0% found this document useful (0 votes)
188 views7 pages

How To Configure LACP On Mikrotik

The document provides an overview of the key features and configuration options available in the SwOS network operating system used on CRS3xx series switches. It describes how to access the switch's web interface using the default IP address and login credentials. It then summarizes the main tabs and functions for system information and management, DHCP and PPoE snooping, port configuration including link aggregation, VLAN configuration, access control lists, and SNMP support.

Uploaded by

leonard sava
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
188 views7 pages

How To Configure LACP On Mikrotik

The document provides an overview of the key features and configuration options available in the SwOS network operating system used on CRS3xx series switches. It describes how to access the switch's web interface using the default IP address and login credentials. It then summarizes the main tabs and functions for system information and management, DHCP and PPoE snooping, port configuration including link aggregation, VLAN configuration, access control lists, and SNMP support.

Uploaded by

leonard sava
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

SwOS/CRS3xx

Connecting to the Switch


Open your web browser and enter IP address of your Switch (192.168.88.1 by default) and login screen will appear.

SwOS default IP address: 192.168.88.1, user name: admin and there is no password.

System
System Tab performs the following functions:

 General information about Switch


 Switch management
 Configuration reset
 Backup and restore configuration

DHCP & PPPoE Snooping

Property Description

Trusted Ports Group of ports, which allows DHCP or PPPoE servers to provide a requested information. Mainly
used to limit unauthorized servers to provide malicious information for users, access ports usually
do not configure as trusted

Add Enables or disables DHCP Option-82 information. When enabled, the Option-82 information
Information (Agent Remote ID and Circuit ID) is added for DHCP packets received from untrusted ports. Can be
Option used together with Option-82 capable DHCP server to assign IP addresses and implement policies

Password and Backup

Link
Link Tab allows you to configure each interface settings and monitor link status

PoE
Devices with PoE-out support have some configuration options and certain monitoring features, like PoE-out current,
voltage, etc. For more detailed description, see Manual:PoE-Out.

SFP
SFP tab allows you to monitor status of SFP/SFP+ modules.
Port Isolation
Port Isolation table allows or restricts traffic forwarding between specific ports. By default, all available switch chip
ports can communicate with any other port, there is no isolation used. When the checkbox is enabled/ticked you
allow to forward traffic from this port towards the ticked port. Below are some port isolation examples.

In some scenarios you might need to In some scenarios you might need to forward all

isolate a group of devices from other traffic to an uplink port while all other ports are Individual isolated Port1 (e.g. for
groups. In this example devices on Port1- isolated from each other. This kind of setup is management purpose), it cannot send
Port5 are not able to communicate called Private VLAN configuration. The switch will or receive traffic from any other port
with Port6-Port10 devices, and vice versa. forward all Ethernet frames only to the
uplink Port1, while uplink can reach all other ports

LAG
IEEE 802.3ad (LACP) compatible link aggregation is supported, as well as static link aggregation to ensure failover
and load balancing based on Layer2, Layer3 and Layer4 hashing.
Up to 16 link aggregation groups with up to 8 ports per a group are supported.

Each individual port can be configured as Passive LACP, Active LACP or a Static LAG port.
Property Description

Mode (default: Specify LACP packet exchange mode or Static LAG mode on ports:
passive)

 Passive : Place port in listening state, use LACP only when it's contrary port uses
active LACP mode
 Active : Prefer to start LACP regardless contrary port mode
 Static : Set port in a Static LAG mode

Property Description

Group Specify a Static LAG group

Trunk (read only) Represents group number port belongs to.

Partner (read Represents partner mac-address.


only)

Forwarding
Forwarding Tab provides advanced forwarding options among switch ports, port locking, port mirroring, bandwidth
limit and broadcast storm control features.

RSTP
Per port and global RSTP configuration and monitoring is available in the RSTP menu.

Stats, Errors and Histogram


These menus provide detailed information about received and transmitted packets.

VLAN and VLANs


VLAN configuration for switch ports.
VLAN Configuration Example
Simple trunk and access port configuration, as well as trunk and hybrid port configuration examples can be found in
this article - SWOS/CSS326-VLAN-Example.

Hosts
This table represents dynamically learnt MAC address to port mapping entries. It can contain two kinds of entries:
dynamic and static. Dynamic entries get added automatically, this is also called a learning process: when switch
receives a packet from certain port, it adds the packet's source MAC address and port it received the packet from to
host table, so when a packet comes in with certain destination MAC address it knows to which port it should forward
the packet. If the destination MAC address is not present in host table then it forwards the packet to all ports in the
group. Dynamic entries take about 5 minutes to time out. CRS3xx devices supports 16383 host table entries.
Static entries will take over dynamic if dynamic entry with same mac-address already exists. Also by adding a static
entry you get access to some more functionality.

IGMP Snooping
IGMP Snooping which controls multicast streams and prevents multicast flooding is implemented in SwOS starting
from version 2.5. The feature allows a switch to listen in the IGMP conversation between hosts and routers.
Enable this option under System tab.
It is possible to enable IGMP Snooping for a specific VLAN ID under VLANs menu.

SNMP
SwOS supports SNMP v1 and uses IF-MIB, SNMPv2-MIB, BRIDGE-MIB and MIKROTIK-MIB (only for health, PoE-
out and SFP diagnostics) for SNMP reporting.

ACL Tab
An access control list (ACL) rule table is very powerful tool allowing wire speed packet filtering, forwarding and VLAN
tagging based on L2,L3 protocol header field conditions. Each rule contains a conditions part and an action part.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy