background image

 

VigorSwitch P2260 User’s Guide 

57

 

Parameter description: 

Port 1-26:   

Port number. 

PVID:   

This PVID range will be 1-4094. Before you set a number x 
as PVID, you have to create a Tag-based VLAN with VID x. 
For example, if port x receives an untagged packet, the 
switch will apply the PVID (assume as VID y) of port x to 
tag this packet, the packet then will be forwarded as the 
tagged packet with VID y. 

Default Priority   

It bases on 802.1p QoS and affects untagged packets. When 
the packets enter the switch, it would get the priority 
precedence according to your Default Priority setting and 
map to 802.1p priority setting in QoS function. For example, 
while you set Default Priority of port 2 with 2 and transmit 
untagged packets to port 2, these packets will own priority 2 
precedence due to your default 802.1p Priority Mapping 
setting in QoS function and be put into Queue 1. 

Drop Untag: 

Drop untagged frame. You can configure a given port to 
accept all frames (Tagged and Untagged) or just receive 
tagged frame. If the former is the case, then the packets with 
tagged or untagged will be processed. If the later is the case, 
only the packets carrying VLAN tag will be processed, the 
rest packets will be discarded. 

2

2

.

.

8

8

.

.

4

4

 

 

P

P

o

o

r

r

t

t

-

-

b

b

a

a

s

s

e

e

d

d

 

 

G

G

r

r

o

o

u

u

p

p

 

 

Function name: 

Port-based Group Configuration 

Function description: 

It shows the information of the existed Port-based VLAN Groups. You can easily create, 
edit and delete a Port-based VLAN group by pressing 

<Add>

,

 <Edit> 

and 

<Delete>

 

function buttons. User can add a new VLAN group by inputting a new VLAN name. 

Содержание VigorSwitch P2260

Страница 1: ...VigorSwitch P2260 User s Guide Version 1 0 Date 2008 12 08 Cop27 yright 2008 All rights reserved ...

Страница 2: ...ne 1 years from the date of purchase from the dealer Please keep your purchase receipt in a safe place as it serves as proof of date of purchase During the warranty period and upon proof of purchase should the product have indications of failure due to faulty workmanship and or materials we will at our discretion repair or replace the defective products or components without charge for either part...

Страница 3: ...on This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turni...

Страница 4: ...17 1 6 Typical Applications 21 2 Operation of Web based Management 23 2 1 Web Management Home Overview 24 2 1 1 The Information of Page Layout 24 2 1 2 System Information 26 2 1 3 IP Configuration 28 2 1 4 Time Configuration 30 2 1 5 Account Configuration 31 2 1 6 Management Policy 32 2 1 7 Virtual Stack 35 2 2 Port Configuration 37 2 2 1 Port Status 37 2 2 2 Port Configuration 39 2 2 3 Simple Cou...

Страница 5: ...tatus 74 2 12 2 Aggregator View 76 2 12 3 LACP System Priority 78 2 13 802 1X Configuration 78 2 13 1 802 1X State Setting 83 2 13 2 802 1X Mode Setting 84 2 13 3 Port Security Management 85 2 14 Alarm Configuration 87 2 14 1 Events Configuration 87 2 14 2 Email SMS Configuration 89 2 15 Configuration 90 2 15 1 Save Restore 91 2 15 2 Config File 94 2 16 Security 95 2 16 1 Mirror 95 2 16 2 Isolated...

Страница 6: ...er s Guide vi 2 19 2 Loopback Test 110 2 19 3 Ping Test 110 2 20 TFTP Server 111 2 21 Log 112 2 22 Firmware Upgrade 113 2 23 Reboot 114 2 24 Logout 114 3 Trouble Shooting 116 3 1 Resolving No Link Condition 116 3 2 Q A 116 ...

Страница 7: ...rk management is enhanced and the network efficiency is also improved to accommodate high bandwidth applications In addition the switch features comprehensive and useful function such as QoS Quality of Service Spanning Tree VLAN Port Trunking Bandwidth Control Port Security SNMP RMON and IGMP Snooping capability via the intelligent software It is suitable for both metro LAN and office application ...

Страница 8: ...IB In the device SNMP agent is a client software which is operating over SNMP protocol used to receive the command from SNMP manager server site and echo the corresponded data i e MIB object Besides SNMP agent will actively issue TRAP information when happened RMON is the abbreviation of Remote Network Monitoring and is a branch of the SNMP MIB The device supports MIB 2 RFC 1213 Bridge MIB RFC 149...

Страница 9: ...n z Supports port mirror function z Supports the static trunk function z Supports 802 1Q VLAN with 256 entries z Supports user management and limits three users to login z Supports DHCP Broadcasting Suppression to avoid network suspended or crashed z Supports to send the trap event while monitored events happened z Supports default configuration which can be restored to overwrite the current confi...

Страница 10: ...ti io on na al l M Mo od du ul le es s In the switch Port 25 26 includes two types of media TP and SFP Fiber LC BiDi LC this port supports 10 100 1000Mbps TP or 1000Mbps SFP Fiber with auto detected function 1000Mbps SFP Fiber transceiver is used for high speed connection expansion the following are optional SFP types compatible for the switch z 1000Mbps LC MM SFP Fiber transceiver z 1000Mbps LC S...

Страница 11: ...speed mode LINK Green Lit when connection with remote device is good Off when cable connection is not good NORM FDX SPD Amber 1 to 26 Ethernet TP Port LEDSET set on NORM mode Blinks when any traffic is present LEDSET set on FDX full duplex mode Lit when full duplex mode is active Blinks when any collision is present LEDSET set on SPD speed mode Lit when 100Mbps speed is active Off when 10Mbps spee...

Страница 12: ...VigorSwitch P2260 User s Guide 6 U Us se er r I In nt te er rf fa ac ce es s o on n t th he e R Re ea ar r P Pa an ne el l One RS 232 DB 9 interface is offered for configuration or management ...

Страница 13: ...raight through Cable pin outs for RJ 45 jack 1 2 3 6 to 1 2 3 6 in 10 100M TP 1 2 3 4 5 6 7 8 to 1 2 3 4 5 6 7 8 in Gigabit TP and crossed over Cable pin outs for RJ 45 jack 1 2 3 6 to 3 6 1 2 can be used It means you do not have to tell from them just plug it 1 Use Cat 5 grade RJ 45 TP cable to connect to a TP port of the switch and the other end is connected to a network aware device such as a w...

Страница 14: ...the front side of the switch See Fig 2 2 3 Place the Chassis into the 19 inch wiring closet rail and locate it at the proper position Then fix the Chassis by screwing it 1 1 5 5 4 4 C Ca ab bl li in ng g R Re eq qu ui ir re em me en nt ts s To help ensure a successful installation and keep the network performance good please take a care on the cabling requirement Cables with worse specification wi...

Страница 15: ...125µm Single mode transceiver 1310nm 10Km 1000Base LX LH X XD ZX Single mode transceiver 1550nm 30 50 70 110Km TX Transmit 1310nm SFP 0BL 621 2 02 Single Mode 20Km RX Receive 1550nm TX Transmit 1550nm 1000Base LX Single Fiber WDM Module SFP 0BL 621 2 01 Single Mode 20Km RX Receive 1310nm S Sw wi it tc ch h C Ca as sc ca ad di in ng g i in n T To op po ol lo og gy y Takes the Delay Time into Accoun...

Страница 16: ...ity of network loop and will improve network efficiency If more than two switches are connected in the same network select one switch as Level 1 switch and connect all other switches to it at Level 2 Server Host is recommended to connect to the Level 1 switch This is general if no VLAN or other special requirements are applied Case 1 All switch ports are in the same local area network Every port c...

Страница 17: ...assign different names for each VLAN groups at one switch Case 3 Port based VLAN 2 VLAN1 members could not access VLAN2 VLAN3 and VLAN4 members VLAN2 members could not access VLAN1 and VLAN3 members but they could access VLAN4 members VLAN3 members could not access VLAN1 VLAN2 and VLAN4 VLAN4 members could not access VLAN1 and VLAN3 members but they could access VLAN2 members ...

Страница 18: ...VigorSwitch P2260 User s Guide 12 Case 4 The same VLAN members can be at different switches with the same VID ...

Страница 19: ...2 cable with DB 9 connector Next run a terminal emulator with the default setting of the switch s serial port With this you can communicate with the switch In the switch RS 232 interface only supports baud rate 57 6k bps with 8 data bits 1 stop bit no parity check and no flow control RS 232 cable with female DB 9 connector at both ends VigorSwitch P2260 Default IP Setting IP address DHCP Enabled S...

Страница 20: ... either configure your PC IP address or change IP address of the switch next to change the IP address of default gateway and subnet mask For example your network address is 10 1 1 0 and subnet mask is 255 255 255 0 You can change the switch s default IP address 192 168 1 1 to 10 1 1 1 and set the subnet mask to be 255 255 255 0 Then choose your default gateway may be it is 10 1 1 254 Default Value...

Страница 21: ...t They are CLI Web browser and SNMP manager The user interface for the last one is NMS dependent and does not cover here We just introduce the first two types of management interface Managing VigorSwitch P2260 through Ethernet Port Before you communicate with the switch you have to finish the configuration of the IP address or to know the IP address of the switch Then follow the procedures listed ...

Страница 22: ...ch and a PC by a qualified UTP Cat 5 cable with RJ 45 connector Note If PC directly connects to the switch you have to setup the same subnet mask between them But subnet mask may be different for the PC in the remote site 2 Run CLI or web browser and follow the menu Please refer to Chapter 2 ...

Страница 23: ...ddress we used is version 4 known as IPv4 Network identifier Host identifier With the classful addressing it divides IP address into three classes class A class B and class C The rest of IP addresses are for multicast and broadcast The bit length of the network prefix is the same as that of the subnet mask and is denoted as IP address X for example 192 168 1 0 24 Each class has its address range d...

Страница 24: ...s more efficiently and ease to manage IP network For a class B network 128 1 2 3 it may have a subnet mask 255 255 0 0 in default in which the first two bytes is with all 1s This means more than 60 thousands of nodes in flat IP address will be at the same network It s too large to manage practically Now if we divide it into smaller network by extending network prefix from 16 bits to say 24 bits th...

Страница 25: ...is considered a physical network in an autonomous network So it owns a network IP address which may looks like 168 1 2 0 With the subnet mask a bigger network can be cut into small pieces of network If we want to have more than two independent networks in a worknet a partition to the network must be performed In this case subnet mask must be applied For different network applications the subnet ma...

Страница 26: ...5 x is allowable in this case DNS The Domain Name Server translates human readable machine name to IP address Every machine on the Internet has a unique IP address A server generally has a static IP address To connect to a server the client needs to know the IP of the server However user generally uses the name to connect to the server Thus the switch DNS client program such as a browser will ask ...

Страница 27: ...dule supported comprehensive fiber types of connection including LC BiDi LC for SFP For more details on the specification of the switch please refer to Appendix A The switch is suitable for the following applications FTTB FTTO application is used in carrier or ISP Network Connection of FTTB FTTO it is a system wide basic reference connection diagram This diagram demonstrates how the switch connect...

Страница 28: ...VigorSwitch P2260 User s Guide 22 Daisy Chain Fiber Network Connection Uninterrupted Power Supply for IP Phone Application ...

Страница 29: ...s now is completed Just click the link of Forget Password in WebUI or input Ctrl Z in CLI s login screen in case the user forgets the manager s password Then the system will display a serial No for the user Write down this serial No and contact your vendor the vendor will give you a temporary password Use this new password as ID and Password and it will allow the user to login the system with mana...

Страница 30: ...Port RAM Size and Flash Size With this information you will know the software version used MAC address serial number how many ports good and so on This is helpful while malfunctioning In the following figure left section is the whole function tree with web user interface and we will travel it through this chapter 2 2 1 1 1 1 T Th he e I In nf fo or rm ma at ti io on n o of f P Pa ag ge e L La ay y...

Страница 31: ...or egress and ingress respectively On the left top corner there is a pull down list for Auto Logout For the sake of security we provide auto logout function to protect you from illegal user as you are leaving If you do not choose any selection in Auto Logout list it means you turn on the Auto Logout function and the system will be logged out automatically when no action on the device 3 minutes lat...

Страница 32: ...VigorSwitch P2260 User s Guide 26 2 2 1 1 2 2 S Sy ys st te em m I In nf fo or rm ma at ti io on n Function name System Information Function description Show the basic system information ...

Страница 33: ...nute second Current time Show the system time of the switch Its format day of week month day hours minutes seconds year For instance Wed Apr 23 12 10 10 2004 BIOS version The version of the BIOS in this switch Firmware version The firmware version in this switch Hardware Mechanical version The version of Hardware and Mechanical The figure before the hyphen is the version of electronic hardware the...

Страница 34: ...the abbreviation of Dynamic Host Configuration Protocol Here DHCP means a switch to turn ON or OFF the function The switch supports DHCP client used to get an IP address automatically if you set this function Enable When enabled the switch will issue the request to the DHCP server resided in the network to get an IP address If DHCP server is down or does not exist the switch will issue the request...

Страница 35: ...ble to support by the amount of 2 power of the bit number of subnet number 2 bit number of subnet number Subnet mask is used to set the subnet mask value which should be the same value as that of the other devices resided in the same network it attaches For more information please also see the Section 2 1 5 IP Address Assignment in this manual Default 255 255 255 0 Default gateway Set an IP addres...

Страница 36: ...ses the expression form of GMT xx hours Function name Time Function description Set the system time by manual input or set it by syncing from Time servers The function also supports daylight saving for different area s time adjustment Parameter description Current Time Show the current time of the system Manual This is the function to adjust the time manually Filling the valid figures in the field...

Страница 37: ...em time will be decreased one hour after one minute at the time since it passed over The switch supports valid configurable day light saving time is 5 5 step one hour The zero for this parameter means it need not have to adjust current time equivalent to in act daylight saving You don t have to set the starting ending date as well If you set daylight saving to be non zero you have to set the start...

Страница 38: ...eated The default setting for user account is Username admin Password admin The default setting for guest user account is Username guest Password guest 2 2 1 1 6 6 M Ma an na ag ge em me en nt t P Po ol li ic cy y Through the management security configuration the administrator can do the strict setup to control the switch and limit the user to access this switch The following rules are offered for...

Страница 39: ... description The switch offers Management Security Configuration function With this function the manager can easily control the mode that the user connects to the switch According to the mode users can be classified into two types Those who are able to connect to the switch Accept and those who are unable to connect to the switch Deny Some restrictions also can be placed on the mode that the user ...

Страница 40: ...Any and Custom Default is Any You can select the ports that you would like them to be worked and restricted in the management security configuration if Custom had been chosen Access Type The switch supports two kinds of options for managed valid Access Type including Any and Custom Default is Any Http Telnet and SNMP are three ways for the access and managing the switch in case that Custom had bee...

Страница 41: ...r group device will appear on the top of its Web UI By pressing these buttons user will be allowed to connect the Web UI of the devices of the group in the same window without the login of these devices The most top left button is only for Master device The background color of the button you press will be changed to represent that the device is under your management Note It will remove the groupin...

Страница 42: ...M Default is Disable Role The role that the switch would like to play in virtual stack Two types of roles including master and slave are offered for option Default is Master Group ID It is the group identifier GID which signs for VSM Valid letters are A Z a z 0 9 and _ characters The maximal length is 15 characters ...

Страница 43: ...odule ports 25 and 26 is also offered Function name Port Status Function Description Report the latest updated status of all ports in this switch When any one of the ports in the switch changes its parameter displayed in the page it will be automatically refreshed the port current status about every 5 seconds Parameter Description Port No Display the port number The number is 1 26 Both port 25 and...

Страница 44: ...the link result is Down Default Enabled Speed Duplex Mode Display the speed and duplex of all port There are three speeds 10Mbps 100Mbps and 1000Mbps supported for TP media and the duplex supported is half duplex and full duplex If the media is 1Gbps fiber it is 1000Mbps supported only The status of speed duplex mode is determined by 1 the negotiation of both local port and link partner in Auto Sp...

Страница 45: ...fic can be transmitted and received via this port When disabled the port is blocked and no traffic can be transferred through this port Port State is configurable by the user There are only two states Enable and Disable able to choose If you set a port s state Disable then that port is prohibited to pass any traffic even it looks Link up Default Enable Speed Duplex Set the speed and duplex of the ...

Страница 46: ... t send PAUSE frame This is one way flow control Default Symmetric 2 2 2 2 3 3 S Si im mp pl le e C Co ou un nt te er r The function of Simple Counter collects any information and provides the counting about the traffic of the port no matter the packet is good or bad In the following figure the window can show all ports counter information at the same time Each data field has 20 digit long If the ...

Страница 47: ...d or bad In the following figure the window can show only one port counter information at the same time To see another port s counter you have to pull down the list of Select then you will see the figures displayed about the port you had chosen Each data field has 20 digit long If the counting is overflow the counter will be reset and restart counting The data is updated every time interval define...

Страница 48: ...ted that experienced exactly one collision Tx Multiple Collision Number of frames transmitted that experienced more than one collision Tx Drop Packets Number of frames dropped due to excessive collision late collision or frame aging Tx Deferred Transmit Number of frames delayed to transmission due to the medium is busy Tx Late Collision Number of times that a collision is detected later than 512 b...

Страница 49: ... number of the transmitted multicast packet Tx Pause Packets Show the counting number of the transmitted pause packet Rx FCS Errors Number of bad FSC packets received Rx Alignment Errors Number of Alignment errors packets received Rx Fragments Number of short frames 64 bytes with invalid CRC Rx Jabbers Number of long frames according tomax_length register with invalid CRC Rx Drop Packets Frames dr...

Страница 50: ... Off The switch will stop supplying the power to the port due to the power required by the PD that is linked to the port on the switch excesses the Class setting of the PD Short Circuit Port Off The switch will stop supplying the power to the port if it detects that the PD linked to the port is short circuit Over Temp Protection The port of the switch will be disabled due to fast transient rise in...

Страница 51: ...in the condition of supplying the power State Enable means the manager allows the power supplied to the PD is legal while the port linked to the PD Disable means the port does not own PoE function Priority Three options are offered for the user to choose including Normal Low and High Default is Normal The switch will stop supplying the power to the port based on the order of the priority LowÆNorma...

Страница 52: ...re is no loop happened for this port Locked means there is loop happened in this port and that port is blocked Resume Action You can use resume action to unlock the locked port when you make sure the looping issue has been resolved You also can remove the locked port cable then reconnect the cable to resume the locked port Action Start loop detection 2 2 5 5 S SN NM MP P C Co on nf fi ig gu ur ra ...

Страница 53: ...So both parties must have the same community name Once completing the setting click Apply button the setting takes effect Parameters description SNMP The term SNMP here is used for the activation or de activation of SNMP Default is Enable Get Set Trap Community Community name is used as password for authenticating if the requesting network management unit belongs to the same community group If the...

Страница 54: ...P address to host the trap message In other words the trap host is a network management unit with SNMP manager receiving the trap message from the managed switch with SNMP agent issuing the trap message 6 trap hosts can prevent the important trap message from losing For each public trap the switch supports the trap event Cold Start Warm Start Link Down Link Up and Authentication Failure Trap They ...

Страница 55: ...2 7 7 I IG GM MP P S Sn no oo op pi in ng g The function IGMP Snooping is used to establish the multicast groups to forward the multicast packet to the member ports and in nature avoids wasting the bandwidth while IP multicast packets are running over the network This is because a switch that does not support IGMP or IGMP Snooping can not tell the multicast packet from the broadcast packet so it c...

Страница 56: ...P Snooping function Default Disable Active In Active mode IGMP snooping switch will periodically issue the Membership Query message to all hosts attached to it and gather the Membership report message to update the database of the Multicast table By the way this also reduces the unnecessary multicast traffic Passive In Passive Snooping mode the IGMP snooping will not periodically poll the hosts in...

Страница 57: ... assigned effective IP range The valid range is 224 0 0 0 239 255 255 255 VID The switch supports two kinds of options for managed valid VLAN VID including Any and Custom Default is Any When you choose Custom you can fill in VID number The valid VID range is 1 4094 Port The switch supports two kinds of options for managed valid port range including Any and Custom Default is Any You can select the ...

Страница 58: ...e registered on this device VID Set VLAN ID for each multicast group Member Port Set member ports that join each multicast group Member port may be only or more than one Add Create a new Static IP Multicast group entry Edit Modify a Static IP Multicast group entry Delete Remove a static IP Multicast group entry 2 2 8 8 V VL LA AN N The switch supports Tag based VLAN 802 1q and Port based VLAN Supp...

Страница 59: ...ical port you connect to For example for a port based VLAN named PVLAN 1 contains port members Port 1 2 3 4 If you are on the port 1 you can communicate with port 2 3 4 If you are on the port 5 then you cannot talk to them Each port based VLAN you built up must be assigned a group name This switch can support up to maximal 8 port based VLAN groups Tag based Tag based VLAN identifies its member by ...

Страница 60: ... the same filtering database storing the membership information of the VLAN to learn or look up the membership information of the VLAN While SVL is disable it means learning mode is IVL In this mode different VLAN uses different filtering database storing the membership information of the VLAN to learn or look up the information of a VLAN member Double Tag Double tag mode belongs to the tag based ...

Страница 61: ...can add a new VLAN group by inputting a new VLAN name and VLAN ID Parameter description VLAN Name The name defined by administrator is associated with a VLAN group Valid letters are A Z a z 0 9 and _ characters The maximal length is 15 characters VID VLAN identifier Each tag based VLAN group has a unique VID It appears only in tag based and Double tag mode Add Input the VLAN name VID and then choo...

Страница 62: ...tton then you can modify a group s description 2 2 8 8 3 3 P PV VI ID D Function name PVID Function description In PVID Setting user can input VID number to each port The range of VID number is from 1 to 4094 User also can choose ingress filtering rule Rule 2 to each port The Ingress Filtering Rule 2 is drop untagged frame While Rule 2 is enabled the port will discard all Untagged frames ...

Страница 63: ... 2 with 2 and transmit untagged packets to port 2 these packets will own priority 2 precedence due to your default 802 1p Priority Mapping setting in QoS function and be put into Queue 1 Drop Untag Drop untagged frame You can configure a given port to accept all frames Tagged and Untagged or just receive tagged frame If the former is the case then the packets with tagged or untagged will be proces...

Страница 64: ...ased VLAN Input the VLAN name and choose the member by ticking the check box beside the port No then press the Apply button to have the setting taken effect Member This is used to enable or disable if a port is a member of the new added VLAN Enable means it is a member of the VLAN Just tick the check box beside the port x to enable it Delete Just press the Delete button to remove the selected grou...

Страница 65: ...tion description To create a secure VLAN for the switch management interface all of the management traffic will be sent via an isolated VLAN This is a security function It can protect switch management interface it also can avoid the switch CPU DoS by network attacking Parameter description State Enable This function is based on tag based VLAN mode When this function is enabled only the tagged pac...

Страница 66: ...ti io on n Function name MAC Table Information Function Description Display the static or dynamic learning MAC entry and the state for the selected port Parameter description Port Select the port you would like to inquire Search Set up the MAC entry you would like to inquire The default is MAC Display the MAC address of one entry you selected from the searched MAC entries table Alias Set up the Al...

Страница 67: ...nds and the setup of this time will have no effect on static MAC addresses In addition the learning limit of MAC maintenance is able to limit the amount of MAC that each port can learn Parameter description Aging Time Delete a MAC address idling for a period of time from the MAC Table which will not affect static MAC address Range of MAC Address Aging Time is 10 65535 seconds The default Aging Tim...

Страница 68: ...packets As static with source drop is chosen the packet will be dropped if its SA is equal to the value you set up Due to this setting belongs to the global one so it may affect all ports transmission of the packets Parameter description MAC It is a six byte long Ethernet hardware address and usually expressed by hex and separated by hyphens For example 00 40 C7 D6 00 01 VID VLAN identifier This w...

Страница 69: ... MAC Alias Delete You can click Create Edit button to add modify a new or an existed alias name for a specified MAC address or mark an existed entry to delete it Alias name must be composed of A Z a z and 0 9 only and has a maximal length of 15 characters In the MAC Alias function MAC Alias Add Edit function is used to let you add or modify an association between MAC address and a plain English na...

Страница 70: ...tion and GIP GVRP state machine maintain the contents of Dynamic VLAN Registration Entries for each VLAN and propagate these information to other GVRP aware devices to setup and update their knowledge database the set of VLANs associated with currently active members and through which ports these members can be reached In GVRP Configuration function folder there are three functions supported inclu...

Страница 71: ...ages and reacts for the received GVRP BPDU Default Registrar Mode The mode here means the type of Registrar There are three types of parameters for registrar administrative control value normal registrar fixed registrar and forbidden registrar provided for the user s choice Normal It is Normal Registration The Registrar responds normally to incoming GARP messages The default setting is Normal Fixe...

Страница 72: ...s received by the GARP application LeaveAll Message Packets Number of GARP BPDU with Leave All message is received by the GARP application JoinEmpty Message Packets Number of GARP BPDU with Join Empty message is received by the GARP application JoinIn Message Packets Number of GARP BPDU with Join In message is received by the GARP application LeaveEmpty Message Packets Number of GARP BPDU with Lea...

Страница 73: ... the GARP application LeaveEmpty Message Packets Number of GARP BPDU with Leave Empty message is transmitted by the GARP application Empty Message Packets Number of GARP BPDU with Empty message is transmitted by the GARP application 2 2 1 10 0 3 3 G GV VR RP P G Gr ro ou up p I In nf fo or rm ma at ti io on n Function name GVRP Group Information Function description Show the dynamic group member a...

Страница 74: ... web management and then set up other advanced items We recommend that you enable STP on all switches to ensure a single active path on the network 2 2 1 11 1 1 1 S ST TP P S St ta at tu us s Function name STP Status Function description In the Spanning Tree Status user can read 12 parameters to know STP current status The 12 parameters description is listed in the following table Parameter descri...

Страница 75: ...n bridge Hello Time Show the current hello time of the root bridge Hello time is a time interval specified by root bridge used to request all other bridges periodically sending hello message every hello time seconds to the bridge attached to its designated port STP Topology Change Count STP Topology Change Count expresses the time spent in unit of seconds since the beginning of the Spanning Tree T...

Страница 76: ...idges It decides how long a bridge should send this message to other bridge to tell I am alive When the GEL2 SW8 is the root bridge of the LAN for example all other bridges will use the hello time assigned by this switch to communicate with each other The valid value is 1 10 in unit of second Default is 2 seconds Max Age When the GEL2 SW8 is the root bridge the whole LAN will apply this figure set...

Страница 77: ... One is RSTP and the other is STP If STP is chosen RSTP will run as a legacy STP The switch supports RSTP 802 1w which is backward compatible with STP 802 1d 2 2 1 11 1 3 3 S ST TP P P Po or rt t C Co on nf fi ig gu ur ra at ti io on n Function name STP Port Setting Function description In the STP Port Setting one item selection and five parameters settings are offered for user s setup User can di...

Страница 78: ...dingly and display this value in the field of Path Cost Status Otherwise it may show the value that the administrator set up in Configured Path Cost and Path Cost Status 802 1w RSTP recommended value Valid range 1 200 000 000 10 Mbps 2 000 000 100 Mbps 200 000 1 Gbps 20 000 Default 0 Priority Priority here means Port Priority Port Priority and Port Number are mixed to form the Port ID Port IDs are...

Страница 79: ...ct as an RSTP port Click M Check button to send a RSTP BPDU from the port you specified 2 2 1 12 2 T Tr ru un nk ki in ng g C Co on nf fi ig gu ur ra at ti io on n The Port Trunking Configuration is used to configure the settings of Link Aggregation You can bundle more than one port with the same speed full duplex and the same MAC to be a single logical port thus the logical port aggregates the ba...

Страница 80: ...8 trunk groups for LACP and additional 8 trunk groups for Static Trunk But in the system capability view only 8 real trunked groups are supported An LACP trunk group with more than one ready member pors is a real trunked group An LACP trunk group with only one or less than one ready member port is not a real trunked group Any Static trunk group is a real trunked group Per Trunking Group supports a...

Страница 81: ...CP Activer An Active LACP port begins to send LACPDU to its link partner right after LACP protocol entity started to take control of this port Passive A Passive LACP port will not actively send LACPDU out before it receives an LACPDU from its link partner Aggtr Aggtr is an abbreviation of aggregator Every port is also an aggregator and its own aggregator ID is the same as its own Port No We can re...

Страница 82: ... aggregator point of view Parameter description Aggregator It shows the aggregator ID from 1 to 8 of every port In fact every port is also an aggregator and its own aggregator ID is the same as its own Port No Method Show the method a port uses to aggregate with other ports Member Ports Show all member ports of an aggregator port Ready Ports Show only the ready member ports within an aggregator po...

Страница 83: ...h you are watching on Partner The peer system from this aggregator s view System Priority Show the System Priority part of a system ID MAC Address Show the MAC Address part of a system ID Port Show the port number part of an LACP port ID Key Show the key value of the aggregator The key value is determined by the LACP protocol entity and can t be set through management Trunk Status Show the trunk s...

Страница 84: ...ose Default DA and SA 2 2 1 13 3 8 80 02 2 1 1X X C Co on nf fi ig gu ur ra at ti io on n 802 1X port based network access control provides a method to restrict users to access network resources via authenticating user s information This restricts users from gaining access to the network resources through a 802 1X enabled port without authentication If a user wishes to touch the network through a ...

Страница 85: ...authenticator PAE is authorized and otherwise an uncontrolled port will unconditionally pass the packets with PAE group MAC address which has the value of 01 80 c2 00 00 03 and will not be forwarded by MAC bridge at any time Authentication server A device provides authentication service through EAP to an authenticator by using authentication credentials supplied by the supplicant to determine if t...

Страница 86: ...services on device B and C first it must exchange the authentication message with the authenticator on the port it connected via EAPOL packet The authenticator transfers the supplicant s credentials to Authentication server for verification If success the authentication server will notice the authenticator the grant PC A then is allowed to access B and C via the switch If there are two switches di...

Страница 87: ... to the authenticator The authenticator will embed the user ID into Radius Access Request command and send it to the authentication server for confirming its identity 6 After receiving the Radius Access Request the authentication server sends Radius Access Challenge to the supplicant for asking for inputting user password via the authenticator PAE 7 The supplicant will convert user password into t...

Страница 88: ...de for the devices connected to this port once a supplicant is authorized the devices connected to this port can access the network resource through this port 802 1X Port based Network Access Control function supported by the switch is little bit complex for it just support basic Multihost mode which can distinguish the device s MAC address and its VID The following table is the summary of the com...

Страница 89: ...ADIUS server for the authentication service The valid value ranges 1 65535 Default port number is 1812 Secret Key The secret key between authentication server and authenticator It is a string with the length 1 31 characters The character string may contain upper case lower case and 0 9 It is character sense It is not allowed for putting a blank between any two characters Default Radius Accounting ...

Страница 90: ...he 802 1X operation mode 802 1X Mode 802 1X operation mode There are three options including Disable Normal and Advanced 802 1x mode Default is Disable Disable It will have the chosen port acting as a plain port that is no 802 1X port access control works on the port Normal In this mode for the devices connected to this port once a supplicant is authorized the devices connected to this port can ac...

Страница 91: ...isable mode for a port in the function 802 1X Port Mode Configuration the port is in the uncontrolled port state and does not apply 802 1X authenticator on it Any node attached on this port can access the network without the admittance of 802 1X authenticator The Port Status will show the following screen Port Status The current 802 1X status of the port In Disable mode this field is disabled P Pa...

Страница 92: ...lled port is forced to hold in the unauthorized state ForceAuthorized The controlled port is forced to hold in the authorized state Auto The controlled port is set to be in authorized state or unauthorized state depends on the result of the authentication exchange between the authentication server and the supplicant Default Auto reAuthMax 1 10 The number of authentication attempt that is permitted...

Страница 93: ...Timeout 1 65535 s A timeout condition in the exchange between the authenticator and the authentication server The valid range 1 65535 Default 30 seconds 2 2 1 14 4 A Al la ar rm m C Co on nf fi ig gu ur ra at ti io on n 2 2 1 14 4 1 1 E Ev ve en nt ts s C Co on nf fi ig gu ur ra at ti io on n Function name Events Configuration Function description The Trap Events Configuration function is used to ...

Страница 94: ...P Disabled LACP Enabled LACP Member Added LACP Port Failure GVRP GVRP Disabled GVRP Enabled VLAN VLAN Disabled Port based VLAN Enabled Tag based VLAN Enabled Metro mode Vlan Enabled Double tag Vlan Enabled Module Swap Module Inserted Module Removed Dual Media Swapped This page only provides fixed event table for user to select and asks device sending the trap when the event happens ...

Страница 95: ...6 mobile phone numbers at most The 24 different trap events will be sent out to SNMP Manager when trap event occurs After ticking trap events you can fill in your desired email addresses and mobile phone numbers Then please click Apply button to complete the alarm configuration It will take effect in a few seconds Note SMS may not work in your mobile phone system It is customized for different sys...

Страница 96: ...e switch One is the function of Restore Default Configuration included default IP address the IP address will restore to default 192 168 1 1 as you use it The other is the function of Restore Default Configuration without changing current IP address the IP address will keep the same one that you had saved before by performing this function W Wo or rk ki in ng g C Co on nf fi ig gu ur ra at ti io o...

Страница 97: ... on n Function name Save As Start Configuration Function description Save the current configuration as a start configuration file in flash memory S Sa av ve e A As s U Us se er r C Co on nf fi ig gu ur ra at ti io on n Function name Save As User Configuration Function description Save the current configuration as a user configuration file in flash memory ...

Страница 98: ...tart configuration And the IP address of the switch will also be restored to 192 168 1 1 R Re es st to or re e D De ef fa au ul lt t C Co on nf fi ig gu ur ra at ti io on n e ex xc cl lu ud de es s c cu ur rr re en nt t I IP P a ad dd dr re es ss s Function name Restore Default Configuration excludes current IP address Function description Restore Default Configuration function can retrieve the ex...

Страница 99: ...nfiguration Function description Restore User Configuration function can retrieve the previous confirmed working configuration stored in the flash memory to update start configuration When completing to restore the configuration the system s start configuration is updated and will be changed its system settings after rebooting the system ...

Страница 100: ...ig files of Save As Start or Save As User via TFTP Parameter description Export File Path Export Start Export Save As Start s config file stored in the flash Export User Conf Export Save As User s config file stored in the flash Import File Path Import Start Import Save As Start s config file stored in the flash Import User Conf Import Save As User s config file stored in the flash ...

Страница 101: ...tion or de activation of Port Mirror function Default is Disable Monitoring Port Set up the port for monitoring Valid port is Port 1 26 and default is Port 1 Monitored Ingress Port Set up the port for being monitored It only monitor the packets received by the port you set up Just tick the check box beside the port x and valid port is Port 1 26 Monitored Egress Port Set up the port for being monit...

Страница 102: ...or the activation or de activation of Isolated Group function Default is Disable Isolated Group User can choose any port to be the member of this group Just tick the check box beside the port x and valid port is Port 1 26 In this group all of these member ports cannot forward packets with each other Thus the switch will not be capable of forwarding any packets in case its all ports become the memb...

Страница 103: ...field Pause frames are also generated if flow control is enabled The format of the packet limits to unicast broadcast and multicast Valid value of Port 1 24 ranges from 66 102400 and Port 25 26 ranges from 66 1024000 with the minimum unit of 1 Default value of Port 1 24 is 102400 and Port 25 26 is 1024000 2 2 1 17 7 2 2 E Eg gr re es ss s Function name Ingress Bandwidth Control Egress Bandwidth Co...

Страница 104: ... up in Data Rate field Traffic may be lost if egress buffers run full The format of the packet limits to unicast broadcast and multicast Valid value of Port 1 24 ranges from 66 102400 and Port 25 26 ranges from 66 1024000 with the minimum unit of 1 Default value of Port 1 24 is 102400 and Port 25 26 is 1024000 2 2 1 17 7 3 3 S St to or rm m Function name Bandwidth Storm Control Function descriptio...

Страница 105: ...th for storm type you choose Valid value of the storm rate ranges from 1 100 with the minimum unit of 1 And only integer is acceptable Default is 100 2 2 1 18 8 Q Qo oS S Q Qu ua al li it ty y o of f S Se er rv vi ic ce e C Co on nf fi ig gu ur ra at ti io on n The switch supports 5 kinds of QoS are as follows MAC Priority 802 1p Priority IP TOS Priority and DiffServ DSCP Priority Port Based Prior...

Страница 106: ...s designed up to 4 queues Each QoS is influenced by two scheduling WRR Weighted Round Robin and Strict Priority as well When you finish setting the priority mapping to the queue WRR scheduling will distribute the bandwidth according to the weight you set for 4 queues queue 0 to queue 3 Another scheduling is Strict Priority dedicated for the function named VIP Port of QoS While we select some ports...

Страница 107: ...Strict Priority Next you can arrange Weight values for queue 0 to queue 3 Parameter description QoS Mode You can Enable QoS Mode and let QoS function become effective Default is Disable Priority Control Just tick the check box of 802 1P TOS or DSCP Qos and click Apply button to be in operation Scheduling Method There are two Scheduling Method WRR and Strict Priority Default is WRR After you choose...

Страница 108: ...aneously transmit packets from port 2 and port 3 to port 1 at speed of 100MB and let congestion happen The packets for port 3 will be dropped because the packets from port 2 owns highest precedence For the sake of this function taking effect you must choose Scheduling Method of Strict Priority ahead Parameter description VIP Group Just tick the check box to select any port port 1 26 as the VIP Por...

Страница 109: ...queues of the switch queue 0 3 and possess different bandwidth distribution according to your weight setting Parameter description Queue Each Priority can select any of Queue 0 Queue 3 In Default Priority 0 is mapping to Queue 0 Priority 1 is mapping to Queue 0 Priority 2 is mapping to Queue 1 Priority 3 is mapping to Queue 1 Priority 4 is mapping to Queue 2 Priority 5 is mapping to Queue 2 Priori...

Страница 110: ...it M Type Monetary Cost Priority 1bit and UNUSED PRECEDENCE 3 bits can arrange 8 kinds of priorities corresponding to the 0 7 priority in the following priority diagram TOS Delay Priority Mapping works while D TYPE in TOS field of IP header of the packets received by the switch is configured Parameter description Queue Each Priority can select any of Queue 0 Queue 3 In Default Priority 0 is mappin...

Страница 111: ...it M Type Monetary Cost Priority 1bit and UNUSED PRECEDENCE 3 bits can arrange 8 kinds of priorities corresponding to the 0 7 priority in the following priority diagram TOS Throughput Priority Mapping works while T TYPE in TOS field of IP header of the packets received by the switch is configured Parameter description Queue Each Priority can select any of Queue 0 Queue 3 In Default Priority 0 is m...

Страница 112: ...it M Type Monetary Cost Priority 1bit and UNUSED PRECEDENCE 3 bits can arrange 8 kinds of priorities corresponding to the 0 7 priority in the following priority diagram TOS Reliability Priority Mapping works while R TYPE in TOS field of IP header of the packets received by the switch is configured Parameter description Queue Each Priority can select any of Queue 0 Queue 3 In Default Priority 0 is ...

Страница 113: ...it M Type Monetary Cost Priority 1bit and UNUSED PRECEDENCE 3 bits can arrange 8 kinds of priorities corresponding to the 0 7 priority in the following priority diagram TOS Monetary Cost Priority Mapping works while M TYPE in TOS field of IP header of the packets received by the switch is configured Parameter description Queue Each Priority can select any of Queue 0 Queue 3 In Default Priority 0 i...

Страница 114: ...s sometimes abbreviated DSCP and the last two bits are left unused DSCP can form total 64 0 63 kinds of Traffic Class based on the arrangement of 6 bit field in DSCP of the IP packet In the switch user is allowed to set up these 64 kinds of Class that belong to any of queue 0 3 Parameter description Queue 64 kinds of priority traffic as mentioned above user can set up any of Queue 0 3 In default P...

Страница 115: ...in this function folder for device self diagnostics 2 2 1 19 9 1 1 D Di ia ag gn no os st ti ic cs s Function name Diagnostics Function description Diagnostics function provides a set of basic system diagnosis It let users know that whether the system is health or needs to be fixed The basic system check includes EEPROM test UART test DRAM test and Flash test ...

Страница 116: ...ill report the port numbers failed If they all are ok it just shows OK Note Whatever you choose Internal Loopback Test or External Loopback Test these two functions will interfere with the normal system working and all packets in sending and receiving also will stop temporarily 2 2 1 19 9 3 3 P Pi in ng g T Te es st t Function name Ping Test Function description Ping Test function is a tool for de...

Страница 117: ...way IP address of the default gateway 2 2 2 20 0 T TF FT TP P S Se er rv ve er r Function name TFTP Server Function description Set up IP address of TFTP server Parameter description Specify the IP address where the TFTP server locates Fill in the IP address of your TFTP server then press Apply button to have the setting taken effect ...

Страница 118: ... Data Function description The Trap Log Data is displaying the log items including all SNMP Private Trap events SNMP Public traps and user logs occurred in the system In the report table No Time and Events are three fields contained in each trap record Parameter description No Display the order number that the trap happened Time Display the time that the trap happened Events Display the trap event...

Страница 119: ...eld the IP address of your TFTP server should be filled in 2 Specifying what the filename and where the file is You must specify full path and filename Then press Upgrade button if your download is not successful the switch will also be back to Software Upgrade and it will not upgrade the software as well When download is completed the switch starts upgrading software A reboot message will be prom...

Страница 120: ...he switch It will take around thirty 30 seconds to complete the system boot Parameter description Save and Reboot Save the current settings as start configuration before rebooting the switch Reboot Reboot the system directly 2 2 2 24 4 L Lo og go ou ut t You can manually logout by performing Logout function In the switch it provides another way to logout You can configure it to logout automaticall...

Страница 121: ...P2260 User s Guide 115 Parameter description Auto Logout Default is ON If it is ON and no action and no key is stroke as well in any function screen more than 3 minutes the switch will have you logout automatically ...

Страница 122: ...a an n c co on nn ne ec ct t t to o C Co om mp pu ut te er r B B b bu ut t c ca an nn no ot t c co on nn ne ec ct t t to o C Co om mp pu ut te er r C C t th hr ro ou ug gh h t th he e M Ma an na ag ge ed d S Sw wi it tc ch h The network device of Computer C may fail to work Please check the link act status of Computer C on the LED indicator Try another network device on this connection The network...

Страница 123: ...g gu ur re e t th he e M Ma an na ag ge ed d S Sw wi it tc ch h The Hyperterm is the terminal program in Win95 98 NT Users can also use any other terminal programs in Linux Unix to configure the Managed Switch Please refer to the user guide of that terminal program But the COM port parameters baud rate data bits parity bits flow control must be the same as the setting of the console port of the Ma...

Отзывы: