background image

Model No.

WIRED

with WebView

8-Port 10/100/1000 Gigabit Switch

SRW2008/SRW2008P/SRW2008MP

User Guide

Summary of Contents for SRW2008

Page 1: ...Model No WIRED with WebView 8 Port 10 100 1000 Gigabit Switch SRW2008 SRW2008P SRW2008MP User Guide ...

Page 2: ... for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section This exclamation point means there is a caution or warning and is something that could damage your property or the Switch word definition This checkmark means ...

Page 3: ...figuring the HyperTerminal Application 13 Connecting to the Switch through a Telnet Session 14 Configuring the Switch through the Console Interface 15 Chapter 5 Using the Web based Utility for Configuration 27 Overview 27 Accessing the Web based Utility 27 Setup Tab Summary 28 Setup Tab Network Settings 29 Setup Tab Time 30 Port Management Tab Port Settings 31 Port Management Tab Link Aggregation ...

Page 4: ...Security 55 Security Tab Multiple Hosts 57 Security Tab Storm Control 57 QoS 58 QoS Tab CoS Settings 59 QoS Tab Queue Settings 59 QoS Tab DSCP Settings 60 QoS Tab Bandwidth 60 QoS Tab Basic Mode 61 QoS Tab Advanced Mode 61 Spanning Tree 64 Spanning Tree Tab STP Status 64 Spanning Tree Tab Global STP 65 Spanning Tree Tab STP Port Settings 66 Spanning Tree Tab RSTP Port Settings 67 Spanning Tree Tab...

Page 5: ...Tab Save Configuration 86 Admin Tab Firmware Upgrade 87 Admin Tab Reboot 87 Admin Tab Factory Defaults 88 Admin Tab Server Logs 88 Admin Tab Memory Logs 89 Admin Tab Flash Logs 89 Appendix A About Gigabit Ethernet and Fiber Optic Cabling 90 Gigabit Ethernet 90 Fiber Optic Cabling 90 Appendix B Windows Help 91 Appendix C Downloading using Xmodem 92 Startup Menu Procedures 92 Appendix D Glossary 94 ...

Page 6: ... Finding HyperTerminal 13 Figure 4 2 Connection Description 13 Figure 4 3 Connect To 13 Figure 4 4 COM1 Properties 14 Figure 4 5 Telnet Login screen 14 Figure 4 6 Switch Main Menu 15 Figure 4 7 System Configuration Menu 16 Figure 4 8 System Information Menu 17 Figure 4 9 Versions 17 Figure 4 10 General System Information 17 Figure 4 11 Management Settings Menu 18 Figure 4 12 Serial Port Configurat...

Page 7: ...4 33 Port Status 26 Figure 4 34 Port Configuration 26 Figure 5 1 Login Screen 27 Figure 5 2 Setup Summary 28 Figure 5 3 Setup Network Settings 29 Figure 5 4 Setup Time 30 Figure 5 5 Port Management Port Settings 31 Figure 5 6 Port Settings Port Configuration Detail 32 Figure 5 7 Port Management Link Aggregration 34 Figure 5 8 Link Aggregation Link Aggregation Detail 34 Figure 5 9 Port Management L...

Page 8: ...1 Figure 5 28 Security ACL Binding 52 Figure 5 29 Security RADIUS 52 Figure 5 30 Security TACACS 53 Figure 5 31 Security 802 1x Settings 54 Figure 5 32 802 1x Settings Setting Timer 55 Figure 5 33 Security Port Security 55 Figure 5 34 Security Multiple Hosts 57 Figure 5 35 Security Storm Control 57 Figure 5 36 QoS CoS Settings 59 Figure 5 37 QoS Queue Settings 59 Figure 5 38 QoS DSCP Settings 60 F...

Page 9: ... Parameters 74 Figure 5 57 SNMP Views 75 Figure 5 58 SNMP Group Profile 76 Figure 5 59 SNMP Group Membership 77 Figure 5 60 SNMP Communities 78 Figure 5 61 SNMP Notification Filter 79 Figure 5 62 Notification Recipient 80 Figure 5 63 Admin User Authentication 81 Figure 5 64 Jumbo Frames 82 Figure 5 65 Admin Static Address 82 Figure 5 66 Admin Dynamic Address 83 Figure 5 67 Admin Logging 84 Figure ...

Page 10: ...WebView Switches Figure C 1 Startup Menu 92 Figure C 1 Auto Boot Message 92 Figure C 2 Send File 93 Figure C 3 Download 93 ...

Page 11: ...ty queues together with the Weighted Round Robin and Strict Priority scheduling techniques facilitate efficient coexistence of real time traffic with data traffic allowing them each to meet their QoS needs Individual users or applications can be prioritized above others using various Class of Service options by port layer 2 priority 802 1p and Layer 3 priority TOS or DSCP Intelligent Broadcast and...

Page 12: ...lly detects Power over Ethernet on access point before providing power Power feeding of Ethernet limited for fixed 10 100 1000 Base T TX ports The SRW2008MP can provide maximum output power per PoE port up to 15 4W on 8 ports simultaneously while the SRW2008P can provide maximum output power on 4 ports simultaneously or 8 ports at half power ...

Page 13: ...sed Utility Appendix A About Gigabit Ethernet and Fiber Optic Cabling This appendix gives a general description of Gigabit Ethernet and fiber optic cabling Appendix B Windows Help This appendix describes how you can use Windows Help for instructions about networking such as installing the TCP IP protocol Appendix C Downloading using Xmodem This appendix describes how you can download software into...

Page 14: ...s LEDs and ports are located on the front panel LEDs System Green The SYSTEM LED lights up to indicate that the Switch is powered on Link Act Green The LINK ACT LED lights up to indicate a functional network link through the corresponding port 1 through 8 with an attached device It flashes to indicate that the Switch is actively sending or receiving data over that port Gigabit Orange The Gigabit L...

Page 15: ...Refer to Chapter 4 Using the Console Interface for Configuration for more information miniGBIC 1 2 The mini GBIC gigabit interface converter port is a connection point for a mini GBIC expansion module so the Switch can be uplinked via fiber to another switch The MiniGBIC port provides a link to a high speed network segment or individual workstation at speeds of up to 1000Mbps Use the Linksys MGBT1...

Page 16: ...Ports 1 8 The Switch is equipped with 8 auto sensing Ethernet network ports which use RJ 45 connectors The Fast Ethernet ports support network speeds of 10Mbps or 100Mbps They can operate in half and full duplex modes Auto sensing technology enables each port to automatically detect the speed of the device connected to it 10Mbps or 100Mbps and adjust its speed and duplex accordingly miniGBIC1 2 Th...

Page 17: ... port is where you can connect a serial cable to a PC s serial port for configuration using your PC s HyperTerminal program Refer to Chapter 4 Using the Console Interface for Configuration for more information The Back Panel The power port is located on the back panel of the Switch Power The Power port is where you will connect the power cord NOTE If you need to reset the Switch unplug the power c...

Page 18: ...are listed in the following table A hub refers to any type of 100Mbps hub including regular hubs and stackable hubs A 10Mbps hub connected to another 10Mbps hub can span up to 100 meters 328 feet Table 1 Maximum Cabling Distances From To Maximum Distance Switch Switch or Hub 100 meters 328 feet Hub Hub 5 meters 16 4 feet Switch or Hub Computer 100 meters 328 feet Cable DSL Modem Router 10 100 1000...

Page 19: ... provide a minimum clearance of two inches 50 mm Do not stack free standing Switches more than four units high Placement Options Before connecting cables to the Switch first you will physically install the Switch Either set the Switch on its four rubber feet for desktop placement or mount the Switch in a standard sized 19 inch wide 1U high rack for rack mount placement Desktop Placement 1 Attach t...

Page 20: ...tch with the supplied screws Then attach the other bracket to the other side 3 Make sure the brackets are properly attached to the Switch 4 Use the appropriate screws not included to securely attach the brackets to your rack 5 Proceed to the section Connecting the Switch IMPORTANT Make sure you use the screws supplied with the mounting brackets Using the wrong screws could damage the Switch and wo...

Page 21: ... sure the holes are 3 7 inches 94 mm apart You can print the template from this page 3 Insert a screw into each hole and leave 3 mm of its head exposed 4 Maneuver the Switch so the wall mount slots line up with the two screws 5 Place the wall mount slots over the screws and slide the Switch down until the screws fit snugly into the wall mount slots Congratulations The Wall Mount installation of th...

Page 22: ... port and tighten the captive retaining screws Connect the other end to your PC s serial port This PC must be running the VT100 terminal emulation software such as HyperTerminal 12 Connect the supplied power cord to the Switch s power port and plug the other end into an electrical outlet 13 Power on the network devices connected to the Switch Each active port s corresponding Link Act LED will ligh...

Page 23: ...hich is covered in the next chapter Configuring the HyperTerminal Application Before you use the console interface you will need to configure the HyperTerminal application on your PC 1 Click the Start button Select Programs and choose Accessories Select Communications Select HyperTerminal from the options listed in this menu 2 On the Connection Description screen enter a name for this connection I...

Page 24: ...hrough a Telnet Session Open a command line editor and enter telnet 192 168 1 254 Then press the Enter key The Login screen will now appear The first time you open the CLI interface select Edit and hit Enter Enter admin in the User Name field Leave the Password field blank Press the Esc button and you will return to the login screen Use the right arrow button to navigate to Execute and press the E...

Page 25: ...option To navigate through the menus and actions of the console interface use the up or down arrow keys to move up or down and use the left or right arrow keys to move left or right Use the Enter key to select a menu option and use the Esc key to return to the previous selection Menu options and any values entered or present will be highlighted The bottom of the screen lists the actions available ...

Page 26: ...ches System Configuration Menu On the System Configuration Menu screen you have these choices 1 System Information 2 Management Settings 3 User Password Settings 4 Security Settings 5 IP Configuration 6 File Management 7 Restore System Default Settings 8 Reboot System 0 Back to main menu Figure 4 7 System Configuration Menu ...

Page 27: ...firmware versions General System Information The General System Information screen displays the Switch s description System Up Time System MAC Address System Contact System Name and System Location Select Edit and press the Enter key to make changes When your changes are complete press the Esc key to return to the Action menu Select Save and press the Enter key to save your changes To exit select ...

Page 28: ...ges are complete press the Esc key to return to the Action menu Select Save and press the Enter key to save your changes To exit select Quit and press the Enter key Telnet Configuration On the Telnet Configuration screen the time out is displayed The value is entered in seconds If you do not want the Telnet session to timeout you may enter a value of 0 sec Select Edit and press the Enter key to ma...

Page 29: ...ing the SPACE bar to toggle the option The SSH Server Port can be modified by entering in the value Select Edit and press the Enter key to make changes When your changes are complete press the Esc key to return to the Action menu Select Save and press the Enter key to save your changes To exit select Quit and press the Enter key SSH Status The SSH Status screen displays whether the SSH Server is e...

Page 30: ... be modified Select Edit and press the Enter key to make changes When your changes are complete press the Esc key to return to the Action menu Select Save and press the Enter key to save your changes To exit select Quit and press the Enter key SSH Keys Fingerprints On the SSH Keys Fingerprints screen the RSA and DSA keys will be displayed if they have been generated Select Refresh to update the sc...

Page 31: ...h as well as generate and display the certificate SSL Certificate Generation Use the Certificate Generation screen to specify a device generated certificate The following fields are specified Public Key Length Specifies the SSL RSA key length Range 512 2048 Organization Name Specifies the organization name Range 1 64 Locality or City Name Specifies the location or city name Range 1 64 State or Pro...

Page 32: ... internal certificate Disable Active Management Profile Selecting this option will prompt you to confirm that you want to disable the Active Management Profile IP Configuration The IP Configuration screen displays these choices the Switch s IP Address Settings HTTP HTTPS Configuration and Network Configuration IP Address Configuration Figure 4 22 SSL Certificate Figure 4 23 IP Configuration ...

Page 33: ...lect DISABLE Select Edit to make changes When your changes are complete press the Esc key to return to the Action menu and select Save to save your changes HTTP The HTTP screen displays the status and port number of the HTTP Server Select Edit and press the Enter key to make changes When your changes are complete press the Esc key to return to the Action menu Select Save and press the Enter key to...

Page 34: ...lete press the Esc key to return to the Action menu Select Save and press the Enter key to save your changes To exit select Quit and press the Enter key TraceRoute The TraceRoute screen displays the IP address of the address whose route you want to trace Select Edit to change the IP address and select Execute to begin the traceroute test After the traceroute test is complete the TraceRoute screen ...

Page 35: ...h back to the factory default settings select Restore System Default Settings and press the Enter key You will be asked if you want to continue Press the y key to restore the Switch s default settings or press the n key to cancel Reboot System Select Reboot System and press the Enter key if you want to restart the Switch You will be asked if you want to continue Press the y key to reboot the Switc...

Page 36: ...n the Switch Main Menu screen select Port Configuration and press the Enter key if you want to configure the Switch s ports The Port Configuration screen displays the port numbers their status auto negotiation status speed and duplex mode and status of flow control which is the flow of packet transmissions Select Edit and press the Enter key to make changes When your changes are complete press the...

Page 37: ...ing Tree Multicast SNMP Admin and Logout Click one of the main tabs to view additional tabs The LEDs on the Setup Summary screen display status information about their corresponding ports A green LED indicates a connection while a grey LED indicates no connection An orange LED indicates the port has been closed down by the administrator When you click a port s LED the statistics for that port are ...

Page 38: ...r the Switch is configured with a Static or Dynamic IP address configurable from Setup Network Settings tab Base MAC Address This is the MAC address of the Switch System Information Serial Number The product s Serial Number is displayed here Model Name This is the model number and name of the Switch Hardware Version The version number of the Switch s hardware is displayed here Boot Version Indicat...

Page 39: ...ring a description of where the Switch is located such as 3rd floor System Contact Enter the administrative contact person in this field System Object ID The system object identifier is displayed here Base MAC Address This is the MAC address of the Switch IP Configuration Management VLAN This drop down allows you to select the Management VLAN IP Address Mode This drop down allows you to select Sta...

Page 40: ...s The hour can be entered here Minutes The minutes can be entered here Seconds The seconds can be entered here Month The month can be entered here Day The day can be entered here Year The year can be entered here Time Zone Enter the difference between Greenwich Mean Time GMT and local time Daylight Saving Daylight Saving Select Daylight Saving to enable it on the Switch If the Switch should use US...

Page 41: ...s the amount of time in seconds before the Switch polls the SNTP server The default value is every 1024 seconds approx 17 minutes Click the Save Settings button to save your changes or click Cancel Changes to discard the information Port Management Tab Port Settings The Port Management Port Settings screen shows you the settings for each of the Switch s ports Port The number of the port To use an ...

Page 42: ... Edge PVE port it bypasses the Forwarding Database and forwards all unicast multicast and broadcast traffic to an uplink Uplinks can be ports or LAGs Detail The Detail button will open the Port Configuration Detail screen Port Configuration Detail screen Port The number of the port Description Displays a brief description of the port can be entered by clicking on the Detail button Port Type This i...

Page 43: ...advertises its capabilities to its neighbor port to begin the negotiation process This field displays the current advertisement settings Neighbor Advertisement The neighbor port the port to which the selected interface is connected advertises its capabilities to the port to start the negotiation process This field displays the neighbor s current settings Back Pressure The Back Pressure feature of ...

Page 44: ...he flow control status of the LAG It is active when the port uses Full Duplex Mode LAG Mode Displays the LAG status On Off or Not Present Detail button The Detail button opens up the Link Aggregation Detail screen Link Aggregation Detail screen LAG Configuration LAG The number of the selected LAG Description A general description can be listed here for reference LACP Indicates if the LAG is in LAC...

Page 45: ... selected LAG Port Management Tab LACP Aggregate ports can be linked into link aggregation port groups Each group is comprised of ports with the same speed set to full duplex operation Aggregated Links can be manually setup or automatically established by enabling Link Aggregation Control Protocol LACP on the relevant links Aggregate ports can be linked into link aggregation port groups Each group...

Page 46: ...l parameters for configuring and working with VLANs Single VLAN VLAN ID 2 4094 Indicates the ID number of the VLAN being configured Up to 256 VLANs can be created This field is used to add VLANs one at a time To add the defined VLAN ID number press the Add button VLAN Name Displays the user defined VLAN name VLAN Range VLAN Range Indicates a range of VLANs being configured To add the defined range...

Page 47: ...on the port packet type cannot be designated It is also not possible to enable disable ingress filtering on an access port Trunk The port belongs to VLANs in which all ports are tagged except for an optional single native VLAN Acceptable Frame Type Packet type accepted on the port Possible values are Admit Tag Only Indicates that only tagged packets are accepted on the port Admit All Indicates tha...

Page 48: ...le untagged VLAN When a port is in Access mode the packet types which are accepted on the port cannot be designated Ingress filtering cannot be enabled disabled on an access port Trunk Indicates the port belongs to VLANs in which all ports are tagged except for one port that can be untagged General Indicates the port belongs to VLANs and each VLAN is user defined as tagged or untagged full 802 1Q ...

Page 49: ...tes the port belongs to a single untagged VLAN When a port is in Access mode the packet types which are accepted on the port cannot be designated Ingress filtering cannot be enabled disabled on an access port Trunk Indicates the port belongs to VLANs in which all ports are tagged except for one port that can be untagged Join VLAN Defines the VLANs to which the interface is joined VLANs Displays th...

Page 50: ...which GVRP is enabled The possible field values are Port Indicates the port number on which GVRP is enabled LAG Indicates the LAG number on which GVRP is enabled GVRP State When the checkbox is checked GVRP is enabled on the interface Dynamic VLAN Creation When the checkbox is checked Dynamic VLAN creation is enabled on the interface GVRP Registration When the checkbox is checked VLAN registration...

Page 51: ...dcast packets received on the interface since the device was last refreshed This number does not include Multicast packets Multicast Packets Received Displays the number of good Multicast packets received on the interface since the device was last refreshed CRC Align Errors Displays the number of CRC and Align errors that have occurred on the interface since the device was last refreshed Undersize...

Page 52: ... interface from which the history samples were taken The possible field values are Port Specifies the port from which the RMON information was taken LAG Specifies the port from which the RMON information was taken Sampling Interval Indicates in seconds the time that samplings are taken from the ports The field range is 1 3600 The default is 1800 seconds equal to 30 minutes Max No of Samples to Kee...

Page 53: ... number of packets received on the interface since the device was last refreshed including bad packets Multicast and Broadcast packets Broadcast Packets Displays the number of good Broadcast packets received on the interface since the device was last refreshed This number does not include Multicast packets Multicast Packets Displays the number of good Multicast packets received on the interface si...

Page 54: ...ossible field values are Port Displays the RMON statistics for the selected port LAG Displays the RMON statistics for the selected LAG Counter Name Displays the selected MIB variable Sample Type Defines the sampling method for the selected variable and comparing the value against the thresholds The possible field values are Absolute Compares the values directly with the thresholds at the end of th...

Page 55: ...he Trap can also be saved using the Trap mechanism Both Indicates that both the Log and Trap mechanism are used to report alarms Startup Alarm Displays the trigger that activates the alarm generation Rising is defined by crossing the threshold from a low value threshold to a higher value threshold Interval Defines the alarm interval time in seconds Owner Displays the device or user that defined th...

Page 56: ...he event occurred Statistics Tab Port Utilization The Port Utilization screen displays the amount of resources each interface is currently consuming Ports in green are functioning normally while ports in red are currently transmitting an excessive amount of network traffic Refresh Rate Indicates the amount of time that passes before the port utilization statistics are refreshed The possible field ...

Page 57: ...asured 802 1x statistic Description Describes the measured 802 1x statistic Packet Displays the amount of packets measured for the particular 802 1x statistic Statistics Tab GVRP Statistics The GVRP Statistics screen contains device statistics for GVRP The GVRP Statistics screen is divided into two areas GVRP Statistics Table and GVRP Error Statistics Table The following fields are relevant for bo...

Page 58: ...s the device GVRP Leave all statistics The GVRP Error Statistics Table contains the following fields Invalid Protocol ID Displays the device GVRP Invalid Protocol ID statistics Invalid Attribute Type Displays the device GVRP Invalid Attribute ID statistics Invalid Attribute Value Displays the device GVRP Invalid Attribute Value statistics Invalid Attribute Length Displays the device GVRP Invalid A...

Page 59: ...IGRP is used to classify network flows ICMP Indicates that the Internet Control Message Protocol ICMP is used to classify network flows IGMP Indicates that the Internet Group Management Protocol IGMP is used to classify network flows TCP Indicates that the Transmission Control Protocol is used to classify network flows OSPF Matches the packet to the Open Shortest Path First OSPF protocol UDP Indic...

Page 60: ...Defines the source IP address wildcard mask Wildcard masks specify which bits are used and which bits are ignored A wild card mask of 255 255 255 255 indicates that no bit is important A wildcard of 0 0 0 0 indicates that all the bits are important For example if the source IP address 149 36 184 198 and the wildcard mask is 255 36 184 00 the first eight bits of the IP address are ignored while the...

Page 61: ...o which packets are addressed to the ACE Wildcard Mask Defines the source IP address wildcard mask Wildcard masks specify which bits are used and which bits are ignored A wild card mask of 255 255 255 255 indicates that no bit is important A wildcard of 0 0 0 0 indicates that all the bits are important For example if the source IP address 149 36 184 198 and the wildcard mask is 255 36 184 00 the f...

Page 62: ...al security for networks RADIUS servers provide a centralized authentication method for web access IP Address The Authentication Server IP address Priority The server priority The possible values are 0 65535 where 1 is the highest value The RADIUS Server priority is used to configure the server query order Authentication Port Identifies the authentication port The authentication port is used to ve...

Page 63: ... 802 1X port authentication The Add to List button adds the RADIUS configuration to the RADIUS Table at the bottom of the screen Security Tab TACACS The device provides Terminal Access Controller Access Control System TACACS client support TACACS provides centralized security for validation of users accessing the device TACACS provides a centralized user management system while still retaining con...

Page 64: ...le at the bottom of the screen Security Tab 802 1x Settings Port based authentication enables authenticating system users on a per port basis via an external server Only authenticated and approved system users can transmit and receive data Ports are authenticated via the RADIUS server using the Extensible Authentication Protocol EAP Enable 802 1x Place a checkmark in the check box to enable 802 1x...

Page 65: ...ault is 30 seconds Server Timeout Specifies the number of seconds that lapses before the switch resends a request to the authentication server Range 1 65535 The field default is 30 seconds Security Tab Port Security Network security can be increased by limiting access on a specific port only to users with specific MAC addresses MAC addresses can be dynamically learned or statically configured Lock...

Page 66: ... the maximum addresses allowed on the port Both relearning and aging MAC addresses are enabled In order to change the Learning Mode the Lock Interface must be set to Unlocked Once the mode is changed the Lock Interface can be reinstated Max Entries Specifies the number of MAC addresses that can be learned on the port The Max Entries field is enabled only if Locked is selected in the Interface Stat...

Page 67: ...n until reactivated or until the device is reset Enable Traps When checked indicates that traps are enabled for Multiple Hosts Trap Frequency Defines the time period by which traps are sent to the host The Trap Frequency 1 1000000 field can be defined only if multiple hosts are disabled The default is 10 seconds Status Indicates the host status If there is an asterisk the port is either not linked...

Page 68: ...c facilities Classifying incoming traffic into handling classes based on an attribute including The ingress interface Packet content A combination of these attributes Providing various mechanisms for determining the allocation of network resources to different handling classes including The assignment of network traffic to a particular hardware queue The assignment of internal resources Traffic sh...

Page 69: ...affic priority queues are supported The Restore Defaults button restores the device factory defaults for mapping CoS values to a forwarding queue CoS Default Interface Interface to which the CoS configuration applies Default CoS Determines the default CoS value for incoming packets for which a VLAN tag is not defined The possible field values are 0 7 The default CoS is 0 Restore Defaults Restores ...

Page 70: ...ed with the Service mode as bandwidth settings are based on services Queue shaping can be based per queue and or per interface Shaping is determined by the lower specified value The queue shaping type is selected in the Bandwidth screen Interface Indicates the interface for which the queue shaping information is displayed The possible field values are Port Indicates the port for which the bandwidt...

Page 71: ...e Advanced QoS mode provides rules for specifying flow classification and assigning rule actions that relate to bandwidth management The rules are based on the Access Control Lists see Access Control Tab MAC ACLs and IP ACLs can be grouped together in more complex structures called policies Policies can be applied to an interface Policy ACLs are applied in the sequence they appear within the polic...

Page 72: ... Policer New Policy Name Defines a new Policy name Class Map Selects an existing Class Map by name New Class Map The New Class Map button opens the New Class Map screen New Class Map screen Class Map Name Defines a new Class Map name Preferred ACL Indicates if packets are first matched to an IP based ACL or a MAC based ACL The possible field values are IP Based ACLs Matches packets to IP based ACL...

Page 73: ...asses in the same policy map but cannot be used across different policy maps Single Configures the class to use manually configured information rates and exceed actions Aggregate Policer User defined aggregate policers Aggregate Policer Settings The Aggregate Policer button opens the New Aggregate Policer screen New Aggregate Policer screen Aggregate Policer Name Enter a name in this field Ingress...

Page 74: ... the RSTP In addition Multiple STP transmits packets assigned to different VLANs through different MST regions MST regions act as a single bridge Spanning Tree Tab STP Status The STP Status screen describes the STP status on the device Spanning Tree State Indicates if STP is enabled on the device Spanning Tree Mode Indicates the STP mode by which STP is enabled on the device Bridge ID Identifies t...

Page 75: ...ays 5 hours 10 minutes and 4 seconds Spanning Tree Tab Global STP The Global STP screen contains parameters for enabling STP on the device Global Setting Spanning Tree State Indicates if STP is enabled on the device STP Operation Mode Indicates the STP mode by which STP is enabled on the device The possible field values are Classic STP Enables Classic STP on the device This is the default value Ra...

Page 76: ... 20 seconds The range is 6 to 40 seconds Forward Delay Specifies the device forward delay time The Forward Delay Time indicates the amount of time in seconds a bridge remains in a listening and learning state before forwarding packets The default is 15 seconds The range is 4 to 30 seconds Spanning Tree Tab STP Port Settings Network administrators can assign STP settings to specific interfaces usin...

Page 77: ...lue of the port The priority value influences the port choice when a bridge has two ports connected in a loop The priority value is between 0 240 The priority value is provided in increments of 16 Designated Bridge ID Indicates the bridge priority and the MAC Address of the designated bridge Designated Port ID Indicates the selected port s priority and interface Designated Cost Indicates the cost ...

Page 78: ...Indicates that Multiple STP is enabled on the device Fast Link Indicates if Fast Link is enabled or disabled for the port or LAG If Fast Link is enabled for a port the port is automatically placed in the forwarding state Port State Indicates if RSTP is enabled on the interface Point to Point Admin Status Indicates if a point to point links are established or permits the device to establish a point...

Page 79: ...ation The revision number is required as part of the MST configuration The possible field range 0 65535 Max Hops Indicates the total number of hops that occur in a specific region before the BPDU is discarded Once the BPDU is discarded the port information is aged out The possible field range is 1 40 The field default is 20 hops IST Master Identifies the Spanning Tree Master instance The IST Maste...

Page 80: ... Settings screen contains the following fields Instance ID Lists the MSTP instances configured on the device Possible field range is 0 15 Interface Displays the interface for which the MSTP settings are displayed The possible field values are Port Specifies the port for which the MSTP settings are displayed LAG Specifies the LAG for which the MSTP settings are displayed Port State Indicates whethe...

Page 81: ... Tree mode The Spanning Tree mode is selected in the Global STP screen The possible field values are Classic STP Indicates that Classic STP is enabled on the device Rapid STP Indicates that Rapid STP is enabled on the device Multiple STP Indicates that Multiple STP is enabled on the device Interface Priority Defines the interface priority for specified instance The default value is 128 Path Cost I...

Page 82: ...LAN ID Specifies the VLAN ID IGMP Status Indicates if IGMP snooping is enabled on the VLAN Auto Learn Indicates if Auto Learn is enabled on the device If Auto Learn is enabled the device automatically learns where other Multicast groups are located Enables or disables Auto Learn on the Ethernet device Host Timeout Indicates the amount of time host waits to receive a message before timing out The d...

Page 83: ... divided into two areas Configuring Multicast and Multicast Table The fields are the same for both areas VLAN ID Identifies a VLAN to be configured to a Multicast service Bridge Multicast Address Identifies the Multicast group MAC address IP address Bridge IP Multicast DIsplays the port that can be added to a Multicast service LAG Displays LAG that can be added to a Multicast service The configura...

Page 84: ...Tab Global Parameters The Global Parameters screen contains parameters for defining SNMP notification parameters Local Engine ID Indicates the local device engine ID The field value is a hexadecimal string Each byte in hexadecimal character strings consists of two hexadecimal digits Each byte can be separated by a period or a colon The Engine ID must be defined before SNMPv3 is enabled For stand a...

Page 85: ... granted via the MIB name or MIB Object ID View Name Displays the user defined views The options are as follows Default Displays the default SNMP view for read and read write views DefaultSuper Displays the default SNMP view for administrator views Subtree ID Tree Indicates the device feature OID included or excluded in the selected SNMP view The options to select the Subtree are as follows Select...

Page 86: ...roup SNMPv2 SNMPv2 is defined for the group SNMPv3 SNMPv3 is defined for the group Security Level Defines the security level attached to the group Security levels apply to SNMPv3 only The possible field values are No Authentication Indicates that neither the Authentication nor the Privacy security levels are assigned to the group Authentication Authenticates SNMP messages and ensures the SNMP mess...

Page 87: ...that port authentication is performed via HMAC MD5 96 password authentication SHA Password Indicates that port authentication is performed via HMAC SHA 96 password authentication MD5 Key Indicates that port authentication is performed via the HMAC MD5 algorithm SHA Key Indicates that port authentication is performed via HMAC SHA 96 authentication Password Define the local user password Local user ...

Page 88: ...and contains the following fields Access Mode Defines the access rights of the community The possible field values are Read Only Management access is restricted to read only and changes cannot be made to the community Read Write Management access is read write and changes can be made to the device configuration but not to the community SNMP Admin User has access to all device configuration options...

Page 89: ...ure aspect The Notification Filter screen also allows network managers to filter notifications Filter Name Contains a list of user defined notification filters New Object Identifier Subtree Displays the OID for which notifications are sent or blocked If a filter is attached to an OID traps or informs are generated and sent to the trap recipients Object IDs are selected from either the Select from ...

Page 90: ...Either SNMPv1 2 or SNMPv3 can be enabled at any one time but not both at the same time If SNMPv1 2 is enabled the Community String and Notification Version fields are enabled for configuration Community String Identifies the community string of the trap manager Notification Version Determines the trap type The possible field values are SNMP V1 Indicates SNMP Version 1 traps are sent SNMP V2 Indica...

Page 91: ... User Authentication screen is used to modify user passwords Authentication Type Defines the user authentication methods Combinations of all the authentication methods can be selected The possible field values are Local Authenticates the user at the device level The device checks the user name and password for authentication RADIUS Authenticates the user at the RADIUS server TACACS Authenticates t...

Page 92: ...g database parameters refer LAG The specific LAG number to which the forwarding database parameters refer MAC Address Displays the MAC address to which the entry refers VLAN ID Displays the VLAN ID number to which the entry refers VLAN Name Displays the VLAN name to which the entry refers Status Displays how the entry was created The possible field values are Permanent The MAC address is permanent...

Page 93: ...nformation about the aging time before a dynamic MAC address is erased and includes parameters for querying and viewing the Dynamic MAC Address table The Dynamic MAC Address table contains address parameters by which packets are directly forwarded to the ports The Dynamic Address Table can be sorted by interface VLAN and MAC Address Address Aging Specifies the amount of time in seconds the MAC add...

Page 94: ...on generating the message It allows messages to be filtered based on their urgency or relevancy Each message severity determines the set of event logging devices that are sent per each event logging Logging Indicates if device global logs for Cache File and Server Logs are enabled Console logs are enabled by default Emergency The system is not functioning Alert The system needs immediate attention...

Page 95: ...ing ports Target Port Defines the port from which traffic is mirrored Admin Tab Cable Test The Cable Test screen shows you results from performance tests on copper cables The maximum cable length that can be tested is 120 meters Cables are tested when the ports are in the down state except for the Approximate Cable Length test Port This is the port to which the cable is connected Test Result This ...

Page 96: ...ackup the switch configuration via TFTP enter the TFTP server address TFTP Server Specifies the TFTP Server IP Address to which the Configuration file will be saved Destination File Specifies the name of the configuration file The default is StartupCfg cfg Via HTTP This HTTP Firmware Upgrade screen is used for saving configuration information using your Web browser Upgrade Select this option to up...

Page 97: ...nes the screen functionality as a Firmware backup TFTP Server IP Address Specifies the TFTP Server IP Address from which files are downloaded Source File Name Specifies the file to be downloaded Destination File name Specifies the destination file type to which to the file is downloaded The possible field values are Software Image Downloads the Image file Boot Code Downloads the Boot file Admin Ta...

Page 98: ...hich system logs are sent to the remote server Only one facility can be assigned to a single server If a second facility level is assigned the first facility is overridden All applications defined for a device utilize the same facility on a server The field default is Local 7 The possible field values are Local 0 Local 7 Description Provides a user defined server description Minimum Severity Indic...

Page 99: ...e log severity Description Displays the log message text Admin Tab Flash Logs The Flash Log screen contains information about log entries saved to the Log File in FLASH including the time the log was generated the log severity and a description of the log message The Message Log is available after reboot Log Index Displays the log number Log Time Displays the time at which the log was generated Se...

Page 100: ...y capable of carrying terabits of data per second the signaling hardware currently on the market can handle no more than a few gigabits of data per second Fiber cables come with two main connector types The most commonly used fiber optic cable is multi mode fiber cable MMF with a 62 5 micron fiber optic core Single mode fiber cabling is somewhat more efficient than multi mode but far more expensiv...

Page 101: ...tocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shared resources N...

Page 102: ...vided null modem cable from the COM port on your computer to the Console port on the Switch 3 Power on your computer and launch HyperTerminal follow the instructions in Chapter 4 Using the Console Interface for Configuration to configure HyperTerminal to connect to the Switch 4 Power on the Switch and watch for the auto boot message Autoboot in 2 seconds press RETURN or Esc to abort and enter prom...

Page 103: ...ck Browse to locate the file Only valid files with a ros or rfb suffix that have been provided by Linksys can be downloaded Downloading invalid files will result in unpredictable behavior Ensure that the Xmodem protocol is selected in the Protocol field 9 Press Send and the software is downloaded After the software has been downloaded the device will reboot automatically Figure C 3 Download Figure...

Page 104: ...g the device Access to management functions can be limited to user groups which are defined by the following criteria Ingress interfaces Source IP address and or Source IP subnets ACE Filters in Access Control Lists ACL that determine which network traffic is forwarded An ACE is based on the following criteria Protocol Protocol ID Source Port Destination Port Wildcard Mask Source IP Address Destin...

Page 105: ...outers bind Broadcast domains because routers do not forward broadcast frames Broadcast Storm An excessive amount of broadcast messages simultaneously transmitted across a network by a single port Forwarded message responses are heaped onto the network overloading network resources or causing the network to time out Burst A packet transmission at faster than normal rates Bursts are limited in time...

Page 106: ... amount of time instead of assigning permanent IP addresses DHCP Clients An Internet host using DHCP to obtain configuration parameters such as a network address DHCP Server An Internet host that returns configuration parameters to DHCP clients DNS Domain Name Server The IP address of your ISP s server which translates the names of websites into IP addresses Domain A specific name for a network of...

Page 107: ...d to connect to servers on the World Wide Web HTTPS HyperText Transport Protocol Secure An extension to the standard HTTP protocol that provides confidentiality by encrypting the traffic from the website By default this protocol uses TCP port 443 ICMP Internet Control Message Protocol Allows the gateway or destination host to communicate with the source host For example to report a processing erro...

Page 108: ...smits copies of a single packet to multiple ports Network A series of computers or devices connected for the purpose of data sharing storage and or transmission between users NMS Network Management System An interface that provides a method of managing a system OID Object Identifier Used by SNMP to identify managed objects In the SNMP Manager Agent network management paradigm each managed object m...

Page 109: ...ndard e mail protocol on the Internet SNMP Simple Network Management Protocol A widely used network monitoring and control protocol SSH Secure Shell A utility that uses strong authentication and secure communications to log in to another computer over a network SSL Secure Socket Layer Encryption technology for the Internet used to provide secure transactions such as the transmission of credit card...

Page 110: ...mizes port usage by linking a group of ports together to form a single trunk aggregated groups TX Rate Transmission Rate UDP User Data Protocol Communication protocol that transmits packets but does not guarantee their delivery Upgrade To replace existing software or firmware with a newer version Upload To transmit a file over a network URL Uniform Resource Locator The address of a file located on...

Page 111: ...MDI X Autonegotiate Manual setting Cabling Type UTP CAT 5 or better for 10BASE T 100BASE TX UTP CAT 5e or better for 1000BASE T LEDs Link Act Gigabit speed System Performance Switching Capacity 16 Gig non blocking Forwarding Rate 11 9 Mpps wire speed performance Layer 2 MAC table size 8K Number of VLANs 256 active VLANs 4096 range VLAN Port based and 802 1Q Tag based VLANs Management VLAN HOL Bloc...

Page 112: ...B RFC 1215 Traps RMON Embedded Remote Monitoring RMON software agent supports four RMON groups history statistics alarms and events for enhanced traffic management monitoring and analysis Firmware Upgrade Web Browser upgrade HTTP and TFTP Port Mirroring Traffic on a port can be mirrored to another port for analysis with a network analyzer or RMON probe Other Management Traceroute Secure Socket Lay...

Page 113: ...l Broadcast Multicast and Unknown Unicast Spanning Tree IEEE 802 1D Spanning Tree IEEE 802 1w Rapid Spanning Tree IEEE 802 1s Multiple Spanning Tree IGMP Snooping IGMP v1 v2 snooping limits bandwidth intensive video traffic to only the requestors Support 256 multicast groups QoS Priority levels 4 Hardware queues Scheduling Priority Queueing and Weighted Round Robin WRR Class of Service Port based ...

Page 114: ...ow Control 802 3 ad LACP 802 1d STP 802 1Q p VLAN 802 1w Rapid STP 802 1s Multiple STP 802 1x Port Access Authentication Environmental Dimensions 11 x 1 75 x 6 69 279 4 mm x 44 45 mm x 170 mm Unit Weight 2 20 lbs 1 kg Power External AC Power Adapter Certification FCC Part15 Class A CE Class A UL cUL CE mark CB Operating Temp 0º to 40ºC 32º to 104ºF Storage Temp 20º to 70ºC 4º to 158ºF Operating Hu...

Page 115: ...PoE System POE 802 3af compliant Supply up to IEEE Standard maximum of 15 4W on 8 10 100 1000 ports Performance Switching Capacity 16 Gig non blocking Forwarding Rate 11 9 Mpps wire speed performance Layer 2 MAC table size 8K Number of VLANs 256 active VLANs 4096 range VLAN Port based and 802 1Q Tag based VLANs Management VLAN HOL Blocking Head of line blocking prevention Management Web User Inter...

Page 116: ... events for enhanced traffic management monitoring and analysis Firmware Upgrade Web Browser upgrade HTTP and TFTP Port Mirroring Traffic on a port can be mirrored to another port for analysis with a network analyzer or RMON probe Other Management Traceroute Secure Socket Layer SSL Secure Shell SSH RADIUS port mirroring TFTP upgrade SSL security for Web UI DHCP Client BootP SNTP Xmodem upgrade Cab...

Page 117: ...1D Spanning Tree IEEE 802 1w Rapid Spanning Tree IEEE 802 1s Multiple Spanning Tree IGMP Snooping IGMP v1 v2 snooping limits bandwidth intensive video traffic to only the requestors Support 256 multicast groups QoS Priority levels 4 Hardware queues Scheduling Priority Queueing and Weighted Round Robin WRR Class of Service Port based 802 1p VLAN priority based IPv4 v6 IP Precedence TOS DSCP based T...

Page 118: ...802 1Q p VLAN 802 1w Rapid STP 802 1s Multiple STP 802 1x Port Access Authentication Environmental Dimensions 11 x 1 75 x 6 69 279 4 mm x 44 45 mm x 170 mm Unit Weight 2 65 lbs 1 2 kg Power External AC Power Adapter Certifications FCC Part15 Class A CE Class A UL cUL CE mark CB Operating Temp 0ºC to 40ºC 32ºF to 104ºF Storage Temp 20ºC to 70ºC 4ºF to 158ºF Operating Humidity 10 to 90 Non Condensin...

Page 119: ...E T LEDs Link Act PoE System POE 802 3af complaint Supply up to IEEE Standard maximum of 15 4W on 4 10 100 1000 ports or up to 7 5W on 8 10 100 1000 ports Performance Switching Capacity 16 Gig non blocking Forwarding Rate 11 9 Mpps wire speed performance Layer 2 MAC table size 8K Number of VLANs 256 active VLANs 4096 range VLAN Port based and 802 1Q Tag based VLANs Management VLAN HOL Blocking Hea...

Page 120: ... groups history statistics alarms and events for enhanced traffic management monitoring and analysis Firmware Upgrade Web Browser upgrade HTTP and TFTP Port Mirroring Traffic on a port can be mirrored to another port for analysis with a network analyzer or RMON probe Other Management Traceroute Secure Socket Layer SSL Secure Shell SSH RADIUS port mirroring TFTP upgrade SSL security for Web UI DHCP...

Page 121: ...D Spanning Tree IEEE 802 1w Rapid Spanning Tree IEEE 802 1s Multiple Spanning Tree IGMP Snooping IGMP v1 v2 snooping limits bandwidth intensive video traffic to only the requestors Support 256 multicast groups QoS Priority levels 4 Hardware queues Scheduling Priority Queueing and Weighted Round Robin WRR Class of Service Port based 802 1p VLAN priority based IPv4 v6 IP Precedence TOS DSCP based TC...

Page 122: ...02 1Q p VLAN 802 1w Rapid STP 802 1s Multiple STP 802 1x Port Access Authentication Environmental Dimensions 11 x 1 75 x 6 69 279 4 mm x 44 45 mm x 170 mm Unit Weight 2 65 lbs 1 2 kg Power External AC Power Adapter Certifications FCC Part15 Class A CE Class A UL cUL CE mark CB Operating Temp 0ºC to 40ºC 32ºF to 104ºF Storage Temp 20ºC to 70ºC 4ºF to 158ºF Operating Humidity 10 to 90 Non Condensing...

Page 123: ...D WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys b has...

Page 124: ...ed to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance Safety Notices Caution To reduce the risk of fire use only No 26 AWG or larger telecommuni...

Page 125: ...érences reçues y compris celles qui risquent d entraîner un fonctionnement indésirable User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE This document contains important information for users with regards to the proper disposal and recycling of Linksys products Consumers are required to comply with this notice for all electron...

Page 126: ...116 Appendix G Regulatory Information WebView Switches ...

Page 127: ...117 Appendix G Regulatory Information WebView Switches ...

Page 128: ...118 Appendix G Regulatory Information WebView Switches ...

Page 129: ...119 Appendix G Regulatory Information WebView Switches For more information visit www linksys com ...

Page 130: ... with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization department for ob...

Reviews: