3Com 3CRUS2475 24 Скачать руководство пользователя страница 49

Defining RADIUS Authentication

49

Number of Retries

 — Defines the number of transmitted requests 

sent to the RADIUS server before a failure occurs. Possible field values 
are 1-10. The default value is 3.

Timeout for Reply

 — Defines the amount of time (in seconds) the 

device waits for an answer from the RADIUS server before retrying the 
query, or switching to the next server. Possible field values are 1-30. 
The default value is 3.

Dead Time

 — Defines the default amount of time (in minutes) that a 

RADIUS server is bypassed for service requests. The range is 0-2000. 
The default value is 0.

Key String

 — Defines the default key string used for authenticating 

and encrypting all RADIUS-communications between the device and 
the RADIUS server. This key must match the RADIUS encryption.

Usage Type

 — Specifies the RADIUS server authentication type. The 

default value is 

All

. The possible field values are: 

Log in —

 Indicates the RADIUS server is used for authenticating 

user name and passwords. 

802.1X

 — Indicates the RADIUS server is used for 802.1X 

authentication.

All

 — Indicates the RADIUS server is used for authenticating user 

names and passwords, and 802.1X port authentication.

2

Define the fields.

3

Click 

. The RADIUS Servers are enabled, and the system is 

updated. 

Содержание 3CRUS2475 24

Страница 1: ...www 3Com com Part No 10015245 Rev AA Published October 2006 3Com Unified Gigabit Wireless PoE Switch 24 User Guide 3CRUS2475...

Страница 2: ...t to remove or deface any portion of any legend provided on any licensed program or documentation contained in or delivered to you in conjunction with this User Guide Unless otherwise indicated 3Com r...

Страница 3: ...nitors and troubleshoots network devices from a remote web browser The Embedded Web Interface web pages are easy to use and easy to navigate In addition The Embedded Web Interface provides real time g...

Страница 4: ...ACLs and device access methods Managing System Information Provides information for configuring general system information including the user defined system name the user defined system location and...

Страница 5: ...mapping policies and configuring Trust mode Managing System Logs Provides information for viewing system logs and configuring device log servers Managing System Files Provides information for definin...

Страница 6: ...tions Table 1 lists conventions that are used throughout this guide Related Documentation In addition to this guide other documentation available for the 3Com Unified Switch 24 include the following Q...

Страница 7: ...ning Wireless Settings 18 Step 5 Saving Configured Settings 19 2 GETTING STARTED Starting the 3Com Embedded Web Interface 20 Understanding the 3Com Embedded Web Interface 22 Using Screen and Table Opt...

Страница 8: ...ultiple Hosts 61 Modifying Multiple Hosts 62 Managing Port Security 64 Enabling Storm Control 68 Configuring EAP Statistics 71 Defining ACLs 73 Configuring ACLs 76 Defining MAC based ACL Rules 78 Remo...

Страница 9: ...AG Membership 136 7 CONFIGURING VLANS Defining VLAN Properties 140 Defining VLAN Membership 144 Defining VLAN Interface Settings 147 Defining GVRP 151 Defining Voice VLAN 154 8 DEFINING WLAN Defining...

Страница 10: ...RWARDING Defining IGMP Snooping 205 Enabling IGMP Snooping 207 Defining Multicast Groups 209 Defining Router Groups 215 11 CONFIGURING SPANNING TREE Defining Classic Spanning Tree for Ports 219 Config...

Страница 11: ...SYSTEM FILES Backing Up and Restoring System Files 265 Downloading the Software Image 267 Activating Image Files 269 15 VIEWING STATISTICS Viewing RMON Statistics 271 Configuring RMON History 274 Mod...

Страница 12: ...TTINGS B DEVICE SPECIFICATIONS AND FEATURES Related Standards 308 Environmental 308 Physical 309 Electrical 309 Unified Switch 24 Features 310 C TROUBLESHOOTING Problem Management 316 Troubleshooting...

Страница 13: ...ameters that can be manually configured by the system administrator The wizard includes the following steps Step 1 Viewing Factory Defaults Step 2 Configuring System Settings Step 3 Configuring IP Set...

Страница 14: ...0 160 characters System Location Defines the location where the system is currently running The field range is 0 160 characters System Contact Defines the name of the contact person The field range is...

Страница 15: ...nd can contain up to 32 characters Security Type Indicates the method used to secure WLAN access The possible field values are Open Enables open system authentication without encryption WEP Indicates...

Страница 16: ...o Enable Enables the Master Radio Country Code Displays a list of country codes System Name Defines the user defined device name The field range is 0 160 characters System Location Defines the locatio...

Страница 17: ...the IP Interface is configured by the user DHCP Indicates that the IP Interface is dynamically created IP Address Displays the currently configured IP address Subnet Mask Displays the currently confi...

Страница 18: ...que SSID are denied network access Each SSID must be unique and can contain up to 32 characters Security Type Indicates the method used to secure WLAN access The possible field values are Open Enables...

Страница 19: ...higher bit rates Passphrase Key Indicates the encryption key type VLAN ID Specifies the VLAN ID 7 Define the fields 8 Click to move to the final stage Step 5 Saving Configured Settings The Manual Con...

Страница 20: ...ice Starting the 3Com Embedded Web Interface Disable the popup blocker before beginning device configuration using the EWS This section contains information on starting the 3Com Embedded Web interface...

Страница 21: ...ame and password The device is configured with a user name that is admin and a password that is blank and can be configured without entering a password Passwords are case sensitive To operate the devi...

Страница 22: ...figuration located at the top of the home page the tab view contains a Setup Wizard and the Summary Wired and Wireless configuration views Tree View Tree View provides easy navigation through the conf...

Страница 23: ...ding modifying and deleting configuration parameters Device Representation The 3Com Embedded Web Interface Home Page contains a graphical panel representation of the device that appears within the Wir...

Страница 24: ...g the 3Com Embedded Web Interface Management Buttons Configuration Management buttons and icons provide an easy method of configuring device information and include the following Table 2 3Com Web Inte...

Страница 25: ...Table Options 3Com contains screens and tables for configuring devices This section contains the following topics Viewing Configuration Information Adding Configuration Information Modifying Configura...

Страница 26: ...e Port Settings Summary Page opens Figure 10 Port Settings Summary Page Adding Configuration Information User defined information can be added to specific 3Com Web Interface pages by opening a Setup p...

Страница 27: ...Using Screen and Table Options 27 Figure 11 Password Management Setup Page 2 Define the fields 3 Click The configuration information is saved and the device is updated...

Страница 28: ...g Configuration Information 1 Click Wired Ports LACP Modify A modification page such as the LACP Modify Page opens Figure 12 LACP Modify Page 2 Modify the fields 3 Click The fields are modified and th...

Страница 29: ...on Information 1 Click Administration Management Access Remove The Management Access Remove Page opens Figure 13 Management Access Remove Page 2 Select the management method to be deleted 3 Click The...

Страница 30: ...ation Page A message appears The operation will save your configuration Do you wish to continue 2 Click A Configuration is saved to flash memory successful message appears 3 Click The configuration is...

Страница 31: ...e 2 Click A confirmation message is displayed 3 Click The device is reset and a prompt for a user name and password is displayed 4 Enter a user name and password to reconnect to the web interface Rest...

Страница 32: ...ation Reset The Reset Page opens Figure 16 Reset Page 2 Click The system is restored to factory defaults Logging Off the Device To log off the device 1 Click The Logout Page opens 2 The following mess...

Страница 33: ...d configure essential information required for setting up and maintaining device settings The various views display the settings configured in the Wizard and other basic maintenance views For further...

Страница 34: ...The Device Summary Page opens Figure 17 Device Summary Page The Device Summary Page contains the following fields Product Description Displays the device model number and name System Name Defines the...

Страница 35: ...e 41 days 2 hours 22 minutes and 15 seconds Software Version Displays the installed software version number Boot Version Displays the current boot version running on the device Hardware Version Displa...

Страница 36: ...s RJ45 Displays the port status of the RJ45 Registered Jack 45 connections which are the physical interface used for terminating twisted pair type cable SFP Displays the port status of the Small Form...

Страница 37: ...cess point status Ensure that the Wireless Controller Software WCS has been activated To view Wireless Access Point Settings 1 Click Device Summary Wireless The Wireless Page opens Figure 19 Wireless...

Страница 38: ...based on MIMO Multiple input multiple output technology which uses multiple antennas at both the source transmitter and the destination receiver to minimize errors and optimize data speed Channel Dis...

Страница 39: ...re device management security password management defining RADIUS and TACACS authentication This section includes the following topics Defining Management Access Configuring Password Management Port b...

Страница 40: ...ccessed by all interfaces To view Management Access 1 Click Administration Management Access Summary The Management Access Summary Page opens Figure 20 Management Access Summary Page The Management Ac...

Страница 41: ...ss to the device SNMP Assigns SNMP access to the rule If selected users accessing the device using SNMP meeting access profile criteria are permitted or denied access to the device HTTP Assigns HTTP a...

Страница 42: ...ther locally or on an external server User authentication occurs in the order the methods are selected If the first authentication method is not available the next selected method is used The possible...

Страница 43: ...ted access profile Access Profiles cannot be removed when Active Unchecked Maintains the access profiles Management Method Defines the management method for which the rule is defined Source IP Address...

Страница 44: ...Password Management Summary The Password Management Summary Page opens Figure 23 Password Management Summary Page The Password Management Summary Page contains the following fields User Name Displays...

Страница 45: ...elds User Name Displays the user name Access Level Displays the user access level The lowest user access level is Monitoring and the highest is Configuration Configuration Provides users read and writ...

Страница 46: ...lays the user name Access Level Displays the user access level The lowest user access level is Monitoring and the highest is Configuration Configuration Provides users read and write access rights Mon...

Страница 47: ...Removes the user from the User Name list The possible field values are Checked Removes the selected local user Unchecked Maintains the local users User Name Displays the user name Access Level Display...

Страница 48: ...defined RADIUS servers To configure RADIUS Servers 1 Click Administration Authentication RADIUS Setup The Radius Authentication Setup Page opens Figure 27 Radius Authentication Setup Page The Radius...

Страница 49: ...rvice requests The range is 0 2000 The default value is 0 Key String Defines the default key string used for authenticating and encrypting all RADIUS communications between the device and the RADIUS s...

Страница 50: ...rvices Authentication Provides authentication during login and via user names and user defined passwords Authorization Performed at login Once the authentication session is completed an authorization...

Страница 51: ...ds Host IP Address Defines the TACACS Server IP address Key String Defines the default authentication and encryption key for TACACS communication between the device and the TACACS server Authenticatio...

Страница 52: ...52 CHAPTER 3 MANAGING DEVICE SECURITY Checked Enables a single connection Unchecked Disables a single connection 2 Define the fields 3 Click The TACACS Server is enabled and the device is updated...

Страница 53: ...ve data Ports are authenticated via the RADIUS server using the Extensible Authentication Protocol EAP Port based authentication includes Authenticators Specifies the device port which is authenticate...

Страница 54: ...port based authentication on the device Disable Disables port based authentication on the device Authentication Method Specifies the authentication method used for port authentication The possible fi...

Страница 55: ...ID 2 Define the fields 3 Click The 802 1x Global Settings are enabled and the device is updated To view Port based Authentication 1 Click Policy Security Port Authentication Summary The Port Authenti...

Страница 56: ...cation is enabled on the device Reauthentication Period Displays the time span in seconds in which the selected port is reauthenticated The field default is 3600 seconds The field range is 300 4294967...

Страница 57: ...ys the admin port authorization state ForceUnauthorized Indicates that either the port control is force Unauthorized and the port link is down or the port control is Auto but a client has not been aut...

Страница 58: ...is not received after the defined period the authentication process is restarted The field default is 2 retries The field range is 0 65535 Supplicant Timeout Displays the Supplicant Timeout The field...

Страница 59: ...t access lists The Authenticated Hosts Page contians the following fields User Name Contains a list of the various RADIUS servers used as authenticators as defined in the Add User Name Port Indicates...

Страница 60: ...Name Lists the supplicants that were authenticated and are permitted on each port Session Time Displays the amount of time in seconds the supplicant was logged on the port Authentication Method Displa...

Страница 61: ...ch advanced port based authentication is enabled Multiple Hosts Indicates whether multiple hosts are enabled Multiple hosts must be enabled in order to either disable the ingress filter or to use port...

Страница 62: ...ined only if multiple hosts are disabled The field range is 1 1 000 000 The default is 10 seconds Status Indicates the host status If there is an asterisk the port is either not linked or is down The...

Страница 63: ...enabled in order to either disable the ingress filter or to use port lock security on the selected port The possible field values are Multiple Multiple hosts are enabled Disable Multiple hosts are di...

Страница 64: ...AC addresses can be dynamically learned or statically configured Locked port security monitors both received and learned packets that are received on specific ports Access to the locked port is limite...

Страница 65: ...d is currently receiving and transmitting traffic Locked The port is currently disabled and is not currently receiving or transmitting traffic Learning Mode Defines the locked port type The Learning M...

Страница 66: ...to packets arriving in single host mode from a host whose MAC address is not the supplicant MAC address The possible field values are Forward Forwards the packet Discard Discards the packets This is...

Страница 67: ...rmed to static MAC addresses When the port is unlocked they are removed from the static list Learning Mode Defines the locked port type The Learning Mode field is enabled only if Locked is selected in...

Страница 68: ...onds between traps The default value is 10 seconds 2 Define the fields 3 Click The Port Security settings are modified and the device is updated Enabling Storm Control Storm control limits the amount...

Страница 69: ...o the selected ports Port Indicates the port from which storm control is enabled Enable Broadcast Control Indicates if forwarding Broadcast packet types is enabled on the interface Enable Enables broa...

Страница 70: ...cast storm control To modify Storm Control Settings 1 Click Policy Storm Control Modify The Storm Control Modify Page opens Figure 38 Storm Control Modify Page The Storm Control Modify Page contains t...

Страница 71: ...Threshold Indicates the maximum rate kilobits per second at which unknown packets are forwarded The range is 3 500 1 000 000 The default value is 3 500 2 Modify the fields 3 Click Storm control is en...

Страница 72: ...e port Log off Frames Receive Indicates the number of EAPOL Logoff frames that have been received on the port Respond ID Frames Receive Indicates the number of EAP Resp Id frames that have been receiv...

Страница 73: ...that are made of the filters that determine traffic classifications The following fiters can be defined as ACEs Source Port IP Address and Wildcard Mask Filters the packets by the Source port IP addre...

Страница 74: ...h ACE is matched to a packet on a first match basis The possible field values are 1 2147483647 Source Address Indicates the source MAC address Source Mask Indicates the MAC address Source Mask Destina...

Страница 75: ...values are Permit Forwards packets which meet the ACL criteria Deny Drops packets which meet the ACL criteria Shutdown Drops packet that meet the ACL criteria and disables the port to which the packet...

Страница 76: ...kets are matched on a first fit basis Source Address Indicates the source MAC address Source Wild Card Mask Indicates the source MAC Address wild card mask Wild cards are used to mask all or part of a...

Страница 77: ...F the first two bits of the MAC are used while the last two bits are ignored VLAN ID Matches the packet s VLAN ID to the ACL CoS Classifies traffic based on the CoS tag value CoS Mask Defines the CoS...

Страница 78: ...rder in the ACL list Source Address Indicates the source MAC address Source Wild Card Mask Indicates the source MAC Address wild card mask Wild cards are used to mask all or part of a source MAC addre...

Страница 79: ...ts of the MAC are used while the last two bits are ignored VLAN ID Specifies the VLAN ID CoS Classifies traffic based on the CoS tag value CoS Mask Defines the CoS mask used to classify network traffi...

Страница 80: ...based ACLs Remove ACL Enables the ACL to be removed Priority Defines the rule priority for the MAC based ACL VLAN ID Specifies the VLAN ID CoS Classifies Class of Service of the packet CoS Mask Define...

Страница 81: ...ch the packet was addressed Ports are reactivated from the Interface Configuration Page 2 Select the ACL Name to be deleted 3 Enable ACL Removal and select the ACL to be removed from the table 4 Click...

Страница 82: ...of the IP based ACLs Priority Indicates the ACE priority that determines which ACE is matched to a packet based on a first match basis The possible field value is 1 2147483647 Protocol Creates an ACE...

Страница 83: ...Flag Set Sets the indicated TCP flag that can be triggered ICMP Type Specifies an ICMP message type for filtering ICMP packets ICMP Code Specifies an ICMP message code for filtering ICMP packets ICMP...

Страница 84: ...New Rule Priority Enables the new rule priority New Rule Priority Defines the ACL priority ACLs are checked on the first fit basis The ACL priority defines the ACL order in the ACL list Protocol Creat...

Страница 85: ...es that all the bits are important For example if the source IP address 149 36 184 198 and the wildcard mask is 255 36 184 00 the first eight bits of the IP address are ignored while the last eight bi...

Страница 86: ...sed to match packets to ACLs Action Indicates the ACL forwarding action Possible field values are Permit Forwards packets which meet the ACL criteria Deny Drops packets which meet the ACL criteria Shu...

Страница 87: ...are checked on the first fit basis The ACL priority defines the ACL order in the ACL list Protocol Enables creating an ACL based on a specific protocol Select from List Selects a protocol from a list...

Страница 88: ...ss Matches the destination IP address to which packets are addressed to the ACL Wild Card Mask Indicates the destination IP Address wild card mask Wild cards are used to mask all or part of a destinat...

Страница 89: ...riteria and disables the port to which the packet was addressed Ports are reactivated from the Interface Configuration Page 2 Select an ACL from the ACL Name drop down list 3 Define the rule setup fie...

Страница 90: ...Removes an ACL The possible field values are Checked Removes the selected IP based ACL Unchecked Maintains the IP based ACL Priority Indicates the ACL priority which determines which ACL is matched to...

Страница 91: ...DSCP value or the IP Precedence value is used to match packets to ACLs IP Prec Indicates matching ip precedence with the packet ip precedence value Action Indicates the ACL forwarding action Possible...

Страница 92: ...mary Page contains the following fields Ports Displays the ACL Port parameters The possible field values are Interface Displays the port interface for which the ACL parameters are defined ACL Name Con...

Страница 93: ...rts or LAGs interface to be configured Ports Selects the ports interface to be bound LAGs Selects the LAGs interface to be bound Bind ACL Binds the interface to the ACL interface MAC based ACL Binds t...

Страница 94: ...tains information for configuring general system information and includes the following Viewing System Description Defining System Settings Configuring Country Codes Configuring System Name Configurin...

Страница 95: ...k Device Summary The Device Summary Information Page opens Figure 50 Device Summary Information Page The Device Summary Information Page contains the following fields Product Description Displays the...

Страница 96: ...isplays the device MAC address System Up Time Displays the amount of time since the most recent device reset The system time is displayed in the following format Days Hours Minutes and Seconds For exa...

Страница 97: ...97 Defining System Settings The following section allows system administrators to configure advanced system settings The section includes the following Configuring Country Codes Configuring System Nam...

Страница 98: ...and settings see WLAN Country Settings To configure the Country Code 1 Click Administration Country Code The Country Codes Page opens Figure 51 Country Codes Page The Country Codes Page contains the...

Страница 99: ...2 4835 Brazil BR C 36 40 44 48 52 56 60 64 149 153 157 161 200 mW EIRP 1 W EIRP 5 725 5 85 1 11 1 W EIRP 2 4 2 4835 Canada CA A 36 40 44 48 52 56 60 64 149 153 157 161 50 mW 6 dBi 200 mW 250 mW 6 dBi...

Страница 100: ...0 124 128 132 140 200 mW EIRP200 mW EIRP1 W EIRP 5 15 5 255 25 5 355 47 5 725 1 11 100 mW EIRP 2 4 2 4835 Estonia EE E 36 40 44 48 52 56 60 64 149 153 157 161 50 mW 6 dBi 200 mW250 mW 6 dBi 1 W1 W 6 d...

Страница 101: ...60 64 149 153 157 161 200 mW EIRP200 mW EIRP1 W 6 dBi 4 W 5 15 5 25 5 25 5 35 5 725 5 85 1 11 100 mW EIRP 2 4 2 4835 Hungary HU E 36 40 44 48 52 56 60 64 200 mW EIRP 5 15 5 255 25 5 35 1 11 1 W EIRP 2...

Страница 102: ...120 124 128 132 140 1 11 100 mW EIRP 2 4 2 4835 Italy IT E 36 40 44 48 52 56 60 200 mW EIRP200 mW EIRP1 W EIRP 5 15 5 25 5 25 5 35 5 47 5 725 64 104 108 112 116 120 124 128 132 140 1 11 100 mW EIRP 2...

Страница 103: ...104 108 112 116 120 124 128 132 140 1 11 100 mW EIRP 2 4 2 4835 Latvia LV E 36 40 44 48 52 56 60 50 mW 6 dBi 200 mW250 mW 6 5 15 5 25 5 25 5 35 5 725 5 85 64 149 153 dBi 1 W1 W 6 157 161 dBi 4 W 1 11...

Страница 104: ...53 dBi 1 W1 W 6 157 161 dBi 4 W 1 11 1 W Restricted Antennas 2 4 2 4835 Philippines PH C TBA TBA 5 725 5 875 100 mW EIRP 2 4 2 4835 Poland PL E 36 40 44 48 52 56 60 200 mW EIRP 1 W EIRP 2 4 2 4835 64...

Страница 105: ...15 5 255 25 5 355 725 5 85 64 149 153 dBi 1 W1 W 6 157 161 dBi 4 W 1 11 1 W Restricted Antennas 2 4 2 4835 Slovak Republic SK E 36 40 44 48 52 56 60 64 149 153 157 161 50 mW 6 dBi 200 mW250 mW 6 dBi...

Страница 106: ...25 5 35 1 11 1 W Conducted Output 2 4 2 4835 United States of America LOW USL A 36 40 44 48 52 56 60 64 50 mW 6 dBi 200 mW250 mW 6 dBi 1 W 5 15 5 25 5 25 5 35 1 11 1 W Conducted Output 2 4 2 4835 Unit...

Страница 107: ...tup Page includes the following fields System Name Defines the user defined device name The field range is 0 160 characters System Location Defines the location where the system is currently running T...

Страница 108: ...f March until the last weekend of October Bahamas From April to October in conjunction with Daylight Savings Time in the United States Belarus From the last weekend of March until the last weekend of...

Страница 109: ...ast weekend of March until the last weekend of October India India does not use Daylight Saving Time Iran From Farvardin 1 until Mehr 1 Iraq From April 1 until October 1 Ireland From the last weekend...

Страница 110: ...uay From April 6 until September 7 Poland From the last weekend of March until the last weekend of October Portugal From the last weekend of March until the last weekend of October Romania From the la...

Страница 111: ...dministration Time The Time Page opens Figure 53 Time Page The Time Page contains the following sections Local Settings Displays the system time in the following format Time Indicates the system time...

Страница 112: ...Month The month of the year in which DST ends every year The possible field range is Jan Dec Time The time at which DST ends every year The field format is Hour Minute for example 05 30 To Defines th...

Страница 113: ...ab allows the latest configuration to be saved to the flash memory To save the device configuration 1 Click Save Configuration The Save Configuration Page opens Figure 54 Save Configuration Page The f...

Страница 114: ...ng the Device The Reset page enables resetting the device from a remote location To prevent the current configuration from being lost save all changes from the running configuration file to the startu...

Страница 115: ...n contains information for configuring Port Settings and includes the following sections Viewing Port Settings Defining Port Settings Configuring Address Tables Viewing Static Addresses Defining Stati...

Страница 116: ...following fields Port Indicates the selected port number PortType Displays the type of the port Port Status Indicates whether the port is currently operational or non operational The possible field va...

Страница 117: ...ities to its partner Advertisement Defines the auto negotiation setting the port advertises The possible field values are Max Capability Indicates that all port speeds and duplex mode settings are acc...

Страница 118: ...connected to each other or two end stations are connected to each other a crossover cable is used to ensure that the correct pairs are connected The possible field values are MDIX Media Dependent Int...

Страница 119: ...ains the following fields Port Indicates the selected port number Description Displays a port description Port Type Indicates the type of the port Admin Status Indicates whether the port is currently...

Страница 120: ...sion between the device and its link partner in both directions simultaneously Half The interface supports transmission between the device and the client in only one direction at a time Current Duplex...

Страница 121: ...in full duplex mode Current Flow Control Displays the current flow control status on the port MDI MDIX Displays the MDI MDIX status on the port Hubs and switches are deliberately wired opposite the wa...

Страница 122: ...arning the ports from the frames source address Frames addressed to a destination MAC address that is not associated with any port are flooded to all ports of the relevant VLAN Static addresses are ma...

Страница 123: ...ossible values are Permanent The MAC address is permanent Delete on Reset The MAC address is deleted when the device is reset Delete on Time out The MAC address is deleted when a timeout occurs Secure...

Страница 124: ...ins the following fields Interface Displays specific port or LAG to which the static MAC address is applied MAC address Displays the MAC addresses listed in the current static addresses list VLAN ID D...

Страница 125: ...e out The MAC address is deleted when a timeout occurs Secure Used for defining static MAC Addresses for Locked ports Removing Static Addresses To remove Static addresses 1 Click Wired Ports Address T...

Страница 126: ...e internally used VLANs assigned to an port or trunk on which an IP address is configured MAC address The MAC addresses listed in the current static addresses list Interface The specific port or LAG t...

Страница 127: ...ing and viewing the Dynamic Address list The Current Address Table contains dynamic address parameters by which packets are directly forwarded to the ports To open the Dynamic MAC Address Summary Page...

Страница 128: ...e two interface types from which to select MAC Address Specifies the MAC address for which the table is queried VLAN ID The VLAN ID for which the table is queried Address Table Sort Key Specifies the...

Страница 129: ...a LAG must be the same media type A VLAN is not configured on the port The port is not assigned to a different LAG Auto negotiation mode is not configured on the port The port is in full duplex mode A...

Страница 130: ...o link aggregation port groups Each group is comprised of ports with the same speed To configure LACP Setup 1 Click Wired Ports LACP Setup The LACP Setup Page opens Figure 61 LACP Setup Page The LACP...

Страница 131: ...ACP Modify Page contains the following fields Port Displays the port number to which timeout and priority values are assigned LACP Port Priority Specifies port priority value The field range is 1 6553...

Страница 132: ...width between the devices increases port flexibility and provides link redundancy To view Link Aggregation 1 Click Wired Ports Link Aggregation Summary The Link Aggregation Summary Page opens Figure 6...

Страница 133: ...isplays the auto negotiation status on the LAG Auto negotiation is a protocol between two link partners that enables a LAG to advertise its transmission rate duplex mode and flow control abilities to...

Страница 134: ...Current Auto Negotiation Displays the current LAG auto negotiation status Admin Advertisement Defines the auto negotiation setting the LAG advertises The possible field values are Max Capability Indi...

Страница 135: ...rently operating at 100 Mbps 1000M Indicates the LAG is currently operating at 1000 Mbps Current Speed Displays the current LAG speed Admin Flow Control Displays the flow control status on the LAG Ope...

Страница 136: ...ink Aggregation Membership Page opens Figure 65 Link Aggregation Membership Page The Link Aggregation Setup Page contains the following fields LAG Specifies if the port is part of a LAG LAG Name Displ...

Страница 137: ...Defining LAG Membership 137...

Страница 138: ...within the VLAN a Layer 3 router working at a protocol level is required to allow traffic flow between VLANs Layer 3 routers identify segments and coordinate with VLANs VLANs are Broadcast and Multica...

Страница 139: ...139 Defining Voice VLAN Defining GVRP...

Страница 140: ...Summary Page contains the following fields and buttons Back Displays the following page of VLANs in the VLAN Summary table if there is a page following the current page Next Displays the previous page...

Страница 141: ...The possible field values are Enabled Indicates authentication is disabled for the specified VLAN ID Disabled Indicates authentication is enabled for the specified VLAN ID The Setup Page creates VLANS...

Страница 142: ...following fields VLAN ID Displays the VLAN ID VLAN Name Displays the user defined VLAN name Disable Authentication Indicates whether authentication is enabled for the specific VLAN ID The possible fi...

Страница 143: ...nt VLAN entries VLAN ID Displays the VLAN ID VLAN Name Displays the user defined VLAN name Type Indicates the if the VLAN was dynamically or statically created Authentication Indicates whether authent...

Страница 144: ...ummary The VLAN Membership Summary Page opens Figure 70 VLAN Membership Summary Page The VLAN Membership Summary Page contains the following fields VLAN ID Displays the user defined VLAN ID VLAN Name...

Страница 145: ...signed VLAN membership by toggling through the Port Control settings To modify VLAN Membership 1 Click Policy VLAN Membership Modify The VLAN Membership Modify Page opens Figure 71 VLAN Membership Mod...

Страница 146: ...face VLAN membership even if GARP indicates the port is to be added Tagged Indicates the interface is a tagged member of a VLAN All packets forwarded by the interface are tagged The packets contain VL...

Страница 147: ...LAN Interface Settings Summary The VLAN Interface Settings Summary Page opens Figure 72 VLAN Interface Settings Summary Page The VLAN Interface Settings Summary Page contains the following fields Port...

Страница 148: ...4095 is defined as per standard and industry practice as the Discard VLAN Packets classified to the Discard VLAN are dropped Frame Type Specifies the packet type accepted on the port The possible fiel...

Страница 149: ...ongs to VLANs and each VLAN is user defined as tagged or untagged full IEEE802 1q mode Access Indicates a port belongs to a single untagged VLAN When a port is in Access mode the packet types which ar...

Страница 150: ...re accepted on the port Ingress Filtering Indicates whether ingress filtering is enabled on the port The possible field values are Enable Enables ingress filtering on the device Ingress filtering disc...

Страница 151: ...vidually configure each bridge and register VLAN membership The GVRP Summary Page displays the GVRP configuration for ports and LAGS To view GVRP Settings 1 Click Policy VLAN GVRP Summary The GVRP Sum...

Страница 152: ...c VLAN creation is enabled on the interface The possible field values are Enabled Enables Dynamic VLAN creation on the interface Disabled Disables Dynamic VLAN creation on the interface GVRP Registrat...

Страница 153: ...Indicates if Dynamic VLAN creation is enabled on the interface The possible field values are Enable Enables Dynamic VLAN creation on the interface Disable Disables Dynamic VLAN creation on the interf...

Страница 154: ...ved unevenly The system currently supports one voice VLAN When configuring Voice VLAN ensure the following IP phones are configured with VLAN mode as enabled ensuring that tagged packets are used for...

Страница 155: ...AN Only ports which were defined in the VLAN membership page are active Secured Indicates if secure ports drop all non voice IP traffic The possible field values are Checked Indicates that all ports a...

Страница 156: ...bridging between 802 11 and ethernet points Access points also extend the physical size of wireless networks When several access points are grouped they allow network users to roam This section includ...

Страница 157: ...he type and radio configuration and the current access point status Ensure that the Wireless Controller Software WCS has been activated To view Wireless Access Points 1 Click Wireless Access Point Sum...

Страница 158: ...Indicates the radio transceiver type The field values are A Indicates the radio type is 802 11a G Indicates the radio type is 802 11g b g Indicates the radio type is 802 11b g n Indicates the radio t...

Страница 159: ...urrent Access Points Activation State Indicates the access point state The possible field values are Activated Indicates access point is currently active Discovered Indicates access point was discover...

Страница 160: ...t Reset Page The Wireless Access Point Reset Page contains the following fields Access Point Contains a list of either the user defined access points or the MAC address assigned to wireless networks A...

Страница 161: ...ts The optional displays are All Displays all Access Points Discovered APs Displays discovered Access Points Active APs Displays active Access Points Name Displays the user defined access point name I...

Страница 162: ...and VLANs in a WLAN network An ESS are a group of access points that share the same Service Set Identification SSID APs announce their ESS membership by SSID parameter via Beacon frames When stations...

Страница 163: ...Service Set Identifier SSID for the ESS SSIDs act as a password when a mobile device attempts to connect to the BSS SSIDs differentiates between WLANs therefore all access points and devices which co...

Страница 164: ...hrase Key Indicates the encryption key type 2 Define the fields 3 Click The Wireless Configuration is saved at the end of the wizard setup and the device is updated Defining Wireless Rogue Handling Ac...

Страница 165: ...ddress assigned to wireless networks Scanning Interval Indicates the scanning Intervals The possible field values are Long Scans for rouges at 240 second intervals Short Scans for rouges at 20 second...

Страница 166: ...e table The possible field values are SSID Sorts according to the access point Service Set IDentifier SSID associated with the rogue The SSID is the name of the ESS to which the transceiver belongs St...

Страница 167: ...system Unknown Indicates the rogue is unknown to the system 2 Select an Access Point to from the List 3 Click The table information is cleared 4 Select a field from the Sort by drop down list 5 Once t...

Страница 168: ...Mitigate The Rogue Handling Mitigate Page opens Figure 84 Rogue Handling Mitigate Page The Rogue Handling Mitigate Page contains the following fields Sort by Defines the parameter that will be applie...

Страница 169: ...pdated and the device is updated Defining Wireless Radio Settings Access Points can have up to two radio interfaces However each radio interface is configured and controlled separately Radio interface...

Страница 170: ...splays the specific access point to which the radio settings are assigned VAP Displays the virtual access point number SSID Broadcast Indicates SSID Broadcasting is enabled SSID Broadcasting allows ac...

Страница 171: ...within a specific common access point range but outside range of each other Beacon Interval Indicates the access point beacon transmission rates Short Preamble Indicates that a short preamble is enab...

Страница 172: ...ive to the selected country s device power regulations Auto Channel Enables access point channeling Channel Displays the user defined channel 2 Select the Access Point 3 Select the relevant Radio 802...

Страница 173: ...Point Name Displays the specific access point to which the radio settings are assigned Remove Removes VAP management for the specific VAP Select Enables VAP management for the specific VAP VAP Display...

Страница 174: ...tory Indicates the device must transmit or communicate at this data rate Optional Indicates the device can communicate at this date rate but does not transmit at the selected data rate Not Allowed Ind...

Страница 175: ...ncy Selection DFS status DFS permits the system to scan and switch to different channels DFS listens for signals and monitors operating spectrums IF DFS detects a signal the channel associated with th...

Страница 176: ...ollowing fields Access Point Name Displays the specific access point to which the radio settings are assigned RTS Threshold Defines the Request to Send RTS Threshold that reduces collisions when multi...

Страница 177: ...untry s device power regulations Minimum Sets the power to the minimum power settings relative to the selected country s device power regulations Auto Channel Enables the access point channeling Chann...

Страница 178: ...ecific access point to which the radio settings are assigned Remove Removes VAP management for the specific VAP Select Enables VAP management for the specific VAP VAP Displays the VAP Virtual Access P...

Страница 179: ...lues are Mandatory Indicates the device must transmit or communicate at this data rate Optional Indicates the device can communicate at this date rate but does not transmit at the selected data rate N...

Страница 180: ...ummary Page Profile Name SSID Displays the Profile Name QoS Mode Determines the QoS mode on the interface The possible values are WMM Indicates that QoS is enabled for Wi Fi Multimedia EDCF None Indic...

Страница 181: ...Click Wireless Profiles Setup The Profiles Summary Page Profiles Setup Page opens Figure 92 Profiles Setup Page The Profiles Setup Page contains the following fields Profile Name SSID Displays the use...

Страница 182: ...name SSID Enables renaming of SSID Load Balancing Enables the even distribution of data or processing packets across available network resources For example load balancing may distribute the incoming...

Страница 183: ...s the VLAN mapped to the SSID Security Type Defines the WLAN Security type The security type options are Open Enables open system authentication without encryption WEP Indicates that Wired Equivalent...

Страница 184: ...tes that WPA2 PSK is the selected WLAN security method WPA2 PSK improves system security by encrypting signals at a higher bit rates Network Key Indicates that network key is the selected WLAN securit...

Страница 185: ...Profiles Remove Page The Profiles Remove Page contains the following fields Profile Name SSID Displays the Profile Name QoS Mode Determines the QoS mode on the interface The possible values are WMM I...

Страница 186: ...The Wireless Stations Summary Page contains the following fields MAC Address Displays the MAC address attached to the WLAN station Type Displays the WLAN IP Address Displays the WLAN station s IP addr...

Страница 187: ...protect station communications VLAN Displays the VLAN on which the WLAN station is located Session Time Indicates the amount of time the station has been connected to the access point Removing WLAN St...

Страница 188: ...at the station is currently associated with the wireless network but has not been authorized and authenticated Authorized Indicates that the station is currently in the authorization process and waiti...

Страница 189: ...Wireless Power Settings The WLAN Radio Power Settings Page opens Figure 97 WLAN Radio Power Settings Page The WLAN Radio Power Settings Page contains the following fields Auto Adjust Signal Strength...

Страница 190: ...9 CONFIGURING IP INFORMATION This section contains information for defining IP interfaces and includes the following sections Defining IP Addressing Configuring ARP Configuring Address Tables...

Страница 191: ...Interface Setup Page opens Figure 98 IP Interface Setup Page The IP Interface Setup Page contains the following fields Configuration Method Indicates if the IP address has been configured statically o...

Страница 192: ...192 CHAPTER 9 CONFIGURING IP INFORMATION 3 If Manual has been selected configure the IP Address Subnet Mask and Default Gateway 4 Click The IP configuration is enabled and the device is updated...

Страница 193: ...s Figure 99 ARP Settings Summary Page The ARP Settings Summary Page contains the following fields Interface Displays the interface type for which ARP parameters are displayed The possible field value...

Страница 194: ...194 CHAPTER 9 CONFIGURING IP INFORMATION Static Indicates the ARP entry is a static entry...

Страница 195: ...splays the interface type for which ARP parameters are displayed The possible field value is VLAN Indicates the VLAN for which ARP parameters are defined IP Address Indicates the station IP address wh...

Страница 196: ...3 Click The ARP parameters are defined and the device is updated Removing ARP Entries To remove ARP Entries 1 Click Administration IP Addressing ARP Settings Remove The ARP Settings Remove Page opens...

Страница 197: ...Defining ARP Interface Settings 197 Unchecked Maintains the current ARP entries...

Страница 198: ...earning the ports from the frames source address Frames addressed to a destination MAC address that is not associated with any port are flooded to all ports of the relevant VLAN Static addresses are m...

Страница 199: ...us The possible field values are Permanent The MAC address is permanent Delete on Reset The MAC address is deleted when the device is reset Delete on Time out The MAC address is deleted when a timeout...

Страница 200: ...Page The Static Addresses Setup Page contains the following fields Interface The specific port or LAG to which the static MAC address is applied MAC address The MAC addresses listed in the current st...

Страница 201: ...Defining Static Addresses 201 Delete on Time out The MAC address is deleted when a timeout occurs Secure Used for defining static MAC Addresses for Locked ports...

Страница 202: ...MAC Address page also contains information about the aging time before a dynamic MAC address is erased and includes parameters for querying and viewing the Dynamic Address list The Current Address Tab...

Страница 203: ...ifies the interface for which the table is queried There are two interface types from which to select Port or LAG MAC Address Specifies the MAC address for which the table is queried VLAN ID The VLAN...

Страница 204: ...IGURING MULITCAST FORWARDING This section contains information for configuring Multicast forwarding and includes the following sections Defining IGMP Snooping Defining Multicast Groups Defining Router...

Страница 205: ...t traffic Ports requesting to join a specific Multicast group issue an IGMP report specifying that Multicast group is accepting members This results in the creation of the Multicast filtering database...

Страница 206: ...o receive a message before timing out The field range is 1 2147483648 The default time is 260 seconds MRouter Timeout Indicates the amount of the time the Multicast router waits to receive a message b...

Страница 207: ...ng fields IGMP Snooping Status Indicates if IGMP Snooping is enabled on the device IGMP Snooping can be enabled only if Bridge Multicast Filtering is enabled The possible field values are Enable Indic...

Страница 208: ...time is 260 seconds MRouter Timeout Indicates the amount of the time the Multicast router waits to receive a message before it times out The default value is 300 seconds Leave Timeout Indicates the am...

Страница 209: ...The Multicast Group Summary Page permits new Multicast service groups to be created The Multicast Group Summary Page also assigns ports to a specific Multicast service address group To view Multicast...

Страница 210: ...The possible field values are Enabled Enables Multicast filtering on the device Disabled Disables Multicast filtering on the device If Multicast filtering is disabled Multicast frames are flooded to a...

Страница 211: ...ation about the Multicast group address Bridge Multicast IP Address Identifies the Multicast group IP address Bridge Multicast IP Address Identifies the Multicast group MAC address Interface Displays...

Страница 212: ...st Multicast Group Port Details The Multicast Port Details Page opens Figure 110 Multicast Port Details Page The Multicast Port Details Page contains the following information VLAN ID Identifies a VLA...

Страница 213: ...part of a Multicast group To remove Multicast Groups 1 Click Policy Multicast Multicast Group Remove Group The Multicast Port Remove Group Page opens Figure 111 Multicast Port Remove Group Page The M...

Страница 214: ...APTER 10 CONFIGURING MULITCAST FORWARDING Multicast Address Identifies the Multicast group MAC IP address 2 Select the VLAN ID to be removed 3 Click The Multicast group is deleted and the device is up...

Страница 215: ...cast Router Group Summary Page contains the following information VLAN ID Identifies a VLAN and contains information about the Multicast group address Ports LAG Displays status table according to Port...

Страница 216: ...p Modify Page contains the following information VLAN ID Identifies a VLAN and contains information about the Multicast group address Interface Displays the port number Interface Status Indicates the...

Страница 217: ...Defining Router Groups 217 2 Modify the Interface Status 3 Click The Interface Status is modified and the device is updated...

Страница 218: ...ions avoiding and eliminating loops For more information on configuring Classic STP see Defining Classic Spanning Tree for Ports Rapid STP Detects and uses network topologies that provide faster conve...

Страница 219: ...olicy Spanning Tree Classic STP Summary The Classic STP Summary Page opens Figure 114 Classic STP Summary Page The Classic STP Summary Page contains the following fields Port The interface for which t...

Страница 220: ...Provides an alternate path to the root switch from the root interface Backup Provides a backup path to the designated port path toward the Spanning Tree leaves Backup ports occur only when two ports a...

Страница 221: ...Cost Indicates the cost of the port participating in the STP topology Ports with a lower cost are less likely to be blocked if STP detects loops Forward Transitions Indicates the number of times the p...

Страница 222: ...p Page The Classic STP Setup Page contains the following fields Global Settings Bridge Settings Designated Root Settings Global Setting Parameters Spanning Tree State Indicates whether STP is enabled...

Страница 223: ...to an interface varies according to the selected method Hello Time Max Age or Forward Delay Bridge Setting Parameters Priority Specifies the bridge priority value When switches or bridges are running...

Страница 224: ...Bridge The default is zero Root Path Cost Specifies the cost of the path from this bridge to the Root Bridge Topology Changes Counts Specifies the total amount of STP state changes that have occurred...

Страница 225: ...icates if STP is enabled on the port The possible field values are Enabled Indicates that STP is enabled on the port Disabled Indicates that STP is disabled on the port Port Fast Indicates if Fast Lin...

Страница 226: ...s used to forward traffic when a path is re routed The field range is 1 200 000 000 Priority Priority value of the port The priority value influences the port choice when a bridge has two ports connec...

Страница 227: ...without creating forwarding loops The Global System LAG information displays the same field information as the ports but represent the LAG RSTP information To define RSTP 1 Click Policy Spanning Tree...

Страница 228: ...is enabled on the device Port Status Displays the current STP state of a port If enabled the port state determines what forwarding action is taken on traffic Possible port states are Disabled Indicat...

Страница 229: ...on which Rapid STP is enabled Role Displays the port role assigned by the STP algorithm to provide to STP paths The possible field values are Root Provides the lowest cost path to forward packets to t...

Страница 230: ...addresses Blocking Indicates that the port is currently blocked and cannot forward traffic or learn MAC addresses Blocking is displayed when Classic STP is enabled Point to Point Admin Status Indicate...

Страница 231: ...switch port link type It may differ from the administrative state Disable Disables point to point link Point to Point Operational Status Displays the point to point operating state 2 Click The Rapid...

Страница 232: ...Multiple STP Setup Page opens Figure 119 Multiple STP Setup Page The Multiple STP Setup Page contains the following fields Region Name User defined STP region name Revision An unsigned 16 bit number t...

Страница 233: ...Defining Multiple Spanning Tree 233 2 Define the fields 3 Click The Multiple STP properties are defined and the device is updated...

Страница 234: ...A configuration consists of the name revision and region to which the device belongs Network administrators can define the MSTP instance settings using the Multiple STP Instance Summary Page To view...

Страница 235: ...cates the selected instance s path cost Bridge ID Indicates the bridge ID of the selected instance Remaining Hops Indicates the number of hops remaining to the next destination 2 Define the fields 3 C...

Страница 236: ...Spanning Tree Multiple STP Port Summary The Multiple STP Port Summary Page opens Figure 122 Multiple STP Port Summary Page The Multiple STP Port Summary Page contains the following fields Interface Th...

Страница 237: ...to LANs in an outlying region If the port is a Boundary port this field also indicates whether the device on the other side of the link is working in RSTP or STP mode Master Port Indicates the port is...

Страница 238: ...esignated Bridge ID Indicates the bridge priority and the MAC Address of the designated bridge Designated Port ID Indicates the selected port priority and interface Remaining Hops Indicates the number...

Страница 239: ...Page contains the following fields Instance ID Lists the MSTP instances configured on the device Possible field range is 0 15 Port State Indicates whether the port is enabled for the specific instanc...

Страница 240: ...nt to point link or when a LAN has two or more connections connected to a shared segment Disabled Indicates the port is not participating in the Spanning Tree Mode Indicates the STP mode by which STP...

Страница 241: ...s the LAG State has changed from a Forwarding state to a Blocking state Remain Hops Indicates the hops remaining to the next destination Define the Instance ID MSTP Port Status and the Interface Prior...

Страница 242: ...NG QUALITY OF SERVICE This section contains information for configuring QoS and includes the following topics Quality of Service Overview Defining QoS Basic Mode Defining QoS General Mode Configuring...

Страница 243: ...hing the user defined specifications are classified together Action Defines traffic management where packets are forwarded are based on packet information and packet field values such as VLAN Priority...

Страница 244: ...ains the following fields Trust Mode Defines which packet fields to use for classifying packets entering the device When no rules are defined the traffic containing the predefined packet CoS field is...

Страница 245: ...o incoming packets To view DSCP Rewrite Values 1 Click Policy QoS Basic Mode DSCP Rewrite Summary The DSCP Rewrite Summary Page opens Figure 125 DSCP Rewrite Summary Page The DSCP Rewrite Summary Page...

Страница 246: ...SCP Rewrite Setup Page opens Figure 126 DSCP Rewrite Setup Page The DSCP Rewrite Setup Page contains the following fields DSCP In Displays the incoming packet s DSCP value DSCP Out Displays the outgoi...

Страница 247: ...Settings DSCP to Queue Defining CoS Services To view CoS Settings 1 Click Policy QoS General CoS Summary The CoS Summary Page opens Figure 127 CoS Summary Page The CoS Summary Page contains the follow...

Страница 248: ...orwarding queue 2 Select the Restore Defaults field to restore Interface factory defaults To configure CoS Settings 1 Click Policy QoS General CoS Modify The CoS Modify Page opens Figure 128 CoS Modif...

Страница 249: ...he LAG for which the global QoS parameters are defined Set Default User Priority Determines the default CoS value for incoming packets for which a VLAN tag is not defined The possible field values are...

Страница 250: ...e 129 Queue Setup Page The Queue Setup Page contains the following fields Strict Priority Specifies whether traffic scheduling is based strictly on the queue priority WRR Assigns WRR weights to queues...

Страница 251: ...type is selected in the Bandwidth Summary Page To view Bandwidth Settings 1 Click Policy QoS General Bandwidth Summary The Bandwidth Summary Page opens Figure 130 Bandwidth Summary Page The Bandwidth...

Страница 252: ...0 kbits per second To configure Bandwidth Settings 1 Click Policy QoS General Bandwidth Setup The Bandwidth Setup Page opens Figure 131 Bandwidth Setup Page The Bandwidth Setup Page contains the follo...

Страница 253: ...ion Rate CIR Defines CIR as the queue shaping type The possible field value is 4096 1 000 000 000 bits per second Committed Burst Size CbS Defines CbS as the queue shaping type The possible field valu...

Страница 254: ...ned to queue 2 To view the DSCP Queue 1 Click Policy QoS General DSCP to Queue Summary The DSCP to Queue Summary Page opens Figure 132 DSCP to Queue Summary Page The DSCP to Queue Summary Page contain...

Страница 255: ...General DSCP to Queue Setup The DSCP to Queue Setup Page opens Figure 133 DSCP to Queue Setup Page The DSCP to Queue Setup Page contains the following fields DSCP Displays the incoming packet s DSCP v...

Страница 256: ...12 CONFIGURING QUALITY OF SERVICE Configuring QoS Mapping This section contains information for mapping CoS and DSCP values to queues and includes the following sections Defining CoS to Queue Defining...

Страница 257: ...e Summary Page opens Figure 134 CoS to Queue Summary Page The CoS to Queue Summary Page contains the following fields Class of Service Specifies the CoS priority tag values where zero is the lowest an...

Страница 258: ...Defaults Restores the device factory defaults for mapping CoS values to a forwarding queue Class of Service Specifies the CoS priority tag values where zero is the lowest and 7 is the highest Queue D...

Страница 259: ...be filtered based on their urgency or relevancy Each message severity determines the set of event logging devices that are sent per each event message The following table lists the log severity level...

Страница 260: ...gging Display Page opens Figure 136 Logging Display Page The Logging Display Page contains the following fields and buttons Save Preview Saves the displayed Log table Clear Logs Deletes all logs from...

Страница 261: ...137 Logging Setup Page The Logging Setup Page contains the following fields Enable Local Logging Indicates if device local logs for Cache File and Server Logs are enabled Console logs are enabled by d...

Страница 262: ...dicates if device local logs are enabled The possible field values Checked Enables device logs Unchecked Disables device logs Emergency The highest warning level If the device is down or not functioni...

Страница 263: ...ng messages Syslog IP Address Defines IP Address to upload syslog messages Syslog Port Defines the Port through which syslog messages are uploaded 2 Enable Logging and define the fields 3 Click The lo...

Страница 264: ...d to the device During the session all new commands entered are added to the commands existing in the Running Configuration file Commands are not overwritten To update the Startup file before powering...

Страница 265: ...ng system files To download System Files 1 Click Administration Backup Restore Configurations Restore The Backup Restore Configurations Page opens Figure 138 Backup Restore Configurations Page The Bac...

Страница 266: ...ation File Specifies the destination file to which to the configuration file is downloaded The possible field values are Running Configuration Downloads commands into the Running Configuration file St...

Страница 267: ...mage Page contains the following fields Download via TFTP Enables initiating a download via the TFTP server Download via HTTP Enables initiating a download via the HTTP server or HTTPS server TFTP Ser...

Страница 268: ...ation Downloads commands into the Running Configuration file Startup Configuration Downloads the Startup Configuration file and overwrites the old Startup Configuration file 2 Define the fields 3 Clic...

Страница 269: ...ge The Active Image Page opens Figure 140 Active Image Page The Active Image Page contains the following fields Active Image The Image file which is currently active on the unit After Reset The Image...

Страница 270: ...ISTICS This section contains information for viewing and configuring RMON statistics and contains the following sections Viewing RMON Statistics Configuring RMON History Configuring RMON Events Defini...

Страница 271: ...Interface Indicates the device for which statistics are displayed The possible field values are Port Defines the specific port for which RMON statistics are displayed LAG Defines the specific LAG for...

Страница 272: ...since the device was last refreshed Undersize Packets Displays the number of undersized packets less than 64 octets received on the interface since the device was last refreshed Oversize Packets Displ...

Страница 273: ...1 Bytes Number of 256 to 511 byte frames received on the interface since the device was last refreshed Frames of 512 to 1023 Bytes Number of 512 to 1023 byte frames received on the interface since the...

Страница 274: ...The RMON History Control Summary Page contains the following fields History Entry No Displays the entry number for the History Control Table page Source Interface Displays the interface from which the...

Страница 275: ...History Control Setup Page The RMON History Control Setup Page contains the following fields New History Entry No Displays the new entry number for the History Control Table page Source Interface Disp...

Страница 276: ...g Interval Indicates in seconds the time that samplings are taken from the ports The field range is 1 3600 The default is 1800 seconds equal to 30 minutes 2 Define the fields 3 Click RMON History Cont...

Страница 277: ...ntains the following fields History Entry No Displays the entry number for the History Control Table page Source Interface Displays the interface from which the history samples were taken The possible...

Страница 278: ...g Interval Indicates in seconds the time that samplings are taken from the ports The field range is 1 3600 The default is 1800 seconds equal to 30 minutes 2 Modify the fields 3 Click RMON History Cont...

Страница 279: ...story Remove Control Page contains the following fields Remove Removes a RMON event The possible field values are Checked Removes a selected RMON event Unchecked Maintains RMON events History Entry No...

Страница 280: ...sted Displays the number of samples to be saved The field range is 1 65535 The default value is 50 Current Number of Samples Displays the current number of samples taken Owner Displays the RMON statio...

Страница 281: ...y Summary Page opens Figure 146 RMON History Summary Page The RMON History Summary Page contains the following fields History Entry No Displays the entry number for the History Control Table page Owne...

Страница 282: ...eceived on the interface since the device was last refreshed Oversize Packets Displays the number of oversized packets over 1518 octets received on the interface since the device was last refreshed Fr...

Страница 283: ...view RMON Events 1 Click Wired Ports Stats RMON Events Control Summary The RMON Events Control Summary Page opens Figure 147 RMON Events Control Summary Page The RMON Events Control Summary Page conta...

Страница 284: ...icates that the event is a trap Log and Trap Indicates that the event is both a log entry and a trap None Indicates that no event occurred Time Displays the time that the event occurred Owner Displays...

Страница 285: ...following fields Event Entry Displays the event Community Displays the community to which the event belongs Description Displays the user defined event description Type Describes the event type Possib...

Страница 286: ...286 CHAPTER 15 VIEWING STATISTICS 3 Click The RMON Events are defined and the device is updated...

Страница 287: ...contains the following fields Event Entry No Displays the event Community Displays the community to which the event belongs Description Displays the user defined event description Type Describes the...

Страница 288: ...288 CHAPTER 15 VIEWING STATISTICS 2 Modify the fields 3 Click The RMON Events Control is modified and the device is updated...

Страница 289: ...fields Remove Removes a RMON event The possible field values are Checked Removes a selected RMON event Unchecked Maintains RMON events Event Entry Displays the event Community Displays the community t...

Страница 290: ...None Indicates that no event occurred Time Displays the time that the event occurred Owner Displays the device or user that defined the event 2 Select the event to be deleted 3 Click The RMON Event is...

Страница 291: ...sample To view RMON Events Summary 1 Click Wired Ports Stats RMON Events Events Summary The RMON Events Summary Page opens Figure 151 RMON Events Summary Page The RMON Events Summary Page contains th...

Страница 292: ...Alarm Summary Page The RMON Alarm Summary Page contains the following fields Alarm Entry Indicates a specific alarm Counter Name Displays the selected MIB variable Interface Displays interface for whi...

Страница 293: ...ates that both the Log and Trap mechanism are used to report alarms Falling Threshold Displays the falling counter value that triggers the falling threshold alarm The falling threshold is graphically...

Страница 294: ...ntry Indicates a specific alarm Interface Displays interface for which RMON statistics are displayed The possible field values are Port Displays the RMON statistics for the selected port LAG Displays...

Страница 295: ...using the Trap mechanism Both Indicates that both the Log and Trap mechanism are used to report alarms Falling Threshold Displays the falling counter value that triggers the falling threshold alarm Th...

Страница 296: ...MON statistics are displayed The possible field values are Port Displays the RMON statistics for the selected port LAG Displays the RMON statistics for the selected LAG Counter Name Displays the selec...

Страница 297: ...Trap mechanism are used to report alarms Falling Threshold Displays the falling counter value that triggers the falling threshold alarm The falling threshold is graphically presented on top of the gr...

Страница 298: ...emove Removes a RMON event The possible field values are Checked Removes a selected RMON event Unchecked Maintains RMON events Alarm Entry Indicates a specific alarm Counter Name Displays the selected...

Страница 299: ...If the device is not reset the entry remains in the Log Table TRAP Indicates that an SNMP trap is generated and sent via the Trap mechanism The Trap can also be saved using the Trap mechanism Both Ind...

Страница 300: ...4835 Australia AU N 36 40 44 48 52 56 60 64 149 153 157 161 200 mW EIRP 200 mW EIRP 1 W EIRP 5 15 5 25 5 25 5 35 5 725 5 825 1 11 200 mW EIRP 2 4 2 4835 Belgium BE E 36 40 44 48 52 56 60 64 120 mW EI...

Страница 301: ...200 mW EIRP200 mW EIRP1 W EIRP 5 15 5 255 25 5 355 725 5 825 1 11 200 mW EIRP 2 4 2 4835 Germany DE E 36 40 44 48 52 56 60 64 104 108 112 116 120 124 128 132 140 200 mW EIRP200 mW EIRP1 W EIRP 5 15 5...

Страница 302: ...4 2 48352 4 2 454 United Kingdom GB E 36 40 44 48 52 56 60 64 104 108 200 mW EIRP200 mW EIRP1 W EIRP 5 15 5 25 5 25 5 35 5 47 5 725 112 116 120 124 128 132 140 1 11 100 mW EIRP 2 4 2 4835 Greece GR E...

Страница 303: ...40 44 48 52 56 60 64 200 mW EIRP200 mW EIRP 5 15 5 255 25 5 35 5 13 100 mW EIRP 2 4 2 4835 India IN TBA N A N A N A 4 W EIRP 2 4 2 4835 Iceland IS E 36 40 44 48 52 56 60 200 mW EIRP200 mW EIRP1 W EIR...

Страница 304: ...6 60 50 mW 6 dBi 200 mW250 mW 6 5 15 5 25 5 25 5 35 5 725 5 85 64 149 153 dBi 1 W1 W 6 157 161 dBi 4 W 1 11 1 W Restricted Antennas 2 4 2 4835 Luxembourg LU E 36 40 44 48 52 56 60 200 mW EIRP200 mW EI...

Страница 305: ...W EIRP 5 15 5 25 5 25 5 35 5 47 5 725 112 116 120 124 128 132 140 1 11 100 mW EIRP 2 4 2 4835 New Zealand NZ N 36 40 44 48 52 56 60 50 mW 6 dBi 200 mW250 mW 6 5 15 5 25 5 25 5 35 5 725 5 85 64 149 153...

Страница 306: ...47 5 725 64 104 108 112 116 120 124 128 132 140 1 11 100 mW EIRP 2 4 2 4835 Singapore SG S 36 40 44 48 52 56 60 64 149 153 157 161 200 mW EIRP200 mW EIRP1 W EIRP 5 15 5 25 5 25 5 35 5 725 5 85 1 13 2...

Страница 307: ...ates US A 36 40 44 50 mW 6 dBi 200 5 15 5 25 5 25 5 35 of America 48 52 56 60 mW250 mW 6 5 725 5 85 64 149 153 dBi 1 W1 W 6 157 161 dBi 4 W 1 11 1 W Conducted Output 2 4 2 4835 United States of Americ...

Страница 308: ...64 50 mW 6 dBi 200 mW250 mW 6 dBi 1 W 5 15 5 25 5 25 5 35 1 11 1 W Conducted Output 2 4 2 4835 South Africa ZA TBA N A N A 5 25 5 355 725 5 825 1 13 1 W EIRP 2 4 2 4835 Country Country Code Access Po...

Страница 309: ...thernet 1000Base X IEEE 802 3x Flow Control IEEE 802 1d 1998 Bridging IEEE 802 1p Virtual LAN IEEE 802 af DTE Power MAC Address 8192 Safety UL 60950 1 CSA 22 2 No 60950 1 EN 60950 1 IEC 60950 1 EMC Em...

Страница 310: ...320 AC Line Frequency 50 60 Hz 3 Hz Input Voltage 100 240 Vac auto range Current Rating 8 Amp maximum Maximum Power Consumption 465 Watts Maximum Power Dissipation 207 BTU hr PoE Maximum Output Power...

Страница 311: ...imits are established or enforced 802 1p is a spin off of the 802 1Q VLANs standard 802 1p establishes eight levels of priority similar to the IP Precedence IP Header bit field Command Line Interface...

Страница 312: ...nning Tree Protocol Features topology IGMP Snooping IGMP Snooping examines IGMP frame contents when they are forwarded by the device from work stations to an upstream Multicast router From the frame t...

Страница 313: ...ons Regions are one or more MSTP bridges by which frames can be transmitted The standard lets administrators assign VLAN traffic to unique paths Password Management Password management provides increa...

Страница 314: ...network traffic monitoring capabilities as opposed to SNMP which allows network device management and monitoring RMON is a standard MIB that defines current and historical MAC layer statistics and co...

Страница 315: ...ries are not subject to aging and are preserved across resets and reboots TACACS TACACS provides centralized security for validation of users accessing the device TACACS provides a centralized user ma...

Страница 316: ...s addressed to a destination MAC address that is not associated with any port are flooded to all ports of the relevant VLAN Web based Management With web based management the system can be managed fro...

Страница 317: ...is detected and what are the possible causes of the problem With the problem known the effect of the problem is recorded with all known results from the problem Once the problem is quantified the sol...

Страница 318: ...ial cable Software settings Replace the serial cable Replace serial cable for a pin to pin straight flat cable Reconfigure the emulation software connection settings Response from the terminal emulati...

Страница 319: ...of pairs Fiber optical cable connection is reversed Bad cable Wrong cable type Check pinout and replace if necessary Change if necessary Check Rx and Tx on fiber optic cable Replace with a tested cabl...

Страница 320: ...ystem y n n 2 Enter Y The device reboots After the POST when the text Autoboot in 2 seconds press RETURN or Esc to abort and enter prom is displayed press Enter The Startup Menu is displayed 1 Downloa...

Страница 321: ...320 APPENDIX C TROUBLESHOOTING...

Страница 322: ...of service and then placing them in the appropriate output queue Data is transmitted from the queues using weighted round robin service to enforce priority service and prevent blockage of lower level...

Страница 323: ...GARP is a protocol that can be used by endstations and switches to register and propagate multicast group membership information in a switched environment so that multicast data frames are propagated...

Страница 324: ...rnet Control Message Protocol ICMP A network layer protocol that reports errors in processing IP packets ICMP is also used by routers to feed back information about better routing choices Internet Gro...

Страница 325: ...broken MD5 is a one way hash function meaning that it takes a message and converts it into a fixed string of digits also called a message digest Multicast Switching A process whereby the switch filte...

Страница 326: ...ffic downstream and calculates the shortest path back to the multicast source network via reverse path forwarding PIM uses the router s IP routing table rather than maintaining a separate multicast ro...

Страница 327: ...rk systems Spanning Tree detects and directs data along the shortest available path maximizing the performance and efficiency of the network Telnet Defines a remote communication facility for interfac...

Страница 328: ...so known as EAP TTLS User Datagram Protocol UDP UDP provides a datagram mode for packet switched communications It uses IP as the underlying transport mechanism to provide access to IP like services U...

Страница 329: ...328 APPENDIX GLOSSARY...

Страница 330: ...Service 311 Classic_STP 219 CLI 310 Command Line Interface 310 Committed Information Rate 252 Configuring ARP 193 Configuring_RMON_Events 283 conventions notice icons About This Guide 4 CoS 311 CoS_t...

Страница 331: ...36 LCP 230 LEDs 22 Link Aggregation Control Protocol 130 Link Control Protocol 230 Log_Display 260 Logging_Setup 261 Lost password 319 M MAC addresses 64 MAC_based_Rules 78 Management Access Lists 40...

Страница 332: ...ions software is not readable 317 RMON_Alarm_Setup 294 RMON_Events_Control 287 RMON_History_Control 274 RMON_History_Summeries 281 RMON_statistics 271 Rouge_setup 164 RSTP 227 313 rstp 227 S Self test...

Страница 333: ...22 User 83 V VAPs 172 177 Viewing System Description 95 Virtual Cable Testing 314 VLAN 140 151 VLAN priority 243 VLAN_interface 147 VLAN_membership 140 VLAN_Membership_Modify 145 VLAN_Membership_Summa...

Отзывы: