Edimax Technology Switch ES 5816PGH User Manual

User Manual  
ES-5816PHG  
Gigabit 16-Port 802.3at PoE Web Smart Switch  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Content  
Content………………………………………………………………………………….I  
Introduction……………………………………………………………………………..1  
Product Overview……………………………………………………………………………….1  
General Feature…………………………………………………………………….1  
L2 switching………………………………………………………………………………………..1  
Quality of Service………………………………………………………………………………… 2  
Security…………………………………………………………………………………………… .2  
Specification……………………………………………………………………………………..3  
Mechanical……………………………………………………………………………………....3  
Package Contents……………………………………………………………………………...4  
Hardware Description………………………………………………………………….5  
Physical Dimensions / Weight………………………………………………………………...5  
Front Panel……………………………………………………………………………………...5  
LEDs Indicators…………………………………………………………………………………..5  
Rear Panel………………………………………………………………………………………6  
Hardware Installation…………………………………………………………………………..6  
Software Description…………………………………………………………………..7  
Login……………………………………………………………………………………………..7  
Configuration……………………………………………………………………………………8  
System ..…………………………………………………………………….…………….....8  
Ports ………….…………………………………………………..…………………………..10  
Vlan…………………………………….……………………….…………………………...11  
Aggregation…………………………………………………………………………….….12  
LACP……………………………………………………………………………….……….13  
RSTP………………………………………………………………………………………..14  
802.1x ………………………………………………………………………………………16  
Snopping………………………………………………………………………….17  
Mirrioring…………………………………………………………………………………18  
QoS……………………………………………………………………………………….19  
Filter..……………………………………………………………………………….…22  
Power over Ethernet ………………………………………………………………………...23  
Rate Limit…………………………………………………………………………………….24  
Storm Control……………………………………………………………………………24  
Monitoring…………………………………………………………………………………...26  
Statistic Overview……………………………………………………………………… 26  
I
Download from Www.Somanuals.com. All Manuals Search And Download.  
Detailed Statistic………………………………………………………………………..26  
LACP Status……………………………………………………………………………. 27  
RSTP Status……………………………………………………………………………..28  
IGMP Status……………………………………………………………………………..30  
VeriPHY…………………………………………………………………………………..30  
Ping……………………………………………………………………………………....31  
Maintenance………………………………………………………………………………...34  
Warm Restart…………………………………………………………………………....34  
Factory Default………………………………………………………………………….34  
Software Upload………………………………………………………………………..34  
Configuration File Transfer…………………………………………………………....34  
Logout……………………………………………………………………………………35  
II  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Introduction  
Product Overview  
This switch is a Web Management Switch equipped with 16-ports  
10/100/1000BaseT(X) with 4-port gigabit SFP open slots. It was designed for  
easy installation and high performance in an environment where traffic is on  
the network and the number of users increases continuously. The compact  
rigid desktop size was specifically designed for small to medium workgroups.  
It can be installed where space is limited; moreover, it provides smooth  
network migration and easy upgrade to network capacity.  
In addition, the switch features comprehensive and useful function such as  
QoS (Quality of Service), Spanning Tree, VLAN, Port Trunking, Bandwidth  
Control, Port Security, SNMP/RMON, IGMP Snooping capability via the  
intelligent software. It is suitable for both metro-LAN and office application.  
General Features  
- 16 Gigabit Ethernet ports with non-blocking wire-speed performance  
- 16 tri-speed 10/100/1000 Mbps Gigabit Ethernet Media Access Controllers  
(MACs)  
- Eight tri-speed ( 10/100/1000 Mbps ) integrated copper transceivers  
( PHY’s)  
- Sixteen integrated SGMII ports  
- Buffer Memory 500K Bytes  
- 8,192 IP multicast groups supported  
- Jumbo frame support at all speed ( 10/100/1000 Mbps) of up to 9.6K bytes  
- Wire-speed automatic learning and CPU-based learning configurable per  
port  
- Support up to 24 trunks with up to 16 ports in a trunk  
Layer-2 Switching  
-
-
16 Giga Ethernet ports with non-blocking wire-speed performance  
8,192 MAC addresses with wire-speed automatic learning and  
CPU-based learning configurable per port  
-
Rapid Spanning Tree Protocol support ( IEEE std 802.1w)  
1
Download from Www.Somanuals.com. All Manuals Search And Download.  
-
-
Multiple Spanning Tree support ( IEEE std 802.1s )  
IGMP, GARP, GMRP, and GVRP support  
Quality of Service  
- Programmable multi-layer classifier with four QoS classes per port  
- Strict priority or weighted round-robin forwarding with guaranteed  
bandwidth allocation  
- Traffic class assignment based on port  
- DSCP ( IPv4 & IPv6) and 802.1p support  
- DSCP remarking for both IPv4 & IPv6 packets  
- Provide Bridge support with multiple VLAN tags ( Q-in Q)  
- Broadcast and multicast storm control  
- Full-duplex flow control ( IEEE 802.3x ) and half-duplex back pressure  
- Traffic shaping and policing per port in sites  
- Link aggregation support based on layer 2-4 information ( IEEE Std  
802.3ad)  
Security  
- Port-based access control support  
- 4,096 VLAN support  
- VLAN awareness on a per port basis  
- Independent and share VLAN learning  
- VLAN Q-in Q support (VLAN stacking )  
- Source IP filter per port to block unwanted access  
- Extensive snooping : BPDU, GARP, ARP, IPMC, IGMP, TCP/UDP  
- TCP/UDP filter for CPU copy/redirect, frame snooping and frame  
eradication  
- DHCP filter to block unwanted DHCP servers on a per-port basis  
- Multiple ARP filters for detection of ARP intrusion scans  
- Extensive storm control: broadcast, multicast, uni-cast, ICMP and CPU  
( ARP, BPDU) traffic control  
- Per port CPU based learning option  
- CPU mirroring per port and per VLAN  
2
Download from Www.Somanuals.com. All Manuals Search And Download.  
Specifications  
¾ Standard  
IEEE 802.3 10BaseT  
IEEE 802.3u 100BaseTX  
IEEE 802.ab 1000BaseT  
IEEE 802.3z 1000BaseSX/LX  
IEEE 802.3x Flow Control  
IEEE 802.3 Auto Negotiation  
IEEE 802.3 Auto-MDI/MDI-X  
IEEE 802.1ad Provider Bridge ( Q in Q )  
IEEE 802.1x Port-based Network Access Control  
IEEE 802.1Q VLAN Tagging  
IEEE 802.3ad Link Aggregation  
IEEE 802.1d Spanning tree protocol  
IEEE 802.1w Rapid Spanning tree protocol  
IEEE 802.1p Class of service, Priority Protocols  
IEEE 802.3af- 2003 Power over Ethernet  
IEEE 802.3at- 2009 Power over Ethernet  
¾ Number of Port  
16-port 10/100/1000BaseT(X) + 4 Gigabit SFP Open Slots  
¾ LEDs Indicator  
Per Port: Link/ Act, 1000M  
Per Unit: Power  
¾ Power Consumption: 130 Watts (Max)  
¾ Power Input: 100~240V/AC, 50~60HZ  
¾ Product Dimensions/ Weight  
45 × 330 × 440 mm (H × W ×D) / 4.4kg  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
Package Contents  
Before you start to install this switch, please verify your package that  
contains the following items:  
z One Switch  
z One Power Cord  
z One User Manual  
z One pair Rack-mount kit + 8 Screws  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
Hardware Description  
This part primarily presents hardware of the web-smart switch, physical  
dimensions and functional overview would be described.  
Physical Dimensions/ Weight  
45 × 440 × 330 mm (H × W × D) / 4.4KG  
Front Panel  
The front Panel of the web-smart Switch consists of 16 gigabit RJ-45 ports + 4  
gigabit SFP open slot. The LED Indicators are also located on the front panel.  
SFP ports for  
LED Display  
RJ-45 Port  
optical transceivers  
LED Indicators  
The LED Indicators present real-time information of systematic operation  
status. This table provides description of LED status and the meaning.  
Table 1-1 LED Indicators  
LED  
Status  
Description  
On  
Off  
Power on  
Disconnect from Power Source  
Reset button for 3 seconds  
Power  
Blink  
On  
Flashing  
Off  
Link  
Data activating  
No device is attached  
Port is linked to Power Device  
No Power Device is connected  
Link/ ACT  
PoE  
On  
Off  
Note: The SFP ports are shared with normal RJ-45 ports 1,2,3 and 4. The  
RJ-45 can not be used when SFP port link up.  
5
Download from Www.Somanuals.com. All Manuals Search And Download.  
Rear Panel  
The 3-pronged power plug is placed at the rear panel of the switch right side  
shown as below.  
Hardware Installation  
Set the switch on a large flat space with a power socket close by. The flat  
space should be clean, smooth, level and sturdy. Make sure there is enough  
clearance around the switch to allow attachment of cables, power cord and  
allow air circulation. The last, use twisted pair cable to connect this switch to  
your PC then user could start to operate the switch.  
6
Download from Www.Somanuals.com. All Manuals Search And Download.  
Software Description  
This part instructs user how to set up and manage the switch through the web  
user interface. Please follow the description to understand the procedure.  
At the first, open the web browser, and go to 192.168.2.1 site then the user will  
see the login screen. Key in the password to pass the authentication then  
clicks the Apply. The login process is completed and comes out the sign  
“Password successfully entered”.  
Login  
Password: 1234  
Figure 1-1  
7
Download from Www.Somanuals.com. All Manuals Search And Download.  
After the user login, the right side of website shows all functions as Fig. 1-2.  
Figure 1-2  
Configuration  
System  
System Configuration  
This page shows system configuration information. User can configure  
information as below:  
8
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 2-1  
¾ MAC Address: Displays the unique hardware address assigned by  
manufacturer (default).  
¾ S/W Version: Displays the switch’s firmware version.  
¾ H/W Version: Displays the switch’s Hardware version.  
¾ DHCP Enabled: Click the box to enable DHCP  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
¾ Fallback IP address: Manually assign the IP address that the network is  
using. The default IP is 192.168.2.1  
¾ Fallback Subnet Mask: Assign the subnet mask to the IP address  
¾ Fallback Gateway: Assign the network gateway for industrial switch. The  
default gateway is 0.0.0.0.  
¾ Management VLAN: ID of a configured VLAN (1-4094) through which you  
can manage the switch. By default, all ports on the switch are members of  
VLAN 1. However, if the management VLAN is changed, the management  
station must be attached to a port belonging to this VLAN.  
¾ Name: Type in the new user name (The default value is ‘admin’).  
¾ Password: Type in the new password (The default value is ‘admin’).  
¾ SNMP Enabled: Enables or disables SNMP on the switch. Supports SNMP  
version 1and 2c management clients.  
¾ SNMP Trap Destination: IP address of the trap manager to receive  
notification messages from this switch. Traps indicating status changes are  
issued by the switch to specified trap managers. You must specify trap  
managers so that key events are reported by this switch to your  
management station.  
¾ SNMP Read Community: A community string that acts like a password and  
permits access to the SNMP database on this switch. Authorized  
management stations are only able to retrieve MIB objects.  
¾ SNMP Trap Community: Community string sent with the notification  
operation.  
Ports  
Port configuration ensures access to a switch port based on MAC address,  
limits the total number of devices from using a switch port and protects  
against MAC flooding attacks.  
Port Configuration  
In Port Configuration, you can set and view the operation mode for each port.  
¾ Enable Jumbo Frames: This switch provides more efficient throughput for  
large sequential data transfers by supporting jumbo frames on Gigabit  
Ethernet ports up to 9216 bytes. Compared to standard Ethernet frames  
that run only up to 1.5 KB, using jumbo frames significantly reduces the  
per-packet overhead required to process protocol encapsulation fields.  
10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
¾ Power Saving Mode: Adjusts the power provided to ports based on the  
length of the cable used to connect to other devices. Only sufficient power is  
used to maintain connection requirements.  
¾ Mode: allow user to manually set the port speed such as Auto, 10 half, 10  
Full, 100 Half, 100 Full, 1000 Full or Disabled. User may press Apply button  
to complete the configuration procedure.  
Figure 2-2  
Vlan  
A Virtual LAN (VLAN) is a logical network grouping that limits the broadcast  
domain, which would allow you to isolate network traffic, so only the members  
of the same VLAN will receive traffic from the ones of the same VLAN.  
Basically, creating a VLAN from a switch is logically equivalent of reconnecting  
a group of network devices to another Layer 2 switch. However, all the network  
devices are still plugged into the same switch physically.  
Port Segmentation (VLAN) Configuration  
¾ VLAN ID: ID of configured VLAN (1-4094, no leading zeroes).  
¾ VLAN Configuration List: Lists all the current VLAN groups created for this  
system. Up to 64 VLAN groups can be defined. VLAN 1 is the default  
untagged VLAN.  
11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 2-3  
Aggregation  
Port trunk allows multiple links to be bundled together and act as a single  
physical link for increased throughput. It provides load balancing, and  
redundancy of links in a switched inter-network. Actually, the link does not  
have an inherent total bandwidth equal to the sum of its component physical  
links. Traffic in a trunk is distributed across an individual link within the trunk in  
a deterministic method that called a hash algorithm. The hash algorithm  
automatically applies load balancing to the ports in the trunk. A port failure  
within the trunk group causes the network traffic to be directed to the remaining  
ports. Load balancing is maintained whenever a link in a trunk is lost or  
returned to service.  
Aggregation / Trunking Configuration  
To assign a port to a trunk, click the required trunk number, then click Apply.  
Figure 2-4  
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LACP  
IEEE 802.3ad Link Aggregation Control Protocol (LACP) increases bandwidth  
by automatically aggregating several physical links together as a logical trunk  
and providing load balancing and fault tolerance for uplink connections.  
LACP Port Configuration  
¾ Port: The port number.  
¾ Enabled: Enables LACP on the associated port.  
¾ Key Value: Configures a port's LACP administration key. The port  
administrative key must be set to the same value for ports that belong to the  
same link aggregation group (LAG). If this administrative key is not set when  
an LAG is formed (i.e., it has the null value of 0), this key will automatically  
be set to the same value as that used by the LAG.  
Figure 2-5  
13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
RSTP  
IEEE 802.1w Rapid Spanning tree protocol (LACP) provides a loop-free  
network and redundant links to the core network with rapid convergence to  
ensure faster recovery from failed links, enhancing overall network stability  
and reliability.  
RSTP System Configuration  
¾ System Priority: This parameter configures the spanning tree priority  
globally for this switch. The device with the highest priority becomes the  
STP root device. However, if all devices have the same priority, the device  
with the lowest MAC address will then become the root device. Number  
between 0 - 61440 in increments of 4096. Therefore, there are 16 distinct  
values.  
¾ Hello Time: Interval (in seconds) at which the root device transmits a  
configuration message (BPDU frame). Number between 1-10 (default is 2).  
¾ Max Age – The maximum time (in seconds) a device can wait without  
receiving a configuration message before attempting to reconfigure. That  
also means the maximum life time for a BPDU frame. Number between 6-40  
(default is 20).  
¾ Forward Delay: The maximum time (in seconds) the root device will wait  
before changing states (i.e., discarding to learning to forwarding). Number  
between 4 – 30 (default is 15).  
¾ Force Version: Set and show the RSTP protocol to use. Normal - use RSTP,  
Compatible - compatible with STP.  
Figure 2-6-1  
14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
RSTP Port Configuration  
¾ Port: The port ID. It cannot be changed. Aggregations mean any configured  
trunk group.  
¾ Enabled: Click on the tick-box to enable/disable the RSTP protocol for the  
port.  
¾ Edge: Expect the port to be an edge port (linking to an end station) or a link  
to another STP device.  
¾ Path Cost: This parameter is used by the STP to determine the best path  
between devices. Therefore, lower values should be assigned to ports  
attached to faster media, and higher values assigned to ports with slower  
media. Set the RSTP pathcost on the port. Number between 0 - 200000000.  
0 means auto generated pathcost.  
802.1X Configuration  
IEEE802.1X provides a security standard for network access control, specially  
in Wi-Fi wireless networks. 802.1x holds a network port disconnected until  
authentication is completed. The switch uses Extensible Autentication Protocol  
over LANS to exchange authentication protocol client identity with the client,  
15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
and forward it to another remote RADIUS authentication server to verify  
access rights. The EAP packet from the RADIUS server also contain the  
authentication method to be used. The client can reject the authentication  
method and request another, depending on the configuration of the client  
software and the RADIUS server. Depending on the authenticated results, the  
port is either made available to the user, or the user is denied access to the  
network.  
The RADIUS servers make the network a lot easier to manage for the  
administrator by gathering and storing the user lists.  
By default, 802.1x is disabled. To use EAP for security, select enabled and set  
the 802.1X Global Settings for the Radius Server and applicable authentication  
information.  
RADIUS server IP: The IP ADDRESS OF THE EXTERNAL Radius Server, you  
need to specify an RADIUS server to enable 802.1s authentication.  
IGMP Snooping  
IGMP Snooping is the process of listening to IGMP network traffic. IGMP  
Snooping, as implied by the name, is a feature that allows a layer 2 switch to  
“listen in” on the IGMP conversation between hosts and routers by processing  
the layer3 IGMP packets sent in a multicast network.  
When IGMP Snooping is enabled in a switch it analyzes all IGMP packets  
16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
between hosts connected to the switch and multicast routers in the network.  
When a switch hears an IGMP report from a host for a given multicast group,  
the switch adds the host’s port number to the multicast list for that group. And,  
when the switch hears an IGMP Leave, it removes the host’s port from the  
table entry.  
Prevents flooding of IP multicast traffic, and limits bandwidth intensive video  
traffic to only the subscribers.  
IGMP Configuration  
¾ IGMP Enabled: When enabled, the switch will monitor network traffic to  
determine which hosts want to receive multicast traffic.  
¾ Router Ports: Set if ports are connecting to the IGMP administrative routers.  
¾ Unregistered IPMC Flooding enabled: Set the forwarding mode for  
unregistered (not-joined) IP multicast traffic. The traffic will flood when  
enabled, and forward to router-ports only when disabled.  
¾ IGMP Snooping Enabled: When enabled, the port will monitor network  
traffic to determine which hosts want to receive the multicast traffic.  
¾ IGMP Querying Enabled: When enabled, the port can serve as the Querier,  
which is responsible for asking hosts if they want to receive multicast traffic.  
Figure 2-7  
Mirroring  
Port Mirroring is used on a network switch to send a copy of network packets  
seen on one switch port (or an entire VLAN) to a network monitoring  
connection on another switch port. This is commonly used for network  
appliances that require monitoring of network traffic, such as an  
intrusion-detection system.  
Mirroring Configuration  
17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
¾ Port to Mirror to: The port that will “duplicate” or “mirror” the traffic on the  
source port. Only incoming packets can be mirrored. Packets will be  
dropped when the available egress bandwidth is less than ingress  
bandwidth.  
¾ Ports to Mirror: Select the ports that you want to mirror from this section of  
the page. A port will be mirrored when the “Mirroring Enabled” check-box is  
checked.  
Figure 2-8  
QoS  
In QoS Mode, select QoS Disabled, 802.1p, or DSCP to configure the related  
parameters.  
QoS Configuration  
¾ Strict: Services the egress queues in sequential order, transmitting all traffic  
in the higher priority queues before servicing lower priority queues.  
¾ WRR: Weighted Round-Robin shares bandwidth at the egress ports by  
using scheduling weights with default values of 1, 2, 4, 8 for queues 0  
through 7, respectively. (This is the default selection.)  
Note: WRR can only be selected if Jumbo Frame mode is disabled on the  
Port Configuration page  
18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 2-9-1  
QoS Mode: QoS Disabled  
When the QoS Mode is set to QoS Disabled, the following table is displayed.  
QoS Mode: 802.1p  
Packets are prioritized using the 802.1p field in the VLAN tag. This field is  
three bits long, representing the values 0 - 7. When the QoS Mode is set to  
802.1p, the 802.1p Configuration table appears, allowing you to map each of  
the eight 802.1p values to a local priority queue (low, normal, medium or high).  
The default settings are shown below.  
When the QoS Mode is set to 802.1p, the 802.1p Configuration table is  
displayed as shown below.  
Figure 2-9-2  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
QoS Mode: DSCP  
DSCP: Packets are prioritized using the DSCP (Differentiated Services Code  
Point) value. The Differentiated Services Code Point (DSCP) is a six-bit field  
that is contained within an IP (TCP or UDP) header. The six bits allow the  
DSCP field to take any value in the range 0 - 63. When QoS Mode is set to  
DSCP, the DSCP Configuration table is displayed, allowing you to map each of  
the DSCP values to a hardware output queue (low, normal, medium or high).  
The default settings map all DSCP values to the high priority egress queue.  
User can use the Prioritize Traffic drop-down list to quickly set the values in the  
DSCP Configuration table to a common priority queue. Use Custom if you  
want to set each value individually.  
When the QoS Mode is set to DSCP, the DSCP Configuration table is  
displayed as shown below.  
Figure 2-9-4  
20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 2-9-5  
Filter Configuration  
There are 3 mode that you can choice for filter configuration:  
Disabled: this mode is protected from potential threats like hackers, if the traffic  
from illegal MAC addresses will not be forwarded by the switch.  
Static: This table displays the static MAC addresses connected, as well as the  
VID  
DHCP:  
Figure 2-10  
21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PoE (Power over Ethernet) Configuration  
PoE technology is a system to pass electrical power safely, along with data, on  
Ethernet cabling. Power is supplied in common mode over two or more of the  
differential pairs of wires found in the Ethernet cables and comes from a power  
supply within a PoE enabled networking devise such as Switch or can be  
injected into a cable run with a midspan power supply.  
This figure shows all the PoE ‘s status when connect or disconnect to the PD  
devise.  
¾ PoE Enabled: POE of the port is able to supply power to the attached PD  
(Powered Device)  
¾ PD Class: Detect the class of PD  
¾ Delivering Power (W): Output power.  
¾ Current (mA): The status of the port current  
¾ Power output voltage per port  
¾ Power Budget Percentage of PoE power has been used  
22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Rate Limit Configuration  
Type of Port: You can define the certain port as Policer and Shaper before you  
set up the rate limit.  
No Limit: This drop-down menu allows you to specify that the selected port  
will have no bandwidth limit.  
Rate Limit: There is also allow you to enter the data rate, in Kbits per second,  
this can limit for the selected port. The value is between 128kbps – 3968kbps.  
Figure 2-11  
Storm Control  
Broadcast storms may occur when a device on your network is malfunctioning,  
or if application programs are not well designed or properly configured. If there  
is too much broadcast traffic on your network, performance can be severely  
degraded or everything can come to complete halt.  
You can protect your network from broadcast storms by setting a threshold for  
broadcast traffic for each port. Any broadcast packets exceeding the specified  
threshold will then be dropped.  
Storm Control Configuration  
There are three type of traffic which can be rate limited, including broadcast  
multicast frame and Flooded Uncast Rate.  
23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 2-12-1  
¾ Enable Rate Limit: Click the check box to enable storm control.  
¾ Rate (number of frames per second): The Rate field is set by a single  
drop-down list. The same threshold is applied to every port on the switch.  
When the threshold is exceeded, packets are dropped, irrespective of the  
flow-control settings.  
¾ Web: Click PORTS, Storm Control. This page enables you to set the  
broadcast storm control parameters for every port on the switch.  
Figure 2-12-2  
24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Monitorning  
Statistic Overview  
Statistic Overview for all ports  
User can mirror traffic from any source port to a target port for real-time  
analysis the following figures shows clearly the statistics overview.  
Figure 3-1  
Detailed Statics  
To view the statistics of individual ports, click one of the linked port numbers for  
details.  
Clear: To renew the details collected and displayed.  
Refresh: To reset the details displayed.  
Figure 3-2  
LACP Status  
LACP Aggregation Overview  
LACP allows for the automatic detection of links in a Port Trunking Group  
25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 3-3-1  
¾ Port: The port number.  
¾ Port Active: Shows if the port is a member of an active LACP group.  
¾ Partner Port Number: A list of the ports attached at the remote end of this  
LAG link member.  
¾ Operational Port Key: Current operational value of the key used by this  
LAG.  
LACP Port Status  
Active LACP ports are capable of processing and sending LACP control  
frames. This allows LACP compliant devices to negotiate the aggregated link  
so the group may be changed dynamically as needs requires.  
Figure 3-3-2  
26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
RSTP Status  
RSTP VLAN Bridge Overview  
Figure 3-4  
¾ Hello Time: Interval (in seconds) at which the root device transmits a  
configuration message.  
¾ Max Age: The maximum time (in seconds) a device can wait without  
receiving a configuration message before attempting to reconfigure. All  
device ports (except for designated ports) should receive configuration  
messages at regular intervals. Any port that age out STA information  
(provided in the last configuration message) becomes the designated port  
for the attached LAN. If it is a root port, a new root port is selected from  
among the device ports attached to the network.  
¾
¾
Fwd Delay: The maximum time (in seconds) the root device will wait before  
changing states (i.e., discarding to learning to forwarding). This delay is  
required because every device must receive information about topology  
changes before it starts to forward frames. In addition, each port needs time  
to listen for conflicting information that would make it return to a discarding  
state; otherwise, temporary data loops might result.  
Topology: Indicates if spanning tree topology is steady or undergoing  
reconfiguration. (The time required for reconfiguration is extremely short, so  
no values other that “steady” state are likely to be seen in this field.)  
27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
¾
Root ID : The priority and MAC address of the device in the Spanning Tree  
that this switch has accepted as the root device, and the port connected to  
the root device.  
RSTP Port Status  
¾ Port/Group: The number of a port or the ID of a static trunk.  
¾ Path Cost: The cost for a packet to travel from this port to the root in the  
current Spanning Tree configuration. The slower the media, the higher the  
cost.  
¾ Edge Port: Shows if this port is functioning as an edge port, either through  
¾ manual selection (see the RSTP Port Configuration table) or auto-detection.  
Note that if the switch detects another bridge connected to this port, the  
manual setting for Edge Port will be overridden, and the port will instead  
function as a point-to-point connection.  
¾ P2P Port: Shows if this port is functioning as a Point-to-Point connection to  
exactly one other bridge. The switch can automatically determine if the  
interface is attached to a point-to-point link or to shared media. If shared  
media is detected, the switch will assume that it is connected to two or more  
bridges.  
¾ Protocol: Shows the spanning tree protocol functioning on this port, either  
RSTP or STP (that is, STP-compatible mode).  
IGMP Status  
IGMP Status  
IGMP Status shows the IGMP Snooping statistics for the whole switch.  
¾ VLAN ID: VLAN ID number.  
¾ Querier: Show whether Querying is enabled.  
¾ Queries transmitted: Show the number of transmitted Query packets.  
¾ Queries received: Show the number of received Query packets.  
¾ v1 Reports: Show the number of received v1 Report packets.  
¾ v2 Reports: Show the number of received v2 Report packets.  
¾ v3 Reports: Show the number of received v2 Report packets.  
¾ v3 Leave: Show the number of v3 leave packets received.  
28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 3-5  
VeriPHY  
VeriPHY Cable Diagnostics  
User can perform cable diagnostics for all ports or selected ports to diagnose  
any cable faults (short, open etc..) and feedback a distance to the fault.  
¾ Cable Diagnostics: Cable diagnostics is performed on a per-port basis.  
Select the port number from the drop-down list.  
¾ Cable Status: Shows the cable length, operating conditions and isolates a  
variety of common faults that can occur on Category 5 twisted pair cabling.  
Figure 3-6  
Ping  
This command sends ICMP echo request packets to another node on the  
network.  
Ping Parameters  
¾ Target IP Address: IP address of the host  
¾ Count: Number of packets to send. (Range: 1-20)  
¾ Time Out: setting the time period of host will be Ping  
Use the ping command to see if another site on the network can be reached.  
29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
The following are some results of the ping command:  
¾ Normal response: The normal response occurs in one to ten seconds,  
depending on network traffic.  
¾ Destination does not respond: If the host does not respond, a “timeout”  
appears in ten seconds.  
¾ Destination unreachable: The gateway for this destination indicates that  
the destination is unreachable.  
¾ Network or host unreachable: The gateway found no corresponding entry  
in the route table.  
Press <Esc> to stop pinging.  
Figure 3-7-1  
30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 3-7-2  
Figure 3-7-3  
Maintenance  
Warm Restart  
Press Yes button to restart the switch, the reset will be complete when the  
power lights stop blinking.  
31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 4-1  
Factory Default  
Forces the switch to restore the original factory settings. To reset the switch,  
select “Reset to Factory Defaults” from the drop-down list and click Apply. The  
LAN IP Address, Subnet Mask and Gateway IP Address will be reset to their  
factory  
Figure 4-2  
Software upload  
Select “Upgrade Firmware” from the Tools drop-down list then click on the  
“Browse” button to select the firmware file. Click the APPLY button to upgrade  
the selected switch firmware file. User can download firmware files for user’s  
switch from the Support section of your local supplier.  
Figure 4-3  
Configuration File Transfer  
Configuration file transfer allows you to save the switch’s current configuration  
or restore a previously saved configuration back to the device. Configuration  
files can be saved to any location on the web management station. To upload  
the configuration file to save a configuration or "Download" to restore a  
configuration. Use the Browse button to choose a file location on the web  
management station, or to find a saved configuration file.  
32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure43-4  
Logout  
The administrator has write access for all parameters governing the onboard  
agent. User should therefore assign a new administrator password as soon as  
possible, and store it in a safe place.  
Figure 4-5  
33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Reset button for the factory default setting  
Please take the following steps to reset the Web Smart Switch back to the  
original default:  
Step 1:  
Turn on the Web Smart Switch  
Step 2:  
Press and hold the reset button continuously for 5 seconds and release the  
reset button.  
Step 3:  
The switch will reboot for 20 seconds and the configuration of switch will back  
to the default setting.  
34  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Craftsman Offroad Vehicle A2006ABH4AUSG User Manual
Dukane Projector 28A8910 User Manual
Dynex Camera Accessories DX SW040 User Manual
Edimax Technology Network Card EW 7206Apg User Manual
EverFocus Home Security System EBH5241 User Manual
Extron electronic Stereo Receiver VS50 SL User Manual
Fujitsu Laptop A3040 User Manual
Garland Griddle CG 24 User Manual
Gefen Network Card GTV DIGAUD 2 AAUD User Manual
GE Monogram Trash Compactor ZCG3100VBB User Manual