background image

46

Chapter 5: Using the Web-based Utility for Configuration
ACL Tab - MAC Based ACL

24-Port 10/100/1000 Gigabit Switch with Webview and PoE

Dest. IP Address.

 Matches the destination port IP address to which packets are addressed to the ACE.

Wildcard Mask.

 Defines the destination IP address wildcard mask.

Match DSCP.

 Matches the packet DSCP value to the ACE. Either the DSCP value or the IP Precedence value is 

used to match packets to ACLs. The possible field range is 0-63.

Match IP Precedence.

 Matches the packet IP Precedence value to the ACE. Either the DSCP value or the IP 

Precedence value is used to match packets to ACLs. The possible field range is 0-7.

The 

Add to List

 button adds the configured IP Based ACLs to the IP Based ACL Table at the bottom of the screen.

ACL Tab - MAC Based ACL

The MAC Based ACL screen allows a MAC based ACL to be defined. ACEs can be added only if the ACL is not 
bound to an interface.

Target

. Select the New ACL Name radio button and enter an ACL name in the text field provided (with up to 16 

characters). Or to add rules to an existing ACL select the ACL Name radio button and select an ACL from the 
dropdown menu.

ACL Name.

 Displays the user-defined MAC based ACLs. 

New ACL Name.

 Specifies a new user-defined MAC based ACL name, the name cannot include spaces.

Action.

 Indicates the ACL forwarding action. Possible field values are: 

Permit.

 Forwards packets which meet the ACL criteria. 

Deny.

 Drops packets which meet the ACL criteria.

Shutdown.

 Drops packet that meet the ACL criteria, and disables the port to which the packet was 

addressed. 

Source MAC Address.

 Matches the source MAC address to which packets are addressed to the ACE. 

Wildcard Mask.

 Defines the source IP address wildcard mask. Wildcard masks specify which bits are used and 

which bits are ignored. A wild card mask of 255.255.255.255 indicates that no bit is important. A wildcard of 
0.0.0.0 indicates that all the bits are important. For example, if the source IP address 149.36.184.198 and the 
wildcard mask is 255.36.184.00, the first eight bits of the IP address are ignored, while the last eight bits are 
used.

Figure 5-26: ACL - Mac Based ACL

Summary of Contents for SRW2024P

Page 1: ...Model No Model No USER GUIDE BUSINESS SERIES Model No Model No 24 Port 10 100 1000 Gigabit Switch Model No SRW2024P with Webview and PoE WIRED ...

Page 2: ...echnical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section This exclamation point means there is a caution or warning and is something that could damage your property or the Switch word definition This checkmark means there ...

Page 3: ... 4 Using the Console Interface for Configuration 11 Overview 11 Configuring the HyperTerminal Application 11 Connecting to the Switch through a Telnet Session 12 Configuring the Switch through the Console Interface 13 Chapter 5 Using the Web based Utility for Configuration 25 Overview 25 Accessing the Web based Utility 25 Setup Tab Summary 26 Setup Tab Network Settings 27 Setup Tab Time 28 Port Ma...

Page 4: ...ttings 49 Security Tab Ports Security 51 Security Tab HTTPS Settings 52 Security Tab SSH Settings 53 SSH Host Key Settings 54 QoS Tab 55 QoS Tab CoS Settings 55 QoS Tab Queue Settings 56 QoS Tab DSCP Settings 57 QoS Tab Diffserv Settings 57 QoS Tab Diffserv Port Binding 60 QoS Tab Bandwidth 60 Spanning Tree Tab 61 Spanning Tree Tab Global Settings 61 Spanning Tree Tab STP Settings 62 Spanning Tree...

Page 5: ...tory Default 78 Appendix A About Gigabit Ethernet and Fiber Optic Cabling 79 Gigabit Ethernet 79 Fiber Optic Cabling 79 Appendix B Windows Help 80 Appendix C Downloading using Xmodem 81 Startup Menu Procedures 81 Appendix D Glossary 83 Appendix E Specifications 90 Appendix F Warranty Information 94 Appendix G Regulatory Information 95 Appendix H Contact Information 101 ...

Page 6: ...s 12 Figure 4 5 Telnet Login Screen 12 Figure 4 6 Switch Main Menu 13 Figure 4 7 System Configuration Menu 14 Figure 4 8 System Information Menu 15 Figure 4 9 Versions 15 Figure 4 10 General System Information 15 Figure 4 11 Management Settings Menu 16 Figure 4 12 Serial Port Configuration 16 Figure 4 13 User Password Settings 17 Figure 4 14 IP Configuration Menu 17 Figure 4 15 IP Address Configur...

Page 7: ...il 30 Figure 5 7 Port Management Link Aggregration 32 Figure 5 8 Link Aggregation Link Aggregation Select Member 32 Figure 5 9 Link Aggregation Link Aggregation Detail 32 Figure 5 10 Port Management LACP 33 Figure 5 11 Port Management PoE Power Settings 34 Figure 5 12 VLAN Management Create VLAN 35 Figure 5 13 VLAN Management Port Settings 35 Figure 5 14 VLAN Management Ports to VLAN 36 Figure 5 1...

Page 8: ...gure 5 34 Security SSH Host Key Settings 54 Figure 5 35 QoS CoS Settings 55 Figure 5 36 QoS Queue Settings 56 Figure 5 37 QoS DSCP Settings 57 Figure 5 38 QoS Diffserv Settings 57 Figure 5 39 QoS Diffserv Settings Edit Class Element 58 Figure 5 40 QoS Diffserv Settings Edit Policy Element 59 Figure 5 41 QoS Diffserv Port Binding 60 Figure 5 42 QoS Bandwidth 60 Figure 5 43 Spanning Tree Global Sett...

Page 9: ...ry Logging 73 Figure 5 57 Admin Port Mirroring 74 Figure 5 58 Admin Cable Test 75 Figure 5 59 Admin Ping 75 Figure 5 60 Admin Save Configuration 76 Figure 5 61 Admin Jumbo Frame 76 Figure 5 62 Admin Firmware Upgrade 77 Figure 5 63 Admin HTTP Upgrade 77 Figure 5 64 Admin Reboot 78 Figure 5 65 Admin Factory Defaults 78 Figure C 1 Interface 81 Figure C 2 Send File 81 Figure C 3 Browse 82 Figure C 4 S...

Page 10: ...port layer 2 priority 802 1p and Layer 3 priority TOS or DSCP Intelligent Broadcast and Multicast storm control minimizes and contain the effect of these types of traffic on regular traffic IGMP Snooping limits bandwidth intensive video traffic to only the requestors without flooding to all users Incoming traffic can be policed and outgoing traffic can be shaped allowing you to control network acc...

Page 11: ...the Web based Utility Appendix A About Gigabit Ethernet and Fiber Optic Cabling This appendix gives a general description of Gigabit Ethernet and fiber optic cabling Appendix B Windows Help This appendix describes how you can use Windows Help for instructions about networking such as installing the TCP IP protocol Appendix C Downloading using Xmodem This appendix describes how you can download sof...

Page 12: ...es orange to indicate that the POST has failed Link Act 1 24 Orange The Link Act LED lights orange to indicate a functional 1000Mbps network link through the corresponding port 1 through 24 with an attached device Green The Link Act LED lights green to indicate a functional 10 100Mbps network link Flashes to indicate that the Switch is actively sending or receiving data over that port PoE Orange T...

Page 13: ...work peripheral system or clients at speeds of 1000Mbps Use the Linksys MGBT1 MGBSX1 or MGBLH1 miniGBIC modules with the Switch The MGBSX1 and the MGBLH1 require fiber cabling with LC connectors while the MGBT1 requires a Category 5e Ethernet cable with an RJ 45 connector Console The Console port is where you can connect a serial cable to a PC s serial port for configuration using your PC s HyperT...

Page 14: ...from the Switch over the twisted pair cable without requiring its own separate power source This capability gives network administrators centralized power control for devices such as IP phones and wireless access points which translates into greater network availability For each attached 802 3af compliant device the Switch automatically senses the load and dynamically supplies the required power T...

Page 15: ... Port The Switch is equipped with a serial port labeled Console located on the front of the switch that allows you to connect to a computer s serial port for configuration purposes using the provided serial cable You can use HyperTerminal to manage the Switch using the console port With this and many other Linksys products your networking options are limitless Go to the Linksys website at www link...

Page 16: ...typical network configuration see the application diagram shown below When you connect your network devices make sure you don t exceed the maximum cabling distances which are listed in the following table Table 1 Maximum Cabling Distances From To Maximum Distance Switch Switch or Hub 100 meters 328 feet Hub Hub 5 meters 16 4 feet Switch or Hub Computer 100 meters 328 feet Figure 3 1 Typical Networ...

Page 17: ...all the Switch When you choose a location for the Switch observe the following guidelines Make sure that the Switch will be accessible and that the cables can be easily connected Keep cabling away from sources of electrical noise power lines and fluorescent lighting fixtures Position the Switch away from water and moisture sources To ensure adequate air flow around the Switch be sure to provide a ...

Page 18: ...ment To mount the Switch in any standard sized 19 inch wide 1U high rack follow these instructions 1 Place the Switch on a hard flat surface with the front panel facing you 2 Attach a rack mount bracket to one side of the Switch with the supplied screws Then attach the other bracket to the other side 3 Make sure the brackets are properly attached to the Switch 4 Use the appropriate screws not incl...

Page 19: ...al port This PC must be running a VT100 terminal emulation software such as HyperTerminal 7 Connect the supplied power cord to the Switch s power port and plug the other end into an electrical outlet 8 Power on the network devices connected to the Switch Each active port s corresponding Link Act LED will light up on the Switch Uplinking the Switch To uplink the Switch connect one end of a Category...

Page 20: ...h the web utility which is covered in the next chapter Configuring the HyperTerminal Application Before you use the console interface you will need to configure the HyperTerminal application on your PC 1 Click the Start button Select Programs and choose Accessories Select Communications Select HyperTerminal from the options listed in this menu 2 On the Connection Description screen enter a name fo...

Page 21: ...ting to the Switch through a Telnet Session Open a command line editor and enter telnet 192 168 1 254 Then press the Enter key The Login screen will now appear The first time you open the CLI interface select Edit and hit Enter Enter admin in the User Name field Leave the Password field blank Press the Esc button and you will return to the login screen Use the right arrow button to navigate to Exe...

Page 22: ...ghlighted option To navigate through the menus and actions of the console interface use the up or down arrow keys to move up or down and use the left or right arrow keys to move left or right Use the Enter key to select a menu option and use the Esc key to return to the previous selection Menu options and any values entered or present will be highlighted The bottom of the screen lists the actions ...

Page 23: ...igabit Switch with Webview and PoE System Configuration Menu On the System Configuration Menu screen you have these choices 1 System Information 2 Management Settings 3 User Password Settings 4 IP Configuration 5 File Management 6 Restore System Default Settings 7 Reboot System 0 Back to Main Menu Figure 4 7 System Configuration Menu ...

Page 24: ...tware loader and hardware firmware versions General Information The General System Information screen displays the Switch s description System Up Time System MAC Address System Contact System Name and System Location Select Edit and press the Enter key to make changes When your changes are complete press the Esc key to return to the Action menu Select Save and press the Enter key to save your chan...

Page 25: ...n Configuration Serial Port Configuration On the Serial Port Configuration screen the Switch s baud rate is displayed Select Edit and press the Enter key to make changes Toggle to the desired speed and when your changes are complete press the Esc key to return to the Action menu Select Save and press the Enter key to save your changes To exit select Quit and press the Enter key Figure 4 11 Managem...

Page 26: ...device on the network Subnet Mask The subnet mask of the Switch is displayed Default Gateway The IP address of your network s default gateway is displayed Management VLAN The VLAN ID number is displayed Set the ID number of the Management VLAN This is the only VLAN through which you can gain management access to the Switch By default all ports on the Switch are members of VLAN 1 so a management st...

Page 27: ... Server Enable or disable the Secure HTTP server function of the Switch HTTPS Server port Set the TCP port that the HTTPS packets are sent and received from Select Edit and press the Enter key to make changes When your changes are complete press the Esc key to return to the Action menu Select Save and press the Enter key to save your changes To exit select Quit and press the Enter key SNMP The SNM...

Page 28: ...the Enter key to make changes When your changes are complete press the Esc key to return to the Action menu Select Save and press the Enter key to save your changes To exit select Quit and press the Enter key File Management The File Management screen allows you to upload or download files such as the startup configuration boot or image file using a TFTP server Select Edit to change the settings W...

Page 29: ... the y key to restore the Switch s default settings or press the n key to cancel Reboot System Select Reboot System and press the Enter key if you want to restart the Switch You will be asked if you want to continue Press the y key to reboot the Switch or press the n key to cancel After the Switch has rebooted the Switch Main Menu screen will appear Back to Main Menu Select Back to Main Menu and p...

Page 30: ...able or disable an interface set auto negotiation and the interface capabilities to advertise or manually fix the speed duplex mode and flow control Enable Allows you to manually enable or disable an interface You can disable an interface due to abnormal behavior for example excessive collisions and then enable it again once the problem has been resolved You may also disable an interface for secur...

Page 31: ...r budget Port power can be automatically turned on and off for connected devices and a per port power priority can be set so that the Switch never exceeds its allocated power budget When a device is connected to a port its power requirements are detected by the Switch before power is supplied If the power required by a device exceeds the power budget of the port or the whole Switch power is not su...

Page 32: ...PoE settings for each port Select the Edit action and use the left right and up down arrows to select the attribute you would like to set You can set the Admin Status the Priority and the Power Allocation for each port Use the Save action to save the new settings Help Select Help and press the Enter key if you want to view the help information This screen explains how to navigate the various scree...

Page 33: ...24 Chapter 4 Using the Console Interface for Configuration Configuring the Switch through the Console Interface 24 Port 10 100 1000 Gigabit Switch with Webview and PoE ...

Page 34: ...CL Security QoS Quality of Service Spanning Tree Multicast SNMP Admin and Logout Click one of the main tabs to view additional tabs The LEDs on the Setup Summary screen display status information about their corresponding ports A green LED indicates a connection while a grey LED indicates no connection An orange LED indicates the port has been closed down by the administrator When you click a port...

Page 35: ...de Indicates whether the Switch is configured with a Static or Dynamic IP address configurable from Setup Network Settings tab Base MAC Address This is the MAC address of the Switch System Information Serial Number The product s Serial Number is displayed here Model Name This is the model number and name of the Switch Hardware Version The version number of the Switch s hardware is displayed here B...

Page 36: ...u to assign a system name System Location This field is used for entering a description of where the Switch is located such as 3rd floor System Contact Enter the administrative contact person in this field System Object ID The system object identifier is displayed here Base MAC Address This is the MAC address of the Switch IP Configuration Management VLAN This drop down allows you to select the Ma...

Page 37: ...witch will only record the time from the factory default set at the last bootup When the SNTP client is enabled the Switch periodically sends a request for a time update to a configured time server You can configure up to two time server IP addresses The Switch will attempt to poll each server in the sequence Set Time Set the system time manually When this option is selected the local hardware clo...

Page 38: ...imes every year then select Recurring From If you selected Recurring then enter the date and time when daylight savings begins To If you selected Recurring then enter the date and time when daylight savings ends SNTP Servers Server1 Enter the primary SNTP server here Server2 Enter a secondary SNTP server here SNTP Polling Interval The value defined here determines the amount of time in seconds bef...

Page 39: ... end station The MDIX setting is used if the port is connected to a hub or another switch Flow Control This is the flow control status of the port It is active when the port uses Full Duplex Mode Type Displays the port type LAG This indicates if the port is part of a LAG Detail The Detail button will open the Port Setting screen Port Setting Port Select the number of the port from the drop down me...

Page 40: ...olve a problem Otherwise back pressure jamming signals may degrade overall performance for the segment attached to the hub Default Autonegotiation enabled Advertised capabilities for 100Base TX 10half 10full 100half 100full 1000Base T 10half 10full 100half 100full 1000full 1000Base SX LX LH 1000full Port Broadcast Control You can protect your network from broadcast storms by setting a threshold fo...

Page 41: ... active when the port uses Full Duplex Mode Create To create a new LAG click the Create button in the Create column then add members to the LAG by clicking on the Select Member button The select member screen for the Link Aggregation opens Detail button To configure the LAG and the LAG broadcast control click the Detail button The detail screen for the LAG opens Assign up to 8 ports to the LAG by ...

Page 42: ...idth of 4 Gbps when operating at full duplex To avoid creating a loop in the network be sure you enable LACP before connecting the ports and also disconnect the ports before disabling LACP Global Setting System Priority Indicates the global LACP priority value The possible range is 1 65535 The default value is 1 Port Setting Set the System Priority and Port Priority for the Port Actor After you ha...

Page 43: ...t power priority settings are used to control the supplied power Select Enabled to enable PoE power on selected ports set the priority using the drop down menu provided and set the power allocation for each port Port Displays the port number Admin Status Select Enabled to enable PoE power to be supplied to the connected device Priority Set the priority of the supply using the drop down menu Power ...

Page 44: ...ove a VLAN click the Remove button VLAN Management Tab Port Settings The VLAN Port Settings screen provides parameters for managing ports that are part of a VLAN The port default VLAN ID PVID is configured on the VLAN Port Settings screen All untagged packets arriving to the device are tagged by the ports PVID Port The port number included in the VLAN Mode Indicates the port mode Possible values a...

Page 45: ...en to configure port members for the selected VLAN index Assign ports as tagged if they are connected to 802 1Q VLAN compliant devices or untagged they are not connected to any VLAN aware devices Select VLAN Select the VLAN number from the drop down menu Switch Port Mode Indicates VLAN membership mode for an interface Default Access Access Indicates the port belongs to a single untagged VLAN When ...

Page 46: ... belongs to VLANs and each VLAN is user defined as tagged or untagged full 802 1Q mode Access Indicates the port belongs to a single untagged VLAN When a port is in Access mode the packet types which are accepted on the port cannot be designated Ingress filtering cannot be enabled disabled on an access port Trunk Indicates the port belongs to VLANs in which all ports are tagged except for one port...

Page 47: ...ON statistics are refreshed every 60 seconds Interface Indicates the device for which statistics are displayed The possible field values are Port Defines the specific port for which RMON statistics are displayed LAG Defines the specific LAG for which RMON statistics are displayed Drop Events Displays the number of dropped events that have occurred on the interface since the device was last refresh...

Page 48: ...equence FCS with an integral number of octets FCS Error or a bad FCS with a non integral octet Alignment Error number The field range to detect jabbers is between 20 ms and 150 ms Collisions Displays the number of collisions received on the interface since the device was last refreshed Frames of xx Bytes Number of xx byte frames received on the interface since the device was last refreshed Clear C...

Page 49: ...en contains fields for setting network alarms Network alarms occur when a network problem or event is detected Rising and falling thresholds generate events The RMON Alarms screen allows you to record important events and critical network problems The RMON Alarm and Event Control Tables are used together to define specific criteria that will generate response events Alarms can be set to test data ...

Page 50: ...an the threshold then an alarm will be generated After a falling event has been generated another such event will not be generated until the sampled value has risen above the Falling Threshold and reaches the Rising Threshold Rising Event Index Displays the mechanism in which the alarms are reported The possible field values are LOG Indicates there is not a saving mechanism for either the device o...

Page 51: ...type Possible values are None Indicates that no event occurred Log Indicates that the event is a log entry Trap Indicates that the event is a trap Log and Trap Indicates that the event is both a log entry and a trap Community Displays the community to which the event belongs Owner Displays the device or user that defined the event Maximum 127 characters The Add button adds the configured RMON even...

Page 52: ...he statistics are refreshed every 30 seconds 60 Sec Indicates that the statistics are refreshed every 60 seconds Statistics Tab 802 1x Statistics The 802 1X Statistic screen contains information about EAP packets received on a specific port To view the statistics for a port select the required interface from the drop down menu and click Query Refresh Rate Indicates the amount of time that passes b...

Page 53: ...P based ACL the name cannot include spaces Action Indicates the action assigned to the packet matching the ACL Packets are forwarded or dropped In addition the port can be shut down a trap can be sent to the network administrator or a packet assigned rate limiting restrictions for forwarding The options are as follows Permit Forwards packets which meet the ACL criteria Deny Drops packets which mee...

Page 54: ...nt Ack Indicates the packet is acknowledged Psh Indicates the packet is pushed Rst Indicates the connection is dropped Syn Indicates request to start a session Fin Indicates request to close a session Source Port Defines the TCP UDP source port to which the ACE is matched This field is active only if 800 6 TCP or 800 17 UDP are selected in the Select from List drop down menu The possible field ran...

Page 55: ... enter an ACL name in the text field provided with up to 16 characters Or to add rules to an existing ACL select the ACL Name radio button and select an ACL from the dropdown menu ACL Name Displays the user defined MAC based ACLs New ACL Name Specifies a new user defined MAC based ACL name the name cannot include spaces Action Indicates the ACL forwarding action Possible field values are Permit Fo...

Page 56: ...the MAC Based ACL Table at the bottom of the screen To remove an ACL rule select an ACL rule from the table and click Remove When all rules are removed from the ACL the ACL is also removed Security Tab ACL Binding After configuring Access Control Lists ACL you should bind them to the ports that need to filter traffic You can assign one IP or MAC access list to any port You must configure a mask fo...

Page 57: ... server verifies the client identity and sends an access challenge back to the client The EAP packet from the RADIUS server contains not only the challenge but the authentication method to be used The client can reject the authentication method and request another depending on the configuration of the client software and the RADIUS server The authentication method must be MD5 The client responds t...

Page 58: ...globally for the Switch Each Switch port that will be used must be set to dot1X Auto mode Each client that needs to be authenticated must have dot1X client software installed and properly configured The RADIUS server and 802 1X client support EAP The Switch only supports EAPOL in order to pass the EAP packets from the server to the client The RADIUS server and client also have to support the same ...

Page 59: ...lick Detail to configure the 802 1X settings for that port The 802 1x Port Settings screen allows configuration of the following parameters Reauthentication To reauthenticate a client select Enabled Maximum Request Sets the maximum number of times the switch port will retransmit an EAP request packet to the client before it times out the authentication session Range 1 10 Default 2 Quiet Period Set...

Page 60: ...ncoming traffic with source addresses already stored in the dynamic or static address table will be accepted as authorized to access the network through that port If a device with an unauthorized MAC address attempts to use the switch port the intrusion will be detected and the Switch can automatically take action by disabling the port and sending a trap message To use port security specify a maxi...

Page 61: ...to that interface is restricted to the specified addresses If anyone tries to access a management interface on the Switch from an invalid address the Switch will reject the connection enter an event message in the system log and send a trap message to the trap manager IP addresses can be configured for web SNMP and Telnet access Each of these groups can include up to five different sets of address...

Page 62: ...ent through the SSH protocol The Switch supports both SSH Version 1 5 and 2 0 SSH Server Status Allows you to enable disable the SSH server on the Switch Default Disabled Version The Secure Shell version number Version 2 0 is displayed but the Switch supports management access via either SSH Version 1 5 or 2 0 clients SSH Authentication Timeout Specifies the time interval in seconds that the SSH s...

Page 63: ...l Signature Standard DSS The last string is the encoded modulus Host Key Type The key type used to generate the host key pair i e public and private keys Range RSA Version 1 DSA Version 2 Both Default RSA The SSH server uses RSA or DSA for key exchange when the client first establishes a connection with the Switch and then negotiates with the client to select either DES 56 bit or 3DES 168 bit for ...

Page 64: ...fy which data packets have greater precedence when traffic is buffered in the Switch due to congestion The Switch supports CoS with four priority queues for each port Data packets in a port s high priority queue will be transmitted before those in the lower priority queues You can set the default priority for each interface and configure the mapping of frame priority tags to the Switch s priority ...

Page 65: ... LAG To configure the default priority for LAGs go to the table entry for the LAG number which is listed after port g24 at the end of the table Default settings can be restored using the Restore Defaults button Click Save Settings to save the changes QoS Tab Queue Settings The Queue Setting screen contains fields for defining the QoS queue forwarding types Queue Displays the queue for which the qu...

Page 66: ...ion criteria and service policies Differentiated Services DiffServ provides policy based management mechanisms used for prioritizing network resources to meet the requirements of specific traffic types on a per hop basis Each packet is classified upon entry into the network based on access lists IP Precedence DSCP values or VLAN lists Using access lists allows you select traffic based on Layer 2 L...

Page 67: ...ap Range 1 256 characters Add Creates a new class map using the entered class name and description Edit Class Element Modifies the class map criteria used to classify ingress traffic Remove Removes the selected class from the list Select the entry from the table that you wish to change then click Edit Class Element Add rules to a selected class using the ACL list drop down menu or the IP DSCP IP P...

Page 68: ...a new policy or select a policy and click Edit Policy Element to change the policy rules of the selected policy or Remove Policy to delete the policy Class Name Name of class map Use the drop down menu to select a different policy Action Configures the service provided to ingress traffic by setting a CoS DSCP or IP Precedence value in a matching packet Range CoS 0 7 DSCP 0 63 IP Precedence 0 7 Ena...

Page 69: ...terfaces at the edge of a network to limit traffic coming out of the Switch Traffic that falls within the rate limit is transmitted while packets that exceed the acceptable amount of traffic are dropped Rate limiting can be applied to individual ports or LAGs When an interface is configured with this feature the traffic rate will be monitored by the hardware to verify conformity Non conforming tra...

Page 70: ...dicates the STA mode by which STP is enabled on the device Bridge ID Identifies the Bridge priority and MAC address Designated Root Indicates the ID of the bridge with the lowest path cost to the instance ID Root Port Indicates the port number that offers the lowest cost path from this bridge to the Root Bridge It is significant when the Bridge is not the Root The default is zero Root Path Cost Th...

Page 71: ...lo Time indicates the amount of time in seconds a root bridge waits between configuration messages The default is 2 seconds The range is 1 to 10 seconds Maximum Age The maximum time in seconds a device can wait without receiving a configuration message before attempting to reconfigure All device ports except for designated ports should receive configuration messages at regular intervals Any port t...

Page 72: ...ransmitted configuration messages for an interval set by the Forward Delay parameter without receiving contradictory information Port address table is cleared and the port begins learning addresses Forwarding Port forwards packets and continues learning addresses Forward Transitions The number of times this port has transitioned from the Learning state to the Forwarding state Operational Edge Port...

Page 73: ...000 Default Ethernet Half duplex 2 000 000 full duplex 1 000 000 LAG 500 000 Fast Ethernet Half duplex 200 000 full duplex 100 000 LAG 50 000 Gigabit Ethernet Full duplex 10 000 LAG 5 000 Priority Defines the priority used for this port in the Spanning Tree Protocol If the path cost for all ports on a switch are the same the port with the highest priority i e lowest value will be configured as an ...

Page 74: ...e Port should only be enabled for ports connected to an end node device Default Disabled Administrative Link Type The link type attached to this interface Point to Point A connection to exactly one other bridge Shared A connection to two or more bridges Auto The Switch automatically determines if the interface is attached to a point to point link or to shared media This is the default setting ...

Page 75: ...eceive multicast traffic Default Enabled IGMP Query Count Sets the maximum number of queries issued for which there has been no response before the Switch takes action to drop a client from the multicast group Range 2 10 Default 2 IGMP Query Interval Sets the frequency at which the Switch sends IGMP host query messages Range 60 125 seconds Default 125 IGMP Report Delay Sets the time between receiv...

Page 76: ...te the VLAN that will propagate the multicast service specify the multicast IP address and click Add Multicast Tab Static Router Ports Depending on your network connections IGMP snooping may not always be able to locate the IGMP querier Therefore if the IGMP querier is a known multicast router switch connected over the network to an interface port or lag on the Switch you can manually configure th...

Page 77: ...st Tab Router Member Ports Query Multicast routers that are attached to ports on the Switch use information obtained from IGMP to support IP multicasting across the Internet These routers may be dynamically discovered by the Switch or statically assigned to an interface on the Switch You can use the Router Port Query screen to display the ports on the Switch attached to a neighboring multicast rou...

