LevelOne GEL-2671 User Manual

Browse online or download User Manual for Network switches LevelOne GEL-2671. LevelOne GEL-2671 network switch

  • Download
  • Add to my manuals
  • Print
  • Page
    / 272
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - GEL-2671

GEL-2671 24 GE With 4 Shared SFP + 2 GE SFP L2 Managed Switch User Manual Rev 1.0 Dec 2013

Page 3

86 3-6.2 VLAN Configuration When MLD snooping is enabled on a VLAN, the switch acts to minimize unnecessary multicast traffic. If the s

Page 4

87 Last Listener Query Interval. The Last Listener Query Interval is the Maximum Response Delay used to calculate

Page 5

88 3-6.3 Port Group Filtering The section describes that you could to set the Port Group Filtering in the MLD Snooping function. On the UI that you

Page 6

89 3-6.4 Status The section describes when you complete the MLD Snooping and how to display the MLD Snooping Status

Page 7

90  Queries Received : The number of Received Queries.  V1 Reports Received : The number of Received V1 Reports.  V2 Reports Received : The n

Page 8

91 3-6.5 Group Information The section describes user could set the MLD Snooping Groups Information. The "Star

Page 9

92  Auto-refresh : To evoke the auto-refresh icon then the device will refresh the log automatically.  Upper right icon (Refresh, <<, >

Page 10

93 3-6.6 IPv6 SSM Information The section describes the user to configure the Entries in the MLDv2 Information Tabl

Page 11 - INTRODUCTION

94 3-7 MVR The MVR feature enables multicast traffic forwarding on the Multicast VLAN. In a multicast television application, a PC or a television w

Page 12 - Configuration

95 Parameter description:  MVR Mode : Enable/Disable the Global MVR.  VLAN ID : Specify the Multicast VLAN ID.

Page 13

1 INTRODUCTION Overview In this user’s manual, it will not only tell you how to install and connect your network system but configure and monit

Page 14 - GEL-2671 web help function:

96 3-7.2 Port Group Information The section describes user could display the MVR Groups detail information on the switch. Entries in the MVR Group T

Page 15

97 3-7.3 Statistics The section describes the switch will display the MVR detail Statistics after you had config

Page 16

98 3-8 LLDP The switch supports the LLDP. For current information on your switch model, The Link Layer Discovery Protocol (LLDP) provides a st

Page 17

99 Parameter description: LLDP Parameters  Tx Interval : The switch periodically transmits LLDP frames to its neig

Page 18 - System Configuration

100 Both the CDP and LLDP support "system capabilities", but the CDP capabilities cover capabilities that are not part of the LL

Page 19

101 3-8.2 LLDP Neighbours This page provides a status overview for all LLDP neighbours. The displayed table contain

Page 20

102 When a capability is enabled, the capability is followed by (+). If the capability is disabled, the capability is followed by (-).  System Des

Page 21

103 3-8.3 LLDP-MED Configuration Media Endpoint Discovery is an enhancement of LLDP, known as LLDP-MED, that provid

Page 22 - 2-1.2 Configuration

104 Rapid startup and Emergency Call Service Location Identification Discovery of endpoints is a critically important aspect of VoIP systems in gener

Page 23 - 2-2 Time

105 IETF Geopriv Civic Address based Location Configuration Information (Civic Address LCI).  Country code : The t

Page 24

2 Chapter 1 Operation of Web-based Management Initial ConfigurationThis chapter instructs you how to configure and manage the GEL-26

Page 25 - 2-2.2 NTP

106  Postal community name : Postal community name - Example: Leonia.  P.O. Box : Post office box (P.O. BOX) - Example: 12345.  Additional code

Page 26 - 2-3.1 Users

107  Application Type : Intended use of the application types: 1. Voice - for use by dedicated IP Telephon

Page 27

108  Port Policies Configuration : Every port may advertise a unique set of network policies or different attributes for the same network policies,

Page 28 - 2-3.2 Privitege Level

109 3-8.4 LLDP-MED Neighbours This page provides a status overview of all LLDP-MED neighbours. The displ

Page 29

110  LLDP-MED Generic Endpoint (Class I) : The LLDP-MED Generic Endpoint (Class I) definition is applicable to all endpoint products that require

Page 30 - 2-4.1 IPV4

111 as PCs or laptops. 6. Video Conferencing - for use by dedicated Video Conferencing equipment and other similar a

Page 31

112 3-8.5 EEE By using EEE power savings can be achieved at the expense of traffic latency. This latency occurs due to that the circuits EEE

Page 32 - 2-4.2 IPV6

113  Resolved Tx Tw : The resolved Tx Tw for this link. Note : NOT the link partner The resolved value that is the

Page 33 - 2-5 Syslog

114 3-8.6 Port Statistics Two types of counters are shown. Global counters are counters that refer to the whole switch, while local counters refer t

Page 34 - 2-5.2 Log

115 The displayed table contains a row for each port. The columns hold the following information:  Local Port : T

Page 35 - 2-5.3 Detailed Log

1 NOTE: AS GEL-2671 the function enable dhcp, so If you do not have DHCP server to provide ip addresses to the sw

Page 36 - 2-6 SNMP

116 3- 9 Filtering Data Base Filtering Data Base Configuration gathers many functions, including MAC Table Information, Static MAC Learning, which c

Page 37 - 2-6.2 Communities

117 Parameter description:  Aging Configuration : By default, dynamic entries are removed from the MAC t

Page 38 - 2-6.3 Users

118  Buttons: Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values.

Page 39

119 3- 9.2 Dynamic MAC Table Entries in the MAC Table are shown on this page. The MAC Table contains up to 8192 ent

Page 40 - 2-6.4 Groups

120 3-10 VLAN To assign a specific VLAN for management purpose. The management VLAN is used to establish an IP connection to the switch from a works

Page 41 - 2-6.5 Views

121 A row of check boxes for each port is displayed for each VLAN ID. To include a port in a VLAN, check the box. To

Page 42 - 2-6.6 Access

122 3-10.2 Ports The function in VLAN Tag Rule Setting, user can input VID number to each port. The range of VID number is from 1 to 4094. User a

Page 43

123 Parameter description:  Ethertype for Custom S-ports : This field specifies the ether type used for Custom S-p

Page 44 - 2-6.7 Tarp

124 3-10.3 Switch Status The function Switch Status gathers the information of all VLAN status and reports it by the order of Staic NAS MVRP MVP

Page 45

125 3-10.4 Port Status The function Port Status gathers the information of all VLAN status and reports it by the o

Page 46 - Configuration

2 GEL-2671 web help function:

Page 47

126  UVID : Shows UVID (untagged VLAN ID). Port's UVID determines the packet's behaviour at the egress side.  Conflicts : Shows statu

Page 48 - 3-1.2 Port Description

127 3-10.5 Private VLANs In a private VLAN, communication between ports in that private VLAN is not permitted. A VL

Page 49

128 3-10.5.2 Port Isolation Port Isolation provides for an apparatus and method to isolate ports on layer 2 switches on the same VLAN to restrict tr

Page 50 - 3-1.3 Traffic Overview

129 3-10.6 MAC-based VLAN MAC address-based VLAN decides the VLAN for forwarding an untagged frame based on the sou

Page 51 - 3-1.4 Detailed Statistics

130  MAC Address : Indicates the MAC address.  VLAN ID : Indicates the VLAN ID.  Port Members : A row of check boxes for each port is disp

Page 52 - Transmit Error Counters

131 3-10.6.2 Status This section shows MAC-based VLAN entries configured by various MAC-based VLAN users. Currently

Page 53 - 3-1.5 Qos Statistics

132 3-10.7 Protocol -based VLAN This section describe Protocol -based VLAN, The Switch support Protocol include Ethernet LLC SNAP Protocol, LLC The

Page 54 - 3-1.6 SFP Information

133  Frame Type : Frame Type can have one of the following values: 1. Ethernet 2. LLC 3. SNAP NOTE: On c

Page 55

134 3-10.7.2 Group to VLAN This section allows you to map a already configured Group Name to a VLAN for the selected switch. Web Interface To Disp

Page 56 - 3-1.7 EEE

135  Auto-refresh : To evoke the auto-refresh icon then the device will refresh the information automatically. 

Page 57

1 CONNECTING NETWORK DEVICES The switch is designed to be connected to 10, 100 or 1000Mbps network cards

Page 58 - 3-2 ACL

136 3-11 Voice VLAN Voice VLAN is VLAN configured specially for voice traffic. By adding the ports with voice devices attached to voice VLAN, we can

Page 59

137 Parameter description:  Mode : Indicates the Voice VLAN mode operation. We must disable MSTP feature

Page 60 - 3-2.2 Rate Limiters

138 3-11.2 OUI The section describes to Configure VOICE VLAN OUI table. The maximum entry number is 16. Modifying the OUI table will restart auto de

Page 61 - 3-2.3 Access Control List

139 3-12 GARP The Generic Attribute Registration Protocol (GARP) provides a generic framework whereby devices in

Page 62

140 Parameter description:  Port : The Port column shows the list of ports for which you can configure GARP settings. There are 2 types configurati

Page 63

141 3-12.2 Statistics The section describes to port statistics of GARP for all switch ports. The port s

Page 64 - 3-2.4 ACL Status

142 3-13 GVRP GVRP is an application based on Generic Attribute Registration Protocol (GARP), mainly used to automatically and dynamically maintain

Page 65

143 Parameter description:  GVRP Mode : GVRP Mode is a global setting, to enable the GVRP globally select 'En

Page 66 - 3-3 Aggregation

144 3-13.2 Statistics The section describes to shows the basic GVRP Port statistics for all switch ports. The statistics relate to the current

Page 67

145 3-14 QoS The switch support four QoS queues per port with strict or weighted fair queuing scheduling. It suppor

Page 69

146 Parameter description:  Port : The port number for which the configuration below applies.  QoS class : Controls the default QoS class, i.e.,

Page 70

147 3-14.2 Port Policing This section provides an overview of f QoS Ingress Port Policers for all switch ports The

Page 71

148 Parameter description:  Port : The logical port for the settings contained in the same row. Click on the port number in order to configure the

Page 72

149 3-14.3 Port Scheduler This section provides an overview of QoS Egress Port Schedulers for all switch ports. an

Page 73 - 3-4 Spanning Tree

150 Parameter description:  Port : The logical port for the settings contained in the same row. Click on the port number in order to configure th

Page 74 - Advanced Settings

151  Queue Scheduler Percent : Shows the weight in percent for this queue. This parameter is only shown if "S

Page 75

152 3-14.4 Port Shaping This section provides an overview of QoS Egress Port Shaping for all switch ports. Others the user could get all detail

Page 76 - 2-4.2 MSTI Mapping

153 Parameter description:  Port : The logical port for the settings contained in the same row. Click on the por

Page 77 - MSTI Mapping

154 Controls whether the queue is allowed to use excess bandwidth.  Queue Scheduler Weight : Controls the weight for this queue. The default value

Page 78 - 3-4.3 MSTI Priorities

155 3-14.5 Port Tag Remarking The Section provides user to get an overview of QoS Egress Port Tag Remarking for

Page 79 - 3-4.4 CIST Ports

3 Step2. If the device is a network card and the switch is in the wiring closet, attach the other end of the cable segment to a modular wall outle

Page 80 - 3-4.5 MSTI Ports

156  Buttons: Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values. Cancel – Click to

Page 81

157 3-14.6 Port DSCP The section will teach user to set the QoS Port DSCP configuration that was allowed you to con

Page 82

158 Parameter description:  Port : The Port coulmn shows the list of ports for which you can configure dscp ingress and egress settings.  Ingr

Page 83 - 3-4.6 Bridge Status

159 3-14.7 DSCP-Based QoS The section will teach user to configure the DSCP-Based QoS mode that This page allo

Page 84 - 3-4.7 Port Status

160 Parameter description:  DSCP : Maximum number of support ed DSCP values are 64.  Trust : Click to check if the DSCP value is trusted.  Qo

Page 85 - 3-4.8 Port Statistics

161 3-14.8 TOS-Based QoS This page allows you to configure the basic QoS ToS based QoS Ingress Classification settin

Page 86 - 3-5 IGMP Snooping

162 Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values.

Page 87

163 3-14.9 DSCP Translation The section describes the swtich allows you to configure the basic QoS DSCP Translatio

Page 88 - Parameter description:

164 Parameter description:  DSCP : Maximum number of supported DSCP values are 64 and valid DSCP value ranges from 0 to 63.  Ingress : Ingress s

Page 89

165 3-14.10 DSCP Classification The section describes to teach user to configure and allows you to map DSCP value

Page 90 - 3-5.3 Port Group Filtering

4 Chapter 2 System Configuration This chapter describes the entire basic configuration tasks which includes the System Information and

Page 91

166 3-14.11 QoS Control List Configuration The section shows the QoS Control List(QCL), which is made up of the QCEs. Each row describes a QCE that i

Page 92 - 3-5.4 Status

167 Specify the type of Destination MAC addresses for incoming frame. Possible values are: Any: All types of Destin

Page 93

168 1. Any 2. Ethernet 3. LLC 4. SNAP 5. IPv4 6. IPv6 NOTE: All frame types are explained below: 1. Any : Allow all types of frames.

Page 94 - IGMP Group Table Columns

169 3-14.12 QCL Status The section will let you know how to configure and shows the QCL status by different QCL u

Page 95

170 Displays QCE status. It may happen that resources required to add a QCE may not available, in that case it shows conflict status as

Page 96

171 3-14.13 Storm Control The section allows user to configure the Storm control for the switch. There is a unicas

Page 97 - 3-6 MLD Snooping

172 3-15 s-Flow Agent The sFlow Collector configuration for the switch can be monitored and modified here. Up to 1 Collector is supported. This pag

Page 98

173 The value accepted is within the range of 1-65535. But an appropriate port number not used by other protocols ne

Page 99

174 3-15.2 Sampler The section display the sFlow sampler what you set or you can edit it for your requirement. That will help user based on

Page 100 - Web Interface

175 List of the port numbers on which sFlow is configured.  sFlow Instance : Configured sFlow instance for the po

Page 102 - 3-6.3 Port Group Filtering

176 3-16 Loop Protection The loop Protection is used to detect the presence of traffic. When switch receives packet’s (looping detection frame) MA

Page 103 - 3-6.4 Status

177 Parameter description: General Settings:  Enable Loop Protection: Controls whether loop protections is enabled

Page 104

178 3-16.2 Status This page displays the loop protection port status the ports of the switch Web Interface To configure the Loop Protection para

Page 105 - 3-6.5 Group Information

179  Buttons: Refresh –Click to refresh the page immediately. Auto-Refresh- Check this box to enable an automatic

Page 106

180 3-17 Single IP Single IP Management (SIM), a simple and useful method to optimize network utilities and management, is designed to manage a group

Page 107 - 3-6.6 IPv6 SSM Information

181 3-17.2 Information The section describes how to display the Single IP information what you set on the switch.

Page 108 - 3-7 MVR

182 3-18 Easy Port Easy Port provides a convenient way to save and share common configurations. You can use it to enable features and settings based

Page 109

183 To scroll to enable or disable the Port Security function on the Port. If you turn on the function then you need

Page 110 - MVR Group Table Columns

184 3-19 Mirroring You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMO

Page 111 - 3-7.3 Statistics

185 Parameter description:  Port to mirror on : Port to mirror also known as the mirror port. Frames from ports th

Page 113 - LLDP Port Configuration

6 Parameter description:  Model name: The model name of this device.  System description: As it is, this tells what this device is. Here, it is

Page 114

186 3-20 Trap Event Severity The function is used to set an Alarm trap and get the Event log. The Trap Events Configuration function is used to enab

Page 115 - 3-8.2 LLDP Neighbours

187 3-21 SMTP Configuration The function is used to set an Alarm trap when the switch alarm then you could s

Page 116

188 3-22 UPnP UPnP is an acronym for Universal Plug and Play. The goals of UPnP are to allow devices to connect seamlessly and to simplify the i

Page 117 - Fast start repeat count

189 Chapter 4. Security This chapter describes all of the switch security configuration tasks

Page 118 - Civic Address Location

190 Parameter description:  Mode of IP Source Guard Configuration : Enable the Global IP Source Guard or disable the Global IP Source Guard. All

Page 119

191 4-1.2 Static Table The section describes to configure the Static IP Source Guard Table parameters of the switch.

Page 120 - Policies

192 4-1.3 Dynamic Table The section describes to configure the Dynamic IP Source Guard Table parameters of the switch. You could use the Dynamic IP

Page 121

193 4-2 ARP Inspection The section describes to configure the ARP Inspection parameters of the switch. You could us

Page 122

194 Parameter description:  Mode of ARP Inspection Configuration : Enable the Global ARP Inspection or disable the Global ARP Inspection.  Port

Page 123 - 3-8.4 LLDP-MED Neighbours

195 4-2.2 Static Table The section describes to configure the Static ARP Inspection Table parameters of the switch.

Page 124

7 To display the bridge FDB size information.  Transmit Queue : To display the device’s transmit hardware priorit

Page 125

196 4-2.3 Dynamic Table The section describes to configure the Dynamic ARP Inspection Table parameters of the switch. The Dynamic ARP Inspec

Page 126 - 3-8.5 EEE

197 4-3 DHCP Snooping The section describes to configure the DHCP Snooping parameters of the switch. The DHCP Snoop

Page 127

198 Parameter description:  Snooping Mode : Indicates the DHCP snooping mode operation. Possible modes are: Enabled: Enable DHCP snooping mode ope

Page 128 - Local Counters

199 4-3.2 Statistics The section describes to show the DHCP Snooping Statistics information of the switch. The stat

Page 129

200 The number of lease unknown (option 53 with value 12) packets received and transmitted.  Rx and Tx Lease Active : The number of lease active (

Page 130 - 3- 9 Filtering Data Base

201 4-4 DHCP Relay The section describes how to forward DHCP requests to another specific DHCP servers via DHCP rel

Page 131 - MAC Table Learning

202  Relay Information Policy : Indicates the DHCP relay information option policy. When DHCP relay information mode operation is enabled, if agent

Page 132 -  Buttons:

203 4-4.2 Statistics The section describes to show the DHCP Relay Statistics information of the switch.

Page 133 - MAC Table Columns

204  Replace Agent Option : The number of packets which were replaced with relay agent information option.  Keep Agent Option : The number of pa

Page 134 - 3-10 VLAN

205 4-5 NAS The section describes to configure the NAS parameters of the switch. The NAS server can be employed to

Page 135

8 2-1.2 Configuration You can identify the system by configuring the contact information, name, and location of the switch. Web interface To confi

Page 136 - Web Interface

206 Parameter description:  Mode : Indicates if NAS is globally enabled or disabled on the switch. If globally disabled, all ports are allowed forw

Page 137

207 RADIUS-assigned QoS provides a means to centrally control the traffic class to which traffic coming from a

Page 138

208 In this mode, the switch will send one EAPOL Success frame when the port link comes up, and any client on the port will be allowed network access

Page 139 - 3-10.4 Port Status

209 port (for instance through a hub) to piggy-back on the successfully authenticated client and get network access

Page 140

210 Only the first occurrence of the attribute in the packet will be considered, and to be valid, it must follow this rule: • All 8 octets in the at

Page 141 - 3-10.5 Private VLANs

211 enabled, the port will now be placed in the Guest VLAN. If disabled, the switch will first check its history to

Page 142 - 3-10.5.2 Port Isolation

212 4-5.2 Switch Status The section describes to show the each port NAS status information of the switch.The status includes Admin State Port State,

Page 143 - Web Interface

213  Port VLAN ID : The VLAN ID that NAS has put the port in. The field is blank, if the Port VLAN ID is not overr

Page 144

214 4-5.3 Port Status The section describes to provide detailed NAS statistics for a specific switch port running EAPOL-based IEEE 802.1X authentica

Page 145 - 3-10.6.2 Status

215 • Single 802.1X • Multi 802.1X  Backend Server Counters : These backend (RADIUS) frame counters are

Page 146 - 3-101.7.1 Protocol to Group

9 2-2 Time This page configures the switch Time. Time configure is including Time Configuration and NTP Configuration 2-2.1 Manual The switch prov

Page 147

216 Shows the date and time of the last authentication of the client (successful as well as unsuccessful).  Auto-refresh : To evoke the auto-ref

Page 148 - 3-10.7.2 Group to VLAN

217 4-6 AAA This section shows you to use an AAA (Authentication, Authorization, Accounting) server to provide acce

Page 149 -  Auto-refresh :

218 Figure 4-5.3.3: The RADIUS Configuration Figure 4-5.3.4: The RADIUS Accounting Configuration Figure 4-5.3.4: The TACACS+ Authentication C

Page 150 - 3-11 Voice VLAN

219 RADIUS Authentication Server Configuration The table has one row for each RADIUS Authentication Server and a num

Page 151

220  Secret : The secret - up to 29 characters long - shared between the TACACS+ Authentication Server and the switch.  Buttons: Sa

Page 152 - 3-11.2 OUI

221 4-6.2 Radius Overview This section shows you an overview of the RADIUS Authentication and Accounting servers st

Page 153 - 3-12 GARP

222 module is ready to accept accounting attempts. Dead (X seconds left): Accounting attempts were made to this server, but it did not reply within t

Page 154

223 4-6.3 Radius Details This section shows you detailed statistics of the RADIUS Authentication and Acc

Page 155 - 3-12.2 Statistics

224 4-7 Port Security This section shows you to to configure the Port Security settings of the Switch. You can use the Port Security feature to

Page 156 - 3-13 GVRP

225  Mode : Indicates if Limit Control is globally enabled or disabled on the switch. If globally disabled, other

Page 157

10 The switch supports valid configurable day light saving time is –5 ~ +5 step one hour. The zero for this parameter means it need not have to adjus

Page 158 - 3-13.2 Statistics

226 Trap & Shutdown: If Limit + 1 MAC addresses is seen on the port, both the "Trap" and the "Shutdown" actions described abo

Page 159 - 3-14 QoS

227 4-7.2 Switch Status This section shows the Port Security status. Port Security is a module with no

Page 160

228 which are:  Port : The port number for which the status applies. Click the port number to see the status for this particular port.  Users :

Page 161 - 3-14.2 Port Policing

229 4-7.3 Port Status This section shows the MAC addresses secured by the Port Security module. Port Security is a

Page 162

230 4-8 Access Management This section shows you to configure access management table of the Switch including HTTP/HTTPS, SNMP, and TELN

Page 163 - 3-14.3 Port Scheduler

231  HTTP/HTTPS : Indicates that the host can access the switch from HTTP/HTTPS interface if the host IP address

Page 164

232 4-8.2 Statistics This section shows you a detailed statistics of the Access Management including HTTP, HTTPS, SSH. TELNET, and S

Page 165

233 4-9 SSH This section shows you to use SSH (Secure SHell) to securely access the Switch. SSH is a secure communi

Page 166 - 3-14.4 Port Shaping

234 4-10 HTTPs This section shows you how to use HTTPS to securely access the Switch. HTTPS is a secure communication protocol that combines authent

Page 167

235 4-11 Auth Method This page shows how to configure a user with authenticated when he logs into the switch via on

Page 168

11 2-2.2 NTP NTP is Network Time Protocol and is used to sync the network time based Greenwich Mean Time (GMT). If use the NTP mode and select a bu

Page 169 - 3-14.5 Port Tag Remarking

236 Chapter 5. Maintenance This chapter describes all of the switch Maintenance configuration tasks to enhance the performance

Page 170

237 5-2 Firmware This section describes how to upgrade Firmware. The Switch can be enhanced with more value-added

Page 171 - 3-14.6 Port DSCP

238 5-2.2 Firmware Selection Due to the switch supports Dual image for firmware redundancy purpose. You can select what firmware image for your

Page 172

239 NOTE: 1. In case the active firmware image is the alternate image, only the "Active Image" table i

Page 173 - 3-14.7 DSCP-Based QoS

240 5-3 Save / Restore This section describes how to save and restore the Switch configuration including reset to Factory Defaults, Save Start, Save

Page 174

241 Save – Click the “Save” button to save current setting as Start Configuration. 5-3.3 Save User This section des

Page 175 - 3-14.8 TOS-Based QoS

242 5-4 Export / Import This section describes how to export and import the Switch configuration. Any current configuration files will be

Page 176

243 5-4.2 Import Config This section describes to export the switch Configuration for maintenance needs.

Page 177 - 3-14.9 DSCP Translation

244 5-5 Diagnostics This section provides a set of basic system diagnosis. It let users know that whether the system is health or needs to be fixed.

Page 178

245 5-5.2 Ping6 This section allows you to issue ICMPv6 PING packets to troubleshoot IPv6 connectivity issues.

Page 179 - 3-14.10 DSCP Classification

12 2-3 Account In this function, only administrator can create, modify or delete the username and password. Administrator can modify other guest id

Page 180

246 5-5.3 VeriPHY This section is used for running the VeriPHY Cable Diagnostics. Press to run the diagnostics. This will take approximately 5 secon

Page 181 - : Edits the QCE

A. Glossary of Web-based Management A ACE ACE is an acronym for Access Control Entry. It describes access permission associated with a particula

Page 182

248 (Also Port Aggregation, Link Aggregation). ARP ARP is an acronym for Address Resolution Protocol. It is a protocol that used to convert an IP a

Page 183 - 3-14.12 QCL Status

249 Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather tha

Page 184

250 EPS EPS is an abbreviation for Ethernet Protection Switching defined in ITU/T G.8031. Ethernet Type Ethernet Type, or EtherType, is a field i

Page 185 - 3-14.13 Storm Control

251 ICMP is an acronym for Internet Control Message Protocol. It is a protocol that generated the error response, di

Page 186 - 3-15 s-Flow Agent

252 IP Source Guard is a secure feature used to restrict IP traffic on DHCP snooping untrusted ports by filtering traffic based on the DHCP Snooping

Page 187

253 MEP MEP is an acronym for Maintenance Entity Endpoint and is an endpoint in a Maintenance Entity Group (ITU-T Y

Page 188 - 3-15.2 Sampler

254 O OAM OAM is an acronym for Operation Administration and Maintenance. It is a protocol described in ITU-T Y.1731 used to implement carrier et

Page 189

255 POP3 POP3 is an acronym for Post Office Protocol version 3. It is a protocol for email clients to retrieve emai

Page 190 - 3-16 Loop Protection

13 The privilege level of the user. The allowed range is 1 to 15. If the privilege level value is 15, it can access

Page 191

256 RARP is an acronym for Reverse Address Resolution Protocol. It is a protocol that is used to obtain an IP address for a given hardware address, s

Page 192 - 3-16.2 Status

257 access points within range advertising their SSIDs, and can choose one to connect to based on pre-configuration,

Page 193

258 User Datagram Protocol (UDP) and provides file writing and reading, but it does not provide directory service and security features. U UDP U

Page 194 - 3-17 Single IP

14 2-3.2 Privitege Level This page provides an overview of the privilege levels. The switch provides user set Account, Aggregation, Diagnostics ,EEE

Page 195 - 3-17.2 Information

15 Parameter description:  Group Name The name identifying the privilege group. In most cases, a privilege level

Page 196

i The information in this document is subject to change without notice. Unless the explicit written permission of M

Page 197

16 2-4 IP IP is an acronym for Internet Protocol. It is a protocol used for communicating data across an internet network. IP is a "best effor

Page 198 - 3-19 Mirroring

17 Enable the DHCP client by checking this box. If DHCP fails and the configured IP address is zero, DHCP will retry

Page 199 - Mirror Port Configuration

18 2-4.2 IPV6 This section describes how to configure the switch-managed IPv6 information. The Configured column is used to view or chang

Page 200 - 3-20 Trap Event Severity

19 2-5 Syslog The Syslog is a standard for logging program messages . It allows separation of the software that ge

Page 201

20 2-5.2 Log This section describes that display the system log information of the switch Web Interface To display the log configuration in the we

Page 202 - 3-22 UPnP

21 2-5.3 Detailed Log This section describes that display the detailed log information of the switch Web Interface

Page 203 - Security

22 2-6 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped with S

Page 204

23 2-6.2 Communities The function is used to configure SNMPv3 communities. The Community and UserName is unique. T

Page 205 - 4-1.2 Static Table

24 2-6.3 Users The function is used to configure SNMPv3 user. The Entry index key is UserName. To create a new UserName account, please check

Page 206 - 4-1.3 Dynamic Table

25 A string identifying the authentication password phrase. For MD5 authentication protocol, the allowed string leng

Page 207 - 4-2 ARP Inspection

ii DISCLAIMER. EXCEPT AS PROVIDED ABOVE, THE SOFTWARE IS PROVIDED “AS IS ” AND MANMANUFACTURE AND ITS LICENSORS MAKE NO WARRANTIES, EXPRESS OR IMPL

Page 208

26 2-6.4 Groups The function is used to configure SNMPv3 group. The Entry index key are Security Model and Security Name. To create a new group acco

Page 209 - 4-2.2 Static Table

27 2-6.5 Views The function is used to configure SNMPv3 view. The Entry index key are OID Subtree and View Name. T

Page 210 - 4-3 ARP Inspection

28 2-6.6 Access The function is used to configure SNMPv3 accesses. The Entry index key are Group Name, Security Model and Security level. To create

Page 211 - DHCP Snooping Configuration

29 Auth, Priv: Authentication and privacy.  Read View Name The name of the MIB view defining the MIB objects for

Page 212

30 2-6.7 Tarp The function is used to configure SNMP trap. To create a new trap account, please check <No number> button, and enter the trap i

Page 213 - 4-3.2 Statistics

31  Security Level: Indicates what kind of message will send to Security Level. Possible modes are: Info: Send i

Page 214

32 Chapter 3. Configuration This chapter describes all of the basic network configuration tasks which includes the Ports, Layer 2 netwo

Page 215 - 4-4 DHCP Relay

33 Parameter description:  Port : This is the logical port number for this row.  Link : The current link state

Page 216

34 3-1.2 Port Description The section describes to configure the Port’s alias or any descriptions for the Port Identity. It provides use

Page 219 - 4-5 NAS

36 3-1.3 Traffic Overview The section describes to the Port statistics information and provides overview of general traffic statistics for all sw

Page 220

37 3-1.4 Detailed Statistics The section describes how to provide detailed traffic statistics for a specific swi

Page 221

38  Rx and Tx Broadcast : The number of received and transmitted (good and bad) broadcast packets.  Rx and Tx Pause : A count of the MAC Con

Page 222

39 3-1.5 Qos Statistics The section describes that switch could display the QoS detailed Queuing coun

Page 223

40 3-1.6 SFP Information The section describes that switch could display the SFP module detail information which you connect it to the switch. T

Page 224

41 Show the serial number assigned by the manufacturer.  Date Code: Show the date this SFP module was made.  Tem

Page 225

42 3-1.7 EEE The section which allows the user to inspect and configure the current EEE port settings. EEE is a power saving option that reduces

Page 226 - 4-5.2 Switch Status

43 Parameter description:  EEE Port Configuration: The EEE port settings relate to the currently selected, as ref

Page 227

44 3-2 ACL The GEL-2671 switch access control list (ACL) is probably the most commonly used object in the IOS. It is used for packet filtering but a

Page 228 - Port Counters

45  Action : Select whether forwarding is permitted ("Permit") or denied ("Deny"). The default

Page 229 - VLAN ID

iv Table of Contents INTRODUCTION ...

Page 230

46 3-2.2 Rate Limiters The section describes how to configure the switch’s ACL Rate Limiter parameters. The Rate Limiter Level from 1 to 16 that all

Page 231 - 1. Check “Enabled”

47 3-2.3 Access Control List The section describes how to configure Access Control List rule. An Access Control Lis

Page 232

48 Parameter description:  Ingress Port : Indicates the ingress port of the ACE. Possible values are: Any: The ACE will match any ingress port.

Page 233

49 : Edits the ACE row. : Moves the ACE up the list. : Moves the ACE down the list. : Deletes the ACE. : The low

Page 234

50 3-2.4 ACL Status The section describes how to shows the ACL status by different ACL users. Each row describes the ACE that is de

Page 235 - 4-6.2 Radius Overview

51  Mirror : Specify the mirror operation of this port. The allowed values are: Enabled: Frames received on the p

Page 236

52 3-3 Aggregation The Aggregation is used to configure the settings of Link Aggregation. You can bundle more than one port with the same speed, ful

Page 237 - 4-6.3 Radius Details

53 Parameter description: Hash Code Contributors  Source MAC Address : The Source MAC address can be used to calcu

Page 238 - 4-7 Port Security

54 3-3.2 LACP Ports using Link Aggregation Control Protocol (according to IEEE 802.3ad specification) as their trunking method can choose their

Page 239 - Port Configuration

55 Parameter description:  Port : The switch port number.  LACP Enabled : Controls whether LACP is enabled on

Page 240

v 3-4.6 Bridge Status ...

Page 241 - 4-7.2 Switch Status

56 3-3.2.2 System Status This section describes that when you complete to set LACP function on the switch then it provides a status overview for all

Page 242

57 3-3.2.3 Port Status This section describes that when you complete to set LACP function on the switch then it pro

Page 243 - 4-7.3 Port Status

58 3-3.2.4 Port Statistics This section describes that when you complete to set LACP function on the switch then it provides a Port Statistics overv

Page 244 - 4-8 Access Management

59 3-4 Spanning Tree The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provi

Page 245

60 Figure 3-4.1: The STP Bridge Configuration Parameter description: Basic Settings  Protocol Version : The STP protocol version setting. Valid

Page 246 - 4-8.2 Statistics

61 certain time. If recovery is not enabled, ports have to be disabled and re-enabled for normal STP o

Page 247 - 4-9 SSH

62 2-4.2 MSTI Mapping When you implement an Spanning Tree protocol on the switch that the bridge instance. The CIST is not available for explicit ma

Page 248 - 4-10 HTTPs

63 MSTI Mapping  MSTI : The bridge instance. The CIST is not available for explicit mapping, as it will receive

Page 249 - 4-11 Auth Method

64 3-4.3 MSTI Priorities When you implement a Spanning Tree protocol on the switch that the bridge instance. The CIST is the default instance which

Page 250 - Maintenance

65 3-4.4 CIST Ports When you implement an Spanning Tree protocol on the switch that the bridge instance. You need t

Page 251 - 5-2.1 Firmware Upgrade

vi 3-14.13 Storm Control ...

Page 252 - 5-2.2 Firmware Selection

66 Specific setting, a user-defined value can be entered. The path cost is used when establishing the active topology of the netwo

Page 253

67 An MSTI port is a virtual port, which is instantiated separately for each active CIST (physical) port for each MS

Page 254 - 5-3 Save / Restore

68 Parameter description:  Port : The switch port number of the corresponding STP CIST (and MSTI) port.  Path Cost : Controls the path cost inc

Page 255

69 3-4.6 Bridge Status After you complete the MSTI Port configuration that you could to ask the switch display the

Page 256 - 5-4.1 Export Config

70 3-4.7 Port Status After you complete the STP configuration the you could to ask the switch display the STP Port Status. The Section provides

Page 257 - 5-4.2 Import Config

71 3-4.8 Port Statistics After you complete the STP configuration then you could to let the switch display the STP

Page 258 - 5-5 Diagnostics

72 3-5 IGMP Snooping The function, is used to establish the multicast groups to forward the multicast packet to the member ports, and, in nature, av

Page 259 - 5-5.2 Ping6

73 Parameter description:  Snooping Enabled: Enable the Global IGMP Snooping.  Unregistered IPMCv4 Flooding e

Page 260 - 5-5.3 VeriPHY

74 3-5.2 VLAN Configuration The section describes the VLAN configuration setting process integrated with IGMP Snooping function. For each setting pa

Page 261

75 seconds; default query response interval is 100 in tenths of seconds (10 seconds).  LLQI (LMQI for IGMP) : Las

Page 262

vii 5-5.1 Ping ...

Page 263

76 3-5.3 Port Group Filtering The section describes how to set the IGMP Port Group Filtering? With the IGMP filtering feature, an user can exert thi

Page 264

77  Filtering Groups : The IP Multicast Group that will be filtered.  Buttons: Save – Click to save changes. Re

Page 265

78 3-5.4 Status After you complete the IGMP Snooping configuration, then you could to let the switch display the IGMP Snooping Status. The Sect

Page 266

79  V1 Reports Received : The number of Received V1 Reports.  V2 Reports Received : The number of Received V2 R

Page 267

80 3-5.5 Group Infermation After you complete to set the IGMP Snooping function then you could let the switch to display the IGMP Snooping Group Inf

Page 268

81 3-5.6 IPv4 SSM information Source Specific Multicast (SSM) is a datagram delivery model that best supports one-t

Page 269

82 Group address of the group displayed.  Port : Switch port number.  Mode : Indicates the filtering mode maintained per (VLAN ID, port number,

Page 270

83 3-6 MLD Snooping Curiously enough, a network node that acts as a source of IPv6 multicast traffic is only an ind

Page 271

84 Parameter description:  Snooping Enabled : Enable the Global MLD Snooping.  Unregistered IPMCv6 Flooding enabled : Enable unregistered IP

Page 272

85 The Port index what you enable or disable the MLD Snooping function.  Fast Leave : To evoke to enable the fast

Comments to this Manuals

No comments