MSM-6226 User's Manual 24-Port L2 Plus Managed Fast Ethernet Switch + 2 TP/SFP Gigabit Dual Media Release 1.0 2011, ICPDAS Manufacture Corporation. All rights reserved. All brand and product names are trademarks or registered trademarks of their respective companies. i Publication date:March.
The information in this document is subject to change without notice. Unless the explicit written permission of ICPDAS Manufacture Corporation, this document in whole or in part shall not be replicated or modified or amended or transmitted, in any from, or by any means manual, electric, electronic, electromagnetic, mechanical, optical or otherwise for any purpose.
external or electrical stress, shipment, storage, accident, abuse or misuse, (3) Product is used in an extra hazardous environment or activities, (4) any serial number on the Product has been removed or defaced, or (5) this warranty will be of no effect if the repair is via anyone other than Manufacture or the authorized agents. The maximum liability of ICPDAS Manufacture under this warranty is confined to the purchase price of the Product covered by this warranty. DISCLAIMER.
Table of Contents CAUTION ........................................................................................................................... IV ELECTRONIC EMISSION NOTICES ....................................................................................... IV 1. Introduction.......................................................................................................................1 1-1. OVERVIEW OF MSM-6226 ..............................................................................
3-9-1. IGMP Setting .................................................................................................... 65 3-9-2. IGMP VLAN ..................................................................................................... 66 3-9-3. Group Allow ..................................................................................................... 68 3-9-4. MVR Setting...................................................................................................... 69 3-9-5.
Appendix B Null Modem Cable Specifications .............................................................
Revision History Release Date Revision 1.0 2011/03/21 A1 vii Publication date: March.
Caution Circuit devices are sensitive to static electricity, which can damage their delicate electronics. Dry weather conditions or walking across a carpeted floor may cause you to acquire a static electrical charge. To protect your device, always: • Touch the metal chassis of your computer to ground the static electrical charge before you pick up the circuit device. • • Pick up the device by holding it on the left and right edges only.
Warrning: • Self-demolition on Product is strictly prohibited. Damage caused by selfdemolition will be charged for repairing fees. • Do not place product at outdoor or sandstorm. • Before installation, please make sure input power supply and product specifications are compatible to each other. • Before importing / exporting configuration please make sure the firmware version is always the same.
About this user’s manual In this user’s manual, it will not only tell you how to install and connect your network system but configure and monitor the MSM-6226 through the built-in CLI and web by RS-232 serial interface and Ethernet ports step-by-step. Many explanation in detail of hardware and software functions are shown as well as the examples of the operation for web-based interface and command-line interface (CLI).
1. Introduction 1-1. Overview of MSM-6226 MSM-6226, a 24 Fast Ethernet + 2 Gigabit L2 Managed Switch, which implemented 24 10/100Mbps TP + 2 Gigabit dual media ports with TP/SFP(or GBIC), is a standard switch that meets all IEEE 802.3/u/x/z Gigabit, Fast Ethernet and Ethernet specifications. The switch can be managed through RS-232 serial port via directly connection, or through Ethernet port using Telnet or Web-based management unit, associated with SNMP agent.
DHCP Snooping: This feature enables the DHCP Snooping (MSM-6226 switch) to include information about client when forwarding DHCP requests from a DHCP client to a DHCP server via Trust Port. DHCP snooping can be configured on LAN switches to harden the security on the LAN to only allow clients with specific IP/MAC addresses to have access to the network. In short, DHCP snooping ensures IP integrity on a Layer 2 switched domain. QoS: Support Quality of Service by the IEEE 802.1P standard.
• • • When queried, sends group membership reports to the group. When one of its hosts joins a multicast address group to which none of its other hosts belong, sends unsolicited group membership reports to that group. When the last of its hosts in a particular multicast group leaves the group, sends an unsolicited leave group membership report to the all-routers group (244.0.0.2).
1-2. Checklist Before you start installing the switch, verify that the package contains the following: MSM-6226 24 Fast Ethernet + 2 Gigabit L2 Managed Switch Modules (optional) Mounting Accessory (for 19” Rack Shelf) This User's Manual in CD-ROM AC Power Cord RS-232 Cable Please notify your sales representative immediately if any of the aforementioned items is missing or damaged. 1-3.
• Supports 802.1Q VLAN with 4K entries. • Supports user management and limits three users to login • Supports DHCP Broadcasting Suppression to avoid network suspended or crashed • Supports to send the trap event while monitored events happened • Supports Link Layer Discovery Protocol (LLDP, IEEE802.
1-4. View of MSM-6226 Fig. 1-1 Full View of MSM-6226D with SFP Module 1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs) There are 24 TP Fast Ethernet ports and 2 slots for optional removable modules on the front panel of the switch. LED display area, locating on the front panel, contains a CPURUN, Power LED and 26 ports working status of the switch.
• LED Indicators LED Color Function System LED CPURUN POWER ACT FDX SPD Green Green Green Green Green Lit when CPU is on and good Lit when AC power is on and good Lit when LEDSET set on active mode Lit when LEDSET set on full-duplex mode Lit when LEDSET set on speed mode 10/100Mbps Ethernet TP Port 1 to 24 LED LNK Lit when connection with remote device is good Off when cable connection is not good a. LEDSET set on ACT (active) mode: Blinks when any traffic is present Amber b.
2. Installation 2-1. Starting MSM-6226 Up This section will give users a quick start for: - Hardware and Cable Installation - Management Station Installation - Software booting and configuration 2-1-1. Hardware and Cable Installation At the beginning, please do first: ⇒ Wear a grounding device to avoid the damage from electrostatic discharge • Installing Optional SFP/GBIC Fiber Transceivers to the MSM-6226 Managed Switch Note: If you have no modules, please skip this section. Fig.
• TP Port and Cable Installation ⇒ In the switch, TP port supports MDI/MDI-X auto-crossover, so both types of cable, straight-through (Cable pin-outs for RJ-45 jack 1, 2, 3, 6 to 1, 2, 3, 6 in 10/100M TP; 1, 2, 3, 4, 5, 6, 7, 8 to 1, 2, 3, 4, 5, 6, 7, 8 in Gigabit TP) and crossed-over (Cable pin-outs for RJ-45 jack 1, 2, 3, 6 to 3, 6, 1, 2) can be used. It means you do not have to tell from them, just plug it. ⇒ Use Cat.
2-1-2. Installing Chassis to a 19-Inch Wiring Closet Rail Fig. 2-2 Caution: Allow a proper spacing and proper air ventilation for the cooling fan at both sides of the chassis. ⇒ ⇒ ⇒ Wear a grounding device for electrostatic discharge. Screw the mounting accessory to the front side of the switch (See Fig. 2-2). Place the Chassis into the 19-inch wiring closet rail and locate it at the proper position. Then, fix the Chassis by screwing it. 2-1-3.
Gigabit Fiber with BiDi LC 1310nm SFP module Gigabit Fiber with BiDi LC 1550nm SFP module The following table lists the types of fiber that we support and those else not listed here are available upon request. Multi-mode Fiber Cable and Modal Bandwidth Multi-mode 62.5/125µm IEEE 802.3z Gigabit Ethernet 1000SX 850nm Modal Bandwidth Multi-mode 50/125µm Modal Bandwidth Distance Distance 160MHz-Km 220m 400MHz-Km 500m 200MHz-Km 275m 500MHz-Km 550m SFP. LC.S10/30/50/70/B0 Km (or GBIC.SC.
provide the long haul connection. • Typical Network Topology in Deployment A hierarchical network with minimum levels of switch may reduce the timing delay between server and client station. Basically, with this approach, it will minimize the number of switches in any one path; will lower the possibility of network loop and will improve network efficiency. If more than two switches are connected in the same network, select one switch as Level 1 switch and connect all other switches to it at Level 2.
Case 2b: Port-based VLAN (See Fig.2-5). Fig. 2-5 Port-based VLAN Diagram 1. VLAN1 members could not access VLAN2, VLAN3 and VLAN4 members. 2. VLAN2 members could not access VLAN1 and VLAN3 members, but they could access VLAN4 members. 3. VLAN3 members could not access VLAN1, VLAN2 and VLAN4. 4. VLAN4 members could not access VLAN1 and VLAN3 members, but they could access VLAN2 members. Case3a: The same VLAN members can be at different switches with the same VID (See Fig. 2-6). Fig.
2-1-4. Configuring the Management Agent of MSM-6226 We offer you three ways to startup the switch management function. They are RS-232 console, CLI, and Web. Users can use any one of them to monitor and configure the switch. You can touch them through the following procedures.
Note: The switch’s serial port default settings are listed as follows: Baud rate Stop bits Data bits Parity Flow control 4. 57600 1 8 N none When you complete the connection, then press key. The login prompt will be shown on the screen. The default username and password are shown as below: Username = admin Password = admin • Set IP Address, Subnet Mask and Default Gateway IP Address Please refer to Fig. 2-7 CLI Management for details about ICPDAS Manufacture’s setting.
2-1-4-2. Configuring the Management Agent of MSM-6226 through the Ethernet Port There are three ways to configure and monitor the switch through the switch’s Ethernet port. They are CLI, Web browser and SNMP manager. The user interface for the last one is NMS dependent and does not cover here. We just introduce the first two types of management interface. MSM-6226 L2 Managed Switch Default IP Setting: IP = 192.168.1.1 Subnet Mask = 255.255.255.0 Default Gateway = 192.168.1.
2-1-5. IP Address Assignment For IP address configuration, there are three parameters needed to be filled in. They are IP address, Subnet Mask, Default Gateway and DNS. IP address: The address of the network device in the network is used for internetworking communication. Its address structure looks is shown in the Fig. 2-11. It is “classful” because it is split into predefined address classes or categories.
10 Network address Host address Class C: IP address range between 192.0.0.0 and 223.255.255.255. Each class C network has a 24-bit network prefix followed 8-bit host address. There are 2,097,152 (2^21)/24 networks able to be defined with a maximum of 254 (2^8 –2) hosts per network. Bit # 0 1 2 3 23 24 31 110 Network address Host address Class D and E: Class D is a class with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RFC 1112.
Network Subnet 10000000.00000001.00000010.1 0000000 25 bits All 0s = 128.1.2.128 All 1s= 128.1.2.255 1 0000000 1 1111111 In this diagram, you can see the subnet mask with 25-bit long, 255.255.255.128, contains 126 members in the sub-netted network. Another is that the length of network prefix equals the number of the bit with 1s in that subnet mask. With this, you can easily count the number of IP addresses matched. The following table shows the result. Prefix Length No. of IP matched No.
With the subnet mask, a bigger network can be cut into small pieces of network. If we want to have more than two independent networks in a worknet, a partition to the network must be performed. In this case, subnet mask must be applied. For different network applications, the subnet mask may look like 255.255.255.240. This means it is a small network accommodating a maximum of 15 nodes in the network.
2-2. Typical Applications The MSM-6226 implements 24 Fast Ethernet TP ports with auto MDIX and 2 Gigabit dual media ports with SFP/GBIC for removable module supported comprehensive fiber types of connection, including LC, BiDi LC for SFP and LC/SC, BiDi LC/SC for GBIC. For more details on the specification of the switch, please refer to Appendix A. The switch is suitable for the following applications. Central Site/Remote site application is used in carrier or ISP (See Fig.
Fig. 2-14 Peer-to-peer Network Connection Fig.
3. Operation of Web-based Management This chapter instructs you how to configure and manage the MSM-6226 through the web user interface it supports, to access and manage the 24 10/100Mbps TP + 2 Gigabit dual media ports with TP/SFP(or GBIC)Fiber management Ethernet switch.
To optimize the display effect, we recommend you use Microsoft IE 6.0 above, Netscape V7.1 above or FireFox V1.00 above and have the resolution 1024x768. The switch supported neutral web browser interface. In Fig. 3-2, for example, left section is the whole function tree with web user interface and we will travel it through this chapter. Fig.
3-1. Web Management Home Overview After you login, the switch shows you the system information as Fig. 3-2. This page is default and tells you the basic information of the system, including “Model Name”, “System Description”, “Location”, “Contact”, “Device Name”, “System Up Time”, “Current Time”, “BIOS Version”, “Firmware Version”, “Hardware-Mechanical Version”, “Serial Number”, “Host IP Address”, “Host MAC Address”, “Device Port”, “RAM Size” and “Flash Size”.
Fig. 3-3 port detail information In Fig. 3-3, it shows the basic information of the clicked port. With this, you’ll see the information about the port status, traffic status and bandwidth rating for egress and ingress respectively. On the left-top corner, there is a pull-down list for Auto Logout. For the sake of security, we provide auto-logout function to protect you from illegal user as you are leaving.
Root System DHCP Snooping DHCP Relay IP-MAC Binding Port Loop Detection SNMP DHCP Boot Multicast LLDP VLAN MAC Table GVRP STP MSTP Trunk 802.1X TACACS+ Alarm Configuration TFTP Server Security Bandwidth QoS ACL Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout 27 Publication date: March.
3-1-1. System Information Function name: System Information Function description: Show the basic system information. Fig. 3-3.1 System information Parameter description: Model name: The model name of this device. System description: As it is, this tells what this device is. Here, it is “24 Fast Ethernet + 2 Gigabit L2 Managed Switch”. Location: Basically, it is the location where this switch is put. User-defined.
The time accumulated since this switch is powered up. Its format is day, hour, minute, second. Current time: Show the system time of the switch. Its format: day of week, month, day, hours : minutes : seconds, year. For instance, Tue Apr 20 23:25:58 2004 BIOS version: The version of the BIOS in this switch. Firmware version: The firmware version in this switch. Hardware-Mechanical version: The version of Hardware and Mechanical.
3-1-2. IP Configuration IP configuration is one of the most important configurations in the switch. Without the proper setting, network manager will not be able to manage or view the device. The switch supports both manual IP address setting and automatic IP address setting via DHCP server. When IP address is changed, you must reboot the switch to have the setting taken effect and use the new IP to browse for web management and CLI management.
Subnet mask is made for the purpose to get more network address because any IP device in a network must own its IP address, composed of Network address and Host address, otherwise can’t communicate with other devices each other. But unfortunately, the network classes A, B, and C are all too large to fit for almost all networks, hence, subnet mask is introduced to solve this problem.
3-1-3. Time Configuration The switch provides manual and automatic ways to set the system time via NTP. Manual setting is simple and you just input “Year”, “Month”, “Day”, “Hour”, “Minute” and “Second” within the valid value range indicated in each item. If you input an invalid value, for example, 61 in minute, the switch will clamp the figure to 59. NTP is a well-known protocol used to synchronize the clock of the switch system time over a network.
Manual: This is the function to adjust the time manually. Filling the valid figures in the fields of Year, Month, Day, Hour, Minute and Second respectively and press button, time is adjusted. The valid figures for the parameter Year, Month, Day, Hour, Minute and Second are >=2000, 1-12, 1-31, 0-23, 0-59 and 0-59 respectively. Input the wrong figure and press button, the device will reject the time adjustment request. There is no time zone setting in Manual mode.
Mth: Range is 1 ~ 12. Default: 1 Day: Range is 1 ~ 31. Default: 1 Hour: Range is 0 ~ 23. Default: 0 Day Light Saving End : This is used to set when to stop performing the daylight saving time. Mth: Range is 1 ~ 12. Default: 1 Day: Range is 1 ~ 31. Default: 1 Hour: Range is 0 ~ 23.
3-1-4. Account Configuration In this function, only administrator can create, modify or delete the username and password. Administrator can modify other guest identities’ password without confirming the password but it is necessary to modify the administrator-equivalent identity. Guest-equivalent identity can modify his password only. Please note that you must confirm administrator/guest identity in the field of Authorization in advance before configuring the username and password.
3-1-5. Management Security Through the management security configuration, the manager can do the strict setup to control the switch and limit the user to access this switch. The following rules are offered for the manager to manage the switch: Rule 1) : When no lists exists, then it will accept all connections.
Function name: Management Security Configuration Function description: The switch offers Management Security Configuration function. With this function, the manager can easily control the mode that the user connects to the switch. According to the mode, users can be classified into two types: Those who are able to connect to the switch (Accept) and those who are unable to connect to the switch (Deny).
IP Range: The switch supports two kinds of options for managed valid IP Range, including “Any” and “Custom”. Default is “Any”. In case that” Custom” had been chosen, you can assigned effective IP range. The valid range is 0.0.0.0~255.255.255.255. Incoming Port: The switch supports two kinds of options for managed valid Port Range, including “Any” and “Custom”. Default is “Any”.
3-1-6. Virtual Stack Function name: Virtual Stack Function description: Virtual Stack Management(VSM) is the group management function. Through the proper configuration of this function, switches in the same LAN will be grouped automatically. And among these switch, one switch will be a master machine, and the others in this group will become the slave devices. VSM offers a simple centralized management function.
Fig. 3-8 Parameter description: State: It is used for the activation or de-activation of VSM. Default is Enable. Role: The role that the switch would like to play in virtual stack. Two types of roles, including master and slave are offered for option. Default is Master. Group ID: It is the group identifier (GID) which signs for VSM. Valid letters are A-Z, a-z, 0-9, “ - “ and “_” characters. The maximal length is 15 characters. Fig.
3-2. DHCP Snooping DHCP Snooping Config Trust Group Lease List Counter Fig.3-9-1 3-2-1. DHCP Snooping Config Function name: DHCP Snooping Config Function description: The addresses assigned to DHCP clients on unsecure ports can be carefully controlled using the dynamic bindings registered with DHCP Snooping. DHCP snooping allows a switch to protect a network from rogue DHCP servers or other devices which send port-related information to a DHCP server.
3-2-2. Trust Group Function name: Trust Group Function description: The function which you can configure the Group as trusted or untrusted. You must to set the trust port1 and port2 on the Switch, Option 82 state with “ Disable”/ “Enable”, Action with “Replace”/ “Drop” /” Keep” , DHCP Server VLAN ID, DHCP Server IP address. and Trust VID. Fig. 3-10.1 Parameter description: Server Port1, 2: To configure the port which DHCP Server connect to on the Switch.
The DHCP Server belong the VLAN member ID which you set on the Switch. ;Obey by the PVID on the Switch. Server IP: The DHCP Server IP address. It allows the IP address with 0.0.0.0. Trust VID: The DHCP client belong the VLAN member ID which you set on the Switch. It can be different with server VID; Obey by the PVID on the Switch. Edit/ Create: It allows you to edit or create a DHCP snooping trust group rule on the switch. Delete: To delete a DHCP snooping trust group entry on the switch.
3-2-3. Lease List Function name: Lease List Function description: To record and display the DHCP Snooping concurrent lease List table. Fig. 3-10.2 Parameter description: MAC: To display the DHCP server Client MAC address. IP: To display the client’s IP address which got from the DHCP server. Port: To display the client belong the port on the switch. VID: To display the client belong the VLAN member ID on the switch. Lease: To display the client lease time state, includes Day.Hour:Min:Sec.
3-2-4. Counter Function name: Counter Function description: To display the DHCP Snooping packet received per port detail counter information. . Fig. 3-10.2 Parameter description: Port No: The port number on the switch. . Discovery: To display discovery of DHCP request packet received by the port on the switch . 45 Publication date:March.
3-3. DHCP Relay The Dynamic Host Configuration Protocol (DHCP) is a service that runs at the application layer of the TCP/IP protocol stack to dynamically assign IP addresses to DHCP clients. DHCP clients request IP addresses, and obtain leases for IP addresses from the DHCP server. The DHCP Relay Agent makes it possible for DHCP broadcast messages to be sent over routers that do not support forwarding of these types of messages.
To enable or disable the DHCP Relay function on the Switch, Default is “Disable”. DHCP Relay Lifetime: Use to set the default lifetime for which a prefix delegated by this DHCP local server is valid. This default is overridden by an interface-specific lifetime. Default is “5” sec. DHCP Relay Agent Information Option 82 state: Enables the system to insert the DHCP relay agent information option 82 in forwarded BOOT REQUEST messages to a DHCP server. Default is “Disable” sec.
3-4. IP-MAC Binding The IP network layer uses a four-byte address. The Ethernet link layer uses a six-byte MAC address. Binding these two address types together allows the transmission of data between the layers. The primary purpose of IP-MAC binding is to restrict the access to a switch to a number of authorized users. Only the authorized client can access the Switch’s port by checking the pair of IP-MAC Addresses and port number with the pre-configured database.
MAC: Six-byte MAC Address: xx-xx-xx-xx-xx-xx For example: 00-40-c7-00-00-01 IP: Four-byte IP Address: xxx.xxx.xxx.xxx For example: 192.168.1.100 Port No: Port no.: 1-24 Add: Input MAC, IP, Port and VID, then click on to create a new entry into the IP MAC Binding table Edit: The existed entry also can be modified after pressing button. Delete: Select one of entry from the table, then click on to delete this entry. Fig. 3-12 49 Publication date: March.
3-5. Port Configuration Four functions, including Port Status, Port Configuration, Simple Counter and Detail Counter are contained in this function folder for port monitor and management. Each of them will be described in detail orderly in the following sections. Port Configuration Status Configuration Description Simple Counter Detail Counter 3-5-1.
Port No: Display the port number. The number is 1 – 26. Both port 25 and 26 are optional modules. Media: Show the media type adopted in all ports. The Port 25 and Port 26 are optional modules, which support either fiber or UTP media with either Gigabit Ethernet (1000Mbps) or 10/100Mbps Fast Ethernet port. They may have different media types and speed. Especially, fiber port has comprehensive types of connector, distance, fiber mode and so on. The switch describes the module ports with the following page.
In port 25 and port 26, if the media is 1000Mbps with TP media, it will show the combinations of 10/100M and Full/Half duplex, 1000Mbps and Full duplex only. If the media is 1000Mbps with fiber media, it will show only 1000M/Full duplex. Default: None, depends on the result of the negotiation. Rx Pause: The way that the port adopts to process the PAUSE frame. If it shows “on”, the port will care the PAUSE frame; otherwise, the port will ignore the PAUSE frame.
Display the Manufacturer's OUI code which is assigned by IEEE. Vendor Name: Display the company name of the module Manufacturer. Vendor P/N: Display the product name of the naming by module Manufacturer. Vendor Rev (Revision): Display the module revision. Vendor SN (Serial Number): Show the serial number assigned by the Manufacturer. Date Code: Show the date this module was made. Temperature: Show the current temperature of module. Vcc: Show the working DC voltage of module.
3-5-2. Port Configuration Port Configuration is applied to change the setting of each port. In this configuration function, you can set/reset the following functions. All of them are described in detail below. Function name: Port Configuration Function description: It is used to set each port’s operation mode. The switch supports 3 parameters for each port. They are State, Speed/Duplex and Flow Control. Fig. 3-15 Parameter description: 54 Publication date:March.
State: Set the communication capability of the port is Enabled or Disabled. When enabled, traffic can be transmitted and received via this port. When disabled, the port is blocked and no traffic can be transferred through this port. Port State is configurable by the user. There are only two states “Enable” and “Disable” able to choose. If you set a port’s state “Disable”, then that port is prohibited to pass any traffic, even it looks Link up. Default: Enable.
3-5-3. Port Description Port Description is applied to change the setting of each port. In this configuration function, you can set the port description for specific application. All of them are described in detail below. Function name: Port Description Function description: It is used to set each port’s description for network management purpose. You can assign the friendly description per port to identity the Port purpose. Fig. 3-15 Parameter description: Port: The port number on the Switch.
3-5-4. Simple Counter The function of Simple Counter collects any information and provides the counting about the traffic of the port, no matter the packet is good or bad. In the Fig. 3-13, the window can show all ports’ counter information at the same time. Each data field has 20-digit long. If the counting is overflow, the counter will be reset and restart counting. The data is updated every time interval defined by the user. The valid range is 3 to 10 seconds.
3-5-5. Detail Counter The function of Detail Counter collects any information and provides the counting about the traffic of the port, no matter the packet is good or bad. In the Fig. 3-14, the window can show only one port counter information at the same time. To see another port’s counter, you have to pull down the list of Select, then you will see the figures displayed about the port you had chosen. Each data field has 20-digit long.
Rx Errors: Number of bad packets received. Rx Unicast Packets: Show the counting number of the received unicast packet. Rx Broadcast Packets: Show the counting number of the received broadcast packet. Rx Multicast Packets: Show the counting number of the received multicast packet. Rx Pause Packets: Show the counting number of the received pause packet. Tx Collisions: Number of collisions transmitting frames experienced.
Number of 512 ~ 1023-byte frames in good and bad packets received. Packets 1024- 1522 Octets: Number of 1024-1522-byte frames in good and bad packets received. Tx Packets: The counting number of the packet transmitted. TX Octets: Total transmitted bytes. Tx Unicast Packets: Show the counting number of the transmitted unicast packet. Tx Broadcast Packets: Show the counting number of the transmitted broadcast packet. Tx Multicast Packets: Show the counting number of the transmitted multicast packet.
3-6. Loop Detection The loop detection is used to detect the presence of traffic. When switch receives packet’s(looping detection frame) MAC address the same as oneself from port, show Loop detection happens. The port will be locked when it received the looping detection frames.
3-7. SNMP Configuration Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped with SNMP agent, provided that the Management Information Base (MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity (OID) of the management Information Base (MIB), described in the form of SMI syntax.
Community name is used as password for authenticating if the requesting network management unit belongs to the same community group. If they both don’t have the same community name, they don’t belong to the same group. Hence, the requesting network management unit can not access the device with different community name via SNMP protocol; If they both have the same community name, they can talk each other. Community name is user-definable with a maximum length of 15 characters and is case sensitive.
3-8. DHCP Boot The DHCP Boot function is used to spread the request broadcast packet into a bigger time frame to prevent the traffic congestion due to broadcast packets from many network devices which may seek its NMS, boot server, DHCP server and many connections predefined when the whole building or block lose the power and then reboot and recover.
3-9. Multicast The function, is used to establish the multicast groups to forward the multicast packet to the member ports, and, in nature, avoids wasting the bandwidth while IP multicast packets are running over the network. This is because a switch that does not support IGMP or IGMP Snooping can not tell the multicast packet from the broadcast packet, so it can only treat them all as the broadcast packet.
Parameter description: IGMP snooping mode selection: The switch supports to enable IGMP snooping function Enable: Set “Enable” mode to enable IGMP Snooping function. Default: un-enable. Unregistered Multicast Flooding : The switch supports to enable Unregistered Multicast Flooding function Enable: Set “Enable” mode to enable IGMP Snooping function.
IGMP VLAN Function description: Specify the a static connection to a multicast router for the VLAN. Fig. 3-22 Parameter description: VID: To Set specify the IGMP snooping VLAN ID for each multicast group. 67 Publication date: March.
3-9-3. Group Allow Function name: Group Allowed Function description: The Group Allowed function allows the IGMP Snooping to set up the IP multicast table based on user’s specific conditions. IGMP report packets that meet the items you set up will be joined or formed the multicast group. Fig. 3-18 Parameter description: IP Range: The switch supports two kinds of options for managed valid IP range, including “Any” and “Custom”. Default is “Any”.
3-9-4. MVR Setting Function name: MVR Setting Function description: Multicast VLAN Registration (MVR) routes packets received in a multicast source VLAN to one or more receive VLANs. Clients are in the receive VLANs and the multicast server is in the source VLAN. Multicast routing has to be disabled when MVR is enabled. Refer to the configuration guide at Understanding Multicast VLAN Registration for more information on MVR.. Fig.
3-9-5. Multicast Status Function name: Multicast Status Function description: The Multicast Status function allows to display the switch received multicast traffic status. If the switch doesn’t receive any multicast traffic then it will display the “No multicast entry !” Fig. 3-24 Parameter description: No: To display current built-up multicast group entry index. Group Address : To display current built-up multicast Group Address VID: To display current built-up multicast VLAN ID .
3-9-6. RADIUS IGMP Function name: RADIUS IGMP Function description: The RADIUS IGMP function allows to some multicast applications, such as IPTV and Internet Radio, may be of minimal interest to law enforcement agencies, other multicast traffic may contain information important to an investigation.
The secret key between authentication server and authenticator. It is a string with the length 1 – 31 characters. The character string may contain upper case, lower case and 0-9. It is character sense. It is not allowed for putting a blank between any two characters. Default: Radius To display current built-up multicast VLAN ID . Response Timeout: A timeout condition in the exchange between the authenticator and the authentication server. The valid range: 1 –65535.
3-10. LLDP The switch supports the LLDP. For current information on your switch model, The Link Layer Discovery Protocol (LLDP) provides a standards-based method for enabling switches to advertise themselves to adjacent devices and to learn about adjacent LLDP devices. 3-10-1 . LLDP State Function name: LLDP State Function description: The LLDP state function, you can set per port the LLDP configuration and the detail parameters, the settings will take effect immediately. Fig.
reinitializing LLDP transmission. (Default: 2 secs) Notification Interval: Mode Port Descr Sys Name Sys Descr Sys Capa Mgmt Addr Notification The minimum interval for LLDP data change Notification fpr the same neighbor. Refer to IEEE 802.1AB-2005 or later for more information. (Default: 5 secs) : To enable or disable the LLDP mode per port. There are four type includes Disable, Tx_Rx, Tx only and Rx only : To evoke the outbound LLDP advertisements, includes an alphanumeric string describing the port.
3-10-2 . LLDP Entry Function name: LLDP Entry Function description: The LLDP Entry function allows a switch to display per port which build the LLDP available entry. This information can be useful in tracking LLDP packets back to a physical port. Fig. 3-18-2 LLDP Entry Parameter description: Local port: To display the switch local port. Chassis ID: To display the Chassis ID which connect to the switch and what the neighbor Chassis ID.
that are supported. Also includes information on whether the capabilities are enabled. Management Address: To display include a specific IP address in the outbound LLDP advertisements for specific ports.
3-10-3 . LLDP Statistics Function name: LLDP Counter Function description: Display the detailed counting number of each port’s LLDP traffic. Fig. 3-18-3 LLDP statistics Parameter description: Neighbor Entries List Last Updated : The time period which neighbor entries List were be updated . Total Neighbors Entries Added: The total neighbors entries added be received. Total Neighbors Entries Deleted: The total neighbors entries deleted be received.
Tx Frames: The counting number of the frames transmitted. Rx Frames: The counting number of the frames transmitted. Frames Discarded: Show the number of frame discarded. TLVs Discarded: Show the number of TLVs discarded. TLVs Unrecognized: Show the number of TLVs unrecognized. Age Outs: Show the number of Age Outs.
3-11. VLAN The switch supports Tag-based VLAN (802.1q) and Port-based VLAN. Support 256 active VLANs and VLAN ID 1~4094. VLAN configuration is used to partition your LAN into small ones as your demand. Properly configuring it, you can gain not only improving security and increasing performance but greatly reducing VLAN management. 3-11-1.
Port-based: Port-based VLAN is defined by port. Any packet coming in or outgoing from any one port of a port-based VLAN will be accepted. No filtering criterion applies in port-based VLAN. The only criterion is the physical port you connect to. For example, for a port-based VLAN named PVLAN-1 contains port members Port 1&2&3&4. If you are on the port 1, you can communicate with port 2&3&4. If you are on the port 5, then you cannot talk to them.
26: Except Port 26, each port of the switch cannot transmit packets with each other. Each port groups a VLAN with Port 26, thus, total 23 groups consisting of 2 members are formed. 25&26: Except Port 25 and Port 26, each port of the switch cannot transmit packets with each other. Each port groups a VLAN with Port 25 and Port 26, thus, total 22 groups consisting of 3 members are formed. 81 Publication date: March.
3-11-2. Tag-based Group Function name: Tag-based Group Configuration Function description: It shows the information of existed Tag-based VLAN Groups. You can also easily create, edit and delete a Tag-based VLAN group by pressing , and function buttons. User can add a new VLAN group by inputting a new VLAN name and VLAN ID after pressing button. Fig.
Member: This is used to enable or disable if a port is a member of the new added VLAN, “Enable” means it is a member of the VLAN. Just tick the check box beside the port x to enable it. Utag: This is used to enable or disable if a port is a utag member of the new added VLAN, “Enable” means it is a utag member of the VLAN. Just tick the check box beside the port x to enable it. Action: The mode here means the type of participant. There are two modes, Active and NotInService, provided for the user’s choice.
3-11-3. PVID Function name: PVID Function description: In PVID Setting, user can input VID number to each port. The range of VID number is from 1 to 4094. User also can choose ingress filtering rule (Rule 2) to each port. The Ingress Filtering Rule 2 is “drop untagged frame”. While Rule 2 is enabled, the port will discard all Untagged-frames. Fig. 3-29 Parameter description: Port 1-26: Port number. PVID: This PVID range will be 1-4094.
Drop Untag: Drop untagged frame. You can configure a given port to accept all frames (Tagged and Untagged) or just receive tagged frame. If the former is the case, then the packets with tagged or untagged will be processed. If the later is the case, only the packets carrying VLAN tag will be processed, the rest packets will be discarded. 85 Publication date: March.
3-11-4. Port-based Group Function name: Port-based Group Configuration Function description: It shows the information of the existed Port-based VLAN Groups. You can easily create, edit and delete a Port-based VLAN group by pressing , and function buttons. User can add a new VLAN group by inputting a new VLAN name. Fig. 3-30 Parameter description: VLAN Name: The name defined by administrator is associated with a VLAN group. Valid letters are A-Z, a-z, 0-9, “ - “ and “_” characters.
Add Group: Create a new Port-based VLAN. Input the VLAN name and choose the member by ticking the check box beside the port No., then, press the button to have the setting taken effect. Fig. 3-31 Delete Group: Just press the button to remove the selected group entry from the Port-based group table. Fig. 3-32 Edit a group: Just select a group entry and press the button, then you can modify a group‘s description and member set. 87 Publication date: March.
3-11-5. Management VLAN Function name: Management VLAN Function Description: To assign a specific VLAN for management purpose. Fig. 3-33 Parameter description: State: It works when the tag-based mode is chosen. When this function is enabled, only the tagged packets with this VID can manage the switch. VID: Valid range 1~4094.
3-12. MAC Table MAC Table Configuration gathers many functions, including MAC Table Information, MAC Table Maintenance, Static and MAC Alias, which cannot be categorized to some function type. They are described below. Function name: MAC Table Information Function Description: Display the static or dynamic learning MAC entry and the state for the selected port. Fig. 3-34 Parameter description: Port: Select the port you would like to inquire. Search: Set up the MAC entry you would like to inquire.
Search: Find the entry that meets your setup. Previous Page: Move to the previous page. Next Page: Move to the next page. Alias: The Alias of the searched entry. MAC Address: The MAC address of the searched entry. Port: The port that exists in the searched MAC Entry. VID: VLAN Group that MAC Entry exists. State: Display the method that this MAC Entry is built. It may show “Dynamic MAC” or “Static MAC”.
Fig. 3-35 Parameter description: Aging Time: Delete a MAC address idling for a period of time from the MAC Table, which will not affect static MAC address. Range of MAC Address Aging Time is 10-1000000 seconds. The default Aging Time is 300 seconds. Learning Limit: To set up the maximum amount of MAC that each port can learn. Valid value of learning limit for port 1~24 ranges from 0-8191. As to port 25~port 26, only the fixed value “8192” is assigned to these two ports and user cannot configure this value.
Fig. 3-36 Parameter description: MAC: It is a six-byte long Ethernet hardware address and usually expressed by hex and separated by hyphens. For example, 00 – 40 - C7 - D6 – 00 - 01 VID: VLAN identifier. This will be filled only when tagged VLAN is applied. Valid range is 1 ~ 4094. Forwarding Rule(Drop Policy): Static: A MAC address is assigned to a specific port, all of the switch’s traffics sent to this MAC address will be forwarded to this port.
Function name: MAC Alias Function description: MAC Alias function is used to let you assign MAC address a plain English name. This will help you tell which MAC address belongs to which user in the illegal access report. At the initial time, it shows all pairs of the existed alias name and MAC address. There are three MAC alias functions in this function folder, including MAC Alias Add, MAC Alias Edit and MAC Alias Delete.
Function name: Port Security Function description: Port Security function is used to let you assign the port authenticate with the MAC address for security purpose. Fig. 3-37-1 Parameter description: Port: Select the port you would like to inquire. Function name: Port static MAC Function description: Port Static MAC function is used to let you assign per port authenticate with the static MAC address for security purpose.
Fig. 3-37-1 Parameter description: MAC Address: It is a six-byte long Ethernet hardware address and usually expressed by hex and separated by hyphens. For example, 00 – 40 - C7 - D6 – 00 - 02 VID: VLAN Group ID that MAC Entry for the port member exists. 95 Publication date: March.
3-13. GVRP Configuration GVRP is an application based on Generic Attribute Registration Protocol (GARP), mainly used to automatically and dynamically maintain the group membership information of the VLANs. The GVRP offers the function providing the VLAN registration service through a GARP application. It makes use of GARP Information Declaration (GID) to maintain the ports associated with their attribute database and GARP Information Propagation (GIP) to communicate among switches and end stations.
Leave Time: Used to declare the Leave Time in unit of centisecond. Valid time range: 60 –300 centisecond, Default: 60 centisecond. Leave All Time: A time period for announcement that all registered device is going to be de-registered. If someone still issues a new join, then a registration will be kept in the switch. Valid range: 1000-5000 unit time, Default: 1000 unit time. Default Applicant Mode: The mode here means the type of participant.
Enabled: In this mode, the switch does not create dynamic VLAN when this port received GVRP PDU. Except received dynamic VLAN message of the GVRP PDU is an existed static VLAN in the switch, this port will be added into the static VLAN members dynamically. Function name: GVRP Counter Function description: All GVRP counters are mainly divided into Received and Transmitted two categories to let you monitor the GVRP actions. Actually, they are GARP packets. Fig.
JoinIn Message Packets: Number of GARP BPDU with Join In message is received by the GARP application. LeaveEmpty Message Packets: Number of GARP BPDU with Leave Empty message is received by the GARP application. Empty Message Packets: Number of GARP BPDU with Empty message is received by the GARP application. Transmitted: Total GVRP Packets: Total GARP BPDU is transmitted by the GVRP application. Invalid GVRP Packets: Number of invalid GARP BPDU is transmitted by the GVRP application.
Fig. 3-40 Parameter description: Current Dynamic Group Number: The number of GVRP group that are created currently. VID: VLAN identifier. When GVRP group creates, each dynamic VLAN group owns its VID. Valid range is 1 ~ 4094. Member Port: Those are the members belonging to the same dynamic VLAN group. Edit Administrative Control: When you create GVRP group, you can use Administrative Control function to change Applicant Mode and Registrar Mode of GVRP group member.
3-14. STP Configuration The Spanning Tree Protocol (STP) is a standardized method (IEEE 802.1D) for avoiding loops in switched networks. When STP is enabled, ensure that only one path is active between any two nodes on the network at a time. User can enable Spanning Tree Protocol on switch’s web management and then set up other advanced items. We recommend that you enable STP on all switches to ensure a single active path on the network. 3-14-1.
bridge, the “Designated Root” will show this switch’s bridge ID. Designated Priority: Show the current root bridge priority. Root Port: Show port number connected to root bridge with the lowest path cost. Root Path Cost: Show the path cost between the root port and the designated port of the root bridge. Current Max. Age: Show the current root bridge maximum age time. Maximum age time is used to monitor if STP topology needs to change.
3-14-2. STP Configuration The STP, Spanning Tree Protocol, actually includes RSTP. In the Spanning Tree Configuration, there are six parameters open for the user to configure as user’s idea. Each parameter description is listed below. Function name: STP Configuration Function description: User can set the following Spanning Tree parameters to control STP function enable/disable, select mode RSTP/STP and affect STP state machine behavior to send BPDU in this switch.
will use the hello time assigned by this switch to communicate with each other. The valid value is 1 ~ 10 in unit of second. Default is 2 seconds. Max. Age: When the MSM-6226 is the root bridge, the whole LAN will apply this figure set by this switch as their maximum age time. When a bridge received a BPDU originated from the root bridge and if the message age conveyed in the BPDU exceeds the Max.
3-14-3. STP Port Configuration Function name: STP Port Setting Function description: In the STP Port Setting, one item selection and five parameters settings are offered for user’s setup. User can disable and enable each port by selecting each Port Status item. User also can set “Path Cost” and “Priority” of each port by filling in the desired value and set “Admin Edge Port” and “Admin Point To Point” by selecting the desired item. Fig.
Configured Path Cost: The range is 0 – 200,000,000. In the switch, if path cost is set to be zero, the STP will get the recommended value resulted from auto-negotiation of the link accordingly and display this value in the field of Path Cost Status. Otherwise, it may show the value that the administrator set up in Configured Path Cost and Path Cost Status. 802.
this port. Default: Auto M Check: Migration Check. It forces the port sending out an RSTP BPDU instead of a legacy STP BPDU at the next transmission. The only benefit of this operation is to make the port quickly get back to act as an RSTP port. Click button to send a RSTP BPDU from the port you specified. 107 Publication date: March.
3-15. MSTP Configuration The implementation of MSTP is according to IEEE 802.1Q 2005 Clause 13 – Multiple Spanning Tree Protocol. MSTP allows frames assigned to different VLANs to follow separate paths, each based on an independent Multiple Spanning Tree Instance (MSTI), within Multiple Spanning Tree (MST) Regions composed of LANs and or MST Bridges. Proper configuration of MSTP in an 802.1Q VLAN environment can ensure a loop-free data path for a group of vlans within an MSTI.
3-15-2 Region Config Function name: MSTP Region Config Function description: To configure the basic identification of a MSTP bridge. Bridges participating in a common MST region must have the same Region Name and Revision Level. Fig. 3-43.2 Parameter description: Region Name: 0-32 characters.(A variable length text string encoded within a fixed field of 32 octets , conforming to RFC 2271’s definition of SnmpAdminString.
3-15-3 Instance View Function name: MSTP Instance Config Function description: Providing an MST instance table which include information(vlan membership of a MSTI ) of all spanning instances provisioned in the particular MST region which the bridge belongs to. Through this table, additional MSTP configuration data can be applied and MSTP status can be retrieved. Fig. 3-43.3 Parameter description: Instance ID: Every spanning tree instance need to have a unique instance ID within 0~4095.
Del MSTI: To delete an MSTI. Del All MSTI: Deleting all provisioned MSTIs at a time. Instance Configuration: Fig. 3-43.5 To provision spanning tree performance parameters per instance. Port Config: Fig. 3-43.4 To provision spanning tree performance parameters per instance per port. Instance Status: Fig. 3-43.5 To show the status report of a particular spanning tree instance. Port Status: Fig. 3-43.5 To show the status report of all ports regarding a specific spanning tree instance. Fig. 3-43.
Fig. 3-43.5 Instance Config Parameter description: Priority: The priority parameter used in the CIST(Common and Internal Spanning Tree) connection. 0 / 4096 / 8192 / 12288 / 16384 / 20480 / 24576 / 28672 / 32768 / 36864 / 40960 / 45056 / 49152 / 53248 / 57344 / 61440 MAX. Age: 6-40sec. The same definition as in the RSTP protocol. Forward Delay: 4-30sec. The same definition as in the RSTP protocol. MAX. Hops: 6-40sec. It’s a new parameter for the multiple spanning tree protocol.
Fig. 3-43.6 Port Config Parameter description: Port: 1-24 Path Cost: 1 – 200,000,000 The same definition as in the RSTP specification. But in MSTP, this parameter can be respectively applied to ports of CIST and ports of any MSTI. Priority: 0 / 16 / 32 / 48 / 64 / 80 / 96 / 112 / 128 / 144 / 160 / 176 / 192 / 208 / 224 / 240 The same definition as in the RSTP specification. But in MSTP, this parameter can be respectively applied to ports of CIST and ports of any MSTI.
Restricted Role: Yes / No If “Yes” causes the Port not to be selected as Root Port for the CIST or any MSTI, even it has the best spanning tree priority vector. Such a Port will be selected as an Alternate Port after the Root Port has been selected. This parameter is “No” by default. If set, it can cause lack of spanning tree connectivity.
Fig. 3-43.7 Instance Status Parameter description: MSTP State: MSTP protocol is Enable or Disable. Force Version: It shows the current spanning tree protocol version configured. Bridge Max Age: It shows the Max Age setting of the bridge itself. Bridge Forward Delay: It shows the Forward Delay setting of the bridge itself. Bridge Max Hops: It shows the Max Hops setting of the bridge itself.
CIST ROOT PRIORITY: Spanning tree priority value of the CIST root bridge CIST ROOT MAC: Mac Address of the CIST root bridge CIST EXTERNAL ROOT PATH COST: Root path cost value from the point of view of the bridge’s MST region. CIST ROOT PORT ID: The port ID of the bridge’s root port. In MSTP, peer port of a root port may reside in defferent MST region or in the same MST region.The first case indicates that the root port’s owner is the CIST regional root bridge.
Fig. 3-43.8 Port Status Parameter description: Port No: 1-24 Status: The forwarding status.Same definition as of the RSTP specification Possible values are “FORWARDING” , “LEARNING” , “DISCARDING” Status: The role that a port plays in the spanning tree topology. Possible values are “dsbl”(disable port) , ”alt”(alternate port) , “bkup”(backup port) , “ROOT”(root port) , “DSGN”(designated port) , “MSTR”(master port).
3-16. Trunking Configuration The Port Trunking Configuration is used to configure the settings of Link Aggregation. You can bundle more than one port with the same speed, full duplex and the same MAC to be a single logical port, thus the logical port aggregates the bandwidth of these ports. This means you can apply your current Ethernet equipments to build the bandwidth aggregation.
Per Trunking Group supports a maximum of 4 ready member-ports. Please note that some decisions will automatically be made by the system while you are configuring your trunking ports.
LACP: A port use LACP as its trunk method to get aggregated with other ports also using LACP. Static: A port use Static Trunk as its trunk method to get aggregated with other ports also using Static Trunk. Group: Ports choosing the same trunking method other than “None” must be assigned a unique Group number (i.e. Group ID, valid value is from 1 to 8) in order to declare that they wish to aggregate with each other. Active LACP: This field is only referenced when a port’s trunking method is LACP.
Function name: Aggregator View Function description: To display the current port trunking information from the aggregator point of view. Fig.3-45 Parameter description: Aggregator: It shows the aggregator ID (from 1 to 26) of every port. In fact, every port is also an aggregator, and its own aggregator ID is the same as its own Port No.. Method: Show the method a port uses to aggregate with other ports. Member Ports: Show all member ports of an aggregator (port).
Function name: LACP Detail (LACP Aggregator Detailed Information) Function description: Show the detailed information of the LACP trunking group. Fig. 3-46 Parameter description: Actor: The switch you are watching on. Partner: The peer system from this aggregator’s view. System Priority: Show the System Priority part of a system ID. MAC Address: Show the MAC Address part of a system ID. Port: Show the port number part of an LACP port ID. Key: Show the key value of the aggregator.
Function name: LACP System Configuration Function description: It is used to set the priority part of the LACP system ID. LACP will only aggregate together the ports whose peer link partners are all on a single system. Each system supports LACP will be assigned a globally unique System Identifier for this purpose. A system ID is a 64-bit field comprising a 48-bit MAC Address and 16-bit priority value. Fig.3-47 Parameter description: System Priority: The System Priority can be set by the user.
3-17. 802.1x Configuration 802.1x port-based network access control provides a method to restrict users to access network resources via authenticating user’s information. This restricts users from gaining access to the network resources through a 802.1x-enabled port without authentication. If a user wishes to touch the network through a port under 802.
The overview of operation flow for the Fig. 3-41 is quite simple. When Supplicant PAE issues a request to Authenticator PAE, Authenticator and Supplicant exchanges authentication message. Then, Authenticator passes the request to RADIUS server to verify. Finally, RADIUS server replies if the request is granted or denied.
Authentication server C Fig. 3-49 Authenticator B Supplicant A The Fig. 3-49 shows the procedure of 802.1x authentication. There are steps for the login based on 802.1x port access control management. The protocol used in the right side is EAPOL and the left side is EAP. 1. At the initial stage, the supplicant A is unauthenticated and a port on switch acting as an authenticator is in unauthorized state. So the access is blocked in this stage. 2. Initiating a session.
8. If user ID and password is correct, the authentication server will send a Radius-Access-Accept to the authenticator. If not correct, the authentication server will send a Radius-Access-Reject. 9. When the authenticator PAE receives a Radius-Access-Accept, it will send an EAP-Success to the supplicant. At this time, the supplicant is authorized and the port connected to the supplicant and under 802.1x control is in the authorized state.
Only MultiHost 802.1X is the type of authentication supported in the switch. In this mode, for the devices connected to this port, once a supplicant is authorized, the devices connected to this port can access the network resource through this port. 802.1x Port-based Network Access Control function supported by the switch is little bit complex, for it just support basic Multihost mode, which can distinguish the device’s MAC address and its VID.
Function name: 802.1x State Setting Function description: This function is used to configure the global parameters for RADIUS authentication in 802.1x port security application. Fig. 3-51 Parameter description: Radius Server: RADIUS server IP address for authentication. Default: 192.168.1.1 Port Number: The port number to communicate with RADIUS server for the authentication service. The valid value ranges 1-65535. Default port number is 1812.
Function name: 802.1x Mode Setting Function description: Set the operation mode of 802.1X for each port. In this device, it supports Normal and Advanced 802.1X mode. Fig. 3-52 Parameter description: Port Number: Indicate which port is selected to configure the 802.1x operation mode. 802.1x Mode: 802.1x operation mode. There are two options, including Disable and Multi-host mode. Default is Disable. Disable It will have the chosen port acting as a plain port, that is no 802.
Function name: Port Security Management Function description: Shows each port status. In Multihost mode, it shows the port number and its status, authorized or unauthorized. Fig. 3-53 Parameter description: Disable Mode: When selecting Disable mode for a port in the function 802.1X Port Mode Configuration, the port is in the uncontrolled port state and does not apply 802.1X authenticator on it. Any node attached on this port can access the network without the admittance of 802.1X authenticator.
Function name: Param. Setting Function description: This function is used to configure the parameters for each port in 802.1x port security application. Refer to the following parameters description for details. Fig. 3-54 Parameter description: Port: It is the port number to be selected for configuring its associated 802.1x parameters which are Port control, reAuthMax, txPeriod, Quiet Period, reAuthEnabled, reAuthPeriod, max. Request, suppTimeout, serverTimeout and Controlled direction.
Auto: The controlled port is set to be in authorized state or unauthorized state depends on the result of the authentication exchange between the authentication server and the supplicant. Default: Auto reAuthMax(1-10): The number of authentication attempt that is permitted before the port becomes unauthorized. Default: 2 txPeriod(1-65535 s): A time period to transmitted EAPOL PDU between the authenticator and the supplicant.
3-18. Alarm Configuration Alarm Configuration Events Configuration Emai Configuration Function name: Events Configuration Function description: The Trap Events Configuration function is used to enable the switch to send out the trap information while pre-defined trap events occurred. The switch offers 21 different trap events to users for switch management. The trap information can be sent out in tow ways, including email and trap.
Email Configuration Function description: Alarm configuration is used to configure the persons who should receive the alarm message via either email. It depends on your settings. An email address has to be set in the web page of alarm configuration (See Fig. 3-49). Then, user can read the trap information from the email. This function provides 6 email addresses. The 21 different trap events will be sent out to SNMP Manager when trap event occurs.
3-19. Configuration The switch supports three copies of configuration, including the default configuration, working configuration and user configuration for your configuration management. All of them are listed and described below respectively. Default Configuration: This is Manufacture’s setting and cannot be altered. In Web UI, two restore default functions are offered for the user to restore to the default setting of the switch.
3-19-1. Save/Restore Function name: Save As Start Configuration Function description: Save the current configuration as a start configuration file in flash memory. Fig. 3-58 Function name: Save As User Configuration Function description: Save the current configuration as a user configuration file in flash memory. Fig.
Function name: Restore Default Configuration (includes default IP address) Function description: Restore Default Configuration function can retrieve Manufacture’s setting to replace the start configuration. And the IP address of the switch will also be restored to 192.168.1.1. Fig. 3-60 Function name: Restore Default Configuration (excludes current IP address) Function description: Restore Default Configuration function can retrieve Manufacture’s setting to replace the start configuration.
Function name: Restore User Configuration Function description: Restore User Configuration function can retrieve the previous confirmed working configuration stored in the flash memory to update start configuration. When completing to restore the configuration, the system’s start configuration is updated and will be changed its system settings after rebooting the system. Fig.
3-19-2. Config File Function name: Config File Function description: With this function, user can back up or reload the config files of Save As Start or Save As User via TFTP. Fig. 3-63 Parameter description: Export File Path: Export Start: Export Save As Start’s config file stored in the flash. Export User-Conf: Export Save As User’s config file stored in the flash. Import File Path: Import Start: Import Save As Start’s config file stored in the flash.
3-20. Security Function name: Mirror Configuration Function description: Mirror Configuration is to monitor the traffic of the network. For example, we assume that Port A and Port B are Monitoring Port and Monitored Port respectively, thus, the traffic received by Port B will be copied to Port A for monitoring. Fig. 3-64 Parameter description: Mode: Used for the activation or de-activation of Port Mirror function. Default is disable. Monitoring Port: Set up the port for monitoring.
Function name: Isolated Group Function description: Isolated Group function can let the port be independent of other ports in the Isolated group, and the communication is also forbidden between these ports. But, the ports of the Isolated group are still able to communicate with the ports of the non-Isolated group. With this design, it will be helpful to the administrator to immediately find and solve the port that results in the occurrence of looping problems in the network. Fig.
3-21. Bandwidth Function name: Ingress Bandwidth Setting Function description: Ingress Bandwidth Setting function is used to set up the limit of Ingress bandwidth for each port. Fig. 3-66 Parameter description: Port No.: Choose the port that you would like this function to work on it. Valid range of the port is 1~26. Rate: Set up the limit of Ingress bandwidth for the port you choose. Incoming traffic will be discarded if the rate exceeds the value you set up in Data Rate field.
Function name: Egress Bandwidth Setting Function description: Egress Bandwidth Setting function is used to set up the limit of Egress bandwidth for each port. Fig. 3-67 Parameter description: Port No.: Choose the port that you would like this function to work on it. Valid range of the port is 1~26. Rate: Set up the limit of Egress bandwidth for the port you choose. Packet transmission will be delayed if the rate exceeds the value you set up in Data Rate field.
Function name: Storm Function description: Bandwidth Management function is used to set up the limit of Ingress and Egress bandwidth for each port. Fig. 3-68 Parameter description: Storm Type: Disable: Disable the function of the bandwidth storm control. BC (Broadcast Storm Control): Enable the function of bandwidth storm control for broadcast packets. UC (Unknown Unicast Storm Control): Enable the function of bandwidth storm control for unknown unicast packets.
UC, MC (Unknown Unicast, Multicast Storm Control): Enable the function of bandwidth storm control for Unknown Unicast and multicast Storm packets in transmission. BC, UC, MC (Broadcast, Unknown Unicast, Multicast Storm Control): Enable the function of bandwidth storm control for all packets in transmission. Rate : Set up the limit of bandwidth for storm type you choose. Valid value of the storm rate ranges: FE Ports: 64 - 102400 (Kbps) GE Ports: 1024 - 1024000 (Kbps). And only integer is acceptable.
3-22. QoS(Quality of Service Configuration) The switch supports 5 kinds of QoS, are as follows, MAC Priority, 802.1p Priority, IP TOS Priority, and DiffServ DSCP Priority. Port Based Priority has a special name called VIP Port in the switch. Any packets enter VIP Port will have highest transmitting priority. MAC Priority act on the destination address of MAC in packets. VLAN tagged Priority field is effected by 802.1p Priority setting.
and DSCP. ** VIP/DSCP > TOS > 802.1p (Final result) Function name: QoS Global Setting Function description: When you want to use QoS function, please enable QoS Mode in advance. Then you can use MAC Priority, 802.1p Priority, IP TOS Priority, DiffServ DSCP Priority, or VIP Port functions and take effect. In this function, you can Enable QoS Mode. Choose any of Priority Control, such as 802.1p, TOS, DSCP. Moreover, you can select Scheduling Method of WRR (Weighted Round Robin) or Strict Priority.
Function name: 802.1p Setting Function description: This function will affect the priority of VLAN tag. Based on priority of VLAN tag, it can arrange 0~8 priorities, priorities can map to 4 queues of the switch (queue 0~3) and possess different bandwidth distribution according to your weight setting. Fig. 3-70 Parameter description: 802.1p Priority Mapping: Each Priority can select any of Queue 0 ~ Queue 3.
Function name: DSCP Setting Function description: In the late 1990s, the IETF redefined the meaning of the 8-bit SERVICE TYPE field to accommodate a set of differentiated services (DS). Under the differentiated services interpretation, the first six bits comprise a codepoint, which is sometimes abbreviated DSCP, and the last two bits are left unused. DSCP can form total 64 (0~63) kinds of Traffic Class based on the arrangement of 6-bit field in DSCP of the IP packet.
3-23. ACL The MSM-6226 switch access control list (ACL) is probably the most commonly used object in the IOS. It is used for packet filtering but also for selecting types of traffic to be analyzed, forwarded, or influenced in some way. The ACLs are divided into EtherTypes. IPv4, ARP protocol, MAC and VLAN parameters etc. Here we will just go over the standard and extended access lists for TCP/IP.
Parameter description: Add To add new access control rule on switch. You must configure the parameters what described later when you add the new access control rule. Edit/ Show: To modify or monitor the access control configuration rule on switch. Delete: To delete existed access control rule on switch. Fig. 3-73 ACL Configuration: To add a new ACL rule on switch. ACL name: To add a new ACL rule name, A name is composed of any letter (A-Z, a-z) and digit (0-9) with maximal 8 characters.
Fig. 3-74 VLAN Tag: To input VLAN Type with 2 type include “any” and “ Tag-based Vlan” If you choice Tag-based Vlan type then you must input Tag VID in field and droll the Tag Priority bar to choice the tag priority from 0 to 7. Fig. 3-75 Ethernet Type: Fig. 3-76 153 Publication date: March.
To droll “Ethernet Type” bar and option “any”, “ IPv4”, “ ARP” and “ Specific” for ACL requirement. Any: IPv4: ARP: Specific: It is including all frame type It is including all IPv4 protocol frame type It is including all ARP protocol frame type It is specific frame type Fig. 3-77 IPv4: To set the IPv4 packet filter function with ACLs, the parameters shown as below: Protocol : To droll the bar and you can elect “ Any”, “ICMP”, “ UDP”, “TCP” and “Other” Fig.
IPv4 TOS : To droll the bar and you can elect “ Any”, and “ Specific”. If you click “ Specific” then you need to set the TOS Value to filter. Fig. 3-79 Fig. 3-80 TTL Range : To droll the bar and you can elect “ TTL=0”, “TTL=1”, “TTL=2-254” and “ TTL=255” and set the Time to live value range. Fig. 3-81 155 Publication date: March.
IPv4 DA/ SA : To droll the bar and you can elect “ Any”, “HOST” and “Network”. Fig. 3-82 L4 Destination port : To droll the bar and you can elect “ Any” and “Specific”. If you click “specific” then you need to set destination port value. Fig. 3-83 Fig.
L4 Source port : To droll the bar and you can elect “ Any” and “Specific”. If you click “specific” then you need to set source port value. Fig. 3-85 Fig. 3-86 Action: To set network packet filter includes “In-band” , “Out-band” and “Modify Packet for In/Out-Band”. In-Band / Out-Band: Forward Decision: To droll down the bar to elect “No change” , “ Use new forward map” , “ ORed with new map” and “ Explicit actions” Use new forward map: When the packet is in-band then it will forward to new map.
Fig. 3-87 Fig. 3-88 Fig. 3-89 Fig. 3-90 Modify Packet for In/ Out-Band : Modify Packet -802.
To droll down the bar to elect “Any” and “Specific”. If you click the “ Specific” then you need to set 802.1p value in the field. default is 0 Fig. 3-91 Modify Packet -QOS: To droll down the bar to elect “Any” and “Specific”. If you click the “ Specific” then you need to set QoS value in the field. default is 0 Fig. 3-92 Rate Meter: To set rate meter function with the bandwidth parameter. The range is 64 to 1024000kbps. Fig. 3-93 159 Publication date: March.
3- 24. Diagnostics Five functions, including Diagnostics, Loopback Test, Ping Test, Auto Ping and Cable are contained in this function folder for device self-diagnostics. Each of them will be described in detail orderly in the following sections. Diagnostics Diag Loopback Test Ping Test Auto Ping Cable Function name: Diag Function description: Diagnostics function provides a set of basic system diagnosis. It let users know that whether the system is health or needs to be fixed.
Function name: Loopback Test Function description: In the Loopback Test function, there are two different loopback tests. One is Internal Loopback Test and the other is External Loopback Test. The former test function will not send the test signal outside the switch box. The test signal only wraps around in the switch box. As to the latter test function, it will send the test signal to its link partner. If you do not have them connected to active network devices, i.e.
Function name: Ping Test Function description: Ping Test function is a tool for detecting if the target device is alive or not through ICMP protocol which abounds with report messages. The switch provides Ping Test function to let you know that if the target device is available or not. You can simply fill in a known IP address and then click button. After a few seconds later, the switch will report you the pinged device is alive or dead in the field of Ping Result. Fig.
Function name: Auto Ping Function description: Auto Ping function is a tool for detecting if the target device is alive or not through ICMP protocol which abounds with report messages. The switch provides auto Ping Test function to let you know that if the target device is available or not. Fig. 3-98 Parameter description: IP Address: An IP address with the version of v4, e.g. 192.168.1.1. Interval: Range is 1 ~300 sec. Times: Range is 3 ~100 163 Publication date: March.
Function name: Cable Function description: Cable function is a tool for detecting if the cable per port status is OK or not. report messages. The switch provides cable Test function to let you know that if the cable connect to a port is OK or not. Fig.
3- 25. TFTP Server Function name: TFTP Server Function description: Set up IP address of TFTP server. Fig. 3-100 Parameter description: Specify the IP address where the TFTP server locates. Fill in the IP address of your TFTP server, then press button to have the setting taken effect. 165 Publication date: March.
3-26. Log This function shows the log data. The switch provides system log data for users. There are 16 private trap logs, 5 public trap logs. The switch supports total 120 log entries. For more details on log items, please refer to the section of Trap/Alarm Configuration and SNMP Configuration. Function name: Log Data Function description: The Trap Log Data is displaying the log items including all SNMP Private Trap events, SNMP Public traps and user logs occurred in the system. In the report table, No.
3-27. Firmware Upgrade Software upgrade tool is used to help upgrade the software function in order to fix or improve the function. The switch provides a TFTP client for software upgrade. This can be done through Ethernet. Function name: Firmware Upgrade Function description: The switch supports TFTP upgrade tool for upgrading software. If you assure to upgrade software to a newer version one, you must follow two procedures: 1.) Specifying the IP address where TFTP server locates.
3-28. Reboot We offer you many ways to reboot the switch, including power up, hardware reset and software reset. You can press the RESET button in the front panel to reset the switch. After upgrading software, changing IP configuration or changing VLAN mode configuration, then you must reboot to have the new configuration taken effect. Here we are discussing is software reset for the “reboot” in the main menu. Function name: Reboot Function description: Reboot the switch.
3-29. Logout You can manually logout by performing Logout function. In the switch, it provides another way to logout. You can configure it to logout automatically. Function name: Logout Function description: The switch allows you to logout the system to prevent other users from the system without the permission. If you do not logout and exit the browser, the switch will automatically have you logout.
4. Operation of CLI Management 4-1. CLI Management Refer to Chapter 2 for basic installation. The following description is the brief of the network connection. -- Locate the correct DB-9 null modem cable with female DB-9 connector. Null modem cable comes with the management switch. Refer to the Appendix B for null modem cable configuration. -- Attach the DB-9 female connector to the male DB-9 serial port connector on the Management board.
Fig. 4-1 171 Publication date: March.
4-2. Commands of CLI To see the commands of the mode, please input “?” after the prompt, then all commands will be listed in the screen. All commands can be divided into two categories, including global commands and local commands. Global commands can be used wherever the mode you are. They are “exit”, “end”, “help”, “history”, “logout”, “save start”, “save user”, “restore default” and “restore user”. For more details, please refer to Section 4-2-1.
4-2-1. Global Commands of CLI end Syntax: end Description: Back to the top mode. When you enter this command, your current position would move to the top mode. If you use this command in the top mode, you are still in the position of the top mode. Argument: None. Possible value: None. Example: FEL2P-SW26 # alarm FEL2P-SW26 (alarm)# events FEL2P-SW26 (alarm-events)# end FEL2P-SW26 # exit Syntax: exit Description: Back to the previous mode.
help Syntax: help Description: To show available commands. Some commands are the combination of more than two words. When you enter this command, the CLI would show the complete commands. Besides, the command would help you classify the commands between the local commands and the global ones. Argument: None. Possible value: None.
history Syntax: history [#] Description: To show a list of previous commands that you had ever run. When you enter this command, the CLI would show a list of commands which you had typed before. The CLI supports up to 256 records. If no argument is typed, the CLI would list total records up to 256. If optional argument is given, the CLI would only show the last numbers of records, given by the argument. Argument: [#]: show last number of history records. (optional) Possible value: [#]: 1, 2, 3, ….
logout Syntax: logout Description: When you enter this command via Telnet connection, you would logout the system and disconnect. If you connect the system through direct serial port with RS-232 cable, you would logout the system and be back to the initial login prompt when you run this command. Argument: None. Possible value: None.
restore user Syntax: restore user Description: To restore the startup configuration as user defined configuration. If restoring default successfully, the CLI would prompt if reboot immediately or not. If you press Y or y, the system would reboot immediately; others would back to the CLI system. After restoring user-defined configuration, all the changes in the startup configuration would be lost. After rebooting, the entire startup configuration would replace as user defined one. Argument: None.
save user Syntax: save user Description: To save the current configuration as the user-defined configuration. When you enter this command, the CLI would save your current configuration into the non-volatile FLASH as user-defined configuration. Argument: None. Possible value: None. Example: FEL2P-SW26 # save user Saving user...
4-2-2. Local Commands of CLI 802.1x set quiet-period Syntax: set quiet-period Description: A timer used by the Authenticator state machine to define periods of time during when it will not attempt to acquire a Supplicant. Argument: : syntax 1,5-7, available from 1 to 26 : timer, range 0-65535 Possible value: : 1 to 26 : 0-65535, default is 60 Example: FEL2P-SW26 (802.
: 1 to 26 : 1-10, default is 2 Example: FEL2P-SW26 (802.1x)# set reAuthMax 2 2 set reAuthPeriod Syntax: set reAuthPeriod Description: A constant that defines a nonzero number of seconds between periodic reauthentication of the supplicant. Argument: : syntax 1,5-7, available from 1 to 26 : timer, range 1-65535 Possible value: : 1 to 26 : 1-65535, default is 3600 Example: FEL2P-SW26 (802.
from 1 to 31 : 0 for disable, 1 for enable : xxx.xxx.xxx.xxx :1~65535 Possible value: : 1~65535, default 1812 : 0 for disable, 1 for enable : xxx.xxx.xxx.xxx :1~65535 Example: FEL2P-SW26(802.1X)# set state 192.168.2.252 1812 winradius 1 192.168.2.252 225 FEL2P-SW26(802.
Argument: : syntax 1,5-7, available from 1 to 26 : timer, range 1-65535 Possible value: : 1 to 26 : 1-65535, default is 30 Example: FEL2P-SW26 (802.1x)# set txPeriod 2 30 show mode Syntax: show mode Description: To display the mode of each port. Argument: None. Possible value: None. Example: FEL2P-SW26(802.1X)# show mode ====== ============ 1 Disable 2 Disable 3 Disable 4 Disable 5 Disable 6 Disable 7 Disable 8 Disable 9 Disable 10 Advanced 802.
port 1) port control reAuthMax txPeriod Quiet Period reAuthEnabled reAuthPeriod max. Request suppTimeout serverTimeout : : : : : : : : : : : : Auto 2 30 60 ON 3600 2 30 30 show security Syntax: show security Description: To display the authentication status of each port. Argument: None. Possible value: None. Example: MSM-6226FEL2P-SW26 (802.
show state Syntax: show state Description: To display the Radius server configuration. Argument: None. Possible value: None. Example: FEL2P-SW26 (802.1x)# show state Radius Server: 192.168.1.115 Port Number : 1812 Secret Key : WinRadius account add Syntax: add Description: To create a new guest user. When you create a new guest user, you must type in password and confirm password. Argument: : new account name Possible value: : A string must be at least 5 character.
Syntax: modify Description: To change the username and password of an existing account. Argument: : existing user account Possible value: None. Example: FEL2P-SW26(account)# modify aaaaa username/password: the length is from 5 to 15. Current username (aaaaa):bbbbb New password: Confirm password: Username changed successfully. Password changed successfully. show Syntax: show Description: To show system account, including account name and identity. Argument: None. Possible value: None.
alarm <> del mail-address Syntax: del mail-address <#> Description: To remove the e-mail address. Argument: <#>: email address number, range: 1 to 6 Possible value: <#>: 1 to 6 Example: FEL2P-SW26(alarm-email)# del mail-address 2 del server-user Syntax: del server-user Description: To remove the server, user account and password. Argument: None. Possible value: None.
set server Syntax: set server Description: To set up the IP address of the email server. Argument: :email server ip address or domain name Possible value: None. Example: FEL2P-SW26(alarm-email)# set server 192.168.1.6 set user Syntax: set user Description: To set up the account of the email server. Argument: : email server account Possible value: None.
<> del all Syntax: del all Description: To disable email and trap of events. Argument: :del the range of email and trap of events, syntax 1,5-7, available from 1 to 25 Possible value: : 1~25 Example: FEL2P-SW26(alarm-events)# del all 1-3 del email Syntax: del email Description: To disable the email of the events.
set all Syntax: set all Description: To enable email and trap of events. Argument: :set the range of email and trap of events, syntax 1,5-7, available from 1 to 25 Possible value: : 1~25 Example: FEL2P-SW26(alarm-events)# set all 1-3 set email Syntax: set email Description: To enable the email of the events.
Possible value: None.
Email Email Email Email Address Address Address Address 3: 4: 5: 6: FEL2P-SW26 (alarm)# show events 1 Cold Start 4 Link Up 5 Authentication Failure 6 User Login 7 User Logout 8 STP Topology Changed 9 STP Disabled 10 STP Enabled 11 LACP Disabled 12 LACP Enabled 13 LACP Member Added 14 LACP Port Failure 15 GVRP Disabled 16 GVRP Enabled 17 Port-based Vlan Enabled 18 Tag-based Vlan Enabled 19 Metro-mode Vlan Enabled 20 Module Inserted 21 Module Removed 22 Dual Media Swapped 23 Looping Detected 24 IP-MAC Bind
autologout autologout Syntax: autologout
11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 1024000 1024000 3776 3776 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 1024000 1024000 DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 1024000 10
9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 102400 102400 102400 102400 102400 102400 19520 19520 19520 19520 102400 102400 102400 102400 102400 102400 1024000 1024000 3776 3776 3776 3776 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 1024000 1024000 DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE 102400 102400 102400 102400 102400 102400 102400 102400 102400 1024
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 102400 102400 102400 102400 102400 102400 102400 102400 102400 19520 19520 19520 19520 102400 102400 102400 102400 102400 102400 1024000 1024000 102400 102400 3776 3776 3776 3776 3776 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 1024000 1024000 DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE BC,UC DISABLE DISABLE DISABLE DISABLE DISABLE DISABLE
12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 102400 102400 102400 19520 19520 19520 19520 102400 102400 102400 102400 102400 102400 1024000 1024000 3776 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 102400 1024000 1024000 config-file export start Syntax: export start Description: To run the export start function. Argument: None. Possible value: None. Example: FEL2P-SW26 (config-file)# export start Export successful.
Syntax: import start Description: To run the import start function. Argument: None. Possible value: None. Example: FEL2P-SW26 (config-file)# import start Import successful. import user-conf Syntax: import user-conf Description: To run the import user-conf function. Argument: None. Possible value: None. Example: FEL2P-SW26 (config-file)# import user-conf Import successful. set export-path Syntax: set export-path Description: To set up the file path and filename that user would like to export.
set import-path Syntax: set import-path Description: To set up the filepath and filename that user would like to import. Argument: :filepath and filename Possible value: :filepath and filename Example: FEL2P-SW26 (config-file)# set import-path log/21511.txt show Syntax: show Description: To display the information of the config file. Argument: None. Possible value: None. Example: FEL2P-SW26(config-file)# show TFTP Server IP Address: 192.168.3.
Syntax: show Description: To display the status of DHCP Boot. Argument: None. Possible value: None. Example: FEL2P-SW26(dhcp-boot)# show DHCP Boot : Enable Second : 30 FEL2P-SW26(dhcp-boot)# diag <> disable Syntax: disable Description: Disable auto ping function on switch Argument: None. Possible value: None. Example: FEL2P-SW26 (diag-autoping)# disable enable Syntax: enable Description: Enable auto ping function on switch Argument: None. Possible value: None.
Syntax: set Description: To set auto ping function on switch Argument: : IPv4 format : 1~300 (sec) : 3~100 Possible value: : IPv4 format : 1~300 (sec) : 3~100 Example: FEL2P-SW26(diag-autoping)# set 192.168.2.22 100 3 FEL2P-SW26(diag-autoping)# show Auto Ping state :Enabled IP address :192.168.2.
Syntax: cable Description: To enable cable diagnostic function on switch Argument: : syntax: 1,5-7, available from 1 to 26 Possible value: : 1 to 26. Example: FEL2P-SW26(diag)# cable 1-5 port 1: cable Ok (2 pairs, length +/- 10 meters) pair A Ok, length 10 meters pair B Ok, length 10 meters diag Syntax: diag Description: Diag is used to test whether EEPROM, UART, DRAM and Flash is normal or not. Argument: None. Possible value: None.
FEL2P-SW26(diag)# ping Syntax: ping Description: To confirm that whether the remote end-station or switch itself is alive or not. Argument: : IP address or domain name Possible value: IP address, e.g. 192.168.2.65 or domain name, e.g. tw.yahoo.com Example: FEL2P-SW26(diag)# ping 192.168.2.22 Gateway : 192.168.2.254 192.168.2.22 is alive. FEL2P-SW26(diag)# firmware set upgrade-path Syntax: set upgrade-path Description: To set upgrade file path and name on switch.
upgrade Syntax: upgrade Description: To run the software upgrade function. Argument: None. Possible value: None. Example: FEL2P-SW26(firmware)# upgrade Upgrading firmware ... gvrp disable Syntax: disable Description: To disable the gvrp function Argument: None. Possible value: None. Example: FEL2P-SW26 (gvrp)# disable enable Syntax: enable Description: To enable the gvrp function. Argument: None. Possible value: None.
Description: To enter any of gvrp group for changing gvrp group setting. You can change the applicant or registrar mode of existing gvrp group per port. Argument: : enter which gvrp group you had created, using value is vid.
6 7 8 9 10 17 23 24 25 26 Non-Participant Normal Normal Normal Normal Normal : Normal Normal Normal Normal Fixed Fixed Fixed Fixed Fixed Normal : Normal Normal Normal Normal set applicant Syntax: set applicant Description: To set default applicant mode for each port.
set restricted Description: To set the restricted mode for each port.
FEL2P-SW26 (gvrp)# set timer 2-8 25 80 2000 show config Syntax: show config Description: To display the gvrp configuration. Argument: None. Possible value: None.
Empty message 0 0 show group Syntax: show group Description: To show the gvrp group. Argument: None. Possible value: None. Example: FEL2P-SW26(gvrp)# show group GVRP group information Current Dynamic Group Number: 0 VID Member Port ---- -------------------------------------------------- hostname hostname Syntax: hostname Description: To set up the hostname of the switch. Argument: : hostname, max. 40 characters. Possible value: : hostname, max. 40 characters.
Possible value: : from 1 to 4094 value. : ip address format. : ip address format. syntax: 1,5-7, from 1 to 26 value. Example: FEL2P-SW26(multicast)# add group-filter 2 224.1.1.1 230.255.255.255 10-15 FEL2P-SW26(multicast)# show group-filtering 2 Index : 1 Start Address : 224.1.1.1 End Address : 230.255.255.255 Port Member : 10,11,12,13,14,15 FEL2P-SW26(multicast)# add igmp-vlan Syntax: add igmp-vlan Description: To add igmp vlan function on switch.
FEL2P-SW26(multicast)# show group-filtering 2 None entry exist. FEL2P-SW26(multicast)# delete igmp-vlan Syntax: delete igmp-vlan Description: To delete igmp-vlan function on switch. Argument: : from 1 to 4094 value. Possible value: : from 1 to 4094 value.
Port Member : 10,11,12,13,14,15 FEL2P-SW26(multicast)# edit group-filter 3 1 224.1.1.1 226.255.255.255 1011 FEL2P-SW26(multicast)# show group-filtering 3 Index : 1 Start Address : 224.1.1.1 End Address : 226.255.255.255 Port Member : 10,11 set unregfld-enable Syntax: set unregfld-enable Description: To set unregister multicast flooding state function on switch.
set gnlqry-interval Syntax: set gnlqry-interval Description: To set general query interval function on switch. Argument: : from 1 to 2000 value. Possible value: : 1 to 2000 . Example: FEL2P-SW26(multicast)# set gnlqry-interval 20 set gnlqry-response Syntax: set gnlqry-response Description: To set general query max response time Argument: : from 1 to 10 value. Possible value: : 1 to 10 .
set group-limit Syntax: set group-limit Description: To set multicast group limit Argument: syntax: 1,5-7, from 1 to 26 value. : from 0 to 256 value Possible value: : 1 to 26. : 0 to 256.
: 0(disable), 1(enable). Example: FEL2P-SW26(multicast)# set igmpsnp-enable 0 FEL2P-SW26(multicast)# show igmp-setting IGMP Snooping : Disable Unregister Multicast Flooding : Enable General Query Interval : 20 General Query Max Response Time : 5 General Query Timeout : 15 Specific Query Count : 2 Specific Query Max Response Time : 1 Specific Query Timeout : 2 Port Multicast Group Limit ---- --------------------1 256 2 256 3 256 4 256 5 256 6 256 7 256 8 256 9 256 10 55 11 55 12 55 ...
Specific Query Max Response Time : 1 Specific Query Timeout : 2 Port Multicast Group Limit ---- --------------------1 256 2 256 3 256 4 256 5 256 6 256 7 256 8 256 9 256 10 55 11 55 12 55 ...(q to quit) IGMP Router ----------- v v v v v v set mvr-enable Syntax: set mvr-enable Description: To set igmp router port Argument: : 0(disable), 1(enable). : from 1 to 4094 value. When set mvr to enable mode, this option is necessary. Possible value: : 0(disable), 1(enable).
FEL2P-SW26(multicast)# set mvr-tagging 8-10 1 FEL2P-SW26(multicast)# show mvr-setting Multicast VLAN Registration : Enable MMulticast VLAN ID : 0 Port Service Type ---- -----------1 None 2 None 3 None 4 None 5 None 6 None 7 None 8 None 9 None 10 None 11 None 12 None 13 None 14 None 15 None 16 None 17 None 18 None ...
set mvrserv-type Syntax: set mvrserv-type Description: To set mvr service type Argument: syntax: 1,5-7, from 1 to 26 value. : 0(None), 1(Client), 2(Router). Possible value: : 1 to 26. : 0(None), 1(Client), 2(Router).
set specqry-count Syntax: set specqry-count Description: To set specific query count function on switch Argument: : from 1 to 10 value. Possible value: : from 1 to 10 value. Example: FEL2P-SW26(multicast)# set specqry-count 5 set specqry-response Syntax: set specqry-response Description: To set specific query max response time on switch. Argument: : from 1 to 10 value. Possible value: : 1 to 10.
---- --------------------1 256 2 256 3 256 4 256 5 256 6 256 7 256 8 256 9 256 10 55 11 55 12 55 ...(q to quit) ----------- v v v v v v show group-filtering Syntax: show group-filtering Description: To show group filtering on switch. Argument: : from 1 to 4094 value. Possible value: : 1 to 4094. Example: FEL2P-SW26(multicast)# show group-filtering 3 Index :1 Start Address : 224.1.1.1 End Address : 226.255.255.
General Query Interval General Query Max Response Time General Query Timeout Specific Query Count Specific Query Max Response Time Specific Query Timeout Port Multicast Group Limit ---- --------------------1 256 2 256 3 256 4 256 5 256 6 256 7 256 8 256 9 256 10 55 11 55 12 55 ...(q to quit) : : : : : : 20 5 15 5 1 20 IGMP Router ----------- v v v v v v show igmp-vlan Syntax: show igmp-vlan Description: To show igmp-vlan on switch.
To show multicast-status on switch. Argument: none Possible value: none Example: FEL2P-SW26(multicast)# show multicast-status ? None entry exist. FEL2P-SW26(multicast)# show mvr-setting Syntax: show mvr-setting Description: To show mvr-setting on switch.
IP disable dhcp Syntax: disable dhcp Description: To disable the DHCP function of the system. Argument: None. Possible value: None. Example: FEL2P-SW26(ip)# disable dhcp DHCP is already stopped. enable dhcp Syntax: enable dhcp Description: To enable the system DHCP function and set DNS server via manual or auto mode. Argument: : set DNS by using manual or auto mode.
set ip Syntax: set ip Description: To set the system IP address, subnet mask and gateway. Argument: : ip address : subnet mask : default gateway Possible value: : 192.168.1.1 or others : 255.255.255.0 or others : 192.168.1.253 or others Example: FEL2P-SW26 (ip)# set ip 192.168.1.2 255.255.255.0 192.168.1.253 FEL2P-SW26(ip)# show DHCP : Disable IP Address : 192.168.1.2 Subnet mask : 255.255.255.0 Gateway : 192.168.1.
log clear Syntax: clear Description: To clear the log data. Argument: None. Possible value: None. Example: FEL2P-SW26 (log)# clear disable auto-upload Syntax: disable auto-upload Description: To disable the auto-upload function. Argument: None. Possible value: None. Example: FEL2P-SW26 (log)# disable auto-upload enable auto-upload Syntax: enable auto-upload Description: To enable the auto-upload function. Argument: None. Possible value: None.
show Syntax: show Description: To show a list of trap log events. When any of log events happens, it will be recorded and using show command in log function to query. Up to 120 log records are supported. Argument: None. Possible value: None. Example: FEL2P-SW26(log)# show Tftp Server : 192.168.2.
LLDP <> set Syntax: set clear Description: Resets the traffic and error counters to zero.
set reInitDelay Syntax: set reInitDelay Description: To set LLDP reInitDelay time Argument: : from 1 to 10 second(s) Possible value: : from 1 to 10 second(s) Example: FEL2P-SW26(lldp)# set reInitDelay 5 FEL2P-SW26(lldp)# set tlv Syntax: set tlv <0> <1> <2> <3> <4> Description: To set disable/enable lldp tlv Argument: Port Description: bit 0 System Name: bit 1 System Description: bit 2 System Capabilities: bit 3 Management Address: bit 4 port range syntax : 1,5-7, available from
FEL2P-SW26(lldp)# set txHold Syntax: set txHold Description: To set lldp txHold Argument: : from 2 to 10 second(s) Possible value: : from 2 to 10 second(s) Example: FEL2P-SW26(lldp)# set txHold 5 FEL2P-SW26(lldp)# set txInterval Syntax: set txInterval Description: To set lldp txInterval Argument: : from 5 to 32768 second(s) Possible value: : from 5 to 32768 second(s) Example: FEL2P-SW26(lldp)# set txInterval 5 FEL2P-SW26(lldp)# show config Syntax: Show config Descrip
LLDP Notification Interval [5] : 500 LLDP Port Configuation Port AdminStatus NotificationEnabled -------------- ------------------1 Disable False 2 Disable False 3 Disable False 4 Disable False 5 Disable True 6 Disable False 7 Disable False 8 Disable False 9 Disable False 10 Disable False FEL2P-SW26(lldp)# show detail counter Syntax: show detail-counter Description: To display LLDP detail counter Argument: : 1,5-9, available from 1 to 10 Possible value: : 1,5-9, available from 1 to 10
To display LLDP local device Argument: None Possible value: None Example: FEL2P-SW26(lldp)# show local-device LLDP Local Devices Information Chassis Type : MAC-address Chassis Id : 00-A0-57-15-2A-F7 System name = FEL2P-SW26 System Description : 24-Port FEL2 Plus Managed Switch with 2 SFP Dual Media System Capabilities Supported : bridge System Capabilities Enabled : bridge Management Address : Type : ipv4 Address : 192 . 168. 20 .
FEL2P-SW26(lldp)# show port-config Syntax: show port-config Description: To display LLDPport config Argument: : 1,5-9, available from 1 to 26. Possible value: : 1,5-9, available from 1 to 26.
Tx Rx Rx Port Frames Frames Errors -----------------1 0 0 2 0 0 3 0 0 4 0 0 5 0 0 .. ... .......... FEL2P-SW26(lldp)# Rx TLV Discards Discards 0 0 0 0 0 TLV Unknown -------- -------------- ----0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ........ ......................... mac-table <> del Syntax: del Description: To delete the mac alias entry.
Possible value: None. Example: FEL2P-SW26(mac-table-alias)# show MAC Alias List MAC Address Alias ----- ----------------- ---------------1) 00-d0-59-c5-92-c8 client1 2) 00-e5-55-c9-93-c9 client2 <> search Syntax: search Description: To look for the relative mac information in mac table.
---------------- client2 ----------------------00-C0-26-C3-3F-37 1 00-C0-9F-71-12-24 1 00-D0-59-C5-92-C8 7 00-E0-18-6C-9E-DA 1 00-E0-18-DF-91-DD 1 52-54-4C-39-3A-38 1 ------1 Dynamic 1 Dynamic 1 Dynamic 1 Dynamic 1 Dynamic 1 Dynamic ----------------- <> flush Syntax: flush Description: To flush MAC table. Argument: none Possible value: none Example: FEL2P-SW26(mac-table-maintain)# flush set aging Syntax: set aging Description: To set up the age out time of dynamic learning mac.
show Syntax: show Description: To display the settings of MAC table ageout time and the learning limit of each port. Argument: None. Possible value: None. Example: FEL2P-SW26(mac-table-maintain)# show Mac table ageout time: 300 seconds Port Dynamically learn limit ------ ------------------------1 8191 2 8191 3 8191 4 8191 5 8191 : : : 21 8191 22 8191 23 8191 24 8191 25 8192 26 8192 <> disable Syntax: disable Description: To disable port security.
enable Syntax: enable Description: To enable port security. Argument: none Possible value: none Example: FEL2P-SW26(mac-table-port-security)# enable <> Syntax: port Description: To enter into per port static mac mode.
Argument: : mac address, format: 01-02-03-04-05-06 : vlan id, from 1 to 4094 : forwarding rule, from 0 to 2 0:static 1:drop destination address matches 2:drop source address matches : forwarded destination port, form 1 to 26 Possible value: : 1 to 4094 : 0 to 2 : 1 to 26 Example: FEL2P-SW26(mac-table-static-mac)# add 00-d0-59-c5-92-c8 1 1 8 FEL2P-SW26(mac-table-static-mac)# show MAC VID Forwarding Rule Port ------ ----------------- ------ ----------------------------
Possible value: None.
1): Name : VID : IP Range: Port : Access : Action : acc1 2 192.168.2.2-192.168.2.
Access Action : Http Telnet SNMP : Deny FEL2P-SW26(management)# set ip Syntax: set ip Description: To setup ip field of a management security entry Argument: : management security entry name : start ip address, 0 for any : end ip address Possible value: : management security entry name : start ip address, 0 for any : end ip address Example: FEL2P-SW26(management)# set ip remote1 192.168.2.33 192.168.2.
set port Syntax: set port Description: To setup port field of a management security entry Argument: : management security entry name : 1,5-7, available from 0 to 26, 0 for any Possible value: : management security entry name : 1,5-7, available from 0 to 26, 0 for any Example: FEL2P-SW26(management)# set port remote1 9 FEL2P-SW26(management)# show 1): Name : remote1 VID : Any IP Range: 192.168.2.33-192.168.2.
Access Action : Any : Deny FEL2P-SW26(management)# show Syntax: show Description: To show management security entry. Argument: None Possible value: None. Example: FEL2P-SW26(management)# show 1): Name : remote1 VID : 300 IP Range: 192.168.2.33-192.168.2.34 Port : 9 Access : Any Action : Deny FEL2P-SW26(management)# port clear counter Syntax: clear counter Description: To clear all ports’ counter (include simple and detail port counter) information. Argument: None. Possible value: None.
Description: To disable the communication capability of the port. Argument: : port range, syntax 1,5-7, available from 1 to 26 Possible value: : 1 ~ 26 Example: FEL2P-SW26 (port)# disable state 12 enable state Syntax: enable state Description: To enable the communication capability of the port.
9 10 11 12 13 …… set flow-control Syntax: set flow-control Description: To set up the flow control function of all ports.
9 TP 10 TP 11 TP 12 TP 13 TP 14 TP 15 TP 16 TP …… …….
20 21 22 23 Enable Enable Enable Enable Auto Auto Auto Auto Mode Mode Mode Mode Symmetric Symmetric Symmetric Symmetric show detail-counter Syntax: show detail-counter <#> Description: To display the detailed counting number of each port’s traffic.
Argument: : available 25, 26 Possible value: : 25, 26 Example: FEL2P-SW26(port)# show media 25 Port 25 Fiber Media Information --------------------------------------------------------------------Connector Type : SFP - Unknown or unspecified Fiber Type : Reserved Tx Central Wavelength : 0 Baud Rate : 1G Vendor OUI : 00:00:00 Vendor Name : FIBERXON INC.
Port 3 Tx Octets : 0 Tx Packets : 0 Tx Collisions : 0 … … Rx Octets : 0 Rx Packets : 0 Rx Errors : 0 ...(q to quit) show status Syntax: show status Description: To display the port’s current status. Argument: None. Possible value: None. Example: FEL2P-SW26(port)# show status Port Media Link State Auto Nego.
None. Example: FEL2P-SW26 (qos)# disable 1p disable dscp Syntax: disable dscp Description: To disable IP DSCP qos. Argument: None. Possible value: None. Example: FEL2P-SW26 (qos)# disable dscp disable qos Syntax: disable qos Description: To disable qos function. Argument: None. Possible value: None. Example: FEL2P-SW26 (qos)# disable qos enable 1p Syntax: enable 1p Description: To enable 802.1p qos. Argument: None. Possible value: None.
Syntax: enable dscp Description: To enable IP DSCP qos. Argument: None. Possible value: None. Example: FEL2P-SW26 (qos)# enable dscp enable qos Syntax: enable qos Description: To enable qos function. Argument: None. Possible value: None. Example: FEL2P-SW26 (qos)# enable qos enable tos Syntax: enable tos Description: To enable IP TOS qos. Argument: None. Possible value: None.
syntax: 1,2 or 2,5-7, available from 0 to 63. Possible value: : 0 to 63 Example: FEL2P-SW26 (qos)# set dscp q0 2 q1 2 q2 2 q3 3 set pri-tag Syntax: set pri-tag [] [] [] [] Description: To set 802.1p qos weighting for 4 queues. Argument: : queue level, q0: queue 0; q1: queue 1; q2: queue 2; q3: queue 3. : priority level. One queue has been assigned 2 different priorities.
method : priority scheduling method 0: 4 WRR 1: 1 Strict + 3 WRR 2: 2 Strict + 2 WRR 3: 4 Strict wrr_0 to 3: weighted for every queue. weighted range : 1-55. Possible value: : 0-3 : 1-55. Example: FEL2P-SW26(qos)# set sche 0 2 8 11 11 FEL2P-SW26(qos)# show pr 802.1p priority ==================== Global QoS mode: Enable QoS Enable 802.1p Priority Enable ip diffserv classification Scheduling: 4 WRR method. weight: wrr 0 = 2; wrr 1 = 8; wrr 2 = 11; wrr 3 = 11. weighted range: 1~55.
Scheduling: weight: P0~63: Default mode: P48~63. Enable ip diffserv classification weighted round robin method. wrr 0 = 1; wrr 1 = 1; wrr 2 = 8; wrr 3 = 16. weighted range: 1~55. Priority 0~63.
P0~7: Default mode: P6,P7. Priority 0~7. Queue0: P0,P1; Queue1: P2,P3; Queue2: P4,P5; Queue3: P0 P1 P2 P3 P4 P5 P6 P7 ---- ---- ---- ---- ---- ---- ---- ---Queue 0 1 2 3 1 2 3 3 FEL2P-SW26(qos)# reboot reboot Syntax: reboot Description: To reboot the system. Argument: None. Possible value: None. Example: FEL2P-SW26 # reboot security <> set Syntax: set Description: To set up the function of the isolated group.
show Syntax: show Description: To display the current setting status of isolated group. Argument: None. Possible value: None. Example: FEL2P-SW26(security-isolated-group)# set 9,10-14 FEL2P-SW26(security-isolated-group)# show Isolated group: 9 10 11 12 13 14 FEL2P-SW26(security-isolated-group)# <> disable Syntax: disable Description: To disable the function of mirror. Argument: None. Possible value: None.
set Syntax: set Description: To set up the monitoring port and monitored ports of the mirror (ingress/egress) function. User can monitor the ports that receive or transmit the packets.
Argument: None. Possible value: None. Example: FEL2P-SW26(snmp)# disable set-community FEL2P-SW26(snmp)# disable snmp enable Syntax: enable set-community enable snmp Description: The Enable here is used for the activation snmp or set-community. Argument: None. Possible value: None.
Description: The Show here is to display the configuration of SNMP. Argument: None. Possible value: None. Example: FEL2P-SW26 (snmp)# show SNMP : Enable Get Community: public Set Community: private [Enable] Trap Host 1 IP Address: 192.168.1.1 Port: 162 Community: public Trap Host 2 IP Address: 0.0.0.0 Port: 162 Community: public Trap Host 3 IP Address: 0.0.0.0 Port: 162 Community: public Trap Host 4 IP Address: 0.0.0.0 Port: 162 Community: public Trap Host 5 IP Address: 0.0.0.
Description: To enable the function of STP. Argument: None. Possible value: None. Example: FEL2P-SW26 (stp)# enable set config Syntax: set config Description: To set up the parameters of STP. Argument: : priority must be a multiple of 4096,available from 0 to 61440. : available from 1 to 10. : available from 6 to 40. : available from 4 to 30.
set version Syntax: set version Description: To set up the version of STP. Argument: :stp / rstp Possible value: :stp / rstp Example: FEL2P-SW26 (stp)# set version rstp show config Syntax: show config Description: To display the STP configuration data. Argument: None. Possible value: None. Example: FEL2P-SW26 (stp)# show config STP State Configuration : Spanning Tree Protocol : Enabled Bridge Priority (0-61440) : 61440 Hello Time (1-10 sec) : 2 Max.
4 5 DISCARDING DISCARDING 23 24 25 26 DISCARDING DISCARDING DISCARDING DISCARDING 2000000 2000000 : : : 200000 200000 20000 20000 128 128 Yes Yes Auto Auto 128 128 128 128 No No No No Auto Auto Auto Auto show status Syntax: show status Description: To display of the status of STP. Argument: None. Possible value: None. Example: FEL2P-SW26 (stp)# show status STP Status : STP State Bridge ID Bridge Priority Designated Root Designated Priority Root Port Root Path Cost Current Max.
:string length up to 40 characters. Possible value: : A, b, c, d, ... ,z and 1, 2, 3, …. etc. Example: FEL2P-SW26 (system)# set contact Taipei set device-name Syntax: set device-name Description: To set the device name description of the switch. Argument: : string length up to 40 characters. Possible value: : A, b, c, d, ... ,z and 1, 2, 3, …. etc.
Contact Device Name System Up Time Current Time BIOS Version Firmware Version Hardware-Mechanical Version Serial Number Host IP Address Host MAC Address Device Port RAM Size Flash Size : : : : : : : : : : : : : FEL2P-SW26 0 Days 22 Hours 29 Mins 31 Secs Wed Aug 31 14:03:33 2005 v1.03 v2.04 v65535.65535-v0.04 123 192.168.1.1 00-40-c7-08-00-00 UART * 1 TP *24 Fiber * 2 16 M 2 M tftp set server Syntax: set server Description: To set up the IP address of tftp server.
set daylightsaving Syntax: set daylightsaving
Description: To set up the daylight saving.FEL2P-SW26(time)# show Current Time : NTP Server : Timezone : Day light Saving : Day light Saving Start: Day light Saving End : Tue Apr 08 11:24:02 2008 209.81.9.7 8 -5 Hours Mth: 10 Day: 31 Hour: 0 Mth: 12 Day: 31 Hour: 0 FEL2P-SW26(time)# set ntp Syntax: set ntp Description: To set up the current time via NTP server.
trunk del trunk Syntax: del trunk Description: To remove the trunk port. Argument: : syntax 1,5-7, available from 1 to 26 Possible value: : 1 to 26 Example: FEL2P-SW26 (trunk)# del trunk 1 set hash Syntax: set hash Description: To set up trunk hash method. Argument: : lacp hash method 0: DA and SA 1: SA 2: DA Note : This hash method applies to both LACP and static trunk.
set trunk Syntax: set trunk Description: To set up the status of trunk, including the group number and mode of the trunk as well as LACP mode. Argument: : syntax 1,5-7, available from 1 to 26 : static : adopt the static link aggregation lacp : adopt the dynamic link aggregation- link aggregation control protocol : 1-3.
show lacp-config Syntax: show lacp-config Description: To display the value of LACP Priority. Argument: None. Possible value: None. Example: FEL2P-SW26 (trunk)# show lacp-config LACP System Priority : 33333 Hash Method : DA show lacp-detail Syntax: show lacp-detail Description: To display the detailed information of the LACP trunk group.
Possible value: None.
: port-vlan name Example: FEL2P-SW26 (vlan)# del port-group vlan-2 del tag-group Syntax: del tag-group Description: To delete the tag-based vlan group. Argument: : vlan ID, available from 1 to 4094 Possible value: : 1 to 4094 Example: FEL2P-SW26 (vlan)# del tag-group 2 disable double-tag Syntax: disable double-tag Description: To disable double-tag. Argument: None. Possible value: None.
Description: To enable Independent VLAN Learning. Argument: None. Possible value: None. Example: FEL2P-SW26 (vlan)# disable svl disable symmetric Syntax: disable symmetric Description: To Not drop frames from the non-member port. Argument: None. Possible value: None. Example: FEL2P-SW26 (vlan)# disable symmetric enable double-tag Syntax: enable double-tag Description: To enable double-tag. Argument: None. Possible value: None.
Example: FEL2P-SW26 (vlan)# enable drop-untag 2,4,5-7 enable svl Syntax: enable svl Description: To enable Shared VLAN Learning. Argument: None. Possible value: None. Example: FEL2P-SW26 (vlan)# enable svl enable symmetric Syntax: enable symmetric Description: To drop frames from the non-member port. Argument: None. Possible value: None. Example: FEL2P-SW26 (vlan)# enable symmetric set mgt-vlan Syntax: set mgt-vlan [vid] Description: To set management vlan function on switch..
set mode Syntax: set mode Description: To switch vlan mode between port-based and tag-based modes.
: which PVID you want to set, available from 1 to 4094 : which priority you want to set, available from 0 to 7 Possible value: : 1 to 26 : 1 to 4094 : 0 to 7 Example: FEL2P-SW26 (vlan)# set pvid 3,5,6-8 5 6 set tag-group Syntax: set tag-group Description: To add or edit the tag-based vlan group.
show group Description: To display vlan mode and vlan group. Argument: None Possible value: None Example: FEL2P-SW26 (vlan)# show group Vlan mode is tag-based. 1) 2) Name :default VID :1 Member:1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Untag :1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Name :VLAN-2 VID :2 Member:2 3 4 5 6 13 14 15 Untag : show pvid Syntax: show pvid Description: To display pvid, priority and drop untag result.
13 14 15 16 17 1 1 1 1 1 0 0 0 0 0 Disable Disable Disable Disable Disable vs disable Syntax: disable Description: To disable the virtual stack. Argument: None. Possible value: None. Example: FEL2P-SW26(vs)# disable enable Syntax: enable Description: To enable the virtual stack. Argument: None. Possible value: None. Example: FEL2P-SW26 (vs)# enable set gid Syntax: set gid Description: To set the group id.
Syntax: set role Description: To set role. Argument: : master: act as master, slave : act as slave Possible value: : master or slave Example: FEL2P-SW26 (vs)# set role master show Syntax: show Description: To display the configuration of the virtual stack. Argument: None. Possible value: None. Example: FEL2P-SW26 (vs)# show Virtual Stack Config: State : Enable Role : Master Group ID : group1 277 Publication date: March.
5. Maintenance 5-1. Resolving No Link Condition The possible causes for a no link LED status are as follows: The attached device is not powered on The cable may not be the correct type or is faulty The installed building premise cable is faulty The port may be faulty 5-2. Q&A 1. Computer A can connect to Computer B, but cannot connect to Computer C through the Managed Switch. The network device of Computer C may fail to work. Please check the link/act status of Computer C on the LED indicator.
Appendix A Technical Specifications Features • The switch included 24-Port 10/100Mbps TP and 2-Port Gigabit Dual Media TP/SFP or TP/GBIC. • Supports 24-port 10/100M TP ports with Nway and auto MDIX function. • MSM-6226 supports 2 Gigabit dual media ports(TP/SFP) and 2 slots for removable SFP module supporting 1000M SFP fiber module. • MSM-6226 supports 2 Gigabit dual media ports(TP/GBIC) and 2 slots for removable GBIC module supporting 1000M GBIC fiber module.
Hardware Specifications Standard Compliance: IEEE802.3ab / 802.3z / 802.3u / 802.3x 802.3z and 802.3ab compliant Gigabit Ethernet ports Network Interface of Option transceiver: Configuration Mode Connector Port SFP.0LC.202 1000FDX *LC M-M 2(Option) SFP.0LC.212.XX 1000FDX *LC S-M 2(Option) SFP.0BL.621.20X 1000FDX 2(Option) GBI.ZSC.202 1000FDX *BiDi-LC S-M *SC M-M 2(Option) GBI.ZSC.212.XX 1000FDX *SC S-M 2(Option) GBI.ZSC.621.
1000M Fiber/TP Port 25,26 Power Requirement : : LINK/ACT, FDX, SPD AC Line Voltage : 100∼240 V Frequency : 50∼60 Hz Consumption : 15W Ambient Temperature : -10°C ~ 60 °C Humidity : 5% ~ 90% Dimensions : 44(H) × 442(W) × 209(D) mm Comply with FCC Part 15 Class A & CE Mark Approval Management Software Specifications System Configuration Management Agent Spanning Tree Algorithm VLAN Function Trunk Function IGMP Bandwidth Control Quality of Service (QoS) Port Security Internetworking Protoc
Appendix B Null Modem Cable Specifications The DB-9 cable is used for connecting a terminal or terminal emulator to the Managed Switch’s RS-232 port to access the command-line interface. The table below shows the pin assignments for the DB-9 cable.
283