background image

 

COPYRIGHT 

All rights reserved. No part of this publication may be reproduced, stored in a retrieval 
system, or transmitted in any form or by any means, whether electronic, mechanical, 
photo copying, recording or otherwise, without the prior written permission of the 
publisher. 

FCC WARNING 

This equipment has been tested and found to comply with the limits for a 
class A device, pursuant to part 15 of FCC rules. These limits are designed 
to provide reasonable protection against harmful interference in a 
commercial installation. This equipment generates, uses and can radiate 
radio frequency energy and, if not installed and used in accordance with the 
instructions, may cause harmful interference to radio communication. 
Operation of this equipment in a residential area is likely to cause harmful 
interference, in which case, the user will be required to correct the 
interference at the user’s own expense. 

 

This is a Class A product. In a domestic environment, this product may 
cause radio interference in which case the user may be required to take 
adequate measures. 

 

Take special care to read and understand all the content in the warning 
boxes. 

 

Do not work on the system or connect or disconnect cables during 
periods of lightning activity. 

 

 

Warning

 

Warning

 

Содержание NGI-S04C2

Страница 1: ...1...

Страница 2: ...This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communication Operation o...

Страница 3: ...re that no exposed portion of the DC input power source wire extends from the terminal block plug Ethernet cables must be shielded when used in a central office environment If a redundant power system...

Страница 4: ...t at the bottom of the rack If the rack is provided with stabilizing devices install the stabilizers before mounting or servicing the unit in the rack This unit might have more than one power supply c...

Страница 5: ...area can be accessed only through the use of a special tool lock and key or other means of security No user serviceable parts inside Do not open This equipment must be grounded Never defeat the ground...

Страница 6: ...N 28 4 2 1 2 WEB CONFIGURATION 29 4 2 2 LOOP DETECTION CONFIGURATION 30 4 2 2 1 CLI CONFIGURATION 31 4 2 2 2 WEB CONFIGURATION 32 4 2 3 PORT PRIORITY 34 4 2 3 1 CLI CONFIGURATION 34 4 2 3 2 WEB CONFIG...

Страница 7: ...WITCH MANAGEMENT 71 5 3 2 QUICK CONFIGURATION MENU 72 5 3 2 1 IP CONFIGURATION 73 5 3 2 2 LOOP DETECTION CONFIGURATION 74 5 3 2 3 PORT CONFIGURATION 75 5 3 2 4 PORT MIRROR CONFIGURATION 76 5 3 2 5 POR...

Страница 8: ...T STATISTICS 108 7 3 1 CLI CONFIGURATION 108 7 3 2 WEB INFORMATION 108 7 4 PORT UTILIZATION 109 7 4 1 CLI CONFIGURATION 109 7 4 2 WEB PORT UTILIZATION 109 7 5 SYSLOG 110 7 5 1 CLI CONFIGURATION 110 7...

Страница 9: ...NFIGURATION 126 8 3 SNTP 126 8 3 1 CLI CONFIGURATION 127 8 3 2 WEB CONFIGURATION 129 8 4 SYSTEM INFORMATION 131 8 4 1 CLI CONFIGURATION 131 8 4 2 WEB CONFIGURATION 131 8 5 SYSTEM MAINTENANCE 132 8 5 1...

Страница 10: ...SFP slots to satisfy new and evolving network demands In addition the switch contains dual power inputs to ensure reliability and maximize network up time Other integrated features of the switch inclu...

Страница 11: ...r Control Storm Control VLAN Setting Diagnostic Alarm Information Port Mirroring Port Statistics Port Utilization and Threshold Remote System Log Syslog Management SNMP v1 v2c v3 SNMP trap SNTP Firmwa...

Страница 12: ...r Zero Overload current protection Support Power reverse polarity protection Support Relay output One with current carrying capacity of 1A 24V DC Power consumption 10W system Mechanical Dimension W x...

Страница 13: ...into the ports and the ports will adjust according to the end node devices The following are recommended cabling for the RJ45 connectors 1 10Mbps Cat 3 or better 2 100 1000Mbps Cat 5e or better SFP S...

Страница 14: ...l mounted or wall mounted optional in cabinet or enclosure 3 2 Installation The location chosen for installing the Switch may greatly affect its performance When selecting a site we recommend consider...

Страница 15: ...t the device straight up to unhook it from the DIN rail Wall Mount Installation Location The NGI S04C2 can be placed on a horizontal surface through wall mounted kit Place the switch by using mounting...

Страница 16: ...The product should be mounted in an Industrial Control Panel and the ambient temperature should not exceed 60 C 140 F Attention A corrosion free mounting rail is advisable When installing make sure t...

Страница 17: ...ng the wiring can overheat causing serious damage to your equipment Please read and follow these guidelines Use separate paths to route wiring for power and devices If power wiring and device wiring p...

Страница 18: ...rrect power supply voltage is listed on the product label Check the voltage of your power source to make sure that you are using the correct voltage Do NOT use a voltage greater than what is specified...

Страница 19: ...al block PWR 4 pin mini DIN connector is not available RPS Green Illuminated Redundant secondary Power on Off Redundant secondary Power off or failure ALM Red Illuminated Alarm for following condition...

Страница 20: ...ant power input from terminal block ON Redundant power alarm reporting is enabled OFF Redundant power alarm reporting is disabled Warning Do not block air ventilation holes as heat dissipated pass thr...

Страница 21: ...and subsequent steps after plug in 4 1 Wizard Settings Wizard will be use full to configure basic settings in the device like switch User account with host name management IP And access Mode The Wizar...

Страница 22: ...the management IP user can select DHCP mode or static mode to configure the switch IP as shown below Step 3 Access Mode is to access the device have 2 options Security mode HTTPs SSH and SNMPv3 and No...

Страница 23: ...lt Username admin Password admin After successful completion of the settings the web link will take you to the Topology Map as landing page shown below where you can access the Dashboard Login and Inf...

Страница 24: ...for the end users tricolor scheme as the Topology Map The dashboard setting enables you to control the performance of the switch like CPU Memory Port Tx Usage Port Rx Usage Use the learn option to obt...

Страница 25: ...itical percentage or disable the feature Memory Usage User can configure threshold value to normal alert critical percentage or disable the feature Port Tx Usage User can configure threshold value to...

Страница 26: ...sly Typically once a party begins receiving a signal it must wait for the transmitter to stop transmitting before replying Full Duplex A full duplex or sometimes double duplex system allows communicat...

Страница 27: ...ed speed and duplex mode when making a connection thus requiring you to make sure that the settings of the peer port are the same in order to connect Flow Control A concentration of traffic on a port...

Страница 28: ...scription for the specific port interface no description This command configures the default port description interface cable test This command diagnostics the Ethernet cable and shows the broken dist...

Страница 29: ...or port s Flow Control User can configure flow control on interface on off Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh Port Status Port...

Страница 30: ...overy When the loop detection is enabled the Switch will send one probe packets every two seconds and then wait for this packet If it receives the packet at the same port the Switch will disable this...

Страница 31: ...command enables the port It can unblock port blocked by loop detection interface loop detection recovery disable enable This command enables disables the recovery function on the port interface loop...

Страница 32: ...uard protection State Select Enable to use the loop guard feature on the Switch Loop Recovery Select Enable to reactivate the port automatically after the designated recovery time has passed Recovery...

Страница 33: ...op guard feature is enabled Status This field displays if the port is blocked Loop Recovery This field displays if the loop recovery feature is enabled Recovery Time min This field displays the recove...

Страница 34: ...This command configures the 802 1p priority mapping to the service queue to default configure qos mode high first This command configures the QoS scheduling mode to high_first each hardware queue wil...

Страница 35: ...Priority Status Port This field displays a port number Priority This field displays the priority for a port 4 3 Ring Configuration 4 3 1 ERPS Introduction The ITU T G 8032 Ethernet Ring Protection Swi...

Страница 36: ...controlled e g for blocking or flushing by the Ethernet ring protection control process ERP control process of only one Ethernet ring Each major ring or sub ring must have its own RPL In an Ethernet...

Страница 37: ...he expiry of a WTR timer which is used to avoid toggling protection states in case of intermittent defects In non revertive operation the traffic channel continues to use the RPL if it is not failed a...

Страница 38: ...enter ERPS node to configure detail ring configurations erps ring show This command displays the configurations of the ring erps ring control vlan This command configures a control vlan for the ERPS r...

Страница 39: ...new instance and specifies its control vlan and data vlan config erps inst no instance INSTANCE_ID This command removes an instance config erps inst show This command displays all of the instance con...

Страница 40: ...from 5 to 12 min MEL Configures the Control MEL for the ring The Valid value is from 0 to 7 The default is 7 Guard Timer Configures the Guard time for the ring The Valid value is from 10 to 2000 ms Le...

Страница 41: ...eb Configuration Parameter Description Instance Settings Instance Configures the instance ID The valid value is from 1 to 31 Control VLAN Configures the control vlan for the instance The valid value i...

Страница 42: ...hat causes a topology change first notifies the root bridge and then the root bridge notifies the network Both RSTP and STP flush unwanted learned addresses from the filtering database In STP the port...

Страница 43: ...is value according to the speed of the bridge The slower the media the higher the cost How STP Works After a bridge determines the lowest cost spanning tree with STP it enables the root port and the p...

Страница 44: ...port receiving and sending data normal operation STP still monitors incoming BPDUs that would indicate it should return to the blocking state to prevent a loop Disabled Not strictly part of STP a net...

Страница 45: ...st priority becomes the STA root device However if all devices have the same priority the device with the lowest MAC address will become the root device Port Priority Set the port priority in the swit...

Страница 46: ...ds Per port STP state enabled Per port Priority 128 Per port Edge port disabled Per port BPDU filter disabled Per port BPDU guard disabled Per port BPDU Root guard disabled Per port Path Cost depend o...

Страница 47: ...command configures the bridge message max age time sec configure no spanning tree max age This command configures the default values for max age time configure spanning tree mode rstp stp This command...

Страница 48: ...e enable This command configures enables disables the bpdufilter function for the specific port if range spanning tree bpduguard disable enable This command configures enables disables the bpduguard f...

Страница 49: ...eturn to a blocking state otherwise temporary data loops might result The allowed range is 4 to 30 seconds Max Age This is the maximum time in seconds the Switch can wait without receiving a BPDU befo...

Страница 50: ...y for this bridge Priority determines the root bridge which in turn determines the Root Hello Time Root Maximum Age and Root Forwarding Delay Pathcost Method Path cost is the cost of transmitting a fr...

Страница 51: ...guard function for the specific port Port Status Active The state of the STP function Role The port role Should be one of the Alternated Designated Root Backup None Status The port s status Should be...

Страница 52: ...MODBUS TCP supports different types of data format for reading The primary four types of them are Data Access Type Function Code Function Name Note Bit access Physical Discrete Inputs 2 Read Discrete...

Страница 53: ...affic passing through your Switch The Switch can perform IGMP snooping on up to 4094 VLANs You can configure the Switch to automatically learn multicast group membership of any VLANs The Switch then p...

Страница 54: ...s when the IGMP snooping function is enabled drop Drop all of the unknown multicast packets interface igmp querier mode auto fixed edge This command specifies whether or not and under what conditions...

Страница 55: ...ubnet Mask is 255 255 255 0 Default Gateway is 0 0 0 0 4 4 3 1 CLI Configuration Node Command Description enable ping IPADDR c COUNT This command sends an echo request to the destination host The c pa...

Страница 56: ...nd configures a DHCP client function for the system Disable Use a static IP address on the switch Enable Renew Use DHCP client to get an IP address from DHCP server Example The procedures to configure...

Страница 57: ...is to configure Management VLAN Modbus TCP Settings Modbus TCP State Select option to enable disable the Modbus TCP on the Switch IGMP Snooping Settings IGMP Snooping State Select Enable to activate I...

Страница 58: ...ly get an IP address from a DHCP server Click Renew to have the Switch re get an IP address from the DHCP server Select Disable if you want to configure the Switch s IP address manually IP Address Con...

Страница 59: ...mation about the connected device If the neighbor device is a Switch which supports Lamungan Management function click the right key of the mouse The menu will be displayed on the screen And then you...

Страница 60: ...ound image so that you can identify easily where the switch has been placed Picture To choice a file which you want to display it in the background and the Preview window will display your select imme...

Страница 61: ...r to select standard color for the background The Preview window will display your selection Client Switch Management By right clicking on the neighbor non lite switch this menu will appear and can co...

Страница 62: ...cation of all devices on the map so that it restores its places after refresh Login Web GUI To log in to the client device web GUI and make necessary changes By right clicking on the neighbor lite swi...

Страница 63: ...on the Switch is enabled Tx Interval 30 seconds Tx Hold 4 times Time To Live 120 seconds 5 2 1 1 CLI Configuration Node Command Description enable show lldp This command displays the LLDP configuratio...

Страница 64: ...et on the specific port tx only Transmit the LLDP packet on the specific port only rx only Receive the LLDP packet on the specific port 5 2 1 2 Web configuration Parameter Description LLDP Settings St...

Страница 65: ...gistration of lamungan device type like ipcam plc switch pc configure no lamungan device mac This command is delete configure of manual registration lamungan device using mac of ipcam plc switch pc co...

Страница 66: ...roduct Name User can configure name of the product selected for manual registration System Name User can configure the system name for the manual registration Apply Click Apply to take effect the sett...

Страница 67: ...ONVIF device gets connect to it 5 2 3 1 CLI Configuration Node Command Description enable show onvif neighbors This command displays the onvif neighbor discovery configure onvif enable This command i...

Страница 68: ...resh Click Refresh to begin configuring this screen afresh ONVIF Neighbor Information Port The connected port of the ONVIF device IP Address The IP address of the ONVIF device MAC Address The MAC addr...

Страница 69: ...creen If the neighbor device is a Switch which supports Lamungan server function click the right key of the mouse The menu will be displayed on the screen And then you can click an item which you want...

Страница 70: ...ails of the devices connected to the host by placing the cursor on it When there is something wrong with the device the screen will appear as shown so that you can find the details of events that have...

Страница 71: ...as shown Non Lite Switch Menu Save All Device Locations To fix the location of all devices on the map so that it restores its places after refresh Login Web GUI To log in to the client device web GUI...

Страница 72: ...By right clicking on the neighbor lite management switch this menu will appear and you can configure as shown By right clicking on the neighbor switch only lite management switches this menu will appe...

Страница 73: ...Pv4 address for your Switch in dotted decimal notation For example 192 168 0 254 Subnet Mask Configures a IP subnet mask of your Switch in dotted decimal notation for example 255 255 255 0 Default Gat...

Страница 74: ...configure loop detection State Select option to enable disable the loop detection feature on port s Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this scree...

Страница 75: ...e port State Select option to enable disable the port Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh Port Status Port This field displays t...

Страница 76: ...the Switch Source Port Selects a port which packets received and transmitted by this port will be copied to the destination port Destination Port Select a port which connects to a network traffic anal...

Страница 77: ...h to begin configuring this screen afresh Port Priority Status Port This field displays a port number Priority This field displays the priority for a port 5 3 2 6 Storm Control Configuration Parameter...

Страница 78: ...the port 5 3 2 7 Save Configuration Parameter Description Save Configuration Save Configuration Click Save Configuration to save the current running configuration to the NVRAM 5 3 2 8 Save All Device...

Страница 79: ...With 802 1X port based authentication the supplicant provides credentials such as user name password or digital certificate to the authenticator and the authenticator forwards the credentials to the a...

Страница 80: ...2 1x port the switch assigns clients to a guest VLAN when the switch does not receive a response to its EAP request identity frame or when EAPOL packets are not sent by the client Port Parameters Admi...

Страница 81: ...mand displays the current user accounts for the local authentication enable show dot1x accounting record This command displays the local accounting records configure dot1x authentication disable enabl...

Страница 82: ...eq 1 10 This command sets the max req times of a port 1 10 interface dot1x port control auto force authorized force unauthorized This command configures the port control mode on the port interface dot...

Страница 83: ...elf to authenticate However only a certain number of accounts can exist at one time RADIUS is a security protocol used to authenticate users by means of an external server instead of an internal devic...

Страница 84: ...ry Radius Server is down Global Status State This field displays if 802 1x authentication is Enabled or Disabled Authentication Method This field displays if the authentication method is Local or RADI...

Страница 85: ...n Select In to drop only incoming packets on the port when a user has not passed 802 1x port authentication Re authentication Specify if a subscriber has to periodically re enter his or her user name...

Страница 86: ...thentication settings back to default Apply Click Apply to add modify the settings Refresh Click Refresh to begin configuring this screen afresh Port Status Port This field displays the port number 80...

Страница 87: ...rules the system will do the actions deny deny means rejecting these packets The Action Resolution engine collects the information action and metering results from the hit entries if more than one rul...

Страница 88: ...nd configures the ether type for the profile Where the STRING is a hex decimal value e g 08AA acl no ethertype This command removes the limitation of the ether type from the profile acl source mac hos...

Страница 89: ...to filter a range of MAC in the packets source MAC or destination MAC For Example source mac 00 01 02 03 04 05 ff ff ff ff 00 The command will filter source MAC range from 00 01 02 03 00 00 to 00 01 0...

Страница 90: ...f the source MAC of the packets that you want to filter If the Source MAC field has been configured and this field is empty it means the profile will filter the one MAC configured in Source MAC field...

Страница 91: ...address of the device directly connected to a particular port and allow traffic through We will ask the question How do we control who and how many can connect to a switch port This is where port sec...

Страница 92: ...his command enables disables the global port security function interface port security disable enable This command enables disables the port security function on the specific port interface port secur...

Страница 93: ...SH and Telnet service individually 6 4 1 CLI Configuration Node Command Description enable show server status This command displays the current server status configure ssh server This command enables...

Страница 94: ...tate Selects Enable or Disable to enable or disable the SNMPv1 v2c service SNMPv3 Server State Selects Enable or Disable to enable or disable the SNMPv3 service SSH Server State Selects Enable or Disa...

Страница 95: ...Pv3 service status SSH Server Status Displays the current SSH service status Telnet Server Status Displays the current Telnet service status 6 5 Storm Control 6 5 1 Alarm Threshold When the selected p...

Страница 96: ...s Destination Lookup Failure or DLF packets the Switch receives per second on the ports When the maximum number of allowable broadcast multicast and unknown unicast packets is reached per second the s...

Страница 97: ...igure the packet rate in pps to allow on interfaces Disable for 0 and ranges 1 5000 Type Click the check box to select Multicast Broadcast DLF storm control Apply Click Apply to take effect the settin...

Страница 98: ...a VLAN with all Ethernet ports If it does not form a VLAN with a particular port then the Switch cannot be managed from that port 6 6 1 1 CLI Configuration Node Command Description enable show port i...

Страница 99: ...it will communicate with the port currently being configured Select All Deselect All Click Select All to mark all ports as egress ports and permit traffic Click Deselect All to unmark all ports and i...

Страница 100: ...contains two bytes of TPID Tag Protocol Identifier residing within the type length field of the Ethernet frame and two bytes of TCI Tag Control Information starts after the source address field of th...

Страница 101: ...of the VLAN The switch is further responsible for ensuring that ports in a different VLAN do not receive the information This approach is quite simple fast and easy to manage in that there are no com...

Страница 102: ...phabet or hyphens or underscores _ The maximum length of the name is 16 characters vlan no name This command configures the vlan name to default Note The default vlan name is VLAN vlan_ID VLAN1 VLAN2...

Страница 103: ...ble VLAN s are 5 vlan range 1 4 This command will allow user to create VLAN range maximum allowed VLAN s are 5 vlan range add PORTLISTS This command adds a port or a range of ports to the vlans vlan r...

Страница 104: ...ber to configure from the drop down box Select All to configure all ports at the same time Role Select role on interface as access or trunk VLAN User can configure maximum of 5 VLAN s on each interfac...

Страница 105: ...ill send alarm message when the redundant power supply disconnect 7 1 1 CLI Command Node Command Description enable show alarm info This command displays alarm information 7 1 2 Web Configuration Para...

Страница 106: ...w mirror This command displays the current port mirroring configurations configure mirror disable enable This command disables enables the port mirroring on the switch configure mirror destination por...

Страница 107: ...et the common settings and then make adjustments on a port by port basis Source Port Selects a port to monitor packets received and transmit or both Monitor Mode Select a port to monitor as destinatio...

Страница 108: ...Information Parameter Description Port Select a port or a range of ports to display their statistics Rx Packets The field displays the received packet count Tx Packets The field displays the transmitt...

Страница 109: ...utilization Example L2SWITCH show port utilization Port Speed Utilization 9 100 0 001 7 4 2 Web Port Utilization Parameter Description Port Utilization Port The field displays the port ID Speed The fi...

Страница 110: ...ies If the file is full the oldest one will be replaced 7 5 1 CLI Configuration Node Command Description enable show syslog The command displays all of log message recorded in the Switch enable show s...

Страница 111: ...erver when any new log message occurred Apply Click Apply to add modify the settings Refresh Click Refresh to begin configuring this screen afresh Log Level Select Alert Critical Error Warning Notice...

Страница 112: ...erface 1 0 4 This command enters the interface configure node interface port utilization threshold rate value This command configures the port utilization threshold value interface port utilization th...

Страница 113: ...alarm threshold for the port s Packet Rate Configures the threshold rate When the port packet rate over the threshold the Switch will send trap and syslog Apply Click Apply to take effect the setting...

Страница 114: ...cations 8 1 1 SNMP configuration Allows user to enable and disable SNMP protocol globally By default SNMP state will be disabled User can change the system name with respect to their requirement also...

Страница 115: ...y parameters of SNMP clients in an SNMP v1 and SNMP v2c environments The default SNMP community is public for both SNMP v1 and SNMP v2c Network ID of Trusted Host The IP address is a combination of th...

Страница 116: ...vice the SNMP agent The community string is included in every packet that is transmitted between the SNMP manager and the SNMP agent Rights Select Read Only to allow the SNMP manager using this string...

Страница 117: ...disable enable This command enables disables the alarm over heat trap configure snmp trap event alarm over load disable enable This command enables disables the alarm over load trap configure snmp tr...

Страница 118: ...Trap when system is over load Trap when system power is over voltage under voltage RPS over voltage RPS under voltage BPDU Guard Loop Detection Port Admin State Change Port Link Change STP Topology C...

Страница 119: ...nterface snmp port link change trap This command enables the link change trap on the specific port interface no snmp port link change trap This command disables the link change trap on the specific po...

Страница 120: ...er IPADDR VERSION COMMUNITY String This command configures the trap receiver s configurations including the IP address version v1 or v2c and community String 8 1 5 2 Web Configuration Parameter Descri...

Страница 121: ...curity and the view based access control model VACM for access control USM specifies authentication and encryption 8 2 1 SNMPv3 Group 8 2 1 1 CLI Configuration Node Command Description enable show snm...

Страница 122: ...ifications to members of the group default value is none Notify View By using a notify view a group determines the list of notifications its users can receive default value is none Apply Click Apply t...

Страница 123: ...mmand changes the node to configure node configure snmp user USERNAME GROUPNAME noauth Configurs v3 user of non authentication configure snmp user USERNAME GROUPNAME auth MD5 SHA STRINGS Configurs v3...

Страница 124: ...not encrypted priv means messages are authenticated and encrypted Auth Algorithm Select MD5 or SHA Algorithm when security level is auth or priv Auth Password Set the password for this user when secur...

Страница 125: ...MPv3 View 8 2 3 1 CLI Configuration Node Command Description enable show snmp view This command displays all snmp v3 view enable configure terminal This command changes the node to configure node conf...

Страница 126: ...h to begin configuring this screen afresh View Status View Name This field displays the v3 view name View Subtree This field displays the subtree View Type This field displays the subtree adding to th...

Страница 127: ...e time server s IP address is not configured the Switch will not send any SNTP request packets 4 If no SNTP reply packets the Switch will retry every 10 seconds forever 5 If the Switch has received SN...

Страница 128: ...third fourth last Sunday Monday Tuesday Wednesday Thursday Friday Saturday MONTH HOUR This command sets the start time of the Daylight Saving Time configure time daylight saving time end date first s...

Страница 129: ...nter the system date and time manually New Time Enter the new date in year month and day format and time in hour minute and second format The new date and time then appear in the Current Date and Curr...

Страница 130: ...an Union start using Daylight Saving Time at the same moment 1 A M GMT or UTC So in the European Union you would select Last Sunday 3 March and the last field depends on your time zone In Germany for...

Страница 131: ...window appears each time you log into the program Alternatively this window can be accessed by clicking System Information 8 4 1 CLI Configuration Node Command Description enable show model This comm...

Страница 132: ...efresh Click Refresh to begin configuring this screen afresh 8 5 System Maintenance 8 5 1 Configuration Upload and Download Configuration 8 5 1 1 CLI Configuration Node Command Description configure w...

Страница 133: ...the current configurations to local host Reset Configuration Click the Reset button to reset the system configurations to default values 8 5 2 Firmware Upgrade Firmware 8 5 2 1 CLI Configuration Node...

Страница 134: ...to create up to 6 user accounts The username and password should be the combination of the digits or the alphabet The last admin user account cannot be deleted Users should input a valid user account...

Страница 135: ...be the combination of digits and the alphabet The last admin user account cannot be deleted The maximum length of the username and password is 32 characters 8 6 1 CLI Configuration Node Command Descr...

Страница 136: ...and write or normal read only for this user account Dot1x user for radius Apply Click Apply to take effect the settings Refresh Click Refresh to begin configuring this screen afresh User Account List...

Страница 137: ...cally TRIPP LITE is not liable for any costs such as lost profits or revenue loss of equipment loss of use of equipment loss of software loss of data costs of substitutes claims by third parties or ot...

Страница 138: ...ll be required to correct the interference at his own expense The user must use shielded cables and connectors with this equipment Any changes or modifications to this equipment not expressly approved...

Отзывы: