
User Guide for Ruijie models including: RG-ES224GC-V2, RG-ES2 Series 24-Port Gigabit Smart Cloud Mananged Non PoE Switch, 24-Port Gigabit Smart Cloud Mananged Non PoE Switch, Smart Cloud Mananged Non PoE Switch, Mananged Non PoE Switch, Non PoE Switch
Reyee RG-ES224GC-V2 - CCTV
Reyee RG-ES224GC-V2 - CCTV resenja
File Info : application/pdf, 36 Pages, 1.49MB
DocumentDocumentRuijie Reyee RG-ES2 Series Switches 1.0(1)B1P35 Configuration Guide Document Version: V1.0 Date: 2024.06.27 Copyright © 2024 Ruijie Networks Copyright Copyright © 2024 Ruijie Networks All rights are reserved in this document and this statement. Any reproduction, excerption, backup, modification, transmission, translation or commercial use of this document or any portion of this document, in any form or by any means, without the prior written consent of Ruijie Networks is prohibited. Trademarks including , , are owned by Ruijie Networks. All other trademarks or registered trademarks mentioned in this document are owned by their respective owners. Disclaimer The products, services, or features you purchase are subject to commercial contracts and terms. Some or all of the products, services or features described in this document may not be within the scope of your purchase or use. Unless otherwise agreed in the contract, Ruijie Networks does not make any express or implied statement or guarantee for the content of this document. The names, links, descriptions, screenshots, and any other information regarding third-party software mentioned in this document are provided for your reference only. Ruijie Networks does not explicitly or implicitly endorse or recommend the use of any third-party software and does not make any assurances or guarantees concerning the applicability, security, or legality of such software. You should choose and use third-party software based on your business requirements and obtain proper authorization. Ruijie Networks assumes no liability for any risks or damages arising from your use of third-party software. Due to product version upgrades or other reasons, the content of this document will be updated from time to time. Ruijie Networks reserves the right to modify the content of the document without any notice or prompt. This manual is for reference only. Ruijie Networks endeavors to ensure content accuracy and will not shoulder any responsibility for losses and damages caused due to content omissions, inaccuracies or errors. Preface Intended Audience This document is intended for: Network engineers Technical support and servicing engineers Network administrators Technical Support The official website of Ruijie Reyee: https://reyee.ruijie.com Technical Support Website: https://reyee.ruijie.com/en-global/support Case Portal: https://www.ruijienetworks.com/support/caseportal Community: https://community.ruijienetworks.com Technical Support Email: service_rj@ruijienetworks.com Online Robot/Live Chat: https://reyee.ruijie.com/en-global/rita Conventions 1. GUI Symbols Interface symbol Description Example Boldface 1. Button names 2. Window names, tab name, field name and menu items 3. Link 1. Click OK. 2. Select Config Wizard. 3. Click the Download File link. > Multi-level menus items Select System > Time. 2. Signs The signs used in this document are described as follows: Warning An alert that calls attention to important rules and information that if not understood or followed can result in data loss or equipment damage. Caution An alert that calls attention to essential information that if not understood or followed can result in function failure or performance degradation. I Note An alert that contains additional or supplementary information that if not understood or followed will not lead to serious consequences. Specification An alert that contains a description of product or version support. 3. Note This manual introduces the product model, port type and GUI for your reference. In case of any discrepancy or inconsistency between the manual and the actual version, the actual version prevails. II Contents Preface .................................................................................................................................................. I 1 Release Note..................................................................................................................................... 1 1.1 Hardware Support......................................................................................................................1 1.2 Software Feature Changes........................................................................................................1 2 Login.................................................................................................................................................. 2 2.1 Configuration Environment Requirements ................................................................................ 2 2.2 Login to the Web Management System ....................................................................................2 2.2.1 Connecting the Device...................................................................................................2 2.2.2 Login to the Web Management System ........................................................................ 2 3 Port Settings...................................................................................................................................... 3 3.1 Managing Port Information ........................................................................................................ 3 3.1.1 Port Status Bar...............................................................................................................3 3.1.2 Port Info Overview ......................................................................................................... 5 3.1.3 Port Packet Statistics ..................................................................................................... 6 3.2 Setting and Viewing Port Attributes ........................................................................................... 