background image

Waters Network Systems 

        User’s Manual 

Page 114 

GSM-2108/GSM-1008SFP 

Command Syntax 

Description 

Argument 

Possible 
Value 

05-06 
<alias> mac alias 
name, max 15 
characters 

Show 

show 

Used to display the MAC alias 
entry 

None None 

<<information>> 

Search search 

<port> 

<mac> <vid> 

Used to find the relative MAC 
information in the MAC table 

<port>: set up the 
range of the ports to 
search for 
Syntax 1, 5-7, 
available from 1 to 8 
<mac>: mac address, 
format: 01-02-03-04-
05-06 ‘?” can be used 
<vid>: vlan id from 1 
to 4094; ‘?” as don’t 
care, 0 as untagged 

<port>; 1 to 8 
<vid>:0, 
1~4094 

show 

show 

Used to display all MAC table 
information 

None None 

<<maintain>> 

Set aging 

set aging 

Used to set up the age out time 
of dynamic learning MAC 

<#>; age-timer in 
seconds 0, 10 to 
65535.  The value “0” 
means to disable 
aging 

<#>; 0, 10 to 
65535 

Set flush 

set flush 

Used to delete all MACs 
learned dynamically 

None None 

Show 

show 

Used to display the age timer 
settings 

None None 

<<static mac>> 

Add add 

<mac> 

<port> <vid> 
[alias] 

Used to add the static MAC 
entry 

<mac>: mac address, 
format: 00-02-03-04-
05-06 
<port>: 0-8. The 
value “0” means this 
entry is a filtering 
entry 
<vid>: vlan id 0, 1-
4094. VID must be 
zero if vlan mode is 
not tag-based 
[alias]: mac alias 
name, max 15 
characters 

<mac>: mac 
address 
<port>:0-8 
<vid>:0, 1-4094 
[alias]: mac 
alias name 

Del del 

<mac> 

<vid> 

Used to remove the static MAC 
entry 

<mac>: mac address, 
format 00-02-03-04-
05-06 
<vid>:vlan id. 0, 1-
4094. VID must be 
zero if VLAN mode is 

<mac>: mac 
address 
<vid>: 0, 1-
4094 

Summary of Contents for GSM2108

Page 1: ...S MANUFACTURING CUSTOMER SERVICE 5001 American Blvd W Suite 605 945 37 th Avenue NW Bloomington MN 55437 Rochester MN 55901 Phone 800 441 5319 Phone 800 328 2275 Phone 952 831 5603 Phone 507 252 1951...

Page 2: ...MENT 21 5 1 OVERVIEW OF WEB MANAGEMENT 22 5 2 SYSTEM INFORMATION 25 5 3 IP CONFIGURATION 26 5 4 TIME CONFIGURATION 28 5 5 ACCOUNT CONFIGURATION 30 5 6 MANAGEMENT POLICY 30 5 7 VIRTUAL STACK 33 5 8 POR...

Page 3: ...3 3 CONFIGURATION FILE 96 5 24 DIAGNOSTICS 97 5 25 TFTP SERVER 99 5 26 LOG DATA 100 5 27 FIRMWARE UPGRADE 101 5 28 REBOOT 102 5 29 LOGOUT 103 6 0 OPERATION OF CLI MANAGEMENT 104 6 1 LOGIN 104 6 2 COMM...

Page 4: ...for full duplex MANAGEMENT FUNCTIONS Web based SNMP v1 v2c CLI or Telnet Port setting for duplex and speed Port trunking 4 groups Port based and tagged VLANs up to 256 IGMP snooping 802 1x access cont...

Page 5: ...er Consumption 30 watts maximum OPERATING ENVIRONMENT Ambient Temperature 32 to 122 F 0 to 50 C Ambient Humidity 0 to 90 MECHANICAL Enclosure Rack mountable Cooling Method Fan cooled PHYSICAL CHARACTE...

Page 6: ...Bandwidth Control Port Security SNMP RMON IGMP Snooping capability via the intelligent software The switch is suitable for both metro LAN and office applications Ports 7 and 8 provide two types of me...

Page 7: ...cket length can be up to 9216 bytes for jumbo frame application Supports DHCP broadcasting suppression Supports QoS for real time applications based on the information taken from layer 2 to layer 4 su...

Page 8: ...witch The LEDs located on the left side of the front panel contains a power LED indicating the power status and the status of the eight working ports on the switch Figure 3 1 GSM 2108 Switch Figure 3...

Page 9: ...ort 7 8 LED SFP LINK ACT Green Lit when connection with the remote device is good Blinks when any traffic is present Off when module connection is not good Table 3 1 3 4 Rear Panel Located on the rear...

Page 10: ...t module and conforms to the chassis 2 Slide the module along the slot 3 Seat the module against the slot socket connector 4 Install the proper cable for network connection 3 8 Power On Once the switc...

Page 11: ...r and client station Basically with this approach it will minimize the number of switches in any one path will lower the possibility of network loop and will improve network efficiency If more than tw...

Page 12: ...re3 6 This is an example of how VLANs can be set up between two switches 1 VLAN1 members cannot access VLAN2 VLAN3 and VLAN4 members 2 VLAN2 members cannot access VLAN1 and VLAN3 members but they can...

Page 13: ...al Port Connection To configure the switch via the RS 232 serial port connection follow these steps 1 Connect the serial cable included with your switch to your workstation 2 Connect the serial cable...

Page 14: ...ch via the console connection you will have to use the CLI command listed below A complete list of CLI commands is in Section 6 0 of this manual 1 Once you have logged into the switch you will see the...

Page 15: ...ore you are able to communicate with the switch you must know the IP address of the switch Once you know the IP address follow these instructions 1 Connect the switch with a UTP cable to your workstat...

Page 16: ...which the host resides while the host identifier identifies the particular host on the given network The host identifier must be unique in the same LAN Each class has its own network range between th...

Page 17: ...FC 1112 Class E is a class with first 4 MSB set to 1 1 1 1 and is used for IP broadcast According to IANA internet assigned numbers authority there are three specific IP address blocks reserved and ab...

Page 18: ...third byte is used to identify the subnet within this class B network and of course the last byte is the host number Not all IP addresses are available in the sub netted network Two special addresses...

Page 19: ...etwork in an autonomous network It owns a network IP address which may look like 168 1 2 0 With the subnet mask a bigger network can be divided into smaller pieces If you want to have more than two in...

Page 20: ...st be set on your PC Second Subnet Mask as shown in the Figure 4 4 enter 255 255 255 0 Any subnet mask such as 255 255 255 x is allowable in this case DNS The Domain Name Server translates the human r...

Page 21: ...ick on the Login button The login process now is completed If you forget the password click the link Forget Password on the Web login screen See Figure 5 1 or input Ctrl Z in from the CLI s login scre...

Page 22: ...en the function tree for all of the management functions is displayed We will explore these functions in this chapter The following information is listed on the opening screen Model System Description...

Page 23: ...front panel displayed at the top of the screen provides clicking functions that allow you to view information about the switch This is a very convenient function for browsing the information for a sin...

Page 24: ...ted the management screen will remain on The left side of the screen displays the main menu tree for the web functions This a hierarchical menu When you make a selection a sub menu may be displayed wi...

Page 25: ...The name of the switch User defined Default is GEL2 SW8 System up time The time accumulated since this switch was powered up The format is day hour minute and second Current time Show the system time...

Page 26: ...ess Configuration Function name IP Configuration Function description Set IP address subnet mask default gateway and DNS for the switch Parameter description DHCP Setting DHCP is the abbreviation of D...

Page 27: ...set the subnet mask value which should be the same value as that of the other devices resided in the same network it attaches Default gateway Set an IP address for a gateway to handle those packets th...

Page 28: ...te and Second are 2000 1 12 1 31 0 23 0 59 and 0 59 respectively Input the wrong figure and press the Apply button the device will reject the time adjustment request There is no time zone setting in M...

Page 29: ...to set the starting ending date as well otherwise the daylight saving function will not be activated Default for Daylight Saving 0 The following parameters are configurable for the function Daylight S...

Page 30: ...valent identity can modify his password only Please note that you must confirm administrator guest identity in the field of Authorization in advance before configuring the username and password Only o...

Page 31: ...g range Accept Deny Deny Deny Accept __________________________________________________ Rule 5 If both accept and deny lists exist all connections will be denied except the connection inside of accept...

Page 32: ...naged valid Port Range including any and Custom The default is any Custom allows you to select the ports that should be used and the ports that should be restricted in the management security configur...

Page 33: ...p without logging into these devices The top left button is only for Master device See Figure3 9 The background color of the button you press will be changed to represent that the device is under your...

Page 34: ...on or de activation of VSM Role The role that the switch would like to play in virtual stack Two types of roles including master and slave are offered The default is Master Group ID It is the group id...

Page 35: ...otiation status speed duplex and flow control If a fiber module is installed in one or both of the slots the current status for those ports will be displayed See Figure 5 10 Figure 5 10 Port Status Fu...

Page 36: ...ice the link will show that is it Up otherwise it will show Down This is determined by the hardware on both devices of the connection No default value State Displays the communication function of the...

Page 37: ...E802 3x for full duplex operation The switch supports both Default Disabled Parameter description of Port 7 and Port 8 Connector Type Displays the connector type UTP SC ST LC etc Fiber Type Displays t...

Page 38: ...le 5 8 2 Port Configuration Port Configuration is used to modify the setting by port This function allows set and reset the functions described below Figure 5 12 Port Configuration Function name Port...

Page 39: ...is no default value In forced mode the default value depends on the setting Flow Control There are two modes to choose in flow control including Enable and Disable If flow control is set to Enable bo...

Page 40: ...ed Rx Error Packet Number of bad packets received 5 8 4 Detail Counter The function of the Detail Counter is to collect information and provide the counting for the traffic of the port whether the pac...

Page 41: ...unting number of the packets received RX Octets Total received bytes Rx High Priority Packets Number of Rx packets classified as high priority Rx Low Priority Packets Number of Rx packets classified a...

Page 42: ...e frames in good and bad packets received Rx 1024 Bytes Number of 1024 max_length byte frames in good and bad packets received Tx 64 Bytes Number of 64 byte frames in good and bad packets transmitted...

Page 43: ..._length register with invalid CRC Rx Drops Frames dropped due to the lack of receiving buffer Rx Errors Number of the error packets received Tx Collisions Number of collisions transmitting frames expe...

Page 44: ...ommended to avoid setting a port to be a sniffer port and an aggregated port at the same time Parameter description Mode Used for the activation or de activation of Port Mirror function Default is dis...

Page 45: ...e discarded if the rate exceeds the value you set up in Data Rate field Pause frames are also generated if flow control is enabled The format of the packet limits to unicast broadcast and multicast Va...

Page 46: ...tting are viewed as Default Class For example if you set QoS function as VLAN Tag Priority mode and then choose Default Class as High the priority of the packets with no tag will be considered as High...

Page 47: ...priority for each traffic class For instance if we set VLAN tagged priority 0 0 0 to high priority and VLAN tagged priority 0 0 1 to Low Priority and then include ports 1 2 3 in VLAN 2 that means the...

Page 48: ...us is on the TOS field of the IP header There are three bits in TOS field Bit 5 7 of TOS field will be used According to these three bits we could arrange eight traffics 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0...

Page 49: ...special TCP UDP port for QoS Prioritize IP Telephony VoIP Belongs to the QoS in L4 Select the option button and click Apply Click Advance to set special TCP UDP port for QoS Prioritize iSCSI Belongs...

Page 50: ...TDP UDP class function to work To set all ports at the same time select All Special UDP TCP Port Selection The following are port numbers defined by the following specific networks in L4 Down priorit...

Page 51: ...fferentiated services DS Under the differentiated services interpretation the first six bits comprise a codepoint which is sometimes abbreviated DSCP and the last two bits are left unused IP Diffserve...

Page 52: ...MIB can be accessed via SNMP manager If SNMP is set to Disable the SNMP agent will not be activated The related Community Name Trap Host IP Address Trap and all MIB counters will be ignored Function...

Page 53: ...are six supported trap hosts Each has its own community name and IP address and is user definable To create a trap host means to create a trap manager by assigning an IP address to the host the trap...

Page 54: ...s function once a switch receives an IP multicast packet it will forward the packet to the members who had joined a specified IP multicast group Figure 5 25 IGMP Snooping Function name IGMP Snooping F...

Page 55: ...h 9k jumbo frames Parameter description Jumbo Frame bytes Set up the maximum length of the packet that each port of the switch can accept Maximum length can be up to 1532 bytes or 9216 bytes The defau...

Page 56: ...onfiguring VLANs you can improve security and increase performance 5 16 1 VLAN Mode Function name VLAN Mode Setting Function description The VLAN Mode Selection function includes five modes Port based...

Page 57: ...port based VLAN groups Double tag Double tag mode belongs to the tag based mode however it would treat all frames as the untagged ones which means that tag with PVID will be added into all packets Th...

Page 58: ...arameter description VLAN Name Valid letters are A Z a z 0 9 and _ characters The maximal length is 15 characters VID VLAN identifier Each tag based VLAN group has a unique VID used in tag based and D...

Page 59: ...re 5 30 Tag based Group Add Group Create a new Tag based VLAN Input the VLAN name and the VID Configure the SYM VLAN function and choose the member by selecting the check box beside the port number Pr...

Page 60: ...a group Select a group entry and select Edit This allows you to modify the group s description SYM VLAN and member set 5 16 3 Port Based Group Function name Port based Group Configuration Function des...

Page 61: ...Enable means the port is a member of the VLAN Select the check box beside the port x to enable it Figure 5 33 Port based Group Add Group Create a new port based VLAN Input the VLAN name and choose the...

Page 62: ...this port s configured VID Ingress Filtering Rule 2 Drop untagged frame Select the role of each port as Access Trunk or Hybrid Parameter description Port 1 8 Port number PVID This PVID range will be 1...

Page 63: ...ID of port 1 is 100 and port 1 is not member of VLAN 100 the packet will be dropped Role This is an egress rule of the port You can choose Access Trunk or Hybrid Trunk means the outgoing packets must...

Page 64: ...arched MAC entries table Alias Set up the Alias for the selected MAC entry Set Alias Save the Alias of MAC entry you set up Search Find the entry that meets your setup Previous Page Move to the previo...

Page 65: ...removed from the MAC Table The range of age out time is 10 65535 seconds and the setup of this time will have no effect on static MAC addresses Parameter description Aging Time Deletes a MAC address...

Page 66: ...all of the switch s traffic is sent to this MAC address will be forwarded to this port For adding a MAC address entry in the allowed table fill in four parameters MAC address associated port VID and A...

Page 67: ...be filled only when tagged VLAN is applied Valid range is 1 4094 Alias Assigned MAC alias name Figure 5 40 Static Forwarding MAC Function name MAC Alias Function description MAC Alias function is use...

Page 68: ...add a new record with name Select the MAC Alias Delete function to remove an alias name from a MAC address You can select an existing MAC address or alias name for removal Figure 5 41 MAC Alias Param...

Page 69: ...AN and propagate these information to other GVRP aware devices to setup and update their knowledge database the set of VLANs associated with currently active members and through which ports these memb...

Page 70: ...ges The switch listens for messages and reacts for the received GVRP BPDU Default Registrar Mode There are three types of parameters for registrar mode registrar administrative control value normal re...

Page 71: ...umber of invalid GARP BPDU received by the GARP application LeaveAll Message Packets Number of GARP BPDU with Leave All message received by the GARP application JoinEmpty Message Packets Number of GAR...

Page 72: ...ets Number of GARP BPDU with Leave Empty message transmitted by the GARP application Empty Message Packets Number of GARP BPDU with Empty message transmitted by the GARP application Function name GVRP...

Page 73: ...path on the network 5 19 1 STP Status Function name STP Status Function description Spanning Tree Status displays the current status of 12 parameters The 12 parameters are described below Parameter de...

Page 74: ...is defined as the time spent from Listening state moved to Learning state or from Learning state moved to Forwarding state of a port in bridge Hello Time Displays the current hello time of the root b...

Page 75: ...this switch to communicate with each other The valid value is 1 10 in unit of second The default is 2 seconds Max Age When the GSM switch is the root bridge the whole LAN will apply the number set by...

Page 76: ...ation DISCARDING state indicates that this port can neither forward packets nor contribute learning knowledge LEARNING state indicates this port can now contribute its learning knowledge but cannot fo...

Page 77: ...ge port toggles the STP topology keeps unchanged Unlike the designate port or root port though an edge port will transit to a normal spanning tree port immediately if it receives a BPDU Default No Adm...

Page 78: ...ort The benefit of using LACP is that a port makes an agreement with its peer port before it becomes a ready member of a trunk group also called aggregator LACP is safer than the other trunking method...

Page 79: ...ng method and its Group ID will turn to 0 This means the port won t aggregate with other ports 14 ports use LACP Trunk Group ID 1 At most 12 ports can aggregate together and transit into the ready sta...

Page 80: ...y to aggregate to a particular aggregator port This aggregator port is usually the port with the smallest port number within the trunking group Status This field represents the trunking status of a po...

Page 81: ...nction description Displays the detailed information of the LACP trunking group Parameter description Actor The switch you are using to view LACP Partner The peer system from the aggregator s view Sys...

Page 82: ...to set the priority of the LACP system ID LACP will only aggregate together the ports whose peer link partners are all on a single system Each system supports LACP will be assigned a globally unique S...

Page 83: ...authorized or unauthorized according to the result of authentication message exchanged between it and a supplicant PAE The authenticator may request the supplicant to re authenticate itself at a confi...

Page 84: ...message with the authenticator on the port it connected via EAPOL packet The authenticator transfers the supplicant s credentials to Authentication server for verification If successful the authentic...

Page 85: ...ting user password via the authenticator PAE 7 The supplicant will convert the user password into the credential information perhaps in MD5 format and replies an EAP Response with this credential info...

Page 86: ...s of port mode set in 802 1X Port mode port control state set in 802 1X port setting Entry Authorized means MAC entry is authorized Port Mode Port Control Authentication Port Status Disable Don t Care...

Page 87: ...er for the authentication service The valid value ranges 1 65535 Default port number is 1812 Secret Key The secret key between authentication server and authenticator It is a string with the length 1...

Page 88: ...cription Displays each port status In multihost mode the port number and its status authorized or unauthorized are displayed Parameter description Disable Mode If Disable mode is selected for a port i...

Page 89: ...ption Port The port number to be selected for configuring its associated 802 1X parameters which are Port control reAuthMax txPeriod Quiet Period reAuthEnabled reAuthPeriod max Request suppTimeout ser...

Page 90: ...number seconds between the periodic re authentication of the supplicant Default 3600 max Request 1 10 The maximum of number times that the authenticator will retransmit an EAP Request to the supplica...

Page 91: ...p The message will be sent if you check the trap event individually on the web page shown below Parameter description Trap Cold Start Warm Start Link Down Link Up Authentication Failure User login Use...

Page 92: ...p event occurs Once trap events have been selected enter your desired email addresses and mobile phone numbers Select Apply to complete the alarm configuration The alarm settings will take effect in a...

Page 93: ...uration before rebooting the switch Default Configuration The factory setting and cannot be altered Working Configuration The working configuration is the current configuration and can be changed any...

Page 94: ...Start Configuration Function description Save the current configuration as a start configuration file in flash memory Figure 5 62 Configuration Function name Save As User Configuration Function descri...

Page 95: ...If the factory settings are restored the IP address of the switch will be restored to 192 168 1 1 Figure 5 64 Restore Configuration Function name Restore Default Configuration excludes current IP add...

Page 96: ...ngs after rebooting the system Figure 5 66 Restore Configuration 5 23 3 Configuration File Function name Config File Function description Use this function to back up or reload the configuration files...

Page 97: ...ailable for device self diagnostics Each of them will be described in detail in the following sections Function name Diagnostics Function description Diagnostics provides a set of basic system diagnos...

Page 98: ...tch box The test signal only wraps around in the switch The second function will send the test signal to its link partner If the switch is not connected to active network devices i e the ports are lin...

Page 99: ...few seconds the switch will report to the pinged device the result of the Ping Parameter description IP Address An IP address with the version of v4 e g 192 168 1 1 Default Gateway IP address of the d...

Page 100: ...logs The switch supports a total 120 log entries For more details on log items please refer to Section 5 22 for Trap Alarm Configuration and SNMP Configuration Function name Log Data Function descript...

Page 101: ...Function name Firmware Upgrade Function description The switch supports software upgrade through a TFTP server To apply a firmware upgrade follow this procedures 1 Specify the IP address TFTP server 2...

Page 102: ...hanging IP configuration or modifying VLAN configurations you must reboot in order for the new configuration to take effect Function name Reboot Function description Reboot the switch Reboot takes the...

Page 103: ...on name Logout Function description The switch provides and automatic logout to prevent unauthorized users from using the system If you do not logout and exit the browser the switch will automatically...

Page 104: ...irect serial connection to the device or a Telnet session The default login identification is Username admin Password admin After you login successfully the prompt will be shown as if you are the firs...

Page 105: ...t Restore user Command instructions residing in the corresponding modes are local commands The same commands can be used in different modes and will perform a different function resulting in totally d...

Page 106: ...n prompt None None Restore Default restore default Use this command to restore the startup configuration provided by factory default If the restore is successful you will be prompted to reboot Once re...

Page 107: ...us of each port 0 ForceUnauthorized 1 ForceAuthorized 2 Auto port range 1 to 8 authorized 0 1 or 2 Set quiet period set quiet period port range sec This command is used to define periods of time when...

Page 108: ...provided by the Backend Authentication state machine to determine timeout conditions in the exchanges between the Authenticator and the Supplicant or Authentication Server The initial value is either...

Page 109: ...name None Set user set user username Used to set up the account for the email server username email server account and password None Show Show Used to display email configuration None None email Del...

Page 110: ...Used to set time for autologout time range 1 to 3600 seconds 0 for autologout OFF default setting is 180 seconds time 1 1 3600 Bandwidth Disable egress rate disable egress rate range Used to cancel t...

Page 111: ...p boot set dhcp boot sec Used to set the delay time for DHCP boot sec range syntax 0 1 30 the value o is used to disable DHCP boot delay sec 0 30 Show show Used to display the status of DHCP boot None...

Page 112: ...dden mode range 1 to 8 normal fixed forbidden nor mal or fixed or forbidden Set restricted set restricted range enable disable Used to set the restricted mode for each port range port range syntax 1 5...

Page 113: ...way Used to set the system IP address subnet mask and gateway ip ip address mask subnet mask gateway default gateway ip 192 168 1 2 or others mask 255 25 5 255 0 or others gateway 192 168 1 253 or oth...

Page 114: ...Set aging set aging Used to set up the age out time of dynamic learning MAC age timer in seconds 0 10 to 65535 The value 0 means to disable aging 0 10 to 65535 Set flush set flush Used to delete all M...

Page 115: ...vid value Range is 1 4095 and can be set to any ip value Any valid IP address port value 1 or 1 9 type value h ttp s nmp or t elnet or any action value No default and must be set Delete delete Used to...

Page 116: ...ntax 1 5 7 available from 1 to 8 range 1 to 8 Set monitoring port set monitoring port Used to set the monitoring port for the mirror function User can observe the packets of the monitored port receive...

Page 117: ...y the SFP module information port SFP port available 7 8 port 7 8 Show simple counter show simple counter Used to display the summary counter for each port s traffic None None Show status show status...

Page 118: ...x port range tag range class Used to set class of ports on VLAN tag based QoS range port range syntax 1 5 7 available from 1 to 8 tag range tag priority level syntax 1 5 7 available 0 to 7 class class...

Page 119: ...mode is used to set up get community set community trap host IP host port and trap community trap number ip IP address or domain name port trap port community trap community name 1 to 6 port 1 6553 5...

Page 120: ...None System Set contact set contact contact string Used to set the contact description of the switch contact string length up to 40 characters contact a b c d z and 1 2 3 etc Set device name set devic...

Page 121: ...and daylight saving endI None None Trunk Del trunk del trunk port range Used to delete the truanking port port range port range syntax 1 5 7 available from 1 to 8 port range 1 to 8 Set priority set pr...

Page 122: ...e drop untag enable drop untag range Used to drop the untagged frames range ports to be set syntax 1 5 7 available 1 to 8 range 1 to 8 Enable sym vlan enable sym vlan range Used to drop frames from th...

Page 123: ...ame range vlan group members syntax 1 5 7 available from 1 to 8 sym asym vlan setting 1 symmetric vlan 0 asymmetric vlan vid 1 to 4094 range 1 to 8 0 or 1 Show group show group Used to display the VLA...

Page 124: ...connection b The network configuration of Computer C may be faulty Verify the network configuration on Computer C 2 The uplink connection function fails to work a Please check the uplink setup of the...

Page 125: ...nsure that they have been properly connected and the cables wires have not been crimped or in some way impaired during installation About 90 of network downtime can be attributed to wiring and connect...

Page 126: ...est and evaluate all returned products will repair products that are under warranty at no charge and will return the warranty repaired units to the sender with shipping charges prepaid see Warranty In...

Page 127: ...Waters Network Systems User s Manual Page 127 GSM 2108 GSM 1008SFP Waters Network Systems Attention Customer Service 945 37th Avenue NW Rochester MN 55901...

Page 128: ...ems Repaired or replaced products will be returned at no cost to the original Buyer and shipped via the carrier and method of delivery chosen by Waters Network Systems Specific warranty by product fam...

Reviews: