background image

User’s Guide

 

Page 1 of 33 

L2 Managed Switch    User’s Guide 

HT-8G-2F

http://www.kst-bg.com

Содержание HT-8G-2F

Страница 1: ...User s Guide Page 1 of 33 L2 Managed Switch User s Guide HT 8G 2F http www kst bg com...

Страница 2: ...OGIN 11 CHAPTER 2 SWITCH STATUS 12 2 1 System Information 12 2 2 Logging Message 12 2 3 Port Counters 13 2 4 Port Status Port Bandwidth Statistics 13 2 5 Link Aggregation 14 2 6 LLDP Statistics 14 2 7...

Страница 3: ...TY 26 5 1 Port Limit Configuration 26 5 2 Storm Control 27 5 3 Port Isolation 28 5 4 DoS configuration 28 5 5 STP Configuration 29 CHAPTER 6 SYSTEM MAINTENANCE 30 6 1 Reboot Switch 30 6 2 Factory Rese...

Страница 4: ...f 33 Packaging list The L2 Managed Switch x1 Power Cord x1 User Guide CD x1 Warranty card x1 Installation accessories kit x1 Please contact local reseller or distributor if any accessories are missing...

Страница 5: ...rating the HT 8G 2F Managed Switch 1 2 Front Panel 1 HT 8G 2F Managed 8 10 100 1000M Base T ports 2 1000 Base X SFP 1 Console port refer to Picture 1 2 2 Picture 1 2 1 H T 8 G 2 F M a n a g e d Front...

Страница 6: ...Preparations before Instruction 2 1 Precautions Please read the following precautions carefully before operation to avoid damaging the device or causing body injuries 1 Please remove the power socket...

Страница 7: ...op 2 3 Installation Tools 1 Flathead screw driver 2 Cross screw driver 3 Anti static wrist strap Chapter 3 Installation 3 1 Install the Switch 3 1 1 Install the switch on a 19 inch standard cabinet 1...

Страница 8: ...one please connect one end of power cord to the power jack on the switch rear panel Connect the other end to the AC power socket Step two check the power indicator PWR on the front panel if the LED i...

Страница 9: ...ged Protocol and Standards IEEE 802 3 10 BASE T Ethernet IEEE 802 3ad Static or Dynamic Link Aggregation IEEE 802 3u 100 BASE TX IEEE 802 3ab 1000 BASE T IEEE 802 3z 1000 BASE X IEEE 802 3x Full Duple...

Страница 10: ...known cast and broadcast Storm suppression based on bandwidth adjustment storm filtering and ACL Supports attack against strategy against Land attack Blat attack Ping attack and TCL control led Flag a...

Страница 11: ...five parts which are switch status basic configuration advanced configuration network security system maintenance Picture 1 1 1 Login Page Enter user password in the above login page the default passw...

Страница 12: ...ge which contains Device Model number equipment type PCB HW Version MAC Address Serial Number System Object ID Firmware Version Firmware Updated Date System Running Time System Up Time 2 2 Logging Mes...

Страница 13: ...as very poor working performance the user need to examine the connection of network cable or the partner network card The current software version doesn t support real time statistics refresh please c...

Страница 14: ...aggregation information Like aggregator group LAG link state aggregator group member state active standby 2 6 LLDP Statistics Picture 2 6 1 LLDP Statistics LLDP information can be checked in above pag...

Страница 15: ...istics When the IGMP snooping function is enabled IGMP information can be checked in above page 2 8 STP Statistics Picture 2 8 1 STP Statistics In above STP statistics page users can check the BPDU pa...

Страница 16: ...Picture 3 1 1 IP configuration The above IP address configuration page can be used to configure the IP address of device management interface Interface Vlan 1 The default IP address subnet mask and ga...

Страница 17: ...ure 3 2 1 Account configuration Login password can be revised in this page please remember the new password for future login 3 3 Logging Setting Picture 3 3 1 Logging Setting System log configuration...

Страница 18: ...can be configured Auto negotiation 10 Half 10 Full 100 Half 100 Full and1000 Full Default mode is Auto negotiation can be changed in pull down list Flow Control This function is defaulted closed open...

Страница 19: ...ort is Mirroring Port This is commonly used for network appliances that require monitoring of network traffic without influencing the normal working of every port it s a convenient online monitoring f...

Страница 20: ...vices interactively gather information through LACP According to the parameters and status of each device automatically receive and dispatch Data of matchable link aggregation When the Aggregation is...

Страница 21: ...ill be received Membership type tag refers to the port will receive tagged packets and the VLAN ID in for tagged packet is not 0 untag refers to the port receive untagged packets only 4 4 Voice VLAN 4...

Страница 22: ...onfiguration Picture 4 5 1 Multicast Configuration MLD Snooping is short for Multicast Listener Discovery Snooping which is IPv6 multicast control mechanism for Layer 2 devices The function is used to...

Страница 23: ...rame Configuration Picture 4 7 1 Jumbo Frame Configuration Generally the max frame size for packet is 1518 Bytes when packet is larger than this size it will be processed in batch 1518 Bytes as a unit...

Страница 24: ...and port tags as different TLV type length value and save them in LLDPDU Link Layer Discovery Protocol Data Unit These information will be released to the direct connected neighbor device neighbor dev...

Страница 25: ...a and a set of data objects SNMP is used mostly in network management systems to monitor network attached devices for conditions that warrant administrative attention 4 11 2 SNMP Community configurati...

Страница 26: ...User s Guide Page 26 of 33 SNMP manager Chapter 5 Network Security 5 1 Port Limit Configuration Picture 5 1 1 Ingress Bandwidth Control Picture 5 1 2 egress Bandwidth Control http www kst bg com...

Страница 27: ...ontrol priority class 5 2 Storm Control Picture 5 2 1 Storm control Picture 5 2 2 Storm control Port Configuration After enable the global situation storm control please continue with function configu...

Страница 28: ...t Isolation Configuration In above port isolation page isolated ports can be configured Applying port isolation function to ensure port security 5 4 DoS configuration Picture 5 4 1 Global Dos Configur...

Страница 29: ...which will block the normal network service The most common DoS attacks are computer network bandwidth attack and connectivity attack Please configure DoS information in above pages 5 5 STP Configura...

Страница 30: ...rs can choose from STP and RSTP modes according to different network requirements Chapter 6 System Maintenance 6 1 Reboot Switch Picture 6 1 1 Reboot Switch Above page is used to reboot switch When ma...

Страница 31: ...on can be checked in this page and new software upgrade can be made 6 4 Ping Test Picture 6 4 1 Ping Test Configuration Ping test is to check if a specified Client can be reached the function is the s...

Страница 32: ...IP addresses of switch and PC must be in same network segment 6 6 Network Cable Test Picture 6 6 1 Network Cable Test Users can test the twisted pair cable working status Please select test ports then...

Страница 33: ...no data transmitting from PD and the switch can t learn a new address to do communication Waiting for 120s the swith will get auto updated address or transmitting data from the PD the switch will get...

Отзывы: