GE Security GE-DS-82 and 82-PoE Ethernet Managed Switch User Manual P/N 1069182 • REV 1.
Copyright © 2010 GE Security, Inc. This document may not be copied in whole or in part or otherwise reproduced without prior written consent from GE Security, Inc., except where specifically permitted under US and international copyright law. Disclaimer The information in this document is subject to change without notice. GE Security, Inc.
Content Chapter 1 Introduction 1 Package Contents 2 Product Description 2 Product Features 4 Product Specifications 7 Chapter 2 Installation 11 Hardware Description 11 Switch Installation 16 Chapter 3 Switch Management 23 Requirements 23 Management Access Overview 24 Web Browser Management 25 SNMP-Based Network Management 28 The Administration Console 28 Direct Access 29 Protocols 30 Chapter 4 Web-Based Management 33 About Web-based Management 33 Logging on to the Switch 35 Main Web Page 36 Main Menu 37 Sys
Commands Level 143 Chapter 6 Command Line Interface 145 Operation Notice 145 System Commands 146 Switch Static Configuration 147 Trunk Configuration 152 VLAN Configuration 155 Misc Configuration 165 Administration Configuration 167 MAC limit 172 Port Mirroring Configuration 173 Quality of Service 174 MAC Address Configuration 177 STP/RSTP Commands 179 SNMP 184 IGMP 188 802.
Chapter 1 Introduction The GE Security GE-DS-82 and GE-DS-82-PoE are Ethernet Managed Switches with 8 10/100Mbps ports and 2 Gigabit TP/SFP fiber optical combo connective ability with robust layer 2 features.
Chapter 1: Introduction Package Contents Open the Managed Switch box and carefully unpack it. The box should contain the following items: The Managed Switch x1 User’s manual CD x1 Installation Sheet x1 19” Rack mount accessory kit x1 Power cord x1 Rubber feet X4 RS-232 cable x1 If any of these items are missing or damaged, please contact your dealer immediately.
Chapter 1: Introduction Cost-effective solution with SNMP monitor for Network deployment Not only catering to the needs of easy WEB-based management but also the centralized SNMP application to monitor the status of Switch and traffic per port, GE Security releases the cost-effective Managed Switch. The key features are listed below: • WEB / SSL / Telnet / Console management • 802.1Q / Q-in-Q VLAN • Rapid Spanning Tree • IGMP Snooping • 802.
Chapter 1: Introduction Power over Ethernet of GE-DS-82-PoE The PoE in-line power following the standard IEEE 802.3af makes the GE-DS-82-PoE able to power 8 PoE devices at a distance of up to 100 meters through the 4-pair Cat 5/5e UTP wire.
Chapter 1: Introduction GE-DS-82-PoE • 8-Port 10/100Base-TX RJ-45 with PoE Injector • 2 10/100/1000T TP combo interfaces • 2 mini-GBIC/SFP slots, shared with Port-9 and Port-10 • Reset button for system management • 1 RS-232 male DB9 console interface for basic Switch management and setup Layer 2 Features • Prevents packet loss Flow Control: • IEEE 802.
Chapter 1: Introduction • IEEE 802.1p Class of Service • IP TOS / DSCP code priority • Port Base priority • Strict priority and weighted round robin (WRR) CoS policies • Ingress/Egress Bandwidth control on each port Multicast • IGMP Snooping v1 and v2 • IGMP Snooping v2 fast leave • IGMP Query mode for Multicast Media application Security • IEEE 802.
Chapter 1: Introduction Power over Ethernet (GE-DS-82-PoE Only) • Complies with IEEE 802.3af Power over Ethernet End-Span PSE • Up to 8 IEEE 802.3af devices can be powered • Supports PoE Power up to 15.
Chapter 1: Introduction Maximum Frame Size Flow Control 9K Bytes Back pressure for Half-Duplex IEEE 802.3x Pause Frame for Full-Duplex Power Power Link/Activity (Green) Link/Activity (Green) 10/100 LNK / ACT (Green) PoE In-Use (Amber) 1000 LNK / ACT (Green) 1000 LNK / ACT (Green) 10/100 LNK / ACT (Green) 10/100 LNK / ACT (Green) 13” x 6.10” x 1.71” / 330 x 155 x 43.5mm 13” x 6.10” x 1.71” / 330 x 155 x 43.5mm 330 1U height 1U height Weight 2.8 lbs / 1.2kg 3.49 lbs / 1.
Chapter 1: Introduction Static Port Trunk Link Aggregation IEEE 802.3ad LACP (Link Aggregation Control Protocol) Supports 13 groups of 8-Port trunk support 4 priority queue Traffic classification based on: Quality of Service IGMP Snooping Bandwidth Control Port Mirror • Port-Based priority • 802.1p priority, • IP DSCP/TOS field in IP Packet v1 and v2 256 multicast groups and IGMP query Per port Ingress / Egress bandwidth control in steps of128Kbps RX / TX / Both 1 to 1 monitor 802.
Chapter 1: Introduction Power Pin Assignment - 1/2(+), 3/6(-) PoE Power Budget - 180 Watts Max. number of Class2 PD 8 Max. number of Class 3 PD - 8 Standards Conformance Safety FCC Part 15 Class A, CE IEEE 802.3 10Base-T IEEE 802.3u 100Base-TX/100BASE-FX IEEE 802.3z Gigabit SX/LX IEEE 802.3ab Gigabit 1000Base-T IEEE 802.3x Flow Control and Back pressure IEEE 802.1d Spanning tree protocol IEEE 802.1w Rapid spanning tree protocol IEEE 802.1p Class of service Standards Compliance IEEE 802.
Chapter 2 Installation This section describes the hardware features and installation of the Managed Switch on the desktop or rack mount. For easier management and control of the Managed Switch, familiarize yourself with its display indicators, and ports. Front panel illustrations in this chapter display the unit LED indicators. Before connecting any network device to the Managed Switch, please read this chapter completely.
Chapter 2: Installation Gigabit TP Interface Port-9, Port-10: 10/100/1000Base-T Copper, RJ-45 Twist-Pair: Up to 100 meters. Gigabit SFP Slots Port-9, Port-10: 1000Base-SX/LX mini-GBIC slot, SFP (Small Factor Pluggable) transceiver module: From 550 meters (Multi-mode fiber), up to 10/30/50/70/120 kilometers (Single-mode fiber). Reset button At the left of front panel, the Reset button is designed to reboot the Managed Switch without turning the power off.
Chapter 2: Installation • • System LED Color Function PWR Green Lit: indicates there is power to the Switch Per 10/100Base-T RJ-45 port LED LNK/ACT • Color Green Function Lit: indicates the link through that port is successfully established Blink: indicates the Switch is actively sending or receiving data over that port Per 10/100/1000Base-T port/SFP interfaces LED Color Function Lit: indicates the port is operating at 1000Mbps LNK/ACT 1000 Green Off: indicates the port is operating at 1
Chapter 2: Installation • Per 10/100Base-TX, PoE interfaces (Port-1 to Port-8) LED Color LNK/ACT Green PoE In Use Orange Function Lit: indicates the link through that port is successfully established Blink: indicates the Switch is actively sending or receiving data over that port Lit: indicates the port is providing 48VDC in-line power • Off: indicates the connected device is not a PoE Powered Device (PD) Per 10/100/1000Base-T port/SFP interfaces LED Color Function Lit: indicates the port is op
Chapter 2: Installation Figure 4: GE-DS-82 and GE-DS-82-PoE Rear panels Console Port The console port is a DB9, RS-232 male serial port connector. It is an interface for connecting a terminal directly. The console port provides rich diagnostic information including IP Address setting, factory reset, port management, link status and system settings. Users can use the attached RS-232 cable in the package and connect to the console port on the device.
Chapter 2: Installation Switch Installation This section describes how to install the Managed Switch and connect it as necessary. Please read the following instructions, and perform the procedures in the listed order. Desktop/Shelf Installation NOTE: Refer to the environmental restrictions listed in the Product Specification when selecting a location for the Managed Switch. Step 1: Attach the rubber feet to the recessed areas on the bottom of the Managed Switch.
Chapter 2: Installation NOTE: Connection to the Managed Switch requires UTP Category 5 network cabling with RJ-45 tips. Refer to the Cabling Specification in Appendix A for further information. Step 4: Connect the Managed Switch to network devices. A. Connect one end of a standard network cable to the 10/100/1000 RJ-45 ports on the front of the Managed Switch. B. Connect the other end of the cable to the network devices (printer servers, workstations, routers etc).
Chapter 2: Installation Step 4: Follow the same steps to attach the second bracket to the opposite side. Step 5: After the brackets are attached to the Managed Switch, use suitable screws to securely attach the brackets to the rack, as shown in Figure 7. Figure 7: Mounting the GE-DS-82 in a rack Step 6: Follow steps 4 and 5 of the Desktop Installation section to connect the network cabling and supply power to the Managed Switch.
Chapter 2: Installation Figure 8: Plugging-in the SFP transceiver Approved GE Security SFP Transceivers The Managed Switch supports both single-mode and multi-mode SFP transceivers.
Chapter 2: Installation Before connecting the other switches, workstations or Media Converter: 1. Make sure both sides of the SFP transceiver are the same media type (for example: 1000Base-SX to 1000Base-SX, 1000Base-LX to 1000Base-LX). 2. Verify that the fiber-optic cable type matches the SFP transceiver model. • To connect to a 1000Base-SX SFP transceiver, use multi-mode fiber cable (one side must be male duplex LC connector type).
Chapter 2: Installation Figure 9: Pulling out the SFP transceiver CAUTION: Never pull out the module without pull the handle or the push bolts on the module. Pulling out the module with too much force could damage the module and SFP module slot of the Managed Industrial Switch.
Chapter 2: Installation 22 GE-DS-82 and 82-PoE Ethernet Managed Switch User Manual
Chapter 3 Switch Management Summary This chapter explains the methods that you can use to configure management access to the Managed Switch. It describes the types of management applications and the communication and management protocols that deliver data between your management device (work-station or personal computer) and the system. It also contains information about port connection options.
Chapter 3: Switch Management • Above Workstation installed with WEB Browser and JAVA runtime environment Plug-in • Serial Port connect o Above PC with COM Port (DB-9 / RS-232) or USB-to-RS-232 converter NOTE: We recommend using Internet Explore 6.0 or above to access the Managed Switch.
Chapter 3: Switch Management Table 1: Management Methods Comparison Method Web Browser Advantages • Ideal for configuring the switch remotely • Compatible with all popular browsers • Can be accessed from any location Disadvantages • Security can be compromised (hackers need only know the IP address and subnet mask) • May encounter lag times on poor connections • Most visually appealing SNMP Agent • Communicates with switch functions at the MIB level • Based on open standards • Requires SNMP manager so
Chapter 3: Switch Management Web Browser Setup The following shows how to start up the Web Management of the GE-DS-82 Managed Switch. Please note that the Managed Switch is configured through an Ethernet connection. Make sure the manager PC is set on the same IP subnet address. For example, the default IP address of the GE-DS-82 Managed Switch is 192.168.0.100, then the manager PC should be set at 192.168.0.x (where x is a number between 1 and 254, except 100), and the default subnet mask is 255.255.255.0.
Chapter 3: Switch Management Figure 11: Login screen 3. After entering the username and password, the main screen appears as shown in Figure 12.
Chapter 3: Switch Management SNMP-Based Network Management You can use an external SNMP-based application to configure and manage the Managed Switch, such as Snip Network Manager, HP Open view Network Node Management (NNM) or What’s up Gold. This management method requires the SNMP agent on the switch and the SNMP Network Management Station to use the same community string. This management method, in fact, uses two community strings: the get community string and the set community string.
Chapter 3: Switch Management Figure 14: PC connected to Switch with RS-232 serial cable PC / Workstation with Terminal emulation software Managed Switch RS-232 Serial Port Serial Port 57600,8,n,1 Direct Access Direct access to the administration console is achieved by directly connecting a terminal or a PC equipped with a terminal-emulation program (such as HyperTerminal) to the Managed Switch console (serial) port.
Chapter 3: Switch Management You can change these settings, if desired, after you log on. This management method is often preferred because you can remain connected and monitor the system during system reboots. Also, certain error messages are sent to the serial port, regardless of the interface through which the associated action was initiated. A Macintosh or PC attachment can use any terminal-emulation program for connecting to the terminal serial port.
Chapter 3: Switch Management Figure 16: New Connection dialog window 4. Change the Connect using drop-down menu to TCP/IP (Winsock) then input Host address. The Managed Switches default IP address is 192.168.0.100 and the default telnet port number is 23, then press the OK button. Figure 17: The Connect to dialog window Log on to the Console Make sure the device finished booting. Once the telnet has connected to the device, the hyper terminal will display the login request.
Chapter 3: Switch Management Figure 18: Login request window Now you can configure the Switch by Telnet. The management interface is exactly the same with RS-232 console management. SNMP Protocol Simple Network Management Protocol (SNMP) is the standard management protocol for multi-vendor IP networks. SNMP supports transaction-based queries that allow the protocol to format messages and to transmit information between reporting devices and data-collection programs.
Chapter 4 Web-Based Management About Web-based Management The Managed Switch offers management features that allow users to manage the Switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer. The Web-Based Manager supports Internet Explorer 6.0. It is based on Java Applets with an aim to reduce network bandwidth consumption, enhance access speed, and present an easy viewing screen. NOTE: By default, IEv6.0 or later does not allow Java Applets to open sockets.
Chapter 4: Web-Based Management For example, the default IP address of the Managed Switch is 192.168.0.100, then the manager PC should be set at 192.168.0.x (where x is a number between 1 and 254, except 100), and the default subnet mask is 255.255.255.0. If you have changed the default IP address of the Managed Switch to 192.168.1.1 with subnet mask 255.255.255.0 via console, then the manager PC should be set at 192.168.1.
Chapter 4: Web-Based Management Logging on to the Switch 1. Use Internet Explorer to enter the factory default IP address in the browser address field to access the Web interface. The factory-default IP Address is: http://192.168.0.100 Figure 19: Login screen 2. The login screen will appear. Enter the default username and password (or the username/password you have changed via console) to login to the main screen of Managed Switch. User name: admin Password: admin 3.
Chapter 4: Web-Based Management Figure 20: Main Web Page The Menu on the left side of the Web page lets you access all the commands and statistics that the Switch provides. NOTE: WEB configuration of GE-DS-82-PoE is the similar to the GE-DS-82 except with PoE features, so where there are differences they will be indicated. Main Web Page The Main web page allows you to configure the Managed Switch. This section describes how to use the Managed Switch's Web browser interface to configure and manage it.
Chapter 4: Web-Based Management Figure 21: Port Control page The port states are illustrated as follows: State Disabled Down Link RJ-45 Ports SFP Ports PoE Ports Main Menu The Main menu is located on the left side of the Main Web Page. This is where all the configuration menus can be accessed.
Chapter 4: Web-Based Management Figure 22: Main Menu System Use the System menu items to display and configure basic administrative details of the Managed Switch.
Chapter 4: Web-Based Management Basic The Basic System Info page provides information for the current device information. Basic System Info page helps a switch administrator to identify the model name, firmware / hardware version and MAC address.
Chapter 4: Web-Based Management Figure 24: Switch Misc Config screenshot This page includes the following fields: OBJECT DESCRIPTION Type the number of seconds that an inactive MAC address remains in MAC Address Age-out Time the switch's address table. The value is a multiple of 6. Default is 300 seconds. Broadcast Storm Filter Mode To configure broadcast storm control, enable it and set the upper threshold for individual ports.
Chapter 4: Web-Based Management To select broadcast storm Filter Packets type. If no packets types are selected, no filtering will occur. The Broadcast Storm Filter Mode will show OFF. Broadcast Storm Filter Packets Select Collision Retry Forever The selectable items as below: • Broadcast Packets • IP Multicast • Control Packets • Flooded Unicast / Multicast Packets Provide Collision Retry Forever function "Disable" or 16, 32, 48 collision numbers on Managed Switch.
Chapter 4: Web-Based Management set up for this service, you will get an IP address assigned over the network. If you don't get an address in about 30 seconds, you probably don't have DHCP. IP Configuration The IP Configuration includes the IP Address, Subnet Mask and Gateway. The Configured column is used to view or change the IP configuration. Fill up the IP Address, Subnet Mask and Gateway for the device. The screen in Figure 25 appears.
Chapter 4: Web-Based Management Assign the subnet mask to the IP address. Subnet Mask If DHCP client function is disabled, the user has to assign the subnet mask in this column field. Assign the network gateway for the switch. Gateway If DHCP client function is disabled, the user has to assign the gateway in this column field. The default gateway is 192.168.0.254.
Chapter 4: Web-Based Management An SNMP-managed network consists of four key components: Network management stations (NMSs), SNMP agents, Management information base (MIB) and Networkmanagement protocol: • Network management stations (NMSs): Sometimes called consoles, these devices execute management applications that monitor and control network elements.
Chapter 4: Web-Based Management Figure 27: SNMP configuration interface This page includes the following fields: OBJECT System Name DESCRIPTION An administratively assigned name for this managed node. By convention, this is the node's fully qualified domain name. A domain name is a text string drawn from the alphabet (A-Za-z), digits (0-9), minus sign (-). No space characters are permitted as part of a name. The first character must be an alpha character.
Chapter 4: Web-Based Management Community Strings Community strings serve as passwords. See the table below. Figure 28: Community strings interface This page includes the following fields: OBJECT DESCRIPTION Here you can define the new community string set and remove the unwanted community string. • String: Fill the name string. Community Strings • RO: Read only. Enables requests accompanied by this community string to display MIB-object information. • RW: Read/write.
Chapter 4: Web-Based Management This page includes the following fields: OBJECT DESCRIPTION 85 Enter the IP address of the trap manager. Community Enter the community string for the trap station. SNMPv3 Groups Configure SNMPv3 groups table on this page. The entry index keys are Security Model and Security Name. The SNMPv3 Groups Configuration screen in Figure 30 appears.
Chapter 4: Web-Based Management Security Name: A string identifying the security name that this entry should belong to. The allowed string length is 1 to 15 Remove Check to delete the entry. It will be deleted during the next save. SNMPv3 View Configure the SNMPv3 views table on this page. The entry index keys are View Name and OID Subtree. The SNMPv3 Views Configuration screen in Figure 31 appears.
Chapter 4: Web-Based Management View Subtree The OID defining the root of the subtree to add to the named view. The allowed OID length is 1 to 128. The allowed string content is digital number or asterisk(*) View Mask (Hexadecimal Digits): View mask is defined in order to reduce the amount of configuration information required when fine-grained access control is required (e.g., access control at The object instance level) SNMPv3 Access Configure the SNMPv3 access table on this page.
Chapter 4: Web-Based Management Indicates the security model that this entry should belong to. Possible security models are: SNMP Access: NoAuth: None authentication and none privacy. Auth: Authentication and none privacy. Authpriv: Authentication and privacy. Read View: The name of the MIB views defining the MIB objects for which this request may request the current values. The allowed string length is 1 to 16.
Chapter 4: Web-Based Management This page include the following fields: Object Description SNMP User Name: A string identifying the user name that this entry should belong to. The allowed string length is 1 to 15. Indicates the authentication protocol that this entry should belong to. Possible authentication protocol are: None: None authentication protocol. Auth Type: MD5: An optional flag to indicate that this user using MD5 authentication protocol.
Chapter 4: Web-Based Management This page includes the following fields: OBJECT DESCRIPTION TFTP Server IP Address Type in your TFTP server IP. Firmware File Name Type in the name of the firmware image file to be updated. HTTP Firmware Upgrade The HTTP Firmware Upgrade page contains fields for downloading system image files from the Local File browser to the device. The Web Firmware Upgrade screen in Figure 35 appears.
Chapter 4: Web-Based Management 4. Click Submit, the Software Upload Progress will show the file upload status. Note: Firmware upgrade needs several minutes. Please wait a while, and then manually refresh the webpage. Configuration Backup TFTP Restore Configuration You can restore a previous backup configuration from the TFTP server to recover the settings. Before doing that, you must locate the image file on the TFTP Server first and the Managed Switch will download the flash image.
Chapter 4: Web-Based Management TFTP Backup Configuration You can back up the current configuration from flash ROM to the TFTP server for the purpose of recovering the configuration later. It helps you to avoid wasting time on configuring the settings by backing up the configuration. Figure 37: Configuration Backup interface This page includes the following fields: OBJECT DESCRIPTION TFTP Server IP Address Type in your TFTP server IP. Backup File Name Type in the file name.
Chapter 4: Web-Based Management Factory Default Reset switch to default configuration. Click reset to reset all configurations to the default value. Figure 38: Factory Default interface System Reboot Reboot the switch. Click reboot to reboot the system.
Chapter 4: Web-Based Management Syslog Setting The Syslog Setting page allows you to configure the logging of messages that are sent to remote syslog servers or other management stations. You can also limit the event messages sent to only those messages below a specified level. Figure 40: Syslog setting web interface This page includes the following settings: OBJECT DESCRIPTION Syslog Server IP IP address of syslog server.
Chapter 4: Web-Based Management Figure 41: Port Control interface This page includes the following fields: OBJECT DESCRIPTION Port Use the scroll bar and click on the port number to choose the port to be configured. State Current port state. The port can be set to disable or enable mode. If the port state is set as 'Disable', it will not receive or transmit any packet. Negotiation Auto and Force. Being set as Auto, the speed and duplex mode are negotiated automatically.
Chapter 4: Web-Based Management OBJECT DESCRIPTION Port-1 - Port-24, supports by-port ingress and egress rate control. For example, assume port 1 is 10Mbps, users can set its effective egress rate at 1Mbps and ingress rate at 500Kbps. Device will perform flow control or backpressure to confine the ingress rate to meet the specified rate. • Ingress: Type the port effective ingress rate. Rate Control The valid range is 0 - 8000. The unit is 128K. (Unit: 128KBbps) 0: disable rate control.
Chapter 4: Web-Based Management Port Status This page displays current port configurations and operating status - it is a ports' configurations summary table. Via the summary table, you can find the status of each port clear at a glance, like Port Link Up/Link Down status, negotiation, Link Speed, Rate Control, Duplex mode and Flow Control.
Chapter 4: Web-Based Management Figure 43: Port Statistics interface This page includes the following fields: OBJECT DESCRIPTION Port The port number. Link The status of linking-'Up' or 'Down' State Set by Port Control. When the state is disabled, the port will not transmit or receive any packet. Tx Good Packet The counts of transmitting good packets via this port.
Chapter 4: Web-Based Management Port Sniffer The Port Sniffer (mirroring) is a method for monitor traffic in switched networks. Traffic through a port can be monitored by one specific port. That is, traffic goes in or out a monitored port will be duplicated into the sniffer port. Figure 44: Port Mirror application Configuring the port mirroring by assigning a source port from which to copy all packets and a destination port where those packets will be sent.
Chapter 4: Web-Based Management Figure 45: Port Sniffer interface This page includes the following fields: OBJECT DESCRIPTION Select a sniffer mode: • Disable Sniffer Type • Rx • Tx • Both Analysis (Monitoring) Port It' means Analysis port can be used to see the traffic on another port you want to monitor. You can connect Analysis port to LAN analyzer or netxray. Monitored Port The port you want to monitor. The monitor port traffic will be copied to the Analysis port.
Chapter 4: Web-Based Management Protected Port There are two protected port groups, ports in different groups can't communicate. In the same group, protected ports can't communicate with each other, but can communicate with unprotected ports. Unprotected ports can communicate with any ports, including protected ports Figure 46: Protected Port setting web interface This page includes the following fields: OBJECT DESCRIPTION Port ID Identify the Managed Switch interface.
Chapter 4: Web-Based Management VLAN Configuration VLAN Overview A Virtual Local Area Network (VLAN) is a network topology configured according to a logical scheme rather than the physical layout. VLAN can be used to combine any collection of LAN segments into an autonomous user group that appears as a single LAN. VLAN also logically segment the network into different broadcast domains so that packets are forwarded only between ports within the VLAN.
Chapter 4: Web-Based Management on another switch port, VLAN considerations come into play to decide if the packet is dropped by the Switch or delivered. • IEEE 802.1Q VLANs IEEE 802.1Q (tagged) VLAN are implemented on the Switch. 802.1Q VLAN require tagging, which enables them to span the entire network (assuming all switches on the network are IEEE 802.1Q-compliant). VLAN allow a network to be segmented in order to reduce the size of broadcast domains.
Chapter 4: Web-Based Management 802.1Q Tag User Priority CFI 3 bits TPID (Tag Protocol Identifier) Destination Address 6 bytes Source Address 1 bits 2 bytes Ethernet Type VLAN TAG 6 bytes 12 bits TCI (Tag Control Information) 2 bytes Preamble VLAN ID (VID) 4 bytes 2 bytes Data 46-1517 bytes FCS 4 bytes The Ether Type and VLAN ID are inserted after the MAC source address, but before the original Ether Type/Length or Logical Link Control.
Chapter 4: Web-Based Management for tagged packets, tag-aware and tag-unaware network devices can coexist on the same network. A switch port can have only one PVID, but can have as many VID as the switch has memory in its VLAN table to store them.
Chapter 4: Web-Based Management Figure 47: Static VLAN interface NOTE: 1. No matter what basis is used to uniquely identify end nodes and assign these nodes VLAN membership, packets cannot cross VLAN without a network device performing a routing function between the VLAN. 2. The Switch supports Port-based VLAN and IEEE 802.1Q VLAN. The port untagging function can be used to remove the 802.1 tag from packet headers to maintain compatibility with devices that are tag-unaware.
Chapter 4: Web-Based Management Figure 48: Port-based VLAN interface Create a VLAN and add member ports to it 1. Click the hyperlink "VLAN" \ "Static VLAN" to enter the VLAN configuration interface. 2. Select "Port Based VLAN" at the VLAN Operation Mode, to enable the portbased VLAN function. 3. Click "Add" to create a new VLAN group. Figure 49 appears. 4. Type a name and Group ID for the new VLAN, the available range is 2-4094. 5.
Chapter 4: Web-Based Management Figure 49: Static VLAN interface This page includes the following fields: OBJECT DESCRIPTION VLAN Name Use this optional field to specify a name for the VLAN. It can be up to 16 alphanumeric characters long, including blanks. Group ID You can configure the ID number of the VLAN by this item. This field is used to add VLANs one at a time. The VLAN group ID and available range is 2-4094. Port Indicate port 1 to port 26.
Chapter 4: Web-Based Management NOTE: All unselected ports are treated as belonging to another single VLAN. If the port-based VLAN is enabled, the VLAN-tagging is ignored. 802.1Q VLAN Tagged-based VLAN is an IEEE 802.1Q specification standard. Therefore, it is possible to create a VLAN across devices from different switch venders. IEEE 802.1Q VLAN uses a technique to insert a "tag" into the Ethernet frames. Tag contains a VLAN Identifier (VID) that indicates the VLAN numbers.
Chapter 4: Web-Based Management VLAN Group Configuration • VLAN Group Configuration Figure 50: VLAN Group Configuration interface 1. Click the hyperlink "VLAN" \ "Static VLAN" to enter the VLAN configuration interface. 2. Select "802.1Q" at the VLAN Operation Mode, to enable the 802.1Q VLAN function. 3. Click Add to create a new VLAN group or Edit to management exist VLAN groups. Then the VLAN Group column appears. 4. Input a VLAN group ID and available range is 2-4094.
Chapter 4: Web-Based Management Figure 51: VLAN Group Configuration interface 5. Select specific port as member port. Figure 52 appears. 6. After setup completed, please press "Apply" button to take effect. 7. Please press "Back" for return to VLAN configuration screen to add other VLAN group. 8. If there are many groups that over the limit of one page, you can click Next to view other VLAN groups. 9. Use Delete button to delete unwanted VLAN. 10. Use Edit button to modify existing VLAN group.
Chapter 4: Web-Based Management Figure 52: 802.1Q VLAN Setting Web Page screen This page includes the following fields: OBJECT DESCRIPTION VLAN Name Use this optional field to specify a name for the VLAN. It can be up to 16 alphanumeric characters long, including blanks. VLAN ID You can configure the ID number of the VLAN by this item. This field is used to add VLANs one at a time. The VLAN group ID and available range is 2-4094. Port UnTag Member Indicate port 1 to port 26.
Chapter 4: Web-Based Management VLAN Filter • 802.1Q VLAN Port Configuration This page is used for configuring the Switch port VLAN. The VLAN per Port Configuration page contains fields for managing ports that are part of a VLAN. The port default VLAN ID (PVID) is configured on the VLAN Port Configuration page. All untagged packets arriving to the device are tagged by the ports PVID. This section provides 802.1Q Ingress Filter of each port from the Switch, the screen in Figure 53 appears. Figure 53: 802.
Chapter 4: Web-Based Management OBJECT DESCRIPTION Ingress filtering lets frames belonging to a specific VLAN to be forwarded if the port belongs to that VLAN. Ingress Filtering 1 Enable: Forward only packets with VID matching this port's configured VID. Disable: Disable Ingress filter function. Drop untagged frame. Ingress Filtering 2 Disable: Acceptable all Packet. Enable: Only packet with match VLAN ID can be permission to go through the port. Apply button Press the button to save configurations.
Chapter 4: Web-Based Management The Managed Switch supports multiple VLAN tags and can therefore be used in MAN applications as a provider bridge, aggregating traffic from numerous independent customer LANs into the MAN (Metro Access Network) space. One of the purposes of the provider bridge is to recognize and use VLAN tags so that the VLANs in the MAN space can be used independent of the customers' VLANs. This is accomplished by adding a VLAN tag with a MAN-related VID for frames entering the MAN.
Chapter 4: Web-Based Management This page includes the following fields: OBJECT QinQ DESCRIPTION Enable Sets the Managed Switch to QinQ mode, and allows the QinQ tunnel port to be configured. Disable The Managed Switch operates in its normal VLAN mode. The default is for the Managed Switch to function in Disable mode. The Tag Protocol Identifier (TPID) specifies the ethertype of incoming packets on a tunnel access port. QinQ TPID • 802.1Q Tag : 8100 • vMAN Tag : 88A8 Default : 802.1Q Tag.
Chapter 4: Web-Based Management Figure 55: Q-in-Q Tunnel Setting interface • To configure the QinQ Port do the following: 1. Enable global QinQ function: select QinQ enable "Enable". 2. Fill QinQ Tpid. 3. Enable port QinQ function: select QinQ checkbox for special port. 4. Enable port QinQ Uplink function: select QinQ Uplink checkbox for special port.
Chapter 4: Web-Based Management GVRP VLAN GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) is a protocol that facilitates control of virtual local area networks (VLANs) within a larger network. GVRP conforms to the IEEE 802.1Q specification, which defines a method of tagging frames with VLAN configuration data. This allows network devices to dynamically exchange VLAN configuration information with other devices.
Chapter 4: Web-Based Management Figure 56: GVRP Configuration web interface This page includes the following fields: OBJECT DESCRIPTION GVRP Enable global GVRP function Port Indicate port 1 to port 10.
Chapter 4: Web-Based Management GVRP Table The GVRP Table can be used to display dynamic VLANs from being learned via GVRP. Figure 57: GVRPTable web interface This page includes the following fields: OBJECT VLAN ID Port Members 82 DESCRIPTION Display the learned VLANs via GVRP protocol on GVRP enabled ports. The Managed Switch allows displaying up to 128 dynamic VLAN entries. Identify the GVRP enabled port that dynamic VLAN is learned from.
Chapter 4: Web-Based Management Rapid Spanning Tree The Rapid Spanning Tree Protocol (RSTP) is an evolution of the Spanning Tree Protocol and provides for faster spanning tree convergence after a topology change. The system also supports STP and the system will auto-detect the connected device that is running STP or RSTP protocol. Theory The Spanning Tree protocol can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers.
Chapter 4: Web-Based Management • Automatically reconfigures the spanning tree to compensate for the failure, addition, or removal of any element in the tree. • Reconfigures the spanning tree without operator intervention.
Chapter 4: Web-Based Management When STP is enabled using the default parameters, the path between source and destination stations in a switched network might not be ideal. For instance, connecting higher-speed links to a port that has a higher number than the current root port can cause a root-port change. STP Port States The BPDUs take some time to pass through a network.
Chapter 4: Web-Based Management Figure 58: STP Port State Transitions You can modify each port state by using management software. When you enable STP, every port on every switch in the network goes through the blocking state and then transitions through the states of listening and learning at power up. If properly configured, each port stabilizes to the forwarding or blocking state.
Chapter 4: Web-Based Management the Priority setting, or influencing STP to choose a particular port to block using the Port Priority and Port Cost settings is, however, relatively straight forward. Figure 59: Before Applying the STA Rules In this example, only the default STP values are used.
Chapter 4: Web-Based Management The switch with the lowest Bridge ID (switch C) was elected the root bridge, and the ports were selected to give a high port cost between switches B and C. The two (optional) Gigabit ports (default port cost = 4) on switch A are connected to one (optional) Gigabit port on both switch B and C. The redundant link between switch B and C is deliberately chosen as a 100 Mbps Fast Ethernet link (default port cost = 19).
Chapter 4: Web-Based Management The following are the user-configurable STP parameters for the port or port group level: PARAMETER DESCRIPTION DEFAULT VALUE Port Priority A relative priority for each switch - lower numbers give a higher priority and a greater chance of a given switch being 128 elected as the root bridge.
Chapter 4: Web-Based Management Figure 61: RSTP System Configuration interface This page includes the following fields: OBJECT DESCRIPTION RSTP mode The user must enable the RSTP function first before configuring the related parameters. Protocol Version A value used to specify the spanning tree protocol, the original spanning tree protocol (STP, 802.1d) or the rapid spanning tree protocol (RSTP, 802.1w).
Chapter 4: Web-Based Management NOTE: Follow the rule as below to configure the MAX Age, Hello Time, and Forward Delay Time. 2 x (Forward Delay Time value -1) > = Max Age value >= 2 x (Hello Time value +1). NOTE: Each switch in a spanning-tree adopts the Hello Time, Forward Delay time, and Max Age parameters of the root bridge, regardless of how it is configured. Root Bridge Information This page provides a status overview for all RSTP bridge instances.
Chapter 4: Web-Based Management This page includes the following fields: OBJECT DESCRIPTION Priority The bridge identifier of the root bridge. It is made up from the bridge priority and the base MAC address of the bridge. MAC Address The bridge identifier of the root bridge. It is made up from the bridge priority and the base MAC address of the bridge. Root Path Cost For the Root Bridge this is zero.
Chapter 4: Web-Based Management This page includes the following fields: OBJECT DESCRIPTION Path Cost The cost of the path to the other bridge from this transmitting bridge at the specified port. Enter a number 1 through 200,000,000. Priority Decide which port should be blocked by setting its priority as the lowest. Enter a number between 0 and 240. The value of priority must be the multiple of 16.
Chapter 4: Web-Based Management Recommended STP Path Cost Range Port Type IEEE 802.1D-1998 IEEE 802.1w-2001 Ethernet 50-600 200,000-20,000,000 Fast Ethernet 10-60 20,000-2,000,000 Gigabit Ethernet 3-10 2,000-200,000 Recommended STP Path Cost Range Port Type Link Type IEEE 802.1D-1998 IEEE 802.
Chapter 4: Web-Based Management Aggregator Setting This section provides Port Trunk-Aggregator Setting of each port from the Managed Switch, the screen in Figure 64 appears.
Chapter 4: Web-Based Management This page includes the following fields: OBJECT DESCRIPTION System Priority A value, which is used to identify the active LACP. The Managed Switch with the lowest value has the highest priority and is selected as the active LACP peer of the trunk group. Group ID There are 13 trunk groups to be selected. Assign the "Group ID" to the trunk group. • Enabled, the trunk group is using LACP.
Chapter 4: Web-Based Management Figure 65: Assigning 2 ports to a trunk group with LACP disabled Figure 66: Static Trunking Group information GE-DS-82 and 82-PoE Ethernet Managed Switch User Manual 97
Chapter 4: Web-Based Management This page includes the following fields: OBJECT DESCRIPTION Group Key This is a read-only column field that displays the trunk group ID. Port member This is a read-only column field that displays the members of this static trunk group. LACP enabled Having set up the aggregator setting with LACP enabled, you will see the trunking group information between two switches on the tab of Aggregator Information. • Switch 1 configuration 1.
Chapter 4: Web-Based Management • Switch 2 configuration 6. Set System Priority of the trunk group. For example: 32768. 7. Select a trunk group ID by pull down the drop-down menu bar. 8. Enable LACP. 9. Include the member ports by clicking the Add button after selecting the port number and the column field of Work Ports changes automatically. Figure 68: Switch 2 configuration interface 10.
Chapter 4: Web-Based Management Figure 69: Switch 1 Aggregator Information State Activity Having set up the LACP aggregator on the tab of Aggregator Setting, you can configure the state activity for the members of the LACP trunk group. You can tick or cancel the checkbox beside the state label. When you remove the tick mark of the port and click Apply, the port state activity will change to Passive.
Chapter 4: Web-Based Management This page includes the following fields: OBJECT DESCRIPTION Active The port automatically sends LACP protocol packets. Passive The port does not automatically send LACP protocol packets, and responds only if it receives LACP protocol packets from the opposite device. NOTE: A link having two passive LACP nodes will not perform dynamic LACP trunk because both ports are waiting for an LACP protocol packet from the opposite device.
Chapter 4: Web-Based Management Figure 71: Dynamic MAC Address interface MAC Table Entries OBJECT DESCRIPTION NO The index of the MAC address entry. MAC The MAC address of the entry. PORT The ports that are members of the entry. VID The VLAN ID of the entry. Type Indicates whether the entry is a static or dynamic entry. Click "Clear" to clear the dynamic MAC addresses information of the current port shown on the screen.
Chapter 4: Web-Based Management Figure 72: Static MAC Addresses interface This page includes the following fields: OBJECT DESCRIPTION MAC Address Enter the MAC address of the port that should permanently forward traffic, regardless of the device network activity. Port Num Pull down the selection menu to select the port number. VLAN ID The VLAN ID for the entry. MAC Filtering By filtering MAC address, the switch can easily filter the pre-configured MAC address and become more secure.
Chapter 4: Web-Based Management Figure 73: MAC Filtering interface This page includes the following fields: OBJECT DESCRIPTION MAC Address Enter the MAC address that you want to filter. VLAN ID The VLAN ID for the entry.
Chapter 4: Web-Based Management IGMP Snooping Theory The Internet Group Management Protocol (IGMP) lets host and routers share information about multicast groups memberships. IGMP snooping is a switch feature that monitors the exchange of IGMP messages and copies them to the CPU for feature processing. The overall purpose of IGMP Snooping is to limit the forwarding of multicast frames to only ports that are a member of the multicast group.
Chapter 4: Web-Based Management Figure 75: Multicast flooding Figure 76: IGMP Snooping multicast stream control 106 GE-DS-82 and 82-PoE Ethernet Managed Switch User Manual
Chapter 4: Web-Based Management IGMP Versions 1 and 2 Multicast groups allow members to join or leave at any time. IGMP provides the method for members and multicast routers to communicate when joining or leaving a multicast group. IGMP version 1 is defined in RFC 1112. It has a fixed packet size and no optional data. The format of an IGMP packet is shown below: IGMP Message Format Octets 0 8 Type 16 Response Time 31 Checksum Group Address (all zeros if this is a query).
Chapter 4: Web-Based Management The Time-to-Live (TTL) field of query messages is set to 1 so that the queries will not be forwarded to other sub networks. IGMP version 2 introduces some enhancements such as a method to elect a multicast queried for each LAN, an explicit leave message, and query messages that are specific to a given group.
Chapter 4: Web-Based Management IGMP Configuration The Switch support IP multicast, you can enable IGMP protocol on web management's switch setting advanced page, then the IGMP snooping information displays. IP multicast addresses range are from 224.0.0.0 through 239.255.255.255. Figure 78: IGMP Configuration interface This page includes the following fields: OBJECT DESCRIPTION IGMP Protocol Enable or disable the IGMP protocol. IGMP Fastleave Enable or disable Fast Leave on the port.
Chapter 4: Web-Based Management QoS Configuration Understand QOS Quality of Service (QoS) is an advanced traffic prioritization feature that allows you to establish control over network traffic. QoS enables you to assign various grades of network service to different types of traffic, such as multi-media, video, protocolspecific, time critical, and file-backup traffic. QoS reduces bandwidth limitations, delay, loss, and jitter.
Chapter 4: Web-Based Management QoS Configuration QoS settings allow customization of packet priority in order to facilitate delivery of data traffic that might be affected by latency problems. When CoS/802.1p Tag Priority is applied, the Switch recognizes 802.1Q VLAN tag packets and extracts the VLAN tagged packets with User Priority value. 802.1Q Tag and 802.
Chapter 4: Web-Based Management Figure 79: QoS Configuration - 802.1Priority This page includes the following fields: OBJECT DESCRIPTION First Come First Service The sequence of packets sent is dependant on arrival order. All High before Low The high priority packets are sent before low priority packets. Select the preference given to packets in the switch's higher-priority queue. These options represent the number of higher priority packets sent before one lower priority packet is sent.
Chapter 4: Web-Based Management QoS PerPort Configuration Configure the priority level for each port. With the drop-down selection item of Priority Type above being selected as Port-based, this control item will then be available to set the queuing policy for each port. Figure 80: QoS Configuration - Port-Based Priority This page includes the following fields: OBJECT DESCRIPTION Port Number: Indicates port 1 to port 26. Port Priority: Each port has 8 priority levels—0-7 or Disable to be chosen.
Chapter 4: Web-Based Management 0 1 2 3 Precedence 4 5 6 TOS 7 MBZ Pv4 Packet Header Type of Service Octet The four TOS bits provide 15 different priority values, however only five values have a defined meaning. DiffServ Code Point (DSCP) - is the traffic prioritization bits within an IP header that are encoded by certain applications and/or devices to indicate the level of service required by the packet across a network.
Chapter 4: Web-Based Management Figure 81: QoS Configuration - TOS Priority This page includes the following fields: OBJECT DESCRIPTION TOS/DSCP Enable / Disable internal traffic class ( 0-7) to map the corresponding IP DSCP value. DSCP Priority The values of the IP DSCP header field within the incoming packet. 0-63. Specify which 802.1p priority to map the corresponding IP DSCP. The value is 0-7. TOS/DSCP Port Configuration Set up IP TOS / DSCP mapping to 802.
Chapter 4: Web-Based Management Figure 82: QoS Configuration - TOS/DSCP Port Status This page includes the following fields: OBJECT DESCRIPTION Port Number Indicates port 1 to port 26. TOS/DSCP Status Enable / Disable TOS/DSCP map to 802.1p priority on specify port. Access Control List The Access Control List (ACL) is a concept in computer security used to enforce privilege separation.
Chapter 4: Web-Based Management Figure 83: Access Control List (ACL) Web Page screen This page includes the following fields: IPv4 ACL OBJECT DESCRIPTION Group ID 1 - 247 (max. 247 ACL group). Action Permit / Deny. VLAN Packet Type • Permit: Permit packet cross switch. • Deny: Drop packet. Any / VID. • Any: Any VLAN id. • VID: 1-4094. A certain VLAN id. IPv4 / Non-IPv4 / Binding • IPv4: Set Ipv4 packet field. • Non-IPv4: Set non-Ipv4 packet field. • Binding: Set binding entry.
Chapter 4: Web-Based Management OBJECT DESCRIPTION DEFAULT VALUE Src IP Address Set this field if Packet Type is IPv4, else ignore. Any Any / IP and Mask • Any: Any IP address. • IP : A certain IP address. Mask: ***.***.***.*** * is represent a digit from 0-9, *** is range from 0 to 255 Notice: This is not subnet mask. Dst IP Address Set this field if Packet Type is IPv4, else ignore. Any Any / IP and Mask Any: Any IP address. IP : A certain IP address. Mask: ***.***.***.
Chapter 4: Web-Based Management OBJECT DESCRIPTION Port Set this field if Packet Type is IPv4, else ignore. DEFAULT VALUE 0-65535 If UDP port not find in UDP field, you can direct assign number. Port Id Source port id, from 1-26, 0 means don’t care. Current List You create ACL and Binding groups. 0 Non-IPv4 ACL In Packet Type/Binding box should select Non-IPv4 OBJECT DESCRIPTION Group ID 1 - 247 (max. 247 ACL group) Action Permit / Deny.
Chapter 4: Web-Based Management Binding Let a device that has specific IP address and MAC address use the network. We can set specific IP address, MAC address, VLAN id and port id to bind, and device can cross switch if all conditions match. Use binding function; we should enable it first in following page. In Packet Type/Binding box should select Binding. OBJECT DESCRIPTION Group ID 1 - 247 (max. 247 ACL group) Action Permit / Deny.
Chapter 4: Web-Based Management MAC Limit MAC limit allows users to set a maximum number of MAC addresses to be stored in the MAC address table. The MAC addresses chosen to be stored in MAC address table are the result of first-come-first-save policy. Once a MAC address is stored in the MAC address table, it stays in until it is aged out. When an "opening" is available, the switch stored the first new MAC address it sees in that opening.
Chapter 4: Web-Based Management MAC Limit Port Status This table displays current MAC Limit status of each port. Figure 85: MAC Limit - MAC Limit Port Status This page includes the following fields: OBJECT DESCRIPTION Port Number Indicates port 1 to port 26. Limit Display the current MAC Limit configuration and status of each port.
Chapter 4: Web-Based Management 802.1X Configuration 802.1x is an IEEE authentication specification which prevents the client from accessing a wireless access point or wired switch until it provides authority, like the user name and password that are verified by an authentication server (such as RADIUS server). Understanding IEEE 802.1X Port-Based Authentication The IEEE 802.
Chapter 4: Web-Based Management Figure 86: 802.1x device role Client-the device (workstation) that requests access to the LAN and switch services and responds to requests from the switch. The workstation must be running 802.1Xcompliant client software such as that offered in the Microsoft Windows XP operating system. (The client is the supplicant in the IEEE 802.1X specification.) • Authentication server-performs the actual authentication of the client.
Chapter 4: Web-Based Management • Authentication Initiation and Message Exchange The switch or the client can initiate authentication. If you enable authentication on a port by using the dot1x port-control auto interface configuration command, the switch must initiate authentication when it determines that the port link state transitions from down to up.
Chapter 4: Web-Based Management Figure 87: EAP message exchange • Ports in Authorized and Unauthorized States The switch port state determines whether or not the client is granted access to the network. The port starts in the unauthorized state. While in this state, the port disallows all ingress and egress traffic except for 802.1X protocol packets. When a client is successfully authenticated, the port transitions to the authorized state, allowing all traffic for the client to flow normally.
Chapter 4: Web-Based Management authentication server cannot be reached, the switch can retransmit the request. If no response is received from the server after the specified number of attempts, authentication fails, and network access is not granted. When a client logs off, it sends an EAPOL-logoff message, causing the switch port to transition to the unauthorized state.
Chapter 4: Web-Based Management After enabling the IEEE 802.1X function, you can configure the parameters of this function. Figure 89: 802.1x System Configuration interface This page includes the following fields: OBJECT DESCRIPTION IEEE 802.1x Protocol: Enable or disable 802.1x protocol. Radius Server IP: Assign the RADIUS Server IP address. Server Port: Set the UDP destination port for authentication requests to the specified RADIUS Server.
Chapter 4: Web-Based Management Figure 90: 802.1x Per Port Setting interface This page includes the following fields: OBJECT DESCRIPTION FU (Force Unauthorized) The specified port is required to be held in the unauthorized state. FA (Force Authorized) The specified port is required to be held in the authorized state.
Chapter 4: Web-Based Management Misc Configuration In this page, you can change the default configuration for the 802.1x standard: Figure 91: 802.1x Misc Configuration interface c This page includes the following fields: OBJECT DESCRIPTION Quiet Period: Used to define periods of time during which it will not attempt to acquire a supplicant. Default time is 60 seconds. TX Period: Set the period the port waits for retransmit next EAPOL PDU during an authentication session. Default value is 30 seconds.
Chapter 4: Web-Based Management Power Over Ethernet Providing up to 24 PoE, in-line power interface, the GE-DS-82-PoEPoE Switch can easily build a power central-controlled IP phone system, IP Camera system, AP group for the enterprise. For instance, 24 camera / AP can be easily installed around the corner in the company for surveillance demands or build a wireless roaming environment in the office.
Chapter 4: Web-Based Management The PSU input power consumption is monitored by measuring the voltage and current. The input power consumption is equal to the system's aggregated power consumption. The power management concept allows all ports to be active and activates additional ports, as long as the aggregated power of the system is lower than the power level at which additional PDs cannot be connected. When this value is exceeded, ports will be deactivated, according to user-defined priorities.
Chapter 4: Web-Based Management This page includes the following fields: OBJECT DESCRIPTION PoE PSU Status PoE PSU Status shows status of power supply for PoE output. PoE Temperature Unit 1 Display the current operating temperature of PoE chip unit 1. The unit 1 is in charge of PoE Port-1-Port-12 PoE Temperature Unit 2 Display the current operating temperature of PoE chip unit 2.
Chapter 4: Web-Based Management OBJECT DESCRIPTION Power Limit It can limit the port PoE supply watts. Per port maximum value must less 15.4, total ports values must less than the Power Reservation value. Once power overload detected, the port will auto shut down and keep on detection mode until PD’s power consumption lower than the power limit value. NOTE: For GE-DS-82-PoE, the total PoE power reservation from Port-1-8 is up to 180W.
Chapter 4: Web-Based Management DHCP Relay and Option 82 The Relay Agent Information option (Option82) is inserted by the DHCP relay agent when forwarding client-originated DHCP packets to a DHCP server (RFC 3046). Servers recognizing the Relay Agent Information option may use the information to implement IP address or other parameter assignment policies. The DHCP Relay can forward the DHCP broadcast packets to a DHCP server in a different subnet (RFC 1542).
Chapter 4: Web-Based Management Figure 93: DHCP Relay & Option 82 This page includes the following fields: OBJECT DESCRIPTION DHCP Option 82 Enable global option82 function DHCP Relay Enable global Relay function DHCP Option 82 Router Port DCHP Opt.82 Port Identify Port-1 to Port-10 to configure DHCP option 82 Option Enable port option82 function on selected port. Relay IP Type the IP addresses of the DHCP "Relay IP".
Chapter 4: Web-Based Management LLDP Configuration Use this page to change LLDP parameters. Figure 94: LLDP Configuration This page includes the following fields: OBJECT DESCRIPTION LLDP Status Enable/Disable LLDP. LLDP hello time You can change LLDP hello time value. The time interval between the transmission LLDP info packets. Value range is from 5 to 32768. Default value is 30. LLDP hold time You can change LLDP hold time value.
Chapter 4: Web-Based Management Figure 95: LLDP Per Port Configuration This page includes the following fields: OBJECT DESCRIPTION LLDP Status Enable/Disable LLDP. LLDP hello time You can change LLDP hello time value. The time interval between the transmission LLDP info packets. Value range is from 5 to 32768. Default value is 30. LLDP hold time You can change LLDP hold time value. (The hold time * the hello time) is the TTL time in the LLDP info packets. Value range is from 2 to 10.
Chapter 5 Console Management Login in to the Console Interface To configure the system via console mode, connect a serial cable to a COM port on a PC or notebook computer and to RJ-45 type serial (console) port of the Managed Switch. The console port of the Managed Switch is DCE already, so that you can connect the console port directly through PC without the need of Null Modem.
Chapter 5: Console Management Figure 96: GE-DS-82-PoEConsole Login screen NOTE: For security reasons, please change and memorize the new username and password after this first setup. Username Max: 6, Min: 1 characters. Password Max: 6, Min: 1 characters. Only enter commands in lowercase letters in the console interface.
Chapter 5: Console Management Configure IP address The GE-DS-82-PoEManaged Switch is shipped with default IP address as following. IP Address : 192.168.0.100 Subnet Mask : 255.255.255.0 To check the current IP address or modify a new IP address for the Switch, please use the procedures as follow: Show the current IP address 1. On "Switch# " prompt, enter "configure". 2. On "Switch(config)# " prompt, enter "show ip". 3. The screen displays the current IP address, Subnet Mask and Gateway.
Chapter 5: Console Management Configure IP address 1. On "Switch(config)# " prompt, enter the following command and press . As show in Figure 98. Switch(config)# ip address 192.168.1.100 255.255.255.0 Switch(config)# ip default-gateway 192.168.1.254 The previous command would apply the follow settings for the Switch. IP: 192.168.1.100 Subnet Mask: 255.255.255.0 Gateway: 192.168.1.254 Figure 98: Set IP address screen 2. Repeat Step 1 to check if the IP address has changed.
Chapter 5: Console Management NOTE: If you are not familiar with console command or the related parameter, enter "help" anytime in console to get the help description. You can change these settings, if desired, after you log on. This management method is often preferred because you can remain connected and monitor the system during system reboots. Also, certain error messages are sent to the serial port, regardless of the interface through which the associated action was initiated.
Chapter 5: Console Management 144 GE-DS-82 and 82-PoE Ethernet Managed Switch User Manual
Chapter 6 Command Line Interface Operation Notice To enter the "configuration" mode, you need to be in the privileged mode, and then types in the command configure: Switch# configure Switch (config) # GE-DS-82 and 82-PoE Ethernet Managed Switch User Manual 145
Chapter 6: Command Line Interface Command Line Editing Key Function -B ; ← Moves the cursor back one character. -D Deletes the character at the cursor. -E Jumps to the end of the current command line. -F ; → Moves the cursor forward one character. -K Deletes from the cursor to the end of the command line. -N ; ↓ Enters the next command line in the command history. -P ; ↑ Enters the previous command line in the command history.
Chapter 6: Command Line Interface Switch Static Configuration Port Configuration and show status port state Description: Turn the port state on or off. Syntax: port state [] Parameters: specifies the ports to be turn on or off. If not entered, all ports are turn on or off. port nego Description: Set port negotiation. Syntax: port nego [] Parameters: specifies the ports to be set.If not entered, all ports are set.
Chapter 6: Command Line Interface port flow Description: Enable or disable port flow control. Syntax: port flow [] Parameters: The first enables or disables flow control in full duplex mode. The second enables or disables flow control in half duplex mode. specifies the ports to be set. If not entered, all ports are set. port rate Description: Set port effective ingress or egress rate.
Chapter 6: Command Line Interface port jumboframe Description: Set port jumbo frame. When port jumbo frame is enable, the port forward jumbo frame packet Syntax: port jumboframe [] Parameters: specifies the ports to be set. If not entered, all ports are set. show port status Description: Show port status, including port State, Link, Trunking, VLAN, Negotiation, Speed, Duplex, Flow control, Rate control ,Priority, Security, BSF control.
Chapter 6: Command Line Interface Port 3 Information ---------------------------------------------------------------------State: on Link: down --More-- show port statistics Description: Show port statistics, including TxGoodPkt, TxBadPkt, RxGoodPkt, RxBadPkt, TxAbort, Collision, and DropPkt. Parameters: specifies the port to be shown.
Chapter 6: Command Line Interface DropPkt: 0 ---------------------------------------------------------------------Port 3 Information -----------------------------------------------------------------------More-- show port protection Description: Show protected port information.
Chapter 6: Command Line Interface 21 | off | 1 22 | off | 1 25 | off | 1 26 | off | 1 Trk1 | off | 1 Trunk Configuration Trunk allows the switch to combine ports so that they function like a single highspeed link. It can be used to increase the bandwidth to some devices to provide a high-speed link. For example, trunk is useful when making connections between switches or connecting servers to the switch. Trunk can also provide a redundant link for fault tolerance.
Chapter 6: Command Line Interface trunk add Description: Add a new trunk group. Syntax: trunk add Parameters: specifies the trunk group to be added. lacp Description: Specifies the added trunk group to be LACP enabled. Syntax: lacp no-lacp specifies the added trunk group to be LACP disabled. Parameters: specifies the ports to be set. specifies the ports to be set to LACP active.
Chapter 6: Command Line Interface lacp system-priority Description: Set LACP system priority. Syntax: lacp system-priority <1..65535> Parameters: <1..65535> specifies the LACP system priority. no lacp system-priority Description: Set LACP system priority to the default value 32768. show lacp status Description: Show LACP enable/disable status and system priority. show lacp Description: Show LACP information. Switch(config)# show lacp status LACP is enabled.
Chapter 6: Command Line Interface show lacp port Description: Show LACP information by port. Syntax: show lacp port Parameters: specifies the port to be shown. NOTE: If VLAN group exists, all of the members of static trunk group must be in same VLAN group. VLAN Configuration Virtual LANs A Virtual LAN (VLAN) is a logical network group that limits the broadcast domain. It allows you to isolate network traffic so only members of the VLAN receive traffic from the same VLAN members.
Chapter 6: Command Line Interface 2 can only be forwarded to port 1. That means the computer A can send packets to computer B, and vice versa. The same situation also occurred in VLAN 2. The computer C and D can communicate with each other. However, the computers in VLAN 1 can not see the computers in VLAN 2 since they belonged to different VLANs. IEEE 802.
Chapter 6: Command Line Interface vlan mode Description: Change VLAN mode. Syntax: vlan mode (disabled|port-based|dot1q) Parameters: (disabled | port-based | dot1q) specifies the VLAN mode. NOTE: Change the VLAN mode for every time, user have to restart the switch for valid value. Advanced 802.1Q VLAN Configuration Ingress filters configuration When a packet was received on a port, you can govern the switch to drop it or not if it is an untagged packet.
Chapter 6: Command Line Interface NOTE: Change the VLAN mode for every time, user have to restart the switch for valid value. vlan mode Description: Add or edit VLAN entry. Syntax: vlan add <1-4094> NAME (cpu-port|no-cpu-port) LIST [LIST] Parameters: <1-4094> specifies the VLAN id or Group id (if port based VLAN mode) NAME specifies the VLAN group name. (cpu-port|no-cpu-port) specifies the CPU port belong this VLAN group. LIST specifies the ports to be set to VLAN members.
Chapter 6: Command Line Interface show vlan Description: Show VLAN entry information. Syntax: show vlan [<1-4094>] Parameters: <1-4094> specifies the VLAN id, null means all valid entries. e.g.
Chapter 6: Command Line Interface Switch(config)# show vlan 1 VLAN :1 Type : Static Creation Time (sec.
Chapter 6: Command Line Interface show vlan static Description: Show static VLAN entry information. show vlan pvid Description: Show port default VLAN id. Syntax: show vlan pvid [LIST] Parameters: [LIST] specifies the ports to be showed. If not entered, all port’s PVID will be showed. e.g.
Chapter 6: Command Line Interface Switch(config)# show vlan pvid Port | PVID -----------+------Port1 | 1 Port2 | 1 Port3 | 1 Port4 | 1 Port5 | 1 Port6 | 1 Port7 | 1 Port8 | 1 Port9 | 1 Port10 | 1 Port11 | 1 Port12 | 1 Port13 | 1 Port14 | 1 Port15 | 1 Port16 | 1 Port17 | 1 Port18 | 1 Port19 | 1 Port20 | 1 Port21 | 1 --More-Port22 | 1 Port25 | 1 Port26 | 1 Trk1 | 1 162 GE-DS-82 and 82-PoE Ethernet Managed Switch User Manual
Chapter 6: Command Line Interface vlan filter Description: Set ingress filter rules. Syntax: vlan filter (enable | disable) (enable | disable) LIST Parameters: (enable | disable) specifies the non-members packet will be forwarded or not. If set enable, forward only packets with VID matching this port's configured VID. (enable | disable) specifies the untagged frame will be dropped or not. If set enable, drop untagged frame. show vlan filter Description: Show VLAN filter setting.
Chapter 6: Command Line Interface Switch(config)# show vlan filter Port | Rule 1 | Rule 2 Filter (nonmbr) (untag) -----------+------------+--------Port1 | Drop | Forward Port2 | Drop | Forward Port3 | Drop | Forward Port4 | Drop | Forward Port5 | Drop | Forward Port6 | Drop | Forward Port7 | Drop | Forward Port8 | Drop | Forward Port9 | Drop | Forward Port10 | Drop | Forward Port11 | Drop | Forward Port12 | Drop | Forward Port13 | Drop | Forward Port14 | Drop | Forward Port15 | Drop | Forward Port16 | Drop
Chapter 6: Command Line Interface Misc Configuration no mac-age-time Description: Set MAC address age-out time. Syntax: [no] mac-age-time Enable or disable MAC address age-out. mac-age-time <6..1572858> Parameters: <6..1572858> specifies the MAC address age-out time. Must be divisible by 6. Type the number of seconds that an inactive MAC address remains in the switch’s address table. show mac-age-time Description: Show MAC address age-out time.
Chapter 6: Command Line Interface broadcast select Description: Select the Broadcast storm filter packet type: Unicast/Multicast: Flood unicast/multicast filter Control Packets: Control packets filter IP multicast: IP multicast packets filter Broadcast Packets: Broadcast Packets filter Syntax: broadcast select Collision-Retry Description: Collision-Retry setting Syntax: Collision-Retry < off | 16 | 32 | 48 > Parameters: 16\32\48 – In Half-Dup
Chapter 6: Command Line Interface Administration Configuration Change Username / Password hostname Description: Set switch name. Syntax: hostname Parameters: specifies the switch name. If you would like to have spaces within the name, use quotes (“”) around the name. no hostname Reset the switch name to factory default setting. [no] password Description: Set or remove username and password for manager or operator.
Chapter 6: Command Line Interface IP Configuration User can configure the IP setting and fill in the new value. ip address Description: Set IP address and subnet mask. Syntax: ip address ip default-gateway Description: Set the default gateway IP address. Syntax: ip default-gateway show ip Description: Show IP address, subnet mask, and the default gateway. show info Description: Show basic information, including system info, MAC address, and versions.
Chapter 6: Command Line Interface dhcp Description: Set switch as dhcp client, it can get ip from dhcp server. NOTE: If you set this command, the switch will reboot. show dhcp Description: Show dhcp enable/disable. Reboot switch boot Description: Reboot (warm-start) the switch. Reset to Default erase startup-config Description: Reset configurations to default factory settings at next boot time.
Chapter 6: Command Line Interface TFTP Update Firmware copy tftp firmware Description: Download firmware from TFTP server. Syntax: copy tftp firmware Parameters: specifies the IP address of the TFTP server. specifies the file to be downloaded from the TFTP server. Restore Configure File copy tftp Description: Retrieve configuration from the TFTP server.
Chapter 6: Command Line Interface Backup Configure File copy tftp Description: Send configuration to the TFTP server. If you want to save the configuration in a text file of CLI commands, use the keywordrunning-config. If you want to save the configuration flash image instead, use the keyword flash. Syntax: copy tftp Parameters: specifies the IP address of the TFTP server.
Chapter 6: Command Line Interface MAC limit MAC limit allows users to set a maximum number of MAC addresses to be stored in the MAC address table. The MAC addresses chosen to be stored in MAC address table is the result of first-come-first-save policy. Once a MAC address is stored in the MAC address table, it stays in until it is aged out. When an “opening” is available, the switch stored the first new MAC address it sees in that opening.
Chapter 6: Command Line Interface Port Mirroring Configuration Port monitoring is a feature to redirect the traffic occurred on every port to a designated monitoring port on the switch. With this feature, the network administrator can monitor and analyze the traffic on the entire LAN segment. In the Managed Switch, you can specify one port to be the monitored ports and any single port to be the monitoring port. You also can specify the direction of the traffic that you want to monitor.
Chapter 6: Command Line Interface Quality of Service There are four transmission queues with different priorities in the Managed Switch: Highest, SecHigh, SecLow and Lowest. The Managed Switch will take packets from the four queues according to its QoS mode setting. If the QoS mode was set to "Disable", the Managed Switch will not perform QoS on its switched network.
Chapter 6: Command Line Interface priority packets sent before one lower priority packet is sent. For example, 8 Highest:4 second-high means that the switch sends 8 highest-priority packets before sending 4 second-high priority packets. • QoS level: 0-7 priority level can map to highest, second-high, second-low, lowest queue. qos priority Description: Set 802.1p priority.
Chapter 6: Command Line Interface show qos Description: Show QoS configurations, including802.1p priority, priority level. e.g. Switch(config)# show qos QoS configurations: QoS mode: weighted round robin Highest weight: 8 Second High weight: 4 Second Low weight: 2 Lowest weight: 1 802.1p priority[0-7]: Lowest Lowest SecLow SecLow SecHigh SecHigh Highest Highest Per Port Priority port priority Description: Set port priority.
Chapter 6: Command Line Interface MAC Address Configuration clear mac-address-table Description: Clear all dynamic MAC address table entries. mac-address-table static Description: Set static unicast or multicast MAC address. If multicast MAC address (address beginning with 01:00:5E) is supplied, the last parameter must be port-list. Otherwise, it must be port-id.
Chapter 6: Command Line Interface show mac-address-table static Description: Display static MAC address table entries. show mac-address-table multicast Description: Display multicast-related MAC address table. smac-address-table static Description: Set static unicast or multicast MAC address in secondary MAC address table. If multicast MAC address (address beginning with 01:00:5E) is supplied, the last parameter must be port-list. Otherwise, it must be port-id.
Chapter 6: Command Line Interface show filter Description: Display filter MAC address table. STP/RSTP Commands [no] spanning-tree Description: Enable or disable spanning-tree. spanning-tree forward-delay Description: Set spanning tree forward delay used, in seconds. Syntax: spanning-tree forward-delay <4-30> Parameters: <4-30> specifies the forward delay, in seconds. Default value is 15.
Chapter 6: Command Line Interface spanning-tree maximum-age Description: Set spanning tree maximum age, in seconds. Syntax: spanning-tree maximum-age <6-40> Parameters: <6-40> specifies the maximum age, in seconds. Default value is 20. NOTE: The parameters must enforce the following relationships: 2*(hello-time + 1) <= maximum-age <= 2*(forward-delay - 1). spanning-tree priority Description: Set spanning tree bridge priority.
Chapter 6: Command Line Interface Description: Set spanning tree port priority. Syntax: spanning-tree port priority <0-240> [] Parameters: <0-240> specifies the port priority. The value must be in steps of 16. specifies the ports to be set. Null means all ports. show spanning-tree Description: Show spanning-tree information. show spanning-tree port Description: Show spanning tree per port information.
Chapter 6: Command Line Interface spanning-tree protocol version Description: Change spanning tree protocol version. Syntax: spanning-tree protocol-version Parameters: stp specifies the original spanning tree protocol (STP,802.1d). rstp specifies rapid spanning tree protocol (RSTP,802.1w). [no] spanning-tree port mcheck Description: Force the port to transmit RST BPDUs. No format means not force the port to transmit RST BPDUs.
Chapter 6: Command Line Interface [no] spanning-tree port non-stp Description: Disable or enable spanning tree protocol on this port. Syntax: [no] spanning-tree port non-stp [] Parameters: specifies the ports to be set. Null means all ports. spanning-tree point-to-point mac Description: Set the port to be point to point connection. Syntax: spanning-tree port point-to-point-mac [] Parameters: auto specifies point to point link auto connection.
Chapter 6: Command Line Interface SNMP Any Network Management system running the simple Network Management Protocol (SNMP) can be managed by the switch. System Options Snmp /no snmp Description: Enable or disable SNMP. Show snmp status Description: Show the enable or disable status of SNMP. Snmp system-name Description: Set agent system name string. Syntax: snmp system-name Parameters: specifies the system name string. e.g.
Chapter 6: Command Line Interface Snmp system-location Description: Set agent location string. Syntax: snmp system-location Parameters: specifies the location string. e.g. snmp system-location office Snmp system-contact Description: Set agent system contact string. Syntax: snmp system-contact Parameters: specifies the contact string. e.g. snmp system-contact abc@sina.com show snmp system Description: Show SNMP system information.
Chapter 6: Command Line Interface Community Strings snmp community Description: Set SNMP community string. Syntax: snmp community Parameters: specifies the community string. e.g. snmp community read-all-only public no snmp community Description: Delete SNMP community string. Syntax: no snmp community Parameters: specifies the community string. e.g.
Chapter 6: Command Line Interface Trap Managers snmp trap Description: Set SNMP trap receiver IP address, community string, and port number. Syntax: snmp trap [] [<1..65535>] Parameters: specifies the IP address. specifies the community string. <1..65535> specifies the trap receiver port number. e.g. snmp trap 192.168.200.1 public no snmp trap Description: Remove trap receiver IP address and port number. Syntax: no snmp trap [<1..
Chapter 6: Command Line Interface IGMP The Internet Group Management Protocol (IGMP) is an internal protocol of the Internet Protocol (IP) suite. igmp Description: Enable/disable IGMP snooping. Syntax: [no] igmp igmp fastleave Description: Enable/disable IGMP snooping fast leave. If enable, switch will fast delete member who send leave report, else wait one sec. Syntax: [no] igmp fastleave igmp querier Description: Enable/disable IGMP snooping querier.
Chapter 6: Command Line Interface igmp debug Description: Enable/disable IGMP snooping debugging output. Syntax: [no] igmp debug show igmp Description: Show IGMP snooping information. Syntax: show igmp Parameters: status specifies IGMP snooping status and statistics information. router specifies IGMP snooping router's IP address. groups specifies IGMP snooping multicast group list. table specifies IGMP snooping IP multicast table entries.
Chapter 6: Command Line Interface 802.1x Protocol dot1x Description: Enable or disable 802.1x. Syntax: [no] dot1x radius-server host Description: Set radius server IP, port number, and accounting port number. Syntax: radius-server host <1024..65535> <1024..65535> Parameters: specifies server's IP address. The first <1024..65535> specifies the server port number. The second <1024..65535> specifies the accounting port number. radius-server key Description: Set 802.1x shared key.
Chapter 6: Command Line Interface radius-server nas Description: Set 802.1x NAS identifier. Syntax: radius-server nas Parameters: specifies NAS identifier string. show radius-server Description: Show radius server information, including radius server IP, port number, accounting port number, shared key, NAS identifier, dot1x timeout quiet-period Description: Set 802.1x quiet period. (default: 60 seconds) Syntax: dot1x timeout quiet-period <0..65535> Parameters: <0..
Chapter 6: Command Line Interface dot1x timeout supplicant Description: Set 802.1x supplicant timeout (default: 30 seconds) Syntax: dot1x timeout supplicant <1..300> Parameters: <1..300> specifies the supplicant timeout, in seconds. dot1x timeout radius-server Description: Set radius server timeout (default: 30 seconds). Syntax: dot1x timeout radius-server <1..300> Parameters: <1..300> specifies the radius server timeout, in seconds. dot1x max-req Description: Set 802.
Chapter 6: Command Line Interface show dot1x Description: Show 802.1x information, quiet period, Tx period, supplicant timeout, server timeout, maximum requests, and re-auth period. dot1x port Description: Set 802.1x per port information. Syntax: dot1x port Parameters: fu specifies forced unauthorized. fa specifies forced authorized. au specifies authorization. no specifies disable authorization. specifies the ports to be set.
Chapter 6: Command Line Interface Access Control List Packets can be forwarded or dropped by ACL rules include Ipv4 or non-Ipv4. The Managed Switch can be used to block packets by maintaining a table of packet fragments indexed by source and destination IP address, protocol, and so on. Ipv4 ACL commands no acl Description: Delete ACL group. Syntax: no acl <1-220> Parameters: <1-220> specifies the group id. e.g. no acl 1 no acl count Description: Reset the ACL group count.
Chapter 6: Command Line Interface show acl Description: Show ACL group information. Syntax: show acl [<1-220>] Parameters: <1-220> specifies the group id, null means all valid groups. e.g.
Chapter 6: Command Line Interface acl (add|edit) <1-220> (permit|deny) <0-4094> ipv4 <0-255> Description: Add or edit ACL group for Ipv4. Syntax: acl (add|edit) <1-220> (permit|deny) <0-4094> ipv4 <0-255> A.B.C.D A.B.C.D A.B.C.D A.B.C.D (check|unCheck) <0-65535> <0-26> Parameters: (add|edit) specifies the operation. <1-220> specifies the group id. (permit|deny) specifies the action. permit: permit packet cross switch; deny: drop packet. <0-4094> specifies the VLAN id. 0 means don't care.
Chapter 6: Command Line Interface acl (add|edit) <1-220> (qosvoip) <0-4094> Description: Add or edit ACL group for Ipv4. Syntax: acl (add|edit) <1-220> (qosvoip) <0-4094> <0-7> <0-1F> <0-1F> <0-FF> <0-FF> <0FFFF> <0-FFFF> <0-FFFF> <0-FFFF> Parameters: (add|edit) specifies the operation. <1-220> specifies the group id. (qosvoip) specifies the action, do qos voip packet adjustment. <0-4094> specifies the VLAN id. 0 means don't care. <0-1F> specifies the port ID value. <0-1F> specifies the port ID mask.
Chapter 6: Command Line Interface acl (add|edit) <1-220> (permit|deny) <0-4094> nonipv4 <0-65535> Description: Add or edit ACL group for non-Ipv4. Syntax: acl (add|edit) <1-220> (permit|deny) <0-4094> nonipv4 <0-65535> Parameters: (add|edit) specifies the operation. <1-220> specifies the group id. (permit|deny) specifies the action. permit: permit packet cross switch; deny: drop packet. <0-4094> specifies the VLAN id. 0 means don't care. <0-65535> specifies the Ether Type. 0 means don't care. e.g.
Chapter 6: Command Line Interface Binding Let device that has specific IP address and MAC address can use network. We can set specific IP address, MAC address, VLAN id and port id to bind, and device can cross switch if all conditions match. SIP/SMAC binding commands bind Description: Enable binding function. no bind Description: Disable binding function. no bind Description: Delete Binding group. Syntax: no bind <1-220> Parameters: <1-220> specifies the group id. e.g.
Chapter 6: Command Line Interface show bind Description: Show Binding group information. Syntax: show bind [<1-220>] Parameters: <1-220> specifies the group id, null means all valid groups. e.g. show bind 1 bind add Description: Add Binding group. Syntax: bind add <1-220> A:B:C:D:E:F <0-4094> A.B.C.D <1-26> Parameters: <1-220> specifies the group id. A.B.C.D specifies the MAC address. <0-4094> specifies the VLAN id. 0 means don't care. A.B.C.D specifies the Source IP address. 0.0.0.0 means don't care. A.B.
Chapter 6: Command Line Interface Power over Ethernet Commands (GE DS-82-PoE) show poe Show System Power over Ethernet information show poe status Show PoE port information poe temperature-protection Enabling or disabling the PoE power supply over temperature protection poe limit-mode Configure System PoE power limit mode information poe enable Enabling or disabling the port POE injects function poe priority Set port priority for the power supply management poe maximum-power Enabling or disabl
Chapter 6: Command Line Interface show poe status Description: Show per PoE port information Command Level Global Configuration Syntax: show poe status [] Parameters: specifies the ports to be set. If not entered, all ports are set. Example 1: Switch(config)# show poe status 1 Port Admin Oper Priority Power Limit[W] Current Device Current[mA] Consumption [W] Class Port1 Enable on Low 15.4 13.
Chapter 6: Command Line Interface Configure PoE Over Temperature Protection poe temperature-protection enable[x4] Description: Configure PoE over temperature protection to enable or disable Command Level Global Configuration Syntax: poe temperature-protection { enable / disable } Parameters: Enable PoE power budget change automatically by detected PoE unit temperature Disable PoE power budget change automatically NOTE: PoE temperature-protection working in Priority mode or Total Limit
Chapter 6: Command Line Interface Example: Switch(config)# poe limit-mode port-priority Switch (config)# show poe Maximum Available Power :190Watts System Operation Status : on PoE Power Consumption : 55 watts Usage Threshold : 21% PoE Power limit mode : Port Priority Switch (config)# no poe limit-mode Switch (config)# show poe 204 Maximum Available Power :190Watts System Operation Status : on PoE Power Consumption : 55 watts Usage Threshold : 21% PoE Power limit mode : No Limit GE
Chapter 6: Command Line Interface Configure PoE -- Port poe enable Description: Enabling or disabling the port POE injects function. Command Level: Global Configuration Syntax: poe enable [] [no] poe enable [] Parameters: specifies the ports to be set. If not entered, all ports are set.
Chapter 6: Command Line Interface poe priority Description: Set port priority for the power supply management. The command is configurable while "poe limit-mode" is set to "Port Priority" Command Level: Global Configuration Syntax: poe priority { Critical | High | Low} [] Parameters: {Critical | High | Low} • Critical - Indicates that operating the powered device is high. • High- Indicates that operating the powered device has medium priority.
Chapter 6: Command Line Interface poe maximum-power Description: Enabling or disabling per port power output limit. The command is configurable while "poe limit-mode" is set to "Total-Limit" Command Level: Global Configuration Syntax: poe maximum-power <1-15.4> [] no poe mximum-power [] Parameters: <1-15.4> specifies the ports to be set. If not entered, all ports are set.
Chapter 6: Command Line Interface 208 GE-DS-82 and 82-PoE Ethernet Managed Switch User Manual
Chapter 7 Switch Operation Address Table The Switch is implemented with an address table. This address table composed of many entries. Each entry is used to store the address information of some node in network, including MAC address, port no, etc. This information comes from the learning process of Ethernet Switch. Learning When one packet comes in from any port, the Switch will record the source address, port no. And the other related information in address table.
Chapter 7: Switch Operation Store-and-Forward Store-and-Forward is one type of packet-forwarding techniques. A Store-andForward Ethernet Switching stores the incoming frame in an internal buffer, do the complete error checking before transmission. Therefore, no error packets occurrence, it is the best choice when a network needs efficiency and stability.
Chapter 8 Power Over Ethernet Overview What is PoE? Based on the global standard IEEE 802.3af, PoE is a technology for wired Ethernet, the most widely installed local area network technology adopted today. PoE allows the electrical power necessary for the operation of each end-device to be carried by data cables rather than by separate power cords. New network applications, such as IP Cameras, VoIP Phones, and Wireless Networking, can help enterprises improve productivity.
Chapter 8: Power Over Ethernet Overview PoE System Architecture The specification of PoE typically requires two devices: the Powered Source Equipment (PSE) and the Powered Device (PD). The PSE is either an End-Span or a MidSpan, while the PD is a PoE-enabled terminal, such as IP Phones, Wireless LAN, etc. Power can be delivered over data pairs or spare pairs of standard CAT-5 cabling.
Chapter 8: Power Over Ethernet Overview The data pairs are used. Since Ethernet pairs are transformer coupled at each end, it is possible to apply DC power to the center tap of the isolation transformer without upsetting the data transfer. In this mode of operation the pair on pins 3 and 6 and the pair on pins 1 and 2 can be of either polarity.
Chapter 8: Power Over Ethernet Overview http://www.poweroverethernet.com/articles.php?article_id=52 Microsemi /PowerDsine http://www.microsemi.com/PowerDsine/ Linear Tech http://www.linear.com/ The PoE Provision Process While adding PoE support to networked devices is relatively painless, it should be realized that power cannot simply be transferred over existing CAT-5 cables.
Chapter 8: Power Over Ethernet Overview Line Detection Before power is applied, safety dictates that it must first be ensured that a valid PD is connected to the PSE's output. This process is referred to as "line detection", and involves the PSE seeking a specific, 25 KO signature resistor. Detection of this signature indicates that a valid PD is connected, and that provision of power to the device may commence.
Chapter 8: Power Over Ethernet Overview Power Overloads The IEEE 802.3af standard defines handling of overload conditions. In the event of an overload (a PD drawing a higher power level than the allowed 12.95 Watts), or an outright short circuit caused by a failure in cabling or in the PD, the PSE must shut down power within 50 to 75 milliseconds, while limiting current drain during this period to protect the cabling infrastructure.
Chapter 9 Troubleshooting This chapter contains information to help you solve common problems. If the Ethernet Switch is not functioning properly, make sure the Ethernet Switch was set up according to the instructions in this manual. The Link LED is not lit Solution: Check the cable connection and remove duplex mode of the Ethernet Switch Some stations cannot talk to other stations located on the other port Solution: Check the VLAN settings, trunk settings, or port enabled / disabled status.
Chapter 9: Troubleshooting 4. Make sure the cable is the right type 5. Turn off the power. After a while, turn on power again 100Base-TX port link LED is lit, but the traffic is irregular Solution: Check that the attached device is not set to dedicate full duplex. Some devices use a physical or software switch to change duplex modes. Auto-negotiation may not recognize this type of full-duplex setting. Switch does not power up Solution: 1. AC power cord not inserted or faulty 2.
Appendix A RJ-45 Pin Assignment Switch's RJ-45 Pin Assignments 1000Mbps, 1000Base T Contact MDI MDI-X 1 BI_DA+ BI_DB+ 2 BI_DA- BI_DB- 3 BI_DB+ BI_DA+ 4 BI_DC+ BI_DD+ 5 BI_DC- BI_DD- 6 BI_DB- BI_DA- 7 BI_DD+ BI_DC+ 8 BI_DD- BI_DC- Implicit implementation of the crossover function within a twisted-pair cable, or at a wiring panel, while not expressly forbidden, is beyond the scope of this standard.
Appendix A: RJ-45 Pin Assignment 10/100Mbps, 10/100Base-TX When connecting your 10/100Mbps Ethernet Switch to another switch, a bridge or a hub, a straight or crossover cable is necessary. Each port of the Switch supports auto-MDI/MDI-X detection. That means you can directly connect the Switch to any Ethernet devices without making a crossover cable.
Appendix A: Power Over Ethernet Overview Figure 101: Straight-Through and Crossover Cable Straight Cable 1 2 3 4 5 6 7 8 SIDE 1 4 5 6 7 8 SIDE 2 Crossover Cable 1 2 3 4 5 6 7 8 SIDE 1 5 6 7 8 SIDE 2 1 1 2 2 3 3 4 SIDE 1 1 = White / Orange 2 = Orange 3 = White / Green 4 = Blue 5 = White / Blue 6 = Green 7 = White / Brown 8 = Brown SIDE2 1 = White / Orange 2 = Orange 3 = White / Green 4 = Blue 5 = White / Blue 6 = Green 7 = White / Brown 8 = Brown SIDE 1 1 = White / Orange 2 =