GEL-2671 24 GE With 4 Shared SFP + 2 GE SFP L2 Managed Switch User Manual Rev 1.0 Dec 2013
86 3-6.2 VLAN Configuration When MLD snooping is enabled on a VLAN, the switch acts to minimize unnecessary multicast traffic. If the s
87 Last Listener Query Interval. The Last Listener Query Interval is the Maximum Response Delay used to calculate
88 3-6.3 Port Group Filtering The section describes that you could to set the Port Group Filtering in the MLD Snooping function. On the UI that you
89 3-6.4 Status The section describes when you complete the MLD Snooping and how to display the MLD Snooping Status
90 Queries Received : The number of Received Queries. V1 Reports Received : The number of Received V1 Reports. V2 Reports Received : The n
91 3-6.5 Group Information The section describes user could set the MLD Snooping Groups Information. The "Star
92 Auto-refresh : To evoke the auto-refresh icon then the device will refresh the log automatically. Upper right icon (Refresh, <<, >
93 3-6.6 IPv6 SSM Information The section describes the user to configure the Entries in the MLDv2 Information Tabl
94 3-7 MVR The MVR feature enables multicast traffic forwarding on the Multicast VLAN. In a multicast television application, a PC or a television w
95 Parameter description: MVR Mode : Enable/Disable the Global MVR. VLAN ID : Specify the Multicast VLAN ID.
1 INTRODUCTION Overview In this user’s manual, it will not only tell you how to install and connect your network system but configure and monit
96 3-7.2 Port Group Information The section describes user could display the MVR Groups detail information on the switch. Entries in the MVR Group T
97 3-7.3 Statistics The section describes the switch will display the MVR detail Statistics after you had config
98 3-8 LLDP The switch supports the LLDP. For current information on your switch model, The Link Layer Discovery Protocol (LLDP) provides a st
99 Parameter description: LLDP Parameters Tx Interval : The switch periodically transmits LLDP frames to its neig
100 Both the CDP and LLDP support "system capabilities", but the CDP capabilities cover capabilities that are not part of the LL
101 3-8.2 LLDP Neighbours This page provides a status overview for all LLDP neighbours. The displayed table contain
102 When a capability is enabled, the capability is followed by (+). If the capability is disabled, the capability is followed by (-). System Des
103 3-8.3 LLDP-MED Configuration Media Endpoint Discovery is an enhancement of LLDP, known as LLDP-MED, that provid
104 Rapid startup and Emergency Call Service Location Identification Discovery of endpoints is a critically important aspect of VoIP systems in gener
105 IETF Geopriv Civic Address based Location Configuration Information (Civic Address LCI). Country code : The t
2 Chapter 1 Operation of Web-based Management Initial ConfigurationThis chapter instructs you how to configure and manage the GEL-26
106 Postal community name : Postal community name - Example: Leonia. P.O. Box : Post office box (P.O. BOX) - Example: 12345. Additional code
107 Application Type : Intended use of the application types: 1. Voice - for use by dedicated IP Telephon
108 Port Policies Configuration : Every port may advertise a unique set of network policies or different attributes for the same network policies,
109 3-8.4 LLDP-MED Neighbours This page provides a status overview of all LLDP-MED neighbours. The displ
110 LLDP-MED Generic Endpoint (Class I) : The LLDP-MED Generic Endpoint (Class I) definition is applicable to all endpoint products that require
111 as PCs or laptops. 6. Video Conferencing - for use by dedicated Video Conferencing equipment and other similar a
112 3-8.5 EEE By using EEE power savings can be achieved at the expense of traffic latency. This latency occurs due to that the circuits EEE
113 Resolved Tx Tw : The resolved Tx Tw for this link. Note : NOT the link partner The resolved value that is the
114 3-8.6 Port Statistics Two types of counters are shown. Global counters are counters that refer to the whole switch, while local counters refer t
115 The displayed table contains a row for each port. The columns hold the following information: Local Port : T
1 NOTE: AS GEL-2671 the function enable dhcp, so If you do not have DHCP server to provide ip addresses to the sw
116 3- 9 Filtering Data Base Filtering Data Base Configuration gathers many functions, including MAC Table Information, Static MAC Learning, which c
117 Parameter description: Aging Configuration : By default, dynamic entries are removed from the MAC t
118 Buttons: Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values.
119 3- 9.2 Dynamic MAC Table Entries in the MAC Table are shown on this page. The MAC Table contains up to 8192 ent
120 3-10 VLAN To assign a specific VLAN for management purpose. The management VLAN is used to establish an IP connection to the switch from a works
121 A row of check boxes for each port is displayed for each VLAN ID. To include a port in a VLAN, check the box. To
122 3-10.2 Ports The function in VLAN Tag Rule Setting, user can input VID number to each port. The range of VID number is from 1 to 4094. User a
123 Parameter description: Ethertype for Custom S-ports : This field specifies the ether type used for Custom S-p
124 3-10.3 Switch Status The function Switch Status gathers the information of all VLAN status and reports it by the order of Staic NAS MVRP MVP
125 3-10.4 Port Status The function Port Status gathers the information of all VLAN status and reports it by the o
2 GEL-2671 web help function:
126 UVID : Shows UVID (untagged VLAN ID). Port's UVID determines the packet's behaviour at the egress side. Conflicts : Shows statu
127 3-10.5 Private VLANs In a private VLAN, communication between ports in that private VLAN is not permitted. A VL
128 3-10.5.2 Port Isolation Port Isolation provides for an apparatus and method to isolate ports on layer 2 switches on the same VLAN to restrict tr
129 3-10.6 MAC-based VLAN MAC address-based VLAN decides the VLAN for forwarding an untagged frame based on the sou
130 MAC Address : Indicates the MAC address. VLAN ID : Indicates the VLAN ID. Port Members : A row of check boxes for each port is disp
131 3-10.6.2 Status This section shows MAC-based VLAN entries configured by various MAC-based VLAN users. Currently
132 3-10.7 Protocol -based VLAN This section describe Protocol -based VLAN, The Switch support Protocol include Ethernet LLC SNAP Protocol, LLC The
133 Frame Type : Frame Type can have one of the following values: 1. Ethernet 2. LLC 3. SNAP NOTE: On c
134 3-10.7.2 Group to VLAN This section allows you to map a already configured Group Name to a VLAN for the selected switch. Web Interface To Disp
135 Auto-refresh : To evoke the auto-refresh icon then the device will refresh the information automatically.
1 CONNECTING NETWORK DEVICES The switch is designed to be connected to 10, 100 or 1000Mbps network cards
136 3-11 Voice VLAN Voice VLAN is VLAN configured specially for voice traffic. By adding the ports with voice devices attached to voice VLAN, we can
137 Parameter description: Mode : Indicates the Voice VLAN mode operation. We must disable MSTP feature
138 3-11.2 OUI The section describes to Configure VOICE VLAN OUI table. The maximum entry number is 16. Modifying the OUI table will restart auto de
139 3-12 GARP The Generic Attribute Registration Protocol (GARP) provides a generic framework whereby devices in
140 Parameter description: Port : The Port column shows the list of ports for which you can configure GARP settings. There are 2 types configurati
141 3-12.2 Statistics The section describes to port statistics of GARP for all switch ports. The port s
142 3-13 GVRP GVRP is an application based on Generic Attribute Registration Protocol (GARP), mainly used to automatically and dynamically maintain
143 Parameter description: GVRP Mode : GVRP Mode is a global setting, to enable the GVRP globally select 'En
144 3-13.2 Statistics The section describes to shows the basic GVRP Port statistics for all switch ports. The statistics relate to the current
145 3-14 QoS The switch support four QoS queues per port with strict or weighted fair queuing scheduling. It suppor
146 Parameter description: Port : The port number for which the configuration below applies. QoS class : Controls the default QoS class, i.e.,
147 3-14.2 Port Policing This section provides an overview of f QoS Ingress Port Policers for all switch ports The
148 Parameter description: Port : The logical port for the settings contained in the same row. Click on the port number in order to configure the
149 3-14.3 Port Scheduler This section provides an overview of QoS Egress Port Schedulers for all switch ports. an
150 Parameter description: Port : The logical port for the settings contained in the same row. Click on the port number in order to configure th
151 Queue Scheduler Percent : Shows the weight in percent for this queue. This parameter is only shown if "S
152 3-14.4 Port Shaping This section provides an overview of QoS Egress Port Shaping for all switch ports. Others the user could get all detail
153 Parameter description: Port : The logical port for the settings contained in the same row. Click on the por
154 Controls whether the queue is allowed to use excess bandwidth. Queue Scheduler Weight : Controls the weight for this queue. The default value
155 3-14.5 Port Tag Remarking The Section provides user to get an overview of QoS Egress Port Tag Remarking for
3 Step2. If the device is a network card and the switch is in the wiring closet, attach the other end of the cable segment to a modular wall outle
156 Buttons: Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values. Cancel – Click to
157 3-14.6 Port DSCP The section will teach user to set the QoS Port DSCP configuration that was allowed you to con
158 Parameter description: Port : The Port coulmn shows the list of ports for which you can configure dscp ingress and egress settings. Ingr
159 3-14.7 DSCP-Based QoS The section will teach user to configure the DSCP-Based QoS mode that This page allo
160 Parameter description: DSCP : Maximum number of support ed DSCP values are 64. Trust : Click to check if the DSCP value is trusted. Qo
161 3-14.8 TOS-Based QoS This page allows you to configure the basic QoS ToS based QoS Ingress Classification settin
162 Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values.
163 3-14.9 DSCP Translation The section describes the swtich allows you to configure the basic QoS DSCP Translatio
164 Parameter description: DSCP : Maximum number of supported DSCP values are 64 and valid DSCP value ranges from 0 to 63. Ingress : Ingress s
165 3-14.10 DSCP Classification The section describes to teach user to configure and allows you to map DSCP value
4 Chapter 2 System Configuration This chapter describes the entire basic configuration tasks which includes the System Information and
166 3-14.11 QoS Control List Configuration The section shows the QoS Control List(QCL), which is made up of the QCEs. Each row describes a QCE that i
167 Specify the type of Destination MAC addresses for incoming frame. Possible values are: Any: All types of Destin
168 1. Any 2. Ethernet 3. LLC 4. SNAP 5. IPv4 6. IPv6 NOTE: All frame types are explained below: 1. Any : Allow all types of frames.
169 3-14.12 QCL Status The section will let you know how to configure and shows the QCL status by different QCL u
170 Displays QCE status. It may happen that resources required to add a QCE may not available, in that case it shows conflict status as
171 3-14.13 Storm Control The section allows user to configure the Storm control for the switch. There is a unicas
172 3-15 s-Flow Agent The sFlow Collector configuration for the switch can be monitored and modified here. Up to 1 Collector is supported. This pag
173 The value accepted is within the range of 1-65535. But an appropriate port number not used by other protocols ne
174 3-15.2 Sampler The section display the sFlow sampler what you set or you can edit it for your requirement. That will help user based on
175 List of the port numbers on which sFlow is configured. sFlow Instance : Configured sFlow instance for the po
5
176 3-16 Loop Protection The loop Protection is used to detect the presence of traffic. When switch receives packet’s (looping detection frame) MA
177 Parameter description: General Settings: Enable Loop Protection: Controls whether loop protections is enabled
178 3-16.2 Status This page displays the loop protection port status the ports of the switch Web Interface To configure the Loop Protection para
179 Buttons: Refresh –Click to refresh the page immediately. Auto-Refresh- Check this box to enable an automatic
180 3-17 Single IP Single IP Management (SIM), a simple and useful method to optimize network utilities and management, is designed to manage a group
181 3-17.2 Information The section describes how to display the Single IP information what you set on the switch.
182 3-18 Easy Port Easy Port provides a convenient way to save and share common configurations. You can use it to enable features and settings based
183 To scroll to enable or disable the Port Security function on the Port. If you turn on the function then you need
184 3-19 Mirroring You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMO
185 Parameter description: Port to mirror on : Port to mirror also known as the mirror port. Frames from ports th
6 Parameter description: Model name: The model name of this device. System description: As it is, this tells what this device is. Here, it is
186 3-20 Trap Event Severity The function is used to set an Alarm trap and get the Event log. The Trap Events Configuration function is used to enab
187 3-21 SMTP Configuration The function is used to set an Alarm trap when the switch alarm then you could s
188 3-22 UPnP UPnP is an acronym for Universal Plug and Play. The goals of UPnP are to allow devices to connect seamlessly and to simplify the i
189 Chapter 4. Security This chapter describes all of the switch security configuration tasks
190 Parameter description: Mode of IP Source Guard Configuration : Enable the Global IP Source Guard or disable the Global IP Source Guard. All
191 4-1.2 Static Table The section describes to configure the Static IP Source Guard Table parameters of the switch.
192 4-1.3 Dynamic Table The section describes to configure the Dynamic IP Source Guard Table parameters of the switch. You could use the Dynamic IP
193 4-2 ARP Inspection The section describes to configure the ARP Inspection parameters of the switch. You could us
194 Parameter description: Mode of ARP Inspection Configuration : Enable the Global ARP Inspection or disable the Global ARP Inspection. Port
195 4-2.2 Static Table The section describes to configure the Static ARP Inspection Table parameters of the switch.
7 To display the bridge FDB size information. Transmit Queue : To display the device’s transmit hardware priorit
196 4-2.3 Dynamic Table The section describes to configure the Dynamic ARP Inspection Table parameters of the switch. The Dynamic ARP Inspec
197 4-3 DHCP Snooping The section describes to configure the DHCP Snooping parameters of the switch. The DHCP Snoop
198 Parameter description: Snooping Mode : Indicates the DHCP snooping mode operation. Possible modes are: Enabled: Enable DHCP snooping mode ope
199 4-3.2 Statistics The section describes to show the DHCP Snooping Statistics information of the switch. The stat
200 The number of lease unknown (option 53 with value 12) packets received and transmitted. Rx and Tx Lease Active : The number of lease active (
201 4-4 DHCP Relay The section describes how to forward DHCP requests to another specific DHCP servers via DHCP rel
202 Relay Information Policy : Indicates the DHCP relay information option policy. When DHCP relay information mode operation is enabled, if agent
203 4-4.2 Statistics The section describes to show the DHCP Relay Statistics information of the switch.
204 Replace Agent Option : The number of packets which were replaced with relay agent information option. Keep Agent Option : The number of pa
205 4-5 NAS The section describes to configure the NAS parameters of the switch. The NAS server can be employed to
8 2-1.2 Configuration You can identify the system by configuring the contact information, name, and location of the switch. Web interface To confi
206 Parameter description: Mode : Indicates if NAS is globally enabled or disabled on the switch. If globally disabled, all ports are allowed forw
207 RADIUS-assigned QoS provides a means to centrally control the traffic class to which traffic coming from a
208 In this mode, the switch will send one EAPOL Success frame when the port link comes up, and any client on the port will be allowed network access
209 port (for instance through a hub) to piggy-back on the successfully authenticated client and get network access
210 Only the first occurrence of the attribute in the packet will be considered, and to be valid, it must follow this rule: • All 8 octets in the at
211 enabled, the port will now be placed in the Guest VLAN. If disabled, the switch will first check its history to
212 4-5.2 Switch Status The section describes to show the each port NAS status information of the switch.The status includes Admin State Port State,
213 Port VLAN ID : The VLAN ID that NAS has put the port in. The field is blank, if the Port VLAN ID is not overr
214 4-5.3 Port Status The section describes to provide detailed NAS statistics for a specific switch port running EAPOL-based IEEE 802.1X authentica
215 • Single 802.1X • Multi 802.1X Backend Server Counters : These backend (RADIUS) frame counters are
9 2-2 Time This page configures the switch Time. Time configure is including Time Configuration and NTP Configuration 2-2.1 Manual The switch prov
216 Shows the date and time of the last authentication of the client (successful as well as unsuccessful). Auto-refresh : To evoke the auto-ref
217 4-6 AAA This section shows you to use an AAA (Authentication, Authorization, Accounting) server to provide acce
218 Figure 4-5.3.3: The RADIUS Configuration Figure 4-5.3.4: The RADIUS Accounting Configuration Figure 4-5.3.4: The TACACS+ Authentication C
219 RADIUS Authentication Server Configuration The table has one row for each RADIUS Authentication Server and a num
220 Secret : The secret - up to 29 characters long - shared between the TACACS+ Authentication Server and the switch. Buttons: Sa
221 4-6.2 Radius Overview This section shows you an overview of the RADIUS Authentication and Accounting servers st
222 module is ready to accept accounting attempts. Dead (X seconds left): Accounting attempts were made to this server, but it did not reply within t
223 4-6.3 Radius Details This section shows you detailed statistics of the RADIUS Authentication and Acc
224 4-7 Port Security This section shows you to to configure the Port Security settings of the Switch. You can use the Port Security feature to
225 Mode : Indicates if Limit Control is globally enabled or disabled on the switch. If globally disabled, other
10 The switch supports valid configurable day light saving time is –5 ~ +5 step one hour. The zero for this parameter means it need not have to adjus
226 Trap & Shutdown: If Limit + 1 MAC addresses is seen on the port, both the "Trap" and the "Shutdown" actions described abo
227 4-7.2 Switch Status This section shows the Port Security status. Port Security is a module with no
228 which are: Port : The port number for which the status applies. Click the port number to see the status for this particular port. Users :
229 4-7.3 Port Status This section shows the MAC addresses secured by the Port Security module. Port Security is a
230 4-8 Access Management This section shows you to configure access management table of the Switch including HTTP/HTTPS, SNMP, and TELN
231 HTTP/HTTPS : Indicates that the host can access the switch from HTTP/HTTPS interface if the host IP address
232 4-8.2 Statistics This section shows you a detailed statistics of the Access Management including HTTP, HTTPS, SSH. TELNET, and S
233 4-9 SSH This section shows you to use SSH (Secure SHell) to securely access the Switch. SSH is a secure communi
234 4-10 HTTPs This section shows you how to use HTTPS to securely access the Switch. HTTPS is a secure communication protocol that combines authent
235 4-11 Auth Method This page shows how to configure a user with authenticated when he logs into the switch via on
11 2-2.2 NTP NTP is Network Time Protocol and is used to sync the network time based Greenwich Mean Time (GMT). If use the NTP mode and select a bu
236 Chapter 5. Maintenance This chapter describes all of the switch Maintenance configuration tasks to enhance the performance
237 5-2 Firmware This section describes how to upgrade Firmware. The Switch can be enhanced with more value-added
238 5-2.2 Firmware Selection Due to the switch supports Dual image for firmware redundancy purpose. You can select what firmware image for your
239 NOTE: 1. In case the active firmware image is the alternate image, only the "Active Image" table i
240 5-3 Save / Restore This section describes how to save and restore the Switch configuration including reset to Factory Defaults, Save Start, Save
241 Save – Click the “Save” button to save current setting as Start Configuration. 5-3.3 Save User This section des
242 5-4 Export / Import This section describes how to export and import the Switch configuration. Any current configuration files will be
243 5-4.2 Import Config This section describes to export the switch Configuration for maintenance needs.
244 5-5 Diagnostics This section provides a set of basic system diagnosis. It let users know that whether the system is health or needs to be fixed.
245 5-5.2 Ping6 This section allows you to issue ICMPv6 PING packets to troubleshoot IPv6 connectivity issues.
12 2-3 Account In this function, only administrator can create, modify or delete the username and password. Administrator can modify other guest id
246 5-5.3 VeriPHY This section is used for running the VeriPHY Cable Diagnostics. Press to run the diagnostics. This will take approximately 5 secon
A. Glossary of Web-based Management A ACE ACE is an acronym for Access Control Entry. It describes access permission associated with a particula
248 (Also Port Aggregation, Link Aggregation). ARP ARP is an acronym for Address Resolution Protocol. It is a protocol that used to convert an IP a
249 Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather tha
250 EPS EPS is an abbreviation for Ethernet Protection Switching defined in ITU/T G.8031. Ethernet Type Ethernet Type, or EtherType, is a field i
251 ICMP is an acronym for Internet Control Message Protocol. It is a protocol that generated the error response, di
252 IP Source Guard is a secure feature used to restrict IP traffic on DHCP snooping untrusted ports by filtering traffic based on the DHCP Snooping
253 MEP MEP is an acronym for Maintenance Entity Endpoint and is an endpoint in a Maintenance Entity Group (ITU-T Y
254 O OAM OAM is an acronym for Operation Administration and Maintenance. It is a protocol described in ITU-T Y.1731 used to implement carrier et
255 POP3 POP3 is an acronym for Post Office Protocol version 3. It is a protocol for email clients to retrieve emai
13 The privilege level of the user. The allowed range is 1 to 15. If the privilege level value is 15, it can access
256 RARP is an acronym for Reverse Address Resolution Protocol. It is a protocol that is used to obtain an IP address for a given hardware address, s
257 access points within range advertising their SSIDs, and can choose one to connect to based on pre-configuration,
258 User Datagram Protocol (UDP) and provides file writing and reading, but it does not provide directory service and security features. U UDP U
14 2-3.2 Privitege Level This page provides an overview of the privilege levels. The switch provides user set Account, Aggregation, Diagnostics ,EEE
15 Parameter description: Group Name The name identifying the privilege group. In most cases, a privilege level
i The information in this document is subject to change without notice. Unless the explicit written permission of M
16 2-4 IP IP is an acronym for Internet Protocol. It is a protocol used for communicating data across an internet network. IP is a "best effor
17 Enable the DHCP client by checking this box. If DHCP fails and the configured IP address is zero, DHCP will retry
18 2-4.2 IPV6 This section describes how to configure the switch-managed IPv6 information. The Configured column is used to view or chang
19 2-5 Syslog The Syslog is a standard for logging program messages . It allows separation of the software that ge
20 2-5.2 Log This section describes that display the system log information of the switch Web Interface To display the log configuration in the we
21 2-5.3 Detailed Log This section describes that display the detailed log information of the switch Web Interface
22 2-6 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped with S
23 2-6.2 Communities The function is used to configure SNMPv3 communities. The Community and UserName is unique. T
24 2-6.3 Users The function is used to configure SNMPv3 user. The Entry index key is UserName. To create a new UserName account, please check
25 A string identifying the authentication password phrase. For MD5 authentication protocol, the allowed string leng
ii DISCLAIMER. EXCEPT AS PROVIDED ABOVE, THE SOFTWARE IS PROVIDED “AS IS ” AND MANMANUFACTURE AND ITS LICENSORS MAKE NO WARRANTIES, EXPRESS OR IMPL
26 2-6.4 Groups The function is used to configure SNMPv3 group. The Entry index key are Security Model and Security Name. To create a new group acco
27 2-6.5 Views The function is used to configure SNMPv3 view. The Entry index key are OID Subtree and View Name. T
28 2-6.6 Access The function is used to configure SNMPv3 accesses. The Entry index key are Group Name, Security Model and Security level. To create
29 Auth, Priv: Authentication and privacy. Read View Name The name of the MIB view defining the MIB objects for
30 2-6.7 Tarp The function is used to configure SNMP trap. To create a new trap account, please check <No number> button, and enter the trap i
31 Security Level: Indicates what kind of message will send to Security Level. Possible modes are: Info: Send i
32 Chapter 3. Configuration This chapter describes all of the basic network configuration tasks which includes the Ports, Layer 2 netwo
33 Parameter description: Port : This is the logical port number for this row. Link : The current link state
34 3-1.2 Port Description The section describes to configure the Port’s alias or any descriptions for the Port Identity. It provides use
36 3-1.3 Traffic Overview The section describes to the Port statistics information and provides overview of general traffic statistics for all sw
37 3-1.4 Detailed Statistics The section describes how to provide detailed traffic statistics for a specific swi
38 Rx and Tx Broadcast : The number of received and transmitted (good and bad) broadcast packets. Rx and Tx Pause : A count of the MAC Con
39 3-1.5 Qos Statistics The section describes that switch could display the QoS detailed Queuing coun
40 3-1.6 SFP Information The section describes that switch could display the SFP module detail information which you connect it to the switch. T
41 Show the serial number assigned by the manufacturer. Date Code: Show the date this SFP module was made. Tem
42 3-1.7 EEE The section which allows the user to inspect and configure the current EEE port settings. EEE is a power saving option that reduces
43 Parameter description: EEE Port Configuration: The EEE port settings relate to the currently selected, as ref
44 3-2 ACL The GEL-2671 switch access control list (ACL) is probably the most commonly used object in the IOS. It is used for packet filtering but a
45 Action : Select whether forwarding is permitted ("Permit") or denied ("Deny"). The default
iv Table of Contents INTRODUCTION ...
46 3-2.2 Rate Limiters The section describes how to configure the switch’s ACL Rate Limiter parameters. The Rate Limiter Level from 1 to 16 that all
47 3-2.3 Access Control List The section describes how to configure Access Control List rule. An Access Control Lis
48 Parameter description: Ingress Port : Indicates the ingress port of the ACE. Possible values are: Any: The ACE will match any ingress port.
49 : Edits the ACE row. : Moves the ACE up the list. : Moves the ACE down the list. : Deletes the ACE. : The low
50 3-2.4 ACL Status The section describes how to shows the ACL status by different ACL users. Each row describes the ACE that is de
51 Mirror : Specify the mirror operation of this port. The allowed values are: Enabled: Frames received on the p
52 3-3 Aggregation The Aggregation is used to configure the settings of Link Aggregation. You can bundle more than one port with the same speed, ful
53 Parameter description: Hash Code Contributors Source MAC Address : The Source MAC address can be used to calcu
54 3-3.2 LACP Ports using Link Aggregation Control Protocol (according to IEEE 802.3ad specification) as their trunking method can choose their
55 Parameter description: Port : The switch port number. LACP Enabled : Controls whether LACP is enabled on
v 3-4.6 Bridge Status ...
56 3-3.2.2 System Status This section describes that when you complete to set LACP function on the switch then it provides a status overview for all
57 3-3.2.3 Port Status This section describes that when you complete to set LACP function on the switch then it pro
58 3-3.2.4 Port Statistics This section describes that when you complete to set LACP function on the switch then it provides a Port Statistics overv
59 3-4 Spanning Tree The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provi
60 Figure 3-4.1: The STP Bridge Configuration Parameter description: Basic Settings Protocol Version : The STP protocol version setting. Valid
61 certain time. If recovery is not enabled, ports have to be disabled and re-enabled for normal STP o
62 2-4.2 MSTI Mapping When you implement an Spanning Tree protocol on the switch that the bridge instance. The CIST is not available for explicit ma
63 MSTI Mapping MSTI : The bridge instance. The CIST is not available for explicit mapping, as it will receive
64 3-4.3 MSTI Priorities When you implement a Spanning Tree protocol on the switch that the bridge instance. The CIST is the default instance which
65 3-4.4 CIST Ports When you implement an Spanning Tree protocol on the switch that the bridge instance. You need t
vi 3-14.13 Storm Control ...
66 Specific setting, a user-defined value can be entered. The path cost is used when establishing the active topology of the netwo
67 An MSTI port is a virtual port, which is instantiated separately for each active CIST (physical) port for each MS
68 Parameter description: Port : The switch port number of the corresponding STP CIST (and MSTI) port. Path Cost : Controls the path cost inc
69 3-4.6 Bridge Status After you complete the MSTI Port configuration that you could to ask the switch display the
70 3-4.7 Port Status After you complete the STP configuration the you could to ask the switch display the STP Port Status. The Section provides
71 3-4.8 Port Statistics After you complete the STP configuration then you could to let the switch display the STP
72 3-5 IGMP Snooping The function, is used to establish the multicast groups to forward the multicast packet to the member ports, and, in nature, av
73 Parameter description: Snooping Enabled: Enable the Global IGMP Snooping. Unregistered IPMCv4 Flooding e
74 3-5.2 VLAN Configuration The section describes the VLAN configuration setting process integrated with IGMP Snooping function. For each setting pa
75 seconds; default query response interval is 100 in tenths of seconds (10 seconds). LLQI (LMQI for IGMP) : Las
vii 5-5.1 Ping ...
76 3-5.3 Port Group Filtering The section describes how to set the IGMP Port Group Filtering? With the IGMP filtering feature, an user can exert thi
77 Filtering Groups : The IP Multicast Group that will be filtered. Buttons: Save – Click to save changes. Re
78 3-5.4 Status After you complete the IGMP Snooping configuration, then you could to let the switch display the IGMP Snooping Status. The Sect
79 V1 Reports Received : The number of Received V1 Reports. V2 Reports Received : The number of Received V2 R
80 3-5.5 Group Infermation After you complete to set the IGMP Snooping function then you could let the switch to display the IGMP Snooping Group Inf
81 3-5.6 IPv4 SSM information Source Specific Multicast (SSM) is a datagram delivery model that best supports one-t
82 Group address of the group displayed. Port : Switch port number. Mode : Indicates the filtering mode maintained per (VLAN ID, port number,
83 3-6 MLD Snooping Curiously enough, a network node that acts as a source of IPv6 multicast traffic is only an ind
84 Parameter description: Snooping Enabled : Enable the Global MLD Snooping. Unregistered IPMCv6 Flooding enabled : Enable unregistered IP
85 The Port index what you enable or disable the MLD Snooping function. Fast Leave : To evoke to enable the fast
Comments to this Manuals