GE Security GE-DS-242-PoE Managed Ethernet Switch User Manual P/N 1069174 • REV 1.
Copyright © 2010 GE Security, Inc. This document may not be copied in whole or in part or otherwise reproduced without prior written consent from GE Security, Inc., except where specifically permitted under US and international copyright law. Disclaimer The information in this document is subject to change without notice. GE Security, Inc.
Content Chapter 1 Introduction 1 Package Contents 2 Product Description 2 How to Use this Manual 3 Product Features 4 Product Specifications 7 Chapter 2 Installation 11 Hardware Description 12 Switch Installation 15 Chapter 3 Switch Management 21 Requirements 22 Management Access Overview 22 Web Management 23 SNMP-Based Network Management 25 Administration Console 25 Protocols 27 Management Architecture 28 Chapter 4 Web-Based Management 29 About Web-based Management 29 System 34 VLAN Configuration 54 Rapid
Chapter 6 Command Line Interface 127 Operation Notice 127 System Commands 128 Switch Static Configuration 129 Trunk Configuration 135 VLAN Configuration 138 Misc Configuration 147 Administration Configuration 149 MAC limit 154 Port Mirroring Configuration 155 Quality of Service 156 MAC Address Configuration 159 STP/RSTP Commands 162 SNMP 167 IGMP 171 802.
Chapter 1 Introduction The GE Security GE-DS-242-PoE offers 24 10/100Mbps Fast Ethernet ports with 2 Gigabit TP/SFP combo ports (Port-25, 26). The two Gigabit TP/SFP combo ports can be either 1000Base-T for 10/100/1000Mbps or 1000Base-SX/LX through SFP (Small Form-Factor Pluggable) interface. The GE-DS-242-PoE has a high performance switch architecture that is capable of providing non-blocking switch fabric and wire-speed throughput as high as 8.8Gbps.
Chapter 1: Introduction Package Contents What’s in the box Open the Managed Switch box and carefully unpack it. The box should contain the following items: The Managed Switch x1 User’s manual CD x1 Installation Sheet x1 19” Rack mount accessory kit x1 Power cord x1 Rubber feet X4 RS-232 cable x1 If any of these are missing or damaged, please contact your dealer immediately.
Chapter 1: Introduction Power Over Ethernet The PoE in-line power following the standard IEEE 802.3af makes the GE-DS-242-PoE able to power on 24 PoE devices at a distance of up to 100 meters through the 4-pair Cat 5/5e UTP wire. Cost-effective solution with SNMP monitor for Network deployment GE Security releases the cost-effective Managed Switch not only for catering to the need of easy WEB-based management, but also the centralized SNMP application to monitor the status of Switch and traffic per port.
Chapter 1: Introduction Product Features • Physical Port o 24-Port 10/100Base-TX RJ-45 with PoE Injector o 2-Port Gigabit TP/SFP combo interfaces o Reset button for system management o 1 RS-232 male DB9 console interface for Switch basic management and setup • Layer 2 Features o Complies with the IEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.
Chapter 1: Introduction IEEE 802.1p Class of Service IP TOS / DSCP code priority Port Base priority o Strict priority and weighted round robin (WRR) CoS policies o Ingress/Egress Bandwidth control on each port • Multicast o IGMP Snooping v1 and v2 o IGMP Query mode for Multicast Media application o 256 multicast groups • Security o Layer 2 / 3 / 4 Access Control List (ACL) o IEEE 802.
Chapter 1: Introduction o Auto detect powered device (PD) o Circuit protection prevent power interference between ports o Remote power feeding up to 100m o PoE Management Total PoE power budget control Per port PoE function enable/disable PoE Port Power feeding priority Per PoE port power limit PD classification detection PoE Power Supply Over temperature Protection 6 GE-DS-242-PoE Managed Ethernet Switch User Manual
Chapter 1: Introduction Product Specifications GE-DS-242-PoE HARDWARE SPECIFICATIONS 10/100Mbps Copper Ports 24 10/100Base-TX RJ-45 Auto-MDI/MDI-X ports 1000Mbps Copper Ports 2 10/100/1000Base-T RJ-45 port SFP/mini-GBIC Slots 2 SFP interfaces, shared with Port-25 and Port-26 Switch Architecture Store-and-Forward Switch Fabric 8.8Gbps / non-blocking Switch Throughput 6.
Chapter 1: Introduction Port disable/enable Port Configuration Auto-negotiation 10/100Mbps full and half duplex mode selection Flow Control disable / enable Bandwidth control and broadcast storm filter on each port Port Status VLAN Spanning Tree Display each port's speed duplex mode, link status, flow control status, auto-negotiation status Port-Based VLAN, up to 26 VLAN groups IEEE 802.1q Tagged Based VLAN , 4K VLAN ID, up to 256 VLAN groups IEEE 802.1d Spanning Tree IEEE 802.
Chapter 1: Introduction PoE Power Supply Type End-Span PoE Power Output Per Port 48V DC, 350mA . Max. 15.4 watts Power Pin Assignment 1/2(+), 3/6(-) PoE Power Budget 380 Watts Max. number of Class 2 PD 24 Max. number of Class 3 PD 24 Standards Conformance Safety FCC Part 15 Class A, CE IEEE 802.3 10Base-T IEEE 802.3u 100Base-TX IEEE 802.3z Gigabit SX/LX IEEE 802.3ab Gigabit 1000Base-T IEEE 802.3x Flow Control and Back pressure Standards Compliance IEEE 802.1d Spanning tree protocol IEEE 802.
Chapter 1: Introduction 10 GE-DS-242-PoE Managed Ethernet Switch User Manual
Chapter 2 Installation This section describes the hardware features and installation of the Managed Switch on the desktop or rack mount. For easier management and control of the Managed Switch, familiarize yourself with its display indicators and ports. Front panel illustrations in this chapter display the unit’s LED indicators. Read this chapter completely before connecting any network device to the Managed Switch.
Chapter 2: Installation Hardware Description Switch Front Panel The Switches front panel provides a simple interface for monitoring the Managed Switch. Figure 2-1 shows the front panel of the Managed Switch. Figure 2-1: GE-DS-242-PoE Switch front panel 10/100Mbps TP Interface Port-1~Port-24: 10/100Base-TX Copper, RJ-45 Twist-Pair: Up to 100 meters. Gigabit TP Interface Port-25, Port-26: 10/100/1000Base-T Copper, RJ-45 Twist-Pair: Up to 100 meters.
Chapter 2: Installation Reset button At the left of front panel, the Reset button is designed to reboot the Managed Switch without turning the power off. The following table summarizes the Reset button functions: Reset Button Pressed and Released Function About 1~3 seconds Reboots the Managed Switch Resets the Managed Switch to Factory Default configuration.
Chapter 2: Installation • System • LED Color Function PWR Green Lit: indicates there is power to the Switch Per 10/100Base-TX, PoE interfaces (Port-1 to Port-24) LED LNK/ACT Color Green Function Lit: indicates the link through that port is successfully established Blink: indicares the Switch is actively sending or receiving data over that port Lit: indicates the port is providing 48VDC in-line power PoE In Use • Orange Off: indicates the connected device is not a PoE Powered Device (PD) P
Chapter 2: Installation Switch Rear Panel The rear panel of the Managed Switch includes an AC inlet power socket, which accepts input power from 100 to 240VAC, 50-60 Hz. Figure 2-3 shows the rear panel of the Managed Switch. Figure 2-3: GE-DS-242-PoE Rear panel 3 2 POWER NOTICE: 1. The Managed Switch is a power-required device: it will not work unless it is receiving power.
Chapter 2: Installation Step 3: Ensure there is enough ventilation space between the Managed Switch and surrounding objects. Figure 2-4: Typical placement of GE-DS-242-PoE on desktop NOTE: Connection to the Managed Switch requires UTP Category 5 network cabling with RJ-45 tips. Refer to the Cabling Specification in Appendix A for further information. Step 4: Connect the Managed Switch to network devices. A.
Chapter 2: Installation Step 1: Place the Managed Switch on a hard flat surface, with the front panel positioned towards the front. CAUTION: Use only the screws supplied with the mounting brackets. Damage caused by using incorrect screws will invalidate the warranty. Step 2: Attach the rack-mount bracket to each side of the Managed Switch. Use the supplied screws attached to the package. Figure 2-5 shows how to attach brackets to one side of the Managed Switch.
Chapter 2: Installation Step 6: Follow steps 4 and 5 of the Desktop Installation section to connect the network cabling and supply power to the Managed Switch. SFP Transceiver Installation This section describes how to insert an SFP transceiver into an SFP slot. SFP transceivers are hot pluggable and hot swappable. You can insert and remove a transceiver to and from any SFP port without powering down the Managed Switch, as shown in Figure 2-7.
Chapter 2: Installation Before connecting the other switches, workstations or Media Converter: 1. Make sure both sides of the SFP transceiver are the same media type (for example: 1000Base-SX to 1000Base-SX, 1000Bas-LX to 1000Base-LX). 2. Verify that the fiber-optic cable type matches the SFP transceiver model. • To connect to the 1000Base-SX SFP transceiver, use multi-mode fiber cable (one side must be male duplex LC connector type).
Chapter 2: Installation Figure 2-8: Pulling out the SFP transceiver CAUTION: Never pull out the module without pulling the handle or the push bolts on the module. Pulling out the module with too much force could damage the module and SFP module slot of the Managed Industrial Switch.
Chapter 3 Switch Management This chapter explains the methods that you can use to configure management access to the Managed Switch. It describes the types of management applications and the communication and management protocols that deliver data between your management device (work-station or personal computer) and the system. It also contains information about port connection options.
Chapter 3: Switch Management Requirements • Workstations of subscribers running Windows 98/ME, NT4.0, 2000/XP, MAC OS9 or later, Linux, UNIX or other platform compatible with TCP/IP protocols. • Workstation installed with Ethernet NIC (Network Interface Card) • Ethernet Port connection • Network cables - Use standard network (UTP) cables with RJ45 connectors.
Chapter 3: Switch Management Table 3-1: Management Methods Comparison Method Web Browser Advantages • Ideal for configuring the switch remotely • Compatible with all popular browsers • Can be accessed from any location Disadvantages • Security can be compromised (hackers need only know the IP address and subnet mask) • May encounter lag times on poor connections • Most visually appealing SNMP Agent • Communicates with switch functions at the MIB level • Based on open standards • Requires SNMP manager
Chapter 3: Switch Management Figure 3-1: Web management setup Figure 3-2: Web main screen of Managed Switch 24 GE-DS-242-PoE Managed Ethernet Switch User Manual
Chapter 3: Switch Management SNMP-Based Network Management You can use an external SNMP-based application to configure and manage the Managed Switch, such as SNMPc Network Manager, HP Openview Network Node Management (NNM) or What'sup Gold. This management method requires the SNMP agent on the switch and the SNMP Network Management Station to use the same community string. This management method, in fact, uses two community strings: the get community string and the set community string.
Chapter 3: Switch Management Figure 3-4: Console management setup Direct Access Direct access to the administration console is achieved by directly connecting a terminal or a PC equipped with a terminal-emulation program (such as HyperTerminal) to the Managed Switch console (serial) port. When using this management method, a straight DB9 RS-232 cable is required to connect the switch to the PC.
Chapter 3: Switch Management You can change these settings, if desired, after you log on. This management method is often preferred because you can remain connected and monitor the system during system reboots. Also, certain error messages are sent to the serial port, regardless of the interface through which the associated action was initiated. A Macintosh or PC attachment can use any terminal-emulation program for connecting to the terminal serial port.
Chapter 3: Switch Management devices and data-collection programs. SNMP runs on top of the User Datagram Protocol (UDP), offering a connectionless-mode service. Management Architecture All of the management application modules use the same Messaging Application Programming Interface (MAPI).
Chapter 4 Web-Based Management Summary This section introduces the configuration and functions of the Web-Based management. About Web-based Management The Managed Switch offers management features that allow users to manage the Managed Switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer. The Web-Based Management supports Internet Explorer 6.0.
Chapter 4: Web-Based Management Requirements • Workstations of subscribers running Windows 98/ME, NT4.0, 2000/2003/XP, MAC OS9 or later, Linux, UNIX or other platform compatible with TCP/IP protocols. • Workstation installed with Ethernet NIC (Network Card). • Ethernet Port connect • Network cables - Use standard network (UTP) cables with RJ45 connectors. • Above PC installed with WEB Browser and JAVA runtime environment Plug-in. It is recommended to use Internet Explorer 6.
Chapter 4: Web-Based Management Figure 4-2: Login screen 1. After entering the username and password, the main screen appears as Figure 4-3. Figure 4-3: Web main page 2. The Switch Menu on the left of the Web page let you access all the commands and statistics the Switch provides. Now, you can use the Web management interface to continue the switch management or manage the Managed Switch by Web interface.
Chapter 4: Web-Based Management NOTE: • We recommend using Internet Explorer 6.0 or above to access Managed Switch. • A changed IP address take effect immediately after click on the Save button, you need to use the new IP address to access the Web interface. • For security reason, please change and memorize the new password after this first setup. • Only enter commands in lowercase letters in the web interface.
Chapter 4: Web-Based Management The port states are illustrated as follows: State Disabled Down Link RJ-45 Ports SFP Ports PoE Ports Main Menu Using the onboard web agent, you can define system parameters, manage and control the Managed Switch, and all its ports, or monitor network conditions. Via the Web-Management, the administrator can setup the Managed Switch by select the functions those listed in the Main Function. The screen in Figure 4-5 appears.
Chapter 4: Web-Based Management System Use the System menu items to display and configure basic administrative details of the Managed Switch.
Chapter 4: Web-Based Management This page includes the following fields: OBJECT DESCRIPTION MODEL NAME Displays the system name of the Managed Switch DESCRIPTION Describes the Managed Switch MAC ADDRESS Displays the unique hardware address assigned by manufacturer (default) FIRMWARE VERSION Displays the Managed Switch's firmware version HARDWARE VERSION Displays the current hardware version Misc Config Choose Misc Config from System Information of Managed Switch, the screen in Figure 4-7 appear
Chapter 4: Web-Based Management This page includes the following fields: OBJECT DESCRIPTION Type the number of seconds that an inactive MAC address remains in MAC Address Age-out Time the switch's address table. The value is a multiple of 6. Default is 300 seconds. Broadcast Storm Filter Mode To configure broadcast storm control, enable it and set the upper threshold for individual ports. The threshold is the percentage of the port's total bandwidth used by broadcast traffic.
Chapter 4: Web-Based Management IP address overview What is an IP address? Each device (such as a computer) which participates in an IP network needs a unique "address" on the network. It's similar to having a US mail address so other people have a know way to send you messages. An IP address is a four byte number, which is usually written in "dot notation" - each of the bytes' decimal value is written as a number, and the numbers are separated by "dots" (aka periods). An example: 199.25.123.
Chapter 4: Web-Based Management Figure 4-8: IP configuration interface This page includes the following fields: OBJECT DESCRIPTION Enable or disable the DHCP client function. DHCP When DHCP function is enabled, the Managed Switch will be assigned an IP address from the network DHCP server. The default IP address will be replaced by the assigned IP address on DHCP server.
Chapter 4: Web-Based Management SNMP Configuration SNMP Overview The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management information between network devices. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth.
Chapter 4: Web-Based Management • Management information base (MIB): A MIB is a collection of managed objects residing in a virtual information store. Collections of related managed objects are defined in specific MIB modules. • Network-management protocol: A management protocol is used to convey management information between agents and NMSs. SNMP is the Internet community's de facto standard management protocol. SNMP Overview SNMP itself is a simple request/response protocol.
Chapter 4: Web-Based Management Figure 4-10: SNMP configuration interface This page includes the following fields: OBJECT System Name DESCRIPTION An administratively assigned name for this managed node. By convention, this is the node's fully-qualified domain name. A domain name is a text string drawn from the alphabet (A-Za-z), digits (0-9), minus sign (-). No space characters are permitted as part of a name. The first character must be an alpha character.
Chapter 4: Web-Based Management Community Strings Community strings serve as passwords and can be entered as one of the following: Figure 4-11: Community strings interface This page includes the following fields: OBJECT DESCRIPTION Here you can define the new community string set and remove the unwanted community string. • String: Fill the name string. Community Strings • RO: Read only. Enables requests accompanied by this community string to display MIB-object information. • RW: Read/write.
Chapter 4: Web-Based Management This page includes the following fields: OBJECT DESCRIPTION IP Address Enter the IP address of the trap manager. Community Enter the community string for the trap station. Firmware Upgrade It provides the functions allowing the user to update the switch firmware via the Trivial File Transfer Protocol (TFTP) server. Before updating, make sure the TFTP server is ready and the firmware image is located on the TFTP server.
Chapter 4: Web-Based Management Figure 4-14: HTTP Firmware Upgrade interface To open Firmware Upgrade screen, perform the following: 1. Click System -> Web Firmware Upgrade. 2. The Firmware Upgrade screen is displayed as in Figure 4-14. 3. Click the "Browse" button of the main page, the Choose file window will appear. 4. Select the firmware file, then click the Open button to load the file. The Firmware upgrade process takes several minutes. Please wait a while, and then manually refresh the webpage.
Chapter 4: Web-Based Management Figure 4-15: Configuration Restore interface This page includes the following fields: OBJECT DESCRIPTION TFTP Server IP Address Type in your TFTP server IP. Restore File Name Type in the correct file name for restoring. TFTP Backup Configuration You can back up the current configuration from flash ROM to the TFTP server for the purpose of recovering the configuration later. It helps you to avoid wasting time on configuring the settings by backing up the configuration.
Chapter 4: Web-Based Management This page includes the following fields: OBJECT DESCRIPTION TFTP Server IP Address Type in your TFTP server IP. Backup File Name Type in the file name. Factory Default Reset Switch to default configuration. Click the reset button to restore all configurations to the default value.
Chapter 4: Web-Based Management System Reboot Reboot the Switch with a software reset. Click the reboot button to reboot the system.
Chapter 4: Web-Based Management Port Configuration In Port control you can configure the settings of each port to control the connection parameters, the status of each port is listed below. Figure 4-19: Port Control interface This page includes the following fields: OBJECT DESCRIPTION Port Use the scroll bar and click on the port number to choose the port to be configured. State Current port state. The port can be set to disable or enable mode.
Chapter 4: Web-Based Management OBJECT DESCRIPTION Port-1 ~ Port-24, supports by-port ingress and egress rate control. For example, assume port 1 is 10Mbps, users can set its effective egress rate at 1Mbps and ingress rate at 500Kbps. Device will perform flow control or backpressure to confine the ingress rate to meet the specified rate. • Ingress: Type the port effective ingress rate. Rate Control The valid range is 0 ~ 8000. The unit is 128K. (Unit: 128KBbps) 0: disable rate control.
Chapter 4: Web-Based Management Port Status This page displays current port configurations and operating status - it is a ports' configurations summary table. Via the summary table, you can learn the status of each port at a glance, like Port Link Up/Link Down status, negotiation, Link Speed, Rate Control, Duplex mode and Flow Control.
Chapter 4: Web-Based Management Port Statistics The following chart provides the current statistic information, which displays the realtime packet transfer status for each port. The user might use the information to plan and implement the network, or check and find the problem when the collision or heavy traffic occurs. Figure 4-21: Port Statistics interface This page includes the following fields: OBJECT DESCRIPTION Port The port number.
Chapter 4: Web-Based Management OBJECT DESCRIPTION Packet Dropped The counts of dropped packet. Rx Bcast Packet The counts of broadcast packet. Rx Mcast Packet The counts of multicast packet. Port Sniffer The Port Sniffer (mirroring) is a method for monitor traffic in switched networks. Traffic through a port can be monitored by one specific port. That is, traffic goes in or out a monitored port will be duplicated into sniffer port.
Chapter 4: Web-Based Management Figure 4-23: Port Sniffer interface This page includes the following fields: OBJECT DESCRIPTION Select a sniffer mode: • Disable Sniffer Type • Rx • Tx • Both Analysis (Monitoring) Port It' means Analysis port can be used to see the traffic on another port you want to monitor. You can connect Analysis port to LAN analyzer or netxray. Monitored Port The port you want to monitor. The monitor port traffic will be copied to Analysis port.
Chapter 4: Web-Based Management VLAN Configuration VLAN Overview A Virtual Local Area Network (VLAN) is a network topology configured according to a logical scheme rather than the physical layout. VLAN can be used to combine any collection of LAN segments into an autonomous user group that appears as a single LAN. VLAN also logically segment the network into different broadcast domains so that packets are forwarded only between ports within the VLAN.
Chapter 4: Web-Based Management on another switch port, VLAN considerations come into play to decide if the packet is dropped by the Switch or delivered. IEEE 802.1Q VLANs IEEE 802.1Q (tagged) VLAN are implemented on the Switch. 802.1Q VLAN require tagging, which enables them to span the entire network (assuming all switches on the network are IEEE 802.1Q-compliant). VLAN allow a network to be segmented in order to reduce the size of broadcast domains.
Chapter 4: Web-Based Management 802.1Q Tag User Priority CFI 3 bits TPID (Tag Protocol Identifier) Destination Address 6 bytes Source Address 2 bytes Ethernet Type VLAN TAG 6 bytes 12 bits TCI (Tag Control Information) 2 bytes Preamble VLAN ID (VID) 1 bits 4 bytes 2 bytes Data 46-1517 bytes FCS 4 bytes The Ether Type and VLAN ID are inserted after the MAC source address, but before the original Ether Type/Length or Logical Link Control.
Chapter 4: Web-Based Management for tagged packets, tag-aware and tag-unaware network devices can coexist on the same network. A switch port can have only one PVID, but can have as many VID as the switch has memory in its VLAN table to store them.
Chapter 4: Web-Based Management Figure 4-24: Static VLAN interface NOTE: 1. No matter what basis is used to uniquely identify end nodes and assign these nodes VLAN membership, packets cannot cross VLAN without a network device performing a routing function between the VLAN. 2. The Switch supports Port-based VLAN and IEEE 802.1Q VLAN. The port untagging function can be used to remove the 802.1 tag from packet headers to maintain compatibility with devices that are tag-unaware.
Chapter 4: Web-Based Management Figure 4-25: Port-based VLAN interface Create a VLAN and add member ports to it 1. Click the hyperlink "VLAN" \ "Static VLAN" to enter the VLAN configuration interface. 2. Select "Port Based VLAN" at the VLAN Operation Mode, to enable the portbased VLAN function. 3. Click " Add " to create a new VLAN group. See Figure 4-26 appears. 4. Type a name and Group ID for the new VLAN, the available range is 2-4094. 5.
Chapter 4: Web-Based Management Figure 4-26: Static VLAN interface This page includes the following fields: OBJECT DESCRIPTION VLAN Name Use this optional field to specify a name for the VLAN. It can be up to 16 alphanumeric characters long, including blanks. Group ID You can configure the ID number of the VLAN by this item. This field is used to add VLANs one at a time. The VLAN group ID and available range is 2-4094. Port Indicate port 1 to port 26.
Chapter 4: Web-Based Management Understanding the nomenclature of the Switch • IEEE 802.1Q Tagged and Untagged Every port on an 802.1Q compliant switch can be configured as tagged or untagged. Tagged Ports with tagging enabled will put the VID number, priority and other VLAN information into the header of all packets that flow into those ports. If a packet has previously been tagged, the port will not alter the packet, thus keeping the VLAN information intact.
Chapter 4: Web-Based Management 1. Click the hyperlink "VLAN" \ "Static VLAN" to enter the VLAN configuration interface. 2. Select "802.1Q" in the VLAN Operation Mode, to enable the 802.1Q VLAN function. 3. Click Add to create a new VLAN group or Edit to management exist VLAN groups. Then the VLAN Group column appears. 4. Input a VLAN group ID and available range is 2-4094. Figure 4-28: VLAN Group Configuration interface 5. Select specific port as member port. The screen in Figure 4-29 appears.
Chapter 4: Web-Based Management Figure 4-29: 802.1Q VLAN Setting Web Page screen This page includes the following fields: OBJECT DESCRIPTION VLAN Name Use this optional field to specify a name for the VLAN. It can be up to 16 alphanumeric characters long, including blanks. VLAN ID You can configure the ID number of the VLAN by this item. This field is used to add VLANs one at a time. The VLAN group ID and available range is 2-4094. Port UnTag Member Indicate port 1 to port 26.
Chapter 4: Web-Based Management NOTE: Enable 802.1Q VLAN, the all ports on the switch belong to default VLAN, VID is 1. The default VLAN can't be deleted. VLAN Filter • 802.1Q VLAN Port Configuration This page is used for configuring the Switch port VLAN. The VLAN per Port Configuration page contains fields for managing ports that are part of a VLAN. The port default VLAN ID (PVID) is configured on the VLAN Port Configuration page. All untagged packets arriving to the device are tagged by the ports PVID.
Chapter 4: Web-Based Management This page includes the following fields: OBJECT DESCRIPTION NO Indicate port 1 to port 26. Set the port VLAN ID that will be assigned to untagged traffic on a given port. This feature is useful for accommodating devices that you want to participate in the VLAN but that don't support tagging. PVID The switch each port allows user to set one VLAN ID, the range is 1~255, default VLAN ID is 1.
Chapter 4: Web-Based Management 802.1Q VLAN IEEE 802.1Q Tunneling (Q-in-Q) IEEE 802.1Q Tunneling (QinQ) is designed for service providers carrying traffic for multiple customers across their networks. QinQ tunneling is used to maintain customer-specific VLAN and Layer 2 protocol configurations even when different customers use the same internal VLAN IDs.
Chapter 4: Web-Based Management In cases where a given service VLAN only has two member ports on the switch, the learning can be disabled for the particular VLAN and can therefore rely on flooding as the forwarding mechanism between the two ports. This way, the MAC table requirements are reduced. Q-in-Q Port Setting The QinQ VLAN \ QinQ Port Setting screen in Figure 4-31 appears.
Chapter 4: Web-Based Management OBJECT QinQ Uplink DESCRIPTION Check Configures IEEE 802.1Q tunneling (QinQ) for an uplink port to another device within the service provider network. Cancel Configures IEEE 802.1Q tunneling (QinQ) for a client access port to segregate and preserve customer VLAN IDs for traffic crossing the service provider network. Q-in-Q Tunnel Setting Business customers of service providers often have specific requirements for VLAN IDs and the number of VLANs to be supported.
Chapter 4: Web-Based Management Rapid Spanning Tree The Rapid Spanning Tree Protocol (RSTP) is an evolution of the Spanning Tree Protocol and provides for faster spanning tree convergence after a topology change. The system also supports STP and the system will auto-detect the connected device that is running STP or RSTP protocol. Theory The Spanning Tree protocol can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers.
Chapter 4: Web-Based Management • Automatically reconfigures the spanning tree to compensate for the failure, addition, or removal of any element in the tree. • Reconfigures the spanning tree without operator intervention.
Chapter 4: Web-Based Management When STP is enabled using the default parameters, the path between source and destination stations in a switched network might not be ideal. For instance, connecting higher-speed links to a port that has a higher number than the current root port can cause a root-port change. STP Port States The BPDUs take some time to pass through a network.
Chapter 4: Web-Based Management Figure 4-33: STP Port State Transitions You can modify each port state by using management software. When you enable STP, every port on every switch in the network goes through the blocking state and then transitions through the states of listening and learning at power up. If properly configured, each port stabilizes to the forwarding or blocking state.
Chapter 4: Web-Based Management NOTE: On the switch level, STP calculates the Bridge Identifier for each switch and then sets the Root Bridge and the Designated Bridges. On the port level, STP sets the Root Port and the Designated Ports. The following are the user-configurable STP parameters for the switch: PARAMETER DESCRIPTION A combination of the User-set priority and the Bridge Identifier (Not switch's MAC address.
Chapter 4: Web-Based Management Default Spanning-Tree Configuration Feature Default Value Enable state STP disabled for all ports Port priority 128 Port cost 0 Bridge Priority 32,768 NOTE: The Hello Time cannot be longer than the Max. Age. Otherwise, a configuration error will occur. Observe the following formulas when setting the above parameters: • Max. Age _ 2 x (Forward Delay - 1 second) • Max.
Chapter 4: Web-Based Management Figure 4-34: Before Applying the STA Rules In this example, only the default STP values are used.
Chapter 4: Web-Based Management The switch with the lowest Bridge ID (switch C) was elected the root bridge, and the ports were selected to give a high port cost between switches B and C. The two (optional) Gigabit ports (default port cost = 4) on switch A are connected to one (optional) Gigabit port on both switch B and C. The redundant link between switch B and C is deliberately chosen as a 100 Mbps Fast Ethernet link (default port cost = 19).
Chapter 4: Web-Based Management This page includes the following fields: OBJECT DESCRIPTION RSTP mode The user must enable the RSTP function first before configuring the related parameters. Protocol Version A value used to specify the spanning tree protocol, the original spanning tree protocol (STP, 802.1d) or the rapid spanning tree protocol (RSTP, 802.1w). Priority (0-61440) Max Age (6-40) The switch with the lowest value has the highest priority and is selected as the root.
Chapter 4: Web-Based Management Figure 4-37: RSTP Bridge Status page screenshot This page includes the following fields: Object Description Priority The bridge identifier of the root bridge. It is made up from the bridge priority and the base MAC address of the bridge. MAC Address The bridge identifier of the root bridge. It is made up from the bridge priority and the base MAC address of the bridge. Root Path Cost For the Root Bridge this is zero.
Chapter 4: Web-Based Management Figure 4-38: RSTP Port Configuration interface This page includes the following fields: OBJECT DESCRIPTION Path Cost The cost of the path to the other bridge from this transmitting bridge at the specified port. Enter a number 1 through 200,000,000. Priority Decide which port should be blocked by setting its priority as the lowest. Enter a number between 0 and 240. The value of priority must be the multiple of 16.
Chapter 4: Web-Based Management NOTE: Path cost "0" is used to indicate auto-configuration mode. When the short path cost method is selected and the default path cost recommended by the IEEE 8021w standard exceeds 65,535, the default is set to 65,535. By default, the system automatically detects the speed and duplex mode used on each port, and configures the path cost according to the values shown below. Table 4-1: Recommended STP Path Cost Range Port Type IEEE 802.1D-1998 IEEE 802.
Chapter 4: Web-Based Management Trunking Port trunking is the combination of several ports or network cables to expand the connection speed beyond the limits of any one single port or network cable.
Chapter 4: Web-Based Management This section provides Port Trunk-Aggregator settings for each port from the Managed Switch, the screen in Figure 4-40 appears. Figure 4-40: Port Trunk-Aggregator setting interface (two ports are added to the left field with LACP enabled) This page includes the following fields: OBJECT DESCRIPTION System Priority A value which is used to identify the active LACP.
Chapter 4: Web-Based Management NOTE: A trunk group, including member ports split between two switches, has to enable the LACP function of the two switches. Aggregator Information When you setup the LACP aggregator, you will see relational information here. LACP disabled Having set up the aggregator setting with LACP disabled, you will see the local static trunk group information on the tab of Aggregator Information.
Chapter 4: Web-Based Management This page includes the following fields: OBJECT DESCRIPTION Group Key This is a read-only column field that displays the trunk group ID. Port member This is a read-only column field that displays the members of this static trunk group. LACP enabled Having set up the aggregator setting with LACP enabled, you will see the trunking group information between two switches on the tab of Aggregator Information. • Switch 1 configuration 1.
Chapter 4: Web-Based Management • Switch 2 configuration 6. Set System Priority of the trunk group. For example: 32768. 7. Select a trunk group ID by pull down the drop-down menu bar. 8. Enable LACP. 9. Include the member ports by clicking the Add button after selecting the port number and the column field of Work Ports changes automatically. Figure 4-44: Switch 2 configuration interface 10.
Chapter 4: Web-Based Management State Activity Having set up the LACP aggregator on the tab of Aggregator Setting, you can configure the state activity for the members of the LACP trunk group. You can tick or cancel the checkbox beside the state label. When you remove the tick mark of the port and click the Apply button, the port state activity will change to Passive.
Chapter 4: Web-Based Management Figure 4-47: State Activity of Switch 2 NOTE: A link having two passive LACP nodes will not perform dynamic LACP trunk because both ports are waiting for an LACP protocol packet from the opposite device.
Chapter 4: Web-Based Management Forwarding and Filtering The frames of Ethernet Packets contain a MAC address (SMAC address), which shows the MAC address of the equipment sending the frame. The SMAC address is used by the switch to automatically update the MAC table with these dynamic MAC addresses. Dynamic entries are removed from the MAC table if no frames with the corresponding SMAC address have been seen after a configurable age time. Dynamic MAC Table Entries in the MAC Table are shown on this page.
Chapter 4: Web-Based Management Static MAC Table You can add a static MAC address that remains in the switch's address table regardless of whether the device is physically connected to the switch. This saves the switch from having to re-learn a device's MAC address when the disconnected or powered-off device is active on the network again. Via this interface, you can add / modify / delete a static MAC address. Add the Static MAC Address You can add a static MAC address in the switch MAC table here.
Chapter 4: Web-Based Management Figure 4-50: MAC Filtering interface This page includes the following fields: OBJECT DESCRIPTION MAC Address Enter the MAC address that you want to filter. VLAN ID The VLAN ID for the entry.
Chapter 4: Web-Based Management IGMP Snooping Theory The Internet Group Management Protocol (IGMP) lets host and routers share information about multicast groups memberships. IGMP snooping is a switch feature that monitors the exchange of IGMP messages and copies them to the CPU for feature processing. The overall purpose of IGMP Snooping is to limit the forwarding of multicast frames to only ports that are a member of the multicast group.
Chapter 4: Web-Based Management Figure 4-52: Multicast flooding Figure 4-53: IGMP Snooping multicast stream control 92 GE-DS-242-PoE Managed Ethernet Switch User Manual
Chapter 4: Web-Based Management IGMP Versions 1 and 2 Multicast groups allow members to join or leave at any time. IGMP provides the method for members and multicast routers to communicate when joining or leaving a multicast group. IGMP version 1 is defined in RFC 1112. It has a fixed packet size and no optional data. The format of an IGMP packet is shown below: IGMP Message Format Octets 0 8 Type 16 Response Time 31 Checksum Group Address (all zeros if this is a query).
Chapter 4: Web-Based Management The Time-to-Live (TTL) field of query messages is set to 1 so that the queries will not be forwarded to other sub networks. IGMP version 2 introduces some enhancements such as a method to elect a multicast queried for each LAN, an explicit leave message, and query messages that are specific to a given group.
Chapter 4: Web-Based Management IGMP Configuration The Switch support IP multicast, you can enable IGMP protocol on web management's switch setting advanced page, then the IGMP snooping information displays. IP multicast addresses range are from 224.0.0.0 through 239.255.255.255. Figure 4-55: IGMP Configuration interface This page includes the following fields: OBJECT DESCRIPTION IGMP Protocol Enable or disable the IGMP protocol. IGMP Fastleave Enable or disable Fast Leave on the port.
Chapter 4: Web-Based Management QoS Configuration Understand QOS Quality of Service (QoS) is an advanced traffic prioritization feature that allows you to establish control over network traffic. QoS enables you to assign various grades of network service to different types of traffic, such as multi-media, video, protocolspecific, time critical, and file-backup traffic. QoS reduces bandwidth limitations, delay, loss, and jitter.
Chapter 4: Web-Based Management QoS Configuration QoS settings allow customization of packet priority in order to facilitate delivery of data traffic that might be affected by latency problems. When CoS / 802.1p Tag Priority is applied, the Switch recognizes 802.1Q VLAN tag packets and extracts the VLAN tagged packets with User Priority value. 802.1Q Tag and 802.
Chapter 4: Web-Based Management Figure 4-56: QoS Configuration - 802.1Priority This page includes the following fields: OBJECT DESCRIPTION First Come First Service The sequence of packets sent is depend on arrival order. All High before Low The high priority packets sent before low priority packets. Select the preference given to packets in the switch's higher-priority queue. These options represent the number of higher priority packets sent before one lower priority packet is sent.
Chapter 4: Web-Based Management Figure 4-57: QoS Configuration - Port-Based Priority This page includes the following fields: OBJECT DESCRIPTION Port Number: Indicate port 1 to port 26. Port Priority: Each port has 8 priority levels—0~7 or Disable to be chosen. 7 is the highest priority. TOS/DSCP TOS/DSCP priority is obtained through a 6-bit Type-of-Service (TOS) or Differentiated Service Code Point (DSCP) to 3-bit priority mapping.
Chapter 4: Web-Based Management DiffServ Code Point (DSCP) - is the traffic prioritization bits within an IP header that are encoded by certain applications and/or devices to indicate the level of service required by the packet across a network. DSCP are defined in RFC2597 for classifying traffic into different service classes. The Managed Switch extracts the codepoint value of the DS field from IPv4 packets and identifies the priority of the incoming IP packets based on the configured priority.
Chapter 4: Web-Based Management Figure 4-58: QoS Configuration - TOS Priority This page includes the following fields: OBJECT DESCRIPTION TOS/DSCP Enable / Disable internal traffic class ( 0~7) to map the corresponding IP DSCP value. DSCP Priority The values of the IP DSCP header field within the incoming packet. 0~63. Specify which 802.1p priority to map the corresponding IP DSCP. The value is 0~7. TOS/DSCP Port Configuration Set up IP TOS / DSCP mapping to 802.
Chapter 4: Web-Based Management Figure 4-59 : QoS Configuration - TOS/DSCP Port Status This page includes the following fields: OBJECT DESCRIPTION Port Number Indicate port 1 to port 26. TOS/DSCP Status Enable / Disable TOS/DSCP map to 802.1p priority on specify port. Access Control List The Access Control List (ACL) is a concept in computer security used to enforce privilege separation.
Chapter 4: Web-Based Management Figure 4-60: Access Control List (ACL) Web Page screen This page includes the following fields: IPv4 ACL OBJECT DESCRIPTION Group ID 1 ~ 247 (max. 247 ACL group). Action Permit / Deny. DEFAULT VALUE Permit Permit: Permit packet cross switch. Deny: Drop packet. VLAN Any / VID. Any Any: Any VLAN id. VID: 1~4094. A certain VLAN id. Packet Type IPv4 / Non-IPv4 / Binding IPv4 IPv4: Set Ipv4 packet field. Non-IPv4: Set non-Ipv4 packet field.
Chapter 4: Web-Based Management OBJECT DESCRIPTION DEFAULT VALUE Src IP Address Set this field if Packet Type is IPv4, else ignore. Any Any / IP and Mask Any: Any IP address. IP : A certain IP address. Mask: ***.***.***.*** * is represent a digit from 0~9, *** is range from 0 to 255 Notice: This is not subnet mask. Dst IP Address Set this field if Packet Type is IPv4, else ignore. Any Any / IP and Mask Any: Any IP address. IP : A certain IP address. Mask: ***.***.***.
Chapter 4: Web-Based Management OBJECT DESCRIPTION Port Set this field if Packet Type is IPv4, else ignore. DEFAULT VALUE 0~65535 If UDP port not find in UDP field, you can direct assign number. Port Id Source port id, from 1~26, 0 means don’t care. Current List You create ACL and Binding groups. 0 Non-IPv4 ACL In Packet Type / Binding box should select Non-IPv4 OBJECT DESCRIPTION Group ID 1 ~ 247 (max. 247 ACL group) Action Permit / Deny.
Chapter 4: Web-Based Management Binding Let device that has specific IP address and MAC address can use network. We can set specific IP address, MAC address, VLAN id and port id to bind, and device can cross switch if all conditions match. Use binding function; we should enable it first in following page. In Packet Type / Binding box should select Binding. OBJECT DESCRIPTION Group ID 1 ~ 247 (max. 247 ACL group) Action Permit / Deny. DEFAULT VALUE Permit Permit : Permit packet cross switch.
Chapter 4: Web-Based Management MAC Limit MAC limit allows users to set a maximum number of MAC addresses to be stored in the MAC address table. The MAC addresses chosen to be stored in MAC address table is the result of first-come-first-save policy. Once a MAC address is stored in the MAC address table, it stays in until it is aged out. When an "opening" is available, the switch stored the first new MAC address it sees in that opening.
Chapter 4: Web-Based Management MAC Limit Port Status This table displays current MAC Limit status of each port. Figure 4-62: MAC Limit - MAC Limit Port Status This page includes the following fields: OBJECT DESCRIPTION Port Number Indicate port 1 to port 26. Limit Display the current MAC Limit configuration and status of each port.
Chapter 4: Web-Based Management 802.1X Configuration 802.1x is an IEEE authentication specification which prevents the client from accessing a wireless access point or wired switch until it provides authority, like the user name and password that are verified by an authentication server (such as RADIUS server). Understanding IEEE 802.1X Port-Based Authentication The IEEE 802.
Chapter 4: Web-Based Management Client-the device (workstation) that requests access to the LAN and switch services and responds to requests from the switch. The workstation must be running 802.1Xcompliant client software such as that offered in the Microsoft Windows XP operating system. (The client is the supplicant in the IEEE 802.1X specification.) • Authentication server - performs the actual authentication of the client.
Chapter 4: Web-Based Management NOTE: If 802.1X is not enabled or supported on the network access device, any EAPOL frames from the client are dropped. If the client does not receive an EAPrequest/identity frame after three attempts to start authentication, the client transmits frames as if the port is in the authorized state. A port in the authorized state effectively means that the client has been successfully authenticated.
Chapter 4: Web-Based Management In contrast, when an 802.1X-enabled client connects to a port that is not running the 802.1X protocol, the client initiates the authentication process by sending the EAPOLstart frame. When no response is received, the client sends the request for a fixed number of times.
Chapter 4: Web-Based Management After enabling the IEEE 802.1X function, you can configure the parameters of this function. Figure 4-66: 802.1x System Configuration interface This page includes the following fields: OBJECT DESCRIPTION IEEE 802.1x Protocol: Enable or disable 802.1x protocol. Radius Server IP: Assign the RADIUS Server IP address. Server Port: Set the UDP destination port for authentication requests to the specified RADIUS Server.
Chapter 4: Web-Based Management Figure 4-67: 802.1x Per Port Setting interface This page includes the following fields: OBJECT DESCRIPTION FU (Force Unauthorized) The specified port is required to be held in the unauthorized state. FA (Force Authorized) The specified port is required to be held in the authorized state.
Chapter 4: Web-Based Management Misc Configuration In this page, you can change the default configuration for the 802.1x standard: Figure 4-68: 802.1x Misc Configuration interface This page includes the following fields: OBJECT DESCRIPTION Quiet Period: Used to define periods of time during which it will not attempt to acquire a supplicant. Default time is 60 seconds. TX Period: Set the period the port waits for retransmit next EAPOL PDU during an authentication session. Default value is 30 seconds.
Chapter 4: Web-Based Management Power Over Ethernet Providing up to 24 PoE, in-line power interface, the GE-DS-242-PoE PoE Switch can easily build a power central-controlled IP phone system, IP Camera system, AP group for the enterprise. For instance, 24 camera / AP can be easily installed around the corner in the company for surveillance demands or build a wireless roaming environment in the office.
Chapter 4: Web-Based Management The PSU input power consumption is monitored by measuring voltage and current. The input power consumption is equal to the system's aggregated power consumption. The power management concept allows all ports to be active and activates additional ports, as long as the aggregated power of the system is lower than the power level at which additional PDs cannot be connected .When this value is exceeded, ports will be deactivated, according to user-defined priorities.
Chapter 4: Web-Based Management OBJECT DESCRIPTION Over Temperature Protection Enable / Disable over temperature protection. Power limit mode When the PoE temperature unit 1 / unit2 over 70 degree C then PoE power budget will be changed by 3 segments as following. • Over 70 Degree C power budget 180 Watts • Over 73 Degree C power budget 170 Watts • Over 76 Degree C power budget 160 Watts Allow to configure power limit mode of Web Smart Device.
Chapter 4: Web-Based Management • PD Classifications A PD may be classified by the PSE based on the classification information provided by the PD. The intent of PD classification is to provide information about the maximum power required by the PD during operation. Class 0 is the default for PDs. However, to improve power management at the PSE, the PD may opt to provide a signature for Class 1 to 3. The PD is classified based on power.
Chapter 4: Web-Based Management 120 GE-DS-242-PoE Managed Ethernet Switch User Manual
Chapter 5 Console Management Login in the Console Interface To configure the system via console mode, connect a serial cable to a COM port on a PC or notebook computer and to RJ-45 type serial (console) port of the Managed Switch. The console port of the Managed Switch is DCE already, so that you can connect the console port directly through PC without the need of Null Modem.
Chapter 5: Console Management Figure 5-1: GE-DS-242-PoE Console Login screen NOTE: For security reasons, please change and memorize the new username and password after this first setup. Username Max: 6, Min: 1 characters. Password Max: 6, Min: 1 characters. Only enter commands in lowercase letters in console interface.
Chapter 5: Console Management Configure IP address The GE-DS-242-PoE Managed Switch is shipped with default IP address as follows. IP Address : 192.168.0.100 Subnet Mask : 255.255.255.0 To check the current IP address or modify a new IP address for the Switch, please use the procedures as follows: Show the current IP address 1. On "Switch# " prompt, enter "configure". 2. On "Switch(config)# " prompt, enter "show ip". 3. The screen displays the current IP address, Subnet Mask and Gateway.
Chapter 5: Console Management IP: 192.168.1.100 Subnet Mask: 255.255.255.0 Gateway: 192.168.1.254 Figure 5-3: Set IP address screen 2. Repeat Step 1 to check if the IP address is changed. If the IP is successfully configured, the Managed Switch will apply the new IP address setting immediately. You can access the Web interface of Managed Switch through the new IP address.
Chapter 5: Console Management Commands Level The following table lists the CLI commands and descriptions. Modes User EXEC Access Method Begin a session with your switch. Prompt switch> Exit Method Enter logout or quit. About This Model The user commands available at the user level are a subset of those available at the privileged level. Use this mode to: • Perform basic tests. • Display system information. The privileged command is the advanced mode.
Chapter 5: Console Management 126 GE-DS-242-PoE Managed Ethernet Switch User Manual
Chapter 6 Command Line Interface Operation Notice To enter the "configuration" mode, you need to be in the privileged mode, and then types in the command configure: Switch# configure Switch (config) # GE-DS-242-PoE Managed Ethernet Switch User Manual 127
Chapter 6: Command Line Interface Command Line Editing Key Function ← -B ; Moves the cursor back one character. -D Deletes the character at the cursor. -E Jumps to the end of the current command line. -F ; → Moves the cursor forward one character. -K Deletes from the cursor to the end of the command line. -N ; ↓ Enters the next command line in the command history. -P ; ↑ Enters the previous command line in the command history.
Chapter 6: Command Line Interface Switch Static Configuration Port Configuration and show status port state Description: Turn the port state on or off. Syntax: port state [] Parameters: specifies the ports to be turn on or off. If not entered, all ports are turn on or off. port nego Description: Set port negotiation. Syntax: port nego [] Parameters: specifies the ports to be set.If not entered, all ports are set.
Chapter 6: Command Line Interface port flow Description: Enable or disable port flow control. Syntax: port flow [] Parameters: The first enables or disables flow control in full duplex mode. The second enables or disables flow control in half duplex mode. specifies the ports to be set. If not entered, all ports are set. port rate Description: Set port effective ingress or egress rate.
Chapter 6: Command Line Interface port jumboframe Description: Set port jumbo frame. When port jumbo frame is enable, the port forward jumbo frame packet Syntax: port jumboframe [] Parameters: specifies the ports to be set. If not entered, all ports are set. show port status Description: Show port status, including port State, Link, Trunking, VLAN, Negotiation, Speed, Duplex, Flow control, Rate control ,Priority, Security, BSF control.
Chapter 6: Command Line Interface Port 3 Information ---------------------------------------------------------------------State: on Link: down --More-- show port statistics Description: Show port statistics, including TxGoodPkt, TxBadPkt, RxGoodPkt, RxBadPkt, TxAbort, Collision, and DropPkt. Parameters: specifies the port to be shown.
Chapter 6: Command Line Interface DropPkt: 0 ---------------------------------------------------------------------Port 3 Information -----------------------------------------------------------------------More-- show port protection Description: Show protected port information.
Chapter 6: Command Line Interface 21 | off | 1 22 | off | 1 25 | off | 1 26 | off | 1 Trk1 | off | 1 134 GE-DS-242-PoE Managed Ethernet Switch User Manual
Chapter 6: Command Line Interface Trunk Configuration Trunk allows the switch to combine ports so that they function like a single highspeed link. It can be used to increase the bandwidth to some devices to provide a high-speed link. For example, trunk is useful when making connections between switches or connecting servers to the switch. Trunk can also provide a redundant link for fault tolerance. If one link in the trunk failed, the switch can balance the traffic among the remaining links.
Chapter 6: Command Line Interface Lacp Description: Specifies the added trunk group to be LACP enabled. Syntax: lacp no-lacp specifies the added trunk group to be LACP disabled. Parameters: specifies the ports to be set. specifies the ports to be set to LACP active. no trunk Description: Delete an existing trunk group. Syntax: no trunk Parameters: specifies the trunk group to be deleted LACP Commands [no] lacp Description: Enable/disable LACP.
Chapter 6: Command Line Interface no lacp system-priority Description: Set LACP system priority to the default value 32768. show lacp status Description: Show LACP enable/disable status and system priority. show lacp Description: Show LACP information. Switch(config)# show lacp status LACP is enabled. LACP system priority: 32768 show lacp agg Description: Show LACP aggregator information. Syntax: show lacp agg Parameters: specifies the trunk group to be shown.
Chapter 6: Command Line Interface VLAN Configuration Virtual LANs A Virtual LAN (VLAN) is a logical network group that limits the broadcast domain. It allows you to isolate network traffic so only members of the VLAN receive traffic from the same VLAN members. Basically, creating a VLAN within a switch is logically equivalent of reconnecting a group of network devices to another Layer 2 switch. However, all the network devices are still plugged into the same switch physically.
Chapter 6: Command Line Interface The difference between a port-based VLAN and a tag-based VLAN is that the tagbased VLAN truly divided the network into several logically connected LANs. Packets rambling around the switches can be forwarded more intelligently. In the figure shown below, by identifying the tag, broadcast packets coming from computer A in VLAN1 at sw1 can be forwarded directly to VLAN1. However, the switch could not be so smart in the port-based VLAN mechanism.
Chapter 6: Command Line Interface Advanced 802.1Q VLAN Configuration Ingress filters configuration When a packet was received on a port, you can govern the switch to drop it or not if it is an untagged packet. Furthermore, if the received packet is tagged but not belonging to the same VALN group of the receiving port, you can also control the switch to forward or drop the packet.
Chapter 6: Command Line Interface (cpu-port|no-cpu-port) specifies the CPU port belong this VLAN group. LIST specifies the ports to be set to VLAN members. [LIST] specifies the ports to be set to tagged members. If not entered, all members set to untagged. e.g.. switch(config)# vlan add 1 vlan1 cpu-port 1-4 This VLAN entry has four members (from port1 to port4) and all members are untagged. no vlan Description: Delete VLAN entry.
Chapter 6: Command Line Interface Switch(config)# show vlan 1 VLAN :1 Type : Static Creation Time (sec.
Chapter 6: Command Line Interface show vlan static Description: Show static VLAN entry information. show vlan pvid Description: Show port default VLAN id. Syntax: show vlan pvid [LIST] Parameters: [LIST] specifies the ports to be showed. If not entered, all port’s PVID will be showed. e.g.
Chapter 6: Command Line Interface Switch(config)# show vlan pvid Port | PVID -----------+------Port1 | 1 Port2 | 1 Port3 | 1 Port4 | 1 Port5 | 1 Port6 | 1 Port7 | 1 Port8 | 1 Port9 | 1 Port10 | 1 Port11 | 1 Port12 | 1 Port13 | 1 Port14 | 1 Port15 | 1 Port16 | 1 Port17 | 1 Port18 | 1 Port19 | 1 Port20 | 1 Port21 | 1 --More-Port22 | 1 Port25 | 1 Port26 | 1 Trk1 | 1 144 GE-DS-242-PoE Managed Ethernet Switch User Manual
Chapter 6: Command Line Interface vlan filter Description: Set ingress filter rules. Syntax: vlan filter (enable | disable) (enable | disable) LIST Parameters: (enable | disable) specifies the non-members packet will be forwarded or not. If set enable, forward only packets with VID matching this port's configured VID. (enable | disable) specifies the untagged frame will be dropped or not. If set enable, drop untagged frame. show vlan filter Description: Show VLAN filter setting.
Chapter 6: Command Line Interface Switch(config)# show vlan filter Port | Rule 1 | Rule 2 Filter (nonmbr) (untag) -----------+------------+--------Port1 | Drop | Forward Port2 | Drop | Forward Port3 | Drop | Forward Port4 | Drop | Forward Port5 | Drop | Forward Port6 | Drop | Forward Port7 | Drop | Forward Port8 | Drop | Forward Port9 | Drop | Forward Port10 | Drop | Forward Port11 | Drop | Forward Port12 | Drop | Forward Port13 | Drop | Forward Port14 | Drop | Forward Port15 | Drop | Forward Port16 | Drop
Chapter 6: Command Line Interface Misc Configuration no mac-age-time Description: Set MAC address age-out time. Syntax: [no] mac-age-time Enable or disable MAC address age-out. mac-age-time <6..1572858> Parameters: <6..1572858> specifies the MAC address age-out time. Must be divisible by 6. Type the number of seconds that an inactive MAC address remains in the switch’s address table. show mac-age-time Description: Show MAC address age-out time.
Chapter 6: Command Line Interface broadcast select Description: Select the Broadcast storm filter packet type: Unicast/Multicast: Flood unicast/multicast filter Control Packets: Control packets filter IP multicast: IP multicast packets filter Broadcast Packets: Broadcast Packets filter Syntax: broadcast select Collision-Retry Description: Collision-Retry setting Syntax: Collision-Retry < off | 16 | 32 | 48 > Parameters: 16\32\48 – In Half-Dup
Chapter 6: Command Line Interface Administration Configuration Change Username / Password hostname Description: Set switch name. Syntax: hostname Parameters: specifies the switch name. If you would like to have spaces within the name, use quotes (“”) around the name. no hostname Reset the switch name to factory default setting. [no] password Description: Set or remove username and password for manager or operator.
Chapter 6: Command Line Interface IP Configuration User can configure the IP setting and fill in a new value. ip address Description: Set IP address and subnet mask. Syntax: ip address ip default-gateway Description: Set the default gateway IP address. Syntax: ip default-gateway show ip Description: Show IP address, subnet mask, and the default gateway. show info Description: Shows basic information, including system info, MAC address, and versions.
Chapter 6: Command Line Interface dhcp Description: Set switch as dhcp client, it can get ip from dhcp server. NOTE: If you set this command, the switch will reboot. show dhcp Description: Show dhcp enable/disable. Reboot switch boot Description: Reboot (warm-start) the switch. Reset to Default erase startup-config Description: Reset configurations to default factory settings at next boot time.
Chapter 6: Command Line Interface TFTP Update Firmware copy tftp firmware Description: Download firmware from TFTP server. Syntax: copy tftp firmware Parameters: specifies the IP address of the TFTP server. specifies the file to be downloaded from the TFTP server. Restore Configure File copy tftp Description: Retrieve configuration from the TFTP server.
Chapter 6: Command Line Interface Backup Configure File copy tftp Description: Send configuration to the TFTP server. If you want to save the configuration in a text file of CLI commands, use the keywordrunning-config. If you want to save the configuration flash image instead, use the keyword flash. Syntax: copy tftp Parameters: specifies the IP address of the TFTP server.
Chapter 6: Command Line Interface MAC limit MAC limit allows users to set a maximum number of MAC addresses to be stored in the MAC address table. The MAC addresses chosen to be stored in MAC address table is the result of first-come-first-save policy. Once a MAC address is stored in the MAC address table, it stays in until it is aged out. When an “opening” is available, the switch stored the first new MAC address it sees in that opening.
Chapter 6: Command Line Interface Port Mirroring Configuration Port monitoring is a feature to redirect the traffic occurred on every port to a designated monitoring port on the switch. With this feature, the network administrator can monitor and analyze the traffic on the entire LAN segment. In the Managed Switch, you can specify one port to be the monitored ports and any single port to be the monitoring port. You also can specify the direction of the traffic that you want to monitor.
Chapter 6: Command Line Interface Quality of Service There are four transmission queues with different priorities in the Managed Switch: Highest, SecHigh, SecLow and Lowest. The Managed Switch will take packets from the four queues according to its QoS mode setting. If the QoS mode was set to "Disable", the Managed Switch will not perform QoS on its switched network.
Chapter 6: Command Line Interface priority packets sent before one lower priority packet is sent. For example, 8 Highest:4 second-high means that the switch sends 8 highest-priority packets before sending 4 second-high priority packets. • QoS level: 0~7 priority level can map to highest, second-high, second-low, lowest queue. qos priority Description: Set 802.1p priority.
Chapter 6: Command Line Interface show qos Description: Show QoS configurations, including802.1p priority, priority level. e.g. Switch(config)# show qos QoS configurations: QoS mode: weighted round robin Highest weight: 8 Second High weight: 4 Second Low weight: 2 Lowest weight: 1 802.1p priority[0-7]: Lowest Lowest SecLow SecLow SecHigh SecHigh Highest Highest Per Port Priority port priority Description: Set port priority.
Chapter 6: Command Line Interface MAC Address Configuration clear mac-address-table Description: Clear all dynamic MAC address table entries. mac-address-table static Description: Set static unicast or multicast MAC address. If multicast MAC address (address beginning with 01:00:5E) is supplied, the last parameter must be port-list. Otherwise, it must be port-id.
Chapter 6: Command Line Interface show mac-address-table static Description: Display static MAC address table entries. show mac-address-table multicast Description: Display multicast-related MAC address table. smac-address-table static Description: Set static unicast or multicast MAC address in secondary MAC address table. If multicast MAC address (address beginning with 01:00:5E) is supplied, the last parameter must be port-list. Otherwise, it must be port-id.
Chapter 6: Command Line Interface show filter Description: Display filter MAC address table.
Chapter 6: Command Line Interface STP/RSTP Commands [no] spanning-tree Description: Enable or disable spanning-tree. spanning-tree forward-delay Description: Set spanning tree forward delay used, in seconds. Syntax: spanning-tree forward-delay <4-30> Parameters: <4-30> specifies the forward delay, in seconds. Default value is 15. NOTE: The parameters must enforce the following relationships: 2*(hello-time + 1) <= maximum-age <= 2*(forward-delay - 1).
Chapter 6: Command Line Interface spanning-tree maximum-age Description: Set spanning tree maximum age, in seconds. Syntax: spanning-tree maximum-age <6-40> Parameters: <6-40> specifies the maximum age, in seconds. Default value is 20. NOTE: The parameters must enforce the following relationships: 2*(hello-time + 1) <= maximum-age <= 2*(forward-delay - 1). spanning-tree priority Description: Set spanning tree bridge priority.
Chapter 6: Command Line Interface spanning-tree port priority Description: Set spanning tree port priority. Syntax: spanning-tree port priority <0-240> [] Parameters: <0-240> specifies the port priority. The value must be in steps of 16. specifies the ports to be set. Null means all ports. show spanning-tree Description: Show spanning-tree information. show spanning-tree port Description: Show spanning tree per port information.
Chapter 6: Command Line Interface spanning-tree protocol version Description: Change spanning tree protocol version. Syntax: spanning-tree protocol-version Parameters: stp specifies the original spanning tree protocol (STP,802.1d). rstp specifies rapid spanning tree protocol (RSTP,802.1w). [no] spanning-tree port mcheck Description: Force the port to transmit RST BPDUs. No format means not force the port to transmit RST BPDUs.
Chapter 6: Command Line Interface [no] spanning-tree port non-stp Description: Disable or enable spanning tree protocol on this port. Syntax: [no] spanning-tree port non-stp [] Parameters: specifies the ports to be set. Null means all ports. spanning-tree point-to-point mac Description: Set the port to be point to point connection. Syntax: spanning-tree port point-to-point-mac [] Parameters: auto specifies point to point link auto connection.
Chapter 6: Command Line Interface SNMP Any Network Management running the simple Network Management Protocol (SNMP) can be management with the switch. System Options Snmp /no snmp Description: Enable or disable SNMP. Show snmp status Description: Show the enable or disable status of SNMP. Snmp system-name Description: Set agent system name string. Syntax: snmp system-name Parameters: specifies the system name string. e.g.
Chapter 6: Command Line Interface Snmp system-location Description: Set agent location string. Syntax: snmp system-location Parameters: specifies the location string. e.g. snmp system-location office Snmp system-contact Description: Set agent system contact string. Syntax: snmp system-contact Parameters: specifies the contact string. e.g. snmp system-contact abc@sina.com show snmp system Description: Show SNMP system information.
Chapter 6: Command Line Interface Community Strings snmp community Description: Set SNMP community string. Syntax: snmp community Parameters: specifies the community string. e.g. snmp community read-all-only public no snmp community Description: Delete SNMP community string. Syntax: no snmp community Parameters: specifies the community string. e.g.
Chapter 6: Command Line Interface Trap Managers snmp trap Description: Set SNMP trap receiver IP address, community string, and port number. Syntax: snmp trap [] [<1..65535>] Parameters: specifies the IP address. specifies the community string. <1..65535> specifies the trap receiver port number. e.g. snmp trap 192.168.200.1 public no snmp trap Description: Remove trap receiver IP address and port number. Syntax: no snmp trap [<1..
Chapter 6: Command Line Interface IGMP The Internet Group Management Protocol (IGMP) is an internal protocol of the Internet Protocol (IP) suite. igmp Description: Enable/disable IGMP snooping. Syntax: [no] igmp igmp fastleave Description: Enable/disable IGMP snooping fast leave. If enable, switch will fast delete member who send leave report, else wait one sec. Syntax: [no] igmp fastleave igmp querier Description: Enable/disable IGMP snooping querier.
Chapter 6: Command Line Interface igmp debug Description: Enable/disable IGMP snooping debugging output. Syntax: [no] igmp debug show igmp Description: Show IGMP snooping information. Syntax: show igmp Parameters: status specifies IGMP snooping status and statistics information. router specifies IGMP snooping router's IP address. groups specifies IGMP snooping multicast group list. table specifies IGMP snooping IP multicast table entries.
Chapter 6: Command Line Interface 802.1x Protocol dot1x Description: Enable or disable 802.1x. Syntax: [no] dot1x radius-server host Description: Set radius server IP, port number, and accounting port number. Syntax: radius-server host <1024..65535> <1024..65535> Parameters: specifies server's IP address. The first <1024..65535> specifies the server port number. The second <1024..65535> specifies the accounting port number. radius-server key Description: Set 802.1x shared key.
Chapter 6: Command Line Interface radius-server nas Description: Set 802.1x NAS identifier. Syntax: radius-server nas Parameters: specifies NAS identifier string. show radius-server Description: Show radius server information, including radius server IP, port number, accounting port number, shared key, NAS identifier, dot1x timeout quiet-period Description: Set 802.1x quiet period. (default: 60 seconds) Syntax: dot1x timeout quiet-period <0..65535> Parameters: <0..
Chapter 6: Command Line Interface dot1x timeout supplicant Description: Set 802.1x supplicant timeout (default: 30 seconds) Syntax: dot1x timeout supplicant <1..300> Parameters: <1..300> specifies the supplicant timeout, in seconds. dot1x timeout radius-server Description: Set radius server timeout (default: 30 seconds). Syntax: dot1x timeout radius-server <1..300> Parameters: <1..300> specifies the radius server timeout, in seconds. dot1x max-req Description: Set 802.
Chapter 6: Command Line Interface show dot1x Description: Show 802.1x information, quiet period, Tx period, supplicant timeout, server timeout, maximum requests, and re-auth period. dot1x port Description: Set 802.1x per port information. Syntax: dot1x port Parameters: fu specifies forced unauthorized. fa specifies forced authorized. au specifies authorization. no specifies disable authorization. specifies the ports to be set.
Chapter 6: Command Line Interface Access Control List Packets can be forwarded or dropped by ACL rules include Ipv4 or non-Ipv4. The Managed Switch can be used to block packets by maintaining a table of packet fragments indexed by source and destination IP address, protocol, and so on. Ipv4 ACL commands no acl Description: Delete ACL group. Syntax: no acl <1-220> Parameters: <1-220> specifies the group id. e.g. no acl 1 no acl count Description: Reset the ACL group count.
Chapter 6: Command Line Interface show acl Description: Show ACL group information. Syntax: show acl [<1-220>] Parameters: <1-220> specifies the group id, null means all valid groups. e.g.
Chapter 6: Command Line Interface acl (add|edit) <1-220> (permit|deny) <0-4094> ipv4 <0-255> Description: Add or edit ACL group for Ipv4. Syntax: acl (add|edit) <1-220> (permit|deny) <0-4094> ipv4 <0-255> A.B.C.D A.B.C.D A.B.C.D A.B.C.D (check|unCheck) <0-65535> <0-26> Parameters: (add|edit) specifies the operation. <1-220> specifies the group id. (permit|deny) specifies the action. permit: permit packet cross switch; deny: drop packet. <0-4094> specifies the VLAN id. 0 means don't care.
Chapter 6: Command Line Interface acl (add|edit) <1-220> (qosvoip) <0-4094> Description: Add or edit ACL group for Ipv4. Syntax: acl (add|edit) <1-220> (qosvoip) <0-4094> <0-7> <0-1F> <0-1F> <0-FF> <0-FF> <0FFFF> <0-FFFF> <0-FFFF> <0-FFFF> Parameters: (add|edit) specifies the operation. <1-220> specifies the group id. (qosvoip) specifies the action, do qos voip packet adjustment. <0-4094> specifies the VLAN id. 0 means don't care. <0-1F> specifies the port ID value. <0-1F> specifies the port ID mask.
Chapter 6: Command Line Interface acl (add|edit) <1-220> (permit|deny) <0-4094> nonipv4 <0-65535> Description: Add or edit ACL group for non-Ipv4. Syntax: acl (add|edit) <1-220> (permit|deny) <0-4094> nonipv4 <0-65535> Parameters: (add|edit) specifies the operation. <1-220> specifies the group id. (permit|deny) specifies the action. permit: permit packet cross switch; deny: drop packet. <0-4094> specifies the VLAN id. 0 means don't care. <0-65535> specifies the Ether Type. 0 means don't care. e.g.
Chapter 6: Command Line Interface Binding Let device that has specific IP address and MAC address can use network. We can set specific IP address, MAC address, VLAN id and port id to bind, and device can cross switch if all conditions match. SIP/SMAC binding commands bind Description: Enable binding function. no bind Description: Disable binding function. no bind Description: Delete Binding group. Syntax: no bind <1-220> Parameters: <1-220> specifies the group id. e.g.
Chapter 6: Command Line Interface show bind Description: Show Binding group information. Syntax: show bind [<1-220>] Parameters: <1-220> specifies the group id, null means all valid groups. e.g. show bind 1 bind add Description: Add Binding group. Syntax: bind add <1-220> A:B:C:D:E:F <0-4094> A.B.C.D <1-26> Parameters: <1-220> specifies the group id. A.B.C.D specifies the MAC address. <0-4094> specifies the VLAN id. 0 means don't care. A.B.C.D specifies the Source IP address. 0.0.0.0 means don't care. A.B.
Chapter 6: Command Line Interface Power over Ethernet Commands show poe Show System Power over Ethernet information show poe status Show PoE port information poe temperature-protection Enabling or disabling the PoE power supply over temperature protection poe limit-mode Configure System PoE power limit mode information poe enable Enabling or disabling the port POE injects function poe priority Set port priority for the power supply management poe maximum-power Enabling or disabling per port po
Chapter 6: Command Line Interface show poe status Description: Show per PoE port information Command Level Global Configuration Syntax: show poe status [] Parameters: specifies the ports to be set. If not entered, all ports are set. Example 1: Switch(config)# show poe status 1 Port Admin Oper Priority Power Limit[W] Current Device Current[mA] Consumption [W] Class Port1 Enable on Low 15.4 13.
Chapter 6: Command Line Interface Configure PoE Over Temperature Protection poe temperature-protection enable[x4] Description: Configure PoE over temperature protection to enable or disable Command Level Global Configuration Syntax: poe temperature-protection { enable / disable } Parameters: Enable PoE power budget change automatically by detected PoE unit temperature Disable PoE power budget change automatically NOTE: PoE temperature-protection working in Priority mode or Total Limit
Chapter 6: Command Line Interface Example: Switch(config)# poe limit-mode port-priority Switch (config)# show poe Maximum Available Power :190Watts System Operation Status : on PoE Power Consumption : 55 watts Usage Threshold : 21% PoE Power limit mode : Port Priority Switch (config)# no poe limit-mode Switch (config)# show poe Maximum Available Power :190Watts System Operation Status : on PoE Power Consumption : 55 watts Usage Threshold : 21% PoE Power limit mode : No Limit GE-DS-24
Chapter 6: Command Line Interface Configure PoE -- Port poe enable Description: Enabling or disabling the port POE injects function. Command Level: Global Configuration Syntax: poe enable [] [no] poe enable [] Parameters: specifies the ports to be set. If not entered, all ports are set.
Chapter 6: Command Line Interface poe priority Description: Set port priority for the power supply management. The command is configurable while "poe limit-mode" is set to "Port Priority" Command Level: Global Configuration Syntax: poe priority { Critical | High | Low} [] Parameters: {Critical | High | Low} • Critical - Indicates that operating the powered device is high. • High- Indicates that operating the powered device has medium priority.
Chapter 6: Command Line Interface poe maximum-power Description: Enabling or disabling per port power output limit. The command is configurable while "poe limit-mode" is set to "Total-Limit" Command Level: Global Configuration Syntax: poe maximum-power <1~15.4> [] no poe mximum-power [] Parameters: <1~15.4> specifies the ports to be set. If not entered, all ports are set.
Chapter 7 Switch Operation Address Table The Switch is implemented with an address table. This address table composed of many entries. Each entry is used to store the address information of some node in network, including MAC address, port no, etc. This information comes from the learning process of Ethernet Switch. Learning When one packet comes in from any port, the Switch will record the source address, port no. And the other related information in address table.
Chapter 7: Switch Operation Store-and-Forward Store-and-Forward is one type of packet-forwarding techniques. A Store-andForward Ethernet Switching stores the incoming frame in an internal buffer, do the complete error checking before transmission. Therefore, no error packets occurrence, it is the best choice when a network needs efficiency and stability.
Chapter 8 Power Over Ethernet Overview What is PoE? Based on the global standard IEEE 802.3af, PoE is a technology for wired Ethernet, the most widely installed local area network technology adopted today. PoE allows the electrical power necessary for the operation of each end-device to be carried by data cables rather than by separate power cords. New network applications, such as IP Cameras, VoIP Phones, and Wireless Networking, can help enterprises improve productivity.
Chapter 8: Power Over Ethernet Overview PoE System Architecture The specification of PoE typically requires two devices: the Powered Source Equipment (PSE) and the Powered Device (PD). The PSE is either an End-Span or a MidSpan, while the PD is a PoE-enabled terminal, such as IP Phones, Wireless LAN, etc. Power can be delivered over data pairs or spare pairs of standard CAT-5 cabling.
Chapter 8: Power Over Ethernet Overview The data pairs are used. Since Ethernet pairs are transformer coupled at each end, it is possible to apply DC power to the center tap of the isolation transformer without upsetting the data transfer. In this mode of operation the pair on pins 3 and 6 and the pair on pins 1 and 2 can be of either polarity.
Chapter 8: Power Over Ethernet Overview http://www.poweroverethernet.com/articles.php?article_id=52 Microsemi /PowerDsine http://www.microsemi.com/PowerDsine/ Linear Tech http://www.linear.com/ The PoE Provision Process While adding PoE support to networked devices is relatively painless, it should be realized that power cannot simply be transferred over existing CAT-5 cables.
Chapter 8: Power Over Ethernet Overview Line Detection Before power is applied, safety dictates that it must first be ensured that a valid PD is connected to the PSE's output. This process is referred to as "line detection", and involves the PSE seeking a specific, 25 KO signature resistor. Detection of this signature indicates that a valid PD is connected, and that provision of power to the device may commence.
Chapter 8: Power Over Ethernet Overview Operation During normal operation, the PSE provides 44-57 VDC, able to support a minimum of 15.4 watts power. Power Overloads The IEEE 802.3af standard defines handling of overload conditions. In the event of an overload (a PD drawing a higher power level than the allowed 12.
Chapter 8: Power Over Ethernet Overview AC Disconnect detection involves the induction of low AC signal in addition to the 48 VDC operating voltage. The returned AC signal amplitude is monitored by the PSE at the port terminals. During normal operation, the PD's relatively low impedance lowers the returned AC signal while a sudden disconnection of this PD will cause a surge to the full AC signal level and will indicate PD disconnection.
Chapter 8: Power Over Ethernet Overview 200 GE-DS-242-PoE Managed Ethernet Switch User Manual
Chapter 9 Troubleshooting This chapter contains information to help you solve common problems. If the Ethernet Switch is not functioning properly, make sure the Ethernet Switch was set up according to the instructions in this manual. The Link LED is not lit Solution: Check the cable connection and remove duplex mode of the Ethernet Switch Some stations cannot talk to other stations located on the other port Solution: Check the VLAN settings, trunk settings, or port enabled / disabled status.
Chapter 9: Troubleshooting 4. Make sure the cable is the right type 5. Turn off the power. After a while, turn on power again 100Base-TX port link LED is lit, but the traffic is irregular Solution: Check that the attached device is not set to dedicate full duplex. Some devices use a physical or software switch to change duplex modes. Auto-negotiation may not recognize this type of full-duplex setting. Switch does not power up Solution: 1. AC power cord not inserted or faulty 2.
Appendix A RJ-45 Pin Assignment Switch's RJ-45 Pin Assignments 1000Mbps, 1000Base T Contact MDI MDI-X 1 BI_DA+ BI_DB+ 2 BI_DA- BI_DB- 3 BI_DB+ BI_DA+ 4 BI_DC+ BI_DD+ 5 BI_DC- BI_DD- 6 BI_DB- BI_DA- 7 BI_DD+ BI_DC+ 8 BI_DD- BI_DC- Implicit implementation of the crossover function within a twisted-pair cable, or at a wiring panel, while not expressly forbidden, is beyond the scope of this standard.
Appendix A: RJ-45 Pin Assignment 10/100Mbps, 10/100Base-TX When connecting your 10/100Mbps Ethernet Switch to another switch, a bridge or a hub, a straight or crossover cable is necessary. Each port of the Switch supports auto-MDI/MDI-X detection. That means you can directly connect the Switch to any Ethernet devices without making a crossover cable.
Appendix A: RJ-45 Pin Assignment Figure 101: Straight-Through and Crossover Cable Straight Cable 1 2 3 4 5 6 7 8 SIDE 1 4 5 6 7 8 SIDE 2 Crossover Cable 1 2 3 4 5 6 7 8 SIDE 1 5 6 7 8 SIDE 2 1 1 2 2 3 3 4 SIDE 1 1 = White / Orange 2 = Orange 3 = White / Green 4 = Blue 5 = White / Blue 6 = Green 7 = White / Brown 8 = Brown SIDE2 1 = White / Orange 2 = Orange 3 = White / Green 4 = Blue 5 = White / Blue 6 = Green 7 = White / Brown 8 = Brown SIDE 1 1 = White / Orange 2 = Orange