Web Configuration Manual For Industrial Ethernet Switches
Web Configuration Manual For Industrial Ethernet Switches
1
Switch Web configuration guide
1 Overview
1.1 Introduction
In order to facilitate network administrators to operate and maintain network equipment, our company has
launched the Web management function for the equipment. Administrators can use the webpage directly
manage and maintain the equipment. The operating environment of Web administrator is shown in figure
1-1.
Figure 1-1 Web management operating environment
When the device leaves the factory, web server service has been enabled by default with default login
account: user name is admin, login password is admin, and IP address is 192.168.1.168. Users can use
these information to complete the first login of Web administrator.
Take the 4GX8GT switch as an example to introduce how to log in the device via Web. The specific steps
are as followed:
(1) Connect the device to the PC and connect the PC to the Ethernet port of the device (all ports belong
to VLAN 1 by default) with the network cable.
(2) Configure IP address for PC, and set the IP address of PC in the same network segment as the
default VLAN interface IP address of the device (except the default IP address of the device), such as
192.168.1.20.
(3) Launch the browser and enter your login information.
Figure 1-2 Web login page
2
Switch Web configuration guide
Start the browser on PC, enter "192.168.1.168" in the address bar and enter the Web login page of the
device, as shown in figure 1-2. Enter the default account "admin" and password "admin", and click the
"login" button to log in to the Web administrator. The system will automatically select the language
according to the operating system language used by the user, and the user can also manually switch
(including Chinese and English).
(1) For Windows browser, Edge is recommended and IE6 is not supported.
(2) In order to get better display effect, recommend to use Google browser, or 360 or baidu browser, as
shown in figure 1-3
3
Switch Web configuration guide
• The system does not automatically save the current configuration when exiting webmaster. Before exiting
Webmaster please save the current configuration.
Operation steps:
Click the "logout" button below the navigation bar on the Web administrator page (as shown in figure 1-6)
to exit the Web administrator.
4
Switch Web configuration guide
• After configuring all projects on the page, be sure to save the configuration, otherwise unsaved configuration
information will be lost due to restart and other operations.
Operation steps:
Click the "save" button below the navigation bar on the Web administrator page (as shown in figure 1-6)
to save the current configuration to the configuration file. The configuration is still valid after restart or
power-down restart.
There are two ways to save the configuration:
(1) In the current configuration page, click "ok" or "apply" button, save the current configuration into
memory. The save in this current does not really save the configuration items into the configuration file. If
the switch has power failure or other failures at this time, the configuration of the page will fail.
(2) Click the "save" button below the navigation bar, the system will automatically save the configuration
of all pages to the configuration file.
Organize the Web network management function menu of the device in the form of
The navigation
navigation tree. Users can choose the function menu conveniently in the navigation bar
bar
The selection results are displayed in the configuration area
Language
For switching languages, currently only Chinese and English are supported
selection
The
Configuration An area for users to configure and view
area
5
Switch Web configuration guide
(1) Product model (2) Navigation bar (3) Language selection (4) Configuration
area
6
Switch Web configuration guide
management configuration
PoE
interface Show/configure PD devices that PSE hangs
configuration
General Shows the status of ERPS, previous event, ring number, east
situation interface, west interface, etc
IGMP
Turn on/off the IGMP Snooping function
Snooping
IGMP static
Display/configure IGMP static groups
Switching group
General
Displays the MSTP port parameters
situation
Global
Display and set MSTP global parameters
configuration
Spanning tree
The MST
Display MSTP field information, modify the MSTP field
configuration
MAC
Set the aging time for MAC addresses
management
MAC Static
Configure static MAC addresses without aging table entries
management address
Filter
Used to discard packets containing a specific MAC address
addresses
Security The ACL Display port status, configure port properties, VLAN
Application
ownership
7
Switch Web configuration guide
General
Display/configure QoS, queue weights
situation
CoS
QoS Display/configure QoS CoS mapping
mapping
DSCP
Display/configure QoS DSCP mapping
mapping
Disable/
DHCP Enable/disable this feature
enable
Snooping
Trust port Set the trust port for DHCP Snooping
802.1 X General
Display 802.1x authentication profile
authentication situation
General
MAC Displays MAC authentication profile
situation
authentication
Configuration Configure MAC authentication
Global
RADIUS global configuration
The RADIUS configuration
Date and time Displays/sets the current system date and time
System
Download the
Setup to back up configuration files to localhost
backup
Factory data
Settings to restore the device to its factory configuration
reset
8
Switch Web configuration guide
Web tools Perform the ping/trace route operation and display the results
9
Switch Web configuration guide
2 Interface
• Due to the different parameters of electrical port and optical port, it is recommended to configure electrical port and
optical port separately when selecting multi-port configuration.
The port management module is used to configure and view the working parameters of the Ethernet
interface, including: name, description, port mode, media type, rate, duplex state, flow control, MTU, state,
as shown in figure 2-1.
Operation steps:
(1) Select [interface] [port management] in the navigation bar, as shown in figure 2-1.
(2) Check the ports to be configured (support multiple ports) and click the "edit" button to enter the page
as shown in picture 2-2.
(3) Configure the working parameters of the port, as shown in table 2-1.
(4) Click the [apply] button to complete the operation.
(5) Click the [save] button in the navigation bar to save the configuration.
10
Switch Web configuration guide
Duplex state
• AUTO: self negotiating duplex
• FULL duplex
• -sheldon: HALF duplex
Set the working mode of the port to support different working modes, which need
corresponding optical module support.
• 100base-fx: set the port to work in 100 MB light mode.
• 1000base-x: set the port to work in gigabit light mode.
• SGMII: set the port to work in SGMII mode, which needs to be configured
when the optical port inserts gigabit to 100 MBPS (SFP ge-fx) or
light-to-electricity (mini-gbic-gt) modules.
• 2500base-x: set the port to work in 2.5g optical port mode.
Port mode
• 10G base-x: set the port to work in 10G optical port mode.
When this end and the end of the device can enable the flow control function,
if the end of the device congestion, send a message to the end of the device,
notify the end of the device to temporarily stop sending messages; After
receiving the message, the opposite device will temporarily stop sending the
Flow control message to the opposite device. And vice versa. Thus, packet loss is
avoided.
Flow control can be realized only when the flow control function is turned on at
both the local port and the opposite port
11
Switch Web configuration guide
Set the frame length allowed for forwarding from 64 to 10240 bytes. The default is
MTU
1526 bytes.
Configuration examples:
Case requirements: configure port eth0/9 to work in 2.5g mode, turn off flow control, set MTU to 10000
bytes, and port description to ABC.
Step 1: Select [interface] [port management] in the navigation bar to enter the port management page
Step 2: Select port eth0/9 and click the [edit] button to enter the port configuration page, as shown in
figure 2-3.
Step 3: As shown in figure 2-3, follow the description of "ABC", medium type "SFP", port mode
"2500base-x", flow control "OFF", MTU "10000", management state "No shutdown", and configure
parameters.
Step 5: click the "save" button in the navigation bar to save the configuration.
Operation steps:
(1) Select [interface] [port speed limit] in the navigation bar and enter the port speed limit
configuration page, as shown in figure 2-4.
12
Switch Web configuration guide
(2) For ports that need to be configured with speed limit, enter corresponding values in the dialog box,
and the specific parameters are defined as shown in table 2-2.
(3) Click the "apply" button on the corresponding port to complete the operation.
(4) Click the "save" button in the navigation bar to save the configuration.
• This feature only supports single-port configuration, such as eth0/1, and if parameters are entered on other ports,
when eth0/1's apply button is clicked, parameters for other ports are cleared (configuration does not take effect).
• Limit values are deterministic, such as 1M, limit is 1024, but burst values are derived from empirical values. When the
burst numerical distribution is large, the flow peak is higher, the speed limit is stable, but the average speed may be
higher than the speed limit. When the burst value is small, the flow peak is low and the speed limit fluctuates greatly.
The average speed may be less than the speed limit. It is recommended to configure burst with a value of 4 times limit
and a small value of 16384.
Input burst flow (KB) Burst traffic limits in the input direction (Kbytes).
Output rate (KBPS) Bandwidth limit per second in the output direction (KBits).
Output burst flow
Output direction burst traffic limit (Kbytes)
(KB)
Application Sets the port speed limit function that enables the specified port.
Remove Clear the dialog box of what has been filled in.
13
Switch Web configuration guide
Configuration examples:
Case requirements: suppose the port eth0/1 of the switch is connected to the Internet, the traffic limit at
the port eth0/1 outlet is required, the bandwidth limit is 102400KBits per second, and the burst traffic limit
is 256Kbytes per second.
Step 1: Select [interface] [port speed limit] in the navigation bar to enter the port speed limit
configuration page.
Step 2: Fill in the corresponding parameter dialog box for port eth0/1, as shown in figure 2-5.
Step 3: Click the [apply] button of port eth0/1 to complete the configuration.
Step 4: click the "save" button in the navigation bar to save the configuration.
Storm control module for setting port suppression ratio for broadcast, multicast, unknown list
broadcast.The storm control mode based on bandwidth percentage is adopted.When the speed of data
stream received by the device port exceeds the set bandwidth, the device will only allow the data stream
passing through the set bandwidth, and the data stream exceeding the set bandwidth will be discarded
until the data stream returns to normal.
Configuration steps:
(1) Select [interface] [storm control] in the navigation bar and enter the storm control page, as shown in
figure. 2-6.
(2) Check the ports to be configured (support multiple ports) and click [edit] to enter the page shown in
figure 2-7.
(3) Configure storm suppression types and bandwidth suppression ratios of ports, as shown in table 2-3.
(4) Click the "apply" button to complete the operation.
(5) Click the "save" button to save the configuration.
14
Switch Web configuration guide
Configuration examples:
Case requirements: enable storm control on port eth0/1, and set the suppression ratio of broadcast
messages to 10%.
15
Switch Web configuration guide
Step 1: Select [interface] [storm control] in the navigation bar to enter the storm control page.
Step 2: Select port eth0/1 and click the "edit" button to enter the configuration page.
Step 3: [Type] select broadcast and set the bandwidth ratio to 10, as shown in figure 2-8.
Step 4: Click the apply button to complete the operation.
Step 5: Click the "save" button in the navigation bar to save the configuration.
16
Switch Web configuration guide
Number of bytes
The number of bytes of all messages received by the interface
received
Number of sent
All messages sent by the port
messages
Number of
The number of bytes of all messages sent by an interface
sent bytes
Reception rate
Interface receiving rate, unit PPS (bit per second bit/second)
(PPS)
Reception rate Packet Per Second Packet rate received by the interface, BPS (Packet Per
(BPS) Second)
Send rate (PPS) Interface send rate, unit PPS (bit per second bit/second)
Sending rate (BPS) Packet Per Second Packet Per Second Packet Packet
SPAN does not affect the message exchange between the source port and the destination port, but
simply copies a copy of all incoming and outgoing messages from the source port to the destination port.
Messages may be discarded when the mirror traffic of the source port exceeds the destination port
bandwidth, such as when the 100Mbps destination port monitors the traffic of the 1000Mbps source port.
SPAN is based on session management, configuring the source and destination ports of SPAN in the
session. There can be only one destination port in a session, but multiple source ports can be configured
simultaneously.
17
Switch Web configuration guide
Configuration steps:
(1) select [interface] [port mirror] in the navigation bar and enter the page shown in figure 2-11.
Figure 2-11 port mirroring page
(2) Click the "add" button to enter the page as shown in picture 2-12.
Figure 2-12 port mirroring configuration page
(3) Select the session, destination interface and source interface, and the specific parameters are
described in table 2-5.
(4) Click the "apply" button to complete the operation.
(5) Click the "save" button in the navigation bar to save the configuration.
Configuration examples:
Case requirement: Monitoring eth0/1 port and eth0/2 inbound/outbound messages by using port eth0/3.
Step 1: Select [interface] [port image] in the navigation bar to enter the port image configuration page.
Step 2: Click the "add" button to enter the port image configuration page.
Step 3: Select session 1, as shown in figure 2-13, eth0/3 for the destination interface, eth0/1 and eth0/2
for the source interface.
18
Switch Web configuration guide
Step 4: Click the "apply" button to complete the configuration and automatically return to the port
mirroring page. You can see the successfully created mirror group 1, as shown in figure 2-14.
Step 5: Click the "save" button in the navigation bar to save the configuration.
19
Switch Web configuration guide
Configuration examples:
Networking requirements, as shown in figure 2-16:
• The cell User1, User2, and User3 are connected to the Switch ports eth0/2, eth0/3, and eth0/4,
respectively.
• The device connects to the external network through the eth0/1 port.
• Eth0/1, eth0/2, eth0/3 and eth0/4 belong to the same VLAN; Realize that cell users User1, User2 and
User3 cannot communicate with each other, but can communicate with external network.
Step 1: Select [interface] -> [port isolation] in the navigation bar to enter the port isolation page.
Step 2: Select eth0/2, eth0/3, eth0/4, and click the [disabled] button to enable port isolation, as shown in
figure 2-17.
20
Switch Web configuration guide
Step 3: Click the "save" button in the navigation bar to save the configuration.
2.7.1.2 LACP
21
Switch Web configuration guide
Link Aggregation Control Protocol (LACP) based on IEEE802.3 AD standard is a Protocol for dynamic
Link Aggregation. If the port enable LACP protocol, the port will send the LACPDU to announce its
system priority, system MAC, port priority, port number, operation key, etc. After receiving the LACP
message of the opposite end, the connected device compares the system priority of both ends according
to the system ID in the message. At one end of the system ID higher priority, will be in accordance with
the port ID, in order of priority from high to low set aggregation group within the port is in a state of
aggregation, and issue the updated LACP packets, the terminal device after receiving the message, will
set the corresponding port into the aggregation state, so that the two sides can keep consistently when
exit or join aggregation group. Only when both ports have completed the dynamic aggregation binding,
the physical link can transmit data messages.
After the LACP member port link is bound, periodic LACP message interactions are also conducted.
When the LACP message is not received for a period of time, the packet receipt timeout is considered,
the member port link is unbound, and the port is again in the non-forwarding state. There are two modes
of timeout: long timeout mode and short timeout mode. In the long timeout mode, a packet is sent at an
interval of 30 seconds. If the opposite packet is not received within 90 seconds, it will be in the packet
receiving timeout. In the short timeout mode, a packet is sent at an interval of 1 second between ports,
and if the opposite packet is not received within 3 seconds, it is in the packet receiving timeout.
As shown in Figure 2-19, switch A and switch B are connected through 3 ports. The system priority of
switch A is 61440, and the system priority of switch B is 4096. Open the LACP port aggregation on the
three directly connected ports of switch A and B, set the aggregation mode of the three ports as the active
mode, and set the port priority of the three ports as the default priority 32768.
After receiving to end LACP message, switch B found their system ID is higher priority (switch B of A
higher priority than switches) system, and in accordance with the order of the port ID priority (port under
the condition of the same priority, according to the order of the port since the childhood) set port 4, 5, and
6 in the aggregation state.When switch A receives the updated LACP message from switch B, it finds that
the system ID of the opposite end has A higher priority, and the ports are set to aggregate state, and ports
1, 2 and 3 are set to aggregate state.
22
Switch Web configuration guide
(1) Select [interface] [port aggregation] in the navigation bar, enter the port aggregation configuration
page, and select load balancing algorithm in the global configuration page, as shown in figure 2-20, and
parameter description is shown in table 2-6.
(2) In the aggregation port member, configure the "ID" and "mode" of the corresponding port, and click
"apply" to complete the configuration, as shown in FIG. 2-21 and table 2-8 of parameter description.
23
Switch Web configuration guide
After the configuration is completed, the aggregation port ID and member port information that have been
successfully created will be displayed in the page of the aggregation port, as shown in figure 2-22, and
the parameter description table 2-9.
2. Configuration steps
Load sharing can be achieved using both static and dynamic aggregation groups. The configuration
methods for both groups are described below.
(1) Method 1: Configure static aggregation groups
Step 1: Select [interface] [port aggregation] in the navigation bar to enter the port aggregation
configuration page.
24
Switch Web configuration guide
Step 2: In the global configuration item, select "load balancing algorithm" as src-ip, and click "apply"
button to save the configuration, as shown in figure 2-24.
Step 3: From the aggregation port member, select eth0/1, ID is "1", mode select "Manual", and click
"apply" to save the configuration.
After configuration, you can see the successful aggregation port 1 created in the aggregation port, as
shown in figure 2-26.
Step 4: Click the "save" button in the navigation bar to save the current configuration.
(2) Method 2: Configure dynamic aggregation groups
Step 1: Select [interface] [port aggregation] in the navigation bar to enter the port aggregation
configuration page.
Step 2: In the global configuration item, select "load balancing algorithm" as src-ip, and click "apply"
button to save the configuration, as shown in figure 2-27.
Step 3: From the aggregation port member, select eth0/1, ID is "1", mode select "Manual", click "apply" to
save the configuration, and use the same operation to complete the configuration of eth0/2 and eth0/3
successively, as shown in figure 2-28.
25
Switch Web configuration guide
After configuration, you can see the successful aggregation port 1 created in the aggregation port, as
shown in figure 2-29.
Step 4: Click the "save" button in the navigation bar to save the current configuration.
• Non-poe switches, PoE functions will be displayed in Web pages, but no configuration is allowed.
26
Switch Web configuration guide
PSE is the device that directly powers PD. PSE comes in two flavors: Endpoint and Midspan: Endpoint
means PSE integrates in the switch, Midspan means PSE and the switch are independent. Our company
use built-in PSE. PSE supports main functions including finding and detecting PD, classifying PD,
supplying power to it, power management, and detecting whether the connection with PD is disconnected,
etc.
3. PI,
PI refers to Ethernet interfaces with PoE power supply capability, also known as PoE interfaces, including
FE and GE interfaces.
PoE interface remote power supply has two modes:
Signal line power supply mode: PSE USES 3/5 type twisted pair (1, 2, 3, 6) to transmit data to PD and
direct current at the same time.
Idle line power supply mode: PSE USES 3/5 type twisted pair of wires (4, 5, 7, 8) that are not used for
data transmission to transmit direct current to PD.
4. PD
PD is the device that receives PSE power, such as IP phone, wireless AP (Access Point), portable device
charger, card reader, network camera and so on.
PD equipment can be connected to other power sources while receiving PoE power supply for power
redundancy backup.
Before configuring PoE functions, make sure that the PoE power supply or PSE is in a normal operating state, otherwise
you may not be able to configure or the PoE cannot work.
27
Switch Web configuration guide
This function belongs to the global mode and is effective for all ports. It is necessary
to confirm that the device with port access is PD product, otherwise it is easy to
cause wrong power supply to the access device and cause damage to the device.
28
Switch Web configuration guide
(3) Select the port to be configured, click [edit] to enter the page configuration interface, and select
"enable/disable" the PoE function of this port, as shown in figure 2-29.
(4) Click the "apply" button to complete the operation and return to the PoE main page, as shown in
figure 2-30.
(5) Click the "save" button in the navigation bar to save the configuration.
The PoE port status parameters are described in table 2-11.
• The default power supply priority of the system is: the priority decreases with the increase of port number
29
Switch Web configuration guide
• When the external power supply of the equipment is insufficient, the PoE interface with high power supply priority
shall be given priority to power supply.
• If PSE power is low, no matter the priority of newly connected PD, it will not close the port that has been supplied, and
no power will be supplied to newly connected PD.
30
Switch Web configuration guide
3 Switching
3.1 VLAN
3.1.1 Overview
VLAN is short for Virtual Local Area Network, which is a logical Network divided from a physical Network.
This network corresponds to the second layer of the ISO model. VLAN are not partitioned by the physical
location of the network ports. VLAN has the same properties as a normal physical network, except that
there are no physical location restrictions. The unicast, broadcast, and multicast frames of second layer
are forwarded and diffused within one VLAN without directly entering into other vlans.
Port-based VLAN is the simplest VLAN partition method. Users can divide the ports on the device into
different vlans, and then the messages received from a certain port can only be transmitted in the
corresponding VLAN, so as to realize the isolation of broadcast domain and the division of virtual working
group.
31
Switch Web configuration guide
• It is recommended that the default VLAN of this end device port should be the same as the default VLAN for the
connected end device port.
• It is recommended to ensure the default VLAN of the port is the allowed VLAN can pass through. If the port does not
allow a VLAN to pass through, but the default VLAN of the port is that VLAN, then the port will discard the received
message of the VLAN or the message without VLAN Tag.
32
Switch Web configuration guide
33
Switch Web configuration guide
Name VLAN name, not configurable, default VLAN 1 is default, VLAN 2 is VLAN0002.
Tagged member
It means the port member sends a VLAN segment with a Tag.
port
Tagged member
It means the port member sends a VLAN segment without a Tag.
port
Edit Select the VLAN ID need to be edited and click enter the edit page.
Delete Select the VLAN ID need to be edit, and click this button to delete the VLAN.
Configuration steps:
(1) Select [switch] -> [VLAN] in the navigation bar to enter the VLAN configuration page, as shown in
figure 3-2.
(2) Click the "add" button to enter the page as shown in picture 3-3.
(3) Configure the port members of VLAN, click the "apply" button to complete the operation.
(4) Click the "save" button in the navigation bar to save the configuration.
34
Switch Web configuration guide
The
Configure the port type to be an Access port.
VLAN Access
mode Trunk Configure the port type to be Trunk port
Hybrid Configure the port type to be the Hybrid port.
PVID PORT-BASE VLAN ID, suitable for Access PORT.
Edit Select the port need to be edit and click this button to enter the edit page.
Configuration steps:
(1) Select [switch] -> [VLAN] in the navigation bar to enter the interface configuration page, as shown in
figure 3-4.
(2) Select the port to be configured and click the "edit" button to enter the interface configuration page.
(3) Configure the VLAN mode of the port, PVID or Native VLAN. In general, it is recommended to
configure the Native VLAN of the Trunk port as “1”. The configuration page is shown in figure 3-6.
(4) Click the "save" button in the navigation bar to save the configuration.
35
Switch Web configuration guide
Switch A configuration:
Step 2: Create VLAN 10, VLAN 20, and add VLAN 10 and VLAN 20 to Trunk eth0/9.
Under the VLAN page, click "add" button to enter the VLAN edit page, as shown in figure 3-9. Enter
"10,20" in the dialog box, select port eth0/9 from Tagged member port, and click "apply" button to
complete the configuration.
Step 3: Configure port eth0/1 VLAN mode for Access and PVID 10.
Under the interface page, select eth0/1 and click the "edit" button to enter the interface configurationpage,
as shown in figure 3-10. VLAN mode is the default Access and PVID is configured as 10. Click "apply"
button to complete the configuration.
36
Switch Web configuration guide
Step 4: Configure port eth0/2 VLAN mode as Access and PVID as 20.
The same as step 3, set eth0/2's VLAN mode as Access and PVID as 20. Click [apply] to complete the
configuration, and the VLAN page is shown in figure 3-11:
Step 5: Click the "save" button in the navigation bar to save the configuration.
Switch B configuration:
Configuration methos ia the same as switch A, Eth0/9 and eth0/10 are configured with the Switch A.
Create VLAN 10 and VLAN 20 and complete the corresponding port configuration. After configuration, the
VLAN page is shown in figure 3-12.
3.2 ERPS
37
Switch Web configuration guide
storms caused by the data loop when the Ethernet is complete and quickly restore communication
between the nodes of the Ethernet when one link is disconnected.
At present, STP is another technology to solve the problem of layer 2 network loop. STP is more mature,
but its convergence time is longer (second level). ERPS is a link-layer protocol specially used in Ethernet
ring networks. The two-layer convergence performance is up to 50ms, which has a faster convergence
rate than STP.
38
Switch Web configuration guide
To prevent loop generation, ERPS first blocks the RPL owner port, if the RPL neighbor is configured, the
port will also be blocked, other ports can normally forward traffic.
39
Switch Web configuration guide
Tangent ring:
A ring network in a network topology in which two or more devices share the same device. For example,
in figure 3-17, two rings in the network topology share one device. Each ring has only one blocking point,
and each ring has only one RPL link. Different rings should have different RAPS to manage vlans.
All devices in the ring need to support ERPS
Links between devices in the ring network must be directly connected, without intermediate equipment
Intersecting rings:
40
Switch Web configuration guide
In a network topology, two or more rings share a link (the two intersecting nodes must be directly
connected, and no other nodes are allowed). Take figure 3-18 as an example, there are two rings in the
network topology. Each ring has one RPL owner node and each ring has one RPL link. Different rings
need to have different RAPS to manage VLAN.
All devices in the ring need to support ERPS
Links between devices in the ring network must be directly connected, without intermediate
equipment
• The spanning tree protocol and the ERPS protocol cannot be turned on at the same time.
41
Switch Web configuration guide
After the configuration is completed, return to the ERPS ring configuration page. Click the "delete" button
after the ring entry to delete the ERPS ring, as shown in figure 3-21.
42
Switch Web configuration guide
Click the "+ add" button of ERPS instance configuration to enter the ERPS instance configuration page.
After the configuration is completed, click the "apply" button, as shown in figure 3-22. Specific parameters
of the instance configuration are described in table 3-9.
43
Switch Web configuration guide
Case requirements:
As shown in figure 3-21, 3 switching unit ring networks are configured with eth0/9 port S1 as the default
blocking port. In case of failure, links can be restored in time to ensure network availability. Where the
data VLAN is 1, 2 and 3.
Click the "apply" button, and the interface returned page is shown in figure 3-25.
Step 2: Create VLAN 2, 3, 4 and add VLAN 2, 3, 4 to Trunk ports eth0/9, eth0/10.
In VLAN page, as shown in Figure 3-26, click [add] button, input “2-3” in ID, tagged member ports are
select with eth0/9, eth0/10.
44
Switch Web configuration guide
Click the "apply" button, and the interface returned page is shown in figure 3-37.
Step 3: Create the ERPS ring ID and set up the east and west interface.
Select [ERPS] in the navigation bar [exchange] and enter the ERPS configuration page. Click the [+ add]
to enter the ERPS ring configuration page, as shown in figure 3-28. The ring number is set as "1", the
east interface set as "eth0/9", and the west interface set as "eth0/10".
Click the "apply" button to return to the following page, as shown in picture 3-29.
Step 4: Create an ERPS instance and set the ring name, number, blocking port and other parameters.
In the ERPS configuration page, select the instance configuration and click [+ add] button to enter the
ERPS instance configuration page, as shown in figure 3-30. Name "1", ring number "1", level "0", RAPS
management VLAN "1000", Owner interface "East", sub-ring blocking port "None".
45
Switch Web configuration guide
Step 5: Select the "save" button on the navigation bar and save the configuration.
• In the case of single ring, only one blocking point needs to be set, and the choice of blocking point is generally
considered in the middle of the ring.
46
Switch Web configuration guide
Step 5: Select the "save" button on the navigation bar and save the configuration.
There is no strict distinction between the main ring and the sub-ring, it is generally assumed one of the
rings as main ring, and the other is a sub-ring. In this example, the ring composed of S1, S2 and S3 is
defined as the main ring, the ring number is "1", the blocking port is "eth0/9" of S2, the RAPS
management VLAN is "1000", the ring composed of S1, S4 and S5 is a sub-ring, the ring number is "2",
the blocking port is "eth0/9" of S4, and the RAPS management VLAN is "1001", the specific parameters
are shown in table 3-10.
47
Switch Web configuration guide
Click the "apply" button, and the interface page returned is shown in figure 3-35.
Step 2: Create VLAN 2, 3, 4 and add VLAN 2, 3, 4 to Trunk ports eth0/9, eth0/10, eth0/11, and eth0/12.
In the VLAN page, click [add] button, as shown in Figure 3-36, input “2-4” in ID, Tagged member ports
select eth0/9, eth0/10, eth0/11, and eth0/12.
48
Switch Web configuration guide
Click the "apply" button, and the interface returned page is shown in Figure 3-37.
Step 3: Create the ERPS primary ring and sub-ring and set up east and west interface as “eth0/10”
Select [ERPS] in the navigation bar [exchange] and enter the ERPS configuration page. Click the button
[+ add] to enter the ERPS ring configuration page, as shown in figure 3-38. The ring number is set as "1",
the east interface set as "eth0/9", and the west interface set as "eth0/10".
49
Switch Web configuration guide
Click the "apply" button to return to the following page, as shown in Figure 3-43:
Step 5: Select the "save" button on the navigation bar and save the configuration.
50
Switch Web configuration guide
Step 2: Create VLAN 2, VLAN 3, and VLAN 4, and add VLAN 2, 3, and 4 to Trunk eth0/9 and eth0/10.
Under the VLAN option, click the "add" button, enter "2-4" in the ID, Tagged member port select eth0/9
and eth0/10. Click the "apply" button, and the interface returned page is shown in figure 3-45.
Step 3: Create the ERPS ring and set up the thing interface.
Select "ERPS" from the "switch" sub-item in the navigation bar and enter the ERPS configuration page.
Click "+ add" button to enter the ERPS ring configuration page. The ring number is set as "1", the east
interface set as "eth0/9", and the west interface set as"eth0/10". Click the "apply" button, and the return
page is shown in figure 3-46:
51
Switch Web configuration guide
"1000", Owner interface "East", and sub ring blocking port is "None". Click the "apply" button to return to
the page as shown in figure 3-47:
Step 5: Select the "save" button on the navigation bar and save the configuration.
Step 2: Create VLAN 2, VLAN 3, and VLAN 4, and add VLAN 2, 3, and 4 to Trunk eth0/9 and eth0/10.
Under the VLAN page, click the [add] button, enter "2-4" in the ID, Tagged member port and tick eth0/9
and eth0/10. Click the "apply" button, and the port interface returned page is shown in figure 3-49.
Step 3: Create the ERPS ring and set up the east and west interface.
Select "ERPS" from the "switch" sub-item in the navigation bar and enter the ERPS configuration page.
Click "+ add" button to enter the ERPS ring configuration page. The ring number is set to "1", the east
interface to "eth0/9", and the west interface to "eth0/10". Click the "apply" button to return to the page as
shown in figure 3-50:
52
Switch Web configuration guide
Step 5: Select the "save" button on the navigation bar and save the configuration.
Step 2: Create VLAN 2, VLAN 3, and VLAN 4, and add VLAN 2, 3, and 4 to Trunk ports eth0/9 and
eth0/10.
Under the VLAN page, click the "add" button, enter "2-4" in the ID, Tagged member port select eth0/9 and
eth0/10. Click the "apply" button, and the port interface returned page is shown in figure 3-53.
53
Switch Web configuration guide
Step 3: Create the ERPS ring and set up east and west interface
Select [ERPS] in the navigation bar [exchange] and enter the ERPS configuration page. Click the button
[+ add] to enter the ERPS ring configuration page, as shown in figure 3-54. The ring number is set as "2",
the east port set as "eth0/9" and the west interface set as "eth0/10". Click the "apply" button to return to
the following page:
Step 5: Select the "save" button on the navigation bar and save the configuration.
54
Switch Web configuration guide
Step 2: Create VLAN 2, VLAN 3, and VLAN 4, and add VLAN 2, 3, and 4 to Trunk eth0/9 and eth0/10.
Under the VLAN page, click the [add] button, enter "2-4" in the ID, Tagged member port select eth0/9 and
eth0/10. Click the [apply] button, and the interface returned page is shown in figure 3-57.
Step 3: Create the ERPS ring and set up the east and west interface.
Select [ERPS] in the navigation bar [exchange] and enter the ERPS configuration page. Click the button
[+ add] to enter the ERPS ring configuration page, as shown in figure 3-58. The ring number is set as "2",
the east interface set as "eth0/9" and the west interface set as"eth0/10". Click the "apply" button to return
to the following page:
Step 5: Select the [save] button on the navigation bar and save the configuration.
55
Switch Web configuration guide
• The RAPS management VLAN within the primary and sub-ring must be different
• In the sub-ring, the port corresponding to the link where the main ring intersects with the sub-ring must be set as the
blocking port, and the associated instance is set as the main ring.
There is no strict distinction between the primary ring and the sub-ring. It is generally assumed that one of
the main rings is assumed, and the other is a sub-ring. In this example, the ring composed of S1, S2 and
S3 is defined as the primary ring, the ring number is "1", the eth0/9 of S3 is the blocking point, and the
RAPS management VLAN is "1000". The ring composed of S1, S2 and S4 is a sub-ring, the ring number
is "2", the eth0/9 of S4 is the breaking point, the RAPS management VLAN is "1001", and the intersecting
link of the two rings is eth0/9 of S1 to eth0/10 of S2. Specific parameters are described in table 3-11.
The Sub-ring
Ring
RAPS VLAN Owner blocking Associated instance
Parameter number
interface mouth
equipment
Switch S1 1 1000 None None \
56
Switch Web configuration guide
Click the "apply" button, and the interface returned page is shown in figure 3-62.
Step 2: Create VLAN 2, VLAN 3, and VLAN 4, and add VLAN 2, 3, and 4 to Trunk ports eth0/9, eth0/10,
and eth0/11.
In the VLAN page, click [add] button, input “2-4” in ID, Tagged member ports select eth0/9, eth0/10,
eth0/11.
Click the [apply] button, and the interface returned page is shown in figure 3-64.
57
Switch Web configuration guide
Step 3: Create the ERPS primary ring and sub-ring and set up the east and west interface.
(1) Create the primary ring
Select [ERPS] in the navigation bar [exchange] and enter the ERPS configuration page. Click the button
[+ add] to enter the ERPS ring configuration page, as shown in figure 3-65. The ring number is set as "1",
the east interface set as "eth0/9", and the west interface set as "eth0/10".
58
Switch Web configuration guide
As shown in figure 3-68, name "1", ring number "1", level "0", RAPS management VLAN "1000", Owner
interface "None", sub-ring blocking port "None".
(2) Create ERPS instance 2
In the ERPS configuration page, select the instance configuration and click [+ add] button to enter the
ERPS instance configuration page, as shown in figure 3-69. Name "2", ring number "2", level "0", RAPS
management VLAN "1001", Owner interface "None", sub-ring blocking port "East", associated instance
select "1".
Step 5: Select the "save" button on the navigation bar and save the configuration.
59
Switch Web configuration guide
Step 2: Create VLAN 2, VLAN 3, and VLAN 4, and add VLAN 2, 3, and 4 to Trunk port eth0/9, eth0/10,
and eth0/12.
Under the VLAN page, click "add" button, enter "2-4" in ID, Tagged member port se;ect eth0/9, eth0/10,
eth0/12, and click "apply" button. The interface returned page is shown in figure 3-72.
Step 3: Create the primary ring and sub-rings and set up the east and west interface.
(1) Create the primary ring
Select [ERPS] from the [switch] subitem in the navigation bar to enter the ERPS configuration page. Click
[+ add] button to enter the ERPS ring configuration interface. The ring number is set as "1", the east
interface is set as "eth0/9", and the west interface is set as "eth0/10".
(2) Create sub-rings
Select [ERPS] in the navigation bar [switch] and enter the ERPS configuration page. Click [+ add] to enter
the ERPS ring configuration page. The ring number is set as "2", the east interface is set as "eth0/10",
and the west interface is set as "eth0/12". Click the "apply" button to return to the following page:
60
Switch Web configuration guide
In the ERPS configuration page, select the instance configuration and click [+ add] button to enter the
ERPS instance configuration page. Name "1", ring number "1", level "0", RAPS management VLAN
"1000", Owner interface "None", sub-ring blocking port "None".
(2) Create a sub-ring instance
In the ERPS configuration page, select the instance configuration and click [+ add] button to enter the
ERPS instance configuration page. Name "2", ring number "2", level "0", RAPS management VLAN
"1001", Owner interface "None", sub ring blocking port "East", associated instance select "1". Click the
"apply" button to return to the following page, as shown in figure 3-74:
Step 5: Select the "save" button on the navigation bar and save the configuration.
Step 2: Create VLAN 2, VLAN 3, and VLAN 4, and add VLAN 2, 3, and 4 to Trunk eth0/9 and eth0/10.
Under the VLAN page, click the "add" button, enter "2-4" in the ID, Tagged member port and tick eth0/9
and eth0/10. Click the "apply" button, and the interface returned page is shown in figure 3-76.
61
Switch Web configuration guide
Step 3: Create ERPS ring 1 and set up the east and west port
Select "ERPS" from the "switch" sub-menu in the navigation bar and enter the ERPS configuration page.
Click "+ add" button to enter the ERPS ring configuration page, as shown in figure 3-77. The ring number
is set as "1", the east interface set as "eth0/9", and the west interface set as "eth0/10". Click the "apply"
button to return to the following page:
Step 5: Select the "save" button on the navigation bar and save the configuration.
62
Switch Web configuration guide
Step 2: Create VLAN 2, VLAN 3, and VLAN 4, and add VLAN 2, 3, and 4 to Trunk eth0/9 and eth0/10.
Under the VLAN page, click the "add" button, enter "2-4" in the ID, Tagged member port select eth0/9 and
eth0/10. Click the "apply" button, and the interface returned page is shown in figure 3-80.
Step 3: Create ERPS ring 2 and set up the east and west interface.
Select [ERPS] in the navigation bar [exchange] and enter the ERPS configuration page. Click the button
[+ add] to enter the ERPS ring configuration page, as shown in figure 3-81. The ring number is set to "2",
the east interface to "eth0/9" and the west interface to "eth0/10". Click the "apply" button to return to the
following page:
Step 5: Select the "save" button on the navigation bar and save the configuration.
63
Switch Web configuration guide
64
Switch Web configuration guide
IGMP Snooping Turns on/off the IGMP Snooping function, which is turned off by default.
Turn on/off discard unknown multicast function
An unknown multicast data packet is defined as a forwarding item that
does not exist in an IGMP Snooping forwarding
Discard Those multicast data segment:
unknown • When use enable to discards the unknown multicast segment function,
IGMP
multicast the switch will discard all received segment of unknown groups
Snooping
• When use forbid discarding multicast segement function, the switch will
broadcast the segment in the VLAN to which the unknown multicast
segment belongs
Topological
change Turn on/off topology change suppression
suppression
VID The ID of the VLAN to which the multicast table entry belongs
IGMP route
Interface All member ports
mouth
Delete Delete the IGMP route
(2) Click the [add] button to enter the page of setting IGMP route port, as shown in figure 3-86. Configure
Vid and select the port to be applied. Click the "apply" button to complete the configuration.
65
Switch Web configuration guide
VID The ID of the VLAN to which the multicast table entry belongs
Group address Multicast group address
IGMP static
Source address Multicast source address
group
interface All member ports
delete Delete the IGMP static group
(2) click the "add" button to enter the IGMP static group setting page, as shown in figure 3-88.Configure
vids, group addresses, source addresses, and interface names.Click the "apply" button to complete the
configuration.
66
Switch Web configuration guide
Click the "ok" button to return to the interface as shown in figure 3-93
67
Switch Web configuration guide
Select "IGMP Snooping" from the "switch" sub-item in the navigation bar, and enter the configuration
page. Click the "add" button under "IGMP route port" to enter the interface of route port adding page, as
shown in figure 3-94:
Click the "ok" button to return to the interface as shown in figure 3-95.
Step 5: Select the "save" button on the navigation bar and save the configuration.
Like many other protocols, apanningTree protocols are constantly being updated as the network evolves,
from the original STP (SpanningTree Protocol) to the RSTP (Rapid SpanningTree Protocol) to the latest
MSTP (Multiple SpanningTree Protocol).
With layer 2 Ethernet, there can only be one active path between the two LAN, otherwise there will be a
broadcast storm. However, in order to enhance the reliability of a LAN, it is necessary to establish
redundant links, some of which must be in a backup state. If the network fails and another link fails, the
redundant links must be promoted to active state. Manually controlling such a process is obviously a lot of
hard work, and the STP protocol does it automatically. It enables a device in a LAN to do the following:
• Discover and launch an optimal tree topology for the LAN.
• Discover failures and then recover, automatically update the network topology so that the best tree
structure possible is selected at all times.
68
Switch Web configuration guide
The spanning tree module provides the global configuration, MST configuration, instance, interface, etc.
The state and configuration page are shown in figure 3-96~101, and the detailed parameters are shown
in table 3-14~18:
69
Switch Web configuration guide
Hello Time Set the period of sending hello message to detect link fault
Max Age Sets the maximum length of time messages are held on the device
70
Switch Web configuration guide
Error port disables Configuration error port automatically disabled after timeout
timeout undisabled time
ID Instance ID
VLAN list All VLAN associated with the instance, shown as a list
The
Priority The priority of the bridge in the current instance
instance
The editor Click to edit the instance
71
Switch Web configuration guide
72
Switch Web configuration guide
MSTP is configured. Messages of different VLAN in figure 3-103 are forwarded according to different
spanning tree instances. The specific configuration is:
• All devices in the network belong to the same MST domain;
• VLAN 20 is forwarded along instance 0, VLAN 10's message is forwarded along instance 1, VLAN 30 is
forwarded along instance 3, and VLAN 40 is forwarded along instance 4.
The parameter configuration of each device is shown in table 3-18:
73
Switch Web configuration guide
• The note "Allow vlan" on the link in the figure indicates which VLAN segment are allowed to pass through the link.
Step 2: In the VLAN page, click "add" button to create VLAN 10,20,30,40, as shown in figure 3-105.
Click the "apply" button to return to the page as shown in the figure. At this time, all ports will be
added to the VLAN by default.
Select VLAN 10 and click the [edit] button to enter the edit page. Eth0/11 is deleted. Click "apply" to
return to the following page.
74
Switch Web configuration guide
Step 3: Select the [exchange] [spanning tree], click the [instance] TAB, and click the [add] button, as
shown in the figure below, ID is "1", VLAN list is "10", the default parameters are used for priority, and
click the "apply" button to save the configuration.
In the same way, create instances 3 and 4 with corresponding VLAN lists of 30 and 40, and create the
successful instance list as shown in the figure.
Step 4: In the current page, click the "global configuration" tab, select mode as "MSTP", state as "Enable",
select default for other parameters, and click "apply" button to complete the configuration.
Step 5: Select the "save" button on the navigation bar and save the configuration.
75
Switch Web configuration guide
Step 1: Refer to Swtich A to configure ports 9, 10, and 11 as trunk ports and Native Vlan as default value
1.
Step 2: Create VLAN 10, 20, 30, 40 and add the corresponding ports to the VLAN, as shown in the figure.
Step 3: Select the [exchange] [spanning tree], click the [instance] TAB, and click the [add] button, as
shown in the figure below, ID is "1", VLAN list is "10", the default parameters are used for priority, and
click the "apply" button to save the configuration.
Step 4: In the current page click the "global configuration" TAB, select mode as "MSTP", state as "Enable",
select default for other parameters, and click "apply" button to complete the configuration.
Step 5: Select the "save" button on the navigation bar and save the configuration.
76
Switch Web configuration guide
Step 3: Select the [exchange] [spanning tree], click the [instance] TAB, and click the [add] button, as
shown in the figure below, ID is "1", VLAN list is "10", the default parameters are used for priority, and
click the "apply" button to save the configuration.
Step 4: In the current page, click the "global configuration" TAB, select mode as "MSTP", state as
"Enable", select default for other parameters, and click "apply" button to complete the configuration.
Step 5: Select the "save" button on the navigation bar and save the configuration.
77
Switch Web configuration guide
Step 3: Select the [exchange] [spanning tree], click the [instance] TAB, and click the [add] button, as
shown in the figure below, ID is "1", VLAN list is "10", the default parameters are used for priority, and
click the "apply" button to save the configuration.
Step 4: In the current page , click the "global configuration" TAB, select mode as "MSTP", state as
"Enable", select default for other parameters, and click "apply" button to complete the configuration.
Step 5: Select the "save" button on the navigation bar and save the configuration.
Known unicast: Ethernet switch finds the table item corresponding to the destination MAC address and
VLAN ID of the segment in the MAC address table, and the output port in the table item is unique, the
segment is directly output from the corresponding port of the table item.
78
Switch Web configuration guide
Unknown broadcast: the Ethernet switch did not find the corresponding table entry of the target MAC
address in the address table, and the message was sent to all other ports in the VLAN to output, except
the message input port.
MAC addresses of Ethernet switches can be obtained dynamically or statically, usually dynamically. The
working principle of MAC address dynamic learning is presented by analyzing the interaction process
between user A and user C.
As shown in figure 3-120, user A sends messages to port eth0/1 of the switch, in this time, the Ethernet
switch learns user A's MAC address to the MAC address table. Since there is no source MAC address in
user C’s address table, Ethernet switches broadcast segment to all ports belonging to VLAN 1 except
eth0/1 which connected with user A, including ports for user B and user C, where user B can receive
messages sent by user A that do not belong to it.
As shown in figure 3-121, user B after receiving the segment will reply segment through Ethernet switch
port eth0/2, sent to the user A, at this time, MAC address table of the Ethernet switch already existed in
user A’s MAC address, A segment is in the form of unicast forwarding to eth0/1 port, the Ethernet
switches at the same time will learn C’s MAC address of the user, the difference is user B can not receive
the segment which sent to user A from user C
79
Switch Web configuration guide
After an interaction between user A and user C, the device learns the source MAC address of user A and
user C. After that, the message interaction between user A and user C is forwarded by unicast, and user
B will no longer receive the interactive message between user A and user C.
80
Switch Web configuration guide
Step 1: Create the static MAC address, MAC: 000e.c6c1.c8ab, VLAN 1, eth0/1.
Select [switch] -> [MAC management] in the navigation bar to enter the MAC address configuration page.
In the static address item, click "add" button, and then configure the MAC address, VID and interface
successively as shown in figure 3-122.
Figure 3-122 Static address configuration
81
Switch Web configuration guide
Click the "apply" button to complete the configuration and return to the page as shown in figure 3-
123.
Select [exchange] -> [MAC management] in the navigation bar to enter the MAC address configuration
page. In the address filtering item, click the "add" button.
Click the [apply] button to complete the configuration, and the return page is shown in figure 3-125.
Step 3: Select the "save" button on the navigation bar and save the configuration.
3.6 QinQ
3.6.1 Overview
QinQ is short for 802.1Q in 802.1Q, it is based on a layer 2 tunneling protocol of IEEE 802.1 Q technology,
through the encapsulation of user's private network segment with outer VLAN Tag, make it pass through
the backbone network(also called public network) of carrier with two layers of VLAN Tag, so that provide
82
Switch Web configuration guide
users with a simple layer 2 VPN tunnel technology, also allow operators to use one VLAN network to
provide service for users include multi VLANs.
83
Switch Web configuration guide
As shown in figure 3-126, the private network VLANs of user network A and B are VLAN 1 ~ 10 and VLAN
1 ~ 20, respectively. The vlans assigned by the operator to the user network A and B are VLAN 3 and
VLAN 4 respectively. When the segment with VLAN Tag in network A and B enters into the operator's
network, VLAN 3 and VLAN 4 VLAN tags will be encapsulated on the outside of the message. In this way,
message from different user networks are completely separated when they are transmitted in the
operator's network, even if the VLAN ranges of these user networks overlap, there is no conflict when
they are transmitted in the operator's network.
84
Switch Web configuration guide
2. Flexible QinQ
Flexible QinQ is implemented based on the combination of port and VLAN. It extends the functions of
QinQ and is a more flexible implementation of QinQ. Flexible QinQ in addition to realizing all basic
functions of QinQ, different operations can be carried out according to different VLAN on packets
received from the same port, including:
Add different outer VLAN tags for messages with different inner VLAN IDs.
According to the 802.1p priority of the inner VLAN of the message, mark the 802.1p
priority of the outer VLAN.
By using flexible QinQ technology, when ti isolate operator network and user network, in the same time it
can provide rich business characteristics and more flexible networking ability.
QinQ category
Classification Stacking: multilayer tag Stacking pattern
Mapping: tag replacement mode
85
Switch Web configuration guide
Configuration QinQ
Step 1: Create the VLAN VPN rule
In the current QinQ page, click [add] button to enter the VLAN VPN rule creation page, as shown in figure.
3-129, and parameters of VPN rules are shown in table 3-23.
After configuring "name", "CVID" and "SVID", click the "apply" button and return to the following page, as
shown in picture 3-130, you can see the list of rules successfully created.
86
Switch Web configuration guide
After configuration, click the upper left corner [profile] TAB bar, click the [profile] button, you can see the
successful creation of QinQ rules. As showing in figure 3-132.
87
Switch Web configuration guide
Illustration:
Customer A1 and Customer A2, Customer B1 and Customer B2 are the edge devices in the network
of enterprise user A and enterprise user B respectively. Provider A and Provider B are edge devices
of the service Provider network.
The office network VLAN range used by enterprise A is VLAN 1-100.
The office network VLAN range used by enterprise B is VLAN 1-200.
ProviderA and ProviderB are perfectly symmetrical and configured exactly the same:
Step 1: Configure ports eth0/1, eth0/2, and eth0/5 to be Trunk ports.
Select [switch] > [VLAN] > [interface] in the navigation bar to enter the interface configuration page, select
ports eth0/1, eth0/2, eth0/5, click the [edit] button to enter the configuration mode, as shown in figure.
3-133. Select "Trunk" for VLAN mode, Native VLAN defaults to "1".
Step 2: Create VLAN 2-200, Tagged member ports select eth0/1, eth0/2, and eth0/5.
Select [switch] > [VLAN] in the navigation bar, click [add] button to enter the VLAN configuration page,
enter "2-100" in the ID text box, Tagged member port select eth0/1, eth0/2, eth0/5, and click [apply] button
to complete the configuration.
88
Switch Web configuration guide
Step 3: Create VLAN 2-200, Tagged member ports select eth0/2 and eth0/5.
Select [switch] > [VLAN] in the navigation bar, enter into the VLAN configuration page, enter "101-200" in
the ID text box, Tagged member port select eth0/2 and eth0/5, and click [apply] button to complete the
configuration.
Step 5: Configure ports eth0/1, eth0/2, and eth0/5 with their Trunk modes.
Select [switch] > [QinQ] in the navigation bar to enter the QinQ configuration page. Click the [apply] tab in
the upper left corner to configure the "basic" of ports eth0/1 and eth/2 to be Enabled, as shown in figure
3-137. Click the [apply] button to complete the configuration.
89
Switch Web configuration guide
Step 6: Select the "save" button on the navigation bar and save the configuration.
Case 2: Flexible QINQ based on C-Tag realizes layer 2 VPN and business flow management
Basic QinQ can only encapsulate user data message with one layer outer Tag of Native VLAN, that is, the
outer Tag encapsulateion depends on Native VLAN of Tunnel port. Flexible QinQ provides flexible
encapsulation of external Tag(s-tag) of service provider (ISP) based on the user's Tag(c-tag) of message,
so as to realize VPN passthrough and QOS policy of business flow more flexibly.
Broadband Internet access, IPTV service are the important business of MAN, MAN service providers
network divides VLAN for different traffic flows to differentiate management, and provide QOS policy
services for these VLANs. QinQ based on C-Tag can be used on the edge equipment of service
provider to encapsulate the service flow of users with related VLANs, when pass through also use
QOS strategy of service provider network.
The unified VLAN planning is realized among the enterprise branches, and the important business
and general business are respectively in different VLAN scope. The enterprise network can make
use of C-Tag based flexible QinQ pass through of the company's internal business, and make use of
the QOS policy of the service provider network to guarantee the data transmission of important
business in priority.
As shown in the figure below, the user-end equipment converges in MAN area through the corridor
switches in the residential area. Broadband Internet access and IPTV services are distinguished by
assigning different VLANs to enjoy different QOS service strategies.
In the public network, different traffic flows of broadband Internet access and IPTV are propagated in
different VLANs to realize pass-through of user services.
ISP network sets QOS policy for VLAN, and can package corresponding VLAN for user service on
edge equipment of service provider, so that IPTV service has priority in ISP network transmission.
90
Switch Web configuration guide
Illustration:
CE1 and CE2 are edge devices that connect to the user's network, and PE1 and PE2 are edge devices
that the provider serves on the network.
VLAN 1-100 and VLAN 101-200 on CE1 and CE2 devices are the broadband Internet service flow for
users, and the IPTV service flow for users.
PE1 and PE2 devices encapsulate different S-Tags for VLAN of different businesses to distinguish
different business data. VLAN 1-100 encapsulate VLAN100, vlan101-200 encapsulate VLAN200.
Step 2: Configure port eth0/1 for Hybrid port and PVID "100".
Select [switch] > [VLAN] > [interface] in the navigation bar to enter the interface configuration page, select
port eth0/1, click [edit] button to enter the configuration mode, as shown in figure 3-140. VLAN mode
select "Hybrid" and PVID is "100".
91
Switch Web configuration guide
Step 3: Configure port eth0/2 port mode to Trunk port, Native Vlan configure ro "1".
Select [switch] > [VLAN] > [interface] in the navigation bar to enter the interface configuration page, select
port eth0/2, click the [edit] button to enter the configuration mode, as shown in figure 3-141. Select
"Trunk" for VLAN mode, Native VLAN defaults to "1".
Step 4: Configure the Tagged and Untagged member ports for VLAN200.
Select [switch] > [VLAN] in the navigation bar, click [add] button to enter the VLAN configuration page,
enter "200" in the ID text box, select eth0/2 on Tagged member port, eth0/1 on Untagged member port,
and click [apply] button to complete the configuration.
92
Switch Web configuration guide
Step 6: Select the "save" button on the navigation bar and save the configuration.
93
Switch Web configuration guide
4 Safety
4.1 ACL
4.4.1 ACL overview
ACL implement message filtering by configuring matching rules and processing operations on messages.
It can effectively prevent illegal users from accessing the network, and also can control traffic and save
network resources. Data packet matching rules defined by ACL, it can also be referenced by other
Functions that need to distinguish traffic, such as the definition of flow classification rules in QoS.
ACL classify packets by a series of matching conditions, which can be SMAC, DMAC, SIP, DIP, etc.
According to the matching conditions, ACL can be divided into the following categories:
IP based standard ACL: rules are made only based on the source IP address of the data packet.
IP based extended ACL: make rules according to data packet source IP address, destination IP address,
ETYPE and protocol.
Mac-based ACL: make rules according to the source MAC address and destination MAC address of data
packet.
Can be named ACL: rules are made with IP-based standard ACL and extended acls.
• Maximum 128 rules can be configured under single ACL-ID. Due to the limitation of hardware resource, single device
can maximum support 500 rule.
• When an ACL is already applied to a port, if a deletion rule needs to be added, it needs to be applied from the port first.
The ACL module provides configuration based on ACL types, including IP, IP-Extend, MAC-Extend, IP-
named, and IP-Named-Extend. ACL configuration page as shown in figure 4-1~5, and each
parameter description is shown in table 4-1~5.
94
Switch Web configuration guide
The ACL
IP ACL of standard IP that match the source IP fields in IPv4 messages
type
95
Switch Web configuration guide
The ACL Extend MAC ACL, match layer 2 source MAC addresses and destination
MAC-Extend
type MAC addresses
The ACL
IP-Named Standard ACL, support name naming, the first character must be a letter
type
Name A string that begins with a letter
Deny Release the message hitting the rule
Type
Permit Discard messages that hit the rule
96
Switch Web configuration guide
Operation Steps:
(1) Select ACL in the navigation bar [safety] to enter the ACL configuration page
(2) Select the ACL tab and click [add] button to enter the ACL rules page
(3) Fill in the parameters as required, and click the [apply] button to save.
(4) Select the [application] tab to enter the ACL application page. Select the corresponding entry number
on the corresponding port and click the "apply" button to make the configuration effective.
(5) Click the "save" button in the navigation bar to save the configuration.
97
Switch Web configuration guide
Click the "apply" button and automatically return to the main page of ACL configuration, as shown in
figure 4-2, the ACL regulation that has been successfully created can be seen.
98
Switch Web configuration guide
Click the [apply] button and automatically return to the main page of ACL configuration, as shown in
figurec 4-4, the ACL regulations that have been successfully created can be seen.
Step 4: Click the "save" button in the navigation bar to save the configuration.
4.2 QoS
4.2.1 Overview
QoS (Quality of Service) refers to the ability of a network to provide better service capability for specified
network communication by utilizing various basic technologies.
Traditional networks use the "best effort" forwarding mechanism, when the network bandwidth is sufficient,
all the data flows are better processed, when the network congestion, all the data flows are likely to be
discarded. In order to meet the requirements of different applications and different service qualities, the
network needs to be able to allocate and schedule resources according to the requirements of users and
provide different service qualities for different data streams.
99
Switch Web configuration guide
Transmission equipment to support the QoS ability, able to provide quality services, according to a certain
class of data stream, for it gives a certain level of transmission priority, to identify the relative importance
of it, and use the equipment provided by the various forward priority strategy, such as congestion
avoidance mechanisms for these data streams to provide special transport services.
The network environment with QoS configuration can increase the predictability of network performance,
effectively allocate network bandwidth and make the use of network resources reasonably.
The cir values are deterministic, such as 1M speed limit, so the cir values are 1024, but the CBS values are derived from
empirical values. When the value of CBS is large, the flow peak is higher and the speed limit is stable, but the average
speed may be higher than the speed limit. When the value of CBS distribution is small, the flow peak is low, the speed limit
fluctuation is large, and the average speed may be less than the speed limit.It is recommended that CBS be configured
with a 4 times cir value and a small value of 31250.
QoS module provides, QoS global, port trust, CoS mapping, DSCP mapping, policy and other
configuration. The configuration page is shown in figure 4-6~10, and the detailed parameters are shown
in table 4-6~10:
100
Switch Web configuration guide
Name Port
Default <0, 7>, when the configured port does not trust, or the configured trust does not
CoS meet the trust condition, adopt port default cos to mark the entry message
Support distrust, trust cos, trust dscp configuration. When in no trust mode, the
entry stage modifies the message cos field and dscp field according to the
Port trust
default cos of port; When configuring trust cos, for message without tag, the same
Trust
as no trust mode, for message with tag, choose the message with cos. When
configure trust dscp, for IP message, select messag with DSCP, for non-IP
mesaage, the same as trust cos mode.
Application Click configure to take effect
101
Switch Web configuration guide
102
Switch Web configuration guide
Step 2: Create standard ACL 1, match source IP: 192.168.64.1, mask 255.255.255.255
Click the [security] ACL in the navigation bar to enter the ACL configuration page. Click the [add] button,
as shown in figure 4-12, name "1", type "permit", match IP "192.168.64.1", mask "255.255.255.255",
invert to "0.0.0.0".
103
Switch Web configuration guide
Click [apply] to complete the configuration, and return to the page shown in figure 4-15. You can see
the successful rule creation.
Step 4: Create policy p1, associate category c1, and set the action speed limit of 1024kbps
104
Switch Web configuration guide
Under the current QoS policy page, select policy-map and click [add] button to enter the policy-map
configuration page. The specific configuration method is shown in figure 4-16.
Figure 4-16 policy-map configuration page
Click [apply] to complete the configuration, and return to the page shown in figure 4-17. You can see
the successful policy creation.
Figure 4-17 policy-map display page
Under the current QoS policy page, select the application option, select port eth0/1 and the entry policy is
p1, and click the "apply" button of the port, as shown in figure 4-18.
Figure 4-18 QoS policy application configuration page
Step 6: Click the "save" button in the navigation bar to save the configuration.
Configuration example 2:
Case requirements: In the case of network congestion, ensure the normal forwarding of eth0/2, eth0/2 is
access port
Select navigation bar [Safty] QoS of navigation bar to enter QoS configuration page. As shown in
picture 4-19, click the "profile" tab and click the "disabled" button to enable global switch of QoS.
105
Switch Web configuration guide
Step 2: Configure the default cos of port eth0/2 to 7, port trust cos, and other ports to default cos is 0,
default don't trust.
In the current QoS configuration page, click the tab of "port trust" to enter the port trust configuration page,
as shown in figure 4-20. The default CoS for port eth0/2 is “7”, trust to “CoS”, and other ports remain
configured by default.
Step 3: Configure the queue mapping relationship so that the cos 7 mapping queue is 7
In the current QoS configuration page, click tab [CoS mapping] to enter the CoS mapping configuration
page. As shown in figure 4-21, the mapping queue of CoS 7 is selected as "7" and click the "apply"
button.
Step 4: Configure the scheduling mode to wrr, configure queue 7 to have a weight of 0
In the current QoS configuration page, click [overview] tab, as shown in figure 4-22. Under QoS option,
select the scheduling algorithm as "wrr", and configure the weight of queue 7 as "0".
106
Switch Web configuration guide
Step 5: Click the "save" button in the navigation bar to save the configuration.
107
Switch Web configuration guide
(2) Select the corresponding port to open this function, select enable, and click the [apply] button to
complete the configuration.
(4) Click the [save] button in the navigation bar to save the configuration.
802.1x protocol is a port-based network access control protocol, that is, to authenticate the access user
devices on the ports of LAN access devices so that the user devices can control access to network
resources.
• A client is a user terminal device that requests access to the LAN, it is authenticated by the device
in the LAN. Client must install the software that supports 802.1x certification.
108
Switch Web configuration guide
• The device side is the network device in the LAN that controls the access of the client. It is located
between the client and the authentication server, providing the client with the access port (physical
port or logical port) of the LAN, and authenticating the connected client through the interaction with
the server.
• The Authentication server is used to authenticate, authorize, and charge the client, usually the
RADIUS (Remote Authentication dial-in User Service) server. The authentication server verifies the
legitimacy of the client according to the authentication information sent from the device end, and
notifies the verification result to the device end, which decides whether to allow the client end to
access or not. In some smaller network environments, the role of authentication server can also be
replaced by the device side, that is, the device side performs local authentication, authorization
and billing for the client.
109
Switch Web configuration guide
3. Controlled direction
Controlled ports can be set to unidirectional and bidirectional controlled in an unauthorized state.
• Under bidirectional control, the sending and receiving of frames are forbidden.
• When under one-way control, receiving frames from the client is forbidden, but sending frames to
the client is allowed.
Controlled ports of our switch can only in the state of one-way control state
• Multicast trigger: the client sends eapol-start message to the device to trigger the authentication.
The destination address of this message is multicast MAC address 01-80-c2-00-00-03.
• Broadcast trigger: the client sends EAPOL-start message to the device to trigger authentication.
The destination address of this message is broadcast MAC address. This method can solve the
problem that the authentication device cannot receive the client authentication request because
some devices in the network do not support the above group broadcast.
110
Switch Web configuration guide
The device side active trigger mode is used to support clients that cannot send EAPOL-Start messages
actively, such as 802.1x client that comes with Windows XP. There are two ways for devices to initiate
authentication:
• Multicast trigger: the device actively broadcasts an Identity type of EAP-Request frame to the client
group every N seconds (default: 30 seconds) to trigger authentication.
• Unicast trigger: when the device receives a packet of unknown source MAC address, it actively
broadcasts the EAP-Request frame of Identity type to the MAC address sheet to trigger
authentication. If the device does not receive a response from the client within the set time period,
the message will be reposted.
(2) When the user needs to access the external network, open the 802.1x client program, enter the user
name and password that have been applied and registered, and initiate the connection request. At this
111
Switch Web configuration guide
point, the client program will issue an authentication request frame (EAPOL-Start) to the device side to
start an authentication process.
(3) After the device receives the authentication request frame, it will issue an Identity Request frame
(eap-request /Identity) to ask the user's client program to send the input user name.
(4) The client program responds to the request from the device side, send the user name information to
the device side through the Identity type Response frame (eap-response /Identity).
(5) The device side encapsulate the EAP message sent by the client in RADIUS access-request and
sends it to the authentication server for processing.
(6) After RADIUS server receiving the user name information forwarded by the device end, it will
compare the information with the user name table in the database, finds the password information
corresponding to the user name, encrypts the password with a randomly generated MD5 Challenge, and
sends the MD5 Challenge to the device end through RADIUS access-challenge message.
(7) The device forwards the MD5 Challenge sent by the RADIUS server to the client.
(8) After receiving the MD5 Challenge sent by the device, the client encrypts the password part with the
Challenge, generates the EAP-Response /MD5 Challenge message, and sends it to the device.
(9) The device side encapsulate this EAP-Response /MD5 Challenge message in RADIUS message
(RADIUS-Access-Request) and send it to the RADIUS authentication server.
(10) The RADIUS server compares the encrypted password information received with the local encrypted
password information. If the same, it considers the user as a legitimate user and sends a RADIUS
access-accept message to the device side.
(11) After receiving the authentication pass message, the device sends the authentication successful
frame to the client, and change the port to the authorization state, allowing the user to access the network
through the port.
(12) When the user is online, the device side will monitor the user's online status by sending handshake
messages to the client on a regular basis.
(13) After receiving the handshake message, the client sends a reply message to the device, indicating
that the user is still online. By default, if the two-handshake request message sent by the device end are
not answered by the client, the device end will ask the user to log out to prevent the user from logging out
due to abnormal reasons and the device cannot perceive.
(14) The client can send the EAPOL-Logoff frame to the device, and actively request to Logoff.
(15) The device side changes the port state from the authorized state to the unauthorized state and sends
the EAP-Failure message to the client.
In EAP relay, it is necessary to ensure that a consistent EAP authentication method is selected on the client and RADIUS
server, while on the device, only need to configure the authentication mode of 802.1x configuration is required
The authentication mode of 802.1X user is EAP.
112
Switch Web configuration guide
113
Switch Web configuration guide
Set the value of silent timer. When 802.1x user fails to authenticate, the
device needs to be silent for a period of time (through setting "silent
Silent time duration") and then initiate authentication again. During the silent period,
the equipment does not carry out the relevant processing of 802.1x
certification.
Port recertification
114
Switch Web configuration guide
to the authentication server, the device side starts the server timeout
timer. If the device side does not receive the response from the
authentication server within the time limit set by the timer, the device side
will resend the authentication Request message
115
Switch Web configuration guide
Click the "add" button to enter the page shown in figure 4-34. Configure RADIUS server IP as 1.1.1.2,
authentication port as 1812 by default, enter password, timeout as 5S by default, retransmission times as
3, and click the "apply" button to complete the configuration.
Figure 4-34 RADIUS server configuration
page
When configured, automatically return to the following page, as shown in figure 4-35, to see a
successful RADIUS server created.
Figure 4-35 the RADIUS server display page
116
Switch Web configuration guide
Click the "apply" button to complete the configuration and automatically return to the following page,
as shown in figure 4-38. You can see the successfully created port.
Figure 4-38 802.1X port configuration display
page
If the configuration of a static MAC is the same as a silent MAC, the MAC silent function will be disabled
117
Switch Web configuration guide
118
Switch Web configuration guide
Global MAC
MAC authentication switch
configuration authentication
119
Switch Web configuration guide
Click the "add" button to enter the interface shown in figure 4-43. Configure RADIUS server IP as 1.1.1.2,
authentication port as 1812 by default, enter password, timeout as 5S by default, retransmission times as
3, and click the "apply" button to complete the configuration.
Figure 4-43 RADIUS server configuration page
When finish configuration, automatically return to the following page, as shown in figure 4-44, it can
be seen a successful RADIUS server created.
120
Switch Web configuration guide
Click the "apply" button to complete the configuration and automatically return to the following page,
as shown in figure 4-47, you can see the successfully created port.
Figure 4-47 Creates a successful MAC authentication port
121
Switch Web configuration guide
4.6 RADIUS
4.6.1 Overview
RADIUS (Remote Authentication dial-in User Service) is a common protocol for implementing AAA
(Authentication, Authorization and Accounting).
At the beginning, RADIUS was just a AAA protocol for dial-up users. Later, with the diversified
development of user access methods, RADIUS also ADAPTS to a variety of user access methods, such
as Ethernet access and ADSL access. It provides access services through authentication authorization
and collects and records users' use of network resources through billing.
• “Users”: Used to store user information (such as user name, password, and configuration
information such as the protocol used, IP address, etc.).
• "Clients": Used to store information about RADIUS Clients (such as shared keys of access devices,
IP addresses, etc.).
• "Dictionary”: Used to store properties and the meaning of property values of he RADIUS protocol.
4.6.1.3 Security and authentication mechanism
122
Switch Web configuration guide
The interaction of authentication messages between RADIUS client and RADIUS server is accomplished
through the participation of Shared key, and the shared key cannot be transmitted through the network,
which enhances the security of information interaction. In addition, passwords are encrypted during
transmission to prevent them from being stolen when they are transmitted over insecure networks.
The RADIUS server supports several methods for authenticating users, such as PAP, CHAP
authentication based on PPP. In addition, RADIUS server can also act as a proxy to communicate with
other RADIUS authentication servers as RADIUS client and be responsible for forwarding RADIUS
authentication and billing messages.
123
Switch Web configuration guide
Select “secure > RADIUS” in the navigation bar and go to the page shown in figure 4-50. The global
configuration parameters are described in table 4-16.
Figure 4-50 the RADIUS global configuration page
124
Switch Web configuration guide
IP Server IP address
125
Switch Web configuration guide
5 System
• After changing the IP address, you need to manually point the page to the new address and re-access the switch.
• The configuration of VLAN (VID) management is complicated, and improper operation will cause failure to log on the
device. If you need to change the VID, please refer to the specific operation method
Manage VLAN configuration instances.
As shown in figure 5-1, select "manage IP address" from the menu of "system" to enter the IP address
management page.
IPV4 address Set IPV4 to manage IP addresses. IPV4 addresses are available when "static" is selected
Set the subnet mask to 255.255.255.0 by default. The IPv4 address is available when "static"
IPV4 mask
is selected
IPV4 gateway Specify the IP address of the gateway. The IPv4 address is available when "static" is selected
126
Switch Web configuration guide
IPV6 address Set IPV6 administrative IP address. IPV6 address can be obtained by selecting "static"
IPV6 prefix
Set the IPV6 prefix length. IPV6 address is available when "static" is selected
length
IPV6 gateway Set up IPV6 gateway. IPV6 address is available when "static" is selected
Configuration example 1
Case requirements: management VLAN 1, management IP 192.168.64.200, subnet mask 255.255.255.0,
gateway address 192.168.64.1.
Configuration steps:
Step 1: Click [system] ->[manage IP address] in the navigation bar to enter the IP address management
page.
Step 2: Enter the content need to be changed as shown in figure 5-2 and click the [apply] button to make
the configuration
effective.
Step 3: Modify the login IP of the browser to be 192.168.64.200. The PC needs to be equipped with the
Step 4: Click the "save" button on the navigation bar to save the configuration.
127
Switch Web configuration guide
Configuration example 2
Case requirements: the device manages VLAN 1 by default, the management IP address is
192.168.1.168. The management VLAN needs to be modified to VLAN 100, and the management IP
needs to be modified to 192.168.1.100.
• Ensure that the VLAN of the PC and switch is accessible before modifying the management VLAN, otherwise the
switch may not be accessible.
Scenario 1: PC is connected directly to the switch. The PC is connected to the switch eth0/1, which is
Step 2: Configure an idle port as access port and Native VLAN as new administration VLAN 100.
For example, use the eth0/2 port, select eth0/2, and click the edit button to enter the following
configuration page. Change the mode of eth0/2 to access and PVID to 100, and click the "apply" button to
complete the configuration.
128
Switch Web configuration guide
Go back and check the modified configuration to make sure port eth0/2 is configured correctly
Step 3: Modify the administration VLAN to 100 and configure the new IP address.
Click [system] -> [management IP address] in the navigation bar to enter the management VLAN
configuration page
Modify the management VLAN to the expected configuration of 100, and modify the management IP to
the expected configuration of 192.168.1.100, and click [apply] to modify.
Step 4: Switch the PC from eth0/1 to eth0/2 to connect to the switch and log in to the switch WEB page
using the new IP 192.168.1.100.
Step 5 :(optional) if you want to access the switch from other devices, you need to add the trunk port
connected with devices to the new management VLAN 100.
Scenario 2: As shown in figure 5-8, Switch A is the Switch to which expected to be modified configuration,
and the PC is connected to SW1 through the Switch B Switch.
Step 1: Configure the Switch A and Switch B interconnect port eth0/5 as their trunk port.
129
Switch Web configuration guide
Click the navigation bar [switch] -> [VLAN], enter the interface page, select port eth0/5, click the button
[edit], as shown in the figure, select Trunk for VLAN mode, Native VLAN default is 1, click [apply] to
complete the configuration.
Step 2: Switch A and Switch B create VLAN 100, tagged member port select eth0/5.
Click the navigation bar [switch] -> [VLAN] to enter the VLAN page, click the button [add], VLAN ID is
"100", Tagged member port select eth0/5, and click [apply] to return to the VLAN main page
Step 3: Modify Switch A management VLAN to 100 and configure the new IP address.
Click the navigation bar [system] -> [IP address management] to enter the IP address management page.
Modify the management VLAN to be the expected configuration value 100, and modify the management
IP to be the expected configuration 192.168.1.100, and click [apply] to modify.
130
Switch Web configuration guide
Step 4: Change the eth0/1 of Switch B which directly connected to PC to access mode, NativeVLAN100,
after ensure the management mesaage of PC and the management VLAN 100 of Switch A can arrive,
you could access Switch A through PC.
Configuration example 3
Case requirements: VLAN management is 1, and IP management is DHCP allocation.
Step 1: Click [system] ->[IP management] in the navigation bar to enter the IP address management
page
Step 2: Select DHCP according to the IPV4 type shown in figure 5-2, and click the "apply" button to
After the configuration takes effect, the IP address of the device can be seen on the DHCP server, or
logged in the device by serial port, enter “show management summary” to check device IP
address.
Step 3: Log in the device with the new IP address and re-enter the IP management page to see the
131
Switch Web configuration guide
Step 4: Click the "save" button on the navigation bar to save the configuration.
• In order to improve the security of the device, please change the password as soon as possible, and be sure to save
the changed password. If you forget the password, you will be unable to log in the device.
Click the navigation bar [system] -> [user management] to enter the user management page, as shown in
figure 5-13.
Step 1: Click [system]-> [user management] in the navigation bar to enter the user management
page.
Step 2: Click the "add" button to enter the add account page, as shown in figure 5-14.
After logging into the device for the first time, please modify the password as soon as possible and enter
the new password twice according to the prompts, as shown in figure 5-13. Passwords are composed of
Numbers and letters that are 0-32 bytes long and case-sensitive.
132
Switch Web configuration guide
Step 3: Click the "apply" button to complete the configuration, and the page will automatically return to the
account display page, as shown in figure 5-15, to see the newly created account.
Step 4: Click the "save" button on the navigation bar to save the configuration.
5.3 Services
5.3.1 Overview
The service management module provides management functions of Telnet and SSH services, enable
users to enable the service only when they need to use the corresponding service, or close the service.
This can improve the performance of the system and the safety of equipment, to achieve the safety
management of equipment.
1.The Telnet service
Telnet protocol belongs to the application layer protocol in TCP/IP protocol family, which is used to
provide remote login and virtual terminal functions in the network.
2. SSH services
SSH is short for Secure Shell. When the user logs into the device remotely through a network
environment that cannot guarantee security, SSH can use encryption and powerful authentication
functions to provide security to protect the device from attacks such as IP address fraud and
plaintext password interception.
133
Switch Web configuration guide
5.4 SNMP
5.4.1 Overview
SNMP (Simple Network Management Protocol) is a Network Management standard Protocol in the
Internet, which is widely used to realize the access and Management of managed devices by managed
devices. SNMP has the following features:
• Support intelligent management of network equipment. Using the network management platform
based on SNMP, network administrators can query the running status and parameters of network
equipment, set parameter values, find faults, complete fault diagnosis, carry out capacity planning
and generate reports.
• Support for managing devices with different physical characteristics. SNMP only provides a basic
set of functions, making management tasks relatively independent from the physical
characteristics and networking technologies of managed devices, so as to realize the management
of devices from different manufacturers.
134
Switch Web configuration guide
The MIB is organized in a tree structure and consists of several nodes, each of which represents the
managed Object. The managed object can be uniquely identified by a string of Numbers representing the
path starting from the root, which is called OID (Object Identifier).
As shown in figure 5-16, managed object B can be uniquely determined by a string of Numbers {1.2.1.1},
which is the OID of managed object B.
SNMP provides four basic operations to realize the interaction between NMS and Agent:
• GET operation: the NMS USES this operation to query the value of one or more nodes in the Agent
MIB.
• SET operation: this operation is used by the NMS to SET the value of one or more nodes in the
Agent MIB.
• Trap operation: Agent use this operation to send Trap information to the NMS. Agent does not require
NMS to send response message.
NMS will not respond to Trap information. SNMPv1, SNMPv2c, and SNMPv3 support Trap
operations.
135
Switch Web configuration guide
Instruction
The precondition of NMS and Agent to creat connection is that NMS and Agent must use the same SNMP version
(2) Configure SNMP community string, click [+add] button to enter the new page and add new SNMP
community string, as shown in figure 5-18, and SNMP group word parameters 5-4 are described as
shown in the table.
136
Switch Web configuration guide
Community
SNMP server authentication group word
string
137
Switch Web configuration guide
(2) Configure SNMPv3 view, click [+ add] button to enter the page of adding new view, as shown in figure
5-21, and view parameters are described in table 5-6.
138
Switch Web configuration guide
Version
Currently SNMPv3 users and groups support only authenticated and encrypted levels of
security.
Set up a read view of the SNMP group
All: Select All view
Read view None: Select the None view
Prompt
139
Switch Web configuration guide
Group
Unencrypted groups
• Select groups of all security levels when the user's security level is "both authenticated
and encrypted.
Prompt
Currently SNMPv3 users and groups support only authenticated and encrypted levels of
security.
Authentication When the security level selects "authentication but no encryption " or " both
type authentication and encryption", set the authentication mode, including: MD5, SHA
Authentication Set the authentication password when the security level selects “authentication, not
passward Encryption” or “both authentication and encryption”
When the security level selects "both authentication and encryption", set the encryption
Encryption type
mode, including: DES, AES
Encrypted When the security level selects “both authentication and encryption”, set the encrypted
password password
(5) Configure SNMPv3 host, click [+add] button to enter new SNMP host, as shown in figure 5-24, and
SNMP host parameter description is shown in table 5-9.
Family IP address family, used to distinguish between IPv4 and IPv6 hosts
140
Switch Web configuration guide
5.5 Date/time
In order to ensure the coordination between the equipment and other equipment, users need to configure
the system time accurately. The date and time settings modules is used to display and set the system
time on the webmaster, and to set the system time zone. The device supports manual configuration of
system time and automatic synchronization of NTP Protocol (Network Time Protocol) server Time.
NTP (Network Time Protocol) is a time synchronization protocol defined by RFC 1305 for time
synchronization between distributed Time servers and clients. The purpose of using NTP is to
synchronize the clocks of all devices with clocks in the network so that the clocks of all devices in the
network are consistent, thus enabling the devices to provide multiple applications based on uniform time.
For the local system running NTP, synchronization from other clock sources can be accepted and can be
used as a clock source to synchronize other clocks and with other devices.
141
Switch Web configuration guide
(1) Select [system] [date and time] in the navigation bar to enter the date and time page, as shown in
figure 5-26.
(2) Check the synchronization option follow the date and time text box, and click the "apply" button to
complete the configuration.
(3) Click the "save" button in the navigation bar to save the current configuration.
Figure 5-26 date and time configuration page
Instruction
• For devices without built-in RTC, the time and date of the device will be restored to factory Settings after restart, and
the time and date need to be reconfigured.
Instruction
• After finish configuration, the device automatically synchronizes the time information from the server. The first time to
finish synchronization wil takes about 4-8 minutes.
• For devices without built-in RTC, the time and date of device restart will be restored to factory Settings, and the
equipment configured with NTP server will automatically synchronize network time.
142
Switch Web configuration guide
Select [configuration file management] from the drop-down menu of [system] in the navigation bar and
enter the configuration file management page, as shown in figure 5-28.
Click the "backup configuration" button and popup the [file download] dialog box and save the
configuration file locally.
As shown in figure 5-29, click the [select file button] select the configuration file with the suffix ".conf "
need to be imported, and click the [upload configuration] button. The device will restart automatically
during the import configuration process and waiting page shown in figure 5-30.
143
Switch Web configuration guide
Step 3: Wait for the device finish restart, as shown in figure 5-32. log in with default IP, user name
and password after the device restart.
Note
• Software upgrades take some time. Please do not operate on the Web during the software upgrade,
as it may ause software upgrade interruption.
• After the upgrade, the device will restart automatically.
Step 1: Select [system] ->[system upgrade] in the navigation bar and enter the page of “Update
Step 2: Click the "Choose File" button and select the upgrade File corresponding to the device in the
144
Switch Web configuration guide
Step 3: Click the "upgrade" or "save configuration & upgrade" buttons to start the software upgrade.
5.8 Log/Diagnosis
Since each functional module has its corresponding running information, generally, users need to view
the display information module by module. In order to collect more information at one time in case of
routine maintenance or system failure, the device supports the diagnostic information module. When the
user performs the operation of generating the diagnostic information file, the system will save the
statistics information currently run by multiple functional modules in a file named "backup-SWITCH-year
mon-day-log " file, which users can view to locate problems faster.
Step 2: click the "backup log" button, pop up the "file download" dialog box, and save the log file locally.
5.9 Restart
• Be sure to save the configuration before restarting the device, otherwise all unsaved configuration will be lost after
restarting.
• After the device restarts, the user needs to log in again.
Step 1: Select [system] [restart] in the navigation bar and enter the restart page, as shown in
figure 5-36.
145
Switch Web configuration guide
Step 2: Click the [execute restart] button and wait for the device finish restart and it will take some time,
please be patient.
146
Switch Web configuration guide
6 Route
6.1 Route
In the network, the router selects an appropriate path according to the destination address of the received
message and forwards the message to the next router. The last router in the path forwards the message
to the destination host. Route is the path information in the forwarding process of message, which is used
to guide message forwarding.
Static route cannot automatically adapt to changes in network topology. When the network fails or the
topology changes, the configuration must be manually modified by the network administrator.
147
Switch Web configuration guide
Next address Route next hop addresses; For example, the next jump in the above examples is 192.168.1.1
• When the first VLAN interface IP is configured, the administrative IP address is automatically
removed. So in order to keep the IP address accessible, please set the first VLAN interface as the
148
Switch Web configuration guide
device's administrative IP. Take the default managed IP: 192.168.1.168, IP belongs to VLAN1 as an
example, as shown in the figure below
First, remove the device's management IP to the VLAN interface configuration.
IP addresses and masks of Switch A, Switch B and Switch C interfaces and hosts are shown in figure 6-4.
Required that after configuration IPv4 static route between Switch A, Switch B, and Switch C, any two
hosts in the figure can communicate.
2. Configuration ideas
3. Configuration steps
149
Switch Web configuration guide
Select [VLAN] from the sub-item [switch] in the navigation bar to enter the VLAN configuration page. In
the sub-page of VLAN, click the button [add], as shown in figure 6-5, to create VLAN300 and VLAN500.
(2) VLAN mode configured for port 3 is access, VLAN 300, and VLAN mode configured for port 9 is
access, VLAN500.
Select [VLAN] from the sub-item [switch] in the navigation bar to enter the VLAN configuration page. In
the interface of port eth0/3, click the button [edit] to enter the configuration mode, as shown in figure 6-6.
In VLAN mode, select Access and PVID 300. do the same configuration for port 9.
150
Switch Web configuration guide
(2) VLAN mode configured for port 3 is access, VLAN 100; VLAN mode configured for port 9 is access,
VLAN500; VLAN mode configured for port 10 is access, VLAN 600.
Select [VLAN] from the sub-item [switch] in the navigation bar to enter the VLAN configuration page. In
the interface of port eth0/3, click the button [edit] to enter the configuration mode, as shown in figure 6-10.
In VLAN mode, select Access and PVID 100. Do the same configuration for ports 9 and 10.
151
Switch Web configuration guide
152
Switch Web configuration guide
(2) VLAN mode configured for port 3 is access, VLAN 900, and VLAN mode configured for port 9 is
access, VLAN600.
Select [VLAN] from the sub-item [switch] in the navigation bar to enter the VLAN configuration page. In
the interface of port eth0/3, click the button [edit] to enter the configuration mode, as shown in FIG.
6-15.In VLAN mode, select Access and PVID 900. Do the same configuaration for port 9.
153
Switch Web configuration guide
In a LAN, when a host or other network device has data to send to another host or device, it must know
the network layer address (IP address) of that host or device. However, IP address alone is not enough,
because IP data packets must be encapsulated into frames before they can be sent through the physical
network, so the sending station must also have the physical address of the receiving station, so a
mapping from IP address to physical address is required. ARP is the protocol that implements this
function.
ARP table
154
Switch Web configuration guide
After the device parses the destination MAC address through ARP, it will add a mapping table item of IP
address to MAC address in its own ARP table for subsequent forwarding of messages to the same
destination.
ARP table items are divided into dynamic ARP table items and static ARP table items.
Configuring static ARP table entries increases the security of communication. Static ARP table item can
only use the designated MAC address when communicating with the designated IP address device. At
this time, attack message cannot modify the mapping relationship between the IP address and MAC
address of this table item, thus protecting the normal communication between the device and the
designated device.
IP Terminal IP address
The MAC
Terminal MAC address
address
Interface The name of the layer 3 port where the terminal resides
155
Switch Web configuration guide
• Switch A connects to the host and connect with Router B via the interface eth0/10. Port eth0/10
belongs to VLAN 100.
• The IP address of Router B is 192.168.1.1/24, and the MAC address is 00e0-fc01-0000.
To increase the security of Switch A and Router B communication, static ARP table entries can be
configured on Switch A.
156
Switch Web configuration guide
2. Configuration steps
157
Switch Web configuration guide
158
Switch Web configuration guide
7 Diagnosis
The trace route execution object can be the IP address or host name of the destination device, if the
host name of the destination device cannot be recognized, then the source device will output prompt
message.
159
Switch Web configuration guide
(2) Check the results of ping operation in the information box below, as shown in figure 7-2.
Figure 7-2 Ping operation returns results
160
Switch Web configuration guide
161
Switch Web configuration guide
Click the “detail” button to query the supplier, serial number, production date and other basic information
of the optical module, as shown in figure 7-7.
162