Instrukcja PFS5428-24GT
Instrukcja PFS5428-24GT
V1.0.0
Cybersecurity Recommendations II
In the event that your social media, bank, email, etc. account is compromised, you would not want
someone collecting those passwords and trying them out on your video surveillance system. Using a
different username and password for your security system will make it more difficult for someone to
guess their way into your system.
9. Limit Features of Guest Accounts:
If your system is set up for multiple users, ensure that each user only has rights to features and
functions they need to use to perform their job.
10. UPnP:
● UPnP will automatically try to forward ports in your router or modem. Normally this would be a good
thing. However, if your system automatically forwards the ports and you leave the credentials
defaulted, you may end up with unwanted visitors.
● If you manually forwarded the HTTP and TCP ports in your router/modem, this feature should be
turned off regardless. Disabling UPnP is recommended when the function is not used in real
applications.
11. SNMP:
Disable SNMP if you are not using it. If you are using SNMP, you should do so only temporarily, for
tracing and testing purposes only.
12. Multicast:
Multicast is used to share video streams between two recorders. Currently there are no known issues
involving Multicast, but if you are not using this feature, deactivation can enhance your network
security.
13. Check the Log:
If you suspect that someone has gained unauthorized access to your system, you can check the
system log. The system log will show you which IP addresses were used to login to your system and
what was accessed.
14. Physically Lock Down the Device:
Ideally, you want to prevent any unauthorized physical access to your system. The best way to achieve
this is to install the recorder in a lockbox, locking server rack, or in a room that is behind a lock and key.
15. Connect IP Cameras to the PoE Ports on the Back of an NVR:
Cameras connected to the PoE ports on the back of an NVR are isolated from the outside world and
cannot be accessed directly.
16. Isolate NVR and IP Camera Network
The network your NVR and IP camera resides on should not be the same network as your public
computer network. This will prevent any visitors or unwanted guests from getting access to the same
network the security system needs in order to function properly.
General
This Web Config Manual (hereinafter referred to be "the Manual") introduces operations on
web interface of Ethernet Switch DH-PFS5428-24GT. The Ethernet Switch supports web
access. You can visit the switch on web browser, and configure and manage the switch.
Models
DH-PFS5428-24GT
Safety Instructions
The following categorized signal words with defined meaning might appear in the Manual.
Signal Words Meaning
TIPS Provides methods to help you solve a problem or save you time.
Revision History
As the device user or data controller, you might collect personal data of other such as face,
fingerprints, car plate number, Email address, phone number, GPS and so on. You need to be
in compliance with the local privacy protection laws and regulations to protect the legitimate
rights and interests of other people by implementing measures include but not limited to:
Foreword IV
providing clear and visible identification to inform data subject the existence of surveillance
area and providing related contact.
The Manual is for reference only. If there is inconsistency between the Manual and the
actual product, the actual product shall prevail.
We are not liable for any loss caused by the operations that do not comply with the
Manual.
The Manual would be updated according to the latest laws and regulations of related
regions. For detailed information, see the paper manual, CD-ROM, QR code or our
official website. If there is inconsistency between paper manual and the electronic
version, the electronic version shall prevail.
All the designs and software are subject to change without prior written notice. The
product updates might cause some differences between the actual product and the
Manual. Please contact the customer service for the latest program and supplementary
documentation.
There still might be deviation in technical data, functions and operations description, or
errors in print. If there is any doubt or dispute, please refer to our final explanation.
Upgrade the reader software or try other mainstream reader software if the Manual (in
PDF format) cannot be opened.
All trademarks, registered trademarks and the company names in the Manual are the
properties of their respective owners.
Please visit our website, contact the supplier or customer service if there is any problem
occurred when using the device.
If there is any uncertainty or controversy, please refer to our final explanation.
Foreword V
Important Safeguards and Warnings
The Manual helps you to use our product properly. To avoid danger and property damage,
read the Manual carefully before using the product, and we highly recommend you to keep it
well for future reference.
Operating Requirements
Do not expose the device directly to the sunlight, and keep it away from heat.
Do not install the device in the damp environment, and avoid dust and soot.
Make sure the device is in horizontal installation, and install the device on solid and flat
surface to avoid falling down.
Avoid liquid spattering on the device. Do not place object full of liquid on the device to
avoid liquid flowing into the device.
Install the device in the well-ventilated environment. Do not block the air vent of the
device.
Use the device at rated input and output voltage.
Do not dissemble the device without professional instruction.
Transport, use, and store the device in allowed ranges of humidity and temperature.
Use the battery properly to avoid fire, explosion, and other dangers.
Replace the battery with battery of the same type.
Use locally recommended power cord in the limit of rated specifications.
Use the standard power adapter. We will assume no responsibility for any problems
caused by nonstandard power adapter.
The power supply shall meet the SELV requirement. Use the power supply that conforms
to Limited Power Source, according to IEC60950-1. Refer to the device label.
Adopt GND protection for I-type device.
The coupler is the disconnecting apparatus. Keep it at the angle for easy to operate.
Step 2 Enter the user name and password. The user name and the password are "admin" by
default.
Step 3 Click Login.
The Quick Setting interface is displayed.
After the first login, modify the password. The new password can be set from 8
characters through 32 characters and contains at least two types from number, letter,
and special characters (excluding"'", """, ";", ":" and "&"). Modify the password in time.
Port
This switch has 28 ports. Port quantity might vary depending on the
model you purchased, and the actual product shall prevail.
Port Type Three types: Access, Hybrid, and Trunk.
Two link states: Up and Down. Up indicates the port is connected
Link
successfully, and Down indicates the port is not connected.
Flow Control show the flow control state.
Quick Setting 3
Parameters Description
Online: It shows the port rate and the duplex mode
Speed/Duplex
Offline : It shows Down.
VLAN The port VLAN. It is VLAN 1 by default.
The current receive speed is divided by the average speed in a
Receive Usage
certain period (5 minutes usually).
The current send speed is divided by the average speed in a certain
Send Usage
period (5 minutes usually).
Two media types: Copper and Fiber. Copper indicates the RJ-45
Media Type
port, and Fiber indicates the fiber port.
2.2 Local
You can set the device name, IP address and subnet mask.
Step 1 Click Local on the Quick Setting interface.
The Local interface is displayed. See Figure 2-2.
Figure 2-2 Local
2.3 Vlan
Add the port to Vlan, and configure the Vlan. By default, the port belongs to Vlan1.
Step 1 Click Vlan on the Quick Setting interface.
The Vlan interface is dispalyed. See Figure 2-3.
Quick Setting 4
Figure 2-3 Vlan
2.4 Aggregation
Add the port to a certain aggregation. There are two types of aggregations: static aggregation
and dynamic aggregation. See “3.1.4 Aggregation.”
Click Aggregation on the Quick Setting interface, and the Aggregation interface is
displayed. See Figure 2-4.
Quick Setting 5
Figure 2-4 Aggregation
Quick Setting 6
Figure 2-5 Static aggregation
Quick Setting 7
Figure 2-6 Dynamic aggregation
Quick Setting 8
Figure 2-7 IP and Route
Quick Setting 9
A blank record is displayed. See Figure 2-9.
Figure 2-9 IP route
Quick Setting 10
3 Advanced Configuration
3.1 Common Configuration
Advanced Configuration 11
Figure 3-1 System information
Step 2 Set the device name, IP address and mask length and DHCP client enable.
Step 3 Click Save.
Advanced Configuration 12
3.1.1.2 IP and Route
The hosts belong to different VLANs cannot communicate directly. Network devices ( route or
the layer 3 switch) are needed for the switching. The switch supports layer 3 switching of
packet through VLAN interface.
VLAN interface is a virtual port of layer 3 mode, which is for layer 3 communication among
the VLANs. It is not a physical entity on the device. Every VLAN corresponds to a VLAN
interface, and the VLAN interface can switch the packet which received by the VLAN.
Generally, because the VLAN can isolate the broadcasting domain, every VLAN corresponds
to a network segment. As the gateway of the network segment, VLAN interface supports
layer 3 switching for the packet based on IP address.
Step 1 Select Advanced > Common > System Config > IP&Route.
The IP&Route interface is displayed. See Figure 3-2.
Figure 3-2 IP and Route
Advanced Configuration 13
Figure 3-3 Add IP
Advanced Configuration 14
Step 4 Click Save.
3.1.1.3 Time
You can set the time by the following three methods:
Set the time manually.
Sync PC time
Sync NTP server time
Select Advanced > Common > System Config > Current Time. The Current Time
interface is displayed. See Figure 3-5.
Figure 3-5 System Time (1)
Advanced Configuration 15
Figure 3-6 System Time (2)
3.1.1.4 Logs
You can view logs, export logs and clear logs.
Select Advanced > Common > System Config > Log, and the Log interface is displayed.
See Figure 3-7.
Advanced Configuration 16
Figure 3-7 Log
3.1.2 Port
You can set the port parameters, including speed, full duplex and half duplex.
Step 1 Select Advanced > Common > Port.
The Port Configuration interface is displayed. See Figure 3-8.
Advanced Configuration 17
Figure 3-8 Port Configuration
Advanced Configuration 18
Parameters Description
Enable/Disable egress limit
: Egress enable is enabled.
Egress Limit Enable
: Egress enable is disabled.
3.1.3 VLAN
Add the port to Vlan, and configure the Vlan. By default, the port belongs to Vlan1.
Step 1 Select Advanced > Common > VLAN Settings.
The VLAN Settings interface is displayed. See Figure 3-9.
Figure 3-9 VLAN settings
Advanced Configuration 19
Parameters Description
Show whether data can flow into the port. Only Hybird supports the
configuration (By default, all date flows into the port under other
models). See the following situations:
Ingress Acceptance
Tagged and Untagged: All data flows into the port.
Tagged only: Only tagged data can flows into the port.
Untagged only: Only untagged data can flow into the port.
Show whether to tag the data that will egress the port. See the
following three situations:
Untag Port VLAN: If the data flow tag is the same with PVID, the
Egress Tagging
tag will be peeled.
Tag All: All data will be tagged.
Untag All: All data will not be tagged.
Allowed VLANs Set the allowed VLAN.
Step 4 Click Save.
3.1.4 Aggregation
Aggregation is to form the multiple physical ports of the switch into the logical port.
The multiple links in the same group can be regarded as a logical link with the larger
bandwidth. Through aggregation, the ports in the same group can share the communication
flow, to make a larger bandwidth. Besides, the ports in the same group can back up
reciprocally and dynamically, to enhance the link reliability.
Advanced Configuration 20
Figure 3-10 Aggregation
Step 2 Select the hash code contributors in Aggregation Configuration.There are four
types:
Source MAC Address: The aggregation load balancing algorithm based on MAC
address.
Destination MAC Address: The aggregation load balancing algorithm based on
destination MAC address.
IP Address: The aggregation load balancing algorithm based on source IPv4
address and destination IPv4 address.
TCP/UDP Port: The aggregation load balancing algorithm based on source and
destination TCP/UDP port.
Step 3 Select Mode as Static, and add the port member to the aggregation group. For
example, add port 1 and port 2 to aggregation group 1. See Figure 3-11.
Advanced Configuration 21
Figure 3-11 Static aggregation
3.1.4.2 LACP
LACP (Link Aggregation Control Protocol) is the protocol for link dynamic aggregation. LACP
communication with another port through LACPDU (Link Aggregation Control Protocol Data
Unit).
Select the role from the drop-down list.There are two types:
Active: The port sends LACPDU packet actively to the opposite port, and analyzes the
LACP.
Passive:The port doesn’t send LACPDU packet actively. After receiving the LACP
packet sent by the opposite port, the port analyzes the LACP.
Step 1 Select Advanced > Common > Aggregation.
The Aggregation is displayed.See Figure 3-12.
Advanced Configuration 22
Figure 3-12 LACP (1)
Step 2 Select Mode as LACP (Active), and add the port member to the dynamic
aggregation group. For example, add port 3 and port 4 to dynamic aggregation group
2. See Figure 3-13.
Step 3 Select Mode as LACP (Passive), and add the port member to the dynamic
aggregation group. For example, add port 5 and port 6 to dynamic aggregation group
3. See Figure 3-13.
Advanced Configuration 23
Figure 3-13 LACP (2)
Advanced Configuration 24
Figure 3-14 MAC address table
Step 2 Bind the MAC address to the port in the certain VLAN. For example, bind the MAC
address 00-00-00-00-00-01 to port 8 in VLAN 2.
1) Click Add.
The Add Static MAC Address dialog box is prompted.
2) Set the MAC address, port and Vlan. See Figure 3-15.
Figure 3-15 Add static MAC address
3) Click OK.
Advanced Configuration 25
The static MAC devices changing from the dynamic MAC devices.
Step 1 Select Advanced > Common > MAC Table > Port MAC Filtering.
The Port MAC Filtering interface is displayed. See Figure 3-16.
Figure 3-16 Port MAC filtering
Step 3 Click behind Port <8> Enable to enable the port. See Figure 3-17.
Advanced Configuration 26
Figure 3-17 Enable port MAC filtering
Advanced Configuration 27
2) Set MAC address and VLAN.
3) Click OK.
The devices in MAC whitelist can communicate with port normally.
Static Table
The static ARP table is manually configured and maintained. It will not not be aged, and it will
not be covered by dynamic ARP table.
Static ARP table can enhance the security performance of communication. Static ARP table
can regulate that only the specific MAC address can be used in communication between
network devices, and the attack packet can not modify the mapping between the IP address
and the physical address of the table.Communication between the device and the pointed
device is protected.
Step 1 Select Advanced > Common > ARP Table.
The ARP Table interface is displayed. See Figure 3-19. When the Type column
shows Static, it is the static table.
Advanced Configuration 28
Figure 3-19 ARP table
Dynamic Table
Dynamic table is automatically created and maintained by ARP through ARP packet. It can be
aged, and it can be covered by new ARP packet or static ARP table. When reaching ageing
time and the port is down, the corresponding dynamic table will be deleted.
Advanced Configuration 29
Select Advanced > Common> ARP Table.The ARP Table interface is displayed. See Figure
3-21. When the Type column shows Dynamic, it is the dynamic table.
Figure 3-21 Dynamic ARP view table
Advanced Configuration 30
Figure 3-22 STP ports settings
Advanced Configuration 31
Figure 3-24 RSTP mode
Step 4 Select 3 ports at least to combine a STP/RSTP/MSTP snoop. For example: Port 1,
port 2 and port 3 combine a STP snoop. See Figure 3-26.
Advanced Configuration 32
Figure 3-26 STP snoop
3.2.1 ERPS
ERPS (Ethernet Ring Protection Switching) is the loop prevention protocol standard of layer 2
defined by ITU-T, and the standard number is ITU-T G.8032/Y1344. So it is also called
G.8032. It defines RAPS (Ring Auto Protection Switching) protocol packet and protection
switching scheme.
ERPS supports two versions (V1 and V2). V1 was released by ITU-T in June 2008, and V2
was released by ITU-T in August 2010. V2 is compatible with V1, and adds the following
functions:
1. Multi-ring networks including crossing ring
2. Sub-ring switch RAPS packet by virtual channel or non-virtual channel.
3. Forcedly and manually switch blocks.
4. ERPS reverse switch is configurable.
Advanced Configuration 33
Figure 3-27 MEP Configuration
Advanced Configuration 34
Figure 3-29 ERPS Configuration
Advanced Configuration 35
Step 4 Click OK.
Networking Requirement
Three switches, and the ports are port 1 and port 2. It is requested to combine an ERPS. See
Figure 3-31. The corresponding relationship: Switch 1: MEP 1 and MEP 2; Switch 2: MEP3
and MEP 4; Switch 3: MEP 5 and MEP 6.
Figure 3-31 ERPS single ring configuration
Configuration
Example
Plan protection VLAN and protocol VLAN to be 2 and 3. Set port 2 of switch 1 to be RPL ower
port. Ensure to disable the mutex function of the ports, including STP function and LLDP
function.
The configurations of the switch are as following:
Step 1 Configure protection VLAN and protocol VLAN are 2 and 3 separately.
1) Select Advanced > Common > VLAN Settings.
The VLAN Settings interface is displayed.See .
2) Set the mode of port 1 and port 2 to be Trunk. See Figure 3-32.
3) Set the port VLAN of port 1 and port 2 to be 1.
4) Set the allowed VLAN to be 2 and 3.
Advanced Configuration 36
5) Click Save.
Figure 3-32 Add port 1 and port 2 into VLAN 1.
Advanced Configuration 37
Figure 3-33 Add MEP
Add MEP in the same way. Set Instance to be 2, Residence port to be 2, Level to
be 0 and Tagged VID to be 3.
Step 3 Click 1 and 2 separately under Instance to enter the configuration interface. Modify
MEP ID and add peer ID. See Figure 3-34 and Figure 3-35.
Figure 3-34 Configure the peer ID of MEP 1
Advanced Configuration 38
Figure 3-35 Configure the peer ID of MEP 2
Advanced Configuration 39
Figure 3-36 Add New ERPS
Step 6 Click 1 under ERPSID to enter the configuration interface. For ERPS configuration,
see Figure 3-37.
Advanced Configuration 40
Figure 3-37 ERPS Configuration
1) Click VLANconfig.
The ERPS VLAN Configuration dialog is prompted.
2) Click Add.
3) Set ERPS VLAN to be 2. See Figure 3-38.
4) Click OK.
Advanced Configuration 41
Figure 3-38 ERPS VLAN configuration
3.2.2 ACL
ACL (Access Control List) is for flow identification. For filtering the packet, you need to
cfonfigure configure a series of matching conditions on the network deviceto classify the
packets.The conditions can be the source address, destination address, and the port number
of the packet.
When the device port receives the packet, it can analyze the packet field according to the
ACL rule of the current port. And after the specific packet is identified, the packet is allowed or
forbidden to pass according to the preset rule.
Advanced Configuration 42
3.2.2.1 ACL Configuration
Step 1 Select Advanced > Seldom-used > ACL > ACL Setting.
The ACL Setting interface is displayed. See Figure 3-41.
Figure 3-41 ACL Configuration
Advanced Configuration 43
Figure 3-42 Add
Advanced Configuration 44
Step 2 Enter ACL ID Ensure the ACL ID has been added during ACL configuration.
Step 3 Click Save.
3.2.4 Security
Add user
Advanced Configuration 45
Figure 3-46 Add user
Step 2 Enter the user name, password and confirm password. The password can be set
from 8 characters through 32 characters and contains at least two types from number,
letter, and special characters (excluding"'", """, ";", ":"and "&"). For example, add the
new user test 01.
Step 3 Click Save.
The new user test 01 is added. See Figure 3-47.
Figure 3-47 New user added
Click , and the Modify User interface is displayed. See Figure 3-48.
Advanced Configuration 46
Figure 3-48 Modify User
SSH
Click corresponding to SSH on the upper right on the User Management interface
HTTPS
HTTPS (Hyper Text Transfer Protocol over Secure Socket Layer) is the HTTP channel for
security target. SSL layer and TLS layer are added to HTTP. SSL and TLS are the security
foundation of HTTP, so SSL/TLS are requested for encryption HTTPS is the URI scheme,
and the syntax is similar to HTTP. It is used for security HTTP data transmission. Built in the
web Netscape Navigator, it provides authentication and encryption communication. It is
widely applied in world wide web for security sensitive communication. For example, it is
used to protect account security and use information.
interface.
Advanced Configuration 47
Figure 3-49 NAS Configuration
Advanced Configuration 48
RADIUS is an information interaction protocol of distributed and C/S construction. It can
protect the network from the interfere of unauthorized visits. It is used in the network that
allows remote visits but requests the higher security. It defines the RADIUS packet format
and the message transmission mechanism. It stipulates that using UDP as transport layer
protocol to encapsulate the RADIUS packet.
At the beginning, RADIUS is the AAA protocol for the dial-up users only. With the
development of the user accesses, RADIUS adapts to various access, including Ethernet
access and ADSL access. It accesses server through authentication and authorization, and
collects records the usage of network source through accounting.
Step 1 Select Advanced > Seldom-used > Security > Radius Settings.
The Radius Settings interface is displayed. See Figure 3-50.
Figure 3-50 Radius configuration
Advanced Configuration 49
Figure 3-51 Add new server
Step 3 Set the server address, auth port, acct port, restransmit and key.
Step 4 Click OK.
Advanced Configuration 50
Figure 3-52 IGMP Snooping
Step 5 Set VLAN ID and querier address, and check the box Querier Election to enable the
querier .
Step 6 Click OK.
Advanced Configuration 51
3.2.6 QoS
QoS (Quality of Service) is used to evaluate the capability that server meets customer’s
service demands. In Internet, what QoS evaluates is the service capability of network
forwarding and packet.
Qos can evaluate from the different aspects according to the various services provided by the
network. Qos evaluates bandwidth, delay, dithering and packet loss during packet and
forwarding.
Congestion
Congestion is common in a complex Internet packet switched environment. See the following
example:
Figure 3-54 Flow congestion
1) The packet comes in the device by the high-speed link and exits by low-speed link.
2) The packet comes in the device from multiple ports and exits from one port (The speed
rate of multiple ports larger than that of the exit port).
If the flow arrives at linear speed, it will encounter the resource chock point, and then the
congestion will generate.
Besides the aggression bandwidth, any other resource shortages (such as the shortages of
distributive processing time, buffer and memory resources) will cause congestion.
Additionally, the poor control of the arrived flow in a certain time, which leads to the flow
exceeding the distributive network resource, is also a factor for generating congestion.
3.2.6.1 Port
Through setting Cos, the priority for packet passing egress port of switch can be decided.
If the congestion occurs at the egress port, the switch will give a CoS value to the packet after
it passing the ingress port. The large the Cos value is, the higher the priority.
Step 1 Select Advanced > Seldom-used > QoS > Port Classification.
The Port Classification interface is displayed. See Figure 3-55.
Advanced Configuration 52
Figure 3-55 Port classification
Step 2 Set the CoS. For example: Set port 1 to be 1, and port 2 to be 2. See Figure 3-56.
Port 1 and port 2 are ingress ports, and port 3 is egress port. The Cos value of port 2
is large than that of port 1, so the data of port 2 will pass port 3 first.
Advanced Configuration 53
Figure 3-56 Set Cos
Advanced Configuration 54
Figure 3-57 Port Schedulers
Advanced Configuration 55
Figure 3-58 Port configuration
Advanced Configuration 56
Figure 3-59 Port Schedulers
Advanced Configuration 57
Figure 3-60 Port Shapers
3.2.6.4 DSCP-Based
Ensure to enable DSCP before configuring DSCP-Based function.
Step 1 Select Advanced > Seldom-used > QoS > Port Schedulers.
The Port Schedulers interface is displayed.See .
Step 2 Enable DSCP at DSCP port. Suppose port 3 is the egress port, see Figure 3-61.
Advanced Configuration 58
Figure 3-61 Port classification
Advanced Configuration 59
Figure 3-62 DSCP-Based
Advanced Configuration 60
Figure 3-63 Storm Policer
Step 2 The port can receive the rate up to 2000 fps. See Figure 3-64.
In Unicast, check the box Enable, and enter 2000 in Rate. It means that the port
can receive the rate up to 2000 fps of unicast packet.
In Multicast, check the box Enable, and enter 2000 in Rate. It means that the
port can receive the rate up to 2000 fps of Multicast packet.
In Broadcast, check the box Enable, and enter 2000 in Rate. It means that the
port can receive the rate up to 2000 fps of broadcast packet.
Figure 3-64 Storm policer configuration
Advanced Configuration 61
3.2.7 SNMP
SNMP (Simple Network Management Protocol) is the standard protocol for network
management in Internet, and it is widely applied for management device to access and
manage the managed devices. SNMP has the following features:
It supports intelligent management for network device. By using the network
management platform based on SNMP, the network administrator can query the running
status and the parameters of the network device, and can set the parameter, find the
error, perform fault diagnosis, and then to plan the capacity and create the report.
SNMP supports to manage the devices of different physical features. SNMP provides
only the most basic function library. It makes the management task and the physical
feature and the networking technology of the managed device independent, to manage
the devices from different manufacturers.
SNMP network provides two element, NMS and Agent.
NMS (Network Management System) is the manager in SNMP network, and it provides
friendly human-machine interface, to help the network administrator to finish most of the
network management work.
Agent is the manged role in SNMP network, and it receives and handles the request
packet from NMS. In some emergency circumstances, for example, if the port status
changes, Agent can send alarm packet to NMS.
Advanced Configuration 62
Step 2 Click in SNMP to enable SNMP.
Advanced Configuration 63
Figure 3-66 SNMP
Advanced Configuration 64
Step 2 Set the trap address, trap port and trap name.
Step 3 Set the read-only username, authentication type, authentication password,
encryption type and encryption password.
Step 4 Set the read&write username, authentication type, authentication password,
encryption type and encryption password.
Step 5 Click Save.
3.2.8 DHCP
Advanced Configuration 65
Figure 3-67 DHCP server
Advanced Configuration 66
Figure 3-69 Add Excluded IP
Advanced Configuration 67
3.2.8.2 DHCP Relay
DHCP is only applicable when the client and server in the same sub network since the
request packet is sent by broadcast when dynamically acquiring the IP. It is not economic to
set a DHCP server in every net segment for dynamic host configuration.
The introduction of DHCP relay solves this problem: Client can get the IP address through
the communication between DHCP relay and DHCP servers on the other net segments. In
this way, DHCP clients in different segments can use the same DHCP server, which is
economic and also convenient for centralized management.
Step 1 Select Advanced > Seldom-used > DHCP > DHCP Relay.
The DHCP Relay interface is displayed.See Figure 3-71.
Figure 3-71 DHCP Relay
3.2.9 LLDP
LLDP (Link Layer Discovery Protocol) is a standard link layer discovery way. It can form its
main capabilities, management address, device no and port no as TLV (Type Length Value),
encapsulate it in LLDPDU (Link Layer Discovery Protocol Data Unit), and advertises it to its
neighour. The neighour will keep the received information in the form of standard MIB
(Management Information Base), so that the network management can query and judge the
communication state of the link.
LLDP
Advanced Configuration 68
Figure 3-72 LLDP
Select Advanced > Seldom-used > DHCP > DHCP Relay > LLDP Neighbor.The LLDP
Neighbor interface is displayed. See Figure 3-73.
Advanced Configuration 69
Figure 3-73 LLDP neighbor
Advanced Configuration 70
4 Maintenance
4.1 System Reboot
Step 1 Select Maintain > Common > System Reboot.
The System Reboot interface is displayed. See Figure 4-1.
Figure 4-1 System reboot
4.3 Mirror
Port mirror is also called port monitor. Port monitor is the data package acquiring technology
that through configuring switch, data package from one or several ports (mirroring source
ports) can be copied to a specific port (mirroring destination port).The mirror destination port
connects to a PC that data package analyzing software is installed, and it can analyze the
received data package for network monitoring and troubleshooting.
Step 1 Select Maintain > Common > Mirror.
The Mirror interface is displayed. See Figure 4-3.
Maintenance 71
Figure 4-3 Mirror
Step 2 In Global Settings, select Enabled for the mode to enable mirror.
Step 3 In Port Configuration, select Source or Destination according to the actual
situation.
Select the following four ways for source port.
Both: Enable the port as the source address of mirror.
Disable: Disable the port as the source address of mirror.
Rx only: The port only mirror receiving data, not mirror sending data.
Tx only: The port only mirror sending data, not mirror receiving data.
Maintenance 72
Check the box Destination to set the port to be destination.
Step 4 Click Save.
4.5.1 Export
Step 1 Select Maintain > Common > Config Manage > Export.
The Export interface is displayed. See Figure 4-5.
Figure 4-5 Export
4.5.2 Upload
Step 1 Select Maintain > Common > Config Manage > UpLoad.
The UpLoad interface is displayed. See Figure 4-6 .
Figure 4-6 Upload
Maintenance 73
4.6 Ping
With Ping protocol, you can check whether the device with a specified IP address can be
accessed, or you can check whether there is a network connection failure.
Step 1 Select Maintain > Common > Ping.
The Ping interface is displayed. See Figure 4-7.
Figure 4-7 Ping
Maintenance 74
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD.
Address: No.1199, Bin'an Road, Binjiang District, Hangzhou, P.R. China
Postcode: 310053
Tel: +86-571-87688883
Fax: +86-571-87688815
Email: overseas@dahuatech.com
Website: www.dahuasecurity.com