Page 78: ...name from the list enter the new password confirm the password by entering it again and then click Update User Name Displays the user name Password Specifies the new password The password is not displayed As it entered an corresponding to each character is displayed in the field Range 1 159 characters Confirm Password Confirms the new password The password entered into this field must be exactly t...

Page 79: ...ess table entries are discarded Set the Aging Interval by entering the number of seconds into the text field provided Click Save Settings to save the changes Static Address Setting A static address can be assigned to a specific interface on the Switch Static addresses are bound to the assigned interface and will not be moved When a static address is seen on another interface the address will be ig...

Page 80: ...the displayed addresses and then click Query The dynamic addresses that conform to the search criteria are listed in the text box To delete a MAC address from the forwarding database select the entry in the displayed list then click Remove Admin Tab SNMP Simple Network Management Protocol SNMP is a communication protocol designed specifically for managing devices on a network Equipment commonly ma...

Page 81: ...are only Level 2 5 and 6 event messages for the current firmware release System Logging The system allows you to enable or disable event logging and specify which event levels are logged to RAM or flash memory Severe error messages that are logged to flash memory are permanently stored in the Switch to assist in troubleshooting network problems System Log Status Enables disables the logging of deb...

Page 82: ...evel Remote Log Status Enables disables the logging of debug or error messages to the remote logging process Default Disabled Logging Facility Sets the facility type for remote logging of Syslog messages There are eight facility types specified by values of 16 to 23 The facility type is used by the Syslog server to dispatch log messages to an appropriate service The attribute specifies the facilit...

Page 83: ...itch or the address of an administrator responsible for the Switch Destination Email Address 1 5 Specifies the email recipients of alert messages You can specify up to five recipients Enable Admin Status select the minimum severity level and specify a source email address Add at least one IP address to the SMTP server list and specify up to five email addresses to receive the alert messages Click ...

Page 84: ...hat a short has occurred in the cable Undefined indicates that the test could not be properly performed Cable Fault Distance This is the distance from the port at which the cable error occurred Last Update This is the last time the port was tested Test Click the Test button to perform the test Admin Tab Ping You can use a ping to see if another site on the network can be reached Ping sends ICMP ec...

Page 85: ...large sequential data transfers by supporting jumbo frames up to 10240 bytes on the Gigabit ports and mini jumbo frames on the 10 100Mbps ports Compared to standard Ethernet frames that run only up to 1 5 KB using jumbo frames significantly reduces the per packet overhead required to process protocol encapsulation fields To use jumbo frames both the source and destination end nodes such as a compu...

Page 86: ... or Backup to save a firmware file to the server Select the Upgrade or Backup radio button then the file type from the drop down menu either Software Image or Boot Code Enter the IP address of the TFTP server specify the file name of the software on the server and then click Save Settings Admin Tab HTTP Upgrade Download new Switch runtime software from the local web management PC Enter the file na...

Page 87: ...ted Admin Tab Factory Default The Factory Reset screen restores the Switch s factory default settings Click the Reset to Factory Default Configuration button then click OK to confirm and restart the Switch Figure 5 64 Admin Reboot Figure 5 65 Admin Factory Defaults NOTE Restoring the factory defaults will erase all configuration settings that you have made You can save a backup of your current con...

Page 88: ...ber is physically capable of carrying terabits of data per second the signaling hardware currently on the market can handle no more than a few gigabits of data per second Fiber cables come with two main connector types The most commonly used fiber optic cable is multi mode fiber cable MMF with a 62 5 micron fiber optic core Single mode fiber cabling is somewhat more efficient than multi mode but f...

Page 89: ...instructions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing...

Page 90: ...ace for Configuration to configure HyperTerminal to connect to the Switch 4 Power on the Switch and watch for the POST done message Done All Pass 5 When the POST done message appears press and hold Ctrl and press the U key to access the Xmodem interface 6 Check that the switch has sufficient flash memory space for the new code file before starting the download You can store a maximum of only two r...

Page 91: ...ad loader code files Press Send and the software is downloaded 9 Specify a name for the downloaded code file File names are case sensitive should be from 1 to 31 characters not contain slashes or and the leading letter of the file name should not be a period Valid characters A Z a z 0 9 _ 10 To set the new downloaded file as the startup file use the S et Startup File menu option 11 Press Q to quit...

Page 92: ... rules for accessing the device Access to management functions can be limited to user groups which are defined by the following criteria Ingress interfaces Source IP address and or Source IP subnets ACE Filters in Access Control Lists ACL that determine which network traffic is forwarded An ACE is based on the following criteria Protocol Protocol ID Source Port Destination Port Wildcard Mask Sourc...

