background image

Model No.

WIRED

with WebView

8-Port 10/100 Ethernet Switch

SRW208/SRW208G/SRW208L/SRW208P/SRW208MP

User Guide

Summary of Contents for SRW208G

Page 1: ...Model No WIRED with WebView 8 Port 10 100 Ethernet Switch SRW208 SRW208G SRW208L SRW208P SRW208MP User Guide ...

Page 2: ... for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section This exclamation point means there is a caution or warning and is something that could damage your property or the Switch word definition This checkmark means ...

Page 3: ...g the Console Interface for Configuration 16 Overview 16 Configuring the HyperTerminal Application 16 Connecting to the Switch through a Telnet Session 17 Configuring the Switch through the Console Interface 18 Chapter 5 Using the Web based Utility for Configuration 30 Overview 30 Accessing the Web based Utility 30 Setup Tab Summary 31 Setup Tab Network Settings 32 Setup Tab Time 33 Port Managemen...

Page 4: ...5 Security Tab TACACS 56 Security Tab 802 1x Settings 57 Security Tab Port Security 58 Security Tab Multiple Hosts 59 Security Tab Storm Control 60 QoS 61 QoS Tab CoS Settings 61 QoS Tab Queue Settings 62 QoS Tab DSCP Settings 63 QoS Tab Bandwidth 63 QoS Tab Basic Mode 64 QoS Tab Advanced Mode 64 Spanning Tree 66 Spanning Tree Tab STP Status 67 Spanning Tree Tab Global STP 68 Spanning Tree Tab STP...

Page 5: ...ab Port Mirroring 88 Admin Tab Cable Test 88 Admin Tab Save Configuration 89 Admin Tab Firmware Upgrade 90 Admin Tab Reboot 90 Admin Tab Factory Defaults 91 Admin Tab Server Logs 91 Admin Tab Memory Logs 92 Admin Tab Flash Logs 92 Appendix A About Gigabit Ethernet and Fiber Optic Cabling 93 Gigabit Ethernet 93 Fiber Optic Cabling 93 Appendix B Windows Help 94 Appendix C Downloading using Xmodem 95...

Page 6: ...WebView Switches Appendix G Regulatory Information 125 Appendix H Contact Information 131 ...

Page 7: ...all Mount Orientation Vertical 14 Figure 3 6 Wall Mount Template 14 Figure 4 1 Finding HyperTerminal 16 Figure 4 2 Connection Description 16 Figure 4 3 Connect To 16 Figure 4 4 COM1 Properties 17 Figure 4 5 Telnet Login screen 17 Figure 4 6 Switch Main Menu 18 Figure 4 7 System Configuration Menu 19 Figure 4 8 System Information Menu 20 Figure 4 9 Versions 20 Figure 4 10 General System Information...

Page 8: ...31 Restore System Default Settings 28 Figure 4 32 Reboot System 28 Figure 4 33 Port Status 29 Figure 4 34 Port Configuration 29 Figure 5 1 Login Screen 30 Figure 5 2 Setup Summary 31 Figure 5 3 Setup Network Settings 32 Figure 5 4 Setup Time 33 Figure 5 5 Port Management Port Settings 34 Figure 5 6 Port Settings Port Configuration Detail 35 Figure 5 7 Port Management Link Aggregration 37 Figure 5 ...

Page 9: ...istics GVRP Statistics 50 Figure 5 26 ACL IP Based ACL 52 Figure 5 27 ACL Mac Based ACL 54 Figure 5 28 Security ACL Binding 55 Figure 5 29 Security RADIUS 55 Figure 5 30 Security TACACS 56 Figure 5 31 Security 802 1x Settings 57 Figure 5 32 802 1x Settings Setting Timer 57 Figure 5 33 Security Port Security 58 Figure 5 34 Security Multiple Hosts 60 Figure 5 35 Security Storm Control 60 Figure 5 36...

Page 10: ... Multicast 76 Figure 5 55 Multicast Bridge Multicast Forward All 77 Figure 5 56 SNMP Global Parameters 77 Figure 5 57 SNMP Views 78 Figure 5 58 SNMP Group Profile 79 Figure 5 59 SNMP Group Membership 80 Figure 5 60 SNMP Communities 81 Figure 5 61 SNMP Notification Filter 82 Figure 5 62 SNMP Notification Recipient 83 Figure 5 63 Admin User Authentication 84 Figure 5 64 Admin Static Address 85 Figur...

Page 11: ...WebView Switches Figure 5 74 Admin Memory Logs 92 Figure 5 75 Admin Flash Logs 92 Figure C 1 Startup Menu 95 Figure C 1 Auto Boot Message 95 Figure C 2 Send File 96 Figure C 3 Download 96 ...

Page 12: ...ber is mentioned then the feature is specific to that model The Linksys WebView Managed switch allows you to expand your network securely Configuration of the switch is secured using SSL for Web access User control is secured using 802 1x security using a RADIUS authentication mechanism and can also be controlled using MAC based filtering Extensive QoS features makes the solution ideal for real ti...

Page 13: ...availability of the system The rich management functionality of the WebView switches includes SNMP RMON Telnet and HTTP Management options allowing you to flexibly integrate and manage these devices in your network The SRW208P and SRW208MP support Automatic Load Sensing Power control circuitry automatically detects Power over Ethernet on access point before providing power Power feeding of Etherne...

Page 14: ...sed Utility Appendix A About Gigabit Ethernet and Fiber Optic Cabling This appendix gives a general description of Gigabit Ethernet and fiber optic cabling Appendix B Windows Help This appendix describes how you can use Windows Help for instructions about networking such as installing the TCP IP protocol Appendix C Downloading using Xmodem This appendix describes how you can download software into...

Page 15: ...ch s LEDs and ports are located on the front panel LEDs System Green The SYSTEM LED lights up to indicate that the Switch is powered on Link Act Green The LINK ACT LED lights up to indicate a functional network link through the corresponding port 1 through 8 with an attached device It flashes to indicate that the Switch is actively sending or receiving data over that port 100M Orange The 100M LED ...

