Industrial Gigabit Ethernet Switch ECIS4500 Series Version Number: 1.0 Web Management Guide www.edge-core.
Web Management Guide ECIS4500 6T2F Industrial Gigabit Ethernet Switch Industrial Gigabit Ethernet Switch with 6 10/100/1000BASE-T ports, 2 10/100/1000BASE-X SFP slots ECIS4500 8T2F Industrial Gigabit Ethernet Switch Industrial Gigabit Ethernet Switch with 8 10/100/1000BASE-T ports, 2 10/100/1000BASE-X SFP slots ECIS4500 6T4F Industrial Gigabit Ethernet Switch Industrial Gigabit Ethernet Switch with 6 10/100/1000BASE-T ports, 4 10/100/1000BASE-X SFP slots ECIS4500 4P4T Industrial Gigabit Ethernet Switch I
About This Guide This guide includes detailed information on the switch software, including how to operate and use the management functions of the switch. To deploy this switch effectively and ensure trouble-free operation, you should first read the relevant sections in this guide so that you are familiar with all of its software features. Who Should Read This This guide is for network administrators who are responsible for operating and Guide? maintaining network equipment.
Contents [CONTENTS] 1. 1.1 1.2 1.2.1 1.2.2 1.2.3 1.2.4 1.3 2. 2.1 2.2 2.2.1 2.2.2 2.2.3 2.2.4 2.2.5 Introductions .............................................................................................................. 8 System Description .................................................................................................. 8 Using the Web Interface .......................................................................................... 8 Web Browser Support...........................
2.3.18 Security .................................................................................................................. 37 2.3.19 Switch..................................................................................................................... 37 2.3.20 Users ...................................................................................................................... 37 2 2.3.21 2.3.22 2.3.23 2.3.24 2.3.25 2.3.26 2.3.27 2.3.28 2.3.29 2.3.30 2.3.31 2.3.32 2.3.33 2.3.34 2.3.
Contents 2.3.56 TACACS+ ............................................................................................................... 106 2.3.57 Aggregation .......................................................................................................... 108 2.3.58 Static Aggregation ................................................................................................ 108 2.3.59 2.3.60 2.3.61 2.3.62 2.3.63 2.3.64 2.3.65 2.3.66 2.3.67 2.3.68 2.3.69 LACP Aggregation....................
2.3.94 Protocol to Group ................................................................................................ 170 2.3.95 Group to VLAN ..................................................................................................... 172 2.3.96 IP Subnet-based VLAN ......................................................................................... 174 2.3.97 2.3.98 2.3.99 2.3.100 2.3.101 2.3.102 2.3.103 2.3.104 2.3.105 2.3.106 2.3.107 2.3.108 2.3.109 2.3.110 2.3.111 2.3.
Contents 2.4.13 QoS Statistics ....................................................................................................... 224 2.4.14 QCL Status ............................................................................................................ 225 2.4.15 Detailed Statistics ................................................................................................ 227 2.4.16 2.4.17 2.4.18 2.4.19 2.4.20 2.4.21 2.4.22 2.4.23 2.4.24 2.4.25 2.4.26 DHCP ..............................
2.4.51 Bridge Status ........................................................................................................ 268 2.4.52 Port Status............................................................................................................ 269 2.4.53 Port Statistics ....................................................................................................... 270 2.4.54 2.4.55 2.4.56 2.4.57 2.4.58 2.4.59 2.4.60 2.4.61 2.4.62 2.4.63 2.4.64 2.4.65 2.4.66 2.4.67 2.4.68 2.4.69 MVR ...
Contents 2.6.2 Factory Default..................................................................................................... 320 2.6.3 Software ............................................................................................................... 321 2.6.3.1 Software Upload .................................................................................................. 321 2.6.3.2 2.6.4 2.6.4.1 2.6.4.2 2.6.4.3 2.6.4.4 2.6.4.5 Image select .................................................
1. Introductions 1.1 System Description The ECIS4500 series industrial Ethernet switches deliver high quality, wide operating temperature range, extended power input range, IP-30 design, and advanced VLAN & QoS features. It’s ideal for harsh environments and mission critical applications. The managed QoS ECIS4500 series switches provide enterprise-class networking features to fulfill the needs of large network infrastructure and extreme environments.
Command Descriptions Web page font Times New Roman Encoding Unicode (UTF-8) Text size Medium 1.2.2 Navigation All main screens of the web interface can be reached by clicking on hyperlinks in the four menu boxes on the left side of the screen: Configuration Monitor Diagnostics Maintenance 1.2.3 Title Bar Icons Help Button For more information about any screen, click on the Help button on the screen. Help information is displayed in the same window.
Save Button If any unsaved change has been made to the configuration (by you during this or a prior session, or by any other administrator using the web interface or the Command Line Interface), a Save icon appears in the title line. To save the running configuration to the startup configuration: 1. Click on the Save icon. The System/Save and Restore screen appears. 2. Click on Submit next to Data Control Action drop-down list on top of System/Save and Restore screen. 1.2.
Command Descriptions 2. Using the Web 2.1 Login Operation 1. 2. Fill Username and Password Click “Sign in” Field Description Factory Default IP 192.168.2.10 255.255.255.0 Username Login user name. The maximum length is 32. Default: admin Password Login user password. The maximum length is 32. Default: admin 2.2 Tree View The tree view is a menu of the web. It offers user quickly to get the page for expected data or configuration.
2.2.
Command Descriptions 2.2.
2.2.3 Diagnostics Menu 2.2.4 Maintenance Menu 2.2.
Command Descriptions 2.3 Configuration 2.3.1 System 2.3.2 System Information The switch system information is provided here. Object System Contact Description The textual identification of the contact person for this managed node, together with information on how to contact this person. The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 32 to 126. System Name An administratively assigned name for this managed node.
2.3.3 System IP Configure IP basic settings, control IP interfaces and IP routes. The maximum number of interfaces supported is 8 and the maximum number of routes is 32. Object Description IP Configuration Mode Configure whether the IP stack should act as a Host or a Router. In Host mode, IP traffic between interfaces will not be routed. In Router mode traffic is routed between all interfaces. DNS Server This setting controls the DNS name resolution done by the switch.
Command Descriptions No DNS server No DNS server will be used. Configured Explicitly provide the IP address of the DNS Server in dotted decimal notation. From this DHCP interface Specify from which DHCP-enabled interface a provided DNS server should be preferred. DNS Proxy When DNS proxy is enabled, system will relay DNS requests to the currently configured DNS server, and reply as a DNS resolver to the client devices on the network.
may be left blank if IPv4 operation on the interface is not desired - or no DHCP fallback address is desired. IPv6 Address The IPv6 address of the interface. A IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separating each field (:). For example, fe80::215:c5ff:fe03:4dc7. The symbol :: is a special syntax that can be used as a shorthand way of representing multiple 16-bit groups of contiguous zeros; but it can appear only once.
Command Descriptions Click to save changes. Click to add a new IP route. A maximum of 32 routes is supported. Click to save changes. Click to revert to previously saved values. 2.3.4 System NTP Configure NTP on this page. Object Mode Description Indicates the NTP mode operation. Possible modes are: Enabled: Enable NTP client mode operation. Disabled: Disable NTP client mode operation. Server # Provide the IPv4 or IPv6 address of a NTP server.
Buttons Click to save changes. Click to undo any changes made locally and revert to previously saved values. 2.3.
Command Descriptions Object Description Time Zone Configuration 21
Time Zone Lists various Time Zones worldwide. Select appropriate Time Zone from the drop down and click Save to set. Acronym User can set the acronym of the time zone. This is a User configurable acronym to identify the time zone. ( Range : Up to 16 characters ) Daylight Saving Time Configuration Daylight Saving Time This is used to set the clock forward or backward according to the configurations set below for a defined Daylight Saving Time duration.
Command Descriptions Hours Select the ending hour. Minutes Select the ending minute Offset settings Enter the number of minutes to add during Daylight Saving Time. ( Range: 1 to 1440 ) Offset Date/Time Configuration Date/Time Settings Year Year of current datetime. ( Range: 2000 to 2037 ) Month Month of current datetime. Date Date of current datetime. Hours Hour of current datetime. Minutes Minute of current datetime. Seconds Second of current datetime. Buttons Click to save changes.
communication and received on UDP port 514 and the syslog server will not send acknowledgments back sender since UDP is a connectionless protocol and it does not provide acknowledgments. The syslog packet will always send out even if the syslog server does not exist. Possible modes are: Enabled: Enable server mode operation. Disabled: Disable server mode operation. Server Address Indicates the IPv4 host address of syslog server. If the switch provide DNS feature, it also can be a host name.
Command Descriptions Object Description ID The identification of the Alarm Profile entry. Description Alarm Type Description. Enabled If alarm entry is Enabled, then alarm will be shown in alarm history/current when it occurs. Alarm LED will be on (lighted), Alarm Relay also be enabled. SNMP trap will be sent if any SNMP trap entry exists and enabled.
2.3.8 Green Ethernet 2.3.9 Port Power Savings This page allows the user to configure the port power savings features. Object Description Port Power Savings Configuration Optimize EEE for The switch can be set to optimize EEE for either best power saving or least traffic latency. Port Configuration Port 26 The switch port number of the logical port.
Command Descriptions ActiPHY Link down power savings enabled. ActiPHY works by lowering the power for a port when there is no link. The port is power up for short moment in order to determine if cable is inserted. PerfectReach Cable length power savings enabled. PerfectReach works by determining the cable length and lowering the power for ports with short cables. EEE Controls whether EEE is enabled for this switch port.
2.3.10 Port This page displays current port configurations. Ports can also be configured here. Object Description Port This is the logical port number for this row. Link The current link state is displayed graphically. Green indicates the link is up and red that it is down. Current Link Speed Provides the current link speed of the port. Configured Link Speed Selects any available link speed for the given switch port. Only speeds supported by the specific port is shown.
Command Descriptions When a fixed-speed setting is selected, that is what is used. The Current Rx column indicates whether pause frames on the port are obeyed, and the Current Tx column indicates whether pause frames on the port are transmitted. The Rx and Tx settings are determined by the result of the last Auto-Negotiation. Check the configured column to use flow control. This setting is related to the setting for Configured Link Speed.
2.3.11 DHCP 2.3.12 DHCP Server 2.3.13 DHCP Server Mode This page configures global mode and VLAN mode to enable/disable DHCP server per system and per VLAN. Object Description Global Mode Mode Configure the operation mode per system. Possible modes are: Enabled: Enable DHCP server per system. Disabled: Disable DHCP server pre system. VLAN Mode VLAN Range Indicate the VLAN range in which DHCP server is enabled or disabled. The first VLAN ID must be smaller than or equal to the second VLAN ID.
Command Descriptions steps. 1. press to add a new VLAN range. 2. input the VLAN range that you want to disable. 3. choose Mode to be Disabled. 4. press to apply the change. Then, you will see the disabled VLAN range is removed from the DHCP Server mode configuration page. Mode Indicate the the operation mode per VLAN. Possible modes are: Enabled: Enable DHCP server per VLAN. Disabled: Disable DHCP server pre VLAN. Buttons Click to delete the setting. Click to add a new VLAN range.
2.3.14 DHCP Server Excluded IP This page configures excluded IP addresses. DHCP server will not allocate these excluded IP addresses to DHCP client. Object IP Range Description Define the IP range to be excluded IP addresses. The first excluded IP must be smaller than or equal to the second excluded IP. BUT, if the IP range contains only 1 excluded IP, then you can just input it to either one of the first and second excluded IP or both. Buttons Click to delete the setting.
Command Descriptions 2.3.15 DHCP Server Pool This page manages DHCP pools. According to the DHCP pool, DHCP server will allocate IP address and deliver configuration parameters to DHCP client. Object Name Description Configure the pool name that accepts all printable characters, except white space. If you want to configure the detail settings, you can click the pool name to go into the configuration page. Type Display which type of the pool is.
Click to save changes. Click to undo any changes made locally and revert to previously saved values. 2.3.16 DHCP Snooping Configure DHCP Snooping on this page. Object Snooping Mode 34 Description Indicates the DHCP snooping mode operation.
Command Descriptions Enabled: Enable DHCP snooping mode operation. When DHCP snooping mode operation is enabled, the DHCP request messages will be forwarded to trusted ports and only allow reply packets from trusted ports. Disabled: Disable DHCP snooping mode operation. Port Mode Configuration Indicates the DHCP snooping port mode. Possible port modes are: Trusted: Configures the port as trusted source of the DHCP messages. Untrusted: Configures the port as untrusted source of the DHCP messages.
Enabled: Enable DHCP relay mode operation. When DHCP relay mode operation is enabled, the agent forwards and transfers DHCP messages between the clients and the server when they are not in the same subnet domain. And the DHCP broadcast message won't be flooded for security considerations. Disabled: Disable DHCP relay mode operation. Relay Server Indicates the DHCP relay server IP address. Relay Information Mode Indicates the DHCP relay information mode option operation.
Command Descriptions 2.3.18 Security 2.3.19 Switch 2.3.20 Users This page provides an overview of the current users. Currently the only way to login as another user on the web server is to close and reopen the browser. Object User Name Description A string identifying the user name that this entry should belong to. The allowed string length is 1 to 31. The valid user name allows letters, numbers and underscores. Password The password of the user. The allowed string length is 0 to 31.
Buttons Click to add a new user. Click to save changes. Click to undo any changes made locally and revert to previously saved values. Click to undo any changes made locally and return to the Users. Delete the current user.
Command Descriptions 2.3.21 Privilege Level This page provides an overview of the privilege levels. Object Group Name Description The name identifying the privilege group. In most cases, a privilege level group consists of a single module (e.g. LACP, RSTP or QoS), but a few of them contains more than one.
System: Contact, Name, Location, Timezone, Daylight Saving Time, Log. Security: Authentication, System Access Management, Port (contains Dot1x port, MAC based and the MAC Address Limit), ACL, HTTPS, SSH, ARP Inspection, IP source guard. IP: Everything except 'ping'. Port: Everything except 'VeriPHY'. Diagnostics: 'ping' and 'VeriPHY'. Maintenance: CLI- System Reboot, System Restore Default, System Password, Configuration Save, Configuration Load and Firmware Load.
Command Descriptions 2.3.22 Auth Method This page allows you to configure how a user is authenticated when he logs into the switch via one of the management client interfaces. Object Description Client The management client for which the configuration below applies. Methods Method can be set to one of the following values: no: Authentication is disabled and login is not possible. local: Use the local user database on the switch for authentication.
Click to undo any changes made locally and revert to previously saved values.
Command Descriptions 2.3.23 SSH Configure SSH on this page. Object Mode Description Indicates the SSH mode operation. Possible modes are: Enabled: Enable SSH mode operation. Disabled: Disable SSH mode operation. Buttons Click to save changes. Click to undo any changes made locally and revert to previously saved values.
2.3.24 HTTPS Configure HTTPS on this page. Object Mode Description Indicates the HTTPS mode operation. When the current connection is HTTPS, to apply HTTPS disabled mode operation will automatically redirect web browser to an HTTP connection. Possible modes are: Enabled: Enable HTTPS mode operation. Disabled: Disable HTTPS mode operation. Automatic Redirect Indicates the HTTPS redirect mode operation. It only significant if HTTPS mode "Enabled" is selected.
Command Descriptions Configure access management table on this page. The maximum number of entries is 16. If the application's type match any one of the access management entries, it will allow access to the switch. Object Mode Description Indicates the access management mode operation. Possible modes are: Enabled: Enable access management mode operation. Disabled: Disable access management mode operation. Delete Check to delete the entry. It will be deleted during the next save.
2.3.26 SNMP 2.3.27 SNMP System Configuration Configure SNMP on this page. Object Mode Description Indicates the SNMP mode operation. Possible modes are: Enabled: Enable SNMP mode operation. Disabled: Disable SNMP mode operation. Version Indicates the SNMP supported version. Possible versions are: SNMP v1: Set SNMP supported version 1. SNMP v2c: Set SNMP supported version 2c. SNMP v3: Set SNMP supported version 3.
Command Descriptions 33 to 126. The field is applicable only when SNMP version is SNMPv1 or SNMPv2c. If SNMP version is SNMPv3, the community string will be associated with SNMPv3 communities table. It provides more flexibility to configure security name than a SNMPv1 or SNMPv2c community string. In addition to community string, a particular range of source addresses can be used to restrict source subnet. Engine ID Indicates the SNMPv3 engine ID.
2.3.28 SNMP Trap Configuration Configure SNMP trap on this page. Object Description Global Settings Mode Indicates the trap mode operation. Possible modes are: Enabled: Enable SNMP trap mode operation. Disabled: Disable SNMP trap mode operation. Trap Destination Configurations Name Indicates the trap Configuration's name. Indicates the trap destination's name. Enable Indicates the trap destination mode operation. Possible modes are: Enabled: Enable SNMP trap mode operation.
Command Descriptions Indicates the SNMP trap destination IPv6 address. IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separating each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'. The symbol '::' is a special syntax that can be used as a shorthand way of representing multiple 16-bit groups of contiguous zeros; but it can appear only once. It can also represent a legally valid IPv4 address. For example, '::192.1.2.34'.
Disabled: Disable SNMP trap mode operation. Trap Version Indicates the SNMP trap supported version. Possible versions are: SNMP v1: Set SNMP trap supported version 1. SNMP v2c: Set SNMP trap supported version 2c. SNMP v3: Set SNMP trap supported version 3. Trap Community Indicates the community access string when sending SNMP trap packet. The allowed string length is 0 to 255, and the allowed content is ASCII characters from 33 to 126. Trap Destination Indicates the SNMP trap destination address.
Command Descriptions USM for authentication and privacy. A unique engine ID for these traps and informs is needed. When "Trap Probe Security Engine ID" is enabled, the ID will be probed automatically. Otherwise, the ID specified in this field is used. The string must contain an even number(in hexadecimal format) with number of digits between 10 and 64, but all-zeros and all-'F's are not allowed. Trap Security Name Indicates the SNMP trap security name.
2.3.29 SNMP Communities Configure SNMPv3 community table on this page. The entry index key is Community. Object Description Delete Check to delete the entry. It will be deleted during the next save. Community Indicates the community access string to permit access to SNMPv3 agent. The allowed string length is 1 to 32, and the allowed content is ASCII characters from 33 to 126. The community string will be treated as security name and map a SNMPv1 or SNMPv2c community string.
Command Descriptions 2.3.30 SNMP Users Configure SNMPv3 user table on this page. The entry index keys are Engine ID and User Name. Object Description Delete Check to delete the entry. It will be deleted during the next save. Engine ID An octet string identifying the engine ID that this entry should belong to. The string must contain an even number(in hexadecimal format) with number of digits between 10 and 64, but all-zeros and all-'F's are not allowed.
must first ensure that the value is set correctly. Authentication A string identifying the authentication password phrase. For MD5 authentication Password protocol, the allowed string length is 8 to 32. For SHA authentication protocol, the allowed string length is 8 to 40. The allowed content is ASCII characters from 33 to 126. Privacy Protocol Indicates the privacy protocol that this entry should belong to. Possible privacy protocols are: None: No privacy protocol.
Command Descriptions 2.3.31 SNMP Groups Configure SNMPv3 group table on this page. The entry index keys are Security Model and Security Name. Object Description Delete Check to delete the entry. It will be deleted during the next save. Security Model Indicates the security model that this entry should belong to. Possible security models are: v1: Reserved for SNMPv1. v2c: Reserved for SNMPv2c. usm: User-based Security Model (USM).
56
Command Descriptions 2.3.32 SNMP Views Configure SNMPv3 view table on this page. The entry index keys are View Name and OID Subtree. Object Description Delete Check to delete the entry. It will be deleted during the next save. View Name A string identifying the view name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is ASCII characters from 33 to 126. View Type Indicates the view type that this entry should belong to.
2.3.33 SNMP Access Configure SNMPv3 access table on this page. The entry index keys are Group Name, Security Model and Security Level. Object Description Delete Check to delete the entry. It will be deleted during the next save. Group Name A string identifying the group name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is ASCII characters from 33 to 126. Security Model Indicates the security model that this entry should belong to.
Command Descriptions Click to add a new access entry. Click to save changes. Click to undo any changes made locally and revert to previously saved values.
2.3.34 RMON 2.3.35 RMON Statistics Configure RMON Statistics table on this page. The entry index key is ID. Object Description Delete Check to delete the entry. It will be deleted during the next save. ID Indicates the index of the entry. The range is from 1 to 65535. Data Source Indicates the port ID which wants to be monitored. If in stacking switch, the value must add 1000*(switch ID-1), for example, if the port is switch 3 port 5, the value is 2005 Buttons Click to add a new community entry.
Command Descriptions 2.3.36 RMON History Configure RMON History table on this page. The entry index key is ID. Object Description Delete Check to delete the entry. It will be deleted during the next save. ID Indicates the index of the entry. The range is from 1 to 65535. Data Source Indicates the port ID which wants to be monitored. If in stacking switch, the value must add 1000*(switch ID-1), for example, if the port is switch 3 port 5, the value is 2005.
2.3.37 RMON Alarm Configure RMON Alarm table on this page. The entry index key is ID. Object Description Delete Check to delete the entry. It will be deleted during the next save. ID Indicates the index of the entry. The range is from 1 to 65 Interval Indicates the interval in seconds for sampling and comparing the rising and falling threshold. The range is from 1 to 2^31-1.
Command Descriptions OutQLen: The length of the output packet queue (in packets). Sample Type The method of sampling the selected variable and calculating the value to be compared against the thresholds, possible sample types are: Absolute: Get the sample directly. Delta: Calculate the difference between samples (default). Value The value of the statistic during the last sampling period.
2.3.38 RMON Event Configure RMON Event table on this page. The entry index key is ID. Object Description Delete Check to delete the entry. It will be deleted during the next save. ID Indicates the index of the entry. The range is from 1 to 65535. Desc Indicates this event, the string length is from 0 to 127, default is a null string. Type Indicates the notification of the event, the possible types are: none: No SNMP log is created, no SNMP trap is sent.
Command Descriptions 65
2.3.39 Network 2.3.40 Limit Control This page allows you to configure the Port Security Limit Control system and port settings. Limit Control allows for limiting the number of users on a given port. A user is identified by a MAC address and VLAN ID. If Limit Control is enabled on a port, the limit specifies the maximum number of users on the port. If this number is exceeded, an action is taken. The action can be one of the four different actions as described below.
Command Descriptions disabled, other modules may still use the underlying functionality, but limit checks and corresponding actions are disabled. Aging Enabled If checked, secured MAC addresses are subject to aging as discussed under Aging Period . Aging Period If Aging Enabled is checked, then the aging period is controlled with this input. If other modules are using the underlying port security for securing MAC addresses, they may have other requirements to the aging period.
will be sent every time the limit gets exceeded. Shutdown: If Limit + 1 MAC addresses is seen on the port, shut down the port. This implies that all secured MAC addresses will be removed from the port, and no new address will be learned. Even if the link is physically disconnected and reconnected on the port (by disconnecting the cable), the port will remain shut down.
Command Descriptions 2.3.41 NAS This page allows you to configure the IEEE 802.1X and MAC-based authentication system and port settings. The IEEE 802.1X standard defines a port-based access control procedure that prevents unauthorized access to a network by requiring users to first submit credentials for authentication. One or more central servers, the backend servers, determine whether the user is allowed access to the network.
Object Description System Configuration Mode Indicates if NAS is globally enabled or disabled on the switch. If globally disabled, all ports are allowed forwarding of frames. Reauthentication If checked, successfully authenticated supplicants/clients are reauthenticated after Enabled the interval specified by the Reauthentication Period. Reauthentication for 802.1X-enabled ports can be used to detect if a new device is plugged into a switch port or if a supplicant is no longer attached.
Command Descriptions • Multi 802.1X • MAC-Based Auth. When the NAS module uses the Port Security module to secure MAC addresses, the Port Security module needs to check for activity on the MAC address in question at regular intervals and free resources if no activity is seen within a given period of time. This parameter controls exactly this period and can be set to a number between 10 and 1000000 seconds. If reauthentication is enabled and the port is in an 802.
RADIUS-Assigned VLAN RADIUS-assigned VLAN provides a means to centrally control the VLAN on which a Enabled successfully authenticated supplicant is placed on the switch. Incoming traffic will be classified to and switched on the RADIUS-assigned VLAN. The RADIUS server must be configured to transmit special RADIUS attributes to take advantage of this feature (see RADIUS-Assigned VLAN Enabled below for a detailed description).
Command Descriptions following modes are available: Force Authorized In this mode, the switch will send one EAPOL Success frame when the port link comes up, and any client on the port will be allowed network access without authentication. Force Unauthorized In this mode, the switch will send one EAPOL Failure frame when the port link comes up, and any client on the port will be disallowed network access. Port-based 802.1X In the 802.
server request from the switch. This scenario will loop forever. Therefore, the server timeout should be smaller than the supplicant's EAPOL Start frame retransmission rate. Single 802.1X In port-based 802.1X authentication, once a supplicant is successfully authenticated on a port, the whole port is opened for network traffic.
Command Descriptions Unlike port-based 802.1X, MAC-based authentication is not a standard, but merely a best-practices method adopted by the industry. In MAC-based authentication, users are called clients, and the switch acts as the supplicant on behalf of clients. The initial frame (any kind of frame) sent by a client is snooped by the switch, which in turn uses the client's MAC address as both username and password in the subsequent EAP exchange with the RADIUS server.
valid, it must follow this rule: • All 8 octets in the attribute's value must be identical and consist of ASCII characters in the range '0' - '7', which translates into the desired QoS Class in the range [0; 7]. RADIUS-Assigned VLAN When RADIUS-Assigned VLAN is both globally enabled and enabled (checked) for a Enabled given port, the switch reacts to VLAN ID information carried in the RADIUS Access-Accept packet transmitted by the RADIUS server when a supplicant is successfully authenticated.
Command Descriptions outlined below. This option is only available for EAPOL-based modes, i.e.: • Port-based 802.1X • Single 802.1X • Multi 802.1X For trouble-shooting VLAN assignments, use the "Monitor→VLANs→VLAN Membership and VLAN Port" pages. These pages show which modules have (temporarily) overridden the current Port VLAN configuration. Guest VLAN Operation: When a Guest VLAN enabled port's link comes up, the switch starts transmitting EAPOL Request Identity frames.
Restart Two buttons are available for each row. The buttons are only enabled when authentication is globally enabled and the port's Admin State is in an EAPOL-based or MAC-based mode. Clicking these buttons will not cause settings changed on the page to take effect. Reauthenticate: Schedules a reauthentication whenever the quiet-period of the port runs out (EAPOL-based authentication). For MAC-based authentication, reauthentication will be attempted immediately.
Command Descriptions 2.3.42 ACL 2.3.43 ACL Port Configure the ACL parameters (ACE) of each switch port. These parameters will affect frames received on a port unless the frame matches a specific ACE. Object Description Port The logical port for the settings contained in the same row. Policy ID Select the policy to apply to this port. The allowed values are 0 through 255. The default value is 0. Action Select whether forwarding is permitted ("Permit") or denied ("Deny").
Enabled: Frames received on the port are mirrored. Disabled: Frames received on the port are not mirrored. The default value is "Disabled". Loggig Specify the logging operation of this port. Notice that the logging message doesn't include the 4 bytes CRC. The allowed values are: Enabled: Frames received on the port are stored in the System Log. Disabled: Frames received on the port are not logged. The default value is "Disabled".
Command Descriptions 2.3.44 ACL Rate Limiters Configure the rate limiter for the ACL of the switch. Object Description Rate Limiter ID The rate limiter ID for the settings contained in the same row. Rate The rate range is located 0-3276700 in pps. Or Unit 0, 100, 200, 300, ..., 1000000 in kbps. Specify the rate unit. The allowed values are: pps: packets per second. kbps: Kbits per second.
Buttons Click to save changes. Click to undo any changes made locally and revert to previously saved values.
Command Descriptions 2.3.45 Access Control List This page shows the Access Control List (ACL), which is made up of the ACEs defined on this switch. Each row describes the ACE that is defined. The maximum number of ACEs is 256 on each switch. Click on the lowest plus sign to add a new ACE to the list. The reserved ACEs used for internal protocol, cannot be edited or deleted, the order sequence cannot be changed and the priority is highest.
Mirror Specify the mirror operation of this port. Frames matching the ACE are mirrored to the destination mirror port. The allowed values are: Enabled: Frames received on the port are mirrored. Disabled: Frames received on the port are not mirrored. The default value is "Disabled". Counter The counter indicates the number of times the ACE was hit by a frame.
Command Descriptions Object Ingress Port Description Select the ingress port for which this ACE applies. All: The ACE applies to all port. Port n: The ACE applies to this port number, where n is the number of the switch port. Policy Filter Specify the policy number filter for this ACE. Any: No policy filter is specified. (policy filter status is "don't-care".) Specific: If you want to filter a specific policy with this ACE, choose this value. Two field for entering an policy value and bitmask appears.
IPv4: Only IPv4 frames can match this ACE. Notice the IPv4 frames won't match the ACE with ethernet type. IPv6: Only IPv6 frames can match this ACE. Notice the IPv6 frames won't match the ACE with Ethernet type. Action Specify the action to take with a frame that hits this ACE. Permit: The frame that hits this ACE is granted permission for the ACE operation. Deny: The frame that hits this ACE is dropped. Filter: Frames matching the ACE are filtered.
Command Descriptions Specific: If you want to filter a specific source MAC address with this ACE, choose this value. A field for entering an SMAC value appears. SMAC Value When "Specific" is selected for the SMAC filter, you can enter a specific source MAC address. The legal format is "xx-xx-xx-xx-xx-xx" or "xx.xx.xx.xx.xx.xx" or "xxxxxxxxxxxx" (x is a hexadecimal digit). A frame that hits this ACE matches this SMAC value. DMAC Filter Specify the destination MAC filter for this ACE.
ARP: Frame must have ARP opcode set to ARP. RARP: Frame must have RARP opcode set to RARP. Other: Frame has unknown ARP/RARP Opcode flag. Request/Reply Specify the available Request/Reply opcode (OP) flag for this ACE. Any: No Request/Reply OP flag is specified. (OP is "don't-care".) Request: Frame must have ARP Request or RARP Request OP flag set. Reply: Frame must have ARP Reply or RARP Reply OP flag. Sender IP Filter Specify the sender IP filter for this ACE. Any: No sender IP filter is specified.
Command Descriptions IP/Ethernet Length Specify whether frames can hit the action according to their ARP/RARP hardware address length (HLN) and protocol address length (PLN) settings. 0: ARP/RARP frames where the HLN is not equal to Ethernet (0x06) or the (PLN) is not equal to IPv4 (0x04). 1: ARP/RARP frames where the HLN is equal to Ethernet (0x06) and the (PLN) is equal to IPv4 (0x04). Any: Any value is allowed ("don't-care").
IP Fragment Specify the fragment offset settings for this ACE. This involves the settings for the More Fragments (MF) bit and the Fragment Offset (FRAG OFFSET) field for an IPv4 frame. No: IPv4 frames where the MF bit is set or the FRAG OFFSET field is greater than zero must not be able to match this entry. Yes: IPv4 frames where the MF bit is set or the FRAG OFFSET field is greater than zero must be able to match this entry. Any: Any value is allowed ("don't-care").
Command Descriptions ICMP: Select ICMP to filter IPv6 ICMP protocol frames. Extra fields for defining ICMP parameters will appear. These fields are explained later in this help file. UDP: Select UDP to filter IPv6 UDP protocol frames. Extra fields for defining UDP parameters will appear. These fields are explained later in this help file. TCP: Select TCP to filter IPv6 TCP protocol frames. Extra fields for defining TCP parameters will appear. These fields are explained later in this help file.
a specific ICMP code value. A field for entering an ICMP code value appears. ICMP Code Value When "Specific" is selected for the ICMP code filter, you can enter a specific ICMP code value. The allowed range is 0 to 255. A frame that hits this ACE matches this ICMP code value. TCP/UDP Parameters TCP/UDP Source Filter Specify the TCP/UDP source filter for this ACE. Any: No TCP/UDP source filter is specified (TCP/UDP source filter status is "don't-care").
Command Descriptions 1: TCP frames where the FIN field is set must be able to match this entry. Any: Any value is allowed ("don't-care"). TCP SYN Specify the TCP "Synchronize sequence numbers" (SYN) value for this ACE. 0: TCP frames where the SYN field is set must not be able to match this entry. 1: TCP frames where the SYN field is set must be able to match this entry. Any: Any value is allowed ("don't-care"). TCP RST Specify the TCP "Reset the connection" (RST) value for this ACE.
Return to the previous page. 2.3.46 IP Source Guard 2.3.47 IP Source Guard Configuration This page provides IP Source Guard related configuration. Object 94 Description Mode of IP Source Guard Enable the Global IP Source Guard or disable the Global IP Source Guard. All Configuration configured ACEs will be lost when the mode is enabled.
Command Descriptions Port Mode Configuration Specify IP Source Guard is enabled on which ports. Only when both Global Mode and Port Mode on a given port are enabled, IP Source Guard is enabled on this given port. Max Dynamic Clients Specify the maximum number of dynamic clients that can be learned on given port. This value can be 0, 1, 2 or unlimited.
2.3.48 IP Source Guard Static Table Object Description Delete Check to delete the entry. It will be deleted during the next save. Port The logical port for the settings. VLAN ID The vlan id for the settings. IP Address Allowed Source IP address. MAC address Allowed Source MAC address. Buttons Click to add a new entry to the Static IP Source Guard table. Click to save changes. Click to undo any changes made locally and revert to previously saved values.
Command Descriptions 2.3.49 ARP Inspection 2.3.50 Port Configuration This page provides ARP Inspection related configuration. Object Mode of ARP Inspection Description Enable the Global ARP Inspection or disable the Global ARP Inspection. Configuration Port Mode Configuration Specify ARP Inspection is enabled on which ports. Only when both Global Mode and Port Mode on a given port are enabled, ARP Inspection is enabled on this given port.
Enabled: Enable ARP Inspection operation. Disabled: Disable ARP Inspection operation. If you want to inspect the VLAN configuration, you have to enable the setting of "Check VLAN". The default setting of "Check VLAN" is disabled. When the setting of "Check VLAN" is disabled, the log type of ARP Inspection will refer to the port setting. And the setting of "Check VLAN" is enabled, the log type of ARP Inspection will refer to the VLAN setting.
Command Descriptions 2.3.51 VLAN Configuration Each page shows up to 9999 entries from the VLAN table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the VLAN Table. The first displayed will be the one with the lowest VLAN ID found in the VLAN Table. The "VLAN" input fields allow the user to select the starting point in the VLAN Table.
Click to add a new VLAN to the ARP Inspection VLAN table.
Command Descriptions 2.3.52 Static Table Object Description Delete Check to delete the entry. It will be deleted during the next save. Port The logical port for the settings VLAN ID The vlan id for the settings. MAC Address Allowed Source MAC address in ARP request packets. IP Address Allowed Source IP address in ARP request packets. Buttons Click to add a new entry to the Static ARP Inspection table. Click to save changes.
2.3.53 Dynamic Table Each page shows up to 99 entries from the Dynamic ARP Inspection table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Dynamic ARP Inspection Table. The "Start from port address", "VLAN", "MAC address" and "IP address" input fields allow the user to select the starting point in the Dynamic ARP Inspection Table.
Command Descriptions Click to undo any changes made locally and revert to previously saved values. Updates the table starting from the first entry in the Dynamic ARP Inspection Table. Updates the table, starting with the entry after the last entry currently displayed.
2.3.54 AAA 2.3.55 RADIUS This page allows you to configure the RADIUS servers. Object Description Global Configuration Timeout Timeout is the number of seconds, in the range 1 to 1000, to wait for a reply from a RADIUS server before retransmitting the request. Retransmit Retransmit is the number of times, in the range 1 to 1000, a RADIUS request is retransmitted to a server that is not responding. If the server has not responded after the last retransmit it is considered to be dead.
Command Descriptions only if more than one server has been configured. Key The secret key - up to 63 characters long - shared between the RADIUS server and the switch. NAS-IP-Address(Attribute The IPv4 address to be used as attribute 4 in RADIUS Access-Request packets. If 4) this field is left blank, the IP address of the outgoing interface is used. NAS-IPv6-Address(Attribute The IPv6 address to be used as attribute 95 in RADIUS Access-Request packets.
2.3.56 TACACS+ This page allows you to configure the TACACS+ servers. Object Description Global Configuration Timeout Timeout is the number of seconds, in the range 1 to 1000, to wait for a reply from a TACACS+ server before it is considered to be dead. Deadtime Deadtime, which can be set to a number between 0 to 1440 minutes, is the period during which the switch will not send new requests to a server that has failed to respond to a previous request.
Command Descriptions Port The TCP port to use on the TACACS+ server for authentication. Timeout This optional setting overrides the global timeout value. Leaving it blank will use the global timeout value. Key This optional setting overrides the global key. Leaving it blank will use the global key. Buttons Click to add a new TACACS+ server, up to 5 servers are supported. The button can be used to undo the addition of the new server. Click to save changes.
2.3.57 Aggregation 2.3.58 Static Aggregation This page is used to configure the Aggregation hash mode and the aggregation group. Object Description Hash Code Contributors Source MAC Address The Source MAC address can be used to calculate the destination port for the frame. Check to enable the use of the Source MAC address, or uncheck to disable. By default, Source MAC Address is enabled. Destination MAC The Destination MAC Address can be used to calculate the destination port for the Address frame.
Command Descriptions IP Address The IP address can be used to calculate the destination port for the frame. Check to enable the use of the IP Address, or uncheck to disable. By default, IP Address is enabled. TCP/UDP Port Number The TCP/UDP port number can be used to calculate the destination port for the frame. Check to enable the use of the TCP/UDP Port Number, or uncheck to disable. By default, TCP/UDP Port Number is enabled.
2.3.59 LACP Aggregation This page allows the user to inspect the current LACP port configurations, and possibly change them as well. Object Description Port The switch port number. LACP Enabled Controls whether LACP is enabled on this switch port. LACP will form an aggregation when 2 or more ports are connected to the same partner. Key The Key value incurred by the port, range 1-65535 . The Auto setting will set the key as appropriate by the physical link speed, 10Mb = 1, 100Mb = 2, 1Gb = 3.
Command Descriptions LACP packet. Prio The Prio controls the priority of the port. If the LACP partner wants to form a larger group than is supported by this device then this parameter will control which ports will be active and which ports will be in a backup role. Lower number means greater priority. Buttons Click to save changes. Click to undo any changes made locally and revert to previously saved values.
2.3.60 Loop Protection This page allows the user to inspect the current Loop Protection configurations, and possibly change them as well. Object Description General Settings 112 Enable Loop Protection Controls whether loop protections is enabled (as a whole).
Command Descriptions to 10 seconds. Shutdown Time The period (in seconds) for which a port will be kept disabled in the event of a loop is detected (and the port action shuts down the port). Valid values are 0 to 604800 seconds (7 days). A value of zero will keep a port disabled (until next device restart). Port Configuration Port The switch port number of the port. Enable Controls whether loop protection is enabled on this switch port.
2.3.61 Spanning Tree 2.3.62 Bridge Settings This page allows you to configure STP system settings. The settings are used by all STP Bridge instances in the Switch Object Description Basic Settings Protocol Version The MSTP / RSTP / STP protocol version setting. Valid values are STP, RSTP and MSTP. Bridge Priority Controls the bridge priority. Lower numeric values have better priority.
Command Descriptions For MSTP operation, this is the priority of the CIST. Otherwise, this is the priority of the STP/RSTP bridge Forward Delay The delay used by STP Bridges to transit Root and Designated Ports to Forwarding (used in STP compatible mode). Valid values are in the range 4 to 30 seconds. Max Age The maximum age of the information transmitted by the Bridge when it is the Root Bridge.
2.3.63 MSTI Mapping This page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. Object Description Configuration Identification Configuration Name The name identifying the VLAN to MSTI mapping. Bridges must share the name and revision (see below), as well as the VLAN-to-MSTI mapping configuration in order to share spanning trees for MSTI's (Intra-region). The name is at most 32 characters.
Command Descriptions VLANs Mapped The list of VLANs mapped to the MSTI. The VLANs can be given as a single (xx, xx being between 1 and 4094) VLAN, or a range (xx-yy), each of which must be separated with comma and/or space. A VLAN can only be mapped to one MSTI. An unused MSTI should just be left empty. (I.e. not having any VLANs mapped to it.) Example: 2,5,20-40. Buttons Click to save changes. Click to undo any changes made locally and revert to previously saved values.
2.3.64 MSTI Priorities This page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. Object Description MSTI The bridge instance. The CIST is the default instance, which is always active. Priorities Controls the bridge priority. Lower numeric values have better priority. The bridge priority plus the MSTI instance number, concatenated with the 6-byte MAC address of the switch forms a Bridge Identifier.
Command Descriptions Click to undo any changes made locally and revert to previously saved values.
2.3.65 CIST Ports This page allows the user to inspect the current STP CIST port configurations, and possibly change them as well. This page contains settings for physical and aggregated ports. Object Description Port The switch port number of the logical STP port. STP Enabled Controls whether STP is enabled on this switch port. Path Cost Controls the path cost incurred by the port. The Auto setting will set the path cost as appropriate by the physical link speed, using the 802.
Command Descriptions port cost. (See above). operEdge (state flag) Operational flag describing whether the port is connecting directly to edge devices. (No Bridges attached). Transition to the forwarding state is faster for edge ports (having operEdge true) than for other ports. The value of this flag is based on AdminEdge and AutoEdge fields. This flag is displayed as Edge in Monitor->Spanning Tree -> STP Detailed Bridge Status.
Click to save changes. Click to undo any changes made locally and revert to previously saved values.
Command Descriptions 2.3.66 MSTI Ports This page allows the user to inspect the current STP MSTI port configurations, and possibly change them as well. An MSTI port is a virtual port, which is instantiated separately for each active CIST (physical) port for each MSTI instance configured on and applicable to the port. The MSTI instance must be selected before displaying actual MSTI port configuration options. This page contains MSTI port settings for physical and aggregated ports.
Object Description Port The switch port number of the corresponding STP CIST (and MSTI) port. Path Cost Controls the path cost incurred by the port. The Auto setting will set the path cost as appropriate by the physical link speed, using the 802.1D recommended values. Using the Specific setting, a user-defined value can be entered. The path cost is used when establishing the active topology of the network. Lower path cost ports are chosen as forwarding ports in favour of higher path cost ports.
Command Descriptions Click to save changes. Click to undo any changes made locally and revert to previously saved values.
2.3.67 IPMC Profile 2.3.68 Profile Table This page provides IPMC Profile related configurations. The IPMC profile is used to deploy the access control on IP multicast streams. It is allowed to create at maximum 64 Profiles with at maximum 128 corresponding rules for each. Object Global Profile Mode Description Enable/Disable the Global IPMC Profile. System starts to do filtering based on profile settings only when the global profile mode is enabled. Delete Check to delete the entry.
Command Descriptions using the following buttons: : List the rules associated with the designated profile. : Adjust the rules associated with the designated profile. Buttons Click to add new IPMC profile. Specify the name and configure the new entry. Click "Save". Click to save changes. Click to undo any changes made locally and revert to previously saved values.
2.3.69 Address Entry This page provides address range settings used in IPMC profile. The address entry is used to specify the address range that will be associated with IPMC Profile. It is allowed to create at maximum 128 address entries in the system. Object Delete Description Check to delete the entry. The designated entry will be deleted during the next save. Entry Name The name used for indexing the address entry table.
Command Descriptions Updates the table starting from the first entry in the IPMC Profile Address Configuration. Updates the table, starting with the entry after the last entry currently displayed.
2.3.70 MVR This page provides MVR related configurations. The MVR feature enables multicast traffic forwarding on the Multicast VLANs. In a multicast television application, a PC or a network television or a set-top box can receive the multicast stream. Multiple set-top boxes or PCs can be connected to one subscriber port, which is a switch port configured as an MVR receiver port.
Command Descriptions Snooping. It is suggested to enable Unregistered Flooding control when the MVR group table is full. Delete Check to delete the entry. The designated entry will be deleted during the next save. MVR VID Specify the Multicast VLAN ID. Be Caution: MVR source ports are not recommended to be overlapped with management VLAN ports. MVR Name MVR Name is an optional attribute to indicate the name of the specific MVR VLAN. Maximum length of the MVR VLAN Name string is 16.
Button : List the rules associated with the designated profile. Port The logical port for the settings. Port Role Configure an MVR port of the designated MVR VLAN as one of the following roles. Inactive: The designated port does not participate MVR operations. Source: Configure uplink ports that receive and send multicast data as source ports. Subscribers cannot be directly connected to source ports.
Command Descriptions 2.3.71 IPMC 2.3.72 IGMP Snooping 2.3.73 Basic Configuration This page provides IGMP Snooping related configuration.
Snooping Enabled Enable the Global IGMP Snooping. Unregistered IPMCv4 Enable unregistered IPMCv4 traffic flooding. Flooding Enabled The flooding control takes effect only when IGMP Snooping is enabled. When IGMP Snooping is disabled, unregistered IPMCv4 traffic flooding is always active in spite of this setting. IGMP SSM Range SSM (Source-Specific Multicast) Range allows the SSM-aware hosts and routers run the SSM service model for the groups in the address range.
Command Descriptions 2.3.74 VLAN Configuration Each page shows up to 99 entries from the VLAN table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the VLAN Table. The first displayed will be the one with the lowest VLAN ID found in the VLAN Table. The "VLAN" input fields allow the user to select the starting point in the VLAN Table. Object Description Delete Check to delete the entry.
IGMPv3, default compatibility value is IGMP-Auto. PRI Priority of Interface. It indicates the IGMP control frame priority level generated by the system. These values can be used to prioritize different classes of traffic. The allowed range is 0 (best effort) to 7 (highest), default interface priority value is 0. RV Robustness Variable. The Robustness Variable allows tuning for the expected packet loss on a network. The allowed range is 1 to 255, default robustness variable value is 2.
Command Descriptions Click to save changes. Click to undo any changes made locally and revert to previously saved values.
2.3.75 Port Filtering Profile Object Description Port The logical port for the settings. Filtering Profile Select the IPMC Profile as the filtering condition for the specific port. Summary about the designated profile will be shown by clicking the view button. Profile Management Button You can inspect the rules of the designated profile by using the following button: : List the rules associated with the designated profile. Buttons Click to save changes.
Command Descriptions 2.3.76 MLD Snooping 2.3.77 Basic Configuration This page provides MLD Snooping related configuration. Object Description Snooping Enable Enable the Global MLD Snooping. Unregistered IPMCv6 Enable unregistered IPMCv6 traffic flooding. Flooding Enable The flooding control takes effect only when MLD Snooping is enabled. When MLD Snooping is disabled, unregistered IPMCv6 traffic flooding is always active in spite of this setting.
Proxy Enable Enable MLD Proxy. This feature can be used to avoid forwarding unnecessary join and leave messages to the router side. Router Port Specify which ports act as router ports. A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or MLD querier. If an aggregation member port is selected as a router port, the whole aggregation will act as a router port. Fast Leave Enable the fast leave on the port.
Command Descriptions 2.3.78 VLAN Configuration Each page shows up to 99 entries from the VLAN table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the VLAN Table. The first displayed will be the one with the lowest VLAN ID found in the VLAN Table. The "VLAN" input fields allow the user to select the starting point in the VLAN Table. Object Description Delete Check to delete the entry.
QI Query Interval. The Query Interval is the interval between General Queries sent by the Querier. The allowed range is 1 to 31744 seconds, default query interval is 125 seconds. QRI Query Response Interval. The Maximum Response Delay used to calculate the Maximum Response Code inserted into the periodic General Queries. The allowed range is 0 to 31744 in tenths of seconds, default query response interval is 100 in tenths of seconds (10 seconds). LLQI Last Listener Query Interval.
Command Descriptions 143
2.3.79 Port Filtering Profile Object Description Port The logical port for the settings. Filtering Profile Select the IPMC Profile as the filtering condition for the specific port. Summary about the designated profile will be shown by clicking the view button. Profile Management Button You can inspect the rules of the designated profile by using the following button: : List the rules associated with the designated profile. Buttons Click to save changes.
Command Descriptions 2.3.80 LLDP 2.3.81 LLDP This page allows the user to inspect and configure the current LLDP port settings. Object Description LLDP Parameters Tx Interval The switch periodically transmits LLDP frames to its neighbors for having the network discovery information up-to-date. The interval between each LLDP frame is determined by the Tx Interval value. Valid values are restricted to 5 - 32768 seconds.
Valid values are restricted to 1 - 8192 seconds. Tx Reinit When a port is disabled, LLDP is disabled or the switch is rebooted, an LLDP shutdown frame is transmitted to the neighboring units, signalling that the LLDP information isn't valid anymore. Tx Reinit controls the amount of seconds between the shutdown frame and a new LLDP initialization. Valid values are restricted to 1 - 10 seconds. LLDP Port Parameters Port The switch port number of the logical LLDP port. Mode Select LLDP mode.
Command Descriptions Note: When CDP awareness on a port is disabled the CDP information isn't removed immediately, but gets removed when the hold time is exceeded. Port Descr Optional TLV: When checked the "port description" is included in LLDP information transmitted. Sys Name Optional TLV: When checked the "system name" is included in LLDP information transmitted. Sys Descr Optional TLV: When checked the "system description" is included in LLDP information transmitted.
Object Description Fast start repeat count Fast start repeat count Rapid startup and Emergency Call Service Location Identification Discovery of endpoints is a critically important aspect of VoIP systems in general.
Command Descriptions Because there is a risk of an LLDP frame being lost during transmission between neighbors, it is recommended to repeat the fast start transmission multiple times to increase the possibility of the neighbors receiving the LLDP frame. With Fast start repeat count it is possible to specify the number of times the fast start transmission would be repeated.
NAD83/NAVD88: North American Datum 1983, CRS Code 4269, Prime Meridian Name: Greenwich; The associated vertical datum is the North American Vertical Datum of 1988 (NAVD88). This datum pair is to be used when referencing locations on land, not near tidal water (which would use Datum = NAD83/MLLW). NAD83/MLLW: North American Datum 1983, CRS Code 4269, Prime Meridian Name: Greenwich; The associated vertical datum is Mean Lower Low Water (MLLW).
Command Descriptions trunk-based PSAP. This format consists of a numerical digit string, corresponding to the ELIN to be used for emergency calling. Policies Delete Check to delete the policy. It will be deleted during the next save. Policy ID ID for the policy. This is auto generated and shall be used when selecting the policies that shall be mapped to the specific ports. Application Type Intended use of the application types: 1.
require specific network policy treatment. Video applications relying on TCP with buffering would not be an intended use of this application type. 8. Video Signalling (conditional) - for use in network topologies that require a separate policy for the video signalling than for the video media. This application type should not be advertised if all the same network policies apply as those advertised in the Video Conferencing application policy.
Command Descriptions check marking the checkboxes that corresponds to the policies. Buttons Click to save changes. Click to undo any changes made locally and revert to previously saved values.
2.3.83 PoE This page allows the user to inspect and configure the current PoE port settings. Object Description Reserved Power determined by Allocated mode In this mode the user allocates the amount of power that each port may reserve. The allocated/reserved power for each port/PD is specified in the Maximum Power fields. Class mode In this mode each port automatically determines how much power to reserve according to the class the connected PD belongs to, and reserves the power accordingly.
Command Descriptions exceeds the amount of power that the power supply can deliver or if the actual power consumption for a given port exceeds the reserved power for that port. The ports are shut down according to the ports priority. If two ports have the same priority the port with the highest port number is shut down. Reserved Power In this mode the ports are shut down when total reserved powered exceeds the amount of power that the power supply can deliver.
delivered to a remote device. For port support 4Pairs mode, the maximum allowed value is 60 W; others are 30 W. Buttons Click to save changes. Click to undo any changes made locally and revert to previously saved values. 2.3.84 PoE Scheduler This page provides power scheduling configurations. The entry is used to control the power alive interval on PoE port. It is allowed to set the specific interval to schedule power on/off in one week.
Command Descriptions Power Scheduling Interval Configuration Day Checkmarks indicate which day are members of the set. Interval Start - Select the start hour and minute. End - Select the end hour and minute. Action Power On - Select the radio button to apply power on during the interval. Power Off - Select the radio button to apply power off during the interval. Power Scheduling During Time Interval There are 48 time interval one day. Each interval have 30 minutes.
Object Delete Description Check to delete the entry. The designated entry will be deleted during the next save. Day Checkmarks indicate which day are members of the entry. Check or uncheck as needed to modify the entry. Time (hh:mm) hh - Select the hour. mm - Select the minute. Buttons Click to add new reset entry Click to save changes. Click to undo any changes made locally and revert to previously saved values.
Command Descriptions 2.3.86 MAC Table The MAC Address Table is configured on this page. Set timeouts for entries in the dynamic MAC Table and configure the static MAC table here. Object Description Aging Configuration Disable Automatic Aging Disable the automatic aging of dynamic entries by ticking the item. Aging Time Enter a value in seconds. The allowed range is 10 to 1000000 seconds. MAC Table Learning Auto Learning is done automatically as soon as a frame with unknown SMAC is received.
Note: Make sure that the link used for managing the switch is added to the Static Mac Table before changing to secure learning mode, otherwise the management link is lost and can only be restored by using another non-secure port or by connecting to the switch via the serial interface. Static MAC Table Learning Delete Check to delete the entry. It will be deleted during the next save. VLAN ID The VLAN ID of the entry. MAC Address The MAC address of the entry.
Command Descriptions This page allows for controlling VLAN configuration on the switch. The page is divided into a global section and a per-port configuration section. Object Description Global VLAN Configuration Allowed Access VLANs This field shows the allowed Access VLANs, i.e. it only affects ports configured as Access ports. Ports in other modes are members of all VLANs specified in the Allowed VLANs field. By default, only VLAN 1 is enabled.
Voice VLAN may add the port to more VLANs behind the scenes. Access ports have the following characteristics: Member of exactly one VLAN, the Port VLAN (a.k.a. Access VLAN), which by default is 1 Accepts untagged and C-tagged frames Discards all frames that are not classified to the Access VLAN On egress all frames classified to the Access VLAN are transmitted untagged.
Command Descriptions unaware, the frame is untagged, or VLAN awareness is enabled on the port, but the frame is priority tagged (VLAN ID = 0). On egress, frames classified to the Port VLAN do not get tagged if Egress Tagging configuration is set to untag Port VLAN. The Port VLAN is called an "Access VLAN" for ports in Access mode and Native VLAN for ports in Trunk or Hybrid mode.
Tagged Only Only tagged frames are accepted on ingress. Untagged frames are discarded. Untagged Only Only untagged frames are accepted on ingress. Tagged frames are discarded. Egress Tagging Ports in Trunk and Hybrid mode may control the tagging of frames on egress. Untag Port VLAN Frames classified to the Port VLAN are transmitted untagged. Other frames are transmitted with the relevant tag. Tag All All frames, whether classified to the Port VLAN or not, are transmitted with a tag.
Command Descriptions 2.3.88 Private VLANs 2.3.89 Membership The Private VLAN membership configurations for the switch can be monitored and modified here. Private VLANs can be added or deleted here. Port members of each Private VLAN can be added or removed here. Private VLANs are based on the source port mask, and there are no connections to VLANs. This means that VLAN IDs and Private VLAN IDs can be identical. A port must be a member of both a VLAN and a Private VLAN to be able to forward packets.
Adding a New Private VLAN Click to add a new private VLAN ID. An empty row is added to the table, and the private VLAN can be configured as needed. The allowed range for a private VLAN ID is the same as the switch port number range. Any values outside this range are not accepted, and a warning message appears. Click "OK" to discard the incorrect entry, or click "Cancel" to return to the editing and make a correction. The Private VLAN is enabled when you click "Save".
Command Descriptions 2.3.90 Port Isolation This page is used for enabling or disabling port isolation on ports in a Private VLAN. A port member of a VLAN can be isolated to other isolated ports on the same VLAN and Private VLAN. Object Port Members Description A check box is provided for each port of a private VLAN. When checked, port isolation is enabled on that port. When unchecked, port isolation is disabled on that port. By default, port isolation is disabled on all ports.
2.3.91 VCL 2.3.92 MAC-based VLAN The MAC-based VLAN entries can be configured here. This page allows for adding and deleting MAC-based VLAN entries and assigning the entries to different ports. This page shows only static entries. Object Delete Description To delete a MAC-based VLAN entry, check this box and press save. The entry will be deleted in the stack. MAC Address Indicates the MAC address. VLAN ID Indicates the VLAN ID.
Command Descriptions Buttons Click to save changes. Click to undo any changes made locally and revert to previously saved values. Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refreshes the displayed table. Updates the table starting from the first entry in the MAC-based VLAN Table. Updates the table, starting with the entry after the last entry currently displayed.
2.3.93 Protocol-based VLAN 2.3.94 Protocol to Group This page allows you to add new protocols to Group Name (unique for each Group) mapping entries as well as allow you to see and delete already mapped entries for the switch. Object Delete Description To delete a Protocol to Group Name map entry, check this box. The entry will be deleted on the switch during the next Save.
Command Descriptions For SNAP: Valid value in this case also is comprised of two different sub-values. a. OUI: OUI (Organizationally Unique Identifier) is value in format of xx-xx-xx where each pair (xx) in string is a hexadecimal value ranges from 0x00-0xff. b.
2.3.95 Group to VLAN This page allows you to map a already configured Group Name to a VLAN for the switch. Object Delete Description To delete a Group Name to VLAN map entry, check this box. The entry will be deleted on the switch during the next Save. Group Name A valid Group Name is a string at the most 16 characters which consists of a combination of alphabets (a-z or A-Z) and integers(0-9), no special character is allowed.
Command Descriptions Click to save changes. Click to undo any changes made locally and revert to previously saved values. Click to add a new entry in mapping table. Legal values for a VLAN ID are 1 through 4095. The button can be used to undo the addition of new entry. The maximum possible Group to VLAN mappings are limited to 64. Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Click to refresh the page immediately.
2.3.96 IP Subnet-based VLAN The IP subnet-based VLAN entries can be configured here. This page allows for adding, updating and deleting IP subnet-based VLAN entries and assigning the entries to different ports. This page shows only static entries. Object Delete Description To delete a IP subnet-based VLAN entry, check this box and press save. The entry will be deleted in the stack. VCE ID Indicates the index of the entry. It is user configurable. It's value ranges from 0-128.
Command Descriptions The button can be used to undo the addition of new IP subnet-based VLANs. The maximum possible IP subnet-based VLAN entries are limited to 128. Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refreshes the displayed table. 2.3.97 Voice VLAN 2.3.98 Voice VLAN Configuration The Voice VLAN feature enables voice traffic forwarding on the Voice VLAN, then the switch can classify and schedule network traffic.
Object Mode Description Indicates the Voice VLAN mode operation. We must disable MSTP feature before we enable Voice VLAN. It can avoid the conflict of ingress filtering. Possible modes are: Enabled: Enable Voice VLAN mode operation. Disabled: Disable Voice VLAN mode operation. VLAN ID Indicates the Voice VLAN ID. It should be a unique VLAN ID in the system and cannot equal each port PVID. It is a conflict in configuration if the value equals management VID, MVR VID, PVID etc.
Command Descriptions other cases, it will be based on hardware aging time. The actual aging time will be situated between the [age_time; 2 * age_time] interval. Traffic Class Indicates the Voice VLAN traffic class. All traffic on the Voice VLAN will apply this class. Port Mode Indicates the Voice VLAN port mode. Possible port modes are: Disabled: Disjoin from Voice VLAN. Auto: Enable auto detect mode.
2.3.99 Voice VLAN OUI Configure VOICE VLAN OUI table on this page. The maximum number of entries is 16. Modifying the OUI table will restart auto detection of OUI process. Object Description Delete Check to delete the entry. It will be deleted during the next save. Telephony OUI A telephony OUI address is a globally unique identifier assigned to a vendor by IEEE. It must be 6 characters long and the input format is "xx-xx-xx" (x is a hexadecimal digit). Description The description of OUI address.
Command Descriptions Click to undo any changes made locally and revert to previously saved values. 2.3.100 QoS 2.3.101 Port Classification This page allows you to configure the basic QoS Ingress Classification settings for all switch ports. Object Description Port The port number for which the configuration below applies. CoS Controls the default class of service. All frames are classified to a CoS. There is a one to one mapping between CoS, queue and priority.
Otherwise the frame is classified to the default CoS. The classified CoS can be overruled by a QCL entry. Note: If the default CoS has been dynamically changed, then the actual default CoS is shown in parentheses after the configured default CoS. DPL Controls the default drop precedence level. All frames are classified to a drop precedence level. If the port is VLAN aware and the frame is tagged, then the frame is classified to a DPL that is equal to the DEI value in the tag.
Command Descriptions Address Mode The IP/MAC address mode specifying whether the QCL classification must be based on source (SMAC/SIP) or destination (DMAC/DIP) addresses on this port. The allowed values are: Source: Enable SMAC/SIP matching. Destination: Enable DMAC/DIP matching. Buttons Click to save changes. Click to undo any changes made locally and revert to previously saved values.
2.3.102 Port Policing This page allows you to configure the Policer settings for all switch ports. Object Description Port The port number for which the configuration below applies. Enabled Controls whether the policer is enabled on this switch port. Rate Controls the rate for the policer. The default value is 500. This value is restricted to 100-1000000 when the "Unit" is "kbps" or "fps", and it is restricted to 1-3300 when the "Unit" is "Mbps" or "kfps".
Command Descriptions Buttons Click to save changes. Click to undo any changes made locally and revert to previously saved values.
2.3.103 Port Scheduler This page provides an overview of QoS Egress Port Schedulers for all switch ports. Object Port Description The logical port for the settings contained in the same row. Click on the port number in order to configure the schedulers. 184 Mode Shows the scheduling mode for this port. Qn Shows the weight for this queue and port.
Command Descriptions 2.3.104 Port Shaping This page provides an overview of QoS Egress Port Shapers for all switch ports. Object Port Description The logical port for the settings contained in the same row. Click on the port number in order to configure the shapers. Qn Shows "disabled" or actual queue shaper rate - e.g. "800 Mbps". Port # Shows "disabled" or actual port shaper rate - e.g. "800 Mbps".
2.3.105 Port Tag Remarking This page provides an overview of QoS Egress Port Tag Remarking for all switch ports. Object Port Description The logical port for the settings contained in the same row. Click on the port number in order to configure tag remarking. Mode Shows the tag remarking mode for this port. Classified: Use classified PCP/DEI values. Default: Use default PCP/DEI values. Mapped: Use mapped versions of QoS class and DP level.
Command Descriptions 2.3.106 Port DSCP This page allows you to configure the basic QoS Port DSCP Configuration settings for all switch ports. Object Port Description The Port column shows the list of ports for which you can configure dscp ingress and egress settings. Ingress In Ingress settings you can change ingress translation and classification settings for individual ports.
-Disable: No Ingress DSCP Classification. -DSCP=0: Classify if incoming (or translated if enabled) DSCP is 0. -Selected: Classify only selected DSCP for which classification is enabled as specified in DSCP Translation window for the specific DSCP. -All: Classify all DSCP. Egress Port Egress Rewriting can be one of -Disable: No Egress rewrite. -Enable: Rewrite enabled without remapping. -Remap DP Unaware: DSCP from analyzer is remapped and frame is remarked with remapped DSCP value.
Command Descriptions This page allows you to configure the basic QoS DSCP based QoS Ingress Classification settings for all switches. Object Description DSCP Maximum number of supported DSCP values are 64. Trust Controls whether a specific DSCP value is trusted. Only frames with trusted DSCP values are mapped to a specific QoS class and Drop Precedence Level. Frames with untrusted DSCP values are treated as a non-IP frame.
Qos Class QoS class value can be any of (0-7) DPL Drop Precedence Level (0-1) Buttons Click to save changes. Click to undo any changes made locally and revert to previously saved values.
Command Descriptions 2.3.108 DSCP Translation This page allows you to configure the basic QoS DSCP Translation settings for all switches. DSCP translation can be done in Ingress or Egress. Object DSCP Description Maximum number of supported DSCP values are 64 and valid DSCP value ranges from 0 to 63. Ingress Ingress side DSCP can be first translated to new DSCP before using the DSCP for QoS class and DPL map.
There are two configuration parameters for DSCP Translation Translate Classify Translation DSCP at Ingress side can be translated to any of (0-63) DSCP values. Classify Click to enable Classification at Ingress side. Egress There are the following configurable parameters for Egress side Remap DP0 Controls the remapping for frames with DP level 0. Remap DP1 Controls the remapping for frames with DP level 1. Remap DP0 Select the DSCP value from select menu to which you want to remap.
Command Descriptions 2.3.109 DSCP Classification This page allows you to configure the mapping of QoS class and Drop Precedence Level to DSCP value. Object Description QoS Class Actual QoS class. DPL Actual Drop Precedence Level. DSCP Select the classified DSCP value (0-63). Buttons Click to save changes.
Click to undo any changes made locally and revert to previously saved values. 2.3.110 QoS Control List This page shows the QoS Control List(QCL), which is made up of the QCEs. Each row describes a QCE that is defined. The maximum number of QCEs is 256 on each switch. Click on the lowest plus sign to add a new QCE to the list. Object Description QCE Indicates the QCE id. Port Indicates the list of ports configured with the QCE. DMAC Indicates the destination MAC address.
Command Descriptions VID Indicates (VLAN ID), either a specific VID or range of VIDs. VID can be in the range 1-4095 or 'Any' PCP Priority Code Point: Valid values of PCP are specific(0, 1, 2, 3, 4, 5, 6, 7) or range(0-1, 2-3, 4-5, 6-7, 0-3, 4-7) or 'Any'. DEI Drop Eligible Indicator: Valid value of DEI are 0, 1 or 'Any'. Frame Type Indicates the type of frame. Possible values are: Any: Match any frame type. Ethernet: Match EtherType frames. LLC: Match (LLC) frames. SNAP: Match (SNAP) frames.
Object Port Members Description Check the checkbox button to include the port in the QCL entry. By default all ports are included. Key parameters Key configuration is described as below: DMAC Destination MAC address: Possible values are 'Unicast', 'Multicast', 'Broadcast' or 'Any'. SMAC Source MAC address: xx-xx-xx-xx-xx-xx or 'Any'. If a port is configured to match on DMAC/DIP, this field is the Destination MAC address. Tag Value of Tag field can be 'Untagged', 'Tagged' or 'Any'.
Command Descriptions DSAP Address Valid DSAP(Destination Service Access Point) can vary from 0x00 to 0xFF or 'Any'. Control Valid Control field can vary from 0x00 to 0xFF or 'Any'. SNAP: PID Valid PID(a.k.a Ether Type) can be 0x0000-0xFFFF or 'Any'. IPv4: Protocol IP protocol number: (0-255, 'TCP' or 'UDP') or 'Any'. Source IP Specific Source IP address in value/mask format or 'Any'. IP and Mask are in the format x.y.z.w where x, y, z, and w are decimal numbers between 0 and 255.
Return to the previous page without saving the configuration change.
Command Descriptions 2.3.111 Storm Control Storm control for the switch is configured on this page. There is a unicast storm rate control, multicast storm rate control, and a broadcast storm rate control. These only affect flooded frames, i.e. frames with a (VLAN ID, DMAC) pair not present on the MAC Address table. The configuration indicates the permitted packet rate for unicast, multicast or broadcast traffic across the switch.
Click to undo any changes made locally and revert to previously saved values.
Command Descriptions 2.3.112 Mirror Configure port Mirroring on this page. To debug network problems, selected traffic can be copied, or mirrored, on a mirror port where a frame analyzer can be attached to analyze the frame flow. The traffic to be copied on the mirror port is selected as follows: All frames received on a given port (also known as ingress or source mirroring). All frames transmitted on a given port (also known as egress or destination mirroring).
Object Port to mirror Description Port to mirror also known as the mirror port. Frames from ports that have either source (rx) or destination (tx) mirroring enabled are mirrored on this port. Disabled disables mirroring. Port The logical port for the settings contained in the same row. Mode Select mirror mode. Rx only Frames received on this port are mirrored on the mirror port. Frames transmitted are not mirrored. Tx only Frames transmitted on this port are mirrored on the mirror port.
Command Descriptions 2.3.113 GVRP 2.3.114 Global Config This page allows you to configure the basic GVRP Configuration settings for all switch ports. Object GVRP Protocol timers Description Join-time is a value in the range 1-20 in the units of centi seconds, i.e. in units of one hundredth of a second. The default is 20. Leave-time is a value in the range 60-300 in the units of centi seconds, i.e. in units of one hundredth of a second.The default is 60.
2.3.115 Port Config This page allows you to enable a port for GVRP. Buttons Click to save changes. 2.3.116 sFlow This page allows for configuring sFlow. The configuration is divided into two parts: Configuration of the sFlow receiver (a.k.a. sFlow collector) and configuration of per-port flow and counter samplers.
Command Descriptions sFlow sampling. Object Description Agent Configuration IP Address The IP address used as Agent IP address in sFlow datagrams. It serves as a unique key that will identify this agent over extended periods of time. Both IPv4 and IPv6 addresses are supported. Receiver Configuration Owner Basically, sFlow can be configured in two ways: Through local management using the Web or CLI interface or through SNMP.
The button allows for releasing the current owner and disable sFlow sampling. The button is disabled if sFlow is currently unclaimed. If configured through SNMP, the release must be confirmed (a confirmation request will appear). IP Address/Hostname The IP address or hostname of the sFlow receiver. Both IPv4 and IPv6 addresses are supported. UDP Port The UDP port on which the sFlow receiver listens to sFlow datagrams. If set to 0 (zero), the default port (6343) is used.
Command Descriptions Click to save changes. Note that sFlow configuration is not persisted to non-volatile memory. Click to undo any changes made locally and revert to previously saved values.
2.3.117 RingV2 This page provides Ring related configuration. Object Index Description The group index. This parameter is used for easy identifying the ring when user configure it. Group 1 (Index 1) - It supports configuration of ring. Group 2 (Index 2) - It supports configuration of ring, coupling and dual-homing. Group 3 (Index 3) - It supports configuration of chain and balancing-chain. Mode Enable Ring on the specific group.
Command Descriptions Group 1 - support option of ring-master and ring-slave. # Ring - it could be master or slave. Group 2 - support configuration of the ring, coupling and dual-homing. # Ring - it could be master or slave. # Coupling - it could be primary and backup. # Dual-Homing Group 3 - support configuration of the chain and balancing-chain. # Chain - it could be head, tail or member. # Balancing Chain - it could be central-block, terminal-1/2 or member.
tail port is redundant port; it is blocking port in normal state. # When role is chain/member, both ring ports are member port. Both ring ports are forwarding port in normal state. # When role is balancing-chain/central-block, one ring port is member port and another is block port. The block port is redundant port; it is blocking port in normal state. # When role is balancing-chain/terminal-1/2, one ring port is member port and another is terminal port.
Command Descriptions Object Description Mode Enabled Enable DDMI mode operation. Disabled Disable DDMI mode operation. Buttons Click to save changes. Click to undo any changes made locally and revert to previously saved values.
2.4 Monitor 2.4.1 System 2.4.2 System Information The switch system information is provided here. Object Contact Description The system contact configured in Configuration | System | Information | System Contact. Name The system name configured in Configuration | System | Information | System Name. Location The system location configured in Configuration | System | Information | System Location. MAC Address The MAC Address of this switch. Chip ID The Chip ID of this switch.
Command Descriptions 213
2.4.3 CPU Load This page displays the CPU load, using line chart. The load is measured as averaged over the last 100ms, 1sec and 10 seconds intervals. The last 1~256 samples (maximum 256) are graphed, and the last numbers are displayed as text as well. Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.
Command Descriptions 2.4.4 IP Status This page displays the status of the IP protocol layer. The status is defined by the IP interfaces, the IP routes and the neighbour cache (ARP cache) status. Object Description IP Interfaces Interface The name of the interface. Type The address type of the entry. This may be LINK or IPv4. Address The current address of the interface (of the given type). Status The status flags of the interface (and/or address).
Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.
Command Descriptions System Log 2.4.5 Each page shows up to 999 table entries, selected through the "entries per page" input field. When first visited, the web page will show the beginning entries of this table. The "Level" input field is used to filter the display system log entries. The "Clear Level" input field is used to specify which system log entries will be cleared. To clear specific system log entries, select the clear level first then click the button.
Message The detail message of the system log entry. Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Updates the table entries, starting from the current entry. Flushes the selected entries. Updates the table entries, starting from the first available entry. Updates the table entries, ending at the last entry currently displayed. Updates the table entries, starting from the last entry currently displayed.
Command Descriptions System Detailed Log 2.4.6 The switch system detailed log information is provided here. Object Description ID The ID (>= 1) of the system log entry. Message The detailed message of the system log entry. Buttons Updates the system log entry to the current entry ID. Updates the system log entry to the first available entry ID. Updates the system log entry to the previous available entry ID. Updates the system log entry to the next available entry ID.
Object Description Description Alarm Type Description.. Time Alarm occurrence date time. Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Click to refresh data.
Command Descriptions 2.4.8 Green Ethernet 2.4.9 Port Power Saving This page provides the current status for EEE. Object Description Port This is the logical port number for this row. Link Shows if the link is up for the port (green = link up, red = link down). EEE Shows if EEE is enabled for the port (reflects the settings at the Port Power Savings configuration page). LP EEE cap Shows if the link partner is EEE capable. EEE Savings Shows if the system is currently saving power due to EEE.
2.4.10 Ports 2.4.11 Ports State This page provides an overview of the current switch port states. The port states are illustrated as follows: RJ45 ports SFP ports State Disabled Down Link Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Click to refresh the page.
Command Descriptions 2.4.12 Trafice Overview This page provides an overview of general traffic statistics for all switch ports. Object Description Port The logical port for the settings contained in the same row. Packet The number of received and transmitted packets per port. Bytes The number of received and transmitted bytes per port. Errors The number of frames received in error and the number of incomplete transmissions per port.
2.4.13 QoS Statistics This page provides statistics for the different queues for all switch ports. Object Description Port The logical port for the settings contained in the same row. Qn There are 8 QoS queues per port. Q0 is the lowest priority queue. Rx/Tx The number of received and transmitted packets per queue Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Click to refresh the page immediately. Clears the counters for all ports.
Command Descriptions 2.4.14 QCL Status This page shows the QCL status by different QCL users. Each row describes the QCE that is defined. It is a conflict if a specific QCE is not applied to the hardware due to hardware limitations. The maximum number of QCEs is 256 on each switch. Object Description User Indicates the QCL user. QCE Indicates the QCE id. Port Indicates the list of ports configured with the QCE. Frame Type Indicates the type of frame.
Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Click to release the resources required to add QCL entry, in case the conflict status for any QCL entry is 'yes'. Click to refresh the page.
Command Descriptions 2.4.15 Detailed Statistics This page provides detailed traffic statistics for a specific switch port. Use the port select box to select which switch port details to display. The displayed counters are the totals for receive and transmit, the size counters for receive and transmit, and the error counters for receive and transmit. Object Description Receive Total and Transmit Total Rx and Tx Packets The number of received and transmitted (good and bad) packets.
respective frame sizes. Receive and Transmit Queue Counters The number of received and transmitted packets per input and output queue. Receive Error Counters Rx Drops The number of frames dropped due to lack of receive buffers or egress congestion. Rx CRC/Alignment The number of frames received with CRC or alignment errors. Rx Undersize The number of short 1 frames received with valid CRC. Rx Oversize The number of long 2 frames received with valid CRC.
Command Descriptions 2.4.16 DHCP 2.4.17 DHCP Server 2.4.18 Statistics This page displays the database counters and the number of DHCP messages sent and received by DHCP server. Object Description Database Counters Pool Number of pools. Excluded IP Address Number of excluded IP address ranges. Declined IP Address Number of declined IP addresses. Binding Counters Automatic Binding Number of bindings with network-type pools.
DECLINE Number of DHCP DECLINE messages received. RELEASE Number of DHCP RELEASE messages received. INFORM Number of DHCP INFORM messages received. DHCP Message Sent Counters OFFER Number of DHCP OFFER messages sent. ACK Number of DHCP ACK messages sent. NAK Number of DHCP NAK messages sent. Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Click to refresh the page immediately.
Command Descriptions 2.4.19 Binding This page displays bindings generated for DHCP clients. Object Description IP IP address allocated to DHCP client. Type Type of binding. Possible types are Automatic, Manual, Expired. State State of binding. Possible states are Committed, Allocated, Expired. Pool Name The pool that generates the binding. Server ID Server IP address to service the binding. Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.
2.4.20 Declined IP This page displays declined IP addresses. Object Declined IP Description List of IP addresses declined. Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Click to refresh the page immediately.
Command Descriptions 2.4.21 DHCP Snooping Table Each page shows up to 99 entries from the Dynamic DHCP snooping table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Dynamic DHCP snooping Table. The "MAC address" and "VLAN" input fields allows the user to select the starting point in the Dynamic DHCP snooping Table.
Updates the table, starting with the entry after the last entry currently displayed.
Command Descriptions 2.4.22 DHCP Relay Statistics This page provides statistics for DHCP relay. Object Description Server Statistics Transmit to Server The number of packets that are relayed from client to server. Transmit Error The number of packets that resulted in errors while being sent to clients. Receive from Server The number of packets received from server. Receive Missing Agent The number of packets received without agent information options.
seconds. Click to refresh the page immediately. Clear all statistics.
Command Descriptions 2.4.23 DHCP Detailed Statistics This page provides statistics for DHCP snooping. Notice that the normal forward per-port TX statistics isn't increased if the incoming DHCP packet is done by L3 forwarding mechanism. And clear the statistics on specific port may not take effect on global statistics since it gathers the different layer overview. Object Description Rx and Tx Discover The number of discover (option 53 with value 1) packets received and transmitted.
Untrusted Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refreshes the displayed table starting from the input fields. Flushes all dynamic entries.
Command Descriptions 2.4.24 Security 2.4.25 Accessment Management Statistics This page provides statistics for access management. Object Description Interface The interface type through which the remote host can access the switch. Received Packets Number of received packets from the interface when access management mode is enabled. Allowed Packets Number of allowed packets from the interface when access management mode is enabled.
2.4.26 Network 2.4.27 Port Security 2.4.28 Switch This page shows the Port Security status. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning. In this mode, frames from unknown MAC addresses are passed on to the port security module, which in turn asks all user modules whether to allow this new MAC address to forward or block it.
Command Descriptions Port Status Port The port number for which the status applies. Click the port number to see the status for this particular port. Users Each of the user modules has a column that shows whether that module has enabled Port Security or not. A '-' means that the corresponding user module is not enabled, whereas a letter indicates that the user module abbreviated by that letter (see Abbr) has enabled port security. State Shows the current state of the port.
2.4.29 Port This page shows the MAC addresses secured by the Port Security module. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning. In this mode, frames from unknown MAC addresses are passed on to the port security module, which in turn asks all user modules whether to allow this new MAC address to forward or block it.
Command Descriptions 243
2.4.30 NAS 2.4.31 Switch This page provides an overview of the current NAS port states. Object Description Port The switch port number. Click to navigate to detailed NAS statistics for this port. Admin State The port's current administrative state. Refer to NAS Admin State for a description of possible values. Port State The current state of the port. Refer to NAS Port State for a description of the individual states.
Command Descriptions Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Click to refresh the page immediately.
2.4.32 Port This page provides detailed NAS statistics for a specific switch port running EAPOL-based IEEE 802.1X authentication. For MAC-based ports, it shows selected backend server (RADIUS Authentication Server) statistics, only . Use the port select box to select which port details to be displayed. Object Description Port State Admin State The port's current administrative state. Refer to NAS Admin State for a description of possible values. Port State The current state of the port.
Command Descriptions Counters administrative states: • Port-based 802.1X • Single 802.1X • Multi 802.1X • MAC-based Auth. Last Supplicant/Client Information about the last supplicant/client that attempted to authenticate. This Info information is available for the following administrative states: • Port-based 802.1X • Single 802.1X • Multi 802.1X • MAC-based Auth.
remain in the unauthenticated state for Hold Time seconds. Last Authentication Shows the date and time of the last authentication of the client (successful as well as unsuccessful). Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Click to refresh the page immediat This button is available in the following modes: • Force Authorized • Force Unauthorized • Port-based 802.1X • Single 802.1X Click to clear the counters for the selected port.
Command Descriptions 2.4.33 ACL Status This page shows the ACL status by different ACL users. Each row describes the ACE that is defined. It is a conflict if a specific ACE is not applied to the hardware due to hardware limitations. The maximum number of ACEs is 256 on each switch. Object Description User Indicates the ACL user. Ingress Port Indicates the ingress port of the ACE. Possible values are: All: The ACE will match all ingress port. Port: The ACE will match a specific ingress port.
Enabled: Frames received on the port are mirrored. Disabled: Frames received on the port are not mirrored. The default value is "Disabled". CPU Forward packet that matched the specific ACE to CPU. CPU Once Forward first packet that matched the specific ACE to CPU. Counter The counter indicates the number of times the ACE was hit by a frame. Conflict Indicates the hardware status of the specific ACE. The specific ACE is not applied to the hardware due to hardware limitations.
Command Descriptions 2.4.34 ARP Inspection Each page shows up to 99 entries from the Dynamic ARP Inspection table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Dynamic ARP Inspection Table. The "Start from port address", "VLAN", "MAC address" and "IP address" input fields allow the user to select the starting point in the Dynamic ARP Inspection Table.
Updates the table, starting with the entry after the last entry currently displayed.
Command Descriptions 2.4.35 IP Source Guard Each page shows up to 99 entries from the Dynamic IP Source Guard table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Dynamic IP Source Guard Table. The "Start from port address", "VLAN" and "IP address" input fields allow the user to select the starting point in the Dynamic IP Source Guard Table.
Update the table starting from the first entry in the Dynamic IP Source Guard Table. Updates the table, starting with the entry after the last entry currently displayed.
Command Descriptions 2.4.36 AAA 2.4.37 RADIUS Overview This page provides an overview of the status of the RADIUS servers configurable on the Authentication configuration page. Object Description RADIUS Authentication Servers # The RADIUS server number. Click to navigate to detailed statistics for this server. IP Address The IP address and UDP port number (in : notation) of this server. Status The current status of the server.
IP Address The IP address and UDP port number (in : notation) of this server. Status The current status of the server. This field takes one of the following values: Disabled: The server is disabled. Not Ready: The server is enabled, but IP communication is not yet up and running. Ready: The server is enabled, IP communication is up and running, and the RADIUS module is ready to accept accounting attempts.
Command Descriptions 2.4.38 RADIUS Details This page provides detailed statistics for a particular RADIUS server. Object Description RADIUS Authentication Statistics Packet Counters RADIUS authentication server packet counter. There are seven receive and four transmit counters. Other Info This section contains information about the state of the server and the latest round-trip time. RADIUS Accounting Statistics Packet Counters RADIUS accounting server packet counter.
2.4.39 Switch 2.4.40 RMON 2.4.41 Statistics This page provides an overview of RMON Statistics entries. Each page shows up to 99 entries from the Statistics table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Statistics table. The first displayed will be the one with the lowest ID found in the Statistics table. Object Description ID Indicates the index of Statistics entry.
Command Descriptions Frag. The number of frames which size is less than 64 octets received with invalid CRC. Jabb. The number of frames which size is larger than 64 octets received with invalid CRC. Coll. The best estimate of the total number of collisions on this Ethernet segment. 64 The total number of packets (including bad packets) received that were 64 octets in length. 65~127 The total number of packets (including bad packets) received that were between 65 to 127 octets in length.
2.4.42 History This page provides an overview of RMON History entries. Each page shows up to 99 entries from the History table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the History table. The first displayed will be the one with the lowest History Index and Sample Index found in the History table. Object Description History Index Indicates the index of History control entry.
Command Descriptions during this sampling interval, in hundredths of a percent. Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Click to refresh the page immediately. Updates the table starting from the first entry in the History table, i.e., the entry with the lowest History Index and Sample Index. Updates the table, starting with the entry after the last entry currently displayed.
2.4.43 Alarm This page provides an overview of RMON Alarm entries. Each page shows up to 99 entries from the Alarm table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Alarm table. The first displayed will be the one with the lowest ID found in the Alarm table. Object Description ID Indicates the index of Alarm control entry.
Command Descriptions 2.4.44 Event This page provides an overview of RMON Event table entries.Each page shows up to 99 entries from the Event table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Event table. The first displayed will be the one with the lowest Event Index and Log Index found in the Event table. Object Description Event Index Indicates the index of the event entry.
2.4.45 LACP 2.4.46 System Status This page provides a status overview for all LACP instances. Object Aggr ID Description The Aggregation ID associated with this aggregation instance. For LLAG the id is shown as 'isid:aggr-id' and for GLAGs as 'aggr-id' Partner System ID The system ID (MAC address) of the aggregation partner. Partner Key The Key that the partner has assigned to this aggregation ID. Last Changed The time since this aggregation changed.
Command Descriptions 2.4.47 Port Status This page provides a status overview for LACP status for all ports. Object Description Port The switch port number. LACP 'Yes' means that LACP is enabled and the port link is up. 'No' means that LACP is not enabled or that the port link is down. 'Backup' means that the port could not join the aggregation group but will join if other port leaves. Meanwhile it's LACP status is disabled. Key The key assigned to this port.
2.4.48 Port Statistics This page provides an overview for LACP statistics for all ports. Object Description Port The switch port number. LACP Received Shows how many LACP frames have been received at each port. LACP Transmitted Shows how many LACP frames have been sent from each port. Discarded Shows how many unknown or illegal LACP frames have been discarded at each port. Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.
Command Descriptions 2.4.49 Loop Protection This page displays the loop protection port status the ports of the switch. Object Description Port The switch port number of the logical port. Action The currently configured port action. Transmit The currently configured port transmit mode. Loops The number of loops detected on this port. Status The current loop protection status of the port. Loop Whether a loop is currently detected on the port.
2.4.50 Spanning Tree 2.4.51 Bridge Status This page provides a status overview of all STP bridge instances. Object Description MSTI The Bridge Instance. This is also a link to the STP Detailed Bridge Status. Bridge ID The Bridge ID of this Bridge instance. Root ID The Bridge ID of the currently elected root bridge. Root Port The switch port currently assigned the root port role. Root Cost Root Path Cost. For the Root Bridge it is zero.
Command Descriptions 2.4.52 Port Status This page displays the STP CIST port status for physical ports of the switch. Object Description Port The switch port number of the logical STP port. CIST Role The current STP port role of the CIST port. The port role can be one of the following values: AlternatePort BackupPort RootPort DesignatedPort Disabled. CIST State The current STP port state of the CIST port. The port state can be one of the following values: Discarding Learning Forwarding.
2.4.53 Port Statistics This page displays the STP port statistics counters of bridge ports in the switch. Object Description Port The switch port number of the logical STP port. MSTP The number of MSTP BPDU's received/transmitted on the port. RSTP The number of RSTP BPDU's received/transmitted on the port. STP The number of legacy STP Configuration BPDU's received/transmitted on the port. TCN The number of (legacy) Topology Change Notification BPDU's received/transmitted on the port.
Command Descriptions 2.4.54 MVR 2.4.55 MVR Statistics This page provides MVR Statistics information. Object Description VLAN ID The Multicast VLAN ID. IGMP/MLD Queries The number of Received Queries for IGMP and MLD, respectively. Received IGMP/MLD Queries The number of Transmitted Queries for IGMP and MLD, respectively. Transmitted IGMPv1 Joins Received The number of Received IGMPv1 Join's. IGMPv2/MLDv1 Report’s The number of Received IGMPv2 Join's and MLDv1 Report's, respectively.
2.4.56 MVR Channel Groups Each page shows up to 99 entries from the MVR Group table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the MVR Channels (Groups) Information Table. The "Start from VLAN", and "Group Address" input fields allow the user to select the starting point in the MVR Channels (Groups) Information Table.
Command Descriptions Updates the table starting from the first entry in the MVR Channels (Groups) Information Table. Updates the table, starting with the entry after the last entry currently displayed.
2.4.57 MVR SFM Information Each page shows up to 99 entries from the MVR SFM Information Table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the MVR SFM Information Table. The "Start from VLAN", and "Group Address" input fields allow the user to select the starting point in the MVR SFM Information Table.
Command Descriptions Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refreshes the displayed table starting from the input fields. Updates the table starting from the first entry in the MVR SFM Information Table. Updates the table, starting with the entry after the last entry currently displayed.
2.4.58 IPMC 2.4.59 IGMP Snooping 2.4.60 IGMP Snooping Status This page provides IGMP Snooping status. Object Description VLAN ID The VLAN ID of the entry. Querier Version Working Querier Version currently. Host Version Working Host Version currently. Querier Status Shows the Querier status is "ACTIVE" or "IDLE". "DISABLE" denotes the specific interface is administratively disabled. Querier Transmitted The number of Transmitted Queries. Queries Received The number of Received Queries.
Command Descriptions Port Switch port number. Status Indicate whether specific port is a router port or not. Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Click to refresh the page immediately. Clears all Statistics counters.
2.4.61 Groups Information Each page shows up to 99 entries from the IGMP Group table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the IGMP Group Table. The "Start from VLAN", and "group" input fields allow the user to select the starting point in the IGMP Group Table. Clicking the button will update the displayed table starting from that or the closest next IGMP Group Table match.
Command Descriptions Updates the table, starting with the entry after the last entry currently displayed.
2.4.62 IPv4 SFM Information Each page shows up to 99 entries from the IGMP SFM Information table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the IGMP SFM Information Table. The "Start from VLAN", and "group" input fields allow the user to select the starting point in the IGMP SFM Information Table.
Command Descriptions Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refreshes the displayed table starting from the input fields. Updates the table starting from the first entry in the IGMP SFM Information Table. Updates the table, starting with the entry after the last entry currently displayed.
2.4.63 MLD Snooping 2.4.64 MLD Snooping Status This page provides MLD Snooping status. Object Description VLAN ID The VLAN ID of the entry. Querier Version Working Querier Version currently. Host Version Working Host Version currently. Quereier Status Shows the Querier status is "ACTIVE" or "IDLE". "DISABLE" denotes the specific interface is administratively disabled. Queries Transmitted The number of Transmitted Queries. Queries Received The number of Received Queries.
Command Descriptions status Indicate whether specific port is a router port or not. Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Click to refresh the page immediately. Clears all Statistics counters.
2.4.65 Groups Information Each page shows up to 99 entries from the MLD Group table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the MLD Group Table. The "Start from VLAN", and "group" input fields allow the user to select the starting point in the MLD Group Table. Clicking the button will update the displayed table starting from that or the closest next MLD Group Table match.
Command Descriptions Updates the table, starting with the entry after the last entry currently displayed.
2.4.66 IPv6 SFM Information Each page shows up to 99 entries from the MLD SFM Information table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the MLD SFM Information Table. The "Start from VLAN", and "group" input fields allow the user to select the starting point in the MLD SFM Information Table.
Command Descriptions Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refreshes the displayed table starting from the input fields.. Updates the table starting from the first entry in the MLD SFM Information Table. Updates the table, starting with the entry after the last entry currently displayed.
2.4.67 LLDP 2.4.68 Neighbors This page provides a status overview for all LLDP neighbors. The displayed table contains a row for each port on which an LLDP neighbor is detected. Object Description Local Port The port on which the LLDP frame was received. Chassis ID The Chassis ID is the identification of the neighbor's LLDP frames. Port ID The Port ID is the identification of the neighbor port. Port Description Port Description is the port description advertised by the neighbor unit.
Command Descriptions 9. Reserved When a capability is enabled, the capability is followed by (+). If the capability is disabled, the capability is followed by (-). Management Address Management Address is the neighbor unit's address that is used for higher layer entities to assist discovery by the network management. This could for instance hold the neighbor's IP address. Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Click to refresh the page.
2.4.69 LLDP-MED Neighbors This page provides a status overview of all LLDP-MED neighbors. The displayed table contains a row for each port on which an LLDP neighbor is detected. This function applies to VoIP devices which support LLDP-MED. Object Description Port The port on which the LLDP frame was received. Device Type LLDP-MED Devices are comprised of two primary Device Types: Network Connectivity Devices and Endpoint Devices.
Command Descriptions framework. Within the LLDP-MED Endpoint Device category, the LLDP-MED scheme is broken into further Endpoint Device Classes, as defined in the following. Each LLDP-MED Endpoint Device Class is defined to build upon the capabilities defined for the previous Endpoint Device Class.
The LLDP-MED Communication Endpoint (Class III) definition is applicable to all endpoint products that act as end user communication appliances supporting IP media. Capabilities include all of the capabilities defined for the previous Generic Endpoint (Class I) and Media Endpoint (Class II) classes, and are extended to include aspects related to end user devices.
Command Descriptions voice signalling than for the voice media. 3. Guest Voice - to support a separate limited feature-set voice service for guest users and visitors with their own IP Telephony handsets and other similar appliances supporting interactive voice services. 4. Guest Voice Signalling - for use in network topologies that require a different policy for the guest voice signalling than for the guest voice media. 5.
Priority Priority is the Layer 2 priority to be used for the specified application type. One of the eight priority levels (0 through 7). DSCP DSCP is the DSCP value to be used to provide Diffserv node behavior for the specified application type as defined in IETF RFC 2474. Contain one of 64 code point values (0 through 63). Auto-negotiation Auto-negotiation identifies if MAC/PHY auto-negotiation is supported by the link partner.
Command Descriptions 2.4.70 EEE By using EEE power savings can be achieved at the expense of traffic latency. This latency occurs due to that the circuits EEE turn off to save power, need time to boot up before sending traffic over the link. This time is called "wakeup time". To achieve minimal latency, devices can use LLDP to exchange information about their respective tx and rx "wakeup time ", as a way to agree upon the minimum wakeup time they need.
Echo Rx Tw The link partner's Echo Rx Tw value. Resolved Tx Tw The resolved Tx Tw for this link. Note : NOT the link partner The resolved value that is the actual "tx wakeup time " used for this link (based on EEE information exchanged via LLDP). Resolved Rx Tw The resolved Rx Tw for this link. Note : NOT the link partner The resolved value that is the actual "tx wakeup time " used for this link (based on EEE information exchanged via LLDP).
Command Descriptions 2.4.71 Port Statistics This page provides an overview of all LLDP traffic. Two types of counters are shown. Global counters are counters that refer to the whole switch, while local counters refer to per port counters for the currently selected switch. Object Description Global Counters Neighbor entries were Shows the time when the last entry was last deleted or added. It also shows the time last change elapsed since the last change was detected.
Local Port The port on which LLDP frames are received or transmitted. Tx Frames The number of LLDP frames transmitted on the port. Rx Frames The number of LLDP frames received on the port. Rx Errors The number of received LLDP frames containing some kind of error. Frames Discarded If a LLDP frame is received on a port, and the switch's internal table has run full, the LLDP frame is counted and discarded. This situation is known as "Too Many Neighbors" in the LLDP standard.
Command Descriptions 2.4.72 PoE This page allows the user to inspect the current status for all PoE ports. Object Description PoE Status Local Port This is the logical port number for this row. PD Class Each PD is classified according to a class that defines the maximum power the PD will use. The PD Class shows the PDs class. Five Classes are defined: Class 0: Max. power 15.4 W Class 1: Max. power 4.0 W Class 2: Max. power 7.0 W Class 3: Max. power 15.4 W Class 4: Max. power 30.
PoE turned OFF - PD overload - The PD has requested or used more power than the port can deliver, and is powered down. PoE turned OFF - PD is off. Invalid PD - PD detected, but is not working correctly. Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Click to refresh the page.
Command Descriptions 2.4.73 MAC Table Each page shows up to 999 entries from the MAC table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the MAC Table. The first displayed will be the one with the lowest VLAN ID and the lowest MAC address found in the MAC Table. The "Start from MAC address" and "VLAN" input fields allow the user to select the starting point in the MAC Table.
MAC Address The MAC address of the entry. VLAN The VLAN ID of the entry. Port Members The ports that are members of the entry. Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refreshes the displayed table starting from the "Start from MAC address" and "VLAN" input fields. Flushes all dynamic entries. Updates the table starting from the first entry in the MAC Table, i.e. the entry with the lowest VLAN ID and MAC address.
Command Descriptions 2.4.74 VLANs 2.4.75 VLANs Membership Each page shows up to 99 entries from the VLAN table (default being 20), selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the VLAN Table. The first displayed will be the one with the lowest VLAN ID found in the VLAN Table. The "VLAN" input field allows the user to select the starting point in the VLAN Table.
VLAN, the following image will be displayed: . The port will not be a member of the VLAN in this case. Buttons Select VLAN Users from this drop down list. Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Click to refresh the page immediately.
Command Descriptions 2.4.76 VLANs Ports This page provides VLAN Port Status. Object VLAN User Description Various internal software modules may use VLAN services to configure VLAN port configuration on the fly. The drop-down list on the right allows for selecting between showing VLAN memberships as configured by an administrator (Admin) or as configured by one of these internal software modules.
Frame Type Shows the acceptable frame types (All, Taged, Untagged) that a given user wants to configure on the port. The field is empty if not overridden by the selected user. Port VALN ID Shows the Port VLAN ID (PVID) that a given user wants the port to have. The field is empty if not overridden by the selected user. Tx Tag Shows the Tx Tag requirements (Tag All, Tag PVID, Tag UVID, Untag All, Untag PVID, Untag UVID) that a given user has on a port.
Command Descriptions 2.4.77 VCL 2.4.78 MAC-Based VLAN This page shows MAC-based VLAN entries configured by various MAC-based VLAN users. Currently we support following VLAN User types: CLI/Web/SNMP : These are referred to as static. NAS : NAS provides port-based authentication, which involves communications between a Supplicant, Authenticator, and an Authentication Server. Object Description MAC Address Indicates the MAC address. VLAN ID Indicates the VLAN ID.
2.4.79 sFlow This page shows receiver and per-port sFlow statistics. Object Description Receiver Statistics Owner This field shows the current owner of the sFlow configuration. It assumes one of three values as follows: • If sFlow is currently unconfigured/unclaimed, Owner contains . • If sFlow is currently configured through Web or CLI, Owner contains . • If sFlow is currently configured through SNMP, Owner contains a string identifying the sFlow receiver.
Command Descriptions configuration. To diagnose, paste the receiver's IP address/hostname into the Ping Web page (Diagnostics → Ping/Ping6). Flow Samples The total number of flow samples sent to the sFlow receiver. Counter Samples The total number of counter samples sent to the sFlow receiver. Port Statistics Port The port number for which the following statistics applies. Rx and Tx Flow Samples The number of flow samples sent to the sFlow receiver originating from this port.
This page provides a status overview for all of Ring status. Object Description Group Index The group index. This parameter is used for easy identifying which ring group. Mode It indicates whether the group is enabled. Role It indicates group is configured as which role. State When ring is complete, it will show "Normal". When ring is incomplete (at least one link is down), it will show "Fail". Ring Port(s) Describes current status of ring port(s).
Command Descriptions Object Description Port DDMI port. Vendor Indicates Vendor name SFP vendor name. Part Number Indicates Vendor PN Part number provided by SFP vendor. Serial Number Indicates Vendor SN Serial number provided by vendor. Revision Indicates Vendor rev Revision level for part number provided by vendor. Date Code Indicates Date code Vendor's manufacturing date code. Transceiver Indicates Transceiver compatibility. 2.4.
Transceiver Indicates Transceiver compatibility. DDMI Information Current The current value of temperature, voltage, TX bias, TX power, and RX power. High Alarm Threshold The high alarm threshold value of temperature, voltage, TX bias, TX power, and RX power. High Warn Threshold The high warn threshold value of temperature, voltage, TX bias, TX power, and RX power. Low Warn Threshold The low warn threshold value of temperature, voltage, TX bias, TX power, and RX power.
Command Descriptions 2.5 Diagnostics 2.5.1 Ping This page allows you to issue ICMP PING packets to troubleshoot IP connectivity issues. Object IP Address Description The destination IP Address.
Ping Length The payload size of the ICMP packet. Values range from 2 bytes to 1452 bytes. Ping Count The count of the ICMP packet. Values range from 1 time to 60 times. Ping Interval The interval of the ICMP packet. Values range from 0 second to 30 seconds. Egress Interface The VLAN ID (VID) of the specific egress IPv6 interface which ICMP packet goes. (only for IPv6) The given VID ranges from 1 to 4094 and will be effective only when the corresponding IPv6 interface is valid.
Command Descriptions 2.5.2 Ping6 This page allows you to issue ICMPv6 PING packets to troubleshoot IPv6 connectivity issues. Object Description IP Address The destination IP Address. Ping Length The payload size of the ICMP packet. Values range from 2 bytes to 1452 bytes. Ping Count The count of the ICMP packet. Values range from 1 time to 60 times. Ping Interval The interval of the ICMP packet. Values range from 0 second to 30 seconds.
corresponding IPv6 interface is valid. When the egress interface is not given, PING6 finds the best match interface for destination. Do not specify egress interface for loopback address. Do specify egress interface for link-local or multicast address. Buttons Click to start transmitting ICMP packets. Click to re-start diagnostics with PING.
Command Descriptions VeriPHY 2.5.3 Press to run the diagnostics. This will take approximately 5 seconds. If all ports are selected, this can take approximately 15 seconds. When completed, the page refreshes automatically, and you can view the cable diagnostics results in the cable status table. Note that VeriPHY is only accurate for cables of length 7 - 140 meters. 10 and 100 Mbps ports will be linked down while running VeriPHY.
The status of the cable pair. OK - Correctly terminated pair Open - Open pair Short - Shorted pair Short A - Cross-pair short to pair A Short B - Cross-pair short to pair B Short C - Cross-pair short to pair C Short D - Cross-pair short to pair D Cross A - Abnormal cross-pair coupling with pair A Cross B - Abnormal cross-pair coupling with pair B Cross C - Abnormal cross-pair coupling with pair C Cross D - Abnormal cross-pair coupling with pair D Length: The length (in meters) of the cable pair.
Command Descriptions 2.6 Maintenance 2.6.1 Restart Device You can restart the switch on this page. After restart, the switch will boot normally. Buttons Click to restart device. Click to return to the Port State page without restarting.
2.6.2 Factory Default You can reset the configuration of the switch on this page. Only the IP configuration is retained. The new configuration is available immediately, which means that no restart is necessary. Buttons Click to reset the configuration to Factory Defaults. Click to return to the Port State page without resetting the configuration.
Command Descriptions Software 2.6.3 2.6.3.1 Software Upload This page facilitates an update of the firmware controlling the switch. Buttons Go to find the software image and click . After finding the software image, click the button to update firmware. After the software image is uploaded, a page announces that the firmware update is initiated. After about a minute, the firmware is updated and the switch restarts. Warning: While the firmware is being updated, Web access appears to be defunct.
2.6.3.2 Image select This page provides information about the active and alternate (backup) firmware images in the device, and allows you to revert to the alternate image. The web page displays two tables with information about the active and alternate firmware images. Note: 1. In case the active firmware image is the alternate image, only the "Active Image" table is shown. In this case, the Activate Alternate Image button is also disabled. 2.
Command Descriptions Image The flash index name of the firmware image. The name of primary (preferred) image is image, the alternate image is named image.bk. Version The version of the firmware image. Data The date where the firmware was produced. Buttons Click to use the alternate image. This button may be disabled depending on system state. Cancel activating the backup image. Navigates away from this page.
2.6.4 2.6.4.1 Configuration Save startup-config Copy running-config to startup-config, thereby ensuring that the currently active configuration will be used at the next reboot.
Command Descriptions 2.6.4.2 Download It is possible to download any of the files on the switch to the web browser. Select the file and click . Download running-config may take a little while to complete, as the file must be prepared for download.
2.6.4.3 Upload It is possible to upload a file from the web browser to all the files on the switch, except default-config, which is read-only. Select the file to upload, select the destination file on the target, then click . If the destination is running-config, the file will be applied to the switch configuration. This can be done in two ways: - Replace mode: The current configuration is fully replaced with the configuration in the uploaded file.
Command Descriptions 2.6.4.4 Activate It is possible to activate any of the configuration files present on the switch, except for running-config which represents the currently active configuration. Select the file to activate and click . This will initiate the process of completely replacing the existing configuration with that of the selected file.
2.6.4.5 Delete It is possible to delete any of the writable files stored in flash, including startup-config. If this is done and the switch is rebooted without a prior Save operation, this effectively resets the switch to default configuration.