background image

 

 

 

Summary of Contents for NGI-S05C2POE4

Page 1: ...1 ...

Page 2: ...nce to radio communication Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at the user s own expense This is a Class A product In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures Take special care to read and ...

Page 3: ...tion to people and damage to the system Before performing any of the following procedures ensure that power is removed from the DC circuit Read the installation instructions before connecting the system to the power source To prevent bodily injury when mounting or servicing this unit in a rack you must take special precautions to ensure that the system remains stable The following guidelines are p...

Page 4: ...id using such interconnection methods unless the exposed metal parts are located within a restricted access location and users and service people who are authorized within the restricted access location are made aware of the hazard A restricted access area can be accessed only through the use of a special tool lock and key or other means of security No user serviceable parts inside Do not open Thi...

Page 5: ...URATION 26 4 3 2 PD ALIVE CHECK 27 4 3 2 1 CLI CONFIGURATION 28 4 3 2 2 WEB CONFIGURATION 28 4 3 3 POWER DELAY 29 4 3 3 1 CLI CONFIGURATION 29 4 3 3 2 WEB CONFIGURATION 31 4 3 4 POE SCHEDULE 32 4 3 4 1 CLI CONFIGURATION 32 4 3 4 2 WEB CONFIGURATION 33 4 4 PORT SETTINGS 34 4 4 1 PORT CONFIGURATION 35 4 4 1 1 CLI CONFIGURATION 35 4 4 1 2 WEB CONFIGURATION 37 4 4 2 LOOP DETECTION 38 4 4 2 1 CLI CONFI...

Page 6: ...63 5 NETWORK TOPOLOGY 65 5 1 MAP SETTINGS 66 5 1 1 CLI CONFIGURATION 66 5 1 2 WEB CONFIGURATION 67 5 2 NEIGHBOR DEVICES 70 5 2 1 LLDP 70 5 2 1 1 CLI CONFIGURATION 70 5 2 1 2 WEB CONFIGURATION 71 5 2 2 MANUAL REGISTRATION 72 5 2 2 1 CLI CONFIGURATION 72 5 2 2 2 WEB CONFIGURATION 73 5 2 3 ONVIF 74 5 2 3 1 CLI CONFIGURATION 74 5 2 3 2 WEB CONFIGURATION 75 5 3 TOPOLOGY MAP 77 5 3 1 CLIENT SWITCH MANAG...

Page 7: ... 107 6 5 2 1 CLI CONFIGURATION 107 6 5 2 2 WEB CONFIGURATION 108 6 6 VLAN 109 6 6 1 PORT ISOLATION 109 6 6 1 1 CLI CONFIGURATION 109 6 6 1 2 WEB CONFIGURATION 110 6 6 2 VLAN 111 6 6 2 1 CLI CONFIGURATION 112 6 6 2 2 WEB CONFIGURATION 114 7 DIAGNOSTIC 115 7 1 ALARM 115 7 1 1 CLI CONFIGURATION 115 7 1 2 WEB CONFIGURATION 115 7 2 PORT MIRROR 115 7 2 1 CLI CONFIGURATION 115 7 2 2 WEB CONFIGURATION 116...

Page 8: ...LI CONFIGURATION 134 8 2 1 2 WEB CONFIGURATION 134 8 2 2 SNMPV3 USER 135 8 2 2 1 CLI CONFIGURATION 135 8 2 2 2 WEB CONFIGURATION 136 8 2 3 SNMPV3 VIEW 137 8 2 3 1 CLI CONFIGURATION 137 8 2 3 2 WEB CONFIGURATION 138 8 3 SNTP 138 8 3 1 CLI CONFIGURATION 139 8 3 2 WEB CONFIGURATION 140 8 4 SYSTEM INFORMATION 143 8 4 1 CLI CONFIGURATION 143 8 4 2 WEB CONFIGURATION 143 8 5 SYSTEM MANAGEMENT 144 8 5 1 C...

Page 9: ...d wide operating temperatures from 10 to 60 14 F to 140 F Switch features 5 10 100 1000Base T ports and two 100FX Gigabit SFP slots to satisfy new and evolving network demands In addition the switch is built with dual power inputs to ensure reliability and maximize network up time With 4 IEEE 802 3at compliant ports the switch provides up to 30W per port to meet the growing demand of higher power ...

Page 10: ... LLDP ONVIF Topology Map Ethernet Interface 10 100 1000Base T interfaces Auto negotiation and Auto MDI MDI X Flow control of half duplex back pressure Flow control of full duplex Security 802 1X Radius ACL Port Security Server Control Storm Control VLAN Setting Diagnostic Alarm Information Port Mirroring Port Statistics Port Utilization and Threshold Remote System Log Syslog Management SNMP v1 v2c...

Page 11: ...uffer size 4 1Mbit MAC table size 8k Jumbo Frame Size 10k Throughput 1 488 000pps when 1000Mbps speed Physical ports 10 100 1000Base T PSE 4 10 100 1000Base T RJ45 1 100Base FX Gigabit SFP slots 2 Power Input Voltage Primary input 24 57VDC at a maximum of 6A 2 pin Terminal block Redundant input 24 57VDC at a maximum of 6A 4 pin mini DIN connector Connection Removable 2 pin terminal block One 4 pin...

Page 12: ... Temperature 10 to 60 14 F to 140 F Storage Temperature 40 to 75 40 F to 167 F Operating Humidity 5 to 95 RH non condensing Storage Humidity 5 to 95 RH non condensing Altitude Up to 2000 m 6561 ft IEC Indoor use and pollution degree II ...

Page 13: ...the ports will adjust according to the end node devices The following are recommended cabling for the RJ45 connectors 1 10Mbps Cat 3 or better 2 100 1000Mbps Cat 5e or better SFP Slots for SFP Modules The two SFP slots are designed to 100FX Gigabit SFP modules that support network speed of 100 1000Mbps 3 2 Installation The location chosen for installing the Switch may greatly affect its performanc...

Page 14: ... mounting installation Location The NGI S05C2POE4 can be DIN Rail mounted in cabinet or enclosure Mounting the Switch Place the NGI S05C2POE4 on the DIN rail from above using the slot and push the front of the switch toward the mounting surface until it snaps into place with a click sound Dismounting the Switch Pull out the lower edge of the switch and then remove the switch from the DIN rail Wall...

Page 15: ...th ground to adequately ground the chassis and protect the operator from electrical hazards Attention The product should be mounted in an Industrial Control Panel and the ambient temperature should not exceed 60 C 140 F Attention A corrosion free mounting rail is advisable When installing make sure to allow for enough space to properly install the cabling Wiring Power Inputs You can use Terminal B...

Page 16: ... the intersection point NOTE Do not run signal or communications wiring and power wiring through the same wire conduit To avoid interference wires with different signal characteristics should be routed separately You can use the type of signal transmitted through a wire to determine which wires should be kept separate The rule of thumb is that wiring that shares similar electrical characteristics ...

Page 17: ... well as Port LEDs to display what is happening in all your connections They are as follows System LEDs PWR Illuminated Power on Off Power off or failure Interface LEDs SFP port 6 7 Illuminated Ethernet link up Blinking Activity receiving or transmitting data Off Port disconnected or link failed PoE 1 4 Copper Port Illuminated Supplying power to PD Off No any power supply to PD Port Number 1 5 Cop...

Page 18: ...Operation is subject to the following conditions 1 This device may not cause harmful interference 2 This device must accept any interference received including interference that may cause undesired operation ATTENTION If the equipment is used in a manner not specified by the Tripp Lite the protection provided by the equipment may be impaired ...

Page 19: ...and subsequent steps after plug in 4 1 Wizard Settings Wizard will be use full to configure basic settings in the device like switch User account with device name management IP And access Mode The Wizard assisted interface covers the basic requirements for most end users to set up the Ethernet switch in these three steps 1 Account 2 IP address 3 Access Mode Step 1 Account Settings to configure use...

Page 20: ...20 Step 2 IPAddress is to configure the management IP user can select DHCP mode or static mode to configure the switch IP as shown below ...

Page 21: ...H and SNMPv3 and Normal mode HTTPs SSH SNMPv3 HTTP TELNET and SNMPv1 v2 Default Username admin Password admin After successful completion of the settings the web link will take you to the Topology Map as landing page shown below where you can access the Dashboard Login and Information ...

Page 22: ...scription Port Registration Learn Learn This field is to obtain the port registration information Reset Reset option to reset the port registration information Port Link Down Statistics Port User can select individual port or all ports information to reset to default on registration information Download This field will download the statistics of port down information along with date time Critical ...

Page 23: ... disable the feature Port Tx Usage User can configure threshold value to normal alert critical percentage of the interface Tx usage or disable the feature Port Rx Usage User can configure threshold value to normal alert critical percentage of the interface Rx usage or disable the feature Apply Click Apply to take effect the settings Default This field will make above settings to default value ...

Page 24: ...ll in active use PSE Power sourcing equipment PSE is a device such as a switch that provides sources power on the Ethernet cable PD A powered device PD is a device such as an access point or a switch that supports PoE Power over Ethernet so that it can receive power from another device through a 10 100 Mbps Ethernet port 24V 48V Total PoE power budget 128W 240W Vin Power Input 24 57VDC 48 57VDC Vo...

Page 25: ...hanges the node to configure node configure poe disable enable This command disables or enables the global PoE for the Switch configure poe total power This command configures the total power which the Switch can support configure poe total power This command configures the total power which the Switch can support configure interface IFNAME This command enters the interface configure node interfac...

Page 26: ...of ports which to configure loop detection State Selects Enable to enable the PoE function on the specific port Selects Disable to disable the PoE function on the specific port LLDP Alloc PoE Power is allocated by LLDP MED Priority Selects Critical High Low priority for the specific port Max Power Limit Interface wise PoE power budget can be configured with respect to requirement Maximum Power Lim...

Page 27: ...witch will check the configurations of every port If the port s state is enabled the Switch will send keep a live probe packet every interval time If the host cannot respond when the keep a live probe packet count is over the retry times the Switch performs the action reboot alarm all to the Power Device depending on the port s configuration Power OFF Time sec When PD has been rebooted the PoE por...

Page 28: ...alarm all none This command configures the action when the system detects that the host cannot respond the keep a live probe packet interface pd alive interval 10 120 This command configures the interval to send the keep a live probe packets to check if the host is still alive for the specific port interface pd alive ip IP_ADDR This command configures the Host IP address which connects to the spec...

Page 29: ...Click Refresh to begin configuring this screen afresh 4 3 3 Power delay The Power Delay allows the user to setting the delay time of power providing after device rebooted Notice The high priority port should have low value for power delay 4 3 3 1 CLI Configuration Node Command Description enable show poe power delay This command displays the PoE power delay configurations enable configure terminal...

Page 30: ...30 Power Delay for the range of ports ...

Page 31: ...Selects a port or a range of ports which you want to configure State Enables Disables the PoE Power Delay for the specific ports Time The delay time for the specific ports Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh ...

Page 32: ...erval between Start time and End Time the Switch will not send power to the port 4 3 4 1 CLI Configuration Node Command Description enable show poe schedule port PORT_ID This command displays the PoE port schedule configurations enable configure terminal This command changes the node to configure node configure interface IFNAME This command enters the interface configure node interface poe schedul...

Page 33: ...led Week Select a week day that you want to configure the schedule Check Enables or Disables the PoE schedule on the specific port for a defined time period Action Selects action enable disable for the specific port for a particular day or week Time Hour User can configure the PoE Schedule time from 0 to 24 hrs Apply Click Apply to take effect the settings Refresh Click Refresh to begin configurin...

Page 34: ... at the same time Loopback Test A loopback test is a test in which a signal in sent from a communications device and returned looped back to it as a way to determine whether the device is working right or as a way to pin down a failing node in a network One type of loopback test is performed using a special plug called a wrap plug that is inserted in a port on a communications device The effect of...

Page 35: ...d a pause signal to the sending port causing it to temporarily stop sending signals when the receiving port memory buffers fill Back Pressure flow control is typically used in half duplex mode to send a collision signal to the sending port mimicking a state of packet collision causing the sending port to temporarily stop sending signals and resend later Note 1000 Base T does not support force mode...

Page 36: ...nd configures a description for the specific ports if range no description This command configures the default port description for the specific ports if range shutdown This command disables the specific ports if range no shutdown This command enables the specific ports if range speed auto 10 full 10 full n 10 half 10 half n 100 full 100 full n 100 half 100 half n 1000 full 1000 full n This comman...

Page 37: ... configure flow control on interface on off Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh Port Status Port This field displays the index number of a port State This field displays the state of a port Speed Duplex This field displays the speed duplex of a port Flow Control Display the status on the flow control on interface on off Link S...

Page 38: ...he loop detection is enabled the Switch will send one probe packets every two seconds and then wait for this packet If it receives the packet at the same port the Switch will disable this port After the time period recovery time the Switch will enable this port and do loop detection again The Switch generates syslog internal log messages as well as SNMP traps when it shuts down a port via the loop...

Page 39: ...and disables enables the loop detection on the port interface no shutdown This command enables the port It can unblock port blocked by loop detection interface loop detection recovery disable enable This command enables disables the recovery function on the port interface loop detection recovery time 1 60 This command configures the recovery period time configure interface range gigabitethernet1 0...

Page 40: ...onfigure loop guard protection State Select Enable to use the loop guard feature on that particular port of the Switch Recovery State Select Enable to reactivate the port automatically after the designated recovery time has passed Recovery Time min Specify the recovery time in minutes that the Switch will wait before reactivating the port This can be between 1 to 60 minutes Apply Click Apply to sa...

Page 41: ...ays if the port is blocked Manual Recovery If the port is blocked by loop detection you can click Unblock to recovery it manually Recovery State This field displays if the loop recovery feature is enabled Recovery Time min This field displays the recovery time for the loop recovery feature ...

Page 42: ...hanges the node to configure node configure interface IFNAME This command enters the interface configure node interface default priority 0 7 This command allows the user to specify a default priority handling of untagged packets received by the Switch The priority value entered with this command will be used to determine which of the hardware priority queues the packet is forwarded to Default 0 in...

Page 43: ...ange of ports on which to configure the priority Priority Select a priority for packets received by the port Only packets without 802 1p priority tagged will be applied the priority you set here Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh ...

Page 44: ...rk that consists of conjoined Ethernet rings by one or more interconnection points The protection switching mechanisms and protocol defined in this Recommendation shall be applicable for a multi ring ladder network if the following principles are adhered to R APS channels are not shared across Ethernet ring interconnections on each ring port each traffic channel and each R APS channel are controll...

Page 45: ...nel is restored to the working transport entity i e blocked on the RPL In the case of clearing of a defect the traffic channel reverts after the expiry of a WTR timer which is used to avoid toggling protection states in case of intermittent defects In non revertive operation the traffic channel continues to use the RPL if it is not failed after a switch condition has cleared Control VLAN The pure ...

Page 46: ...lan for the ERPS ring erps ring guard timer 10 2000 This command configures the Guard Timer for the ERPS ring default 500ms erps ring holdoff timer 0 10000 This command configures the Hold off Timer for the ERPS ring default 0 ms erps ring left port PORTID type owner neighbor norm al This command configures the left port and type for the ERPS ring erps ring mel 0 7 This command configures a Contro...

Page 47: ...he revertive mode Instance Configures the instance for the ring The Valid value is from 0 to 30 0 Disable means the ERPS is running in version 1 The control VLAN of the instance should be same as below Control VLAN Control VLAN Configures the Control VLAN which is the ERPS control packets domain for the ring Version Configures the version for the ring Hold off Timer Configures the Hold off time fo...

Page 48: ...fect the settings Refresh Click Refresh to begin configuring this screen afresh ERPS Ring Status Ring ID The ring ID Ring Name The ring name State The ring state Revertive The ring revertive mode Control VLAN The ring Control VLAN Version The protocol version on the ring Hold off Timer The Hold off time WTR Timer The WTR time MEL The Control MEL Guard Timer The Guard time Left Port The left port L...

Page 49: ...d configures a new instance and specifies its control VLAN and data VLANs config erps inst no instance 1 2 This command removes an instance config erps inst show This command displays all of the instance configurations 4 5 1 2 2 Web Configuration Parameter Description Instance Settings Instance Configures the instance ID The valid value is from 1 to 30 Control VLAN Configures the control VLAN for ...

Page 50: ...enerates the topology change In STP a longer delay is required as the device that causes a topology change first notifies the root bridge and then the root bridge notifies the network Both RSTP and STP flush unwanted learned addresses from the filtering database In STP the port states are Blocking Listening Learning Forwarding In RSTP the port states are Discarding Learning and Forwarding Note In ...

Page 51: ...dia the higher the cost How STP Works After a bridge determines the lowest cost spanning tree with STP it enables the root port and the ports that are the designated ports for connected LANs and disables all other ports that participate in STP Network packets are therefore only forwarded between enabled ports eliminating any possible network loops STP aware switches exchange Bridge Protocol Data U...

Page 52: ...a port 802 1w RSTP In 1998 the IEEE with document 802 1w introduced an evolution of the Spanning Tree Protocol Rapid Spanning Tree Protocol RSTP which provides for faster spanning tree convergence after a topology change Standard IEEE 802 1D 2004 now incorporates RSTP and obsoletes STP While STP can take 30 to 50 seconds to respond to a topology change RSTP is typically able to respond to changes ...

Page 53: ... be blocked by STP if a network loop is detected BPDU Guard This is a per port setting If the port is enabled in BPDU guard and receive any BPDU the port will be set to disable to avoid the error environments User must enable the port by manual BPDU Filter It is a feature to filter sending or receiving BPDUs on a switch port If the port receives any BPDUs the BPDUs will be dropped Notice If both o...

Page 54: ...o time configure no spanning tree algorithm timer This command configures the default values for forward time max age hello time configure spanning tree forward time 4 30 This command configures the bridge forward delay time sec configure no spanning tree forward time This command configures the default values for forward time configure spanning tree max age 6 40 This command configures the bridge...

Page 55: ...ay time in seconds the Switch will wait before changing states This delay is required because every switch must receive information about topology changes before it starts to forward frames In addition each port needs time to listen for conflicting information that would make it return to a blocking state otherwise temporary data loops might result The allowed range is 4 to 30 seconds Max Age This...

Page 56: ... switch If all switches have the same priority the switch with the lowest MAC address will then become the root switch Enter a value from 0 61440 The lower the numeric value you assign the higher the priority for this bridge Priority determines the root bridge which in turn determines the Root Hello Time Root Maximum Age and Root Forwarding Delay Pathcost Method Path cost is the cost of transmitti...

Page 57: ...d value range 1 65535 32 bit based value range 1 200000000 interface no spanning tree cost This command configures the path cost to default for the specific port interface spanning tree port priority 0 240 This command configures the port priority for the specific port Default 128 interface no spanning tree port priority This command configures the port priority to default for the specific port co...

Page 58: ... port 4 5 2 2 2 Web Configuration Parameter Description STP Port Settings Port Selects a port that you want to configure Path Cost Configures the path cost for the specific port Priority Configures the priority for the specific port Edge Port Configures the port type for the specific port Edge or Non Edge BPDU Filter Enables Disables the BPDU filter function for the specific port BPDU Guard Enable...

Page 59: ...signated Root Backup None Status The port s status Should be one of the Discarding Blocking Listening Learning Forwarding Disabled Path Cost The port s path cost Priority The port s priority Edge Port The state of the edge function BPDU Filter The state of the BPDU filter function BPDU Guard The state of the BPDU guard function ROOT Guard The state of the BPDU Root guard function ...

Page 60: ... supports different types of data format for reading The primary four types of them are Data Access Type Function Code Function Name Note Bit access Physical Discrete Inputs 2 Read Discrete Inputs Not support now Internal Bits or Physical Coils 1 Read Coils Not support now Word access 16 bit access Physical Input Registers 4 Read Input Registers Physical Output Registers 3 Read Holding Registers N...

Page 61: ... that send IGMP packets Alternatively you can specify the VLANs that IGMP snooping should be performed on This is referred to as fixed mode In fixed mode the Switch does not learn multicast group membership of any VLANs other than those explicitly added as an IGMP snooping VLAN IGMP Snooping VLAN State Users can enable disable the IGMP Snooping on the Switch Users also can enable disable the IGMP ...

Page 62: ...e s parameter allow user to specific the packet size Valid range 0 1047 bytes enable ping IPADDR c COUNT s SIZE This command sends an echo request to the destination host The c parameter allow user to specific the packet count The default count is 4 The s parameter allow user to specific the packet size Valid range 0 1047 bytes enable ping IPADDR s SIZE c COUNT This command sends an echo request t...

Page 63: ...terminal L2SWITCH config To enter the ETH0 interface node L2SWITCH config interface eth0 L2SWITCH config if To get an IP address from a DHCP server L2SWITCH config if ip dhcp client enable To configure a static IP address and a gateway for the Switch L2SWITCH config if ip address 192 168 202 111 24 L2SWITCH config if ip address default gateway 192 168 202 1 4 6 1 5 Web Configuration Parameter Desc...

Page 64: ...elete and enter VLANs on which to have the Switch not perform IGMP snooping Unknown Multicast Packets Specify the action to perform when the Switch receives an unknown multicast frame Select Drop to discard the frame s Select Flooding to send the frame s to all ports IPv4 Settings DHCP Client Select Enable to allow the Switch to automatically get an IP address from a DHCP server Click Renew to hav...

Page 65: ...bor device When move the mouse indicator on the Device icon it will display a few information about the connected device If the neighbor device is a Switch which supports Lamungan Management function click the right key of the mouse The menu will be displayed on the screen And then you can click an item which you want to configure the Switch NOTE The topology map can be viewed on Google Chrome Mic...

Page 66: ...displays the Topology Map settings enable configure terminal This command changes the node to configure node configure topology map color HHHHHH This command configures the background color for the Topology Map configure topology map picture FILENAME This command configures the background picture for the Topology Map configure interface IFNAME This command enters the interface configure node inter...

Page 67: ...ound image so that you can identify easily where the switch has been placed Picture To choose a file which you want to display it in the background and the Preview window will display your select immediately If you click the Upgrade button the file will be downloaded to the Switch and take effect immediately ...

Page 68: ...P format and its file size cannot be larger than 80 KB If you have download a picture before and then you want to download a new one The new one will update the old one Color Select the color for the background of the Topology Map Default Clicks the Default button the background will be reset to white color background Apply Click Apply to take effect the settings Refresh Click Refresh to begin con...

Page 69: ...picture for the device ICON remapping The picture should be in GIF PNG JPG BMP format and its file size cannot be larger than 40 KB Preview To display your configurations and then make decision if apply your configurations ...

Page 70: ...ormation to be accessed by a Network Management System NMS using a management protocol such as the Simple Network Management Protocol SNMP Default Settings The LLDP on the Switch is enabled Tx Interval 30 seconds Tx Hold 4 times Time To Live 120 seconds 5 2 1 1 CLI Configuration Node Command Description enable show lldp This command displays the LLDP configurations enable show lldp neighbor This c...

Page 71: ... message TTL tx hold tx interval Time To Live The hold time for the Switch s information Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh LLDP Neighbor Information Local Port The local port ID Remote Port ID The connected port ID Chassis ID The neighbor s chassis ID System Name The neighbor s system name System Description The neighbor s s...

Page 72: ...ommand changes the node to configure node configure manual registration device type ipcam plc switch pc mac MACADDR ip IPADDR product name STRINGS system name STRINGS This command configures a device for the Topology Map configure no manual registration device mac MACADDR This command removes a device from the Topology Map Example L2SWITCH config manual registration device type switch mac 18 31 bf...

Page 73: ...s of the device IP The IP address of the device Product Name The product name of the device System Name The system name of the device Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh Manual Registration Table Type The kind of devices connected to the Switch MAC Address The MAC address of the device IP The IP address of the device Product N...

Page 74: ...o 10 ONVIF devices connected to it If one or more ONVIF devices are connected to the same port it displays the last ONVIF device gets connect to it 5 2 3 1 CLI Configuration Node Command Description enable show onvif This command displays the ONVIF configurations enable configure terminal This command changes the node to configure node config onvif enable This command enables the ONVIF on the Swit...

Page 75: ... Switch Tx Interval Configures the sending ONVIF discovery packet interval Valid range is 6 3600 seconds Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh ONVIF Neighbor Information Port The connected port of the ONVIF device IP Address The IP address of the ONVIF device ...

Page 76: ...AN ID The VLAN ID of the ONVIF device join Product Name Name of the product added Product Type What kind of product that is added Model Model of the product Location Location where it is placed Web Service Address Address of the web service of that camera ...

Page 77: ...screen If the neighbor device is a Switch which supports Lamungan server function click the right key of the mouse The menu will be displayed on the screen And then you can click an item which you want to configure the Switch Note The topology map can be viewed only on Google or Firefox browsers Web Configuration of Topology MAP When you click the Topology Map Lock the screen will appear as below ...

Page 78: ...tails of the devices connected to the host by placing the cursor on it When there is something wrong with the device the screen will appear as shown so that you can find the details of events that have gone wrong and correct them ...

Page 79: ...re as shown Non Lite Switch Menu Save All Device Location To fix the location of all devices on the map so that it restores its places after refresh Login Web GUI To log in to the client device web GUI and make necessary changes By right clicking on the neighbor lite switch this menu will appear and you can configure as shown ...

Page 80: ... By right clicking on the neighbor lite management switch this menu will appear and you can configure as shown By right clicking on the neighbor switch only lite management switches this menu will appear and you can configure as shown ...

Page 81: ...IPv4 address for your Switch in dotted decimal notation For example 192 168 0 254 Subnet Mask Configures a IP subnet mask of your Switch in dotted decimal notation for example 255 255 255 0 Default Gateway Configures an IP address of the default outgoing gateway in dotted decimal notation for example 192 168 1 1 Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuri...

Page 82: ...o configure loop detection State Select option to enable disable the loop detection feature on port s Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh Loop Detection Status Port This field displays a port number State This field displays if the loop detection feature is enabled Status This field displays if the port is blocked by loop dete...

Page 83: ...he port State Select option to enable disable the port Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh Port Status Port This field displays the index number of a port Stata This field displays the state of a port Link Status This field displays the link status of a port ...

Page 84: ... Selects a port which packets received and transmitted by this port will be copied to the destination port Destination Port Select a port which connects to a network traffic analyzer Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh 5 3 2 5 Port Priority Configuration Parameter Description Port Priority Settings ...

Page 85: ...d displays the priority for a port 5 3 2 6 Storm Control Configuration Parameter Description Storm Control Settings Port Select the port number for which you want to configure storm control settings Type Click the check box to enable disable the Multicast Broadcast DLF storm control Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh Storm Co...

Page 86: ...ick Save Configuration to save the current running configuration to the NVRAM 5 3 2 8 Save All Device Location To fix the location of all devices on the topology map so that it restores its places after refresh 5 3 2 9 Save All Device Location To fix the location of all devices on the topology map so that it restores its places after refresh 5 3 2 10 Login Homepage To log in to the client device w...

Page 87: ...assword or digital certificate to the authenticator and the authenticator forwards the credentials to the authentication server for verification If the credentials are valid in the authentication server database the supplicant client device is allowed to access resources located on the protected side of the network Upon detection of the new client supplicant the port on the switch authenticator is...

Page 88: ...e authentication Specify if a subscriber has to periodically re enter his or her user name and password to stay connected to the port Reauth period Specify how often a client has to re enter his or her username and password to stay connected to the port The acceptable range for this field is 0 to 65535 seconds Port Control Mode Auto Users can access network after authenticating Force authorized Us...

Page 89: ...erver ip IP port PORTID This command configures the primary radius server configure dot1x radius primary server ip IP port PORTID key KEY This command configures the primary radius server configure dot1x radius secondary server ip IP port PORTID This command configures the secondary radius server configure dot1x radius secondary server ip IP port PORTID key KEY This command configures the secondar...

Page 90: ... one time RADIUS is a security protocol used to authenticate users by means of an external server instead of an internal device user database that is limited to the memory capacity of the device In essence RADIUS allows you to validate an unlimited number of users from a central location Guest VLAN Configure the guest vlan Primary Radius Server When RADIUS is selected as the 802 1x authentication ...

Page 91: ...cation is Enabled or Disabled Authentication Method This field displays if the authentication method is Local or RADIUS Guest VLAN The field displays the guest vlan Primary Radius Server This field displays the IP address UDP port and shared key for the Primary Radius Server This will be blank if nothing has been set Secondary Radius Server This is the backup server used only when the Primary Radi...

Page 92: ...bles disables the 802 1x on the port interface dot1x default This command sets the port configuration to default settings interface dot1x guest vlan disable enable This command configures the 802 1x state on the port interface dot1x max req 1 10 This command sets the max req times of a port 1 10 interface dot1x port control auto force authorized force unauthorized This command configures the port ...

Page 93: ...n the port when a user has not passed 802 1x port authentication Select In to drop only incoming packets on the port when a user has not passed 802 1x port authentication Re authentication Specify if a subscriber has to periodically re enter his or her user name and password to stay connected to the port Port Control Mode Select Auto to require authentication on the port Select Force Authorized to...

Page 94: ...e settings Refresh Click Refresh to begin configuring this screen afresh Port Status Port This field displays the port number 802 1x State This field displays if 802 1 x authentications is Enabled or Disabled on the port Admin Control Direction This field displays the Admin Control Direction Both will drop incoming and outgoing packets on the port when a user has not passed 802 1x port authenticat...

Page 95: ...matched rule with highest priority Default Settings Maximum profile 64 Maximum profile name length 16 Notice The ACL name should be the combination of the digit or the alphabet 6 2 1 CLI Configuration Node Command Description enable show access list This command displays all of the access control profiles enable configure terminal This command changes the node to configure node configure no access...

Page 96: ...PADDR IPMASK This command configures the destination IP address and mask for the profile acl no destination ip This command removes the destination IP address from the profile acl destination application VALUE This command configures the UDP TCP destination port for the profile acl no destination application This command removes the UDP TCP destination port from the profile acl vlan 1 4094 This co...

Page 97: ...H config acl source interface 1 L2SWITCH config acl show Profile Name 111 Activate disabled VLAN 2 Source Interface 1 Destination MAC Address any Source MAC Address any Ethernet Type any Source IP Address any Destination IP Address any Source Application any Destination Application any Note Any Don t care ...

Page 98: ...N Configures the VLAN of the packets that you want to filter Source MAC Configures the source MAC of the packets that you want to filter Mask of Source MAC Configures the bitmap mask of the source MAC of the packets that you want to filter If the Source MAC field has been configured and this field is empty it means the profile will filter the one MAC configured in Source MAC field Destination MAC ...

Page 99: ...urce IP field Destination IP Configures the destination IP of the packets that you want to filter Mask of Destination IP Configures the bitmap mask of the destination IP of the packets that you want to filter If the Destination IP field has been configured and this field is empty it means the profile will filter the one IP configured in Destination IP field Source Application Configures the source...

Page 100: ...is exceeded incoming packets with new MAC addresses are dropped It can be use MAC table to check it The static MAC addresses are included for the limit Note If you configure a port of the Switch from disabled to enabled all of the MAC learned by this port will be clear Default Settings The port security on the Switch is disabled The Maximum MAC per port is 5 The port state of the port security is ...

Page 101: ...t Security on the port Maximum MAC The maximum number of MAC addresses allowed per interface The acceptable range is 1 to 1000 Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh Port Security Status Port This field displays a port number State This field displays if Port Security is Enabled or Disabled Maximum MAC This field displays the max...

Page 102: ...s the HTTPS service on the Switch configure no https server This command disables the HTTPS service on the Switch configure http server restart This command restart the HTTP server If you have changed HTTP service state or TCP port of the HTTP server you should run this command to let them take effects configure snmpv1 v2c This command enables the SNMPv1 v2c service on the Switch configure no snmp...

Page 103: ... SNMPv1 v2c service SNMPv3 Server State Selects Enable or Disable to enable or disable the SNMPv3 service SSH Server State Selects Enable or Disable to enable or disable the SSH service Telnet Server State Selects Enable or Disable to enable or disable the Telnet service Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh Server Status HTTP S...

Page 104: ...us Displays the current SNMPv1 v2c service status SNMPv3 Server Status Displays the current SNMPv3 service status SSH Server Status Displays the current SSH service status Telnet Server Status Displays the current Telnet service status ...

Page 105: ...onfigure node configure bandwidth limit egress 0 62500 ports PORTLISTS This command enables the bandwidth limit for outgoing packets and set the limitation configure no bandwidth limit egress ports PORTLISTS This command disables the bandwidth limit for outgoing packets configure bandwidth limit ingress 0 62500 ports PORTLISTS This command enables the bandwidth limit for incoming packets and set t...

Page 106: ...e alarm threshold State Selects Enable Disable the alarm threshold for the port s Packet Type Selects packet type one of Broadcast Multicast Bcast Mcast Packet Rate Select the alarm threshold packet rate in pps Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh Alarm Threshold Status The table displays the current settings and port status ...

Page 107: ...e broadcast multicast and unknown unicast packets in your network The default rate is 300pps for Broadcast and DLF You can set to maximum rate of 5000pps for multicast broadcast or DLF 6 5 2 1 CLI Configuration Node Command Description enable show storm control This command displays the current storm control configurations enable configure terminal This command changes the node to configure node c...

Page 108: ... storm control Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh Storm Control Status Port This field displays a port number Multicast Rate pps This field displays the multicast storm control state along with configured rate of pps on the port Broadcast Rate pps This field displays the broadcast storm control state along with configured rat...

Page 109: ...ort 6 6 1 1 CLI Configuration Node Command Description enable show port isolation This command displays the current port isolation configurations V indicates the port s packets can be sent to that port indicates the port s packets cannot be sent to that port enable configure terminal This command changes the node to configure node configure interface IFNAME This command enters the interface config...

Page 110: ... port means it will communicate with the port currently being configured Select All Deselect All Click Select All to mark all ports as egress ports and permit traffic Click Deselect All to unmark all ports and isolate them Deselecting all ports means the port being configured cannot communicate with any other port Apply Click Apply to take effect the settings Refresh Click Refresh to begin configu...

Page 111: ...f TCI Tag Control Information starts after the source address field of the Ethernet frame The CFI Canonical Format Indicator is a single bit flag always set to zero for Ethernet switches If a frame received at an Ethernet port has a CFI set to 1 then that frame should not be forwarded as it is to an untagged port The remaining twelve bits define the VLAN ID giving a possible maximum number of 4 09...

Page 112: ...iation is done with an application specific integrated circuit ASIC the performance is very good An ASIC allows the port to VLAN mapping to be done at the hardware level The port isolation is a port based virtual LAN feature It partitions the switching ports into virtual private domains designated on a per port basis Data switching outside of the port s private domain is not allowed It will ignore...

Page 113: ...ISTS This command assigns ports for permanent member of the VLAN vlan no fixed PORTLISTS This command removes all fixed member from the VLAN vlan tagged PORTLISTS This command assigns ports for tagged member of the VLAN group The ports should be one some of the permanent members of the VLAN vlan no tagged PORTLISTS This command removes all tagged member from the VLAN vlan untagged PORTLISTS This c...

Page 114: ...he drop down box Select All to configure all ports at the same time Role Select role on interface as access or trunk VLAN User can configure maximum of 5 VLAN s on each interface in the format 1 3 7 10 25 Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh ...

Page 115: ...ort Based Mirroring is used on a network switch to send a copy of network packets sent received on one switch ports to a network monitoring connection on another switch port Destination Port This is commonly used for network appliances that require monitoring of network traffic such as an intrusion detection system Port Mirroring together with a network traffic analyzer helps to monitor network tr...

Page 116: ...ode L2SWITCH configure terminal L2SWITCH config To enable the global mirror function L2SWITCH config mirror enable To configure the monitor port to port 2 L2SWITCH config mirror destination port 2 To configure the source ports which you want to check L2SWITCH config mirror source ports 3 6 mode both 7 2 2 Web Configuration Parameter Description Port Mirror Settings State Select option to enable di...

Page 117: ...or both Monitor Mode Select a port to monitor as destination for the source port Select Ingress Egress or Both to only copy the ingress incoming egress outgoing or both incoming and outgoing traffic from the specified source ports to the monitor port Select Disable to not copy any traffic from the specified source ports to the monitor port Apply Click Apply to take effect the settings Refresh Clic...

Page 118: ...formation Parameter Description Port Select a port or a range of ports to display their statistics Rx Packets The field displays the received packet count Tx Packets The field displays the transmitted packet count Rx Bytes The field displays the received byte count Tx Bytes The field displays the transmitted byte count Rx Errors The field displays the received error count Tx Errors The field displ...

Page 119: ...H show port utilization Kbps Port Speed Rx Utilization Rx Utilization Kbps Tx Utilization Tx Utilization Kbps 8 1000 0 00 8 0 00 0 L2SWITCH show port utilization Mbps Port Speed Rx Utilization Rx Utilization Mbps Tx Utilization Tx Utilization Mbps 8 1000 0 00 0 0 00 0 7 4 2 Web Configuration Parameter Description Port Utilization Refresh Click Refresh to begin configuring this screen afresh Port T...

Page 120: ... all of log message recorded in the Switch enable show syslog level 1 6 The command displays the log message with the level recorded in the Switch enable show syslog server The command displays the syslog server configurations enable configure terminal This command changes the node to configure node configure syslog server disable enable The command disables enables the syslog function configure s...

Page 121: ...server when any new log message occurred Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh Log Level Select Alert Critical Error Warning Notice Information to choose which log message to want to see Clear Click Clear to clear all of log message Save Click Save to save all of log message into NV RAM ...

Page 122: ...e interface IFNAME This command enters the interface configure node interface port utilization threshold rate value This command configures the port utilization threshold value interface port utilization threshold state disable enable The command disables enables the port utilization threshold function on interface Example L2SWITCH configure terminal L2SWITCH config port utilization threshold enab...

Page 123: ...gures the threshold rate When the port packet rate over the threshold the Switch will send trap and syslog Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh Alarm Threshold Status Port This field displays a port number State This field displays the current alarm threshold state for the port Status This field displays if alarm threshold has ...

Page 124: ...NMP protocol globally By default SNMP state will be disabled User can change the system name with respect to their requirement also can add system location and contact location 8 1 1 1 CLI Configuration Node Command Description enable show snmp This command displays the SNMP configurations enable configure terminal This command changes the node to configure node configure snmp disable enable This ...

Page 125: ... an SNMP v1 and SNMP v2c environments The default SNMP community is public for both SNMP v1 and SNMP v2c Network ID of Trusted Host The IP address is a combination of the Network ID and the Host ID Network ID Host IP Mask User need only input the network ID and leave the host ID to 0 If user has input the host ID such as 192 168 1 102 the system will reset the host ID such as 192 168 1 0 User conf...

Page 126: ...ages that are sent between the management station the SNMP manager and the device the SNMP agent The community string is included in every packet that is transmitted between the SNMP manager and the SNMP agent Rights Select Read Only to allow the SNMP manager using this string to collect information from the Switch Select Read Write to allow the SNMP manager using this string to create or edit MIB...

Page 127: ...snmp trap event alarm over heat disable enable This command enables disables the alarm over heat trap configure snmp trap event alarm over load disable enable This command enables disables the alarm over load trap configure snmp trap event alarm power fail enable enable This command enables disables the alarm power fail trap configure snmp trap event bpdu disable enable This command enables disabl...

Page 128: ...ature is too high Alarm Over Load Trap when system is over load Alarm Power Fail Trap when system power is over voltage under voltage RPS over voltage RPS under voltage BPDU Guard Trap when port is blocked by BPDU Guard BDPU Root Guard BPDU port state changed Loop Detection Trap when port is blocked by Loop Detection Port Admin State Change Trap when port is enabled disable by administrator Port L...

Page 129: ...129 Apply Click Apply to configure the settings Refresh Click Refresh to begin configuring this screen afresh ...

Page 130: ...trap This command enables the link change trap on the specific port interface no snmp port link change trap This command disables the link change trap on the specific port config interface range fastethernet1 0 gigabitethernet1 0 PORTLISTS This command enters the if range configure node if range snmp port link change trap This command enables the link change trap on the specific ports if range no ...

Page 131: ...131 Apply Click Apply to configure the settings Refresh Click Refresh to begin configuring this screen afresh ...

Page 132: ...e remote trap station in dotted decimal notation Version Select the version of the Simple Network Management Protocol to use v1or v2c Community String Specify the community string used with this remote trap station Apply Click Apply to configure the settings Refresh Click Refresh to begin configuring this screen afresh Trap Receiver List No This field displays the index number of the trap receiver...

Page 133: ...133 Action Click Delete to remove a configured trap receiver station ...

Page 134: ...up enable configure terminal This command changes the node to configure node configure snmp group GROUPNAME noauth read STRINGS write STRINGS notify STRINGS Configurs v3 group of non authentication configure snmp group GROUPNAME auth read STRINGS write STRINGS notify STRINGS Configurs v3 group of authentication configure snmp group GROUPNAME priv read STRINGS write STRINGS notify STRINGS Configurs...

Page 135: ...el This field displays the security model of the group Always displayed v3 User based Security Model USM Security Level This field displays the security level to this group Read View These fields display the View list of this group Write View Notify View Action Click Delete to remove a v3 group 8 2 2 SNMPv3 User 8 2 2 1 CLI Configuration Node Command Description enable show snmp user This command ...

Page 136: ...e authenticated and encrypted Auth Algorithm Select MD5 or SHA Algorithm when security level is auth or priv Auth Password Set the password for this user when security level is auth or priv pass phrases must be at least 8 characters long Priv Algorithm Select DES encryption when security level is priv Priv Password Set the password for this user when security level is priv pass phrases must be at ...

Page 137: ...Node Command Description enable show snmp view This command displays all snmp v3 view enable configure terminal This command changes the node to configure node configure snmp view VIEWNAME STRINGS included excluded This command configures the v3 view name for creating an entry in the SNMPv3 MIB view table and OID defining the root of the sub tree to add to or exclude from the named view and includ...

Page 138: ...iew name View Subtree This field displays the subtree View Type This field displays the subtree adding to the view or not Action Click Delete to remove a v3 view 8 3 SNTP The Network Time Protocol NTP is a protocol for synchronizing the clocks of computer systems over packet switched variable latency data networks A less complex implementation of NTP using the same protocol but without requiring t...

Page 139: ...tion Node Command Description enable show time This command displays current time and time configurations enable configure terminal This command changes the node to configure node configure time HOUR MINUTE SECOND Sets the current time on the Switch hour 0 23 min 0 59 sec 0 59 Note If you configure Daylight Saving Time after you configure the time the Switch will apply Daylight Saving Time configu...

Page 140: ... UTC formerly known as GMT and your time zone Valid value 1200 1200 8 3 2 Web Configuration Parameter Description Current Time and Date Current Time This field displays the time you open refresh this menu Current Date This field displays the date you open refresh this menu Time and Date Setting Manual Select this option if you want to enter the system date and time manually New Time Enter the new ...

Page 141: ...starts using Daylight Saving Time at 2 A M local time So in the United States you would select Second Sunday 3 March and 2 00 Daylight Saving Time starts in the European Union on the last Sunday of March All of the time zones in the European Union start using Daylight Saving Time at the same moment 1 A M GMT or UTC So in the European Union you would select Last Sunday 3 March and the last field de...

Page 142: ... October and the last field depends on your time zone In Germany for instance you would select 2 00 because Germany s time zone is one hour ahead of GMT or UTC GMT 1 Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh ...

Page 143: ...on of switch like vendor product mac address serial boot code firmware version etc enable show system info This command will display information of CPU loading and memory usage etc enable show uptime This command will display the time from the system power up 8 4 2 Web Configuration Parameter Description System Information Model Name This field displays the model name of the Switch Host name This ...

Page 144: ... command changes the node to configure node configure write memory This command writes current operating configurations to the configuration file configure archive download config URL PATH This command downloads a new copy of configuration file to replace the startup config from TFTP server Where URL PATH can be ftp user pass 192 168 1 1 file http 192 168 1 1 file tftp 192 168 1 1 file configure a...

Page 145: ...ning configurations to startup config file When the Switch boot up it will load startup config as the system configurations When users execute the command reload default config the system will copy user default config to startup config How to build your own default configuration file 1 You can prepare a configuration file and then do below command archive download config URL_PATH user default conf...

Page 146: ...ration file which you want to upgrade it to the Switch Click the Upload button to start the upgrade procedures Click the Download button to download the current configurations to local host Reset Configuration Click the Reset button to reset the system configurations to default values ...

Page 147: ...e download fw URL PATH This command downloads a new copy of firmware file from TFTP FTP HTTP server Where URL PATH can be ftp user pass 192 168 1 1 file http 192 168 1 1 file tftp 192 168 1 1 file 8 5 2 2 Web Configuration Click the Choose File button to select the new firmware which you want to upgrade it to the Switch Click the Upgrade button to start the upgrade procedures ...

Page 148: ...onfiguration Node Command Description enable configure terminal This command changes the node to configure node configure reboot This command reboots the system 8 5 3 2 Web Configuration Click the Reboot button to restart the Switch ...

Page 149: ...to enter the Switch and then create a new user account Notices The Switch allows users to create up to 6 dot1x user account and 6 non dot1x user account The user name and the password should be the combination of the digit or the alphabet The last admin user account cannot be deleted The last dot1x user account cannot be deleted The maximum length of the username and password is 32 characters 8 6 ...

Page 150: ... associates admin read and write or normal read only or dot1x Dot1X user for local authentication Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh User Account List No This field displays the index number of an entry Name This field displays the name of a user account Authority This field displays the associated group Action Click the Dele...

Page 151: ...r otherwise PRODUCT REGISTRATION Visit www tripplite com warranty today to register your new Tripp Lite product You ll be automatically entered into a drawing for a chance to win a FREE Tripp Lite product No purchase necessary Void where prohibited Some restrictions apply See website for details Regulatory Compliance Identification Numbers For the purpose of regulatory compliance certifications an...

Page 152: ...oved by Tripp Lite could void the user s authority to operate this equipment Tripp Lite has a policy of continuous improvement Specifications are subject to change without notice Photos and illustrations may differ slightly from actual products 21 04 336 93 3EF6_RevA ...

Reviews: