I GTL-5280 L2 Plus Managed Switch – 48 GE with 4 Combo SFP + 4 10GE SFP Plus User Manual Ver. 1.1-130827
2 Chapter 1 Operation of Web-based Management Initial ConfigurationThis chapter instructs you how to configure and manage the
92 3-6.4 Status The section describes when you complete the MLD Snooping and how to display the MLD Snooping Status and detail information. It wi
93 V1 Reports Received : The number of Received V1 Reports. V2 Reports Received : The number of Received V2 Reports. V1 Leaves Received : T
94 3-6.5 Group Infermation The section describes user could set the MLD Snooping Groups Information. The "Start from VLAN", and "group
95 Auto-refresh : To evoke the auto-refresh icon then the device will refresh the log automatically. Upper right icon (Refresh, <<, >&
96 3-6.6 IPv6 SSM Information The section describes the user to configure the Entries in the MLDv2 Information Table are shown on this page. The MLDv
97 3-7 MVR The MVR feature enables multicast traffic forwarding on the Multicast VLAN. In a multicast television application, a PC or a television wi
98 Parameter description: MVR Mode : Enable/Disable the Global MVR. VLAN ID : Specify the Multicast VLAN ID. Mode : Enable MVR on the port.
99 3-7.2 Groups Information The section describes user could display the MVR Groups detail information on the switch. Entries in the MVR Group Table
100 3-7.3 Statistics The section describes the switch will display the MVR detail Statistics after you had configured MVR on the switch. It provid
101 3-8 LLDP The switch supports the LLDP. For current information on your switch model, The Link Layer Discovery Protocol (LLDP) provides a
3 NOTE: AS GTL-5280 the function enable dhcp, so If you do not have DHCP server to provide ip addresses to the switch, the
102 Parameter description: LLDP Parameters Tx Interval : The switch periodically transmits LLDP frames to its neighbours for having the
103 Both the CDP and LLDP support "system capabilities", but the CDP capabilities cover capabilities that are not part of the LL
104 3-8.2 LLDP Neighbours This page provides a status overview for all LLDP neighbours. The displayed table contains a row for each port on which an
105 9. Reserved When a capability is enabled, the capability is followed by (+). If the capability is disabled, the capability is followed by (-).
106 3-8.3 LLDP-MED Configuration Media Endpoint Discovery is an enhancement of LLDP, known as LLDP-MED, that provides the following facilities: Auto-
107 Parameter description: Fast start repeat count Rapid startup and Emergency Call Service Location Identification Discovery of endpoints is a criti
108 pair is to be used when referencing locations on water/sea/ocean. Civic Address Location IETF Geopriv Civic Address based Location Configuration
109 Room number - Example: 450F. Place type : Place type - Example: Office. Postal community name : Postal community name - Example: Leonia.
110 Policy ID : ID for the policy. This is auto generated and shall be used when selecting the polices that shall be mapped to the specific ports.
111 Adding a new policy : Click to add a new policy. Specify the Application type, Tag, VLAN ID, L2 Priority and DSCP for the new policy. Click &qu
4 GTL-5280 web help function:
112 3-8.4 LLDP-MED Neighbours This page provides a status overview of all LLDP-MED neighbours. The displayed table contains a row for eac
113 applicable to both Media Endpoints (Class II) and Generic Endpoints (Class I). LLDP-MED Generic Endpoint (Class I) : The LLDP-MED Generic Endpo
114 5. Softphone Voice - for use by softphone applications on typical data centric devices, such as PCs or laptops. 6. Video Conferencing - for us
115 3-8.5 EEE By using EEE power savings can be achieved at the expense of traffic latency. This latency occurs due to that the circuits EEE t
116 The link partner's Echo Rx Tw value. Resolved Tx Tw : The resolved Tx Tw for this link. Note : NOT the link partner The resolved value tha
117 3-8.6 Port Statistics Two types of counters are shown. Global counters are counters that refer to the whole switch, while local counters refer to
118 Total Neighbours Entries Added : Shows the number of new entries added since switch reboot. Total Neighbours Entries Deleted : Shows the nu
119 3- 9 Filtering Data Base Filtering Data Base Configuration gathers many functions, including MAC Table Information, Static MAC Learning, which ca
120 The allowed range is 10 to 1000000 seconds. Disable the automatic aging of dynamic entries by checking Disable automatic aging. MAC Table Learni
121 3- 9.2 Dynamic MAC Table Entries in the MAC Table are shown on this page. The MAC Table contains up to 8192 entries, and is sorted first by VLAN
5 CONNECTING NETWORK DEVICES The switch is designed to be connected to 10, 100 or 1000Mbps network cards in PCs and servers, as well as