Page 93: ... a designated set Routers bind Broadcast domains because routers do not forward broadcast frames Broadcast Storm An excessive amount of broadcast messages simultaneously transmitted across a network by a single port Forwarded message responses are heaped onto the network overloading network resources or causing the network to time out Burst A packet transmission at faster than normal rates Bursts ...

Page 94: ...a user for a limited amount of time instead of assigning permanent IP addresses DHCP Clients An Internet host using DHCP to obtain configuration parameters such as a network address DHCP Server An Internet host that returns configuration parameters to DHCP clients DNS Domain Name Server The IP address of your ISP s server which translates the names of websites into IP addresses Domain A specific n...

Page 95: ...ations protocol used to connect to servers on the World Wide Web HTTPS HyperText Transport Protocol Secure An extension to the standard HTTP protocol that provides confidentiality by encrypting the traffic from the website By default this protocol uses TCP port 443 ICMP Internet Control Message Protocol Allows the gateway or destination host to communicate with the source host For example to repor...

Page 96: ...nents Multicast Transmits copies of a single packet to multiple ports Network A series of computers or devices connected for the purpose of data sharing storage and or transmission between users NMS Network Management System An interface that provides a method of managing a system OID Object Identifier Used by SNMP to identify managed objects In the SNMP Manager Agent network management paradigm e...

Page 97: ...fer Protocol The standard e mail protocol on the Internet SNMP Simple Network Management Protocol A widely used network monitoring and control protocol SSH Secure Shell A utility that uses strong authentication and secure communications to log in to another computer over a network SSL Secure Socket Layer Encryption technology for the Internet used to provide secure transactions such as the transmi...

Page 98: ...nk Aggregation Optimizes port usage by linking a group of ports together to form a single trunk aggregated groups TX Rate Transmission Rate UDP User Data Protocol Communication protocol that transmits packets but does not guarantee their delivery Upgrade To replace existing software or firmware with a newer version Upload To transmit a file over a network URL Uniform Resource Locator The address o...

Page 99: ... VLANs 256 Static Today and Dynamic Future Management Web User Interface Built in Web UI for easy browser based configuration HTTP HTTPS SNMP SNMP version v1 v2c with support for traps SNMP MIBs RFC1213 MIB 2 RFC2863 Interface MIB RFC2665 Ether like MIB RFC1493 Bridge MIB RFC2674 Extended Bridge MIB P bridge Q bridge RFC2819 RMON MIB groups 1 2 3 9 only RFC2737 Entity MIB RFC 2618 RADIUS Client MI...

Page 100: ...Management Telnet Client SSL security for Web UI Switch Audit Log DHCP Client BootP SNTP Xmodem upgrade Cable Diagnostics PING Security features IEEE 802 1x 802 1x RADIUS Authentication MD5 Encryption Access Control IP and MAC ACLs Management ACL Port security MAC filtering Availability Link Aggregation Link Aggregation using IEEE 802 3ad LACP Up to 8 ports in up to 8 LAGs Storm Control Broadcast ...

Page 101: ...Class of Service Port based 802 1p VLAN priority based IP TOS DSCP based CoS IPv6 Traffic Class based CoS Rate Limiting Ingress Policer Egress Shaper Layer 2 VLAN Port based and 802 1q based VLANs Management VLAN HOL Blocking Head of line blocking prevention Jumbo frame Supports frames up to 10K byte frames Standards IEEE 802 3 2005 Ethernet IEEE 802 3u Fast Ethernet IEEE 802 3z Gigabit Ethernet I...

Page 102: ...ew and PoE Power Internal switching power Power Input 100 240V 3A 50 60Hz Certification FCC Part 15 Class A CE Class A UL cUL CE mark CB Operating Temperature 32 to 104 F 0 to 50 C Storage Temperature 4 to 158 F 20 to 70 C Operating Humidity 10 to 90 Storage Humidity 10 to 95 ...

Page 103: ... REPRESENTATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered exce...

Page 104: ...he user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance Safety Notices Caution To reduce the risk of fire use only No 26 AWG or...

Page 105: ...r toutes les interférences reçues y compris celles qui risquent d entraîner un fonctionnement indésirable User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE This document contains important information for users with regards to the proper disposal and recycling of Linksys products Consumers are required to comply with this noti...

Page 106: ...97 Appendix G Regulatory Information 24 Port 10 100 1000 Gigabit Switch with Webview and PoE ...

Page 107: ...98 Appendix G Regulatory Information 24 Port 10 100 1000 Gigabit Switch with Webview and PoE ...

Page 108: ...99 Appendix G Regulatory Information 24 Port 10 100 1000 Gigabit Switch with Webview and PoE ...

Page 109: ...100 Appendix G Regulatory Information 24 Port 10 100 1000 Gigabit Switch with Webview and PoE For more information visit www linksys com ...

Page 110: ...ore about networking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorizati...

Reviews: