LevelOne GTL-5280 Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Netzwerk-Switches LevelOne GTL-5280 herunter. LevelOne GTL-5280 Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 264
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - GTL-5280

I GTL-5280 L2 Plus Managed Switch – 48 GE with 4 Combo SFP + 4 10GE SFP Plus User Manual Ver. 1.1-130827

Seite 2

2 Chapter 1 Operation of Web-based Management Initial ConfigurationThis chapter instructs you how to configure and manage the

Seite 3

92 3-6.4 Status The section describes when you complete the MLD Snooping and how to display the MLD Snooping Status and detail information. It wi

Seite 4

93  V1 Reports Received : The number of Received V1 Reports.  V2 Reports Received : The number of Received V2 Reports.  V1 Leaves Received : T

Seite 5

94 3-6.5 Group Infermation The section describes user could set the MLD Snooping Groups Information. The "Start from VLAN", and "group

Seite 6

95  Auto-refresh : To evoke the auto-refresh icon then the device will refresh the log automatically.  Upper right icon (Refresh, <<, >&

Seite 7

96 3-6.6 IPv6 SSM Information The section describes the user to configure the Entries in the MLDv2 Information Table are shown on this page. The MLDv

Seite 8

97 3-7 MVR The MVR feature enables multicast traffic forwarding on the Multicast VLAN. In a multicast television application, a PC or a television wi

Seite 9 - INTRODUCTION

98 Parameter description:  MVR Mode : Enable/Disable the Global MVR.  VLAN ID : Specify the Multicast VLAN ID.  Mode : Enable MVR on the port.

Seite 10

99 3-7.2 Groups Information The section describes user could display the MVR Groups detail information on the switch. Entries in the MVR Group Table

Seite 11

100 3-7.3 Statistics The section describes the switch will display the MVR detail Statistics after you had configured MVR on the switch. It provid

Seite 12 - GTL-5280 web help function:

101 3-8 LLDP The switch supports the LLDP. For current information on your switch model, The Link Layer Discovery Protocol (LLDP) provides a

Seite 13

3 NOTE: AS GTL-5280 the function enable dhcp, so If you do not have DHCP server to provide ip addresses to the switch, the

Seite 14

102 Parameter description: LLDP Parameters  Tx Interval : The switch periodically transmits LLDP frames to its neighbours for having the

Seite 15 - System Configuration

103 Both the CDP and LLDP support "system capabilities", but the CDP capabilities cover capabilities that are not part of the LL

Seite 16

104 3-8.2 LLDP Neighbours This page provides a status overview for all LLDP neighbours. The displayed table contains a row for each port on which an

Seite 17 - 2-1.2 Configuration

105 9. Reserved When a capability is enabled, the capability is followed by (+). If the capability is disabled, the capability is followed by (-). 

Seite 18 - 2-1.3 CPU Load

106 3-8.3 LLDP-MED Configuration Media Endpoint Discovery is an enhancement of LLDP, known as LLDP-MED, that provides the following facilities: Auto-

Seite 19 - 2-2 Time

107 Parameter description: Fast start repeat count Rapid startup and Emergency Call Service Location Identification Discovery of endpoints is a criti

Seite 20

108 pair is to be used when referencing locations on water/sea/ocean. Civic Address Location IETF Geopriv Civic Address based Location Configuration

Seite 21 - 2-2.2 NTP

109 Room number - Example: 450F.  Place type : Place type - Example: Office.  Postal community name : Postal community name - Example: Leonia. 

Seite 22 - 2-3.1 Users

110  Policy ID : ID for the policy. This is auto generated and shall be used when selecting the polices that shall be mapped to the specific ports.

Seite 23

111  Adding a new policy : Click to add a new policy. Specify the Application type, Tag, VLAN ID, L2 Priority and DSCP for the new policy. Click &qu

Seite 24 - 2-3.2 Privitege Level

4 GTL-5280 web help function:

Seite 25

112 3-8.4 LLDP-MED Neighbours This page provides a status overview of all LLDP-MED neighbours. The displayed table contains a row for eac

Seite 26 - 2-4.1 IPV4

113 applicable to both Media Endpoints (Class II) and Generic Endpoints (Class I).  LLDP-MED Generic Endpoint (Class I) : The LLDP-MED Generic Endpo

Seite 27

114 5. Softphone Voice - for use by softphone applications on typical data centric devices, such as PCs or laptops. 6. Video Conferencing - for us

Seite 28 - 2-4.2 IPV6

115 3-8.5 EEE By using EEE power savings can be achieved at the expense of traffic latency. This latency occurs due to that the circuits EEE t

Seite 29 - 2-5 Syslog

116 The link partner's Echo Rx Tw value.  Resolved Tx Tw : The resolved Tx Tw for this link. Note : NOT the link partner The resolved value tha

Seite 30 - 2-5.2 Log

117 3-8.6 Port Statistics Two types of counters are shown. Global counters are counters that refer to the whole switch, while local counters refer to

Seite 31 - 2-5.3 Detailed Log

118  Total Neighbours Entries Added : Shows the number of new entries added since switch reboot.  Total Neighbours Entries Deleted : Shows the nu

Seite 32 - 2-6 SNMP

119 3- 9 Filtering Data Base Filtering Data Base Configuration gathers many functions, including MAC Table Information, Static MAC Learning, which ca

Seite 33 - 2-6.2 Communities

120 The allowed range is 10 to 1000000 seconds. Disable the automatic aging of dynamic entries by checking Disable automatic aging. MAC Table Learni

Seite 34 - 2-6.3 Users

121 3- 9.2 Dynamic MAC Table Entries in the MAC Table are shown on this page. The MAC Table contains up to 8192 entries, and is sorted first by VLAN

Seite 35

5 CONNECTING NETWORK DEVICES The switch is designed to be connected to 10, 100 or 1000Mbps network cards in PCs and servers, as well as

Seite 36 - 2-6.4 Groups

122 3-10 VLAN To assign a specific VLAN for management purpose. The management VLAN is used to establish an IP connection to the switch from a workst

Seite 37 - 2-6.5 Views

123 unchecked. By default, no ports are members, and all boxes are unchecked.  Adding a New VLAN : Click to add a new VLAN ID. An empty row is adde

Seite 38

124 3-10.2 Ports The function in VLAN Tag Rule Setting, user can input VID number to each port. The range of VID number is from 1 to 4094. User al

Seite 39 - 2-6.6 Access

125 a port to any value to support network devices that do not use the standard 0x8100 Ethertype field value on 802.1Q-tagged or 802.1p-

Seite 40

126 3-10.3 Switch Status The function Switch Status gathers the information of all VLAN status and reports it by the order of Staic NAS MVRP MVP

Seite 41 - 2-6.7 Tarp

127 3-10.4 Port Status The function Port Status gathers the information of all VLAN status and reports it by the order of Static NAS MVRP MVP Voice

Seite 42

128 removed. C-port is Customer Port. S-port is Service port. Custom S-port is S-port with Custom TPID.  Ingress Filtering : Shows the

Seite 43 - Configuration

129 3-10.5 Private VLANs In a private VLAN, communication between ports in that private VLAN is not permitted. A VLAN can be configured as a private

Seite 44

130 3-10.6 MAC-based VLAN MAC address-based VLAN decides the VLAN for forwarding an untagged frame based on the source MAC address of the frame. A m

Seite 45 - 3-1.2 Port Description

131  MAC Address : Indicates the MAC address.  VLAN ID : Indicates the VLAN ID.  Port Members : A row of check boxes for each port is

Seite 46 - 3-1.3 Traffic Overview

6 Step2. If the device is a network card and the switch is in the wiring closet, attach the other end of the cable segment to a modular wall

Seite 47 - 3-1.4 Detailed Statistics

132 3-10.6.2 Status This section shows MAC-based VLAN entries configured by various MAC-based VLAN users. Currently we support following VLAN User ty

Seite 48 - Transmit Error Counters

133 3-10.7 Protocol -based VLAN This section describe Protocol -based VLAN, The Switch support Protocol include Ethernet LLC SNAP Protocol, LLC The L

Seite 49 - 3-1.5 Qos Statistics

134 the switch during the next Apply.  Frame Type : Frame Type can have one of the following values: 1. Ethernet 2. LLC 3. SNAP NOTE: On

Seite 50 - 3-1.6 SFP Information

135 3-10.7.2 Group to VLAN This section allows you to map a already configured Group Name to a VLAN for the selected switch. Web Interface To Displa

Seite 51

136 3-11 Voice VLAN Voice VLAN is VLAN configured specially for voice traffic. By adding the ports with voice devices attached to voice VLAN, we can

Seite 52 - 3-2 ACL

137 Parameter description:  Mode : Indicates the Voice VLAN mode operation. We must disable MSTP feature before we enable Voice VLAN. It

Seite 53

138 3-11.2 OUI The section describes to Configure VOICE VLAN OUI table . The maximum entry number is 16. Modifying the OUI table will restart auto de

Seite 54 - 3-2.2 Rate Limiters

139 3-12 GARP The Generic Attribute Registration Protocol (GARP) provides a generic framework whereby devices in a bridged LAN, e.g. end stati

Seite 55 - 3-2.3 Access Control List

140 Parameter description:  Port : The Port coulmn shows the list of ports for which you can configure GARP settings. There are 2 types configuratio

Seite 56

141 3-12.2 Statistics The section describes to port statistics of GARP for all switch ports.The port statistics relate to the currently s

Seite 57

7 Chapter 2 System Configuration This chapter describes the entire basic configuration tasks which includes the System Inform

Seite 58 - 3-2.4 ACL Status

142 3-13 GVRP GVRP is an application based on Generic Attribute Registration Protocol (GARP), mainly used to automatically and dynamically maintain t

Seite 59

143 Parameter description:  GVRP Mode : GVRP Mode is a global setting, to enable the GVRP globally select 'Enable' from menu and to disabl

Seite 60 - 3-3 Aggregation

144 3-13.2 Statistics The section describes to shows the basic GVRP Port statistics for all switch ports. The statistics relate to the currentl

Seite 61

145 3-14 QoS The switch support four QoS queues per port with strict or weighted fair queuing scheduling. It supports QoS Control Lists (QCL) for adv

Seite 62 - 3-3.2 LACP

146 Parameter description:  Port : The port number for which the configuration below applies.  QoS class : Controls the default QoS class, i.e.,

Seite 63

147 3-14.2 Port Policing This section provides an overview of f QoS Ingress Port Policers for all switch ports The Port Policing is useful in co

Seite 64

148 order to configure the schedulers.  Enabled : To evoke which Port you need to enable the QoS Ingress Port Policers function.  Rate : To set t

Seite 65

149 3-14.3 Port Scheduler This section provides an overview of QoS Egress Port Schedulers for all switch ports. and the ports belong to the currentl

Seite 66

150 Parameter description:  Port : The logical port for the settings contained in the same row. Click on the port number in order to config

Seite 67

151 Controls the weight for this queue. The default value is "17". This value is restricted to 1-100. This parameter is only shown if "

Seite 68

8 The model name of this device.  System description: As it is, this tells what this device is. Here, it is “44-Port 10/100/1000Base-T + 4 (100/1G)

Seite 69 - 3-4 Spanning Tree

152 3-14.4 Port Shaping This section provides an overview of QoS Egress Port Shaping for all switch ports. Others the user could get all detail

Seite 70 - Basic Settings

153 Parameter description:  Port : The logical port for the settings contained in the same row. Click on the port number in order to configure

Seite 71 - Advanced Settings

154 Controls the weight for this queue. The default value is "17". This value is restricted to 1-100. This parameter is only shown if "

Seite 72 - 2-4.2 MSTI Mapping

155 3-14.5 Port Tag Remarking The Section provides user to get an overview of QoS Egress Port Tag Remarking for all switch ports. Oth

Seite 73 - MSTI Mapping

156 Apply – Click to Apply changes. Reset- Click to undo any changes made locally and revert to previously Saved values. Cancel – Click to cancel the

Seite 74 - 3-4.3 MSTI Priorities

157 3-14.6 Port DSCP The section will teach user to set the QoS Port DSCP configuration that was allowed you to configure the basic QoS Port DSC

Seite 75 - 3-4.4 CIST Ports

158 Parameter description:  Port : The Port coulmn shows the list of ports for which you can configure dscp ingress and egress settin

Seite 76

159 3-14.7 DSCP-Based QoS The section will teach user to configure the DSCP-Based QoS mode that This page allows you to configure the ba

Seite 77 - 3-4.5 MSTI Ports

160 Parameter description:  DSCP : Maximum number of support ed DSCP values are 64.  Trust : Click to check if the DSCP value is trusted.  QoS

Seite 78

161 3-14.8 DSCP Translation The section describes the swtich allows you to configure the basic QoS DSCP Translation settings for all switches.

Seite 79 - 3-4.6 Bridge Status

9 2-1.2 Configuration You can identify the system by configuring the contact information, name, and location of the switch. Web interface To config

Seite 80 - 3-4.7 Port Status

162 Parameter description:  DSCP : Maximum number of supported DSCP values are 64 and valid DSCP value ranges from 0 to 63.  Ingress : Ingress si

Seite 81

163 3-14.9 DSCP Classification The section describes to teach user to configure and allows you to map DSCP value to a QoS Class and DPL value. Other

Seite 82 - 3-4.8 Port Statistics

164 3-14.10 QoS Control List Configuration The section shows the QoS Control List(QCL), which is made up of the QCEs. Each row describ

Seite 83 - 3-5 IGMP Snooping

165 Any: All types of Destination MAC addresses are allowed. Unicast: Only Unicast MAC addresses are allowed. Multicast: Only Multicast MAC addresse

Seite 84

166 1. Any 2. Ethernet 3. LLC 4. SNAP 5. IPv4 6. IPv6 NOTE: All frame types are explained below: 1. Any : Allow all types of frames.

Seite 85 - 3-5.2 VLAN Configuration

167 3-14.11 QCL Status The section will let you know how to configure and shows the QCL status by different QCL users. Each row describes the QCE t

Seite 86

168 under DSCP column.  Conflict : Displays QCE status. It may happen that resources required to add a QCE may not available, in that

Seite 87 - 3-5.3 Port Group Filtering

169 3-14.12 Storm Control The section allows user to configure the Storm control for the switch. There is a unicast storm rate control, multicast st

Seite 88

170 3-14.13 WRED The section allows user to configure the WRED function for the switch. This page allows you to configure the Random Early Detection

Seite 89 - 3-5.4 Status

171  Max. DP3 : Controls the drop probability for frames marked with Drop Precedence Level 3 when the average queue filling level is 100%. This val

Seite 90

10 2-1.3 CPU Load This page displays the CPU load, using an SVG graph. The load is measured as averaged over the last 100ms, 1sec and 10 seconds in

Seite 91 - IGMP Group Table Columns

172 3-15 s-Flow Agent The sFlow Collector configuration for the switch can be monitored and modified here. Up to 1 Collector is supported. This page

Seite 92

173 The value accepted is within the range of 1-65535. But an appropriate port number not used by other protocols need to be configured. By def

Seite 93

174 3-15.2 Sampler The section display the sFlow sampler what you set or you can edit it for your requirement. That will help user based on

Seite 94 - 3-6 MLD Snooping

175  sFlow Ports : List of the port numbers on which sFlow is configured.  sFlow Instance : Configured sFlow instance for the port number.  Sam

Seite 95

176 3-18 Loop Protection The loop Protection is used to detect the presence of traffic. When switch receives packet’s(looping detection f

Seite 96

177  Shutdown Time: The period (in seconds) for which a port will be kept disabled in the event of a loop is detected (and the port

Seite 97 - 3-6.2 VLAN Configuration

178 3-18.2 Status This page displays the loop protection port status the ports of the switch Web Interface To configure the Loop Protection param

Seite 98

179 3-19 Easy Port Easy Port provide a convenient way to Apply and share common configurations. You can use it to enable features and settings based

Seite 99 - 3-6.3 Port Group Filtering

180 (Low) to 7 (High). If you want the voice has high priority then you can set the value with 7.  Port Security : To scroll to enable or disab

Seite 100 - Web Interface

181 3-20 Mirroring You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON

Seite 101

11 2-2 Time This page configure the switch Time. Time configure is including Time Configuration and NTP Configuration 2-2.1 Manual The switch prov

Seite 102 - 3-6.5 Group Infermation

182 Parameter description:  Port to mirror on : Port to mirror also known as the mirror port. Frames from ports that have either source (rx) or des

Seite 103

183 3-21 Trap Event Severity The function, is used to set a Alarm trap and get the Event log. The Trap Events Configuration function is used to enab

Seite 104 - 3-6.6 IPv6 SSM Information

184 3-22 SMTP Configuration The function, is used to set a Alarm trap when the switch alarm then you could set the SMTP server to send you th

Seite 105 - 3-7 MVR

185 3-23 UPnP UPnP is an acronym for Universal Plug and Play. The goals of UPnP are to allow devices to connect seamlessly and to simplify the i

Seite 106

186 Chapter 4. Security This chapter describes all of the switch security configuration tasks to enhance the security of local

Seite 107 - 3-7.2 Groups Information

187 Parameter description:  Mode of IP Source Guard Configuration : Enable the Global IP Source Guard or disable the Global IP Source Guard. All con

Seite 108 - 3-7.3 Statistics

188 4-1.2 Static Table The section describes to configure the Static IP Source Guard Table parameters of the switch. You could use the Static IP Sour

Seite 109 - 3-8 LLDP

189 4-1.3 Dynamic Table The section describes to configure the Dynamic IP Source Guard Table parameters of the switch. You could use the Dy

Seite 110 - LLDP Port Configuration

190 4-2 ARP Inspection The section describes to configure the ARP Inspection parameters of the switch. You could use the ARP Inspection configure to

Seite 111

191 Parameter description:  Mode of ARP Inspection Configuration : Enable the Global ARP Inspection or disable the Global ARP Inspection.  Port M

Seite 112 - 3-8.2 LLDP Neighbours

II The information in this document is subject to change without notice. Unless the explicit written permission of Digital Data Communications Corpo

Seite 113

12 The switch supports valid configurable day light saving time is –5 ~ +5 step one hour. The zero for this parameter means it need not h

Seite 114 - 3-8.3 LLDP-MED Configuration

192 4-2.2 Static Table The section describes to configure the Static ARP Inspection Table parameters of the switch. You could use the Static ARP Insp

Seite 115 - Coordinates Location

193 4-2.3 Dynamic Table The section describes to configure the Dynamic ARP Inspection Table parameters of the switch. The Dynamic ARP Ins

Seite 116 - Civic Address Location

194 4-3 DHCP Snooping The section describes to configure the DHCP Snooping parameters of the switch. The DHCP Snooping can prevent attackers from add

Seite 117 - P) value (IETF RFC 2474)

195 Parameter description:  Snooping Mode : Indicates the DHCP snooping mode operation. Possible modes are: Enabled: Enable DHCP snooping mode oper

Seite 118

196 4-3.2 Statistics The section describes to show the DHCP Snooping Statistics information of the switch. The statistics show only packet counters w

Seite 119

197 The number of lease unknown (option 53 with value 12) packets received and transmitted.  Rx and Tx Lease Active : The number of lease active (o

Seite 120 - 3-8.4 LLDP-MED Neighbours

198 4-4 DHCP Relay The section describes how to forward DHCP requests to another specific DHCP servers via DHCP relay. The DHCP servers may be on ano

Seite 121

199 Disabled: Disable DHCP relay information mode operation.  Relay Information Policy : Indicates the DHCP relay information option policy. When D

Seite 122

200 4-4.2 Statistics The section describes to show the DHCP Relay Statistics information of the switch. The statistics show both of Serv

Seite 123 - 3-8.5 EEE

201  Replace Agent Option : The number of packets which were replaced with relay agent information option.  Keep Agent Option : The number of pac

Seite 124

13 2-2.2 NTP NTP is Network Time Protocol and is used to sync the network time based Greenwich Mean Time (GMT). If use the NTP mode and select a bu

Seite 125 - 3-8.6 Port Statistics

202 4-5 NAS The section describes to configure the NAS parameters of the switch. The NAS server can be employed to connect users to a variety of

Seite 126 - Local Counters

203 Parameter description:  Mode : Indicates if NAS is globally enabled or disabled on the switch. If globally disabled, all ports are allowed forwa

Seite 127 - 3- 9 Filtering Data Base

204  RADIUS-Assigned QoS Enabled : RADIUS-assigned QoS provides a means to centrally control the traffic class to which traffic coming f

Seite 128 - MAC Table Learning

205 following modes are available:  Force Authorized : In this mode, the switch will send one EAPOL Success frame when the port link comes up, and a

Seite 129 - Web Interface

206 secure a supplicant's MAC address once successfully authenticated.  Multi 802.1X : In port-based 802.1X authentication, once a supplicant

Seite 130 - 3-10 VLAN

207 • Single 802.1X RADIUS attributes used in identifying a QoS Class: Refer to the written documentation for a description of the RADIUS attributes

Seite 131

208 Guest VLAN Operation: When a Guest VLAN enabled port's link comes up, the switch starts transmitting EAPOL Request Identity frames. If th

Seite 132 - Web Interface

209 4-5.2 Switch Status The section describes to show the each port NAS status information of the switch.The status includes Admin State Port State,

Seite 133

210  Port VLAN ID : The VLAN ID that NAS has put the port in. The field is blank, if the Port VLAN ID is not overridden by NAS. If the VLAN ID is as

Seite 134

211 4-5.3 Port Status The section describes to provides detailed NAS statistics for a specific switch port running EAPOL-based IEEE 802.1X auth

Seite 135 - 3-10.4 Port Status

14 2-3 Account In this function, only administrator can create, modify or delete the username and password. Administrator can modify other guest i

Seite 136

212 • Port-based 802.1X • Single 802.1X • Multi 802.1X  Backend Server Counters : These backend (RADIUS) frame counters are available

Seite 137 - 3-10.5.1 Port Isolation

213  Last Authentication : Shows the date and time of the last authentication of the client (successful as well as unsuccessful). 

Seite 138 - Web Interface

214 4-6 AAA This section shows you to use an AAA (Authentication, Authorization, Accounting) server to provide access control to your network.

Seite 139

215 Figure 4-5.3.3: The RADIUS Configuration Figure 4-5.3.4: The RADIUS Accounting Configuration Figure 4-5.3.4: The TACACS+ Authentication Co

Seite 140 - 3-10.6.2 Status

216 RADIUS Authentication Server Configuration The table has one row for each RADIUS Authentication Server and a number of columns, which are:  # :

Seite 141 - 3-10.7.1 Protocol to Group

217  Secret : The secret - up to 29 characters long - shared between the TACACS+ Authentication Server and the switch.  Buttons: Ap

Seite 142

218 4-6.2 Radius Overview This section shows you an overview of the RADIUS Authentication and Accounting servers status to ensure the function is wor

Seite 143 - 3-10.7.2 Group to VLAN

219 Ready: The server is enabled, IP communication is up and running, and the RADIUS module is ready to accept accounting attempts. Dead

Seite 144 - 3-11 Voice VLAN

220 4-6.3 Radius Details This section shows you an detailed statistics of the RADIUS Authentication and Accounting servers. The statistics map closel

Seite 145

221 4-7 Port Security This section shows you to to configure the Port Security settings of the Switch. You can use the Port Security feature to

Seite 146 - 3-11.2 OUI

15  Privilege Level : The privilege level of the user. The allowed range is 1 to 15. If the privilege level value is 15, it can acces

Seite 147 - 3-12 GARP

222 Parameter description: System Configuration  Mode : Indicates if Limit Control is globally enabled or disabled on the switch. If globally disabl

Seite 148

223 1) Boot the switch, 2) Disable and re-enable Limit Control on the port or the switch, 3) Click the Reopen button. Trap & Shutdown: If Limit

Seite 149 - 3-12.2 Statistics

224 4-7.2 Switch Status This section shows the Port Security status. Port Security is a module with no direct configuration. Configurat

Seite 150 - 3-13 GVRP

225  Abbr : A one-letter abbreviation of the user module. This is used in the Users column in the port status table.  Port Status : The table ha

Seite 151

226 4-7.3 Port Status This section shows the MAC addresses secured by the Port Security module. Port Security is a module with no direct configuratio

Seite 152 - 3-13.2 Statistics

227 4-8 Access Management This section shows you to configure access management table of the Switch including HTTP/HTTPS, SNMP, and TELNE

Seite 153 - 3-14 QoS

228  HTTP/HTTPS : Indicates that the host can access the switch from HTTP/HTTPS interface if the host IP address matches the IP address range provi

Seite 154

229 4-8.2 Statistics This section shows you a detailed statistics of the Access Management including HTTP, HTTPS, SSH. TELNET, ans SS

Seite 155 - 3-14.2 Port Policing

230 4-9 SSH This section shows you to use SSH (Secure SHell) to securely access the Switch. SSH is a secure communication protocol that combines aut

Seite 156

231 4-10 HTTPs This section shows you how to use HTTPS to securely access the Switch. HTTPS is a secure communication protocol that combines authenti

Seite 157 - 3-14.3 Port Scheduler

16 2-3.2 Privitege Level This page provides an overview of the privilege levels. The switch provides user set Account, Aggregation,Diagnostics,EEE,GA

Seite 158

232 4-11 Auth Method This page shows how to configure a user with authenticated when he logs into the switch via one of the management client interfa

Seite 159

233 Chapter 5. Maintenance This chapter describes all of the switch Maintenance configuration tasks to enhance the performance

Seite 160 - 3-14.4 Port Shaping

234 5-2 Firmware This section describes how to upgrade Firmware. The Switch can be enhanced with more value-added functions by installing

Seite 161

235 5-2.2 Firmware Selection Due to the switch supports Dual image for firmware redundancy purpose. You can select what firmware image for your d

Seite 162

236 NOTE: 1. In case the active firmware image is the alternate image, only the "Active Image" table is shown. In this case, the Activat

Seite 163 - 3-14.5 Port Tag Remarking

237 5-3 Apply / Restore This section describes how to Apply and restore the Switch configuration including reset to Factory Defaults, Apply Start, Ap

Seite 164

238 Apply – Click the “Apply” button to Apply current setting as Start Configuration. 5-3.3 Apply User This section describes how to Apply users info

Seite 165 - 3-14.6 Port DSCP

239 5-4 Export / Import This section describes how to export and import the Switch configuration. Any current configuration files will be

Seite 166

240 5-4.2 Import Config This section describes to export the Swith Configuration for maintenance needs. Any current configuration files will be expor

Seite 167 - 3-14.7 DSCP-Based QoS

241 5-5 Diagnostics This section provides a set of basic system diagnosis. It let users know that whether the system is health or need

Seite 168

17 Parameter description:  Group Name The name identifying the privilege group. In most cases, a privilege level group consists of a single mod

Seite 169 - 3-14.8 DSCP Translation

242 5-5.2 Ping6 This section allows you to issue ICMPv6 PING packets to troubleshoot IPv6 connectivity issues. Web Interface To configu

Seite 170

243 5-5.3 VeriPHY This section is used for running the VeriPHY Cable Diagnostics. Press to run the diagnostics. This will take approximately 5 second

Seite 171 - 3-14.9 DSCP Classification

A. Glossary of Web-based Management A ACE ACE is an acronym for Access Control Entry. It describes access permission associated with a particula

Seite 172

245 (Also Port Aggregation, Link Aggregation). ARP ARP is an acronym for Address Resolution Protocol. It is a protocol that used to convert an IP ad

Seite 173 - : Edits the QCE

246 Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather than requiring an administrator to ma

Seite 174

247 EPS EPS is an abbreviation for Ethernet Protection Switching defined in ITU/T G.8031. Ethernet Type Ethernet Type, or EtherType, is a field in

Seite 175 - 3-14.11 QCL Status

248 ICMP is an acronym for Internet Control Message Protocol. It is a protocol that generated the error response, diagnostic or routing purposes. ICMP

Seite 176

249 IP Source Guard is a secure feature used to restrict IP traffic on DHCP snooping untrusted ports by filtering traffic based on the DHCP Snooping T

Seite 177 - 3-14.12 Storm Control

250 MEP MEP is an acronym for Maintenance Entity Endpoint and is an endpoint in a Maintenance Entity Group (ITU-T Y.1731). MD5 MD5 is an acronym f

Seite 178 - 3-14.13 WRED

251 O OAM OAM is an acronym for Operation Administration and Maintenance. It is a protocol described in ITU-T Y.1731 used to implement carrier eth

Seite 179

18 2-4 IP IP is an acronym for Internet Protocol. It is a protocol used for communicating data across an internet network. IP is a "best effort

Seite 180 - 3-15 s-Flow Agent

252 POP3 POP3 is an acronym for Post Office Protocol version 3. It is a protocol for email clients to retrieve email messages from a mail server. P

Seite 181

253 R RARP RARP is an acronym for Reverse Address Resolution Protocol. It is a protocol that is used to obtain an IP address for a given hardware a

Seite 182 - 3-15.2 Sampler

254 SSID Service Set Identifier is a name used to identify the particular 802.11 wireless LANs to which a user wants to attach. A client device will

Seite 183

255 TELNET TELNET is an acronym for TELetype NETwork. It is a terminal emulation protocol that uses the Transmission Control Protocol (TCP) and provi

Seite 184 - 3-18 Loop Protection

256 VLAN ID VLAN ID is a 12-bit field specifying the VLAN to which the frame belongs. Voice VLAN Voice VLAN is VLAN configured specially for voice

Seite 185

19 Parameter description:  DHCP Client : Enable the DHCP client by checking this box. If DHCP fails and the configured IP address is zero, DHCP wi

Seite 186 - 3-18.2 Status

20 2-4.2 IPV6 This section describes how to configure the switch-managed IPv6 information. The Configured column is used to view or change

Seite 187 - 3-19 Easy Port

21 2-5 Syslog The Syslog is a standard for logging program messages . It allows separation of the software that generates messages from the system t

Seite 188

III operation, design, performance or implementation of the Software and related documentation that is confidential to LevelOne to any t

Seite 189 - 3-20 Mirroring

22 2-5.2 Log This section describes that display the system log information of the switch Web Interface To display the log configuration in the web

Seite 190 - Mirror Port Configuration

23 2-5.3 Detailed Log This section describes that display the detailed log information of the switch Web Interface To display the detailed log conf

Seite 191 - 3-21 Trap Event Severity

24 2-6 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped

Seite 192

25 2-6.2 Communities The function is used to configure SNMPv3 communities. The Community and UserName is unique. To create a new community account,

Seite 193 - 3-23 UPnP

26 2-6.3 Users The function is used to configure SNMPv3 user. The Entry index key is UserName. To create a new UserName account, please check &

Seite 194 - Security

27 None: No authentication protocol. MD5: An optional flag to indicate that this user uses MD5 authentication protocol. SHA: An optiona

Seite 195

28 2-6.4 Groups The function is used to configure SNMPv3 group. The Entry index key are Security Model and Security Name. To create a new group accou

Seite 196 - 4-1.2 Static Table

29 2-6.5 Views The function is used to configure SNMPv3 view. The Entry index key are OID Subtree and View Name. To create a new view account, pleas

Seite 197 - 4-1.3 Dynamic Table

30  OID Subtree The OID defining the root of the subtree to add to the named view. The allowed OID length is 1 to 128. The allowed string

Seite 198 - 4-2 ARP Inspection

31 2-6.6 Access The function is used to configure SNMPv3 accesses. The Entry index key are Group Name, Security Model and Security level. To create a

Seite 199

IV Table of Contents INTRODUCTION ...

Seite 200 - 4-2.2 Static Table

32 NoAuth, NoPriv: No authentication and no privacy. Auth, NoPriv: Authentication and no privacy. Auth, Priv: Authentication and privacy.  Read V

Seite 201 - 4-2.3 Dynamic Table

33 2-6.7 Tarp The function is used to configure SNMP trap. To create a new trap account, please check <No number> button, and enter the trap in

Seite 202 - 4-3 DHCP Snooping

34  Community / Security Name: The length of “Community / Security Name” string is restricted to 1-32.  Security Level: Indicates what kind of me

Seite 203

35 Chapter 3. Configuration This chapter describes all of the basic network configuration tasks which includes the Ports, Layer 2 networ

Seite 204 - 4-3.2 Statistics

36 Parameter description:  Port : This is the logical port number for this row.  Link : The current link state is displayed graphically. Green i

Seite 205

37 3-1.2 Port Description The section describes to configure the Port’s alias or any descriptions for the Port Identity. It provides user to writ

Seite 206 - 4-4 DHCP Relay

38 3-1.3 Traffic Overview The section describes to the Port statistics information and provides overview of general traffic statistics for all swi

Seite 207

39 3-1.4 Detailed Statistics The section describes how to provide detailed traffic statistics for a specific switch port. Use the port select box

Seite 208 - Client Statistics

40 The number of received and transmitted (good and bad) multicast packets.  Rx and Tx Broadcast : The number of received and transmitted (good and

Seite 209

41 3-1.5 Qos Statistics The section describes that switch could display the QoS detailed Queuing counters for a specific switch port.

Seite 210 - 4-5 NAS

V 3-4.3 MSTI Priorities ... 66

Seite 211

42 3-1.6 SFP Information The section describes that switch could display the SFP module detail information which you connect it to the switch.

Seite 212

43 Display the module revision.  Vendor SN (Serial Number): Show the serial number assigned by the manufacturer.  Date Code: Show the date this SF

Seite 213

44 3-2 ACL The GTL-5280 switch access control list (ACL) is probably the most commonly used object in the IOS. It is used for packet filtering but al

Seite 214

45 Parameter description:  Port : The logical port for the settings contained in the same row.  Policy ID : Select the policy to apply to t

Seite 215

46 3-2.2 Rate Limiters The section describes how to configure the switch’s ACL Rate Limiter parameters. The Rate Limiter Level from 1 to 16 that allo

Seite 216

47 3-2.3 Access Control List The section describes how to configure Access Control List rule. An Access Control List (ACL) is a sequential list of pe

Seite 217 - 4-5.2 Switch Status

48 Parameter description:  Ingress Port : Indicates the ingress port of the ACE. Possible values are: Any: The ACE will match any ingress port. Po

Seite 218

49 : Inserts a new ACE before the current row. : Edits the ACE row. : Moves the ACE up the list. : Moves the ACE down the list. : Deletes the ACE.

Seite 219 - Port Counters

50 3-2.4 ACL Status The section describes how to shows the ACL status by different ACL users. Each row describes the ACE that is d

Seite 220 - VLAN ID

51  Mirror : Specify the mirror operation of this port. The allowed values are: Enabled: Frames received on the port are mirrored. Disabled: Frame

Seite 221

VI 3-14.9 DSCP Classification ... 163 3-14

Seite 222 - 1. Check “Enabled”

52 3-3 Aggregation The Aggregation is used to configure the settings of Link Aggregation. You can bundle more than one port with the same speed, full

Seite 223

53 Parameter description: Hash Code Contributors  Source MAC Address : The Source MAC address can be used to calculate the destination port for the

Seite 224

54 3-3.2 LACP Ports using Link Aggregation Control Protocol (according to IEEE 802.3ad specification) as their trunking method can choose their u

Seite 225

55 Parameter description:  Port : The switch port number.  LACP Enabled : Controls whether LACP is enabled on this switch port. LACP

Seite 226 - RADIUS Accounting Servers

56 3-3.2.2 System Status This section describes that when you complete to set LACP function on the switch then it provides a status over

Seite 227

57 3-3.2.3 Port Status This section describes that when you complete to set LACP function on the switch then it provides a Port Status o

Seite 228 - 4-6.3 Radius Details

58 Parameter description:  Port : The switch port number.  LACP : 'Yes' means that LACP is enabled and the port link is up. 'No&ap

Seite 229 - 4-7 Port Security

59 3-3.2.4 Port Statistics This section describes that when you complete to set LACP function on the switch then it provides a Port Statistic

Seite 230 - Port Configuration

60  LACP Received : Shows how many LACP frames have been received at each port.  LACP Transmitted : Shows how many LACP frames have been sent fro

Seite 231

61 3-4 Spanning Tree The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between switches,

Seite 232 - 4-7.2 Switch Status

VII 5-5 DIAGNOSTICS ...

Seite 233

62 Figure 3-4.1: The STP Bridge Configuration Parameter description: Basic Settings  Protocol Version : The STP protocol version setting. Valid

Seite 234 - 4-7.3 Port Status

63 Advanced Settings  Edge Port BPDU Filtering : Control whether a port explicitly configured as Edge will transmit and receive BPDUs.

Seite 235 - 4-8 Access Management

64 2-4.2 MSTI Mapping When you implement an Spanning Tree protocol on the switch that the bridge instance. The CIST is not available for explicit map

Seite 236

65 MSTI Mapping  MSTI : The bridge instance. The CIST is not available for explicit mapping, as it will receive the VLANs not explici

Seite 237 - 4-8.2 Statistics

66 3-4.3 MSTI Priorities When you implement an Spanning Tree protocol on the switch that the bridge instance. The CIST is the default instance whi

Seite 238 - 4-9 SSH

67 3-4.4 CIST Ports When you implement an Spanning Tree protocol on the switch that the bridge instance. You need to configure the CIST Ports. The se

Seite 239 - 4-10 HTTPs

68 path cost ports are chosen as forwarding ports in favour of higher path cost ports. Valid values are in the range 1 to 200000000. 

Seite 240 - 4-11 Auth Method

69 3-4.5 MSTI Ports The section describes it allows the user to inspect the current STP MSTI port configurations, and possibly change them as well. A

Seite 241 - Maintenance

70  Port : The switch port number of the corresponding STP CIST (and MSTI) port.  Path Cost : Controls the path cost incurred by the port. The Au

Seite 242 - 5-2.1 Firmware Upgrade

71 3-4.6 Bridge Status After you complete the MSTI Port configuration the you could to ask the switch display the Bridge Status. The Section provides

Seite 244

72 3-4.7 Port Status After you complete the STP configuration the you could to ask the switch display the STP Port Status. The Section provides y

Seite 245 - 5-3 Apply / Restore

73 Parameter description:  Port : The switch port number of the logical STP port.  CIST Role : The current STP port role of the CIST port. The p

Seite 246

74 3-4.8 Port Statistics After you complete the STP configuration then you could to let the switch display the STP Statistics. The Section provi

Seite 247 - 5-4.1 Export Config

75 3-5 IGMP Snooping The function, is used to establish the multicast groups to forward the multicast packet to the member ports, and, in nature, av

Seite 248 - 5-4.2 Import Config

76 Parameter description:  Snooping Enabled: Enable the Global IGMP Snooping.  Unregistered IPMCv4 Flooding enabled : Enable unregistered IPMCv

Seite 249 - 5-5 Diagnostics

77 3-5.2 VLAN Configuration The section describes the VLAN configuration setting process integrated with IGMP Snooping function. For Each setting pag

Seite 250 - 5-5.2 Ping6

78 Query Response Interval. The Max Response Time used to calculate the Max Resp Code inserted into the periodic General Queries. The allowed range i

Seite 251 - 5-5.3 VeriPHY

79 3-5.3 Port Group Filtering The section describes how to set the IGMP Port Group Filtering? With the IGMP filtering feature, an user

Seite 252

80  Port : To evoke the port enable the IGMP Snooping Port Group Filtering function.  Filtering Groups : The IP Multicast Group that will be fil

Seite 253

81 3-5.4 Status After you complete the IGMP Snooping configuration, then you could to let the switch display the IGMP Snooping Status. The Secti

Seite 254

1 INTRODUCTION Overview In this user’s manual, it will not only tell you how to install and connect your network system but con

Seite 255

82 The number of Transmitted Queries.  Queries Received : The number of Received Queries.  V1 Reports Received : The number of Received V1 Repor

Seite 256

83 3-5.5 Group Infermation After you complete to set the IGMP Snooping function then you could let the switch to display the IGMP Snooping Group Info

Seite 257

84 3-5.6 IPv4 SSM information Source Specific Multicast (SSM) is a datagram delivery model that best supports one-to-many applications, also known as

Seite 258

85 VLAN ID of the group.  Group : Group address of the group displayed.  Port : Switch port number.  Mode : Indicates the filtering mode main

Seite 259

86 3-6 MLD Snooping Curiously enough, a network node that acts as a source of IPv6 multicast traffic is only an indirect participant in MLD snoo

Seite 260

87 Parameter description:  Snooping Enabled : Enable the Global MLD Snooping.  Unregistered IPMCv6 Flooding enabled : Enable unregistered IPM

Seite 261

88 To evoke to enable the fast leave on the port.  Router Port : Specify which ports act as router ports. A router port is a port on the Ethernet s

Seite 262

89 3-6.2 VLAN Configuration When MLD snooping is enabled on a VLAN, the switch acts to minimize unnecessary multicast traffic. If the sw

Seite 263

90 Last Listener Query Interval. The Last Listener Query Interval is the Maximum Response Delay used to calculate the Maximum Response Code in

Seite 264 - Voice VLAN

91 3-6.3 Port Group Filtering The section describes that you could to set the Port Group Filtering in the MLD Snooping function. On the UI

Kommentare zu diesen Handbüchern

Keine Kommentare