USER GUIDE BUSINESS SERIES WebView Switches Model: SRW2048, SRW2024, SRW2016, SRW248G4, SRW224G4
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Introduction 1 Chapter 2: Product Overview 2 SRW2048 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Chapter 5: Advanced Configuration 20 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Accessing the Web-based Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Setup > Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Security > RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Security > TACACS+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Security > 802.1x Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 802.1x Settings > Setting Timer . .
Table of Contents Admin > Static Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Admin > Dynamic Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Query . . . . . . . . . . . . .
Table of Contents User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Appendix H: Software License Agreement 82 Software in Linksys Products: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Software Licenses: . . . . . . . . . . . . . . . . . . . . . . .
Chapter 1 Chapter 1: Introduction Thank you for choosing Linksys WebView Switches. This User Guide covers five product models: •• SRW2048 48-port 10/100/1000 Gigabit Switch with WebView. Includes 48 10/100/1000 RJ-45 ports and 4 shared SFP (MiniGBIC) slots. •• SRW2024 24-Port 10/100/1000 Gigabit Switch with WebView. Includes 24 10/100/1000 RJ-45 ports and 2 shared SFP (MiniGBIC) slots. Introduction There are features that allow you to expand and grow your network of switches.
Product Overview Chapter 2 Chapter 2: Product Overview SRW2048 Front Panel The Switch’s LEDs and ports are located on the front panel. Front Panel of the SRW2048 LEDs POWER (Green) Lights up green to indicate that power is being supplied to the Switch. LINK/ACT (1-48) (Green/Amber) Lights up green to indicate a functional 10/100-Mbps network link through the corresponding port (1 through 48) with an attached device.
Product Overview Chapter 2 CONSOLE The Switch is equipped with a serial port labeled Console (located on the back of the switch) that allows you to connect to a computer’s serial port (for configuration purposes) using the provided serial cable. You can use HyperTerminal to manage the Switch using the console port. MiniGBIC (1-2) The miniGBIC (gigabit interface converter) port is a connection point for a miniGBIC expansion module, so the Switch can be uplinked via fiber to another switch.
Product Overview Chapter 2 CONSOLE The Switch is equipped with a serial port labeled Console (located on the back of the switch) that allows you to connect to a computer’s serial port (for configuration purposes) using the provided serial cable. You can use HyperTerminal to manage the Switch using the console port. MiniGBIC (1-2) The miniGBIC (gigabit interface converter) port is a connection point for a miniGBIC expansion module, so the Switch can be uplinked via fiber to another switch.
Product Overview Chapter 2 NOTE: If you need to reset the Switch, unplug the power cord from the back of the Switch. Wait a few seconds and then reconnect it. SRW248G4 Front Panel The Switch’s LEDs and ports are located on the front panel. Front Panel of the SRW248G4 LEDs POWER (Green) Lights up green to indicate that power is being supplied to the Switch.
Product Overview Chapter 2 CONSOLE The Switch is equipped with a serial port labeled Console (located on the back of the switch) that allows you to connect to a computer’s serial port (for configuration purposes) using the provided serial cable. You can use HyperTerminal to manage the Switch using the console port. Refer to Chapter 4: Configuration Using the Console Interface for more information. NOTE: If you need to reset the Switch, unplug the power cord from the back of the Switch.
Chapter 2 Product Overview POWER The Power port is where you will connect the AC power. CONSOLE The Switch is equipped with a serial port labeled Console (located on the back of the switch) that allows you to connect to a computer’s serial port (for configuration purposes) using the provided serial cable. You can use HyperTerminal to manage the Switch using the console port. Refer to Chapter 4: Configuration Using the Console Interface for more information.
Connecting the Switch Chapter 3 Placement Options Chapter 3: Connecting the Switch There are two ways to physically install the Switch, either set the Switch on its four rubber feet for desktop placement or mount the switch in a standard-sized, 482.6-mm wide, 1U-high rack for rack-mount placement. Overview This chapter will explain how to connect network devices to the Switch. For an example of a typical network configuration, see the application diagram shown below.
Chapter 3 To rack-mount the Switch in any standard 482.6-mm wide, 1U high rack, follow the instructions described below. 1. Place the Switch on a hard flat surface with the front panel facing you. 2. Attach a rack–mount bracket to one side of the Switch with the supplied screws and secure the bracket tightly. Connecting the Switch Hardware Installation To connect network devices to the Switch, follow these instructions: 1. Make sure all the devices you will connect to the Switch are powered off. 2.
Chapter 4 Chapter 4: Configuration Using the Console Interface Configuration Using the Console Interface 4. Select a port to communicate with the Switch: COM1, COM2, or TCP/IP. Overview The Switch features a menu-driven console interface for basic configuration of the Switch and management of your network. The Switch can be configured using CLI through the console interface or through a Telnet connection. This chapter describes console interface configuration.
Chapter 4 Configuration Using the Console Interface System Configuration Menu On the System Configuration Menu screen, you can choose from the following: 1. System Information 2. Management Settings 3. User & Password Settings 4. Security Settings Telnet Login Screen Press the Esc button to return to the login screen. Use the right arrow button to navigate to the Execute option and press the Enter button to open CLI interface. Configuring the Switch through the Console Interface 5. IP Configuration 6.
Configuration Using the Console Interface Chapter 4 Versions Management Settings The Versions screen displays the Switch’s boot, software, and hardware firmware versions. From the Management Settings screen, you can set the following options: •• Serial Port Session Configuration •• Telnet Session Configuration •• Secure Telnet (SSH) Configuration. Versions General System Information The General System Information screen displays general information about the Switch.
Chapter 4 Configuration Using the Console Interface Telnet Configuration SSH Server Configuration The Telnet Configuration screen displays the timeout value. The value is entered in seconds. If you do not want the Telnet session to timeout, you may enter a value of 0 sec. On the SSH Server Configuration screen, you can enable or disable the SSH Server by navigating to the SSH Server option and using the SPACE bar to toggle the option. The SSH Server Port can be modified by entering in the value.
Chapter 4 Configuration Using the Console Interface SSH Crypto Key Generation Username & Password Settings On the SSH Crypto Key Generation screen, you can toggle between RSA and DSA using the SPACE bar. The SSH Public Key Length cannot be modified. From the Username & Password Settings screen, you can administer the user names and passwords of those accessing the Switch. Username & Password Settings SSH Crypto Key Generation Select Edit and press the Enter key to make changes.
Chapter 4 Configuration Using the Console Interface SSL Certificate Generation Disable Active Management Profile Use the Certificate Generation screen to specify a devicegenerated certificate. To disable the active management profile, selecting Disable Active Management Profile from the Security Settings screen. You are prompted for confirmation. SSL Certificate Generation Public Key Length Specifies the SSL RSA key length. (Range: 512–2048) Organization Name Specifies the organization name.
Chapter 4 Configuration Using the Console Interface IP Address Configuration HTTP The IP Address Configuration screen lets you configure the Switch’s IP address information. The HTTP screen lets you configure the status and port number of the HTTP Server. IP Address Configuration HTTP IP Address The IP Address of the Switch is displayed. (The default IP address is 192.168.1.254.) Verify that the address you enter is correct and does not conflict with another device on the network.
Chapter 4 Configuration Using the Console Interface Network Configuration TraceRoute The Network Configuration screen offers a choice of two tests: Ping and TraceRoute. The TraceRoute screen displays the IP address of the address whose route you want to trace. Network Configuration TraceRoute Test Ping The Ping screen displays the IP address of the location you want to contact. Select Edit to change the IP address, and select Execute to begin the traceroute test.
Chapter 4 File Management Configuration Using the Console Interface Reboot System The File Management screen allows you to upload or download files, such as the startup configuration, boot, or image file, using a TFTP server. Reboot System File Management Select Reboot System and press the Enter key if you want to restart the Switch. You will be asked if you want to continue. Press the y key to reboot the Switch, or press the n key to cancel.
Chapter 4 Configuration Using the Console Interface Port Configuration On the Switch Main Menu screen, select Port Configuration and press the Enter key if you want to configure the Switch’s ports. The Port Configuration screen displays the port numbers, their status, auto-negotiation status, speed and duplex mode, and status of flow control, which is the flow of packet transmissions. Port Configuration Select Edit and press the Enter key to make changes.
Chapter 5 Chapter 5: Advanced Configuration Overview This chapter describes the features included in the Webbased Utility. All of the features shown in this chapter, unless specifically identified, are included in all of the WebView Switches. The screen images were taken from the SRW2048 Switch. Additional features for specific Switches are noted. The SRW224G4, SRW248G4, SRW2016, and SRW2024 Switches may not support all functions.
Advanced Configuration Chapter 5 IP Address The IP address assigned to the Switch. This setting can be configured from the Setup tab’s Network Settings screen. Subnet Mask The Subnet Mask assigned to the Switch. This setting can be configured from the Setup tab’s Network Settings screen. DNS Servers The IP address of your ISP’s server that translates the names of websites into IP addresses. This setting can be configured from the Setup tab’s Network Settings screen.
Advanced Configuration Chapter 5 Click Save Settings to save your changes. Click Cancel Changes to cancel your changes. Setup > Time The Time screen allows you to configure the time settings for the Switch. Time Set Offset For non-US and European countries, specify the amount of time for daylight savings. The default is 60 minutes. The range is (1–1440). From If you selected Other for the Daylight Saving setting, enter the date and time when daylight savings begins.
Advanced Configuration Chapter 5 Setup > Green Ethernet Port Management > Port Settings The Green Ethernet Configuration screen allows you to enable energy-efficient Ethernet (EEE). EEE optimizes power consumption by monitoring both port and system power requirements, while minimizing energy consumption. Green Ethernet ensures that the network operation is not comprimised, while at the same time maintaining a Green network. The Port Settings screen shows you the settings for each of the Switch’s ports.
Advanced Configuration Chapter 5 PVE When a port is a Private VLAN Edge (PVE) port, it bypasses the Forwarding Database and forwards all unicast, multicast, and broadcast traffic to an uplink. Uplinks can be ports or LAGs. Detail The Detail button opens the Port Configuration Detail screen. Port Settings > Port Configuration Current Auto Negotiation (Read-only) The port’s current Auto-Negotiation status. Admin Advertisement Specifies the capabilities to be advertised by the port.
Advanced Configuration Chapter 5 PVE When a port is a Private VLAN Edge (PVE) port, it bypasses the Forwarding Database and forwards all unicast, multicast, and broadcast traffic to an uplink. Link Aggregation > Detail NOTE: All ports in the same PVE group should join the same VLAN group. LAG (Read-only) The LAG to which this port belongs, if the port is a LAG member. Click Save to save the settings and leave the screen open. Click Save & Close to save the settings and close the screen.
Advanced Configuration Chapter 5 Select Ports VLAN Management > Create VLAN Ports Displays the ports that are members of the selected LAG. The Create VLAN screen provides information and global parameters for configuring and working with VLANs. Port Management > LACP You can use the Link Aggregation Control Protocol (LACP) to link aggregate ports into link aggregation port groups. Each group is comprised of ports with the same speed, set to full-duplex operation.
Chapter 5 Advanced Configuration VLAN Management > Port Setting VLAN Management > Ports to VLAN The VLAN Port Setting screen provides parameters for managing ports that are part of a VLAN. The port default VLAN ID (PVID) is configured on the VLAN Port Setting screen. All untagged packets arriving to the device are tagged by the ports PVID. The Ports to VLAN screen contains fields for configuring ports to a VLAN. The port default VLAN ID (PVID) is configured on the Create VLAN screen.
Advanced Configuration Chapter 5 VLAN Management > VLAN to Ports VLAN Management > GVRP The VLAN to Ports screen contains fields for configuring VLANs to a ports. GARP VLAN Registration Protocol (GVRP) is specifically provided for automatic distribution of VLAN membership information among VLAN-aware bridges. GVRP allows VLAN-aware bridges to automatically learn VLANs to bridge ports mapping, without having to individually configure each bridge and register VLAN membership.
Chapter 5 Statistics > RMON Statistics The RMON Statistics screen contains fields for viewing information about device utilization and errors that occurred on the device. Advanced Configuration Broadcast Packets Received Displays the number of good broadcast packets received on the interface since the device was last refreshed. This number does not include Multicast packets.
Advanced Configuration Chapter 5 Statistics > RMON History View History Table button This button opens the RMON History screen. The RMON History screen contains information about samples of data taken from ports. For example, the samples may include interface definitions or polling periods. RMON History The RMON History screen contains interface-specific statistical network samplings. Each table entry represents all counter values compiled during a single sample.
Chapter 5 Advanced Configuration Undersize Packets Displays the number of undersized packets (less than 64 octets) received on the interface since the device was last refreshed. Sample Type Defines the sampling method for the selected variable and comparing the value against the thresholds. The possible field values are: Oversize Packets Displays the number of oversized packets (over 1518 octets) received on the interface since the device was last refreshed.
Advanced Configuration Chapter 5 Counter Value Displays the current counter value for the particular alarm. RMON Events Log Statistics > RMON Events The RMON Events screen contains fields for defining RMON events. RMON Events > Events Log Event Displays the RMON events log entry number. Log No Displays the log number. Log Time Displays the time the log entry was entered. Statistics > RMON Events Add Event Event Entry Displays the event. Community Displays the community to which the event belongs.
Advanced Configuration Chapter 5 Statistics > 802.1x Statistics Statistics > GVRP Statistics The 802.1X Statistic screen contains information about EAP packets received on a specific port. The GVRP Statistics screen contains device statistics for GVRP. Statistics > 802.1x Statistics Statistics > GVRP Statistics Port Indicates the port, which is polled for statistics. Refresh Rate Indicates the amount of time that passes before the EAP statistics are refreshed.
Chapter 5 The GVRP Error Statistics Table contains the following fields: Invalid Protocol ID Displays the device GVRP Invalid Protocol ID statistics. Invalid Attribute Type Displays the device GVRP Invalid Attribute ID statistics. Invalid Attribute Value Displays the device GVRP Invalid Attribute Value statistics. Invalid Attribute Length Displays the device GVRP Invalid Attribute Length statistics. Invalid Event Displays the device GVRP Invalid Events statistics.
Advanced Configuration Chapter 5 Source Port Defines the TCP/UDP source port to which the ACE is matched. This field is active only if 800/6-TCP or 800/17-UDP are selected in the Select from List drop-down menu. The possible field range is 0–65,535. Destination Port Defines the TCP/UDP destination port. This field is active only if 800/6-TCP or 800/17-UDP are selected in the Select from List drop-down menu. The possible field range is 0–65,535.
Chapter 5 Ether Type Specifies the packet’s Ethernet type. Use the Add to List button to add the configured MAC Based ACLs to the MAC Based ACL Table at the bottom of the screen. Security > ACL Binding Advanced Configuration Security > RADIUS Remote Authorization Dial-In User Service (RADIUS) servers provide additional security for networks. RADIUS servers provide a centralized authentication method for web access.
Chapter 5 •• 802.1X Indicates that the RADIUS server is used for 802.1X authentication. •• All Indicates that the RADIUS server is used for Advanced Configuration Status Displays the connection status between the device and the TACACS+ server. The possible field values are: authenticating user name and passwords, and 802.1X port authentication.
Advanced Configuration Chapter 5 Use the Setting Timer button to open the Setting Timer screen to configure ports for 802.1x functionality. 802.1x Settings > Setting Timer 802.1x Settings > Setting Timer Port Indicates the port name. Reauthentication Period Specifies the number of seconds in which the selected port is reauthenticated (Range: 300–4,294,967,295). The field default is 3600 seconds.
Advanced Configuration Chapter 5 Learning Mode Defines the locked port type. The Learning Mode field is enabled only if Locked is selected in the Interface Status field. The possible field values are: •• Classic Lock Locks the port using the classic lock mechanism. The port is immediately locked, regardless of the number of addresses that have already been learned.
Advanced Configuration Chapter 5 Security > Storm Control Providing various mechanisms for determining the allocation of network resources to different handling classes, including: •• The assignment of network traffic to a particular hardware queue •• The assignment of internal resources •• Traffic shaping The terms Class of Service (CoS) and QoS are used in the following context: CoS provides varying Layer 2 traffic services.
Chapter 5 Class of Service Specifies the CoS priority tag values, where 0 is the lowest and 7 is the highest. Queue Defines the traffic forwarding queue to which the CoS priority is mapped. Four traffic priority queues are supported. The Restore Defaults button restores the device factory defaults for mapping CoS values to a forwarding queue. CoS Default Advanced Configuration WRR Weight Displays the WRR weights to queues. % of WRR Bandwidth Displays the amount of bandwidth assigned to the queue.
Chapter 5 Queue shaping can be based per queue and/or per interface. Shaping is determined by the lower specified value. The queue shaping type is selected in the Bandwidth screen. Interface Indicates the interface for which the queue shaping information is displayed.
Advanced Configuration Chapter 5 Use the Policy Settings button to open the Policy Name screen. Advanced Mode > New Aggregate Policer Advanced Mode > Policy Name Advanced Mode > New Aggregate Policer Advanced Mode > Policy Name Policy Name Defines a new Policy name. Add to List The Add to List button lets you add the policy to the Policy Name table. Advanced Mode > New Class Map Aggregate Policer Name Enter a name in this field.
Advanced Configuration Chapter 5 Spanning Tree > STP Status The STP Status screen describes the STP status on the device. Last Topology Change Indicates the amount of time that has elapsed since the bridge was initialized or reset, and the last topographic change occurred. The time is displayed in a day hour minute second format, for example, 2 days 5 hours 10 minutes and 4 seconds. Spanning Tree > Global STP The Global STP screen contains parameters for enabling STP on the device.
Chapter 5 Path Cost Default Values Specifies the method used to assign default path costs to STP ports. The possible field values are: •• Short Specifies a 1–65,535 range for port path costs. Advanced Configuration Spanning Tree > STP Port Settings Network administrators can assign STP settings to specific interfaces using the STP Interface Settings screen. This is the default value. •• Long Specifies a 1–200,000,000 range for port path costs.
Advanced Configuration Chapter 5 Path Cost Indicates the port contribution to the root path cost. The path cost is adjusted to a higher or lower value, and is used to forward traffic when a path being rerouted. Default Path Cost When selected the default path cost is implemented. Priority Priority value of the port. The priority value influences the port choice when a bridge has two ports connected in a loop. The priority value is between 0–240. The priority value is provided in increments of 16.
Chapter 5 •• Multiple STP Indicates that Multiple STP is enabled on the device. Fast Link Indicates if Fast Link is enabled or disabled for the port or LAG. If Fast Link is enabled for a port, the port is automatically placed in the forwarding state (configurable from Spanning Tree > STP Port Settings). Port State Indicates if RSTP is enabled on the interface. Point-to-Point Admin Status Indicates if a point-to-point links are established, or permits the device to establish a point-to-point link.
Advanced Configuration Chapter 5 Spanning Tree > MSTP Instance Settings Spanning Tree > MSTP Interface Settings MSTP operation maps VLANs into STP instances. Packets assigned to various VLANs are transmitted along different paths within Multiple Spanning Trees Regions (MST Regions). Regions are one or more Multiple Spanning Tree bridges by which frames can be transmitted. In configuring MST, the MST region to which the device belongs is defined.
Advanced Configuration Chapter 5 •• Alternate Provides an alternate path to the root device from the root interface. •• Backup Provides a backup path to the designated port path toward the Spanning Tree leaves. Backup ports occur only when two ports are connected in a loop by a point-to-point link. Backup ports also occur when a LAN has two or more connections connected to a shared segment. •• Disabled Indicates the port is not participating in the Spanning Tree.
Chapter 5 Leave Timeout Indicates the amount of time the host waits, after requesting to leave the IGMP group and not receiving a Join message from another station, before timing out. If a Leave Timeout occurs, the switch notifies the Multicast device to stop sending traffic The Leave Timeout value is either user-defined, or an immediate leave value. The default timeout is 10 seconds.
Advanced Configuration Chapter 5 SNMP > Global Parameters SNMP > Views The Global Parameters screen contains parameters for defining SNMP notification parameters. SNMP Views provide access or block access to device features or feature aspects. For example, a view can be defined that states that SNMP Group A has Read Only (R/O) access to Multicast groups, while SNMP Group B has Read-Write (R/W) access to Multicast groups. Feature access is granted via the MIB name, or MIB Object ID.
Advanced Configuration Chapter 5 SNMP > Group Profile SNMP > Group Membership The Group Profile screen provides information for creating SNMP groups and assigning SNMP access control privileges to SNMP groups. Groups allow network managers to assign access rights to specific device features, or features aspects. The Group Membership screen provides information for assigning SNMP access control privileges to SNMP groups.
Advanced Configuration Chapter 5 Authentication Key Defines the HMAC-MD5-96 or HMAC-SHA-96 authentication level. The authentication and privacy keys are entered to define the authentication key. If only authentication is required, 16 bytes are defined. If both privacy and authentication are required, 32 bytes are defined. Each byte in hexadecimal character strings is two hexadecimal digits. Each byte can be separated by a period or a colon.
Chapter 5 Advanced Configuration Base Table SNMP > Notification Filter Management Station Displays the management station IP address for which the basic SNMP community is defined. The Notification Filter screen permits filtering traps based on OIDs (Object Identifiers). Each OID is linked to a device feature or a feature aspect. The Notification Filter screen also allows network managers to filter notifications.
Advanced Configuration Chapter 5 SNMP > Notification Recipient The Notification Recipient screen contains information for defining filters that determine whether traps are sent to specific users, and the trap type sent. SNMP notification filters provide the following services: •• Identifying Management Trap Targets •• Trap Filtering •• Selecting Trap Generation Parameters •• Providing Access Control Checks Security Level Defines the means by which the packet is authenticated.
Advanced Configuration Chapter 5 User Name Displays the user name. Password Specifies the new password. The password is not displayed. As it entered an “*” corresponding to each character is displayed in the field. The range is 1–159 characters. Confirm Password Confirms the new password. The password entered into this field must be exactly the same as the password entered in the Password field. Admin > Static Address A static address can be assigned to a specific interface on this switch.
Advanced Configuration Chapter 5 MAC Address Specifies the MAC address for which the table is queried. VLAN ID Specifies the VLAN ID for which the table is queried. Address Table Sort Key Specifies the means by which the Dynamic MAC Address Table is sorted. The address table can be sorted by address, VLAN, or interface. Admin > Dynamic Address The Dynamic Address Table contains the MAC addresses learned by monitoring the source address for traffic entering the switch.
Chapter 5 •• Error A system error has occurred. •• Warning A system warning has occurred. •• Notice The system is functioning properly, but system notice has occurred. •• Informational Provides device information. •• Debug Provides detailed information about the Advanced Configuration Admin > Cable Test The Cable Test screen shows you results from performance tests on copper cables. The maximum cable length that can be tested is 120 meters.
Advanced Configuration Chapter 5 Admin > Save Configuration Admin > Firmware Upgrade After you download a new image file, the device should be rebooted. If you are downloading a new boot image, please follow these steps: 1. Download the new boot code. DO NOT RESET THE DEVICE! 2. Download the new software image. 3. Reset the device now. Admin > Save Configuration Via TFTP Upgrade Select this option to upgrade the switch from a file located on a TFTP server.
Chapter 5 Advanced Configuration Admin > Reboot Admin > Server Logs The Reboot screen resets the device. The device configuration is automatically saved before the device is rebooted. The Server Logs screen contains information for viewing and configuring the Remote Log Servers. New log servers can be defined, and the log severity sent to each server.
Chapter 5 Advanced Configuration Admin > Memory Logs Admin > Flash Logs The Memory Log screen contains all system logs in a chronological order that are saved in RAM (Cache). The Flash Log screen contains information about log entries saved to the Log File in FLASH, including the time the log was generated, the log severity, and a description of the log message. The Message Log is available after reboot. Admin > Memory Logs Log Index Displays the log number.
Appendix A About Gigabit Ethernet and Fiber Optic Cabling Appendix A: About Gigabit Ethernet and Fiber Optic Cabling Gigabit Ethernet Gigabit Ethernet runs at speeds of 1Gbps (Gigabit per second), ten times faster than 100Mbps Fast Ethernet, but it still integrates seamlessly with 100Mbps Fast Ethernet hardware. Users can connect Gigabit Ethernet hardware with either fiber optic cabling or copper Category 5e cabling, with fiber optics more suited for network backbones.
Appendix B Windows Help Appendix B: Windows Help Almost all networking products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix. TCP/IP Before a computer can communicate within a network, TCP/IP must be enabled. TCP/IP is a set of instructions, or protocol all PCs follow to communicate over a network.
Appendix C Appendix C: Downloading using Xmodem Downloading using Xmodem 5. When the auto-boot message appears, press the Enter key to access the Startup menu. Startup Menu Procedures The Startup menu can be entered when booting the device. There is a two second window of time to enter the Startup Menu immediately after the POST test. The menu can be accessed directly from a terminal connected to the console port. The Startup menu procedures can be done using the ASCII terminal or Windows HyperTerminal.
Appendix C Downloading using Xmodem 9. Press Send and the software is downloaded. Download After the software has been downloaded, the device will reboot automatically.
Glossary Appendix D Appendix D: Glossary Baud Indicates the number of signaling elements transmitted each second. This glossary contains some basic networking terms you may come across when using this product. Bit A binary digit. WEB: For additional terms, please visit the glossary at www.linksys.com/glossary Access Mode Specifies the method by which user access is granted to the system. Access Point A device that allows wireless-equipped computers and other devices to communicate with a wired network.
Appendix D CoS (Class of Service) The 802.1p priority scheme. CoS provides a method for tagging packets with priority information. A CoS value between 0-7 is added to the Layer II header of packets, where zero is the lowest priority and seven is the highest. DDNS (Dynamic Domain Name System) Allows the hosting of a website, FTP server, or e-mail server with a fixed domain name (e.g., www.xyz.com) and a dynamic IP address. Default Gateway A device that forwards Internet traffic from your local area network.
Appendix D Glossary MAC (Media Access Control) Address The unique address that a manufacturer assigns to each networking device. RADIUS (Remote Authentication Dial-In User Service) A protocol that uses an authentication server to control network access. Mask A filter that includes or excludes certain values, for example parts of an IP address. RJ-45 (Registered Jack-45) An Ethernet connector that holds up to eight wires.
Appendix D Glossary TCP (Transmission Control Protocol) A network protocol for transmitting data that requires acknowledgement from the recipient of data sent. TCP/IP (Transmission Control Protocol/Internet Protocol) A set of instructions PCs use to communicate over a network. Telnet A user command and TCP/IP protocol used for accessing remote PCs. TFTP (Trivial File Transfer Protocol) A version of the TCP/IP FTP protocol that has no directory or password capability.
Specifications Appendix E Appendix E: Specifications SRW2048 Ports 48 RJ-45 connectors for 10BASE-T, 100BASE-TX and 1000BASE-T with 4 shared SFP (miniGBIC) slots Cabling Type UTP CAT 5 or better for 10BASE-T/100BASE-TX, UTP CAT 5e or better for 1000BASE-T LEDs Power, Link/Act, Speed Other Management Performance Switching Capacity 96 Gbps, non-blocking MAC table size 8K Number of VLANs 256 - Static and Dynamic RFC854 Telnet (Menu-driven configuration) Secure Shell (SSH) and Telnet Management Te
Specifications Appendix E QoS SRW2016/SRW2024 Priority levels 4 Hardware queues Scheduling Priority Queueing and Weighted Round Robin (WRR) Class of Service Port-based 802.1p VLAN priority based IP TOS/DSCP based IPv4 & IPv6 Traffic Class based COS MAC Address port security VLAN ID MAC Address IP Address Subnet Mask Service Type Protocol TCP/UDP Port Rate Limiting Ingress Policer, Egress Shaper Standards IEEE 802.3, 802.3u, 802.3ab, 802.3x, 802.1p, 802.
Specifications Other Management RFC854 Telnet (Menu-driven configuration) Secure Shell (SSH) and Telnet Management RADIUS TACACS+ Telnet Client SSL security for Web UI Switch Audit Log DHCP Client BootP SNTP Xmodem upgrade Cable Diagnostics PING Traceroute Syslog Security Features IEEE 802.1x 802.1x - RADIUS Authentication. MD5 Encryption Access Control MAC based ACL Availability Link Aggregation Link Aggregation using IEEE 802.
Specifications SRW224G4/SRW248G4 Ports 24 or 48 RJ-45 connectors for 10BASE-T and 100BASE-TX, 4 RJ-45 connectors for 10BASET/100BASE-TX/1000BASE-T with 2 shared SFP (miniGBIC) slots Auto MDI/MDI-X Autonegotiate/Manual setting Cabling Type UTP CAT 5 or better for 10BASE-T/100BASE-TX, UTP CAT 5e or better for 1000BASE-T LEDs Power, Link/Act, Speed Performance Other Management RFC854 Telnet (Menu-driven configuration) Secure Shell (SSH) and Telnet Management Telnet Client SSL security for Web UI Switc
Specifications QoS Environmental Priority levels 4 Hardware queues Dimensions SRW224G4 - 430 x 44 x 203 mm Scheduling Priority Queueing and Weighted Round Robin (WRR) HxWxD SRW248G4 - 430 x 44 x 350 mm Weight SRW224G4 - 4.41 lb (2 kg) Class of Service Port-based 802.1p VLAN priority based IP TOS/DSCP based IPv4 & IPv6 Traffic Class based COS MAC Address port security† VLAN ID* MAC Address* IP Address* Subnet Mask* Service Type* Protocol* TCP/UDP Port* Rate Limiting SRW248G4 - 8.60 lb (3.
Appendix F Appendix F: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified for this product at www.linksys.com/warranty.
Appendix F Warranty Information product to Linksys at your cost and risk. You must include the RMA number and a copy of your dated proof of original purchase when returning your product. Products received without a RMA number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge.
Appendix G Appendix G: Regulatory Information FCC Statement This equipment has been tested and complies with the specifications for a Class A digital device, pursuant to Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
Appendix G User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix G Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix G Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix G Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenčina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix H Appendix H: Software License Agreement Software in Linksys Products: This product from Cisco-Linksys LLC or from one of its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or CiscoLinksys K.K. (“Linksys”) contains software (including firmware) originating from Linksys and its suppliers and may also contain software from the open source community. Any software originating from Linksys and its suppliers is licensed under the Linksys Software License Agreement contained at Schedule 1 below.
Software License Agreement Appendix H your Linksys product and/or the Software is being used in accordance with the terms of this Agreement; (iii) to provide improvements to the way Linksys delivers technology to you and to other Linksys customers; (iv) to enable Linksys to comply with the terms of any agreements it has with any third parties regarding your Linksys product and/or Software and/or (v) to enable Linksys to comply with all applicable laws and/or regulations, or the requirements of any regulato
Appendix H Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it.
Appendix H c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
Software License Agreement Appendix H License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royaltyfree redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.
Appendix H Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2.
Appendix H Software License Agreement THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY O
Appendix I Contact Information Appendix I: Contact Information Linksys Contact Information Website http://www.linksys.com Support Site http://www.linksys.com/support FTP Site ftp.linksys.com Advice Line 800-546-5797 (LINKSYS) Support 800-326-7114 RMA (Return Merchandise http://www.linksys.com/warranty Authorization) NOTE: Details on warranty and RMA issues can be found in the Warranty section of this Guide.