background image

95 

 

HTTP Server Status  Displays the current HTTP service status. 
HTTPS Server 

Status 

Displays the current HTTPS service status. 

SNMPv1/v2c Server 

Status 

Displays the current SNMPv1/v2c service status. 

SNMPv3 Server 

Status 

Displays the current SNMPv3 service status. 

SSH Server Status 

Displays the current SSH service status. 

Telnet Server Status  Displays the current Telnet service status. 

 

6.5.

 

Storm Control 

6.5.1.

 

Alarm Threshold 

When the selected packet rate is over the alarm threshold, the Switch will send syslog 

alarm to syslog server. 

 

6.5.1.1.

 

Web Configuration 

 

 

Parameter  Description 

Alarm Threshold Settings 

State 

Select  option to enable / disable the alarm threshold feature on the 

Switch. 

Summary of Contents for NGI-S04C2

Page 1: ...1...

Page 2: ...This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communication Operation o...

Page 3: ...re that no exposed portion of the DC input power source wire extends from the terminal block plug Ethernet cables must be shielded when used in a central office environment If a redundant power system...

Page 4: ...t at the bottom of the rack If the rack is provided with stabilizing devices install the stabilizers before mounting or servicing the unit in the rack This unit might have more than one power supply c...

Page 5: ...area can be accessed only through the use of a special tool lock and key or other means of security No user serviceable parts inside Do not open This equipment must be grounded Never defeat the ground...

Page 6: ...N 28 4 2 1 2 WEB CONFIGURATION 29 4 2 2 LOOP DETECTION CONFIGURATION 30 4 2 2 1 CLI CONFIGURATION 31 4 2 2 2 WEB CONFIGURATION 32 4 2 3 PORT PRIORITY 34 4 2 3 1 CLI CONFIGURATION 34 4 2 3 2 WEB CONFIG...

Page 7: ...WITCH MANAGEMENT 71 5 3 2 QUICK CONFIGURATION MENU 72 5 3 2 1 IP CONFIGURATION 73 5 3 2 2 LOOP DETECTION CONFIGURATION 74 5 3 2 3 PORT CONFIGURATION 75 5 3 2 4 PORT MIRROR CONFIGURATION 76 5 3 2 5 POR...

Page 8: ...T STATISTICS 108 7 3 1 CLI CONFIGURATION 108 7 3 2 WEB INFORMATION 108 7 4 PORT UTILIZATION 109 7 4 1 CLI CONFIGURATION 109 7 4 2 WEB PORT UTILIZATION 109 7 5 SYSLOG 110 7 5 1 CLI CONFIGURATION 110 7...

Page 9: ...NFIGURATION 126 8 3 SNTP 126 8 3 1 CLI CONFIGURATION 127 8 3 2 WEB CONFIGURATION 129 8 4 SYSTEM INFORMATION 131 8 4 1 CLI CONFIGURATION 131 8 4 2 WEB CONFIGURATION 131 8 5 SYSTEM MAINTENANCE 132 8 5 1...

Page 10: ...SFP slots to satisfy new and evolving network demands In addition the switch contains dual power inputs to ensure reliability and maximize network up time Other integrated features of the switch inclu...

Page 11: ...r Control Storm Control VLAN Setting Diagnostic Alarm Information Port Mirroring Port Statistics Port Utilization and Threshold Remote System Log Syslog Management SNMP v1 v2c v3 SNMP trap SNTP Firmwa...

Page 12: ...r Zero Overload current protection Support Power reverse polarity protection Support Relay output One with current carrying capacity of 1A 24V DC Power consumption 10W system Mechanical Dimension W x...

Page 13: ...into the ports and the ports will adjust according to the end node devices The following are recommended cabling for the RJ45 connectors 1 10Mbps Cat 3 or better 2 100 1000Mbps Cat 5e or better SFP S...

Page 14: ...l mounted or wall mounted optional in cabinet or enclosure 3 2 Installation The location chosen for installing the Switch may greatly affect its performance When selecting a site we recommend consider...

Page 15: ...t the device straight up to unhook it from the DIN rail Wall Mount Installation Location The NGI S04C2 can be placed on a horizontal surface through wall mounted kit Place the switch by using mounting...

Page 16: ...The product should be mounted in an Industrial Control Panel and the ambient temperature should not exceed 60 C 140 F Attention A corrosion free mounting rail is advisable When installing make sure t...

Page 17: ...ng the wiring can overheat causing serious damage to your equipment Please read and follow these guidelines Use separate paths to route wiring for power and devices If power wiring and device wiring p...

Page 18: ...rrect power supply voltage is listed on the product label Check the voltage of your power source to make sure that you are using the correct voltage Do NOT use a voltage greater than what is specified...

Page 19: ...al block PWR 4 pin mini DIN connector is not available RPS Green Illuminated Redundant secondary Power on Off Redundant secondary Power off or failure ALM Red Illuminated Alarm for following condition...

Page 20: ...ant power input from terminal block ON Redundant power alarm reporting is enabled OFF Redundant power alarm reporting is disabled Warning Do not block air ventilation holes as heat dissipated pass thr...

Page 21: ...and subsequent steps after plug in 4 1 Wizard Settings Wizard will be use full to configure basic settings in the device like switch User account with host name management IP And access Mode The Wizar...

Page 22: ...the management IP user can select DHCP mode or static mode to configure the switch IP as shown below Step 3 Access Mode is to access the device have 2 options Security mode HTTPs SSH and SNMPv3 and No...

Page 23: ...lt Username admin Password admin After successful completion of the settings the web link will take you to the Topology Map as landing page shown below where you can access the Dashboard Login and Inf...

Page 24: ...for the end users tricolor scheme as the Topology Map The dashboard setting enables you to control the performance of the switch like CPU Memory Port Tx Usage Port Rx Usage Use the learn option to obt...

Page 25: ...itical percentage or disable the feature Memory Usage User can configure threshold value to normal alert critical percentage or disable the feature Port Tx Usage User can configure threshold value to...

Page 26: ...sly Typically once a party begins receiving a signal it must wait for the transmitter to stop transmitting before replying Full Duplex A full duplex or sometimes double duplex system allows communicat...

Page 27: ...ed speed and duplex mode when making a connection thus requiring you to make sure that the settings of the peer port are the same in order to connect Flow Control A concentration of traffic on a port...

Page 28: ...scription for the specific port interface no description This command configures the default port description interface cable test This command diagnostics the Ethernet cable and shows the broken dist...

Page 29: ...or port s Flow Control User can configure flow control on interface on off Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh Port Status Port...

Page 30: ...overy When the loop detection is enabled the Switch will send one probe packets every two seconds and then wait for this packet If it receives the packet at the same port the Switch will disable this...

Page 31: ...command enables the port It can unblock port blocked by loop detection interface loop detection recovery disable enable This command enables disables the recovery function on the port interface loop...

Page 32: ...uard protection State Select Enable to use the loop guard feature on the Switch Loop Recovery Select Enable to reactivate the port automatically after the designated recovery time has passed Recovery...

Page 33: ...op guard feature is enabled Status This field displays if the port is blocked Loop Recovery This field displays if the loop recovery feature is enabled Recovery Time min This field displays the recove...

Page 34: ...This command configures the 802 1p priority mapping to the service queue to default configure qos mode high first This command configures the QoS scheduling mode to high_first each hardware queue wil...

Page 35: ...Priority Status Port This field displays a port number Priority This field displays the priority for a port 4 3 Ring Configuration 4 3 1 ERPS Introduction The ITU T G 8032 Ethernet Ring Protection Swi...

Page 36: ...controlled e g for blocking or flushing by the Ethernet ring protection control process ERP control process of only one Ethernet ring Each major ring or sub ring must have its own RPL In an Ethernet...

Page 37: ...he expiry of a WTR timer which is used to avoid toggling protection states in case of intermittent defects In non revertive operation the traffic channel continues to use the RPL if it is not failed a...

Page 38: ...enter ERPS node to configure detail ring configurations erps ring show This command displays the configurations of the ring erps ring control vlan This command configures a control vlan for the ERPS r...

Page 39: ...new instance and specifies its control vlan and data vlan config erps inst no instance INSTANCE_ID This command removes an instance config erps inst show This command displays all of the instance con...

Page 40: ...from 5 to 12 min MEL Configures the Control MEL for the ring The Valid value is from 0 to 7 The default is 7 Guard Timer Configures the Guard time for the ring The Valid value is from 10 to 2000 ms Le...

Page 41: ...eb Configuration Parameter Description Instance Settings Instance Configures the instance ID The valid value is from 1 to 31 Control VLAN Configures the control vlan for the instance The valid value i...

Page 42: ...hat causes a topology change first notifies the root bridge and then the root bridge notifies the network Both RSTP and STP flush unwanted learned addresses from the filtering database In STP the port...

Page 43: ...is value according to the speed of the bridge The slower the media the higher the cost How STP Works After a bridge determines the lowest cost spanning tree with STP it enables the root port and the p...

Page 44: ...port receiving and sending data normal operation STP still monitors incoming BPDUs that would indicate it should return to the blocking state to prevent a loop Disabled Not strictly part of STP a net...

Page 45: ...st priority becomes the STA root device However if all devices have the same priority the device with the lowest MAC address will become the root device Port Priority Set the port priority in the swit...

Page 46: ...ds Per port STP state enabled Per port Priority 128 Per port Edge port disabled Per port BPDU filter disabled Per port BPDU guard disabled Per port BPDU Root guard disabled Per port Path Cost depend o...

Page 47: ...command configures the bridge message max age time sec configure no spanning tree max age This command configures the default values for max age time configure spanning tree mode rstp stp This command...

Page 48: ...e enable This command configures enables disables the bpdufilter function for the specific port if range spanning tree bpduguard disable enable This command configures enables disables the bpduguard f...

Page 49: ...eturn to a blocking state otherwise temporary data loops might result The allowed range is 4 to 30 seconds Max Age This is the maximum time in seconds the Switch can wait without receiving a BPDU befo...

Page 50: ...y for this bridge Priority determines the root bridge which in turn determines the Root Hello Time Root Maximum Age and Root Forwarding Delay Pathcost Method Path cost is the cost of transmitting a fr...

Page 51: ...guard function for the specific port Port Status Active The state of the STP function Role The port role Should be one of the Alternated Designated Root Backup None Status The port s status Should be...

Page 52: ...MODBUS TCP supports different types of data format for reading The primary four types of them are Data Access Type Function Code Function Name Note Bit access Physical Discrete Inputs 2 Read Discrete...

Page 53: ...affic passing through your Switch The Switch can perform IGMP snooping on up to 4094 VLANs You can configure the Switch to automatically learn multicast group membership of any VLANs The Switch then p...

Page 54: ...s when the IGMP snooping function is enabled drop Drop all of the unknown multicast packets interface igmp querier mode auto fixed edge This command specifies whether or not and under what conditions...

Page 55: ...ubnet Mask is 255 255 255 0 Default Gateway is 0 0 0 0 4 4 3 1 CLI Configuration Node Command Description enable ping IPADDR c COUNT This command sends an echo request to the destination host The c pa...

Page 56: ...nd configures a DHCP client function for the system Disable Use a static IP address on the switch Enable Renew Use DHCP client to get an IP address from DHCP server Example The procedures to configure...

Page 57: ...is to configure Management VLAN Modbus TCP Settings Modbus TCP State Select option to enable disable the Modbus TCP on the Switch IGMP Snooping Settings IGMP Snooping State Select Enable to activate I...

Page 58: ...ly get an IP address from a DHCP server Click Renew to have the Switch re get an IP address from the DHCP server Select Disable if you want to configure the Switch s IP address manually IP Address Con...

Page 59: ...mation about the connected device If the neighbor device is a Switch which supports Lamungan Management function click the right key of the mouse The menu will be displayed on the screen And then you...

Page 60: ...ound image so that you can identify easily where the switch has been placed Picture To choice a file which you want to display it in the background and the Preview window will display your select imme...

Page 61: ...r to select standard color for the background The Preview window will display your selection Client Switch Management By right clicking on the neighbor non lite switch this menu will appear and can co...

Page 62: ...cation of all devices on the map so that it restores its places after refresh Login Web GUI To log in to the client device web GUI and make necessary changes By right clicking on the neighbor lite swi...

Page 63: ...on the Switch is enabled Tx Interval 30 seconds Tx Hold 4 times Time To Live 120 seconds 5 2 1 1 CLI Configuration Node Command Description enable show lldp This command displays the LLDP configuratio...

Page 64: ...et on the specific port tx only Transmit the LLDP packet on the specific port only rx only Receive the LLDP packet on the specific port 5 2 1 2 Web configuration Parameter Description LLDP Settings St...

Page 65: ...gistration of lamungan device type like ipcam plc switch pc configure no lamungan device mac This command is delete configure of manual registration lamungan device using mac of ipcam plc switch pc co...

Page 66: ...roduct Name User can configure name of the product selected for manual registration System Name User can configure the system name for the manual registration Apply Click Apply to take effect the sett...

Page 67: ...ONVIF device gets connect to it 5 2 3 1 CLI Configuration Node Command Description enable show onvif neighbors This command displays the onvif neighbor discovery configure onvif enable This command i...

Page 68: ...resh Click Refresh to begin configuring this screen afresh ONVIF Neighbor Information Port The connected port of the ONVIF device IP Address The IP address of the ONVIF device MAC Address The MAC addr...

Page 69: ...creen If the neighbor device is a Switch which supports Lamungan server function click the right key of the mouse The menu will be displayed on the screen And then you can click an item which you want...

Page 70: ...ails of the devices connected to the host by placing the cursor on it When there is something wrong with the device the screen will appear as shown so that you can find the details of events that have...

Page 71: ...as shown Non Lite Switch Menu Save All Device Locations To fix the location of all devices on the map so that it restores its places after refresh Login Web GUI To log in to the client device web GUI...

Page 72: ...By right clicking on the neighbor lite management switch this menu will appear and you can configure as shown By right clicking on the neighbor switch only lite management switches this menu will appe...

Page 73: ...Pv4 address for your Switch in dotted decimal notation For example 192 168 0 254 Subnet Mask Configures a IP subnet mask of your Switch in dotted decimal notation for example 255 255 255 0 Default Gat...

Page 74: ...configure loop detection State Select option to enable disable the loop detection feature on port s Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this scree...

Page 75: ...e port State Select option to enable disable the port Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh Port Status Port This field displays t...

Page 76: ...the Switch Source Port Selects a port which packets received and transmitted by this port will be copied to the destination port Destination Port Select a port which connects to a network traffic anal...

Page 77: ...h to begin configuring this screen afresh Port Priority Status Port This field displays a port number Priority This field displays the priority for a port 5 3 2 6 Storm Control Configuration Parameter...

Page 78: ...the port 5 3 2 7 Save Configuration Parameter Description Save Configuration Save Configuration Click Save Configuration to save the current running configuration to the NVRAM 5 3 2 8 Save All Device...

Page 79: ...With 802 1X port based authentication the supplicant provides credentials such as user name password or digital certificate to the authenticator and the authenticator forwards the credentials to the a...

Page 80: ...2 1x port the switch assigns clients to a guest VLAN when the switch does not receive a response to its EAP request identity frame or when EAPOL packets are not sent by the client Port Parameters Admi...

Page 81: ...mand displays the current user accounts for the local authentication enable show dot1x accounting record This command displays the local accounting records configure dot1x authentication disable enabl...

Page 82: ...eq 1 10 This command sets the max req times of a port 1 10 interface dot1x port control auto force authorized force unauthorized This command configures the port control mode on the port interface dot...

Page 83: ...elf to authenticate However only a certain number of accounts can exist at one time RADIUS is a security protocol used to authenticate users by means of an external server instead of an internal devic...

Page 84: ...ry Radius Server is down Global Status State This field displays if 802 1x authentication is Enabled or Disabled Authentication Method This field displays if the authentication method is Local or RADI...

Page 85: ...n Select In to drop only incoming packets on the port when a user has not passed 802 1x port authentication Re authentication Specify if a subscriber has to periodically re enter his or her user name...

Page 86: ...thentication settings back to default Apply Click Apply to add modify the settings Refresh Click Refresh to begin configuring this screen afresh Port Status Port This field displays the port number 80...

Page 87: ...rules the system will do the actions deny deny means rejecting these packets The Action Resolution engine collects the information action and metering results from the hit entries if more than one rul...

Page 88: ...nd configures the ether type for the profile Where the STRING is a hex decimal value e g 08AA acl no ethertype This command removes the limitation of the ether type from the profile acl source mac hos...

Page 89: ...to filter a range of MAC in the packets source MAC or destination MAC For Example source mac 00 01 02 03 04 05 ff ff ff ff 00 The command will filter source MAC range from 00 01 02 03 00 00 to 00 01 0...

Page 90: ...f the source MAC of the packets that you want to filter If the Source MAC field has been configured and this field is empty it means the profile will filter the one MAC configured in Source MAC field...

Page 91: ...address of the device directly connected to a particular port and allow traffic through We will ask the question How do we control who and how many can connect to a switch port This is where port sec...

Page 92: ...his command enables disables the global port security function interface port security disable enable This command enables disables the port security function on the specific port interface port secur...

Page 93: ...SH and Telnet service individually 6 4 1 CLI Configuration Node Command Description enable show server status This command displays the current server status configure ssh server This command enables...

Page 94: ...tate Selects Enable or Disable to enable or disable the SNMPv1 v2c service SNMPv3 Server State Selects Enable or Disable to enable or disable the SNMPv3 service SSH Server State Selects Enable or Disa...

Page 95: ...Pv3 service status SSH Server Status Displays the current SSH service status Telnet Server Status Displays the current Telnet service status 6 5 Storm Control 6 5 1 Alarm Threshold When the selected p...

Page 96: ...s Destination Lookup Failure or DLF packets the Switch receives per second on the ports When the maximum number of allowable broadcast multicast and unknown unicast packets is reached per second the s...

Page 97: ...igure the packet rate in pps to allow on interfaces Disable for 0 and ranges 1 5000 Type Click the check box to select Multicast Broadcast DLF storm control Apply Click Apply to take effect the settin...

Page 98: ...a VLAN with all Ethernet ports If it does not form a VLAN with a particular port then the Switch cannot be managed from that port 6 6 1 1 CLI Configuration Node Command Description enable show port i...

Page 99: ...it will communicate with the port currently being configured Select All Deselect All Click Select All to mark all ports as egress ports and permit traffic Click Deselect All to unmark all ports and i...

Page 100: ...contains two bytes of TPID Tag Protocol Identifier residing within the type length field of the Ethernet frame and two bytes of TCI Tag Control Information starts after the source address field of th...

Page 101: ...of the VLAN The switch is further responsible for ensuring that ports in a different VLAN do not receive the information This approach is quite simple fast and easy to manage in that there are no com...

Page 102: ...phabet or hyphens or underscores _ The maximum length of the name is 16 characters vlan no name This command configures the vlan name to default Note The default vlan name is VLAN vlan_ID VLAN1 VLAN2...

Page 103: ...ble VLAN s are 5 vlan range 1 4 This command will allow user to create VLAN range maximum allowed VLAN s are 5 vlan range add PORTLISTS This command adds a port or a range of ports to the vlans vlan r...

Page 104: ...ber to configure from the drop down box Select All to configure all ports at the same time Role Select role on interface as access or trunk VLAN User can configure maximum of 5 VLAN s on each interfac...

Page 105: ...ill send alarm message when the redundant power supply disconnect 7 1 1 CLI Command Node Command Description enable show alarm info This command displays alarm information 7 1 2 Web Configuration Para...

Page 106: ...w mirror This command displays the current port mirroring configurations configure mirror disable enable This command disables enables the port mirroring on the switch configure mirror destination por...

Page 107: ...et the common settings and then make adjustments on a port by port basis Source Port Selects a port to monitor packets received and transmit or both Monitor Mode Select a port to monitor as destinatio...

Page 108: ...Information Parameter Description Port Select a port or a range of ports to display their statistics Rx Packets The field displays the received packet count Tx Packets The field displays the transmitt...

Page 109: ...utilization Example L2SWITCH show port utilization Port Speed Utilization 9 100 0 001 7 4 2 Web Port Utilization Parameter Description Port Utilization Port The field displays the port ID Speed The fi...

Page 110: ...ies If the file is full the oldest one will be replaced 7 5 1 CLI Configuration Node Command Description enable show syslog The command displays all of log message recorded in the Switch enable show s...

Page 111: ...erver when any new log message occurred Apply Click Apply to add modify the settings Refresh Click Refresh to begin configuring this screen afresh Log Level Select Alert Critical Error Warning Notice...

Page 112: ...erface 1 0 4 This command enters the interface configure node interface port utilization threshold rate value This command configures the port utilization threshold value interface port utilization th...

Page 113: ...alarm threshold for the port s Packet Rate Configures the threshold rate When the port packet rate over the threshold the Switch will send trap and syslog Apply Click Apply to take effect the setting...

Page 114: ...cations 8 1 1 SNMP configuration Allows user to enable and disable SNMP protocol globally By default SNMP state will be disabled User can change the system name with respect to their requirement also...

Page 115: ...y parameters of SNMP clients in an SNMP v1 and SNMP v2c environments The default SNMP community is public for both SNMP v1 and SNMP v2c Network ID of Trusted Host The IP address is a combination of th...

Page 116: ...vice the SNMP agent The community string is included in every packet that is transmitted between the SNMP manager and the SNMP agent Rights Select Read Only to allow the SNMP manager using this string...

Page 117: ...disable enable This command enables disables the alarm over heat trap configure snmp trap event alarm over load disable enable This command enables disables the alarm over load trap configure snmp tr...

Page 118: ...Trap when system is over load Trap when system power is over voltage under voltage RPS over voltage RPS under voltage BPDU Guard Loop Detection Port Admin State Change Port Link Change STP Topology C...

Page 119: ...nterface snmp port link change trap This command enables the link change trap on the specific port interface no snmp port link change trap This command disables the link change trap on the specific po...

Page 120: ...er IPADDR VERSION COMMUNITY String This command configures the trap receiver s configurations including the IP address version v1 or v2c and community String 8 1 5 2 Web Configuration Parameter Descri...

Page 121: ...curity and the view based access control model VACM for access control USM specifies authentication and encryption 8 2 1 SNMPv3 Group 8 2 1 1 CLI Configuration Node Command Description enable show snm...

Page 122: ...ifications to members of the group default value is none Notify View By using a notify view a group determines the list of notifications its users can receive default value is none Apply Click Apply t...

Page 123: ...mmand changes the node to configure node configure snmp user USERNAME GROUPNAME noauth Configurs v3 user of non authentication configure snmp user USERNAME GROUPNAME auth MD5 SHA STRINGS Configurs v3...

Page 124: ...not encrypted priv means messages are authenticated and encrypted Auth Algorithm Select MD5 or SHA Algorithm when security level is auth or priv Auth Password Set the password for this user when secur...

Page 125: ...MPv3 View 8 2 3 1 CLI Configuration Node Command Description enable show snmp view This command displays all snmp v3 view enable configure terminal This command changes the node to configure node conf...

Page 126: ...h to begin configuring this screen afresh View Status View Name This field displays the v3 view name View Subtree This field displays the subtree View Type This field displays the subtree adding to th...

Page 127: ...e time server s IP address is not configured the Switch will not send any SNTP request packets 4 If no SNTP reply packets the Switch will retry every 10 seconds forever 5 If the Switch has received SN...

Page 128: ...third fourth last Sunday Monday Tuesday Wednesday Thursday Friday Saturday MONTH HOUR This command sets the start time of the Daylight Saving Time configure time daylight saving time end date first s...

Page 129: ...nter the system date and time manually New Time Enter the new date in year month and day format and time in hour minute and second format The new date and time then appear in the Current Date and Curr...

Page 130: ...an Union start using Daylight Saving Time at the same moment 1 A M GMT or UTC So in the European Union you would select Last Sunday 3 March and the last field depends on your time zone In Germany for...

Page 131: ...window appears each time you log into the program Alternatively this window can be accessed by clicking System Information 8 4 1 CLI Configuration Node Command Description enable show model This comm...

Page 132: ...efresh Click Refresh to begin configuring this screen afresh 8 5 System Maintenance 8 5 1 Configuration Upload and Download Configuration 8 5 1 1 CLI Configuration Node Command Description configure w...

Page 133: ...the current configurations to local host Reset Configuration Click the Reset button to reset the system configurations to default values 8 5 2 Firmware Upgrade Firmware 8 5 2 1 CLI Configuration Node...

Page 134: ...to create up to 6 user accounts The username and password should be the combination of the digits or the alphabet The last admin user account cannot be deleted Users should input a valid user account...

Page 135: ...be the combination of digits and the alphabet The last admin user account cannot be deleted The maximum length of the username and password is 32 characters 8 6 1 CLI Configuration Node Command Descr...

Page 136: ...and write or normal read only for this user account Dot1x user for radius Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh User Account List...

Page 137: ...cally TRIPP LITE is not liable for any costs such as lost profits or revenue loss of equipment loss of use of equipment loss of software loss of data costs of substitutes claims by third parties or ot...

Page 138: ...ll be required to correct the interference at his own expense The user must use shielded cables and connectors with this equipment Any changes or modifications to this equipment not expressly approved...

Reviews: