BEC V8E2G 8-Port VDSL2 + 2 Gigabit Combo VDSL2 30a CO Switch User Manual -1-
The information in this guide may be changed without notice. The manufacturer assumes no responsibility for any errors which may appear in this guide. Ethernet is a trademark of XEROX Corporation. Microsoft, Windows and Windows logo are trademarks of Microsoft Corporation. Copyright 2010.All rights were reserved. No Part of the contents of this guide maybe transmitted or reproduced in any form or by any means without the written permission of BEC Technologies, Inc.. The revision date for this guide is Jan.
Contents 1. Introduction................................................................................................4 1.1. Package Contents............................................................................4 1.2. How to Use this Guide .....................................................................4 2. Installation..................................................................................................5 2.1. Product Description Overview.............................................
1. Introduction Thank you for choosingVDSL2 Product .These products are cost-effective switching solution idea for small business and the network edge. It provides the Quality of Service (QoS) features, like 802.1p, DSCP and Rate Control etc, to ensure the traffic is prioritized properly to deliver real-time applications like voice and video and also have a good control in network bandwidth usage. The 802.1Q feature enables you separate the network traffic easily and quickly.
2. Installation This chapter describes the function of the VDSL2 switch components and shows how to install it on the desktop or shelf. Basic knowledge of networking is assumed. Read this chapter completely before continuing. 2.1. Product Description Overview The product support VDSL2, supports 802.1Q VLAN, QoS, 802.1d / 1w/ 1s Spanning Tree Protocol, 802.1x, Port Security, Port Mirroring, IGMP Snooping, SNTP, Storm Control, Rate Control, SNMP and RMON, Link Aggregation (IEEE 802.3ad) etc. features. 2.2.
2.3. LED Function This section explains the definition of the Switch’s LEDs on the front panel. Group System LED Color System Green VDSL port Link/Act Green Link/Act Green Speed Amber GE-LED G1/G2 Function On : When the power supplied to the system Off : Power off Blinking: While system Booting /System Self-Test / Firmware upgrade/Error. Lights: When the link through the port is successfully established. Off : No-link detected for the port Blinks: When the port is activating transmitting data.
2.4.1.Pre-Installation Considerations Gigabit Considerations: If you will use the switch for Gigabit applications, keep in mind that the maximum UTP cabling length of Category 5e cable is 328 feet (100 meters). Positioning the switch: When choosing a location for the switch, observe the following guidelines: Keep enough ventilation space between the switch and the surrounding objects. Keep cabling away from sources of electrical noise, power lines, and fluorescent lighting fixtures.
E) Reliable Earthing - Reliable earthing of rack-mounted equipment should be maintained. Particular attention should be given to supply connections other than direct connections to the branch circuit (e.g. use of power strips)." To mount the Switch in any standard-sized, 19-inch wide, 1U high rack, please follow these instructions: Place the Switch on a hard flat surface with the front panel facing you. Attach a rack–mount bracket to one side of the Switch with the supplied screws.
3. Configuration 3.1. Login 3.1.1.Power-On Self-Testing The power-on self-testing is running immediately after the switch system is powered up. The self-testing program diagnoses the hardware components of a switch system. After hardware tests are all passed, the system will detect and display the module slot status and start the initializations. The system will be in ready state while the prompt is showing up. 3.1.2.
Items Option Default Value User name Max:10, Min:0 characters, case sensitive admin Password NULL Max:10, Min:0 characters, case sensitive 3.2. Web User Interface 3.2.1.Home After user login verification, the homepage of the switch will be shown as below. 3.2.2.Administration There are many management functions can be set or performed if you expand the submenus of Administrator in MENU area.
Syslog Setting Firmware Update Configuration Backup 3.2.2.1. IP Address Setting User can see and modify the IP address, subnet mask and default gateway in this page, then clicks “Apply” button to confirm (save) the settings, then the switch reboot must be done to activate the updates. The IP address can be statically set or dynamically be assigned by the DHCP Server. NOTE: If any of the value is changed in this field, reboot is necessary. 3.2.2.2.
Module Info All information in this field is read only; user can’t modify its contents. It is only to display the module port information. MISC CONFIG This page is to provide miscellaneous settings: MAC Address Age-out Time: Type the number of seconds that an inactive MAC address remains in the switch's address table. The valid range is 6~1572858 seconds. Default is 300 seconds. The value is a multiple of 6.
3.2.2.3. Console Port Information Console is a standard UART (RS-232) interface to communicate with serial port. User can use windows HyperTerminal program to link the switch .Refer to following information, user can’t modify the contents.
3.2.2.4. Port Configuration Port Controls This webpage is to provide the display and modification for the port settings. Use the dropdown in Port field to select one or multiple ports. The port settings for the selected port(s) will be displayed in web. Use the other control fields in the upper area to modify the port settings for the selected port(s). Press Apply to save and activate the port settings. State: User can enable or disable this port .
Port Sniffer The Port Sniffer (mirroring) is a method for monitor traffic in switched networks. Traffic through a port can be monitored by one specific port. That is, traffic goes in or out a monitored port will be duplicated into sniffer port. Sniffer Type: Select a sniffer mode: Disable / Rx / TX / Both. RX: Packets goes in the Monitored port will be duplicated into analysis port. TX: Packets goes out the monitored port will be duplicated into analysis port.
Protected Port There are two protected port groups. Ports in different groups can't communicate each other. In the same group, protected ports can't communicate each other, but can communicate with unprotected ports. Unprotected ports can communicate with any ports, including protected ports. In default, all ports are in Group1 and not protected. 3.2.2.5.
Agent. SNMP packets with community names that do not pass the authentication on the device are simply discarded. SNMPv2c SNMPv2c also uses community name for authentication. Compatible with SNMPv1, it extends the functions of SNMPv1. SNMPv2c provides more operation modes such as GetBulk; it supports more data types such as Counter32; and it provides various error codes, thus being able to distinguish errors in more detail.
Trap Manager Trap Manager is a management station that receives traps, the system alerts generated by the switch. If no trap manager is defined, no traps are issued. Create a trap manager by entering the IP address of the station and a community string. SNMPv3 Group The group will be used in V3 access. In SNMP v3 group you can indicate group name security model and group security SNMPv3 View V3 View only used on NNMP v3 .
SNMPv3 Access SNMPv3 Access control users’ access to management information. Only a user with access rights can manage the objects. When a user accesses the management information, he can access only the objects defined by the corresponding MIB view. SNMPv3 USM-User USM introduces the concepts of username and group. You can set the authentication and privacy functions.
3.2.2.6. Syslog This system supports syslog sent to a remote syslog server. Currently system will do syslog for 3 events: cold start, warm start And link change. In this page, user needs to setup the following parameters to activate the syslog: Syslog server IP: The IP address of remote syslog server .Log level: None: never send syslog message to syslog server, and Max Age parameters of the root bridge, regardless of how it is configured. Major: only send major syslog to syslog server, e.g.
image file. Then press Apply button to start the firmware update process. The firmware image will first update to the RAM area in system. Hit the Update Firmware button to confirm to write to the system’s flash memory. When the whole process is completed, system needs to be rebooted by pressing the reboot button to activate the new firmware. HTTP Update An alternative for firmware updating is using HTTP transfer.
TFTP Backup Configuration Use this page to assign a TFTP server IP address and a filename to be stored. Then press Apply button to start the backup process. HTTP Restore Configuration Press “browse” button to select the destination file, then press “submit” button to restore your configuration.
3.2.3.L2 Features This switch provides the following L2 features: VLAN Configuration Trunking (Port Aggregation) Forwarding & Filtering Spanning Tree (STP) IGMP Snooping Spanning Tree DHCP Relay & Option 82 LLDP (optional) 3.2.3.1. VLAN Configuration A Virtual LAN (VLAN) is a logical network grouping that limits the broadcast domain. It allows you to isolate network traffic so only members of the VLAN receive traffic from the same VLAN members.
802.1Q VLAN In this page, user can create 802.1Q (tag-based) VLAN. There are up to 512 VLAN groups to provide configuration. While VLAN Operation Mode is changed to 802.1Q VLAN, all ports on the switch belong to default VLAN group which VID is 1. The default VLAN group can’t be deleted. Use 802.1Q to set the outgoing frames is VLAN-Tagged frames or not. Tag: outgoing frames with VLAN-Tagged. Untag: outgoing frames without VLAN-Tagged.
VLAN Filters Port NO.: Port number(s) to be assigned to see or configure the settings. Port VID (PVID): Port VLAN ID will be assigned to untagged traffic on a given port. This feature is useful for accommodating devices that you want to participate in the VLAN but that don’t support tagging. This switch allows user to set one PVID for each port, the range is 1~4094, default PVID is 1. The PVID must as same as the VLAN ID that the port belong to VLAN group, or the untagged traffic will be dropped.
GVRP Table In GVRP table the VLAN group(s) dynamically created by GVRP can be displayed with VID and port member(s). QinQ VLAN QinQ Port Setting Business customers of service providers often have specific requirements for VLAN IDs and the number of VLANs to be supported. The VLAN ranges required by different customers in the same service-provider network might overlap, and traffic of customers through the infrastructure might be mixed.
VLAN. Using QinQ expands VLAN space by using a VLAN-in-VLAN hierarchy and retagging the tagged packets. A port configured to support QinQ is called a QinQ user-port. A port configured to support QinQ Uplink is called a QinQ uplink-port. To enable QinQ function, the global QinQ option, QinQ Tpid and specified port-based QinQ User or Uplink port option need to be configured.
Note: Only the ports (user port, uplink port) not belong to any VLAN can be added to the same tunnel Following figure is an example of QinQ VLAN application Refer to the figure of QinQ application in previous page, a QinQ tunnel using VLAN100 wants to be created for Sales VLAN10 across the public network. Port1 on left-side switch connects to Sales VLAN100 client. Port2 of switch connects to the public network.
qinq uplinkport enable 2 qinq tunnel add 1 10 1, 2 3.2.3.2. Trunking The Link Aggregation Control Protocol (LACP) provides a standardized means for exchanging information between Partner Systems on a link to allow their Link Aggregation Control instances to reach agreement on the identity of the Link Aggregation Group to which the link belongs, move the link to that Link Aggregation Group, and enable its transmission and reception functions in an orderly manner.
In aggregator information: The static LACP static trunk group will be displayed as follows: In State Activity: Active (select): The port automatically sends LACP protocol packets. N/A (no select): The port does not automatically sends LACP protocol packets, and responds only if it receives LACP protocol packets from the opposite device. 1. A link that has either two active LACP ports or one active port can perform dynamic LACP trunking.
Dynamic MAC Table Static MAC Table MAC Filtering Dynamic MAC Table The switch will dynamically learn the device’s MAC address when it corresponding with the switch. MAC address will be stored in MAC address table. Dynamic MAC Table shows the MAC addresses learned by the switch. The table will be shown by pages if larger than 500 MAC Addresses. You can set the age-out time of Dynamic MAC table in switch setting: Click Clear to clear Dynamic MAC address table.
Port number: Switch port number to associate with the MAC address in a MAC entry VLAN ID: If tag-based (IEEE 802.1Q) VLANs are enabled, static MAC address can be associated with individual VLANs. Type the VID in this field to associate with the MAC address. Click Add to add a new entry. Click Delete to remove a specified entry. The MAC entries in this table can be sorted by clicking the column NO / MAC / PORT / VID / TYPE. MAC Filtering MAC address filtering allows the switch to drop unwanted traffic.
3.2.3.4 IGMP Snooping This switch supports multicast IP, one can enable IGMP protocol on web management’s switch setting advanced page, then display the IGMP snooping information in this page, you can view difference multicast group, VID and member port in here, IP multicast addresses range from 224.0.0.0 through 239.255.255.255. The Internet Group Management Protocol (IGMP) is an internal protocol of the Internet Protocol (IP) suite.
IGMP protocol: Enable/disable IGMP snooping. IGMP fast leave: Enable/disable IGMP snooping fast leave. If enable, switch will fast delete member who send leave report, else wait one second. IGMP Querier: Enable/disable IGMP snooping querier. If select disable, the switch can’t send query report. 3.2.3.5 Spanning Tree STP provides tree topology for any arrangement of bridges and it also provides a unique path between end stations on a network. In this way, it eliminates loops.
VLANs, each instance is associated with the L2 domain on which it performs loop detection/mitigation. This enables a port to be stopped in one instance (for example, in the above example, traffic from VLAN A) while traffic can remain active in another domain where no loop was seen (in VLAN B in the above example). 3.2.3.5.
to the Learning or Forwarding State, respectively. It is also the value used for the ageing time of dynamic entries in the Filtering Database, while received BPDU indicate a topology change. Value range <430>. Default value is 15. You can view STP information about the Root Bridge. Such as following screen. 3.2.3.5.
Parameter Path Cost Priority Admin Edge Admin non-STP Admin P2P Migration Description The contribution of the path through this port, when the port is the root port, to the total cost of the path to the root for this bridge. Value range <1-65535>. You can make it more or less likely to become the root port, the lowest number has the highest priority. Value range <0-240>, the value must be in steps of 16. Default value is 128. Indicates if this port is the edge port.
value is 32768. Status —You can choose the value of Enable if you want the Instance to be enable. Value range is Disable or Enable. Default value is Instance 0 Enable, Other Disable. VLAN Range — Displays the VLANs mapped to the selected instance. Each VLAN belongs to a single instance. 3.2.3.5.
forward traffic, however it can learn new MAC addresses. Forwarding — Port on this instance is in Forwarding mode. The port can forward traffic and learn new MAC addresses. Port Role — Displays the port role, per port per instance, assigned by the MSTP algorithm in order to provide STP paths. The possible options are: Root — Forwarding packets through this interface provides the lowest cost path to forward packets to the root device.
is exchanged between directly connected devices. Information in LLDP PDUs received is restored in its MIB. A LLDP-enabled device operating in the TxRx mode or Tx mode sends LLDP PDUs to its directly connected devices periodically. It also sends LLDP PDUs when the local configuration changes to inform the neighboring devices of the change timely. In any of the two cases, an interval exists between two successive operations of sending LLDP PDUs.
PerPort Configuration Port Number: specify the port(s) to be configured in the switch. Port Status: specify one of four port mode to operate LLDP for specified port(s) Tx only: LLDP transmit the packet of the port only Rx only: LLDP receive the packet of the port only. Tx and Rx: LLDP transmit and receive the packets of the port. Disable: LLDP do not transmit and receive the packets of the port. 3.2.4.Access Control List Packets can be forwarded or dropped by ACL rules include IPv4 or non-Ipv4.
3.2.4.1. IPv4 The IPv4 related parameters are shown in the following table Items Group ID Action VLAN Packet Type Src IP Address Dst IP Address Option 1 ~ 220 (max. 220 ACL groups) Permit / Deny. Permit: Permit packet cross switch. Deny: Drop packet. Any / VID. Any: Any VLAN ID VID: 1~4094. A certain VLAN ID. IPv4 / Non-IPv4 / Binding IPv4: Set Ipv4 packet field. Non-IPv4: Set non-IPv4 packet field. Binding: Set binding entry. (Set this field if Packet Type is IPv4, else ignore.
IP Fragment L4 Protocol Protocol TCP Port UDP Port Port Id Any / IP and Mask Any: Any IP address. IP: A certain IP address. Mask: *** *** *** *** * is represent a digit from 0~9, *** is range from 0 to 255 (Set this field if Packet Type is IPv4, else ignore.) Uncheck / Check Uncheck: Not check IP fragment field. Check: Check IP fragment field. (Set this field if Packet Type is IPv4, else ignore.) Any / ICMP(1) / IGMP(2) / TCP(6) / UDP(17) (Set this field if Packet Type is IPv4, else ignore.) 0~255.
3.2.4.2. Non-IPv4 The related parameters are shown in the following table: Items Group ID Action VLAN Packet Type Ether type Type Current List Option 1 ~ 220 (max. 220 ACL group) Permit / Deny. Permit: Permit packet cross switch. Deny: Drop packet. Any / VID. Any: Any VLAN ID. VID: 1~4094. A certain VLAN ID. IPv4 / Non-IPv4 / Binding IPv4: Set Ipv4 packet field. Non-IPv4: Set non-IPv4 packet field. Binding: Set binding entry. (Set this field if Packet Type is Non-IPv4, else ignore.
Port ID ***.***.***.*** *** is range from 0 to 255 Source port id from 1~10 1 Current List Create ACL and binding groups NULL IP Address 0.0.0.0 3.2.4.4. QoS VoIP QoS VoIP option in Action field is to provide ingress VoIP packets can be forwarded out with higher priority through the ACL function. In “Action” box select the “QoS VoIP” checkbox to make QoS VoIP parameter area available to configure. NOTE: To make this function work, the QoS mode “All High Before Low “ in QoS Configuration is required.
3.2.5.Security 3.2.5.1. Security Manager In this page, user can change user name and password with the following parameters. User Name: Type the new user name. The maximum length is 10 characters. Assign/Change password: Type the new password. Reconfirm password: Retype the new password. Click Apply to activate the setting. 3.2.5.2. MAC Limit MAC limit allows users to set a maximum number of MAC addresses to be stored in the MAC address table.
3.2.5.3. 802.1x Configuration 802.1x makes use of the physical access characteristics of IEEE 802 LAN infrastructures in order to provide a means of authenticating and authorizing devices attached to a LAN port that has point-to-point connection characteristics, and of preventing access to that port in cases in which the authentication and authorization process fails. In the beginning, 802.1 x configuration page is disabled because 802.1x is disabled in default. To enable 802.
3.2.5.3.3 Misc Configuration In this page, you can change the default configuration for the 802.1x standard: Quiet Period: Used to define periods of time during which it will not attempt to acquire a supplicant (default time: 60 seconds). Tx Period: Used to determine when an EAPOL PDU is to be transmitted (Default value is 30 seconds). Supplicant Timeout: Used to determine timeout conditions in the exchanges between the supplicant and authentication server (default value: 30 seconds).
3.2.6.QoS This switch provides quality of service (QoS) to prioritize the packet forwarding when traffic congestion happens. This switch supports port-based (4-level output queue) and 802.1p (8-level priority to 4-level queue mapping)QoS functions. Strict and weight round robin (WRR) QoS mode are supported. 3.2.6.1. QoS Configuration This page is mainly to set the QoS mode (First Come First Service, All High before Low, and WRR) and 8-level priority to 4 –level queue mapping.
3.2.7.Monitoring 3.2.7.1. Port Status This page provides current status of every port that depends on user’s setting and the negotiation result. State: Display port statuses: disable or enable. “Unlink” will be treated as “off”. Link Status: Down means “No Link”; Up means “Link up”. Auto Negotiation: Display the auto negotiation mode: auto/force/nway-force. Speed status: Display 1000Mbps or 100Mbps or 10Mbps speed, port 1-8 are 10/100Mbps, Port 9-10 are 10/100/1000Mbps.
3.2.7.3. Vdsl Port Statistics This page provides current status of VDSL port’s downstream rate: Upstream rate, US, DS and VDSL firmware version. 3.2.8.Profile configuration VDSL2 Profile ITU-T G.993.2 VDSL2 standard defines a wide range of settings for various parameters that could potentially be supported by a VDSL2 transceiver. Profiles are specified to allow transceivers to support a subset of the allowed settings and still be compliant with this Recommendation.
In profile web user can select or create a profile model with the setting of SNR, INP (Impulse noise protection) and max delay -52-
3.2.9.Reset System The page to reset the switch to default configuration is shown as below. 3.2.10. Reboot The page to reboot (warm restart) the switch is shown as below.
4. Specifications 4.1. Cable specifications The related cables specification shown in the following table Cable Type 1000BASE-T RJ11 Cable Requirements Maximum Length Category 5e or better, UTP or STP 328 ft (100M) 100Mbps@984ft (300M) 6P4C (six position, four conductor), Twisted-pair cabling comes in various grades, or categories. Category 5 is required for Fast Ethernet, and is also the most reliable and most commonly used category.
Cables Figure 4-1: Diagram of Straight Through Cables Figure 4-2: Diagram of Crossover Cables Figure 4-3: RJ11 Cable Diagram -55-
4.2. Technical Specifications 4.2.1. Software Specification Supports 802.1D bridge self-learning, storing up to 8K+ 256unicast or multicast addresses Supports automatic age-out period between 1 to 1,000,000 seconds Broadcast storm filtering based on ingress port bandwidth HOL blocking prevention Deadlock relief 9K+ jumbo packets supported on per port and per VLAN basis Supports layer 2 source filtering Supports 802.
Supports Layer 2/3/4 (Layer 2+) classification: Standard-length IPv4 packets can use layer 2 VLAN-tag ID, IP protocol, Source IP, Destination IP, TCP/UDP Destination Port and Source Port, and TCP SYN field for classification Non-standard or non-IPv4 packets use part of layer 2/3 header for classification Up to 256 different classification rules supported Each classification rule is associated with an action code Packet and byte counters for all classification rules to record match stat
Support for Strict Priority, Weighted Round-Robin (WRR) scheduling policies. Support 802.1d, 802.1w, 802.1s Spanning Tree protocol. Support IGMP multicast snooping. Support 802.1x Port-Based Authentication Traffic classification based on Port#, VLAN priority in VLAN tagging packet, DS/TOS field in IP packet. Supports Ingress and Egress Rate Limiting control. Supports up to 3 Link Aggregation Groups, load sharing among LAG ports based on MAC address.
5. Warranty statement We provide this limited warranty for it originally purchased the product from us or its authorized reseller or distributor. We guarantee that equipment is free from physical defects in workmanship and material under normal use from the date of original retail purchase of the Hardware. If the product proves defective during this warranty period, call our Customer Service in order to obtain a Return Authorization number. Be sure to have a proof of purchase on hand when calling.