J-Tech Digital JTD-2886 Скачать руководство пользователя страница 1

24 PORT POE SWITCH

 

JTD-2886 | JTECH-NSP24

 

 

48 PORT POE SWITCH 

JTD-2887 | JTECH-NSP48

 

 

 

 

 

 

 

 

 

 

 

 

USER MANUAL 

J-TECH DIGITAL INC. 

9807 EMILY LANE 

STAFFORD, TX 77477 

TEL: 1-888-610-2818 

E-MAIL: [email protected]  

Содержание JTD-2886

Страница 1: ...24 PORT POE SWITCH JTD 2886 JTECH NSP24 48 PORT POE SWITCH JTD 2887 JTECH NSP48 USER MANUAL J TECH DIGITAL INC 9807 EMILY LANE STAFFORD TX 77477 TEL 1 888 610 2818 E MAIL SUPPORT JTECHDIGITAL COM...

Страница 2: ...ement 10 2 1 IP Configuration 10 2 2 NTP Configuration 11 2 3 Time Zone 12 2 4 SNMP Configuration 13 2 4 1 SNMP System Configuration 14 2 4 2 SNMP Trap Configuration 15 2 4 3 Communities 16 2 4 4 User...

Страница 3: ...1 5 1 VLAN 31 5 2 Port Isolation 35 5 2 1 Port Group 35 5 2 2 Port Isolation 36 5 3 STP 36 5 3 1 STP Bridge Settings 36 5 3 2 MSTI Mapping 38 5 3 3 MSTI Priorities 39 5 3 4 STP Bridge Port 40 5 3 5 MS...

Страница 4: ...Configuration 56 7 Security Configuration 57 7 1 Password 57 7 2 802 1X 57 7 3 DHCP Snooping 59 7 3 1 DHCP Overview 59 7 3 2 About DHCP Snooping 60 7 3 3 DHCP Snooping Configuration 61 7 4 IP MAC Sou...

Страница 5: ...72 9 1 Restart Device 72 9 2 Factory Default 72 9 3 Firmware Upgrade 73 9 4 Firmware Select 73 9 4 1 Download Configuration File 74 9 4 2 Upload Configuration File 75 9 4 3 Activate Configuration 76 9...

Страница 6: ...function attack prevention function ensuring secure management The series complies with FCC and CE standards and support 1 channel ac power input Using the mute fan can adapt to work environment tempe...

Страница 7: ...tion can be managed configured and monitored via embedded Web based HTML interface By a standard browser you can manage switch at any remote site in the network The browser as a universal access tool...

Страница 8: ...8 P a g e Default User Name admin Default Password system 1 5 Web based User Interface After entering the username and password the main screen appears as shown in Figure 1 2...

Страница 9: ...ifferent states they are illustrated as follows 1 6 Main Menu Using the onboard Web agent you can define system parameters manage and control the Managed Switch and all its ports or monitor network co...

Страница 10: ...P a g e 2 Network Management 2 1 IP Configuration Note IP address of switch is 192 168 2 1 by default and the default subnet mask is 255 255 255 0 24 Click Network Admin IP and the screen will show a...

Страница 11: ...fault If user needs to use other VLAN for switch management please first add VLAN in the VLAN module and add the relevant port to the VLAN 2 2 NTP Configuration NTP is an acronym for Simple Network Ti...

Страница 12: ...er configuration was set please click Save to save the setting 2 3 Time zone Time zone is to set the time of the switch users can set the time according to their locations You can get into the time zo...

Страница 13: ...d and solve network problems and plan for network growth This switch support SNMPv1 v2c v3 Different versions of SNMP provide different security level for management stations and network devices In SN...

Страница 14: ...al trap includes authentication failure networking changes and cold hot start trap MIB MIB is a collection of managed objects residing in a virtual information store Collections of related managed obj...

Страница 15: ...a g e Configuration object and description is 2 4 2 SNMP Trap Configuration User can enable or disable SNMP Trap function and set configuration Click Network Admin SNMP Trap then this screen will sho...

Страница 16: ...ntication mechanism The administrator can set authentication and Encryption function The authentication is to verify the validity of a message sender and to avoid illegal user access Encryption is for...

Страница 17: ...17 P a g e Configuration Instruction 2 4 5 Views Users can set the visit view of SNMPv3 Click Network Admin SNMP View As below...

Страница 18: ...18 P a g e 2 4 6 Access Uses can set an Access to load a built Views Click Network Admin SNMP Access as below Figure 2 4 6 SNMPv3 Access Load Set...

Страница 19: ...19 P a g e 2 4 7 Groups Users can set Groups to load built Users and Access Click Network Admin SNMP Groups as below Figure 2 4 7 SNMPV3 Groups Load Setting...

Страница 20: ...0 P a g e Configuration Instruction 2 5 System Log Configuration Users can configure switch s system log via following screen after clicking Network Admin Syslog Configuration object and description i...

Страница 21: ...21 P a g e 3 Port Configuration 3 1 Port Configuration This page is for configuring port specifications of switch After clicking Port Configure Ports this screen will appear as...

Страница 22: ...This switch supports up to 13 groups Link Aggregation 2 to 8 ports as one group Note If any port in the link aggregation group is disconnected data packet that sent to disconnected port will share lo...

Страница 23: ...23 P a g e Configuration object and description is Click Save to store and active settings Note It allows a maximum of 8 ports to be aggregated as 1 static trunk group at the same time...

Страница 24: ...ion lets you group up to eight consecutive ports into a single dedicated connection This feature can expand bandwidth to a device on the network LACP operation requires full duplex mode For more detai...

Страница 25: ...des monitoring of network traffic that forwards a copy of each incoming or outgoing packet from one port of a network switch to another port where the packet can be studied It enables the manager to k...

Страница 26: ...nation port should have equal or higher speed comparing to source port Besides source port and destination port should not be same one 3 4 Thermal Protection Configuration Thermal protection is for de...

Страница 27: ...ver Ethernet PoE means Ethernet network power supply via 100BASE TX 1000BASE T Its maximum power distance is 100 meters By PoE power system based on Ethernet wiring network of UTP Cat5 or higher Cable...

Страница 28: ...it will go to next step 2 PD Classification After detecting PDs PSE will classify them and recognize what is the power that PD required 3 Power up When above 2 steps finished PSE start feeding requir...

Страница 29: ...29 P a g e 4 1 PoE Setting After clicking PoE PoE Setting user can make PoE settings in following screen Configuration object and description is...

Страница 30: ...user can check and look PoE status of all ports after clicking PoE PoE Status 4 3 PoE Scheduling This series supports PoE scheduling users can set timing PoE reboot and enable disable PoE on time sche...

Страница 31: ...ation technology that logically divide one physical LAN into multiple broadcast area network multiple VLAN Hosts within a VLAN can communicate directly But VLAN groups can not directly communicate wit...

Страница 32: ...32 P a g e Configuration object and description is...

Страница 33: ...33 P a g e...

Страница 34: ...34 P a g e...

Страница 35: ...h support port groups Members of port group can forward date Note port can belong to multiple port groups Data can be forwarded among any port that belong to one port group After clicking Advanced Con...

Страница 36: ...settings 5 3 STP The Spanning Tree Protocol STP can be used to detect and disable network loops and to provide backup links between switches bridges or routers This allows the switch to interact with...

Страница 37: ...37 P a g e Configuration object and description is...

Страница 38: ...38 P a g e Click Save to store and active settings 5 3 2 MSTI Mapping Users can set the mapping Click Advanced Configure Spanning Tree MSTI Mapping Configuration Instruction...

Страница 39: ...e and configuration revision of all switches in the looped network when set MSTP 5 3 3 MSTI Priorities Users can set MSTI priorities click advanced configure Spanning Tree MSTI Priorities Note The pri...

Страница 40: ...40 P a g e 5 3 4 STP Bridge Port After clicking Advanced Configure Spanning Tree Bridge Ports following screen will appear Configuration object and description is...

Страница 41: ...41 P a g e Click Save to store and active setting 5 3 5 MSTI Ports Users can set MSTI ports click Advanced Configure Spanning Tree MSTI Ports Configuration Instruction...

Страница 42: ...P a g e 5 4 MAC Address Table This page allows you to configure Mac address table settings After clicking Advanced Configure Mac Table following screen will appear Configuration object and description...

Страница 43: ...rs the exchange of IGMP messages and copies them to the CPU for feature processing The overall purpose of IGMP Snooping is to limit the forwarding of multicast frames to only ports that are a member o...

Страница 44: ...nfiguration object and description is 5 5 2 IGMP Snooping VLAN Configuration After clicking Advanced Configure IGMP Snooping VLAN Configuration following screen will appear Configuration object and de...

Страница 45: ...45 P a g e 5 5 3 Port Filtering Profile Set Port filtering profile click Advanced Configure IGMP Snooping Port Filtering Profile...

Страница 46: ...C Profile Users can set the filter multicast list click Advanced Configure IPMC Profile Address Entry Configuration Instruction Click Save to enable your setting Bind the filter multicast list click A...

Страница 47: ...control mechanism working on the Layer 2 Ethernet switch When enable IPV6 MLD Snooping switch receives the IPV6 MLD message by listening for each interface to exchange interface and multicast group ad...

Страница 48: ...48 P a g e 5 7 1 Basic Configuration Click Advanced Configure IPv6 MLD Snooping Basic Configuration to check the configuration information of IPv6 MLD Snooping Configuration Instruction...

Страница 49: ...onfiguration information of IPv6 MLD Snooping Configuration Instruction 5 8 ERPS ERPS Ethernet Ring Protection Switching it integrates OAM function and APS protocol If the ring network was interrupted...

Страница 50: ...le ERPS STP of ring port should be disabled After clicking Advanced Configure ERPS following screen will appear Configuration object and description is Click Add New Ring Group to create a new ERPS ri...

Страница 51: ...e number under Ring ID it will go to the page for Ring Configuration as following screen Configuration object and description is After clicking VLAN config it will go the page of Rapid Ring VLAN Confi...

Страница 52: ...t uses periodic broadcasts to advertise information about the sending device Advertised information is represented in Type Length Value TLV format according to the IEEE 802 1ab standard and can includ...

Страница 53: ...uration object and description is 5 10 Loop Protection Loop protection is to avoid broadcast loops After clicking Advanced Configure Loop Protection following screen will appear Configuration object a...

Страница 54: ...s you to assign various grades of network service to different types of traffic such as multi media video protocol specific time critical and file backup traffic This function n can not only reserve b...

Страница 55: ...55 P a g e Configuration object and description is 6 2 Port Policing After clicking QoS Configure Port Policing following screen will appear...

Страница 56: ...56 P a g e Configuration object and description is 6 3 Storm Control Configuration After clicking QoS Configure Storm Control following screen will appear...

Страница 57: ...sword Figure 7 1 System Password Configuration Screen Click Save to store and active settings 7 2 802 1X In the 802 1X world the user is called the supplicant the switch is the authenticator and the R...

Страница 58: ...d forwards it When authentication is complete the RADIUS server sends a special packet containing a success or failure indication Besides forwarding this decision to the supplicant the switch uses it...

Страница 59: ...a period of time it will resend DHCP DISCOVER message After received DHCP DISCOVER message DHCP Server will assign sources IP address for example to client and then send DHCP OFFER message to DHCP cl...

Страница 60: ...When DHCP snooping is enabled globally and enabled on a VLAN interface DHCP messages received on an untrusted interface from a device not listed in the DHCP snooping table will be dropped Table entri...

Страница 61: ...Security Configure DHCP Snooping Setting following screen will appear Configuration object and description is Click Save to store and active settings 7 4 IP MAC Source Guard IP MAC Source Guard is a...

Страница 62: ...ps prevent IP spoofing attacks when a host tries to spoof and use the IP address of another host 7 4 1 Port Configuration In this page user can make IP MAC Source Guard Port Configuration After clicki...

Страница 63: ...nually set Static Table of IP MAC Guard to fulfill controlling function to port After clicking Security Configure IP MAC Source Guard Static Table followed screen will appear Configuration object and...

Страница 64: ...o block such attacks Only valid ARP requests and responses can go through DUT A Dynamic ARP prevents the untrust ARP packets based on the DHCP Snooping Database This page provides ARP Inspection relat...

Страница 65: ...65 P a g e 7 5 2 VLAN Configuration After clicking Security Configure ARP Inspection VLAN Configuration following screen will appear...

Страница 66: ...description is 7 5 3 Static Table User can manually configure ARP Inspection Static Table to control port After clicking Security Configure ARP Inspection Static Table following screen will appear Con...

Страница 67: ...object access rights ACL implementations can be quite complex for example when the ACEs are prioritized for the various situation In networking the ACL refers to a list of service ports or network ser...

Страница 68: ...68 P a g e 7 6 2 Rate Limiter Configuration User can make ACL Rate limiter configuration in this page After clicking Security Configure ACL Rate Limiter following screen will appear...

Страница 69: ...ve to store and active settings 7 6 3 Access Control List Configuration User can make Access Control List Configuration in this page After clicking Security Configure ACL Access Control List following...

Страница 70: ...kets to the IP address you defined Destination node will respond to those packets sent from switch So Ping test is to troubleshoot IP connectivity issues After clicking Diagnostics Ping followed scree...

Страница 71: ...ngth and operating conditions and to isolate a variety of common faults that can occur on the Cat5 twisted pair cabling After clicking Diagnostics Cable Diagnostics following screen will appear Click...

Страница 72: ...fter clicking Maintenance Restart Device following screen will appear 9 2 Factory Default This page is for making all settings to factory defaults After clicking Maintenance Factory Defaults following...

Страница 73: ...enance Firmware Upgrade following screen will appear Please click Browse to select the firmware that needed to upgrade And then click Upload to start upgrading 9 4 Firmware Select This page is for upg...

Страница 74: ...Activate Alternate Image to select the firmware In this page user can download upload activated or delete configuration files 9 4 1 Download Configuration File After clicking Maintenance Download foll...

Страница 75: ...lease choose a file and then click Download Configuration button to download 9 4 2 Upload Configuration File After clicking Maintenance Upload following screen will appear Then user can upload Configu...

Страница 76: ...fter clicking Maintenance Activate following screen will appear Then user can activate Configuration File 9 4 4 Delete Configuration File After clicking Maintenance Delete following screen will appear...

Страница 77: ...77 P a g e 10 Appendix 1 Term List...

Страница 78: ...password system 3 Would be both working if configure by web or CLI A Yes both ways are working 4 Why can t increase bandwidth after configuring Trunking A Please check if the information of Trunking s...

Страница 79: ...your product does not work properly because of a defect in materials of workmanship our company referred to as the warrantor will for the length of the period indicated as below Parts and Labor 18 Mon...

Страница 80: ...on faulty installation set up adjustments mis adjustment of consumer controls improper maintenance power line surge lightning damage modification or service by anyone other than a Factory Service cent...

Страница 81: ...81 P a g e WWW JTECHDIGITAL COM PUBLISHED BY J TECH DIGITAL INC 9807 EMILY LANE STAFFORD TX 77477 TEL 1 888 610 2818 E MAIL SUPPORT JTECHDIGITAL COM...

Отзывы: