no modules please skip this section Connecting the SFP Module to the Chassis The optional SFP modules are hot swappable so you can plug or unplug it before or after powering on 1 Verify that the SFP module is the right model and conforms to the chassis 2 Slide the module along the slot Also be sure ...

Page 15: ...he switch in operation Power On The switch supports 100 240 VAC 50 60 Hz power supply The power supply will automatically convert the local AC power source to DC power It does not matter whether any connection plugged into the switch or not when power on even modules as well After the power is on all LED indicators will light up and then all off except the power LED still keeps on This represents ...

Page 16: ...of connector type there mainly are LC and BIDI Gigabit Fiber with multi mode LC SFP module Gigabit Fiber with single mode LC SFP module Gigabit Fiber with BiDi 1310nm SFP module Gigabit Fiber with BiDi 1550nm SFP module The following table lists the types of fiber that we support and those else not listed here are available upon request Multi mode Fiber Cable and Modal Bandwidth Multi mode 62 5 12...

Page 17: ... 10 10 m TP to fiber Converter 56 Bit Time unit 1ns 1sec 1000 Mega bit Bit Time unit 0 01μs 1sec 100 Mega bit Table 2 2 Sum up all elements bit time delay and the overall bit time delay of wires devices must be within Round Trip Delay bit times in a half duplex network segment collision domain For full duplex operation this will not be applied You may use the TP Fiber module to extend the TP node ...

Page 18: ...pports both port based VLAN and tag based VLAN They are different in practical deployment especially in physical location The following diagram shows how it works and what the difference they are Case2a Port based VLAN See Fig 2 3 1 The same VLAN members could not be in different switches 2 Every VLAN members could not access VLAN members each other 3 The switch manager has to assign different nam...

Page 19: ...3 members but they could access VLAN4 members 3 VLAN3 members could not access VLAN1 VLAN2 and VLAN4 4 VLAN4 members could not access VLAN1 and VLAN3 members but they could access VLAN2 members Case3a The same VLAN members can be at different switches with the same VID See Fig 2 5 Fig 2 4 Port based VLAN Diagram Fig 2 5 Attribute based VLAN Diagram ...

Page 20: ...ay of web user is allowed to startup the switch management function Users can use any one of them to monitor and configure the switch You can touch them through the following procedures Section 2 1 3 1 Configuring Management Agent of 24 Port GbE Web Smart Switch through Ethernet Port ...

Page 21: ... a physical path between the configured the switch and a PC by a qualified UTP Cat 5 cable with RJ 45 connector Note If PC directly connects to the switch you have to setup the same subnet mask between them But subnet mask may be different for the PC in the remote site Please refer to Fig 2 6 about the 24 Port GbE Web Smart Switch default IP address information 2 Run web browser and follow the men...

Page 22: ...predefined address classes or categories Each class has its own network range between the network identifier and host identifier in the 32 bits address Each IP address comprises two parts network identifier address and host identifier address The former indicates the network where the addressed host resides and the latter indicates the individual host in the network which the address of host refer...

Page 23: ...oute and 127 0 0 0 8 is reserved for loopback function 0 Class B IP address range between 128 0 0 0 and 191 255 255 255 Each class B network has a 16 bit network prefix followed 16 bit host address There are 16 384 2 14 16 networks able to be defined with a maximum of 65534 2 16 2 hosts per network 10 Class C IP address range between 192 0 0 0 and 223 255 255 255 Each class C network has a 24 bit ...

Page 24: ...t may have a subnet mask 255 255 0 0 in default in which the first two bytes is with all 1s This means more than 60 thousands of nodes in flat IP address will be at the same network It s too large to manage practically Now if we divide it into smaller network by extending network prefix from 16 bits to say 24 bits that s using its third byte to subnet this class B network Now it has a subnet mask ...

Page 25: ...12 510 22 1024 1022 21 2048 2046 20 4096 4094 19 8192 8190 18 16384 16382 17 32768 32766 16 65536 65534 Table 2 3 According to the scheme above a subnet mask 255 255 255 0 will partition a network with the class C It means there will have a maximum of 254 effective nodes existed in this sub netted network and is considered a physical network in an autonomous network So it owns a network IP address...

Page 26: ...nown as default router Basically it is a routing policy For assigning an IP address to the switch you just have to check what the IP address of the network will be connected with the switch Use the same network address and append your host address to it Fig 2 9 First IP Address as shown in the Fig 2 9 enter 192 168 1 1 for instance For sure an IP address such as 192 168 1 x must be set on your PC ...

Page 27: ...refer to Appendix A The switch is suitable for the following applications Central Site Remote site application is used in carrier or ISP See Fig 2 10 Peer to peer application is used in two remote offices See Fig 2 11 Office network See Fig 2 12 Fig 2 10 illustrates how the switches and the various devices form the network infrastructure in a large scale network Fig 2 10 Network Connection between...

Page 28: ...22 Fig 2 12 Office Network Connection Fig 2 11 Peer to peer Network Connection ...

Page 29: ...net was rolled out and provided 1000Mbps Now 10G s Ethernet is under approving Although these Ethernet have different speed they still use the same basic functions So they are compatible in software and can connect each other almost without limitation The transmission media may be the only problem Fig 3 1 IEEE 802 3 reference model vs OSI reference mode In Fig 3 1 we can see that Ethernet locates ...

Page 30: ...idge relay entity Logical link control supports the interface between the Ethernet MAC and upper layers in the protocol stack usually Network layer which is nothing to do with the nature of the LAN So it can operate over other different LAN technology such as Token Ring FDDI and so on Likewise for the interface to the MAC layer LLC defines the services with the interface independent of the medium ...

Page 31: ...esponse The DSAP and SSAP pair with some reserved values indicates some well known services listed in the table below 0xAAAA SNAP 0xE0E0 Novell IPX 0xF0F0 NetBios 0xFEFE IOS network layer PDU 0xFFFF Novell IPX 802 3 RAW packet 0x4242 STP BPDU 0x0606 IP 0x9898 ARP Table 3 2 LLC type 1 connectionless service LLC type 2 connection oriented service and LLC type 3 acknowledge connectionless service are...

Page 32: ... and locally unique address Since this type of address is applied only to the Ethernet LAN media access control MAC they are referred to as MAC addresses The first three bytes are Organizational Unique Identifier OUI code assigned by IEEE The last three bytes are the serial number assigned by the vendor of the network device All these six bytes are stored in a non volatile memory in the device The...

Page 33: ...a broadcast which means all network device except the sender itself can receive the frame and response Ethernet Frame Format There are two major forms of Ethernet frame type encapsulation and length encapsulation both of which are categorized as four frame formats 802 3 802 2 SNAP 802 3 802 2 Ethernet II and Netware 802 3 RAW We will introduce the basic Ethernet frame format defined by the IEEE 80...

Page 34: ...tion and Netware 802 3 RAW encapsulation Each of them has different fields following the Length field If the Length Type value is greater than 1500 it means the Length Type acts as Type Different type value means the frames with different protocols running over Ethernet being sent or received For example 0x0800 IP datagram 0x0806 ARP 0x0835 RARP 0x8137 IPX datagram 0x86DD IPv6 Data Less than or eq...

Page 35: ...summarize what a MAC does before transmitting a frame 1 MAC will assemble the frame First the preamble and Start of Frame delimiter will be put in the fields of PRE and SFD followed DA SA tag ID if tagged VLAN is applied Ethertype or the value of the data length and payload data field and finally put the FCS data in order into the responded fields 2 Listen if there is any traffic running over the ...

Page 36: ...wo most distant devices This maximum time is traded off by the collision recovery time and the diameter of the LAN In the original 802 3 specification Ethernet operates in half duplex only Under this condition when in 10Mbps LAN it s 2500 meters in 100Mbps LAN it s approximately 200 meters and in 1000Mbps 200 meters According to the theory it should be 20 meters But it s not practical so the LAN d...

Page 37: ...both transmitting and receiving frames are processed simultaneously This doubles the total bandwidth Full duplex is much easier than half duplex because it does not involve media contention collision retransmission schedule padding bits for short frame The rest functions follow the specification of IEEE802 3 For example it must meet the requirement of minimum inter frame gap between successive fra...

Page 38: ...gnal on the medium at that time the device will wait for a period of time known as an inter frame gap time to have the medium clear and stabilized as well as to have the jobs ready such as adjusting buffer counter updating counter and so on in the receiver site Once the inter frame gap time expires after the de assertion of carrier sense the MAC transmits data In IEEE802 3 specification this is 96...

Page 39: ...ere or an interface malfunctioned in the LAN When detecting the case the MAC drops the packet and goes back to the ready state 2 If the DA of the received frame exactly matches the physical address that the receiving MAC owns or the multicast address designated to recognize If not discards it and the MAC passes the frame to its client and goes back to the ready state 3 If the frame is too long If ...

Page 40: ...al value 0x8100 at the location of the Length Type field of the normal non VLAN frame it will interpret the received frame as a tagged VLAN frame If this happens in a switch the MAC will forward it according to its priority and egress rule to all the ports that is associated with that VID If it happens in a network interface card MAC will deprive of the tag header and process it in the same way as...

Page 41: ...te who can transmit data to the station s attached in the LAN When more than one station transmits data within the same slot time the signals will collide referred to as collision The arbitrator will arbitrate who should gain the media The arbitrator is a distributed mechanism in which all stations contend to gain the media Please refer to What s the Ethernet for more details In Fig 3 5 assumed in...

Page 42: ...rating in full duplex mode the distance can reach farther than half duplex because it is not limited by the maximum propagation delay time 512 bits time If fiber media is applied the distance can be up to tens of kilometers Traffic Aggregation Traffic aggregation is to aggregate the bandwidth of more than one port and treat it as a single port in the LAN This single port possesses the features of ...

Page 43: ...xist have the packet broadcasted Due to the size of the MAC address limited MAC address aging function is applied When the MAC address has resided and keeps no update in the table for a long time this means the traffic using that entry has yet come for a while If this time period is more than the aging time the entry will be marked invalid The vacancy is now available for other new MAC Both learni...

Page 44: ... may support different schedule algorithms Most common schedulers are FCFS First Come First Service Strictly Priority All High before Low Weighted Round Robin Set a weight figure to the packet with a priority level say 5 7 and next set another weight to the packet with a priority level say 2 4 and so on The WRR will transmit the packet with the weight So the packet of each priority level can be al...

Page 45: ...router is needed which always lies on the edge of the LAN For a layer 2 VLAN it assumes it is a logical subset of a physical LAN separated by specific rules such as tag port MAC address and so on In other words they can communicate with each other between separated small physical LANs within a LAN but can not be between any two separated logical LANs In the figure above all stations are within the...

Page 46: ...gure the network easily according to the criteria needed for example financial accounting R D and whatever you think it necessary You can also easily move a user to a different location or join a new user somewhere in the building to VLAN Without VLAN it is very hard to do Basically VLAN can afford offering at least 3 benefits move and change users reduce broadcast traffic and increase performance...

Page 47: ... a tag field following the source MAC address is four bytes long and contains VLAN protocol ID and tag control information composed of user priority Canonical Format Indicator CFI and optional VLAN identifier VID Normally the maximal length of a tagged frame is 1522 bytes 802 1Q VLAN tagged Ethernet frame 6 6 2 2 2 DA SA VLAN Protocol ID Tag Control Information Length Type VLAN Protocol ID 0x8100 ...

Page 48: ...D assigned by a port is called PVID Each port can only be assigned a PVID The default value for PVID is 1 the same as VID Ingress filtering The process to check a received packet and compare its VID to the VLAN membership of the ingress port The ingress filtering can be set by per port When receiving a packet VLAN bridge examines if the VID in the frame s header presents If the VID of the received...

Page 49: ...ty accordingly If enabled an egress port will transmit out a tagged packet if the port is connected to a 802 1Q compliant device If an egress port is connected to a non 802 1Q device or an end station VLAN bridge must transmit out an untagged packet i e the tag has been stripped off in an egress port Egress rule can be set by per port Independent VLAN Learning IVL It specifies the mode how to lear...

Page 50: ...ed VLAN bridge will only check the MAC address table to see if the destination VLAN exists If VLAN does not exist then drop the packet and if both DA and VLAN do not exist forwards the packet If just knows VLAN existed then floods the packet to all the ports the VLAN covers If we plan to deploy four VLANs in an office and use a switch to partition them we should check which ports belong to which V...

Page 51: ... the solution caused by the limitation of hardware performance may not be scalable If the item 2 is the case now you do not have to pay much more extra cost and can keep flexible according to the demand of bandwidth because all equipments are there already And what s more you can avoid worrying about the interoperability issue Applying LACP in your network you will not only gain benefits below to ...

Page 52: ...tation and station to station Here station may be a host or a router Link Aggregation called port trunking sometimes has two types of link configuration including static port trunk and dynamic port trunk Static Port Trunk When physical links are changed administrator needs to manually configure the switches one by one Dynamic Port Trunk When physical links are changed LACP takes over and automatic...

Page 53: ...ss 192 168 1 1 Subnet Mask 255 255 255 0 Default Gateway 192 168 1 254 Password admin Table 4 1 When the configuration of your Web Smart Switch is finished you can browse it by the IP address you set up For instance type http 192 168 1 1 in the address row in a browser then the following screen see Fig 4 1 would show up and ask for your password input for login and access authentication The defaul...

Page 54: ...shows you the basic information of the switch including Switch Status TP Port Status Fiber Port Status Aggregation VLAN Mirror SNMP and Maximum Packet Length With this information you will know the software version MAC address ports available and so on It would be helpful while malfunction occurred For more details please refer to Section 4 4 1 Fig 4 2 ...

Page 55: ...s you insert Vice versa if ports are disconnected they will show just in black On the left side the main menu tree for web is listed in the page According to the function name in boldface all functions can be divided into three parts including Configuration Monitoring and Maintenance The functions of each folder are described in its corresponded section respectively As to the function names in nor...

Page 56: ...iguration VLAN Group Configuration Aggregation LACP RSTP 802 1X IGMP Snooping Mirror QoS Filter Rate Limit Storm Control and SNMP System Configuration Ports Configuration VLAN Mode Configuration VLAN Group Configuration Aggregation LACP RSTP 802 1X IGMP Snooping Mirror QoS Filter Rate Limit Storm Control SNMP Configuration ...

Page 57: ...rial number active IP address active subnet mask active gateway DHCP server and Lease time left Set device name DHCP enable fallback IP address fallback subnet mask fallback gateway management VLAN password and inactivity timeout Parameter description System Description The simple description of this switch Firmware Version The firmware version of this switch Hardware Version The hardware version ...

Page 58: ...IP settings and fill in new values Then click Apply button to update Default 192 168 1 1 Fallback Subnet Mask Subnet mask is made for the purpose to get more network address because any IP device in a network must own its IP address composed of Network address and Host address otherwise can t communicate with other devices each other But unfortunately the network classes A B and C are all too larg...

Page 59: ...re defined path it must be forwarded to a default router on a default path This means any packet with undefined IP address in the routing table will be sent to this device unconditionally Default 192 168 1 254 Management VLAN Show the management VLAN number Password Set a password for this switch Up to 16 characters are allowed in this parameter Any alphanumeric character is acceptable Default adm...

Page 60: ...isable If the media is TP the Speed Duplex is comprised of the combination of speed mode 10 100 1000Mbps and duplex mode full duplex and half duplex The following table summarized the function the media supports Media type NWay Speed Duplex 1000M TP ON OFF 10 100 1000M Full for all Half for 10 100 1000M Fiber ON OFF 1000M Full In Auto Speed mode no default value In Forced mode default value depend...

Page 61: ...Disable you can choose one of them by pulling down list and pressing the Downward arrow key Then click Apply button the settings will take affect immediately Parameter description VLAN Mode Port based Port based VLAN is defined by port Any packet coming in or outgoing from any one port of a port based VLAN will be accepted No filtering criterion applies in port based VLAN The only criterion is the...

Page 62: ...ilt up must be assigned VLAN name and VLAN ID Valid VLAN ID is 1 4094 User can create total up to 24 Tag VLAN groups Double tag Double tag mode belongs to the tag based mode however it would treat all frames as the untagged ones which means that tag with PVID will be added into all packets Then these packets will be forwarded as Tag based VLAN So the incoming packets with tag will become the doubl...

Page 63: ... of VLAN mode the switch will bring you the responded VLAN configuration which keeps the default data You can easily create and delete a VLAN group by pressing Add and Delete function buttons or click the Group ID directly to edit it Parameter description ID Group ID When you want to edit a VLAN group you must select the Group ID field Then you will enter Tag Base VLAN Group Setting or Port Base V...

Page 64: ...g based VLAN which depends on the VLAN mode you choose in VLAN mode function Fig 4 8 Add or Remove VLAN Member Delete Group Just tick the check box beside the ID then press the Delete button to delete the group Fig 4 9 Port Based VLAN Configuration ...

Page 65: ...59 ...

Page 66: ...t ports are aggregated into a logical port then this logical port s bandwidth would be as three times high as a single Fast Ethernet port s Function name Aggregation Configuration Function description Display the current setup of Aggregation Trunking With this function user is allowed to add a new trunking group or modify the members of an existed trunking group Parameter description Normal Set up...

Page 67: ... also allows port redundancy that is if an operational port fails then one of the standby ports become operational without user intervention Function name LACP Port Configuration Function description Enable or disable LACP protocol user is allowed to set the aggregation key value Parameter description Protocol Enabled Just tick the check box to enable LACP protocol then press the Apply button to a...

Page 68: ...ith the highest priority lowest numeric value becomes the STP root switch If all switches have the same priority the switch with the lowest MAC address will then become the root switch Select a vale from the drop down list box The lower the numeric value you assign the higher the priority for this system Default 32768 Hello Time This is the time interval in seconds between BPDU configuration messa...

Page 69: ...the port x to enable RSTP protocol then press the Apply button to apply Edge Just tick the check box beside the port x to enable edge function Path Cost Path cost is the cost of transmitting a frame on to a LAN through that port It is assigned according to the speed of the bridge The slower the media the higher the cost user can select auto or set the rage from 1 to 200000000 continue Fig 4 12 RST...

Page 70: ...message when the Authenticator PAE request to it Authenticator An entity facilitates the authentication of the supplicant entity It controls the state of the port authorized or unauthorized according to the result of authentication message exchanged between it and a supplicant PAE The authenticator may request the supplicant to re authenticate itself at a configured time period Once start re authe...

Page 71: ...ch at the central location acts Authenticator connecting to PC A and A is a PC outside the controlled port running Supplicant PAE In this case PC A wants to access the services on device B and C first it must exchange the authentication message with the authenticator on the port it connected via EAPOL packet The authenticator transfers the supplicant s credentials to Authentication server for veri...

Page 72: ...nt for asking for inputting user password via the authenticator PAE 7 The supplicant will convert user password into the credential information perhaps in MD5 format and replies an EAP Response with this credential information as well as the specified authentication algorithm MD5 or OTP to Authentication server via the authenticator PAE As per the value of the type field in message PDU the authent...

Page 73: ...ex for it just support basic Enabled mode which can distinguish the device s MAC address and its VID The following table is the summary of the combination of the authentication status and the port status versus the status of port mode set in 802 1x Port mode port control state set in 802 1x port setting Here Entry Authorized means MAC entry is authorized Port Mode Port Control Authentication Port ...

Page 74: ...d for putting a blank between any two characters Default None Admin State This is used to set the operation mode of authorization There are three type of operation mode supported Force Unauthorized Force Authorized Auto y Force Unauthorized The controlled port is forced to hold in the unauthorized state y Force Authorized The controlled port is forced to hold in the authorized state y Auto The con...

Page 75: ...l ports in at once continue Fig 4 16 802 1X Configuration Statistics Choose the port which you want to show of 802 1X statistics the screen include Authenticator counters backend Authenticator counters dot1x MIB counters and Other statistics Press the Refresh button will fresh the screen and see the newer counters ...

Page 76: ...d to the port Parameter description Reauthentication Enabled Choose whether regular authentication will take place in this port Default disable Reauthentication Period 1 65535 s A non zero number seconds between the periodic re authentication of the supplicant Default 3600 EAP timeout 1 255 s A timeout condition in the exchange between the authenticator and the supplicant The valid range 1 255 Def...

Page 77: ...able Router Ports Just tick the check box beside the port x to enable router ports then press the Apply button to start up Default none Unregistered IGMP Flooding enabled Just tick the check box to enable this function Default enable VLAN ID At the IGMP Enable mode being selected it will list the VLAN ID number IGMP Snooping Enabled After IGMP Enabled function start up then user can tick the check...

Page 78: ... we assume that Port A and Port B are Source Ports and Port C is Mirror Port respectively thus the traffic passing through Port A and Port B will be copied to Port C for monitor purpose Parameter description Source Port Set up the port for being monitored Just tick the check box beside the port x and valid port is Port 1 24 Mirror Port Use the drop down menu to select a mirror port Fig 4 20 Mirror...

Page 79: ...figuration The switch offers powerful QoS function This function supports VLAN tagged priority that can make precedence of 8 priorities and DSCP Differentiated Services Code Point on Layer 3 of network framework Fig 4 21 QoS Configuration ...

Page 80: ...high priority for QoS default value Function name 802 1p Setting Function description This function will affect the priority of VLAN tag Based on priority of VLAN tag it can arrange 0 7 priorities priorities can map to 4 queues of the switch low normal medium high and possess different bandwidth distribution according to your weight setting Parameter description 802 1p Priority Mapping Each Priori...

Page 81: ...viated DSCP and the last two bits are left unused DSCP can form total 64 0 63 kinds of Traffic Class based on the arrangement of 6 bit field in DSCP of the IP packet In the switch user is allowed to set up these 64 kinds of Class that belong to any of queue low normal medium high Parameter description DSCP Priority Mapping 64 kinds of priority traffic as mentioned above user can set up any of Queu...

Page 82: ...ts containing the configured source network address are not filtered and can be forwarded by the switch Note In this mode the received packets are filtered except the IP packets with configured source network address For examples 1 IP Address 192 168 3 2 IP Mask 255 255 255 0 Network address 192 168 3 x 254 IP Addresses can be forwarded on the port 2 IP Address 192 168 3 2 IP Mask 255 255 255 255 ...

Page 83: ...77 DHCP Server Allowed Just tick the check box under the port x to allow the DHCP Server on this port and valid port is Port 1 16 Default enable Fig 4 24 Filter Configuration ...

Page 84: ...te field Pause frames are also generated if flow control is enabled The format of the packet limits to unicast broadcast and multicast Valid value of Port 1 24 ranges from 128 3968 kbps Default No Limit Egress Set up the limit of Egress bandwidth for the port you choose Outgoing traffic will be discarded if the rate exceeds the value you set up in Data Rate field Pause frames are also generated if...

Page 85: ...ation Parameter description ICMP Rate To enable the ICMP Storm capability User can use drop down menu to select number of frames Default is No Limit The setting range is 1k 1024k per second Learn Frames Rate To enable the Learn Frames Storm capability User can use drop down menu to select number of frames Default is No Limit The setting range is 1k 1024k per second Broadcast Rate To enable the Bro...

Page 86: ...Limit The setting range is 1k 1024k per second Flooded unicast Rate To enable the Flooded unicast Storm capability User can use drop down menu to select number of frames Default is No Limit The setting range is 1k 1024k per second NOTE After completing the function s setting press Apply button to have this function taken effect ...

Page 87: ...c traps as well as the throttle of SNMP A SNMP manager must pass the authentication by identifying both community names then it can access the MIB information of the target device So both parties must have the same community name Once completing the setting click Apply button the setting takes effect Parameters description SNMP enable The term SNMP enable here is used for the activation or de acti...

Page 88: ...82 Default community name for Get public Default community name for Set private Default community name for Trap public Fig 4 27 SNMP Configuration ...

Page 89: ...time If the counting is overflow the counter will be reset and restart counting Function name Statistics Overview Function description Display the summary counting of each port s traffic including Tx Bytes Tx Frames Rx Bytes Rx Frames Tx Errors and Rx Errors Parameters description Tx Bytes Total transmitted bytes Tx Frames The counting number of the packet transmitted Rx Bytes Total received bytes...

Page 90: ...84 Tx Errors Number of bad packets transmitted Rx Errors Number of bad packets received Fig 4 28 Statistics Overview for all ports ...

Page 91: ...ssified as low priority Rx Broadcast Show the counting number of the received broadcast packet Rx Multicast Show the counting number of the received multicast packet Rx Broad and Multicast Show the counting number of the received broadcast with multicast packet Rx Error Packets Show the counting number of the received error packets Tx Packets The counting number of the packet transmitted TX Octets...

Page 92: ... 1023 byte frames in good and bad packets received Rx 1024 Bytes Number of 1024 max_length byte frames in good and bad packets received Tx 64 Bytes Number of 64 byte frames in good and bad packets transmitted Tx 65 127 Bytes Number of 65 126 byte frames in good and bad packets transmitted Tx 128 255 Bytes Number of 127 255 byte frames in good and bad packets transmitted Tx 256 511 Bytes Number of ...

Page 93: ...g tomax_length register with invalid CRC Rx Drops Frames dropped due to the lack of receiving buffer Tx Collisions Number of collisions transmitting frames experienced Tx Drops Number of frames dropped due to excessive collision late collision or frame aging Tx Overflow Number of frames dropped due to the lack of transmitting buffer Fig 4 29 Detailed Statistics for each port ...

Page 94: ...ow can show LACP information and status for all ports in the same time Parameter description LACP Aggregation Overview Show the group port status Default will set to red sign for port link down user can check legend table below for all reference LACP Port Status Group Port Show the port number Normal as Legend Fig 4 30 LACP Status ...

Page 95: ... of this switch Hello Time Show the current hello time of the root bridge Hello time is a time interval specified by root bridge used to request all other bridges periodically sending hello message every hello time seconds to the bridge attached to its designated port Max Age Show the root bridge s current max age time Fwd Delay Show the root bridge s forward delay time Topology Show the root brid...

Page 96: ...90 Fig 4 31 RSTP Status ...

Page 97: ... which it belongs It Calculate the number of times of IGMPV1 report V2 Reports When a host receives a group membership query it identifies the groups associated with the query and determines to which groups it belongs The host then sets a timer with a value less than the Max Response Time field in the query for each group to which it belongs It Calculate the number of times of IGMPV2 report V3 Rep...

Page 98: ...eters Target IP address Set up a Target IP address to ping Count Use drop down menu to set number of echo requests to send Four type of number can choose there are 1 5 10 and 20 Default 1 Time Out in secs Use drop down menu to set number of echo requests time out in second Four type numbers can choose there are 1 5 10 and 20 Default 1 NOTE All the functions should press Apply button to start up af...

Page 99: ...IP address Status Show the result of the ping status Received replies Show the received replies number of times Request timeouts Show the timeout of request Average Response times In ms Show the average response time in milliseconds Fig 4 33 Ping ...

Page 100: ...94 4 4 Maintenance There are five functions contained in the maintenance function Warm Restart Factory Default Maintenance Software Upgrade Configuration File Transfer Logout ...

Page 101: ...ettings After upgrading software you have to reboot the device to have new configuration take effect The function being discussed here is software reset Function name Warm Restart Function description Reboot the switch Reboot takes the same effect as the RESET button on the front panel of the switch Press Yes button to confirm warm restart function and it will take around thirty 30 seconds to comp...

Page 102: ...e IP address setting all settings will be restored to the factory default values when Factory Default function is performed If you want to restore all configurations including the IP address setting to the factory default please press the RESET button on the front panel Note for RESET button You must press the RESET button over 3 seconds to restore the factory default setting Fig 4 35 ...

Page 103: ...7 4 4 3 Software Upgrade Function name Software Upgrade Function description You can just click Browse button to retrieve the file you want in your system to upgrade your switch Fig 4 36 Software Upgrade ...

Page 104: ...er Function description You can backup your switch s configuration file into your computer folder in case accident happens In addition uploading backup configuration file into a new or a crashed switch can save much time and avoid mistakes Fig 4 37 Configuration Upload Download ...

Page 105: ...t logout and exit the browser the switch will automatically have you logout Besides this manually logout and implicit logout you can set up the parameter of Auto Logout Timer in system configuration function to explicitly ON OFF this logout function Parameter description Auto Manual Logout If no action and no key is stroke as well in any function screen more than the minutes you set up in Auto Log...

Page 106: ...er C 2 The uplink connection function fails to work 9 The connection ports on another must be connection ports Please check if connection ports are used on that 24 Port GbE Web Smart Switch 9 Please check the uplink setup of the 24 Port GbE Web Smart Switch to verify the uplink function is enabled 3 The console interface cannot appear on the console port connection 9 24 Port GbE Web Smart Switch h...

Page 107: ...mode force mode or auto polling mode Supports Head of Line HOL blocking prevention Supports broadcast storm filtering Web based management provides the ability to completely manage the switch from any web browser Supports Port based VLAN and Tag based IEEE802 1Q VLAN Auto aging with programmable inter age time Supports 802 1p Class of Service with 2 level priority queuing Supports port trunking wi...

Page 108: ...ansmission Mode 10 100Mbps support full or half duplex 1000Mbps support full duplex only Transmission Speed 10 100 1000Mbps for TP 1000Mbps for Fiber Full Forwarding Filtering Packet Rate PPS packets per second Forwarding Rate Speed 1 488 000PPS 1000Mbps 148 800PPS 100Mbps 14 880PPS 10Mbps MAC Address and Self learning 8K MAC address Buffer Memory Embedded 400 KB frame buffer Flow Control IEEE802 ...

Page 109: ...4 LINK ACT 10 100 1000Mbps 1000M SFP Fiber Port 21 22 23 24 SFP LINK ACT Power Requirement AC Line Voltage 100 240 V Frequency 50 60 Hz Consumption 30W Ambient Temperature 0 to 50 C Humidity 5 to 90 Dimensions 44 H 442 W 209 D mm Comply with FCC Part 15 Class A CE Mark Approval ...

Page 110: ...group set Trunk Connection VLAN Function Port Base 802 1Q Tagged allowed up to 24 active VLANs in one switch Trunk Function Ports trunk connections allowed Bandwidth Control Supports by port Egress Ingress rate control Quality of Service QoS Referred as Class of Service CoS by the IEEE 802 1P standard Two queues per port Network Management Web browser support based on HTTP Server Note Any specific...

Page 111: ...SW24LProduces OBJECT IDENTIFIER GESM SW24LProductId 1 GESM SW24LIllegalLogin TRAP TYPE ENTERPRISE GESM SW24LProductId DESCRIPTION Send this trap when the illegal user try to login the Web management UI 1 GESM SW24LRxErrorThreshold TRAP TYPE ENTERPRISE GESM SW24LProductId VARIABLES ifIndex DESCRIPTION Send this trap when the number of the Rx bad packet over the Rx Error Threshold The OID value mean...

Page 112: ......

Page 113: ......

Reviews: