background image

SWT

 

GIGABIT/FAST ETHERNET SWITCH TYPE SWT 

113/137

 

USER GUIDE - M0SWTA1903Iv09 -  V09  March 2019 

directory  it  shows  the  values  of  the  parameters  in  that 

directory.  If  the  argument  is  the  name  of  a  configuration 

parameter it shows the value of that parameter.   

To show the complete configuration of the equipment, this 

command must be executed with no arguments, from the 

root directory. 

 

If an argument is used, it must be in the current directory 

or the relative route must be entered. 

Examples

drn /> 

get   

drn />

 get main   

drn /main>

 get hostname 

 

drn />

 get main/hostname 

 

drn /admin> 

get ../main/hostname 

 

remove 

This eliminates an item from the matrix of a matrix-type parameter. 

Syntax

drn /> 

remove

 

name[nº] 

Arguments

name

  

Parameter from which the item is to be removed. 

nº 

(Optional) Order number of the parameter item 

Observations: 

To  remove  an  item  from  the  matrix  of  a  matrix-type 

parameter, it is necessary to be in the respective directory 

or enter the relative route. 

 

If  the  order  number  of  the  item  to  be  removed  is 

indicated, that  item  will  be  removed.  If  the  number  is not 

indicated, the last one will be removed. 

 

When removing an item that is not the last one, the other 

remaining items will be automatically renumbered. 

Examples

drn /> 

remove nat[2] 

 

drn /> 

remove nat 

 

drn /admin> 

remove ../nat

 

 

Summary of Contents for SWT

Page 1: ...37 ZIV Antonio Machado 78 80 08840 Viladecans Barcelona Spain Tel 34 933 490 700 Fax 34 933 492 258 Mail to ziv zivautomation com www zivautomation com GIGABIT FAST ETHERNET SWITCH TYPE SWT USER GUIDE...

Page 2: ...OLS WARNING OR CAUTION This symbol denotes a hazard Not following the indicated procedure operation or alike could mean total or partial breakdown of the equipment or even injury to the personnel hand...

Page 3: ...anagement 13 1 4 5 Additional services 13 1 4 6 Certifications 13 1 4 7 Mechanical characteristics 14 1 4 8 Operating conditions 14 1 5 WARNINGS 16 1 5 1 Warnings before installing 16 1 5 2 Equipment...

Page 4: ...1 1 Equipment identification 42 5 1 2 Access control 42 5 1 3 Others 43 5 1 4 Syslog 43 5 2 ADMINISTRATION 44 5 3 LAN CONFIGURATION 45 5 4 ETHERNET PORTS CONFIGURATION 46 5 5 VLAN CONFIGURATION 50 5 6...

Page 5: ...ION 81 5 15 1 802 1x 82 5 15 2 MAC list 84 5 16 OTHERS CONFIGURATION 85 5 17 REBOOT 86 5 18 CODE REFLASH 86 5 19 CONFIGURATION FILE 87 5 19 1 Upload from the PC to the equipment 88 5 19 2 Download fro...

Page 6: ...and RADIUS 1 2 MAIN CHARACTERISTICS Some of the SWT most important features are described below Grouping of services and architectures Services may be grouped and discriminated some not being accessi...

Page 7: ...SWT GIGABIT FAST ETHERNET SWITCH TYPE SWT 7 137 USER GUIDE M0SWTA1903Iv09 V09 March 2019 FIGURE 1 Traffic separation FIGURE 2 Star topology...

Page 8: ...d for any of the planned interface functions user edge untag inter switch link trunk or native and those associated to the Q in Q functionality access and core Once the LAG is established the set of p...

Page 9: ...r level of importance For example sending orders to open a switch has priority over the traffic from a telephone connection The SWT has Quality of Service QoS which identifies critical services guaran...

Page 10: ...one the monitoring port being able to establish incoming or outgoing traffic copies in each monitored port in an independent manner 1 3 EQUIPMENT COMPOSITION The SWT is provided in a 19 shelf that is...

Page 11: ...n Q in Q operation double tagged Link aggregation by LAG function static according to IEEE 802 1ad Port mirroring Links in VLAN Native mode Interoperability with IEDs Intelligent Electronic Device tha...

Page 12: ...nsole DCE mode 4 Gigabit Ethernet SFP bays see section 1 4 3 Accessories front or rear 1 I O connector with one digital input and output that can be managed via SNMP The digital output can be configur...

Page 13: ...CZ05000010 Multimode fiber MTRJ SC 2m length 4CZ05000011 Multimode fiber MTRJ ST 2m length 4CZ05000012 Multimode fiber MTRJ LC 2m length 4CZ05000013 Multimode fiber LC LC 2m length 4CZ05000014 Singlem...

Page 14: ...0 360 Vdc 80 260 Vac Redundant power supply option and in front port model PoE power supply option in the first four electrical ports 1 to 4 DC operation is protected by diode against polarity inversi...

Page 15: ...uency fields in accordance with EN 61000 4 6 standard Power frequency magnetic field immunity test in accordance with EN 61000 4 8 standard Damped oscillatory magnetic field immunity test in accordanc...

Page 16: ...ny that will use these devices and the Safety standards EN 50110 2 In order to install and handle the SWT the following points must be complied with Only qualified personnel appointed by the electrici...

Page 17: ...njury to persons or third parties caused by the non fulfilment of point 1 1 The terminal contains components sensitive to static electricity the following must be observed when handling it Personnel a...

Page 18: ...u high which is prepared for rack mounting FIGURE 5 shows the general dimensions in mm of the SWT as well as the position of the fastening holes FIGURE 5 General dimensions in mm of the SWT The SWT i...

Page 19: ...irst four 10 100Base Tx ports identified as ports 1 to 4 admit the PoE power supply option which is performed through the connector shown in FIGURE 7 The PoE interfaces provide power supply to the cli...

Page 20: ...ports See in section 1 4 2 Equipment interfaces the types of blocks available and their requirements FIGURE 9 shows an example of a front view of the SWT with 4 Gigabit Ethernet SFP bays and with 26 F...

Page 21: ...enance connector identified as SRV at the right of the SWT for accessing the equipment through a console and an I O connector FIGURE 11 Location of the SRV maintenance connector and the I O connector...

Page 22: ...e up of eight copper wires that form the four twisted pairs covered in different coloured insulating material FIGURE 12 shows the colour of the wires that make up each one of the pairs according to AN...

Page 23: ...the 10 100Base Tx LAN interface Pair 1 is used for the VDCPoE connection and pair 4 is used for the VDCPoE connection in the ports that admit the PoE power supply option electrical ports 1 to 4 Strai...

Page 24: ...length should not be more than 2 km FIGURE 15 shows the most important input and output optical power characteristics according to the type of multimode fiber used All the MT RJ type connectors have a...

Page 25: ...e The cable length should not be more than 2 km FIGURE 15 shows the most important input and output optical power characteristics according to the type of multimode fiber used All the LC type connecto...

Page 26: ...section 1 4 3 Accessories Bays have a protective cap FIGURE 16 SFP modules Inserting procedure of an SFP module The inserting procedure of an SFP module is the following 1 Remove the protective packa...

Page 27: ...he following 1 Disconnect the optical fiber from the connector of the SFP module 2 Pull down the transceiver security lever 3 Whilst the security lever down remove the port from the module if the SFP...

Page 28: ...ics of the maintenance connector and its use are indicated below The connector has a protective cap FIGURE 18 Location of the SRV maintenance connector Pin RS 232 2 RD 3 TD 5 GND SRV CONNECTOR DCE mod...

Page 29: ...UTPUT pin 1 2 Input Inactive In Voltage 8 Vdc between pins 4 5 Output Active Impedance 26 between pins 1 2 Input Active In Voltage 10 Vdc between pins 4 5 Output Inactive Impedance 500 M between pins...

Page 30: ...according to the model are indicated in the following sections 3 1 SWT WITH FRONT PORTS FIGURE 20 shows a front view of the SWT with front ports showing the detail of the different LEDs They are descr...

Page 31: ...oE power supply will remain off LEDs associated with SFP ports Link Act LED Amber There is one LED per SFP interface It stays on when the link is established correctly and flashes in the case of emiss...

Page 32: ...port It stays on when the link is established correctly and flashes in the case of emission or reception activity in the interface LEDs associated with 100Base Fx multimode LC ports or 100Base Lx sing...

Page 33: ...IDE M0SWTA1903Iv09 V09 March 2019 LEDs associated with 100Base Fx multimode SC ports Link Act LED Green There is one LED per port It stays on when the link is established correctly and flashes in the...

Page 34: ...the SWT with rear ports Basic LEDs SRV LED Amber It flashes when there is emission or reception activity by the SRV serial service interface ON LED Red It is permanently lit when the equipment is powe...

Page 35: ...n when the link is established correctly and flashes in the case of emission or reception activity in the interface It lights up in green at 100 Mbit s and in amber at 10 Mbit s LEDs associated with 1...

Page 36: ...D per port It stays on when the link is established correctly and flashes in the case of emission or reception activity in the interface LEDs associated with 100Base Fx multimode LC ports or 100Base L...

Page 37: ...commands that is obtained by executing the help command The data are grouped virtually into directories and subdirectories To browse through the directories the cd change directory command is used The...

Page 38: ...ing able to obtain access Access can also be obtained to the console remotely through SSH connection and Telnet 4 2 HTTP SERVER The HTTP server included provides access to the HTML pages giving access...

Page 39: ...led data are explicitly shown as buttons labelled Add and Delete located on each of the objects that use them The factory IP address of the equipment is 192 168 0 1 meaning it is possible to access th...

Page 40: ...the Apply command which entails the immediate use of the changes made the second is to execute the Save command which means that the changes will be operative once the equipment is rebooted If accessi...

Page 41: ...lidates the user identity In addition to the configuration parameters which will be described in the following sections as shown in the figure the system provides information about the equipment softw...

Page 42: ...re established profiles guest and admin The guest profile can only access query operations On the contrary the admin profile has access to all the system configuration data As summarised in TABLE 1 th...

Page 43: ...y An example might be the loss of the primary ISP connection Critical Level 3 May be used to indicate a failure in the system s primary application Error Level 4 An application has exceeded it file st...

Page 44: ...ess of the Remote Syslog server to which the information is sent The system can order the selective activation deactivation of log information associated to some operating blocks see command log Throu...

Page 45: ...cally through the DHCP client if this control is not selected IP address It establishes the switch IP address IP mask It establishes the mask associated with the switch IP address VLAN id VLAN numeric...

Page 46: ...in the equipment and the assigning of each port to one of the VLANs defined in the equipment see section 5 5 By default Web management is accessible from the interfaces assigned to vlan1 As a factory...

Page 47: ...be transmitted without a tag Trunk All the frames will in all cases be transmitted with a tag It is the specific mode for connection with other switching equipment so as to preserve the VLAN informati...

Page 48: ...any value other than 100hdx is processed as 100fdx The SFP interfaces do not support changing speed that is to say they can operate at the speed set by the manufacturer so that the field value does no...

Page 49: ...by a comma without spaces If a range is to be included the initial and final vlan identifiers are separated by a dash Example in equipment with the vlan1 to vlan3 and vlan5 defined the group of numer...

Page 50: ...ng to the standards 5 5 VLAN CONFIGURATION A Virtual Local Area Network VLAN can be defined as a series of devices connected in a network which belong to one Local Area Network even though they are co...

Page 51: ...on mode is IVL Independent VLAN Learning by default The equipment operates in SVL mode Shared VLAN Learning with the option selected The SVL Overlapping Enabled mode is necessary when using topologies...

Page 52: ...d available to users VID It establishes the VLAN identifier The admitted range goes from 1 to 4095 PRI Override This establishes whether the priority of the frames received in the ports assigned to th...

Page 53: ...tes that the VLAN VID will be sent with double tagging Name A mnemonic descriptive field available to users The VID identifiers that are configured for the Q in Q function will be used in the S Tag an...

Page 54: ...ticking or not ticking the respective Enable box Traffic It specifies the type of traffic all broadcast b broadcast and multicast bm or broadcast multicast and flooding bmf Broadcast refers to the dif...

Page 55: ...n and service policy and establishes the conditions in which it will be treated by the equipment The equipment provides QoS at level 2 switching Level 2 QoS is performed on switched traffic adjusted t...

Page 56: ...erridden If on the contrary they only include the priority they are processed in accordance with the section entitled QoS Port Table The sections and their configuration parameters are as follows Weig...

Page 57: ...frames received do not include an 802 1p tag The assigning of internal priorities is done based on the values established in the section entitled Priority Use IEEE 802 1p The enabled option indicates...

Page 58: ...configuration page 5 8 PORTS MONITORING CONFIGURATION This menu performs Port mirroring functions in the ports in order to monitor their behaviour The incoming and or outgoing traffic from a specific...

Page 59: ...g Egress Monitoring The configuration parameters for each block are indicated below Ingress Monitoring Enable It permits enabling and disabling monitoring of the incoming traffic by ticking or not tic...

Page 60: ...outgoing traffic by ticking or not ticking the corresponding box Monitored Ports It establishes the port or ports to be monitored The outgoing traffic in each one of the selected ports will be replic...

Page 61: ...the LLDP agent of the interface Valid values are TxRx TxOnly RxOnly and disabled The default value is TxRx Tx Interval It sets the time between the transmission of messages in normal operation The un...

Page 62: ...LDP messages sent The value of the field is the text of the Hostname parameter of the main menu see 5 1 1 SysDesc Indicates to the LLDP agent whether or not to include the optional field with the desc...

Page 63: ...Changes made to the SNMP agent configuration will only be active after RESETTING the equipment The Apply command is not sufficient and so the changes must previously be saved using the Save command be...

Page 64: ...assword establishes the word to be used to generate the authentication information The authentication word must be known by the receiver in order to be able to verify the authenticity of the identity...

Page 65: ...es This parameter is only used to create the traps when using SNMPv1 Traps SNMPv3 Tabulate information allowing several destination equipment for the notifications to be defined The receivers are iden...

Page 66: ...re Enable A simple checkbox parameter to indicate whether the STP must be executed or not Version This establishes which of the possible protocol versions will be executed STP or RSTP Rapid STP Bridge...

Page 67: ...SWT GIGABIT FAST ETHERNET SWITCH TYPE SWT 67 137 USER GUIDE M0SWTA1903Iv09 V09 March 2019 FIGURE 36 STP menu configuration page...

Page 68: ...level 2 switching devices connected to the interface This is useful in cases in which the type of devices to be connected is not known The last and fourth mode redundant is specifically designed for p...

Page 69: ...he interfaces operating in edge mode This parameter is only effective when the operating state of the interface is edge and this situation is only possible when the Edge parameter is configured as on...

Page 70: ...t less accurate and on the other hand it is necessary to run it periodically FIGURE 38 NTP SNTP menu configuration page The general usage parameters are Enable Enables disables the execution of the NT...

Page 71: ...width that is used for the synchronization messages There is an additional parameter not dependent on the configuration of NTP servers that sets whether broadcast NTP type messages will be accepted Ac...

Page 72: ...anual configuration that is by configuring static entries with the multicast address of interest and the ports to which the corresponding traffic must be transmitted There are other mechanisms differe...

Page 73: ...T 73 137 USER GUIDE M0SWTA1903Iv09 V09 March 2019 FIGURE 40 Example of using the GARP GMRP or IGMP Snooping a Network that does NOT use Multicast configuration protocols b Network that uses GARP GMRP...

Page 74: ...re 40a shows a network made up by four level 2 switches which in turn are connected to a router Host A is a multicast message emitter and the Hosts B and C are multicast receivers belonging to the sam...

Page 75: ...cluded the initial and final vlan identifiers are separated by a dash The value all means the vlan is not relevant Example in equipment with the vlan1 vlan3 and vlan4 defined the group of numerical id...

Page 76: ...ich the interface is involved Additionally the GMRP protocol also applies this type of manual configuration in an abstract group address called Forward All which means than an interface wants to recei...

Page 77: ...n t be accepted by the client equipment for the group address and that only the multicast traffic registered in the interface will be treated 5 13 3 IGMP The IGMP Snooping is an optimization to be use...

Page 78: ...obtained information Enable A simple CheckBox to indicate if the IGMP periodic consultation service is active or not It establishes the equipment physical port number IGMP forward It establishes the...

Page 79: ...TTP server web and telnet Local users predefined in the system are always present but some external resources can be used to validate users for different types of access for which reason the user data...

Page 80: ...sets the privilege level 0 to 15 in the request to the TACACS server to gain access as guest user guest The privilege level must be consistent with the one configured in the TACACS server queried Admi...

Page 81: ...l access When this option is enabled if there is no accessibility to the configured TACACS or RADIUS servers users are permitted to validate themselves with local user names If the option is disabled...

Page 82: ...number of MAC addresses permitted at one time in the indicated port On max reached This establishes the behaviour of the equipment in the event of reaching the maximum number of MAC addresses permitte...

Page 83: ...AuthMax It establishes the maximum number of tries the equipment will send to request reauthentication The value should be between 1 and 10 Quiet time after failure quietPeriod It indicates the period...

Page 84: ...is to be included the initial port identifier and final port identifier are separated by a dash The value any means the port is not relevant VLANs Numerical identifier of the VLAN defined in the equi...

Page 85: ...blishes the maximum time a learned MAC address of inactivity will remain in the switch MAC address table The value to be configured in seconds is between 15 and 3600 The value established by default i...

Page 86: ...updating of applicative software by executing the Reflash command which is only available in the HTML pages and for the administrator profile The code reflash process does not alter the configuration...

Page 87: ...HTML browser window but depending on the browser it is possible that only the result at the end of the process is shown The Only verify option allows users to check that the code saved is coincident w...

Page 88: ...rmation received and indicates the error situation to the user If the received configuration is valid it is indicated by the system to the user and it is then possible to continue Continue button When...

Page 89: ...ant event log General Events events txt the authentication event log Authority Events authority txt and the security event log Security Events security txt are available The latter is only accesible f...

Page 90: ...atistics are grouped into data on the Ethernet Ports interfaces the MAC addresses identified by the switch STP protocol LLDP protocol and the synchronization client NTP each of which can be accessed b...

Page 91: ...ABIT FAST ETHERNET SWITCH TYPE SWT 91 137 USER GUIDE M0SWTA1903Iv09 V09 March 2019 FIGURE 52 Example of statistics related to general data FIGURE 53 Example of statistics related to the Ethernet ports...

Page 92: ...SWT GIGABIT FAST ETHERNET SWITCH TYPE SWT 92 137 USER GUIDE M0SWTA1903Iv09 V09 March 2019 FIGURE 54 Example of statistics related to a specific port selection of parameter...

Page 93: ...SWT GIGABIT FAST ETHERNET SWITCH TYPE SWT 93 137 USER GUIDE M0SWTA1903Iv09 V09 March 2019 FIGURE 55 Example of statistics related to the MAC addresses identified by the switch...

Page 94: ...SWT GIGABIT FAST ETHERNET SWITCH TYPE SWT 94 137 USER GUIDE M0SWTA1903Iv09 V09 March 2019 FIGURE 56 Example of statistics related to STP protocol...

Page 95: ...SWT GIGABIT FAST ETHERNET SWITCH TYPE SWT 95 137 USER GUIDE M0SWTA1903Iv09 V09 March 2019 FIGURE 57 Example of statistics of the LLDP protocol FIGURE 58 Example of statistics related to NTP...

Page 96: ...SWT GIGABIT FAST ETHERNET SWITCH TYPE SWT 96 137 USER GUIDE M0SWTA1903Iv09 V09 March 2019 APPENDIX A BIBLIOGRAPHY AND ABBREVIATIONS...

Page 97: ...A 1 BIBLIOGRAPHY 1 STD 15 IEEE RFC 1157 May 1990 A Simple Network Management Protocol SNMP 2 STD 62 IEEE RFC 3416 December 2002 Version 2 of the Protocol Operations for the Simple Network Management P...

Page 98: ...Multipoint Virtual Private Network DNS Domain Name Server DPD Dead Peer Detection DSCP Differentiated Services Code Point GPRS General Packet Radio Service GRE Generic Routing Encapsulation HTTP Hype...

Page 99: ...to Point Protocol PPTP Point to Point Tunneling Protocol PSTN Public Switched Telephone Network QoS Quality of Service RADIUS Remote Authentication Dial In User Server RAS Registration Authentication...

Page 100: ...V09 March 2019 VLAN Virtual Local Area Network VPN Virtual Private Network VRID Virtual Router Identifier VRRP Virtual Router Redundancy Protocol WAN Wide Area Network WEP Wired Equivalent Privacy WIN...

Page 101: ...SWT GIGABIT FAST ETHERNET SWITCH TYPE SWT 101 137 USER GUIDE M0SWTA1903Iv09 V09 March 2019 APPENDIX B DATA STRUCTURE IN CLI...

Page 102: ...pment Conventions The equipment configuration parameters are laid out in a tree directory in which parameters and related subdirectories are grouped where A name followed by indicates the name of a di...

Page 103: ...uipment SRV Communication between the computer and the equipment is established through a terminal emulation programme such as Windows HyperTerminal configuring a serial connection with the following...

Page 104: ...ompt will appear ready for the user to enter the login and code for starting the session the logins and their respective passwords are the same as in the web interface Remember that no text will appea...

Page 105: ...DE M0SWTA1903Iv09 V09 March 2019 FIGURE 61 Putty home window In the Serial menu last of all the serial port is configured If an USB converter is used first consult the COM number in the Device adminis...

Page 106: ...ith Putty Pressing the Open button and return if necessary a window is shown in which the swt login prompt will appear ready for the user to enter the login and code for starting the session the login...

Page 107: ...nd be connected to the management computer network Telnet can be executed in Windows XP from the Start button Start Execute and in the text box enter telnet space Equipment_IP_address 111 222 0 123 in...

Page 108: ...uipment the equipment login prompt will appear ready for the user to enter the login and code for starting the session the logins and their respective passwords are the same as in the web interface In...

Page 109: ...eletes the statistics date Shows the date stored in the equipment download Generates a configuration commands file exit Interrupts the connection with the equipment get Shows the parameter values help...

Page 110: ...tats tail Information in the log The events that are generated at the system level and sent to the log include an identification level The system supports 8 different levels separated into two blocks...

Page 111: ...hich it is located or enter the relative route The new item created has the next order number with respect to the last one For instance if nat 1 and nat 2 already existed on executing the command add...

Page 112: ...ds required to obtain the current configuration It is a good idea to copy and save this list of commands in a txt file so it can be used in other equipment with the same characteristics To apply the s...

Page 113: ...drn get main hostname drn admin get main hostname remove This eliminates an item from the matrix of a matrix type parameter Syntax drn remove name n Arguments name Parameter from which the item is to...

Page 114: ...his command can be used irrespective of the directory where the user is Example drn restore save This saves the changes made in configuring the equipment in its permanent memory However these changes...

Page 115: ...argument must include the parameter name the item number and the attribute number Special attention should be paid when entering the arguments of this command as if no argument is indicated the system...

Page 116: ...mmediately above it two dots must be entered cd When the directory is changed the prompt shows the equipment identification letters and the name of the active directory Example drn main Examples drn c...

Page 117: ...ul if it is required to reload the configuration saved in the equipment after the time it was saved Example drn reload telnet Open a telnet session keeping the connection established between the compu...

Page 118: ...the statistics Syntax drn clear Arguments Observations Example drn clear date Shows the date and time recorded in the equipment Syntax drn date Arguments Observations Example drn date help Displays a...

Page 119: ...iming by using a suffix The higher the suffix oldest is the file contents Use the show command to display the oldest files You can filter at will the temporary log using the text as a filter after the...

Page 120: ...ents of the log file specified Syntax drn show file Arguments file Name of the file desired to display The log file in use current is named messages Oldest log files include a suffix e g messages 1 Ob...

Page 121: ...how a parameter for a specific status or those of a specific directory the names of each one must be known Once at drn mac the execution of the command stats shows the MAC addresses identified by the...

Page 122: ...med that the equipment is connected to a network and with an IP address configured which in the case of this example will be 111 222 0 123 In addition the computer used to make the connection is also...

Page 123: ...ly want information it makes no difference which login is entered admin or guest Enter guest and then press enter Now the system is waiting for us to enter the respective password Enter passwd01 which...

Page 124: ...nformation extends beyond the edges of the window the system will only show the information at the start and it will be necessary to press enter once or several times for all the information to be sho...

Page 125: ...left button press the enter key That way you will have copied the selected text into the Windows clipboard Now open Windows Notepad and paste the text Ctrl V in a txt file and save it 4 Obtaining the...

Page 126: ...e the information in a txt file using the method described above 5 Obtaining the equipment statistics The equipment statistics list is shown through the command stats In this example it is assumed tha...

Page 127: ...t is assumed that the equipment is a DRA 2 Remember to save the information in a txt file as indicated above Remember to save the information in a txt file as indicated above 7 Obtaining events taking...

Page 128: ...pt_mode swt_int_devnum 0 qinq stag 0x88A8 vlanoverlapping enable off Press any key to continue or CTRL C to stop A J vlan vlan name vid priover priority 1 vlan_name 1 off 0 2 vlan_name 10 off 0 port p...

Page 129: ...2 off all 60000000 3 off all 40000000 4 off all 20000000 5 off all 64000 6 off all 64000 7 off all 64000 8 off all 64000 9 off all 64000 10 off all 64000 11 off all 64000 12 off all 64000 13 off all...

Page 130: ...auto off 18 on 128 200000 auto auto off 19 on 128 200000 auto auto off 20 on 128 200000 auto auto off 21 on 128 20000 auto auto off 22 on 128 20000 auto auto off 23 on 128 20000 auto auto off 24 on 1...

Page 131: ...24 auto garp_timers port port join_time leave_time leaveall_time 1 200 600 10000 2 200 600 10000 3 200 600 10000 4 200 600 10000 5 200 600 10000 6 200 600 10000 7 200 600 10000 8 200 600 10000 9 200...

Page 132: ...hared_key tH4sIADiCD1wCAzM0AANtAHFEx4YIAAAANDI5OTM3YzMyN2VmYjU4MTc2NjM3MMmY1OWJlMWNiOGQK guest_lvl 1 admin_lvl 2 radius server1_ip 0 0 0 0 server2_ip 0 0 0 0 udp_port 1812 secret tH4sIADiCD1wCAzM0AAPt...

Page 133: ...arch 2019 Press any key to continue or CTRL C to stop A J reauth_period 3600 reauth_max 2 quiet_period 60 radius_server ip 10 212 4 5 udp_port 1812 secret tH4sIADiCD1wCAzM0AANtIyMDMwNzYwNDcwAgTwtvEgAA...

Page 134: ...alid certificate with the command upload cert raw The procedure for loading the certificate is the following Copy in the clipboard the certificate Then execute the indicated upload command and when it...

Page 135: ...g that the certificate has not been validated by a trusted authority Select Go to this web site not recommended Then the equipment access control requires the user login and password In the equipment...

Page 136: ...5mM2hOhWKgaJn0ZEGDqcoIMLj4 E3f 3QIDAQAB nA oGAOvDzYhVKhjodHlUzm3lbsZzAklKAKNorgn8kxbpYE RM8mkV9f Lb3jWhiEu nxy f7m7BmNMcex8bSRwduzrUnK66DW8jP3b2tsxJHLYU9UpN1XKDNBHGvgJ7Gis S nApu oZFYmh34uBl6SJkUdihCs...

Page 137: ...1Bz0FPn3LRxC1Mb6PI kNatYteCq5FJNjGunF8hDIQVc1x7O2ju2vmGOiyVfSz1eqiy Tx0dMYsgpBeY3K 8fb J1jmLPNzPhgMlzPK6VGNA70 QhfCG9l5xK1oWQ END CERTIFICATE Example of a valid private key BEGIN RSA PRIVATE KEY MIICW...

Reviews: