background image

 

VigorSwitch G1260 User’s Guide 

23

Source addresses (SA) 

- The SA field indicates the source node. The SA is always an 

individual address and the left-most bit in the SA field is always 0. 

Length/Type

 - This field indicates either the number of the data bytes contained in the data 

field of the frame, or the Ethernet type of data. If the value of first two bytes is less than or 
equal to 1500 in decimal, the number of bytes in the data field is equal to the Length/Type 
value, i.e. this field acts as Length indicator at this moment. When this field acts as Length, 
the frame has optional fields for 802.3/802.2 SNAP encapsulation, 802.3/802.2 
encapsulation and Netware 802.3 RAW encapsulation. Each of them has different fields 
following the Length field. 

If the Length/Type value is greater than 1500, it means the Length/Type acts as Type. 
Different type value means the frames with different protocols running over Ethernet being 
sent or received. 

For example, 

0x0800  

IP datagram 

0x0806  

ARP 

0x0835  

RARP 

0x8137  

IPX datagram 

0x86DD  

IPv6 

Data

 - Less than or equal to 1500 bytes and greater or equal to 46 bytes. If data is less than 

46 bytes, the MAC will automatically extend the padding bits and have the payload be 
equal to 46 bytes. The length of data field must equal the value of the Length field when 
the Length/Type acts as Length. 

Frame check sequence (FCS) 

- This field contains a 32-bit cyclic redundancy check 

(CRC) value, and is a check sum computed with DA, SA, through the end of the data field 
with the following polynomial. 

 

It is created by the sending MAC and recalculated by the receiving MAC to check if the 
packet is damaged or not. 

H

H

o

o

w

w

 

 

d

d

o

o

e

e

s

s

 

 

a

a

 

 

M

M

A

A

C

C

 

 

w

w

o

o

r

r

k

k

?

?

 

 

The MAC sub-layer has two primary jobs to do: 

1.

 

Receiving and transmitting data. When receiving data, it parses frame to detect error; 
when transmitting data, it performs frame assembly. 

2.

 

Performing Media access control. It prepares the initiation jobs for a frame 
transmission and makes recovery from transmission failure. 

F

F

r

r

a

a

m

m

e

e

 

 

t

t

r

r

a

a

n

n

s

s

m

m

i

i

s

s

s

s

i

i

o

o

n

n

 

 

As Ethernet adopted Carrier Sense Multiple Access with Collision Detect (CSMA/CD), it 
detects if there is any carrier signal from another network device running over the physical 
medium when a frame is ready for transmission. This is referred to as sensing carrier, also 
“Listen”. If there is signal on the medium, the MAC defers the traffic to avoid a 
transmission collision and waits for a random period of time, called backoff time, then 
sends the traffic again. 

After the frame is assembled, when transmitting the frame, the preamble (PRE) bytes are 
inserted and sent first, then the next, Start of frame Delimiter (SFD), DA, SA and through 

Содержание VigorSwitch G1260

Страница 1: ...i ...

Страница 2: ...VigorSwitch G1260 User s Guide ii VigorSwitch G1260 24 Gigabit Port Web Smart Switch User s Guide Version 1 0 Firmware Version V1 21 Date 22 10 2013 ...

Страница 3: ...ears from the date of purchase from the dealer Please keep your purchase receipt in a safe place as it serves as proof of date of purchase During the warranty period and upon proof of purchase should the product have indications of failure due to faulty workmanship and or materials we will at our discretion repair or replace the defective products or components without charge for either parts or l...

Страница 4: ...ing with the requirements set forth in EN55022 Class A and EN55024 Class A The product conforms to the requirements of Low Voltage LVD Directive 2006 95 EC by complying with the requirements set forth in EN6095 1 Federal Communications Commission FCC Statement This equipment has been tested and found to comply with the limits for a class A computing device pursuant to Subpart J of part 15 of FCC R...

Страница 5: ... 6 1 5 5 Configuring the Management Agent of Switch 11 1 5 6 IP Address Assignment 12 1 6 Typical Applications 16 Basic Concept and Management 19 2 1 What s the Ethernet 19 2 2 Media Access Control MAC 21 2 3 Flow Control 26 2 4 How does a switch work 28 Terminology 28 2 5 Virtual LAN 31 2 6 Link Aggregation 36 Operation of Web based Management 39 3 1 Web Management Home Overview 40 3 1 1 The Info...

Страница 6: ...e 62 3 10 Loop Detection 65 3 11 Broadcast Storm Protection 66 3 12 SNMP 67 3 13 Statistics Overview 69 3 14 Detailed Statistics 70 3 15 IGMP Status 72 3 16 Ping 73 3 17 Warm Restart 74 3 18 Factory Default 74 3 19 Firmware Upgrade 75 3 20 Configuration File Transfer 76 3 21 Logout 77 Trouble Shooting 79 4 1 Resolving No Link Condition 79 4 2 Q A 79 ...

Страница 7: ... the client idle and cable length to provide different power In this switch Port 21 22 23 24 includes two types of media TP and SFP Fiber LC BiDi SC this port supports 10 100 1000Mbps TP or 1000Mbps SFP Fiber with auto detected function 1000Mbps SFP Fiber transceiver is used for high speed connection expansion 1000Mbps LC Multi Mode SFP Fiber transceiver 1000Mbps LC 10km SFP Fiber transceiver 1000...

Страница 8: ...h G1260 a standalone off the shelf switch provides the comprehensive features listed below for users to perform system network administration and efficiently and securely serve your network H Ha ar rd dw wa ar re e 20 10 100 1000Mbps Auto negotiation Gigabit Ethernet TP ports 4 10 100 1000Mbps TP or 1000Mbps SFP Fiber dual media auto sense 512KB on chip frame buffer Jumbo frame support 9KB Program...

Страница 9: ...following VigorSwitch G1260 AC Power Cord CD Rubber feet Rack mount kit Please notify your sales representative immediately if any of the aforementioned items is missing or damaged O Op pt ti io on na al l M Mo od du ul le es s In the switch Port 21 24 include two types of media TP and SFP Fiber LC BiDi SC they support 10 100 1000Mbps TP or 1000Mbps SFP Fiber with auto detected function 1000Mbps S...

Страница 10: ...0 100 1000Ethernet TP Port 1 to 24 LED LINK ACT Green Lit when connection with remote device is good Blinks when any traffic is present Speed Green Yellow Off Lit Green when TP link on 1000Mbps speed Lit Amber when TP link on 10 100Mbps speed Off when no link occur 1000SX LX Gigabit Fiber Port 21 22 23 24 LED LINK ACT Green Lit when SFP connection with remote device is good Blinks when any traffic...

Страница 11: ...ve procedures are done T TP P P Po or rt t a an nd d C Ca ab bl le e I In ns st ta al ll la at ti io on n In the switch TP port supports MDI MDI X auto crossover so both types of cable straight through Cable pin outs for RJ 45 jack 1 2 3 6 to 1 2 3 6 in 10 100M TP 1 2 3 4 5 6 7 8 to 1 2 3 4 5 6 7 8 in Gigabit TP and crossed over Cable pin outs for RJ 45 jack 1 2 3 6 to 3 6 1 2 can be used It means...

Страница 12: ...h W Wi ir ri in ng g C Cl lo os se et t R Ra ai il l Caution Allow a proper spacing and proper air ventilation for the cooling fan at both sides of the chassis 1 Wear a grounding device for electrostatic discharge 2 Screw the mounting accessory to the front side of the switch 3 Place the Chassis into the 19 inch wiring closet rail and locate it at the proper position Then fix the Chassis by screwi...

Страница 13: ...62 5 125 m Multi mode 50 125 m Modal Bandwidth Distance Modal Bandwidth Distance 160MHz Km 220m 400MHz Km 500m IEEE 802 3z Gigabit Ethernet 1000SX 850nm 200MHz Km 275m 500MHz Km 550m Single mode Fiber 9 125 m Single mode transceiver 1310nm 10Km 1000Base LX LH X XD ZX Single mode transceiver 1550nm 30 50Km TX Transmit 1310nm Single Mode 20Km RX Receive 1550nm TX Transmit 1550nm 1000Base LX Single F...

Страница 14: ...pproach it will minimize the number of switches in any one path will lower the possibility of network loop and will improve network efficiency If more than two switches are connected in the same network select one switch as Level 1 switch and connect all other switches to it at Level 2 Server Host is recommended to connect to the Level 1 switch This is general if no VLAN or other special requireme...

Страница 15: ... access VLAN members each other The switch manager has to assign different names for each VLAN groups at one switch Case 3 Port based VLAN 2 The switch image is sample only VLAN1 members could not access VLAN2 VLAN3 and VLAN4 members VLAN2 members could not access VLAN1 and VLAN3 members but they could access VLAN4 members VLAN3 members could not access VLAN1 VLAN2 and VLAN4 ...

Страница 16: ...60 User s Guide 10 VLAN4 members could not access VLAN1 and VLAN3 members but they could access VLAN2 members Case 4 The same VLAN members can be at different switches with the same VID The switch image is sample only ...

Страница 17: ...ent interface Web based UI for the switch is an interface in a highly friendly way Managing VigorSwitch G1260 through Ethernet Port Before start using the switch the IP address setting of the switch should be done then perform the following steps 1 Set up a physical path between the configured the switch and a PC by a qualified UTP Cat 5 cable with RJ 45 connector Note If PC directly connects to t...

Страница 18: ...ddress we used is version 4 known as IPv4 Network identifier Host identifier 32 bits With the classful addressing it divides IP address into three classes class A class B and class C The rest of IP addresses are for multicast and broadcast The bit length of the network prefix is the same as that of the subnet mask and is denoted as IP address X for example 192 168 1 0 24 Each class has its address...

Страница 19: ...s more efficiently and ease to manage IP network For a class B network 128 1 2 3 it may have a subnet mask 255 255 0 0 in default in which the first two bytes is with all 1s This means more than 60 thousands of nodes in flat IP address will be at the same network It s too large to manage practically Now if we divide it into smaller network by extending network prefix from 16 bits to say 24 bits th...

Страница 20: ...is considered a physical network in an autonomous network So it owns a network IP address which may looks like 168 1 2 0 With the subnet mask a bigger network can be cut into small pieces of network If we want to have more than two independent networks in a worknet a partition to the network must be performed In this case subnet mask must be applied For different network applications the subnet ma...

Страница 21: ...bove enter 192 168 1 1 for instance For sure an IP address such as 192 168 1 x must be set on your PC Second Subnet Mask as shown above enter 255 255 255 0 Any subnet mask such as 255 255 255 x is allowable in this case Note The DHCP Setting is enabled in default ...

Страница 22: ...upported comprehensive fiber types of connection including LC BiDi LC for SFP For more details on the specification of the switch please refer to Appendix A The switch is suitable for the following applications Central Site Remote site application is used in carrier or ISP The switch image is sample only It is a system wide basic reference connection diagram This diagram demonstrates how the switc...

Страница 23: ...VigorSwitch G1260 User s Guide 17 Peer to peer application is used in two remote offices The switch image is sample only Office Network Connection The switch image is sample only ...

Страница 24: ...VigorSwitch G1260 User s Guide 18 This page is left blank ...

Страница 25: ...et inherits the same frame format CSMA CD software interface In 1998 Gigabit Ethernet was rolled out and provided 1000Mbps Now 10G s Ethernet is under approving Although these Ethernet have different speed they still use the same basic functions So they are compatible in software and can connect each other almost without limitation The transmission media may be the only problem In the above figure...

Страница 26: ... Ethernet MAC and upper layers in the protocol stack usually Network layer which is nothing to do with the nature of the LAN So it can operate over other different LAN technology such as Token Ring FDDI and so on Likewise for the interface to the MAC layer LLC defines the services with the interface independent of the medium access technology and with some of the nature of the medium itself The ta...

Страница 27: ...rvice In Fig 3 2 it shows the format of Service Access Point SAP Please refer to IEEE802 2 for more details 2 2 2 2 M Me ed di ia a A Ac cc ce es ss s C Co on nt tr ro ol l M MA AC C M MA AC C A Ad dd dr re es ss si in ng g Because LAN is composed of many nodes for the data exchanged among these nodes each node must have its own unique address to identify who should send the data or should receive...

Страница 28: ...tination MAC points to A multicast address is identified with a group of network devices or network interfaces In Ethernet a many to many connectivity in the LANs is provided It provides a mean to send a frame to many network devices at a time When all bit of DA is 1s it is a broadcast which means all network device except the sender itself can receive the frame and response E Et th he er rn ne et...

Страница 29: ...a field must equal the value of the Length field when the Length Type acts as Length Frame check sequence FCS This field contains a 32 bit cyclic redundancy check CRC value and is a check sum computed with DA SA through the end of the data field with the following polynomial It is created by the sending MAC and recalculated by the receiving MAC to check if the packet is damaged or not H Ho ow w d ...

Страница 30: ...at the same time As the transmission of a MAC frame with the half duplex operation exists only in the same collision domain the carrier signal needs to spend time to travel to reach the targeted device For two most distant devices in the same collision domain when one sends the frame first and the second sends the frame in worstcase just before the frame from the first device arrives The collision...

Страница 31: ...mitting and receiving frames are processed simultaneously This doubles the total bandwidth Full duplex is much easier than half duplex because it does not involve media contention collision retransmission schedule padding bits for short frame The rest functions follow the specification of IEEE802 3 For example it must meet the requirement of minimum inter frame gap between successive frames and fr...

Страница 32: ...ransmit data out and if there is no carrier signal on the medium at that time the device will wait for a period of time known as an inter frame gap time to have the medium clear and stabilized as well as to have the jobs ready such as adjusting buffer counter updating counter and so on in the receiver site Once the inter frame gap time expires after the de assertion of carrier sense the MAC transm...

Страница 33: ...ame is too long If yes throws it away and reports frame Too Long 4 If the FCS of the received frame is valid If not for 10M and 100M Ethernet discards the frame For Gigabit Ethernet or higher speed Ethernet MAC has to check one more field i e extra bit field if FCS is invalid If there is any extra bits existed which must meet the specification of IEEE802 3 When both FCS and extra bits are valid th...

Страница 34: ...layer is capable of sending and receiving symbols that are readily distinguished from data symbols as is the case in most physical layers that use a block encoding decoding scheme The maximum length of the extension is equal to the quantity slotTime minFrameSize The MAC continues to monitor the medium for collisions while it is transmitting extension bits and it will treat any collision that occur...

Страница 35: ...the switch and use CSMA CD rule For the host directly attached to the switch because no other host s joins the traffic contention hence it will not be affected by CSMA CD These LAN segments are separated in different access domains by the switch The switch image is sample only M Mi ic cr ro o s se eg gm me en nt ta at ti io on n To have a port of the switch connected to a single host is referred t...

Страница 36: ...This is a great feature for the port needing more bandwidth but cannot afford paying much cost for high bandwidth port The switch image is sample only H Ho ow w d do oe es s a a s sw wi it tc ch h o op pe er ra at te e A Layer 2 switch uses some features of the Data Link layer in OSI model to forward the packet to the destination port s Here we introduce some important features of a switch and how...

Страница 37: ...re Low Weighted Round Robin Set a weight figure to the packet with a priority level say 5 7 and next set another weight to the packet with a priority level say 2 4 and so on The WRR will transmit the packet with the weight So the packet of each priority level can be allocated a fixed bandwidth B Ba an nd dw wi id dt th h r ra at ti in ng g Bandwidth rating is the limitation set by administrator an...

Страница 38: ...traffic will rapidly decrease the performance of the network Finally the network may get down The switch image is sample only Now we apply VLAN technology to configure the system shown as the figure above We can partition the users into the different logical networks which have their own broadcast domain The traffic will not disturb among these logical networks The users 1x x denotes a d are membe...

Страница 39: ...Q VLAN Protocol based VLAN It identifies the VLAN membership by layer 3 protocol types for example IPX Appletalk IP etc Other VLAN technologies not mentioned above are MAC based VLAN IP based VLAN and so on T Te er rm mi in no ol lo og gy y Tagged Frame A frame carrying a tag field following the source MAC address is four bytes long and contains VLAN protocol ID and tag control information compose...

Страница 40: ... the ingress port s PVID is applied to the packet VLAN bridge will then look up the MAC address table and determine to which ports the packet should be forwarded Next it will check to see if the destination ports belong to the same VLAN with that PVID If the destination ports are members of the VLAN used by ingress port the packet will be forwarded Note VID can not be 0 or 4095 Ingress Rule Each p...

Страница 41: ...Filtering Database Referred to as FID It can provide the information where the packet will be sent to Filtering database will supply the outgoing port according to the request from forwarding process with VID and DA When a packet is received if it has a non zero VID then FID will offer the associated outgoing ports information to the packet In SVL VLANs use the same Filtering Database In IVL VLANs...

Страница 42: ... the reason why now we have 802 3ad Link Aggregation Control Protocol LACP W Wh hy y 8 80 02 2 3 3a ad d L LA AC CP P Network is varying For example if a port malfunctioned or unplugged accidentally in a static trunk port administrator has to reconfigure it or the network will get trouble Therefore offering a tool with automatic recovery capability is necessary for an administrator LACP is a proto...

Страница 43: ...s You cannot aggregate a 1000Mbps and two 100Mbps for a 1 2Gbps trunk port T Te er rm mi in no ol lo og gy y Link Aggregation It is a method to have multiple physical links with the same media and speed bundled to be a logical link forming a Link Aggregation Group with a group ID With the viewpoint of MAC client each Link Aggregation Group is an independent link There are three cases of link used ...

Страница 44: ...VigorSwitch G1260 User s Guide 38 ...

Страница 45: ...he Switch are listed in the figure below When the configuration of your Web Smart Switch is finished you can browse it by the IP address you set up For instance uncheck the Enable box of DHCP Setting first it is enabled in default Next type http 192 168 1 1 in the address row in a browser then the following screen see Fig 4 1 would show up and ask for your password input for login and access authe...

Страница 46: ...fo or rm ma at ti io on n o of f P Pa ag ge e L La ay yo ou ut t On the top part of the information page it shows the front panel of the switch Linked ports will be displayed in green color and linked off ones will be in black For the optional modules the slots with no module will only show covered plates the other slots with installed modules would present modules The images of modules would depe...

Страница 47: ...not be able to manage the device The switch supports manual IP address setting Function name System configuration Function description Show system description firmware version hardware version MAC address serial number host IP address host MAC address active subnet mask active gateway and DHCP server Set device name uncheck DHCP setting IP address subnet mask default gateway management VLAN passwo...

Страница 48: ... getting help soon You can configure this parameter through the device s user interface or SNMP System Location Set the location of the switch where it was located DHCP Enabled Enable DHCP snooping Just tick the check box to enable it Default disable Fallback IP Address Users can configure the IP settings and fill in new values Then click Apply button to update Default 192 168 1 224 Fallback Subne...

Страница 49: ... a packet does not meet the criteria for other pre defined path it must be forwarded to a default router on a default path This means any packet with undefined IP address in the routing table will be sent to this device unconditionally Default 192 168 1 1 Management VLAN Set the management VLAN number Password Set a password for this switch Up to 16 characters are allowed in this parameter Any alp...

Страница 50: ... each port In this configuration function you can set reset the following functions All of them are described in detail below Function name Port Configuration Function description Port Configuration is applied for the settings of the ports TP Ports and Fiber Ports on the switch By this function you can set or reset the values for Mode and Flow Control Parameter description ...

Страница 51: ...on Link Show link status of this port Mode Set the speed and duplex of the port If the media is 1Gbps fiber there are three modes to choose Auto Speed 1000 100 Full and Disable If the media is TP the speed is Auto Speed 10 100 1000 Mbps Full Half and Disabled The following table summarized the function the media supports In Auto mode no default value Flow Control You can Just tick the check box to...

Страница 52: ...lling down list and selecting an item Then click Apply button the settings will take effect immediately Parameter description VLAN Mode Port based Port based VLAN is defined by port Any packet coming in or outgoing from any one port of a port based VLAN will be accepted No filtering criterion applies in port based VLAN The only criterion is the physical port you connect to For example for a port b...

Страница 53: ...ltering list or egress filtering list the packet will be screened with more filtering criteria to determine if it can be forwarded The switch supports supplement of 802 1q Each tag based VLAN you built up must be assigned VLAN name and VLAN ID Valid VLAN ID is 1 4094 User can create total up to 64 Tag VLAN groups ...

Страница 54: ... You can also easily create edit and delete a Tag based VLAN group by pressing Add Modify and Delete function buttons User can add a new VLAN group by inputting a new VLAN name and VLAN ID Parameter description Add a VLAN Create a new port based VLAN or tag based VLAN which depends on the VLAN mode you choose in VLAN mode function Please input the VLAN ID first then click on Add to create a new Ta...

Страница 55: ...VLAN Configuration List VID VLAN identifier Each tag based VLAN group has a unique VID It appears only in tag based and Double tag mode Member Display the selected port members that will apply to such VALN group Modify Just press the Modify button to edit the selected group entry Delete Just press the Delete button to remove the selected group entry from the Tag based group table VLAN Port Configu...

Страница 56: ...p packets Frame Type Specify a frame type to forward packets All Forward all tagged and untagged packets Tagged Only Forward tagged packets only and discard untagged packets PVID Private VLAN ID identifier Each Private VLAN group has a unique VID Private VLAN contains switch ports that cannot communicate with each other but can access another network It appears only in tag based and Double tag mod...

Страница 57: ...ouble VLAN tags one will be dropped and the other will still be left Hybrid it is similar to Trunk and both of them will tag out When the port is set to Hybrid its packets will be untagged out if the VID of the outgoing packets with tag is the same as the one in the field of Untag VID of this port Untag VID Valid range is 1 4094 It works only when Role is set to Hybrid ...

Страница 58: ...p If you are in tag based VLAN it will show the ID VID Member of the existed tag based VLAN group The switch can store the configuration of port based VLAN and tag based VLAN separately When you choose one of VLAN mode the switch will bring you the responded VLAN configuration which keeps the default data You can easily create and delete a VLAN group by pressing Add and Delete buttons or click the...

Страница 59: ...When you want to edit a VLAN group you must select the Group ID field Then you will enter Tag Base VLAN Group Setting or Port Base VLAN Group Setting page which depends on your VLAN mode selection Member Display the selected port members that will apply to such VALN group Modify Just press the Modify button to edit the selected group entry Delete Just press the Delete button to remove the selected...

Страница 60: ... of the ports on the layer 2 switch as a protected port or a non protected port A destination address on the data packet is matched with a physical address on said layer 2 switch and a forwarding map is generated for the data packet based upon the destination address on the data packet The data packet is then sent to the plurality of ports pursuant to the forwarding map generated based upon whethe...

Страница 61: ...ggregation For example if three Fast Ethernet ports are aggregated into a logical port then this logical port s bandwidth would be as three times high as a single Fast Ethernet port s Function name Aggregation Configuration Function description Display the current setup of Aggregation Trunking With this function user is allowed to add a new trunking group or modify the members of an existed trunki...

Страница 62: ...ng the authentication message when the Authenticator PAE request to it Authenticator An entity facilitates the authentication of the supplicant entity It controls the state of the port authorized or unauthorized according to the result of authentication message exchanged between it and a supplicant PAE The authenticator may request the supplicant to re authenticate itself at a configured time peri...

Страница 63: ...onnecting to PC A and A is a PC outside the controlled port running Supplicant PAE In this case PC A wants to access the services on device B and C first it must exchange the authentication message with the authenticator on the port it connected via EAPOL packet The authenticator transfers the supplicant s credentials to Authentication server for verification If success the authentication server w...

Страница 64: ...AP OTP One Time Password or other else algorithm 8 If user ID and password is correct the authentication server will send a Radius Access Accept to the authenticator If not correct the authentication server will send a Radius Access Reject 9 When the authenticator PAE receives a Radius Access Accept it will send an EAP Success to the supplicant At this time the supplicant is authorized and the por...

Страница 65: ...meter description Mode Enable or disable 802 1X function IP Address RADIUS server IP address for authentication Default 0 0 0 0 UDP Port The port number to communicate with RADIUS server for the authentication service The valid value ranges 1 65535 Default port number is 1812 Secret Key The secret key between authentication server and authenticator It is a string with the length 1 15 characters Th...

Страница 66: ... the unauthorized state Default Authorized Show the port status of authorization Status Re authenticate Specify if subscriber has to periodically re enter his or her username and password to stay connected to the port Re authenticate All Re authenticate for all ports in at once Force Reinitialize Force the subscriber has to reinitialize connected to the port Force Reinitialize All Force Reinitiali...

Страница 67: ...function Default disable Router Ports Just tick the check box beside the port x to enable router ports then press the Apply button to start up Default none Fast Leave Enable the fast leave on the port Unregistered IPMC Flooding enabled Just tick the check box to enable this function Default enable VLAN ID At the IGMP Enable mode being selected it will list the VLAN ID number IGMP Snooping Enabled ...

Страница 68: ...s traffic will be copied to monitoring port Set up the port for being monitored Just tick the check box beside the port x and valid port is Port 1 24 3 3 9 9 Q Qu ua al li it ty y o of f S Se er rv vi ic ce e The switch offers powerful QoS function This function supports VLAN tagged priority that can make precedence of 8 priorities and DSCP Differentiated Services Code Point on Layer 3 of network ...

Страница 69: ...apping to Queue medium Priority 5 is mapping to Queue medium Priority 6 is mapping to Queue high and Priority 0 is mapping to Queue high Parameter description Prioritise Traffic Five Prioritize Traffic values are provided User Defined All Low Priority All Normal Priority All Medium Priority and All High Priority The QoS setting would apply to all ports on the switch if one of the following values ...

Страница 70: ...orm total 64 0 63 kinds of Traffic Class based on the arrangement of 6 bit field in DSCP of the IP packet In the switch user is allowed to set up these 64 kinds of Class that belong to any of queue low normal medium high Parameter description Prioritise Traffic Five Prioritize Traffic values are provided User Defined All Low Priority All Normal Priority All Medium Priority and All High Priority Th...

Страница 71: ...nfiguration Function description The loop detection is used to detect the presence of traffic When switch receives packet s looping detection frame MAC address the same as oneself from port show Loop detection happens The port will be locked when it received the looping detection frames If you want to resume the locked port please find out the looping path and take off the looping path then select...

Страница 72: ... into unlocked If not ticking the port Port maintains locked 3 3 1 11 1 B Br ro oa ad dc ca as st t S St to or rm m P Pr ro ot te ec ct ti io on n Function name Broadcast Strom Protection configuration Function description When the broadcast packets received by the switch exceed the threshold configured the port will be blocked for a period of time which can be set After a configured time the swit...

Страница 73: ...tocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity OID of the management Information Base MIB described in the form of SMI syntax SNMP agent is running on the switch to response the request issued by SNMP manager Basically it is passive except issuing the trap information The switch supports a switch to turn on or off the SNMP ...

Страница 74: ...community name via SNMP protocol If they both have the same community name they can talk each other Community name is user definable with a maximum length of 15 characters and is case sensitive There is not allowed to put any blank in the community name string Any printable character is allowable The community name for each function works independently Each function has its own community name Say ...

Страница 75: ... ic cs s O Ov ve er rv vi ie ew w Function name Statistics Overview for all ports Function description The section describes to the Port statistics information and provides overview of general traffic statistics for all switch ports Parameter description Tx Bytes Rx Bytes The number of received and transmitted bytes per port Tx Frames Rx Frames The number of received and transmitted frames per por...

Страница 76: ...fied as low priority Rx Broadcast Show the counting number of the received broadcast packet Rx Multicast Show the counting number of the received multicast packet Rx Broad and Multicast Show the counting number of the received broadcast with multicast packet Rx Error Packets Show the counting number of the received error packets Tx Packets The counting number of the packet transmitted Tx Octets To...

Страница 77: ...d packets transmitted Tx 128 255 Bytes Number of 127 255 byte frames in good and bad packets transmitted Tx 256 511 Bytes Number of 256 511 byte frames in good and bad packets transmitted Tx 512 1023 Bytes Number of 512 1023 byte frames in good and bad packets transmitted Tx 1024 Bytes Number of 1024 max_length byte frames in good and bad packets transmitted Rx CRC Alignment Number of Alignment er...

Страница 78: ...ield in the query for each group to which it belongs It Calculate the number of times of IGMPV1 report V2 Reports When a host receives a group membership query it identifies the groups associated with the query and determines to which groups it belongs The host then sets a timer with a value less than the Max Response Time field in the query for each group to which it belongs It Calculate the numb...

Страница 79: ...rget IP address for ping function and display ping status Parameter description Target IP Address Set up a Target IP address to ping Count Use drop down menu to set number of echo requests to send Four type of number can choose there are 1 5 10 and 20 Default 1 Time Out in secs Use drop down menu to set number of echo requests time out in second Four type numbers can choose there are 1 5 10 and 20...

Страница 80: ...e to reboot the device to have new configuration take effect The function being discussed here is software reset Function name Warm Restart Function description Reboot the switch Reboot takes the same effect as the RESET button on the front panel of the switch Press Yes button to confirm warm restart function and it will take around thirty 30 seconds to complete the system boot 3 3 1 18 8 F Fa ac ...

Страница 81: ...ode button on the front panel You must press the Mode button over 3 seconds to restore the factory default setting 3 3 1 19 9 F Fi ir rm mw wa ar re e U Up pg gr ra ad de e Function name Firmware Upgrade Function description You can just click Browse button to retrieve the file you want in your system to upgrade your switch ...

Страница 82: ... er r Function name Export Import Configuration Function description With this function user can back up or reload the configuration files of Save As Start or Save As User via TFTP Parameter description Import Import a configuration file stored in the flash Export Export the current configuration on switch from Flash ...

Страница 83: ... function Function name Logout Function description The switch allows you to logout the system to prevent other users from the system without the permission If you do not logout and exit the browser the switch will automatically have you logout Besides this manually logout and implicit logout you can set up the parameter of Auto Logout Timer in system configuration function to explicitly ON OFF th...

Страница 84: ...VigorSwitch G1260 User s Guide 78 This page is left blank ...

Страница 85: ... Please verify the network configuration on Computer C 2 2 T Th he e u up pl li in nk k c co on nn ne ec ct ti io on n f fu un nc ct ti io on n f fa ai il ls s t to o w wo or rk k The connection ports on another must be connection ports Please check if connection ports are used on the Switch Please check the uplink setup of the Switch to verify the uplink function is enabled 3 3 T Th he e c co on ...

Отзывы: