Amsgr24w4 M
Amsgr24w4 M
User’s Guide
Release 1.05
Trademarks
Copyright ©2007 Amer.com.
Contents subject to change without prior notice.
Copyright Statement
No part of this publication may be reproduced in any form or by any means or used to make
any derivative such as translation, transformation, or adaptation without permission, as
stipulated by the United States Copyright Act of 1976.
ii
Table of Contents
CAUTION ............................................................................................................................................ VI
ELECTRONIC EMISSION NOTICES ..................................................................................................... VI
1. INTRODUCTION.....................................................................................................................2
1-1. OVERVIEW OF 24-PORT GBE WEB SMART SWITCH ..................................................................2
1-2. CHECKLIST ..................................................................................................................................3
1-3. FEATURES....................................................................................................................................3
1-4. VIEW OF 24-PORT GBE WEB SMART SWITCH ...........................................................................5
1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs) ..........................5
1-4-2. User Interfaces on the Rear Panel.....................................................................6
1-5. VIEW OF THE OPTIONAL MODULES .............................................................................................7
2. INSTALLATION ......................................................................................................................8
2-1. STARTING 24-PORT GBE WEB SMART SWITCH UP ...................................................................8
2-1-1. Hardware and Cable Installation ........................................................................8
2-1-2. Cabling Requirements........................................................................................9
2-1-3. Configuring the Management Agent of the Switch...........................................14
2-1-4. IP Address Assignment ....................................................................................16
2-2. TYPICAL APPLICATIONS .............................................................................................................21
3. BASIC CONCEPT AND MANAGEMENT.........................................................................23
3-1. WHAT’S THE ETHERNET ............................................................................................................23
3-2. MEDIA ACCESS CONTROL (MAC).............................................................................................26
3-3. FLOW CONTROL ........................................................................................................................32
3-4. HOW DOES A SWITCH WORK?....................................................................................................35
3-5. VIRTUAL LAN ............................................................................................................................39
3-6. LINK AGGREGATION ...................................................................................................................45
4. OPERATION OF WEB-BASED MANAGEMENT ...................................................................47
4-1. WEB MANAGEMENT HOME OVERVIEW .....................................................................................48
4-2. CONFIGURATION ........................................................................................................................50
4-2-1. System Configuration.......................................................................................51
4-2-2. Port Configuration ............................................................................................54
4-2-3. VLAN Mode Configuration ...............................................................................55
4-2-4. VLAN Group Configuration ..............................................................................56
4-2-5. Aggregation ......................................................................................................59
4-2-6. LACP ................................................................................................................60
4-2-7. RSTP................................................................................................................61
4-2-8. 802.1X ..............................................................................................................63
4-2-9 IGMP Snooping .................................................................................................70
Fig. 4-19 IGMP Configuration .....................................................................................70
4-2-10. Mirror Configuration .......................................................................................71
4-2-11. QoS(Quality of Service) Configuration ...........................................................72
4-2-12 Filter ................................................................................................................75
Fig. 4-24 Filter Configuration ......................................................................................76
4-2-13 Rate Limit ........................................................................................................77
Fig. 4-25 Rate Limit Configuration..............................................................................77
4-2-14 Storm Control ..................................................................................................78
Fig.4-26 Storm Control Configuration.........................................................................78
4-2-15 SNMP ..............................................................................................................80
4-3. MONITORING..............................................................................................................................82
4-3-1. Statistics Overview ...........................................................................................82
4-3-2. Detailed Statistics .............................................................................................84
iii
4-3-3. LACP Status .....................................................................................................87
4-3-4. RSTP Status.....................................................................................................88
4-3-5. IGMP Status .....................................................................................................90
4-3-6. Ping Status .......................................................................................................91
4-4. MAINTENANCE ...........................................................................................................................93
4-4-1. Warm Restart ...................................................................................................94
4-4-2. Factory Reset . .................................................................................................95
4-4-3. Software Upgrade ............................................................................................96
4-4-4. Configuration File Transfer ...............................................................................97
Fig. 4-37 Configuration Upload/Download .................................................................97
5. Trouble Shooting.........................................................................................................................99
5-1. RESOLVING NO LINK CONDITION ..............................................................................................99
5-2. Q&A ..........................................................................................................................................99
APPENDIX A TECHNICAL SPECIFICATIONS ..........................................................................100
APPENDIX B MIB SPECIFICATIONS...........................................................................................104
iv
Revision History
v
Caution
Circuit devices are sensitive to static electricity, which can damage their delicate
electronics. Dry weather conditions or walking across a carpeted floor may cause you to
acquire a static electrical charge.
To protect your device, always:
• Touch the metal chassis of your computer to ground the static electrical charge before
you pick up the circuit device.
• Pick up the device by holding it on the left and right edges only.
vi
About this user’s manual
This user’s manual provides instructions on how to install your Web Smart Switch.
This guide also covers management options and detailed explanation about
hardware and software functions.
1. Introduction
1-1. Overview of 24-Port GbE Web Smart Switch
The 24-port Gigabit Web Smart Switch is a standard switch that meets all IEEE
802.3/u/x/z Gigabit, Fast Ethernet specifications. The switch has 20
10/100/1000Mbps TP ports and 4 Gigabit TP/SFP transceiver slots. It supports
console, telnet, http and SNMP interface for switch management. The network
administrator can logon the switch to monitor, configure and control each port’s
activity. In addition, the switch implements the QoS (Quality of Service), VLAN, and
Trunking. It is suitable for office application.
In this switch, Port 21, 22, 23, 24 includes two types of media --- TP and SFP
Fiber (LC, BiDi-SC…); this port supports 10/100/1000Mbps TP or 1000Mbps SFP
Fiber with auto-detected function. 1000Mbps SFP Fiber transceiver is used for high-
speed connection expansion.
⎯ 1000Mbps LC, Multi-Mode, SFP Fiber transceiver
⎯ 1000Mbps LC, 10km, SFP Fiber transceiver
⎯ 1000Mbps LC, 30km, SFP Fiber transceiver
⎯ 1000Mbps LC, 50km, SFP Fiber transceiver
⎯ 1000Mbps BiDi-SC, 20km, 1550nm SFP Fiber WDM transceiver
1000Mbps BiDi-SC, 20km, 1310nm SFP Fiber WDM transceiver
2
User Manual
1-2. Checklist
Before you start installing the switch, verify that the package contains the
following:
⎯ A 24-Port GbE Web Smart Switch
⎯ Modules (optional)
⎯ Mounting Accessory (for 19” Rack Shelf)
⎯ This User's Manual in CD-ROM
⎯ AC Power Cord
1-3. Features
The 24-Port GbE Web Smart Switch, a standalone off-the-shelf switch,
provides the comprehensive features listed below for users to perform system
network administration and efficiently and securely serve your network.
• Hardware
• 20 10/100/1000Mbps Auto-negotiation Gigabit Ethernet TP ports
• 4 10/100/1000Mbps TP or 1000Mbps SFP Fiber dual media auto sense
• 400KB on-chip frame buffer
• Jumbo frame support
• Programmable classifier for QoS (Layer 2/Layer 3)
• 8K MAC address and support VLAN ID (1~4094)
• Per-port shaping, policing, and Broadcast Storm Control
• IEEE802.1Q-in-Q nested VLAN support
• Full-duplex flow control (IEEE802.3x) and half-duplex backpressure
• Extensive front-panel diagnostic LEDs; System: Power, TP Port1-24: LINK/ACT,
10/100/1000Mbps, SFP Port 21, 22, 23,24: SFP(LINK/ACT)
• Management
3
User Manual
4
User Manual
1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs)
There are 24 TP Gigabit Ethernet ports and 4 SFP fiber ports for optional
removable modules on the front panel of the switch. LED display area, locating on
the left side of the panel, contains a Power LED, which indicates the power status
and 24 ports working status of the switch.
• LED Indicators
5
User Manual
1000SX/LX Gigabit Fiber Port 21, 22, 23, 24 LED
Lit when SFP connection with remote device is
SFP(LINK/ACT) Green good
Blinks when any traffic is present
Table1-1
• RESET Button
RESET button is used to restore the system default setting.
6
User Manual
7
User Manual
2. Installation
2-1. Starting 24-Port GbE Web Smart Switch Up
This section describes how to install the Web Smart Switch and its components,
and it includes the following information:
- Hardware and Cable Installation
- Management Station Installation
- Software booting and configuration
8
User Manual
⇒ Use Cat. 5 grade RJ-45 TP cable to connect to a TP port of the switch and the
other end is connected to a network-aware device such as a workstation or a
server.
⇒ Repeat the above steps, as needed, for each RJ-45 port to be connected to a
Gigabit 10/100/1000 TP device.
• Power On
The switch supports 100-240 VAC, 50-60 Hz power supply. The power
supply will automatically convert the local AC power source to DC power. It does not
matter whether any connection plugged into the switch or not when power on, even
modules as well. After the power is on, all LED indicators will light up and then all off
except the power LED still keeps on. This represents a reset of the system.
• Firmware Loading
After resetting, the bootloader will load the firmware into the memory. It will
take about 30 seconds, after that, the switch will flash all the LED once and
automatically performs self-test and is in ready state.
9
User Manual
2-1-2-1. Cabling Requirements for TP Ports
The following table lists the types of fiber that we support and those else not
listed here are available upon request.
Table2-1
10
User Manual
2-1-2-3. Switch Cascading in Topology
The fiber, TP cables and devices’ bit-time delay (round trip) are as follows:
Table 2-2
Sum up all elements’ bit-time delay and the overall bit-time delay of
wires/devices must be within Round Trip Delay (bit times) in a half-duplex network
segment (collision domain). For full-duplex operation, this will not be applied. You
may use the TP-Fiber module to extend the TP node distance over fiber optic and
provide the long haul connection.
11
User Manual
Case1: All switch ports are in the same local area network. Every port can access
each other (See Fig. 2-2).
If VLAN is enabled and configured, each node in the network that can
communicate each other directly is bounded in the same VLAN area.
Here VLAN area is defined by what VLAN you are using. The switch
supports both port-based VLAN and tag-based VLAN. They are different in practical
deployment, especially in physical location. The following diagram shows how it
works and what the difference they are.
12
User Manual
Case 2b: Port-based VLAN (See Fig.2-4).
1. VLAN1 members could not access VLAN2, VLAN3 and VLAN4 members.
2. VLAN2 members could not access VLAN1 and VLAN3 members, but they could
access VLAN4 members.
3. VLAN3 members could not access VLAN1, VLAN2 and VLAN4.
4. VLAN4 members could not access VLAN1 and VLAN3 members, but they could
access VLAN2 members.
Case3a: The same VLAN members can be at different switches with the same VID
(See Fig. 2-5).
13
User Manual
2-1-3. Configuring the Management Agent of the Switch
In the way of web, user is allowed to startup the switch management function.
Users can use any one of them to monitor and configure the switch. You can touch
them through the following procedures.
Section 2-1-3-1: Configuring Management Agent of the Switch through Ethernet
Port
14
User Manual
2-1-3-1. Management through Ethernet Port
There are two ways to configure and monitor the switch through the switch’s
Ethernet port. They are Web browser and SNMP manager. We just introduce the
first type of management interface. Web-based UI for the switch is an interface in a
highly friendly way.
Fig. 2-6
Before start using the switch, the IP address setting of the switch should be
done, then perform the following steps:
15
User Manual
IP address:
The address of the network device in the network is used for internetworking
communication. Its address structure looks is shown in the Fig. 2-8. It is “classful”
because it is split into predefined address classes or categories.
Each class has its own network range between the network identifier and
host identifier in the 32 bits address. Each IP address comprises two parts: network
identifier (address) and host identifier (address). The former indicates the network
where the addressed host resides, and the latter indicates the individual host in the
network which the address of host refers to. And the host identifier must be unique
in the same LAN. Here the term of IP address we used is version 4, known as IPv4.
32 bits
16
User Manual
With the classful addressing, it divides IP address into three classes, class A,
class B and class C. The rest of IP addresses are for multicast and broadcast. The
bit length of the network prefix is the same as that of the subnet mask and is
denoted as IP address/X, for example, 192.168.1.0/24. Each class has its address
range described below.
Class A:
Address is less than 126.255.255.255. There are a total of 126 networks can
be defined because the address 0.0.0.0 is reserved for default route and
127.0.0.0/8 is reserved for loopback function.
Bit # 0 1 78 31
Class B:
IP address range between 128.0.0.0 and 191.255.255.255. Each class B
network has a 16-bit network prefix followed 16-bit host address. There are 16,384
(2^14)/16 networks able to be defined with a maximum of 65534 (2^16 –2) hosts
per network.
Bit # 01 2 15 16 31
10
Class C:
IP address range between 192.0.0.0 and 223.255.255.255. Each class C
network has a 24-bit network prefix followed 8-bit host address. There are
2,097,152 (2^21)/24 networks able to be defined with a maximum of 254 (2^8 –2)
hosts per network.
Bit # 0 1 2 3 23 24 31
110
17
User Manual
Class D and E:
Class D is a class with first 4 MSB (Most significance bit) set to 1-1-1-0 and
is used for IP Multicast. See also RFC 1112. Class E is a class with first 4 MSB set
to 1-1-1-1 and is used for IP broadcast.
According to IANA (Internet Assigned Numbers Authority), there are three
specific IP address blocks reserved and able to be used for extending internal
network. We call it Private IP address and list below:
Please refer to RFC 1597 and RFC 1466 for more information.
Subnet mask:
It means the sub-division of a class-based network or a CIDR block. The
subnet is used to determine how to split an IP address to the network prefix and the
host address in bitwise basis. It is designed to utilize IP address more efficiently and
ease to manage IP network.
For a class B network, 128.1.2.3, it may have a subnet mask 255.255.0.0 in
default, in which the first two bytes is with all 1s. This means more than 60
thousands of nodes in flat IP address will be at the same network. It’s too large to
manage practically. Now if we divide it into smaller network by extending network
prefix from 16 bits to, say 24 bits, that’s using its third byte to subnet this class B
network. Now it has a subnet mask 255.255.255.0, in which each bit of the first
three bytes is 1. It’s now clear that the first two bytes is used to identify the class B
network, the third byte is used to identify the subnet within this class B network and,
of course, the last byte is the host number.
Not all IP address is available in the sub-netted network. Two special
addresses are reserved. They are the addresses with all zero’s and all one’s host
number. For example, an IP address 128.1.2.128, what IP address reserved will be
looked like? All 0s mean the network itself, and all 1s mean IP broadcast.
128.1.2.128/25
Network Subnet
10000000.00000001.00000010.1 0000000
25 bits
18
User Manual
In this diagram, you can see the subnet mask with 25-bit long,
255.255.255.128, contains 126 members in the sub-netted network. Another is that
the length of network prefix equals the number of the bit with 1s in that subnet mask.
With this, you can easily count the number of IP addresses matched. The following
table shows the result.
Prefix Length No. of IP matched No. of Addressable IP
/32 1 -
/31 2 -
/30 4 2
/29 8 6
/28 16 14
/27 32 30
/26 64 62
Table 2-3
19
User Manual
For different network applications, the subnet mask may look like
255.255.255.240. This means it is a small network accommodating a maximum of
15 nodes in the network.
Default gateway:
For the routed packet, if the destination is not in the routing table, all the
traffic is put into the device with the designated IP address, known as default router.
Basically, it is a routing policy.
For assigning an IP address to the switch, you just have to check what the IP
address of the network will be connected with the switch. Use the same network
address and append your host address to it.
Fig. 2-9
First, IP Address: as shown in the Fig. 2-9, enter “192.168.1.1”, for instance.
For sure, an IP address such as 192.168.1.x must be set on your PC.
Second, Subnet Mask: as shown in the Fig. 2-9, enter “255.255.255.0”. Any
subnet mask such as 255.255.255.x is allowable in this case.
20
User Manual
Central Site
Fig. 2-10 Network Connection between Remote Site and Central Site
Fig. 2-10 illustrates how the switches and the various devices form the
network infrastructure in a large-scale network.
21
User Manual
22
User Manual
Fig. 3-1 IEEE 802.3 reference model vs. OSI reference mode
In Fig. 3-1, we can see that Ethernet locates at the Data Link layer and
Physical layer and comprises three portions, including logical link control (LLC),
media access control (MAC), and physical layer. The first two comprises Data link
layer, which performs splitting data into frame for transmitting, receiving
acknowledge frame, error checking and re-transmitting when not received correctly
as well as provides an error-free channel upward to network layer.
23
User Manual
Coaxial/STP/UTP Fiber
This above diagram shows the Ethernet architecture, LLC sub-layer and
MAC sub-layer, which are responded to the Data Link layer, and transceivers, which
are responded to the Physical layer in OSI model. In this section, we are mainly
describing the MAC sub-layer.
Data link layer is composed of both the sub-layers of MAC and MAC-client.
Here MAC client may be logical link control or bridge relay entity.
Logical link control supports the interface between the Ethernet MAC and
upper layers in the protocol stack, usually Network layer, which is nothing to do with
the nature of the LAN. So it can operate over other different LAN technology such
as Token Ring, FDDI and so on. Likewise, for the interface to the MAC layer, LLC
defines the services with the interface independent of the medium access
technology and with some of the nature of the medium itself.
24
User Manual
The table 3-1 is the format of LLC PDU. It comprises four fields, DSAP, SSAP,
Control and Information. The DSAP address field identifies the one or more service
access points, in which the I/G bit indicates it is individual or group address. If all bit
of DSAP is 1s, it’s a global address. The SSAP address field identifies the specific
services indicated by C/R bit (command or response). The DSAP and SSAP pair
with some reserved values indicates some well-known services listed in the table
below.
0xAAAA SNAP
0xE0E0 Novell IPX
0xF0F0 NetBios
0xFEFE IOS network layer PDU
0xFFFF Novell IPX 802.3 RAW packet
0x4242 STP BPDU
0x0606 IP
0x9898 ARP
Table 3-2
25
User Manual
MAC Addressing
Because LAN is composed of many nodes, for the data exchanged among
these nodes, each node must have its own unique address to identify who should
send the data or should receive the data. In OSI model, each layer provides its own
mean to identify the unique address in some form, for example, IP address in
network layer.
The MAC is belonged to Data Link Layer (Layer 2), the address is defined to
be a 48-bit long and locally unique address. Since this type of address is applied
only to the Ethernet LAN media access control (MAC), they are referred to as MAC
addresses.
The first three bytes are Organizational Unique Identifier (OUI) code
assigned by IEEE. The last three bytes are the serial number assigned by the
vendor of the network device. All these six bytes are stored in a non-volatile
memory in the device. Their format is as the following table and normally written in
the form as aa-bb-cc-dd-ee-ff, a 12 hexadecimal digits separated by hyphens, in
which the aa-bb-cc is the OUI code and the dd-ee-ff is the serial number assigned
by manufacturer.
26
User Manual
Bit 47 bit 0
1st byte 2nd byte 3rd byte 4th byte 5th byte 6th byte
OUI code Serial number
The first bit of the first byte in the Destination address (DA) determines the
address to be a Unicast (0) or Multicast frame (1), known as I/G bit indicating
individual (0) or group (1). So the 48-bit address space is divided into two portions,
Unicast and Multicast. The second bit is for global-unique (0) or locally-unique
address. The former is assigned by the device manufacturer, and the later is usually
assigned by the administrator. In practice, global-unique addresses are always
applied.
A unicast address is identified with a single network interface. With this
nature of MAC address, a frame transmitted can exactly be received by the target
an interface the destination MAC points to.
A multicast address is identified with a group of network devices or network
interfaces. In Ethernet, a many-to-many connectivity in the LANs is provided. It
provides a mean to send a frame to many network devices at a time. When all bit of
DA is 1s, it is a broadcast, which means all network device except the sender itself
can receive the frame and response.
27
User Manual
For example,
0x0800 IP datagram
0x0806 ARP
0x0835 RARP
0x8137 IPX datagram
0x86DD IPv6
28
User Manual
Frame transmission
As Ethernet adopted Carrier Sense Multiple Access with Collision Detect
(CSMA/CD), it detects if there is any carrier signal from another network device
running over the physical medium when a frame is ready for transmission. This is
referred to as sensing carrier, also “Listen”. If there is signal on the medium, the
MAC defers the traffic to avoid a transmission collision and waits for a random
period of time, called backoff time, then sends the traffic again.
After the frame is assembled, when transmitting the frame, the preamble
(PRE) bytes are inserted and sent first, then the next, Start of frame Delimiter (SFD),
DA, SA and through the data field and FCS field in turn. The followings summarize
what a MAC does before transmitting a frame.
1. MAC will assemble the frame. First, the preamble and Start-of-
Frame delimiter will be put in the fields of PRE and SFD, followed
DA, SA, tag ID if tagged VLAN is applied, Ethertype or the value
of the data length, and payload data field, and finally put the FCS
data in order into the responded fields.
2. Listen if there is any traffic running over the medium. If yes, wait.
3. If the medium is quiet, and no longer senses any carrier, the
MAC waits for a period of time, i.e. inter-frame gap time to have
the MAC ready with enough time and then start transmitting the
frame.
4. During the transmission, MAC keeps monitoring the status of the
medium. If no collision happens until the end of the frame, it
transmits successfully. If there is a collision happened, the MAC
will send the patterned jamming bit to guarantee the collision
event propagated to all involved network devices, then wait for a
random period of time, i.e. backoff time. When backoff time
expires, the MAC goes back to the beginning state and attempts
to transmit again. After a collision happens, MAC increases the
transmission attempts. If the count of the transmission attempt
reaches 16 times, the frame in MAC’s queue will be discarded.
29
User Manual
64 bytes
30
User Manual
Parameter
10Base 100Base 1000Base
value/LAN
Max. collision
100 meters for UTP 100 meters for UTP
domain DTE to 100 meters
412 meters for fiber 316 meters for fiber
DTE
Max. collision
domain with 2500 meters 205 meters 200 meters
repeater
Slot time 512 bit times 512 bit times 512 bit times
Interframe Gap 9.6us 0.96us 0.096us
AttemptLimit 16 16 16
BackoffLimit 10 10 10
JamSize 32 bits 32 bits 32 bits
MaxFrameSize 1518 1518 1518
MinFrameSize 64 64 64
BurstLimit Not applicable Not applicable 65536 bits
Table 3-4 Ethernet parameters for half duplex mode
31
User Manual
where
k = min (n, 10)
32
User Manual
Frame Reception
In essence, the frame reception is the same in both operations of half duplex
and full duplex, except that full-duplex operation uses two buffers to transmit and
receive the frame independently. The receiving node always “listens” if there is
traffic running over the medium when it is not receiving a frame. When a frame
destined for the target device comes, the receiver of the target device begins
receiving the bit stream, and looks for the PRE (Preamble) pattern and Start-of-
Frame Delimiter (SFD) that indicates the next bit is the starting point of the MAC
frame until all bit of the frame is received.
For a received frame, the MAC will check:
1. If it is less than one slotTime in length, i.e. short packet, and if
yes, it will be discarded by MAC because, by definition, the valid
frame must be longer than the slotTime. If the length of the frame
is less than one slotTime, it means there may be a collision
happened somewhere or an interface malfunctioned in the LAN.
When detecting the case, the MAC drops the packet and goes
back to the ready state.
2. If the DA of the received frame exactly matches the physical
address that the receiving MAC owns or the multicast address
designated to recognize. If not, discards it and the MAC passes
the frame to its client and goes back to the ready state.
3. If the frame is too long. If yes, throws it away and reports frame
Too Long.
4. If the FCS of the received frame is valid. If not, for 10M and 100M
Ethernet, discards the frame. For Gigabit Ethernet or higher
speed Ethernet, MAC has to check one more field, i.e. extra bit
field, if FCS is invalid. If there is any extra bits existed, which
must meet the specification of IEEE802.3. When both FCS and
extra bits are valid, the received frame will be accepted,
otherwise discards the received frame and reports
frameCheckError if no extra bits appended or alignmentError if
extra bits appended.
5. If the length/type is valid. If not, discards the packet and reports
lengthError.
6. If all five procedures above are ok, then the MAC treats the frame
as good and de-assembles the frame.
33
User Manual
What if a VLAN tagging is applied?
VLAN tagging is a 4-byte long data immediately following the MAC source
address. When tagged VLAN is applied, the Ethernet frame structure will have a
little change shown as follows.
Only two fields, VLAN ID and Tag control information are different in
comparison with the basic Ethernet frame. The rest fields are the same.
The first two bytes is VLAN type ID with the value of 0x8100 indicating the
received frame is tagged VLAN and the next two bytes are Tag Control Information
(TCI) used to provide user priority and VLAN ID, which are explained respectively in
the following table.
When MAC parses the received frame and finds a reserved special value
0x8100 at the location of the Length/Type field of the normal non-VLAN frame, it will
interpret the received frame as a tagged VLAN frame. If this happens in a switch,
the MAC will forward it, according to its priority and egress rule, to all the ports that
is associated with that VID. If it happens in a network interface card, MAC will
deprive of the tag header and process it in the same way as a basic normal frame.
For a VLAN-enabled LAN, all involved devices must be equipped with VLAN
optional function.
At operating speeds above 100 Mbps, the slotTime employed at slower
speeds is inadequate to accommodate network topologies of the desired physical
extent. Carrier Extension provides a means by which the slotTime can be increased
to a sufficient value for the desired topologies, without increasing the minFrameSize
parameter, as this would have deleterious effects. Nondata bits, referred to as
extension bits, are appended to frames that are less than slotTime bits in length so
that the resulting transmission is at least one slotTime in duration. Carrier Extension
can be performed only if the underlying physical layer is capable of sending and
receiving symbols that are readily distinguished from data symbols, as is the case in
most physical layers that use a block encoding/decoding scheme.
34
User Manual
Terminology
Separate Access Domains:
As per the description in the section of “What’s the Ethernet”, Ethernet
utilizes CSMA/CD to arbitrate who can transmit data to the station(s) attached in the
LAN. When more than one station transmits data within the same slot time, the
signals will collide, referred to as collision. The arbitrator will arbitrate who should
gain the media. The arbitrator is a distributed mechanism in which all stations
contend to gain the media. Please refer to “What’s the Ethernet” for more details.
In Fig.3-5, assumed in half duplex, you will see some ports of the switch are
linked to a shared HUB, which connects many hosts, and some ports just are
individually linked to a single host. The hosts attached to a shared hub will be in the
same collision domain, separated by the switch, and use CSMA/CD rule. For the
host directly attached to the switch, because no other host(s) joins the traffic
contention, hence it will not be affected by CSMA/CD. These LAN segments are
separated in different access domains by the switch.
Micro-segmentation:
To have a port of the switch connected to a single host is referred to as
micro-segmentation. It has the following interesting characteristics.
- There is no need the access contention (e.g.Collision). They
have their own access domain. But, collision still could happen
between the host and the switch port.
- When performing the full duplex, the collision vanishes.
- The host owns a dedicated bandwidth of the port.
The switch port can run at different speed, such as 10Mbps, 100Mbps or
1000Mbps. A shared hub cannot afford this.
35
User Manual
Traffic Aggregation:
Traffic aggregation is to aggregate the bandwidth of more than one port and
treat it as a single port in the LAN. This single port possesses the features of a
normal port but loading balance. This is a great feature for the port needing more
bandwidth but cannot afford paying much cost for high bandwidth port.
36
User Manual
Fig. 3-6
37
User Manual
Set a weight figure to the packet with a priority level, say 5-7, and next, set
another weight to the packet with a priority level, say 2-4 and so on. The WRR will
transmit the packet with the weight. So the packet of each priority level can be
allocated a fixed bandwidth.
Bandwidth rating
Bandwidth rating is the limitation set by administrator, and it can be applied
to those with SLA. Bandwidth rating can be total bandwidth, types of service of a
port with many steps. The switch supports by-port Ingress and Egress total
bandwidth rate control capacity. The bandwidth rate resolution is 0.1 Mbps
(100Kbps) and ranges from 0 to 100Mbps.
38
User Manual
Fig. 3-7
In the figure above, all stations are within the same broadcast domain. For
these stations, it is obviously that the traffic is getting congested while adding more
stations on it. With the more and more users joining the LAN, broadcast traffic will
rapidly decrease the performance of the network. Finally, the network may get down.
39
User Manual
Fig. 3-8
Now we apply VLAN technology to configure the system shown as the figure
above. We can partition the users into the different logical networks which have their
own broadcast domain. The traffic will not disturb among these logical networks.
The users 1x (x denotes a ~ d) are members of VLAN 1. Any traffic within VLAN 1
does not flow to VLAN 2 and others. This helps us configure the network easily
according to the criteria needed, for example, financial, accounting, R&D and
whatever you think it necessary. You can also easily move a user to a different
location or join a new user somewhere in the building to VLAN. Without VLAN, it is
very hard to do. Basically, VLAN can afford offering at least 3 benefits: move and
change users, reduce broadcast traffic and increase performance, Security.
Besides, VLAN can highly reduce the traffic congestion and increase total
performance because there are no more too many users in the same broadcast
domain.
40
User Manual
There are many types of VLAN applied. Most popular is port-based VLAN,
tag-based VLAN and protocol-based VLAN.
Port-based VLAN
Some physical ports are configured as members of a VLAN. All stations
attached on these ports can communicate with each other.
Tag-based VLAN
It identifies the membership by VLAN ID, no matter where the packet
comes from. It is also referred to as 802.1Q VLAN.
Protocol-based VLAN
It identifies the VLAN membership by layer 3 protocol types, for example
IPX, Appletalk, IP, etc.
Other VLAN technologies not mentioned above are MAC-based VLAN, IP-
based VLAN and so on.
Terminology
Tagged Frame:
A frame, carrying a tag field following the source MAC address, is four bytes
long and contains VLAN protocol ID and tag control information composed of user
priority, Canonical Format Indicator (CFI) and optional VLAN identifier (VID).
Normally, the maximal length of a tagged frame is 1522 bytes.
VLAN Protocol ID =
User Priority CFI VLAN identifier
0x8100
41
User Manual
VLAN-tagged frame:
An Ethernet frame, carrying VLAN tag field, contains VLAN identification
without the value of 0 and 4095, and priority information.
Priority-tagged frame:
An Ethernet frame, carrying VLAN tag field, contains VLAN identification with
the value of 0 and priority information.
Untagged frame:
An Ethernet frame carries no VLAN tag information.
VLAN Identifier:
Also referred to as VID. It is used to identify a member whether it belongs to
the VLAN group with the VID. The assignable number is 1- 4094. If VID=0, the
tagged frame is a priority packet. Both the value of 0 and 4095 also cannot be
assigned in VLAN management.
Ingress filtering:
The process to check a received packet and compare its VID to the VLAN
membership of the ingress port. The ingress filtering can be set by per port. When
receiving a packet, VLAN bridge examines if the VID in the frame’s header presents.
If the VID of the received packet presents, the VID of the packet is used. And
VLAN bridge will check its MAC address table to see if the destination ports are
members of the same VLAN. If both are members of the tagged VLAN, then the
packet will be forwarded.
If the packet is an untagged or a null tag packet, the ingress port’s PVID is
applied to the packet. VLAN bridge will then look up the MAC address table and
determine to which ports the packet should be forwarded. Next, it will check to see if
the destination ports belong to the same VLAN with that PVID. If the destination
ports are members of the VLAN used by ingress port, the packet will be forwarded.
Note: VID can not be 0 or 4095.
42
User Manual
Ingress Rule:
Each packet received by a VLAN-aware bridge will be classified to a VLAN.
The classification rule is described as follows.
1. If the VID of the packet is null VID (VID=0)or this packet is an untagged packet:
a. If there are still some other ways(e.g. protocol, MAC address, application,
IP-subnet, etc.) to classify the incoming packets beside port-based
classification in implement and these approaches can offer non-zero VID,
then, use the value of VID offered by other classifications for VLAN’s
classification.
b. If there is only port-based classification in implement or other classification
approaches cannot offer non-zero VID for the incoming packets, then
assign the PVID to the incoming packets as VID for the classification of
the VLAN group.
2. If the VID is not a null VID (VID≠0), then use the value to classify the VLAN group.
Egress Rule:
An egress list is used to make the tagging and forwarding decision on an
outgoing port. It specifies the VLANs whose packets can be transmitted out and
specifies if the packet should be tagged or not. It can be configured for port’s VLAN
membership, and tagged or untagged for a transmitted packet. When a packet is
transmitted out, the VLAN bridge checks the port’s egress list. If the VLAN of the
packet is on the egress list of the port on which the packet transmits out, the packet
will be transmitted with the priority accordingly. If enabled, an egress port will
transmit out a tagged packet if the port is connected to a 802.1Q-compliant device.
If an egress port is connected to a non-802.1Q device or an end station, VLAN
bridge must transmit out an untagged packet, i.e. the tag has been stripped off in an
egress port. Egress rule can be set by per port.
Independent VLAN Learning (IVL):
It specifies the mode how to learn MAC address. For a specified VLAN, it will
use an independent filtering database (FID) to learn or look up the membership
information of the VLAN and decide where to go.
Shared VLAN Learning (SVL):
It specifies the mode how to learn MAC address. In this mode, some VLAN
or all VLANs use the same filtering database storing the membership information of
the VLAN to learn or look up the membership information of the VLAN. In 24-Port
GbE Web Smart Switch, you can choose a VID for sharing filtering database in
Shared VID field if you wish to use the existed filtering database. For a specified
VLAN, when a MAC address is learned by a switch, VLAN will use this formation to
make forwarding decision.
Filtering Database:
Referred to as FID. It can provide the information where the packet will be
sent to. Filtering database will supply the outgoing port according to the request
from forwarding process with VID and DA. When a packet is received, if it has a
non-zero VID, then FID will offer the associated outgoing ports information to the
packet.
In SVL, VLANs use the same Filtering Database. In IVL, VLANs use different
FIDs. Any VID can be assigned to the same FID by administrator.
43
User Manual
How does a Tagged VLAN work?
If the ingress filtering is enabled and when a packet is received, VLAN bridge
will first check if the VID of the packet presents.
1). If the packet has a non-zero VID, VLAN bridge will apply this VID as the VLAN
ID of the packet in the network.
2). For a packet with null tag or no VLAN tag, if VLAN bridge provides rules to
decide its VID, then apply this VID to the packet.
If VLAN bridge does not support any rule for VID, then apply the PVID of the
port to the packet which came from that port. VLAN bridge checks to see if the
ingress port and the received packet are on the same VLAN. If not, drops it. If yes,
forwards it to the associated ports. Meanwhile, this VLAN must be applied to the
egress port, or the packet will be dropped.
If ingress filtering is disabled, VLAN bridge will only check the MAC address
table to see if the destination VLAN exists. If VLAN does not exist, then drop the
packet, and if both DA and VLAN do not exist, forwards the packet. If just knows
VLAN existed, then floods the packet to all the ports the VLAN covers.
If we plan to deploy four VLANs in an office and use a switch to partition
them, we should check which ports belong to which VLAN first. Assuming a 24-port
switch is applied.
Name VID Port Members
Marketing 2 1,2,3,4,5
Service 3 6,7,20,21,22
Sales 4 8,9,10,11,12,13,14,15,16
Administration 1 17,18,19,23,24
Table 3-6
Next, assigns IP address to each VLAN. Usually, we use 10.x.x.x as internal
IP block. Because there are total four VLANs in the network, we must assign 4 IP
blocks to each of them.
Name VID Network Address
Marketing 2 10.1.2.0/24
Service 3 10.1.3.0/24
Sales 4 10.1.4.0/24
Administration 1 10.1.1.0/24
Table 3-7
Here we apply the subnet mask 255.255.255, and each VLAN is capable of
supporting 254 nodes.
44
User Manual
45
User Manual
Terminology
Link Aggregation:
It is a method to have multiple physical links with the same media and speed
bundled to be a logical link forming a Link Aggregation Group with a group ID. With
the viewpoint of MAC client, each Link Aggregation Group is an independent link.
There are three cases of link used in the network, which are switch to switch,
switch to station and station to station. Here station may be a host or a router.
Link Aggregation, called port trunking sometimes, has two types of link
configuration, including static port trunk and dynamic port trunk.
Static Port Trunk:
When physical links are changed, administrator needs to manually
configure the switches one by one.
Dynamic Port Trunk:
When physical links are changed, LACP takes over and automatically
reconfigure. Administrator does not have to do anything and may see the
trap message of LACP changed in NMS.
46
User Manual
4. Operation of
Web-based Management
This chapter would introduce how to manage your Web Smart Switch and
how to configure the 10/100/1000Mbps TP Ports and Gigabit TP/SFP Fiber dual
media ports on the switch via web user interfaces. Web Smart Switch provides 20
fixed Gigabit Ethernet TP ports and 4 optional Gigabit dual media ports. With this
facility, you can easily access and monitor the status like MIBs, port activity, and
multicast traffic through any ports on the switch.
The default values of 24-Port GbE Web Smart Switch are listed in the table
below:
IP Address 192.168.1.1
Subnet Mask 255.255.255.0
Default Gateway 192.168.1.254
Password admin
Table 4-1
When the configuration of your Web Smart Switch is finished, you can
browse it by the IP address you set up. For instance, type http://192.168.1.1 in the
address row in a browser, then the following screen (see Fig.4-1) would show up
and ask for your password input for login and access authentication. The default
password is “admin”. For the first time access, please enter the default password,
and click <Apply> button. The login process now would be completed.
Web Smart Switch supports a simplified user management function which
allows only one administrator to configure the switch at one time.
To optimize the display effect, we recommend Microsoft IE and 1024x768
display resolution.
47
User Manual
Fig. 4-1
Fig. 4-2
48
User Manual
Root
Configuration
Monitoring
Maintenance
49
User Manual
4-2. Configuration
Configuration includes the following functions: System Configuration, Ports
Configuration, VLAN Mode Configuration, VLAN Group Configuration, Aggregation,
LACP, RSTP, 802.1X, IGMP Snooping, Mirror, QoS, Filter, Rate Limit, Storm Control
and SNMP.
Configuration
System Configuration
Ports Configuration
Aggregation
LACP
RSTP
802.1X
IGMP Snooping
Mirror
QoS
Filter
Rate Limit
Storm Control
SNMP
50
User Manual
4-2-1. System Configuration
System configuration is one of the most important functions. Without a proper
setting, network administrator would not be able to manage the device. The switch
supports manual IP address setting.
Fig. 4-3
Function name:
System Configuration
Function description:
Show system description, firmware version, hardware version, MAC address,
serial number, active IP address, active subnet mask, active gateway, DHCP
server and Lease time left.
Set device name, DHCP enable, fallback IP address, fallback subnet mask,
fallback gateway, management VLAN, password and inactivity timeout.
Parameter description:
System Description:
The simple description of this switch.
Firmware Version:
The firmware version of this switch.
Hardware Version:
The hardware version of this switch.
MAC Address:
It is the Ethernet MAC address of the management agent in this switch.
Serial Number:
The serial number is assigned by the manufacturer.
Active IP Address:
Show the active IP address of this switch.
51
User Manual
Active Subnet Mask:
Show the active subnet mask of this switch.
Active Gateway:
Show the active gateway of this switch.
DHCP Server:
Show the IP address of the DHCP server.
Default: 0.0.0.0
Lease Time Left:
Show the lease time left of DHCP client.
Device Name:
Set a special name for this switch. Up to 16 characters are allowed in
this parameter. Any alphanumeric character and null are acceptable.
Default: Giga Switch
DHCP Enabled:
Enable DHCP snooping, Just tick the check box (;) to enable it.
Default: disable
Fallback IP Address:
Users can configure the IP settings and fill in new values. Then, click
<Apply> button to update.
Default: 192.168.1.1
Fallback Subnet Mask:
Subnet mask is made for the purpose to get more network address
because any IP device in a network must own its IP address, composed
of Network address and Host address, otherwise can’t communicate with
other devices each other. But unfortunately, the network classes A, B,
and C are all too large to fit for almost all networks, hence, subnet mask
is introduced to solve this problem. Subnet mask uses some bits from
host address and makes an IP address looked Network address, Subnet
mask number and host address. It is shown in the following figure. This
reduces the total IP number of a network able to support, by the amount
of 2 power of the bit number of subnet number (2^(bit number of subnet
number)).
52
User Manual
32 bits
Network ID Host ID
Network ID Host ID
Subnet number
Subnet mask is used to set the subnet mask value, which should be the
same value as that of the other devices resided in the same network it
attaches.
For more information, please also see the Section 2-1-4 “IP Address
Assignment” in this manual.
Default: 255.255.255.0
Fallback Gateway:
Set an IP address for a gateway to handle those packets that do not
meet the routing rules predefined in the device. If a packet does not meet
the criteria for other pre-defined path, it must be forwarded to a default
router on a default path. This means any packet with undefined IP
address in the routing table will be sent to this device unconditionally.
Default: 192.168.1.254
Management VLAN:
Show the management VLAN number.
Password:
Set a password for this switch. Up to 16 characters are allowed in this
parameter. Any alphanumeric character is acceptable.
Default: admin
Inactivity Timeout(secs):
Set the auto-logout timer. The valid value is 0 ~ 60 in the unit of minute
and a decimal point is not allowed. The value 0 means auto-logout timer
is disabled.
Default: 0
53
User Manual
4-2-2. Port Configuration
Function name:
Port Configuration
Function description:
Port Configuration is applied for the settings of the ports on the switch. By this
function, you can set or reset the values for Mode and Flow Control.
Parameter description:
Enable Jumbo Frames:
This function support jumbo frames of up to 9600 bytes, Just tick the
check box (;) to enable it.
Default: disable
Link:
Show link status of this port.
Mode:
Set the speed and duplex of the port. If the media is 1Gbps fiber, there
are three modes to choose: Auto Speed, 1000 Full and Disable. If the
media is TP, the Speed/Duplex is comprised of the combination of speed
mode, 10/100/1000Mbps, and duplex mode, full duplex and half duplex.
The following table summarized the function the media supports.
Media type NWay Speed Duplex
1000M TP ON/OFF 10/100/1000M Full for all, Half for 10/100
1000M Fiber ON/OFF 1000M Full
In Auto Speed mode, no default value. In Forced mode, default value
depends on your setting.
Flow Control:
You can Just tick the check box (;) to enable flow control. If flow control
is set Enable, both parties can send PAUSE frame to the transmitting
device(s) if the receiving port is too busy to handle. When it is set
Disable, there will be no flow control in the port. It drops the packet if too
much to handle.
Default: Disable
54
User Manual
Function name:
VLAN Mode Setting
Function description:
The VLAN Mode Selection function includes four modes: Port-based, Tag-
based, Metro mode or Disable, you can choose one of them by pulling down
list and pressing the <Downward> arrow key. Then, click <Apply> button, the
settings will take affect immediately.
Parameter description:
VLAN Mode:
Port-based:
Port-based VLAN is defined by port. Any packet coming in or
outgoing from any one port of a port-based VLAN will be accepted.
No filtering criterion applies in port-based VLAN. The only criterion
is the physical port you connect to. For example, for a port-based
VLAN named PVLAN-1 contains port members Port 1&2&3&4. If
you are on the port 1, you can communicate with port 2&3&4. If you
are on the port 5, then you cannot talk to them. Each port-based
VLAN you built up must be assigned a group name. This switch can
support up to maximal 24 port-based VLAN groups.
55
User Manual
Tag-based:
Tag-based VLAN identifies its member by VID. This is quite
different from port-based VLAN. If there are any more rules in
ingress filtering list or egress filtering list, the packet will be
screened with more filtering criteria to determine if it can be
forwarded. The switch supports supplement of 802.1q. For more
details, please see the section VLAN in Chapter 3.
Each tag-based VLAN you built up must be assigned VLAN name
and VLAN ID. Valid VLAN ID is 1-4094. User can create total up to
24 Tag VLAN groups.
Double-tag:
Double-tag mode belongs to the tag-based mode, however, it would
treat all frames as the untagged ones, which means that tag with
PVID will be added into all packets. Then, these packets will be
forwarded as Tag-based VLAN. So, the incoming packets with tag
will become the double-tag ones.
Metro Mode:
The Metro Mode is a quick configuration VLAN environment
method on Port-based VLAN. It will create 21, 22, 23 or 24 Port-
based VLAN groups.
56
User Manual
Function name:
VLAN Group Configuration
Function description:
It shows the information of VLAN Groups, and allows administrators to
maintain them by modifying and deleting each VLAN group. User also can add
a new VLAN group by inputting a new VLAN name and VLAN ID.
If you are in port-based VLAN, it will just show the ID、Member of the existed
port-based VLAN group. If you are in tag-based VLAN, it will show the ID、
VID、Member of the existed tag-based VLAN group. The switch can store the
configuration of port-based VLAN and tag-based VLAN separately. When you
choose one of VLAN mode, the switch will bring you the responded VLAN
configuration which keeps the default data. You can easily create and delete a
VLAN group by pressing <Add> and <Delete> function buttons, or click the
Group ID directly to edit it.
Parameter description:
ID (Group ID):
When you want to edit a VLAN group, you must select the Group ID field.
Then, you will enter Tag Base VLAN Group Setting or Port Base VLAN
Group Setting page, which depends on your VLAN mode selection.
VID:
VLAN identifier. Each tag-based VLAN group has a unique VID. It
appears only in tag-based mode.
Member:
In modify function this is used to enable or disable if a port is a member
of the new added VLAN, “Enable” means it is a member of the VLAN.
Just tick the check box (;) beside the port x to enable it.
Add Group:
Create a new port-based VLAN or tag-based VLAN, which depends on
the VLAN mode you choose in VLAN mode function.
57
User Manual
Delete Group:
Just tick the check box (;) beside the ID, then press the <Delete>
button to delete the group.
58
User Manual
4-2-5. Aggregation
The Aggregation (Port Trunking) Configuration is used to configure the
settings of Link Aggregation. You can bundle ports by same speed, MAC, and full
duplex to be a single logical port, thus the logical port can aggregate the bandwidth
of these ports. This means you can apply your current Ethernet equipments to build
the bandwidth aggregation. For example, if three Fast Ethernet ports are
aggregated into a logical port, then this logical port’s bandwidth would be as three
times high as a single Fast Ethernet port’s.
Function name:
Aggregation Configuration
Function description:
Display the current setup of Aggregation Trunking. With this function, user is
allowed to add a new trunking group or modify the members of an existed
trunking group.
Parameter description:
Normal:
Set up the ports that do not join any aggregation trunking group.
Group 1~8:
Group the ports you choose together. Up to 12 ports can be selected for
each group.
59
User Manual
4-2-6. LACP
Smart Web Switch supports link aggregation IEEE802.3ad standard. The
standard describes Link Aggregate Control Protocol (LACP) which dynamically
creates and manages trunk groups.
When you enable LACP link aggregation on a port, the port can automatically
negotiate with the ports at the remote end of a link to establish trunk groups. LACP
also allows port redundancy, that is, if an operational port fails, then one of the
“standby” ports become operational without user intervention.
Function name:
LACP Port Configuration
Function description:
Enable or disable LACP protocol, user is allowed to set the aggregation key
value.
Parameter description:
Protocol Enabled:
Just tick the check box (;) to enable LACP protocol then press the
<Apply> button to apply.
Key Value:
It’s key for an aggregation. This must be an integer value between 1 and
255 or auto select by switch.
60
User Manual
4-2-7. RSTP
RSTP detects and resolves network loops, and provides backup links
between switches, bridges and routers. The protocol allows a switch to
communicate with other RSTP compliant switches, and to ensure only one path
existing between two stations in your network environment.
The switch allows you to create multiple STP configurations and assign ports
to a specific tree.
Function name:
Function description:
This screen is used to display the RSTP system configuration and set the
need of parameters.
Parameter description:
System Priority:
System priority is used in determining the root switch, root port and
designated port. The switch with the highest priority (lowest numeric
value) becomes the STP root switch. If all switches have the same
priority, the switch with the lowest MAC address will then become the
root switch. Select a vale from the drop-down list box.
The lower the numeric value you assign, the higher the priority for this
system.
Default: 32768
Hello Time:
This is the time interval in seconds between BPDU configuration
message generations by the root switch. The allowed range is 1 to 10
seconds.
Default: 2
Max Age:
This is the maximum time a switch can wait without receiving a BPDU
before attempting to reconfigure. The allowed range is 6 to 40 seconds.
Default: 20
Forward Delay:
This is the maximum time (in seconds) a switch will wait before changing
states. The general rule: 2 * (Forward Delay – 1) >= Max Age >= 2 *
(Hello Time + 1)
Default: 15
Force version:
Select RSTP or STP protocol from the drop-down list box.
Function name:
61
User Manual
RSTP Port Configuration
Function description:
Enable or disable RSTP protocol on the ports that are selected and set path
cost.
Parameter description:
Protocol Enabled:
Just tick the check box (;) beside the port x to enable RSTP protocol,
then press the <Apply> button to apply.
Edge:
Just tick the check box (;) beside the port x to enable edge function.
Path Cost:
Path cost is the cost of transmitting a frame on to a LAN through that port.
It is assigned according to the speed of the bridge. The slower the media,
the higher the cost, user can select auto or set the rage from 1 to
200000000.
62
User Manual
4-2-8. 802.1X
802.1x port-based network access control provides a method to restrict users
to access network resources via authenticating user’s information. This restricts
users from gaining access to the network resources through a 802.1x-enabled port
without authentication. If a user wishes to touch the network through a port under
802.1x control, he (she) must firstly input his (her) account name for authentication
and waits for gaining authorization before sending or receiving any packets from a
802.1x-enabled port.
Before the devices or end stations can access the network resources through
the ports under 802.1x control, the devices or end stations connected to a controlled
port send the authentication request to the authenticator, the authenticator pass the
request to the authentication server to authenticate and verify, and the server tell
the authenticator if the request get the grant of authorization for the ports.
Supplicant:
Authenticator:
Authentication server:
The overview of operation flow for the Fig. 4-13 is quite simple. When
Supplicant PAE issues a request to Authenticator PAE, Authenticator and
Supplicant exchanges authentication message. Then, Authenticator
passes the request to RADIUS server to verify. Finally, RADIUS server
replies if the request is granted or denied.
63
User Manual
While in the authentication process, the message packets, encapsulated
by Extensible Authentication Protocol over LAN (EAPOL), are exchanged
between an authenticator PAE and a supplicant PAE. The Authenticator
exchanges the message to authentication server using EAP
encapsulation. Before successfully authenticating, the supplicant can
only touch the authenticator to perform authentication message
exchange or access the network from the uncontrolled port.
Fig. 4-13
Fig. 4-14
The Fig. 4-15 shows the procedure of 802.1x authentication. There are steps
for the login based on 802.1x port access control management. The protocol used
64
User Manual
in the right side is EAPOL and the left side is EAP.
65
User Manual
Authentication server, the port you are using is set to be
unauthorized.
Fig. 4-15
Function name:
802.1X Configuration
Function description:
This function is used to configure the global parameters for RADIUS
66
User Manual
authentication in 802.1x port security application.Parameter description:
Mode:
Enable or disable 802.1X function.
RADIUS IP:
RADIUS server IP address for authentication.
Default: 0.0.0.0
RADIUS UDP Port:
The port number to communicate with RADIUS server for the
authentication service. The valid value ranges 1-65535.
Default port number is 1812.
RADIUS Secret:
The secret key between authentication server and authenticator. It is a
string with the length 1 – 15 characters. The character string may contain
upper case, lower case and 0-9. It is character sense. It is not allowed for
putting a blank between any two characters.
Default: None
Admin State:
This is used to set the operation mode of authorization. There are three
type of operation mode supported, Force Unauthorized, Force
Authorized, Auto.
y Force Unauthorized:
The controlled port is forced to hold in the unauthorized state.
y Force Authorized:
The controlled port is forced to hold in the authorized state.
y Auto:
The controlled port is set to be in authorized state or unauthorized
state depends on the result of the authentication exchange between
the authentication server and the supplicant.
Default: Force Authorized
Port State:
Show the port status of authorization.
Re-authenticate:
Specify if subscriber has to periodically re-enter his or her username and
password to stay connected to the port.
Re-authenticate All:
Re-authenticate for all ports in at once.
Force Reinitialize:
Force the subscriber has to reinitialize connected to the port.
Force Reinitialize All:
67
User Manual
Force Reinitialize for all ports in at once.
68
User Manual
69
User Manual
4-2-9 IGMP Snooping
Function name:
IGMP Snooping Configuration
Function description:
IGMP Snooping lets administrators configure a switch to constrain multicast
traffic by listening to Internet Group Management Protocol (IGMP). After finishing
the settings, please press <Apply> button to start up the function.
Parameter description:
IGMP Enabled:
Just tick the check box (;) to enable this function.
Default: disable
Router Ports:
Just tick the check box (;) beside the port x to enable router ports, then
press the <Apply> button to start up.
Default: none
70
User Manual
4-2-10. Mirror Configuration
Function name:
Mirror Configuration
Function description:
Mirror Configuration is provided to monitor the traffic in the network. This
switch supports one-port mirror multi-ports. For example, we assume that Port
A and Port B are Source Ports, and Port C is Mirror Port respectively, thus, the
traffic passing through Port A and Port B will be copied to Port C for monitor
purpose.
Parameter description:
Source Port:
Set up the port for being monitored. Just tick the check box (;) beside the
port x and valid port is Port 1~24.
Mirror Port:
Use the drop-down menu to select a mirror port.
71
User Manual
4-2-11. QoS(Quality of Service) Configuration
The switch offers powerful QoS function. This function supports VLAN-tagged
priority that can make precedence of 8 priorities, and DSCP(Differentiated Services
Code Point) on Layer 3 of network framework.
Function name:
QoS Configuration
Function description:
While setting QoS function, please select QoS Mode in drop-down menu at
first. Then you can use 802.1p Priority and DSCP Priority functions. In this
function, you can enable/disable QoS Mode and set Priority Control, such as:
802.1p and DSCP. The switch only supports Strict Priority. High priority queue
is always passed first.
72
User Manual
Function name:
802.1p QoS Mode
Function description:
This function will affect the priority of VLAN tag. Based on priority of VLAN tag,
it can arrange 0~7 priorities, priorities can map to 4 queues of the switch (low,
normal, medium, high) and possess different bandwidth distribution according
to your weight setting.
Parameter description:
Prioritize Traffic
Five Prioritize Traffic values are provided: Custom, All Low Priority, All
Normal Priority, All Medium Priority, and All High Priority.
The QoS setting would apply to all ports on the switch if one of the
following values is selected: All Low Priority, All Normal Priority, All
Medium Priority, or All High Priority.
Port Number
When Custom is selected for Prioritize Traffic, you may assign specific
Port Number for 802.1p Configuration.
802.1p Configuration:
Each Priority can select any of Queue. In Default, Priority 0 is mapping to
Queue normal, Priority 1 is mapping to Queue low, Priority 2 is mapping
to Queue low, Priority 3 is mapping to Queue normal, Priority 4 is
mapping to Queue medium, Priority 5 is mapping to Queue medium,
Priority 6 is mapping to Queue high, and Priority 0 is mapping to Queue
high.
73
User Manual
Function name:
DSCP QoS Mode
Function description:
In the late 1990s, the IETF redefined the meaning of the 8-bit SERVICE TYPE
field to accommodate a set of differentiated services (DS). Under the
differentiated services interpretation, the first six bits comprise a codepoint,
which is sometimes abbreviated DSCP, and the last two bits are left unused.
DSCP can form total 64 (0~63) kinds of Traffic Class based on the
arrangement of 6-bit field in DSCP of the IP packet. In the switch, user is
allowed to set up these 64 kinds of Class that belong to any of queue (low,
normal, medium, high).
Parameter description:
Prioritize Traffic
Five Prioritize Traffic values are provided: Custom, All Low Priority, All
Normal Priority, All Medium Priority, and All High Priority.
The QoS setting would apply to all ports on the switch if one of the
following values is selected: All Low Priority, All Normal Priority, All
Medium Priority, or All High Priority.
Port Number
When Custom is selected for Prioritize Traffic, you may assign specific
Port Number for DSCP Configuration.
DSCP Configuration:
64 kinds of priority traffic as mentioned above, user can set up any of
Queue (low, normal, medium, high). In default, Priority 0~63 are mapping
to Queue high.
74
User Manual
4-2-12 Filter
Function name:
Filter Configuration
Function description:
This function lets administrators easily set management source IP addresses
to the ports on the switch. After completing the settings, please press <Apply>
button to make this function take effect.
Parameter description:
Source IP Filter:
Mode:
There are three types of mode in this drop-down menu. Default is
disabled.
Disabled:
Allow all IP Address login to this switch and manage it.
Static:
Just allow the IP Address which set by administrator to login to this
switch and manage it..
DHCP:
Allow the IP Address get from DHCP server can login to this switch
and manage it.
IP Address:
Setting up the IP Address, it can be one IP Address or a LAN.
IP Mask:
Setting up the IP Subnet Mask related with the IP Address.
DHCP Server Allowed:
Just tick the check box (;) under the port x to allow the DHCP Server
on this port and valid port is Port 1~24.
Default: enable
75
User Manual
76
User Manual
4-2-13 Rate Limit
Function name:
Ingress and Egress Bandwidth Setting
Function description:
Ingress and Egress Bandwidth Setting function are used to set up the limit of
Ingress or Egress bandwidth for each port.
Parameter description:
Ingress:
Set up the limit of Ingress bandwidth for the port you choose. Incoming
traffic will be discarded if the rate exceeds the value you set up in Data
Rate field. Pause frames are also generated if flow control is enabled.
The format of the packet limits to unicast, broadcast and multicast. Valid
value of Port 1~24 ranges from 128~3968 kbps.
Default: No Limit
Egress:
Set up the limit of Egress bandwidth for the port you choose. Outgoing
traffic will be discarded if the rate exceeds the value you set up in Data
Rate field. Pause frames are also generated if flow control is enabled.
The format of the packet limits to unicast, broadcast and multicast. Valid
value of Port 1~24 ranges from 128~3968 kbps.
Default: No Limit
77
User Manual
4-2-14 Storm Control
Function name:
Storm Control
Function description:
Storm Control is used to block unnecessary multicast and broadcast
frames that reduce switch’s performance. When the function is enabled
and Storm Control rate settings are detected as exceeded, the
unnecessary frames would be dropped.
Parameter description:
ICMP Rate:
To enable the ICMP Storm capability. User can use drop-down menu to
select number of frames. Default is No Limit. The setting range is
1k~1024k per second.
Learn Frames Rate:
To enable the Learn Frames Storm capability. User can use drop-down
menu to select number of frames. Default is No Limit. The setting range
is 1k~1024k per second.
Broadcast Rate:
To enable the Broadcast Storm capability. User can use drop-down menu
to select number of frames. Default is No Limit. The setting range is
1k~1024k per second.
Multicast Rate:
78
User Manual
To enable the Multicast Storm capability. User can use drop-down menu
to select number of frames. Default is No Limit. The setting range is
1k~1024k per second.
Flooded unicast Rate:
To enable the Flooded unicast Storm capability. User can use drop-down
menu to select number of frames. Default is No Limit. The setting range
is 1k~1024k per second.
NOTE:
After completing the function’s setting, press <Apply> button to have this
function taken effect.
79
User Manual
4-2-15 SNMP
Any Network Management System (NMS) running the Simple Network
Management Protocol (SNMP) can manage the Managed devices equipped with
SNMP agent, provided that the Management Information Base (MIB) is installed
correctly on the managed devices. The SNMP is a protocol that is used to govern
the transfer of information between SNMP manager and agent and traverses the
Object Identity (OID) of the management Information Base (MIB), described in the
form of SMI syntax. SNMP agent is running on the switch to response the request
issued by SNMP manager.
Basically, it is passive except issuing the trap information. The switch
supports a switch to turn on or off the SNMP agent. If you set the field SNMP
“Enable”, SNMP agent will be started up. All supported MIB OIDs, including RMON
MIB, can be accessed via SNMP manager. If the field SNMP is set “Disable”, SNMP
agent will be de-activated, the related Community Name, Trap Host IP Address,
Trap and all MIB counters will be ignored.
Function name:
SNMP Configuration
Function description:
This function is used to configure SNMP settings, community name, trap host
and public traps as well as the throttle of SNMP. A SNMP manager must pass the
authentication by identifying both community names, then it can access the MIB
information of the target device. So, both parties must have the same community
name. Once completing the setting, click <Apply> button, the setting takes effect.
Parameters description:
SNMP enable:
The term SNMP enable here is used for the activation or de-activation of
SNMP. Default is Disable.
Get/Set/Trap Community:
Community name is used as password for authenticating if the
requesting network management unit belongs to the same community
group. If they both don’t have the same community name, they don’t
belong to the same group. Hence, the requesting network management
unit can not access the device with different community name via SNMP
protocol; If they both have the same community name, they can talk each
other.
Community name is user-definable with a maximum length of 15
characters and is case sensitive. There is not allowed to put any blank in
the community name string. Any printable character is allowable.
The community name for each function works independently. Each
function has its own community name. Say, the community name for
Read only works for Read function and can’t be applied to other function
such as Write and Trap.
80
User Manual
Default community name for Set: private
Default community name for Trap: public
81
User Manual
4-3. Monitoring
There are six functions contained in the monitoring function.
Monitoring
Statistics Overview
Detailed Statistics
LACP Status
RSTP Status
IGMP Status
Ping
Function name:
Statistics Overview
Function description:
Display the summary counting of each port’s traffic, including Tx Bytes, Tx
Frames, Rx Bytes, Rx Frames, Tx Errors and Rx Errors.
Parameters description:
Tx Bytes:
Total transmitted bytes.
Tx Frames:
The counting number of the packet transmitted.
Rx Bytes:
Total received bytes.
Rx Frames:
The counting number of the packet received.
Tx Errors:
82
User Manual
Number of bad packets transmitted.
Rx Errors:
Number of bad packets received.
83
User Manual
4-3-2. Detailed Statistics
Function name:
Detailed Statistics
Function description:
Display the detailed counting number of each port’s traffic. In the Fig. 4-26, the
window can show all counter information each port at one time.
Parameter description:
Rx Packets:
The counting number of the packet received.
RX Octets:
Total received bytes.
Rx High Priority Packets:
Number of Rx packets classified as high priority.
Rx Low Priority Packets:
Number of Rx packets classified as low priority.
Rx Broadcast:
Show the counting number of the received broadcast packet.
Rx Multicast:
Show the counting number of the received multicast packet.
Rx Broad- and Multicast:
Show the counting number of the received broadcast with multicast
packet.
Rx Error Packets:
Show the counting number of the received error packets.
Tx Packets:
The counting number of the packet transmitted.
TX Octets:
Total transmitted bytes.
Tx High Priority Packets:
Number of Tx packets classified as high priority.
Tx Low Priority Packets:
Number of Tx packets classified as low priority.
Tx Broadcast:
Show the counting number of the transmitted broadcast packet.
Tx Multicast:
Show the counting number of the transmitted multicast packet.
84
User Manual
Tx Broad- and Multicast:
Show the counting number of the transmitted broadcast with multicast
packet.
Tx Error Packets:
Show the counting number of the received error packets.
Rx 64 Bytes:
Number of 64-byte frames in good and bad packets received.
Rx 65-127 Bytes:
Number of 65 ~ 126-byte frames in good and bad packets received.
Rx 128-255 Bytes:
Number of 127 ~ 255-byte frames in good and bad packets received.
Rx 256-511 Bytes:
Number of 256 ~ 511-byte frames in good and bad packets received.
Rx 512-1023 Bytes:
Number of 512 ~ 1023-byte frames in good and bad packets received.
Rx 1024-Bytes:
Number of 1024-max_length-byte frames in good and bad packets
received.
Tx 64 Bytes:
Number of 64-byte frames in good and bad packets transmitted.
Tx 65-127 Bytes:
Number of 65 ~ 126-byte frames in good and bad packets transmitted.
Tx 128-255 Bytes:
Number of 127 ~ 255-byte frames in good and bad packets transmitted.
Tx 256-511 Bytes:
Number of 256 ~ 511-byte frames in good and bad packets transmitted.
Tx 512-1023 Bytes:
Number of 512 ~ 1023-byte frames in good and bad packets transmitted.
Tx 1024-Bytes:
Number of 1024-max_length-byte frames in good and bad packets
transmitted.
Rx CRC/Alignment:
Number of Alignment errors and CRC error packets received.
Rx Undersize:
Number of short frames (<64 Bytes) with valid CRC.
Rx Oversize:
Number of long frames(according to max_length register) with valid CRC.
85
User Manual
Rx Fragments:
Number of short frames (< 64 bytes) with invalid CRC.
Rx Jabber:
Number of long frames(according tomax_length register) with invalid
CRC.
Rx Drops:
Frames dropped due to the lack of receiving buffer.
Tx Collisions:
Number of collisions transmitting frames experienced.
Tx Drops:
Number of frames dropped due to excessive collision, late collision, or
frame aging.
Tx Overflow:
Number of frames dropped due to the lack of transmitting buffer.
86
User Manual
4-3-3. LACP Status
Function name:
LACP Status
Function description:
Display LACP status. Fig. 4-30 illustrates that LACP Status window can show
LACP information and status for all ports in the same time.
Parameter description:
LACP Aggregation Overview:
Show the group/port status. Default will set to red sign for port link down,
user can check legend table below for all reference.
LACP Port Status:
Group/Port:
Show the port number.
Normal : as Legend.
87
User Manual
Function name:
RSTP Status
Function description:
Display RSTP status. Fig. 4-28 shows you that RSTP window can present
VLAN bridge information and the status of all ports.
Parameter description:
RSTP VLAN Bridge Overview:
VLAN Id:
Show the VLAN Id.
Bridge Id:
Show this switch’s current bridge priority setting and bridge ID
which stands for the MAC address of this switch.
Hello Time:
Show the current hello time of the root bridge. Hello time is a time
interval specified by root bridge, used to request all other bridges
periodically sending hello message every “hello time” seconds to
the bridge attached to its designated port.
Max Age:
Show the root bridge’s current max age time.
Fwd Delay:
Show the root bridge’s forward delay time.
Topology:
Show the root bridge’s spanning tree topology.
Root Id:
Show root bridge ID of this network segment. If this switch is a root
bridge, the “This switch is Root” will show this switch’s bridge ID.
88
User Manual
89
User Manual
Function name:
IGMP Status
Function description:
Display IGMP status. In Fig. 4-29, the window shows VLAN ID for each
multicast group.
Parameter description:
VLAN Id:
Show VLAN Id for each multicast group.
Querier:
Show the group membership queries status.
Queries transmitted:
To count the group membership queries transmitted.
Queries received:
To count the group membership queries received.
V1 Reports:
When a host receives a group membership query, it identifies the groups
associated with the query and determines to which groups it belongs.
The host then sets a timer, with a value less than the Max Response
Time field in the query, for each group to which it belongs. It Calculate
the number of times of IGMPV1 report.
V2 Reports:
When a host receives a group membership query, it identifies the groups
associated with the query and determines to which groups it belongs.
The host then sets a timer, with a value less than the Max Response
Time field in the query, for each group to which it belongs. It Calculate
the number of times of IGMPV2 report.
V3 Reports:
When a host receives a group membership query, it identifies the groups
associated with the query and determines to which groups it belongs.
The host then sets a timer, with a value less than the Max Response
Time field in the query, for each group to which it belongs. It Calculate
the number of times of IGMPV3 report.
V2 Leaves:
When a host leaves a group, it sends a leave group membership
message to multicast routers on the network, it show the leaves number.
90
User Manual
Function name:
Ping Status
Function description:
To set up target IP address for ping function and display ping status. In Fig. 4-
30, the window shows the ping information.
Parameter description:
Ping Parameters:
Target IP address:
Set up a Target IP address to ping.
Count:
Use drop-down menu to set number of echo requests to send.
Four type of number can choose, there are 1, 5, 10 and 20.
Default: 1
Time Out (in secs):
Use drop-down menu to set number of echo requests time out in
second. Four type numbers can choose, there are 1,5,10 and 20.
Default: 1
NOTE: All the functions should press <Apply> button to start up
after you set up the parameters.
Ping Results:
Target IP address:
91
User Manual
Show the active target IP address.
Status:
Show the result of the ping status.
Received replies:
Show the received replies number of times.
Request timeouts:
Show the timeout of request.
Average Response times (In ms):
Show the average response time in milliseconds.
92
User Manual
4-4. Maintenance
Maintenance
Warm Restart
Factory Default
Software Upgrade
Logout
93
User Manual
4-4-1. Warm Restart
Web Smart Switch offers many approaches to reboot your switch, such as:
power up, hardware reset and software reset. You can press RESET button in the
front panel of your switch to reset the device and to retrieve default settings. After
upgrading software, you have to reboot the device to have new configuration take
effect. The function being discussed here is software reset.
Function name:
Warm Restart
Function description:
Reboot the switch. Reboot takes the same effect as the RESET button on the
front panel of the switch. Press <Yes> button to confirm warm restart function,
and it will take around thirty (30) seconds to complete the system boot.
94
User Manual
4-4-2. Factory Reset
Function name:
Factory Default
Function description:
Factory Default provides the function to retrieve default settings and replace
current configuration. Except the IP address setting, all settings will be
restored to the factory default values when “Factory Default” function is
performed. If you want to restore all configurations including the IP address
setting to the factory default, please press the “RESET” button on the front
panel.
Fig. 4-35
95
User Manual
4-4-3. Software Upgrade
Function name:
Software Upgrade
Function description:
You can just click Browse button to retrieve the file you want in your system to
upgrade your switch.
96
User Manual
4-4-4. Configuration File Transfer
Function name:
Configuration File Transfer
Function description:
You can backup your switch’s configuration file into your computer folder in
case accident happens. In addition, uploading backup configuration file into a
new or a crashed switch can save much time and avoid mistakes.
97
User Manual
4-4-5. Logout
In addition to auto logout function we just mentioned in system configuration
section, the switch also allows administrators to logout manually by Logout function.
Function name:
Logout
Function description:
The switch allows you to logout the system to prevent other users from the
system without the permission. If you do not logout and exit the browser, the
switch will automatically have you logout. Besides this manually logout and
implicit logout, you can set up the parameter of Auto Logout Timer in system
configuration function to explicitly ON/OFF this logout function.
Parameter description:
Auto/Manual Logout:
If no action and no key is stroke as well in any function screen more than
the minutes you set up in Auto Logout Timer, the switch will have you
logout automatically. Or press the <Logout> button in Logout function to
exit the system manually.
Fig. 4-38
98
User Manual
5. Trouble Shooting
5-1. Resolving No Link Condition
The possible causes for a no link LED status are as follows:
z The attached device is not powered on
z The cable may not be the correct type or is faulty
z The installed building premise cable is faulty
z The port may be faulty
5-2. Q&A
1. Computer A can connect to Computer B, but cannot connect to Computer C
through the 24-Port GbE Web Smart Switch.
9 The network device of Computer C may fail to work. Please check the
link/act status of Computer C on the LED indicator. Try another network
device on this connection.
9 The network configuration of Computer C may be something wrong. Please
verify the network configuration on Computer C.
99
User Manual
Appendix A
Technical Specifications
Features
100
User Manual
Hardware Specifications
Network Interface:
101
User Manual
Diagnostic LED:
Voltage : 100∼240 V
Frequency : 50∼60 Hz
Consumption : 20W
Ambient Temperature : 0° to 40°C
Humidity : 10% to 90%
Dimensions : 44(H) × 442(W) × 170.3(D) mm
Comply with FCC Part 15 Class A & CE Mark Approval
102
User Manual
Management Software Specifications
103
User Manual
Appendix B
MIB Specifications
MIB II Enterprise MIB brief description is listed as below.
IMPORTS
mib-2, DisplayString,ifIndex FROM RFC1213-MIB
enterprises,Counter, TimeTicks, Gauge,IpAddress FROM RFC1155-SMI
OBJECT-TYPE FROM RFC-1212
TRAP-TYPE FROM RFC-1215;
GESM-SW24LIllegalLogin TRAP-TYPE
ENTERPRISE GESM-SW24LProductId
DESCRIPTION
"Send this trap when the illegal user try to login the Web management UI. "
::= 1
GESM-SW24LRxErrorThreshold TRAP-TYPE
ENTERPRISE GESM-SW24LProductId
VARIABLES { ifIndex }
DESCRIPTION
"Send this trap when the number of the Rx bad packet over the Rx Error
Threshold. The OID value means the port number. "
::= 2
GESM-SW24LTxErrorThreshold TRAP-TYPE
ENTERPRISE GESM-SW24LProductId
VARIABLES { ifIndex }
DESCRIPTION
"Send this trap when the number of the Tx bad packet over the Tx Error
Threshold.
The OID value means the port number. "
::= 3
END
104