This guide provides instructions to install your new POE Ethernet Switch.
|
Note: The model you have purchased may appear slightly different from the illustrations shown in the document. Refer to the Product Instruction and Technical Specification sections for detailed information about your switch, its components, network connections, and technical specifications. |
In this guide, the term "Switch" (first letter capitalized) refers to your new POE Switch, and "switch"
(first letter lower case) refers to other PoE switches. Some technologies refer to terms "switch", "bridge"
and "switching hubs" interchangeably, and both are commonly accepted for Ethernet switches.
|
Note: indicates important information that helps a better use of the device. |
|
Warning: indicates potential property damage or personal injury. |
The pictures and data shown in this guide are for reference only, subject to change without notice.
Intended audience
This guide is designed to be used by network managers, IT administrators, and technicians who are responsible for installing, networking equipment in enterprise and service provider environments. Knowledge of telecommunication and internet protocol (IP) technologies is assumed.
Documentation
The ICCN activeARC® product and support documentation consists of a variety of manuals, installation guides, videos, knowledge articles, sample designs, troubleshooting, and FAQ guides to assist you with the deployment of your new and innovative solution.
These and other documents are available for download at:
www.iccnetworking.com/product-support
To view PDF files, use Adobe Acrobat Reader® 5.0 or newer. Download Acrobat
Reader for free from the Adobe website: http://www.adobe.com/products.
Find additional documentation at: http://www.iccnetworking.com.
Contact information
E-mail: support@iccnetworking.com and sales@iccnetworking.com
1 Product Introduction
Thank you for purchasing the new Enterprise POE Ethernet Switch.
The is a 10G Full Managed POE Switch with 48 x10/100/1000Mbps Auto-Negotiation RJ45 POE ports and 4 x10Gbps SFP Ports which can satisfy the full speed forwarding of all ports. The switch uses 19 "1U standard chassis that can be used on the desktop or on the rack. Excellent performance allows your new switch to be used for everything from wireless, high density, IoT, and many other data networking environments.
The front panel consists of LED indicators, RJ-45 copper, console, and SFP ports
PWR LED:The Power LED lights up when the Switch is connected to a power source.
Link/Act LED: The Link/Act LED flashes to indicate a network link through the corresponding port. A Blinking indicates that the Switch is either sending or receiving data to the port.
PoE LED:
Green: Indicates the PoE powered device (PD) is connected and the port supplies power successfully.
Light off: Indicates no powered device (PD) connected.
The rear panel view of the Switch consists of an AC power connector and fan (fan maybe mounted on the rear or side of the unit based on your Switch)
Power: Plug the female connector into the switch and male connector into a power outlet. The Switch supports input voltages 100-240VAC, 50/60Hz.
Switch: Turn on the switch after inserting the power cord, “I” means to turn on, “O” means closing.
Grounding: Make sure to use a specialized ground lead connect
2 Hardware installation
This chapter provides unpacking and installation information for the Managed POE Switch.
Open the shipping carton and carefully unpack its contents. Please consult the packing list located in the User Manual to make sure all items are present and undamaged. If any item is missing or damaged, please contact the local reseller for replacement.
Switch 1pcs
AC power cord 1pcs
Rubber feet 4pcs
Screws 6pcs
Mounting brackets 2pcs
User manual 1pcs
Serial port lines 1pcs
CD ROMs 1pcs
If any item is found missing or damaged, please contact the local reseller or original place of purchase for replacement.
For safe switch installation and operation, it is recommended that you:
Visually inspect the power cord to see that it is secured fully to the AC power connector.
Make sure that there is proper heat dissipation and adequate ventilation around the switch.
Do not place heavy objects on the switch.
When installing the switch on a desktop or shelf, the rubber feet included with the device must be attached on the bottom at each corner of the device's base. Allow enough ventilation space between the device and the objects around it.
The switch can be mounted in an EIA standard size 19-inch rack, which can be placed in a wiring closet with other equipment. To install, attach the mounting brackets to the switch's side panels (one on each side) and secure them with the screws provided (please note that these brackets are not designed for palm size switches).
Then, use the screws provided with the equipment rack to mount the switch in the rack.
Please be aware of following safety Instructions when installing:
A) Elevated Operating Ambient - If installed in a closed or multi-unit rack assembly, the operating ambient temperature of the rack environment may be greater than room ambient. Therefore, consideration should be given to installing the equipment in an environment compatible with the maximum ambient temperature (Tma) specified by the manufacturer.
B) Reduced Air Flow - Installation of the equipment in a rack should be such that the amount of air flow required for safe operation of the equipment is not compromised.
C) Mechanical Loading - Mounting of the equipment in the rack should be such that a hazardous condition is not achieved due to uneven mechanical loading.
D) Circuit Overloading - Consideration should be given to the connection of the equipment to the supply circuit and the effect that overloading of the circuits might have on overcurrent protection and supply wiring. Appropriate consideration of equipment nameplate ratings should be used when addressing this concern.
E) Reliable Earthing - Reliable earthing of rack-mounted equipment should be maintained. Particular attention should be given to supply connections other than direct connections to the branch circuit (e.g. use of power strips)."
You can connect the AC power supply cord to the back of the switch and the other end into the power outlet (power outlet should be well grounded and support over voltage protection)
|
Warning: Do not turn on the power switch before power cables are connected. Power surge may cause damage to the Switch. |
As a precaution, the switch should be unplugged in case of power
failure. When power is resumed, plug the switch back in.
3 Getting Started
This chapter introduces the management interface of your new Managed PoE switch.
The Managed PoE switch can be managed through any port on the device by using the Web-based management.
Each switch must be assigned its own IP address, which is used for communication with Web-Based Management or a SNMP network manager. The PC should have an IP address in the same range as the switch.
Please refer to the following installation instructions for the Web-based Management.
After a successful physical installation, you can configure the Switch, monitor the network status, and display statistics using a web browser.
The embedded Web-based Management currently supports the following web browsers:
Internet Explorer 6 or higher version
Netscape 8 or higher version
Mozilla
Firefox 1.5/2.0 or higher version
You will need the following equipment to begin the web configuration of your device:
1. PC with a RJ-45 Ethernet connection
2. Standard Ethernet network Line
Connect the Ethernet cable to any of the ports on the front panel of the switch and to the Ethernet port on the PC.
Network connection
To access the GUI of the switch, open the web browser and enter the default management IP address of http://192.168.0.1 in the address field of the browser, then press the Enter key.
Enter the IP address in the web browser
|
NOTE: The switch's factory default IP address is 192.168.0.1 with a subnet mask of 255.255.255.0 |
To log in to the switch, the IP address of your PC should be set in the same subnet as that of the switch. The IP address is 192.168.0.x (”x” is any number from 2 to 254). Subnet Mask is 255.255.255.0.
Enter admin for both the User Name and Password in the lower case letters. Then click the Login button or press the Enter key.
Logon Dialog Box
Shown in Figure 2, WEB page is mainly composed of three parts: title page, navigation tree page and main page
Figure 2
Title page: used to display the logo, as well as the real-time port status, shown as below:
· Green light: indicates that the port is connected;
· Gray light: indicates that the port is not connected;
· Red light: indicates that the port is off.
Sort navigation page: WEB function classification entry, the user can click a button to view the corresponding classification menu, and the page on the right is the switch model version and login user name.
Menu page: shows the category menu selected by the user from the sort navigation page. There may be a menu or submenu. Click the menu item to open the corresponding page.
Main page: used to show the page selected by the user from the menu page.
NOTE: Upgrade the firmware by downloading the most current version at www.iccnetworking.com
Figure 3 shows the navigation tree organizational structure.
Navigation tree is located in the lower left of each page, using the tree display nodes of the WEB page; users can easily find the page you want to manage.
Figure 3
There are commonly used buttons on each page. The role of these buttons is the same and explained in Form 2:
Form 2:
BUTTON |
DESCRIPTION |
Refresh |
Updates all fields on the page |
Apply |
Any new numerical value that is entered will be updated into memory. |
Delete |
Delete the current record |
Help |
Opens help pages, view the individual pages of the configuration instructions |
If wrong information is entered, a switch WEB server error can occur while processing user requests. The error will show up in a display dialog box with the corresponding error message. For example, Figure 4 shows an error message dialog box.
Some Navigation Tree selections will allow a table to appear in the Main screen section, as shown in Figure 5. This will allow the user to add, edit or delete any row in the table. Selecting one row to be edited will allow only that row to be edited, however the user can also ‘Select All’ to delete all items in the table. During the first boot up of the Switch all fields are empty until the user adds more information.
If you want to add a new line, simply select NEW or in image 5 select ACL Group ID from the drop-down menu of entry field, enter the new line’s information and any other required details, and then press apply button.
If you want to edit a line that already exists, it is necessary select the appropriate line number of the drop-down menu, edit the values, and then press the APPLY button. Once completed, you will see a corresponding change in the table displayed.
If you want to delete a row, select the line number accordingly from entry field’s drop-down menu, then press the delete key, this line will be deleted from the table.
Figure 5
Your new enterprise switch WEB pages are organized into groups, each including one or more of the WEB pages. The following are introduced one by one on each page.
Figure 6 WEB browsing session of the login page
Figure 6 shows the login dialog box when you first access the switch. Passwords are case-sensitive; the anonymous user password can be maximum set up to 64 characters, while the multi-user name and password can be set up to 11 characters.
The default username is admin and password is admin.
(1)Basic information page
Figure 7 is the system information configuration page, the user can through the page of the switch system information to configure and view.
Figure7 Basic information Page
(2)IP address configuration page
Figure 8 shows the IP address configuration page. You can use this page to configure the IP address, subnet mask, and gateway address of the switch. The management VLAN defaults to 1 and cannot be modified.
Figure 8 IP address configuration page
(3)User management page
Figure 9 is the user management page where you can configure user information and the default user/password is admin/admin. You can create users with different levels of access and while other details cannot be deleted, you can change the password.
Figure 9 user’s management page
(4)SNMP community configuration page
Figure 10 is the SNMP community configuration page, which allows the user to configure the name of the switch and the read and write permissions, a total of eight items can be configured.
By default, there is a public name of the common Community for the switch and the common body is read-only permissions. When the switch needs to be managed through SNMP, you will need to configure a readable and writable community.
Configured commons cannot be modified and cannot be duplicated with existing names. But you can click the corresponding delete link to delete the community, and then re-configure a new one.
Figure 10 is the SNMP community configuration page
(5)SNMP TRAP configuration page
Figure 11 is the SNMP TRAP configuration page, which allows the user to configure the IP address of the workstation receiving the TRAP messages and some parameters of the TRAP protocol package.
Enter the TRAP name, the IP address of the TRAP server, and select the version number. The SNMP TRAP function will take effect if the configuration is correct. If the link up or link down occurs, the switch will automatically send the TRAP packet to the destination address.
The configured TRAP targets cannot be modified and cannot be duplicated with existing names. But you can click the corresponding delete link to delete the TRAP target, and then re-configure.
Figure 11 the SNMP TRAP configuration page
(6)log information
Figure 12 shows the log information page where the user can view logs. Select the priority from the drop-down list of logs. You can click Refresh to update the viewed list of logs.
Figure12 Log information page
(1)Port basic configuration page
Figure 13 is the Basic Configuration page for each Port. This is where the user can enable or disable any port, set per port data rates and flow control, or view the basic information of all ports.
To modify the port configuration, you need to first select the appropriate port (port check boxes are under the "Select All" selection). The selected port will be displayed at the top of the page as well as any previously executed configurations for that port. You can select multiple or all ports to configure more than one port at a time. The list in the page shows the configuration information for all ports.
Figure 13 the port basic configuration page
(2)Port statistics page
Figure 14 shows the port statistics page. This page shows the number of packets, bytes sent and received, the packets received, the error packets, and the number of packets discarded.
Figure14 shows the port statistics page
(3)Port storm suppression page
Figure 15 is the Broadcast Storm Control page. You can suppress port broadcast, multicast, and DLF packets.
From the Port drop-down bar select the port to configure. Then use the on and off key to Enable or Disable to open or close the port broadcast, multicast, and DLF inhibition suppression. Rate control parameters are used to configure the port speed which ranges from 1-1024000 kbps. Rate limiting of a particular port will be the same across all storm control suppression methods.
Figure 15 the Broadcast Storm Control page
(4)port speed limit page
Figure 16 is the port speed-limit (Rate Limiting) page. This page is used to configure the port send and receive rate. Click the corresponding port on the left, or use the "select all" function select ports to tick alone port-in/ port-out the speed limit, speed range from 1 to 1024000, the unit is kbps, the speed limit is not working when canceled click. The list in the page shows configuration information for all ports.
Figure 16 the port speed-limit page
(5)Port mirroring
Figure 17 is the port mirroring configuration page.
This page allows you to configure port mirroring parameters based on your network requirements. Port mirroring is used on your new switch to send a copy of the network packets see on one switch port (or entire VLAN) to a network monitoring connection on another switch port.
There are of four components to port mirroring on your new switch:
· Monitor port,
· Configurable port,
· Monitoring direction
· Mirror configuration information.
You begin mirroring port traffic by first selecting the port you’d like to mirror. The port being mirrored can only have one port that is monitoring it. Once completed you then select the port doing the monitoring and select the monitoring direction (receive or transmit).
· Receive – means monitors data packets that are received by the monitored port
· Transmit – means monitors data packets sent from the monitored port
· Both – means monitoring of data packets that are sent and received by the monitored port
· Selecting Not_Transmit to cancel monitoring
Figure 17 is the port mirroring configuration page
(6)Link Aggregation (Trunking) page
Figure 18 demonstrates how to configure link aggregation.
First, select the trunk group you want to create from the pull-down menu.
You then select the algorithm (Trunk Method) for link aggregation. The algorithm of link aggregation is
based on:
· Source MAC
· Destination MAC
· Source and destination MAC
· Source IP
· Destination IP,
· Source and Destination IP
Figure 18 Create a link aggregation page
(7)Link aggregation (Trunk) configuration page
Figure 19 shows how to complete and review link aggregation configurations. Select the link aggregation group from the drop-down menu and select a port to join that group.
Figure 19 Link Aggregation Configuration page
(8) Link Aggregation Information Page
Figure 20 show that the Trunk Information (link aggregation) information page provides an overview of what you’ve created. This allows you to quickly validate all your trunk groups in one location.
Figure 20 Link Aggregation Information Page
(9) Power-over-Ethernet (PoE) port configuration
(1)PoE Port Configuration page
Figure 21 shows users can enable or disable the port's PoE function to the page, as well as View all ports of PoE information. Information can be seen in the following tables:
a. Status: Enable means PoE function is available
b. Disable means PoE function is close.
c. Operation: Displays the PoE ports ON or OFF
d. Power, Current, and Voltage provide power draw details per port
Figure 21 the PoE port configuration page
(1)VLAN configuration page
Figure 22 shows the basic VLAN configuration page.
To create a new VLAN, you simple enter a new VLAN ID (VID) in the active line. The ranging must be from
2 to 4094 and click Apply. Once the VID is created, it will show up in the overview section below. Please
note that VLAN ID 1 cannot be deleted.
If you want to delete a VLAN, click the corresponding delete link in the VLAN list. Click the Delete All
button to delete all VLANs except VLAN1.
The VLAN list shows all the VLANs that have been created and identifies the port members of each VLAN.
A port cannot be a member of a VLAN. It can be a tagged or untagged member of a VLAN. The characters
in the Member section of the list show [U] and [T] and are as follows:
· T tagged The port is a tagged member of this VLAN
· U untagged The port is an untagged member of this VLAN
Figure 22 the VLAN configuration page
(2)VLAN Access port configuration page
Figure 23 is a graphical representation
to easily show each port and which VLAN it belongs to. The page is divided into
two parts: port list and VLAN list. By simply hovering over a port you can see
the port VLAN mode. You can click on a port to display and configure of the
port VLAN. If the port is in Access mode, it can display its VLAN, select
another VLAN and apply it, that is, change the VLAN of the port. If the port is
not in Access mode, the port is changed to Access mode and VLAN is configured.
Note that only one VLAN can be selected when in Access mode style.
Figure 23 shows the Access port configuration page
(3)Trunk Port configuration page
Figure 24
shows the trunk port configuration page, displays and configures the port Trunk
mode and the VLAN to which it belongs. The page is divided into two parts: port
list and VLAN list. The port part of the operation can refer to the second
section (Access port configuration page). If the port is in trunk mode, it can
display its VLAN, select another VLAN and apply it, that is, change the VLAN of
the port. If the port is not in trunk mode, the port is configured with Trunk
mode and VLAN. While in trunk mode, VLAN can be multi-selected. When need to
select a group of consecutive VLAN, select the first, hold down the Shift key,
then select the last one.
Figure 24 shows the trunk port configuration page
(4)Hybrid port configuration page
Figure 25 shows
the hybrid port configuration page, and displays and configures the port hybrid
mode and the VLAN to which it belongs. The page is divided into two parts: port
lists and VLAN list, the port part of the operation can refer to the second
section (Access port configuration page). If the port is in hybrid mode, it can
display its VLAN, select another VLAN and apply it, that is, change the VLAN of
the port. If the port is not in the hybrid mode, the port is configured with
the hybrid mode and the VLAN is configured. The default VLAN must be configured
and only one can be selected. The tagged VLAN and the untagged VLAN can be
selected in any number. However, for a VLAN, only one of the three modes can be
selected. If a VLAN is configured with a tagged VLAN, the VLAN can not be
Specified as default VLAN or untagged VLAN, and so on.
Figure 25 Hybrid port configuration page
(1)MAC Configuration
① MAC address manual binding page
Figure 26 is the MAC binding configuration page. This page is used to achieve the port to the MAC address binding.
The MAC address on the page is used to enter the bound MAC
address. The VLAN ID entry is used to enter the VLAN to which the MAC address
belongs.
Figure26 MAC address manual binding page
② MAC binding automatic conversion page
Figure 27 is the MAC binding automatic conversion page. This page is used to achieve the port MAC address auto-binding.
Shows the hardware switch on the lay2 the exist port dynamic
MAC address and affiliated VLAN. Can choose one of the entry and convert it
into static binding.
Figure 27 MAC address auto-binding page
③ MAC filtering configuration page
Figure 28 is the MAC filtering configuration page. This page is used to configure the ports on the MAC address filtering.
MAC
entries on the page is used to enter the MAC address filtering, VLAN ID entry
is used to enter the MAC address affiliated VLAN.
Figure 28 MAC Address Filtering Configuration page
(2)ACL Configuration
① IP Standard group ACL page
Figure 29
is the IP standard group ACL page, the user can use this page to establish the
ACL standard IP rule base. The user can select an ACL group number (range
between 1-99, or 1300-1999) to create one or more rules in the group. Fields
that can be matched in a rule have only source IP addresses (with mask).
Figure 29 Standard IP Group ACL page
Users to configure the rules, the source IP address must be in with a mask, the rule can match the collection of IP addresses. The address mask is use anti-code , if the rule were to match the IP address range 192.168.0.0 to 192.168.0.255, then the IP address can be 192.168.0.1, and its mask of 0.0.0.255.
Users to configure the rules, each rule must have a filter mode: allow or deny.
The user to create a rule in the group, the system will automatically give the rule a rule number, when to delete a rule in the group 1 rules, other rules remain unchanged, the system will automatically give the rule a rule group sort. If the user wants to delete the entire rule set, you can first select all, then click the delete key.
② IP Extended ACL configuration page
Figure 30 is an extended IP group ACL page, through which users can create a rule base for ACL extension IP. The user can select an ACL group number (between 100-199, or 2000-2699) to create one or more rules in the group. (Such as ICMP, TCP, UDP, etc.), the source port, and the destination port (TCP and UDP only). The source IP address (masked), destination IP address (masked), protocol type (such as ICMP, TCP, UDP, etc.) Protocol valid), TCP control flag.
When a user configures a rule, the source IP address and destination IP address must be masked. The rule can match the set of IP addresses. The address mask is represented by an anti-code. If the rule matches the IP address range 192.168.0.0 to 192.168.0. 255, the IP address can be 192.168.0.1 and the mask is 0.0.0.255.
When configures a rule, each rule must have a filtering mode: allow or deny.
When a user creates a rule in a rule group, the system automatically gives the rule a rule number. When a rule in a rule group is deleted, the other rules are not changed and the system automatically assigns a rule to a rule group Sort. If you want to delete the entire rule group, you can select all, then press the Delete key.
③ MAC IP group ACL page
Figure 31 shows the MAC IP group ACL page. You can use this
page to create a rule base for ACL MAC addresses. The user can select an ACL
group number (in the range of 700-799) to create one or more rules in the
group. Fields that can match in a rule Active MAC address (with address match
bit), source IP address (with address match bit), destination IP address (with
address match bit).
Figure 31 MAC IP Group ACL page
When configures a rule, the source MAC address, source IP address, and destination IP address need to match the address. The rule can match the set of MAC address and IP address. For example, if the rule matches the IP address range 192.168.0.0 to 192.168.0. 255, the IP address can be 192.168.0.1 and its mask is 0.0.0.255.
When configures a rule, each rule must have a filtering mode: allow or deny.
When creates a rule in a rule group, the system automatically gives the rule a rule number. When a rule in a rule group is deleted, the other rules are not changed and the system automatically assigns a rule to a rule group Sort. If you want to delete the entire rule group, you can select all, then press the Delete key.
④ MAC ARP group ACL page
Figure 32 shows
the MAC ARP group ACL. You can use this page to create a rule base for ACL MAC
ARP. The user can select an ACL group number (in the range of 1100-1199) to
create one or more rules in the group. Fields that can be matched in a rule
have ARP operation type, send MAC address (with address match bit), send IP
address (with address match bit).
Figure 32 MAC ARP group ACL configuration page
When configures a rule, the MAC address and the IP address are sent with an address matching bit. The rule can match the set of MAC address and IP address. For example, if the rule matches the IP address range 192.168.0.0 to 192.168.0. 255, the IP address can be 192.168.0.1 and its mask is 0.0.0.255.
When configures a rule, each rule must have a filtering mode: allow or deny.
When creates a rule in a rule group, the system automatically gives the rule a rule number. When in a rule group is deleted, the other rules are not changed and the system automatically assigns a rule to a rule group Sort. If want to delete the entire rule group, select all, then press the Delete key.
⑤ Port application ACL page
Figure 33 shows the ACL application page for a port. Use this page to select an ACL group for a port and write the rules in this ACL group to the port hardware logic to enable the port to perform ACL filtering on the received packets according to these rules.
When
selecting an ACL group on a port, select the IP standard, IP extension, MAC IP,
and MAC ARP ACL. The selected ACL group must exist. Select the ACL rule group
list and press the Add key. When deleting an ACL group, select an ACL group
from the list of referenced rule groups and press the Delete key.
Figure 33 shows the ACL application page for a port
⑥ ACL configuration information page
Figure 34 shows the ACL configuration
information page, which displays all the rules and references configured in the
current ACL.
Figure 34 ACL configuration information page
(3)AAA configuration
① AAA global configuration page
Figure 35 is the AAA global configuration page. It can configure the information related to AAA. The information that can be set includes:
• Whether to enable 802.1x protocol or not, be sure to enable 802.1x protocol when doing authentication and accounting.
Whether to open the re-authentication function or not. the default is not open, in the authentication and billing according to the actual situation to decide. Turning on the reauthentication function will make the user more reliable when using authentication and billing, but will slightly increase the traffic to the network.
Set the re-authentication interval, only in the case of re-authentication function is enabled, the default is 3600 seconds, in the authentication and billing according to the actual situation to set the value, but the value should not be too small.
RADIUS server IP address, in the authentication and billing must be set when this field.
Standby RADIUS server IP address, which can be set if there is an alternate RADIUS server.
shared key, used to set the switch and the Radius server between the encrypted shared password, in the authentication and billing must be set this field, and to the same settings on the Radius server.
Whether to start billing, the default is to start, when doing the authentication and billing to start billing.
Figure 35 AAA Global Configuration page
② AAA port configuration page
Figure 36 shows the AAA port configuration page. Configure the authentication port mode and the maximum number of hosts supported by this page, and can view the configuration of each port. To modify the port AAA configuration, the user needs to check the left side of the corresponding port, or use the "Select All" function, the selected port will be displayed at the top of the page, several consecutive ports with the connection number. When the settings are successful, the selected ports are configured with the same parameters. The AAA port mode includes four types: N / A status, Auto status, Force-authorized status, and Force-unauthorized status. When a port needs to do 802.1x authentication, the port should be set to Auto state, if no authentication it can access the network, the port is set to N / A state, the other two states in the practical application rarely used.
Figure 36 AAA port configuration page
When 802.1x authentication is enabled, the maximum number of hosts that can be accessed by the port is 256, and the user can modify this field to support up to 256.
③ AAA user information page
Figure 37 is the AAA user information page, the user can view the page under a port access to all users of the state information,
Figure 37 AAA user information page
(4)local management security configuration
① Manage the rights configuration page
Figure 38 is the management rights configuration page, through the configuration of the page, the administrator can control the network management services TELNET, WEB and SNMP, can enable or disable these services, these services can be IP standard ACL Group up to implement the source IP address control, control the host access to these services.
Switch by default TELNET, WEB and SNMP services are open, and do not do ACL filtering, that is, all the hosts can access the switch of these three services. If the administrator for security, do not want to provide other users one or several of these services, which can be one or several of these services closed. If the administrator only wants a particular host to access one or more of these services, users can filter one or more of these services. When a service needs to do ACL filtering, need to open the service and select an IP standard ACL group (1-99). The ACL group must exist.
It should be noted that if the administrator on this page to
control the WEB service (such as the closure of WEB services) may make users
can no longer use the WEB page, then can log in the other way through the
switch and control WEB services so that users can use the WEB page (such as
Open the web service).
Figure 38 Management New Configuration page
(1)IGMP SNOOPING configuration
① IGMP SNOOPING Configuration page
Figure 39 is the IGMP SNOOPING configuration page. Users can enable IGMP Snooping on this page.
Figure 39 IGMPSNOOPING configuration page
② multicast group information page
Figure 40 shows the multicast group information page. Users can view IGMP SNOOPING multicast information from this page.
Figure 40 Multicast group information page
(1)Spanning tree configuration
① Spanning tree global configuration page
Figure 41 is the spanning tree global configuration page, where users can configure global spanning tree parameters
Figure 41 Spanning Tree Global Configuration page
② Spanning tree port configuration page
Figure 42 shows the spanning tree port configuration page. Users can view the port MSTP status on this page.
Figure 42 Spanning tree port configuration page
(2)ERPS configuration
① ERPS predefined configuration page
Figure 43 is the ERPS Predefined Configuration page, which enables the ERPS pre-configuration configuration. When enable the ERPS predefined configuration, can specify the node type: the master node or the transit node.
For example, the ERPS instance number is 1, the ERPS mode is 1, the ring mode is the primary ring mode, the protocol VLAN is VLAN3001, the data VLAN is VLAN1, the rpl port is 51, the rl port is 52, and the recovery behavior is re- coverable , Hold-off time is 0, guard time is 500 milliseconds, wtr time is 5 minutes, wtb time is 5 seconds, protocol message transmission time is 5 seconds.
Figure 43 ERPS predefined configuration page
② ERPS instance configuration page
Figure 44 is the ERPS Instance Configuration page, where you can configure ERPS instances. When an instance is not created, click the Apply button to create and specify a role; if the instance has been created and has no associated ring, the role can be modified; if the instance has been created and the ring is associated, the instance can not be modified. Click the Delete button to delete the selected instance. It can configure up to 8 instances.
Figure 44 ERPS instance configuration page
③ ERPS ring configuration page
Figure 45 is the ERPS ring configuration page, through which user can create and configure an ERPS ring. Select a ring, when the ring is not created, click the Apply button to create the ring and set the configuration information, has been created to modify the configuration information. Click the Delete button to delete the selected ring. The ring must and can only be associated with an instance, and up to 32 loops can be configured. When a ring failure is detected, click the Manual Restore button to resume.
Figure 45 ERPS ring configuration page
④ ERPS information page
Figure 46 is the ERPS information page, and the selected ring number displays the configuration and status information of the associated ERPS ring.
Figure 46 ERPS information page
(1)IP basic configuration
① VLAN interface configuration page
Figure 47 shows the VLAN interface configuration page. User can use this page to configure the IP address of the interface, remove the IP address of the interface, and view the interface information.
Figure 47 VLAN interface configuration page
The switch has a VLAN1 interface by default, and the interface can not be deleted. Only one interface can be configured for one VLAN.
② ARP configuration page
Figure 48 shows the ARP configuration page, which displays all the information of the ARP table of the switch. Users can use this page to configure static ARP entries, delete ARP entries, and modify dynamic ARP entries to static ARP entries.
When configure a static ARP entry, need to enter the IP address and MAC address. The MAC address must be a unicast MAC address, and then click the Apply button.
When the user to delete an ARP entry, click on the list in the corresponding delete link can be.
Figure 48 ARP configuration page
③ static routing configuration page
Figure 49 is a static routing configuration page, the user can add and delete the static routing of the switch. By default, no static route is configured on the switch. Users can configure the default route through the page. That is, the destination / subnet prefix is the routing of 0.0.0.0/0.
Figure 49 Static Routing Configuration page
(1)Save the configuration page
Figure
50 is the save configuration page. Through this page, the user
can view the current configuration of the switch. The Save button stores the
current configuration of the system into the configuration file. Because the
storage operation needs to erase the FLASH chip, which takes a certain amount
of time. When the user is configured on the page and wants to restart the
switch after the configuration is not lost, must exit the page in the current
configuration page, click the Save button.
Figure 50 Save the configuration page
(2)Back up the configuration file page
Figure 51 shows the backup profile page. This page allows the user to view the initial configuration of the system. The initial configuration is actually in the FLASH in the configuration file, when the FLASH does not exist in the configuration file, the system starts using the default configuration. Click the backup button, will pop up a dialog box, the user chooses to save directory path and save the configuration file. The file name of the downloaded configuration file defaults to switch.cfg.
Figure 51 Back up the configuration file page
(3) restore the configuration file page
Figure 52 is the recovery profile page, through which users can upload configuration files to the switch. Click the Browse button to select the directory path of the uploaded profile on the PC. Click the upload button to upload the configuration file. The suffix of the configuration file must be * .cfg. Do not click on other pages or reboot the switch before the transfer results page returns. Otherwise, the file transfer will cause the system to crash.
Figure 52 Resumes the configuration file page
(4)software upgrade page
Figure 53 is the software upgrade page, through which users can upload image files to the switch. Click the Browse button to select the directory path of the uploaded image file on the PC. Click the Upload button to upload the image file, which must be provided by the manufacturer and the file name suffix must be * .img. Do not click on other pages or reboot the switch before the transfer results page returns. Otherwise, the file transfer will cause the system to crash.
Figure 53 Software upgrade page
(5)Restore the factory configuration page
Figure 54 is the Restore Factory Configuration page. This page allows the user to delete the configuration file in the FLASH to restore to the factory configuration. Click the Restore Factory Configuration button to bring up a dialog box that prompts the user if it is OK. After the factory configuration is restored, the switch will automatically restart to make the factory configuration take effect. Please use the factory default IP address and password the next time when log in.
Figure 54 Restore factory configuration page
(6)Restart the page
Figure 55 is the restart page, through which the user restarts the switch. When click the restart button, a dialog box will pop up prompting if the user is sure to restart the switch or not. If sure, press the OK key. Otherwise, press the Cancel key. The Web page will no longer be opened when it is restarted.
Figure 55 restart the page