LevelOne GTL-5280 Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Switche sieciowe LevelOne GTL-5280. LevelOne GTL-5280 Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 264
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów

Podsumowanie treści

Strona 1 - GTL-5280

I GTL-5280 L2 Plus Managed Switch – 48 GE with 4 Combo SFP + 4 10GE SFP Plus User Manual Ver. 1.1-130827

Strona 2

2 Chapter 1 Operation of Web-based Management Initial ConfigurationThis chapter instructs you how to configure and manage the

Strona 3

92 3-6.4 Status The section describes when you complete the MLD Snooping and how to display the MLD Snooping Status and detail information. It wi

Strona 4

93  V1 Reports Received : The number of Received V1 Reports.  V2 Reports Received : The number of Received V2 Reports.  V1 Leaves Received : T

Strona 5

94 3-6.5 Group Infermation The section describes user could set the MLD Snooping Groups Information. The "Start from VLAN", and "group

Strona 6

95  Auto-refresh : To evoke the auto-refresh icon then the device will refresh the log automatically.  Upper right icon (Refresh, <<, >&

Strona 7

96 3-6.6 IPv6 SSM Information The section describes the user to configure the Entries in the MLDv2 Information Table are shown on this page. The MLDv

Strona 8

97 3-7 MVR The MVR feature enables multicast traffic forwarding on the Multicast VLAN. In a multicast television application, a PC or a television wi

Strona 9 - INTRODUCTION

98 Parameter description:  MVR Mode : Enable/Disable the Global MVR.  VLAN ID : Specify the Multicast VLAN ID.  Mode : Enable MVR on the port.

Strona 10

99 3-7.2 Groups Information The section describes user could display the MVR Groups detail information on the switch. Entries in the MVR Group Table

Strona 11

100 3-7.3 Statistics The section describes the switch will display the MVR detail Statistics after you had configured MVR on the switch. It provid

Strona 12 - GTL-5280 web help function:

101 3-8 LLDP The switch supports the LLDP. For current information on your switch model, The Link Layer Discovery Protocol (LLDP) provides a

Strona 13

3 NOTE: AS GTL-5280 the function enable dhcp, so If you do not have DHCP server to provide ip addresses to the switch, the

Strona 14

102 Parameter description: LLDP Parameters  Tx Interval : The switch periodically transmits LLDP frames to its neighbours for having the

Strona 15 - System Configuration

103 Both the CDP and LLDP support "system capabilities", but the CDP capabilities cover capabilities that are not part of the LL

Strona 16

104 3-8.2 LLDP Neighbours This page provides a status overview for all LLDP neighbours. The displayed table contains a row for each port on which an

Strona 17 - 2-1.2 Configuration

105 9. Reserved When a capability is enabled, the capability is followed by (+). If the capability is disabled, the capability is followed by (-). 

Strona 18 - 2-1.3 CPU Load

106 3-8.3 LLDP-MED Configuration Media Endpoint Discovery is an enhancement of LLDP, known as LLDP-MED, that provides the following facilities: Auto-

Strona 19 - 2-2 Time

107 Parameter description: Fast start repeat count Rapid startup and Emergency Call Service Location Identification Discovery of endpoints is a criti

Strona 20

108 pair is to be used when referencing locations on water/sea/ocean. Civic Address Location IETF Geopriv Civic Address based Location Configuration

Strona 21 - 2-2.2 NTP

109 Room number - Example: 450F.  Place type : Place type - Example: Office.  Postal community name : Postal community name - Example: Leonia. 

Strona 22 - 2-3.1 Users

110  Policy ID : ID for the policy. This is auto generated and shall be used when selecting the polices that shall be mapped to the specific ports.

Strona 23

111  Adding a new policy : Click to add a new policy. Specify the Application type, Tag, VLAN ID, L2 Priority and DSCP for the new policy. Click &qu

Strona 24 - 2-3.2 Privitege Level

4 GTL-5280 web help function:

Strona 25

112 3-8.4 LLDP-MED Neighbours This page provides a status overview of all LLDP-MED neighbours. The displayed table contains a row for eac

Strona 26 - 2-4.1 IPV4

113 applicable to both Media Endpoints (Class II) and Generic Endpoints (Class I).  LLDP-MED Generic Endpoint (Class I) : The LLDP-MED Generic Endpo

Strona 27

114 5. Softphone Voice - for use by softphone applications on typical data centric devices, such as PCs or laptops. 6. Video Conferencing - for us

Strona 28 - 2-4.2 IPV6

115 3-8.5 EEE By using EEE power savings can be achieved at the expense of traffic latency. This latency occurs due to that the circuits EEE t

Strona 29 - 2-5 Syslog

116 The link partner's Echo Rx Tw value.  Resolved Tx Tw : The resolved Tx Tw for this link. Note : NOT the link partner The resolved value tha

Strona 30 - 2-5.2 Log

117 3-8.6 Port Statistics Two types of counters are shown. Global counters are counters that refer to the whole switch, while local counters refer to

Strona 31 - 2-5.3 Detailed Log

118  Total Neighbours Entries Added : Shows the number of new entries added since switch reboot.  Total Neighbours Entries Deleted : Shows the nu

Strona 32 - 2-6 SNMP

119 3- 9 Filtering Data Base Filtering Data Base Configuration gathers many functions, including MAC Table Information, Static MAC Learning, which ca

Strona 33 - 2-6.2 Communities

120 The allowed range is 10 to 1000000 seconds. Disable the automatic aging of dynamic entries by checking Disable automatic aging. MAC Table Learni

Strona 34 - 2-6.3 Users

121 3- 9.2 Dynamic MAC Table Entries in the MAC Table are shown on this page. The MAC Table contains up to 8192 entries, and is sorted first by VLAN

Strona 35

5 CONNECTING NETWORK DEVICES The switch is designed to be connected to 10, 100 or 1000Mbps network cards in PCs and servers, as well as

Strona 36 - 2-6.4 Groups

122 3-10 VLAN To assign a specific VLAN for management purpose. The management VLAN is used to establish an IP connection to the switch from a workst

Strona 37 - 2-6.5 Views

123 unchecked. By default, no ports are members, and all boxes are unchecked.  Adding a New VLAN : Click to add a new VLAN ID. An empty row is adde

Strona 38

124 3-10.2 Ports The function in VLAN Tag Rule Setting, user can input VID number to each port. The range of VID number is from 1 to 4094. User al

Strona 39 - 2-6.6 Access

125 a port to any value to support network devices that do not use the standard 0x8100 Ethertype field value on 802.1Q-tagged or 802.1p-

Strona 40

126 3-10.3 Switch Status The function Switch Status gathers the information of all VLAN status and reports it by the order of Staic NAS MVRP MVP

Strona 41 - 2-6.7 Tarp

127 3-10.4 Port Status The function Port Status gathers the information of all VLAN status and reports it by the order of Static NAS MVRP MVP Voice

Strona 42

128 removed. C-port is Customer Port. S-port is Service port. Custom S-port is S-port with Custom TPID.  Ingress Filtering : Shows the

Strona 43 - Configuration

129 3-10.5 Private VLANs In a private VLAN, communication between ports in that private VLAN is not permitted. A VLAN can be configured as a private

Strona 44

130 3-10.6 MAC-based VLAN MAC address-based VLAN decides the VLAN for forwarding an untagged frame based on the source MAC address of the frame. A m

Strona 45 - 3-1.2 Port Description

131  MAC Address : Indicates the MAC address.  VLAN ID : Indicates the VLAN ID.  Port Members : A row of check boxes for each port is

Strona 46 - 3-1.3 Traffic Overview

6 Step2. If the device is a network card and the switch is in the wiring closet, attach the other end of the cable segment to a modular wall

Strona 47 - 3-1.4 Detailed Statistics

132 3-10.6.2 Status This section shows MAC-based VLAN entries configured by various MAC-based VLAN users. Currently we support following VLAN User ty

Strona 48 - Transmit Error Counters

133 3-10.7 Protocol -based VLAN This section describe Protocol -based VLAN, The Switch support Protocol include Ethernet LLC SNAP Protocol, LLC The L

Strona 49 - 3-1.5 Qos Statistics

134 the switch during the next Apply.  Frame Type : Frame Type can have one of the following values: 1. Ethernet 2. LLC 3. SNAP NOTE: On

Strona 50 - 3-1.6 SFP Information

135 3-10.7.2 Group to VLAN This section allows you to map a already configured Group Name to a VLAN for the selected switch. Web Interface To Displa

Strona 51

136 3-11 Voice VLAN Voice VLAN is VLAN configured specially for voice traffic. By adding the ports with voice devices attached to voice VLAN, we can

Strona 52 - 3-2 ACL

137 Parameter description:  Mode : Indicates the Voice VLAN mode operation. We must disable MSTP feature before we enable Voice VLAN. It

Strona 53

138 3-11.2 OUI The section describes to Configure VOICE VLAN OUI table . The maximum entry number is 16. Modifying the OUI table will restart auto de

Strona 54 - 3-2.2 Rate Limiters

139 3-12 GARP The Generic Attribute Registration Protocol (GARP) provides a generic framework whereby devices in a bridged LAN, e.g. end stati

Strona 55 - 3-2.3 Access Control List

140 Parameter description:  Port : The Port coulmn shows the list of ports for which you can configure GARP settings. There are 2 types configuratio

Strona 56

141 3-12.2 Statistics The section describes to port statistics of GARP for all switch ports.The port statistics relate to the currently s

Strona 57

7 Chapter 2 System Configuration This chapter describes the entire basic configuration tasks which includes the System Inform

Strona 58 - 3-2.4 ACL Status

142 3-13 GVRP GVRP is an application based on Generic Attribute Registration Protocol (GARP), mainly used to automatically and dynamically maintain t

Strona 59

143 Parameter description:  GVRP Mode : GVRP Mode is a global setting, to enable the GVRP globally select 'Enable' from menu and to disabl

Strona 60 - 3-3 Aggregation

144 3-13.2 Statistics The section describes to shows the basic GVRP Port statistics for all switch ports. The statistics relate to the currentl

Strona 61

145 3-14 QoS The switch support four QoS queues per port with strict or weighted fair queuing scheduling. It supports QoS Control Lists (QCL) for adv

Strona 62 - 3-3.2 LACP

146 Parameter description:  Port : The port number for which the configuration below applies.  QoS class : Controls the default QoS class, i.e.,

Strona 63

147 3-14.2 Port Policing This section provides an overview of f QoS Ingress Port Policers for all switch ports The Port Policing is useful in co

Strona 64

148 order to configure the schedulers.  Enabled : To evoke which Port you need to enable the QoS Ingress Port Policers function.  Rate : To set t

Strona 65

149 3-14.3 Port Scheduler This section provides an overview of QoS Egress Port Schedulers for all switch ports. and the ports belong to the currentl

Strona 66

150 Parameter description:  Port : The logical port for the settings contained in the same row. Click on the port number in order to config

Strona 67

151 Controls the weight for this queue. The default value is "17". This value is restricted to 1-100. This parameter is only shown if "

Strona 68

8 The model name of this device.  System description: As it is, this tells what this device is. Here, it is “44-Port 10/100/1000Base-T + 4 (100/1G)

Strona 69 - 3-4 Spanning Tree

152 3-14.4 Port Shaping This section provides an overview of QoS Egress Port Shaping for all switch ports. Others the user could get all detail

Strona 70 - Basic Settings

153 Parameter description:  Port : The logical port for the settings contained in the same row. Click on the port number in order to configure

Strona 71 - Advanced Settings

154 Controls the weight for this queue. The default value is "17". This value is restricted to 1-100. This parameter is only shown if "

Strona 72 - 2-4.2 MSTI Mapping

155 3-14.5 Port Tag Remarking The Section provides user to get an overview of QoS Egress Port Tag Remarking for all switch ports. Oth

Strona 73 - MSTI Mapping

156 Apply – Click to Apply changes. Reset- Click to undo any changes made locally and revert to previously Saved values. Cancel – Click to cancel the

Strona 74 - 3-4.3 MSTI Priorities

157 3-14.6 Port DSCP The section will teach user to set the QoS Port DSCP configuration that was allowed you to configure the basic QoS Port DSC

Strona 75 - 3-4.4 CIST Ports

158 Parameter description:  Port : The Port coulmn shows the list of ports for which you can configure dscp ingress and egress settin

Strona 76

159 3-14.7 DSCP-Based QoS The section will teach user to configure the DSCP-Based QoS mode that This page allows you to configure the ba

Strona 77 - 3-4.5 MSTI Ports

160 Parameter description:  DSCP : Maximum number of support ed DSCP values are 64.  Trust : Click to check if the DSCP value is trusted.  QoS

Strona 78

161 3-14.8 DSCP Translation The section describes the swtich allows you to configure the basic QoS DSCP Translation settings for all switches.

Strona 79 - 3-4.6 Bridge Status

9 2-1.2 Configuration You can identify the system by configuring the contact information, name, and location of the switch. Web interface To config

Strona 80 - 3-4.7 Port Status

162 Parameter description:  DSCP : Maximum number of supported DSCP values are 64 and valid DSCP value ranges from 0 to 63.  Ingress : Ingress si

Strona 81

163 3-14.9 DSCP Classification The section describes to teach user to configure and allows you to map DSCP value to a QoS Class and DPL value. Other

Strona 82 - 3-4.8 Port Statistics

164 3-14.10 QoS Control List Configuration The section shows the QoS Control List(QCL), which is made up of the QCEs. Each row describ

Strona 83 - 3-5 IGMP Snooping

165 Any: All types of Destination MAC addresses are allowed. Unicast: Only Unicast MAC addresses are allowed. Multicast: Only Multicast MAC addresse

Strona 84

166 1. Any 2. Ethernet 3. LLC 4. SNAP 5. IPv4 6. IPv6 NOTE: All frame types are explained below: 1. Any : Allow all types of frames.

Strona 85 - 3-5.2 VLAN Configuration

167 3-14.11 QCL Status The section will let you know how to configure and shows the QCL status by different QCL users. Each row describes the QCE t

Strona 86

168 under DSCP column.  Conflict : Displays QCE status. It may happen that resources required to add a QCE may not available, in that

Strona 87 - 3-5.3 Port Group Filtering

169 3-14.12 Storm Control The section allows user to configure the Storm control for the switch. There is a unicast storm rate control, multicast st

Strona 88

170 3-14.13 WRED The section allows user to configure the WRED function for the switch. This page allows you to configure the Random Early Detection

Strona 89 - 3-5.4 Status

171  Max. DP3 : Controls the drop probability for frames marked with Drop Precedence Level 3 when the average queue filling level is 100%. This val

Strona 90

10 2-1.3 CPU Load This page displays the CPU load, using an SVG graph. The load is measured as averaged over the last 100ms, 1sec and 10 seconds in

Strona 91 - IGMP Group Table Columns

172 3-15 s-Flow Agent The sFlow Collector configuration for the switch can be monitored and modified here. Up to 1 Collector is supported. This page

Strona 92

173 The value accepted is within the range of 1-65535. But an appropriate port number not used by other protocols need to be configured. By def

Strona 93

174 3-15.2 Sampler The section display the sFlow sampler what you set or you can edit it for your requirement. That will help user based on

Strona 94 - 3-6 MLD Snooping

175  sFlow Ports : List of the port numbers on which sFlow is configured.  sFlow Instance : Configured sFlow instance for the port number.  Sam

Strona 95

176 3-18 Loop Protection The loop Protection is used to detect the presence of traffic. When switch receives packet’s(looping detection f

Strona 96

177  Shutdown Time: The period (in seconds) for which a port will be kept disabled in the event of a loop is detected (and the port

Strona 97 - 3-6.2 VLAN Configuration

178 3-18.2 Status This page displays the loop protection port status the ports of the switch Web Interface To configure the Loop Protection param

Strona 98

179 3-19 Easy Port Easy Port provide a convenient way to Apply and share common configurations. You can use it to enable features and settings based

Strona 99 - 3-6.3 Port Group Filtering

180 (Low) to 7 (High). If you want the voice has high priority then you can set the value with 7.  Port Security : To scroll to enable or disab

Strona 100 - Web Interface

181 3-20 Mirroring You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON

Strona 101

11 2-2 Time This page configure the switch Time. Time configure is including Time Configuration and NTP Configuration 2-2.1 Manual The switch prov

Strona 102 - 3-6.5 Group Infermation

182 Parameter description:  Port to mirror on : Port to mirror also known as the mirror port. Frames from ports that have either source (rx) or des

Strona 103

183 3-21 Trap Event Severity The function, is used to set a Alarm trap and get the Event log. The Trap Events Configuration function is used to enab

Strona 104 - 3-6.6 IPv6 SSM Information

184 3-22 SMTP Configuration The function, is used to set a Alarm trap when the switch alarm then you could set the SMTP server to send you th

Strona 105 - 3-7 MVR

185 3-23 UPnP UPnP is an acronym for Universal Plug and Play. The goals of UPnP are to allow devices to connect seamlessly and to simplify the i

Strona 106

186 Chapter 4. Security This chapter describes all of the switch security configuration tasks to enhance the security of local

Strona 107 - 3-7.2 Groups Information

187 Parameter description:  Mode of IP Source Guard Configuration : Enable the Global IP Source Guard or disable the Global IP Source Guard. All con

Strona 108 - 3-7.3 Statistics

188 4-1.2 Static Table The section describes to configure the Static IP Source Guard Table parameters of the switch. You could use the Static IP Sour

Strona 109 - 3-8 LLDP

189 4-1.3 Dynamic Table The section describes to configure the Dynamic IP Source Guard Table parameters of the switch. You could use the Dy

Strona 110 - LLDP Port Configuration

190 4-2 ARP Inspection The section describes to configure the ARP Inspection parameters of the switch. You could use the ARP Inspection configure to

Strona 111

191 Parameter description:  Mode of ARP Inspection Configuration : Enable the Global ARP Inspection or disable the Global ARP Inspection.  Port M

Strona 112 - 3-8.2 LLDP Neighbours

II The information in this document is subject to change without notice. Unless the explicit written permission of Digital Data Communications Corpo

Strona 113

12 The switch supports valid configurable day light saving time is –5 ~ +5 step one hour. The zero for this parameter means it need not h

Strona 114 - 3-8.3 LLDP-MED Configuration

192 4-2.2 Static Table The section describes to configure the Static ARP Inspection Table parameters of the switch. You could use the Static ARP Insp

Strona 115 - Coordinates Location

193 4-2.3 Dynamic Table The section describes to configure the Dynamic ARP Inspection Table parameters of the switch. The Dynamic ARP Ins

Strona 116 - Civic Address Location

194 4-3 DHCP Snooping The section describes to configure the DHCP Snooping parameters of the switch. The DHCP Snooping can prevent attackers from add

Strona 117 - P) value (IETF RFC 2474)

195 Parameter description:  Snooping Mode : Indicates the DHCP snooping mode operation. Possible modes are: Enabled: Enable DHCP snooping mode oper

Strona 118

196 4-3.2 Statistics The section describes to show the DHCP Snooping Statistics information of the switch. The statistics show only packet counters w

Strona 119

197 The number of lease unknown (option 53 with value 12) packets received and transmitted.  Rx and Tx Lease Active : The number of lease active (o

Strona 120 - 3-8.4 LLDP-MED Neighbours

198 4-4 DHCP Relay The section describes how to forward DHCP requests to another specific DHCP servers via DHCP relay. The DHCP servers may be on ano

Strona 121

199 Disabled: Disable DHCP relay information mode operation.  Relay Information Policy : Indicates the DHCP relay information option policy. When D

Strona 122

200 4-4.2 Statistics The section describes to show the DHCP Relay Statistics information of the switch. The statistics show both of Serv

Strona 123 - 3-8.5 EEE

201  Replace Agent Option : The number of packets which were replaced with relay agent information option.  Keep Agent Option : The number of pac

Strona 124

13 2-2.2 NTP NTP is Network Time Protocol and is used to sync the network time based Greenwich Mean Time (GMT). If use the NTP mode and select a bu

Strona 125 - 3-8.6 Port Statistics

202 4-5 NAS The section describes to configure the NAS parameters of the switch. The NAS server can be employed to connect users to a variety of

Strona 126 - Local Counters

203 Parameter description:  Mode : Indicates if NAS is globally enabled or disabled on the switch. If globally disabled, all ports are allowed forwa

Strona 127 - 3- 9 Filtering Data Base

204  RADIUS-Assigned QoS Enabled : RADIUS-assigned QoS provides a means to centrally control the traffic class to which traffic coming f

Strona 128 - MAC Table Learning

205 following modes are available:  Force Authorized : In this mode, the switch will send one EAPOL Success frame when the port link comes up, and a

Strona 129 - Web Interface

206 secure a supplicant's MAC address once successfully authenticated.  Multi 802.1X : In port-based 802.1X authentication, once a supplicant

Strona 130 - 3-10 VLAN

207 • Single 802.1X RADIUS attributes used in identifying a QoS Class: Refer to the written documentation for a description of the RADIUS attributes

Strona 131

208 Guest VLAN Operation: When a Guest VLAN enabled port's link comes up, the switch starts transmitting EAPOL Request Identity frames. If th

Strona 132 - Web Interface

209 4-5.2 Switch Status The section describes to show the each port NAS status information of the switch.The status includes Admin State Port State,

Strona 133

210  Port VLAN ID : The VLAN ID that NAS has put the port in. The field is blank, if the Port VLAN ID is not overridden by NAS. If the VLAN ID is as

Strona 134

211 4-5.3 Port Status The section describes to provides detailed NAS statistics for a specific switch port running EAPOL-based IEEE 802.1X auth

Strona 135 - 3-10.4 Port Status

14 2-3 Account In this function, only administrator can create, modify or delete the username and password. Administrator can modify other guest i

Strona 136

212 • Port-based 802.1X • Single 802.1X • Multi 802.1X  Backend Server Counters : These backend (RADIUS) frame counters are available

Strona 137 - 3-10.5.1 Port Isolation

213  Last Authentication : Shows the date and time of the last authentication of the client (successful as well as unsuccessful). 

Strona 138 - Web Interface

214 4-6 AAA This section shows you to use an AAA (Authentication, Authorization, Accounting) server to provide access control to your network.

Strona 139

215 Figure 4-5.3.3: The RADIUS Configuration Figure 4-5.3.4: The RADIUS Accounting Configuration Figure 4-5.3.4: The TACACS+ Authentication Co

Strona 140 - 3-10.6.2 Status

216 RADIUS Authentication Server Configuration The table has one row for each RADIUS Authentication Server and a number of columns, which are:  # :

Strona 141 - 3-10.7.1 Protocol to Group

217  Secret : The secret - up to 29 characters long - shared between the TACACS+ Authentication Server and the switch.  Buttons: Ap

Strona 142

218 4-6.2 Radius Overview This section shows you an overview of the RADIUS Authentication and Accounting servers status to ensure the function is wor

Strona 143 - 3-10.7.2 Group to VLAN

219 Ready: The server is enabled, IP communication is up and running, and the RADIUS module is ready to accept accounting attempts. Dead

Strona 144 - 3-11 Voice VLAN

220 4-6.3 Radius Details This section shows you an detailed statistics of the RADIUS Authentication and Accounting servers. The statistics map closel

Strona 145

221 4-7 Port Security This section shows you to to configure the Port Security settings of the Switch. You can use the Port Security feature to

Strona 146 - 3-11.2 OUI

15  Privilege Level : The privilege level of the user. The allowed range is 1 to 15. If the privilege level value is 15, it can acces

Strona 147 - 3-12 GARP

222 Parameter description: System Configuration  Mode : Indicates if Limit Control is globally enabled or disabled on the switch. If globally disabl

Strona 148

223 1) Boot the switch, 2) Disable and re-enable Limit Control on the port or the switch, 3) Click the Reopen button. Trap & Shutdown: If Limit

Strona 149 - 3-12.2 Statistics

224 4-7.2 Switch Status This section shows the Port Security status. Port Security is a module with no direct configuration. Configurat

Strona 150 - 3-13 GVRP

225  Abbr : A one-letter abbreviation of the user module. This is used in the Users column in the port status table.  Port Status : The table ha

Strona 151

226 4-7.3 Port Status This section shows the MAC addresses secured by the Port Security module. Port Security is a module with no direct configuratio

Strona 152 - 3-13.2 Statistics

227 4-8 Access Management This section shows you to configure access management table of the Switch including HTTP/HTTPS, SNMP, and TELNE

Strona 153 - 3-14 QoS

228  HTTP/HTTPS : Indicates that the host can access the switch from HTTP/HTTPS interface if the host IP address matches the IP address range provi

Strona 154

229 4-8.2 Statistics This section shows you a detailed statistics of the Access Management including HTTP, HTTPS, SSH. TELNET, ans SS

Strona 155 - 3-14.2 Port Policing

230 4-9 SSH This section shows you to use SSH (Secure SHell) to securely access the Switch. SSH is a secure communication protocol that combines aut

Strona 156

231 4-10 HTTPs This section shows you how to use HTTPS to securely access the Switch. HTTPS is a secure communication protocol that combines authenti

Strona 157 - 3-14.3 Port Scheduler

16 2-3.2 Privitege Level This page provides an overview of the privilege levels. The switch provides user set Account, Aggregation,Diagnostics,EEE,GA

Strona 158

232 4-11 Auth Method This page shows how to configure a user with authenticated when he logs into the switch via one of the management client interfa

Strona 159

233 Chapter 5. Maintenance This chapter describes all of the switch Maintenance configuration tasks to enhance the performance

Strona 160 - 3-14.4 Port Shaping

234 5-2 Firmware This section describes how to upgrade Firmware. The Switch can be enhanced with more value-added functions by installing

Strona 161

235 5-2.2 Firmware Selection Due to the switch supports Dual image for firmware redundancy purpose. You can select what firmware image for your d

Strona 162

236 NOTE: 1. In case the active firmware image is the alternate image, only the "Active Image" table is shown. In this case, the Activat

Strona 163 - 3-14.5 Port Tag Remarking

237 5-3 Apply / Restore This section describes how to Apply and restore the Switch configuration including reset to Factory Defaults, Apply Start, Ap

Strona 164

238 Apply – Click the “Apply” button to Apply current setting as Start Configuration. 5-3.3 Apply User This section describes how to Apply users info

Strona 165 - 3-14.6 Port DSCP

239 5-4 Export / Import This section describes how to export and import the Switch configuration. Any current configuration files will be

Strona 166

240 5-4.2 Import Config This section describes to export the Swith Configuration for maintenance needs. Any current configuration files will be expor

Strona 167 - 3-14.7 DSCP-Based QoS

241 5-5 Diagnostics This section provides a set of basic system diagnosis. It let users know that whether the system is health or need

Strona 168

17 Parameter description:  Group Name The name identifying the privilege group. In most cases, a privilege level group consists of a single mod

Strona 169 - 3-14.8 DSCP Translation

242 5-5.2 Ping6 This section allows you to issue ICMPv6 PING packets to troubleshoot IPv6 connectivity issues. Web Interface To configu

Strona 170

243 5-5.3 VeriPHY This section is used for running the VeriPHY Cable Diagnostics. Press to run the diagnostics. This will take approximately 5 second

Strona 171 - 3-14.9 DSCP Classification

A. Glossary of Web-based Management A ACE ACE is an acronym for Access Control Entry. It describes access permission associated with a particula

Strona 172

245 (Also Port Aggregation, Link Aggregation). ARP ARP is an acronym for Address Resolution Protocol. It is a protocol that used to convert an IP ad

Strona 173 - : Edits the QCE

246 Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather than requiring an administrator to ma

Strona 174

247 EPS EPS is an abbreviation for Ethernet Protection Switching defined in ITU/T G.8031. Ethernet Type Ethernet Type, or EtherType, is a field in

Strona 175 - 3-14.11 QCL Status

248 ICMP is an acronym for Internet Control Message Protocol. It is a protocol that generated the error response, diagnostic or routing purposes. ICMP

Strona 176

249 IP Source Guard is a secure feature used to restrict IP traffic on DHCP snooping untrusted ports by filtering traffic based on the DHCP Snooping T

Strona 177 - 3-14.12 Storm Control

250 MEP MEP is an acronym for Maintenance Entity Endpoint and is an endpoint in a Maintenance Entity Group (ITU-T Y.1731). MD5 MD5 is an acronym f

Strona 178 - 3-14.13 WRED

251 O OAM OAM is an acronym for Operation Administration and Maintenance. It is a protocol described in ITU-T Y.1731 used to implement carrier eth

Strona 179

18 2-4 IP IP is an acronym for Internet Protocol. It is a protocol used for communicating data across an internet network. IP is a "best effort

Strona 180 - 3-15 s-Flow Agent

252 POP3 POP3 is an acronym for Post Office Protocol version 3. It is a protocol for email clients to retrieve email messages from a mail server. P

Strona 181

253 R RARP RARP is an acronym for Reverse Address Resolution Protocol. It is a protocol that is used to obtain an IP address for a given hardware a

Strona 182 - 3-15.2 Sampler

254 SSID Service Set Identifier is a name used to identify the particular 802.11 wireless LANs to which a user wants to attach. A client device will

Strona 183

255 TELNET TELNET is an acronym for TELetype NETwork. It is a terminal emulation protocol that uses the Transmission Control Protocol (TCP) and provi

Strona 184 - 3-18 Loop Protection

256 VLAN ID VLAN ID is a 12-bit field specifying the VLAN to which the frame belongs. Voice VLAN Voice VLAN is VLAN configured specially for voice

Strona 185

19 Parameter description:  DHCP Client : Enable the DHCP client by checking this box. If DHCP fails and the configured IP address is zero, DHCP wi

Strona 186 - 3-18.2 Status

20 2-4.2 IPV6 This section describes how to configure the switch-managed IPv6 information. The Configured column is used to view or change

Strona 187 - 3-19 Easy Port

21 2-5 Syslog The Syslog is a standard for logging program messages . It allows separation of the software that generates messages from the system t

Strona 188

III operation, design, performance or implementation of the Software and related documentation that is confidential to LevelOne to any t

Strona 189 - 3-20 Mirroring

22 2-5.2 Log This section describes that display the system log information of the switch Web Interface To display the log configuration in the web

Strona 190 - Mirror Port Configuration

23 2-5.3 Detailed Log This section describes that display the detailed log information of the switch Web Interface To display the detailed log conf

Strona 191 - 3-21 Trap Event Severity

24 2-6 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped

Strona 192

25 2-6.2 Communities The function is used to configure SNMPv3 communities. The Community and UserName is unique. To create a new community account,

Strona 193 - 3-23 UPnP

26 2-6.3 Users The function is used to configure SNMPv3 user. The Entry index key is UserName. To create a new UserName account, please check &

Strona 194 - Security

27 None: No authentication protocol. MD5: An optional flag to indicate that this user uses MD5 authentication protocol. SHA: An optiona

Strona 195

28 2-6.4 Groups The function is used to configure SNMPv3 group. The Entry index key are Security Model and Security Name. To create a new group accou

Strona 196 - 4-1.2 Static Table

29 2-6.5 Views The function is used to configure SNMPv3 view. The Entry index key are OID Subtree and View Name. To create a new view account, pleas

Strona 197 - 4-1.3 Dynamic Table

30  OID Subtree The OID defining the root of the subtree to add to the named view. The allowed OID length is 1 to 128. The allowed string

Strona 198 - 4-2 ARP Inspection

31 2-6.6 Access The function is used to configure SNMPv3 accesses. The Entry index key are Group Name, Security Model and Security level. To create a

Strona 199

IV Table of Contents INTRODUCTION ...

Strona 200 - 4-2.2 Static Table

32 NoAuth, NoPriv: No authentication and no privacy. Auth, NoPriv: Authentication and no privacy. Auth, Priv: Authentication and privacy.  Read V

Strona 201 - 4-2.3 Dynamic Table

33 2-6.7 Tarp The function is used to configure SNMP trap. To create a new trap account, please check <No number> button, and enter the trap in

Strona 202 - 4-3 DHCP Snooping

34  Community / Security Name: The length of “Community / Security Name” string is restricted to 1-32.  Security Level: Indicates what kind of me

Strona 203

35 Chapter 3. Configuration This chapter describes all of the basic network configuration tasks which includes the Ports, Layer 2 networ

Strona 204 - 4-3.2 Statistics

36 Parameter description:  Port : This is the logical port number for this row.  Link : The current link state is displayed graphically. Green i

Strona 205

37 3-1.2 Port Description The section describes to configure the Port’s alias or any descriptions for the Port Identity. It provides user to writ

Strona 206 - 4-4 DHCP Relay

38 3-1.3 Traffic Overview The section describes to the Port statistics information and provides overview of general traffic statistics for all swi

Strona 207

39 3-1.4 Detailed Statistics The section describes how to provide detailed traffic statistics for a specific switch port. Use the port select box

Strona 208 - Client Statistics

40 The number of received and transmitted (good and bad) multicast packets.  Rx and Tx Broadcast : The number of received and transmitted (good and

Strona 209

41 3-1.5 Qos Statistics The section describes that switch could display the QoS detailed Queuing counters for a specific switch port.

Strona 210 - 4-5 NAS

V 3-4.3 MSTI Priorities ... 66

Strona 211

42 3-1.6 SFP Information The section describes that switch could display the SFP module detail information which you connect it to the switch.

Strona 212

43 Display the module revision.  Vendor SN (Serial Number): Show the serial number assigned by the manufacturer.  Date Code: Show the date this SF

Strona 213

44 3-2 ACL The GTL-5280 switch access control list (ACL) is probably the most commonly used object in the IOS. It is used for packet filtering but al

Strona 214

45 Parameter description:  Port : The logical port for the settings contained in the same row.  Policy ID : Select the policy to apply to t

Strona 215

46 3-2.2 Rate Limiters The section describes how to configure the switch’s ACL Rate Limiter parameters. The Rate Limiter Level from 1 to 16 that allo

Strona 216

47 3-2.3 Access Control List The section describes how to configure Access Control List rule. An Access Control List (ACL) is a sequential list of pe

Strona 217 - 4-5.2 Switch Status

48 Parameter description:  Ingress Port : Indicates the ingress port of the ACE. Possible values are: Any: The ACE will match any ingress port. Po

Strona 218

49 : Inserts a new ACE before the current row. : Edits the ACE row. : Moves the ACE up the list. : Moves the ACE down the list. : Deletes the ACE.

Strona 219 - Port Counters

50 3-2.4 ACL Status The section describes how to shows the ACL status by different ACL users. Each row describes the ACE that is d

Strona 220 - VLAN ID

51  Mirror : Specify the mirror operation of this port. The allowed values are: Enabled: Frames received on the port are mirrored. Disabled: Frame

Strona 221

VI 3-14.9 DSCP Classification ... 163 3-14

Strona 222 - 1. Check “Enabled”

52 3-3 Aggregation The Aggregation is used to configure the settings of Link Aggregation. You can bundle more than one port with the same speed, full

Strona 223

53 Parameter description: Hash Code Contributors  Source MAC Address : The Source MAC address can be used to calculate the destination port for the

Strona 224

54 3-3.2 LACP Ports using Link Aggregation Control Protocol (according to IEEE 802.3ad specification) as their trunking method can choose their u

Strona 225

55 Parameter description:  Port : The switch port number.  LACP Enabled : Controls whether LACP is enabled on this switch port. LACP

Strona 226 - RADIUS Accounting Servers

56 3-3.2.2 System Status This section describes that when you complete to set LACP function on the switch then it provides a status over

Strona 227

57 3-3.2.3 Port Status This section describes that when you complete to set LACP function on the switch then it provides a Port Status o

Strona 228 - 4-6.3 Radius Details

58 Parameter description:  Port : The switch port number.  LACP : 'Yes' means that LACP is enabled and the port link is up. 'No&ap

Strona 229 - 4-7 Port Security

59 3-3.2.4 Port Statistics This section describes that when you complete to set LACP function on the switch then it provides a Port Statistic

Strona 230 - Port Configuration

60  LACP Received : Shows how many LACP frames have been received at each port.  LACP Transmitted : Shows how many LACP frames have been sent fro

Strona 231

61 3-4 Spanning Tree The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between switches,

Strona 232 - 4-7.2 Switch Status

VII 5-5 DIAGNOSTICS ...

Strona 233

62 Figure 3-4.1: The STP Bridge Configuration Parameter description: Basic Settings  Protocol Version : The STP protocol version setting. Valid

Strona 234 - 4-7.3 Port Status

63 Advanced Settings  Edge Port BPDU Filtering : Control whether a port explicitly configured as Edge will transmit and receive BPDUs.

Strona 235 - 4-8 Access Management

64 2-4.2 MSTI Mapping When you implement an Spanning Tree protocol on the switch that the bridge instance. The CIST is not available for explicit map

Strona 236

65 MSTI Mapping  MSTI : The bridge instance. The CIST is not available for explicit mapping, as it will receive the VLANs not explici

Strona 237 - 4-8.2 Statistics

66 3-4.3 MSTI Priorities When you implement an Spanning Tree protocol on the switch that the bridge instance. The CIST is the default instance whi

Strona 238 - 4-9 SSH

67 3-4.4 CIST Ports When you implement an Spanning Tree protocol on the switch that the bridge instance. You need to configure the CIST Ports. The se

Strona 239 - 4-10 HTTPs

68 path cost ports are chosen as forwarding ports in favour of higher path cost ports. Valid values are in the range 1 to 200000000. 

Strona 240 - 4-11 Auth Method

69 3-4.5 MSTI Ports The section describes it allows the user to inspect the current STP MSTI port configurations, and possibly change them as well. A

Strona 241 - Maintenance

70  Port : The switch port number of the corresponding STP CIST (and MSTI) port.  Path Cost : Controls the path cost incurred by the port. The Au

Strona 242 - 5-2.1 Firmware Upgrade

71 3-4.6 Bridge Status After you complete the MSTI Port configuration the you could to ask the switch display the Bridge Status. The Section provides

Strona 244

72 3-4.7 Port Status After you complete the STP configuration the you could to ask the switch display the STP Port Status. The Section provides y

Strona 245 - 5-3 Apply / Restore

73 Parameter description:  Port : The switch port number of the logical STP port.  CIST Role : The current STP port role of the CIST port. The p

Strona 246

74 3-4.8 Port Statistics After you complete the STP configuration then you could to let the switch display the STP Statistics. The Section provi

Strona 247 - 5-4.1 Export Config

75 3-5 IGMP Snooping The function, is used to establish the multicast groups to forward the multicast packet to the member ports, and, in nature, av

Strona 248 - 5-4.2 Import Config

76 Parameter description:  Snooping Enabled: Enable the Global IGMP Snooping.  Unregistered IPMCv4 Flooding enabled : Enable unregistered IPMCv

Strona 249 - 5-5 Diagnostics

77 3-5.2 VLAN Configuration The section describes the VLAN configuration setting process integrated with IGMP Snooping function. For Each setting pag

Strona 250 - 5-5.2 Ping6

78 Query Response Interval. The Max Response Time used to calculate the Max Resp Code inserted into the periodic General Queries. The allowed range i

Strona 251 - 5-5.3 VeriPHY

79 3-5.3 Port Group Filtering The section describes how to set the IGMP Port Group Filtering? With the IGMP filtering feature, an user

Strona 252

80  Port : To evoke the port enable the IGMP Snooping Port Group Filtering function.  Filtering Groups : The IP Multicast Group that will be fil

Strona 253

81 3-5.4 Status After you complete the IGMP Snooping configuration, then you could to let the switch display the IGMP Snooping Status. The Secti

Strona 254

1 INTRODUCTION Overview In this user’s manual, it will not only tell you how to install and connect your network system but con

Strona 255

82 The number of Transmitted Queries.  Queries Received : The number of Received Queries.  V1 Reports Received : The number of Received V1 Repor

Strona 256

83 3-5.5 Group Infermation After you complete to set the IGMP Snooping function then you could let the switch to display the IGMP Snooping Group Info

Strona 257

84 3-5.6 IPv4 SSM information Source Specific Multicast (SSM) is a datagram delivery model that best supports one-to-many applications, also known as

Strona 258

85 VLAN ID of the group.  Group : Group address of the group displayed.  Port : Switch port number.  Mode : Indicates the filtering mode main

Strona 259

86 3-6 MLD Snooping Curiously enough, a network node that acts as a source of IPv6 multicast traffic is only an indirect participant in MLD snoo

Strona 260

87 Parameter description:  Snooping Enabled : Enable the Global MLD Snooping.  Unregistered IPMCv6 Flooding enabled : Enable unregistered IPM

Strona 261

88 To evoke to enable the fast leave on the port.  Router Port : Specify which ports act as router ports. A router port is a port on the Ethernet s

Strona 262

89 3-6.2 VLAN Configuration When MLD snooping is enabled on a VLAN, the switch acts to minimize unnecessary multicast traffic. If the sw

Strona 263

90 Last Listener Query Interval. The Last Listener Query Interval is the Maximum Response Delay used to calculate the Maximum Response Code in

Strona 264 - Voice VLAN

91 3-6.3 Port Group Filtering The section describes that you could to set the Port Group Filtering in the MLD Snooping function. On the UI

Komentarze do niniejszej Instrukcji

Brak uwag