background image

User Manual

Business Solutions

User Manual

Business Solutions

Wireless Management Switch

Neutron Series

EWS5912FP  

 EWS7928P  

EWS7952FP 

 

 

 

version 1.0.1

Содержание EWS5912FP

Страница 1: ...User Manual Business Solutions User Manual Business Solutions Wireless Management Switch Neutron Series EWS5912FP EWS7928P EWS7952FP version 1 0 1 ...

Страница 2: ...2 IMPORTANT To install your Switch please refer to the Quick Installation Guide included in the product packaging ...

Страница 3: ...ty WEP 34 WPA2 WPA2 Enterprise 35 WPA PSK WPA2 PSK 35 Advanced Settings 36 Guest Network 37 Security 37 Manual IP Settings Auto DHCP Server Settings 37 Active Clients 39 Access Point Clusters 41 General Global Settings 42 Member Settings Autoconfiguration 43 RadioSettings 2 4GHz 5GHz 43 Autoconfiguration 43 Wireless Radio Settings 2 4 GHz 5 GHz 44 Advanced Settings 46 Visual Monitoring 48 Topology...

Страница 4: ... 88 Global Settings 88 Spanning Tree Loops 89 Root Bridge 91 Port Settings 93 EdgePorts 94 CIST Instance Settings 95 CIST Port Settings 97 MST Instance Settings 99 MST Port Settings 102 MAC Address Table 104 Static MAC Address 104 DynamicMACAddress 105 LLDP 106 Global Settings 107 Local Device 108 Remote Device 109 IGMPSnooping 111 Global Settings 112 VLAN Settings 113 Querier Settings 114 Group L...

Страница 5: ...inding 154 QoS 155 Global Settings 155 CoS Mapping 157 DSCP Mapping 158 Port Settings 159 Bandwidth Control 160 Storm Control 161 Security 162 802 1X 162 Global Settings 163 Port Settings 164 Authenticated Host 166 Radius Server 167 Access 169 HTTP S Settings 169 TelnetSettings 170 SSH Settings 171 Console Settings 172 Port Security 173 DoS 174 Global Settings 174 Port Settings 176 Monitoring 177 ...

Страница 6: ...Pv6 Ping Test 192 Trace Route 193 Chapter 4 Maintenance 194 Maintenance 195 Upgrading Resetting 196 Rebooting Logging Out 197 Appendix 198 Quick Reference Guide 199 Professional Installation Instruction English French 200 FCC Interference Statement 202 IC Interference Statement 203 CE Interference Statement 205 ...

Страница 7: ...7 Chapter 1 Product Overview ...

Страница 8: ...ed and used in accordance with the instructions may cause harmful interference to radio communications Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his her own expense The EnGenius Neutron Series of EWS PoE Switches ControllersaredevicesspeciallydesignedtosupportAccess Points and IP ...

Страница 9: ...output up to 30 Watts per Port Ports 1 48 output up to 30 Watts per Port Total PoE Budget 130 W 185 W 740 W SFP Slots 2 4 4 Switching Capacity 24 Gbps 56 Gbps 104 Gbps Forwarding Mode Store and Forward Flash Memory 32 MB 32 MB 32 MB SD RAM 256 MB 256 MB 256 MB MAC Address Table 8K Jumbo Frame 9K Technical Specifications ...

Страница 10: ...ge Operating 32 to 122 F 0 to 50 C Storage 40 to 158 F 40 to 70 C Humidity non condensing 5 95 L2 Features 802 3ad compatible Link Aggregation 802 1D Spanning Tree STP 802 1w Rapid Spanning Tree RSTP 802 1s Multiple Spanning Tree MSTP IGMP Snooping v1 v2 v3 MLD Snooping IGMP Fast Leave Port Trunking Port Mirroring One to one and many to one VLAN Group Voice VLAN Queue CoS based on 802 1p priority ...

Страница 11: ...AP Cluster Management Wireless Configuration Remote AP Rebooting AP Device Name Editing AP Radio Settings Band Steering Traffic Shaping AP Client Limiting Fast Handover Fast Roaming Guest Network Wireless Security WEP WPA WPA2 Enterprise WPA PSK WPA2 PSK VLANs for Access Point Multiple SSID Wireless Network Monitoring AP Status Monitoring Wireless Client Monitoring Wireless Traffic and Usage Stati...

Страница 12: ...EWS5912FP Width 13 Length 9 Height 1 73 Dimensions and EWS7928P Width 9 45 Length 10 20 Height 1 73 EWS5912FP Front EWS5912FP Back EWS7928P Front EWS7928P Back 2 2 1 1 4 4 5 5 8 8 12 13 13 16 16 7 7 6 6 3 3 9 9 10 10 11 11 14 14 15 15 ...

Страница 13: ...een Light A valid 1000 Mbps link is established on the port 16 Power Connector 1 RJ45 Console Port 2 Power LED Light off Power off Solid Light Power On 3 Fault LED Light off Normal Behavior Solid Light Error 4 PoE Max LED Light off Additional PoE device may still be added Solid Light The PoE device s output power has exceeded total PoE limit No additional devices can be powered on via PoE 5 LAN Mo...

Страница 14: ... Band Wireless N900 Managed Indoor Access Point EnGenius EWS360AP Dual Band Wireless AC1750 Managed Indoor Access Point EnGenius EWS610AP Dual Band Wireless N600 Managed Outdoor Access Point EnGenius EWS620AP Dual Band Wireless N900 Managed Outdoor Access Point EnGenius EWS660AP Dual Band Wireless AC1750 Managed Outdoor Access Point Future firmware releases will support additional models ...

Страница 15: ...15 Management Interface The Neutron Series EWS Layer 2 PoE Switch features an embedded Web interface for the monitoring and management of your device ...

Страница 16: ...OnorEnabled OpenNetworkConnectionsandthen click Local Area Connecton Select Internet Protocol Version 4 TCP IPv4 If your computer is already on a network ensurethatyouhavesetittoaStaticIPAddress ontheInterface Example 192 168 0 10andtheSubnet mask address as 255 255 255 0 5 Open a web browser on your computer In the address bar of the web browser enter 192 168 0 239 and click Enter 6 A login scree...

Страница 17: ...er is on ensure that your TCP IP is set to On or Enabled Open Network Connections and then click Local Area Connecton Select Internet Protocol Version 4 TCP IPv4 5 If your computer is already on a network ensure that you have set it to a Static IP Address on the Interface Example 192 168 0 10 and the Subnet mask address as 255 255 255 0 6 Open a web browser on your computer In the address bar of t...

Страница 18: ...owser on your computer and enter the following address default http 192 168 0 239 2 On the login screen use the following information Username admin Password password To make access to the web based management interface more secure it s highly reccomended that you change the password to something more unique Web Access ...

Страница 19: ...19 Chapter 2 Controller Management ...

Страница 20: ...oning as a Wireless Controller the EWS Wireless Management Switch also possesses functions of a full featured Layer 2 PoE switch Use the Controller Switch tab on the upper left corner to toggle between the Wireless Controller or Layer 2 Switch functions ...

Страница 21: ...P database that are configured with the EWS Switch Active This shows the number of managed APs that currently have an active connection with the EWS Switch Offline This shows the number of managed APs that currently do not have an active connection with the EWS Switch Controller State Click to enable or disable the EWS AP Controller feature Controller Version This is the software version of the de...

Страница 22: ...f multiple Access Points a filtering feature is enabled to help you to manage the Access Points connected by showing or hiding columns via the search bar or checking the corresponding box The EWS Wireless Management Switch is able to manage supported EnGenius Access Points For the discovery proce dure to succeed the EWS Switch and the EWS Access point must be connected in the same network The EWS ...

Страница 23: ... The Reboot button will reboot the selected Access Point s Search box Search for Access Points in the list using the following criteria Status model name MAC Address Device name IP Address Firmware Version Cluster Status This indicates the current status of the managed Access Point Online AP is connected and managed by EWS Switch Provisioning AP is currently in the process of connecting to the EWS...

Страница 24: ...ged Access Point Last Update Display the time the Access Point was last detected and the information was last updated Cluster Displays the Cluster the Access Point is currently assigned to Click on this field and you ll be redirected to the cluster configuration page Column Filter Shows or hides fields in the Access Point list AP s Detected Reveals a list of all APs in the network that the EWS Swi...

Страница 25: ... wish Administrator Username Displays the current administrator login username for the Access Point Enter a new Administrator username for the Access Point if you wish to change the username The default username is admin New Password Enter a new password of between 1 12 alphanumeric characters Verify Password Enter the password again for confirmation Auto Configuration This section displays inform...

Страница 26: ... the subnet mask and default gateway enter DNS server address if necessary Auto Configuration Select Static or DHCP for Auto Config uration IP Address Enter the IP address for the Access Point Subnet Mask Enter the Subnet Mask for the Access Point Default Gateway Enter the default Gateway for the Access Point Primary DNS Server Enter the Primary DNS server name Secondary DNS Server Enter the secon...

Страница 27: ...e Managed list Note that the status will change from Connecting to Provisioning to Online Once you see Online your Access Points s will have been successfully added to the Managed list Note that if the status is in the connecting mode for over 3 minutes please check that the firmware of the Access Point and Switch match each other 1 Access Points in the network will be automatically discovered by ...

Страница 28: ... Point Settings Click on the Device Name field of the Access Point you wish to configure and you will be directed to a screen where you can configure settings for the Access Point Click APPLY to update the system settings ...

Страница 29: ...gs Under 2 4 GHz Settings you can configure the radio set tings of the selected Access Point Wireless Radio Settings 5 GHz Settings Under 5 GHz Settings you can configure the radio set tings of the selected Access Point ...

Страница 30: ...signed to radios is determined based on which country the Access Points are deployed in Transmit Power Use the drop down menu to select the transmit power for the radio Increasing the power improves performance but if two or more Access Points are operating in the same area on the same channel it may cause interference Client Limit Please specify the maximum number of wireless clients that can ass...

Страница 31: ...reases the packet sizes so please keep this in mind Aggregation is useful for increasing bandwidth throughput in environments that are prone to high error rates This mode is only available for 802 11n modes Fill in the frame rate limit you wish to use The range is from 1 32 Next fill in the max byte limit The range is from 2304 65535 Click Apply to save the changes to the system ...

Страница 32: ...splays whether the current SSID profile is enabled or disabled SSID Displays the SSID name as it appears to the wireless clients in the network Security Displays the Security Mode the SSID uses Encryption Displays the Data Encryption type the SSID uses Hidden SSID Displays whether the hidden SSID is enabled or disabled ClientIsolation Displays whether Client Isolation feature is enabled or disable...

Страница 33: ...SSID profile The range is from 1 4094 Note For the Controller to function properly make sure that all ports on all cascading switches as well connected to EWS APs on the switch are configured as the same VLAN ID as the Controller s Management VLAN ID Traffic Shaping Traffic Shaping regulates the flow of packets leaving an interface to deliver improved Quality of Service Enable Traffic Shaping Sele...

Страница 34: ...s which scrambles all data packets transmitted between the Access Point and the wireless clients associated with it Both the Access Point and the wireless client must use the same WEP key for data encryption and decryption Mode Select Open System or Shared Key WEP Key Select the WEP Key you wish to use Input Type Select the key type Your available options are ASCII and HEX ASCII Key You can choose...

Страница 35: ... or disables the accounting feature Radius Accounting Server Enter the IP address of the Radius accounting server Radius Accounting Port Enter the port number used for connections to the Radius accounting server Radius Accounting Secret Enter the secret required to connect to the Radius accounting server Accounting Update Interval Specify how often in seconds the accounting data sends The range is...

Страница 36: ...ntly The range is from 90 dBm 60 dBm Guest Network The Guest Network feature allows administrators to grant Internet connectivity to visitors or guests while keeping other networked devices and sensitive personal or company information private and secure Band Displays the radio band Status Displays whether the current SSID profile is enabled or disabled SSID Displays the SSID name as it appears to...

Страница 37: ...eless clients associated with an Access Point from communicating with other wireless devices Security None Select to disable security for the Access Point WPA PSK WPA2 PSK Select to enable WPA with PSK Pre shared key Personal mode for the network Type Select the WPA type you wish to use Your available options are Mixed WPA PSK and WPA2 PSK Encryption Select the WPA encryption type you wish to use ...

Страница 38: ...fy an IP address for the Guest Network Subnet mask Specify the Subnet mask IP address for the Guest Network Starting IP address Specify the starting IP address range for the Guest Network Ending IP address Specify the ending IP address range for the Guest Network WINS Server IP Specify the Windows Internet Name Service WINS Server IP address for the Guest Network WINS is Microsoft s implementation...

Страница 39: ...you can view information on the wireless clients that are associated with the Access Points that the EWS Switch manages If multiple Access Points are connected to the network use the search bar to find an Access Point by its name ...

Страница 40: ...e Access Point SSID Displays the network on which the client is connected to Client MAC Address Displays the MAC Address of the Wireless Client connected to the Access Point TX Traffic KB Displays the total traffic transmitted to the Wireless Client RX Traffics KB Displays the total traffic received from the Wireless Client RRSS dBm Displays the received signal strength indica tor in terms of dBm ...

Страница 41: ...ster group APs Displays the number of Access Points assigned to this cluster group Member List Displays the device name and MAC address of all Access Points assigned to this cluster group Description Show a description of the cluster group To manage a cluster on an Access Point Add Creates a new Cluster Edit Edits Cluster settings for a cluster Delete Deletes a Cluster 1 Enter the name and descrip...

Страница 42: ...APs field will list all APs managed by the EWS Switch that are currently not currently assigned to another cluster Click Add to assign it to this cluster or click Del to remove from this cluster Administrator Username The administrator login username for all the APs in this Cluster group Enter a new Administrator Username if you want to change the default username Default value is admin New Passwo...

Страница 43: ...AC Check the box to display MAC addresses in addition to the Access Point names Click Apply to save the changes to the system Autoconfiguration DHCP You can choose to auto assign an IP address if there is a DHCP server in the network Static If you wish to manually assign the IP Address choose Static Enter the IP Address you wish to assign to the AP and fill in the subnet mask and default gateway e...

Страница 44: ... as 20MHz 20 40MHz or 40MHz A wider channel improves the performance but some legacy devices can operate only on either 20MHz or 40 MHz This option is only available for 802 11n modes only Extension Channel Use the drop down menu to set the Extension Channel as Upper or Lower channel An extension channel is a secondary channel used to bond with the primary channel to increase this range to 40MHz a...

Страница 45: ...mum number of wireless clients that can associate with the radio Enter a range between 1 127 or fill in 0 for an unlimited client limit Data Rate Enter the data rate you would like to use RTS CTS Threshold Enter the RTS CTS Threshold The range is from 1 2346 Aggregation Click to enable or disable the aggregation feature Frames Enter the amount of frames you wish to utilize The range is from 1 32 B...

Страница 46: ... dBm 60 dBm Guest Network The Guest Network feature allows administrators to grant Internet connectivity to visitors or guests while keeping other networked devices and sensitive personal or company information private and secure Manual IP Settings IP address Specify an IP address for the Guest Network Subnet mask Specify the Subnet mask IP address for the Guest Network Starting IP address Specify...

Страница 47: ...47 Apply Click APPLY to update the the system settings ...

Страница 48: ...ew of the network You can also search Access Points in the network via their IP or MAC address Check the Show Port Info box to show whether you wish the search query to show port information The following table explains the color coding of Access Points in the topology view Green Online Grey Offline Yellow Status Change White Unmanaged Click the Save Topology button to update your settings ...

Страница 49: ...topology tree Left click on the Access Point to redirect to the Active Clients page You can search for an Access Point using the IP Address or MAC address Click the Show Port Info box to show or hide port infor mation on the Controller Click on for the Controller to save the current network topology Changes will be displayed upon de tecting a topology change Note The EWS Switch can only generate t...

Страница 50: ...work enter the Access Point name in the search bar Click Hide AP List to hide the Access Point list on the page or AP List to show a list of connected Access Points Status Displays whether the Access Point in the net work is active or inactive Device Name Displays the name of the Access Point Click Save Map to save your preferences ...

Страница 51: ...e Map for the settings to take effect The number in the marker represents the number of wireless clients currently con nected to the Access Point Use the Search box to search for locations by typing an address or the name of a land mark Use the Location button to pinpoint the map to your current location To use the Map View 1 Click on to display the list of managed Access Points 2 Drag and drop th...

Страница 52: ...ter network visualization of a wireless network Multiple images can be uploaded to visualize Access Point placement on multiple floors of an office building or different branch offices within an organization Floorplan Image From here an administrator can add or delete a custom map or floorplan image ...

Страница 53: ...oaded image Name Shows the name of the custom uploaded image Image Size Displays th e file size of the custom uploaded image Managing Images Add Uploads a new image The campatible formats are GIF PNG or JPG format up to 819 KB per image Edit Edits the name of the uploaded image Delete Removes an uploaded image Floorplan View Floor View From this page the administrator can place Access Points onto ...

Страница 54: ...An Access Point has been recently added to the network How to use the Floorplan View 1 Click on the AP List button to display the list of man aged Access Points 2 Drag and drop the green flag marker representing the Access Point to a location on the map 3 Click on Save Plan to save your changes You can now easily locate you Access Point by having your mouse cursor over the Device Name field in the...

Страница 55: ... Switch Click Sort to view your results for the collective usage of all Access Points on the Network Total Rx Tx Use the buttons to toggle between Total Traffic Rx Traffic or Tx Traffic Sorting Use this button to sort the order from ascending descending depending on your preference Place your mouse cursor over a bar in the chart to show details of the AP Next click on the bar to show the traf fic ...

Страница 56: ...fic Tx Traffic and sort chronologi cally by Traffic Client Number Select a time increment to monitor statistics by 1 day or 1 week Place your mouse cursor over a bar in the chart to show details of the AP Next click on the bar to show the traf fic of the Access Point in a chart ...

Страница 57: ...n based on specific Ac cess Points you can view data via specific clients as well for secuirty purposes Select the Access Point you wish to view and check whether you wish to include Tx Rx or total usage for the client Next click Sort to view your results ...

Страница 58: ... between Total Traffic Rx Traffic and Tx Traffic Sorting Use this button to sort the order to ascending descending Place your mouse cursor over a bar in the chart or on the name of an Access point to show details of a selected Access Point Next click on the bar to show the traffic of the Access Point in a chart Place mouse cursor over a bar in the chart to show details of the wireless client ...

Страница 59: ...ng changes Generate a New Certificate Enter the information below to generate a request for an SSL certificate for the controller Common Name Enter the name of the request Organization Enter the organizations name Organization Unit Enter a unit name department etc Locality City Enter the locality or city State Province Enter the state or province Country Enter the name of the country Apply Click A...

Страница 60: ...e Click Display Certificate Information to show the current certificate information Advanced Options This area will show any advanced options chosen Click on Restore under Advance Options to restore the default SSL Certificate settings Click APPLY to update the the system settings ...

Страница 61: ...n is provided by the sys tem so that administrators can know where the problem lies Note that the topology of the network needs to be saved for this function to work properly Choosing an Access Point to Diagnose The list will show the current status of Access Points on the network Select an Access Point to begin a diagnos tic test If multiple Access Points are connected use the search bar to the t...

Страница 62: ...62 The controller will run a diagnostic test for the selected Access Point Click Start to run the test The test take a few seconds to complete Afterwards the results will display on the page ...

Страница 63: ...mware Version Displays the current firmware version in use File Name Displays the file name of the firmware uploaded Image Size Displays the size of the firmware uploaded in bytes Upload Time Displays the time at which the firmware was uploaded Device List This list displays all the current Access Points connected to the controller Click on the Access Points you wish to upgrade If multiple Access ...

Страница 64: ... Firmware Version Displays the current firmware version of the Access Point To upgrade please follow the steps below 1 Click on Upload New File to mount AP firmware onto EWS Switch flash 2 Once the Access Point firmware is downloaded onto the Controller the list of Access Points that were selected for the firmware upgrade will appear under Device List 3 Select the Access Points you wish to upgrade...

Страница 65: ...65 Chapter 3 Switch Management ...

Страница 66: ...onitoring Statistics Maintenance The description that follows in this chapter describes configuring and managing the system settings within the Switch Search Bar At the top right corner of the Graphical User Interface GUI is the search bar which you can use to find and jump to any of the Switch or Controller management features When you type in a word all possible results for that word in the navi...

Страница 67: ... firmware version of the Switch Serial Number Displays the serial number of the Switch Base MAC address Displays the MAC address of the device IP Address Displays the IP address assigned by DHCP server Gateway Displays the Gateway of IP interface System Uptime Displays the amount of time since the most recent device reset The System Time is displayed in the following format days hours and minutes ...

Страница 68: ...d over the network the Switch needs an IP Address to be assigned The IP Settings screen contains fields for assigning IP addresses IP addresses are either defined as Static or are retrieved using the Dynamic Host Configuration Protocol DHCP DHCP assigns dynamic IP addresses to devices on a network DHCP ensures that network devices have a different IP address every time the device connects to the n...

Страница 69: ...Switch is on This should be labeled in the form xxx xxx xxx xxx where each xxx is a number represented in decimals between 0 and 255 The value should be 255 0 0 0 for a Class A network 255 255 0 0 for a Class B network and 255 255 255 0 for a Class C network but custom subnet masks are allowed Enter the IP subnet mask of your Switch in dotted decimal notation The factory default value is 255 255 2...

Страница 70: ...k interface in Auto Con figuration The Switch will automatically generate and use a globally unique IPv6 address based on the network prefix and its Ethernet MAC address DHCPv6 Client This enables the IP address to be config ured automatically by the DHCP server Select this option if you have an IPv6 DHCP server that can assign the Switch an IPv6 address Prefix and a default gate way IP address St...

Страница 71: ... Displays the current time Enable SNTP Select whether to Enable or Disable the SNTP server The system time is set via an SNTP sever Time Zone Select the difference between Greenwich Mean Time GMT and local time Daylight Savings Time Select between Recurring or Non recurring Daylight Savings Time Offset Enter the time of Daylight Savings Time Offset Recurring From Select the Day Week Month and Hour...

Страница 72: ... enter the port number on the SNTP server to which SNTP requests are sent The valid range is from 1 65535 The default is 123 6 Click APPLY to update the system settings To configure date time manually 1 Next to the Enable SNTP select Disable 2 In the Manual Time field use the drop down boxes to manually select the date and time you wish to set 3 In the Time Zone Offset list select by country or by...

Страница 73: ...e duplex mode of the Ethernet connection on this port Selecting Auto Auto Negotiation allows one port to negotiate with a peer port automatically to obtain the connection speed and duplex mode that both ends support When auto negotiation is turned on a port on the Switch negotiates with the peer automatically to determine the connection speed and duplex mode If the peer port does not support autoe...

Страница 74: ... mode and backpressure flow control in half duplex mode IEEE802 3x flow control is used in full duplex mode to send a pause signal to the sending port causing it to temporarily stop sending signals when the receiving port memory buffers fill Back Pressure flow control is typically used in half duplex mode to send a collision signal to the sending port mimicking a state of packet collision causingt...

Страница 75: ...ble of delivering up to 30 Watts and a total PoE budget of 130 185 370 or 740 Watts depending on you model for uninterrupted PoE use To access the page click PoE under the System menu Ports Power Budget EWS5912FP 8 130 Watts EWS7928P 24 185 Watts EWS7952FP 48 740 Watts Total Power Budget Enter the amount of power the Switch can provide to all ports Consumed Power Shows the total amount of power cu...

Страница 76: ...lick PoE Port Settings under PoE in the System Menu Port Displays the specific port for which PoE parameters are defined PoE parameters are assigned to the powered device that is connected to the selected port State Enable Enables the Device Discovery protocol and provides power to the device using the PoE module The Device Discovery Protocol lets the device discover powered devices attached to de...

Страница 77: ...a port Note The User Power Limit can only be implemented when the Class value is set to User Defined Status Shows the port s PoE status The possible field values are Delivering Power The device is enabled to deliver power via the port Disabled The device is disabled for delivering power via the port Test Fail The powered device test has failed For example a port could not be enabled and cannot be ...

Страница 78: ...78 Apply Click APPLY to update the the system settings ...

Страница 79: ...astructure and the EnGenius Layer 2 Switch complies with the IEEE s Energy Efficient Ethernet EEE standard to give you even more control The EEE compliant Switch offers users the ability to utilize power that Ethernet links use only during data transmission Lower Power Idle LPI is the method for achieving the power saving during Ethernet idel time Use the EEE Configuration page to configure Energy...

Страница 80: ...tion is most commonly used to link a bandwidth intensive network device or devices such as a server to the backbone of a network The participating ports are called Members of a port trunk group Since all ports of the trunk group must be configured to operate in the same manner the configuration of the one port of the trunk group is applied to all ports of the trunk group Thus you will only need to...

Страница 81: ...orts in the LAG have the same transceiver type Ports can be configured as LACP ports only if the ports are not part of a previously configured LAG LACP is a dynamic protocol which helps to automate the configuration and maintenance of LAG s The main purpose of LACP is to automatically configure individual links to an aggregate bundle while adding new links and helping to recover from link failures...

Страница 82: ... Switch Active Ports Displays the active participating members of the trunk group Member Port Select the ports you wish to add into the trunk group Up to eight ports per group can be assigned Static The Link Aggregation is configured manually for specified trunk group LACP The Link Aggregation is configured dynamically for specified trunk group Mode LACP allows for the automatic detection of links...

Страница 83: ...be packetized in Link Aggregation Control Protocol Data Units LACDUs The trunk group can be configured as an active or passive LACP Passive The port prefers to not transmit LACPDUs The port will only transmit LACPDUs when its counterpart uses an active LACP A preference not to speak unless spoken to Active The port prefers to transmit LACPDUs regardless of whether its counterpart uses passive LACP...

Страница 84: ...lowest physical port number will be selected as the backup port If a LAG already exists with the maximum number of allowed port members and LACP is subse quently enabled on another port using a higher priority than an existing member the newly configured port will replace the existing port member that has a lower priori ty A smaller number indicates a higher priority level The range is from 0 6553...

Страница 85: ...from the trunk Set a Short Timeout one second for busy trunked links to ensure that disabled ports are removed from the trunk group as soon as possible The default value for LACP time out is Long Timeout Timeout Select the administrative LACP timeout Long Long timeout value Short Short timeout value Long The LACP PDU will be sent for every 30 seconds and the LACP timeout value is 90 seconds Short ...

Страница 86: ...ent on the original port Port mirroring can consume significant CPU resources while active so be concious of such usage when config uring the Switch Apply Click APPLY to update the the system settings Mirror ID A number identifying the mirror session This Switch only supports up to 4 mirror sessions Port Displays the session ID for port mirroring Destination Port Select the port for traffic purpos...

Страница 87: ... 10 Mbps port this can cause through put problems The port you are copying frames from should always support an equal or lower speed than the port to which you are sending the copies Please note a target port and a source port cannot be the same port Click the Apply button to accept the changes or the Cancel button to discard them ...

Страница 88: ... in the network STP provides a single active path between two devices on a network in order to prevents loops from being formed when the Switch is interconnected via multiple paths STP uses a distributed algorithm to select a bridging device that serves as the root for the spanning tree network It does this by selecting a root port on each bridging device to incur the lowest path cost when forward...

Страница 89: ... active on the Switch at a time The default setting is RSTP STP Select whether to Enable or Disable the spanning tree operation on the Switch Force Version Select the Force Protocol Version parameter for the Switch STP Spanning Tree Protocol IEEE 802 1D RSTP Rapid Spanning Tree Protocol IEEE 802 1w MSTP Multiple Spanning Tree Protocol IEEE 802 1s Once a stable network topology has been established...

Страница 90: ...general replacement for the slower legacy STP RSTP is also incorporated into MSTP With STP convergence can take up to a minute to complete in a larger network This can result in the loss of communication between various parts of the network during the convergence process so STP can subsequent ly can lose data packets during transmission RSTP on the other hand is much faster than STP It can complet...

Страница 91: ...g tree network Thus the root bridge is the bridge with the lowest bridge ID in the spanning tree network The bridge ID includes two parts the bridge priority 2 bytes and the bridge MAC address 6 bytes The 802 1d default bridge priority is 32768 STP devices exchange Bridge Protocol Data Units BPDUs periodically All bridges listen for Hello BPDUs Bridge Protocol Data Units transmitted from the root ...

Страница 92: ...lue becomes the root bridge Forward Delay Displays the Switch Forward Delay Time This is the time in seconds the Root Switch will wait before changing states called listening to learning Maximum Age Displays the bridge Switch Maximum Age Time This is the amount of time a bridge waits before sending a configuration mes sage The default is 20 seconds Hello Time Displays the Switch Hello Time This is...

Страница 93: ... set the speed for forwarding packets to the specified port s in the list for optimal efficiency The default port cost for a 100Mbps port is 200000 and the default port cost for a Gigabit port is 20000 Enter a value between 1 and 200000 000 to determine the External Cost The lower the number the greater the probability the port will be chosen to forward packets Edge Port Indicate whether the port ...

Страница 94: ...tates right after the port is configured as an edge port or when its link status changes Edge Ports are not connected to LANs that have span ning tree devices so Edge Ports do not receive Bridge Protocol Data Units BPDUs If an Edge Port starts to receive BPDUs it is no longer considered an edge port to the Switch Apply Click APPLY to update the the system settings ...

Страница 95: ...me as the CST outside a region All regions are bound together using a CIST which is responsible for creating loop free topology across regions whereas the MSTI controls topology inside regions CST instances allow different regions to communicate between themselves CST is also used for traffic within the region for any VLANs not covered by a MSTI In an MSTP enabled network there is only one CIST th...

Страница 96: ... seconds that a bridge remains in a listening and learning state before forwarding packets The value must be greater or equal to Bridge Max Age 2 1 The time range is from 4 seconds to 30 seconds The default value is 15 seconds Maximum Age The Max Age may be set to ensure that old information does not endlessly circulate through redundant paths in the network preventing the effective propagation of...

Страница 97: ... e lowest value will be configured as an active link in the Spanning Tree This makes a port with higher priority less likely to be blocked if the Spanning Tree Algorithm is detecting network loops When more than one port is assigned the highest priority the port with lowest numeric identifier will be enabled The range is from 0 240 in steps of 16 and the default is 128 Internal Path Cost Conf The ...

Страница 98: ...Internal Port Cost Enter the cost of the port Edge Port Conf Displays the Edge Port state Designated Bridge This is the Bridge Identifier of the bridge of the Designated Port It is made up using the bridge priority and the base MAC address of the bridge Port Role Each MST Bridge Port that is enabled is assigned a Port Role within each spanning tree The port role will be one of the following values...

Страница 99: ... Spanning Tree CST interconnects all adjacent MST Regions and acts as a virtual bridge node for communications between STP or RSTP nodes in the global network MSTP connects all bridges and LAN segments with a single Common and Internal Spanning Tree CIST The CIST is formed as a result of the running spanning tree algorithm between Switches that support STP RSTP and MSTP protocols Once you specify ...

Страница 100: ...ty and the base MAC address of the bridge Internal Root Cost Displays the path cost to the designated root for the MST instance Designated Bridge Displays the bridge identifier of the bridge with the Designated Port It is made up using the bridge priority and the base MAC address of the bridge Root Port Displays the port that accesses the designat ed root for MST instance Configuration Name This n...

Страница 101: ...gnated root for the MST instance Designated Bridge Displays the bridge ID of the root bridge Root Port Displays the port that accesses the designated root for MST instance Configuration Name This name uniquely identifies the MSTI Multi ple Spanning Tree Instance Enter a descrip tive name up to 32 characters for an MST region The default is the MAC address name of the device running MSTP Configurat...

Страница 102: ...priority value for the MST When Switches or bridges are running STP each is assigned a priority After exchanging BPDUs the Switch with the lowest priority value becomes the root bridge The bridge priority is a multiple of 4096 If you specify a priority that is not a multiple of 4096 the priority is automatically set to the next lowest priority that is a multiple of 4096 For example if you set the ...

Страница 103: ...ate Back up Master or Disabled Port State Displays the state of the selected port Edge Port Oper Displays the operating Edge Port state P2P MAC Conf Displays the P2P MAC state P2P MAC Oper Displays the operating P2P MAC state Port Role Displays the port role Shows each MST Bridge Port that is assigned a port role for each spanning tree Port State Displays the state of the selected port Port State ...

Страница 104: ...ociated VLAN ID and port number associated with the address When you specify a Static MAC address you are set the MAC address to a VLAN and a port thus it makes an entry into its forwarding table These entries are then used to forward packets through the Switch Static MAC addresses along with the Switch s port security allow only devices in the MAC address table on a port to access the Switch To a...

Страница 105: ...ries will be removed from related network devices The Dynamic MAC Address Table shows the MAC addresses and their associated VLANs learned on the selected port Index Displays the index for the Dynamic MAC Address table Port Select the port to which the entry refers VID Displays the VLAN ID corresponding to the MAC address MAC Address Displays the MAC addresses that the Switch learned from a specif...

Страница 106: ...n transmitted in LLDP advertisements flow in one direction only from one device to its neighbors This information allows the device to quickly identify a variety of other devices resulting in a LAN that interoperates smoothly and efficiently LLDP transmits information as packets called LLDP Data Units LLDPDUs A single LLDP Protocol Data Unit LLDP PDU is transmitted within a single 802 3 Ethernet f...

Страница 107: ...nterval at which LLDP advertisement updates are sent The default value is 30 The range is from 5 32768 Holdtime Multiplier Enter the amount of time that LLDP packets are held before packets are discarded and measured in multiples of the Advertised Interval The default is 4 The range is from 2 10 Reinitialization Delay Enter the amount of time of delay before reinitializing LLDP The default is 2 Th...

Страница 108: ...D Subtype Displays the chassis ID type Chassis ID Displays the chassis ID of the device transmitting the LLDP frame System Name Displays the administratively assigned device name System Description Describes the device Capabilities Supported Describes the device functions Capabilities Enabled Describes the device functions Port ID Subtype Displays the port ID type Click the Apply button to accept ...

Страница 109: ...P devices must support chassis and port ID advertisement as well as the system name system ID system description and system capability advertisements From here you can viewing detailed LLDP Information for the remote Switch ...

Страница 110: ...mote ID System Name Displays the administratively assigned device name Time to Live Displays the time Auto Negotiation Supported Displays state for the Auto Negotiation Supported Auto Negotiation Enabled Displays state for the Auto Negotiation Enabled Auto Negotiation Advertised Capabilities Displays the type of Auto Negotiation Advertised Capabilities Operational MAU Type Displays the type of MAU...

Страница 111: ... membership IGMP Snooping checks IGMP packets passing through the network and configures Multicasting accordingly Based on the IGMP query and report messages the Switch forwards traffic only to the ports that request the multicast traffic It enables the Switch to forward packets of multicast groups to those ports that have validated host nodes The Switch can also limit flooding of traffic to IGMP ...

Страница 112: ...s it receives to determine which segments should receive packets directed to the group address when enabled Version Select the IGMP version you wish to use If an IGMP packet received by the interface has a version higher than the specified version this packet will be dropped Report Suppression Select whether Report Suppression is Enabled or Disabled for IGMP Snooping The Report Suppression feature...

Страница 113: ...y remove the Layer 2 LAN port from its forwarding table entry upon receiving an IGMP leave message without first sending out IGMP group specific GS queries to the port If Fast Leave is not used a multicast querier will send a GS query message when an IGMPv2 v3 group leave message is received The querier stops forwarding traffic for that group only if no host replies to the query within the specifi...

Страница 114: ...ally ask their hosts if they wish to receive mul ticast traffic The Querier feature will check whether hosts wish to receive multicast traffic when enabled An Elected querier will assume the role of querying the LAN for group members and then propagates the service requests on to any upstream multicast Switch to ensure that it will continue to receive the multicast service This feature is only sup...

Страница 115: ...st Member Query Counter Enter the number of IGMP group specific queries sent before the switch assumes there are no local members Last Member Query Interval Displays the Operational Last Member Query Interval sent by the elected querier Oper Last Member Query Interval Enter the time between two consecutive group specific que ries that are sent by the querier including those sent in response to lea...

Страница 116: ...116 Group List The Group List displays VLAN ID Group IP Address and Members Port in the IGMP Snooping List ...

Страница 117: ...earned The Switch will auto detect the prescence of a multicast router and forward IGMP pacets accordingly Dynamic Port List Displays router ports that have been dynamically configured Forbidden Port List Designates a range of ports as being disconnected to multicast enabled routers Ensures that the forbidden router port will not propagate routing packets out Static Port list Designates a range of...

Страница 118: ...of IPv6 multicast packets in the specified VLANs Both IGMP and MLD Snooping can be active at the same time Global Settings MLD Snooping Status Select to Enable or Disable MLD Snooping on the Switch The Switch snoops all MLD packets it receives to determine which segments should receive packets directed to the group address when enabled MLD Snooping Version Select the MLD version you wish to use If...

Страница 119: ...can improve bandwidth usage for a network which frequently experiences many MLD host add and leave requests VLAN ID Displays the VLAN ID MLD Snooping Status Select to Enable or Disable the MLD snooping feature for the specified VLAN ID Fast Leave Enables or Disables the MLD snooping Fast Leavefeature for the specified VLAN ID Enabling this feature allows the Switch to immediately remove the Layer ...

Страница 120: ...120 Group List The Group List displays the VLAN ID IPv6 Address and Members Port in the MLD Snooping List ...

Страница 121: ...ter Ports Au to Learned The Switch will automatically detect the presence of a multicast router and forward MLD packets accordingly Dynamic Port List Displays router ports that have been dynamically configured Forbidden Port List Designates a range of ports as being dis connected to multicast enabled routers Ensure that the forbidden router port will not propagate routing packets out Static Port L...

Страница 122: ...ire you to use large frame sizes The EnGenius Layer 2 Switch supports a Jumbo Frame size of up to 9216 bytes Jumbo frames need to be configured to work on the ingress and egress port of each device along the end to end transmission path Furthermore all devices in the network must also be consistent on the maximum Jumbo Frame size so it is important to do a thorough investigation of all your device...

Страница 123: ...h can avoid broadcast packets being sent to all the ports on a single Switch A VLAN also increases network performance by limiting broadcasts to a smaller and more manageable logical broadcast domain VLANs also improve security by limiting traffic to specific broadcast domains 802 1Q Each VLAN in a network has an associated VLAN ID which appears in the IEEE 802 1Q tag in the Layer 2 header of pack...

Страница 124: ... characters Tagged Port Frames transmitted from this port are tagged with the VLAN ID Untagged Port Frames transmitted from this port are untagged Important Port based VLAN and 802 1Q VLAN are mutually exclusive If you enable port based VLAN then 802 1Q VLAN is disabled Note The Switch s default setting is to assign all ports to a single 802 1Q VLAN VID 1 Please keep this in mind when configuring ...

Страница 125: ...o button in the tagged ports row to select a port 5 Click the Untagged Ports text box to show the untagged ports dialog box 6 Click a radio button in the Untagged Ports row to select a port 7 Click Confirm to accept the changes or Cancel to discard them To delete an item in the 802 1Q list follow these steps 1 Click the Delete button in the row you want to remove an item from A confirmation dialog...

Страница 126: ... the port that is to transmit the packet the Switch will drop the packet Within the Switch different PVIDs mean different VLANs so VLAN identification based upon the PVIDs cannot create VLANs that extend outside a given Switch If no VLANs are defined on the Switch all ports are then assigned to a default VLAN with a PVID equal to 1 Note To enable PVID functionality the following requirements must ...

Страница 127: ...gged frames it s receives The port only accepts tagged frames Untagged Only Only untagged frames received on the port are accepted All The port accepts both tagged and untagged frames Ingress Filtering Specify how you wish the port to handle tagged frames Select Enabled or Disabled from the list Enabled tagged frames are discarded if VID does not match the PVID of the port Disabled All frames are ...

Страница 128: ...ent VLAN is set to a different VLAN connectivity through the existing management VLAN is lost and an IP connection can be made only through a port that is part of the management VLAN It is also mandatory that the port VLAN ID PVID of the port to be connected in that management VLAN be the same as the management VLAN ID Management VLAN ID Select the VLAN ID for allows user to transfer the authority...

Страница 129: ...fic to be marked with the selected CoS value Remark CoS 802 1p Defines a service priority for traffic on the Voice VLAN The priority of any received VoIP packet is overwritten with the new priority when the Voice VLAN feature is active on a port Range 0 7 Default 6 Aging Time The aging time is used to remove a port from voice VLAN if the port is an automatic VLAN member When the last voice device ...

Страница 130: ...B Assigned to 3COM IP Phones 00 03 6B Assigned to Cisco IP Phones 00 E0 75 Assigned to Veritel IP Phones 00 D0 1E Assigned to Pingtel IP Phones 00 01 E3 Assigned to Siemens IP Phones 00 60 B9 Assigned to NEC Philips IP Phones 00 0F E2 Assigned to H3C IP Phones 00 09 6E Assigned to Avaya IP Phones Index Displays the VoIP sequence ID OUI Address This is the globally unique ID assigned to a ven dor b...

Страница 131: ...port to which the Voice VLAN settings are applied State Select Enabled to enhance VoIP quality on the selected port The default is Disabled CoS Mode Select Src or All from the list Src Src QoS attributes are applied to packets with OUIs in the source MAC address All All QoS attributes are applied to packets that are classified to the Voice VLAN Operate Status Displays the operating status for the ...

Страница 132: ... identify the Switch You can use up to 32 alphanumeric characters The factory default name is EWS7228P System Location Enter the location of the Switch You can use up to 32 alphanumeric characters The factory default is Default Location System Contact Enter the contact person for the Switch You can use up to 160 alphanumeric characters The factory default is Default Location Click Apply to save th...

Страница 133: ...edit an existing account User Name Enter a username You can use up to 18 alphanumeric characters Password Type Select Clear Text or Encrypted from the list Password Enter a new password for accessing the Switch Password Retype Repeat the new password used to access the Switch Privilege Type Select Admin or User from the list to regulate access rights Important Note that Admin users have full acces...

Страница 134: ...on Upgrade First upload the configuration file from a TFTP server to the Switch Next upload the configuration file from your local drive to the Switch by using an HTTP session Upgrade Backup Select Upgrade or Backup from the list Method Two methods can be selected HTTP or TFTP File Field only shown when Upgrading via HTTP Click Browse to select file to Upgrade or Backup Server IP Enter the Server ...

Страница 135: ...d runs from the active image If the active image is corrupt the system automatically boots from the non ac tive image Active Selects the partition you wish to be active Flash Partition Displays the number of the partition Status Displays the partition which is currently active on the Switch Image Name Displays the name version number of the image Image Size Displays the size of the image file Crea...

Страница 136: ...an be read or set via SNMP The manager is the console through which network ad ministrators perform network management functions Several versions of SNMP are supported They are v1 v2c and v3 SNMPv1 which is defined in RFC 1157 A Simple Network Management Protocol SNMP is a stan dard that defines how communication occurs between SNMP capable devices and specifies the SNMP message types Version 1 is...

Страница 137: ...m to generate a mes sage digest Each authentication protocol authenticates a user by checking the message digest In addition both protocols use keys to perform authentication The keys for both protocols are generated locally using the Engine ID and the user password to provide even more security In SNMPv1 and SNMPv2c user authentication is ac complished using types of passwords called Communi ty S...

Страница 138: ... is automatically generated that is unique to the Switch This is referred to as the default engine ID If the local engine ID is deleted or changed all local SNMP users will be cleared and you will need to reconfigure all existing users Click Apply to save the changes to the system Global Settings Simple Network Management Protocol SNMP is an OSI Layer 7 Application Layer protocol designed specific...

Страница 139: ...ID Enter the Object Identifier OID Subtree The OID identifies an object tree MIB tree that will be included or excluded from access by an SNMP manager Note that the first character must be a period Wild cards can be used to mask a specific portion of the OID string using a period Subtree Mask Select 0 or 1 for Subtree mask The mask of the Subtree OID 1 means this object number is concerned amd 0 m...

Страница 140: ...o ciated with the group Security Level Select the security level for the group Secu rity levels apply to SNMPv3 only No Auth Neither authentication nor the privacy security levels are assigned to the group Auth Authenticates SNMP messages Priv Encrypts SNMP messages Read View Management access is restricted to read on only Write View Select a SNMP to allow SNMP write privileges to the Switch s SNM...

Страница 141: ... the Switch Next name the community and choose the level of access that will be granted to the specified list from the drop down boxes Community Name Enter the name of SNMP community string Community Mode Selected Basic or Advance from the list Select the Advance attached to the SNMP group Group Name Select the SNMP group from a list View Name Select the view name from a list Access Rights Specify...

Страница 142: ...pts SNMP messages Authentication Protocol Select the method used to au thenticate users MD5 Using the HMAC MD5 algorithm SHA Using the HMAC SHA 96 authentication level Enter the SHA password and the HMAC SHA 96 password to be used for authentication Authentication Password Enter MD5 password and the HMAC MD5 96 password to be used for authentication Encryption Protocol Select the method used to au...

Страница 143: ...iew In this way you restrict which MIBs a user can display and modify for better security In addition you can restrict the types of traps users can send as well You can do this by de termining where messages are sent and what types of messages can be sent per user Traps indicating status changes can be issued by the Switch to the specified trap manager by sending authentication failure messag es a...

Страница 144: ...t number or frame type or layer 2 frames based on any destination MAC address for unicast broadcast or multicast or based on VLAN ID or VLAN tag priority ACLs can be used to improve performance by blocking unnecessary network traffic or to implement se curity controls by restricting access to specific network resources or protocols Policies can be used to differen tiate service for client ports se...

Страница 145: ...the host However please note that in forms consume more system resources because they must be kept in memory until a response is received Informs also add to network traffic You should consider these effects when deciding whether to issue notifications as traps or informs Community Name Select the Community Name from the list UDP Enter the UDP port used to send notifi cations Timeout Configurable ...

Страница 146: ...e You can use up to 32 alphanumeric characters Click the Apply button to accept the changes or the Cancel button to discard them MAC ACL This page displays the currently defined MAC based ACLs profiles To add a new ACL click Add and enter the name of the new ACL ...

Страница 147: ...atched exactly ff ff ff ff ff ff means the bits are irrelevant Any combination of 0s and ffs can be used Source MAC Value Enter the source MAC address Source MAC Wild card Mask Enter a MAC address mask for the source MAC address A mask of 00 00 00 00 00 00 means the bits must be matched exactly ff ff ff ff ff ff means the bits are irrelevant Any combination of 0s and ffs can be used VLAN ID Enter ...

Страница 148: ...profiles To add a new ACL click Add and enter the name of the new ACL Index Displays the current number of ACLs Name Enter the IP based ACL name You can use up to 32 alphanumeric characters Click the Apply button to accept the changes or the Cancel button to discard them ...

Страница 149: ...nter the protocol in the ACE to which the packet is matched Select from List Selects the protocol from the list in the provided field ICMP Internet Control Message Protocol ICMP The ICMP enables the gateway or destination host to communicate with the source host IPinIP IP in IP Encapsulates IP packets to create tunnels between two routers This ensures that IPIP tunnel appears as a single interface...

Страница 150: ...ween two neighboring gateway hosts in an autonomous systems network IGP Interior Gateway Protocol IGP Enables a routing information exchange between gateways within an autonomous network UDP User Datagram Protocol UDP UDP is a communication protocol that transmits packets but does not guarantee their delivery HMP The Host Mapping Protocol HMP collects network information from various networks host...

Страница 151: ...rofiles To add a new ACL click Add and enter the name of the new ACL Index Displays the current number of ACLs Name Enter the IPv6 based ACL name You can use up to 32 alphanumeric characters Click the Apply button to accept the changes or the Cancel button to discard them ...

Страница 152: ...hes the criteria Permit Forward packets that meet the ACL criteria Deny Drops packets that meet the ACL criteria Protocol Select the Any Protocol ID or Select from List from drop down menu Protocol ID Enter the proto col in the ACE to which the packet is matched Select from List Select the protocol from the list in the provided field Destination IP Address Value Enter the destination IP address De...

Страница 153: ... the ACE to which the packet is matched The range is from 0 255 Select from List Select the ICMP from the list in the provided field ICMP Code Enter the ICMP code The range is from 0 255 Source Port Select Single or Range from the list Enter the source port that is matched to packets The range is from 0 65535 Destination Port Select Single or Range from the list Enter the destination port that is ...

Страница 154: ...ress interface that do not match the ACL are matched to the default rule of drop ping unmatched packets To bind an ACL to an interface simply select an interface and select the ACL s you wish to bind Port Select the port for which the ACLs are bound to MAC ACL The ACL is MAC address based IPv4 ACL The ACL is IP address based IPv6 ACL The ACL is IP address based Click Apply to save the changes to t...

Страница 155: ...ued for transmission within a port the rate at which it is processed depends on how the queue is configured and the amount of traffic present within other queues on the port If a delay is necessary packets are held in the queue until they are authorized for transmission Global Settings There are two options for applying QoS information onto packets the 802 1p Class of Service CoS priority field wi...

Страница 156: ...he Weighted Round Robin WRR algorithm to handle packets in priority classes of service It assigns WRR weights to queues Trust Mode Select which packet fields to use for clas sifying packets entering the Switch DSCP Classify traffic based on the DSCP Differentiated Services Code Point tag value 1p Classify traffic based on the 802 1p The eight priority tags that are specified in IEEE802 qp are from...

Страница 157: ...buffered due to congestion CoS Class of Service Displays the CoS priority tag values where 0 is the lowest and 7 is the highest Queue Check the CoS priority tag box and select the Queue values for each CoS value in the provided fields Eight traffic priority queues are supported and the field values are from 1 8 where one is the lowest priority and eight is the highest priority Click Apply to save ...

Страница 158: ... IP packet for prioritization purposes DSCP Differentiated Services Code Point Displays the packet s DSCPvalues where 0 is the lowest and 10 is the highest Queue Check the CoS priority tag box and select the Queue values for each DSCP in the provided fields Eight traffic priority queues are supported and the field values are from 1 8 where one is the lowest priority and eight is the highest priori...

Страница 159: ...ust setting to let any CoS packet be marked at ingress Port Displays the ports for which the CoS parameters are defined CoS Class of Service Value Select the CoS priority tag values where 0 is the lowest and 7 is the high est Trust Select Enable to trust any CoS packet marking at ingress and select Disable to not trust any CoS packet marking at ingress Click Apply to save the changes to the system...

Страница 160: ... Enable or Disable ingress on the interface Ingress Rate Enter the ingress rate in kilobits per second The Gigabit Ethernet ports have a maximum speed of 1000000 kilobits per second Egress Select from the drop down box to Enable or Disable egress on the interface Egress Rate Enter the egress rate in kilobits per second The Gigabit Ethernet ports have a maximum speed of 1000000 kilobits per second ...

Страница 161: ...Broadcast Enter the broadcast rate in kilobits per second The Gigabit Ethernet ports have a maximum speed of 1000000 kilobits per second If the rate of broadcast traffic ingress on the interface increases beyond the configured threshold the traffic is dropped Unknown Multicast Enter the Unknown Multicast rate in kilobits per second The Gigabit Ethernet ports have a maximum speed of 1000000 kilobit...

Страница 162: ...thenticator Clients connected to a port on the Switch must be authenticated by the Authentication Server Radius before accessing any services offered by the Switch on the LAN Use a Radius server to authenticate users trying to access a network by relaying Extensible Authentication Protocol over LAN EAPOL packets between the Client and Server This establishes the requirements needed for a protocol ...

Страница 163: ...rticular guest VLAN memberships to be defined based on each individual user After authorization the port connected to the authenticated supplicant then becomes a member of the specified guest VLAN When the supplicant is successfully authenticated traffic is automatically assigned to the guest VLAN State Select whether authentication is Enabled or Disabled on the Switch Guest VLAN Select whether Gu...

Страница 164: ...se for the Re authentification period Quiet Period and Supplicant Period After this enter the max number of times you wish for the Switch to retransmit the EAP request Finally choose whether you wish to Enable or Disable the VLAN ID Port Displays the ports for which the 802 1X information is displayed Mode Select the Auto or Force_UnAuthorized or Force_Authorized mode from the list Re Authenticati...

Страница 165: ...165 Apply Click Apply to update the system settings ...

Страница 166: ...166 Authenticated Host The Authenticated Host section displays the Authenticated User Name Port Session Time Authenticated Method and Mac Address ...

Страница 167: ...ication and all have a Radius client component that communicates with the Radius server Clients connected to a port on the Switch must be authenticated by the Authentication Server before accessing services offered by the Switch on the LAN Use a Radius server to authenticate users trying to access a network by relaying Extensible Authentication Protocol over LAN EAPOL packets between the Client an...

Страница 168: ...vice and the RADIUS server Timeout Reply Enter the amount of time the device waits for an answer from the RADIUS Server before switching to the next server The default value is 3 Retry Enter the number of transmitted requests sent to the RADIUS server before a failure occurs The default is 3 Server Priority Enter the priority for the RADIUS server Dead Timeout Enter the amount of time that the RAD...

Страница 169: ...rvice and enter the HTTP Timeout session Next select whether to Enable or Disable the HTTPS sevice and enter the HTTPS timeout session for the Switch HTTP Service Select whether HTTP Service for the Switch is Enabled or Disabled This is enabled by default HTTP Session Timeout Enter the amount of time that elapses before HTTP is timed out The default is 5 minutes The range is from 0 86400 minutes H...

Страница 170: ...it is better to use SSH over Telnet To enable and configure SSH Settings please refer to SSH Settings on the next page Telnet Service Select whether the Telnet Service is Enabled or Disabled It is enabled by default Session Timeout Enter the amount of time that elapses before the Telnet Service is timed out The default is 5 minutes The range is from 0 65535 minutes History Count Enter the entry nu...

Страница 171: ...o use Enter the session timout you wish to implement for SSH Next enter the History Count number you wish The default count is 128 Enter the number of passwords requests to be sent across SSH The deafult attempts is 3 Finally enter the silent time you wish to implement for the SSH service SSH Service Select whether SSH is Enabled or Disabled This is disabled by default Session Timeout Enter the am...

Страница 172: ...The range is from 0 65535 minutes History Count Enter the entry number for History of Console Service The default is 128 The range is from 0 256 Password Retry Count Enter the number of password requests to send to the Console Service The default is 3 The range is from 0 120 Silent Time Enter the silent time for Console Service The range is from 0 65535 seconds Click Apply to save the changes to t...

Страница 173: ...ice to the Switch prior to stopping auto learning processing Max MAC Address Enter the maximum number of MAC Addresses that can be learned on the port The range is from 1 256 Port Displays the port for which the port security is defined State Select Enabled or Disabled for the port security feature for the selected port Click Apply to save the changes to the system ...

Страница 174: ...ed from the list Land Select Enabled or Disabled from the list UDP Blat Select Enabled or Disabled from the list TCP Blat Select the Enabled or Disabled from the list POD Select the Enabled or Disable from the list Fragment Minimal Size Enter the minimal size IPv6 Min Fragment Select Enabled or Disabled from the list Bytes Enter the size of IPv6 packets The range is from 0 65535 ICMP Fragment Sele...

Страница 175: ...to use IPv4 Ping Max Size Select Enabled or Disabled from the list IPv6 Ping Max Size Select Enabled or Disabled from the list Ping Max Size Set ting Enter the max ping size for the ping The range is from 0 65535 Smurf Attack Select Enabled or Disabled from the list Netmask Length Enter the length of the netmask The range is from 0 32 TCP SYN Select Enabled or Disabled from the list Null Scan Atta...

Страница 176: ...from the drop down list whether you wish to Enable or Disable DoS Protection for the Switch Port Displays the port for which the DoS protection is defined DoS Protection Select Enabled or Disabled for the DoS Protection feature for the selected port Click Apply to save the changes to the system ...

Страница 177: ...plays the number of received packets discarded on the port TXByte Displays the number of all packets transmitted on the port TXUcast Displays the number of Unicast packets transmit ted on port TXNUcast Displays the number of Unicast packets transmit ted on the port TXDiscard Displays the number of transmitted packets dis carded on the port RXMcast Displays the number of Multicast packets received ...

Страница 178: ...es RMON events on the Switch Index Enter the entry number for Event Event Type Select the event type Log The event is a log entry SNMP Trap The event is a trap Log Trap The event is both a log entry and a trap Community Enter the community to which the event bel ogs Description Displays the number of good broadcast pack ets received on the interface Last Time Sent Displays the time that event occu...

Страница 179: ...w specific Event logs for the Switch Choose an Event log you wish to view fromt he drop down list Event Log Table Select the index of the Event Log from the list Click the Apply button to accept the changes or the Cancel button to discard them ...

Страница 180: ...e Type Select the sampling method for the selected variable and comparing the value against the thresholds Absolute Compares the values with the thresholds at the end of the sam pling interval Delta Subtracts the last sampled value from the current value Rising Threshold Enter the rising number that triggers the rising threshold alarm Falling Thresh old Enter the falling number that triggers the f...

Страница 181: ...t from which the history sam ples were taken Bucket Requested Enter the number of samples to be saved The range is from 1 50 Interval Enter the time that samples are taken from the ports The field range is from 1 3600 Owner Enter the RMON user that requested the RMON information The range is from 0 32 characters Click the Apply button to accept the changes or the Cancel button to discard them ...

Страница 182: ...tory Log Table From here you can view the History Index for History Logs on the Switch Select a History Index to view from the drop down box History Log Table Select the index for the History Log from the list ...

Страница 183: ...f undersized packets less than 64 octets received on the port Oversize Pkts Displays the number of oversized packets over 1518 octets received on the port Fragments Displays the number of fragments received on the port Jabbers Displays the total number of received pack ets that were longer than 1518 octets Collisions Displays the number of collisions received on the port Pkts of 64 Octets Displays...

Страница 184: ...s the Syslog severity levels Code Severity Description General Description 0 Emergency System is unusable A emergency condition usu ally affecting multiple apps servers sites Direct Attention is required 1 Alert Actions must be taken immediately Should be corrected immedi ately Notify staff who can fix the problem promptly 2 Critical Critical conditions Should be corrected immedi ately but indicat...

Страница 185: ... the Log settings for the Switch Logging Service Use the radio buttons to Enable or Disable the system log Global Logs Select whether to Enable or Disable the Switch s global logs for Cache File and Server Log Apply Click APPLY to update the system settings ...

Страница 186: ...lert and Emergency Target Select Yes or No from the list If the device is not functioning properly an emergency log mes sage is saved to the specified logging location EMERG Select Yes or No from the list If the Switch is not functioning properly an emergency log mes sage is saved to the specified logging location ALERT Select Yes or No from the list If there is a serious Switch malfunction then a...

Страница 187: ...187 Click the Apply button to accept the changes or the Cancel button to discard them ...

Страница 188: ...erver Port Specify the port on the host to which Syslog messages are sent The default port is 514 Severity Level Refer to severity level table on page 25 or 27 Logs with the selected severity level and all logs of greater severity are sent to the host For example if you select Error the logged messages include Error Critical Alert and Emergency Facility The log facility is used to separate out log...

Страница 189: ...mp Displays the time of the log entry Category Displays the category of the history log entry for example If the name of a VLAN group is changed the category will display VLAN If a device is con nected to the Switch the category will display Port Severity Displays the level of severity of the log entry Messages are assigned a severity code Message Displays text describing the event that triggered ...

Страница 190: ... the signal is reflected back either by cable defects or by the end of the cable when an issue is present Cables are tested when the ports are in the down state with the exception of the cable length test Port Select the port to which the cable is connected Pair A B C and D Displays the cable test results Open A cable is not connected to the port OK A cable is connected to the port Cable Length A ...

Страница 191: ... testing Ping Test Settings You can vary the test parameters by entering the data in the appropraite boxes To verify accuracy of the test it is reccomended that you run multiple tests in case of a test fault or user error IP address Enter the IP address or the host name of the station you want the Switch to ping to Count Enter the number of ping to send The range is from 1 5 and the default is 1 I...

Страница 192: ...iple tests in case of a test fault or user error IP address Enter the IPv6 address or the host name of the station you want the Switch to ping to Count Enter the number of pings to send The range is from 1 5 and the default is 1 Interval Enter the number of seconds between pings sent The range is from 1 5 and the default is 4 Size Enter the size of ping packet you wish to send The range is from 8 ...

Страница 193: ... is discarded In testing it will tell you how long each hop from router to router takes via the trip time of the packets it sends and receives from each successive host in the route IP address Enter the IP address or the host name of the sta tion you wish the Switch to ping to Max Hop Enter the maximum number of hops The range is from 2 255 and the default is 30 Result Displays the trace route res...

Страница 194: ...194 Chapter 4 Maintenance ...

Страница 195: ...ebooting the device and logging out of the interface The following represents the Maintenance Menu bar Saving Configurations Important You must save any setting changes before rebooting Failure to save results in loss of new configuration changes Follow this procedure to save the configuration 1 Click to save the entire configuration changes you have made to the device to Switch 2 Click OK Mainten...

Страница 196: ...Click OK and follow the on screen instructions to complete the Firmware Upgrade Note The Upgrade process may require a few minutes to complete It is advised to clear your browser cache after upgrading your firmware Resetting WARNING The Reset function will delete all configuration information from the current device Backup your information before starting this procedure Follow this procedure to re...

Страница 197: ...hen a prompt displays click OK to confirm the reboot process or Cancel to quit the procedure Logging Out Follow this procedure to log out the current profile from the user interface 1 Click to log out of the menu 2 When a prompt shows click OK to confirm logging out or Cancel to quit the procedure ...

Страница 198: ...198 Appendix ...

Страница 199: ...x 30w per port PoE Ports 8 24 48 Total PoE Budget 130 W 185 W 740 W Power Supply 100 240VAC 50 60Hz Environent Operating Temperature 32 F 122 F 0 F C 50 C Storage Temperature 40 F 158 F 40 C 70 C Operating Humidity 10 90 non condensing Storage Humidity 5 90 non condensing Dimensions 330 x 230 x 44mm 13 x 9 x 1 73 inches 440 x 260 x 44mm 17 3 x 10 2 x 1 73 inches 440 x 410 x 44mm 17 3 x 16 1 x 1 73...

Страница 200: ...in normal operating conditions to meet regulatory RF exposure requirement 3 External Antenna Only use the antennas which have been approved by the applicant Any non approved antenna s may produce unwanted spurious or excessive RF transmitting power which may lead to the violation of FCC IC limit and therefore is prohibited 4 Installation Procedure Please refer to the user s manual for details 5 Wa...

Страница 201: ... produit doit etre installe de facon a respecter une distance de 23cm entre l antenne emettrice et les personnes 3 Antenn Externe Utiliser uniiquement les antennes approuvees par le fabricant L utilisation d autres an tennes peut conduire a un niveau de rayonnement essentiel ou non essentiel depassant les niveaux limites definis par FCC IC ce qui est interdit 4 Procedure D installation Consulter l...

Страница 202: ...ce by one of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help WARNING Any changes or modifications not expressly approved by the party responsible for co...

Страница 203: ...0 5250 MHz is only for indoor use to reduce the potential for harmful interference to co channel mobile satellite systems ii high power radars are allocated as primary users i e priority users of the bands 5250 5350 MHz and 5650 5850 MHz and that these radars could cause interference and or damage to LE LAN devices Avertissement i les dispositifs fonctionnant dans la bande 5150 5250 MHz sont réser...

Страница 204: ...nd operated with minimum distance 20cm between the radiator your body Pour l utilisation de dispositifs mobiles Déclaration d exposition aux radiations Cet équipement est conforme aux limites d exposition aux rayonnements IC établies pour un environnement non contrôlé Cet équipement doit être installé et utilisé avec un minimum de 20cm de distance entre la source de rayonnement et votre corps ...

Страница 205: ...s Datatransmissionequipmentoperating inthe2 4GHzISMbandandusingspreadspectrummodulationtechniques HarmonizedENcoveringessentialrequirementsunderarticle 3 2 of the R TTE Directive EN301893 BroadbandRadioAccessNetworks BRAN 5GHzhighperformanceRLAN HarmonizedENcoveringessentialrequirementsofarticle3 2of the R TTE Directive EN301489 1 ElectromagneticcompatibilityandRadioSpectrumMatters ERM ElectroMagn...

Страница 206: ...ed at følgende udstyr udstyrets typebetegnelse overholder de væsentlige krav og øvrige relevante krav i direktiv 1999 5 EF Deutsch German Hiermit erklärt Name des Herstellers dass sich das Gerät Gerätetyp in Übereinstimmung mit den grundlegenden Anforderungen und den übrigen einschlägigen Bestimmungen der Richtlinie 1999 5 EG befindet Eesti Estonian Käesolevaga kinnitab tootja nimi name of manufac...

Страница 207: ...iumaprovvedimenti oħrajn relevanti li hemm fid Dirrettiva 1999 5 EC Magyar Hungarian Alulírott gyártó neve nyilatkozom hogy a típus megfelel a vonatkozó alapvetõ követelményeknek és az 1999 5 EC irányelv egyéb elõírásainak Polski Polish Niniejszym nazwa producenta oświadcza że nazwa wyrobu jest zgodny z zasadniczymi wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999 5 EC Português...

Отзывы: