3onedata IPS7112G-4GS-8GPOE Скачать руководство пользователя страница 23

                                                                                                   

User manual

 

17

                                                                   

www.3onedata.com

 

 

(Figure 6.2.4.1) 

Upload log steps: 

Step 1: in the TFTP server text box to fill in the TFTP server where the IP address. 

Step 2: fill in the file name in the file box to save the file on the server. 

Step 3: click the "Upload" button 

 

6.2.5 SSHD configuration 

SSH full name is Shell Secure. SSH security protocol based on application layer and transport layer. SSH 

is  currently  more  reliable,  designed  for  remote  login  sessions  and  other  network  services  to  provide 

security  protocols.  Using  SSH  protocol  can  effectively  prevent  the  process  of  remote  management  of 

information leakage problem, but also to prevent the DNS and IP. There is also an additional advantage is 

that the transmission of the data is compressed, so you can speed up the transmission speed. 

 

In the menu bar, click on the "main menu", "system configuration", "SSHD configuration", enter the SSHD 

configuration interface. 

 

(Figure 6.2.5.1) 

 

Содержание IPS7112G-4GS-8GPOE

Страница 1: ...IPS7112G 4GS 8GPOE Managed Industrial Ethernet Switch User manual Version 1 0 0 Jun 2017 www 3onedata com ...

Страница 2: ...al belong to their respective manufacturers Agreement As the product version upgrades or other reasons this document is subject to change without notice Unless other agreement this document only as a guide to use All statement information and suggestion in this document without warranty of any kind either expressed or implied Revision History Version No Date Reason V1 0 0 Jun 2017 Document creatio...

Страница 3: ... 4 Packing List 9 Chapter 5 Network Configuration 10 5 1 Configure PC s IP Address 10 Chapter 6 WEB Management 11 6 1 Configurate preparing 11 6 2 System Configuration 13 6 2 1 System information 13 6 2 2 Configuration network 15 6 2 3 User configuration 16 6 2 4 Device log message 16 6 2 5 SSHD configuration 17 6 2 6 Telnet configuration 18 6 2 7 HTTPS configuration 19 6 2 8 Diagnosis 19 6 2 8 1 ...

Страница 4: ...n 37 6 4 2 1 MAC configuration 37 6 4 2 2 Static MAC 38 6 4 3 Spanning tree 39 6 4 3 1 Bridge setting 39 6 4 3 2 Instance setting 40 6 4 3 3 Bridge port 41 6 4 3 4 Instance port configuration 42 6 4 4 IGMP Snooping 43 6 4 4 1 IGMP Snooping 43 6 4 4 2 Static Multicast 44 6 4 5 SW Ring 45 6 4 5 1 Global configuration 45 6 4 5 2 Node configuration 45 6 4 6 GMRP configuration 49 6 4 6 1 GMRP global co...

Страница 5: ...ical 67 6 6 4 3 History 68 6 6 4 4 Alarm 69 6 6 5 DHCP Server configuration 70 6 6 5 1 DHCP Server configuration 70 6 6 5 2 DHCP pool configuration 70 6 6 5 3 Leases list 71 6 6 5 4 Static leases configuration 72 6 6 5 5 Port binding configuration 72 6 6 6 DHCP snooping 73 6 6 6 1 Global configuration 73 6 6 6 2 Static binding 74 6 6 7 DNS configuration 75 6 6 8 NTP configuration 76 6 7 System man...

Страница 6: ...User manual 5 www 3onedata com Appendix 1 Glossary table 81 Appendix 2 Treatment of common problem 83 ...

Страница 7: ...king temperature can meet all kinds of Industrial environment requirement and provide the solution of the economy 1 2 Features Support IEEE802 3 IEEE802 3u IEEE802 3z ab IEEE802 3x IEEE802 1Q IEEE802 1p IEEE802 1W D IEEE802 1s IEEE802 3ad IEEE802 1X Support 8 10 100 1000Base T X RJ45 PoE ports and 4 Gigabit SFP slot SW Ring ring network patent technology Fault recovery time 20ms Support STP RSTP M...

Страница 8: ...e view 1 Ground screw 2 Terminal block for relay output 3 Console port 4 Terminal block for power input PWR1 PWR2 5 DIP switches 6 DIN Rail mounting kit 7 System running indicator 8 Relay alarm indicator 9 Power input P1 P2 LED 10 PoE port Link ACT indicator 11 Ethernet port Link ACT indicator 12 Gigabit PoE port 13 Gigabit SFP port ...

Страница 9: ...the terminal block please take care of operation sequence 2 3 DIP Switch Top panel provided 4 bits DIP switch to do function configure ON to enable effective 1 and 4 keep for future function 2 is recovery default factory 3 is for upgrade Please power off and power on when you change the status of DIP switch 2 4 Relay connection Relay access terminals in the top panel of the device Between the two ...

Страница 10: ...PC Server Converter and HUB Pin 1 2 3 4 5 6 7 8 Corresponding connections in MDI 1 3 2 6 3 1 4 7 5 8 6 2 7 4 8 5 are used as cross wiring in the MDI X port of Converter and HUB In MDI MDI X 100 1000Base TX PIN defines is as follows PIN MDI MDI X 1 BI_DA TX BI_DB RX 2 BI_DA TX BI_DB RX 3 BI_DB RX BI_DA TX 4 BI_DC BI_DD 5 BI_DC BI_DD 6 BI_DB RX BI_DA TX 7 BI_DD BI_DC 8 BI_DD BI_DC Note 10Base T 100B...

Страница 11: ...nterface is used SFP optical module communication through optical fiber transmission can choice different SFP module according to different transfer distance Fiber interface must use for pair TX port is transmit side must connect to RX receive side The fiber interface support loss line indicator Suppose If you make your own cable we suggest labeling the two sides of the same line with the same let...

Страница 12: ... 12 ON Port connection is active Blinking Data transmitted OFF Port connection is not active POE 1 8 ON The PoE device is connected by IEEE802 3af at standard OFF No PoE power output or no PoE connected PoE devices 2 8 Installation Before installation confirm that the work environment meet the installation require including the power needs and abundant space Whether it is close to the connection e...

Страница 13: ...direction and laying position need to match construction requirements and cable length depends on actual position 4 All the cable cannot have break down and terminal in the middle 5 Cables should be straight in the hallways and turning 6 Cable should be straight in the groove and cannot beyond the groove in case of holding back the inlet and outlet holes Cables should be banded and fixed when they...

Страница 14: ...User manual 8 www 3onedata com Chapter 3 Appearance and Dimension 3 1 Appearance 3 2 Dimension Unit mm ...

Страница 15: ...ur first using Please inform us or our distributor if your equipments have been damaged or lost any accessories we will try our best to satisfy you Description Quantity Industrial PoE switch 1 User manual 1 Documentation and software CD 1 Warranty card 1 Certificate of quality 1 DIN Rail mounting kit 1 ...

Страница 16: ...PC s IP address 192 168 1 X X is less than 254 from 2 to 253 Click OK IP address modifies successfully Method 2 Modify the switch IP address through Blue_eyes manager software Install Blue_eyes manager software on the PC Enter into Blue_eyes management interface click Search to search the device After searching the device move mouse to the device click right key modify the device s IP address Plea...

Страница 17: ...t IP address configuration please refer to 5 1 if need local configuration Computers and switches must be routed reach if for remote configuration How to log on to Web Server Please type in the default IP of switch on the browser s address bar and then will pop up a window by clicking the enter key which shows you have to enter your user name and password The default username and password is admin...

Страница 18: ...ate Port rate limit Set port input rate and output rate Mirror Set source port and destination port Alarm setting Set relay alarm PoE Config PoE port power setting Port channel Config Static and LACP configuration Isolate port Config Set isolation port Port statistic Port data statistics Layer 2 Configuration VLAN Configuration Displays the list of the current VLAN and the configuration and manage...

Страница 19: ...agement Management File Switch software upgrade access save or restore the configuration of the switch Save Save the current configuration Reboot reboot device Restore Restore factory settings Firmware System upgrade Web Timeout Treatment The system timeout will cancel the login if the user did not login for a long time The configuration of this login will be remained in the Web interface If user ...

Страница 20: ...ce management Hardware Version Current hardware version Firmware Version Current firmware version Running time Current device usage time CPU usage Current device using CPU information Memory usage Current devices use memory size information CPU MAC Hardware address of the device It is a unique address which is made up of hexadecimal number with 48 bits 6 bytes in length Language switching Figure 6...

Страница 21: ...pe Address range Available IP network range A 0 0 0 0 126 255 255 255 1 0 0 0 126 0 0 0 B 128 0 0 0 191 255 255 255 128 0 0 0 191 254 0 0 C 192 0 0 0 223 255 255 255 192 0 0 0 223 255 254 0 D 224 0 0 0 239 255 255 255 Non E 240 0 0 0 246 255 255 255 Non Others 255 255 255 255 255 255 255 255 A B C class address is unicast address D class address is multicast address E class address is reserved to ...

Страница 22: ...sword does not contain the spaces and etc characters the length of the character is not more than 31 characters Privilege The visitor s permission is 1 15 If you forget the user name and password please contact the company s technical support in the home page in order to get help 6 2 4 Device log message Log configuration of the main functions of the role to view the device log information history...

Страница 23: ...ayer and transport layer SSH is currently more reliable designed for remote login sessions and other network services to provide security protocols Using SSH protocol can effectively prevent the process of remote management of information leakage problem but also to prevent the DNS and IP There is also an additional advantage is that the transmission of the data is compressed so you can speed up t...

Страница 24: ...e IP address of the switch equipment can be modified to obtain in the system management view can use the IP command 3 if connected to the PC terminal and the switch port within the same local area network LAN the IP address must be set in the same segment otherwise terminal and the switch must cross the router Meet the above three points you can use the Telnet command to log on to the switch and t...

Страница 25: ...S configuration enter the HTTPS configuration interface Figure 6 2 7 1 Enable HTTP access to the format HTTP 192 168 1 254 Enable HTTPS access to the format HTTPS 192 168 1 254 HTTPS configuration steps Step 1 check the box in the HTTP check box to enable Step 2 check the box in the HTTPS check box to enable Step 3 in the port of the text box to fill in the port number the default port number is 8...

Страница 26: ...r in order to click on the main menu system configuration diagnostic traceroute enter the traceroute interface Figure 6 2 6 2 Traceroute configuration steps Step 1 fill in the destination IP address in the IP address text box Step 2 click test to see the results 6 2 8 3 Port loopback Port loopback is a common method for the maintenance and troubleshooting communication port line The receiving end ...

Страница 27: ...tep 2 click the Apply button 6 3 Port Configuration 6 3 1 Port Settings The port configuration interface mainly includes port type Electric port or optical port setup speed mode and duplex mode flow control Only when the port is enabled for the port speed duplex flow control will work Select auto negotiation speed and duplex auto negotiation Figure 6 3 1 ...

Страница 28: ... requirements in particular 1000Base Tx Gigabit Ethernet connection at least to use cat5e Port Speed Port speed shows the connecting speed of the port It includes 3 kinds of speed 10M 100M and auto negotiation 10M uses 10base T standard and UTP cable for connection When the port is in 10M speed Link Act indicator will blink continuously while data transmitting and status indicator of 10M 100Mbps w...

Страница 29: ...ol to control the data flow between the sending and receiving nodes can prevent packet loss Polarity MDI MDIX auto negotiation MDI II Medium Dependent Interface II mode is a kind of standard built by IEEE for RJ 45 UTP cable of fast Ethernet 100BASE T II stands for parallel configuration MDI X Media Dependent Interface x mode and MDI II is a kind of standard built by IEEE for RJ 45 UTP cable of fa...

Страница 30: ...DoS attack broadcast storm If the storm control function is enabled this attack can be prevented For the type of storm we test the three types of packets Broadcast packets data frame of the destination address of FF FF FF FF FF FF Multicast packets destination address is XX XX XX XX XX XX data frames second x is odd numbers such as 1 3 5 7 9 b d and f x represents any digit Unknown unicast packet ...

Страница 31: ...he device provides a rate limit of two directions in which the inlet velocity is the actual rate of flow from the PC and other devices to the switch port Exit speed is the actual speed between the switch port and the flow of the device If at the same time limit the inlet velocity and outlet velocity between the two devices the actual speed is smaller Port speed limit configuration step Step 1 in t...

Страница 32: ...of monitored message such as only monitoring of transmitted messages of appointed port The device configures port mirroring function through port mirroring group Each group includes a monitored port and a group of mirror ports Total bandwidth of mirroring is not more than that of monitored port It is good to monitor and manage its internal network data when using port mirroring in a company It is ...

Страница 33: ... IGMP snooping mirroring only FCS treatment normal package cannot handle the wrong data frame 6 3 5 Alarm setting Alarm is divided into power supply alarm port alarm Its main function is when the equipment is in abnormal state can promptly notify the administrator and quickly repair the equipment status avoid excessive losses Power alarm Power alarm is the main power outage alarm enabling power al...

Страница 34: ...ponding operation view the work status current value current total power current power but also can set its maximum power POE total power 1 120W the corresponding port power values are 10W 15W 30W Each port output maximum power of 30W 6 3 6 1 Global configuration In the menu bar click Main Menu Port Config POE Config Global Config to enter the global configuration interface ...

Страница 35: ...ed into a logical link to achieve the purpose of increasing the link bandwidth At the same time these bundled links can effectively improve the reliability of the link by inter dynamic backup Based on an IEEE802 3ad standard LACP link aggregation control protocol protocol is an implementation of dynamic link aggregation protocol operation equipment of the agreement between the mutual LACPDU link a...

Страница 36: ...c configuration enter the Static configuration interface Figure 6 3 7 1 Load balance mode of the aggregation group there are 3 kinds of Src Mac according to the source MAC address of the message to share the load when the source MAC address phase at the same time the message in the same port through otherwise the message from different ports through Dst Mac according to the purpose of the message ...

Страница 37: ...ly the speed and duplex properties are the same and the ports that are connected to the same device and have the same basic configuration can be dynamically converged Even if only one port can also create dynamic convergence this time for single port aggregation In dynamic convergence the LACP protocol of the port is in the state of enable In the menu bar click on the main menu port configuration ...

Страница 38: ... need to add the port to the isolation group you can achieve isolation between the two layer of data between the port data Port isolation provides a more secure and flexible networking solution for the user In the menu bar click on the main menu port configuration isolate port enter the port isolation configuration interface Figure 6 3 8 Configuration port isolation step Step 1 check the port isol...

Страница 39: ... 9 2 Detail port state In the menu bar click the main menu port configuration Port Statistics Detail port state enter the port with statistics interface In the interface we can view to every port of different kinds of packet reception and transmission ...

Страница 40: ...ate the security of broadcast information 3 Flexible management Change users belong to the network does not have to change the port and connection only to change the software configuration on it That is in the same VLAN can communicate with each other in a different VLAN cannot communicate with each other A VLAN with VLAN ID to identify with the same VLAN ID is the same VLAN 6 4 1 1 PVlan configur...

Страница 41: ...th transmit and receive message Type Receive message Message did not take Tag Message take Tag Access Put the VLAN tag point to Port default VLAN ID for message Put the VLAN tag point to Port default VLAN ID for message Trunk Put the VLAN tag point to Port default VLAN ID for message Keep up VLAN ID no need replace Type Transmit message Unmodify Did not modify when transmit the data packet is the ...

Страница 42: ...1 fill Vid in the text box in the Vlan ID Step 2 fill in the description of the text box to fill in the description of the vlan Step 3 select Flood all Flood unknow or drop in the multicast drop down box Step 4 click the add modify button 6 4 1 4 MAC VLAN Based on MAC partition VLAN is another method of VLAN It defines the VLAN member in accordance with the source MAC address of the message and se...

Страница 43: ...he switch to achieve fast forwarding 6 4 2 1 MAC configuration Each port of the switch has the function of automatically learning the address and the source address the source MAC address and the switch port number of the transmitting and receiving frame of the port will be stored in the address table Aging time is a parameter that affects the learning process of the switch The default is 300 seco...

Страница 44: ... and the corresponding table entry is required when the port changes The multicast address table is displayed in the IGMP listener table entry The aging time of the MAC address is 300 seconds After the port is disconnected the upper level program clears all the corresponding port list items 6 4 2 2 Static MAC Static MAC manually set by the user not aging In the menu bar in order to click on the ma...

Страница 45: ... protocol STP Spanning Tree Protocol RSTP Rapid Spanning Tree Protocol and MSTP Multiple Spanning Tree Protocol There are two main functions of the spanning tree protocol one is to use the spanning tree algorithm in the Ethernet network to create a port for the root of a switch to generate a tree to avoid loop Two is in the Ethernet topology changes through the spanning tree protocol to achieve th...

Страница 46: ...n name in MST domain Bridge configuration steps Step 1 check the Spanning tree in the check box Step 2 select STP RSTP or MSTP in the mode selection Step 3 the priority of the text box to fill in the value of the priority Step 4 fill in the values of Max age Hello time Forward delay Max hop Revision and Name Step 5 click the Apply button 6 4 3 2 Instance setting In the menu bar click on the main m...

Страница 47: ...he text box for the Vlan Mapped Step 4 click the add button 6 4 3 3 Bridge port In the menu bar click main menu layer 2 configuration spanning tree bridge port to enter the bridge port configuration interface the interface can be enabled ports in spanning tree configuration port type link type and BPDU protection function Figure 6 4 3 3 Configuration item meaning BPDU Guard Configuration BPDU prot...

Страница 48: ... enable check box Step 2 check the BPDU Guard check box to enable port BPDU protection function Step 3 select automatic Force True or Force False in the Edge drop down box Step 4 select automatic Force True or Force False in the Point to Point drop down box Step 5 click the Apply button 6 4 3 4 Instance port configuration In the menu bar in order to click on the main menu layer 2 configuration spa...

Страница 49: ...d did not receive BPDU Listening Can receive packets after the connection to it switches stay max age 20s in the blocking so judge whether switch port can become root port or designated port the port state will convert listening the state remains 15 ms if it works receive and forward packets during this time to achieve the selection of root for RST structure and the direction of port The decision ...

Страница 50: ... 4 4 1 IGMP Snooping configuration steps Step 1 in the IGMP Snooping configuration to enable the check box to enable IGMP Step 2 in the host aging time of the text box to fill in the aging time Step 3 click the Apply button 6 4 4 2 Static Multicast The main function of the static multicast some ports will be added to a multicast group when data is sent to the multicast address the data can be rece...

Страница 51: ...m the network The switch supports maximum 4 ring groups Each group set up 2 ports as Ring Port and a port cannot belong to several rings Hello_time setting is time interval of sending detecting packet to network at regular time The unit is ms Its main purpose is to detect network connection It sends a detecting packet to next door devices by CPU If they receive it then reply a confirm packet to en...

Страница 52: ...e is Single Configure other switches the same as this switch reboot these switches then connect port 4 and port 5 through network cable use BlueEyes software search the switches the topology of the ring network is as below figure Dual ring configuration Double ring as shown below figure we can send dual ring is 2 rings combining the point is number 105 switch ...

Страница 53: ... method 1 Enable Ring Group 1 and Ring Group 2 Hello_time can be disable too if it enable time of sending Hello packet could not be very fast or it will influence CPU dealing speed 2 Set up Port 1 and 2 of Device 105 106 to be Ring Ports in Ring Group 1 Network ID is 1 Ring Type Single Set up Port 4 of device to be Coupling Port in Ring Group 2 Coupling Control Port is 2 Network ID is 3 and Ring T...

Страница 54: ...Port in Ring Group 1 Network ID is1 Ring Type is Single Set up Port 7 and 8 of Device 107 108 and 109 to be Ring Ports in Ring Group 2 Network ID is 2 Ring Type is Chain 3 Use a wire to connect Port 7 and 8 of Device 107 109 in turn to make a chain Use a wire to connect Port 7 and 8 of Device 100 103 in turn to make a Single Ring Then use a wire to connect Port 8 of Device 107 and Port 7 of Device...

Страница 55: ...to constrain multicasts at Layer 2 without the need to install or configure software on hosts When a host wants to join an IP multicast group it sends an IGMP join message which spawns a GMRP join message Upon receipt of the GMRP join message the switch adds the port through which the join message was received to the appropriate Multicast group The switch propagates the GMRP join message to all ot...

Страница 56: ...ration item meaning ForwardAll forward Join Time In the first time sent the Join message did not get a reply the second time will send Join messages Time interval between two Join messages Leave Time When the switch wants other switches to write off their own attribute information the Leave message will be sent to the outside LeaveAllTime When the switch is started the LeaveAll timer will be start...

Страница 57: ...Registration drop down box Step 7 click the Settings button 6 4 6 3 GMRP group In the menu bar in order to click on the main menu layer 2 configuration GMRP configuration GMRP group access to view the GMRP group interface the interface can view the information of the GMRP group Figure 6 4 6 2 6 5 Network security 6 5 1 Access control In the menu bar click on the main menu network security access c...

Страница 58: ...ng to a predetermined policy 6 5 2 1 ACL group configuration In the menu bar click main menu network security ACL configuration ACL group configuration into ACL group configuration interface the interface can port setting MAC access list ID and IP access list ID Figure 6 5 2 1 ACL GROUP configuration step Step 1 fill in the port of the MAC ACL list ID or IP ACL list ID Step 2 click the Settings bu...

Страница 59: ...te time or cycle time Step 5 if the absolute time in the start time and end time of the text box to fill in the time and date If the cycle time fill in the time at the time of the text box and select the checkbox in the week number of cycles Step 6 click the add button 6 5 2 3 MAC ACL configuration MAC ACL is used to identify the message flow in the purpose of MAC address access control settings i...

Страница 60: ...to fill in the value of the group ID Step 2 click the add button Step 3 fill in the added group ID in the text box of the group ID of the configuration rule Step 4 fill in the value of rule ID in the text box of rule ID Step 5 select deny or permit in the action drop down box Step 6 fill in the blank in the source MAC address or MAC source text box Step 7 fill in the blank in the destination MAC a...

Страница 61: ... in the configuration of the IP access list of the group ID in the text box to fill in the value of the group ID Step 2 click the add button Step 3 fill in the added group ID in the text box of the group ID of the configuration rule Step 4 fill in the value of rule ID in the text box of rule ID Step 5 select deny or permit in the action drop down box Step 6 select the any IGMP IP TCP or UDP in the...

Страница 62: ...hieve the separation of business and certification After the user passed the authentication business stream and certification flow should separate no special requirements on the follow up packet processing the business can be very flexible in particular have a great advantage in carrying out the business of broadband multicast all business are not subject to certification way limit 802 1X authenti...

Страница 63: ...authentication server which is used for authentication and the IP address domain name that the devices can access the default Port is 1812 Authenticate the Shared Password For device access the shared secret string of authentication server Global configuration step Step 1 select enable or disable 802 1x authentication Step 2 select the Radius server remote or local fill in the authentication updat...

Страница 64: ...et loss rate and other core needs to provide support for the assessment of the service capabilities 6 6 1 1 Global configuration QoS provides four internal queues each queue supports four different levels of traffic shorter persistence time of high priority data packets in the switch supports lower latency for certain delay sensitive traffic According to 802 1p priority tags and IP TOS equipment c...

Страница 65: ...3 COS in the Queue drop down box to select the value of 0 3 Queue and then click the apply button Step 3 configure DSCP queue mapping in the DSCP drop down box to select the 0 63 value DSCP in the DSCP New drop down box to select the DSCP 0 63 value New in the Cos drop down box to select the Cos value 0 3 and then click the apply button 6 6 1 2 Port configuration In the menu bar in order to click ...

Страница 66: ...vices to send updated information to that neighbor devices will be the information stored in the standard SNMP MIB library Network management system can query from the SNMP MIB Library of the current second layer connection It should be noted that LLDP is only a remote device status information discovery protocol it can t complete the network device configuration and port control and other functio...

Страница 67: ... to 2 5 seconds LLDP global configuration step Step 1 select enabled or disabled in the radio buttons in LLDP Step 2 fill in the value of the sending period in the text box of the send cycle Step 3 the value of the retransmission time in the text box of the retransmission time Step 4 fill in the value of the sending interval in the text box of the sending interval Step 5 fill in the re enable dela...

Страница 68: ... it is conducive to the network topology network management network management The management address is encapsulated in the Management Address TLV field of the LLDP message and is sent to the neighbor node LLDP port configuration step Step 1 check the port in the sent check box Step 2 check the port in the received check box Step 3 fill in the IP address in the text box of the management address ...

Страница 69: ... will read or write according to the message type to create Response message and send the Response message back to NMS Agent will also send Trap message to NMS when the device is abnormal SNMP supports 3 kinds of basic operating in total Get Manager can use this to get some variable value of Agent Set Manager can use this to set up some variable value of Agent Trap Agent uses this to send an alarm...

Страница 70: ...ist of the community name 6 6 3 1 System information Select enable or disable SMNP features Figure 6 6 3 1 SNMP system configuration steps Step 1 select the checkbox to enable or disable in the mode of the Step 2 click the Apply button 6 6 3 2 View Fill in the name of the view as well as the mode node OID Figure 6 6 3 2 View configuration steps Step 1 fill in the name of the view Step 2 select mod...

Страница 71: ...l in the name of the view Step 4 click add 6 6 3 4 V3 User SNMPv3 using USM User Based Security Model certification mechanism Network administrators can set the authentication and encryption functions Certification for verify the message sender s legitimacy and avoid the illegal user access encryption is to encrypt the transmission message between NMS and agent so as not to be tapped Using authent...

Страница 72: ...MIB information specific to the device is uses as device connector These network devices can be monitored or controlled through the agent When trap event happens a message is transmitted by SNMP Trap an available trap receiver can get this trap information Figure 6 6 3 5 Trap configuration steps Step 1 fill in the trap event occurs when the message is sent to the destination IP address Step 2 clic...

Страница 73: ...s Step 1 in the serial number of the text box to fill in the event group number Step 2 fill in the description of the text box for the description of the event group Step 3 select none log log trap and in the action drop down box Step 4 click the add button 6 6 4 2 Statistical In the menu bar followed by click on the main menu advanced configuration and RMON configuration Statistics in RMON statis...

Страница 74: ...erface the interface can add delete history group and view the configuration information for a group of history Set a physical port as the receiving end of the monitoring information serial number is used to identify a specific application interface when the serial number and the serial number of the application interface before setting the same the previous configuration will be replaced Figure 6...

Страница 75: ...vious index MIB point corresponds to OID Alarm type adopt absolute to monitor the value of MIB target Adopt delta to monitor the change of MIB target value when get sample two times When monitor MIB value reach or pass the rising threshold value will occur event correspond to rising event index When monitor MIB value reach or pass the falling threshold value will occur event correspond to falling ...

Страница 76: ...n to network environment host dynamics and can promote the rate of use of address 6 6 5 1 DHCP Server configuration DHCP Server enabled the device is used as a DHCP server by setting the static allocation address table to achieve the device can be connected to other devices connected to the device IP address In the menu bar in order to click on the main menu advanced configuration DHCP Server conf...

Страница 77: ... pool configuration Step 1 fill in the name of the address pool in the text box of the name of the address pool Step 2 fill in the IP address in the text box of the subnet mask Step 3 configure the DHCP client automatically at the lease time to get to the address of the valid time Step 4 fill in the IP address in the text box of the default gateway Step 5 fill in the IP address in the text box of ...

Страница 78: ...n steps Step 1 select the address pool name in the drop down box in the DHCP Pool Step 2 fill in the IP address of the text box to be assigned to the client s IP address Step 3 in the MAC address of the text box to fill in the MAC address of the client Step 4 click the add button 6 6 5 5 Port binding configuration In the menu bar in order to click on the main menu advanced configuration DHCP Serve...

Страница 79: ...ent s IP address Step 4 click the add button 6 6 6 DHCP snooping DHCP Snooping that is the layer 2 of DHCP service monitoring function open the DHCP Snooping function the device can be extracted from the received DHCP ACK and DHCP REQUEST messages and record the IP address and MAC address information 6 6 6 1 Global configuration In the menu bar click main menu advanced configuration DHCP snooping ...

Страница 80: ...e MAC address in the MAC text box Step 2 fill in the Vlan Id text box Vlan Id Step 3 fill in the IP address in the IP address text box Step 4 write the Tftp server box to fill in the Tftp server IP address Step 5 write the Tftp file name box to fill in the appropriate file name Step 6 select the port in the port selection bar Step 7 click the add button 6 6 6 3 Port configuration DHCP Snooping tru...

Страница 81: ...rt after the Trust IPSG check box check box Step 4 in the corresponding port after the Policy Op82 drop down box selection Step 5 select the Circuit type drop down box at the end of the corresponding port Step 6 fill in ID in the Circuit id text box in the corresponding port Step 7 select the Remote type drop down box at the end of the corresponding port Step 8 fill in ID in the Remote id text box...

Страница 82: ...veral clock source web site to provide users with timing services and between these sites should can compare improve the time accuracy In the menu bar in order to click on the main menu advanced configuration NTP settings to enter the NTP settings interface Figure 6 6 8 NTP server configuration step Step 1 select the checkbox to enable or disable in the mode of the Step 2 in the time interval of t...

Страница 83: ...anagement file view launch configuration to enter the start configuration interface the interface can view the current configuration information Figure 6 7 1 1 6 7 1 2 Management file In the menu bar in order to click on the main menu system management management file management file into the configuration file management interface the interface can be downloaded uploaded profile ...

Страница 84: ... upload Step 4 click the Upload button After the completion of the update will automatically open a new page to the system state 6 7 2 Save In the menu bar click on the main menu system management save to enter the storage configuration interface Figure 6 7 2 6 7 3 Reboot In the menu bar click on the main menu system management Reboot to reset the settings interface Figure 6 7 3 6 7 4 Restore In t...

Страница 85: ...e 6 7 5 Online upgrade steps Step 1 click on the select file tab Step 2 click the Browse button select the location of the file to upload Step 3 click the Upload button 1 The upgrade process is prohibited without power after the confirmation began to burn and write flash 2 After the completion of the upgrade will automatically open a new page to the system state ...

Страница 86: ... the following ways Internet service Make a call to our technical office Return or replace product 7 1 Internet Service Please visit http www 3onedata com 7 2 Make a call to our technical office You can call our technical support office the company has professional technical engineers to answer your questions and help you resolve your problems at the first time Free Service Hotline 400 600 4496 7 ...

Страница 87: ... bit domain can classify packets into 64 level with the value 0 63 range E Ethernet Ethernet uses a bus or star shaped topology and supports transmission rates up to 10Mbps orders of magnitude A new version called fast Ethernet speeds of up to 100Mbps F Flow Control Flow control allows low rate devices communicate with high rate the flow control can match high rate port contracting speed with low ...

Страница 88: ...group tied up a group of ports together to increase bandwidth and improve the connection reliability ToS Type of Service Packaged in IP packet header of 8 bit domain to perform the different priority packets U UDP User Datagram Protocol Face to disconnected unreliable transmission layer protocol UTP Unshielded Twisted Pair Not shielded media out of twisted pair ...

Страница 89: ...host will continue to make alarm sound when got alarm information 5 Why cannot increase the bandwidth after configured trunking Check the Trunking Port s properties are coincident including rate duplex mode VLAN etc 6 How to deal the problem that some of ports cannot access When some of ports cannot access that may be line fault network card failure and switch port failure by the following test to...

Отзывы: