Business Solutions User Manual EGS5212FP | EGS7228P | EGS7228FP | EGS7252FP version 1.
IMPORTANT To install your Switch please refer to the Quick Installation Guide included in the product packaging.
Table of Contents Chapter 1 Product Overview.................................................. 6 Introduction/Package Contents................................................ 7 Technical Specifications.............................................................. 8 Physical Interface.......................................................................... 11 Management Interface............................................................. 14 Connecting the Switch to a Network...............................
- VLAN Settings........................................................................... 71 - Group List..................................................................................... 72 - Router Settings........................................................................ 73 - Jumbo Frame ............................................................................... 74 VLAN................................................................................................ 75 - 802.1Q...............
- Authenticated Host.................................................................. 118 - Radius Server............................................................................ 119 - Access.......................................................................................... 121 - HTTP(S) Settings......................................................................121 - Telnet Settings.......................................................................... 122 - SSH Settings....................
Chapter 1 Product Overview 6
Introduction The EnGenius EGS series Layer 2 Switch is a device specially designed to support Access Points and IP Surveillance cameras, VOIP phones, and other PoE-Capable devices as well as other Ethernet-based networking equipment or computers.The EGS Switch provides simple, yet powerful PoE manageability with features such as: IEEE 802.3af or IEEE 802.3at/af ports, PoE port management, loopback detection, and IGMP snooping.
Technical Specifications Standard: Ports on the front panel Power budget Total PoE Budget SFP Slots Switching Capacity: Forwarding Mode: Flash Memory: SD RAM: MAC Address Table: Jumbo Frame: EGS5212FP EGS7228P EGS7228FP EGS7252FP 10 24 24 48 Ports 1 - 8, output up to 30 Watts per Port 130 Watts Ports 1 - 24, output up to 30 Watts per Port 185 Watts Ports 1 - 24, output up to 30 Watts per Port 370 Watts Ports 1 - 48, output up to30 Watts per Port 740 Watts 2 4 4 4 24 Gbps 56 Gbps 56 Gbps
Ports: MAC Address Table: 8K 10, 24, or 48 10/100/1000 Mbps Ports in the front panel (Depending on model) Jumbo Frame: 9K 2 or 4 100/1000Mbps SFP Ports (Depending on model) LED Indicators 1 RJ 45 Port Device: Power LED x1 PoE Capability: Fault LED x1 Supports IEEE 802.
L2 Features 802.3ad compatible Link Aggregation 802.1D Spanning Tree (STP) 802.1w Rapid Spanning Tree (RSTP) 802.1s Multiple Spanning Tree (MSTP) IGMP Snooping v1/v2/v3 MLD Snooping IGMP Fast Leave Port Trunking Port Mirroring: One to one and many to one VLAN Group Voice VLAN Queue CoS based on 802.1p priority CoS based on physical port CoS based on TOS CoS based on DSCP BootP/DHCP Client Firmware Burn-Proof 802.1X Port-based Access Control 802.
Physical Interface Dimensions Dimensions EGS5212FP Width: 13” EGS7228P 5 Length: 9” 7 8 Height: 1.73” 10 Width: 10.2” Length: 17.32” Height: 1.
Physical Interface Dimensions EGS7228FP Width: 12.2” Length: 17.32” Height: 1.
Dimensions EGS7252FP Width: 17.32” Length: 16.14” 2 3 4 5 6 Height: 1.73” 10 13 11 16 1 7 8 EGS7252FP - Front 9 15 EGS7252FP -Back 14 1 RJ45 Console Port established on the port; Solid Amber Light = A valid 10/100 Mpbs link is established on the port; Solid Green Light = A valid 1000 Mbps link is established on the port. 2 Power LED: Light off = Power off; Solid Light = Power On. 3 Fault LED: Light off = Normal Behavior; Solid Light = Error.
Management Interface The EGS Layer 2 PoE+ Switch features an embedded Web interface for the monitoring and management of your device.
Connecting the Switch to a Network Discovery in a Network with a DHCP Server 5. Open a web browser on your computer. In the address bar of the web browser, enter 192.168.0.239 and click Enter. Use this procedure to setup the Switch within a network that uses DHCP. 6. A login screen will appear. By default, the username is admin and the password is password. Enter the current password of the Switch and then click Login. 1.
Discovery on a Network without a DHCP Server (Example: 192.168.0.10 and the Subnet mask address as 255.255.255.0). This section describes how to set up the EGS Layer 2 Switch in a network without a DHCP server. If your network has no DHCP service, you must assign a static IP address to your Switch in order to log in to the web-based Switch management. 6. Open a web browser on your computer. In the address bar of the web browser, enter 192.168.0.239 and click Enter. 7. A login screen will appear.
Web Access Use this procedure to access the management interface through a Web browser for device configuration. 1. Open a Web browser on your computer and enter the following address (default): http://192.168.0.239. 2. On the login screen, use the following information: Username: admin Password: password To make access to the web-based management interface more secure, it’s highly reccomended that you change the password to something more unique.
Chapter 2 Management 18
System Search Bar The navigation pane at the left of the Web browser interface contains a System tab that enables you to manage your EGS Layer 2 Switch with features under the following main menu options: At the top right corner of the Graphical User Interface (GUI) is the search bar which you can use to find and jump to any of the L2 management features. When you type in a word, all possible results for that word in the navigation pane will appear.
Summary Device Name: FW version: Displays the model name of the Switch Displays the installed firmware version of the Switch. Displays the serial number of the Switch. Serial Number: Base MAC address: Displays the MAC address of the device. Displays the IP address assigned by DHCP IP Address: server. Displays the Gateway of IP interface. Gateway: Displays the amount of time since the most System Uptime: recent device reset. The System Time is displayed in the following format: days, hours, and minutes.
IP Settings IPv4 The IP Setting screen contains fields for assigning IP addresses. IP addresses are either defined as static or are retrieved using the Dynamic Host Configuration Protocol (DHCP). DHCP assigns dynamic IP addresses to devices on a network. DHCP ensures that network devices can have a different IP address every time the device connects to the network. Select whether to you wish to enable Static or DHCP for Auto-Configuration.
Dynamic IP Address (DHCP): Enables the IP address to be configured automatically by the DHCP server. Select this option if you have a DHCP server that can assign the Switch an IP address, subnet mask, default gateway IP address, and a domain name server IP address automatically. Selecting this field disables the IP Address, Subnet mask, and Gateway fields. Allows the entry of an IP address, Static IP Address: subnet mask, and a default gateway for the Switch.
IPv6 IPv6 State: Select whether you wish to enable Auto Configuration, DHCPv6 Client, or Static for the IPv6 address. Auto Configuration: Use this option to set the IPv6 address for the IPv6 network interface in Auto Configuration. The Switch will automatically generate and use a globally-unique IPv6 address based on the network prefix and its Ethernet MAC address. This enables the IP address to be configDHCPv6 Client: ured automatically by the DHCP server.
System Time Current time: Enable SNTP: Displays the current time. Select whether to Enable or Disable the SNTP server. The system time is set via an SNTP sever. Select the difference between Time Zone: Greenwich Mean Time (GMT) and local time. Daylight Savings Time: Select between Recurring or Non-recurring. Daylight Savings Time Offset: Enter the time of Daylight Savings Time Offset. Select the Day, Week, Month, Recurring From: and Hour from the list.
To configure date/time through SNMP: To configure date/time manually: 1. Next to the Enable SNTP, select Enable. 1. Next to the Enable SNTP, select Disable. 2. In the Time Zone Offset list, select by country or by the Coordinated Universal Time (UTC/GMT) time zone in which the Switch is located. 2. In the Manual Time field, use the drop-down boxes to manually select the date and time you wish to set. 3.
Port Settings Displays the port number. Port: Link Status: Indicates whether the link is up or down. Select the speed and the duplex mode of the Mode: Ethernet connection on this port. Use this screen to view and configure Switch port settings. The Port Settings feature lets you change the configuration of the ports on the Switch in order to find the best balance of speed and flow control according to your preferences.
Flow Control: A concentration of traffic on a port decreases port bandwidth and overflows buffer memory causing packet discards and frame losses. Flow Control is used to regulate transmission of signals to match the bandwidth of the receiving port. The Switch uses IEEE802.3x flow control in full duplex mode and backpressure flow control in half duplex mode. IEEE802.
PoE Total Power Budget: Power Budget Consumed Power: Enter the amount of power the Switch can provide to all ports. Shows the total amount of power currently being delivered to all ports. The PoE Management screen contains system PoE information for monitoring the current power usage and assigns the total amount of power the Switch can provide to all of its PoE ports. Ports 1~8, 24, or 48 on the Switch are IEEE802.3at/af compliant ports.
PoE Port Settings The EnGenius Layer 2 PoE+ Switches supports Power over Ethernet (PoE) as defined by the IEEE 802.3af and 802.3at. All ports can support PoE up to 30W. Ports 1-24 can supply about 48 VDC power to Powered Devices (PDs) over standard UTP Ethernet cables. The Switch follows the standard PSE (Power Sourcing Equipment) pinout, whereby power is sent out over pins 1, 2, 3 and 6. Port: Displays the specific port for which PoE parameters are defined.
Class(Auto): Shows the classification of the powered device. The class Status: defines the maximum power that can be provided to the • Delivering Power – The device is enabled to deliver power via the port. powered device. The possible field values are: • Disabled – The device is disabled for delivering power via the port. • Class 0 – The maximum power level at the Power Sourcing. Equipment is 15.4 Watts. • Test Fail – The powered device test has failed.
Apply: Click APPLY to update the the system settings.
EEE Use the EEE Configuration page to configure Energy Efficient Ethernet. Energy Efficient Ethernet (EEE), an Institute of Electrical and Electronics Engineers (IEEE) 802.3az standard, reduces the power consumption of physical layer devices during periods of low link utilization. EEE saves energy by allowing PHY non-essential circuits shut down when there is no traffic. Port: Display the port for which the EEEE setting is displayed. EEE Status: Enable or Disable EEE for the specified port.
L2 Features Link Aggregation A Link Aggregation Group (LAG) optimizes port usage by linking a group of ports together to form a single, logical, higher-bandwidth link. Aggregating ports multiplies the bandwidth and increases port flexibility for the Switch. Link Aggregation is most commonly used to link a bandwidth intensive network device (or devices), such as a server, to the backbone of a network.
When you aggregate ports, the ports and LAG must fulfill the following conditions: •Ports can be configured as LACP ports only if the ports are not part of a previously configured LAG. • All ports within a LAG must be the same media/ format type. LACP is a dynamic protocol which helps to automate the configuration and maintenance of LAG’s.
Port Trunking Group: Port Trunking allows you to assign physical links to one logical link that functions as a single, higher-speed link, providing dramatically increased bandwidth. Use Port Trunking to bundle multiple connections and use the combined bandwidth as if it were a single larger “pipe”. Displays the number of the given trunk group. You can utilize up to 8 link aggregation groups and each group consisting up to 8 ports on the Switch.
LACP Settings Assign a system priority to run with Link Aggregation Control Protocol (LACP) and is become for a backup link if a link goes down. The lowest system priority is allowed to make decisions about which ports it is actively participating in in case a link goes down. If two or more ports have the same LACP port priority, the port with the lowest physical port number will be selected as the backup port.
LACP Timeout Timeout: Select the administrative LACP timeout. • Long – Long timeout value. Link Aggregation Control Protocol (LACP) allows the exchange of information with regard to the link aggregation between two members of aggregation. The LACP Time Out value is measured in a periodic interval. Check first whether the port in the trunk group is up. When the interval expires, it will be removed from the trunk.
Mirror Settings Mirror ID: Mirrors network traffic by forwarding copies of incoming and outgoing packets from specific ports to a monitoring port. The packet that is copied to the monitoring port will be the same format as the original packet. Port: Destination Port: A number identifying the mirror session. This Switch only supports up to 4 mirror sessions. Displays the session ID for port mirroring. Select the port for traffic purposes from source ports mirrored to this port.
NOTE: You cannot mirror a faster port onto a slower port. For example, if you try to mirror the traffic from a 100 Mbps port onto a 10 Mbps port, this can cause throughput problems. The port you are copying frames from should always support an equal or lower speed than the port to which you are sending the copies. Please note a target port and a source port cannot be the same port. Click the Apply button to accept the changes or the Cancel button to discard them.
STP The Spanning Tree Algorithm (STA) can be used to detect and disable network loops, and to provide backup links between Switches. This allows the Switch to interact with other bridging devices in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down. STP provides a tree topology for the Switch.
Global Settings Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on Switches. Spanning Tree Protocol (STP) allows you to ensure that you do not create loops when you have redundant paths in the network. STP provides a single active path between two devices on a network in order to prevents loops from being formed when the Switch is interconnected via multiple paths. STP uses a distributed algorithm to select a bridging device that serves as the root for the spanning tree network.
Spanning Tree Loops Multiple Spanning Tree Protocol (MSTP) defined in IEEE 802.1s, enables multiple VLANs to be mapped to reducethe number of spanning-tree instances needed to support a large number of VLANs. If there is only one VLAN in the network, a single STP works appropriately. Loops occur when alternate routes exist between hosts. Loops in an extended network can cause the Switch to forward traffic indefinitely, resulting in increased traffic and reducing network efficiency.
RSTP on the other hand is much faster than STP. It can complete a convergence in seconds, so it greatly diminishes the possible impact the process can have on your network compared to STP. RSTP reduces the number of state changes before active ports start learning, predefining an alternate route that can be used when a node or port fails and retain the forwarding database for ports insensitive to changes in the tree structure when reconfiguration occurs.
Root Bridge The Root Bridge serves as an administrative point for all Spanning Tree calculations to determine which redundant links to block in order to prevent network loops. From here, you can view all the information regarding the Root Bridge within the STP. All other decisions in a spanning tree network, such as ports being blocked and ports being put in a forwarding mode, are made regarding a root bridge. The root bridge is the “root” of the constructed “tree” within a spanning tree network.
Root Address: Priority: Forward Delay: Maximum Age: Hello Time: Displays the Root Bridge MAC address. Root in Root Bridge refers to the base of the spanning tree, which the Switch could be configured for. Displays the priority for the bridge. When Switches are running STP, each is assigned a priority. After exchanging BPDUs, the Switch with the lowest priority value becomes the root bridge. Displays the Switch Forward Delay Time.
Port Settings Edge Port: STP and RSTP help guard against the formation of loops in an Ethernet network topology. A loop occurs when nodes transmit packets to each other over more than one data path. Packets can become caught in repetitious cycles that needlessly consume network bandwidth which then significantly reduce network performance. With STP, you can set it up on a port per port basis to to further help configure your network topology.
Edge Ports An edge port changes its initial STP port state from a blocking state to a forwarding state immediately without going through listening and learning states right after the port is configured as an edge port or when its link status changes. Edge Ports are not connected to LANs that have span¬ning tree devices, so Edge Ports do not receive Bridge Protocol Data Units (BPDUs). If an Edge Port starts to receive BPDUs, it is no longer considered an edge port to the Switch.
CIST Instance Settings The Common Instance Spanning Tree (CIST) protocol is formed by the spanning-tree algorithm running among bridges that support the IEEE 802.1w, IEEE 802.1s, and IEEE 802.1D standard. A Common and Internal Spanning Tree (CIST) represents the connectivity of the entire network and it is equivalent to a spanning tree in an STP/ RSTP. The CIST inside a Multiple Spanning Tree Instance (MST) region is the same as the CST outside a region.
Enter the information to set up CIST for the Switch: Priority: Maximum Hop: Forward Delay: Maximum Age: Select from the list to specify the priority of the Switch for comparison in the CIST. CIST priority is an important criterion on determining the root bridge. In the same condition, the Switch with the highest priority will be chosen as the root bridge. A lower value has a higher priority. The default value is: 32768 and should be an exact divisor of 4096.
CIST Port Settings MST ID: Port: Priority: Use the CIST Ports Settings page to configure and view STA attributes for interfaces when the spanning tree mode is set to STP or RSTP. You may use a different priority or path cost for ports of the same media type to indicate a preferred path or Edge Port to indicate if the attached device can support fast forwarding or link type to indicate a point-to-point connection or shared-media connection.
Apply: Click APPLY to update the the system settings. Designated Root Bridge: Displays the Root Bridge for the CST. It is comprised using the bridge priority and the base MAC address of the bridge. This is the cost to the CIST regional Internal Root Cost: root in a region. External Root Cost is the cost to the External Root Cost: CIST root. This is the bridge identifier of the Regional Root Bridge: CST Regional Root. It is made up using the bridge priority and the base MAC address of the bridge.
VLANs. MSTP maintains contact with the global network because each instance is treated as an RSTP node in the Common Spanning Tree (CST). MST Instance Settings Multiple Spanning Tree Protocol, or MSTP enables the grouping of multiple VLANs with the same topology requirements into one Multiple Spanning Tree Instance (MSTI). MSTP then builds an Internal Spanning Tree (IST) for the region containing commonly configured MSTP bridges. Instances are not supported in STP or RSTP.
MST ID: VLAN List: Priority: Regional Root Bridge: Internal Root Cost: Designated Bridge: Root Port: Configuration Name: Configuration Reversion: Displays the ID of the MST group that is created. A maximum of 15 groups can be set for the Switch. Enter the VLAN ID range from for the configured VLANs to associate with the MST ID. The VLAN ID number range is from 1 to 4094. Select the bridge priority value for the MST. When Switches or bridges are running STP, each is assigned a priority.
MST Port Settings MST ID: Displays the ID of the MST group that is created. A maximum of 15 groups can be set for the Switch. Displays port or trunked port ID. Port: Select the bridge priority value for Priority: the MST. When Switches or bridges are running STP, each is assigned a priority. After exchanging BPDUs, the Switch with the lowest priority value becomes the root bridge. The bridge priority is a multiple of 4096.
Internal Root Cost: Designated Bridge: Internal Port Cost: Port Role: Port State: Edge Port Oper: P2P MAC Conf: P2P MAC Oper: Port Role: Port State: Port State: Displays the path cost to the designated root for the selected MST instance. Displays the Bridge Identifier of the bridge for the Designated Port. It is made up using the bridge priority and the base MAC address of the bridge.
MAC Address Table The MAC address table contains address information that the Switch uses to forward traffic between the inbound and outbound ports. All MAC addresses in the address table are associated with one or more ports. When the Switch receives traffic on a port, it searches the Ethernet switching table for the MAC address of the destination. If the MAC address is not found, the traffic is flooded out all of the other ports associated with the VLAN.
Dynamic MAC Address Index: Port: The Switch will automatically learn the device’s MAC address and store it to the Dynamic MAC address table. If there is no packet received from the device within the aging time, the Switch adopts an aging mechanism for updating the tables from which MAC address entries will be removed from related network devices. The Dynamic MAC Address Table shows the MAC addresses and their associated VLANs learned on the selected port.
LLDP Link Layer Discovery Protocol (LLDP) is the IEEE 802.1AB standard for Switches to advertise their identity, major capabilities, and neighbors on the 802 LAN. LLDP allows users to views the discovered information to identify system topology and detect faulty configurations on the LAN. LLDP is essentially a neighbor discovery protocol that uses Ethernet connectivity to advertise information to devices on the same LAN and store information about the network.
Global Settings State: Select whether to Enable or Disable the LLDP feature on the Switch. Next, enter the Transmission interval, Holdtime Multiplier, Reinitialization Delay parameter, and the Transmit Delay parameter. When finished, click APPLY to update the the system settings. Transmission Interval: Holdtime Multiplier: Reinitialization Delay: Transmit Delay: 59 Select Enabled or Disabled to activate LLDP for the Switch. Enter the interval at which LLDP advertisement updates are sent.
Local Device Chassis ID Subtype: Chassis ID: Displays the chassis ID type. Displays the chassis ID of the device transmitting the LLDP frame. Displays the administratively assigned System Name: device name. Describes the device. System Description: Capabilities Supported: Describes the device functions. Describes the device functions. Capabilities Enabled: Displays the port ID type.
Remote Device LLDP devices must support chassis and port ID advertisement, as well as the system name, system ID, system description, and system capability advertisements. From here you can viewing detailed LLDP Information for the remote Switch. To scroll, click on the arrow at the top right of the screen. Port: Chassis ID Subtype: Displays the port. Displays the chassis ID type. Chassis ID: Displays the chassis ID of the device that is transmitting the LLDP frame. Displays the port ID type.
Mode: Aggregated links can be set up manually or Click the Apply button to accept the changes or the Cancel button to discard them. automatically. Select Static or LACP for the Link Aggregation type. • Static – The Link Aggregation is configured manually for the specified trunk group. • LACP – The Link Aggregation is configured dynamically for the specified trunk group.
IGMP Snooping can also limit flooding of traffic to IGMP designated ports. This improves network performance by restricting the multicast packets only to Switch ports where host nodes are located. IGMP Snooping significantly reduces overall Multicast traffic passing through your Switch. Without IGMP Snooping, Multicast traffic is treated in the same manner as a Broadcast transmission, which forwards packets to all ports on the network.
Global Settings Status: Click to Enable or Disable the IGMP Snooping feature for the Switch. Next, select whether you wish to use V2 or V3. Finally, select whether you wish to Enable or Disable the Report Suppression feature for the Switch. Version: Report Suppression: Select to Enable or Disable IGMP Snooping on the Switch. The switch snoops all IGMP packets it receives to determine which segments should receive packets directed to the group address when enabled.
VLAN Settings VLAN ID: IGMP Snooping Status: Use the IGMP Snooping VLAN Settings to configure IGMP Snooping settings for VLANs on the system. The Switch performs IGMP Snooping on VLANs that send IGMP packets. You can specify the VLANs that IGMP Snooping should be performed on. Choose from the drop-down box whether to Enable or Disable IGMP Snooping. Next, choose to Enable or Disable Fast Leave for the VLAN ID. Fast Leave: Displays the VLAN ID.
Querier Settings VLAN ID: Querier State: IGMP snooping requires that one central Switch to periodically query all end devices on the network to announce their Multicast memberships and this central device is the IGMP querier. The snooping Switch sends out periodic queries with a time interval equal to the configured querier query interval. The IGMP query keeps the Switch updated with the current multicast group membership information.
Oper Interval: Displays the IGMP Interval of the operational querier. Enter the maximum response Max Response time used in the queries that are Interval: sent by the snooping querier. The default is 10 seconds. Display the maximum response Oper Max Response time which used in the queries Interval: that are sent by the snooping querier. Last Member Query Counter: Enter the number of the operational last member querier.
Group List The Group List displays VLAN ID, Group IP Address, and Members Port in the IGMP Snooping List.
Router Settings Displays the VLAN ID. VLAN ID: Router Ports Auto-Learned: The Switch will auto detect the prescence of a multicast router and forward IGMP pacets accordingly. Displays router ports that have Dynamic Port List: been dynamically configured. Designates a range of ports as being Forbidden Port List: disconnected to multicast-enabled routers. Ensures that the forbidden router port will not propagate routing packets out.
MLD Snooping Global Settings Multicast Listener Discovery (MLD) Snooping operates on the IPv6 traffic level for discovering multicast listeners on a directly attached port and performs a similar function to IGMP Snooping for IPv4. MLD snooping allows the Switch to examine MLD packets and make forwarding decisions based on content. MLD Snooping limits IPv6 multicast traffic by dynamically configuring the Switch port so that multicast traffic is forwarded only to those ports that wish to receive it.
VLAN Settings Fast Leave can improve bandwidth usage for a network which frequently experiences many MLD host add and leave requests. If the Fast Leave feature is not used, a multicast querier will send a GS-query message when an MLD group leave message is received. The querier stops forwarding traffic for that group only if no host replies to the query within the specified timeout period. If Fast Leave is enabled, the Switch assumes that only one host is connected to the port.
Group List The Group List displays VLAN ID, IPv6 Address, and Members Port in the MLD Snooping List.
Router Settings VLAN ID: Router Ports Auto-Learned: The Router Settings feature shows the learned multicast router attached port if the port is active and a member of the VLAN. Select the VLAN ID you would like to configure and enter the Static and Forbidden ports for the specified VLAN IDs that are utilizing MLD Snooping. All MLD packets snooped by the Switch will be forwarded to the multicast router reachable from the port.
Jumbo Frame Jumbo Frame: Ethernet has used the 1500 byte frame size since its inception. Jumbo frames are network-layer PDUs that have a size much larger than the typical 1500 byte Ethernet Maximum Transmission Unit (MTU) size. Jumbo frames extend Ethernet to 9000 bytes, making them large enough to carry an 8 KB application datagram plus packet header overhead. If you intend to leave the local area network at high speeds, the dynamics of TCP will require you to use large frame sizes.
VLAN 802.1Q A Virtual LAN (VLAN) is a group of ports that form a logical Ethernet segment on a Layer 2 Switch which provides better administration, security, and management of multicast traffic. A VLAN is a network topology configured according to a logical scheme rather than a physical layout. When you use a VLAN, users can be grouped by logical function instead of physical location.
Enabled: VID: Name: Tagged Port: Untagged Port: Enables 802.1Q VLANs. This feature is enabled by default. Displays the VLAN ID for which the network policy is defined. The range of the VLAN ID is from 1-494. Enter the VLAN name. You can use up to 32 alphanumeric characters. Frames transmitted from this port are tagged with the VLAN ID. Frames transmitted from this port are untagged. Important: Port-based VLAN and 802.1Q VLAN are mutually exclusive. If you enable port-based VLAN, then 802.
5. Click the Untagged Ports text box to show the untagged ports dialog box. Adding, Editing, and Deleting Items in the List 6. Click a radio button in the Untagged Ports row to select a port. To add an item to the 802.1Q list, follow these steps: 1. Click the Add button . 2. Enter the VID and name in the the VID and Name text boxes. 7. Click Confirm to accept the changes or Cancel to discard them. 3. Click the Tagged Ports text box to show the tagged ports dialog box. 4.
PVID When an Untagged packet enters a Switch port, the PVID (Port VLAN ID) will be attached to the untagged packet and forward frames to a VLAN specified VID part of the PVID. A packet received on a given port would be assigned that port’s PVID and then be forwarded to the port that corresponded to the packet’s destination address. If the PVID of the port that received the packet is different from the PVID of the port that is to transmit the packet, the Switch will drop the packet.
Port: PVID: Accept Type: Displays the VLAN ID to which the PVID tag is assigned. Configure the PVID to assign untagged or tagged frames received on the selected port. Enter the PVID value. The range is from 1-4094. Select Tagged Only and Untagged Only from the list. • Tagged Only: The port discards any untagged frames it’s receives. The port only accepts tagged frames. • Untagged Only: Only untagged frames received on the port are accepted.
Management VLAN Management VLAN ID: The Management VLAN allows users to transfer the authority of the Switch from the default VLAN to other VLAN IDs. By default, the active management VLAN ID is 1, which allows an IP connection to be established through any port. When the management VLAN is set to a different VLAN, connectivity through the existing management VLAN is lost and an IP connection can be made only through a port that is part of the management VLAN.
Voice VLAN Voice VLAN State: Select Enabled or Disabled for Voice VLAN on the Switch. Sets the Voice VLAN ID for the network. Voice VLAN ID: Only one Voice VLAN is supported on the Switch. Enable this function to have outgoing voice 802.1p Remark: traffic to be marked with the selected CoS value. Remark CoS/802.1p: Defines a service priority for traffic on the Voice VLAN. The priority of any received VoIP packet is overwritten with the new priority when the Voice VLAN feature is active on a port.
OUI Settings Port: The Switches determines whether a received packet is a voice packet by checking its source MAC address. VoIP traffic has a preconfigured Organizationally Unique Identifiers (OUI) prefix in the source MAC address. You can manually add specific manufacturer’s MAC addresses and description to the OUI table. All traffic received on the Voice VLAN ports from the specific IP phone with a listed OUI is forwarded on the voice VLAN.
Port Settings Port: Enhance VoIP service by configuring ports to carry IP voice traffic from IP phones on a specific VLAN. Voice VLAN provides QoS to VoIP, ensuring that the quality of voice does not deteriorate if the IP traffic is received unevenly. State: CoS Mode: Src: All: Operate Status: Displays the port to which the Voice VLAN settings are applied. Select Enabled to enhance VoIP quality on the selected port. The default is Disabled. Select Src or All from the list.
Management System Name: System Information System Location: The System Information screen contains general device information including the system name, system location, and system contact for the Switch. System Contact: Enter the name you wish to use to identify the Switch. You can use up to 32 alphanumeric characters. The factory default name is the name of the Swicth. Enter the location of the Switch. You can use up to 32 alphanumeric characters. The factory default is: Default Location.
User Management User Name: Use the User Management page to control management access to the Switch based on manually configured user names and passwords. A User account can only view settings without the right to configure the Switch, and an Admin account can configure all the functions of the Switch. Click the Add button to add an account or the Edit button to edit an existing account. Password Type: Password: Password Retype: Privilege Type: Enter a username.
File Management Configuration Manager The File Management feature is used for saving your current configuration to a file on your computer or a TFTP server, or to restore previously saved configuration settings to the Switch using a configuration file from your local drive or TFTP server. Upgrade Backup First, upload the configuration file from a TFTP server to the Switch. Next, upload the configuration file from your local drive to the Switch by using an HTTP session.
Dual Image Active: Flash Partition: Status: The Switch maintains two versions of the Switch image in its permanent storage. One image is the active image, and the second image is the backup image. The Dual Image screen enables the user to select which partition will be set as active after the next reset. The Switch boots and runs from the active image. If the active image is corrupt, the system automatically boots from the nonactive image.
SNMP The manager is the console through which network administrators perform network management functions. Simple Network Management Protocol (SNMP) is an Application Layer protocol designed specifically for managing and monitoring network devices. Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting information from and configuring network devices such as; servers, printers, hubs, Switches, and routers on an Internet Protocol (IP) network.
In SNMPv3, User-based Security Model (USM) authentication is implemented along with encryption, allowing you to configure a secure SNMP environment. The SNMPv3 protocol uses different terminology than SNMPv1 and SNMPv2c as well. In the SNMPv1 and SNMPv2c protocols, the terms agent and manager are used. In the SNMPv3 protocol, agents and managers are renamed to entities.
Global Settings SNMP State: Simple Network Management Protocol (SNMP) is an OSI Layer 7 (Application Layer) protocol designed specifically for managing and monitoring network devices. The SNMP agents maintain a list of variables that are used to manage the device. The variables are defined in the Management Information Base (MIB), which provides a standard presentation of the information controlled by the on-board SNMP agent. Local Engine ID (10-64 Characters): Enables or Disables the SMNP function.
View List View Name: Enter the view name. The view name can contain up to 30 alphanumeric characters. Enter the Object Identifier (OID) Subtree. The Subtree OID: OID identifies an object tree (MIB tree) that will be included or excluded from access by an SNMP manager. Note that the first character must be a period (.). Wild cards can be used to mask a specific portion of the OID string using a period (.). Subtree Mask: Select 0 or 1 for Subtree mask.
Group List Group Name: Security Mode: Configure SNMP Groups to control network access on the Switch by providing users in various groups with different management rights via the Read View, Write View, and Notify View options. Security Level: Read View: Write View: Notify View: Enter the group name that access control rules are applied to. The group name can contain up to 30 alphanumeric characters. Selects the SNMP version (v1, v2c, v3) associated with the group.
Community List Community Name: In SNMPv1 and SNMPv2c, user authentication is accomplished using types of passwords called Community Strings, which are transmitted in clear text and not supported by authentication. It is important to note that the community name can limit access to the SNMP agent from the SNMP network management station, functioning as a password. Community Mode: Group Name: View Name: Access Rights: Click Add to add a community list to the Switch.
User List Privilege Mode: Use the User List page to create SNMP users for authentication with managers using SNMP v3 to associate them to SNMP groups. Click Add to add a new user. Authentication Protocol: Authentication Password: Encryption Protocol: Encryption Key: Click the Apply button Cancel button 94 Select No Auth, Auth, or Priv security level from the list. • No auth – Neither authentication nor the privacy security levels are assigned to the group.
Trap Settings SNMP Traps A trap is a type of SNMP message. The Switch can send traps to an SNMP manager when an event occurs. You can restrict user privileges by specifying which por¬tions of the MIBs that a user can view. In this way, you restrict which MIBs a user can display and modify for better security. In addition, you can restrict the types of traps users can send as well. You can do this by determining where messages are sent and what types of messages can be sent per user.
Server IP/Hostname: SNMP Version: Notify Type: Community Name: UDP: Enter the Server IP or Hostname. The Hostname can contain up to 128 alphanumeric characters. Select the SNMP version from the list. Select the type of notification to be sent. • Traps – Traps are sent. • Informs – Informs are sent ONLY when v2c is enabled. Note: The recipient of a trap message does not send a response to the Switch.
ACL match the source MAC and source IP address on a specific port. ACLs are composed of Access Control Entries (ACEs), which are rules that determine traffic classifications. Each ACE is a considered as a single rule, and up to 256 rules may be defined on each ACL, with up to 3000 rules globally. ACLs are used to provide traffic flow control, restrict contents of routing updates, and determine which types of traffic are forwarded or blocked.
MAC ACL This page displays the currently-defined MAC-based ACLs profiles. To add a new ACL, click Add and enter the name of the new ACL. Index: Name: Profile identifier. Enter the MAC based ACL name. You can use up to 32 alphanumeric characters. Click the Apply button Cancel button 98 to accept the changes or the to discard them.
Mac-Based ACE Destination MAC Value: Destination MAC Wildcard Mask: Use this page to view and add rules to MAC-based ACLs. Source MAC Value: Source MAC Wildcard Mask: VLAN ID: 802.1p Value: ACL Name: Sequence: Action: Ethertype Value: Select the ACL from the list. Enter the sequence number which signifies the order of the specified ACL relative to other ACLs assigned to the selected interface. The valid range is from 1-2147483646, 1 being processed first.
IPv4 ACL This page displays the currently-defined IPv4-based ACLs profiles. To add a new ACL, click Add and enter the name of the new ACL. Index: Name: Displays the current number of ACLs. Enter the IP based ACL name. You can use up to 32 alphanumeric characters. Click the Apply button Cancel button 100 to accept the changes or the to discard them.
Action: IPv4-Based ACE Select what action to take if a packet matches the criteria. • Permit – Forwards packets that meet the ACL criteria. Use this page to view and add rules to IPv4-based ACLs. Protocol: • Deny– Drops packets that meet the ACL criteria. Select Any, Protocol ID, or Select from a List in the drop down menu. • Any - Check Any to use any protocol. • Protocol ID – Enter the protocol in the ACE to which the packet is matched.
• OSPF — The Open Shortest Path First (OSPF) protocol is a link-state hierarchical interior gateway protocol (IGP) for network routing Layer Two (2) Tunneling Protocols. It is an an extension to the PPP protocol that enables ISPs to operate Virtual Private Networks (VPNs). • EGP — Exterior Gateway Protocol (EGP). Permits exchanging routing information between two neighboring gateway hosts in an autonomous systems network. • PIM — Matches the packet to Protocol Independent Multicast (PIM).
IPv6 ACL This page displays the currently-defined IPv6-based ACLs profiles. To add a new ACL, click Add and enter the name of the new ACL. Index: Name: Displays the current number of ACLs. Enter the IPv6 based ACL name. You can use up to 32 alphanumeric characters. Click the Apply button Cancel button 103 to accept the changes or the to discard them.
IPv6 Based ACE ACL Name: Sequence: Allows IPv6 Based Access Control Entry (ACE) to be defined within a configured ACL. Action: Protocol: Destination IP Address Value: Destination IP Wildcard Mask: Source IP Address Value: Source IP Wildcard Mask: 104 Select the ACL from the list. Enter the sequence number which signifies the order of the specified ACL relative to other ACLs assigned to the selected interface. The valid range is from 1-2147483646, 1 being processed first.
VLAN ID: 802.1p Value: Ethertype Value: ICMP: Enter the VLAN ID to which the IP address is attached in IPv4-Based ACE. The range is from 1-4094. Enter the 802.1p value. The range is from from 0-7. Enter the Ethertype value. The range is from 05DD-FFFF. Select Any, Protocol ID, or Select from List from drop down menu. Click Apply to save the changes to the system. • Protocol ID – Enter the protocol in the ACE to which the packet is matched. The range is from 0-255.
ACL Binding When an ACL is bound to an interface, all the rules that have been defined for the ACL are applied to that interface. Whenever an ACL is assigned on a port or LAG, flows from that ingress or egress interface that do not match the ACL, are matched to the default rule of dropping unmatched packets. To bind an ACL to an interface, simply select an interface and select the ACL(s) you wish to bind. Port: MAC ACL: IPv4 ACL: IPv6 ACL: Select the port for which the ACLs are bound to.
QoS Global Settings Quality of Service (QoS) provides the ability to implement priority queuing within a network. QoS is a means of providing consistent and predictable data delivery to the Switch by distinguishing between packets that have stricter timing requirements from those that are more tolerant of delays. QoS enables traffic to be prioritized while avoiding excessive broadcast and multicast traffic.
State: Scheduling Method: Select whether QoS is enabled or disabled on the switch. Selects the Strict Priority or WRR to specify the traffic scheduling method. • Strict Priority – Specifies traffic scheduling based strictly on the queue priority. Trust Mode: • WRR – Use the Weighted Round-Robin (WRR) algorithm to handle packets in priority classes of service. It assigns WRR weights to queues. Select which packet fields to use for classifying packets entering the Switch.
CoS Mapping CoS (Class of Service): Displays the CoS priority tag values, where 0 is the lowest and 7 is the highest. Check the CoS priority tag box and select Queue: the Queue values for each CoS value in the provided fields. Eight traffic priority queues are supported and the field values are from 1-8, where one is the lowest priority and eight is the highest priority. Use the Class of Service (CoS) Mapping feature to specify which internal traffic class to map to the corresponding CoS value.
DSCP Mapping DSCP (Differentiated Services Code Point): Use Differentiated Services Code Point (DSCP) Mapping feature to specify which internal traffic class to map to the corresponding DSCP values. DSCP Mapping increases the number of definable priority levels by reallocating bits of an IP packet for prioritization purposes. Queue: Displays the packet’s DSCPvalues, where 0 is the lowest and 10 is the highest.
Port Settings Port: Displays the ports for which the CoS parameters are defined. CoS (Class of Service) Select the CoS priority tag values, where 0 is the lowest and 7 is the highValue: est. Trust: Select Enable to trust any CoS packet marking at ingress and select Disable to not trust any CoS packet marking at ingress. From here, you can configure the QoS port settings for the Switch. Select a port you wish to set and choose a CoS value from the drop-down box.
Bandwidth Control Port: Ingress: The Bandwidth Control feature allows users to define the bandwidth settings for a specified port’s Ingress Rate Limit and Egress Rate. Ingress Rate: Egress: Egress Rate: Displays the ports for which the bandwidth settings are displayed. Select to Enable or Disable ingress on the interface. Enter the ingress rate in kilobits per second. The Gigabit Ethernet ports have a maximum speed of 1000000 kilobits per second.
Storm Control Port: Status: Storm Control limits the amount of Broadcast, Unknown Multicast, and Unknown Unicast frames accepted and forwarded by the Switch. Storm Control can be enabled per port by defining the packet type and the rate that the packets are transmitted at. The Switch measures the incoming Broadcast, Unknown Multicast, and Unknown Unicast frames rates separately on each port, and discards the frames when the rate exceeds a user-defined rate.
Security 802.1X The IEEE 802.1X standard authentication uses the Radius (Remote Authentication Dial In User Service) protocol to validate users and provide a security standard for network access control. The user that wishes to be authenticated is called a supplicant. The actual server doing the authentication, typically a Radius server, is called the authentication server. The mediating device, such as a Switch, is called the authenticator.
Global Settings When a supplicant is connected to a Switch port, the port issues an 802.1X authentication request to the attached the 802.1X supplicant. The supplicant replies with the given username and password and an authentication request is then passed to a configured Radius server. The authentication server’s user database supports Extended Authentication Protocol (EAP), which allows particular guest VLAN memberships to be defined based on each individual user.
Port Settings Port: The IEEE-802.1X port-based authentication provides a security standard for network access control with Radius servers and holds a network port disconnected until authentication is completed. With 802.1X port-based authentication, the supplicant provides the required credentials, such as user name, password, or digital certificate to the authenticator, and the authenticator forwards the credentials to the authentication server for verification to the guest VLAN.
Apply: Click Apply to update the system settings.
Authenticated Host The Authenticated Host section displays the authenticated User Name, Port, Session Time, Authenticated Method, and Mac Address.
Radius Server Radius proxy servers are used for centralized administration. Remote Authentication Dial In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users that connect and use a network service for greater convenience. Radius is a server protocol that runs in the application layer, using UDP as transport.
Index: Server IP: Authorized Port: Accounting Port: Key String: Timeout Reply: Retry: Server Priority: Dead Timeout: Displays the index for which RADIUS Server is displayed. Enter the Radius Server IP address. Enter the authorized port number. The default port is 1812. Enter the name you wish to use to identify this Switch. Enter the Key String used for encrypting all Radius communication between the device and the Radius server.
Access Http(s) Settings The EnGenius Layer 2 PoE+ Switch provides a built-in browser interface that enables you to configure and manage the Switch via Hypertext Transfer Protocol (Http) and Hypertext Transfer Protocol Secure (Https) requests selectivly to help prevent security breaches on the network. You can manage your HTTP and HHTPs settings for the Switch further by choosing the length of session timeouts for HTTP and HTTPs requests.
Telnet Settings Telnet Service: From here, you can configure and manage the Switch’s Telnet protocol settings. The Telnet protocol is a standard internet protocol which enables terminals and applications to interface over the Internet with remote hosts by providing Command Line Interface (CLI) communication using a virtual terminal connection. This protocol provides the basic rules for making it possible to link a client to a command interpreter. The Telnet service for the Switch is enabled by default.
SSH Settings SSH Service: Select whether SSH is Enabled or Disabled. This is disabled by default. Session Timeout: Enter the amount of time that elapses before the SSH Service is timed out. The default is 5 minutes. The range is from 0-65535 minutes. Enter the entry number for History of SSH History Count: Service. The default is 128. The range is from 0-256. Password Retry Enter the number of password request sent to the SSH Service. The default is 3. The Count: range is from 0-120.
Console Settings Session Timeout: Enter the amount of time that elapses before Console Service is timed out. The default is 5 minutes. The range is from 0-65535 minutes. Enter the entry number for History of History Count: Console Service. The default is 128. The range is from 0-256. Password Retry Enter the number of password requests to Count: send to the Console Service. The default is 3. The range is from 0-120. Enter the silent time for Console Service. Silent Time: The range is from 0-65535 seconds.
Port Security Max MAC Address: Network security can be increased by limiting access on a specific port to users with specific MAC addresses. Port Security prevents unauthorized device to the Switch prior to stopping auto-learning processing. Port: State: Enter the maximum number of MAC Addresses that can be learned on the port. The range is from 1-256. Displays the port for which the port security is defined. Select Enabled or Disabled for the port security feature for the selected port.
DoS DMAC = SMAC: Land: UDP Blat: TCP Blat: DoS (Denial of Service) is used for classifying and blocking specific types of DoS attacks. From here, you can configure the Switch to monitor and block different types of attacks: POD: Select Enabled or Disabled from the list. Select Enabled or Disabled from the list. Select Enabled or Disabled from the list. Select the Enabled or Disabled from the list. Select the Enabled or Disable from the list. Enter the minimal size.
DMAC = SMAC: Land: UDP Blat: TCP Blat: POD: Fragment Minimal Size: IPv6 Min Fragment: Bytes: Select Enabled or Disabled from the list. Select Enabled or Disabled from the list. Select Enabled or Disabled from the list. Select the Enabled or Disabled from the list. Select the Enabled or Disable from the list. Enter the minimal size. ICMP Fragment: Select Enabled or Disabled from the list. Enter the size of IPv6 packets. The range is from 0-65535. Select Enabled or Disabled from the list.
Port Settings From here you can configure the Port Settings for DoS for the Switch. Select from the drop down list whether you wish to Enable or Disable DoS Protection for the SWitch. Port: Displays the port for which the DoS protection is defined. DoS Protection: Select Enabled or Disabled for the DoS Protection feature for the selected port. Click Apply to save the changes to the system.
Monitoring Port: RXByte: Port Statistics RXUcast: The Port Statistics section displays a summary of all port traffic statistics regarding the monitoring features on the Switch. RXNUcast: RXDiscard: TXByte: TXUcast: TXNUcast: TXDiscard: RXMcast: RXBcast: TXMcast: TXBcast: 129 Displays the port for which statistics are displayed. Displays the number of all packets received on the port. Displays the number of Unicast packets received on the port.
RMON Index: Event Type: Enter the entry number for Event. Select the event type. • Log – The event is a log entry. • SNMP Trap – The event is a trap. • Log & Trap – The event is both a log entry and a trap. Enter the community to which the event belCommunity: ogs. Displays the number of good broadcast packDescription: ets received on the interface. Last Time Sent: Displays the time that event occurred. Owner: Enter the switch that defined the event.
Event Log Table: Event Log Table From here, you can view specific Event logs for the Switch. Choose an Event log you wish to view fromt he drop-down list. Select the index of the Event Log from the list. Click the Apply button to accept the changes or the Cancel button to discard them.
Alarm List Index: Enter the entry number for the History Log Table. Sample Port: Select the port from which the alarm samples were taken. Sample Variable: Select the variable of samples for the specified alarm sample. Sample Interval: Enter the alarm interval time. Select the sampling method for the selected Sample Type: variable and comparing the value against the thresholds. • Absolute – Compares the values with the thresholds at the end of the sampling interval.
History List Index: Enter the entry number for the History Log Table. Select the port from which the history samSample Port: ples were taken. Bucket Requested: Enter the number of samples to be saved. The range is from 1- 50. Enter the time that samples are taken from Interval: the ports. The field range is from 1-3600. Enter the RMON user that requested the Owner: RMON information. The range is from 0-32 characters.
History Log Table History Log Table: From here, you can view the History Index for History Logs on the Switch. Select a History Index to view from the drop-down box. 134 Select the index for the History Log from the list.
Statistics Broadcast Pkts: Displays the number of good broadcast packets received on the port. This number does not include Multicast packets. Displays the number of good Multicast Multicast Pkts: packets received on the port. CRC & Align Errors: Displays the number of CRC and Align errors that have occurred on the port. Displays the number of undersized packets Undersize Pkts: (less than 64 octets) received on the port.
Log The Syslog Protocol allows devices to send event notification messages in response to events, faults, or errors occurring on the platform as well as changes in configuration or other occurrences across an IP network to syslog servers. It then collects the event messages, providing powerful support for users to monitor network operation and diagnose malfunctions. A Syslog-enabled device can generate a syslog message and send it to a Syslog server. Syslog is defined in RFC 3164.
Global Settings From here, you can Enable or Disable the Log settings for the Switch. Logging Service: Global Logs: Use the radio buttons to enable or disable the system log. Select whether to Enable or Disable the Switch’s global logs for Cache, File, and Server Log. Apply: Click APPLY to update the system settings.
Local Logging: Target: From here, you can discover the paths that a packet takes to a destination. EMERG: The Switch supports log output to two directions: Flash and RAM. The information stored in the system’s Flash log will be lost after the Switch is rebooted or powered off, whereas the information stored in the system’s RAM will be kept effective even if the Switch is rebooted or powered off.
Click the Apply button to accept the changes or the Cancel button to discard them.
Remote Logging: IP/Hostname: From here, you can discover the paths that a packet takes to a destination. Remote logging enables the Switch to send system logs to the Log Server. The Log Server helps to centralize system logs from various devices such as Access Points so that the user can monitor and manage the whole network. Click the Add button and select the severity level of events you wish to log.
Log Table: No.: From here, users can view and delete the history log. Select the Log Target you wish to view from the dropdown box. Timestamp: Category: Severity: Message: A counter incremented whenever an entry to the Switch’s history log is made. It displays the last entry (highest sequence number) first. Displays the time of the log entry. Displays the category of the history log entry. for example, If the name of a VLAN group is changed, the category will display “VLAN”.
Diagnostics Port: Cable Diagnostics Select the port to which the cable is connected. Pair (A, B, C, and D): Displays the cable test results. • Open – A cable is not connected to the port. • OK – A cable is connected to the port. Cable Length (A, B, Displays the approximate cable length. C, and D): Cable Diagnostics helps you to detect whether your cable has connectivity problems provides information about where errors have occurred in the cable.
Ping Test Ping Test Settings The Packet INternet Groper (Ping)Test allows you to verify connectivity to remote hosts. The Ping test operates by sending Internet Control Message Protocol (ICMP) request packets to the tested host and waits for an ICMP response. In the process it measures the time from transmission to reception and records any packet loss.Send a ping request to a specified IPv4 address. Check whether the Switch can communicate with a particular network host before testing.
IPv6 Ping Test Send a ping request to a specified IPv6 address. Check whether the Switch can communicate with a particular network host before testing. You can vary the test parameters by entering the data in the appropraite boxes. To verify accuracy of the test, it is reccomended that you run multiple tests in case of a test fault or user error. IP address: Enter the IPv6 address or the host name of the station you want the Switch to ping to. Enter the number of pings to send.
Trace Route The traceroute feature is used to discover the routes that packets take when traveling to their destination. It will list all the routers it passes through until it reaches its destination, or fails to reach the destination and is discarded. In testing, it will tell you how long each hop from router to router takes via the trip time of the packets it sends and receives from each successive host in the route.
Chapter 3 Maintenance 146
Maintenance Maintenance functions are available from the maintenance bar. Maintenance functions include: saving configuration settings, upgrading firmware, resetting the configuration to factory default standards, rebooting the device, and logging out of the interface. Saving Configurations Important: You must save any setting changes before rebooting. Failure to save results in loss of new configuration changes.
Upgrading Resetting WARNING! Backup your configuration information before upgrading to prevent loss of settings information. WARNING! The Reset function will delete all configuration information from the current device. Backup your information before starting this procedure. Follow this procedure to upgrade the Firmware. 1. Click Follow this procedure to reset the Switch back to factory default settings. to start upgrading. 1. Click Choose File.
Rebooting Logging Out Follow this procedure to reboot the Switch. Follow this procedure to log out the current profile from the user interface. 1. Click to start the reboot process. 2. When a prompt displays, click OK to confirm the reboot process or Cancel to quit the procedure. 1. Click to log out of the menu. 2. When a prompt shows, click OK to confirm logging out or Cancel to quit the procedure.
Appendix 150
Quick Reference Guide Hardware Specifications Model Connectors PoE Features Power Supply Environent Dimensions Gigabit RJ45 Ports Gigabit SFP Ports Console Port Standard PoE Ports Total PoE Budget EGS5212FP 10 2 1 EGS7228P 24 EGS7228FP 24 EGS7252FP 48 4 4 4 1 1 1 IEEE802.
Appendix A Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix B - IC Interference Statement Industry Canada Statement This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Ce dispositif est conforme à la norme CNR-210 d’Industrie Canada applicable aux appareils radio exempts de licence.
Appendix C - CE Interference Statement Europe – EU Declaration of Conformity This device complies with the essential requirements of the R&TTE Directive 1999/5/EC.
This device is a 5GHz wideband transmission system (transceiver), intended for use in all EU member states and EFTA countries, except in France and Italy where restrictive use applies. In Italy the end-user should apply for a license at the national spectrum authorities in order to obtain authorization to use the device for setting up outdoor radio links and/or for supplying public access to telecommunications and/or network services.
Français [French] Par la présente [nom du fabricant] déclare que l’appareil [type d’appareil] est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE. Italiano [Italian] Con la presente [nome del costruttore] dichiara che questo [tipo di apparecchio] è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE.