Gebruiksaanwijzing /service van het product KS-2262 van de fabrikant KTI Networks
Ga naar pagina of 256
24 Fast Ethernet + 2 Gig ab it L2 Manage d Sw itch User's Manual KS-2262 Release 2.28.
ii Electronic Emission Notices Federal Communica tions Commission (FCC) S tateme nt This equipment has been tested and f ound to comply with the limits for a c lass A com puting device pursuant to Sub.
T able of Content s CAUTION ----------------------------------------------------------------------------------------------------------------------------- 4 ELECTRIC EMISSION NOTICES------------------------------------------------------------------------------------------------II 1.
2 3-15. SECUR I T Y ----------------------------------------------------------------------------------------------------------------- - 128 3-16. BA NDWIDTH MANAGEMENT --------------------------------------------------------------------------------------- 131 3-17.
3.
4 Caution Circuit devices are sensitive to static electr icity , which can damage their delicate electronics . Dry weather conditions or walking ac ross a carpeted f loor may cause y ou to acquire a s t atic electric al charge.
5 About this user ’ s m anual In this us er ’s m anual, it wi ll not o nl y tell you ho w t o install a nd c onn ec t your netwo rk system but configure and m onitor the 24 F AST ETHERNET + 2 GIGABIT L2 MANAGED S W ITCH through the bu ilt-in CLI and we b by RS-232 serial i nterface and Ether net ports step-by-st ep.
6 1. Introduction 1-1. Ov erview of 24 F A ST ETHERNET + 2 GIGA BIT L2 MA NAGED SWITCH 24 F AST ETHERNET + 2 GIGABIT L2 MANAGED SW ITCH, 24 Fast Eth ernet + 2 Gigabit L2 Managed Switch, im plemented 24 10/100Mbps TP + 2 Gigab it dual media por t s w ith T P/SFP , is a s t andard s witch that meets all IEEE 802.
7 Key Features in the Device QoS: Support Q uality of Ser vice by the I EEE 802.1P standard. T here are t wo priorit y que ue and pack et tr ansmission schedul e us ing W eighted R ound Robin (WRR) .
8 1-2. Checklist Before you start installing the switch, verify that the package contains the f ollow ing: 24 F AST ET HERNET + 2 GIGABIT L2 MANAGED SW ITCH 24 Fas t Ethernet + 2 Gigabit L2 Manage.
9 Supports 802.1Q VLAN with 256 entries. Supports user m anagement and lim its three users to login Supports DHCP Broadcasting Suppression to avoid network suspended or crashed .
10 1-4. V iew of 24 F A ST ETHERNET + 2 GIGA BIT L2 MA NA GED SWITCH 1-4-1. User I nt erf aces on t he Front Panel (Button, LEDs and Pl ugs) There ar e 24 TP Fast Ethernet por ts and 2 slots for optional rem ovable m odules on the front pane l of the s witch.
11 LED Indicators LED Color Function System LED CPURUN Green Lit when CPU is on and good POW ER Green Lit when AC power is on and good ACT Green Lit when LEDSET set on a.
12 1-4-2. User I nt erf aces on t he Rear Panel One RS- 232 DB-9 inter face is offer ed for configur ation or managem ent. And there is one AC power input sock et for having the switch powered on or off .
13 1-5. View of the Optional Modules In the s w itch, Port 25, 26 includes t w o t y p es of media --- TP and SFP Fiber (LC, BiDi LC…); t his port supp ort s 10/100 /1000Mbps TP or 1000Mbps SFP Fiber with auto-detec ted functio n. 1000Mbps SFP Fiber tr ansceiver is used for hig h-speed connecti on expansion.
14.
15 2. Installation 2-1. S t arting 24 F AST ETHERNET + 2 GIGA BIT L2 MA NAGED SWITCH Up This section will give users a quic k start for : - Hardware and Cable Installation - Managem ent S tation Installation - Software booting and configur ation 2-1-1.
16 TP Port and Cable Installation ⇒ In the switc h, TP port supports MDI/MDI-X auto-cross over , s o both types of cable, s traight-thro ugh (Cable pi n-outs for RJ-45 j ack 1, 2, 3, 6 to.
17 2-1-2. I nstalling Chassis t o a 19- Inch Wiring Closet Rail Caution: Allow a proper s pac ing and proper a ir ventilation for the cooling fa n at both sides of the chassis. ⇒ W ear a grounding device f or electrostatic disc harge. ⇒ Screw the m ounting accessory to the front side of the s w itch (See Fig.
18 2-1-3-1. Cablin g Requirements for TP Ports ⇒ F or Fast Ethernet TP network connec tion The grade of the cable mus t be Cat. 5 or Cat. 5e wi th a m aximum length of 100 meter s. ⇒ G igabit Ethernet TP network connection The grade of the cable mus t be Cat.
19 2-1-3-3. Switch Cascading in T opology T akes the Delay Time into Account Theor etically , the switc h partitions the collis ion dom ain for each p ort in s witch cascading that you m ay up-link the s witches unl imitedly .
20 Case1: All switch por t s are in the sam e local area network . Every por t can access each other (See Fig. 2-3) . If VLAN is e nabled and configur ed, eac h n ode i n the n et work that can c om m unicate each other direc tly is bounded in the same VLAN area.
21 Case 2b: Port-bas ed VLAN (See Fig.2-5). 1. VLAN1 mem bers could not ac cess VLAN2, VLAN3 and VLAN4 m embers. 2. VLAN2 mem bers could not ac cess VLAN1 and VLAN3 m embers, but they could access V LAN4 members. 3. VLAN3 mem bers could not ac cess VLAN1, VLAN2 and VLAN4.
22 2-1-4. Conf i guring the Management A gent of 24 F AST ETHERNET + 2 GIGA BIT L2 MA NA GED S WITC H We offer you three wa y s to s t artup the s witch managem ent function. T hey are RS- 232 cons ole, CLI, and Web. Us ers can us e any one of them to m onitor and configur e the switch.
23 2-1-4-1. Configuring the Management A gent through the Serial RS-232 Port T o perf or m the c onfiguration thr ough RS-232 c onsole port, th e switch’s serial port must be directly con nected to a DCE device, for exa mple, a PC, through RS-2 32 cable wit h DB-9 connec tor .
24 Set IP A ddress, Subnet Mask and Default Gatew ay IP A ddress Please r efer to F ig. 2-7 CLI Managem ent for details about fac tory setting.
25 2-1-4-2. Configur ing the Management A gent through the Ethernet Por t There ar e three ways to configure and m onitor the s w itch thr ough the s witch’ s Ethernet port. The y are CLI, W eb browser and SNMP manager . T he user interf ace for the las t one is NMS dependent and does not c over here.
26 Fig. 2-10 the Login Screen for W eb 2-1-5. IP A ddress A ssignment For IP address c onfiguration, th ere are three param eters needed to b e filled i n. They are IP address, Subnet Mask , Default Gateway and DNS. IP address: The addres s of the net work device i n the network is used for internetwork ing comm unication.
27 W i th the clas s addressing, it divides IP address into thr ee classes, clas s A, class B and class C. The res t of IP addresses are for m ulticast and broadcast. The bit length of the network pr efix is the sam e as that of the s ubnet mask and is denote d as IP address/X , for example, 192.
28 Class D and E: Class D is a c lass with fir st 4 MSB (Mos t significance bit) set to 1-1- 1-0 and is us ed for IP Multicast. Se e a lso RFC 1 1 12. Class E is a clas s with first 4 M SB se t to 1- 1-1- 1 and is used f or IP broadcas t.
29 In this di agram, you ca n see the sub net mask w ith 25- bit long, 25 5.255.255.128, contains 1 26 mem bers in the sub- netted networ k. Another is that th e length of network prefix equals the num ber of the bit with 1s in th at subnet m ask. W i th this, you can e asily count the number of IP addresses matched.
30 For diff erent network appl ications, the s ubnet mask may look lik e 255.255.255.2 40. This means it is a sm all network ac commodating a maxim u m of 15 nodes in t he network.
31 2-2. T y pical Applicat ions The 24 F AST ETHERNET + 2 G IGABIT L2 MANAGED SW ITCH implem ents 24 Fast Eth ernet TP ports with auto MDIX an d 2 Gigabit dual m edia ports with SFP for rem ovable module sup ported com prehensive fib er types of connection, inc luding LC, BiDi LC f or SFP .
32 Fig. 2-15 Office N etwork Connection Fig. 2-14 Peer-to-peer Network C onnection.
33 3. Operation of Web-based Management This chapter instruc t s you how to conf igure and m anage the 2 4 F AST ETHERNET + 2 GIGABIT L2 MANAGED SW ITCH through the web user i nterface it sup ports, to acces s and manage t he 24 10/1 00Mbps T P + 2 G igabit dual m edia ports with TP/SFP Fiber m anagement Eth ernet switc h.
34 In the switc h, it supports a s i m ple user managem ent function al lowing only one adminis trator to conf igure the system at the sam e time. If there are t wo or mor e users usin g adm inistrator ’s identit y , the switc h wil l allo w the onl y one who logins fi rs t to configur e the system .
35 3-1. Web Management Home Ov erview After you log in, the s witch shows you the s ystem inf orm ation as Fig. 3-2. T his page is defau lt a nd t ells you the basic i nf orm ation of the s y stem , i.
36 Fig. 3-3 port detail information In Fig. 3-3, it s ho ws th e bas ic inform ation of the clic k ed port. W ith this, you’ll se e th e inform ation about the por t status, traffic s t atus and ba ndwidth rating for egress and ingress r espectively .
37 Port DHCP Boot VLAN Syste m SNMP IGMP Snoopin g MAC T able GVRP Roo t STP Tru n k 802.1x Alar m Configur atio n Securit y Bandw idth QoS Diagno stics TFTP Se rv e r Log Firm w are Upgrade Reboo t L.
38 3-1-1. System Information Function name: Sy stem Inform ation Function desc ription: Show the basic system inf ormation. Parameter desc ription: Model name: The m odel name of this device. Sy stem description: As it is, this tells what this device is.
39 Host IP address: The IP address of the switch. Host MAC address : It is the Ethernet MAC addres s of the managem ent agent in this switch. Device Port: Show all ty pes and num bers of the port in the switch. RAM size: The s i ze of the DRAM in this switch.
40 3-1-2. I P Configuration IP configurat ion is one of the most i mpor t ant config urations in the switch. W ithout the proper s etting, net work m anager will not be a ble to m anage or view t he device. The s w itch s upports both m anual IP address setting and automatic IP ad dress setting via DHCP server .
41 IP address: Users c an configure the IP settin gs and fill in ne w valu es if users set the DHCP function “Disable”. Then, c lick <A pply> button to update. W hen DHCP is disabled, Default: 192.168.1.1 If DHCP is enabled, this f ield is filled by DHCP server and will not allow user m anually set it any more.
42 DNS: It is Dom ain Name Server used to s erve the translation b etween IP address and nam e address. The s w itch s upports DNS c lient functi on to re-route the mnem onic name address to D NS server to get its associate d IP add ress for ac cessing Internet.
43 3-1-3. Time Configuration The s w itch pr ovides m anual and autom atic ways to set the system ti m e via NTP . Manual set ting is sim ple and you jus t input “Y e ar”, “Month” , “Day”, “Hour” , “Minute” and “Seco nd” within the vali d value range indic ated in each item .
44 NTP: NTP is Net w ork T im e Protocol and is used to s y nc the network time based Gree nwich Mean Time (GMT ). If use the NTP mode and s elect a built-in NT P time server or manuall y specif y an user -defined NT P server as well as Time Zone, th e switch will s ync the tim e in a short after pressing <Ap ply > button.
45 Day Light Saving End: This is used to set when to stop perfor ming the daylight saving time. Mth: Range is 1 ~ 12. Default: 1 Day : Range is 1 ~ 31.
46 3-1-4. Account Conf iguration In this f unction, on ly administr ator can crea te, modify or delete t he usernam e and password. Administrator can m odify other gu est identit ies’ password without confirm ing the password but it is necessar y to modif y the adm inistrator-equ ivalent identit y .
47 3-1-5. Management Securi ty Through t he managem ent securit y configurat ion, the m anager can do the st rict setup to control the s w itch and lim it the user to acces s this switch. The f ollow ing rules are of fered for the manager to m anage the switch: Rule 1) : When no list exists, then it will accept all connections.
48 Function name: Management Sec urity Conf iguration Function desc ription: The s w itch off ers Managem ent Security Conf iguration f unction. W ith this function, t he manager ca n easily contr ol the m ode that the user c onnects to the switc h.
49 IP Range: The s witch supports tw o kinds of options for managed valid IP Rang e, including “ Any” and “C ustom” . Default is “An y ”. In c ase that ”Custom ” had been ch osen, you can assign eff ective IP range. The valid range is 0.
50 3-1-6. Virtual St ack Function name: Virtual Stack Function desc ription: Virtual S tack Management( VSM) is the group m anagem ent func tion. Through the proper configuration of this func tion, switches in the same LAN will be grouped a utomaticall y .
51 Fig. 3-8 Parameter desc ription: S tate: It is used f or the activation or de-activation of VSM. Default is Enable. Role: The role that the switc h would like to play in virt ual stack. T wo types of roles, including m aster and slave are off ered for option.
52 3-2. Port Configuration Four func tions , inc luding Port S tatus, Port Conf igur ation, S im ple Counter and Detai l Counter ar e contained in this function folder for port monitor and managem ent. Each of them will be described in detail order ly in the f ollow ing sections .
53 Function name: Port S tatus Function Desc ription: Report the latest upda ted status of all port s in this s w itc h. W hen any one of the ports in the switch chan ges its param eter displa y e d in the page, it will be automatic ally r efreshed the port cur rent status about every 5 seconds.
54 S peed / Duplex : Displa y the spe ed a nd d uplex of all port. T here are thr ee speeds 10M bps, 100Mbps and 1000Mbps suppor ted for TP m edia, and the du plex supporte d is half du plex and full duplex. If th e media is 1Gbps fiber , it is 1000Mbps s upported onl y .
55 Fig. 3-10 Parameter desc ription of Port 25 and Port 26: Connector T y pe: Display the connector ty pe, for ins t ance, UT P , SC, ST , LC and so on.
56 V endor SN (Serial Num ber): Show the serial number assigned by the manuf acturer . Date Code: Show the date this module was m ade. T em perature: Show the current tem perature of m odule. Vcc: Show the working DC voltage of m odule. Mon1(Bias) m A: Show the Bias current of module.
57 3-2-2. Port Conf i gurat i on Port Conf igurat ion is appl ied to cha nge t he sett ing of each port. I n this conf igurat ion function, you can set/res et the follo w ing func tions.
58 S peed/Duplex: Set the s peed a nd dup lex of the p ort. In speed, 10/10 0Mbps bau d rat e is availab le for Fast Eth ernet, G igabit m odule in port 2 5, 26.
59 3-2-3. Port Descri ption Port Desc ription is a pplied to c hange the setting of each por t. In this confi guration function, you can g ive a nam e to each por t. All of them are des cribed in detail below . Fig. 3-12 Function name: Port D escripti on Function desc ription: It is used to set each por t’s descriptio n.
60 3-2-5. Si mpl e Count er The func tion of Sim ple Counter co llects any infor mation and provides the counting about the traffic of the port, no matter the pack et is good or bad. In the Fig. 3-13 , the window can s how all ports’ counter inf ormation at the sa me time.
61 Rx Pack et: The c ounting number of the pack et received. Tx Collision: Num ber of collisions tr ansmitting fr ames exper ienced. Rx Error Packet: Number of bad packets received.
62 3-2-4. Detail Counter The f unction of Detail Cou nter collects a ny inform ation and pro v ides the countin g about the traffic of the port, no matter the pack et is good or bad. In the Fi g. 3-14, the wind ow can show only one port c ounter inform ation at the s ame time.
63 Show the counting number of the received unicast p ack et. Rx Broadcas t Packets: Show the counting number of the received broadcas t p ack et. Rx Multicas t Packets: Show the counting number of the received m ulticast packet. Rx Pause Pack ets: Show the counting number of the received pause packet.
64 Tx Packets: The counting num ber of the pack et transmitted. TX Octets: T otal transm itted by tes . Tx Unicast Packets: Show the counting number of the transm itted unicast packet. Tx Broadcast Pack et s: Show the counting number of the transm itted broadcast packet.
65 3-3. SNMP Configuration Any Net work Managem ent S y s tem (N MS) running th e Simple Network Managem ent Protoco l ( S NMP) can manag e the Ma naged devic es equipped with SNMP agent, pr ovided th at the Managem ent Inform ation Base (MI B ) is i nstalled correc tly on the managed devices.
66 Default SNMP function: Enable Default com munity name f or GET : public Default com munity name f or SET : private Default com munity name f or T r ap: public Default Set f unction: Enable Default trap hos t IP address: 0.0.0.0 Default port num ber: 162 Trap: In the s witch, th ere are 6 tr ap hosts s upported.
67 3-4. Loop Detection Looping will alway s occur when the switches are connec ted as a cy cle and a switch transm its the p ack et s that will go back to the transmitted s w itch. Loop Detection will prevent the looping fr om happening. Moreover , it c ould remove the looping phenomenon per port.
68 looping detection. After enabling looping ac tion, y ou should dec ide which port you w ould like to open loop detec tion capability . For example, you open the loop detection of por t 1 as enable state. W hen the looping situation happens f rom port 1, Loop Detection will lock the port1’s ability .
69 3-5. DHCP Boot The DHCP Boot func tion is used to spre ad the request broadc ast p ack et into a bigger t ime fram e to prevent the traffic conges tion due to br oadcast pack ets from man y ne twor.
70 3-6. IGMP Snooping The f unction, IGMP Snooping, is us ed to establis h the multicas t groups to forward the multic ast packet to the m e m ber ports, and, in nature, avoi ds wasting the bandwidth while IP multic ast pack ets are running o ver the network .
71 Parameter desc ription: IGMP snooping m ode selection: The s w itch supports thr ee kinds of IGMP Snooping s tatus, including “Passive” , “Active” and “Disable” .
72 Function name: Allowed Group Function desc ription: The Allo wed Group functi on allows the IGMP S nooping to set up the I P mu lticast table bas ed on u ser’s specif ic condit ions. IG MP report pac kets that meet the item s you set up will be joined or form ed the multicas t group.
73 Add: A new e ntry of allowed group configurati on can be c reated after th e parameter s as mentioned above had be en setup and then press <A dd> button. Edit: The ex isted entry also can be m odified after press ing <Edit> button. Delete: Remove the ex isted entry of allowed group conf iguration from the allowed group.
74 3-7. VLA N The s witch supports T ag- based VLAN (802.1q) an d Port-base d VLAN . It s upp orts 256 acti ve VLANs and VL AN ID 1~4094. VLAN c onfiguration is used to partition your LAN into sm all ones as your demand.
75 Sy m metric Vlan: This is an Ingress Rul e (Rule 1, The Ingress F iltering Rule 1 is “f orward only pack et s with VID matchin g this port’s conf igured VID”.
76 Fig. 3-20.
77 3-7-2. T ag- based G roup Function name: Tag-bas ed Group Configuration Function desc ription: It shows the inf ormation o f existed T ag-based VL AN Groups. Y ou can a lso easil y create, edit an d delete a T ag-based VLA N group b y pressing <A dd> , <Edit > a nd <Delete> f unction bu ttons.
78 Add Group: Input th e VLAN nam e, VID an d then cho ose the m ember by tick ing the check box beside the port No. to create a ne w T ag- based VLAN. As to the param eter of Untag, it s tands for an egr es s r u le of t he por t. If you tic k the check box beside the port No.
79 3-7-3. PVI D Function name: PVID Function desc ription: In PVID Setti ng, user can inp ut VID number to eac h port. The range of VID number is from 1 to 4094. User also c an choose i ngress f iltering rule (Rule 2) to each port. The I ngress Filter ing Rule 2 is “drop untagged fr ame”.
80 It bases on 8 02.1 p Q oS an d affec ts untagged pack ets. W hen the pack ets enter the s w itch, it w ould get the priority preced ence according to your Default Prior i t y settin g and m ap to 802.
81 3-7-4. Port - based G r oup Function name: Port-based G roup Configuration Function desc ription: It shows t he inform ation of the ex isted Port-bas ed VLAN G roups. Y ou c an easil y create, ed it and delete a P ort-based VL AN group by press ing <A dd> , <Edit > a nd <Delete> f unction bu ttons.
82 Add Group: Create a ne w Port- based VLAN. In put the VLAN na me and choose the mem ber by tick ing the check box beside the port N o., then, pres s the <A pply> button to have the setting taken effec t. Fig. 3-25 Delete Group: Just pre ss the <Delete> button to remove the selec ted group entry from the Port-based gr oup t able.
83 3-7-5. M anagement VLAN Function name: Management VLAN Function Desc ription: Parameter desc ription: S tate: It works w hen the tag-based m ode is chosen. W hen this f unction is enabled, only the tagged packets with this VID can m anage the switch.
84 3-8. MA C T able MAC Tab le Configurati on gathers m any functions, i ncluding MAC Table Inf ormation, MAC T able Mainten ance, Stat ic and M AC Alias, which cann ot be categ orized to som e function type.
85 Port: The port that ex ists in the searched MAC Entry . VID: VLAN Group that MAC Entry exists. S tate: Display the method that this MAC Entry is built.
86 Function Name: MAC T able Maintenanc e Function Desc ription: This function c an allow the user to set up the proc essing mec hanism of MAC T able. An idle MAC ad dress ex ceeding MAC Address Age-out Time will be rem oved from the MAC T able.
87 Function Name: S tatic Setting Function Desc ription: The f unction of Stat ic is us ed to configur e MAC’s r eal manners inside of t he switch. T hree kinds of m a nners inc luding static , static with d estination dro p and static with sourc e drop are contained in this func tion .
88 Queue (Priority): Set up the priority ( 0~3) for the MAC. Forwarding Rule (Dr op Policy ): St a t i c : A MAC address is assigned to a specif ic port, all of the switch’s traff ics sent to this MAC addres s will be forwarded to this port.
89 Function name: MAC Alias Function desc ription: MAC Alias function is used to let you assign M AC address a pl ain English name. T his will hel p you tell which MAC address belo ngs to whic h user in t he illegal ac cess report. At the initi al time, it shows a ll pairs of the ex isted alias name and MAC addr ess.
90 Parameter desc ription: MAC Address: It is a six- byte long Eth erne t hardware a ddress and us ually ex press ed b y hex and separated by hy phens .
91 3-9. GVRP Configuration GVRP is an applic ation based on Gener ic Attribute R egistration Pr otocol (GARP) , ma inly used to autom atically an d dynam ically mai nt ain t he group m embership inform ation of the VLANs. T he GVRP offers the func tion provid ing the VL AN registrat ion serv ice throug h a G ARP applic ation.
92 Function name: GVRP Config Function desc ription: In the functio n of GVRP Config, it is us ed to configure each p ort’s GVRP operatio n mode, in which th ere are se ven parameter s needed to be conf igured described below . Parameter desc ription: GVRP S tate Setting: This function is sim ply to let y ou en able or disab le GVRP function.
93 Normal: It is Norm al Registration. The Registr ar responds norm ally to incom ing GARP m essages. The default s etting is Normal. Fixed: It is Registration F ixed. The Registrar ignores all GARP mes sages, and all mem bers rem ain in the registered ( IN) state.
94 Function name: GVRP Counter Function desc ription: All GVRP count ers are main ly divided in to Received and Transm itted two categories to let you m onitor the GVRP actions . Actually , the y are G ARP pa ckets. Fig. 3-31 Parameter desc ription: Received: T o tal GV RP Pac kets : T otal GVRP BPDU is received by the GVRP application.
95 LeaveEmpty Message Pac ket s: Number of GARP BPDU wi th Leave Em pty m essage is rec eived by the GARP application. Empty Message Pack et s: Number of GARP BPDU wi th Em pty m essage is rec eived by the GARP application. Transmitted: T o tal GV RP Pac kets : T otal GARP BPDU is transm itted by the G V RP application.
96 Function name: GVRP Group Inform ation Function desc ription: T o show the dynamic group m ember and their inform ation. Parameter desc ription: Current Dynamic Gr oup Number: The num ber of GVRP group that are cr eated currently . VID: VLAN identifier .
97 3-10. STP Configuration The S panning Tree Prot ocol (ST P) is a standard ized m ethod (IEEE 80 2.1D) f or avoiding loops in switched networks . W hen ST P is enabled, ensure that onl y one path is active between an y two nodes on th e network at a t ime.
98 All bri dges in t he LAN will r e-learn an d de ter m ine which the root br id ge is . Maxim u m Age time is as signed b y Root Br idge in unit of sec onds. Default is 20 s econds. Current Forward Delay: Show th e current root br idge forwar d delay tim e.
99 3-10-2. STP Configuration The ST P , S panning T ree Protocol, actually includes RST P . In the S panning Tree Configura tion, there are six p aram eters open for t he user to c onfigure as user ’s idea. Each param eter description is lis ted below .
100 Forward Delay: Y ou can s et the root bridge f orward dela y tim e. This figur e is set b y Root Bridge o nly . T he forward delay time is defined as t he time spent f rom Listenin g state moved to Learning state and a lso from Learning state moved to Forwardin g state of a port in br idge.
101 3-10-3. STP Port Configuration Function name: STP Port Setting Function desc ription: In the ST P Port Sett ing, one it em selection a nd five parameters s ettings are offered for user ’ s setup. User can d isable and e nable each p ort by selec ting each Port S tatus item .
102 802.1w RSTP recom mended value: (V alid range: 1 – 200,000,000) 10 Mbps : 2,000,000 100 Mbps : 200,000 1 Gbps : 20,000 Default: 0 Priority : Priorit y her e means Por t Priori ty . P ort Priorit y and Port Number ar e mix ed to form the Port ID.
103 M Check : Migratio n Check . It forces the port s ending out a n RST P BPDU instea d of a leg acy STP BPDU at the next tr ansmiss i on. T he only benefit of this operatio n is to m a ke the p ort quick ly get bac k to act as an R STP port. Click <M Check > button to sen d a RSTP BPDU f rom the por t you specif ied.
104 3-1 1. T runking Configuration The Port T runking Co nfiguration is used to con figure the s ettings of Li nk Aggregat ion. Y ou c an bundle more than o ne port w ith the same s peed, full du plex and the sam e MAC to be a single log ical port, thus the log i cal port aggreg ates the bandwidth of these ports.
105 Per Trunking Gr oup supports a m aximum o f 4 read y member -ports. Please not e that som e decisio ns will autom atically b e made by t he system while y ou ar e configur ing y our tr unking ports.
106 Function name: Port Setting/S tatus Function desc ription: Port setting/s t atus is used to configure th e trunk proper ty of eac h and every port i n th e swi tch sy stem. Parameter desc ription: Method: This deter mines the m ethod a port uses to aggregate with other ports.
107 Aggtr: Aggtr is an abbrev iation of “ aggregator”. Every port is also a n aggregator , and its own aggre gator ID is the s am e as its own Port No.
108 Function name: Aggregator View Function desc ription: T o displa y the current p ort trunk ing inform ation from the aggregator point of view . Parameter desc ription: Aggregator: It shows th e aggre gat or ID ( f rom 1 to 26) of e ver y p ort.
109 Function name: LACP Detail (LACP Aggregator Detailed Infor mation) Function desc ription: Show the detailed information of the LACP trunk ing group. Parameter desc ription: Actor: The s w itch you are watching on. Partner: The peer s y s tem from this aggregator ’s view .
11 0 Function name: LACP Sy s tem Configur ation Function desc ription: It is us ed to set the priority part of the LACP s y stem ID. LACP will onl y aggregate together the ports whose p eer link p artners are all on a single system . Each system supports LACP will be assigned a gl obally unique System Identifier f or this p urpose.
111 3-12. 802.1x Configuration 802.1x por t-based network access contr ol provides a method to r estrict user s to acces s network r esources via a uthenticatin g user ’s inform ation. T his restricts user s from gaining acces s to the networ k resourc es through a 80 2.
11 2 The overv iew of operat ion flow is qu ite simple. W hen Supplican t P A E issues a r equest to Auth enticator P AE, Aut henticator and Supplican t exchanges authenticat ion m essage. Then, Aut henticator p asses th e request to RADIUS ser ver to verif y .
11 3 The Figur e shows the procedur e of 802.1x auth entication. There are steps f or th e login bas ed on 802. 1x port ac cess control m anagement. T he protocol used in the right side is EAPO L and the left side is EAP .
11 4 8. If user ID and pas sword is correct, the aut hentication s erver will send a R adius-Acces s-Accept t o the authe nticator . If not corr ect, the authentication server w ill send a Radius-Ac cess-Rejec t. 9. W h en the authent icator P AE receiv es a Radius-Acc ess-Accept, it will send a n EAP-Succes s to the supp licant.
11 5 Only Mu ltiHost 802.1X is the type of authenticatio n supported in th e switch. In t his mode, f or the devices connected to t his port, onc e a supplicant is author ized, the devices connec ted to this port can acces s the network resourc e through this port.
11 6 Fig. 3-43 Function name: 802.1x S tate Setting Function desc ription: This function is used to conf igure the global parameters for RADIUS authentication in 802.1x port s ecurity application. Parameter desc ription: Radius Server: RADIUS server IP address f or authentication.
11 7 The port num ber to com municate with Acc ounting server for the accounting s ervice. The valid value ranges 1-65535. Default port num ber is 1813.
11 8 Function name: 802.1x Mode Setting Function desc ription: Set the operation m ode of 802.1X for eac h port. In this device, it supports only Multi-host operation m ode. Parameter desc ription: Port Num ber: Indicate which port is s elected to configure the 802.
11 9 Function name: Port Security Management Function desc ription: Shows eac h port status. In Multihost m ode, it shows t he port num ber and its status, authorized or unauthorized. Parameter desc ription: Disable Mode: W h en selecti ng Disable mode for a port in t he function 802.
120 Function name: Param . Setting Function desc ription: This function is used to conf igure the parameter s for each port in 802.1x port security application. Refer to the f ollowing parameters des cription for details. Parameter desc ription: Port: It is the port num ber to be selected f or configuring its ass ociated 802.
121 reAuthEnabled: Choose whether regular authentic ation w ill take place in this port. Default: ON reAuthPeriod(1-65535 s ): A non-zero number seconds between the periodic re-authentic ation of the supplicant.
122 3-13. A larm Configuration Function name: Events Configuration Function desc ription: The Trap Events Conf iguratio n function is used to e nable the sw itch to send out the trap information while pre-def ined trap events occurred. The s w itch offers 21 different tr ap events to users for switch m anagement.
123 Fig. 3-47 Function name: Em ail/SMS Configuration Function desc ription: Alarm configuration is use d to configure the pers ons who shou ld receive the alarm m essage via either email or S MS, or both. It depends on y our s ettings. An email addr ess or a m obile phone num ber has to be set in the web page of alarm c onf igur atio n.
124 Parameter desc ription: Em ail: Mail Server: the IP address of the server transf erring y our email. Usernam e: y our usernam e on the mail ser v er . Password: your password on the mail s erver . Email Address 1 – 6: em ail address that would lik e to receive the alarm message.
125 3-14. Configuration The s w itch s upports three c opies of c onfiguration, including th e default c onfiguration, work ing configuration a nd user conf iguration for y our conf iguration m anagement. All of them are listed and descr ibed below respec tively .
126 3-14-1. Save/Restore Function name: Save As S tart Configuration Function desc ription: Save the current c onfiguration as a start conf iguration file in flash m emor y . Function name: Save As User Configuration Function desc ription: Save the current c onfiguration as a user c onfiguration file in f lash mem ory .
127 3-14-2. Conf i g File Function name: Config File Function desc ription: W ith this f unction, user can back up or reload the config f iles of Save As S tart or Save As Us er via TF TP . T o notice that after im port config f ile, the original IP related setting won’t be changed by config file.
128 3-15. Security Function name: Mirror Conf iguration Function desc ription: Mirror C onfiguratio n is to monitor the tr affic of the n etwork. F or example, we assum e that Port A and Por t B are Mon itoring Port and M onitored P ort respectiv ely, thus, the traffic rec eived b y Port B will be c opied to Port A for monitor ing.
129 Function name: Isolated Group Function desc ription: Isolated G roup function ca n let the port be ind ependent of other por ts in the Isolated gr oup, and the co mmunication is also forbidd en between these p orts. But, the ports of the Is olated gr oup ar e still ab le to co mm unicate with the port s of the non-Iso lated group.
130 Function name: Restricted G roup Function desc ription: The f unction of the Restricted G roup can decide th e direction of tr ansmitting pack ets for the specific port. T he packets rec eived by the port with th e “Ingress ” mode of Res tricted Group will be se nt to the ports with the “ Egress” mode of Restricted Group.
131 3-16. Bandw idth Management Function name: Ingress Bandwidth Setting Function desc ription: Ingress Bandwidth Setting function is used to set up the limit of Ingress bandwidth for each port. Fig. 3-54 Parameter desc ription: Port No.: Choose the p ort that you woul d like this f unction to w ork on it.
132 Function name: Egress Bandwidth Setting Function desc ription: Egress Bandwidth Setting func tion is used to set up the lim it of Egress bandwidth for each port. Parameter desc ription: Port No.: Choose the p ort that you woul d like this f unction to w ork on it.
133 Function name: S torm Setting Function desc ription: Bandwidth Management function is used to set up the limit of Ingress and Egress bandwidth for eac h port. Fig. 3-55 Parameter desc ription: S torm T ype: Disable: Disable the func tion of the bandwidth storm c ontrol.
134 S torm Rate: Set up t he limit of bandwidth for s torm t y p e you choos e. V al id value of the storm rate ranges f rom 1-10 0 with the m inimum unit of 1.
135 3-17. QoS(Quality of Service) Configurat ion The s witch suppor ts 5 kind s of QoS, are as follo ws, M AC Pr iorit y , 8 02.1p Pr iorit y , IP TOS Priorit y , and Diff Serv DSCP Priorit y . Port Base d Priorit y has a spec ial nam e called VIP Port in the s witch.
136 The Q oS functions as we m entioned above are able t o enable at the same tim e. But, the following precedence will decide whether thes e functions work or not. 1. enable both VIP and TOS Choose priorities of VIP and TOS. 2. enable both VIP and DSCP Choose priorities of VIP and DSCP .
137 Function name: QoS Global Setting Function desc ription: W h en you want to use Qo S functio n, please enable QoS Mode in advance. Then you can use MAC Prior ity , 802 .1p Priority , IP TOS Priority , DiffServ DSCP Priorit y , or V IP Port functions and take eff ect.
138 Function name: VIP Port Setting Function desc ription: W h en the port is s et as VIP Port, the p ackets enter this port and will hav e highest tr ansmitting priority. For example, as you cho ose port 2 is VIP Port, sim ultaneously transm it packets from port 2 a nd port 3 t o port 1 at s peed of 100MB and let congest ion happen.
139 Function name: 802.1p Setting Function desc ription: This func tion will af f ect the priorit y of VL AN ta g. Bas ed on prior it y of VLAN t ag , it can ar range 0~8 priorities, pr iorities can map to 4 queues of th e switch (queue 0~ 3) and possess different band width distrib ution according to your weight setting.
140 Function name: D-T y pe TO S Function desc ription: IP TOS Priorit y affec t TOS fields of IP header , you can find it has 8-bit SERVICE T YPE f ield that s pecif ies h ow the datagram shoul d be handl ed.
141 Function name: T- Typ e T O S Function desc ription: IP TOS Priorit y affec t TOS fields of IP header , you can find it has 8-bit SERVICE T YPE f ield that s pecif ies h ow the datagram shoul d be handl ed.
142 Function name: R-T y pe TO S Function desc ription: IP TOS Priorit y affec t TOS fields of IP header , you can find it has 8-bit SERVICE T YPE f ield that s pecif ies h ow the datagram shoul d be handl ed.
143 Function name: M-T y pe TO S Function desc ription: IP TOS Priorit y affec t TOS fields of IP header , you can find it has 8-bit SERVICE T YPE f ield that s pecif ies h ow the datagram shoul d be handl ed.
144 Function name: DSCP Setting Function desc ription: In the late 1990s , the IET F redefine d the m eaning of the 8-bit S ERVICE T YPE field to ac comm odate a set of d i fferentiat ed services ( DS).
145 3-18. Diagnostics Three f unctions, includi ng Diagnostics , Loopback T est and P i ng T est are contain ed in this f unction folder for device s elf-diagnost ics.
146 Function name: Loopback T es t Function desc ription: In the Loopbac k T est func t ion, there are two different loo pback tests. O ne is Internal L oopback T est and the other is Exter nal Loopback T es t. The form e r test func tion will not send the test s ignal outside t he switch b ox.
147 Function name: Ping T est Function desc ription: Ping T es t func tion is a tool for detec ting if the target de vice is alive or not through I CMP protocol which aboun ds with report mess ages. The switch provides P ing T est function to let you know th at if the target d evic e is ava ilabl e or not.
148 3-19. TFTP Serv er Function name: TFTP Ser ve r Function desc ription: Set up IP address of TF TP server . Parameter desc ription: S pecif y the IP address w here the TF TP server locates. Fill in the IP address of y our TFT P server , then press <A pply> button to have the setting t aken eff ect.
149 3-20. Log This function s hows the log data. T he switch provide s system log data f or users. There ar e 16 private trap logs , 5 public trap logs . The switch suppor t s total 120 log entries. F or more detai ls on log i tems, pleas e refer to the section of Trap/Alarm Configuration and SNMP Configuration.
150 Upload Log: Upload log data through tftp. Clear Log: Clear log data..
151 3-21. Firmware Upgrade Software upgra de tool is used to h elp upgrade t he software functi on in order t o fix or impr ove the function . The switch pro vides a TFT P client for software upgrade.
152 3-22. Reboot W e offer y ou m any ways to reboot the s witch, includi ng power up, hardware r eset and softwar e reset. You can pr ess the RESET button in the fr ont panel to reset t he switch.
153 3-23. Logout You can manuall y log out by perf orming Lo gout funct i on. I n the switc h, it prov ides another way to logout. You can configure it to logout autom atically. Function name: Logout Function desc ription: The s w itch a llows you t o logout the s ystem to pre vent other users from the system without the permission.
154 4. Operation of CLI Management 4-1. CLI Management Refer to Chapter 2 for basic installation. The f ollowi ng descr iption is the brief of the network connec tion. -- Locate the c orrect DB-9 null m odem cable with fem ale DB-9 connector . Null modem cable com es with the managem ent switch.
155 ------------------------------- Managed Switch – 2262 FE Switch Login: admin Password: 2262# ------------------------------- Fig. 4-1 ------------------------------- Managed Switch – 2262 FE Switch Login: admin Password: 2262$ ------------------------------- Fig.
156 4-2. Commands of CLI T o see the commands of the mode, p lease input “ ? ” after the prompt, the n all comm ands will be listed in th e screen. All comm ands can be d ivided int o two categories , including g lobal com mands and loca l comm ands.
157 4-2-1. Glo bal Comma nds of CLI --------------------------- end Syntax: end Description: Back to the top mode. W h en you enter this com mand, your current pos ition woul d move to the top m ode. If y ou use this c omm and in the top mode, you are still in the position of the top m ode.
158 --------------------------- help Syntax: help Description: T o show available com mands . Some c om m ands are th e c om bination of m ore than t wo words.
159 --------------------------- history Syntax: history [#] Description: T o show a list of previous com mands that you had ever run. W h en you ent er this com mand, the CLI wou l d sh ow a list of commands whic h you had t y ped bef ore. The CLI supports up to 25 6 records.
160 --------------------------- logout Syntax: logout Description: W h en you enter t his comm and via T elnet con nection, you wou ld logout the s y st em and disc onnect.
161 --------------------------- restore us er Syntax: restore us er Description: T o restor e the s tartup conf igur ati on as us er def in ed c o nf igurati on. If r es toring d ef ault succes sfully , t he CLI would prom pt if reboot im mediatel y or not.
162 --------------------------- save use r Syntax: save user Description: T o save the c urrent conf ig uration as the us er-d efined c onf iguratio n. W hen you enter this com mand, the CLI would sav e your curre nt configurati on into the non-volat ile FLASH as user -defined configur ation.
163 4-2-2. Local Commands of CLI 802.1x --------------------------- set max-r equest Syntax : set m ax-request <port- range> <times> Description : The m aximum num ber o f tim es that the state machin e will retrans mit an EAP Request packet to the Supplic ant before it tim es out the authentication session.
164 --------------------------- set port-c ontrol Syntax : set port-c ontrol <port-range> <authorized> Description : T o set up 802.1X s t atus of eac h port.
165 --------------------------- set reAuthMax Syntax : set reAuthMax <port-range> <max > Description : The num ber of reauthentic ation attempts that are perm itted before the port becom es Unauthorized. A rgument : <port range> : syntax 1,5-7, available from 1 to 26 <max > : max.
166 set st ate Syntax : set state <ip> <port-num ber> <secr et-key> <Accounting Service> <Acc ounting Server> <Acc ounting Port> Description : T o conf igure the settings related with 802.1X Radius Server and Accounting ser v ice.
167 FE2262 (802.1x)# s et txPeriod 2 30 --------------------------- show mode Syntax : show mode Description : T o display the mode of eac h port. A rgument : None.
168 --------------------------- show se curity Syntax : show securit y Description : T o display the authentication status of each port. A rgument : None.
169 account --------------------------- add Syntax: add <name> Description: T o create a new guest us er . W hen y ou create a new guest user , you must type in password and confir m password. A rgument: <name> : new acc ount name Possible valu e: <name> : A string m ust be at least 5 character .
170 --------------------------- modify Syntax: m odify <name> Description: T o change the user name and password of an ex isting account. A rgument: <name> : ex isting user account Possible valu e: None. Example: FEL2SW-26(account)# modify aaaaa username/password: the length is from 5 to 15.
171 alarm <<email>> --------------------------- del mail-address Syntax : del m ail-address <#> Description : T o rem ove the e-ma il address.
172 --------------------------- set serve r Syntax : set serv er <i p> Description : T o set up the IP address of the email server . A rgument : <ip>:ema il server ip address or domain nam e Possible valu e: None. Example: FEL2SW-26(alarm-email)# set server 192.
173 <<even t s>> --------------------------- del all Syntax : del all <range> Description : T o disable em ail, sm s and trap of events.
174 --------------------------- del trap Syntax : del trap <range> Description : T o disable the trap of the events. A rgument : <range>:del the range of trap, sy ntax 1,5-7 Possible valu .
175 --------------------------- set sms Syntax : set sm s <range> Description : T o enable the sm s of the events. A rgument : <range>:set the range of sms, sy ntax 1,5-7 Possible valu e: .
176 --------------------------- show Syntax : show Description : The Show here is us ed to display the configuration of alarm event. A rgument : None. Possible valu e: None.
177 --------------------------- show (al arm) Syntax : show Description : The Sho w fo r al ar m here is used to disp lay the conf igu r ation of Trap, SMS or E- m ail .
178 --------------------------- set phone-number Syntax : set phone-num ber <#> <phone-num ber> Description : T o add sm s phone number . A rgument : <#>: mobile phone num ber , rang.
179 --------------------------- show Syntax : show Description : T o display the configuration of SMS trap event. A rgument : None. Possible valu e: None.
180 autologout --------------------------- autologout Syntax : autologout <time> Description : T o set up the tim er of autologout. A rgument : <time>: r ange 1 to 3600 seconds, 0 for autologout off, current setting is 180 seconds.
181 --------------------------- set sto rm-rate Syntax : set stor m-rate <range> <data_rate> Description : T o set up the stor m-rate of the port s.
182 config -file --------------------------- export start Syntax : export start Description : T o run the expor t st art function. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (conf ig-file)# expor t start Expo rt successful .
183 --------------------------- import user-conf Syntax : impor t user-conf Description : T o run the im port user-conf function. A rgument : None. Possible valu e: None.
184 --------------------------- show Syntax : show Description : T o display the inform ation of the config f ile. A rgument : None. Possible valu e: None. Example: FEL2SW-26(config-file)# show TFTP Server IP Address: 192.168.3.111 Export Path and Filename: log/21511.
185 diag --------------------------- diag Syntax: diag Description: Diag is used to test whether EEPRO M, UAR T , DRAM and Flash is normal or not.
186 192.168.1.115 is alive..
187 firmw are --------------------------- set upgrade-path Syntax : set upgrade-path <f ilep ath> Description : T o set up the im age file that will be upgraded.
188 gvrp --------------------------- disable Syntax : disable Description : T o disable the gvrp f unction A rgument : None. Possible valu e: None. Example: FEL2SW -26 (gvrp) # disable --------------------------- enable Syntax : enable Description : T o enable the gvrp f unction.
189 FEL2SW-26 (gvrp)# group 2 FEL2SW -26 (gvrp- group-2)# set applicant 1- 6 non-p articipant FEL2SW-26 (gvrp-group-2)# show GVRP group VID: 2 Port Applicant Registrar ---- --------------- --------- 1.
190 --------------------------- set applicant Syntax : set applicant <r ange> <normal|non-participant> Description : T o set def ault applicant mode f or each port.
191 Example: FEL2SW-26 (gvrp)# set restricted 1-10 enable FEL2SW-26 (gvrp)# show config GVRP state: Enable Port Join Time Leave Time LeaveAll Time Applicant Registrar Restricted ---- --------- -------.
192 --------------------------- set timer Syntax : set tim er <range> <join> <leave> <leaveall> Description : T o set gvrp j oin time, leave tim e, and leaveall time f or each port.
193 --------------------------- show counter Syntax : show counter <port> Description : T o show counter of the port. A rgument : <port>: port num ber , available from 1 to 26 Possible val.
194 hostname --------------------------- hostname Syntax : hostnam e <name> Description : T o set up the hostnam e of the switch. A rgument : <name>: hos tname, m ax. 40 characters . Possible valu e: <name>: hos tname, m ax.
195 --------------------------- set mode Syntax : set m ode <status> Description : T o set up the m ode of IGMP Snooping. A rgument : <status>: 0:disable, 1:active, 2:passive Possible valu.
196 IP --------------------------- disable dhcp Syntax : disable dhcp Description : T o disable the DHCP function of the s y stem . A rgument : None. Possible valu e: None. Example: FEL2SW -26(ip)# dis able dhcp DHCP is already stopped.
197 --------------------------- set i p Syntax : set ip <ip> <m ask> <gateway> Description : T o set the system IP address , subnet mask and gateway . A rgument : <ip> : ip address <mas k> : subnet m ask <gateway > : default gateway Possible valu e: <ip> : 192.
198 log --------------------------- clear Syntax: clear Description: T o clear the log data. A rgument: None. Possible valu e: None. Example: FEL2SW -26 (log)# clear --------------------------- disable auto-upload Syntax: disable auto-upload Description: T o disable the auto-upload f unction.
199 loop-detect i on (LD) --------------------------- disable action Syntax : disable action Description : Disable LD and corr esponding action. Disable the lock ed-port action when loop occurs. A rgument : None. Possible valu e: None.
200 --------------------------- enable port Syntax : enable port <port range> Description : Enable LD and corres ponding action. Enable LD per port.
201 --------------------------- show Syntax: show Description: T o show a l ist of trap log events. When an y of log events happens , it will be recorded a nd using show c ommand in log f unction to quer y . Up to 120 log records are supported. A rgument: None.
202 mac-table <<alias>> --------------------------- del Syntax : del <m ac> Description : T o delete the m ac alias entry .
203 <<infor mation>> --------------------------- search Syntax : searc h <port> <mac> <vid> Description : T o look for the relative m ac inform ation in mac t able.
204 <<maintain>> --------------------------- set aging Syntax : set aging <tim e> Description : T o set up the age out tim e of dynamic learning m ac. A rgument : <time> : Mac t able age out tim e betw een 10 and 1000000 seconds .
205 Example: FEL2SW-26(mac-table-maintain)# show Mac table age out time: 300 seconds Port Dynamically learn limit ------ ------------------------- 1 8191 2 8191 3 8191 4 8191 5 8191 : : : 21 8191 22 8.
206 --------------------------- del Syntax : del <m ac> Description : T o rem ove the static mac entry . A rgument : <mac > : mac addres s, form at: 00-02-03-04-05-06 Possible valu e: <.
207 management --------------------------- add Syntax: Usage: set [<nam e> <value>] [<vid> <value>] [<ip> <value>] [<port> <value>] [<ty pe> <value>] <action> <value> Sy nopsis: set nam e Mary vid 20 ip 192.
208 --------------------------- delete Syntax: delete # Description: T o delete a spec ific record or range. A rgument: [#]: a specif ic or range managem ent security entry (s) Possible valu e: None. Example: FEL2SW-26 (management)# show #: 1 Name : Tom VlanID : 2 IP : 192.
209 Example: FEL2SW-26 (management)# edit 1 FEL2SW-26 (management-edit-1)# set name Tom vid 2 ip 192.168.1.30- 192.168.1.80 port 1-2 type s action d FEL2SW-26 (management-edit-1)# show #: 1 Name : Tom VlanID : 2 IP : 192.
210 port --------------------------- clear counter Syntax : clear counter Description : T o clear all por t s’ counter (inc lude simple and detail port counter) information.
21 1 set de scripti on Syntax : set desc ription <range> <description> Description : T o set up the hum an readable description of all ports.
212 --------------------------- show conf Syntax : show conf Description : T o display the each port’s configuration about s t ate, speed-duplex and flow control.
213 Port 25 Fiber Media Information --------------------------------------------------------------------- Connector Type : SFP - LC Fiber Type : Multi-mode (MM) Tx Central Wavelength : 850 Baud Rate :.
214 5 TP Up Enable Enable 100M/Full ON ON 6 TP Down Enable Enable ----/---- ---- ---- 7 TP Down Enable Enable ----/---- ---- ---- : : : 24 TP Down Enable Enable ----/---- ---- ---- 25 TP Down Enable E.
215 --------------------------- disable tos Syntax : disable tos Description : T o disable IP TOS qos. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (qos) # disable tos --------------------------- enable 1p Syntax : enable 1p Description : T o enable 802.
216 --------------------------- enable qos Syntax : enable qos Description : T o enable qos f unction. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (qos) # enable qos --------------------------- enable tos Syntax : enable tos Description : T o enable IP TOS qos.
217 --------------------------- set pri-tag Syntax : set pri-tag [<q0><priority>] [<q1><priority> ] [<q2><priority>] [<q3><priority >] Description : T o set 802.1p qos weighting f or 4 queues. A rgument : <q>: queue level, q0: queue 0; q1: queue 1; q2: queue 2; q3: queue 3.
218 Possible valu e: <ty pe_value>: 0~3 <priority >: 0 to 7. Example: FEL2SW -26 (qos) # set tos 0 q0 1 q1 2 q2 4 q3 6 --------------------------- set vi p Syntax : set vip <port_range> <m ode> Description : T o set vip port for strict priority .
219 DiffServ Queue DiffServ Queue DiffServ Queue DiffServ Queue --------- ------- ---------- ------- ---------- ------- ---------- ------- 0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9 0 10 0 11 0 12 0 13 0 1.
220 --------------------------- show priority- t ag Syntax : show priority-t ag Description : T o show 802.1p Qos c onfiguration. A rgument : None. Possible valu e: None. Example: FEL2SW-26 (qos)# show priority-tag 802.1p priority ==================== Global QoS mode: Enable QoS Enable 802.
221 --------------------------- show tos Syntax : show tos Description : T o show IP tos Qos conf iguration. A rgument : none Possible valu e: none Example: FEL2SW-26 (qos)# show tos ip tos classification ==================== Global QoS mode: Enable QoS Disable 802.
222 --------------------------- reboot Syntax: reboot Description: T o reboot the system. A rgument: None. Possible valu e: None. Example: FEL2SW -26 # reboot security <<isolat ed-group>> --------------------------- set Syntax : set <port> Description : T o set up the f unction of the isolated group.
223 <<mirror>> --------------------------- disable Syntax : disable Description : T o disable the f unction of m i rror . A rgument : None. Possible valu e: None. Example: FEL2SW -26 (sec urity -m i rror )# disable --------------------------- enable Syntax : enable Description : T o enable the func tion of mirr or .
224 --------------------------- show Syntax : show Description : T o display the current setting status of mirror . A rgument : None. Possible valu e: None.
225 snmp --------------------------- disable Syntax : disable set-c omm unity disable snm p Description : The Dis able here is used for the de- activation of snm p or set-com munity .
226 --------------------------- set Syntax : set get-com m unity <com munity> set set-c omm unity <com munity> set trap <#> <ip> [port] [com munity] Description : The Set here is used for the setup of get-comm unity , set-com munity , trap hos t ip, host port and trap- c omm unity .
227 stp --------------------------- MCh eck Syntax : MCheck <range> Description : T o force the port to trans mit RST BPDUs. A rgument : <range>: syntax 1,5-7, available fr.
228 --------------------------- set con fig Syntax : set conf ig <Bridge Priority > <Hello Ti m e> <Max. Age> <Forward Delay> Description : T o set up the param eters of ST P . A rgument : <Bridge Priority>: priority m ust be a multiple of 4096,available from 0 to 61440.
229 FEL2SW -26 (stp) # set version rstp --------------------------- show config Syntax : show config Description : T o display the STP configuration data.
230 --------------------------- show status Syntax : show status Description : T o display of the status of ST P . A rgument : None. Possible valu e: None.
231 system --------------------------- set contact Syntax : set contact <contact> Description : T o set the contact des cription of the switch. A rgument : <contact>:string length up to 40 c haracters. Possible valu e: <contact>: A, b, c, d, .
232 --------------------------- show Syntax : show Description : T o display the basic infor mation of the switch. A rgument : None. Possible valu e: None.
233 tft p --------------------------- set serve r Syntax : set serv er <i p> Description : T o set up the IP address of t ftp server . A rgument : <ip>: the IP address of tftp server Possible valu e: <ip>: tftp server IP Example: FEL2SW -26 (tftp)# set ser v er 192.
234 time --------------------------- set daylightsaving Syntax: set daylight saving <hr> <MM/DD/HH> <m m/dd/hh> Description: T o set up the daylight saving.
235 --------------------------- set ntp Syntax: set ntp <ip> <tim ez one> Description: T o set up the cur rent time via NT P server . A rgument: <ip>: ntp server ip addres s or domai.
236 trunk --------------------------- del trunk Syntax : del trunk <port-range> Description : T o rem ove the trunk port. A rgument : <port-range> : s y ntax 1,5-7, availab.
237 --------------------------- set trunk Syntax : set trunk <port-range> <m ethod> <group> <active LACP> Description : T o set up the status of trunk, including the group num ber and mode of the trunk as well as LACP mode.
238 --------------------------- show lacp-c onfig Syntax : show lacp-c onfig Description : T o display the value of LACP Priority . A rgument : None. Possible valu e: None.
239 --------------------------- show status Syntax : show status Description : T o display the aggregator status and the settings of each port. A rgument : None.
240 vla n --------------------------- del port-group Syntax: del port-group <nam e> Description: T o delete the port-bas ed vlan group.
241 --------------------------- disable drop-untag Syntax: disable drop-untag <port_range> Description: T o disable drop- unt ag. A rgument: <port_range>: which port(s ) y ou want not to drop untagged frames .
242 --------------------------- enable double-tag Syntax: enable double-tag Description: T o enable double-tag. A rgument: None. Possible valu e: None. Example: FEL2SW -26 (vlan)# enable double-tag --------------------------- enable drop-untag Syntax: enable drop-untag <port_range> Description: T o enable drop-untag.
243 --------------------------- enable symmetric Syntax: enable symm etric Description: T o drop f rames f rom the non-m ember port. A rgument: None. Possible valu e: None.
244 <name>: por t-vlan name <range>: vlan group m embers , sy ntax: 1,5-7, available from 1 to 26 Possible valu e: <range>: 1 to 26 Example: FEL2SW -26 (vlan)# set por t-group vlan-1.
245 --------------------------- show config Syntax: show config Description: T o display the current vlan m ode, Sy m me tric vlan, SVL and Double tag states.
246 Description: T o display managem ent setting. A rgument: None Possible valu e: None Example: FEL2SW-26(vlan)# show mgt-vlan Management Vlan: State : Disable VID : 1 --------------------------- show pvid Syntax: show pvid Description: T o display pvid, priority and drop untag result.
247 vs --------------------------- disable Syntax: disable Description: T o disable the virt ual stack. A rgument: None. Possible valu e: None. Example: FEL2SW-26(vs)# disable --------------------------- enable Syntax: enable Description: T o enable the virtual s t ack .
248 --------------------------- set role Syntax: set role <m aster|slave> Description: T o set role. A rgument: <m aster|slave>: master : act as mas ter , s lave : act as slave Possible va.
249 5. Maintenance 5-1. Resolving No Link Condition The pos sible causes for a no link LED status are as f ollow s: T he attached device is not powered on T he cable may not be the correct ty pe or is faulty T he installed building premis e cable is faulty T he port may be faulty 5-2.
250 Appendix A Technical Specifications Features • The switch inc luded 24-Port 10/100Mbps TP and 2-Port Gigabit Dual Media TP/SFP . • Supports 24-port 10/100M TP ports with Nway and auto MDIX function . • Supports on-line plug/unplug SFP transce iver modules.
251 Hardware Specifi cat i ons St andard Compliance: IEEE802.3ab / 802.3z / 802.3u / 802.3x 802.3z and 802.3ab compliant Gigabit Ethernet ports T ransmissio n Mode: 10/.
252 Diagnostic LED: Sy stem LED : Power CPURUN ACT (LEDSET ) FDX (LEDSET ) SPD (LEDSET) Per Port LED: 10/100M TP Port 1 to 24 : LINK/ACT , FDX, SPD 1000M Fiber/TP Port 25,26 : LINK/ACT.
253 Management Soft w are Speci f ications Sys tem Configuration Auto-negotiation support on 10/100Base-TX ports, W eb browser or console interface can set transmission speed (10/100Mbp s) and operation mode (Full/Half duplex ) on each port, enable/disable any port, set VLAN group, set T runk Connection.
254 Appendix B Null Modem Cable Specifications The DB-9 c able is used for c onnecting a terminal or ter minal em ulator to the Managed Switch’s RS-232 port to acces s the comm and-line interfac e. The table below shows the pin assignm ents for the DB-9 c able.
Een belangrijk punt na aankoop van elk apparaat KTI Networks KS-2262 (of zelfs voordat je het koopt) is om de handleiding te lezen. Dit moeten wij doen vanwege een paar simpele redenen:
Als u nog geen KTI Networks KS-2262 heb gekocht dan nu is een goed moment om kennis te maken met de basisgegevens van het product. Eerst kijk dan naar de eerste pagina\'s van de handleiding, die je hierboven vindt. Je moet daar de belangrijkste technische gegevens KTI Networks KS-2262 vinden. Op dit manier kan je controleren of het apparaat aan jouw behoeften voldoet. Op de volgende pagina's van de handleiding KTI Networks KS-2262 leer je over alle kenmerken van het product en krijg je informatie over de werking. De informatie die je over KTI Networks KS-2262 krijgt, zal je zeker helpen om een besluit over de aankoop te nemen.
In een situatie waarin je al een beziter van KTI Networks KS-2262 bent, maar toch heb je de instructies niet gelezen, moet je het doen voor de hierboven beschreven redenen. Je zult dan weten of je goed de alle beschikbare functies heb gebruikt, en of je fouten heb gemaakt die het leven van de KTI Networks KS-2262 kunnen verkorten.
Maar de belangrijkste taak van de handleiding is om de gebruiker bij het oplossen van problemen te helpen met KTI Networks KS-2262 . Bijna altijd, zal je daar het vinden Troubleshooting met de meest voorkomende storingen en defecten #MANUAl# samen met de instructies over hun opplosinge. Zelfs als je zelf niet kan om het probleem op te lossen, zal de instructie je de weg wijzen naar verdere andere procedure, bijv. door contact met de klantenservice of het dichtstbijzijnde servicecentrum.