122 3-10 VLAN To assign a specific VLAN for management purpose. The management VLAN is used to establish an IP connection to the switch from a workst
123 unchecked. By default, no ports are members, and all boxes are unchecked. Adding a New VLAN : Click to add a new VLAN ID. An empty row is adde
124 3-10.2 Ports The function in VLAN Tag Rule Setting, user can input VID number to each port. The range of VID number is from 1 to 4094. User al
125 a port to any value to support network devices that do not use the standard 0x8100 Ethertype field value on 802.1Q-tagged or 802.1p-
126 3-10.3 Switch Status The function Switch Status gathers the information of all VLAN status and reports it by the order of Staic NAS MVRP MVP
127 3-10.4 Port Status The function Port Status gathers the information of all VLAN status and reports it by the order of Static NAS MVRP MVP Voice
128 removed. C-port is Customer Port. S-port is Service port. Custom S-port is S-port with Custom TPID. Ingress Filtering : Shows the
129 3-10.5 Private VLANs In a private VLAN, communication between ports in that private VLAN is not permitted. A VLAN can be configured as a private
130 3-10.6 MAC-based VLAN MAC address-based VLAN decides the VLAN for forwarding an untagged frame based on the source MAC address of the frame. A m
131 MAC Address : Indicates the MAC address. VLAN ID : Indicates the VLAN ID. Port Members : A row of check boxes for each port is
6 Step2. If the device is a network card and the switch is in the wiring closet, attach the other end of the cable segment to a modular wall
132 3-10.6.2 Status This section shows MAC-based VLAN entries configured by various MAC-based VLAN users. Currently we support following VLAN User ty
133 3-10.7 Protocol -based VLAN This section describe Protocol -based VLAN, The Switch support Protocol include Ethernet LLC SNAP Protocol, LLC The L
134 the switch during the next Apply. Frame Type : Frame Type can have one of the following values: 1. Ethernet 2. LLC 3. SNAP NOTE: On
135 3-10.7.2 Group to VLAN This section allows you to map a already configured Group Name to a VLAN for the selected switch. Web Interface To Displa
136 3-11 Voice VLAN Voice VLAN is VLAN configured specially for voice traffic. By adding the ports with voice devices attached to voice VLAN, we can
137 Parameter description: Mode : Indicates the Voice VLAN mode operation. We must disable MSTP feature before we enable Voice VLAN. It
138 3-11.2 OUI The section describes to Configure VOICE VLAN OUI table . The maximum entry number is 16. Modifying the OUI table will restart auto de
139 3-12 GARP The Generic Attribute Registration Protocol (GARP) provides a generic framework whereby devices in a bridged LAN, e.g. end stati
140 Parameter description: Port : The Port coulmn shows the list of ports for which you can configure GARP settings. There are 2 types configuratio
141 3-12.2 Statistics The section describes to port statistics of GARP for all switch ports.The port statistics relate to the currently s
7 Chapter 2 System Configuration This chapter describes the entire basic configuration tasks which includes the System Inform
142 3-13 GVRP GVRP is an application based on Generic Attribute Registration Protocol (GARP), mainly used to automatically and dynamically maintain t
143 Parameter description: GVRP Mode : GVRP Mode is a global setting, to enable the GVRP globally select 'Enable' from menu and to disabl
144 3-13.2 Statistics The section describes to shows the basic GVRP Port statistics for all switch ports. The statistics relate to the currentl
145 3-14 QoS The switch support four QoS queues per port with strict or weighted fair queuing scheduling. It supports QoS Control Lists (QCL) for adv
146 Parameter description: Port : The port number for which the configuration below applies. QoS class : Controls the default QoS class, i.e.,
147 3-14.2 Port Policing This section provides an overview of f QoS Ingress Port Policers for all switch ports The Port Policing is useful in co
148 order to configure the schedulers. Enabled : To evoke which Port you need to enable the QoS Ingress Port Policers function. Rate : To set t
149 3-14.3 Port Scheduler This section provides an overview of QoS Egress Port Schedulers for all switch ports. and the ports belong to the currentl
150 Parameter description: Port : The logical port for the settings contained in the same row. Click on the port number in order to config
151 Controls the weight for this queue. The default value is "17". This value is restricted to 1-100. This parameter is only shown if "
8 The model name of this device. System description: As it is, this tells what this device is. Here, it is “44-Port 10/100/1000Base-T + 4 (100/1G)
152 3-14.4 Port Shaping This section provides an overview of QoS Egress Port Shaping for all switch ports. Others the user could get all detail
153 Parameter description: Port : The logical port for the settings contained in the same row. Click on the port number in order to configure
154 Controls the weight for this queue. The default value is "17". This value is restricted to 1-100. This parameter is only shown if "
155 3-14.5 Port Tag Remarking The Section provides user to get an overview of QoS Egress Port Tag Remarking for all switch ports. Oth
156 Apply – Click to Apply changes. Reset- Click to undo any changes made locally and revert to previously Saved values. Cancel – Click to cancel the
157 3-14.6 Port DSCP The section will teach user to set the QoS Port DSCP configuration that was allowed you to configure the basic QoS Port DSC
158 Parameter description: Port : The Port coulmn shows the list of ports for which you can configure dscp ingress and egress settin
159 3-14.7 DSCP-Based QoS The section will teach user to configure the DSCP-Based QoS mode that This page allows you to configure the ba
160 Parameter description: DSCP : Maximum number of support ed DSCP values are 64. Trust : Click to check if the DSCP value is trusted. QoS
161 3-14.8 DSCP Translation The section describes the swtich allows you to configure the basic QoS DSCP Translation settings for all switches.
9 2-1.2 Configuration You can identify the system by configuring the contact information, name, and location of the switch. Web interface To config
162 Parameter description: DSCP : Maximum number of supported DSCP values are 64 and valid DSCP value ranges from 0 to 63. Ingress : Ingress si
163 3-14.9 DSCP Classification The section describes to teach user to configure and allows you to map DSCP value to a QoS Class and DPL value. Other
164 3-14.10 QoS Control List Configuration The section shows the QoS Control List(QCL), which is made up of the QCEs. Each row describ
165 Any: All types of Destination MAC addresses are allowed. Unicast: Only Unicast MAC addresses are allowed. Multicast: Only Multicast MAC addresse
166 1. Any 2. Ethernet 3. LLC 4. SNAP 5. IPv4 6. IPv6 NOTE: All frame types are explained below: 1. Any : Allow all types of frames.
167 3-14.11 QCL Status The section will let you know how to configure and shows the QCL status by different QCL users. Each row describes the QCE t
168 under DSCP column. Conflict : Displays QCE status. It may happen that resources required to add a QCE may not available, in that
169 3-14.12 Storm Control The section allows user to configure the Storm control for the switch. There is a unicast storm rate control, multicast st
170 3-14.13 WRED The section allows user to configure the WRED function for the switch. This page allows you to configure the Random Early Detection
171 Max. DP3 : Controls the drop probability for frames marked with Drop Precedence Level 3 when the average queue filling level is 100%. This val
10 2-1.3 CPU Load This page displays the CPU load, using an SVG graph. The load is measured as averaged over the last 100ms, 1sec and 10 seconds in
172 3-15 s-Flow Agent The sFlow Collector configuration for the switch can be monitored and modified here. Up to 1 Collector is supported. This page
173 The value accepted is within the range of 1-65535. But an appropriate port number not used by other protocols need to be configured. By def
174 3-15.2 Sampler The section display the sFlow sampler what you set or you can edit it for your requirement. That will help user based on
175 sFlow Ports : List of the port numbers on which sFlow is configured. sFlow Instance : Configured sFlow instance for the port number. Sam
176 3-18 Loop Protection The loop Protection is used to detect the presence of traffic. When switch receives packet’s(looping detection f
177 Shutdown Time: The period (in seconds) for which a port will be kept disabled in the event of a loop is detected (and the port
178 3-18.2 Status This page displays the loop protection port status the ports of the switch Web Interface To configure the Loop Protection param
179 3-19 Easy Port Easy Port provide a convenient way to Apply and share common configurations. You can use it to enable features and settings based
180 (Low) to 7 (High). If you want the voice has high priority then you can set the value with 7. Port Security : To scroll to enable or disab
181 3-20 Mirroring You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON
11 2-2 Time This page configure the switch Time. Time configure is including Time Configuration and NTP Configuration 2-2.1 Manual The switch prov
182 Parameter description: Port to mirror on : Port to mirror also known as the mirror port. Frames from ports that have either source (rx) or des
183 3-21 Trap Event Severity The function, is used to set a Alarm trap and get the Event log. The Trap Events Configuration function is used to enab
184 3-22 SMTP Configuration The function, is used to set a Alarm trap when the switch alarm then you could set the SMTP server to send you th
185 3-23 UPnP UPnP is an acronym for Universal Plug and Play. The goals of UPnP are to allow devices to connect seamlessly and to simplify the i
186 Chapter 4. Security This chapter describes all of the switch security configuration tasks to enhance the security of local
187 Parameter description: Mode of IP Source Guard Configuration : Enable the Global IP Source Guard or disable the Global IP Source Guard. All con
188 4-1.2 Static Table The section describes to configure the Static IP Source Guard Table parameters of the switch. You could use the Static IP Sour
189 4-1.3 Dynamic Table The section describes to configure the Dynamic IP Source Guard Table parameters of the switch. You could use the Dy
190 4-2 ARP Inspection The section describes to configure the ARP Inspection parameters of the switch. You could use the ARP Inspection configure to
191 Parameter description: Mode of ARP Inspection Configuration : Enable the Global ARP Inspection or disable the Global ARP Inspection. Port M
II The information in this document is subject to change without notice. Unless the explicit written permission of Digital Data Communications Corpo
12 The switch supports valid configurable day light saving time is –5 ~ +5 step one hour. The zero for this parameter means it need not h
192 4-2.2 Static Table The section describes to configure the Static ARP Inspection Table parameters of the switch. You could use the Static ARP Insp
193 4-2.3 Dynamic Table The section describes to configure the Dynamic ARP Inspection Table parameters of the switch. The Dynamic ARP Ins
194 4-3 DHCP Snooping The section describes to configure the DHCP Snooping parameters of the switch. The DHCP Snooping can prevent attackers from add
195 Parameter description: Snooping Mode : Indicates the DHCP snooping mode operation. Possible modes are: Enabled: Enable DHCP snooping mode oper
196 4-3.2 Statistics The section describes to show the DHCP Snooping Statistics information of the switch. The statistics show only packet counters w
197 The number of lease unknown (option 53 with value 12) packets received and transmitted. Rx and Tx Lease Active : The number of lease active (o
198 4-4 DHCP Relay The section describes how to forward DHCP requests to another specific DHCP servers via DHCP relay. The DHCP servers may be on ano
199 Disabled: Disable DHCP relay information mode operation. Relay Information Policy : Indicates the DHCP relay information option policy. When D
200 4-4.2 Statistics The section describes to show the DHCP Relay Statistics information of the switch. The statistics show both of Serv
201 Replace Agent Option : The number of packets which were replaced with relay agent information option. Keep Agent Option : The number of pac
13 2-2.2 NTP NTP is Network Time Protocol and is used to sync the network time based Greenwich Mean Time (GMT). If use the NTP mode and select a bu
202 4-5 NAS The section describes to configure the NAS parameters of the switch. The NAS server can be employed to connect users to a variety of
203 Parameter description: Mode : Indicates if NAS is globally enabled or disabled on the switch. If globally disabled, all ports are allowed forwa
204 RADIUS-Assigned QoS Enabled : RADIUS-assigned QoS provides a means to centrally control the traffic class to which traffic coming f
205 following modes are available: Force Authorized : In this mode, the switch will send one EAPOL Success frame when the port link comes up, and a
206 secure a supplicant's MAC address once successfully authenticated. Multi 802.1X : In port-based 802.1X authentication, once a supplicant
207 • Single 802.1X RADIUS attributes used in identifying a QoS Class: Refer to the written documentation for a description of the RADIUS attributes
208 Guest VLAN Operation: When a Guest VLAN enabled port's link comes up, the switch starts transmitting EAPOL Request Identity frames. If th
209 4-5.2 Switch Status The section describes to show the each port NAS status information of the switch.The status includes Admin State Port State,
210 Port VLAN ID : The VLAN ID that NAS has put the port in. The field is blank, if the Port VLAN ID is not overridden by NAS. If the VLAN ID is as
211 4-5.3 Port Status The section describes to provides detailed NAS statistics for a specific switch port running EAPOL-based IEEE 802.1X auth
14 2-3 Account In this function, only administrator can create, modify or delete the username and password. Administrator can modify other guest i
212 • Port-based 802.1X • Single 802.1X • Multi 802.1X Backend Server Counters : These backend (RADIUS) frame counters are available
213 Last Authentication : Shows the date and time of the last authentication of the client (successful as well as unsuccessful).
214 4-6 AAA This section shows you to use an AAA (Authentication, Authorization, Accounting) server to provide access control to your network.
215 Figure 4-5.3.3: The RADIUS Configuration Figure 4-5.3.4: The RADIUS Accounting Configuration Figure 4-5.3.4: The TACACS+ Authentication Co
216 RADIUS Authentication Server Configuration The table has one row for each RADIUS Authentication Server and a number of columns, which are: # :
217 Secret : The secret - up to 29 characters long - shared between the TACACS+ Authentication Server and the switch. Buttons: Ap
218 4-6.2 Radius Overview This section shows you an overview of the RADIUS Authentication and Accounting servers status to ensure the function is wor
219 Ready: The server is enabled, IP communication is up and running, and the RADIUS module is ready to accept accounting attempts. Dead
220 4-6.3 Radius Details This section shows you an detailed statistics of the RADIUS Authentication and Accounting servers. The statistics map closel
221 4-7 Port Security This section shows you to to configure the Port Security settings of the Switch. You can use the Port Security feature to
15 Privilege Level : The privilege level of the user. The allowed range is 1 to 15. If the privilege level value is 15, it can acces
222 Parameter description: System Configuration Mode : Indicates if Limit Control is globally enabled or disabled on the switch. If globally disabl
223 1) Boot the switch, 2) Disable and re-enable Limit Control on the port or the switch, 3) Click the Reopen button. Trap & Shutdown: If Limit
224 4-7.2 Switch Status This section shows the Port Security status. Port Security is a module with no direct configuration. Configurat
225 Abbr : A one-letter abbreviation of the user module. This is used in the Users column in the port status table. Port Status : The table ha
226 4-7.3 Port Status This section shows the MAC addresses secured by the Port Security module. Port Security is a module with no direct configuratio
227 4-8 Access Management This section shows you to configure access management table of the Switch including HTTP/HTTPS, SNMP, and TELNE
228 HTTP/HTTPS : Indicates that the host can access the switch from HTTP/HTTPS interface if the host IP address matches the IP address range provi
229 4-8.2 Statistics This section shows you a detailed statistics of the Access Management including HTTP, HTTPS, SSH. TELNET, ans SS
230 4-9 SSH This section shows you to use SSH (Secure SHell) to securely access the Switch. SSH is a secure communication protocol that combines aut
231 4-10 HTTPs This section shows you how to use HTTPS to securely access the Switch. HTTPS is a secure communication protocol that combines authenti
16 2-3.2 Privitege Level This page provides an overview of the privilege levels. The switch provides user set Account, Aggregation,Diagnostics,EEE,GA
232 4-11 Auth Method This page shows how to configure a user with authenticated when he logs into the switch via one of the management client interfa
233 Chapter 5. Maintenance This chapter describes all of the switch Maintenance configuration tasks to enhance the performance
234 5-2 Firmware This section describes how to upgrade Firmware. The Switch can be enhanced with more value-added functions by installing
235 5-2.2 Firmware Selection Due to the switch supports Dual image for firmware redundancy purpose. You can select what firmware image for your d
236 NOTE: 1. In case the active firmware image is the alternate image, only the "Active Image" table is shown. In this case, the Activat
237 5-3 Apply / Restore This section describes how to Apply and restore the Switch configuration including reset to Factory Defaults, Apply Start, Ap
238 Apply – Click the “Apply” button to Apply current setting as Start Configuration. 5-3.3 Apply User This section describes how to Apply users info
239 5-4 Export / Import This section describes how to export and import the Switch configuration. Any current configuration files will be
240 5-4.2 Import Config This section describes to export the Swith Configuration for maintenance needs. Any current configuration files will be expor
241 5-5 Diagnostics This section provides a set of basic system diagnosis. It let users know that whether the system is health or need
17 Parameter description: Group Name The name identifying the privilege group. In most cases, a privilege level group consists of a single mod
242 5-5.2 Ping6 This section allows you to issue ICMPv6 PING packets to troubleshoot IPv6 connectivity issues. Web Interface To configu
243 5-5.3 VeriPHY This section is used for running the VeriPHY Cable Diagnostics. Press to run the diagnostics. This will take approximately 5 second
A. Glossary of Web-based Management A ACE ACE is an acronym for Access Control Entry. It describes access permission associated with a particula
245 (Also Port Aggregation, Link Aggregation). ARP ARP is an acronym for Address Resolution Protocol. It is a protocol that used to convert an IP ad
246 Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather than requiring an administrator to ma
247 EPS EPS is an abbreviation for Ethernet Protection Switching defined in ITU/T G.8031. Ethernet Type Ethernet Type, or EtherType, is a field in
248 ICMP is an acronym for Internet Control Message Protocol. It is a protocol that generated the error response, diagnostic or routing purposes. ICMP
249 IP Source Guard is a secure feature used to restrict IP traffic on DHCP snooping untrusted ports by filtering traffic based on the DHCP Snooping T
250 MEP MEP is an acronym for Maintenance Entity Endpoint and is an endpoint in a Maintenance Entity Group (ITU-T Y.1731). MD5 MD5 is an acronym f
251 O OAM OAM is an acronym for Operation Administration and Maintenance. It is a protocol described in ITU-T Y.1731 used to implement carrier eth
18 2-4 IP IP is an acronym for Internet Protocol. It is a protocol used for communicating data across an internet network. IP is a "best effort
252 POP3 POP3 is an acronym for Post Office Protocol version 3. It is a protocol for email clients to retrieve email messages from a mail server. P
253 R RARP RARP is an acronym for Reverse Address Resolution Protocol. It is a protocol that is used to obtain an IP address for a given hardware a
254 SSID Service Set Identifier is a name used to identify the particular 802.11 wireless LANs to which a user wants to attach. A client device will
255 TELNET TELNET is an acronym for TELetype NETwork. It is a terminal emulation protocol that uses the Transmission Control Protocol (TCP) and provi
256 VLAN ID VLAN ID is a 12-bit field specifying the VLAN to which the frame belongs. Voice VLAN Voice VLAN is VLAN configured specially for voice
19 Parameter description: DHCP Client : Enable the DHCP client by checking this box. If DHCP fails and the configured IP address is zero, DHCP wi
20 2-4.2 IPV6 This section describes how to configure the switch-managed IPv6 information. The Configured column is used to view or change
21 2-5 Syslog The Syslog is a standard for logging program messages . It allows separation of the software that generates messages from the system t
III operation, design, performance or implementation of the Software and related documentation that is confidential to LevelOne to any t
22 2-5.2 Log This section describes that display the system log information of the switch Web Interface To display the log configuration in the web
23 2-5.3 Detailed Log This section describes that display the detailed log information of the switch Web Interface To display the detailed log conf
24 2-6 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped
25 2-6.2 Communities The function is used to configure SNMPv3 communities. The Community and UserName is unique. To create a new community account,
26 2-6.3 Users The function is used to configure SNMPv3 user. The Entry index key is UserName. To create a new UserName account, please check &
27 None: No authentication protocol. MD5: An optional flag to indicate that this user uses MD5 authentication protocol. SHA: An optiona
28 2-6.4 Groups The function is used to configure SNMPv3 group. The Entry index key are Security Model and Security Name. To create a new group accou
29 2-6.5 Views The function is used to configure SNMPv3 view. The Entry index key are OID Subtree and View Name. To create a new view account, pleas
30 OID Subtree The OID defining the root of the subtree to add to the named view. The allowed OID length is 1 to 128. The allowed string
31 2-6.6 Access The function is used to configure SNMPv3 accesses. The Entry index key are Group Name, Security Model and Security level. To create a
IV Table of Contents INTRODUCTION ...
32 NoAuth, NoPriv: No authentication and no privacy. Auth, NoPriv: Authentication and no privacy. Auth, Priv: Authentication and privacy. Read V
33 2-6.7 Tarp The function is used to configure SNMP trap. To create a new trap account, please check <No number> button, and enter the trap in
34 Community / Security Name: The length of “Community / Security Name” string is restricted to 1-32. Security Level: Indicates what kind of me
35 Chapter 3. Configuration This chapter describes all of the basic network configuration tasks which includes the Ports, Layer 2 networ
36 Parameter description: Port : This is the logical port number for this row. Link : The current link state is displayed graphically. Green i
37 3-1.2 Port Description The section describes to configure the Port’s alias or any descriptions for the Port Identity. It provides user to writ
38 3-1.3 Traffic Overview The section describes to the Port statistics information and provides overview of general traffic statistics for all swi
39 3-1.4 Detailed Statistics The section describes how to provide detailed traffic statistics for a specific switch port. Use the port select box
40 The number of received and transmitted (good and bad) multicast packets. Rx and Tx Broadcast : The number of received and transmitted (good and
41 3-1.5 Qos Statistics The section describes that switch could display the QoS detailed Queuing counters for a specific switch port.
V 3-4.3 MSTI Priorities ... 66
42 3-1.6 SFP Information The section describes that switch could display the SFP module detail information which you connect it to the switch.
43 Display the module revision. Vendor SN (Serial Number): Show the serial number assigned by the manufacturer. Date Code: Show the date this SF
44 3-2 ACL The GTL-5280 switch access control list (ACL) is probably the most commonly used object in the IOS. It is used for packet filtering but al
45 Parameter description: Port : The logical port for the settings contained in the same row. Policy ID : Select the policy to apply to t
46 3-2.2 Rate Limiters The section describes how to configure the switch’s ACL Rate Limiter parameters. The Rate Limiter Level from 1 to 16 that allo
47 3-2.3 Access Control List The section describes how to configure Access Control List rule. An Access Control List (ACL) is a sequential list of pe
48 Parameter description: Ingress Port : Indicates the ingress port of the ACE. Possible values are: Any: The ACE will match any ingress port. Po
49 : Inserts a new ACE before the current row. : Edits the ACE row. : Moves the ACE up the list. : Moves the ACE down the list. : Deletes the ACE.
50 3-2.4 ACL Status The section describes how to shows the ACL status by different ACL users. Each row describes the ACE that is d
51 Mirror : Specify the mirror operation of this port. The allowed values are: Enabled: Frames received on the port are mirrored. Disabled: Frame
VI 3-14.9 DSCP Classification ... 163 3-14
52 3-3 Aggregation The Aggregation is used to configure the settings of Link Aggregation. You can bundle more than one port with the same speed, full
53 Parameter description: Hash Code Contributors Source MAC Address : The Source MAC address can be used to calculate the destination port for the
54 3-3.2 LACP Ports using Link Aggregation Control Protocol (according to IEEE 802.3ad specification) as their trunking method can choose their u
55 Parameter description: Port : The switch port number. LACP Enabled : Controls whether LACP is enabled on this switch port. LACP
56 3-3.2.2 System Status This section describes that when you complete to set LACP function on the switch then it provides a status over
57 3-3.2.3 Port Status This section describes that when you complete to set LACP function on the switch then it provides a Port Status o
58 Parameter description: Port : The switch port number. LACP : 'Yes' means that LACP is enabled and the port link is up. 'No&ap
59 3-3.2.4 Port Statistics This section describes that when you complete to set LACP function on the switch then it provides a Port Statistic
60 LACP Received : Shows how many LACP frames have been received at each port. LACP Transmitted : Shows how many LACP frames have been sent fro
61 3-4 Spanning Tree The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between switches,
VII 5-5 DIAGNOSTICS ...
62 Figure 3-4.1: The STP Bridge Configuration Parameter description: Basic Settings Protocol Version : The STP protocol version setting. Valid
63 Advanced Settings Edge Port BPDU Filtering : Control whether a port explicitly configured as Edge will transmit and receive BPDUs.
64 2-4.2 MSTI Mapping When you implement an Spanning Tree protocol on the switch that the bridge instance. The CIST is not available for explicit map
65 MSTI Mapping MSTI : The bridge instance. The CIST is not available for explicit mapping, as it will receive the VLANs not explici
66 3-4.3 MSTI Priorities When you implement an Spanning Tree protocol on the switch that the bridge instance. The CIST is the default instance whi
67 3-4.4 CIST Ports When you implement an Spanning Tree protocol on the switch that the bridge instance. You need to configure the CIST Ports. The se
68 path cost ports are chosen as forwarding ports in favour of higher path cost ports. Valid values are in the range 1 to 200000000.
69 3-4.5 MSTI Ports The section describes it allows the user to inspect the current STP MSTI port configurations, and possibly change them as well. A
70 Port : The switch port number of the corresponding STP CIST (and MSTI) port. Path Cost : Controls the path cost incurred by the port. The Au
71 3-4.6 Bridge Status After you complete the MSTI Port configuration the you could to ask the switch display the Bridge Status. The Section provides
72 3-4.7 Port Status After you complete the STP configuration the you could to ask the switch display the STP Port Status. The Section provides y
73 Parameter description: Port : The switch port number of the logical STP port. CIST Role : The current STP port role of the CIST port. The p
74 3-4.8 Port Statistics After you complete the STP configuration then you could to let the switch display the STP Statistics. The Section provi
75 3-5 IGMP Snooping The function, is used to establish the multicast groups to forward the multicast packet to the member ports, and, in nature, av
76 Parameter description: Snooping Enabled: Enable the Global IGMP Snooping. Unregistered IPMCv4 Flooding enabled : Enable unregistered IPMCv
77 3-5.2 VLAN Configuration The section describes the VLAN configuration setting process integrated with IGMP Snooping function. For Each setting pag
78 Query Response Interval. The Max Response Time used to calculate the Max Resp Code inserted into the periodic General Queries. The allowed range i
79 3-5.3 Port Group Filtering The section describes how to set the IGMP Port Group Filtering? With the IGMP filtering feature, an user
80 Port : To evoke the port enable the IGMP Snooping Port Group Filtering function. Filtering Groups : The IP Multicast Group that will be fil
81 3-5.4 Status After you complete the IGMP Snooping configuration, then you could to let the switch display the IGMP Snooping Status. The Secti
1 INTRODUCTION Overview In this user’s manual, it will not only tell you how to install and connect your network system but con
82 The number of Transmitted Queries. Queries Received : The number of Received Queries. V1 Reports Received : The number of Received V1 Repor
83 3-5.5 Group Infermation After you complete to set the IGMP Snooping function then you could let the switch to display the IGMP Snooping Group Info
84 3-5.6 IPv4 SSM information Source Specific Multicast (SSM) is a datagram delivery model that best supports one-to-many applications, also known as
85 VLAN ID of the group. Group : Group address of the group displayed. Port : Switch port number. Mode : Indicates the filtering mode main
86 3-6 MLD Snooping Curiously enough, a network node that acts as a source of IPv6 multicast traffic is only an indirect participant in MLD snoo
87 Parameter description: Snooping Enabled : Enable the Global MLD Snooping. Unregistered IPMCv6 Flooding enabled : Enable unregistered IPM
88 To evoke to enable the fast leave on the port. Router Port : Specify which ports act as router ports. A router port is a port on the Ethernet s
89 3-6.2 VLAN Configuration When MLD snooping is enabled on a VLAN, the switch acts to minimize unnecessary multicast traffic. If the sw
90 Last Listener Query Interval. The Last Listener Query Interval is the Maximum Response Delay used to calculate the Maximum Response Code in
91 3-6.3 Port Group Filtering The section describes that you could to set the Port Group Filtering in the MLD Snooping function. On the UI
Kommentare zu diesen Handbüchern