eBay SL-SWTGW218AS Smart Web Switch Instruction Manual

SL-SWTGW218AS Smart Web Switch

Specifications

  • Product Name: Smart-Web Switch
  • Model Number: SL-SWTGW218AS
  • Version: Ver. 1.0

Product Information

The Smart-Web Switch SL-SWTGW218AS is designed for network
installation, configuration, and maintenance. It is suitable for
system administrators and installers familiar with network
communication protocols and management.

Product Usage Instructions

Foreword

This manual assumes the user has knowledge of network
communication, management protocols, technical terms, and practical
skills related to networking.

Manual Convention

The manual provides descriptions and cautions to prevent data
loss or equipment damage due to improper operations.

Web Page Login

2.1 Log in the Network Management Client

To log in, type the default switch address: http://192.168.2.1
in a browser (compatible with IE 9.0, Chrome 23.0, Firefox 20.0).
Ensure PC’s IP address is in the same network segment as the switch
(192.168.2.x) with subnet mask 255.255.255.0 for the first login.
Use admin as the default username and password.

2.2 Constitution of Client Interface

The client interface features a typical Web network management
system layout.

2.3 Navigation Bar on Web Interface

The navigation bar includes menu items like System,
Configuration, Security, Monitoring, and Tools with respective
submenus for easy access to different settings.

FAQ

Q: What should I do if I forget my login credentials?

A: If you forget your login credentials, you may need to reset
the switch to factory settings to regain access using default
credentials.

“`

Smart-Web Switch
SL-SWTGW218AS
Tech Suppor t : Sodol a- Net wor ki ng@out l ook. com
Web Manual
Ver. 1.0
1

Revision history

Date

Version Description

Aug. 3, 2024 V 1.0

The first edition

2

Contents
Smart-Web Switch …………………………………………………………………………………………………………………….1 SL-SWTGW218AS …………………………………………………………………………………………………………………1
Web Manual ……………………………………………………………………………………………………………………………….1 Ver. 1.0 …………………………………………………………………………………………………………………………………… 1 Contents ……………………………………………………………………………………………………………………………………..
31 Foreword………………………………………………………………………………………………………………………………… 5
1.1 Target Audience ………………………………………………………………………………………………………………5 1.2 Manual Convention ……………………………………………………………………………………………………….. 5 2 Web Page Login ……………………………………………………………………………………………………………………..5 2.1 Log in the Network Management Client…………………………………………………………………….. 5 2.2 Constitution of Client Interface……………………………………………………………………………………..6 2.3 Navigation Bar on Web Interface ………………………………………………………………………………….6 3 System ……………………………………………………………………………………………………………………………………..8 3.1 Information ……………………………………………………………………………………………………………………… 8 3.2 IP Setting…………………………………………………………………………………………………………………………. 8 3.3 User Account ……………………………………………………………………………………………………………………9 3.4 Port Setting………………………………………………………………………………………………………………………9 4 Configuration ………………………………………………………………………………………………………………………..10 4.1 VLAN……………………………………………………………………………………………………………………………… 10
4.1.1 802.1Q VLAN………………………………………………………………………………………………………….11 4.1.2 802.1Q VID …………………………………………………………………………………………………………….. 12 4.2 QOS ……………………………………………………………………………………………………………………………….. 13 4.2.1 Port to Queue…………………………………………………………………………………………………………15 4.2.2 Queue Weight ………………………………………………………………………………………………………..15 4.3 Loop………………………………………………………………………………………………………………………………..16 4.3.1 Loop detection/loop prevention ………………………………………………………………………….16 4.3.2 STP global ……………………………………………………………………………………………………………….17 4.3.3 STP port …………………………………………………………………………………………………………………..18 4.4 IGMP Snooping……………………………………………………………………………………………………………..19
3

4.5 Trunk Group Setting……………………………………………………………………………………………………..20 4.5.1 static ……………………………………………………………………………………………………………………….. 20 4.5.2 LACP ……………………………………………………………………………………………………………………….. 21
4.6 Port-based Mirroring……………………………………………………………………………………………………23 4.7 Port Isolation ………………………………………………………………………………………………………………….24 4.8 Bandwidth Control ………………………………………………………………………………………………………..24 4.9 Jumbo Frame …………………………………………………………………………………………………………………25 4.10 MAC Constraint ………………………………………………………………………………………………………….. 26 4.11 EEE ……………………………………………………………………………………………………………………………….. 26 5 Security …………………………………………………………………………………………………………………………………. 26 5.1 MAC Address …………………………………………………………………………………………………………………26
5.1.1 MAC Search …………………………………………………………………………………………………………… 27 5.1.2 Static MAC………………………………………………………………………………………………………………28 5.2 Storm Control ………………………………………………………………………………………………………………..28 6 Monitoring…………………………………………………………………………………………………………………………….29 6.1 Port Statistics ………………………………………………………………………………………………………………… 29 7 Tools ……………………………………………………………………………………………………………………………………… 30 7.1 Firmware Upgrade ……………………………………………………………………………………………………….. 30 7.2 Configuration Backup………………………………………………………………………………………………….. 30 7.3 Reset ……………………………………………………………………………………………………………………………….31 7.4 Save ……………………………………………………………………………………………………………………………….. 31 7.5 Reboot …………………………………………………………………………………………………………………………… 31 7.5 Logout …………………………………………………………………………………………………………………………….32
4

1 Foreword
1.1 Target Audience
This manual is prepared for the installers and system administrators who are responsible for network installation, configuration and maintenance. It assumes that the user has understood all network communication and management protocols, as well as the technical terms, theoretical principles, practical skills, and expertise of devices, protocols and interfaces related to networking.

1.2 Manual Convention

The following approaches should prevail.

GUI Convention Interpretation
Notice

Description Describe operations and add necessary information. Remind the user of cautions as improper operations will result in data loss or equipment damage.

2 Web Page Login
2.1 Log in the Network Management Client
Type in the default switch address: http://192.168.2.1 and press “Enter”.
Description: Browser standards: superior to IE 9.0, Chrome 23.0 and Firefox 20.0 Keep the IP network segment of PC consistent with that of switch but differentiate the IP address as you log in. Set PC’s IP address of 192.168.2.x and the subnet mask of 255.255.255.0 for the first login (1< x 254).
A login window appears as follows. Type in the default username of “admin” and the password of “admin”. Click the “Log in” to see the switch system.
5

2.2 Constitution of Client Interface
The typical operation interface of Web network management system is as follows.

2.3 Navigation Bar on Web Interface

Menu items such as System, Configuration, Security, Monitoring, and Tools are available on the web network management client. Each item contains submenus. Navigation bar is detailed as follows:

Menu Items Submenus

Secondary Submenus Description

System

Information

Display the port state and

6

IP Setting

User Account

Port Setting

Configuratio VLAN n

802.1Q VLAN 802.1Q VID

QOS

Port to Queue

Queue Weight

Loop

Loop Protocol

STP global

STP port

IGMP Snooping

Trunk Group Setting static

LACP

Port-based Mirroring

Port Isolation

Bandwidth Control

Jumbo Frame

MAC Constraint

Security

EEE MAC Address

MAC Search

Static MAC

7

product info
Configure and view the management IP address Configure and view the management account Configure and view all ports Configure and view the VLAN Configure and view the PVID of port Configure and view the Port to Queue Configure and view Queue Weight Configure and view Loop Protocol Configure and view STP global Configure and view STP port Configure viewing IGMP Snooping information Configure and view Trunk Group Setting information Configure and view LACP Group Setting Configure and view the Port-based Mirroring Configure and view the Port Isolation Configure and view the Bandwidth Contro Configure and view the Jumbo Frame Configure and view MAC Constraint Configure and view EEE
Display the mac address table Configure and view Static

Storm Control

Monitoring
Tools

Port Statistics Firmware Upgrade Configuration Backup

Reset Save Reboot Logout

MAC

Configure and view Storm Control

Display Port Data Statistics

Save configuration

Save

and

Configuration

Restore

Factory reset

Save Configuration

Restart system

Exit the system

3 System
3.1 Information
Display system information, including model, version, MAC, etc. Instructions: 1. Click the “System > Information” in the navigation bar as follows:

3.2 IP Setting
Change the management IP address on web interface 1. Click the “System > IP Setting” in the navigation bar as follows:
8

Interface data are as follows.

Query Items

Description

DHCP Setting

Enable: Enable DHCP client in system Disable: Disable DHCP client

IP Address

Manager IP address

Netmask

Manager IP mask

Gateway

Manager IP default gateway

3.3 User Account
Users can check and modify the current username and password of the switch. Instructions: 1. Click the “System > User Account” in the navigation bar as follows:

Interface data are as follows.

Query Items

Description

New Username

New Username

New Password

New Password

Confirm Password Enter the new user name again

3.4 Port Setting
Querying and configuring Ethernet ports. Instructions:
9

1. Click the “System > Port Setting” in the navigation bar as follows:

Interface data are as follows.

Query Items

Description

State

Enable or disable port

Speed/Duplex Configure the rate and negotiation status of the port. You can

configure the forced 10M/Half, 10M/Full, 100M/Half,100M/Full

1000M/Full , 2500M/Full

Flow Control

After it is enabled on both local network and opposite network

devices, the local one will notify the other to stop transmitting messages in the presence of network congestion. The opposite one will execute the command temporarily to ensure zero

message loss.

Off-Disabled reception and transmission of PAUSE frame; On-Enabled reception and transmission of PAUSE frame;

4 Configuration
4.1 VLAN
VLAN is formulated not restricted to physical locations, which means the hosts in a same VLAN can be placed at will. As shown below, each VLAN, as a broadcast domain, divides a physical LAN into logical LANs. Hosts can exchange messages by means of
10

traditional communication. For the hosts in different VLANs, the device such as router or L3 switch is a must.
VLAN is superior to the traditional Ethernet in terms of: Broadcast domain coverage: the broadcast message in a LAN is limited in a VLAN to
save the bandwidth and handle the network-related issues more efficiently. LAN security: VLAN hosts fail to communicate with each other since the messages
are separated by the broadcast domain in the data link layer. They need a router or a Layer 3 switch for Layer 3 forwarding. Flexibility of creating a virtual working team: VLAN can create a virtual working team beyond the control of physical network. Users have access to the network without changing the configuration if their physical locations are moving within the scope. This management switch is compatible with VLAN types based on 802.1Q, protocols, MAC, and ports. For default configuration, 802.1Q VLAN mode should be adopted. Port VLAN is divided subject to a switch’s interface No. Network administrator gives each switch interface a different PVID, namely a port default VLAN. If a data frame without a VLAN tag flows into a switch interface with a PVID, it will be marked with the same PVID, or it will get rid of an additional tag even though the interface has a PVID. The solution to a VLAN frame depends on the interface type, which eases member definition but re-configures VLAN in case of member mobility.
4.1.1 802.1Q VLAN 1. Click the “Configuration > VLAN > 802.1Q VLAN”, in the navigation bar as follows:
11

Interface data are as follows

Configuration Items

Description

VLAN ID

It is required to select an ID ranging from 1 to 4,094

VLAN Name

It is optional to modify the VLAN description as required.

Note: VLAN 1 is the system default VLAN and does not support deletion

4.1.2 802.1Q VID 1. Click the “Configuration > VLAN >802.1Q VID”, in the navigation bar as follows:

Interface data are as follows

Configuration Items

Description

PVID

Set the port PVID

Accepted Frame Type Set the port receive frame type

12

4.2 QOS
QoS (Quality of Service) assesses the ability of service providers to meet customer needs and the ability of transmitting packets over the Internet. Diversified services can be assessed based on different aspects. QoS usually refers to the evaluation of service capabilities that support core requirements such as bandwidth, delay, delay variation, and packet loss rate during delivery. Bandwidth, also known as throughput, refers to the average business flow within a certain period of time, with the unit of Kbit/s. Delay refers to the average time required for business flowing through the network. For a network device, the followings are general levels of delay requirements. There are two delay levels, that is, the high-priority business can be served as soon as possible by scheduling method of priority queue, while the low-priority business gets services after that. Delay variation refers to the time change of business flowing through the network. Packet loss rate refers to the percentage of lost business flow during transmission. As modern transmission systems are very reliable, information is often lost in network congestion. Packet loss due to queue overflow is the most common situation.
All messages in a traditional IP network are treated equally. Every network device processes the messages on a FIFO basis, and makes every effort to transmit them to destinations without guaranteeing reliability, transfer delay, or other performance.
Network service quality is constantly improved as new applications keep springing up in the rapidly changing IP network. For example, VoIP, video and other delay-sensitive services have set higher standards on message transmission delay. Message transmission in a short period has been the common trend. In order to support voice, video and data services with different requirements, the network needs to identify business types and provide corresponding services.
The ability to distinguish business types is the prerequisite to provide corresponding services, so the traditional best-effort service no longer meets the application needs. Therefore, QoS comes into being. It regulates the network flow to avoid and handle network congestion and reduce packet loss rate. Meanwhile, users can enjoy dedicated bandwidths while business can improve service quality, thus perfecting the network service capacity.
QoS priorities vary with message types. For instance, the VLAN message uses 802.1p, also known as the CoS (Class of Service) field, while the IP message uses DSCP. To maintain the priority, these fields need to be mapped at the gateway connected with various networks when messages flow through the network. 802.1p priority in the VLAN frame header
Typically, VLAN frames are interacted between Layer 2 devices. The PRI field (i.e. 802.1p priority), or CoS field, in the VLAN frame header identifies the quality of service requirements according to the definitions in IEEE 802.1Q. 802.1p priority in the VLAN frame
13

The 802.1Q header contains 3-bit PRI fields. PRI field defines 8 CoS of business priority ranging from 7 to 0 from high to low. IP Precedence/DSCP Field
According to RFC791 definition, ToS (Type of Service) domain in the IP message header is composed of 8 bits. Among them, the 3-bit long Precedence field, as located in the following, identifies the IP message priority. IP Precedence/DSCP Field
0 to 2 bits are Precedence fields representing the 8 priorities of message transmission ranging from 7 to 0 from high to low, with either Level 7 or 6 as the highest priority that is generally reserved for routing or updating network control communication. User-level applications only have access to Level 0 to 5.
ToS domain, in addition to Precedence fields, also includes D, T and R bits: D-bit represents the Delay requirement (0 for normal delay and 1 for low delay). T-bit represents the throughput (0 for normal throughput and 1 for high throughput). R-bit represents the reliability (0 for normal reliability and 1 for high reliability). ToS domain reserves the 6 and 7 bits.
RFC1349 redefines the ToS domain by adding a C-bit to represent the Monetary Cost. The IETF DiffServ group then redefines the 0 to 5 bits of ToS domain in the IPv4 message header of RFC2474 as DSCP and renames it as DS (Differentiated Service) byte as shown in the figure above.
The first 6 bits (0-5 bits) of DS field distinguish the DSCP (DS Code Point), and the higher 2 bits (6-7 bits) are reserved. The lower 3 bits (0-2 bits) are CSCP (Class Selector Code Point), with the same CSCP value representing the DSCP of the same class. DS nodes select corresponding PHB (Per-Hop Behavior) according to DSCP values.
14

4.2.1 Port to Queue
Sets processing priorities for different tags of the data frame 1. Click the “Configuration > QOS > Port to Queue”, in the navigation bar as follows:

Interface data are as follows

Configuration Items

Description

Queue

1-8

4.2.2 Queue Weight
When the weight is strict priority, it is equivalent to SP, and when the weight is 1-15, it is equivalent to WRR (weighted cyclic Scheduling algorithm). 1. Click the “Configuration > QOS >Queue Weight”, in the navigation bar as follows:

15

Interface data are as follows.

Configuration Items Description

Weight

The default value is strict priority. The weight ranges from 1 to 15

4.3 Loop
4.3.1 Loop detection/loop prevention
The device sends loop detection packets and checks whether the packets are returned to the device (the receiving and sending interfaces are not required to be the same) to check whether loops exist. If a port receives a loop detection packet from the local device, it is determined that the link to which the port resides has a loop. When a loop occurs on the network, the LED of the corresponding port blinks (blocking the loop when loop avoidance is enabled) to alert the network administrator that a loop exists on the port
Instructions: 1. Click the “Configuration >Loop> Loop Protocol”, in the navigation bar as follows:

16

Interface data are as follows.

Configuration Items

Description

Loop Protocol

off, loop detection, loop Prevention, Spanning tree

4.3.2 STP global
Fast spanning tree protocol (RSTP) is used to eliminate the physical loop of data link layer in LAN. Its core is fast spanning tree algorithm. RSTP is fully downward compatible with STP protocol. In addition to the functions of avoiding loops and dynamically managing redundant links like the traditional STP protocol, RSTP greatly shortens the topology convergence time. Under the ideal network topology scale, all switching devices support RSTP protocol, and when configured properly, the time to restore stability after topology changes (link up / down) can be controlled at the second level. The main functions of RSTP can be summarized as follows
1 Discover and generate an optimal tree topology of LAN 2 Discover and recover the topology failure, automatically update the network topology, enable the backup link, and maintain the best tree structure Instructions: 1. Click the “Configuration>Loop >STP global”, in the navigation bar as follows:

17

Interface data are as follows.

Configuration Items

Description

Force Version

Configure view STP mode

Maximum Age

Configure view maximum age time

Hello Time

Configure view Hello time

Forward Delay

Configure and view forwarding delay time

4.3.3 STP port
Instructions: 1. Click the “Configuration >Loop>STP port”, in the navigation bar as follows:

Interface data are as follows.

Configuration Items

Description

Path Cost

Configure view port path Cost

Priority

Configure view port priority

P2P

Configure and view P2P

Edge

Configure view edge ports

18

4.4 IGMP Snooping
IGMP Snooping (Internet Group Management Protocol Snooping) is a constraint mechanism on L2 devices to manage and control multicast groups. By analyzing the IGMP messages received, L2 devices establish a mapping between ports and MAC multicast addresses and forward the multicast data accordingly. As shown below, multicast data are transmitted on L2 without IGMP snooping. When IGMP snooping runs, known multicast group data are transmitted to specified receivers while unknown multicast data are still on Layer 2.

Instructions: 1. Click the “Configuration > IGMP”, in the navigation bar as follows:

Interface data are as follows.

Configuration Items Description

Enable

Enable or disable the IGMP Snooping

Dump IGMP entry

Display multicast group entries

19

4.5 Trunk Group Setting
4.5.1 static Link Aggregation broadens bandwidth and reliability by bundling a group of
physical interfaces into a single logical interface. LAG (Link Aggregation Group) is a logical link bundled by multiple Ethernet links (Eth-Trunk).
Ceaselessly expanding network size increases users’ demands of link bandwidth and reliability. Traditionally, high-speed interface board or the compatible equipment is usually replaced to optimize bandwidth, which is expensive and inflexible. Link Aggregation Technology bundles multiple physical interfaces into a single logical interface without upgrading hardware. Its backup mechanism not only improves reliability, but also shares the flow load on different physical links.
As shown below, Switch A is linked with Switch B through three Ethernet links which are bundled into an Eth-Trunk logical link. Its bandwidth equals to that of the three links in total, thus broadening the bandwidth. Meanwhile, these three links back up mutually to be more reliable.
When there are the following requirements, link aggregation can be configured to achieve: When the bandwidth between two switch devices connected through a link is
20

insufficient.
When the reliability of connecting two switch devices through a link does not meet the requirements.
Link aggregation is divided into static mode and LACP mode based on whether the Link Aggregation Control Protocol (LACP) is enabled or not. In static mode, the establishment of Eth Trunk and the addition of member interfaces are manually configured without the involvement of link aggregation control protocols. In this mode, all active links participate in data forwarding and evenly share traffic, hence it is called load sharing mode. If an active link fails, the link aggregation group automatically shares the traffic equally among the remaining active links. When it is necessary to provide a larger link bandwidth between two directly connected devices and the devices do not support the LACP protocol, static mode can be used.
Instructions: 1. Click the “Configuration > Trunk Group Setting”, in the navigation bar as follows:

Interface data are as follows

Configuration Items

Description

Group ID

There are 2 LAGs numbering from 1 to 2.

Ports

Up to 4 member ports are available in LAG.

4.5.2 LACP
LACP (Link Aggregation Control Protocol), based on IEEE 802.3ad Standard, dynamically aggregates and disaggregates links. It exchanges info with the opposite network devices through LACPDU (Link Aggregation Control Protocol Data Unit). After a port uses LACP, it will inform the opposite network device of system priority, system MAC, port priority and No., and operation Key by transmitting a LACPDU. The opposite device will compare such info with that saved by other ports after receiving it,
21

thus reaching an agreement on port participation in or quitting from a dynamic aggregation.
Dynamic LACP aggregation is automatically created or deleted by system, that is, internal ports can be added or removed by themselves. Only the ports connected to a same device with the same rate, duplex, and basic configuration can be aggregated. Instructions for adding a dynamic link aggregation:
1. Click the “Configuration > Trunk Group Setting” in the navigation bar, select the LAG ID and LACP mode, “Edit” them as follows:

2. Click the “Configuration > Trunk Group Setting” Select LACP, select two ports to add as one LACP group

Interface data are as follows

Configuration

Description

Items

Type

Static mode: When it is necessary to increase the bandwidth or

reliability between two devices, and one of the devices does not

support the LACP protocol, a static link aggregation can be created

on the device and multiple member interfaces can be added to

increase the bandwidth and reliability between the devices.

System Priority

LACP mode: In dynamic LACP mode, the link between two devices has the ability of redundant backup. When some links fail, the backup link is used to replace the faulty link, maintaining uninterrupted data transmission.
LACP determines the active and passive modes between two devices subject to priority standard.

22

Port Port Priority
Timeout

Port list
LACP determines the dynamic LAG member mode subject to the port priority with a superior system. It decides the transmission frequency of LACP messages.

Description:
Please make sure there is no member interface accessing the Eth-Trunk before changing its work pattern, otherwise it fails.

4.6 Port-based Mirroring
Port Mirroring copies the message of a specified switch port to the destination port. The copied port is the Source Port, and the copying port is the Destination Port. Destination Port accesses to data inspection devices so that users can analyze the messages received to monitor network and troubleshoot as follows:

Instructions: 1. Click the “Configuration > Port-based Mirroring”, in the navigation bar as follows:
Interface data are as follows 23

Configuration Items Mirror Direction Mirroring Port
Mirrored Port List

Description
Enable or disable port mirroring, support Rx, Tx, and Both
Only one ordinary physical port can be selected, excluding link aggregation port and source port. List of mirrored source ports

4.7 Port Isolation
Messages of broadcast, multicast, etc. will flood at each port even though the flow needs no mutual communication sometimes. Under this circumstance, port isolation can separate the messages between two ports. Instructions: 1. Click the “Configuration > Port Isolation”, in the navigation bar as follows:

Interface data are as follows

Configuration Items

Description

Port

Port list

Port Isolation List

Establish the member list of interworking group

4.8 Bandwidth Control
It refers to the rate restriction on transmitting and receiving data at physical interfaces.
Restrict the rate limiting at the egress before transmitting flow, thus controlling all outgoing message flow;
Restrict the rate limiting at the ingress before receiving flow, thus controlling all incoming message flow;

24

Instructions: 1. Click the “Configuration > Bandwidth Control”, in the navigation bar as follows:

Interface data are as follows

Configuration Items

Description

Type

Ingress: inbound port direction Degree: direction of outgoing port

State

Enable or disenable port restrictions

Rate

Rate limit, Port1-8 range: 0 to 25000000 Kbit,Port9

range:0to10000000Kbit

4.9 Jumbo Frame
Set the MTU (Maximum Transmission Unit) of the port Instructions: 1. Click the “Configuration >Jumbo Frame”, in the navigation bar as follows:

Interface data are as follows

Configuration Items

Description

Jumbo Frame

Set the MTU of the port

25

4.10 MAC Constraint
MAC address learning limit of port Instructions: 1. Click the “Configuration > MAC Constraint”, in the navigation bar as follows:

Interface data are as follows. Configuration Items State Entry Limits

Description Enable or disable MAC constraint Limited number of MAC address learning

4.11 EEE
1. Click the “Configuration > EEE”, in the navigation bar as follows:

5 Security
5.1 MAC Address
Ethernet switches are mainly innovated to forward according to the purposes in the data link layer. That is, MAC address will transmit the messages to corresponding ports
26

according to the purposes. MAC address forwarding table is a L2 table illustrating MAC addresses and forwarding ports, which is the basis of fast forwarding of L2 messages. MAC address forwarding table contains following data: Destination MAC Address VLAN ID belonging to port Forwarding ingress No. of this device There are two message forwarding types according to MAC address table info: Unicast mode: the switch directly transmits the messages from the table’s egress
when MAC address forwarding table contains corresponding entries with the destination MAC address. Broadcast mode: When the switch receives the messages with the destination address full of F-bits, or there is no entry corresponding to the MAC destination address in the forwarding table, the switch will forward the messages to all ports excluding the receiving port in this way.
5.1.1 MAC Search
MAC address table needs constant updates to cater to network changes. It automatically generates entries that are limited by their lifetime (i.e. aging time). Those entries not refreshed after expiration will be deleted. The aging time of an entry will be recalculated if its record is refreshed before expiration.
Proper aging time helps to achieve the aging target of MAC address. Shortage of aging time may lead many switches broadcast to discover the packets of destination MAC addresses, thus influencing the switch performance. Aging too long can cause the switch to save outdated MAC address entries, thus exhausting the forwarding resources and failing to update the forwarding table based on network changes.
The switch may remove valid MAC address table entries due to too short aging time, thus reducing forwarding efficiency. In general, the aging time recommended is 300 seconds by default. Instructions for aging time setting: 1. Click the “Security > MAC Address > MAC Search”, in the navigation bar as follows:
27

5.1.2 Static MAC
Static table is manually configured by users and distributed to each interface board, which won’t age. Instructions: 1. Click the “Security > MAC Address > Static MAC”, in the navigation bar as follows:

Interface data are as follows.

Configuration Items Description

MAC Address

Enter the new MAC address e.g.: HH:HH:HH:HH:HH:HH

VLAN ID

Specify the VLAN ID

Port

Select the interface type and enter the port list

5.2 Storm Control
Storms generated via broadcast, unknown multicast and unicast messages are prevented as follows. These messages will be suppressed subject to packet rates respectively. The average rate of the messages received by monitoring interfaces will be compared with the max threshold configured during an inspection interval. Configured storm policing will be performed at this interface if the average rate exceeds the max threshold.
When a L2 Ethernet interface receives the broadcast, unknown multicast or unicast messages, the device will forward them to other L2 interfaces in a same VLAN (Virtual Local Area Network) if the egress interface cannot be recognized according to destination MAC addresses. As a result, broadcast storm may occur to degrade device operation performance.
Three kinds of message flow can be controlled by storm policing characteristics to stay away from broadcast storms. Instructions: 1. Click the “Security > Storm Control”, in the navigation bar as follows:

28

Interface data are as follows.

Configuration Items Description

Storm Type

The storm type, like Broadcast, Multicast, Unicast

Port

Port list

State

Enable or disable storm control

Rate

Rate ranges from 8 to 1,000,000 Kbps

6 Monitoring
6.1 Port Statistics
Display port statistics information. Instructions: 1. Click the “Monitoring > Port Statistics”, in the navigation bar as follows:

29

Interface data are as follows.

Configuration Items

Description

Port

Port list

State

Switch status of the port

Link Status

Link status of the port

TxGoodPkt

Send normal packet statistics

TxBadPkt

Send bad packet statistics

RxGoodPkt

Received normal packet statistics

RxBadPkt

Received bad packet statistics

7 Tools
7.1 Firmware Upgrade
System version firmware upgrade Instructions: 1. Click the “Tools> Firmware Upgrade”, in the navigation bar as follows:

Note: After clicking OK, do not power off during the upgrade process, stay on the upgrade page for about 1 minute until the upgrade is complete
7.2 Configuration Backup
System configuration upgrade or backup Instructions
30

1. Click the “Tool > Configuration Backup”, in the navigation bar as follows:

Interface data are as follows.

Configuration

Description

Items

Backup

Backup configuration

Restore

Upload configuration

7.3 Reset
Restore factory settings Instructions 1. Click the “Tool > Reset”, in the navigation bar as follows:

7.4 Save
Instructions 1. Click the “Tool > Save”, in the navigation bar as follows:

7.5 Reboot
Restart the system. Instructions 1. Click the “Tool > Reboot”, in the navigation bar as follows:

31

7.5 Logout
Exit the system Instructions 1. Click the “Tools> Logout”, in the navigation bar as follows:
32

Documents / Resources

eBay SL-SWTGW218AS Smart Web Switch [pdf] Instruction Manual
SL-SWTGW218AS Smart Web Switch, SL-SWTGW218AS, Smart Web Switch, Web Switch, Switch

References

Leave a comment

Your email address will not be published. Required fields are marked *