background image

86 

 

Federal Communication Commission Interference Statement 

 

This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 

15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a 
residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not 

installed and used in accordance with the instructions, may cause harmful interference to radio communications. 

However, there is no guarantee that interference will not occur in a particular installation. If this equipment does 
cause harmful interference to radio or television reception, which can be determined by turning the equipment 

off and on, the user is encouraged to try to correct the interference by one or more of the following measures: 

 

1. Reorient or relocate the receiving antenna. 

2. Increase the separation between the equipment and receiver. 

3. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. 
4. Consult the dealer or an experienced radio technician for help. 

 

FCC Caution 

This device and its antenna must not be co-located or operating in conjunction with any other antenna or 
transmitter. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two 
conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference 
received, including interference that may cause undesired operation. Any changes or modifications not expressly 
approved by the party responsible for compliance could void the authority to operate equipment. 
 

Federal Communications Commission (FCC) Radiation Exposure Statement 

This equipment complies with FCC radiation exposure set forth for an uncontrolled environment. In order to avoid 
the possibility of exceeding the FCC radio frequency exposure limits, human proximity to the antenna shall not be 
less than 2.5cm (1 inch) during normal operation. 
 

Federal Communications Commission (FCC) RF Exposure Requirements 

This EUT is compliance with SAR for general population/uncontrolled exposure limits in ANSI/IEEE 
C95.1-1999 and had been tested in accordance with the measurement methods and procedures specified in 
OET Bulletin 65 Supplement C. The equipment version marketed in US is restricted to usage of the channels 
1-11 only. This equipment is restricted to 

indoor

 use when operated in the 5.15 to 5.25 GHz frequency range. 

 

R&TTE Compliance Statement 

This equipment complies with all the requirements of DIRECTIVE 2014/30/EU OF THE EUROPEAN PARLIAMENT 
AND THE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal equipment and the 
mutual recognition of their conformity (R&TTE). The R&TTE Directive repeals and replaces in the directive 
98/13/EEC (Telecommunications Terminal Equipment and Satellite Earth Station Equipment) As of April 8, 2000. 
 

Safety 

This equipment is designed with the utmost care for the safety of those who install and use it. However, special 
attention must be paid to the dangers of electric shock and static electricity when working with electrical 
equipment. All guidelines of this and of the computer manufacture must therefore be allowed at all times to 
ensure the safe use of the equipment. 
 

EU Countries Intended for Use 

The ETSI version of this device is intended for home and office use in Austria, Belgium, Bulgaria, Cyprus, Czech, 
Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, 
Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Turkey, and United Kingdom. The ETSI 
version of this device is also authorized for use in EFTA member states: Iceland, Liechtenstein, Norway, and 
Switzerland. 
 

EU Countries Not Intended for Use 

None 

 

 

Содержание ES-5424P

Страница 1: ...ES 5424P Edim User Manual 08 2018 v1 0...

Страница 2: ...III 1 1 Connecting to Power 7 III 1 2 Connecting to Network 8 III 1 3 Power over Ethernet PoE Considerations 9 III 1 4 Starting the Web based Configuration Utility 10 III 1 5 Logging In 11 III 1 6 Log...

Страница 3: ...Configuration 27 IV 2 2 Port Mirror Function 29 IV 2 3 Broadcast Storm Protection 30 IV 2 4 Bandwidth Control 32 IV 3 VLAN Configuration 33 IV 3 1 VLAN Mode 33 IV 3 2 VLAN Group based Entry Config 34...

Страница 4: ...Spanning Tree Protocol STP 65 IV 7 1 1 STP Global Settings 65 IV 7 1 2 STP Port Settings 67 IV 7 1 3 MST Configuration Identification 67 IV 7 1 4 STP Instance Settings 69 IV 7 1 5 MSTP Port Informatio...

Страница 5: ...IV 7 4 5 DHCP Relay Agent 77 IV 7 5 Loop Detect 78 IV 7 6 GVRP 79 IV 7 7 Neighbor MACID 80 IV 8 Monitoring 81 IV 8 1 MIB Counter 81 IV 8 2 Scan MACID Lookup Table 83 IV 8 3 Syslog 84...

Страница 6: ...Arguments for which you supply values are in italic Square brackets mean optional elements Braces group required choices and vertical bars separate the alternative elements Braces and vertical bars w...

Страница 7: ...make sure you have all of the package contents available and a PC with a web browser for using web based system management tools I 1 Overview The Edimax ES 5424P is 24 Port Gigabit PoE Smart Managed S...

Страница 8: ...ch capacity PG28CB 56Gbps Forwarding rate 41 6Mbps Supports IGMP Snooping V1 V2 V3 8K MAC address table and 10K jumbo frames 19 inch rack mountable metal case I 4 Product Components I 4 1 Ports The fo...

Страница 9: ...LED Indicators No Name Description 1 Power Off power off On power on 2 System Off system not ready On system ready Blinking system boot up 3 Port LED LINK ACT bi color LED Off port disconnected or li...

Страница 10: ...eating do not operate it in an area that exceeds an ambient temperature of 122 F 50 C Air Flow Be sure that there is adequate air flow around the switch Mechanical Loading Be sure that the switch is l...

Страница 11: ...switch using the screws provided in the kit and have two holes that are used to then screw the switch into the rack An example of one type of these extension brackets is shown in the following figure...

Страница 12: ...6 2 Secure the switch on the equipment rack with the screws provided Figure 6 Rack Installation...

Страница 13: ...off The device only supports the voltage outlined in the type plate Do not use any other power components except those specifically designated for the switch Disconnect the power cord before installa...

Страница 14: ...using CAT 5E or better cable to connect network devices When connecting network devices do not exceed the maximum cabling distance of 100 meters 328 feet It can take up to one minute for attached devi...

Страница 15: ...pable of supplying DC power to attached PDs such as VoIP phones IP cameras and wireless access points APs PoE switches Additionally PoE switches are capable of detecting and supplying power to pre sta...

Страница 16: ...ccess the device from your browser Launching the Configuration Utility To open the web based configuration utility 1 Open a Web browser 2 Enter the IP address of the device you are configuring in the...

Страница 17: ...ice configuration utility 1 Enter the default user ID admin and the default password admin 2 If this is the first time that you logged on with the default user ID admin and the default password admin...

Страница 18: ...the Administration Guide for additional information III 1 6 Logging Out By default the application logs out after ten minutes of inactivity To manually logout click Logout in the top right corner of...

Страница 19: ...interface is separated into four sections as shown in the following figure Figure 11 User Interface No Name Description 1 Configuration menu Navigate to locate specific switch functions 2 Configuratio...

Страница 20: ...Figure 12 Administrator System Information Item Description MAC Address Base MAC address of the switch Firmware Version Current running firmware image version Uptime Display uptime Device Name System...

Страница 21: ...ministrator Account Password Figure 13 Administrator Account Password Item Description User Name Edit username Password Set password of the account Confirm Password Set the same password of the accoun...

Страница 22: ...u to configure the IPv4 address To display the IPv4 web page click Administrator IP Configuration IPv4 Figure 14 Administrator IP Configuration IPv4 Item Description IPv4 Address Edit IPv4 Address Sub...

Страница 23: ...t to monitor SNMP supported devices hereafter referred to as agent Simple Network Management Protocol SNMP consists of three parts including SNMP MIB Management Information Base and SMI Structure of M...

Страница 24: ...tified IV 1 4 1 SNMP View Table To configure and display the SNMP view table click Administrator SNMP Settings SNMP View Table Figure 16 Administrator SNMP Settings SNMP View Table Item Description Vi...

Страница 25: ...ed group Write View Specify write access for the newly added group Notify View Specify Trap View for the newly added group Security Model Specify the SNMP version for the newly added group Security Le...

Страница 26: ...rotocol MD5 Specify authentication protocol MD5 authentication level is used Priv Protocol DES Specify encryption protocol DES 56 bits encryption is used IV 1 4 4 SNMP Community Table To configure and...

Страница 27: ...the IP address of SNMP Trap Security Model Specify the SNMP version Security Level Specify SNMP security level only support SNMPv3 NoAuthNoPriv No authorization and no encryption for packets sent Auth...

Страница 28: ...Figure 21 Administrator SNMP Settings SNMP Configuration Item Description SNMP State Enable Disable SNMP state SNMP Trap Enable Disable SNMP Trap SNMP Link Change Traps Enable Disable to send trap to...

Страница 29: ...onfigure and display the NTP Settings click Administrator NTP Settings Figure 22 Administrator NTP Settings Item Description System Time Display system time State Enable Disable NTP state Time Zone Sp...

Страница 30: ...Syslog Settings click Administrator Syslog Settings Figure 23 Administrator Syslog Settings Item Description Syslog state Enable Syslog Name Protocol State Enable Disable protocol Facility Select Loca...

Страница 31: ...efault click Administrator Load Factory Default Figure 24 Administrator Load Factory Default Item Description Load Default Reset the Switch to the factory default settings Note Load Factory Default wi...

Страница 32: ...z can be selected through Restore to overwrite the current setting IV 1 8 1 Backups To configure and display the Load Factory Default click Administrator Configuration Backup After clicking Apply Butt...

Страница 33: ...Firmware Update The update is completed when waiting time ended To configure and display the Firmware Update click Administrator Firmware Update Figure 27 Administrator Firmware Update Item Descripti...

Страница 34: ...s Current configuration Status The current link status State Power up down Speed Duplex Select port speed and duplex Auto Negotiation Enable Disable Auto negotiation Flow Control Enable Disable Flow c...

Страница 35: ...gnostics or management To configure and display the Port Mirror Function click Basic Configuration Port Mirror Function Figure 29 Basic Configuration Port Mirror Function Item Description Source Port...

Страница 36: ...re 30 Basic Configuration Broadcast Storm Protection Item Description Type Various storm control types Broadcast broadcast packets Multicast one to many transmissions of packets and the 40 bit of dest...

Страница 37: ...ulticast Enable Disable the control on multicast packets DLF Enable Disable control on unknown destination MAC packets ARP Enable Disable control on ARP packets ICMP Enable Disable control on ICMP pac...

Страница 38: ...link speed To configure and display the Bandwidth Control click Basic Configuration Bandwidth Control Figure 31 Basic Configuration Bandwidth Control Item Description Port Selection Select the settin...

Страница 39: ...e click VLAN Configuration VLAN Mode Figure 32 VLAN Configuration VLAN Mode Item Description VLAN Mode Tag Vlan Specify the VID of each Entry according to the Tag based Entry setting and which port sh...

Страница 40: ...N Group based Entry Config Figure 33 VLAN Configuration VLAN Group based Entry Config Item Description Group Name Specify the Group VLAN name Group Member Port Specify Group VLAN member Add Add Group...

Страница 41: ...y Config click VLAN Configuration VLAN Tag based Entry Config Figure 34 VLAN Configuration VLAN Tag based Entry Config Item Description Add Add Tag VLAN Enter default Tag VLAN name and its VID accordi...

Страница 42: ...When GVRP is enabled specify if this Tag VLAN will be transmitted through GVRP VLAN Member Specify the Tag VLAN member Don t care It is a VLAN member Add It is a VLAN member add tag to the packets tra...

Страница 43: ...or remove VLAN Tag Force VLAN Group Specify if priority is set according to Group VLAN Uplink Configure as uplink port When the destination Port of packets are not in the same VLAN packets will be tra...

Страница 44: ...38 Ingress Check Enable ingress check functions check if Port is VLAN member through VID GVRP Enable Disable Port GVRP functions Ingress Frame Configure the assigned frame to enable forward function...

Страница 45: ...ble check box Select the group to be enabled VID Specify the VID when the packets match with Protocol set up this VID will be used to search for VLAN Member Protocol type Specify Protocol type Protoco...

Страница 46: ...dex is specified in QinQ Index Config webpage Tagging Add Add Service Tag to packets enter exit the Port If the packets entered carries Service Tag then modify or replace Service Tag according to if R...

Страница 47: ...nfigure and display the QinQ Index Config click VLAN Configuration QinQ Index Config Figure 39 VLAN Configuration QinQ Index Config Item Description Type Specify the Type of Service Tag Index Specify...

Страница 48: ...bandwidth less critical traffic is limited and therefore excessive bandwidth can be saved Every physical port on the switch has its own queue to realize the applications of various packets IV 4 1 QoS...

Страница 49: ...Set click QoS Configuration QoS Mode Set Figure 41 QoS Configuration QoS Mode Set Item Description Queue Mode Select the default mode for each Group there are six modes First In First Out SPx1 WRR WFQ...

Страница 50: ...when Queue bandwidth reach its bandwidth setting excessive bandwidth will continue to increase to maximum bandwidth 4 Bwlimit Static Bandwidth Management specify the maximum bandwidth of each Queue th...

Страница 51: ...e Aging Figure 42 QoS Configuration QoS Out Queue Aging Item Description Out Queue Aging Time Specify the Queue Aging Time Fast Aging Time Enable Specify Aging Time conversion units change from 100ms...

Страница 52: ...ay the QoS Remap click QoS Configuration QoS Remap Figure 43 QoS Configuration QoS Remap Item Description Port Selection Select settings Port Mode Mode selections of Tx Rx or Tx Rx Q0 Q7 Select the Qu...

Страница 53: ...ection Select the Ports enabled with specific packets priority by default ACL Enable Disable ACL priority IGMP Enable Disable IGMP priority IP Addr Enable Disable IP Adrr Port MAC IP Entry priority MA...

Страница 54: ...and display the 802 1q Base click QoS Configuration 802 1q Base Figure 45 QoS Configuration 802 1q Base Item Description Earlier Edition Select earlier edition 2005 Edition Select 2005 edition Exchan...

Страница 55: ...iguration DSCP Base Figure 46 QoS Configuration DSCP Base Item Description Priority For DSCP Not Match Select the action when current DSCP value does not match with DSCP List DSCP List Select default...

Страница 56: ...QoS Configuration TCP UDP Base Item Description Protocol Each TCP UDP protocol Priority The Queue corresponding to TCP UDP protocol User defined A User defined TCP UDP Port number User defined B User...

Страница 57: ...CL Profile List Figure 48 ACL Configuration ACL Profile List Item Default Description Used Entries 0 128 Displays the number of entry used by successfully configured rule the maximum is 128 One rule d...

Страница 58: ...52 Figure 49 ACL Configuration ACL Profile List Figure 50 ACL Configuration ACL Profile List ACL Profile Configuration MAC Figure 51 ACL Configuration ACL Profile List ACL Profile Configuration IP...

Страница 59: ...53 Figure 52 ACL Configuration ACL Profile List ACL Profile Configuration IP Extension Figure 53 ACL Configuration ACL Profile List ACL Profile Configuration IPv6...

Страница 60: ...sk then FF FF FF FF FF FF FF FF FF 00 00 00 and FF FF 00 00 00 00 can be selected Source IP Address Enter Source IP Address Source IP Mask Select Source IP Mask then 255 255 255 255 255 255 255 240 25...

Страница 61: ...ocol the configuration range is 00 FF Source IPv6 Address Enter Source IPv6 Address Source IPv6 Mask Select Source IPv6 Mask FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF 0000...

Страница 62: ...irror Enable Enable Mirror function then transmit packets to Destination Port according to the configuration of Basic Configuration Port Mirror Function Sflow Enable Specify to enable the Sflow functi...

Страница 63: ...V 5 2 ACL Ctag Settings To configure and display the ACL Ctag Settings click ACL Configuration ACL Ctag Settings Figure 55 ACL Configuration ACL Ctag Settings Figure 56 ACL Configuration ACL Stag Sett...

Страница 64: ...58 Figure 57 ACL Configuration ACL VLAN Settings Figure 58 ACL Configuration ACL Bandwidth Settings...

Страница 65: ...ecurity protection and filtering through checking the source IP address of packets Configure each port through page to check if source IP address MAC address and source port are compatible then perfor...

Страница 66: ...s All Select all Ports Clear Remove all Ports Status Enable Disable Port MAC IP binding function Max learning entry Specify the maximum groups of dynamic binding of each Port Recover learning entry En...

Страница 67: ...the blank cell on the right IMP Entry Management Select the IMP Entry to be edited in IP Table Monitor then click Edit for edit IP Match the selected IMP Entry IP Address Check port Enable Disable if...

Страница 68: ...at don t match with MAC address table should be configured to be discarded or ports are configured to discard certain MAC address port mirroring and sampling transmitted to CPU port MAC address not in...

Страница 69: ...nit second MAC Address Add default MAC Address binding Port Select the Port binding MAC Address MAC Entry Management After adding the binding MAC Address select MAC address in the Table click Edit to...

Страница 70: ...tch with the setting forward such packets to the Destination Port of Port Mirror Sflow Sampling transmits the matched packets to CPU ports Priority When the Source MAC of packets received by Port matc...

Страница 71: ...he root bridge then find the cost of redundant links The smallest path cost will be the communicating path the corresponding port state will become forwarding others will be the backup paths the corre...

Страница 72: ...such Bridge Port will start sending BPDU and build another spanning tree protocol Bridge Hello Time 1 10 2 The interval of each bridge in the STP sending BPDU when Switch is Root Bridge Bridge Forwar...

Страница 73: ...led Enabled Select STP enabled Port IV 7 1 3 MST Configuration Identification To configure and display the MST Configuration Identification click Advanced Features Spanning Tree Protocol MST Configura...

Страница 74: ...t is the same MSTP region MSTI ID 1 4094 The ID code of MSTI entry to be specified Action Add VID The VID List methods of MSTI to be specified Add VID Add VID List to this MSTI Remove VID Remove VID L...

Страница 75: ...otocol STP Instance Settings Figure 67 Advanced Features Spanning Tree Protocol STP Instance Settings IV 7 1 5 MSTP Port Information To configure and display the MSTP Port Information click Advanced F...

Страница 76: ...red aggregate links containing multiple ports to reach faster network speed using specific traffic management ES 5424P supports trunk group of four 10 100MB and trunk group of two 1G There are four st...

Страница 77: ...runk type and supports LACP and Static Mode Passive Communication mode supports Passive and Active Time Out Short The length of Time Out which include Short and Long Short refers to that packets are s...

Страница 78: ...mic Group will inquire if there is existence of member after specification Router Aging Time 100 seconds Group Member Interval dynamic Group will inquire if there is existence of member after specific...

Страница 79: ...ration Enable users to specify static Group and its member port IGMP Snooping Group Information Displays all the currently existing Groups and their status IV 7 3 4 IGMP Snooping Ports To configure an...

Страница 80: ...Default Description MLD Snooping State Disable Enable Disable MLD Snooping Version IGMPv3 Version selections MLDv1 and MLDv2 can be selected MLD Group Aged Out Disable The dynamically added Group shou...

Страница 81: ...res MLD Snooping MLD Snooping Router Ports Settings Item Description MLD Snooping Static Router Ports Static Router Ports can be specified MLD Snooping Dynamic Router Ports Displays dynamic learning R...

Страница 82: ...Display the all the currently existed Groups and their status IV 7 4 4 MLD Snooping Ports To configure and display the MLD Snooping Ports click Advanced Features MLD Snooping MLD Snooping Ports Figure...

Страница 83: ...e 78 Advanced Features DHCP Relay Agent Item Default Description DHCP relay agent state The switch of DHCP Relay Agent Hops Limit 4 The number of times DHCP packets can be forwarded DHCPv4 Server Sett...

Страница 84: ...nd then block 1 port of 2 ports that cause loop when it is detected thus disable packets from entering Switch through the loop and prevent the connection failure by Switch To configure and display the...

Страница 85: ...ied into LeaveEmpty and LeaveIn LeaveEmpty deregisters an unregistered attribute LeaveIn deregisters a registered attribute LeaveAll messages When the Port enabled GVRP function LeaveAll timer is also...

Страница 86: ...IV 7 7 Neighbor MACID Neighbor MACID searches for neighboring Switch MAC ID of each Port Then sends Neighbor Info packets according to the configured send period Switch will add or update aging time o...

Страница 87: ...received and 14 packets types transmitted To configure and display the MIB Counter click Monitoring MIB Counter Figure 82 Monitoring MIB Counter Item Description Port No Port Number Receive Displays d...

Страница 88: ...Detail Item Description Type Type of packets Receive Display data received by different packet types Transmit Display data transmitted by different packet types Refresh Refresh the data of Ports Clea...

Страница 89: ...of Lookup Table To configure and display the Scan MACID Lookup Table click Monitoring Scan MACID Lookup Table Figure 83 Monitoring Scan MACID Lookup Table Item Description Port Selection Select defaul...

Страница 90: ...84 IV 8 3 Syslog Syslog displays application log for managers To configure and display the Syslog click Monitoring Syslog Figure 84 Monitoring Syslog Item Description Refresh Refresh the log...

Страница 91: ...old or licensed as is Should the programs prove defective following their purchase the buyer and not this company its distributor or its dealer assumes the entire cost of all necessary servicing repai...

Страница 92: ...controlled environment In order to avoid the possibility of exceeding the FCC radio frequency exposure limits human proximity to the antenna shall not be less than 2 5cm 1 inch during normal operation...

Страница 93: ...tlinien 2014 30 EU Espa ol El presente equipo cumple los requisitos esenciales de la Directiva 2014 30 EU Italiano Questo apparecchio conforme ai requisiti essenziali e alle altre disposizioni applica...

Страница 94: ...uirements have been followed Directives 2014 30 EU EMC EN 55032 2015 EN 61000 3 2 2014 Class A EN 61000 3 3 2013 EN 55035 2017 Safety LVD EN 60950 1 2006 A11 2009 A1 2010 A12 2011 A2 2013 Date of Sign...

Страница 95: ...oftware or if you modify it For example if you distribute copies of such a program whether gratis or for a fee you must give the recipients all the rights that you have You must make sure that they to...

Страница 96: ...bution medium does not bring the other work under the scope of this License 3 You may copy and distribute the Program or a work based on it under Section 2 in object code or executable form under the...

Страница 97: ...interfaces the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted...

Отзывы: