2 INSTALLATION GUIDE AND OPERATING MANUAL ProSwitch® FlexPort- 2600M Managed Modular Copper and Fiber Switch CORPORATE HEADQUARTERS MANUFACTURING/CUSTOMER SERVICE 5001 American Blvd. W., Suite 605 Bloomington, MN 55437 Phone: 800.441.5319 Phone: 952.831.5603 945 37 Avenue, NW Rochester, MN 55901 Phone: 800.328.2275 Phone: 507.285.1951 th Web site: http://www.watersnet.
TABLE OF CONTENTS 1.0 2.0 2.1 2.2 3.0 3.1 3.2 3.3 3.4 3.5 3.6 4.0 5.0 6.0 6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8 6.9 6.10 6.11 6.12 6.13 6.14 6.15 6.16 6.17 6.18 6.19 6.20 6.21 6.22 6.23 7.0 7.1 7.2 7.3 7.4 SPECIFICATIONS ...................................................................................................1 PACKAGE CONTENTS - PROSWITCH®- 2600M ..................................................3 Product Description ......................................................................................
1.0 Specifications OPERATIONAL CHARACTERISTICS: MAC Address Table: Up to 8K Switching Mode: Store-and-forward Memory Buffer Size: 2 MB Filtering/Forwarding Rate Performance 10Mbps: 14,880 pps 100Mbps: 148,800 pps 1000Mbps: 1,488,000 pps MANAGEMENT OPTIONS: Web Based, SNMP, Console and Telnet DHCP Client SNMP Agent Version 1: MIB-II (RFC1213) Bridge MIB (RFC1493) Etherlike MIB Private MIB RMON: RMON MIB (RFC1757, Group 1, 2, 3, 9) VLAN: Tag and port-based/802.
EMI/SAFETY COMPLIANCE: FCC Part 15 Class A, CE COPPER CABLE CONNECTORS: Twisted Pair Shielded RJ45 FIBER CABLE CONNECTORS: MM FX port: 50/125um, 62.5/125mm MM FX port: 50/125um, 62.5/125mm SM FX port: 9/125um MM SX/LX port: 50/125um, 62.5/125mm SM SX/LX port: 9/125um, 62.
2.0 2.1 Package Contents - ProSwitch®- 2600M ProSwitch®- 2600M AC power cord Two rack-mount kits and screws Console cable Installation manual Product Description The ProSwitch®-2600M is a high performance 10/100/1000Mbps auto-negotiation switch with SNMP/RMON web-based management capability. From a departmental backbone managing lower-level switches, hubs and workstations to high-speed switch-to-switch and switch-to-server links, the 2600M delivers outstanding performance in every environment.
3.2 Rack Mounting the ProSwitch®- 2600M Use the brackets and screws supplied in the rack mounting kit. Use a cross-head screwdriver to attach the brackets to the side of the intelligent Switch. 3. Position the 2600M on the rack by lining up the holes in the brackets with the appropriate holes on the rack, and then use the supplied screws to mount the hub onto the standard EIA 19-inch rack. 1. 2. 3.
Connecting Modules Turn off the switch. Remove the protective plastic covers from the fiber connectors on the module. Plug the connector on the fiber cable into the fiber socket on the module. Connect the other end of the fiber optic segment to an appropriate device fitted with a 100Mbps adapter. 5. Power on the switch. 6. Check the LED indicators on the front of the switch to ensure that the module is operating correctly. 1. 2. 3. 4. Removing Modules 1. 2. 3. 4. 5.
network. Because the switch supports auto MDI/MDI-X detection, normal straight through cables for both workstation connection and hub or switch connection can be used. All ports are auto MDI/MDI-X, so you can use any of the ports to connect a port on another hub or switch with straight through or crossover cables 3.6 Status of LEDs LED STATU S CONDITION Power ON Switch is receiving power. Link / Act ON Port has established a valid link. Flashing Data packets received or sent.
treats additional cables as one connection between them. Traffic looping will not occur between these cables and switches will be more stable with a bigger bandwidth between them. The 2600M supports the trunking function. Enable trunk function. Assign ports to a trunk. For example, assign Port 1, 2, 3 for Trunk 1. Redundant Application The trunk connection supports redundant function.
There is a MAC Security Configuration function for port security. If it set to the Accept mode, only the static MAC addresses can access the network through the assigned port. The other MAC addresses will be denied network access through that port. This function can be used for port binding security. IEEE 802.1x Port Security Function If the 802.1x function is enabled, the switch will act as an authenticator for users accessing the network through the switch. A RADIUS server is required for authentication.
5.0 Console Management Interface (CMI) You can manage the 2600M locally by connecting a personal computer or workstation with terminal emulation software, to the serial port of the 2600M. The appropriate cable is included with your switch. This management method is ideal when: The network is unreliable. The switch has not been assigned an IP address. The network manager does not have direct network connection. Equipment Required Null modem cable, 9 position D-Sub, female to female.
8. The initialization screen will look similar to this example: Booting Program Version 1.05.00, built at 14:44:03, Jul 29 2005 RAM: 0x00000000-0x00800000, 0x0000cc78-0x007f3000 available FLASH: 0x05800000 - 0x05900000, 16 blocks of 0x00010000 bytes each. ==> enter ^C to abort booting within 3 seconds Start to run system initialization task [System Configuration] Company Name : Model Name : Intelligent Switch MAC Address : 00:00:01:23:45:67 Firmware Version: 3.02.
The following table lists the CLI commands and descriptions.
Command Description Syntax Disable: The VLAN filtering function will be executed when the packet is forwarded to the egress port. The create sub-command is used to create a static 802.1Q VLAN. For example, “set 1qvlan create 20 ABC” will create a static 802.1Q VLAN with ID 20 and name “ABC”. The modify sub-command is used to modify a static 802.1Q VLAN setting.
Command Description Syntax default is 300 Additional information: Disable aging is different from static MAC ID in ARL table. The connection port is fixed for a static MAC ID, but the connection port could be changed for a MAC ID with no aging. arl Add a static MAC address in the ARL Set ARL [xx-xx-xx-xx-xx-xx] table [port#] Additional Information: Set ARL 00-00-01-11-22-33 5 will add a static MAC ID 00-00-0111-22-33 to port 5 and this MAC ID will never be aged out from port 5.
Command Description Syntax supptime – set 802.1x supplicant timeout period svrtime – set 802.1x server timeout period transparent – set 802.1x as transparent mode txtime – set 802.1x TX timeout period Additional information: Enable is used to enable the 802.1x authentication function. Disable is used to disable the 802.1x function. Authmode is used to set the authentication mode for a physical port.
Command Description Syntax idle Set idle time for console Default is 10 minutes Set IGMP configuration Set loopback detection of port Enable loopback detection on port Disable loopback detection on port Release ports that loopback detected Set mirror configuration set mirror ingress div x : every x packets, capture one for mirror. For example, “set mirror ingress div 10” will capture one packet from every ten packets from ingress traffic.
Command port protect Description Syntax check the IP configuration from the DHCP server by “show net” command. For static IP setting, you can set the IP configuration of the switch with ip, netmask and gateway commands. For example, “set net ip 192.168.1.250 netmask 255.255.255.0 gateway 192.168.1.154” will set these parameters as the IP address configuration of the switch. After the command, you can use “show net” to verify the setting.
Command pvlan qos rate control Description Syntax isolated ports in the same VLAN. Set members of port-based VLAN groups Note: If a port does not belong to any VLAN, that port will be isolated from other ports – including the internal management interface of the switch Set QoS configuration The switch supports four priority queues on each port – P0, P1, P2 and P3. Both port-based priority and 802.1P tag priority are supported. This command can be used to configure the QoS setting of the switch.
Command Description Syntax [port#] [N:0-240] Set port 1 ingress rate control with 10; Example: set ratecontrol ingress 1 10 Description: Set port 1 ingress rate control with 10*64K=640K No Limit of rate control, with N=0. Rate = N*64 Kb, with N=1~28. Rate = (N-27)*1Mb, with N=29~127. Rate = (N-115)*8Mb, with N=128~240 (only for Gigabit port). set ratecontrol drop [0|1] This subcommand is used to enable/disable the packet dropping operation when ingress traffic exceeds the maximum ingress rate.
Command Description Syntax mode 1 = Accept function mode 2 = Reject function For examples, “set security 1 1” will set Port 1 to accept the users with the static MAC addresses configured on Port 1. rmon Mac Address Table” in web interface. The table will show the learned Mac addresses and you just need to select from the learned address list and add it to static address table. Additional Information: The MAC address filter-in function requires two conditions. The port security mode is set to “Accept”.
Command stormcontrol Description Syntax age - set bridge maximum age delay - set bridge forward delay time set sta port is used to configure for ports of the switch Syntax: set sta port [port#] [cost=xxxx] [priority=xxxx] hello (0~65535): the period to send the spanning tree maintenance packet if the switch is the root of the spanning tree. Default is 2 seconds. age (6~40): the spanning tree aging time if no spanning tree maintenance packet is received.
Command trunk default Description Syntax for the control. set stormcontrol bc: this subcommand is for broadcast storm control. set stormcontrol fd: this subcommand is for flooding storm control. port Syntax: set stormcontrol rate Syntax : set stormcontrol rate [rate value] Example 1: Set stormcontrol rate 10 Description: Set suppression rate for Storm Control function as 640Kb. Rate = No Limit, with N=0. Rate = N*64 Kb, with N=1~28. Rate = (N-27)*1Mb, with N=29~127.
Command del find whoami reset ping backup Description Syntax the factory default This command can delete static entried in the ARL table, delete a VLAN group and delete a trunk connection. This command can find a MAC address in the ARL table Additional Information: If the MAC is in the ARL table, the MAC address will be displayed. If it is not, the message “This MAC is not existed!” will be displayed. Dynamic means the MAC address is learned and cannot be aged out by the switch.
Command Description Syntax Same as the exit command. Show subcommand list: ? help 1qvlan Help commands Help command Displays 802.1q VLAN configuration show ? show help Example: show 1qvlan [status |static|table|port] status: show 802.1q, ingress filter and GVRP protocol status static: show static vlan table content table: show all vlan table content port: show the pvid and Priority for tag of ports Example: show 1qvlan status will display: 802.
Command cfg dot1x Description Syntax negotiation disabled. For most applications, Auto Detect mode is OK. For 100FX connection, you should select Auto Negotiation mode and disable Auto. Set the port to 100/Full. Displays model name, MAC ID, and firmware version Displays current status for 802.1x protocol show cfg show dot1x config Displays: 802.
Command Description Syntax guest Displays name and password for guest Displays GVRP protocol setting Displays http protocol setting If disabled, the web management interface for the switch will be off. show guest gvrp http idle igmp loopback mirror net port protect pvlan qos ratecontrol rmon security snmp sta stormcontrol show gvrp show http Displays idle time for console logout If there is no keystroke during the amount of time set, the console and telnet interface will logout automatically.
Command Description Syntax trunk Use this command to determine the maximum storm rate setting and the port list controlling the storm control Displays trunking configuration show trunk 6.0 Web Management The 2600M switch can be managed via your web browser. You can use the default IP to connect to the switch for the first time. The default IP address is 192.168.1.5. You can also connect to the switch via the console using the CLI commands listed in Section 5.0.
The left side of the home page is a function list. You can use any of these menu options for status monitoring or switch configuration. The top of the screen displays the current link status for the switch. Three colors are used to show the status of ports: link up, link down and port disable. The middle of the screen shows the operation for switch configuration based on the selected function. This is the working area. 6.1 System Configuration Page The System Configuration is the home page of the switch.
Figure 6.2 – System Configuration Screen 6.2 Port Configuration The Port Configuration menu allows you to view the current status of ports and to configure the operation of ports. Auto Mode Auto mode allows you to select the port forced setting. Port forced setting means that the port is being forced into a special setting, for example, 10M/Half, instead of autonegotiation. Connection to some devices may require this setting.
Select Auto Detect mode if the connected device supports auto-negotiation enabled. Select Auto Negotiation mode if the connected device is auto-negotiation disabled. For most applications, Auto Detect mode is OK. But for 100FX connections, you should select Auto Negotiation mode and disable Auto. Set the port to 100/Full. Loopback Detection This switch can detect a loopback condition occurring on ports if this function is enabled. If a loopback condition is determined, the loopback port will be disabled.
Figure 6.
6.3 Spanning Tree The spanning tree menu is used to enable/disable the spanning tree function and configure the bridge parameters. Refer to the section in the CLI chart for detailed information about spanning tree settings. Click on Apply to make changes to spanning tree. Figure 6.4 – Spanning Tree Once the parameters are set, click on Configuration STA Port and the configuration page displayed below will appear. Figure 6.
6.4 Dynamic MAC Address Table The Dynamic MAC Address Table screen will display the MAC address content for the ports. 1. 2. 3. 4. 5. 6. Select the port from the drop down arrow next to Destination Port. The MAC address learned by the switch on the port will be displayed. Up to 128 MAC address will be shown. You can select the MAC address to assign as static MAC addresses for the port. Click Add to Static Address Table once you have chosen the port.
6.5 Static MAC Address Table The 2600M also supports static MAC address assignments. Static MAC addresses can be assigned by two methods: 1. Select from the MAC address list in the Dynamic MAC Address Table. OR 2. Enter a MAC address and select the port. 3. Add this entry to the Static MAC Address Table by clicking on Add MAC. The switch will not age out these static MAC addresses.
6.6 MAC Security Configuration This function is used to set the security modes for the static MAC address on the port. There are three options for this function: No Security - No MAC address access limitation for the port, i.e. every MAC address could access the network through the port. Accept function - The port can accept the static MAC addresses only, i.e. only a user with a static MAC address can access the network through the port.
6.7 Port-based VLANs This switch supports both 802.1Q VLAN and port-based VLAN functions. This screen can be used to configure port-based VLANs. There are three sections on the screen: The top section is used to choose the VLAN function. Choose between 802.1Q VLAN, Port-based VLAN or Disabled for the VLAN function. The middle section of the screen is used to create and modify a port-based VLAN. Use the following steps: 1. Select the VLAN ID number. 2. Enter a name for the VLAN. 3.
6.8 802.1Q VLAN Configuration This screen is used to configure the 802.1Q VLAN function. The following list describes the settings. VLAN Function – Use to select the VLAN mode: 802.1Q VLAN, Port-based VLAN and Disabled. GVRP Protocol - Use to enable/disable the GVRP protocol. The GVRP protocol can learn remote 802.1Q VLANs from other devices and add them to the dynamic 802.1Q VLAN table. Ingress Filter - The ingress-filter function is used for VLAN filtering at the ingress port.
Figure 6.10 – 802.1Q VLAN Configuration 6.9 Static 802.1Q VLAN To create an 802.1Q VLAN: 1. 2. 3. 4. Enter the VLAN ID and VLAN Name in the fields under Create New Static VLAN. Click Create. The valid VLAN ID is 1 ~ 4094. Select the VLAN under Show Static VLAN Table. The new VLAN is empty by default, so the next step is to select the ports. Select the ports and mark them Untagged or Tagged. 5. Click Apply to complete the VLAN configuration. To modify an 802.1Q VLAN: 1.
The tagged port will always send out packets with a tag. If untagged packet is received, a tag will be added with the PVID setting of the ingress port before it is forwarded to the tagged port. The 802.1Q VLAN information will be carried in the tag. The untagged port will always send out packets without tag. If a tagged packet is received, the tag will be removed from the packet before forwarded to an untagged port. Note: Most network adapters or devices are untagged devices.
6.10 802.1Q VLAN Table The 802.1Q VLAN table will show the activity for the VLAN. Both static and dynamic 802.1Q VLANs will be displayed in the table. To view the 802.1Q VLANs: 1. Select a VLAN under the Show VLAN Table section. 2. The current activity for the VLANs will be displayed. Note: If the GVRP protocol is enabled, this table will also display the learned remote 802.1Q VLANs. 6.12 – 802.1Q VLAN Table 6.11 802.1x Configuration The 802.
8. 9. 10. 11. 12. users (called “supplicant” in 802.1x) after the first identification. The valid value is 0~65535. Set the Quiet Timeout Period. This value is the quiet time between the switch and the user before the next authentication process when authentication fails. Set the Tx Timeout Period. This value sets the timeout for the identification request from the switch to users. The request will be re-tried until the Re-authentication Max Count is met.
6.14 – Port Authentication Configuration 6.12 Protected Port Configuration The Protected Port function allows you to isolate the traffic between protected ports. For example, if Ports 1, 2 and 3 are marked as protected, the traffic between these three ports will be blocked, even they are in the same VLAN. However, they still can communicate with other ports in the same VLAN. This function adds another level of security to the switch. 1. 2. 3. 4. Select Enable.
6.15 – Protected Port Setting 6.13 Trunking This switch supports three trunk connections which are disabled by default. Follow these steps to configure trunking: 1. 2. 3. 4. 5. 6. Select Enable in the Trunk Function section of the screen. Click Apply to enable the function. Use Trunk 1 or Trunk 2 to create a trunk of the 10/100Mbps ports. Use Trunk 3 to create a trunk for the Gigabit ports. Click Apply to save the settings. If you want to disable the trunk function, select Disable and click Apply.
6.14 Mirror Settings To configure the Mirror function, follow these steps: 1. 2. 3. 4. 5. 6. 7. 8. Select Enable in Mirroring. Click Apply to enable the function. Select the capture port. The monitored traffic will be forwarded to this port. Select the monitored port from Ingress or Egress table – depending on the traffic direction. Select the filter mode. Choose between All packets or DA/SA address. If DA/SA is selected, enter the special MAC address in the xx-xx-xx-xx-xx-xx format.
6.15 QoS Settings The 2600M switch supports four priority queues on each port for QoS operation. Use the following steps to configure the QoS function: 1. Select Enable in the QoS Function section of the screen. 2. Click Apply to enable the function. 3. If you are using port-based priority, select the ports for High and Low priorities in the Port Priority section of the screen. The packets from high priority port will be forwarded to the highest priority queue on egress port.
6.16 Ingress/Egress Rate Control The rate control function limits the maximum traffic rate for each physical port. Traffic can be ingress traffic or egress traffic. The rate control range is 64Kbps ~ 1000Mbps. The following table describes the rule for the rate control setting. Maximum Rate No Limit 64K,128K,192K…1792Kbps 2M,3M,4M…100Mbps 104M,112M…1000Mbps Rate Control Number (N) 0 1 ~ 28 29 ~ 127 128 ~ 240 Rule 0 means no limit. Rate = N x 64Kbps Rate = (N-27) x 1Mbps Rate = (N-115) x 8Mbps Table 6.
6.17 Storm Control The storm control function limits the maximum traffic rate for packet storm. Two types of traffic storms can be limited: broadcast storm and flooding packet storm. You can enable the storm control by port. Use the following steps to configure the storm control settings. 1. Set the suppression rate. 2.
6.18 SNMP Use this option to configure the SNMP settings. Once SNMP has been configured, you will be able to manage the switch from an SNMP management program. 1. In the RMON section of the screen choose enable or disable. RMON is disabled by default. 2. Click Apply 3. Enter the System Information. 4. Click Apply 5. Enter the following information: • GET/SET Community Name • Trap IP Address and Community Name 6. Click Apply to save the settings. 6.
6.19 IGMP The IGMP function is used for IP multicast operation in the network. The 2600M perform IGMP Snooping function to obtain the IP multicast group information from active IGMP devices. The learned IP multicast member group will be shown in the IGMP web page. The switch will forward IP multicast traffic to the member ports that it has learned from group information. Use this screen to enable/disable IGMP snooping. Click Apply to save the setting. 6.22 – IGMP Setting 6.
6.21 Maintenance Tools The following four functions are supported in the system maintenance tools: System Reset – resets the switch. System Restore – restores switch configuration to the factory default settings. System Backup/Restore – Backup will make a backup copy of the configuration. Restore will import the backup configuration and restore it to the switch. System Upgrade – use this function to upgrade the system software. 6.24 – Maintenance Tools 6.
6.23 Software Update and Backup This switch supports software configuration backup and update restore functions. below are the three ways to perform these functions. Listed 1. From console when booting – Use the Xmodem protocol and a terminal program. This function can be used for run-time code and boot code updating. (Boot code works only at boot time - before the main program starts.) Follow this procedure: • Press Ctrl-C when the switch is booting.
7.0 Troubleshooting All Waters’ switching products are designed to provide reliability and consistently high performance in all network environments. The installation of Waters’ ProSwitch®- 2600M switch is a straightforward procedure discussed in Section 3; the operation is also straightforward and is discussed in Section 4. Should problems develop during installation or operation, this section is intended to help locate, identify and correct these types of problems.
7.2 Return Material Authorization (RMA) Procedure All returns for repair must be accompanied by a Return Material Authorization (RMA) number. To obtain an RMA number, call Waters Network Systems Customer Service at 800.328.2275 during business hours from 8:00 am to 5:00 pm (CT) email carolynl@watersnet.com. When calling, please have the following information readily available: 7.
7.4 Warranty Waters Network Systems’ Warranty Statement Waters Network Systems’ products are warranted against defects in materials and workmanship. The warranty period for each product will be provided upon request at the time of purchase. Unless otherwise stated, the warranty period is for the useable life of the product.