Page 16: ...rTerminal program Refer to Chapter 4 Using the Console Interface for Configuration for more information SRW208G Front Panel The Switch s LEDs and ports are located on the front panel LEDs System Green The SYSTEM LED lights up to indicate that the Switch is powered on Link Act Green The LINK ACT LED lights up to indicate a functional network link through the corresponding port 1 through 8 G1 or G2 ...

Page 17: ...y detect the speed of the device connected to it 10Mbps 100Mbps or 1000Mbps and adjust its speed and duplex accordingly G2 The mini GBIC gigabit interface converter port is a connection point for a mini GBIC expansion module so the Switch can be uplinked via fiber to another switch The MiniGBIC port provides a link to a high speed network segment or individual workstation at speeds of up to 1000Mb...

Page 18: ...eiving data over that port 100M Orange The 100M LED lights up to indicate a 100Mbps connection on the corresponding port 1 through 8 Gigabit Orange The Gigabit LED lights up to indicate a Gigabit connection on the corresponding RJ 45 port G1 Ports 1 8 The Switch is equipped with 8 auto sensing Ethernet network ports which use RJ 45 connectors The Fast Ethernet ports support network speeds of 10Mbp...

Page 19: ... serial cable to a PC s serial port for configuration using your PC s HyperTerminal program Refer to Chapter 4 Using the Console Interface for Configuration for more information SRW208P SRW208MP Front Panel The Switch s LEDs and ports are located on the front panel LEDs System Green The SYSTEM LED lights up to indicate that the Switch is powered on Link Act Green The LINK ACT LED lights up to indi...

Page 20: ...nables each port to automatically detect the speed of the device connected to it 10Mbps 100Mbps or 1000Mbps and adjust its speed and duplex accordingly The G1 and G2 RJ 45 ports are shared with the miniGBIC ports miniGBIC1 2 The mini GBIC gigabit interface converter port is a connection point for a mini GBIC expansion module so the Switch can be uplinked via fiber to another switch Each MiniGBIC p...

Page 21: ...el The power port is located on the back panel of the Switch Power The Power port is where you will connect the power cord NOTE If you need to reset the Switch unplug the power cord from the back of the Switch Wait a few seconds and then reconnect it Figure 2 5 Back Panel of the SRW208 ...

Page 22: ...ch are listed in the following table A hub refers to any type of 100Mbps hub including regular hubs and stackable hubs A 10Mbps hub connected to another 10Mbps hub can span up to 100 meters 328 feet Table 1 Maximum Cabling Distances From To Maximum Distance Switch Switch or Hub 100 meters 328 feet Hub Hub 5 meters 16 4 feet Switch or Hub Computer 100 meters 328 feet Cable DSL Modem Router 10 100 D...

Page 23: ... provide a minimum clearance of two inches 50 mm Do not stack free standing Switches more than four units high Placement Options Before connecting cables to the Switch first you will physically install the Switch Either set the Switch on its four rubber feet for desktop placement or mount the Switch in a standard sized 19 inch wide 1U high rack for rack mount placement Desktop Placement 1 Attach t...

Page 24: ...itch with the supplied screws Then attach the other bracket to the other side 3 Make sure the brackets are properly attached to the Switch 4 Use the appropriate screws not included to securely attach the brackets to your rack Proceed to the section Connecting the Switch IMPORTANT Make sure you use the screws supplied with the mounting brackets Using the wrong screws could damage the Switch and wou...

Page 25: ... sure the holes are 3 7 inches 94 mm apart You can print the template from this page 3 Insert a screw into each hole and leave 3 mm of its head exposed 4 Maneuver the Switch so the wall mount slots line up with the two screws 5 Place the wall mount slots over the screws and slide the Switch down until the screws fit snugly into the wall mount slots Congratulations The Wall Mount installation of th...

Page 26: ... port and tighten the captive retaining screws Connect the other end to your PC s serial port This PC must be running the VT100 terminal emulation software such as HyperTerminal 7 Connect the supplied power cord to the Switch s power port and plug the other end into an electrical outlet 8 Power on the network devices connected to the Switch Each active port s corresponding Link Act LED will light ...

Page 27: ...which is covered in the next chapter Configuring the HyperTerminal Application Before you use the console interface you will need to configure the HyperTerminal application on your PC 1 Click the Start button Select Programs and choose Accessories Select Communications Select HyperTerminal from the options listed in this menu 2 On the Connection Description screen enter a name for this connection ...

Page 28: ...hrough a Telnet Session Open a command line editor and enter telnet 192 168 1 254 Then press the Enter key The Login screen will now appear The first time you open the CLI interface select Edit and hit Enter Enter admin in the User Name field Leave the Password field blank Press the Esc button and you will return to the login screen Use the right arrow button to navigate to Execute and press the E...

Page 29: ...option To navigate through the menus and actions of the console interface use the up or down arrow keys to move up or down and use the left or right arrow keys to move left or right Use the Enter key to select a menu option and use the Esc key to return to the previous selection Menu options and any values entered or present will be highlighted The bottom of the screen lists the actions available ...

Page 30: ...ches System Configuration Menu On the System Configuration Menu screen you have these choices 1 System Information 2 Management Settings 3 User Password Settings 4 Security Settings 5 IP Configuration 6 File Management 7 Restore System Default Settings 8 Reboot System 0 Back to main menu Figure 4 7 System Configuration Menu ...

Page 31: ...firmware versions General System Information The General System Information screen displays the Switch s description System Up Time System MAC Address System Contact System Name and System Location Select Edit and press the Enter key to make changes When your changes are complete press the Esc key to return to the Action menu Select Save and press the Enter key to save your changes To exit select ...

Page 32: ...ges are complete press the Esc key to return to the Action menu Select Save and press the Enter key to save your changes To exit select Quit and press the Enter key Telnet Configuration On the Telnet Configuration screen the time out is displayed The value is entered in seconds If you do not want the Telnet session to timeout you may enter a value of 0 sec Select Edit and press the Enter key to ma...

Page 33: ...ing the SPACE bar to toggle the option The SSH Server Port can be modified by entering in the value Select Edit and press the Enter key to make changes When your changes are complete press the Esc key to return to the Action menu Select Save and press the Enter key to save your changes To exit select Quit and press the Enter key SSH Status The SSH Status screen displays whether the SSH Server is e...

Page 34: ... be modified Select Edit and press the Enter key to make changes When your changes are complete press the Esc key to return to the Action menu Select Save and press the Enter key to save your changes To exit select Quit and press the Enter key SSH Keys Fingerprints On the SSH Keys Fingerprints screen the RSA and DSA keys will be displayed if they have been generated Select Refresh to update the sc...

Page 35: ...h as well as generate and display the certificate SSL Certificate Generation Use the Certificate Generation screen to specify a device generated certificate The following fields are specified Public Key Length Specifies the SSL RSA key length Range 512 2048 Organization Name Specifies the organization name Range 1 64 Locality or City Name Specifies the location or city name Range 1 64 State or Pro...

Page 36: ...o display the internal certificate Disable Active Management Profile Selecting this option will prompt you to confirm that you want to disable the Active Management Profile IP Configuration The IP Configuration screen displays these choices the Switch s IP Address Settings HTTP HTTPS Configuration and Network Configuration Figure 4 22 SSL Certificate Figure 4 23 IP Configuration ...

Page 37: ...tings and select DISABLE Select Edit to make changes When your changes are complete press the Esc key to return to the Action menu and select Save to save your changes HTTP The HTTP screen displays the status and port number of the HTTP Server Select Edit and press the Enter key to make changes When your changes are complete press the Esc key to return to the Action menu Select Save and press the ...

Page 38: ...lete press the Esc key to return to the Action menu Select Save and press the Enter key to save your changes To exit select Quit and press the Enter key TraceRoute The TraceRoute screen displays the IP address of the address whose route you want to trace Select Edit to change the IP address and select Execute to begin the traceroute test After the traceroute test is complete the TraceRoute screen ...

Page 39: ...ult Settings To restore the Switch back to the factory default settings select Restore System Default Settings and press the Enter key You will be asked if you want to continue Press the y key to restore the Switch s default settings or press the n key to cancel Reboot System Select Reboot System and press the Enter key if you want to restart the Switch You will be asked if you want to continue Pr...

Page 40: ...n the Switch Main Menu screen select Port Configuration and press the Enter key if you want to configure the Switch s ports The Port Configuration screen displays the port numbers their status auto negotiation status speed and duplex mode and status of flow control which is the flow of packet transmissions Select Edit and press the Enter key to make changes When your changes are complete press the...

Page 41: ...ing Tree Multicast SNMP Admin and Logout Click one of the main tabs to view additional tabs The LEDs on the Setup Summary screen display status information about their corresponding ports A green LED indicates a connection while a grey LED indicates no connection An orange LED indicates the port has been closed down by the administrator When you click a port s LED the statistics for that port are ...

Page 42: ...he Switch is configured with a Static or Dynamic IP address configurable from Setup Network Settings tab Base MAC Address This is the MAC address of the Switch System Information Serial Number The product s Serial Number is displayed here Model Name This is the model number and name of the Switch Hardware Version The version number of the Switch s hardware is displayed here Boot Version Indicates ...

Page 43: ...ion This field is used for entering a description of where the Switch is located such as 3rd floor System Contact Enter the administrative contact person in this field System Object ID The system object identifier is displayed here Base MAC Address This is the MAC address of the Switch IP Configuration Management VLAN This drop down allows you to select the Management VLAN IP Address Mode This dro...

Page 44: ...rotocol server Local Time Hours The hour can be entered here Minutes The minutes can be entered here Seconds The seconds can be entered here Month The month can be entered here Day The day can be entered here Year The year can be entered here Time Zone Enter the difference between Greenwich Mean Time GMT and local time Daylight Saving Daylight Saving Select Daylight Saving to enable it on the Swit...

Page 45: ...s the amount of time in seconds before the Switch polls the SNTP server The default value is every 1024 seconds approx 17 minutes Click the Save Settings button to save your changes or click Cancel Changes to discard the information Port Management Tab Port Settings The Port Management Port Settings screen shows you the settings for each of the Switch s ports Port The number of the port To use an ...

Page 46: ...ypasses the Forwarding Database and forwards all unicast multicast and broadcast traffic to an uplink Uplinks can be ports or LAGs Detail The Detail button will open the Port Configuration Detail screen Port Configuration Detail screen Port The number of the port Description Displays a brief description of the port can be entered by clicking on the Detail button Port Type This is the port type Adm...

Page 47: ...advertises its capabilities to its neighbor port to begin the negotiation process This field displays the current advertisement settings Neighbor Advertisement The neighbor port the port to which the selected interface is connected advertises its capabilities to the port to start the negotiation process This field displays the neighbor s current settings Back Pressure The Back Pressure feature of ...

Page 48: ...he flow control status of the LAG It is active when the port uses Full Duplex Mode LAG Mode Displays the LAG status On Off or Not Present Detail button The Detail button opens up the Link Aggregation Detail screen Link Aggregation Detail screen LAG Configuration LAG The number of the selected LAG Description A general description can be listed here for reference LACP Indicates if the LAG is in LAC...

Page 49: ...ected LAG Port Management Tab LACP Aggregate ports can be linked into link aggregation port groups Each group is comprised of ports with the same speed set to full duplex operation Aggregated Links can be manually setup or automatically established by enabling Link Aggregation Control Protocol LACP on the relevant links Aggregate ports can be linked into link aggregation port groups Each group is ...

Page 50: ...meters for configuring and working with VLANs Single VLAN VLAN ID 2 4094 Indicates the ID number of the VLAN being configured Up to 256 VLANs can be created This field is used to add VLANs one at a time To add the defined VLAN ID number press the Add button VLAN Name Displays the user defined VLAN name VLAN Range VLAN Range Indicates a range of VLANs being configured To add the defined range of VL...

Page 51: ...on the port packet type cannot be designated It is also not possible to enable disable ingress filtering on an access port Trunk The port belongs to VLANs in which all ports are tagged except for an optional single native VLAN Acceptable Frame Type Packet type accepted on the port Possible values are Admit Tag Only Indicates that only tagged packets are accepted on the port Admit All Indicates tha...

Page 52: ...le untagged VLAN When a port is in Access mode the packet types which are accepted on the port cannot be designated Ingress filtering cannot be enabled disabled on an access port Trunk Indicates the port belongs to VLANs in which all ports are tagged except for one port that can be untagged General Indicates the port belongs to VLANs and each VLAN is user defined as tagged or untagged full 802 1Q ...

Page 53: ...n the port cannot be designated Ingress filtering cannot be enabled disabled on an access port Trunk Indicates the port belongs to VLANs in which all ports are tagged except for one port that can be untagged Join VLAN Defines the VLANs to which the interface is joined VLANs Displays the PVID tag LAG Indicates if the port is a member of a LAG If it is a member of a LAG it cannot be configured to a ...

Page 54: ...which GVRP is enabled The possible field values are Port Indicates the port number on which GVRP is enabled LAG Indicates the LAG number on which GVRP is enabled GVRP State When the checkbox is checked GVRP is enabled on the interface Dynamic VLAN Creation When the checkbox is checked Dynamic VLAN creation is enabled on the interface GVRP Registration When the checkbox is checked VLAN registration...

Page 55: ...dcast packets received on the interface since the device was last refreshed This number does not include Multicast packets Multicast Packets Received Displays the number of good Multicast packets received on the interface since the device was last refreshed CRC Align Errors Displays the number of CRC and Align errors that have occurred on the interface since the device was last refreshed Undersize...

Page 56: ...e Source Interface Displays the interface from which the history samples were taken The possible field values are Port Specifies the port from which the RMON information was taken LAG Specifies the port from which the RMON information was taken Sampling Interval Indicates in seconds the time that samplings are taken from the ports The field range is 1 3600 The default is 1800 seconds equal to 30 m...

Page 57: ... number of packets received on the interface since the device was last refreshed including bad packets Multicast and Broadcast packets Broadcast Packets Displays the number of good Broadcast packets received on the interface since the device was last refreshed This number does not include Multicast packets Multicast Packets Displays the number of good Multicast packets received on the interface si...

Page 58: ...ossible field values are Port Displays the RMON statistics for the selected port LAG Displays the RMON statistics for the selected LAG Counter Name Displays the selected MIB variable Sample Type Defines the sampling method for the selected variable and comparing the value against the thresholds The possible field values are Absolute Compares the values directly with the thresholds at the end of th...

Page 59: ...he Trap can also be saved using the Trap mechanism Both Indicates that both the Log and Trap mechanism are used to report alarms Startup Alarm Displays the trigger that activates the alarm generation Rising is defined by crossing the threshold from a low value threshold to a higher value threshold Interval Defines the alarm interval time in seconds Owner Displays the device or user that defined th...

Page 60: ...he event occurred Statistics Tab Port Utilization The Port Utilization screen displays the amount of resources each interface is currently consuming Ports in green are functioning normally while ports in red are currently transmitting an excessive amount of network traffic Refresh Rate Indicates the amount of time that passes before the port utilization statistics are refreshed The possible field ...

Page 61: ...asured 802 1x statistic Description Describes the measured 802 1x statistic Packet Displays the amount of packets measured for the particular 802 1x statistic Statistics Tab GVRP Statistics The GVRP Statistics screen contains device statistics for GVRP The GVRP Statistics screen is divided into two areas GVRP Statistics Table and GVRP Error Statistics Table The following fields are relevant for bo...

Page 62: ...s the device GVRP Leave all statistics The GVRP Error Statistics Table contains the following fields Invalid Protocol ID Displays the device GVRP Invalid Protocol ID statistics Invalid Attribute Type Displays the device GVRP Invalid Attribute ID statistics Invalid Attribute Value Displays the device GVRP Invalid Attribute Value statistics Invalid Attribute Length Displays the device GVRP Invalid A...

Page 63: ...IGRP is used to classify network flows ICMP Indicates that the Internet Control Message Protocol ICMP is used to classify network flows IGMP Indicates that the Internet Group Management Protocol IGMP is used to classify network flows TCP Indicates that the Transmission Control Protocol is used to classify network flows OSPF Matches the packet to the Open Shortest Path First OSPF protocol UDP Indic...

Page 64: ...Defines the source IP address wildcard mask Wildcard masks specify which bits are used and which bits are ignored A wild card mask of 255 255 255 255 indicates that no bit is important A wildcard of 0 0 0 0 indicates that all the bits are important For example if the source IP address 149 36 184 198 and the wildcard mask is 255 36 184 00 the first eight bits of the IP address are ignored while the...

Page 65: ...o which packets are addressed to the ACE Wildcard Mask Defines the source IP address wildcard mask Wildcard masks specify which bits are used and which bits are ignored A wild card mask of 255 255 255 255 indicates that no bit is important A wildcard of 0 0 0 0 indicates that all the bits are important For example if the source IP address 149 36 184 198 and the wildcard mask is 255 36 184 00 the f...

Page 66: ... security for networks RADIUS servers provide a centralized authentication method for web access IP Address The Authentication Server IP address Priority The server priority The possible values are 0 65535 where 1 is the highest value The RADIUS Server priority is used to configure the server query order Authentication Port Identifies the authentication port The authentication port is used to veri...

Page 67: ... 802 1X port authentication The Add to List button adds the RADIUS configuration to the RADIUS Table at the bottom of the screen Security Tab TACACS The device provides Terminal Access Controller Access Control System TACACS client support TACACS provides centralized security for validation of users accessing the device TACACS provides a centralized user management system while still retaining con...

Page 68: ...ttings Port based authentication enables authenticating system users on a per port basis via an external server Only authenticated and approved system users can transmit and receive data Ports are authenticated via the RADIUS server using the Extensible Authentication Protocol EAP Enable 802 1x Place a checkmark in the check box to enable 802 1x authentication Port Indicates the port name Status P...

Page 69: ... to the authentication server Range 1 65535 The field default is 30 seconds Security Tab Port Security Network security can be increased by limiting access on a specific port only to users with specific MAC addresses MAC addresses can be dynamically learned or statically configured Locked port security monitors both received and learned packets that are received on specific ports Access to the loc...

Page 70: ...ted Max Entries Specifies the number of MAC addresses that can be learned on the port The Max Entries field is enabled only if Locked is selected in the Interface Status field In addition the Limited Dynamic Lock mode is selected The default is 1 Action on Violation Indicates the action to be applied to packets arriving on a locked port The possible field values are Discard Discards packets from a...

Page 71: ...cy 1 1000000 field can be defined only if multiple hosts are disabled The default is 10 seconds Status Indicates the host status If there is an asterisk the port is either not linked or is down The possible field values are Number of Violations Indicates the number of packets that arrived on the interface in single host mode from a host whose MAC address is not the supplicant MAC address Security ...

Page 72: ...ent handling classes including The assignment of network traffic to a particular hardware queue The assignment of internal resources Traffic shaping The terms Class of Service CoS and QoS are used in the following context CoS provides varying Layer 2 traffic services CoS refers to classification of traffic to traffic classes which are handled as an aggregate whole with no per flow settings CoS is ...

Page 73: ...efault CoS Determines the default CoS value for incoming packets for which a VLAN tag is not defined The possible field values are 0 7 The default CoS is 0 Restore Defaults Restores the device factory defaults for mapping CoS values to a forwarding queue LAG LAG to which the CoS configuration applies QoS Tab Queue Settings The Queue Setting screen contains fields for defining the QoS queue forward...

Page 74: ...Bandwidth screen Interface Indicates the interface for which the queue shaping information is displayed The possible field values are Port Indicates the port for which the bandwidth settings are displayed LAG Indicates the LAG for which the bandwidth settings are displayed Ingress Rate Limit Status Indicates if rate limiting is defined on the interface Rate Limit 62 1000000 Kbps Defines the amount...

Page 75: ...her in more complex structures called policies Policies can be applied to an interface Policy ACLs are applied in the sequence they appear within the policy Only a single policy can be attached to a port In advanced QoS mode ACLs can be applied directly to an interface in the Security ACL Binding However a policy and ACL cannot be simultaneously applied to an interface After assigning packets to a...

Page 76: ...alues are IP Based ACLs Matches packets to IP based ACLs first then matches packets to MAC based ACLs MAC Based ACLs Matches packets to MAC based ACLs first then matches packets to IP based ACLs IP ACL Matches packets to IP based ACLs first then matches packets to MAC based ACLs Match Criteria used to match IP addresses and or MAC addresses with an ACL s address The possible field values are And B...

Page 77: ... field is only relevant when the Police value is Single Ingress Committed Burst Size CBS Defines the CBS in bytes per second This field is only relevant when the Police value is Single Exceed Action Action assigned to incoming packets exceeding the CIR This field is only relevant when the Police value is Single Possible values are Drop Drops packets exceeding the defined CIR value Remark DSCP Rema...

Page 78: ...idge is not the Root The default is zero Root Path Cost The cost of the path from this bridge to the root Root Maximum Age sec Indicates the device Maximum Age Time The Maximum Age Time indicates the amount of time in seconds a bridge waits before sending configuration messages The default max age is 20 seconds The range is 6 to 40 seconds Root Hello Time sec Indicates the device Hello Time The He...

Page 79: ...e Flooding Floods BPDU packets when spanning tree is disabled on an interface Path Cost Default Values Specifies the method used to assign default path costs to STP ports The possible field values are Short Specifies 1 through 65 535 range for port path costs This is the default value Long Specifies 1 through 200 000 000 range for port path costs The default path costs assigned to an interface var...

Page 80: ...abled on the port If Fast Link mode is enabled for a port the Port State is automatically placed in the Forwarding state when the port link is up Fast Link optimizes the STP protocol convergence STP convergence can take 30 60 seconds in large networks Port State Displays the current STP state of a port If enabled the port state determines what forwarding action is taken on traffic Possible port st...

Page 81: ...anning Tree Tab RSTP Port Settings While the classic spanning tree prevents Layer 2 forwarding loops in a general network topology convergence can take between 30 60 seconds This time may delay detecting possible loops and propagating status topology changes Rapid Spanning Tree Protocol RSTP detects and uses network topologies that allow a faster STP convergence without creating forwarding loops I...

Page 82: ...shed by the device Enabled Enables the device to establish a point to point link To establish communications over a point to point link the originating PPP first sends Link Control Protocol LCP packets to configure and test the data link After a link is established and optional facilities are negotiated as needed by the LCP the originating PPP sends Network Control Protocols NCP packets to select ...

Page 83: ...is 20 hops IST Master Identifies the Spanning Tree Master instance The IST Master is the specified instance root Spanning Tree Tab MSTP Instance Settings MSTP operation maps VLANs into STP instances Packets assigned to various VLANs are transmitted along different paths within Multiple Spanning Trees Regions MST Regions Regions are one or more Multiple Spanning Tree bridges by which frames can be ...

Page 84: ...re displayed Port State Indicates whether the port is enabled for the specific instance Type Indicates if the port is a point to point port or a port connected to a hub The possible field values are Boundary Port Indicates the port is a boundary port A Boundary port attaches MST bridges to LAN in an outlying region If the port is a boundary port it also indicates whether the device on the other si...

Page 85: ...nterface priority for specified instance The default value is 128 Path Cost Indicates the port contribution to the Spanning Tree instance The range should always be 1 200 000 000 Designated Bridge ID Indicates that the bridge ID number that connects the link or shared LAN to the root Designated Port ID Indicates that the Port ID number on the designated bridge that connects the link or the shared ...

Page 86: ...ed on the device If Auto Learn is enabled the device automatically learns where other Multicast groups are located Enables or disables Auto Learn on the Ethernet device Host Timeout Indicates the amount of time host waits to receive a message before timing out The default time is 260 seconds MRouter Timeout Indicates the amount of the time the Multicast router waits to receive a message before it ...

Page 87: ... divided into two areas Configuring Multicast and Multicast Table The fields are the same for both areas VLAN ID Identifies a VLAN to be configured to a Multicast service Bridge Multicast Address Identifies the Multicast group MAC address IP address Bridge IP Multicast DIsplays the port that can be added to a Multicast service LAG Displays LAG that can be added to a Multicast service The configura...

Page 88: ...Tab Global Parameters The Global Parameters screen contains parameters for defining SNMP notification parameters Local Engine ID Indicates the local device engine ID The field value is a hexadecimal string Each byte in hexadecimal character strings consists of two hexadecimal digits Each byte can be separated by a period or a colon The Engine ID must be defined before SNMPv3 is enabled For stand a...

Page 89: ...the device feature OID included or excluded in the selected SNMP view The options to select the Subtree are as follows Select from List Select the Subtree from the list provided Insert Enables a Subtree not included in the Select from List field to be entered View Type Indicates if the defined OID branch will be included or excluded in the selected SNMP view The Add to List button adds the Views c...

Page 90: ...or the Privacy security levels are assigned to the group Authentication Authenticates SNMP messages and ensures the SNMP messages origin is authenticated Privacy Encrypts SNMP messages Operation Defines the group access rights The possible field values are Read The management access is restricted to read only and changes cannot be made to the assigned SNMP view Write The management access is read ...

Page 91: ...that port authentication is performed via HMAC MD5 96 password authentication SHA Password Indicates that port authentication is performed via HMAC SHA 96 password authentication MD5 Key Indicates that port authentication is performed via the HMAC MD5 algorithm SHA Key Indicates that port authentication is performed via HMAC SHA 96 authentication Password Define the local user password Local user ...

Page 92: ...and contains the following fields Access Mode Defines the access rights of the community The possible field values are Read Only Management access is restricted to read only and changes cannot be made to the community Read Write Management access is read write and changes can be made to the device configuration but not to the community SNMP Admin User has access to all device configuration options...

Page 93: ...ure aspect The Notification Filter screen also allows network managers to filter notifications Filter Name Contains a list of user defined notification filters New Object Identifier Subtree Displays the OID for which notifications are sent or blocked If a filter is attached to an OID traps or informs are generated and sent to the trap recipients Object IDs are selected from either the Select from ...

Page 94: ...ther SNMPv1 2 or SNMPv3 can be enabled at any one time but not both at the same time If SNMPv1 2 is enabled the Community String and Notification Version fields are enabled for configuration Community String Identifies the community string of the trap manager Notification Version Determines the trap type The possible field values are SNMP V1 Indicates SNMP Version 1 traps are sent SNMP V2 Indicate...

Page 95: ... User Authentication screen is used to modify user passwords Authentication Type Defines the user authentication methods Combinations of all the authentication methods can be selected The possible field values are Local Authenticates the user at the device level The device checks the user name and password for authentication RADIUS Authenticates the user at the RADIUS server TACACS Authenticates t...

Page 96: ...er to which the entry refers VLAN Name Displays the VLAN name to which the entry refers Status Displays how the entry was created The possible field values are Permanent The MAC address is permanent Delete on Reset The MAC address is deleted when the device is reset Delete on Timeout The MAC address is deleted when a timeout occurs Secure The MAC Address is defined for locked ports Query Port Spec...

Page 97: ...ters for querying and viewing the Dynamic MAC Address table The Dynamic MAC Address table contains address parameters by which packets are directly forwarded to the ports The Dynamic Address Table can be sorted by interface VLAN and MAC Address Address Aging Specifies the amount of time in seconds the MAC address remains in the Dynamic MAC Address table before it times out if no traffic from the s...

Page 98: ...on generating the message It allows messages to be filtered based on their urgency or relevancy Each message severity determines the set of event logging devices that are sent per each event logging Logging Indicates if device global logs for Cache File and Server Logs are enabled Console logs are enabled by default Emergency The system is not functioning Alert The system needs immediate attention...

Page 99: ...ing ports Target Port Defines the port from which traffic is mirrored Admin Tab Cable Test The Cable Test screen shows you results from performance tests on copper cables The maximum cable length that can be tested is 120 meters Cables are tested when the ports are in the down state except for the Approximate Cable Length test Port This is the port to which the cable is connected Test Result This ...

Page 100: ...ackup the switch configuration via TFTP enter the TFTP server address TFTP Server Specifies the TFTP Server IP Address to which the Configuration file will be saved Destination File Specifies the name of the configuration file The default is StartupCfg cfg Via HTTP This HTTP Firmware Upgrade screen is used for saving configuration information using your Web browser Upgrade Select this option to up...

Page 101: ... IP Address from which files are downloaded Source File Name Specifies the file to be downloaded Destination File name Specifies the destination file type to which to the file is downloaded The possible field values are Software Image Downloads the Image file Boot Code Downloads the Boot file Admin Tab Reboot The Reboot screen resets the device The device configuration is automatically saved befor...

Page 102: ...le range is 1 to 65535 The default value is 514 Facility Defines a user defined application from which system logs are sent to the remote server Only one facility can be assigned to a single server If a second facility level is assigned the first facility is overridden All applications defined for a device utilize the same facility on a server The field default is Local 7 The possible field values...

Page 103: ...e log severity Description Displays the log message text Admin Tab Flash Logs The Flash Log screen contains information about log entries saved to the Log File in FLASH including the time the log was generated the log severity and a description of the log message The Message Log is available after reboot Log Index Displays the log number Log Time Displays the time at which the log was generated Se...

Page 104: ...y capable of carrying terabits of data per second the signaling hardware currently on the market can handle no more than a few gigabits of data per second Fiber cables come with two main connector types The most commonly used fiber optic cable is multi mode fiber cable MMF with a 62 5 micron fiber optic core Single mode fiber cabling is somewhat more efficient than multi mode but far more expensiv...

Page 105: ...tocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shared resources N...

Page 106: ...vided null modem cable from the COM port on your computer to the Console port on the Switch 3 Power on your computer and launch HyperTerminal follow the instructions in Chapter 4 Using the Console Interface for Configuration to configure HyperTerminal to connect to the Switch 4 Power on the Switch and watch for the auto boot message Autoboot in 2 seconds press RETURN or Esc to abort and enter prom...

Page 107: ...ck Browse to locate the file Only valid files with a ros or rfb suffix that have been provided by Linksys can be downloaded Downloading invalid files will result in unpredictable behavior Ensure that the Xmodem protocol is selected in the Protocol field 9 Press Send and the software is downloaded After the software has been downloaded the device will reboot automatically Figure C 3 Download Figure...

Page 108: ...g the device Access to management functions can be limited to user groups which are defined by the following criteria Ingress interfaces Source IP address and or Source IP subnets ACE Filters in Access Control Lists ACL that determine which network traffic is forwarded An ACE is based on the following criteria Protocol Protocol ID Source Port Destination Port Wildcard Mask Source IP Address Destin...

Page 109: ...outers bind Broadcast domains because routers do not forward broadcast frames Broadcast Storm An excessive amount of broadcast messages simultaneously transmitted across a network by a single port Forwarded message responses are heaped onto the network overloading network resources or causing the network to time out Burst A packet transmission at faster than normal rates Bursts are limited in time...

Page 110: ... amount of time instead of assigning permanent IP addresses DHCP Clients An Internet host using DHCP to obtain configuration parameters such as a network address DHCP Server An Internet host that returns configuration parameters to DHCP clients DNS Domain Name Server The IP address of your ISP s server which translates the names of websites into IP addresses Domain A specific name for a network of...

Page 111: ...d to connect to servers on the World Wide Web HTTPS HyperText Transport Protocol Secure An extension to the standard HTTP protocol that provides confidentiality by encrypting the traffic from the website By default this protocol uses TCP port 443 ICMP Internet Control Message Protocol Allows the gateway or destination host to communicate with the source host For example to report a processing erro...

Page 112: ...nsmits copies of a single packet to multiple ports Network A series of computers or devices connected for the purpose of data sharing storage and or transmission between users NMS Network Management System An interface that provides a method of managing a system OID Object Identifier Used by SNMP to identify managed objects In the SNMP Manager Agent network management paradigm each managed object ...

Page 113: ...andard e mail protocol on the Internet SNMP Simple Network Management Protocol A widely used network monitoring and control protocol SSH Secure Shell A utility that uses strong authentication and secure communications to log in to another computer over a network SSL Secure Socket Layer Encryption technology for the Internet used to provide secure transactions such as the transmission of credit car...

Page 114: ...mizes port usage by linking a group of ports together to form a single trunk aggregated groups TX Rate Transmission Rate UDP User Data Protocol Communication protocol that transmits packets but does not guarantee their delivery Upgrade To replace existing software or firmware with a newer version Upload To transmit a file over a network URL Uniform Resource Locator The address of a file located on...

Page 115: ... Manual setting Cabling Type UTP CAT 5 or better for 10BASE T 100BASE TX LEDs 10 100 Link Act Speed System Performance Switching Capacity 1 6 Gig non blocking Forwarding Rate 1 19 Mpps wire speed performance Layer 2 MAC table size 8K Number of VLANs 256 active VLANs 4096 range VLAN Port based and 802 1Q Tag based VLANs Management VLAN HOL Blocking Head of line blocking prevention ...

Page 116: ...8 RADIUS Client MIB RFC 1215 Traps RMON Embedded Remote Monitoring RMON software agent supports four RMON groups history statistics alarms and events for enhanced traffic management monitoring and analysis Firmware Upgrade Web Browser upgrade HTTP and TFTP Port Mirroring Traffic on a port can be mirrored to another port for analysis with a network analyzer or RMON probe Other Management Traceroute...

Page 117: ...in up to 8 groups Storm Control Broadcast Muticast and Unknown Unicast Spanning Tree IEEE 802 1D Spanning Tree IEEE 802 1w Rapid Spanning Tree IEEE 802 1s Multiple Spanning Tree IGMP Snooping IGMP v1 v2 snooping provides for fast client joins and leaves of multicast streams and limits bandwidth intensive video traffic to only the requestors Support 256 multicast groups QoS Priority levels 4 Hardwa...

Page 118: ...2 3 ad LACP 802 1D STP 802 1Q p VLAN 802 1w Rapid STP 802 1s Multiple STP 802 1x Port Access Authentication Environmental Dimensions 11 x 1 75 x 6 69 279 4 mm x 44 45 mm x 170 mm Unit Weight 2 20 lbs 1 kg Power External AC Power Adapter Certifications FCC Part15 Class A CE Class A UL cUL CE mark CB Operating Temp 0ºC to 40ºC 32ºF to 104ºF Storage Temp 20ºC to 70ºC 4ºF to 158ºF Operating Humidity 1...

Page 119: ...5e or better for 1000BASE T LEDs 10 100 Link Act Giga Link Act Speed miniGBIC Link Act Speed System Performance Switching Capacity 5 6 Gig non blocking Forwarding Rate 4 17 Mpps wire speed performance Layer 2 MAC table size 8K Number of VLANs 256 active VLANs 4096 range VLAN Port based and 802 1Q Tag based VLANs Management VLAN HOL Blocking Head of line blocking prevention Management Web User Inte...

Page 120: ...ed traffic management monitoring and analysis Firmware Upgrade Web Browser upgrade HTTP and TFTP Port Mirroring Traffic on a port can be mirrored to another port for analysis with a network analyzer or RMON probe Other Management Traceroute Secure Socket Layer SSL Secure Shell SSH RADIUS port mirroring TFTP upgrade SSL security for Web UI DHCP Client BootP SNTP Xmodem upgrade Cable Diagnostics PIN...

Page 121: ...E 802 1s Multiple Spanning Tree IGMP Snooping IGMP v1 v2 snooping provides for fast client joins and leaves of multicast streams and limits bandwidth intensive video traffic to only the requestors Support 256 multicast groups QoS Priority levels 4 Hardware queues Scheduling Priority Queueing and Weighted Round Robin WRR Class of Service Port based 802 1p VLAN priority based IPv4 v6 IP Precedence T...

Page 122: ... p VLAN 802 1w Rapid STP 802 1s Multiple STP 802 1x Port Access Authentication Environmental Dimensions 11 x 1 75 x 6 69 279 4 mm x 44 45 mm x 170 mm Unit Weight 2 20 lbs 1 kg Power External AC Power Adapter Certifications FCC Part15 Class A CE Class A UL cUL CE mark CB Operating Temp 0ºC to 40ºC 32ºF to 104ºF Storage Temp 20ºC to 70ºC 4ºF to 158ºF Operating Humidity 10 to 90 Non Condensing Storag...

Page 123: ...or better for 1000BASE T LEDs 10 100 Link Act 1 Gig Link Act Speed 1 100LC Link Act System Performance Switching Capacity 3 8 Gig non blocking Forwarding Rate 2 8 Mpps wire speed performance Layer 2 MAC table size 8K Number of VLANs 256 active VLANs 4096 range VLAN Port based and 802 1Q Tag based VLANs Management VLAN HOL Blocking Head of line blocking prevention Management Web User Interface Buil...

Page 124: ...affic management monitoring and analysis Firmware Upgrade Web Browser upgrade HTTP and TFTP Port Mirroring Traffic on a port can be mirrored to another port for analysis with a network analyzer or RMON probe Other Management Traceroute Secure Socket Layer SSL Secure Shell SSH RADIUS port mirroring TFTP upgrade SSL security for Web UI DHCP Client BootP SNTP Xmodem upgrade Cable Diagnostics PING Tel...

Page 125: ...2 1s Multiple Spanning Tree IGMP Snooping IGMP v1 v2 snooping provides for fast client joins and leaves of multicast streams and limits bandwidth intensive video traffic to only the requestors Support 256 multicast groups QoS Priority levels 4 Hardware queues Scheduling Priority Queueing and Weighted Round Robin WRR Class of Service Port based 802 1p VLAN priority based IPv4 v6 IP Precedence TOS D...

Page 126: ... p VLAN 802 1w Rapid STP 802 1s Multiple STP 802 1x Port Access Authentication Environmental Dimensions 11 x 1 75 x 6 69 279 4 mm x 44 45 mm x 170 mm Unit Weight 2 20 lbs 1 kg Power External AC Power Adapter Certifications FCC Part15 Class A CE Class A UL cUL CE mark CB Operating Temp 0ºC to 40ºC 32ºF to 104ºF Storage Temp 20ºC to 70ºC 4ºF to 158ºF Operating Humidity 10 to 90 Non Condensing Storag...

Page 127: ...tter for 10BASE T 100BASE TX UTP CAT 5e or better for 1000BASE T LEDs 10 100 Link Act POE 2 Gig Link Act Speed System POE 802 3af compliant Supply up to IEEE Standard maximum of 15 4W on 8 10 100 ports Performance Switching Capacity 5 6 Gig non blocking Forwarding Rate 4 17Mpps wire speed performance Layer 2 MAC table size 8K Number of VLANs 256 active VLANs 4096 range VLAN Port based and 802 1Q T...

Page 128: ...S Client MIB RFC 1215 Traps Private POE MIB RMON Embedded Remote Monitoring RMON software agent supports four RMON groups history statistics alarms and events for enhanced traffic management monitoring and analysis Firmware Upgrade Web Browser upgrade HTTP and TFTP Port Mirroring Traffic on a port can be mirrored to another port for analysis with a network analyzer or RMON probe Other Management T...

Page 129: ... 3ad LACP Up to 8 ports in up to 8 groups Storm Control Broadcast Multicast and Unknown Unicast Spanning Tree IEEE 802 1d Spanning Tree IEEE 802 1w Rapid Spanning Tree IEEE 802 1s Multiple Spanning Tree IGMP Snooping IGMP v1 v2 snooping limits bandwidth intensive video traffic to only the requestors Support 256 multicast groups QoS Priority levels 4 Hardware queues Scheduling Priority Queueing and...

Page 130: ... Control 802 3 ad LACP 802 3af POE 802 1d STP 802 1Q p VLAN 802 1w Rapid STP 802 1s Multiple STP 802 1x Port Access Authentication Environmental Dimensions 11 x 1 75 x 6 69 279 4 mm x 44 45 mm x 170 mm Unit Weight 2 65 lbs 1 2 kg Power External AC Power Adapter Certifications FCC Part15 Class A CE Class A UL cUL CE mark CB Operating Temp 0ºC to 40ºC 32ºF to 104ºF Storage Temp 20ºC to 70ºC 4ºF to 1...

Page 131: ...LEDs 10 100 Link Act POE 2 Giga Link Act Speed System POE 802 3af complaint Supply up to IEEE Standard maximum of 15 4W on 4 10 100 ports or up to 7 5W on 8 10 100 ports Performance Switching Capacity 5 6 Gig non blocking Forwarding Rate 4 17Mpps wire speed performance Layer 2 MAC table size 8K Number of VLANs 256 active VLANs 4096 range VLAN Port based and 802 1Q Tag based VLANs Management VLAN H...

Page 132: ...s history statistics alarms and events for enhanced traffic management monitoring and analysis Firmware Upgrade Web Browser upgrade HTTP and TFTP Port Mirroring Traffic on a port can be mirrored to another port for analysis with a network analyzer or RMON probe Other Management Traceroute Secure Socket Layer SSL Secure Shell SSH RADIUS port mirroring TFTP upgrade SSL security for Web UI DHCP Clien...

Page 133: ... Spanning Tree IEEE 802 1s Multiple Spanning Tree IGMP Snooping IGMP v1 v2 snooping provides for fast client joins and leaves of multicast streams and limits bandwidth intensive video traffic to only the requestors Support 256 multicast groups QoS Priority levels 4 Hardware queues Scheduling Priority Queueing and Weighted Round Robin WRR Class of Service Port based 802 1p VLAN priority based IPv4 ...

Page 134: ...02 1Q p VLAN 802 1w Rapid STP 802 1s Multiple STP 802 1x Port Access Authentication Environmental Dimensions 11 x 1 75 x 6 69 279 4 mm x 44 45 mm x 170 mm Unit Weight 2 65 lbs 1 2 kg Power External AC Power Adapter Certifications FCC Part15 Class A CE Class A UL cUL CE mark CB Operating Temp 0ºC to 40ºC 32ºF to 104ºF Storage Temp 20ºC to 70ºC 4ºF to 158ºF Operating Humidity 10 to 90 Non Condensing...

Page 135: ...D WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys b has...

Page 136: ...ed to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance Safety Notices Caution To reduce the risk of fire use only No 26 AWG or larger telecommuni...

Page 137: ...érences reçues y compris celles qui risquent d entraîner un fonctionnement indésirable User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE This document contains important information for users with regards to the proper disposal and recycling of Linksys products Consumers are required to comply with this notice for all electron...

Page 138: ...127 Appendix G Regulatory Information WebView Switches ...

Page 139: ...128 Appendix G Regulatory Information WebView Switches ...

Page 140: ...129 Appendix G Regulatory Information WebView Switches ...

Page 141: ...130 Appendix G Regulatory Information WebView Switches For more information visit www linksys com ...

Page 142: ... with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization department for ob...

Reviews: