GEP-0950 8 GE PoE-Plus + 1 GE SFP Web Smart Switch User Manual V1.
Table of Contents ELECTRONIC EMISSION NOTICES ....................................................................................... IV WARNING: .......................................................................................................................... V 1. INTRODUCTION ....................................................................................................... 1 1-1. PRODUCT OVERVIEW ................................................................................................
4-4-2. Factory Default .................................................................................................78 4-4-3. Software Upgrade ..............................................................................................79 4-4-4. Configuration File Transfer ...............................................................................80 Default Settings IP Address 192.168.1.
Caution Circuit devices are sensitive to static electricity, which can damage their delicate electronics. Dry weather conditions or walking across a carpeted floor may cause you to acquire a static electrical charge. To protect your device, always: Touch the metal chassis of your computer to ground the static electrical charge before you pick up the circuit device. Pick up the device by holding it on the left and right edges only.
Warning: Self-demolition on Product is strictly prohibited. Damage caused by selfdemolition will be charged for repairing fees. Do not place product at outdoor or sandstorm. Before installation, please make sure input power supply and product specifications are compatible to each other.
1. Introduction 1-1. Product Overview The LevelOne GEP-0950 is an intelligent Web Smart Switch, equipped with 8 x 10/100/1000Base-T PoE-Plus ports and 1 x 100/1000 Mbps dual speed SFP slot. It is IEEE802.3af/at compliant, provides power and data over a single Ethernet cable to any PoE device, with total power budget of 130W, up to 30W per port, and offers advanced PoE Manageability features which includes PoE Status, PoE Scheduling, PoE Power Delay and PoE Live Checking.
• Management • Supports concisely the status of port and easily port configuration • Supports per port traffic monitoring counters • Supports 802.
1-4. Connectors and LEDs 1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs) There are 8 Gigabit Ethernet PoE ports and 1 SFP fiber ports for optional removable modules on the front panel of the switch. LED display area, locating on the left side of the panel, contains a Power LED, which indicates the power status and 8 ports working status of the switch. • LED Indicators LED POWER ALARM Color System LED Green Red Function Lit when +3.3V power is coming up 1.
2. Installation 2-1. Installing the Switch This section will give users a quick start for: - Hardware and Cable Installation - Management Station Installation - Software booting and configuration 2-1-1.
4. Repeat the above steps, as needed, for each module to be installed into slot(s) 5. Have the power ON after the above procedures are done • TP Port and Cable Installation In the switch, TP port supports MDI/MDI-X auto-crossover, so both types of cable, straight-through (Cable pin-outs for RJ-45 jack 1, 2, 3, 6 to 1, 2, 3, 6 in 10/100M TP; 1, 2, 3, 4, 5, 6, 7, 8 to 1, 2, 3, 4, 5, 6, 7, 8 in Gigabit TP) and crossed-over (Cable pin-outs for RJ-45 jack 1, 2, 3, 6 to 3, 6, 1, 2) can be used.
2-1-2. Cabling Requirements To help ensure a successful installation and keep the network performance good, please take a care on the cabling requirement. Cables with worse specification will render the LAN to work poorly. 2-1-2-1. Cabling Requirements for TP Ports For Fast Ethernet TP network connection The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. Gigabit Ethernet TP network connection The grade of the cable must be Cat. 5 or Cat.
Case2a: Port-based VLAN 1. The same VLAN members could not be in different switches. 2. Every VLAN members could not access VLAN members each other. 3. The switch manager has to assign different names for each VLAN groups at one switch. Case 2b: Port-based VLAN Port-based VLAN Diagram 1. VLAN1 members could not access VLAN2, VLAN3 and VLAN4 members. 2. VLAN2 members could not access VLAN1 and VLAN3 members, but they could access VLAN4 members. 3. VLAN3 members could not access VLAN1, VLAN2 and VLAN4. 4.
Case3a: The same VLAN members can be at different switches with the same VID.
2-1-3. Configuring the Management Agent of GEP-0950 In the way of web, user is allowed to startup the switch management function. Users can use any one of them to monitor and configure the switch. 2-1-3-1. Configuring Management Agent of GEP-0950 through Ethernet Port There are two ways to configure and monitor the switch through the switch’s Ethernet port. They are Web browser and SNMP manager. The user interface for the last one is Management software dependent and does not cover here.
identifier (address) and host identifier (address). The former indicates the network where the addressed host resides, and the latter indicates the individual host in the network which the address of host refers to. And the host identifier must be unique in the same LAN. Here the term of IP address we used is version 4, known as IPv4. Network identifier Host identifier With the classful addressing, it divides IP address into three classes, class A, class B and class C.
Class D is a class with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RFC 1112. Class E is a class with first 4 MSB set to 1-1-1-1 and is used for IP broadcast. According to IANA (Internet Assigned Numbers Authority), there are three specific IP address blocks reserved and able to be used for extending internal network. We call it Private IP address and list below: Class A Class B Class C 10.0.0.0 --- 10.255.255.255 172.16.0.0 --- 172.31.255.255 192.168.0.
Prefix Length No. of IP matched No. of Addressable IP /32 1 - /31 2 - /30 4 2 /29 8 6 /28 16 14 /27 32 30 /26 64 62 /25 128 126 /24 256 254 /23 512 510 /22 1024 1022 /21 2048 2046 /20 4096 4094 /19 8192 8190 /18 16384 16382 /17 32768 32766 /16 65536 65534 According to the scheme above, a subnet mask 255.255.255.0 will partition a network with the class C.
First, IP Address: as shown in the figure above, enter “192.168.1.1”, for instance. For sure, an IP address such as 192.168.1.x must be set on your PC. Second, Subnet Mask: as shown in the figure above, enter “255.255.255.0”. Any subnet mask such as 255.255.255.x is allowable in this case.
3. Basic Concept and Management This chapter will tell you the basic concept of features to manage this switch and how they work. 3-1. What’s the Ethernet Ethernet originated and was implemented at Xerox in Palo Alto, CA in 1973 and was successfully commercialized by Digital Equipment Corporation (DEC), Intel and Xerox (DIX) in 1980. In 1992, Grand Junction Networks unveiled a new high speed Ethernet with the same characteristic of the original Ethernet but operated at 100Mbps, called Fast Ethernet now.
IEEE 802.2 LLC Data Link Layer IEEE802.3 CSMA/CD MAC IEEE 802.3 PLS CS Physical Layer MII IEEE 802.3 MAU Coaxial/STP/UTP ANSI X3T9.5 PMD Fiber This above diagram shows the Ethernet architecture, LLC sub-layer and MAC sub-layer, which are responded to the Data Link layer, and transceivers, which are responded to the Physical layer in OSI model. In this section, we are mainly describing the MAC sub-layer. 3-2.
SSAP, Control and Information. The DSAP address field identifies the one or more service access points, in which the I/G bit indicates it is individual or group address. If all bit of DSAP is 1s, it’s a global address. The SSAP address field identifies the specific services indicated by C/R bit (command or response). The DSAP and SSAP pair with some reserved values indicates some well-known services listed in the table below.
3-3. Media Access Control (MAC) 3-3-1. MAC Addressing Because LAN is composed of many nodes, for the data exchanged among these nodes, each node must have its own unique address to identify who should send the data or should receive the data. In OSI model, each layer provides its own mean to identify the unique address in some form, for example, IP address in network layer. The MAC is belonged to Data Link Layer (Layer 2), the address is defined to be a 48-bit long and locally unique address.
PRE 7 - SFD 7 DA 6 SA 6 Type/Length 2 Data Pad bit if any 46-1500 FCS 4 Preamble (PRE) —The PRE is 7-byte long with alternating pattern of ones and zeros used to tell the receiving node that a frame is coming, and to synchronize the physical receiver with the incoming bit stream.
- It is created by the sending MAC and recalculated by the receiving MAC to check if the packet is damaged or not. How does a MAC work? The MAC sub-layer has two primary jobs to do: 1. Receiving and transmitting data. When receiving data, it parses frame to detect error; when transmitting data, it performs frame assembly. 2. Performing Media access control. It prepares the initiation jobs for a frame transmission and makes recovery from transmission failure.
Ethernet MAC transmits frames in half-duplex and full-duplex ways. In halfduplex operation mode, the MAC can either transmit or receive frame at a moment, but cannot do both jobs at the same time. As the transmission of a MAC frame with the half-duplex operation exists only in the same collision domain, the carrier signal needs to spend time to travel to reach the targeted device.
Parameter value/LAN Max. collision domain DTE to DTE Max. collision domain with repeater Slot time Interframe Gap AttemptLimit BackoffLimit JamSize MaxFrameSize MinFrameSize BurstLimit 10Base 100 meters 100Base 1000Base 100 meters for UTP 100 meters for UTP 412 meters for fiber 316 meters for fiber 2500 meters 205 meters 200 meters 512 bit times 9.6us 16 10 32 bits 1518 64 Not applicable 512 bit times 0.96us 16 10 32 bits 1518 64 Not applicable 512 bit times 0.
3-4. Flow Control Flow control is a mechanism to tell the source device stopping sending frame for a specified period of time designated by target device until the PAUSE time expires. This is accomplished by sending a PAUSE frame from target device to source device. When the target is not busy and the PAUSE time is expired, it will send another PAUSE frame with zero time-to-wait to source device. After the source device receives the PAUSE frame, it will again transmit frames immediately.
Frame Reception In essence, the frame reception is the same in both operations of half duplex and full duplex, except that full-duplex operation uses two buffers to transmit and receive the frame independently. The receiving node always “listens” if there is traffic running over the medium when it is not receiving a frame.
the following table. Bits 15-13 Bit 12 Bits 11-0 User Priority 7-0, 0 is lowest priority CFI (Canonical Format Indicator) 1: RIF field is present in the tag header 0: No RIF field is present VID (VLAN Identifier) 0x000: Null VID. No VID is present and only user priority is present. 0x001: Default VID 0xFFF: Reserved Note: RIF is used in Token Ring network to provide source routing and comprises two fields, Routing Control and Route Descriptor.
3-5. How does a switch work? The switch is a layer 2 Ethernet Switch equipped with 8 Gigabit Ethernet ports and 1 optional module which support Gigabit Ethernet or 100M Ethernet. Each port on it is an independent LAN segment and thus has 9 LAN segments and 9 collision domains, contrast to the traditional shared Ethernet HUB in which all ports share the same media and use the same collision domain and thus limit the bandwidth utilization.
3-6. Virtual LAN What is a VLAN? It is a subset of a LAN. Before we discuss VLAN, we must understand what LAN is. In general, a LAN is composed of different physical network segments bridged by switches or bridges which attach to end stations in the same broadcast domain. The traffic can reach any station on the same LAN. Beyond this domain, the traffic cannot go without router’s help. This also implies that a LAN is limited.
Now we apply VLAN technology to configure the system shown as the figure above. We can partition the users into the different logical networks which have their own broadcast domain. The traffic will not disturb among these logical networks. The users 1x (x denotes a ~ d) are members of VLAN 1. Any traffic within VLAN 1 does not flow to VLAN 2 and others. This helps us configure the network easily according to the criteria needed, for example, financial, accounting, R&D and whatever you think it necessary.
Other VLAN technologies not mentioned above are MAC-based VLAN, IPbased VLAN and so on. Terminology Tagged Frame: A frame, carrying a tag field following the source MAC address, is four bytes long and contains VLAN protocol ID and tag control information composed of user priority, Canonical Format Indicator (CFI) and optional VLAN identifier (VID). Normally, the maximal length of a tagged frame is 1522 bytes. 6 DA 802.
Port VLAN Identifier: VLAN identifier of a port. It also can be referred to as PVID. When an untagged frame or a priority-tagged frame is received, the frame will be inserted the PVID of that port in the VLAN tag field. The frame with VID assigned by a port is called PVID. Each port can only be assigned a PVID. The default value for PVID is 1, the same as VID. Ingress filtering: The process to check a received packet and compare its VID to the VLAN membership of the ingress port.
Independent VLAN Learning (IVL): It specifies the mode how to learn MAC address. For a specified VLAN, it will use an independent filtering database (FID) to learn or look up the membership information of the VLAN and decide where to go. Shared VLAN Learning (SVL): It specifies the mode how to learn MAC address. In this mode, some VLAN or all VLANs use the same filtering database storing the membership information of the VLAN to learn or look up the membership information of the VLAN.
Name Marketing Service Sales Administration VID 2 3 4 1 Port Members 1,2 4,6,7 3,5 8,9 Next, assigns IP address to each VLAN. Usually, we use 10.x.x.x as internal IP block. Because there are total four VLANs in the network, we must assign 4 IP blocks to each of them. Name Marketing Service Sales Administration VID 2 3 4 1 Network Address 10.1.2.0/24 10.1.3.0/24 10.1.4.0/24 10.1.1.0/24 Here we apply the subnet mask 255.255.255, and each VLAN is capable of supporting 254 nodes.
3-7. Link Aggregation Basically, Link Aggregation is to aggregate the bandwidth of more than one port to an assigned logical link. This highly increases total bandwidth to the targeted device. There is more than one Link Aggregation technology in many vendors’ switch products already, which may cause the problem of interoperability. This is the reason why now we have 802.3ad Link Aggregation Control Protocol (LACP). Why 802.3ad (LACP)? Network is varying.
Terminology Link Aggregation: It is a method to have multiple physical links with the same media and speed bundled to be a logical link forming a Link Aggregation Group with a group ID. With the viewpoint of MAC client, each Link Aggregation Group is an independent link. There are three cases of link used in the network, which are switch to switch, switch to station and station to station. Here station may be a host or a router.
4. Operation of Web-based Management This chapter would introduce how to manage your Web Smart Switch and how to configure the 10/100/1000Mbps TP Ports and Gigabit SFP Fiber ports on the switch via web user interfaces. GEP-0950 provides 8 fixed Gigabit Ethernet TP ports and 1 Gigabit SPF ports. With this facility, you can easily access and monitor the status like MIBs, port activity, and multicast traffic through any ports on the switch.
4-1. Web Management Home Overview After login, System Information would be displayed as below. This page lists default values and shows you the basic information of the switch, including “Switch Status”, “TP Port Status”, “Fiber Port Status”, “Aggregation”, “VLAN”, “Mirror”, “SNMP”, and “Maximum Packet Length”. With this information, you will know the software version, MAC address, ports available and so on. It would be helpful while malfunction occurred. For more details, please refer to Section 4-4-1.
4-2. Configuration Configuration includes the following functions: System Configuration, System Time, Ports Configuration, VLAN Mode Configuration, VLAN Group Configuration, VLAN Isolation, PoE Configuration, PoE State, PoE Auto Checking, PoE Scheduling, Aggregation, 802.1Z, IGMP Snooping, Mirroring, QOS, Loop detection, Broadcast storm Protection, SNMP. 4-2-1. System Information System configuration is one of the most important functions.
Function name: System Configuration Function description: Show system description, firmware version, hardware version, MAC address, serial number, active IP address, active subnet mask, active gateway, DHCP server and Lease time left. Set device name, DHCP enable, fallback IP address, fallback subnet mask, fallback gateway, management VLAN, password and inactivity timeout. Parameter description: System Description: The simple description of this switch. Firmware Version: The firmware version of this switch.
Fallback IP Address: Users can configure the IP settings and fill in new values. Then, click button to update. Default: 192.168.1.1 Fallback Subnet Mask: Subnet mask is made for the purpose to get more network address because any IP device in a network must own its IP address, composed of Network address and Host address, otherwise can’t communicate with other devices each other.
Default: admin Inactivity Timeout(secs): Set the auto-logout timer. The valid value is 0 ~ 60 in the unit of minute and a decimal point is not allowed. The value 0 means auto-logout timer is disabled.
4-2-2. System Time Function name: System Time Function description: Allows users to sync system time with NTP Server.
4-2-3. Port Configuration Function name: Port Configuration Function description: Port Configuration is applied for the settings of the ports on the switch. By this function, you can set or reset the values for Mode and Flow Control. Others you could set the power saving mode for switch power consumption. Port Configuration Parameter description: Enable Jumbo Frames: This function support jumbo frames of up to 9600 bytes, Just tick the check box () to enable it.
the Enable / Disable Default: disable Link: Show link status of this port. Mode: Set the speed and duplex of the port. If the media is 1Gbps fiber, there are three modes to choose: Auto Speed, 1000 Full and Disable. If the media is TP, the Speed/Duplex is comprised of the combination of speed mode, 10/100/1000Mbps, and duplex mode, full duplex and half duplex. The following table summarized the function the media supports.
4-2-4. VLAN Mode Configuration GEP-0950 supports Port-based VLAN and Tag-based VLAN (802.1q). Its VLAN mode supports 9 active VLANs and the available VLAN ID range is from 1~4096. VLAN configuration is used to divide a LAN into smaller ones. With proper configuration, you can gain not only improved security and increased performance, but also save a lot of VLAN management effort.
4-2-5. VLAN Group Configuration Function name: Tag-Based VLAN Configuration (Tag based VLAN mode) Function description: The VLAN membership configuration for the selected switch can be monitored and modified here. Up to 4096 VLANs are supported. This page allows for adding and deleting VLANs as well as adding and deleting port members of each VLAN.
Parameter description: VID: VLAN identifier. Each tag-based VLAN group has a unique VID. It appears only in tag-based mode. Member: In modify function this is used to enable or disable if a port is a member of the new added VLAN, “Enable” means it is a member of the VLAN. Just tick the check box () beside the port x to enable it. Port: Port number. VLAN aware Enabled: Discard other VLAN group packets, only forward this port joined VLAN group packets.
Function name: Port-Based VLAN Configuration (Port-based VLAN mode) Function description: It shows the information of VLAN Groups, and allows administrators to maintain them by modifying and deleting each VLAN group. User also can add a new VLAN group by inputting a new VLAN name and VLAN ID. If you are in port-based VLAN, it will just show the ID、Member of the existed port-based VLAN group. If you are in tag-based VLAN, it will show the ID、 VID、Member of the existed tag-based VLAN group.
Parameter description: ID (Group ID): When you want to edit a VLAN group, you must select the Group ID field. Then, you will enter Tag Base VLAN Group Setting or Port Base VLAN Group Setting page, which depends on your VLAN mode selection. Member: In modify function this is used to enable or disable if a port is a member of the new added VLAN, “Enable” means it is a member of the VLAN. Just tick the check box () beside the port x to enable it.
4-2-6. VLAN Port Isolation Configuration Function name: Port Isolation Configuration Function description: Port Isolation provides for an apparatus and method to isolate ports on layer 2 switches on the same VLAN to restrict traffic flow. The apparatus comprises a switch having said plurality of ports, each port configured as a protected port or a non-protected port. An address table memory stores an address table having a destination address and port number pair.
4-2-7. PoE Power Over Ethernet (PoE) technology allows IP telephones, wireless LAN access points, and other powered devices (PDs) to receive power and transfer data over existing LAN cabling. Function name: Power over Ethernet configuration Function description: In PoE Port Management function, user can configure the settings about PoE. The switch complies with IEEE 802.
The Delay time is using for set the time period for PD PoE enable time delay period. It is a solution to avoid rush current to cause shorter PD. The available time period is from 0 to 300 seconds and 0 means disable the function. Reset: Used when a port exceeds the PoE budget and needs to be reset without having to unplug the cable.
4-2-8. PoE Status Function name: PoE State Function description: Display the information about the PoE status. Parameter description: Power Reservation: The watts are supplied by the PoE./ The maximal power that the switch can supply (Read Only). Port No: Port number. PD Class: Each PD is classified according to a class that defines the maximum power the PD will use. The PD Class shows the PDs class. Five Classes are defined: Class 0: Max. power 15.4 W Class 1: Max. power 4.0 W Class 2: Max. power 7.
Port Status The Port Status shows the port's status. PoE turned OFF - PoE disabled : PoE is disabled by user. PoE turned OFF - Power budget exceeded - The total requested or used power by the PDs exceeds the maximum power the Power Supply can deliver, and port(s) with the lowest priority is/are powered down. No PD detected - No PD detected for the port. PoE turned OFF - PD overload - The PD has requested or used more power than the port can deliver, and is powered down. PoE turned OFF - PD is off.
4-2-9. PoE Auto Checking Function name: PoE Auto Checking Function description: The function is using for PD auto checking. It can allow user to control the PoE function by using the ping command, in order to turn on or off any PD which connect with port assign. Parameter description: Port No: Port number. Ping IP Address: To set up the PD’s IP address which you need to check it is alive.. Interval Time: To set up the spacing interval time to do ping check, the default value is 30 seconds.
4-2-10. PoE Scheduling Function name: PoE Scheduling Function description: This function allows the user to make a perfect schedule of PoE power supply. PoE Scheduling not only makes PoE management easier but also saves more energy. Parameter description: PoE On: Logical port which to configure power supply.
Schedule mode: Enable / Disable PoE Scheduling. Port: Local port number. Scheduling: Click the desired day and time of when to activate PoE. is enable; blank is disable. Note: The PoE Scheduling will be disabled automatically when NTP sync time server failure occurs.
4-2-11. Aggregation The Aggregation (Port Trunking) Configuration is used to configure the settings of Link Aggregation. You can bundle ports by same speed, MAC, and full duplex to be a single logical port, thus the logical port can aggregate the bandwidth of these ports. This means you can apply your current Ethernet equipments to build the bandwidth aggregation.
4-2-12. IGMP Snooping Function name: IGMP Snooping Configuration Function description: IGMP Snooping lets administrators configure a switch to constrain multicast traffic by listening to Internet Group Management Protocol (IGMP). After finishing the settings, please press button to start up the function. Parameter description: IGMP Enabled: Just tick the check box () to enable this function.
4-2-13. Mirroring Configuration Function name: Mirror Configuration Function description: Mirror Configuration is provided to monitor the traffic in the network. This switch supports one-port mirror multi-ports. For example, we assume that Port A and Port B are Source Ports, and Port C is Mirror Port respectively, thus, the traffic passing through Port A and Port B will be copied to Port C for monitor purpose. Parameter description: Source Port: Set up the port for being monitored.
4-2-14. QoS(Quality of Service) Configuration The switch offers powerful QoS function. This function supports VLAN-tagged priority that can make precedence of 8 priorities, and DSCP(Differentiated Services Code Point) on Layer 3 of network framework. Function name: QoS Configuration Function description: While setting QoS function, please select QoS Mode in drop-down menu at first. Then you can use 802.1p Priority and DSCP Priority functions.
Function name: DSCP QoS Mode Function description: In the late 1990s, the IETF redefined the meaning of the 8-bit SERVICE TYPE field to accommodate a set of differentiated services (DS). Under the differentiated services interpretation, the first six bits comprise a codepoint, which is sometimes abbreviated DSCP, and the last two bits are left unused. DSCP can form total 64 (0~63) kinds of Traffic Class based on the arrangement of 6-bit field in DSCP of the IP packet.
4-2-15. Loop Detection Function name: Loop Detection Configuration Function description: The loop detection is used to detect the presence of traffic. When switch receives packet’s(looping detection frame) MAC address the same as oneself from port, show Loop detection happens. The port will be locked when it received the looping detection frames.
When Port No is chosen and enable port' s Loop detection, the port can detect loop happens and port will be Locked. If Loop did not happen, port maintains Unlocked. Unlock port: When ticking the port, port locked will be opened and turned into unlocked. If not ticking the port, Port maintains locked.
4-2-16. Broadcast Strom Protection Function name: Broadcast Strom Protection configuration Function description: When the broadcast packets received by the switch exceed the threshold configured, the port will be blocked for a period of time which can be set. After a configured time, the switch will detect whether the broadcast packets received on the port still exceed the threshold. If the broadcast traffic is still higher than, the port will be closed for a period of time again.
Parameter description: Mode: Controls whether Broadcast Strom Protection is enabled (as a whole). Packet Per Second: It is a threshold. When the broadcast packet traffic in a second is higher than the threshold configured, the Broadcast Strom Protection enable. Unlock Time: The period (in seconds) for which a port will be kept disabled in the event of a loop is detected (and the port action is to shut down the port). State: Show the status on the port.
4-2-17. SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped with SNMP agent, provided that the Management Information Base (MIB) is installed correctly on the managed devices. It is a protocol used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity (OID) of the management Information Base (MIB), described in the form of SMI syntax.
Parameters description: SNMP enable: The term SNMP enable here is used for the activation or de-activation of SNMP. Default is “Disable”. Get/Set/Trap Community: Community name is used as password for authenticating if the requesting network management unit belongs to the same community group. If they both don’t have the same community name, they don’t belong to the same group.
4-3. Monitoring There are four functions contained in the monitoring function: Statistics Overview, Detailed, Statistics, IGMP Status and Ping 4-3-1. Statistics Overview Function name: Statistics Overview for all ports Function description: The section describes to the Port statistics information and provides overview of general traffic statistics for all switch ports. Parameter description: Tx/Rx Bytes: The number of received and transmitted bytes per port.
4-3-2. Detailed Statistics Function name: Detailed Statistics Function description: Display the detailed counting number of each port’s traffic. In the figure below, the window can show all counter information each port at one time. Parameter description: Rx Packets: The counting number of the packet received. RX Octets: Total received bytes. Rx High Priority Packets: Number of Rx packets classified as high priority. Rx Low Priority Packets: Number of Rx packets classified as low priority.
Rx Broad- and Multicast: Show the counting number of the received broadcast with multicast packet. Rx Error Packets: Show the counting number of the received error packets. Tx Packets: The counting number of the packet transmitted. TX Octets: Total transmitted bytes. Tx High Priority Packets: Number of Tx packets classified as high priority. Tx Low Priority Packets: Number of Tx packets classified as low priority. Tx Broadcast: Show the counting number of the transmitted broadcast packet.
Number of 65 ~ 126-byte frames in good and bad packets transmitted. Tx 128-255 Bytes: Number of 127 ~ 255-byte frames in good and bad packets transmitted. Tx 256-511 Bytes: Number of 256 ~ 511-byte frames in good and bad packets transmitted. Tx 512-1023 Bytes: Number of 512 ~ 1023-byte frames in good and bad packets transmitted. Tx 1024-Bytes: Number of 1024-max_length-byte frames in good and bad packets transmitted. Rx CRC/Alignment: Number of Alignment errors and CRC error packets received.
4-3-3. IGMP Status Function name: IGMP Status Function description: Display IGMP status. Parameter description: VLAN Id: Show VLAN Id for each multicast group. Querier: Show the group membership queries status. Queries transmitted: To count the group membership queries transmitted. Queries received: To count the group membership queries received. V1 Reports: When a host receives a group membership query, it identifies the groups associated with the query and determines to which groups it belongs.
When a host receives a group membership query, it identifies the groups associated with the query and determines to which groups it belongs. The host then sets a timer, with a value less than the Max Response Time field in the query, for each group to which it belongs. It Calculate the number of times of IGMPV3 report. V2 Leaves: When a host leaves a group, it sends a leave group membership message to multicast routers on the network, it show the leaves number.
4-3-4. Ping Status Function name: Ping Status Function description: To set up target IP address for ping function and display ping status. Parameter description: Ping Parameters: Target IP address: Set up a Target IP address to ping. Count: Use drop-down menu to set number of echo requests to send. Four type of number can choose, there are 1, 5, 10 and 20. Default: 1 Time Out (in secs): Use drop-down menu to set number of echo requests time out in second.
Status: Show the result of the ping status. Received replies: Show the received replies number of times. Request timeouts: Show the timeout of request. Average Response times (In ms): Show the average response time in milliseconds.
4-4. Maintenance There are five functions contained in the maintenance function.
4-4-1. Warm Restart Web Smart Switch offers many approaches to reboot your switch, such as: power up, hardware reset and software reset. You can press RESET button in the front panel of your switch to reset the device and to retrieve default settings. After upgrading software, you have to reboot the device to have new configuration take effect. The function being discussed here is software reset. Function name: Warm Restart Function description: Reboot the switch.
4-4-2. Factory Default Function name: Factory Default Function description: Factory Default provides the function to retrieve default settings and replace current configuration. Except the IP address setting, all settings will be restored to the factory default values when “Factory Default” function is performed. If you want to restore all configurations including the IP address setting to the factory default, please press the “RESET” button on the front panel.
4-4-3. Software Upgrade Function name: Software Upgrade Function description: You can just click Browse button to retrieve the file you want in your system to upgrade your switch.
4-4-4. Configuration File Transfer Function name: Configuration File Transfer Function description: You can backup your switch’s configuration file into your computer folder in case accident happens. In addition, uploading backup configuration file into a new or a crashed switch can save much time and avoid mistakes.