Vip-Vision VSPOE-SWA16 User Manual Download Page 20

16/24-Port PoE Switch 

©.-------------------' 

( 3) Select the port whose connection status is green, and then click Bind button. See 

Mll'Hllatll<:  PortMa.::Binding  POIIMICFillrV'lg 

BBB  Ill  1111

"' 

iltl  Ill  l!ll  l!ll  1!11 

UIIJIUU  0Ql6llll  Ql l!l!FJJQJ 

l!IJl!ll jq l"J

Figure 6-23 

6.5.3 Port Mac Filtering 

Ml(  Al.at6" T6Dk:  Poo1 MK  IM'lt:llng  Port Mac  Filterin 

IEIIBBB 

11!11111

,i,

'1;1  '1ilSZIIIIISl 

± 

UIIJIU U  0111161111  Ql�lllQ1 

dllll "'1"1 

'ii 

____ ,_ 

Figure 6-24 

As it is shown in Figure 6-24 that the function is used to restrict allowed MAC packet under 
port, which can prevent counterfeit attack. After the port is configured with the function, 
when the port receives packet, it will check if the source MAC address of packet is the 
same as the allowed MAC address: 

•  If it is same, then the packet is considered as legal, and it will continue to implement

follow-up processing;

•  If it is different, then the packet is considered as illegal, and it will be discarded.

6.6 SNMP Settings 

SNMP network includes two elements: NMS and Agent. 

•  NMS  ( Network Management System)  is the SNMP network administrator. It provides 

user-friendly interactive interface. It is suitable for the network administrator to complete 

the most management work. 

•  Agent is the object to be managed in the SNMP network. It is to receive, process the

NMS query message. In some urgent situation such as the port status has changed,

Agent can auto send out the alarm information to the NMS. 

When NMS manages the device, it pays great attention on some parameters such as port 
status, CPU usage rate and etc. All these parameters together are called the Management 

Information Base (MIB). These parameter are called the nodes in the MIB. MIB defines the 
layers of these nodes and the properties of these objects such as object name, access 
rights, data type and etc. Each Agent has its own MIB. All managed devices have their 

own MIB file, and compiling these MIB files on the NMS can generate the MIB of each 
device. The NMS reads and writes the nodes of the MIB according to the access rights 
setup so that it can manage the Agent. Refer to the following figure for the relationship 

among NMS, Agent and MIB. 

NIIS 

Get/Set  requests 

Get/Set  respan••• 

end  Traps 

Figure 6-19 

Agent 

MIB adopts the tree organization, it consists of many nodes. Each node represents one 
managed object. The managed object can use an unique number representing the path 
beginning from the root. This number is called Object Identifier (01D). Refer to the following 

figure for detailed information. The managed object B can use a series number {1.2.1.1} 

to identify. This is the 01D of the managed object. 

Root 

1  B 

Figure 6-20 

SNMP provides three basic operations to realize the interactive between the NMS and the 
Agent: 

•  Get: NMS uses it to search the value of one or more nodes of the Agent MIB. 
•  Set: NMS uses it to set the value of one or more nodes of the Agent MIB. 
•  Trap: NMS uses it to send Trap information to the NMS. The Agent does not require the 

NMS to send the responding message and NMS does not respond the Trap information.
SNMPv1 ,SNMPv2 and SNMPv3 all support Trap operation. 

SNMP protocol version 

Right now, the Agent supports SNMPv1 ,SNMPv2 and SNMPv3. 
•  SNMPv1 adopts community name to certify. The community name is just like a password, 

it Is to restrict the communication between the NMS and Agent. If the NMS community

name and the managed device community name are not the same, the NMS and the

Agent cannot establish the SNMP connection, which means the NMS cannot access the
Agent and the NMS discards the warning information from the Agent. 

Summary of Contents for VSPOE-SWA16

Page 1: ...emperature in device will rise and may cause fire Do not place any object on the device Do not disassemble the device without professional instruction Warning Please use battery properly to avoid fire...

Page 2: ...9 5 6Long Distance Transmit 20 6 Device Management 22 6 1 Ring Network 22 6 1 1 STP Definition 22 6 1 2 Basic Concepts of STP 23 6 1 3 STP Bridge Settings 24 6 1 4 STP Port Settings 25 6 2 VLAN Settin...

Page 3: ...rt PoE power consumption management Support SNMP V1 V2 V3 network management Support STP RSTP ring network protocol Support manual aggregation and static LACP Support many to one mirroring Support por...

Page 4: ...t power status Table 2 3 3Log in Switch 3 1 Switch Login It needs to log in switch first before configuring the switch users can intuitively manage and maintain PFS42 series Ethernet switch via Web ne...

Page 5: ...check the flow of the current port and then click Port Statistics refer to Figure 3 4 for more details System Config Port Management Device Management PoE Figure 3 4 3 2 3 Config Display Section The...

Page 6: ...address config Parameter Note IP address Switch management IP address whichcanmodify the management IP of the switch Subnet mask Switch subnet maskaddress which can modify config Default gateway Switc...

Page 7: ...password all other information will be restored to factory default setting Figure 4 10 4 7 System Reboot It needs to save the config before rebooting the device Otherwise all the configurations will...

Page 8: ...100M FULL 100M Full duplex 100M HALF 1DOM Half duplex 1000M FULL 1000M Full duplex Fiber port 1000M X 1000M Full duplex Table 5 3 Speed config It is to configure the port speed duplex mode Note It wi...

Page 9: ...so that the port 1 can monitor the packets of port 2 and port 3 2 Settings 1 Enable port mirroring function and select the data streams to monitor 2 Select source port 3 Select destination port Now t...

Page 10: ...speed of the port See Figure 5 6 2 Click Save button 50 50 Figure 5 6 50 50 5 5 Broadcast Storm Control The broadcast storm refers to a phenomenon the broadcast frames on the network are forwarded aga...

Page 11: ...depends on the connection sp and Is as follow 10Mbps s 5000 I JS 100Mbps Is 5001 JS and 1Gbp Is 50 fJS Port Enoble 10 11 12 13 14 15 16 17 1B Figure 5 8 2 Click Save button 5 6 Long Distance Transmit...

Page 12: ...rehensive numerical value of bridge priority and its MAC address and the bridge priority is a parameter which can be set The lower the Bridge ID the higher the bridge prioritybecomes which makes it in...

Page 13: ...n gs S cunty SNMP Settings 802 1X tGMP SnOOfllnll PoE Figure 6 3 STP Mode Enable or disable ring network function Bridge Priority Set bridge priority it ranges from O to 61440 Hello Time Set the perio...

Page 14: ...frame and put When VLAN ID is the Remove Tag and send out the the Tag of the default VLAN same as the defaultVLAf frame ID receive current frame When the VLAN ID is different from the default VLAN ID...

Page 15: ...is three by default which can t be modified The default status of all the aggregation groups is disable member port is null by default Member Port The switch created all the aggregation groups by def...

Page 16: ...o QoS IP network the device treats all packets as the same and the process policy is first in first out FIFO It allocates the required resources according to the time the packet arrived All packets sh...

Page 17: ...e priority setup item becomes the high priority then the item will be put in the high priority line and then forward When there are several high priorities for the same level it adopts First In First...

Page 18: ...y IPpriority Keywords Decimal system Binary system High priority I queue 46 101110 el 10 001010 af11 18 010010 af21 26 011010 af31 34 100010 af41 48 110000 cs6 56 111000 cs Low priority queue Others x...

Page 19: ...rmation and etc 6 5 1 MAC Address List When device forwards the packet it searches the MAC address sheet according to the packet destination MAC address If the MAC address list includes an item matchi...

Page 20: ...yers of these nodes and the properties of these objects such as object name access rights data type and etc Each Agent has its own MIB All managed devices have their own MIB file and compiling these M...

Page 21: ...ad The default setup is public Write community The community name to access the network administrator The right is write The default setup is private Trap address It is to specify the server IP addres...

Page 22: ...e is Md5 6 Authentication password is admin123 7 Encryption mode is CBC DES 8 The encryption password and confirm password is admin123 9 Input read write user name as user1 10 Authentication mode is M...

Page 23: ...thentication request packet to device in order to trigger authentication the destination address of the packet is the broadcast MAC address The mode is able to solve the problem that the device fails...

Page 24: ...in Figure 6 36 IGMP Snooping enable or disable IGMP Snooping function IGMP Leave Packet enable or disable the function of quick leave 7 1 PoE Settings Power over Ethernet PoE means the device uses the...

Page 25: ...a PoE port Note PSE power overload When the total amount of the power consumption of all ports exceeds the maximum power of PSE the system considers the PSE is overloaded Total power It is to set PoE...

Page 26: ...esume power on Monday 2 Set ports 3 Click Save Refer to Figure 7 5 for detailed information System Config Port Management Device Management PoE PoE Settings PoE Event Statistics D GreenPoE Green PoE P...

Reviews: