Ug Teg-448ws (C1)
Ug Teg-448ws (C1)
Connect additional devices to your switch .................................................................... 6 Configure port mirror settings ........................................................................... 29
GVRP (GARP VLAN Registration Protcol) ..................................................................... 40 Add RADIUS Servers (RADIUS Authentication Method) .................................... 68
Add TACACS+ Servers (TACACS+ Authentication Method)................................ 69
Enable GVRP ...................................................................................................... 40
Destination MAC Filter ...................................................................................... 70
Set GVRP port settings ....................................................................................... 41
Denial of Service (DoS) ...................................................................................... 71
Set GVRP time settings ...................................................................................... 42
DHCP Snooping ............................................................................................................ 72
QoS (Quality of Service) ............................................................................................... 43
Set CoS priority settings ..................................................................................... 43 Enable DHCP Snooping ...................................................................................... 72
Enable DHCP Snooping ...................................................................................... 73
Set Port Priority ................................................................................................. 44
Set Trusted Interfaces ........................................................................................ 74
Set DSCP (Differentiated Services Code Point) Class Mapping settings ............ 44
Configure Binding Database .............................................................................. 74
Set the Scheduling Algorithm ............................................................................ 45
Configure the IPv6 Traffic Class Priority Settings ............................................... 46 LLDP (Link-Layer Discovery Protocol) .......................................................................... 76
SNMP ........................................................................................................................... 47 Enable and configure LLDP ................................................................................ 76
View LLDP Neighbor Information ...................................................................... 78
Set the SNMP Engine ID ..................................................................................... 47
Configure the SNMP View Table ........................................................................ 47 Statistic ........................................................................................................................ 78
Configure the SNMP Group Access Table .......................................................... 48
View Traffic Information Statistics..................................................................... 78
Configure the SNMP User/Group Table............................................................. 49
View Error Information Statistics....................................................................... 79
Configure the SNMP Community Table ............................................................. 50
Configure the SNMP Trap Management............................................................ 51 Switch Maintenance ..................................................................... 80
Access Control Config .................................................................................................. 52 Upgrade your switch firmware .................................................................................... 80
Configure Policy Settings ................................................................................... 52 Firmware Upgrade via HTTP Settings ................................................................ 80
Configure Rate Control ...................................................................................... 56 Firmware Upgrade via TFTP Settings ................................................................. 81
View your policy database ................................................................................. 57
Backup and restore your switch configuration settings .............................................. 81
RMON .......................................................................................................................... 57
Backup/Restore via HTTP Settings ..................................................................... 81
Enable RMON..................................................................................................... 57 Backup/Restore via TFTP Settings ..................................................................... 82
Configure parameters for RMON Ethernet statistics ......................................... 58
Cable Diagnostics Test ................................................................................................. 83
Configure parameters for RMON history control settings ................................. 59
Configure parameters for RMON alarms ........................................................... 60 Enable IEEE 802.3az Power Saving Mode .................................................................... 84
Configure parameters for RMON events ........................................................... 62 Reboot/Reset to factory defaults ................................................................................ 84
Voice VLAN .................................................................................................................. 63 Network Connectivity Test (Ping Tool) ........................................................................ 85
Create a Voice VLAN .......................................................................................... 64 Using the Web Smart Switch Management Utility ......................... 86
Configure Voice VLAN OUI settings ................................................................... 65
System Requirements .................................................................................................. 86
Security ........................................................................................................................ 66
Installation ................................................................................................................... 86
Configure Port Access Control ........................................................................... 66
Create Dial-In Users (Local Authentication Method) ......................................... 67 Using the Utility ........................................................................................................... 87
Hardware Design
Rack-mountable 1U metal housing features 48 Gigabit ports and 4 shared SFP slots.
IPv6 Ready
This switch supports IPv6 configuration and IPv6 neighbor discovery.
TEG-448WS
Traffic Management
A broad range of network configurations are supported by: 802.3ad link aggregation,
Package Contents Asymmetric VLAN, 802.1Q VLAN, Voice VLAN, RSTP, MSTP, Loopback Detection, GVRP,
In addition to your switch, the package includes: 802.1p Class of Service (CoS), port bandwidth management, and QoS queue scheduling.
• Multi-Language Quick Installation Guide
• CD-ROM (Utility & User’s Guide)
• Power cord (1.8 m / 6 ft.)
Troubleshooting
Real time traffic comparison charts, error group charts, and a convenient cable
• Rack mount hardware
diagnostic test aid in rapid troubleshooting.
If any package contents are missing or damaged, please contact the retail store, online
retailer, or reseller/distributor from which the product was purchased.
Security
Features such as ACL, SSL, MAC/port filtering, 802.1X, TACACS+, and RADIUS are
compatible with layered security controls.
Monitoring
RMON, SNMP, SNMP Trap, and Port Mirroring support administrator monitoring
solutions.
Rear View
• Reset Button – Press and hold this button for 10 seconds and release to
• AC Power Connector – Connect the AC power cord to the connector and the
reset the switch to factory defaults.
other side into a power outlet. (Input: 100~240VAC, 50/60Hz)
• Gigabit Ethernet Ports (1-48) – Connect network devices. Ports 45-48
are shared with SFP slots 45F-48F and disabled when SFP slots (45F-48F)
are in use and can be used for uplink or downlink connections.
• SFP slots (45F-48F) – Supports optional 1000BASE-SX/LX mini-GBIC
modules.
Diagnostic LEDs
• Power LED
On : When
power.
the Power LED lights on, the device is receiving
Off : When the Power turns off or the power cord is not
connected
The switch can be mounted in an EIA standard-size, 19-inch rack, which can be placed in
Desktop Hardware Installation a wiring closet with other equipment. Attach the mounting brackets at the switch’s
front panel (one on each side), and secure them with the provided screws.
The site where you install the hub stack may greatly affect its performance. When Note: The switch model may be different than the one shown in the example
installing, consider the following pointers: illustrations.
Note: The switch model may be different than the one shown in the example
illustrations.
• Install the Switch in a fairly cool and dry place.
• Install the Switch in a site free from strong electromagnetic field generators (such
as motors), vibration, dust, and direct exposure to sunlight.
• Leave at least 10cm of space at the front and rear of the hub for ventilation.
• Install the Switch on a sturdy, level surface that can support its weight, or in an
EIA standard-size equipment rack. For information on rack installation, see the
next section, Rack Mounting.
• When installing the Switch on a level surface, attach the rubber feet to the
bottom of each device. The rubber feet cushion the hub and protect the hub
case from scratching. Then, use screws provided with the equipment rack to mount each switch in the rack.
7. Configure the switch IP address settings to be within your network subnet, then click
Apply.
Note: You may need to modify the static IP address settings of your computer’s network
adapter to IP address settings within your subnet in order to regain access to the switch.
4. Open your web browser, and type the IP address of the switch in the address bar, and
then press Enter. The default IP address is 192.168.10.200.
5. Enter the User Name and Password, and then click Login. By default:
User Name: admin
Password: admin
Note: User name and password are case sensitive. 8. Click Save Settings to Flash (menu).
You can connect additional computers or other network devices to your switch using Ethernet cables to connect them to one of the available Gigabit Ethernet Ports (1-48). Check the
status of the LED indicators on the front panel of your switch to ensure the physical cable connection from your computer or device.
Note: If you encounter issues connecting to your network, there may be a problem with your computer or device network settings. Please ensure that your computer or device network
settings (also called TCP/IP settings) are configured properly within the network subnet your switch is connected.
1. Log into your switch management page (see “Access your switch management page”
1. Open your web browser and go to the IP address http://192.168.10.200. Your switch on page 7).
will prompt you for a user name and password.
System Information
2. Enter the user name and password. By default: • System Up For – The duration your switch has been running continuously without
a restart/power cycle (hard or soft reboot) or reset.
User Name: admin • Runtime Image: The current software or firmware version your switch is running.
Password: admin
• Boot Loader – The current boot loader version your switch is running.
Note: User Name and Password are case sensitive.
Hardware Information
• Version: Displays your switch hardware version.
• DRAM Size: Displays your switch RAM memory size.
• Flash Size: Displays your switch Flash memory size.
System
Set your system information
System > System Management
This section explains how to assign a name, location, and contact information for the
switch. This information helps in identifying each specific switch among other switches
in the same local area network. Entering this information is optional.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
3. Review the settings. When you have completed making changes, click Apply to save
the settings.
• System Description - Specifies the Switch model. You cannot change this 5. Click Save Settings to Flash (menu).
parameter.
• System Object ID - Indicates the unique SNMP MIB object identifier that
identifies the switch model. You cannot change this parameter.
• System Name - Specifies a name for the switch, the name is optional and may
6. Click Save Settings to Flash (button), then click OK.
contain up to 15 characters.
Note: This step saves all configuration changes to the NV-RAM to ensure that the
• System Location - Specifies the location of the switch. The location is optional
changes are permanent. If you do not complete this step, rebooting or power cycling the
and may contain up to 30 characters.
switch will lose all of your current configuration changes.
• System Contact - Specifies the name of the network administrator responsible
for managing the switch. This contact name is optional and may contain up to
30 characters.
1. Log into your switch management page (see “Access your switch management page”
on page 7). 6. Click Save Settings to Flash (button), then click OK.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
2. Click on System, and click on IPv4 Setup. switch is rebooted or power cycled, the configuration changes will still be applied.
3. Review the settings. When you have completed making changes, click Apply to save
the settings.
• System MAC Address: Displays the switch MAC address information.
• System IP Address: Enter the new switch IP address. (e.g. 192.168.200.200)
• System Subnet Mask: Enter the new switch subnet mask. (e.g. 255.255.255.0)
• System Default Gateway: Enter the default gateway IP address. (e.g.
192.168.200.1 or typically your router/gateway to the Internet).
• System IP Mode: Click the drop-down list and select Static to manually specify
your IP address settings or DHCP to allow your switch to obtain IP address
settings automatically from a DHCP server on your network.
Use the IPv6 System Settings page to configure the IPv6 network interface, which is the
logical interface used for in-band connectivity with the switch via all of the switch's
front-panel ports. The configuration parameters associated with the switch's network
interface do not affect the configuration of the front-panel ports through which traffic is
switched or routed.
3. Review the settings. When you have completed making changes, click Apply to save
the settings.
• IPv6 State: The IPv6 address for the IPv6 network interface is set in auto
configuration mode if this option is enabled. The default value is Disable. Auto • Link Local Address Settings: A link-local address is an IPv6 unicast address that
configuration can be enabled only when DHCPv6 is not enabled on any of the can be automatically configured on any interface using the link-local prefix
management interfaces. DHCPv6 Client: This option only displays when FE80::/10 (1111 1110 10) and the interface identifier in the modified EUI-64
DHCPv6 is enabled. format. Link-local addresses are used in the neighbor discovery protocol and
the stateless autoconfiguration process. Nodes on a local link can use link-local
• IPv6 Unicast Address / Prefix Length: The IPv6 Unicast Address is an identifier
addresses to communicate; the nodes do not need globally unique addresses
for a single interface, on a single node. A packet that is sent to a unicast
to communicate. IPv6 devices must not forward packets that have link-local
address is delivered to the interface identified by that address. Add the IPv6
source or destination addresses to other links.
prefix and prefix length to the IPv6 System Settings interface.
• Automatic Link Local Address: A link local address has a prefix of FE80, is not
• IPv6 Static Gateway: Specifies the corresponding Gateway of the IP address
routable, and can be used for communication only on the local network. Only
entered into the field.
one link local address is supported. If a link local address exists on the interface,
• IPv6 Dynamic Gateway: To configure the switch to automatically obtain its IP this entry replaces the address in the configuration.
configuration from a DHCP server on your network.
• Link Local Address/Prefix length: Enter the Link Local Address/Prefix Length.
• Link Layer MAC Address: Specifies the link layer MAC address.
Click Add to save the entry to the list.
• You can type in the specific address and click Find to find the entry to modify or
click Delete or delete the address. If the entries span multiple pages, you can
navigate page number in the Page field and click Go or you can click First,
5. Click Save Settings to Flash (button), then click OK. Previous, Next, and Last Page to navigate the pages.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
5. Click Save Settings to Flash (button), then click OK.
2. Click on System, and click on IPv6 Neighbor Settings. Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
3. Review the settings. When you have completed making changes, click Apply to save
the settings.
• Neighbor IPv6 Address: Specifies the neighbor IPv6 address.
Set your DNS server settings 2. Click on System, and click on IP Access List.
System > DNS Settings
This setting allows you to configure your IPv4/IPv6 DNS server settings for the purpose 3. Review the settings.
or resolving hostnames. For example, when specifying your SNTP server time settings First, enter the IPv4 or IPv6 address to allow access and click Add for each entry.
via domain name, the switch will not be able to resolve the SNTP domain name specified
until you configure the switch DNS server setting.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
2. Click on System, and click on DNS Settings.
3. Enter your DNS IPv4 Server address and/or DNS IPv6 Server address in the provided
fields. For each entry, the access list will populate. You can click Delete next to the entry to
delete the entry or Delete All to delete all entries in the table.
Restrict access to switch management page 4. Click Save Settings to Flash (menu).
System > IP Access List
This section allows you to define or restrict access to the switch management page to a
list of specific IP addresses.
For each entry, the access list will populate. You can click Delete next to the entry to
delete the entry or Delete All to delete all entries in the table.
When you have completed entering the IPv4 and IPv6 address entries, click the IP
Restriction Status drop-down list at the top and select Enabled, then click Apply.
Change administrator password and add accounts To create additional administrative user accounts:
System > Administration • User Name: Enter the user name of the new account.
This section explains how to change the administrator password create additional • Password: Enter the password for the new acocunt and enter the password
administrative user accounts for access to the switch management page. again the Confirm Password field to verify. Then, click Add to add to the table.
For additional user accounts, you will be provided the option to Modify or
1. Log into your switch management page (see “Access your switch management page” Delete to remove the account.
on page 7). Note: The password consists of up to 12 alphanumeric characters.
To change the administrator password, in the “admin” entry in the table, click on
Modify. Note: This default administrator account cannot be deleted.
.
4. Click Save Settings to Flash (menu).
In the Password field, enter the new password and enter the new password again the
Confirm Password field to verify. Then, click Apply.
Note: The password consists of up to 12 alphanumeric characters. 5. Click Save Settings to Flash (button), then click OK.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
Enable or disable SNMP and modify idle timeout settings • Web Idle Timeout - Enter the idle period in minutes, when the switch will
System > User Interface automatically log out a user from the switch management page.
This section explains how to enable SNMP on the switch and modify the switch
management page idle timeout settings.
Note: If you disable the SNMP on the switch, the switch will not be manageable via
SNMP using MIBs.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
• SNMP Agent: Click the drop-down list to one of the following options.
o Enabled - When you enable this parameter, the SNMP agent is active. 5. Click Save Settings to Flash (button), then click OK.
You can manage the switch with SNMP network management Note: This step saves all configuration changes to the NV-RAM to ensure that if the
software and the switch’s private MIB. switch is rebooted or power cycled, the configuration changes will still be applied.
o Disabled - When you enable this parameter, the SNMP agent is
inactive.
• Web Server Status – Displays the current SNMP status.
Set the switch date and time o SNTP – Allows you to configure your switch to pull time and date
System > System Time settings automatically from a network time server. If selecting this
option, under Simple Network Time Protocol (SNTP) Settings, enter
your time server settings.
1. Log into your switch management page (see “Access your switch management page”
Note: Please note that in order for the switch to communicate to
on page 7).
Internet SNTP time servers, the switch must have valid IPv4/IPv6
address settings including a default gateway address for Internet
2. Click on System, and click on System Time. access. Additionally, if using a domain name, the switch must be
configured with valid DNS server settings in order to resolve
host/domain names.
3. Review the settings. Click Apply to save changes.
SNTP Primary Server – Enter the primary network time server
• Clock Mode - Displays if system time and date is set manually Local Time or
IPv4 address, IPv6 address, or Domain Name.
obtained automatically from a network time server SNTP.
SNTP Secondary Server – Enter the secondary network time
• Current Time – Displays the current system time and date.
server IPv4 address, IPv6 address, or Domain Name..
• Time Zone – Displays the current system time zone. SNTP Poll Interval – Enter the interval time when your switch
will update the time and date settings with the time server.
Time Zone – Click the drop-down list to select your time
zone. Additionally, you can set your Daylight Savings Time.
• Clock Mode: Select Local Time to manually configure your date and time
settings or select SNTP to configure your switch to automatically obtain
settings from an network time server.
o Local Time – Allows you to manually set the time settings. If selecting
this option, under Local Time Settings, manually enter your date and 4. Click Save Settings to Flash (menu).
time settings.
Date Settings – Enter your date settings (YYYY/MM/DD).
Time Settings – Enter your time settings (HH:MM:SS) 5. Click Save Settings to Flash (button), then click OK. Note: This step saves all
configuration changes to the NV-RAM to ensure that if the switch is rebooted or power
cycled, the configuration changes will still be applied.
Enable HTTPS/SSL (Secure Socket Layer) management access Click Continue, Proceed to this website, and accept the certificate if prompted.
System > SSL Settings
By default, your switch management page can be accessed using standard web HTTP
protocol which is unsecure. Enabling HTTPS/SSL management access allows access to
the switch management page using secure encrypted communication which prevents
unauthorized users from intercepting user name and password credentials. Typically, 4. Click Save Settings to Flash (menu).
the switch is accessed within the local network only by system administrators which
does not necessarily require additional security. It is recommended to only enable this
feature, if allowing switch management access from other networks or over the
Internet.
Note: Once HTTPS/SSL management access is enabled, HTTP management access will be 5. Click Save Settings to Flash (button), then click OK.
disabled forcing all access to the switch management page using secure encryption Note: This step saves all configuration changes to the NV-RAM to ensure that if the
communication only. switch is rebooted or power cycled, the configuration changes will still be applied.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
If enabling SSL management access, you will need to access the switch management
page using HTTPS instead of HTTP. (e.g. https://192.168.10.200)
Enable DHCP Auto Configuration View and setup your switch logging
System > DHCP Auto Configuration System > System Log Settings
If you need to automatically update the switch configuration files via a remote server, The system log is designed to monitor the operation the switch by recording the event
the DHCP Auto Configuration feature is available for this purpose via the DHCP server. messages it generates during normal operation. These events may provide vital
Your IP address settings must enable the DHCP client so that this feature can operate information about system activity that can help in the identification and solutions of
with your DHCP server. system problems.
1. Log into your switch management page (see “Access your switch management page” 1. Log into your switch management page (see “Access your switch management page”
on page 7). on page 7).
2. Click on System, and click on DHCP Auto Configuration. 2. Click on System, and click on System Log Settings.
3. Click the Auto Configuration State drop-down list and select Enabled. Click Apply to 3. Review the settings. Click Apply to save changes.
save changes.
• Time Stamp
o Enable - Each event message recorded in the log will have a time
stamp.
o Disable - No time stamp will be included with the event messages.
• Message Buffered Size - Enter the message buffer size. (Range: 1-200)
4. Click Save Settings to Flash (menu).
• Syslog - Allows you to send device logging to an external log (Syslog) server for
troubleshooting or monitoring.
o Syslog Status –
5. Click Save Settings to Flash (button), then click OK. Enable – Enable syslog and in the Syslog Server IP section,
enter the IPv4 or IPv6 address of the external syslog server to
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
send logging.
switch is rebooted or power cycled, the configuration changes will still be applied.
Disable – Disable syslog functionality.
o Facility - Click the drop-down list and which facility to store the
logging. (Options: local0 – local7)
Note: You can define the facility to store logging on your external
syslog server. This helps to ensure you have separate logging sections
for different devices.
o Logging Level – Click the drop-down list to select what level of event Physical Interface
messages that will be logged. Configure your switch ports and view port status
0 Emergency - The system is unusable. Physical Interface
1 Alert - Action must be taken immediately. This section allows you to configure the physical port parameters such as speed, duplex,
2 Critical - Critical conditions are displayed. flow control, and jumbo frames. This section also reports the current link status of each
3 Error - Error conditions are displayed. port and negotiated speed/duplex. Additionally you will be able to set your BPDU ports
4 Warning - Warning conditions are displayed. for Spanning Tree Configuration and EAP ports for 802.1x port-based authentication
configuration.
5 Notice - Normal but significant conditions are displayed.
6 Informational - Informational messages are displayed
1. Log into your switch management page (see “Access your switch management page”
7 Debug - Debug-level messages are displayed.
on page 7).
• Trunk - This parameter indicates the trunk group number. A number in this
column indicates that the port has been added to a trunk using static or
dynamic 802.3ad LACP link aggregation.
• Type - This parameter indicates the port type. On the Switch, the port type is
4. Click Save Settings to Flash (menu). 1000TX for 10/100/1000Base-T twisted-pair ports (1-48) and 100FX or 1000TX
for the SFP ports (45F-48F) for copper or fiber SFP type.
5. Click Save Settings to Flash (button), then click OK. • Link Status - This parameter indicates the status of the link between the port
and the end node connected to the port. The possible values are:
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied. o Up -This parameter indicates a valid link exists between the port and
the end node.
o Down -This parameter indicates the port and the end node have not
established a valid link.
Admin. Status: This parameter indicates the operating status of the port. You can use o 10/Half -This parameter indicates the port is configured for 10Mbps
this parameter to enable or disable a port. You may want to disable a port and prevent operation in half-duplex mode.
packets from being forwarded if a problem occurs with the node or cable connected to
the port. You can enable the port to resume normal operation after the problem has
Note: When selecting a Mode setting, the following points apply:
been fixed. You can also disable an unused port to secure it from unauthorized
connections. The possible values are: o When a twisted-pair port is set to Auto-Negotiation, the end node should
also be set to Auto-Negotiation to prevent a duplex mode mismatch.
o Ignore -This parameter applies to the All row only and indicates that
the Admin. Status field must be set individually for each port. o A switch port using Auto-Negotiation defaults to half-duplex if it detects
that the end node is not using Auto-Negotiation. This can result in a
o Enabled - This parameter indicates the port is able to send and receive
mismatch if the end node is operating at a fixed duplex mode of full-duplex.
Ethernet frames.
To avoid this problem when connecting an end node with a fixed duplex
o Disabled - This parameter indicates the port is not able to send and mode of full-duplex to a switch port, disable Auto-Negotiation on the port
receive Ethernet frames. and set the port’s speed and duplex mode manually.
• Mode: This parameter indicates the speed and duplex mode settings for the o The only valid setting for the SFP ports is Auto-Negotiation.
port. You can use this parameter to set the speed and duplex mode of a port.
The possible settings are:
• Jumbo: This parameter indicates whether or not jumbo frames can be accepted
o Ignore -This parameter indicates that the All setting does not apply to
by the switch. You may want to activate jumbo frames when your switch will
the Mode field. In other words, each port is set individually.
transmit video and audio files. The possible values are:
o Auto -This parameter indicates the port is using Auto-Negotiation to
o Ignore -This parameter indicates that the All setting does not apply to
set the operating speed and duplex mode. The actual operating speed
the Jumbo field. In other words, each port is set individually.
and duplex mode of the port are displayed in parentheses (for
example, “1000/F” for 1000 Mbps full duplex mode) after a port o Enabled -This parameter indicates the port is permitted to accept
establishes a link with an end node. jumbo frames.
o Auto (1000F) -This parameter indicates the port is configured for o Disabled -This parameter indicates the port is not permitted to accept
1000Mbps operation in Auto-Negotiation mode. jumbo frames.
o 1000/Full -This parameter indicates the port is configured for Note: When QoS is enabled on a port, the Jumbo frame parameter cannot be
1000Mbps operation in full-duplex mode. enabled.
o 100/Full -This parameter indicates the port is configured for 100Mbps
operation in full-duplex mode. • Flow Ctrl: Flow Control, This parameter reflects the current flow control setting
o 10/Full -This parameter indicates the port is configured for 10Mbps on the port. The switch uses a special pause packet to notify the end node to
operation in full-duplex mode. stop transmitting for a specified period of time. The possible values are:
o 1000/Half -This parameter indicates the port is configured for o Ignore - This parameter indicates that the All setting does not apply to
1000Mbps operation in half-duplex mode. the Flow Control field. In other words, each port is set individually.
o 100/Half -This parameter indicates the port is configured for 100Mbps o Enabled - This parameter indicates that the port is permitted to use
operation in half-duplex mode. flow control.
o Disabled - This parameter indicates that the port is not permitted to Spanning Tree (STP, RSTP, MSTP)
use flow control. Configure Spanning Tree Protocol settings
Bridge > Spanning Tree > Protocol Settings
• EAP: This parameter reflects the current Extensible Authentication Protocol Spanning Tree Protocol (STP) provides network topology for any arrangement of
(EAP) setting on the port. The possible values are: bridges/switches. STP also provides a single path between end stations on a network,
o Ignore - This parameter indicates that the All setting does not apply to eliminating loops. Loops occur when alternate routes exist between hosts. Loops in an
the EAP field. In other words, each port is set individually. extended network can cause bridges to forward traffic indefinitely, resulting in
o Enabled - This parameter indicates that the port is able to send and increased traffic and reducing network efficiency.
receive EAP packets.
o Disabled - This parameter indicates that the port is disabled and is not 1. Log into your switch management page (see “Access your switch management page”
able to send or receive EAP packets. on page 7).
• BPDU: This parameter reflects the current BPDU setting on the port.The 2. Click on Bridge.
possible values are:
o Ignore - This parameter indicates that the All setting does not apply to 3. Review the settings. Click Apply to save changes.
the BPDU field. In other words, each port is set individually.
• Global STP Status: Select the STP state on the device. The possible field values
o Enabled - This parameter indicates that the switch will pass BPDU are:
frames through the switch and broadcast them through all other
ports. o Disable – Disables STP on the device. This is the default value.
o Disabled - This parameter indicates that the switch will not pass BPDU o Enable – Enables STP on the device.
frames through the switch, With RSTP or STP enabled, the switch will • Protocol Version: Specifies the Spanning Tree Protocol (STP) mode to enable
receive BPDU frames and process them according to the spanning tree on the switch. The possible field values are:
protocol. o STP – Enables STP 802.1d on the device.
o RSTP – Enables Rapid STP 802.1w on the device. This is the default
value.
o MSTP – Enables Multiple STP 802.1s on the device.
• Bridge Priority: The Bridge Priority has a range 0 to 61440 in increments of
4096. To make this easier for you, the Web Management Utility divides the
range into increments. You specify the increment that represents the desired
bridge priority value.
4. Click Save Settings to Flash (menu). • Maximum Age: The Maximum Age defines the amount of time a port will wait
for STP/RSTP information. MSTP uses this parameter when interacting with
5. Click Save Settings to Flash (button), then click OK. STP/RSTP domains on the boundary ports. Its range is 6 - 40 seconds
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
• Hello Time: The Hello Time is frequency with which the root bridge sends out a Configure Spanning Tree Protocol port settings
BPDU. Bridge > Spanning Tree > Port Settings
• Forward Delay: The Forward Delay defines the time that the bridge spends in 1. Log into your switch management page (see “Access your switch management page”
the listening and learning states. Its range is 4 - 30 seconds. on page 7).
• Transmit Hold Count: The Transmit Hold Count specifies the maximum number
of BPDUs that the bridge can send per second. Its range is 1 - 10. 2. Click on Bridge, click on Spanning Tree, and click on Port Settings.
• Max Hop Count: The Max Hop Count is a parameter set in a BPDU packet when
it originates. It is decremented by 1each time it is retransmitted by the next
3. Review the settings. For each entry, click Apply to save changes.
bridge. When the Hop Count value reaches zero, the bridge drops the BPDU
packet. Its range is 6 - 40 hops. • STP Status: Indicates if spanning tree protocol is active or not on the port.
Select one of the following choices from the pull-down menu:
o Enable - The spanning tree protocol is enabled on the port.
o Disabled - The spanning tree protocol is disabled on the port. Enable
Disable
Note: BPDU passthrough must be disabled for all ports under Physical
interface for STP can be enabled.
• Priority: Indicates the port priority. If two paths have the same port cost, the
bridges must select a preferred path. In some instances this can involve the use
of the port priority parameter which is used as a tie breaker when two paths
have the same cost.
The range for port priority is 0 to 240. As with bridge priority, this range is
broken into increments, in this case multiples of 16. To select a port priority for
a port, you enter the desired value. Table 1 lists the values that are valid.
Step 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
In addition, this section also displays the spanning tree root information.
Port
0 16 32 48 64 80 96 112 128 144 160 176 192 208 224 240
Priority
• Admin Cost (0 = Auto): The administratively assigned value for the contribution
of this port to the path cost of paths towards the spanning tree root. Writing a
value of '0' assigns the automatically calculated default Path Cost value to the
port. If the default Path Cost is being used, this object returns '0' when read.
• External Cost: This defines a metric that indicates the relative cost of • P2P: Choosing the Forcetrue parameter indicates a point-to-point (P2P) shared
forwarding packets to the specified port list. Port cost can be set automatically link. P2P ports are similar to edge ports however they are restricted in that a
or as a metric value. Define a value between 1 and 200000000 to determine P2P port must operate in full-duplex.
the external cost. The lower the number, the greater the probability the port Like edge ports, P2P ports transition to a forwarding state rapidly thus
will be chosen to forward packets. The default port cost: 100Mbps port = benefiting from RSTP. A P2P value of Forcefalse indicates that the port cannot
200000. Gigabit port = 20000. have P2P status. Auto allows the port to have P2P status whenever possible
• State – Displays the current port spanning tree state. and operate as if the P2P status were true. If the port cannot maintain this
o Blocking - A blocking state does not allow network traffic to be sent or status, (for example if the port is forced to half-duplex operation) the P2P
received on a the port except for BPDU data. A port with a higher path status changes to operate as if the P2P value were Forcefalse.
cost to the root bridge than another on the switch causes a switching The default setting for this parameter is Auto.
loop and is placed in the blocking state by the Spanning Tree • Restricted Role: Toggle between True and False to set the restricted role state
algorithm. The port’s state may change to the forwarding state if the of the packet. If set to True, the port will never be selected to be the Root port.
other links in use fail and the Spanning Tree algorithm determines the The default value is False.
port may transition to the forwarding state.
• Restricted TCN: Toggle between True and False to set the restricted TCN of the
o Listening - This state occurs on a port during the convergence process. packet. Topology Change Notification (TCN) is a BPDU that a bridge sends out
The port in the listening state processes BPDUs and awaits new to its root port to signal a topology change. If set to True, it stops the port from
information that would cause the port to return to the blocking state. propagating received TCN and to other ports. The default value is False.
o Learning - While the port does not yet forward frames (packets), in • Migrate: Indicates if the port is configured to accept RSTP and STP BPDUs.
this state the port does learn source addresses from frames received
and adds them to the filtering (switching) database.
o Forwarding - A port that both receives and sends data. This indicates
normal operation. STP continues to monitor the port for incoming
BPDUs that indicate the port should return to the blocking state to
prevent a loop.
o Disabled - This state is not strictly part of STP. However, a network
administrator can manually disable a port.
• Edge: Indicates if a port is connected to an edge device in the network topology
or not. Selecting the Forcetrue parameter designates the port as an edge port.
Edge ports cannot create loops, however an edge port can lose edge port 4. Click Save Settings to Flash (menu).
status if a topology change creates a potential for a loop. An edge port
normally should not receive BPDU packets. If a BPDU packet is received, it
automatically loses edge port status. Selecting the Forcefalse parameter
5. Click Save Settings to Flash (button), then click OK.
indicates that the port does not have edge port status. Selecting the Auto
parameter indicates that the port have edge port status or not have edge port Note: This step saves all configuration changes to the NV-RAM to ensure that if the
status automatically. The default setting for this parameter is Auto. switch is rebooted or power cycled, the configuration changes will still be applied.
3. Review the settings. For each section, click Apply to save changes.
• MST Table: Make changes to the table entry, and click Apply modify or click
Delete to remove the ID entry.
MST Configuration Identification Settings
• Configuration Name: A configured name set on the switch to uniquely identify
the MSTI (Multiple Spanning Tree Instance). If a configuration name is not set,
this field shows the MAC address of the device running MSTP.
• Revision Level (0-65535): This value, together with the configuration name,
and identical vlans mapped for STP instance IDs identifies the MST region
configured on the switch.
View your Spanning Tree Protocol Instance Information (MSTP) Configure Spanning Tree Protocol MST Port Settings (MSTP)
Bridge > Spanning Tree > MST Settings Bridge > Spanning Tree > MST Settings
1. Log into your switch management page (see “Access your switch management page” 1. Log into your switch management page (see “Access your switch management page”
on page 7). on page 7).
2. Click on Bridge, click on Spanning Tree, and click on Instance Information. 2. Click on Bridge, click on Spanning Tree, and click on MST Port Settings.
3. View your MSTP instance information. 3. Review the settings. For each entry, click Apply to save changes.
• Select MST Port – Click the drop-down to select which MST port to configure.
• MSTI ID – Specifies the instance to which the VLAN is assigned.
• Internal Root Cost
• Root Port – Indicates the selected instance’s root port.
• Regional Root Bridge
• Designated Bridge – Displays the ID of the bridge that connects the link or • MST Port Info - The MST Port Information page provides user to configure the
shared LAN to the root. MSTP Interface settings.
• Instance Priority – Specifies the selected spanning tree instance device priority. o Admin Path Cost (0 = Auto) - This is the port cost used by MSTP when
The field range is 0-61440. The field default is 32768. calculating path cost to the root bridge.
o Priority - This is the port priority used by MSTP in calculating path
costs when two ports on the switch have the same port cost.
Trunk Config (Link Aggregation) Click the drop-down list and select one of the following options.
Configure port trunk settings • Active - The specific aggregator will broadcast and respond to LACPDU (LACP
Bridge > Trunk Config > Trunking Data Unit) packets. This setting enables the dynamic LACP feature for the trunk.
The trunking function enables the cascading of two or more ports for a combined larger • Passive - The specific aggregator will not broadcast LACPDU packets, but it will
total bandwidth. Up to 4 trunk groups may be created, each supporting up to 8 ports. respond to them. This setting disables the LACP feature for the trunk
Add a trunking Name and select the ports to be trunked together, and click Apply to • Manual - Enables static port trunking and disables the LACP feature for the
activate the selected trunking groups. trunk. (Static link aggregation).
Important Note: Do not connect the cables of a port trunk to the ports on the switch • Disable - Disables the static port trunk and disables the LACP feature.
until you have configured the ports on both the switch and the end nodes. Connecting
the cables prior to configuring the ports can create loops in your network topology.
Loops can result in broadcast storms which can severely limited the effective bandwidth
of your network.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
2. Click on Bridge, click on Trunk Config, and click on Trunking. 4. Click Save Settings to Flash (menu).
3. Review the settings. For each trunk group, click Apply to save changes.
For each Trunk ID/Group, check the port numbers to add for each trunk group. 5. Click Save Settings to Flash (button), then click OK.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
View your trunk group status information Configure your port priority
Bridge > Trunk Config > LACP Group Status Bridge > Trunk Config > Port Priority
1. Log into your switch management page (see “Access your switch management page”
1. Log into your switch management page (see “Access your switch management page” on page 7).
on page 7).
2. Click on Bridge, click on Trunk Config, and click on Port Priority.
2. Click on Bridge, click on Trunk Config, and click on LACP Group Status.
3. View your trunk group status information. 3. Review the settings. Click Apply to save changes.
To assign a port higher priority within a trunk group, find the port number and in the
• System Priority - Preassigned setting that cannot be modified. This value priority column, enter a priority value 0-65535 (65535 being the highest priority).
applies to the switch.
• System ID - MAC address value assigned to the individual switch. This value
cannot be modified.
• Group: # The ID number of the trunk (link aggregation group).
Mirroring To copy data transmitted on specific port, check the port number under the Egress Port
Configure port mirror settings section or you could click All to copy data transmitted on all ports.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
Loopback Detection In the Loopback Detection table, select one of the Loopback Detection State choices
Enable loopback detection from the pull down menu:
Ignore: This parameter indicates that the setting in the All row do not apply to the
Bridge > Loopback Detection Loopback Detection State field. In other words, each port is set individually.
The loopback detection feature allows the switch to detect and prevent disruption from
loops that occur on uplink or downlink switches directly connected to your switch. • Enabled: This selection enables the Loopback Detection feature for each port.
This state must be enabled along with the State field at the top of the page
1. Log into your switch management page (see “Access your switch management page” before this feature can be active on the selected port.
on page 7). • Disabled: This selection disables the Loopback Detection feature on the
selected port.
• Note: In the All row when you select Enable or Disable instead of Ignore, the
2. Click on Bridge and click on Loopback Detection. selection applies to all of the Switch ports.
3. Review the settings. Next to each entry modified, under the Action column, click Apply to save the changes.
Static Unicast In the list, you can click Modify to modify an entry or click Delete or delete the entry.
Add static unicast entries to the switch You can also click Delete All to delete all the entries in the list. If the entries span
multiple pages, you can navigate page number in the Page field and click Go or you can
Bridge > Static Unicast click First, Previous, Next, and Last Page to navigate the pages.
In this section, you can add static unicast entries to the switch configuration.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
Static Multicast In the list, you can click Modify to modify an entry or click Delete or delete the entry. If
Add static multicast entries to the switch the entries span multiple pages, you can navigate page number in the Page field and
click Go or you can click First, Previous, Next, and Last Page to navigate the pages.
Bridge > Static Multicast
In this section, you can add static multicast entries to the switch configuration.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
• 802.1Q VLAN – Enter the VLAN ID where the multicast group MAC address will
reside.
5. Click Save Settings to Flash (button), then click OK.
Note: By default, all switch ports are part of the default VLAN, VLAN ID 1.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
• MAC Address – Enter the multicast group MAC address. switch is rebooted or power cycled, the configuration changes will still be applied.
• Group Member – Check the port(s) where the MAC address will reside.
Note: You can click All to select all ports.
Click Apply to add the Static Multicast Group entry to the list.
IGMP Snooping The table below displays the static multicast address groups defined in your switch for
Configure IGMP Snooping Settings reference and can be modified on under Bridge > Static Multicast or dynamically
updated with the active multicast address groups.
Bridge > IGMP Snooping > IGMP Snooping Settings
1. Log into your switch management page (see “Access your switch management page”
on page 7).
1. Log into your switch management page (see “Access your switch management page”
on page 7).
To modify an entry, click Modify to add statically add router ports. Bandwidth Control
Configure Storm Control
Bridge > Bandwidth Control > Storm Control
This section allows you to configure the DLF (Destination Lookup Failure), broadcast,
and multicast storm settings for each switch port.
1. Log into your switch management page (see “Access your switch management page”
Check the static router ports to add and click Apply to save the settings. on page 7).
Note: You can click on All to add all ports. Clicking Restore will restore the static router
port settings to default. 2. Click on Bridge, click on Bandwidth Control, and click on Storm Control.
3. Review the settings for each port. Click Apply to save the settings.
• DLF (Destination Lookup Failure) – Click the drop-down list and select Enabled
to enable DLF storm control.
• Broadcast – Click the drop-down list and select Enabled to enable broadcast
storm control.
• Multicast – Click the drop-down list and select Enabled to enable multicast
storm control.
• Threshold – Enter the pps (packets per second) threshold.
Note: Modifying settings in the row marked All, will apply the settings to all
ports.
1. Log into your switch management page (see “Access your switch management page” 1. Log into your switch management page (see “Access your switch management page”
on page 7). on page 7).
2. Click on Bridge, click on Bandwidth Control, and click on Ingress Rate Limiting. 2. Click on Bridge, click on Bandwidth Control, and click on Egress Rate Limiting.
3. Review the settings for each port. Click Apply to save the settings. 3. Review the settings for each port. Click Apply to save the settings.
• Bandwidth – Enter the ingress rate limit value. • Bandwidth – Enter the egress rate limit value.
• Status – Click the drop-down list and select Enabled to enable ingress rate • Status – Click the drop-down list and select Enabled to enable egress rate
limiting or select Disabled to disable ingress rate limiting. limiting or select Disabled to disable egress rate limiting.
Note: Modifying settings in the row marked All, will apply the settings to all Note: Modifying settings in the row marked All, will apply the settings to all
ports. ports.
4. Click Save Settings to Flash (menu). 4. Click Save Settings to Flash (menu).
5. Click Save Settings to Flash (button), then click OK. 5. Click Save Settings to Flash (button), then click OK.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied. switch is rebooted or power cycled, the configuration changes will still be applied.
In the sections Static Tagged, Static Untagged, and Not Member, you can add the type
of VLAN ports to add to the new VLAN (Tagged or Untagged) and assign ports that are
not members (Forbidden) of the new VLAN.
Select the not member ports to restrict from the new VLAN. Configure VLAN Port Settings
Bridge > VLAN > Port Settings
In this section, you can modify the port VID settings, acceptable frame types, and
ingress filtering.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
Configure the VLAN Forwarding Table Mode View the switch VLAN dynamic forwarding table
Bridge > VLAN > Forwarding Table Mode Bridge > VLAN > Dynamic Forwarding Table
This section allows you to configure your switch to standard 802.1Q VLAN mode (IVL) or This section allows you to view the VLAN forwarding table with dynamically generated
Asymmetric VLAN mode (SVL). Asymmetric VLAN allows the configuration of forwarding table entries as devices more devices are connected to your switch.
overlapping untagged VLAN ports in order to create VLAN groups. It is recommended to
use the standard 802.1Q VLAN mode when possible.
1. Log into your switch management page (see “Access your switch management page”
IVL – Independent VLAN Learning on page 7).
SVL – Shared VLAN Learning
Please note the following when switching between forwarding table modes: 2. Click on Bridge, click on VLAN, and click on Dynamic Forwarding Table.
• FDB (Forwarding Database) will be cleared.
• Static Unicast Address entries will be cleared. 3. By default, forwarding entries for all ports are listed. You can click the Port drop-
• Static Multicast Address entries will be cleared. down list to select a specific port to view only the forwarding entries for the selected
port.
• 802.1X authenticated records will be cleared.
• IGMP Snooping multicast group addresses will be cleared
If the entries span multiple pages, you can navigate page number in the Page field and
• When using SVL mode, Voice VLAN will not be supported.
click Go or you can click First, Previous, Next, and Last Page to navigate the pages.
• When using SVL mode, the VID field on 802.1Q-VLAN mode will be displayed as
"N/A".
1. Log into your switch management page (see “Access your switch management page”
on page 7).
3. Click the learning mode drop-down list to select the forwarding table mode and click
Apply to save settings.
Note: The default mode is IVL.
Create a private VLAN • Click on the Forwarding Ports ratio button that applies to your configuration.
Bridge > VLAN > Private VLAN • Click Apply.
The private VLAN feature allows you to create a more secure VLAN that is completely
isolated to it’s members and cannot communicate with other VLANs. A private VLAN
partitions the Layer 2 broadcast domain of a VLAN into subdomains, allowing you to
isolate the ports on the switch from each other. A subdomain consists of a primary
VLAN and one or more secondary VLANs. All VLANs in a private VLAN domain share the
same primary VLAN. The secondary VLAN ID differentiates one subdomain from
another. The secondary VLANs may either be isolated VLANs or community VLANs. A
host on an isolated VLAN can only communicate with the associated promiscuous port
in its primary VLAN. Hosts on community VLANs can communicate among themselves
and with their associated promiscuous port but not with ports in other community
VLANs.
The following guidelines apply when configuring private VLANs: The default VLAN 1
cannot be a private VLAN. The management VLAN 4095 cannot be a private VLAN. The
management port cannot be a member of a private VLAN.IGMP Snooping must be
disabled on isolated VLANs. Each secondary port's (isolated port and community ports)
PVID must match its corresponding secondary VLAN ID. Ports within a secondary VLAN
cannot be members of other VLANs. All VLANs that make up the private VLAN must
belong to the same Spanning Tree Group.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
4. Click Save Settings to Flash (menu). GVRP (GARP VLAN Registration Protcol)
The GARP VLAN Registration Protocol (GVRP) allows network devices to share VLAN
5. Click Save Settings to Flash (button), then click OK. information and to use the information to modify existing VLANs or create new VLANs,
Note: This step saves all configuration changes to the NV-RAM to ensure that if the automatically. This makes it easier to manage VLANs that span more than one switch.
switch is rebooted or power cycled, the configuration changes will still be applied. Without GVRP, you have to manually configure your switches to ensure that the various
parts of the VLANs can communicate with each other across the different switches.
With GVRP, which is an application of the Generic Attribute Registration Protocol
(GARP), this is done for you automatically.
View the current VLAN database
Bridge > VLAN > VLAN Database
Enable GVRP
Bridge > GVRP > GVRP Global Settings
1. Log into your switch management page (see “Access your switch management page”
on page 7). 1. Log into your switch management page (see “Access your switch management page”
on page 7).
1. Log into your switch management page (see “Access your switch management page”
on page 7).
3. Review the settings for each port. Click Apply to save the settings.
4. Click Save Settings to Flash (menu).
• Port - This parameter displays the ports on the switch.
• Dynamic Vlan Status - This parameter defines the GVRP status of the port.
From the Dynamic Vlan Status field, select one of the following choices from
the pull-down menu:
o Ignore - This parameter indicates that the setting in the All row does 5. Click Save Settings to Flash (button), then click OK.
not apply to the Dynamic Vlan Status field. In other words, each port Note: This step saves all configuration changes to the NV-RAM to ensure that if the
is set individually. switch is rebooted or power cycled, the configuration changes will still be applied.
o Enable - The Dynamic Vlan is activated for the port row selected.
o Disable - The Dynamic Vlan is de-active for the port row selected.
• Restricted VLAN Registration - This parameter controls if the VLAN registration
on the port is restricted or not.
o Ignore - This parameter indicates that the setting in the All row does
not apply to the Restricted VLAN Registration field. In other words,
each port is set individually.
o Enable - The Restricted VLAN Registration is active for the port row
selected.
o Disable - The Restricted VLAN Registration is de-active for the port
row selected.
1. Log into your switch management page (see “Access your switch management page”
on page 7). 4. Click Save Settings to Flash (menu).
3. Review the settings for each port. Click Apply to save the settings. 5. Click Save Settings to Flash (button), then click OK.
• Port - This parameter displays the ports on the switch. Note: This step saves all configuration changes to the NV-RAM to ensure that if the
• JoinTime - This parameter is the GARP Join Timer. Its range is 10 - 1073741810 switch is rebooted or power cycled, the configuration changes will still be applied.
milli-seconds.
• LeaveTime - This parameter is the GARP Leave Timer. Its range is 30 -
2147483630 milli-seconds. This timer must be set in relation to the GVRP Join
Timer according to the following equation:
• GARPLeaveTimer >= (GARPJoinTimer X 2) + 10
• GarpLeaveAllTime - This parameter is the GARP Leave Timer. Its range is 30 -
2147483630 milli-seconds. This timer must be set in relation to the GVRP Leave
Timer according to the following equation:
• GARPLeaveAllTimer > (GARPLeaveTimer + 10)
Note: Before mapping the CoS priorities and the egress queues, you must disable the
Jumbo frame parameter on each port. When Jumbo frames are enabled, COS cannot be
enabled. 4. Click Save Settings to Flash (menu).
1. Log into your switch management page (see “Access your switch management page”
on page 7).
Set Port Priority Set DSCP (Differentiated Services Code Point) Class Mapping settings
Bridge > QoS > Port Priority Bridge > QoS > DSCP
The Port Priority values are assigned to an untagged frame at ingress for internal If you choose to use the DSCP tags in your Access Control policy configuration, each
processing in the switch. This procedure explains how to change the default mappings of DSCP value (0-63) that is relevant to your configuration needs to be mapped to one of
port priorities to the User Priority. This is set at the switch level. You cannot set this at the four egress queues(Low, Medium, High, or Highest). The default queue for all DSCP
the per-port level. To change the port priority mappings, perform the following values is 0.To assign the queue mappings to the DSCP values, perform the following
procedure. procedure.
1. Log into your switch management page (see “Access your switch management page” 1. Log into your switch management page (see “Access your switch management page”
on page 7). on page 7).
2. Click on Bridge, click on QoS and click on Port Priority. 2. Click on Bridge, click on QoS and click on DSCP.
3. For each port whose priority you want to change, select a priority (0-7) in the User 3. For each DSCP In value that is relevant to your configuration, select a queue (Low,
Priority column. Click Apply to save the settings. Medium, High, or Highest) in the Queue column. Select Enabled in the DSCP Mapping
drop-down list. Click Apply to save the settings.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
Configure the IPv6 Traffic Class Priority Settings In the list, you can click Modify to modify an entry or click Delete or delete the entry.
Bridge > QoS > IPv6 Traffic Class Priority Settings You can also click Delete All to delete all of the entries in the table. If the entries span
multiple pages, you can navigate page number in the Page field and click Go or you can
click First, Previous, Next, and Last Page to navigate the pages.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
2. Click on Bridge, click on QoS and click on IPv6 Traffic Class Priority Settings.
• IPv6 Traffic Class Global Settings: Select Enable or Disable. Click Apply to save
the settings.
• IPv6 Traffic Class (0-255): Specify the value of IPv6 class.
• Class ID: Defines the priority assigned to the port. The priorities are Highest, 4. Click Save Settings to Flash (menu).
High, Medium and Low.
Click Add to add the traffic class setting entry to the table.
1. Log into your switch management page (see “Access your switch management page”
3. Review the settings.
on page 7).
3. Review the settings. Click Apply to save the settings. • Enter the View Name. This entry must be pre-defined on the SNMP
User/Group page.
• Engine ID (10-64 Hex Characters) – Enter the local device Engine ID. The field
value is a hexadecimal string. Each byte in hexadecimal character strings is two • Enter the Subtree OID.
hexadecimal digits. The Engine ID must be defined before SNMP is enabled. • Enter “1” for the OID Mask.
• Reset to Default – Use the device-generated Engine ID (Reset to Default will • Enter the View Type. Choose from the following options, and then click Add.
override any entry in the Engine ID field). o Included: This selection allows the specified MIB object to be included
in the view.
o Excluded: This selection blocks the view of the specified MIB object.
Modifying SNMP View Table Entries Configure the SNMP Group Access Table
If you need to modify an entry in the View Table page, you must first delete the entry SNMP > Group Access Table
and then re-enter it. The SNMP View Names are defined in the SNMP Group Access table and are based on
the User and Group Names
Deleting SNMP View Table Entries
In the Action column of the table, click Delete for the View table entry that you want to 1. Log into your switch management page (see “Access your switch management page”
remove. on page 7).
1. Log into your switch management page (see “Access your switch management page”
on page 7).
• Click Add. The new User Name and Group Name are displayed on the SNMP Configure the SNMP Community Table
User/Group page. SNMP > Community Table
A community string has attributes for controlling who can use the string and what the
string will allow a network management station to do on the switch. The Web
Management Utility does not provide any default community strings. You must first
define an SNMP User and Group Name on the SNMP User/Group page and then define a
Community Name on the SNMP Community Table page.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
• Enable trap management by selecting the radio button next to Enabled at the
4. Click Save Settings to Flash (menu). top of the page. By default, trap management is enabled.
• Enter the Host IP Address for the management device that is toreceive the
SNMP traps.
• Enter the SNMP Version, either v1 or v2c, that is configured for the host
management device.
5. Click Save Settings to Flash (button), then click OK.
• Enter a Community Name that you have defined previously in the SNMP
Note: This step saves all configuration changes to the NV-RAM to ensure that if the Community table. The Community Name must correlate with one of the
switch is rebooted or power cycled, the configuration changes will still be applied. communities displayed on the SNMP Community Table page. If you enter a
Community Name that has not been pre-defined, the Trap Host entry is
displayed, but agent/manager communication fails.
• Click Add. The new host is added to the table.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
Add L2+IPv4 o Destination Layer 4 Port - Indicates the destination layer 4 port
To add an L2+IPv4 policy, use the following procedure: ranging from 1 - 65535.
• Click Add L2+ IPv4, The Policy Settings page. o Policy Sequence: Enter a number in the Policy Sequence field. The
Policy Sequence must be a unique number within the range of 1 -
• Enter a number in the Policy Index field. The Policy Index is a unique number
65535. This field is mandatory.
within the range of 1 – 65535 which identifies the policy. This field is
mandatory. o Policy Action: In the Permit/Deny field, use the pull down menu to
select one of the following parameters:
• Choose the parameters to add for the policy, and enter data one or more of the
parameters required for your policy. They are listed here: o Deny - This selection drops ingress packets that conform to the
specified Replaced-CoS or Replaced-DSCP.
o Source MAC Address - Specifies the source MAC address. The format
is xx.xx.xx.xx.xx.xx. o Permit - This selection allows ingress packets that conform to the
specified Replaced-CoS or Replaced-DSCP to be processed by the
o Source MAC Mask Length - Indicates the length of the Source MAC switch.
Mask ranging from 1- 48.
Note: You must enter a selection for Deny/Permit field even if the
o Destination MAC Address - Specifies the destination MAC address. Profile Action ID that you have entered ignores both the Replaced-
The format is xx.xx.xx.xx.xx.xx. DSCP and Replaced-CoS fields.
o Destination MAC Mask Length - Indicates the length of the o Replaced-CoS: Enter a number in the Replaced-CoS field ranging from
Destination MAC Mask ranging from 1 - 48. 0 to 7. This field indicates the CoS level of interest. This field is not
o VLAN ID - A unique number identifying a VLAN ranging from 1 to mandatory and you may elect to leave it blank
4094. o Replaced-DSCP: Enter a number in the Replaced-DSCP field within the
o 802.1p Priority - 802.1p priority level of the frame ranging from 0 to 7. range of 0 to 63. This field indicates the DSCP level of interest. This
o Ether Type - Indicates the protocol of the ethernet frame protocol field is not mandatory and you may elect to leave it blank.
ranging from 0000 to FFFF. o Rate Control Index: The Rate Control Index is a unique number within
o Protocol - Indicates the packet protocol ranging from 0 to 255. the range of 1 - 65535. This field is mandatory and must match a Port
List Index that has been previously entered on the Policy Index.
o Source IP Address - Specifies the source IP address.
o Port List: Select the interface for which you want to display data.
o Source IP Mask Length - Specifies the mask length of the source IP
address ranging from 0 - 32. • Click Add to add the policy to the Policy Table.
o Destination IP Address - Specifies the destination IP address.
o Destination IP MAC Mask Length - Specifies the mask length of the
destination IP address ranging from 0 - 32.
o DSCP - The DSCP (Differentiated Services Code Point) value in the IP
header ranging from 0 - 63.
o Source Layer 4 Port - Indicates the source layer 4 port ranging from 1 -
65535.
Add IPv6
To add an IPv6 policy, use the following procedure:
• Click Add IPv6, The Policy Settings page.
• Enter a number in the Policy Index field. The Policy Index is a unique number
within the range of 1 – 65535 which identifies the policy. This field is
mandatory.
• Choose the parameters to add for the policy, and enter data one or more of the
parameters required for your policy. They are listed here:
o VLAN ID - A unique number identifying a VLAN ranging from 1 to 4094.
o 802.1p Priority - 802.1p priority level of the frame ranging from 0 to 7.
o Protocol - Indicates the packet protocol ranging from 0 to 255.
o IPv6 Source IP Address - Specifies the IPv6 Source IP address.
o Prefix Length - Indicates the length of the Source IP ranging from 1-
128.
o IPv6 Destination IP Address - Specifies the IPv6 Destination IP
address.
o Prefix Length - Indicates the length of the Destination IP ranging from
1- 128.
o Source Layer 4 Port - Indicates the source layer 4 port ranging from 1 -
65535.
o Destination Layer 4 Port - Indicates the destination layer 4 port
ranging from 1 - 65535.
o Policy Sequence: Enter a number in the Policy Sequence field. The
Policy Sequence must be a unique number within the range of 1 -
65535. This field is mandatory.
o Policy Action: In the Permit/Deny field, use the pull down menu to
select one of the following parameters:
o Deny - This selection drops ingress packets that conform to the
specified Replaced-CoS or Replaced-DSCP.
o Permit - This selection allows ingress packets that conform to the
specified Replaced-CoS or Replaced-DSCP to be processed by the
switch.
Note: You must enter a selection for Deny/Permit field even if the
Profile Action ID that you have entered ignores both the Replaced-
DSCP and Replaced-CoS fields.
o Replaced-CoS: Enter a number in the Replaced-CoS field ranging from In the list, you can click Modify to modify an entry or click Delete or delete the entry.
0 to 7. This field indicates the CoS level of interest. This field is not You can also click Delete All to delete all of the entries in the table. If the entries span
mandatory and you may elect to leave it blank multiple pages, you can navigate page number in the Page field and click Go or you can
o Replaced-DSCP: Enter a number in the Replaced-DSCP field within the click First, Previous, Next, and Last Page to navigate the pages.
range of 0 to 63. This field indicates the DSCP level of interest. This
field is not mandatory and you may elect to leave it blank.
o Rate Control Index: The Rate Control Index is a unique number within
the range of 1 - 65535. This field is mandatory and must match the
Rate Control Settings page.
o Port List: Select the interface for which you want to display data.
• Click Add to add the policy to the Policy Table.
In the list, you can click Modify to modify an entry or click Delete or delete the entry.
You can also click Delete All to delete all of the entries in the table. If the entries span
multiple pages, you can navigate page number in the Page field and click Go or you can
click First, Previous, Next, and Last Page to navigate the pages.
You can use your SNMP Network Management System (NMS) software and the RMON
section of the MIB tree to view the RMON statistics, history and alarms associated with
specific ports. Since RMON uses the SNMP agent for communicating with your NMS
software, the SNMP Agent must be enabled and the SNMP feature must be configured
4.View the active poicies associated with the specified port. on your switch. Since RMON works in conjunction with the SNMP agent, the SNMP
agent must be enabled for the RMON feature to be active.
Enable RMON
RMON > Global Settings
This section allows you to enable or disable RMON functionality.
5. Click Save Settings to Flash (menu).
1. Log into your switch management page (see “Access your switch management page”
on page 7).
6. Click Save Settings to Flash (button), then click OK. 2. Click on RMON and click on Global Settings.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
3. Click the RMON Status drop-down list and select Enabled to enable RMON. Click Configure parameters for RMON Ethernet statistics
Apply to save settings. RMON > Statistics
You can remotely view individual port statistics with RMON by using your SNMP NMS
software and the RMON portion of the MIB tree.
1. Log into your switch management page (see “Access your switch management page”
4. Click Save Settings to Flash (menu). on page 7).
5. Click Save Settings to Flash (button), then click OK. 3. Review the settings.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the • Index: This parameter specifies the ID number of the new group. The range is 1
switch is rebooted or power cycled, the configuration changes will still be applied. to 65535.
• Port: This parameter specifies the port where you want to monitor the
statistical information of the Ethernet traffic.
• Owner: This parameter is used to identify the person who created an entry. It is
primarily intended for switches that are managed by more than one person,
and is an optional field.
In the list, you can click Modify to modify an entry or click Delete or delete the entry. If Configure parameters for RMON history control settings
the entries span multiple pages, you can navigate page number in the Page field and RMON > History
click Go or you can click First, Previous, Next, and Last Page to navigate the pages.
RMON histories are snapshots of port statistics. They are taken by the switch at
predefined intervals and can be used to identify trends or patterns in the numbers or
types of ingress packets on the ports on the switch. The snapshots can be viewed with
your SNMP NMS software with the history group of the RMON portion of the MIB tree.
A history group is divided into buckets. Each bucket stores one snapshot of statistics of a
port. A group can have from 1 to 50 buckets. The more buckets in a group, the more
snapshots it can store.
1. Log into your switch management page (see “Access your switch management page”
4. Click Save Settings to Flash (menu). on page 7).
5. Click Save Settings to Flash (button), then click OK. 3. Review the settings.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the • Index: This parameter specifies the ID number of the new group. The range is 1
switch is rebooted or power cycled, the configuration changes will still be applied. to 65535.
• Port: This parameter specifies the port where you want to monitor the
statistical information of the Ethernet traffic.
• Buckets Requested: This parameter defines the number of snapshots of the
statistics for the port. Each bucket can store one snapshot of RMON statistics.
Different ports can have different numbers of buckets. The range is 1 to 50
buckets.
• Interval: This parameter specifies how frequently the switch takes snapshots of
the port’s statistics. The range is 1 to 3600 seconds (1 hour). For example, if
you want the switch to take one snapshot every minute on a port, you specify
an interval of sixty seconds.
• Owner: This parameter is used to identify the person who created an entry. It is
primarily intended for switches that are managed by more than one person,
and is an optional field.
Click Add to add the entry to the table. Configure parameters for RMON alarms
RMON > Alarm
RMON alarms are used to generate alert messages when packet activity on designated
ports rises above or falls below specified threshold values. The alert messages can take
the form of messages that are entered in the event log on the switch or traps that are
sent to your SNMP NMS software or both.
RMON alarms consist of two thresholds. There is a rising threshold and a falling
threshold. The alarm is triggered if the value of the monitored RMON statistic of the
designated port exceeds the rising threshold. The response of the switch is to enter a
message in the event log, send an SNMP trap, or both. The alarm is reset if the value of
the monitored statistic drops below the falling threshold.
The frequency with which the switch samples the thresholds of an alarm against the
actual RMON statistic is controlled by a time interval parameter. You can adjust this
interval for each alarm.
In the list, you can click Modify to modify an entry or click Delete or delete the entry.
You can also click Delete All to delete all of the entries in the table. If the entries span
multiple pages, you can navigate page number in the Page field and click Go or you can Here are the three components that comprise RMON alarms:
click First, Previous, Next, and Last Page to navigate the pages. • RMON statistics group: A port must have an RMON statistics group configured
if it is to have an alarm. When you create an alarm, you specify the port to
which it is to be assigned not by the port number, but rather by the ID number
of the port’s statistics group.
• RMON event: An event specifies the action of the Switch when the ingress
packet activity on a port crosses a statistical threshold defined in an alarm. The
choices are to log a message in the event log of the Switch, send an SNMP trap
to an SNMP workstation, or both. Since there are only three possible actions
4. Click Save Settings to Flash (menu). and since events can be used with more than one alarm, you probably will not
create more than three events.
• Alarm: The last component is the alarm itself. It defines the port statistic to be
monitored and the rising and falling thresholds that trigger the switch to
perform an event. The thresholds of an alarm can have the same event or
5. Click Save Settings to Flash (button), then click OK. different events. The switch supports up to eight alarms.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
1. Log into your switch management page (see “Access your switch management page” Click Add to add the entry to the table.
on page 7).
Configure parameters for RMON events Click Add to add the entry to the table.
RMON > Event
An event specifies the action of the switch when the ingress packet activity on a port
crosses a statistical threshold defined in an alarm. The choices are to log a message in
the event log of the switch, send an SNMP trap to an SNMP workstation, or both. Since
there are only three possible actions and since events can be used with more than one
alarm, you probably will not create more than three events - one for each of the three
actions.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
2. Click on RMON and click on Event. In the list, you can click Modify to modify an entry or click Delete or delete the entry.
You can also click Delete All to delete all of the entries in the table. If the entries span
multiple pages, you can navigate page number in the Page field and click Go or you can
3. Review the settings. click First, Previous, Next, and Last Page to navigate the pages.
• Index: This parameter specifies the ID number of the new group. The range is 1
to 65535.
• Description: This parameter specifies a text description of the event that you
are configuring.
• Type: This parameter specifies where to log the event when it occurs. The
choices are to log a message in the event log of the Switch, send an SNMP trap
to the SNMP NMS software, or both.
• Community: This parameter specifies the community where you want to send
the SNMP trap. 4. Click Save Settings to Flash (menu).
• Owner: This parameter is used to identify the person who created an entry. It is
primarily intended for switches that are managed by more than one person,
and is an optional field.
Voice VLAN However, it is possible that you can find more than one OUI from the same
manufacturer among the IP phones you are installing. It is also possible that your IP
This chapter contains a description of the Switch’s Voice VLAN feature and the phones are from two or more different manufacturers in which case you will find
procedures to create, modify, and delete a voice VLAN configuration. different OUIs for each manufacturer. If you identify more than one OUI among the IP
The Voice VLAN feature is specifically designed to maintain high quality, uninterrupted phones being installed, then one MAC address representing each individual OUI must be
voice traffic through the switch. When talking on a voice over IP phone, a user expects configured in the voice VLAN. You can enter a total of 10 OUIs.
to have no interruptions in the conversation and excellent voice quality. The Voice VLAN
feature can be configured to meet these requirements.
Dynamic Auto-Detection vs Static Ports
Prior to configuring the voice VLAN, you must configure a tagged VLAN which is the
CoS with Voice VLAN basis for the voice VLAN configuration. The VLAN must be configured with one or more
The Voice VLAN CoS parameter maintains the voice quality between the ingress and tagged or untagged ports that will serve as the voice VLAN uplink/downlink. By default,
egress ports of the switch. CoS must be enabled for the Voice VLAN CoS priority to take a tagged or untagged port is a static member of a tagged VLAN. The ports that you
effect. The CoS priority level that you config is applied to voice traffic on all ports of the choose to configure as dynamic Auto-Detection ports
voice VLAN. Normally, most (non-Voice) Ethernet traffic transverses the switch through must be connected directly to an IP phone. When you initially define the ports of a
lower order egress queues. To avoid delays and interruptions in the voice data flow, the tagged VLAN for your voice VLAN configuration, they must be configured as a “Not
CoS priority level assigned to the voice VLAN should be mapped to a higher order queue Member” ports. The “Not Member” ports are eligible to dynamically join the voice VLAN
and the scheduling algorithm should be set to Strict Priority. These settings ensure that when voice data is detected with a predefined OUI in the source MAC address. The port
the voice data packets are processed before other types of data so that the voice quality will leave the voice VLAN after a specified timeout period. This port behavior is
is maintained as the voice data passes through the switch. configured with the voice VLAN Auto-Detection feature.
For the Auto-Detection feature to function, your IP phone(s) must be capable of
Organization Unique Identifier (OUI) generating 802.1Q packets with imbedded VLAN ID tags. You must manually configure
Each IP phone manufacturer can be identified by one or more Organization Unique your IP phone(s) for the same VLAN ID as the switch’s voice VLAN ID. When voice data is
Identifiers (OUIs). An OUI is three bytes long and is usually expressed in hexadecimal detected on one of the “Not Member” ports, the packets from the IP phone will contain
format. It is imbedded into the first part of each MAC address of an Ethernet network the voice VLAN ID so they are switched within the switch’s voice VLAN.
device. You can find the OUI of an IP phone in the first three complete bytes of its MAC One or more ports in your voice VLAN must be configured as Static tagged or untagged
address. members. Static VLAN members are permanent member ports of the voice VLAN and
Typically, you will find that all of the IP phones you are installing have the same OUI in there is no dependency on the configuration of the devices connected to the ports.
common. The switch identifies a voice data packet by comparing the OUI information in These ports might be connected to other voice VLAN network nodes such as other
the packet’s source MAC address with an OUI table that you configure when you initially Ethernet switches, a telephone switch, or a DHCP server. The voice VLAN Auto-
set up the voice VLAN. This is important when the Auto-Detection feature for a port and Detection feature cannot be enabled on Static tagged or tagged ports.
is a dynamic voice VLAN port. Note: Any Static tagged members of the voice VLAN are required to have the port VLAN
When you are configuring the voice VLAN parameters, you must enter the complete ID (PVID) configured to be the same as the voice VLAN ID. This insures that all untagged
MAC address of at least one of your IP phones. An “OUI Mask” is automatically packets entering the port are switched within the voice VLAN as the voice data passes
generated and applied by the Web Management Utility software to yield the through the switch.
manufacturer’s OUI. If the OUI of the remaining phones from that manufacturer is the If the IP phone(s) that you are installing cannot be configured with a VLAN ID, then the
same, then no other IP phone MAC addresses need to be entered into the configuration. switch ports should be configured as Static tagged ports within the voice VLAN.
Note: Link Layer Discovery Protocol for Media Endpoint Devices (LLDP- MED) is not port will be removed from the voice VLAN. The range is 1 to 120
supported on the switch. Each IP phone that is VLAN aware should be manually hours.
configured for the VLAN ID that matches your voice VLAN ID. Each of the voice VLAN o CoS - This parameter is CoS priority level assigned to the voice data
ports connected to an IP phone should be configured as “Not Member” ports of the packets received on each voice VLAN port. For the COS priority to be
tagged VLAN. effective, QoS must be Enabled.
Click Apply to save the settings.
Create a Voice VLAN
Voice VLAN > Voice VLAN Settings
Note: Prior to configuring your voice VLAN, you must first configure a tagged VLAN. This
VLAN will be used as a basis for your voice VLAN.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
• Enter the MAC address in the User Defined OUI - Telephony OUI field of one of
the IP phones with the manufacturer's OUI.
• Click Add. The new OUI entry is displayed in the table at the bottom of the
page.
Note: If you find more than one OUI among the IP phones you are installing,
enter one MAC address that represents each individual OUI. You can enter a
total of 10 OUIs.
This chapter contains information about the Port-based security features and the Configure the following parameters as required:
procedures for setting this feature. • NAS ID - This parameter assigns an 802.1x identifier to the switch that applies
to all ports. The NAS ID can be up to sixteen characters. Valid characters are 0
to 9, a to z, and A to Z. Spaces are allowed. Specifying an NAS ID is optional.
Configure Port Access Control
• Port Access Control - This parameter enables or disables Port Access Control.
Security > Port Access Control
Select one of the following choices from the pulldown menu:
This section contains information and configuration procedures for the
o Enable: The Port Access Control feature is activated.
Port-based Access Control. Port-based Network Access Control (IEEE 802.1x) is used to
o Disable: The Port Access Control feature is de-activated.
control who can send traffic through and receive traffic from a switch port. With this
feature, the switch does not allow an end node to send or receive traffic through a port • Authentication Method - This parameter indicates the authentication method
until the user of the node logs on by entering a user name and password. used by the switch. Select one of the following choices:
This feature can prevent an unauthorized individual from connecting a computer to a o RADIUS: This parameter configures port security for remote
port or using an unattended workstation to access your network resources. Only those authentication. After completing steps, you must configure the
users to whom you have assigned a user name and password are able to use the switch “RADIUS Client” section.
to access the network. o Local: This parameter configures port security for local authentication.
This feature can be used with one of two authentication methods: After completing steps, you must configure the parameters for “Dial-in
User— Local Authentication” section.
• The RADIUS authentication protocol requires that a remote RADIUS server is
present on your network. The RADIUS server performs the authentication of o TACACS+: This parameter configures port security for terminal
the user name and password combinations. authentication. After completing steps, you must configure the
“TACACS+ Settings” section.
• The Dial-in User (local) authentication method allows you to set up the
authentication parameters internally in the switch without an external server.
In this case, the user name and password combinations are entered in the
associated with an optional VLAN when they are defined. Based on these
entries, the authentication process is done locally by the Web Management
Utility using a standard EAPOL transaction.
Note: RADIUS with Extensible Authentication Protocol (EAP) extensions is the only
supported authentication server for this feature.
1. Log into your switch management page (see “Access your switch management page” 4. Click Save Settings to Flash (menu).
on page 7).
5. Click Save Settings to Flash (button), then click OK.
2. Click on Security and click on Port Access Control. Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
Create Dial-In Users (Local Authentication Method) In the list, you can click Modify to modify an entry or click Delete or delete the entry.
Security > Dial-in User You can also click Delete All to delete all of the entries in the table. If the entries span
multiple pages, you can navigate page number in the Page field and click Go or you can
Dial-in User feature provides the local authentication server for port security when a
click First, Previous, Next, and Last Page to navigate the pages.
remote (RADIUS) server is not available.
The Dial-in User (local) authentication method allows you to set up 802.1x
authentication parameters internally in the Switch. In this case, the user name and
password combinations are entered with an optional VLAN when they are defined.
Based on these entries, the authentication process of a supplicant is done locally by the
Switch Management Utility using a standard EAPOL (EAP over LAN) transaction.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
Add RADIUS Servers (RADIUS Authentication Method) In the list, you can click Modify to modify an entry or click Delete or delete the entry.
Security > RADIUS
1. Log into your switch management page (see “Access your switch management page”
on page 7).
1. Log into your switch management page (see “Access your switch management page”
on page 7). In the list, you can click Modify to modify an entry or click Delete or delete the entry.
Destination MAC Filter 4. The MAC address will be added to the table.
Security > Destination MAC Filter
This section contains an explanation of the Destination MAC Filter feature as well a In the list, you can click Modify to modify an entry or click Delete or delete the entry.
procedure for configuring it. This section includes the following information: You can also click Delete All to delete all of the entries in the table. If the entries span
The Destination MAC Filter feature prevents the switch from forwarding packets to a multiple pages, you can navigate page number in the Page field and click Go or you can
specified device. On the Destination MAC Filter Page of the Web Management Utility click First, Previous, Next, and Last Page to navigate the pages.
software, enter the MAC address of the device that you want to filter.
After the switch receives a packet, it examines the destination MAC address of the
packet. If the destination MAC address matches a MAC address set in the filter, the
software prevents the switch from forwarding it and drops the packet.
You may want to block access to a device within your organization. For instance, you
may not want users on the Sales group switch to have access to a server on the
Accounting group switch. You can enter the MAC address of the Accounting server as a
destination MAC address filter on the Sales group switch. When a packet destined for
the Accounting server is received by the Sales group switch, the switch drops the packet. 5. Click Save Settings to Flash (menu).
The Destination MAC Filter is a subset of the static MAC address.
1. Log into your switch management page (see “Access your switch management page” 6. Click Save Settings to Flash (button), then click OK.
on page 7). Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
2. Click on Security and click on Destination MAC Filter.
3. Enter the MAC Address to add to the destination filter table. Click Add.
Denial of Service (DoS) 3. Next to the DoS item/rule you would like to activate, click the drop-down menu on
Security > Denial of Service the right hand side and select Deny.
The switch has built-in DoS prevention features to restrict specific type of traffic
associated denial of service attacks on your network. By default, all of the DoS settings
are set to Allow, which allow any type of traffic to pass through the switch. Setting one
of the items to Deny will set the switch to check for traffic matching the selected item
and deny any traffic matching the rule. On the other hand, setting one of rules to Deny
may deny a specific type of traffic that may prevent traffic essential to running your
4. Click Apply to save the settings.
network such as devices in load balancing configuration using virtual IP addresses (Ex. If
ARP MAC SA Mismatch is set to Deny, it may cause devices in load balance configuration Note: You can click “Reset to Default” to restore all DoS settings to Allow.
using shared virtual IP addresses communication issues essential for network server
load balancing.) For additional security, you can set these rules to Deny as necessary.
1. Log into your switch management page (see “Access your switch management page” 5. Click Save Settings to Flash (menu).
on page 7).
DHCP Snooping o Enable - The MAC address of each ingress ARP packet is validated
when compared against the Binding Table entries. Invalid ARP packets
Here is a summary of the rules to observe when you configure DHCP Snooping: are discarded.
• A trusted port is connected to one of the following: o Disable - The MAC address of each ingress ARP packet is not validated
o Directly to the legitimate trusted DHCP Server. against the Binding Table. All ARP packets are forwarded through the
switch without regard to the IP and MAC Address information in the
o A network device relaying DHCP messages to and from a trusted
packet header.
server.
• Backup Database - select one of the following choices from the pull-down
o Another trusted source such as a switch with DHCP Snooping enabled. menu:
o Untrusted ports are connected to DHCP clients and to traffic that o Enable - The Web Management Utility Software saves a backup copy
originates outside of the local area network. of the Binding Table to flash at a specified interval (Database Update
• The VLANs to which the DHCP Snooping feature applies must be specified in Interval) of time.
the DHCP Snooping VLAN Setting configuration. o Disable - The Web Management Utility Software does not save a
backup copy of the Binding Table to flash.
• Any static IP addresses on the network must be manually added to the Binding
Database. • Database Update Interval - Enter the database update interval. The range of
this interval is 600 to 86400 seconds.
• DHCP Option 82 Insertion - select one of the following choices from the pull-
Enable DHCP Snooping down menu:
DHCP Snooping > General Settings o Enable: The Web Management Utility software inserts the DHCP
1. Log into your switch management page (see “Access your switch management page” Option 82 information into the DHCP packets.
on page 7). o Disable: The Web Management Utility software does not insert the
DHCP Option 82 information into the DHCP packets.
2. Click on DHCP Snooping and click on General Settings.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
3. In the field, enter the existing VLAN ID to apply DHCP Snooping. Then click Add to add
the VLAN entry to the table.
In the list, you can click Modify to modify an entry or click Delete or delete the entry.
You can also click Delete All to delete all of the entries in the table. If the entries span
multiple pages, you can navigate page number in the Page field and click Go or you can
5. Click Save Settings to Flash (button), then click OK. click First, Previous, Next, and Last Page to navigate the pages.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
LLDP (Link-Layer Discovery Protocol) LLDP Reinit Delay: Sets the reinitialization delay, which is the number of seconds that
must elapse after LLDP is disabled on a port before it can be reinitialized. The range is
Link Layer Discovery Protocol (LLDP) allows Ethernet network devices, such as switches from 1 to 10 seconds.
and routers, to receive and transmit device-related information to directly connected
devices on the network and to store data that is learned about other devices. LLDP TX Delay: Sets the value of the transmission delay timer, which is the minimum
time interval between transmissions of LLDP advertisements due to a change in LLDP
local information. The range is from 1 to 8192 seconds.
Enable and configure LLDP
LLDP > LLDP Global Settings Click Apply to save the settings.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
2. Click on LLDP and click on LLDP Neighbor Information. View Traffic Information Statistics
Statistic > Traffic Information
3. View the LLDP neighbor information. 1. Log into your switch management page (see “Access your switch management page”
• Entity: This parameter is a number assigned to the reporting neighbors in the on page 7).
order that the LLDP information is received from them.
• Port: This parameter specifies the switch port number where the LLDP 2. Click on Statistic and click on Traffic Information.
information was received.
• Chassis ID Subtype: This parameter describes the Chassis ID subtype of the 3. View the Traffic Information Statistics.
neighboring network device which is reporting the LLDP information. • InOctets: Inbound Octets (Bytes/s), number of inbound octet bits in bytes per
• Chassis ID: This parameter is the neighboring device’s chassis ID. second.
• Port ID Subtype: This parameter describes the Port ID subtype of the • InUcastPkts: Inbound Unicast Packets (Pkts), number of inbound unicast
neighboring network device’s port that is connected directly to the switch port. packets in packets per second.
• Port ID: This parameter specifies the neighboring network device’s port • InNUcastPkts: Inbound Non-unicast Packets (Pkts), number of inbound non-
number from which the LLDP information was transmitted. unicast packets (such as broadcast and multicast packets) in packets per
• Port Description: This parameter describes the neighboring network device’s second.
port. • InDiscards: Inbound Discards (Pkts), number of inbound discarded packets in
• Show Normal: If you click on this button, a detailed report of the neighboring packets per second.
network device will be displayed. • OutOctets: Outbound Octets (Bytes/s), rate of outbound octet bits in bytes per
second.
If the entries span multiple pages, you can navigate page number in the Page field and • OutUcastPkts: Outbound Unicast Packets (Pkts), number of outbound unicast
click Go or you can click First, Previous, Next, and Last Page to navigate the pages. packets in packets per second.
• OutNUcastPkts: Outbound Non-unicast Packets (Pkts), number of outbound
non-unicast (such as broadcast and multicast packets) packets.
• OutDiscards: Outbound Discards (Pkts), number of outbound discarded
packets.
1. Log into your switch management page (see “Access your switch management page”
Upgrade your switch firmware on page 7).
Tools > Firmware Upgrade
TRENDnet may periodically release firmware upgrades that may add features or fix 2. Click on Tools, click on Firmware Upgrade, and click via HTTP.
problems associated with your TRENDnet switch model and version. To check if there is
a firmware upgrade available for your device, please check your TRENDnet model and
3. Depending on your web browser, in the Upload Firmware section, click Browse or
version using the link. http://www.trendnet.com/downloads/
Choose File.
In addition, it is also important to verify if the latest firmware version is newer than the
one your switch is currently running. To identify the firmware that is currently loaded on
your switch, log in to the switch, click on the System Info section or click on Tools and
click on Firmware Upgrade. The firmware used by the switch is listed as Runtime Image
or Image Version. If there is a newer version available, also review the release notes to
check if there were any new features you may want or if any problems were fixed that
you may have been experiencing.
Firmware Upgrade via TFTP Settings Backup and restore your switch configuration settings
Note: Before using this method, you will require a TFTP server. There are third party Tools > Config File Backup/Restore
TFTP server applications available for this function. If you are not familiar with the TFTP
protocol, it is recommended to use the HTTP method. You may have added many customized settings to your switch and in the case that you
need to reset your switch to default, all your customized settings would be lost and
would require you to manually reconfigure all of your switch settings instead of simply
1. Log into your switch management page (see “Access your switch management page” restoring from a backed up switch configuration file.
on page 7).
Cable Diagnostics Test The results will be displayed in the Cable Diagnostic Table below.
Note:
1. If the cable length displays N/A, it means that the cable length is Not Available. The
may be due to the port being unable to determine the estimated cable length. If length is
displayed as “N/A” it means the cable length is “Not Available”. This is due to the port
being unable to obtain cable length/either because its link speed is 10M or 100M, or the
cables used are broken and/or of bad in quality. • Test Results: Displays the diagnostic results for each pair in the cable. One of
the following cable status parameters is displayed:
2. The deviation of “Cable Fault Distance” is +/- 2 meters. No cable may be displayed in o OK: There is no problem detected with the cable.
the table when the cable is less than 2 meters in length. o Open in Cable: There is an open wire within the cable.
o Short in Cable: Two wires are shorted together within the cable.
3. The test also measures the cable fault and identifies the fault in length according to o Cross talk in Cable: There is crosstalk detected between one pair
the distance from the switch. o of wires and another pair within the cable.
• Cable Fault Distance: This parameter specifies the distance from the switch
1. Log into your switch management page (see “Access your switch management page” port to the cable fault.
on page 7). • Cable Length: This parameter specifies the length of the cable connected to the
switch port.
2. Click on Tools and click on Cable Diagnostic.
3. Click on the Port drop-down list to select which port to run the cable diagnostic and
click Test Now to run the test.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
4. Click Save Settings to Flash (menu).
2. Click on Tools and click on Reboot.
3. Click the Reboot Type drop-down list and select Normal and click Apply to initiate a
reboot. Wait for the switch complete the rebooting process.
5. Click Save Settings to Flash (button), then click OK.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
To reset your switch to factory defaults: Network Connectivity Test (Ping Tool)
You may want to reset your switch to factory defaults if you are encountering difficulties Tools > IEEE 802.3az EEE
with your switch and have attempted all other troubleshooting. Before you reset your
switch to defaults, if possible, you should backup your switch configuration first, see This chapter provides the procedure to ping a node on your network from the switch.
“Backup and restore your switch configuration settings” on page 44. This procedure is useful in determining whether an active link exists between the switch
and another network device.
The device you are pinging must be a member of the Default VLAN and within the same
There are two methods that can be used to reset your switch to factory defaults. local area network as your switch. In other words, the port on the switch through which
• Hardware Method: Using a paper clip, on the front panel of the switch, push the node is communicating with the switch must be an untagged or tagged member of
and hold the Reset button more than 10 seconds and release. Located on the the Default VLAN.
front panel of your switch, see “Product Hardware Features” on page 6. Use
this method if you are encountering difficulties with accessing your switch
management page. 1. Log into your switch management page (see “Access your switch management page”
on page 7).
Using the Web Smart Switch Management Utility 4. At the Utility installation window, click Next.
The Web Smart Switch Management Utility allows you to do the following:
• You can easily discover all TRENDnet web smart switches on your network
using the discover feature.
• You can modify the IP address settings, change the admin password, and
upgrade firmware for multiple switches.
System Requirements
Installation
7. In the Completion window, click Finish. You can also launch the utility from the Start Menu programs.
Start > Programs (or All Programs) > TRENDnet Management Utility > TRENDnet
Management Utility.exe
Device Setting Firmware Upgrade: When the device has a new function, there will be a new firmware
to update the device, use this function to update.
You can set the device by using the function key in the Device Setting Dialog box.
Configuration Setting: In this Configuration Setting, you can set the IP Address, Subnet
Mask, Gateway, Group Interval, System name, Location and IP Mode.
Select the device in the Discovery list or Monitor List and press this button, then the
Configuration Setting window will appear, after entering the data that you want to
change, you must enter the password and press the “Set” to process the data change
immediately. The default password of TRENDnet Web Smart Switches is “admin”.
Access Web: Double click the device in the Monitor List or select a device in the Monitor
List and press this “Web Access” button to access the device in Web browser.
DHCP Refresh: Press this “DHCP Refresh” button to refresh IP address of selected device
form DHCP server. (Only applies if Web Smart switch IP address settings are set to
DHCP).
Password Change: You can use this Password Change when you need to change the
password, fill in the password needed in the dialog box and press “Set” button to
proceed the password change immediately.
In the “File TAB”, there are Monitor Save, Monitor Save As, Monitor Load and Exit.
Monitor Save: To record the setting of the Monitor List to the default, when you
open the Web Management Utility next time, it will auto load the default
recorded setting.
Monitor Save As: To record the setting of the Monitor List in appointed filename
and file path.
Monitor Load: To manually load the setting file of the Monitor List.
Exit: To exit the Web Management Utility.
In the “View TAB”, there are view log and clear log function, this function will help you
to show trap setting.
View Log: To show the event of the Web Management Utility and the device.
Clear Log: to clear the log.
In the “Option TAB”, there are Refresh Time and Group Interval
Refresh Time: This function helps you to refresh the time of monitoring the
device. Choose 15 secs, 30 secs, 1 min, 2 min and 5 min to select the time of
monitoring.
Group Interval: 120~1225
In the “Help TAB”, there is About function, it will show out the version of the Web
Management Utility.
Compatibility
• Optional Software Utility: Windows® 8.1, 8, 7, Vista, XP, Windows® 2003/2008
Server
Special Features
• Smart fans turn on when needed
• IPv6
• 802.3az power saving
• Rack mountable
Troubleshooting Q: If my switch IP address is different than my network’s subnet, what should I do?
Answer:
You should still configure the switch first. After all the settings are applied, go to the
Q: I typed http://192.168.10.200 in my Internet Browser Address Bar, but an error switch configuration page, click on System, click IPv4 Setup and change the IP address of
message says “The page cannot be displayed.” How can I access the switch the switch to be within your network’s IP subnet. Click Apply, then click OK. Then click
management page? Save Settings to Flash (menu) and click Save Settings to Flash to save the IP settings to
Answer: the NV-RAM.
1. Check your hardware settings again. See “Switch Installation” on page 8.
2. Make sure the Power and port Link/Activity and WLAN lights are lit. Q: I changed the IP address of the switch, but I forgot it. How do I reset my switch?
3. Make sure your network adapter TCP/IP settings are set to Use the following IP Answer:
address or Static IP(see the steps below). Using a paper clip, push and hold the reset button on the front of the switch and release
4. Make sure your computer is connected to one of the Ethernet switch ports. after 15 seconds.
5. Since the switch default IP address is 192.168.10.200, make sure there are no other The default IP address of the switch is 192.168.10.200. The default user name and
network devices assigned an IP address of 192.168.10.200 password is “admin”.
Windows 7
a. Go into the Control Panel, click Network and Sharing Center.
b. Click Change Adapter Settings, right-click the Local Area Connection icon.
c. Then click Properties and click Internet Protocol Version 4 (TCP/IPv4).
d. Then click Use the following IP address, and make sure to assign your
network adapter an IP address in the subnet of 192.168.10.x. Click OK
Windows Vista
a. Go into the Control Panel, click Network and Internet.
b. Click Manage Network Connections, right-click the Local Area Connection
icon and click Properties.
c. Click Internet Protocol Version (TCP/IPv4) and then click Properties.
d. Then click Use the following IP address, and make sure to assign your
network adapter an IP address in the subnet of 192.168.10.x. Click OK
Windows XP/2000
a. Go into the Control Panel, double-click the Network Connections icon
b. Right-click the Local Area Connection icon and the click Properties.
c. Click Internet Protocol (TCP/IP) and click Properties.
d. Then click Use the following IP address, and make sure to assign your
network adapter an IP address in the subnet of 192.168.10.x. Click OK
Note: If you are experiencing difficulties, please contact your computer or operating
system manufacturer for assistance.
Note: If you are experiencing difficulties, please contact your computer or operating
Appendix system manufacturer for assistance.
How to find your IP address?
Note: Please note that although the following procedures provided to follow for your How to configure your network settings to use a static IP address?
operating system on configuring your network settings can be used as general
guidelines, however, it is strongly recommended that you consult your computer or Note: Please note that although the following procedures provided to follow for your
operating system manufacturer directly for assistance on the proper procedure for operating system on configuring your network settings can be used as general
configuring network settings. guidelines, however, it is strongly recommended that you consult your computer or
operating system manufacturer directly for assistance on the proper procedure for
configuring network settings.
Command Prompt Method
Windows 2000/XP/Vista/7 Windows 7
1. On your keyboard, press Windows Logo+R keys simultaneously to bring up the Run a. Go into the Control Panel, click Network and Sharing Center.
dialog box. b. Click Change Adapter Settings, right-click the Local Area Connection icon.
2. In the dialog box, type cmd to bring up the command prompt. c. Then click Properties and click Internet Protocol Version 4 (TCP/IPv4).
3. In the command prompt, type ipconfig /all to display your IP address settings. d. Then click Use the following IP address, and assign your network adapter a
MAC OS X static IP address. Click OK
1. Navigate to your Applications folder and open Utilities. Windows Vista
2. Double-click on Terminal to launch the command prompt. a. Go into the Control Panel, click Network and Internet.
3. In the command prompt, type ipconfig getifaddr <en0 or en1> to display the wired b. Click Manage Network Connections, right-click the Local Area Connection
or wireless IP address settings. icon and click Properties.
Note: en0 is typically the wired Ethernet and en1 is typically the wireless Airport c. Click Internet Protocol Version (TCP/IPv4) and then click Properties.
interface. d. Then click Use the following IP address, and assign your network adapter a
static IP address. Click OK
Graphical Method Windows XP/2000
a. Go into the Control Panel, double-click the Network Connections icon
MAC OS 10.6/10.5
b. Right-click the Local Area Connection icon and the click Properties.
1. From the Apple menu, select System Preferences.
c. Click Internet Protocol (TCP/IP) and click Properties.
2. In System Preferences, from the View menu, select Network.
3. In the Network preference window, click a network port (e.g., Ethernet, AirPort, d. Then click Use the following IP address, and assign your network adapter a
modem). If you are connected, you'll see your IP address settings under "Status:" static IP address. Click OK
MAC OS 10.4/10.5/10.6
MAC OS 10.4 a. From the Apple, drop-down list, select System Preferences.
1. From the Apple menu, select Location, and then Network Preferences. b. Click the Network icon.
2. In the Network Preference window, next to "Show:", select Network Status. You'll see c. From the Location drop-down list, select Automatic.
your network status and your IP address settings displayed. d. Select and view your Ethernet connection.
Note: If you are experiencing difficulties, please contact your computer or operating
system manufacturer for assistance.
In MAC OS 10.4,
1. Apple Menu > System Preferences > Network
2. From the Show menu, select Built-in Ethernet.
3. On the Ethernet tab, the Ethernet ID is your MAC Address.
In MAC OS 10.5/10.6,
1. Apple Menu > System Preferences > Network
2. Select Ethernet from the list on the left.
3. Click the Advanced button.
3. On the Ethernet tab, the Ethernet ID is your MAC Address.