6 3.2.1 Port Settings................................................................................................................... 6 3.2.2 Port Status ..................................................................................................................... 7 3.3 Port Mirroring ............................................................................................................................. 8 3.3.1 Overview ........................................................................................................................ 8 3.3.2 Configuration Steps ....................................................................................................... 8 3.4 Port Isolation .............................................................................................................................. 9 3.5 Port-based Rate Limiting ......................................................................................................... 10 3.6 Management IP Address ......................................................................................................... 11 3.7 Setting the Port Media Type .................................................................................................... 12 i 4 Switch Settings................................................................................................................................ 13 4.1 Managing MAC Address..........................................................................................................13 4.1.1 Overview ...................................................................................................................... 13 4.1.2 Viewing MAC Address Table........................................................................................13 4.1.3 Searching for MAC Address ........................................................................................ 14 4.1.4 Configuring Static MAC Address ................................................................................. 14 4.2 VLAN Settings..........................................................................................................................15 4.2.1 Global VLAN Settings .................................................................................................. 15 4.2.2 Static VLANs Settings..................................................................................................16 4.2.3 Port VLAN Settings ...................................................................................................... 16 5 Security............................................................................................................................................ 18 5.1 DHCP Snooping.......................................................................................................................18 5.1.1 Overview ...................................................................................................................... 18 5.1.2 Configuration Steps ..................................................................................................... 18 5.2 Storm Control ........................................................................................................................... 18 5.2.1 Overview ...................................................................................................................... 18 5.2.2 Configuration Steps ..................................................................................................... 19 5.3 Loop Guard .............................................................................................................................. 19 6 PoE Settings.................................................................................................................................... 20 7 Diagnostics ...................................................................................................................................... 21 7.1 Cloud Settings..........................................................................................................................21 7.2 System Logs ............................................................................................................................ 22 8 System Settings .............................................................................................................................. 23 8.1 Managing Device Information .................................................................................................. 23 ii 8.1.1 Viewing Device Information ......................................................................................... 23 8.1.2 Editing the Hostname................................................................................................... 24 8.1.3 Cloud Management......................................................................................................24 8.2 Password Settings ................................................................................................................... 25 8.3 Device Reboot ......................................................................................................................... 25 8.4 System Upgrade ...................................................................................................................... 26 8.4.1 Local Upgrade..............................................................................................................26 8.4.2 Online Upgrade ............................................................................................................ 26 8.5 Restoring Factory Configuration .............................................................................................. 26 9 Monitoring........................................................................................................................................ 27 9.1 Cable Diagnostics .................................................................................................................... 27 9.2 Multi-DHCP Alarming...............................................................................................................27 9.3 Viewing Switch Information...................................................................................................... 28 10 FAQs.............................................................................................................................................. 29 iii Web-based Configuration Guide Release Note 1 Release Note This section describes the hardware support and software feature changes in the 1.0(1)B1P35 version. For details about hardware changes, see the release notes of relevant software versions. 1.1 Hardware Support The following table lists the hardware models supported by this version. Table 1-1 Supported Hardware Models Hardware Type Model Hardware Version Number Switch RG-ES205GC-P 1.0x, 1.1x, 1.2x, 1.3x, 1.4x, 1.5x, 1.6x,2.0x, 2.1x, 2.2x, 2.3x, 2.4x Switch RG-ES209GC-P 1.0x , 1.1x, 1.2x, 1.3x, 1.4x, 1.5x, 1.6x, 1.7x, 1.8x, 1.9x, 1.Ax, 1.Bx, 1.Cx Switch RG-ES205GC 1.0x, 1.1x, 1.2x, 1.3x, 1.4x Switch RG-ES208GC 1.0x, 1.1x, 1.2x, 1.3x Switch RG-ES210GS-P 1.0x, 1.1x Switch RG-ES218GC-P 1.0x, 1.1x, 1.2x, 1.3x, 1.4x, 2.0x, 2.1x, 2.2x, 3.0x, 3.2x Switch RG-ES226GC-P 1.0x, 1.1x, 1.2x, 1.3x, 2.0x, 2.1x, 2.2x, 2.3x, 3.0x, 3.1x Switch RG-ES220GS-P 1.0x Switch RG-ES228GS-P 1.0x Switch RG-ES206GS-P 1.0x, 1.1x Switch RG-ES216GC-V2 1.0x, 1.1x Switch RG-ES224GC-V2 1.0x, 1.1x 1.2 Software Feature Changes This version added support for the Energy-Efficient Ethernet (EEE) function. For details about EEE configuration and supported device models, see 3.2.1 Port Settings. 1 Web-based Configuration Guide Figure 1-1 EEE Function Display Page Login 2 Login 2.1 Configuration Environment Requirements Browser: Google Chrome, Internet Explorer 9.0, 10.0, and 11.0, and some Chromium/IE kernel-based browsers are supported. Exceptions such as messy code and format errors may occur when other browsers are used. Resolution: 1024 x 768 or a higher resolution is recommended. Exceptions such as font alignment error and format error may occur when other resolutions are used. 2.2 Login to the Web Management System 2.2.1 Connecting the Device Connect the switch port with the network port of the PC through an Ethernet cable. Configure the PC with an IP address in the same network segment as the default IP address of the switch so that the PC can ping the switch. For example, set the IP address of the PC to 10.44.77.100. Table 2-1 Default Configuration Feature Default Setting Device IP Address 10.44.77.200 Password admin 2.2.2 Login to the Web Management System (1) Enter the IP address (10.44.77.200 by default) of the device into the address bar of the browser to access the login page. 2 Web-based Configuration Guide Port Settings Note If the static IP address of the device is changed, or the device dynamically obtains a new IP address, the new IP address can be used to access the web interface of the device as long as the PC and the device are in the same network segment of a LAN. Figure 2-1 Login Page (2) Enter the password (default password: admin), and then click Log In to enter the homepage of the web interface. You will be prompted to reset the default password upon their first login to the web interface. If the password is the default password, you are not allowed to configure the device. You need to log in to the web interface with the reset password to configure and manage the device. For details about password settings, see 6.2. If you forget the device IP address or password, press and hold the Reset button on the device panel for more than 5 seconds to restore factory settings. After restoration, you can use the default IP address and password to log in. Caution Restoring factory settings will delete the current configurations. Exercise caution when performing this operation. 3 Port Settings 3.1 Managing Port Information 3.1.1 Port Status Bar The port status bar is at the top of the web page, showing port ID, port attribute (uplink/downlink), and the connection status. Click Collapse to hide the port status bar. 3 Web-based Configuration Guide Figure 3-1 Port Status Bar Port Settings Different colors and shapes of the port icons represent different port statuses. See Table 2-1 for details. Move the cursor over a port icon and the port status will be displayed, including the connection status, port rate, duplex mode, and flow control status. Table 3-1 Port Icons Port Icon Description The port icon is in the shape of a square, showing the port is a fiber port. The port icon is in the shape of an RJ-45 connector, showing the port is a copper port. The color of the port icon is black, showing the port is disconnected. The color of the port icon is gray, showing the port is disabled and cannot receive or transmit packets. The color of the port icon is yellow, showing there is a loop. The color of the port icon is green, showing the port is working normally. The number above the port icon is the port ID used to identify the device port. With the port ID, you can specify the target port. 4 Web-based Configuration Guide Port Icon Port Settings Description The device port is classified into the uplink port and the downlink port. The uplink port is used to connect network devices in the upper layer and access the core network. The downlink port is used to connect the endpoints. When port isolation is enabled, the downlink ports of the device are isolated from each another, and they can only communicate with the uplink ports. For details, see 2.4. 3.1.2 Port Info Overview Choose Homepage. The homepage displays the global port information, including the port status, port VLAN settings, the packet receiving/transmission rate (Rx/Tx rate), port isolation status, loop detection status, and port PoE settings. Besides, it supports searching for the downlink device. Click Port Status to configure the basic port attributes. For details, see 3.2 Setting and Viewing Port Attributes. Click VLAN to set the VLAN of the port. For details, see4.2 VLAN Settings. Note Port VLAN settings can only be configured and viewed in the Port Info pane after the VLAN Settings switch is toggled on. Figure 3-2 Enabling VLAN Settings Click Isolation Status to configure port isolation so that the downlink ports of the device are isolated from each other. For details, see 3.4 Port Isolation. Click Loop Status to enable loop guard function. After a loop occurs, the port causing the loop will be shut down automatically. For details, see 5.3 Loop Guard. Click PoE to view and set PoE parameters of the port. For details, see6 PoE Settings. Click Search in the Downlink Device column to search for the downlink device of the selected port. After the search is done, click View to view the MAC address of the downlink device. Click Refresh List to fetch the latest port information. 5 Web-based Configuration Guide Figure 3-3 Viewing or Configuring Port Settings Port Settings 3.1.3 Port Packet Statistics Choose Monitoring > Packet Statistics. The Packet Statistics page displays the port status, the connection status, Rx/Tx rate (kbps), Rx/Tx packets (KB), Rx/Tx success, and Rx/Tx failure. Click Clear to clear current packet statistics of all ports and reset the statistics. Figure 3-4 Port Packet Statistics 3.2 Setting and Viewing Port Attributes Choose Switch Settings > Port Settings. 3.2.1 Port Settings You can set the basic attributes of the Ethernet ports in batches. (1) Click Select in the Port column to display options of all device ports. (2) Select the ports you want to configure, and then select the port status, port rate, port duplex mode, flow control status, and click Save. Note The EEE function is supported by every model listed in the Supported Hardware Models, except for the RG-ES218GC-P and RG-ES226GC-P switches. The EEE function can be configured on ports that meet the following criteria: RJ45 port type, operating at 100/1000 Mbps, with auto-negotiation enabled (rate and duplex mode set to auto). 6 Web-based Configuration Guide Figure 3-5 Port Parameter Configuration Port Settings Table 3-2 Basic Port Configuration Parameters Parameter Description Port Select the ports you want to configure. Status When the port is disabled, it cannot receive or transmit packets (PoE is not affected). Speed Configure the operating speed of the Ethernet physical port. When the speed is set to Auto, it means that it is determined by the auto-negotiation between the local port and the peer port. The negotiated speed can be any speed within the port capability. Duplex Flow Control Full duplex: The port can receive packets while sending packets. Half duplex: The port can receive or send packets at a time. Auto-negotiation: The duplex mode of the port is determined by the auto-negotiation between the local port and the peer port. After enabling the flow control feature, the port will process the received flow control frames and send flow control frames when flow congestion occurs. EEE EEE is an IEEE 802.3az standard. When EEE is enabled, the port enters the Lower Power Idle (LPI) mode to save energy when the Ethernet connection is idle. Default NA Enabled Auto Auto Disabled Disabled Caution Shutting down all ports will make the switch unmanageable. Exercise caution when performing this operation. 3.2.2 Port Status You can view the configuration status of the port attributes and check whether these configurations are active, including the port rate, duplex mode, and flow control status. 7 Web-based Configuration Guide Port Settings Note The display of EEE status information is supported by every model listed in the Supported Hardware Models, except for the RG-ES218GC-P and RG-ES226GC-P switches. Figure 3-6 Port Status 3.3 Port Mirroring 3.3.1 Overview In network monitoring and troubleshooting scenarios, users need to analyze data traffic on suspicious network nodes or device ports. When port mirroring is enabled, packets received and transmitted on the source port will be mirrored to the mirror port (destination port). You can monitor and analyze the packets on the mirror port through network analyzer without affecting the normal data forwarding of the monitored device. As Figure 3-7 shows, by configuring port mirroring on Device A, the packets on Port 1 are mirrored to Port 10. Though the network analyzer is not directly connected to Port 1, it can receive all packets on Port 1 and is able to monitor the data traffic on Port 1. Figure 3-7 Operating Principle of Port Mirroring 3.3.2 Configuration Steps Choose Switch Settings > Port Mirroring. Select the source port, the monitoring direction, and the mirror port, and click Save. The device supports configuring one port mirroring rule. If you want to delete port mirroring configuration, click Delete. Caution You can select multiple source ports but only one mirror port. The source ports cannot contain the mirror port. Only one port mirroring rule can be configured. If multiple rules are configured, the rule configured last will take effect. 8 Web-based Configuration Guide Figure 3-8 Configuring Port Mirroring Port Settings Table 3-3 Port Mirroring Parameters Parameter Description Source Port Member The source port is also called the monitored port. Packets on the source port will be mirrored to the mirror port for network analysis or troubleshooting. You can select multiple source ports. Packets on these ports will be mirrored to one mirror port. Direction Direction of the data traffic monitored on the source port: Bi-directions (input & output): All packets on the source port, including the received packets and the transmitted packets, will be mirrored to the mirror port. Input: The packets received by the source port will be mirrored to the mirror port. Output: The packets transmitted from the sourced port will be mirrored to the mirror port. Mirror Port The mirror port is also called the monitoring port. The mirror port is connected with a monitoring device, and it transmits packets on the source port to the monitoring device. 3.4 Port Isolation Choose Switch Settings > Port Isolation. Port isolation is used for isolating layer-2 packets. When port isolation is enabled, the downlink ports are isolated from each other but can communicate with uplink ports. Port isolation is disabled by default. Toggle the switch to On to enable port isolation. 9 Web-based Configuration Guide Figure 3-9 Port Isolation Port Settings Caution The number of the uplink/downlink ports and port IDs of different devices vary. Please refer to the specific device's documentation for accurate information. Port isolation can be enabled on devices featuring DIP switches on the panel. The last configuration applied takes effect. 3.5 Port-based Rate Limiting Choose QoS Settings > Port Rate. You can configure rate limiting rules for packets in the input direction and the output direction of ports. There is no rate limiting on ports by default. Select the port you want to configure, then select the rate limiting type and status, and enter the rate limit. Click Save to save the configuration. The configuration will be displayed accordingly in the Port Rate table right below the Save button. Figure 3-10 Port Rate Table 3-4 Rate Limiting Parameters Parameter Description Port You can select multiple ports for rate limiting configuration in batches. Default NA 10 Web-based Configuration Guide Parameter Type Status Rate (Mbit/sec) Description The direction of the rate-limited data traffic: Input & output: Rate limiting for all packets forwarded over the port, including the received packets and the transmitted packets. Input: Rate limiting for packets received by the port. Output: Rate limiting for packets transmitted from the port. You can decide whether to enable or disable rate limiting. The maximum rate at which packets are forwarded over the port. Port Settings Default NA Disabled No limit Note The port rate limit range varies with the switch model. 3.6 Management IP Address Choose System Settings > IP Settings. You can configure the management IP address of the device. By accessing the management IP address, you can configure and manage the device. There are two Internet types available: Dynamic IP address: Enable Auto Obtain IP feature to use the IP address assigned dynamically by the uplink DHCP server. Static IP address: Disable Auto Obtain IP feature to use the fixed IP address configured manually by the user. Enable Auto Obtain IP feature, and the device will automatically obtain various parameters from the DHCP server. You can select whether to obtain a DNS address automatically from the DHCP server. If Auto Obtain DNS feature is disabled, you need to configure a DNS address manually. After disabling Auto Obtain IP feature, you need to manually configure the IP address, subnet mask, gateway IP address, and DNS address. Click Save to enforce the configuration. VLAN is used for managing VLAN tag of the management packets. Disable VLAN settings, and the management packets will be untagged, and management VLAN configuration is not supported. The management VLAN of the device is VLAN 1 by default. 11 Web-based Configuration Guide Figure 3-11 IP Settings Port Settings Note Disable VLAN settings, and the management packets will be untagged. If you want to tag packets, please enable VLAN settings. For details, see 3.2.1. The management VLAN must be selected from the existing VLANs. To create a static VLAN, refer to 3.2.2. You are advised to bind a configured management VLAN to an uplink port. Otherwise, you may fail to access the web interface. For details, see 3.2.3. If you disable Auto Obtain IP feature, multi-DHCP alarming will fail. For details about multi-DHCP alarming, see 7.2. 3.7 Setting the Port Media Type Note This function is only supported on the RG-ES206GS-P and RG-ES210GS-P switches. Choose Switch Settings > Port media type. You can set the port media type for a combo port as combo (optical preferred), electrical, or optical. Figure 3-12 Setting the Port Media Type 12 Web-based Configuration Guide 4 Switch Settings Switch Settings 4.1 Managing MAC Address 4.1.1 Overview The MAC address table records mappings of MAC addresses and ports to VLANs. The device queries the MAC address table based on the destination MAC address in a received packet. If the device finds an entry that is consistent with the destination MAC address in the packet, the device forwards the packet through the port specified by the entry in unicast mode. If the device does not find such an entry, it forwards the packet through all ports other than the receiving port in broadcast mode. MAC address entries are classified into the following types: Static MAC address entries: Static MAC address entries are manually configured by the users. Packets whose destination MAC address matches the one in such an entry are forwarded through the corresponding port. Dynamic MAC address entries: Dynamic MAC address entries are learned dynamically by the device. They are generated automatically by the device. 4.1.2 Viewing MAC Address Table Choose Switch Settings > MAC Address Info. This page displays the MAC address of the device, including the static MAC address configured manually by the users and the dynamic MAC address learned automatically by the device. Click Clear Dynamic MAC to clear the dynamic MAC address learned by the device. The device will re-learn the MAC address and generate a MAC address table. Figure 4-1 MAC Address Table Note If you disable VLAN, the device will forward packets according to only the destination MAC address. VLAN ID is not displayed in the MAC address table. Up to 100 MAC addresses are displayed. 13 Web-based Configuration Guide Switch Settings 4.1.3 Searching for MAC Address Choose Switch Settings > Search MAC. You can search for MAC address entries according to MAC address and VLAN ID. Caution If you disable VLAN, the VLAN ID will not be recorded in the MAC address table.MAC address entries can only be found through MAC address. Enter MAC address and VLAN ID, and then click Search. The MAC address entries that meet the search criteria will be displayed in table right below the Search button. Moreover, you can enter partial characters of the MAC address for fuzzy search. Figure 4-2 search for MAC address 4.1.4 Configuring Static MAC Address Choose Switch Settings > Static MAC. By configuring a static MAC address, you can manually bind the MAC address of a downlink network device with a port of the switch. After you add a static MAC address, when the device receives a packet destined to this address from VLAN, it forwards the packet to the specified port. Caution If you disable VLAN, the VLAN ID will not be recorded in the MAC address table. It is not allowed to configure a VLAN to which the static MAC address belongs. Enter a MAC address, specify a VLAN ID and select the outbound port. Then click Add to add a static MAC address. The MAC address entries will be updated accordingly in the MAC address table. 14 Web-based Configuration Guide Figure 4-3 Configuring Static MAC Address Switch Settings If you want to delete a static MAC address, select the MAC address entry you want to delete in the table and click Delete. Figure 4-4 delete static MAC address 4.2 VLAN Settings 4.2.1 Global VLAN Settings Choose Homepage > Device Info. This page displays the status of VLAN settings. Toggle the on-off switch to enable or disable VLAN settings. When VLAN is disabled, the device operates like an un-managed switch. The device forwards packets according to the destination MAC address, and the VLAN information of the forwarding packets remains unchanged during the forwarding process. When VLAN is enabled, the device operates like a managed switch. The device forwards packets according to the destination MAC address and VLAN ID. You can configure the port mode (access or trunk) based on whether a VLAN tag is carried in packets. Besides, all device ports will be initialized to access ports. Figure 4-5 VLAN Settings 15 Web-based Configuration Guide Switch Settings 4.2.2 Static VLANs Settings Caution Static VLANs can be created only when the global VLAN settings feature is enabled. For details, see 3.2.1. Choose VLAN Settings > VLAN Members. Enter VLAN ID and click Add to create a static VLAN. The VLAN table contains the existing VLANs. Select the VLANs and click Delete, and the corresponding VLANs will be deleted. VLAN 1 cannot be deleted. Figure 4-6 Static VLANs Settings Note The VLAN ID ranges from 1 to 4094. VLAN 1 is the default VLAN. The Management VLAN (VLAN 1), Native VLAN, Permit VLAN, and Access VLAN cannot be deleted. 4.2.3 Port VLAN Settings Caution You can configure port VLAN only when the VLAN Settings function is enabled. For details, see 3.2.1. Choose VLAN Settings > VLAN Settings. Configure the port mode and VLAN members of a port, and you will know the allowed VLANs of the port and whether the packets forwarded by the port carry tags. Note You are advised to create VLAN members (refer to 3.2.2) before configuring the port based on VLANs. Click VLAN Members to access the VLAN Members page where you can add VLAN members. (1) Select the target ports. Multiple ports can be selected. (2) Configure the port type. Access: If the port is an access port, select Access for the port. Trunk: If the port is a trunk port, select a native VLAN for the port, and enter the VLAN ID range of permit VLANs. 16 Web-based Configuration Guide (3) Click Save. The configured port information is synchronized to the table on the VLAN Settings page. Figure 4-7 Configuring Port VLANs Switch Settings Table 4-1 Port Modes Port Mode Description Access Trunk One access port can belong to only one VLAN and allow frames from this VLAN only to pass through. This VLAN is called an access VLAN. The frames from the access port do not carry VLAN tag. When the access port receives an untagged frame from a peer device, the local device determines that the frame comes from the access VLAN and adds the access VLAN ID to the frame. Access port is connected to the endpoints. One trunk port supports one Native VLAN and several Permit VLANs. Native VLAN frames forwarded by a trunk port do not carry tags while Permit VLAN frames forwarded by the trunk port carry tags. Trunk port is connected to switches. You can set the Permit VLAN range to limit VLAN frames that can be forwarded. Make sure the trunk ports at the two ends of the link are configured with the same Native VLAN. Note Improper configuration of VLANs on a port (especially uplink port) may cause failure to log in to the web interface. Exercise caution when configuring VLANs. 17 Web-based Configuration Guide 5 Security Security 5.1 DHCP Snooping 5.1.1 Overview The Dynamic Host Configuration Protocol (DHCP) snooping function allows a device to snoop DHCP packets exchanged between clients and a server to record and monitor the IP address usage and filter out invalid DHCP packets, including request packets from the clients and response packets from the server. 5.1.2 Configuration Steps Choose Switch Settings > DHCP Snooping Settings. Toggle the switch to On to enable DHCP snooping, select the trusted ports, and then click Save. When DHCP snooping is enabled, request packets from DHCP clients are forwarded only to the trusted ports. For response packets from DHCP servers, only those from the trusted ports are forwarded. Note The uplink port connected to the DHCP server is configured as the trusted port generally. Figure 5-1 DHCP Snooping 5.2 Storm Control 5.2.1 Overview When a local area network (LAN) has excess broadcast, multicast, or unknown unicast data flows, the network speed will slow down and packet transmission will have an increased timeout probability. This situation is called a LAN storm, which may be caused by topology protocol execution errors or incorrect network configuration. You can perform storm control separately for the broadcast, unknown multicast, and unknown unicast data flows. When the rate of broadcast, unknown multicast, or unknown unicast data flows received over a device port exceeds the specified range, the device transmits only packets in the specified range and discards packets beyond the range until the packet rate falls within the range. This prevents flooded data from entering the LAN and causing a storm. 18 Web-based Configuration Guide Security 5.2.2 Configuration Steps Choose QoS Settings > Storm Control. Select the storm control type, port, status, and enter the rate limit, and then click Save. The storm control type and corresponding rate are displayed in the table right below the Save button. When storm control is disabled, the rate of broadcast, unknown multicast, and unknown unicast data flows is not limited. The corresponding status is displayed Disabled. When storm control is enabled, the corresponding rate limits will be displayed. Figure 5-2 Storm Control 5.3 Loop Guard Choose Monitoring > Loop Guard. When loop guard feature is enabled, the port causing the loop will be shut down automatically. After the loop is removed, the port will be up automatically. Loop guard function is disabled by default. Figure 5-3 Loop Guard 19 Web-based Configuration Guide 6 PoE Settings PoE Settings Note This function is supported by switch models suffixed with -P, -LP, -HP, or -UP in the Supported Hardware Models, such as the RG-ES220GS-P. Choose PoE Settings. The device supports PoE power supply. You can view and configure the current power status. PoE information: The total power, used power, remaining power, and current work status of the PoE system are displayed. PoE watchdog: This feature is mainly applicable to security surveillance scenarios. After this feature is enabled, when a PoE port of the device suddenly stops receiving packets during the ping interval, the powered device (PD) will be restarted after the ping interval expires to restore normal operation. Note If a non-PD, such as a computer, is connected to a PoE-enabled port of this device, the PoE watchdog will not initiate any action on the non-PD even if the trigger condition is met. The PoE watchdog ping interval (in seconds) can be set to a value in the range of 90 to 1800. Figure 6-1 PoE Settings Table 6-1 PoE Watchdog Configuration Description Packet Receiving Status of the PoE Port PoE Watchdog is Enabled Action Taken on the PD During the ping interval, a Yes PoE port of the device suddenly stops receiving packets. No The PD is restarted to restore normal operation, and the ping interval is reset. No action is initiated on the PD. During the ping interval, a Yes No action is initiated on the PD. 20 Web-based Configuration Guide Packet Receiving Status of the PoE Port PoE port of the device still stops receiving packets. PoE Watchdog is Enabled No During the ping interval, a Yes PoE port of the device starts to receive packets. No Action Taken on the PD No action is initiated on the PD. The ping interval is reset. No action is initiated on the PD. Diagnostics Port status: The voltage, current, output power, and current power status of the device ports are displayed. You can enable or disable PoE function through the on-off toggle switch. When PoE is disabled, the port will not supply power to external devices. Figure 6-2 Port Status 7 Diagnostics 7.1 Cloud Settings Choose Diagnostics > Cloud Settings. On Ruijie Cloud, you can check the status of your device, including its cloud connectivity status, reason for failure to connect, and the domain name and IP address of the cloud server. To change the domain name of the device, enter the new domain name in the Domain field, and then click Save. Figure 7-1 Cloud Settings 21 Web-based Configuration Guide Diagnostics To restore the default domain name, click Restore Default, and then click OK on the pop-up window. Figure 7-2 Restoring the Default Domain Name Table 7-1 Cloud Settings Parameters Parameter Description Cloud Status Indicates the connectivity status of the device on the cloud, including Connected, Unconnected and Connectable. Reason Indicates the reason for connection failure. Reasons for different cloud statuses: Connected: No reason is displayed. Unconnected: No Internet connection or DNS resolution failure. This device failed to connect to Ruijie Cloud. Connectable: This device is not registered to Ruijie Cloud. Domain name of the cloud server Domain Caution The coap:// prefix is not required in the domain name field as it is added by default. After the domain name is changed, the page is refreshed after 5 seconds by default. IP IP address of the cloud server resolved based on the cloud address. 7.2 System Logs Choose Diagnostics > System Logs. System logs record device operations, operation time, and operation modules. System logs are used by administrators to monitor the running status of the device, analyze network status, and locate faults. 22 Web-based Configuration Guide Figure 7-3 System Logs System Settings Caution If the preceding troubleshooting steps fail to resolve the issue, and remote assistance from technical support is needed, you can contact them to assist in enabling the developer mode. The technical support team can then perform diagnostics to identify and address the issue effectively. 8 System Settings 8.1 Managing Device Information 8.1.1 Viewing Device Information Choose Homepage. The device information is displayed on the homepage, including hostname, device model, serial number, firmware version, IP address, MAC address, cloud status, and uptime. Click Device Info to access the Device Info page (System Settings > Device Info) to view more detailed information. Figure 8-1 Device Info 23 Web-based Configuration Guide Figure 8-2 Viewing Device Information System Settings 8.1.2 Editing the Hostname Choose Homepage > Device Info. Enter the hostname and click Edit to edit the hostname in order to distinguish different devices. Figure 8-3 Editing the Hostname 8.1.3 Cloud Management Choose Homepage > Device Info. Cloud status displays whether the device is connected to the cloud. After the device is bound to a cloud management account, the Cloud Status will display Connected, and you can manage the device remotely through Ruijie Cloud webpage or APP. Click Connected to access the homepage of Ruijie Cloud (https://cloudas.ruijienetworks.com). Click Download APP to download Ruijie Cloud APP. Figure 8-4 Cloud Management 24 Web-based Configuration Guide System Settings 8.2 Password Settings When the device password is the default password, you will be prompted to reset the password when logging into the web interface. Click Yes to access the Account Settings page (or choose System Settings > Account Settings to access the page). Set a new password according to the tip, and then click Save to save the configuration. Figure 8-5 Password Settings If the device is under uniform management, it cannot be configured with an independent password. You need to follow the tip to log in to the master device for global password configuration. Figure 8-6 Managing the Account Caution Upon your initial login to the web interface, you must set the device management password first before you configuring other features. Please remember the device management password (default password: admin). You may need to log in again after changing the password. If the device has been under uniform management, please use MACC or APP to change the network- wide password. Changing the password of this device will cause failure to synchronize network-wide settings to this device. 8.3 Device Reboot Choose System Settings > Reboot. Click Reboot to reboot the switch. Figure 8-7 Device Reboot 25 Web-based Configuration Guide System Settings 8.4 System Upgrade 8.4.1 Local Upgrade Choose System Settings > Upgrade. Click Select File to select the upgrade package from the local files (the upgrade package is a bin file. If it is a tar.gz file, you need to decompress the package and select the bin file for upgrade). Keep Old Config is selected by default. That means the current configuration will be saved after device upgrade. If there is a huge difference between the current version and the upgrade version, you are advised not to select Keep Old Config. Figure 8-8 Local Upgrade 8.4.2 Online Upgrade Choose System Settings > Upgrade. When there is a new version in the cloud, the version number of the latest version will be displayed on this page, and the Upgrade button will become available. The device will download the installation package of the recommended version from the cloud and it will be updated to the latest version. Online upgrade will keep the old configuration by default. Figure 8-9 Online Upgrade Note The time that online upgrade takes depends on the current network speed. It may take some time. Please be patient. 8.5 Restoring Factory Configuration Choose System Settings > Restore Default. Click Restore to restore factory configuration and reboot the device. 26 Web-based Configuration Guide Figure 8-10 Restoring Factory Configuration Monitoring 9 Monitoring 9.1 Cable Diagnostics Choose Monitoring > Cable Diagnostics. Cable diagnostics allows you to check the status of Ethernet cables. For example, you can check whether the cables are short-circuited or disconnected. Select the ports you want to detect, and then click Start to start cable diagnostics. The test result will be displayed accordingly. Click Start All to perform one-click cable diagnostics on all ports. Figure 9-1 Cable Diagnostics Caution If you select an uplink port for diagnostics, the network may be intermittenly disconnected. Exercise caution when performing this operation. 9.2 Multi-DHCP Alarming Caution Multi-DHCP alarming will fail when the device IP address is not obtained dynamically. For relevant IP address configuration, see 3.6 Management IP Address. Choose Homepage. When there are multiple DHCP servers in a LAN, the system will send a conflicting alarm. An alarming message will be displayed in the Device Info column. 27 Web-based Configuration Guide Figure 9-2 Multi-DHCP Alarming Monitoring Move the cursor to to view the alarm details, including the VLAN where the conflicts occur, port, IP address of DHCP server, and MAC address. 9.3 Viewing Switch Information Choose Monitoring > Switches. If the switch is under uniform management, some features cannot be configured independently (such as password settings). To facilitate configuration, information of the master device in the VLAN will be displayed in this page. Click the IP Address of the master device to access Master Device page for global configuration. The device is able to automatically discover other switches in the same management VLAN. Information of these switches will be displayed in Switch List. The first row of Switch List displays information of the current device, and the following rows display information of other devices. Click IP Address of a device to access the web interface of the device (login required). Figure 9-3 Viewing Switches on the Network Note The number of switches that can be discovered varies with product models. 28 Web-based Configuration Guide FAQs 10 FAQs Q1: I failed to log into the web interface. What can I do? (1) Verify that the Ethernet cable is properly connected to the LAN port of the device and the LED indicator blinks or is steady on. (2) Before accessing the web interface, you are advised to configure the PC with a static IP address in the same network segment as the device IP address (default device IP address: 10.44.77.200 and subnet mask: 255.255.255.0). For example, set the IP address of the PC to 10.44.77.100 and the subnet mask to 255.255.255.0. (3) Run the ping command to test the connectivity between the PC and the device. (4) If the login failure persists, restore the device to factory settings. Q2: What can I do if I forget my password? How to restore the factory settings? (1) Log in with the default password (default password: admin). (2) If you fail to log in with the default password, restore the factory settings. To restore the factory settings, please power on the device, and press and hold the Reset button for 5s or more, and release the Reset button after the system LED indicator blinks. The device automatically restores the factory settings and restarts. After device restart, you can log into the web interface by accessing the default management IP address (10.44.77.200). 29