MicroNet SP1678A User Manual Download Page 74

 

 

73 

 

3.19.11 Ping 

Ping Test function is a tool for detecting if the target device is alive or not through ICMP protocol which 

abounds with report messages. The switch provides Ping Test function to let you know that if the target device 

is available or not. You can simply fill in a known IP address and then click <Ping> button. After a few seconds 

later, the switch will report you the pinged device is alive or dead in the field of Ping Result. 

 

 

 

 

3.20 TFTP  Server 

Specify the IP address where the TFTP server locates. Fill in the IP address of your TFTP server, then press 

<Apply> button to have the setting taken effect. 

 

 

 

 

3.21   Log 

This function shows the log data. The switch provides system log data for users. There are 19 private trap logs, 

5 public trap logs. It displays the log items including all SNMP Private Trap events, SNMP Public traps and 

user logs occurred in the system. In the report table, No., Time and Events are three fields contained in each 

trap record. The switch supports total 120 log entries. For more details on log items, please refer to the section 

of Trap/Alarm Configuration and SNMP Configuration.   

 

Parameter description: 

y

 

No.: 

Display the order number that the trap happened. 

y

 

Time: 

Display the time that the trap happened. 

y

 

Events: 

Display the trap event name.   

Summary of Contents for SP1678A

Page 1: ...User s Manual 10 100M Management Switch Model No SP1678A H0http www micronet info...

Page 2: ...33 9 3 PVID H 12331 H 343 9 4 Port based Group H 12433 H 353 9 5 Management VLAN H 12534 H 363 10 MAC TABLE H 12634 H 373 10 1 MAC Table Information H 12734 H 383 10 2 MAC Table Maintenance H 12835 H...

Page 3: ...5 T Type TOS H 16768 H 783 19 6 R Type TOS H 16869 H 793 19 7 M Type TOS H 16970 H 803 19 8 DSCP Setting H 17071 H 813 19 9 Diagnostics H 17172 H 823 19 10 Loopback Test H 17272 H 833 19 11 Ping H 173...

Page 4: ...er auto sense y Support IEEE 802 3ad port trunking with flexible load distribution and failover function y Support IEEE802 1q tag based VLAN IEEE 802 1q in q nested VLAN and 802 1p Class of Service wi...

Page 5: ...ection remote devices is good Link Off Connection not good LEDSET on ACT mode Blink any traffic is present LEDSET on FDX mode Blink any collision is present ACT FDX SPD Amber LEDSET on SPD mode Light...

Page 6: ...to the bottom of the switch to keep the switch from slipping The recommend position has been square marked 2 2 Rack mount Installation The switch may standalone or may be mounted in a standard 19 inc...

Page 7: ...P module Gigabit Fiber with single mode LC SFP module Gigabit Fiber with BiDi LC 1310nm SFP module Gigabit Fiber with BiDi LC 1550nm SFP module y Connecting the SFP Module to the Chassis The optional...

Page 8: ...when power on even modules as well After the power is on all LED indicators will light up immediately and then all off except the power LED still keeps on This represents a reset of the system y Firm...

Page 9: ...rs using administrator s identity the switch will allow the only one who logins first to configure the system The rest of users even with administrator s identity can only monitor the system For those...

Page 10: ...the front panel the linked ports will display green as to the ports which are link off they will be dark For the optional modules the slot will show only a cover plate if no module exists and will sh...

Page 11: ...1 System Information Show the basic system information Parameter description y Model name The model name of this device y System description As it is this tells what this device is Here it is 3 Slot 2...

Page 12: ...ON or OFF the function The switch supports DHCP client used to get an IP address automatically if you set this function Enable When enabled the switch will issue the request to the DHCP server resided...

Page 13: ...NTP is a well known protocol used to synchronize the clock of the switch system time over a network NTP an internet draft standard formalized in RFC 1305 has been adopted on the system is version 3 pr...

Page 14: ...ased one hour after one minute at the time since it passed over And when the time passes over the ending time the system time will be decreased one hour after one minute at the time since it passed ov...

Page 15: ...ser account is Username admin Password admin The default setting for guest user account is Username guest Password guest 3 3 5 Management Policy Through the management security configuration the manag...

Page 16: ...ou choose Deny action you will be restricted and refused to manage the switch due to the Access Type you choose However while you select Accept action you will have the authority to manage the switch...

Page 17: ...ill fail to manage them via telnet console web individually Up to 16 devices can be grouped for VSM however only one Master is allowed to exist in each group For Master redundancy user may configure m...

Page 18: ...it will show Down This is determined by the hardware on both devices of the connection No default value y State Show that the communication function of the port is Enabled or Disabled When it is enab...

Page 19: ...lf duplex In port 25 and port 26 if the media is 1000Mbps with TP SFP media it will show the combinations of 10 100M and Full Half duplex 1000Mbps and Full duplex only If the media is 1000Mbps with fi...

Page 20: ...f the naming by module manufacturer y Vendor Rev Revision Display the module revision y Vendor SN Serial Number Show the serial number assigned by the manufacturer y Date Code Show the date this SFP m...

Page 21: ...is always 1000Mbps and the duplex is full only If the media is TP the Speed Duplex is comprised of the combination of speed mode 10 100 1000Mbps and duplex mode full duplex and half duplex The followi...

Page 22: ...rs for the port description purpose Default Empty 3 4 4 Simple Counter The function of Simple Counter collects any information and provides the counting about the traffic of the port no matter the pac...

Page 23: ...The valid range is 3 to 10 seconds The Refresh Interval is used to set the update frequency Default update time is 3 seconds Parameter description y Rx Packets The counting number of the packet receiv...

Page 24: ...frames 64 Bytes with valid CRC y Rx Oversize Number of long frames according to max_length register with valid CRC y Rx Fragments Number of short frames 64 bytes with invalid CRC y Rx Jabber Number of...

Page 25: ...y name and IP address is user definable To set up a trap host means to create a trap manager by assigning an IP address to host the trap message In other words the trap host is a network management un...

Page 26: ...n Loop Detection will remove the looping status It is very convenient for looping happening in real networking environment After any setting you done please click the Apply button to have the setting...

Page 27: ...is Disable 3 8 IGMP Snooping The function IGMP Snooping is used to establish the multicast groups to forward the multicast packet to the member ports and in nature avoids wasting the bandwidth while...

Page 28: ...e of the Multicast table By the way this also reduces the unnecessary multicast traffic Passive In Passive Snooping mode the IGMP snooping will not periodically poll the hosts in the groups The switch...

Page 29: ...nge is 1 4094 y Port The switch supports two kinds of options for managed valid port range including Any and Custom Default is Any You can select the ports that you would like them to be worked and re...

Page 30: ...ss Rule Rule 1 The Ingress Filtering Rule 1 is forward only packets with VID matching this port s configured VID For example if port 1 receives a tagged packet with VID 100 VLAN name VLAN100 and if Sy...

Page 31: ...button Parameter description y VLAN Name The name defined by administrator is associated with a VLAN group Valid letters are A Z a z 0 9 and _ characters The maximal length is 15 characters y VID VLA...

Page 32: ...the setting taken effect y Delete Group Just press the Delete button to remove the selected group entry from the Tag based group table y Edit a group Just select a group entry and press the Edit butto...

Page 33: ...priority precedence according to your Default Priority setting and map to 802 1p priority setting in QoS function For example while you set Default Priority of port 2 with 2 and transmit untagged pack...

Page 34: ...h is 15 characters y Member This is used to enable or disable if a port is a member of the new added VLAN Enable means it is a member of the VLAN Just tick the check box beside the port x to enable it...

Page 35: ...c and MAC Alias which cannot be categorized to some function type They are described below 3 10 1 MAC Table Information Display the static or dynamic learning MAC entry and the state for the selected...

Page 36: ...unction can allow the user to set up the processing mechanism of MAC Table An idle MAC address exceeding MAC Address Age out Time will be removed from the MAC Table The range of Age out Time is 10 100...

Page 37: ...on As static is chosen assign a MAC address to a specific port all of the switch s traffics sent to this MAC address will be forwarded to this port As static with destination drop is chosen the packet...

Page 38: ...ish name This will help you tell which MAC address belongs to which user in the illegal access report At the initial time it shows all pairs of the existed alias name and MAC address There are three M...

Page 39: ...et hardware address and usually expressed by hex and separated by hyphens For example 00 3B 11 D6 00 02 y Alias MAC alias name you assign Note If there are too many MAC addresses learned in the table...

Page 40: ...through which ports these members can be reached 3 11 1 GVRP Config In the function of GVRP Config it is used to configure each port s GVRP operation mode in which there are seven parameters needed to...

Page 41: ...es The default setting is Normal Fixed It is Registration Fixed The Registrar ignores all GARP messages and all members remain in the registered IN state Forbidden It is Registration Forbidden The Reg...

Page 42: ...ion Empty Message Packets Number of GARP BPDU with Empty message is received by the GARP application y Transmitted Total GVRP Packets Total GARP BPDU is transmitted by the GVRP application Invalid GVR...

Page 43: ...fresh Refresh function can help you to see current GVRP group status 3 12 STP The Spanning Tree Protocol STP is a standardized method IEEE 802 1D for avoiding loops in switched networks When STP is en...

Page 44: ...Age time is assigned by Root Bridge in unit of seconds Default is 20 seconds y Current Forward Delay Show the current root bridge forward delay time The value of Forward Delay time is set by root The...

Page 45: ...communicate with each other The valid value is 1 10 in unit of second Default is 2 seconds y Max Age When the 24 Gigabit L2 managed switch is the root bridge the whole LAN will apply this figure set b...

Page 46: ...e of a port We cannot manually set it because it displays the status only There are three possible states according to 802 1w specification DISCARDING state It indicates that this port can neither for...

Page 47: ...ate port or root port though an edge port will transit to a normal spanning tree port immediately if it receives a BPDU Default No y Admin Point To Point We say a port is a point to point link from RS...

Page 48: ...n be the same with another LACP groupID to form a logic trunked port The benefit of using Static Trunk method is that a port can immediately become a member of a trunk group without any handshaking wi...

Page 49: ...Group ID valid value is from 1 to 3 in order to declare that they wish to aggregate with each other y Active LACP This field is only referenced when a port s trunk method is LACP Active An Active LAC...

Page 50: ...n y Aggregator It shows the aggregator ID from 1 to 24 of every port In fact every port is also an aggregator and its own aggregator ID is the same as its own Port No y Method Show the method a port u...

Page 51: ...cess control provides a method to restrict users to access network resources via authenticating user s information This restricts users from gaining access to the network resources through a 802 1x en...

Page 52: ...lled port will unconditionally pass the packets with PAE group MAC address which has the value of 01 80 c2 00 00 03 and will not be forwarded by MAC bridge at any time Authentication server A device p...

Page 53: ...eceiving the Radius Access Request the authentication server sends Radius Access Challenge to the supplicant for asking for inputting user password via the authenticator PAE 7 The supplicant will conv...

Page 54: ...port control state set in 802 1x port setting Here Entry Authorized means MAC entry is authorized Port Mode Port Control Authentication Port Status Disable Don t Care Don t Care Port Uncontrolled Mul...

Page 55: ...efault is Disable Disable It will have the chosen port acting as a plain port that means no 802 1x port access control working on the port 802 1x with Multi host In Multi host mode for the devices con...

Page 56: ...network through this port once the authenticator is authorized The Port Status will show the following screen If the port is granted to access the network the port status is authorized otherwise unau...

Page 57: ...t to access the supplicant Deafult 60 seconds y reAuthEnabled Choose whether regular authentication will take place in this port Default ON y reAuthPeriod 1 65535 s A non zero number seconds between t...

Page 58: ...mber Added LACP Port Failure y GVRP GVRP Disabled GVRP Enabled y VLAN VLAN Disabled Port based VLAN Enable Tag based VLAN Enable Metro mode VLAN Enabled Double tag VLAN Enabled y Module Swap SEP Inser...

Page 59: ...s that would like to receive the alarm message y SMS y SMS Server the IP address of the server transferring your SMS y Username your username in ISP y Password your username in ISP y Mobile Phone 1 6...

Page 60: ...uration as a start configuration file in flash memory y Save User Save the current configuration as a user configuration file in flash memory y Restore Default Default IP address Retrieve the ex facto...

Page 61: ...is to monitor the traffic of the network For example we assume that Port A and Port B are Monitoring Port and Monitored Port respectively thus the traffic received by Port B will be copied to Port A f...

Page 62: ...ber of this group Just tick the check box beside the port x and valid port is Port 1 26 In this group all of these member ports cannot forward packets with each other Thus the switch will not be capab...

Page 63: ...ort is 1 26 y Rate Set up the limit of Ingress bandwidth for the port you choose Incoming traffic will be discarded if the rate exceeds the value you set up in Data Rate field Pause frames are also ge...

Page 64: ...26 y Rate Set up the limit of Egress bandwidth for the port you choose Packet transmission will be delayed if the rate exceeds the value you set up in Data Rate field Traffic may be lost if egress buf...

Page 65: ...of 1 And only integer is acceptable Default is 100 3 19 QoS Quality of Service Configuration The switch supports 5 kinds of QoS are as follows MAC Priority 802 1p Priority IP TOS Priority and DiffSer...

Page 66: ...ority in egress queue of the switch The QoS functions as we mentioned above are able to enabled at the same time But the following precedence will decide whether these functions work or not 1 enable b...

Page 67: ...0 is 1 the weight of Queue 1 is 2 the weight of Queue 2 is 4 and the weight of Queue 3 is 8 3 19 2 VIP Port Setting When the port is set as VIP Port the packets enter this port and will have highest t...

Page 68: ...o Queue 2 Priority 5 is mapping to Queue 2 Priority 6 is mapping to Queue 3 and Priority 0 is mapping to Queue 3 3 19 4 D Type TOS IP TOS Priority affect TOS fields of IP header you can find it has 8...

Page 69: ...ds of IP header you can find it has 8 bit SERVICE TYPE field that specifies how the datagram should be handled The field could be divided into six subfields as follows PRECEDENCE 3 bits D Type Delay P...

Page 70: ...pe Delay Priority 1 bit T Type Throughput Priority 1bit R Type Reliability Priority 1bit M Type Monetary Cost Priority 1bit and UNUSED PRECEDENCE 3 bits can arrange 8 kinds of priorities corresponding...

Page 71: ...8 kinds of priorities corresponding to the 0 7 priority in the following priority diagram TOS Monetary Cost Priority Mapping works while M TYPE in TOS field of IP header of the packets received by the...

Page 72: ...t unused DSCP can form total 64 0 63 kinds of Traffic Class based on the arrangement of 6 bit field in DSCP of the IP packet In the switch user is allowed to set up these 64 kinds of Class that belong...

Page 73: ...tion there are two different loopback tests One is Internal Loopback Test and the other is External Loopback Test The former test function will not send the test signal outside the switch box The test...

Page 74: ...of your TFTP server then press Apply button to have the setting taken effect 3 21 Log This function shows the log data The switch provides system log data for users There are 19 private trap logs 5 pu...

Page 75: ...to Software Upgrade if you choose Cancel button If your download is not successful the switch will also be back to Software Upgrade and it will not upgrade the software as well When download is comple...

Page 76: ...from the system without the permission If you do not logout and exit the browser the switch will automatically have you logout Besides this manually logout and implicit logout you can pull down the A...

Page 77: ...ed switch are listed below Username admin Password admin After you login successfully the prompt will be shown as if you are the first login person and your authorization is administrator otherwise it...

Page 78: ...tion however it performs displaying the system information in system mode 4 2 Global Command 4 2 1 end Syntax end Description Back to the top mode When you enter this command your current position wou...

Page 79: ...way set dns Set dns enable dhcp Enable DHCP and set dns auto or manual disable dhcp Disable DHCP show Show IP Configuration Global commands exit Back to the previous mode end Back to the top mode help...

Page 80: ...restoring user defined configuration all the changes in the startup configuration would be lost After rebooting the entire startup configuration would replace as user defined one Argument None Possibl...

Page 81: ...etransmit an EAP Request packet to the Supplicant before it times out the authentication session Argument port range syntax 1 5 7 available from 1 to 24 times max times range 1 10 Possible value port...

Page 82: ...sec timer range 0 65535 Possible value port range 1 to 24 sec 0 65535 default is 60 Example FEL2SW 26 802 1x set quiet period 2 30 set reAuthEnabled Syntax set reAuthEnabled port range ebl Description...

Page 83: ...d the Supplicant or Authentication Server The initial value of this timer is either suppTimeout or serverTimeout as determined by the operation of the Backend Authentication state machine Argument por...

Page 84: ...xPeriod Syntax set txPeriod port range sec Description A timer used by the Authenticator PAE state machine to determine when an EAPOL PDU is to be transmitted Argument port range syntax 1 5 7 availabl...

Page 85: ...urity Syntax show security Description To display the authentication status of each port Argument None Possible value None Example FEL2SW 26 802 1x show security Port Mode Status 1 Disable 2 Multi hos...

Page 86: ...EL2SW 26 account del aaaaa Account aaaaa deleted modify Syntax modify name Description To change the username and password of an existing account Argument name existing user account Possible value Non...

Page 87: ...s number range 1 to 6 mail address email address Possible value 1 to 6 Example FEL2SW 26 alarm email set server 192 168 1 6 FEL2SW 26 alarm email set user admin Password Confirm Password FEL2SW 26 ala...

Page 88: ...et sms 1 3 FEL2SW 26 alarm events set email 1 3 FEL2SW 26 alarm events set trap 1 3 FEL2SW 26 alarm events set all 1 3 show Syntax show Description The Show here is used to display the configuration o...

Page 89: ...rname set phone number phone number Description The Set here is used for the configuration of SMS server username password and phone number Argument ip SMS server ip username SMS server account and pa...

Page 90: ...set sms range set email range set trap range set all range Description The Set here is used for the activation of sms email and trap event Argument range syntax 1 5 7 trap number Possible value availa...

Page 91: ...Example FEL2SW 26 alarm show events FEL2SW 26 alarm show email FEL2SW 26 alarm show sms sms del Syntax del Description The Del here is used to remove the configuration of mobile phone number Argument...

Page 92: ...Argument time range 1 to 3600 seconds 0 for autologout off current setting is 180 seconds Possible value time 0 1 3600 Example FEL2SW 26 autologout 3600 Set autologout time to 3600 seconds 4 3 5 bandw...

Page 93: ...ress rate 1 16 200 enable ingress rate Syntax enable ingress rate range data_rate Description To set up the Ingress rate of the ports Argument range syntax 1 5 7 available from 1 to 24 data_rate 0 100...

Page 94: ...isabled 0 Disabled 0 Disabled 0 15 Disabled 0 Disabled 0 Disabled 0 16 Disabled 0 Disabled 0 Disabled 0 17 Disabled 0 Disabled 0 Disabled 0 18 Disabled 0 Disabled 0 Disabled 0 19 Disabled 0 Disabled 0...

Page 95: ...ath filepath and filename Possible value filepath filepath and filename Example FEL2SW 26 config file set export path log 21511 txt set import path Syntax set import path filepath Description To set u...

Page 96: ...one Possible value None Example FEL2SW 26 diag diag EEPROM Test OK UART Test OK DRAM Test OK Flash Test OK loopback Syntax Loopback Description For Internal External Loopback Test Argument None Possib...

Page 97: ...rgument None Possible value None Example FEL2SW 26 firmware show TFTP Server IP Address 192 168 3 111 Path and Filename FEL2SW 26_v2 00 bin gz upgrade Syntax upgrade Description To run the upgrade fun...

Page 98: ...rticipant FEL2SW 26 gvrp group 2 show GVRP group VID 2 Port Applicant Registrar 1 Non Participant Normal 2 Non Participant Normal 3 Non Participant Normal 4 Non Participant Normal 5 Non Participant No...

Page 99: ...e range 1 to 24 normal fixed forbidden normal or fixed or forbidden Example FEL2SW 26 gvrp set registrar 1 5 fixed set restricted Syntax set restricted range enable disable Description To set the rest...

Page 100: ...p set timer 2 8 25 80 2000 show config Syntax show config Description To display the gvrp configuration Argument none Possible value none Example FEL2SW 26 gvrp show config GVRP state Enable Port Join...

Page 101: ...name Syntax hotsname name Description To set up the hostname of the switch Argument name hostname max 128 characters Possible value name hostname max 128 characters Example FEL2SW 26 hostname Company...

Page 102: ...enable dhcp manual Enabled system DHCP function and set DNS server via manual mode set dns Syntax set dns ip Description To set the IP address of DNS server Argument ip dns ip address Possible value...

Page 103: ...To clear the log data Argument None Possible value None Example FEL2SW 26 log clear disable auto upload Syntax disable auto upload Description To disable the auto upload function Argument None Possib...

Page 104: ...alue None Example FEL2SW 26 log upload 4 3 15 mac table alias del Syntax del mac Description To delete the mac alias entry Argument mac mac address format 00 02 03 04 05 06 Possible value mac mac addr...

Page 105: ...AC Table List Alias MAC Address Port VID State 00 11 3B 88 00 06 1 0 Dynamic FEL2SW 26 mac table information show Syntax Show Description To display all mac table information Argument None Possible va...

Page 106: ...lan id 0 1 4094 VID must be zero if vlan mode is not tag based alias mac alias name max 15 characters Possible value mac mac address port 0 24 vid 0 1 4094 alias mac alias name Example FEL2SW 26 mac t...

Page 107: ...8 1 1 192 168 1 90 port 2 5 8 type h s action a Synopsis set name Mary vid 20 ip 192 168 1 1 192 168 1 90 Description To save the adding management policy records Argument name value CL entry name vid...

Page 108: ...2 168 1 90 Description To edit management policy record Argument name value ACL entry name vid value VLAN ID ip value IP Range port value Incoming port type value Access type action value a ccept or d...

Page 109: ...switch can accept Argument range port range syntax 1 5 7 available from 1 to 24 length bytes maximum packet length Possible value range 1 to 24 length bytes 1518 1532 9216 Example FEL2SW 26 max pkt l...

Page 110: ...copied to the monitoring port Argument range the port that is chosen for monitored port of the mirror function syntax 1 5 7 available from 1 to 24 Possible value range 1 to 24 Example FEL2SW 26 mirror...

Page 111: ...24 Example FEL2SW 26 port disable flow control 6 disable state Syntax disable state range Description To disable the communication capability of the port Argument range syntax 1 5 7 available from 1 t...

Page 112: ...port s configuration about state speed duplex and flow control Argument None Possible value None Example FEL2SW 26 port show conf show detail counter Syntax show detail counter range Description To di...

Page 113: ...ilable from 1 to 24 special UDP TCP port selection range 1 10 tcp udp port range 0 65535 default default class all other TCP UDP ports 1 high 0 low match special TCP UDP class 1 high 0 low Possible va...

Page 114: ...diffserv classification Possible value port pri_tag tos layer4 diffserv Example FEL2SW 26 qos set mode port set port Syntax set port range class Description To set class of ports on port based qos Ar...

Page 115: ...ption To set class of ports on IP TOS qos Argument port range port range syntax 1 5 7 available from 1 to 24 tos range tos precedence field syntax 1 5 7 available from 0 to 7 class class of service se...

Page 116: ...SW 26 reboot snmp disable Syntax disable set ability disable snmp Description The Disable here is used for the de activation of snmp or set community Argument None Possible value None Example FEL2SW 2...

Page 117: ...W 26 snmp show SNMP Enable Get Community public Set Community private Enable Trap Host 1 IP Address 192 168 1 1 Port 162 Community public Trap Host 2 IP Address 0 0 0 0 Port 162 Community public Trap...

Page 118: ...Priority 0 to 61440 Hello Time 1 to 10 Max Age 6 to 40 Forward Delay 4 to 30 Example FEL2SW 26 stp set config 61440 2 20 15 set port Syntax set port range path cost priority edge_port admin p2p Descri...

Page 119: ...in Point To Point 1 DISCARDING 2000000 128 No Auto 2 DISCARDING 2000000 128 No Auto 3 DISCARDING 2000000 128 No Auto 4 DISCARDING 2000000 128 No Auto 5 DISCARDING 2000000 128 No Auto 6 DISCARDING 2000...

Page 120: ...the switch Argument contact string length up to 40 characters Possible value contact A b c d z and 1 2 3 etc Example FEL2SW 26 system set contact Taipei set device name Syntax set device name device n...

Page 121: ...RAM Size 16 M Flash Size 2 M 4 3 24 tftp set server Syntax set server ip Description To set up the IP address of tftp server Argument ip the IP address of tftp server Possible value ip tftp server ip...

Page 122: ...m Minute 00 59 ss Second 00 59 Possible value YYYY 2000 2036 MM 01 12 DD 01 31 hh 00 23 mm 00 59 ss 00 59 Example FEL2SW 26 time set manual 2004 12 23 16 18 00 FEL2SW 26 time set ntp Syntax set ntp ip...

Page 123: ...y Argument range available from 1 to 65535 Possible value range 1 to 65535 default 32768 Example FEL2SW 26 trunk set priority 33333 FEL2SW 26 trunk set trunk Syntax set trunk port range method group a...

Page 124: ...System Priority MAC Address System Priority MAC Address 32768 00 11 3B e8 00 02 32768 00 00 00 00 00 00 Port Key Trunk Status Port Key 2 257 2 0 show lacp priority Syntax show lacp priority Descriptio...

Page 125: ...oup Argument vid which vlan group you want to delete available from 1 to 4094 Possible value vid 1 to 4094 Example FEL2SW 26 vlan del tag group 2 disable drop untag Syntax disable drop untag range Des...

Page 126: ...t metro mode vlan double tag enable Q in Q function up link syntax 1 5 7 available from 23 to 24 only for metro mode vlan Possible value disable port tag metro double tag disable port tag metro double...

Page 127: ...vlan group members syntax 1 5 7 available from 1 to 24 sym asym vlan setting 1 symmetric vlan 0 asymmetric vlan Possible value vid 1 to 4094 range 1 to 24 0 or 1 Example FEL2SW 26 vlan set tag group...

Page 128: ...Access 2 1 Disable Disable Access 3 5 Disable Disable Access 4 1 Disable Disable Access 5 5 Enable Disable Hybrid 6 5 Enable Disable Access 7 5 Enable Disable Access 8 5 Enable Disable Access 9 1 Enab...

Page 129: ...ster slave Description To set role Argument master slave master act as master slave act as slave Possible value master slave master or slave Example FEL2SW 26 vs set role master show Syntax show Descr...

Page 130: ...Single mode LC mini GBIC module Filtering Forwarding Rate 10Mbps 14 880pps 14 880pps 100Mbps 148 800pps 148 800pps 1000Mbps 1 488 000pps 1 488 000pps Switching Mechanism Store and Forward Key Features...

Page 131: ...pported MIB 2 RFC 1213 Interface MIB Address Translation MIB IP MIB ICMP MIB TCP MIB UDP MIB SNMP MIB Bridge MIB RFC 1493 RMON MIB RFC 1757 statistics Statistics Group 1 History Group 2 Alarm Group 3...

Reviews: