WEB-10XGF8 Web Smart Switch
“
Product Information
Specifications
- Product Name: WebSmart Switch
- Model: WEB-10XGF8
- Manual: Web Manual
- Revision History: Dec 20 2024 V 2.0 – The second edition
Product Usage Instructions
1. Foreword
The foreword section provides an introduction to the user
manual.
2. Web Page Login
To log in to the Network Management Client:
- Type in the default switch address:
http://192.168.2.1 and press Enter. - Description: Browser standards should be superior to IE 9.0,
Chrome 23.0, and Firefox 20.0. - Keep the IP network segment of the PC consistent with that of
the switch but differentiate the IP address as you log in. - Set PC’s IP address to 192.168.2.x and the
subnet mask to 255.255.255.0 for the first login
(1< x < 254). - A login window will appear where you need to type in the
default username of admin and the password of
admin. - Click Login to access the switch system.
3. Constitution of Client Interface
The typical operation interface of the Web network management
system is provided.
Frequently Asked Questions (FAQ)
Q: How can I reset the switch to factory settings?
A: To reset the switch to factory settings, locate the reset
button on the device and press and hold it for at least 10 seconds.
This will restore the switch to its default configuration.
“`
WebSmart Switch
WEB-10XGF8
Web Manual
Revision history Date
Version Description
Dec 20 2024 V 2.0
The second edition
2
Contents
1 Foreword………………………………………………………………………………………………………………………………… 7 1.1 Target Audience …………………………………………………………………………………………………………….. 7 1.2 Manual Convention……………………………………………………………………………………………………….. 7
2 Web Page Login ……………………………………………………………………………………………………………………. 7 2.1 Log in the Network Management Client…………………………………………………………………….. 7 2.2 Constitution of Client Interface ……………………………………………………………………………………. 8 2.3 Navigation Bar on Web Interface ………………………………………………………………………………… 8
3 Status ……………………………………………………………………………………………………………………………………. 12 3.1 System Information ……………………………………………………………………………………………………… 12 3.2 Statistics ………………………………………………………………………………………………………………………… 12 3.3 MAC Address Table……………………………………………………………………………………………………… 13 3.4 Reboot …………………………………………………………………………………………………………………………… 14
4 Network………………………………………………………………………………………………………………………………… 15 4.1 IP Address……………………………………………………………………………………………………………………… 15 4.2 DNS ……………………………………………………………………………………………………………………………….. 15 4.3 System Time …………………………………………………………………………………………………………………. 16
5 Port ……………………………………………………………………………………………………………………………………….. 18 5.1 Port Setting …………………………………………………………………………………………………………………… 18 5.2 Link Aggregation………………………………………………………………………………………………………….. 19 5.2.1 Group ……………………………………………………………………………………………………………………… 20 5.2.2 Port Setting ……………………………………………………………………………………………………………. 22 5.2.3 LACP ……………………………………………………………………………………………………………………….. 23 5.3 Jumbo Frame………………………………………………………………………………………………………………… 26 5.4 Port Security …………………………………………………………………………………………………………………. 26 5.5 Protected Port………………………………………………………………………………………………………………. 27 5.6 Storm Control……………………………………………………………………………………………………………….. 28 5.7 Mirroring……………………………………………………………………………………………………………………….. 29
6 VLAN …………………………………………………………………………………………………………………………………….. 31 6.1 VLAN ……………………………………………………………………………………………………………………………… 32
3
6.1.1 Create VALN ………………………………………………………………………………………………………….. 32 6.1.2 VLAN Configuration ……………………………………………………………………………………………… 34 6.1.3 Membership…………………………………………………………………………………………………………… 34 6.1.4 Port Setting ……………………………………………………………………………………………………………. 35 7 MAC Address Table…………………………………………………………………………………………………………….. 37 7.1 Static Address……………………………………………………………………………………………………………….. 38 7.2 Filtering Address ………………………………………………………………………………………………………….. 38 8 Spanning Tree ……………………………………………………………………………………………………………………… 39 8.1 Property ………………………………………………………………………………………………………………………… 40 8.2 Port Setting …………………………………………………………………………………………………………………… 41 8.3 MST Instance ………………………………………………………………………………………………………………… 43 8.4 MST Port Setting ………………………………………………………………………………………………………….. 44 8.5 Statistics ………………………………………………………………………………………………………………………… 48 9 ERPS………………………………………………………………………………………………………………………………………. 49 9.1 Property ………………………………………………………………………………………………………………………… 50 9.2 ERPS Instance ……………………………………………………………………………………………………………….. 50 10 Loopback……………………………………………………………………………………………………………………………. 52 11 Discovery ……………………………………………………………………………………………………………………………. 53 11.1 LLDP …………………………………………………………………………………………………………………………….. 54 11.2 Port Setting…………………………………………………………………………………………………………………. 55 11.3 MED Network Policy………………………………………………………………………………………………….. 56 11.4 MED Port Setting ……………………………………………………………………………………………………….. 57 11.5 Packet View ………………………………………………………………………………………………………………… 59 11.6 Local Information……………………………………………………………………………………………………….. 59 11.7 Neighbor …………………………………………………………………………………………………………………….. 60 11.8 Statistics ………………………………………………………………………………………………………………………. 60 12 Multicast …………………………………………………………………………………………………………………………….. 61 12.1 General………………………………………………………………………………………………………………………… 61 12.1.1 Property ……………………………………………………………………………………………………………….. 61 12.1.2 Group Address ……………………………………………………………………………………………………. 62
4
12.1.3 Router Port ………………………………………………………………………………………………………….. 63 12.2 IGMP Snooping ………………………………………………………………………………………………………….. 63
12.2.1 Property ……………………………………………………………………………………………………………….. 64 13 Security ………………………………………………………………………………………………………………………………. 65
13.1 Management Access …………………………………………………………………………………………………. 65 13.1.1 Management Service………………………………………………………………………………………….. 65
13.2 DHCP Snooping …………………………………………………………………………………………………………. 66 13.2.1 Property ……………………………………………………………………………………………………………….. 66 13.2.2 IMPV Binding ………………………………………………………………………………………………………. 68
14 QoS …………………………………………………………………………………………………………………………………….. 69 14.1 General………………………………………………………………………………………………………………………… 71 14.1.1 Property ……………………………………………………………………………………………………………….. 71 14.1.2 Queue Scheduling………………………………………………………………………………………………. 72 14.1.3 CoS Mapping ………………………………………………………………………………………………………. 72 14.1.4 DSCP Mapping ……………………………………………………………………………………………………. 73 14.2 Rate limit……………………………………………………………………………………………………………………… 75 14.2.1 Ingress / Egress Port…………………………………………………………………………………………… 75
15 Diagnostics ………………………………………………………………………………………………………………………… 76 15.1 Ping ……………………………………………………………………………………………………………………………… 76 15.2 Copper Test ………………………………………………………………………………………………………………… 77 15.3 Fiber Module………………………………………………………………………………………………………………. 77
16 Management……………………………………………………………………………………………………………………… 78 16.1 User Account………………………………………………………………………………………………………………. 78 16.2 Firmware……………………………………………………………………………………………………………………… 78 16.3 Configuration ……………………………………………………………………………………………………………… 79 16.3.1 Manual Upgrade …………………………………………………………………………………………………. 79 16.3.2 Save Configuration……………………………………………………………………………………………… 80 16.4 SNMP…………………………………………………………………………………………………………………………… 80 16.4.1 View………………………………………………………………………………………………………………………. 82 16.4.2 Group……………………………………………………………………………………………………………………. 83
5
16.4.3 Community ………………………………………………………………………………………………………….. 84 16.4.4 User ………………………………………………………………………………………………………………………. 85 16.4.5 Engine ID ……………………………………………………………………………………………………………… 86 16.4.6 Trap Event ……………………………………………………………………………………………………………. 87 16.4.7 Notification ………………………………………………………………………………………………………….. 87
6
1 Foreword
1.1 Target Audience
This manual is prepared for the installers and system administrators who are responsible for network installation, configuration and maintenance. It assumes that the user has understood all network communication and management protocols, as well as the technical terms, theoretical principles, practical skills, and expertise of devices, protocols and interfaces related to networking. Work experience in Graphical User Interface (GUI), Command-line Interface, Simple Network Management Protocol (SNMP) and Web Explorer is also required.
1.2 Manual Convention
The following approaches should prevail.
GUI Convention Interpretation
Caution
Description Describe operations and add necessary information. Remind the user of cautions as improper operations will result in data loss or equipment damage.
2 Web Page Login
2.1 Log in the Network Management Client
Type in the default switch address: http://192.168.2.1 and press “Enter”.
Description: Browser standards: superior to IE 9.0, Chrome 23.0 and Firefox 20.0 Keep the IP network segment of PC consistent with that of switch but differentiate the IP address as you log in. Set PC’s IP address of 192.168.2.x and the subnet mask of 255.255.255.0 for the first login (1< x 254). A login window appears as follows. Type in the default username of “admin” and the password of “admin”. Click the “Login” to see the switch system.
7
2.2 Constitution of Client Interface
The typical operation interface of Web network management system is as follows.
2.3 Navigation Bar on Web Interface
Menu items such as Status, Network, Port, VLAN, MAC Address Table, Spanning Tree,
ERPS, Multicast, Security, QoS, Diagnostics and Management are available on the web
network management client. Each item contains submenus. Navigation bar is detailed as
follows:
Menu Items Submenus
Secondary
Description
Submenus
8
Status Network
System Information
Port
Statistics
MAC Address Table
IP Address
DNS
System Time
Port
Port Setting
Link Aggregation
Group
Port Setting LACP
Jumbo Frame
Port Security
Protected Port Storm Control
Mirroring
VLAN
VLAN
Create VLAN
VLAN Configuration Membership
Port Setting
MAC Address Table
Static Address Filtering Address
Spanning
Property
Display the port state and product info Display the detailed port statistics
Display the MAC address table of the current device Configure and view the management IP address Configure and view the DNS and server setting Configure and view the current system time Configure and view all ports
Configure and view the port & strategy balancing algorithms contained in LAG Configure and view the LAG
Check LACP system priority and port configuration Configure and view the length of the max message forwarded by system Configure and view the rate limiting of port security, as well as port state Configure and view the port isolation
Configure and view the port storm policing Configure and view the port mirroring Configure and view the VLAN info of the device Configure and view the VLAN configuration of all ports Configure and view the port info of VLANs Configure and view the PVID and VLAN attributes of ports Configure and view the static MAC address tables of the device Configure and view the MAC address tables to be filtered Configure and view the STP state and
9
Tree ERPS Loopback Discovery
Multicast
attributes
Port Setting
Configure and view the port attributions of STP
MST Instance
Configure and view the instance attributes of STPs
MST Port Setting
Configure and view the instances (incl. port info) of STPs
Statistics
Configure and view the STP message statistics of each port
Property
Configure and view the ERPS global switch
ERPS Instance
Configure and view the ERPS Instance
Loopback Config
Configure and view the loopback configuration
LLDP
Property
Configure and view the attributes related to LLDP
Port Setting
Configure and view the transmitting & receiving state of LLDP at each port
MED Policy
Network Configure and view the MED network strategy table entry
MED Port Setting
Configure and view the MED state at each port
Packet View
Configure and view the detailed LLDP messages at each port
Local Information
Configure and view the LLDP and LLDP-MED state
Neighbor
Configure and view the LLDP neighbor info
Statistics
Configure and view the transmitting & receiving state of LLDP message at each port
General
Property
Configure and view the function configuration
Group Address
Configure and view the relevant static multicast info
Router Port
Configure and view the multicast routed port info
IGMP Snooping Property
Configure and view the switch, version, etc.
10
Security QoS
Diagnostics Management
Management Access DHCP Snooping
General
Rate Limit Ping Copper Test Fiber Module User Account Firmware Configuration
SNMP
Management Service Property IMPV Binding Property Queue Scheduling CoS Mapping DSCP Mapping Ingress/Egress Port
Manual Upgrade Manual Upgrade Save Configuration View Group Community User Engine ID Trap Event Notification
Configure and view the service management mode and relevant attributes Configure and view the switch and state Configure and view the binding tables of IP, MAC, Port and VLAN Configure and view the QoS switch and state Configure and view the algorithm of queue scheduling Configure and view the priority and local queue mapping table Configure and view the priority and local queue mapping table Configure and view the configuration of port rate limiting Network diagnostics by Ping
Electrical interface link diagnostics by VCT Check the SFP module at optical interfaces Configure and view the user info
Update software
Update configuration files
Save the configuration files supporting device running Configure and view the SNMP function view table entry Configure and view the SNMP group
Configure and view the SNMP Community Configure and view the SNMP user attributes Configure and view the SNMP and remote Engine IDs Configure and view the SNMP Trap switch and state Configure and view the SNMP Notification server state
11
3 Status
3.1 System Information
According to the switch connected, web network management panel directly displays the port and product info, incl.: number of ports, port states, product info, device states, function on-off states, etc. Instructions: 1. Click the “Status > System Information” in the navigation bar as follows:
Description: Mouseover a port to check the port No., type, rate and state. “Edit” the “System Name”, “Location” and “Contact” in the product info. “Apply” and finish.
3.2 Statistics
Introduce the detailed flow statistics at a port and the info to be refreshed or cleared manually by users.
12
1. Click the “Status > Port > Statistics” in the navigation bar as follows:
Description: “Clear” the flow statistics at the current port and refresh the page.
3.3 MAC Address Table
View MAC address table information Instructions: 1. Click the “Status > MAC Address Table” in the navigation bar as follows:
13
Interface data are as follows.
Query
Description
Items
MAC
Destination MAC Address
VLAN
VLAN ID belonging to MAC address
Port
Message egress corresponding to MAC address
Type
Dynamic MAC Address refers to the entry which will age with the set aging time. Switches can add entries based on the learning mechanism of MAC address or manual creation. Static MAC address refers to the specified table which is manually configured and won’t age. Management MAC address refers to the address at the management port.
3.4 Reboot
1. Click the “Reboot” on the upper right as guided as follows.
14
4 Network
4.1 IP Address
Change the management IP address on web interface. Instructions: 1. Click the “Network > IP Address” in the navigation bar to discover IPv4 address of 192.168.2.1/24 by default as follows
Note: make sure add changing vlan to corresponding port before change
4.2 DNS
DNS is short for Domain Name System to name computers and network services from units to domain hierarchies. A domain name consists of the dots separated by a series of words or abbreviations, each corresponding to a unique IP address. DNS is the server on the Internet that resolves domain names. Applicable to Internet and other TCP/IP networks, DNS name retrieves computers and services through user-friendly names. As one of the core Internet services, DNS is a distributed database that maps domain names and IP addresses mutually. Instructions: 1. Click on the “Network > DNS” in the navigation bar as follows.
15
Interface data are as follows.
Configuration Items
Description
DNS State
DNS switch
DNS Default Name
Enter the DNS default name
2. “Add” to configure DNS server.
3. “Apply” and finish as follows.
4.3 System Time
It is mainly used to configure the system time, and select the time source, daylight-
16
saving time, etc.
Instructions 1. Click on the “Network > System Time” in the navigation bar as follows.
Interface data are as follows.
Configuration Items
Description
Time Source
Select the time source in SNTP, PC or manual modes
Time Zone
Set the time zone
Address Type
Host name or IPv4 address (with time source set by SNTP)
Server Address
Server Address (with time source set by SNTP)
Server Port No. Server Port No. (with time source set by SNTP)
17
Date Time Type
Reimbursed Time Cyclic Mode Non-cyclic Mode
Date info: DD/MM/YYYY (with time source set in manual mode) Time info: SS/MM/HH (with time source set in manual mode) Daylight-saving time types are divided into None, cyclic, noncyclic, United States and Europe. Reimbursed Time of daylight-saving time Configure the cyclic mode of daylight-saving time Configure the non-cyclic mode of daylight-saving time
5 Port
5.1 Port Setting
Interfaces should be identified so that users can inquire and configure Ethernet interfaces as they want. Instructions: 1. Click the “Port > Port Setting” in the navigation bar:
2. Select the port(s) to be configured, and “Edit” as follows:
18
Interface data are as follows
Configuration
Description
Items
Port
Port list
Description
Port alias
State
Enable or disable port
Speed
Configurable auto negotiation. Interface rates including 100 Mbit/s and 1,000 Mbit/s and 10 Gbit/s are available to interfaces and are optional as required.
Duplex
Configurable auto negotiation with full or half duplexes.
Flow Control
After it is enabled on both local network and opposite network devices, the local one will notify the other to stop transmitting messages in the presence of network congestion. The opposite one will execute the command temporarily to ensure zero message loss. Disable-Disabled reception and transmission of PAUSE frame; Enable-Enabled reception and transmission of PAUSE frame; Auto negotiation-Negotiate PAUSE frame with opposite network devices automatically.
5.2 Link Aggregation
Link Aggregation broadens bandwidth and reliability by bundling a group of physical interfaces into a single logical interface. LAG (Link Aggregation Group) is a logical link bundled by multiple Ethernet links (EthTrunk).
Ceaselessly expanding network size increases users’ demands of link bandwidth and
19
reliability. Traditionally, high-speed interface board or the compatible equipment is usually replaced to optimize bandwidth, which is expensive and inflexible. Link Aggregation Technology bundles multiple physical interfaces into a single logical interface without upgrading hardware. Its backup mechanism not only improves reliability, but also shares the flow load on different physical links.
As shown below, Switch A is linked with Switch B through three Ethernet links which are bundled into an Eth-Trunk logical link. Its bandwidth equals to that of the three links in total, thus broadening the bandwidth. Meanwhile, these three links back up mutually to be more reliable.
Link Aggregation can meet the following demands: Insufficient bandwidth of two switches connected with one link. Insufficient reliability of two switches connected with one link. Link Aggregation can be divided into Manual Mode and LACP Mode in accordance with Link Aggregation Control Protocol (LACP) state.
In the first mode, Eth-Trunk establishment, member interface access should be added manually without LACP. It is also called the Load-sharing Mode because all links are involved in data forwarding and load sharing. In case any active link fails, LAG will average load with the remaining ones. This mode is preferred under the circumstance that two directly connected devices require a larger link bandwidth but has no access to LACP.
5.2.1 Group
Instructions for adding a Static Link Aggregation: 1. Click the “Port > Link Aggregation > Group”, select a load-balancing algorithm with
a radio button. “Apply” and finish as follows:
20
2. Select one of 8 LAGs available, “Edit” the configuration page as follows:
Interface data are as follows
Configuration Items
Description
LAG
There are 8 LAGs numbering from 1 to 8.
Name
Description of LAG, which can be modified as needed.
Type
Select from the manual mode and the LACP mode.
21
Member
Up to 8 member ports are available in LAG.
Illustration: As shown below, Switch A and Switch B connect VLAN 10 and 20 via Ethernet
respectively, with large data flow between them. Both Switch A and B are expected to provide superior link bandwidth for VLAN communication. Meanwhile, there should be the redundancy for reliable data transmission and links. Networking diagram LAG in manual mode
Instructions: 1. Create the ETH trunk interface in SwitchA and add a member interface to increase the link bandwidth. The configuration of SwitchB is like that of SwitchA. Click the “Port > Link Aggregation > Group”, choose “LAG 1” and port TE1, 2 and 3 and move them to the selected ports on the right. “Apply” and finish as follows.
5.2.2 Port Setting Attribute configuration of aggregation group member port
22
1. Click the “Port > Link Aggregation > Port Setting”, to enter the attribute configuration interface of aggregation group member port as follows:
5.2.3 LACP LACP (Link Aggregation Control Protocol), based on IEEE 802.3ad Standard,
dynamically aggregates and dis-aggregates links. It exchanges info with the opposite network devices through LACPDU (Link Aggregation Control Protocol Data Unit). After a port uses LACP, it will inform the opposite network device of system priority, system MAC, port priority and No., and operation Key by transmitting a LACPDU. The opposite device will compare such info with that saved by other ports after receiving it, thus reaching an agreement on port participation in or quitting from a dynamic aggregation.
Dynamic LACP aggregation is automatically created or deleted by system, that is, internal ports can be added or removed by themselves. Only the ports connected to a same device with the same rate, duplex, and basic configuration can be aggregated. Instructions for adding a dynamic link aggregation: 1. Click the “Port > Link Aggregation > Group” in the navigation bar, select the LAG ID
and LACP mode, “Edit” them as follows:
23
2. Click the “Port >Link Aggregation > LACP” in the navigation bar to configure the LACP attributes such as system priority, port priority and timeout method as follows:
Interface data are as follows Configuration Description Items
24
System Priority
Port Port Priority
Timeout
LACP determines the active and passive modes between two devices subject to priority standard. Port list
LACP determines the dynamic LAG member mode subject to the port priority with a superior system. It decides the transmission frequency of LACP messages.
Description:
Please make sure there is no member interface accessing the Eth-Trunk before changing its work pattern, otherwise it fails.
Work pattern of the local network devices should be consistent with that of the opposite network devices.
Illustration Ethernet Switch A aggregates 3 ports from TE1 to TE3 to Switch B, in order to share
the load by each member port. The following configurations are exampled by means of dynamic aggregation.
Description: The following is the configuration of Switch A only, which should stay the same with that of Switch B for port aggregation. Instructions: 1. Click the “Port > Link Aggregation > Group” in the navigation bar, “Edit” with LAG 2, select TE1-TE3 in LACP mode. “Apply” and finish as follows:
25
5.3 Jumbo Frame
Set the MTU (Maximum Transmission Unit) of the port Instructions: 1. Click the “Port > Jumbo Frame” in the navigation bar, enter Jumbo Frame configuration
interface as follows:
5.4 Port Security
The port security feature records the Ethernet MAC address connected to the switch port through the MAC address table, and only one MAC address can communicate through this port. When packets sent by other MAC addresses pass through this port, port security features prevent it. Using port security features can prevent unauthorized devices from accessing the network and enhance security. In addition, port security features can also be used to prevent MAC address table from filling up due to MAC address flooding Instructions: 1. Click the “Port > Port Security” in the navigation bar, enter port security configuration
26
interface as follows:
2. Click the “Port > Port Security” in the navigation bar, select the port and “Edit” to enter the port level configuration interface as follows:
5.5 Protected Port
Messages of broadcast, multicast, etc. will flood at each port even though the flow needs no mutual communication sometimes. Under this circumstance, port isolation can separate the messages between two ports. Instructions: 1. Click the “Port > Protected Port” in the navigation bar, check the port(s) to be isolated, “Edit” to switch this function as follows:
Instructions for achieve port isolation: 1. Click the “Port > Protected Port” in the navigation bar, check and “Edit” the TE1, 2 and 3 to be isolated. “Apply” and finish as follows:
27
2. TE1, 2 and 3 fail to communicate mutually like other non-isolated ports.
5.6 Storm Control
Storms generated via broadcast, unknown multicast and unicast messages are prevented as follows. These messages will be suppressed subject to packet rates respectively. The average rate of the messages received by monitoring interfaces will be compared with the max threshold configured during an inspection interval. Configured storm policing will be performed at this interface if the average rate exceeds the max threshold.
When a L2 Ethernet interface receives the broadcast, unknown multicast or unicast messages, the device will forward them to other L2 interfaces in a same VLAN (Virtual Local Area Network) if the egress interface cannot be recognized according to destination MAC addresses. As a result, broadcast storm may occur to degrade device operation performance.
Three kinds of message flow can be controlled by storm policing characteristics to stay away from broadcast storms. Instructions: 1. Click the “Port > Storm Control” in the navigation bar to configure the attributes related
to storm policing such as mode as follows:
2. Select the appropriate port and “Edit” it by configuring the policing rates of broadcast, unknown multicast and unicast storms at each port.
28
3. Configure info such as storm switch and rate, “Apply” and finish as follows:
5.7 Mirroring
Port Mirroring copies the message of a specified switch port to the destination port. The copied port is the Source Port, and the copying port is the Destination Port. Destination Port accesses to data inspection devices so that users can analyze the messages received to monitor network and troubleshoot as follows:
29
Instance PC1 and PC2 access Switch A through interface TE1 and TE2 respectively. Users intend to monitor the messages transmitted from PC2 to PC1.
Instructions: 1. Click the “Port > Mirroring” in the navigation bar. 4 sets of flow mirroring rules can
be configured as follows:
2. Select one session and “Edit” it in the mirroring group configuration interface:
30
Interface data are as follows
Configuration
Description
Items
Session ID
The switch has 4 session IDs by default.
State
The mirroring group can be enabled or not.
Monitor Port Ingress Port
Only one ordinary physical port can be selected, excluding link aggregation port and source port. Any message received will be mirrored to the destination port.
Egress Port
Any message transmitted will be mirrored to the destination port.
6 VLAN
VLAN is formulated not restricted to physical locations, which means the hosts in a same VLAN can be placed at will. As shown below, each VLAN, as a broadcast domain, divides a physical LAN into logical LANs. Hosts can exchange messages by means of
31
traditional communication. For the hosts in different VLANs, the device such as router or L3 switch is a must.
VLAN is superior to the traditional Ethernet in terms of: Broadcast domain coverage: the broadcast message in a LAN is limited in a VLAN to
save the bandwidth and handle the network-related issues more efficiently. LAN security: VLAN hosts fail to communicate with each other since the messages
are separated by the broadcast domain in the data link layer. They need a router or a Layer 3 switch for Layer 3 forwarding. Flexibility of creating a virtual working team: VLAN can create a virtual working team beyond the control of physical network. Users have access to the network without changing the configuration if their physical locations are moving within the scope. This management switch is compatible with VLAN types based on 802.1Q, protocols, MAC, and ports. For default configuration, 802.1Q VLAN mode should be adopted. Port VLAN is divided subject to a switch’s interface No. Network administrator gives each switch interface a different PVID, namely a port default VLAN. If a data frame without a VLAN tag flows into a switch interface with a PVID, it will be marked with the same PVID, or it will get rid of an additional tag even though the interface has a PVID. The solution to a VLAN frame depends on the interface type, which eases member definition but re-configures VLAN in case of member mobility.
6.1 VLAN
6.1.1 Create VALN
Instructions for creating a new VLAN: 1. Click the “VLAN > VLAN > Create VLAN” to select a name in the valid VLAN box, move
32
it to the VLAN creating box on the right. “Apply” and finish as follows:
2. The VLAN created will be displayed in the VLAN Table. Users can “Edit” the VLAN as follows:
Interface data are as follows.
Configuration Items Description
VLAN ID
It is required to select an ID ranging from 1 to 4,094. For example, 1-3,5,7 and 9. LAN 1 is the default, which won’t be
repeated in another new VLAN.
Name
It is optional to modify the VLAN description as required.
33
6.1.2 VLAN Configuration
There are two methods. One is to add multiple ports under a single VLAN. The other is to add a port to multiple VLANs. They are configured according to different purposes. Instructions for the first method to add the current port to a specified VLAN 1. Click the “VLAN > VLAN > VLAN Configuration” in the navigation bar, select the VLAN
ID on the upper left, and then click the port info as follows:
Interface data are as follows.
Configuration Items Description
VLAN
VLAN ID to be configured
Port
Port list
Mode
VLAN mode of port
Membership
Member roles at the VLAN port: Excluded: the port is out of this VLAN Tagged: the port is a tagged member of this VLAN Untagged: the port is an untagged member of this VLAN
PVID
Whether this VLAN is the port PVID
Forbidden
Whether the VLAN message is forbidden to be forwarded at this port
6.1.3 Membership
Instructions for the second method to add the current port to a specified VLAN 1. Click the “VLAN > VLAN > Membership” in the navigation bar, select the port to be
configured and “Edit” to configure its attributes:
34
Interface data are as follows.
Configuration Items Description
Port
Port list
Mode
VLAN mode of port
Membership
The port is the attribute of VLAN ID and VLAN: Forbidden: do not forward the VLAN message Excluded: the port out of the VLAN Tagged: The Tagged member of the VLAN Untagged: The Untagged member of the VLAN PVID: whether the VLAN is the port PVLAN
6.1.4 Port Setting
Trunk configuration. Connected with other switches, Trunk interfaces mainly connect trunk links to allow the VLAN frames to flow through. IEEE 802.1q is the encapsulation protocol of Trunk link and considers the formal standard for Virtual Bridged Local Area Networks. It changes the frame format of Ethernet by adding a 4-bit 802.1q Tag between the source MAC address field and the protocol field.
802.1q frame format
Meanings of 802.1q tag fields
Field
Length Name
Analysis
TPID
2 bytes
Tag Protocol Identifier to It refers to the 802.1q Tag frame
describe the frame type
when the value is 0x8,100, which
will be discarded if relevant
equipment fails to receive it.
35
PRI
3 bits Frame Priority
It ranges from 0 to 7, with the
higher priority represented by
larger number. Data frame with
higher priority will be sent
preferentially in case of switch
congestion.
CFI
1 bit Canonical Format Indicator to MAC address is classical when
reveal whether the MAC CFI is 0 and non-classical when
address is classical or not.
CFI is 1. It promotes the
compatibility between Ethernet
and token ring. CFI will be 0 in
the Ethernet.
VID
12 bits VLAN ID indicates the VLAN to It ranges from 0 to 4,095, with 1
which the frame belongs.
to 4,094 valid since 0 and 4,095
are the protocol retention
values.
Packets sent by each switch supporting 802.1q protocol contain a VLAN ID to indicate the VLAN to which the switch belongs. Therefore, Ethernet frames are divided into two types as follows in a VLAN switching network: Tagged frame: it refers to the frame adding a 4-bit 802.1q Tag. Untagged frame: it refers to the original frame without a 4-bit 802.1q Tag.
Connected with other switches, Trunk interfaces mainly connect trunk links to allow the VLAN frames to flow through.
Instructions for trunk interface configuration: 1. Click the “VLAN > VLAN > Port Setting” in the navigation bar, select the port and “Edit”
it to configure the attributes:
Interface data are as follows.
Configuration Items
Description
Port
Port No. to be configured
36
Mode
PVID Accept Frame Type
Ingress Filtering Uplink TPID
VLAN mode of port Hybrid: port in this mode serves as the member of Tagged and Untagged ports of VLANs Access: port in this mode serves as the only member of VLAN Trunk: port in this mode serves as the only Untagged member of PVID and the Tagged member of VLANs Tunnel: Port Q-in-Q VLAN Port native VLAN
Message types received by ports All: all messages Tag Only: only Tagged messages will be received Untag Only: only Untagged messages will be received A switch to decide to filter VLAN messages excluded at the port Whether in uplink mode or not
Identification No. of VLAN Tag
7 MAC Address Table
Ethernet switches are mainly innovated to forward according to the purposes in the data link layer. That is, MAC address will transmit the messages to corresponding ports according to the purposes. MAC address forwarding table is a L2 table illustrating MAC addresses and forwarding ports, which is the basis of fast forwarding of L2 messages. MAC address forwarding table contains following data: Destination MAC Address VLAN ID belonging to port Forwarding ingress No. of this device There are two message forwarding types according to MAC address table info: Unicast mode: the switch directly transmits the messages from the table’s egress
when MAC address forwarding table contains corresponding entries with the destination MAC address. Broadcast mode: When the switch receives the messages with the destination address full of F-bits, or there is no entry corresponding to the MAC destination address in the forwarding table, the switch will forward the messages to all ports excluding the receiving port in this way.
37
7.1 Static Address
Static table is manually configured by users and distributed to each interface board, which won’t age. Instructions: 1. Click the “MAC Address Table > Static Address” as follows:
Interface data are as follows.
Configurati Description
on Items
MAC
Required. Enter the new MAC address e.g.: HH:HH:HH:HH:HH:HH
VLAN
Required. Specify the VLAN ID
Port
Required. Select the interface type and enter the interface name
Description: it must be the member port of the configured VLANs.
2. Fill in corresponding configuration items. 3. “Apply” and finish.
7.2 Filtering Address
The switch discards the matched data frame by configuration Instructions: 1. Click the “MAC Address Table > Filtering Address” as follows:
38
Interface data are as follows. Configuration Items MAC Address VLAN
Description MAC address to be filtered VLAN of MAC address
8 Spanning Tree
Redundant links are often used for link backup and network reliability in the Ethernet
switching network. However, such links will generate loops on the switching network,
leading to broadcast storm, unstable MAC address list and other faults, thus worsening users’ communication quality, or even interrupting the communication. As a result, STP
(Spanning Tree Protocol) appears.
Same with the development of other protocols, from the original STP defined in IEEE
802.1D, to RSTP (Rapid Spanning Tree Protocol) defined in IEEE 802.1W and to MSTP (Multiple Spanning Tree Protocol) defined in IEEE 802.1S, STP keeps upgrading.
MSTP is compatible with RSTP and STP while RSTP is compatible with STP. The
contrast among these 3 protocols is shown in the table.
The contrast among 3 protocols
STP
Characteristic
Application
STP
A tree rid of loops as the solution to All VLANs can be shared
broadcast storms and redundant backups. without discrimination in user
It converges slowly.
or business flow.
RSTP A tree rid of loops as the solution to
broadcast storms and redundant backups.
It converges rapidly.
MSTP A tree rid of loops as the solution to Distinguish the user and
broadcast storms and redundant backups. business flow for load sharing.
It converges rapidly.
Different VLANs forward the
Spanning trees balance the load among flow through separate
VLANs. Flow of different VLANs will be spanning trees.
39
forwarded subject to paths. After STP is deployed, the following objectives can be achieved by calculating the loops with topology: Loop elimination: eliminate possible communication loops by blocking redundant
links. Link backups: activate redundant links to restore network connectivity if the active
path fails.
8.1 Property
Configure STP global parameters. In specific network environment, STP parameters of some devices must be adjusted to achieve the best performance. Instructions: 1. Click the “Spanning Tree > Property” in the navigation bar as follows:
Interface data are as follows.
Configuration
Description
Items
State
It is checked by default to enable the spanning tree on behalf of
switches.
40
Operation Mode Path Cost BPDU Handling Priority Hello Time Max Age
3 modes are available, namely STP and RSTP. In Long mode and Short mode The method to handle the BPDU messages received by the device Port priority Intervals between Hello messages Max aging time
Forward Delay
Forward delay time
Tx Hold Count Region Name
Revision
Specify the Tx-hold-count used to limit the maximum numbers of packets transmission per second MST domain name. Switch master board sets the MAC address by default. Together with the VLAN mapping table of MST domain and the revision level of MSTP, switch domain name will jointly determine the domain to which it belongs. The MSTP revision number
Max Hop
Specify the number of hops in an MSTP region before the BPDU
is discarded
2. Fill in corresponding configuration items. 3. “Apply” and finish.
8.2 Port Setting
In specific network environment, STP parameters of some devices need to be adjusted for the best performance. 1. Click the “Spanning Tree > Port Setting” in the navigation bar, select the port and “Edit”
to configure its attributes:
41
Interface data are as follows. Configuration Description Items
Port
The port No. to configure attributes
State
Enable STP or not
Path Cost Priority
Enter the path cost value of the interface Use IEEE 802.1t Standard with the value ranging from 0 to 200,000,000 Select the port priority with smaller value representing higher priority. Interface priority affects the role of the interface on the specified MSTI. On different MSTI, users can configure the priorities for a same interface. As a result, flow of different VLANs can be forwarded along physical links to achieve VLAN load sharing. Description: MSTP will recalculate the interface role and migrate its state when its priority changes.
Edge Port
Rather than another switch or network segment, the edge port should be connected directly to user terminals. It can quickly transit to the forward state since topology changes create no loops. An
42
BPDU Filter BPDU Guard
Point-to-Point
edge port under configuration can be quickly transitioned to forward state by STP. To achieve this, it is recommended that Ethernet ports connected directly to user terminals should be configured as edge ports. Enable BPDU Filter or not
Enable BPDU Guard or not. Unchecked by default. If BPDU Guard is enabled, the device will shut down the interfaces receiving BPDU and notify the NMS. Such interfaces can only be restored manually by network administrators. Select enabled, shutdown, and auto modes. Auto mode: it indicates the connect state between the default auto inspection and point-to-point links. Enabled mode: it indicates the specific port is connected to the point-to-point links. Shutdown mode: it indicates the specific port fails to connect the point-to-point links.
2. Fill in corresponding configuration items. 3. “Apply” and finish.
8.3 MST Instance
A switching network is divided into multiple domains by MSTP, with independent spanning trees formed within each domain. Each Spanning Tree is called a MSTI (Multiple Spanning Tree Instance), and each domain is called a MST Region: Multiple Spanning Tree Region).
Description:
An instance is a group of VLANs that reduces communication cost and resource utilization rate. Each instance, independently calculated with topology, can balance the load. VLANs with the same topology can be mapped to a same instance, and they are forwarded according to the port state in corresponding MSTP instances.
In simple terms, mapped to the specified MST instance, one or more VLANs are distributed to a spanning tree at a time. Instructions: 1. Click the “Spanning Tree > MST Instance” in the navigation bar, “Edit” the selected
spanning tree instances to be configured as follows:
43
Interface data are as follows.
Configuration Description Items
MSTI
Instance No. of spanning trees ranges from 0 to 15
VLAN
VLAN No. mapped from instances
Priority
Set the priority of a multiple of 4,096 for the specified instance, ranging from 0 to 65,535 with 32,768 as default.
2. Fill in corresponding configuration items. 3. “Apply” and finish as follows.
8.4 MST Port Setting
Instructions: 1. Click the “Spanning Tree > MST Port Setting” in the navigation bar, check the port to
be modified from the list of all ports of the device, “Edit” to enter the detailed configuration interface as follows:
44
Interface data are as follows.
Configuration Description Items
MSTI
Select the instance for configuration through the drop-down box in the upper left.
Port
Select the port to be configured by users
Path Cost
Enter the path cost value of the interface Use IEEE 802.1t Standard with the value ranging from 0 to 200,000,000
Priority
Select the port priority with smaller value representing higher priority. Interface priority affects the role of the interface on the specified MSTI. On different MSTI, users can configure the priorities for a same interface. As a result, flow of different VLANs can be forwarded along physical links to achieve VLAN load sharing.
45
Port Role
Port State Mode Type
Description: MSTP will recalculate the interface role and migrate its state when its priority changes. 3 types of root ports, namely specified port, backup port and disabled port. Including 3 states, namely Discarding, Forwarding and Disabled Current STP mode The port types in the instance contain boundary and internal ports
2. Fill in corresponding configuration items. 3. “Apply” and finish. Example of MSTP function configuration:
Switch A, B, C and D all run MSTP which introduces instances to share the load of VLAN10 and 20. MSTP can set up the VLAN mapping table to associate VLANs with spanning tree instances, and to map VLAN10 from instance 1 and VLAN20 from instance 2.
Instructions: 1. Switch A, B, C and D create VLAN10 and 20 to configure the L2 forwarding function of
the devices on the Ring. Click the “VLAN > VLAN > Create VLAN” in the navigation bar, fill in the corresponding configurations. “Apply” and finish as follows.
46
2. VLANs are added to the switch ports ingress loops. Click the “VLAN > VLAN > Membership” in the navigation bar, select the ring port to be configured, move VLAN10 and 20 to the right box and mark them with “Tagged”. “Apply” and finish:
3. Click the “Spanning Tree > Property” in the navigation bar, and choose MSTP mode as follows:
47
4. Configure the VLAN mapping between instance MSTI1 and MSTI2. Click the “Spanning Tree > MST Instance” to fill in corresponding parameters, and “Add” them as follows:
Note: Set the priority of MSTI1 to 0 and MSTI2 to 4,096 before configuring Switch A. Set the priority of MSTI1 to 4,096 and MSTI2 to 0 before configuring Switch B. The priority must be a multiple of 4,096.
5. Switch B serves as the root bridge of MSTI2 and the backup root bridge of MSTI1 in the domain. Please refer to 5 for instructions.
6. The tree-shaped network will eliminate loops.
8.5 Statistics
Instructions: 1. Click the “Spanning Tree > Statistics” in the navigation bar, entry port statistics as
48
follows:
9 ERPS
ERPS (Ethernet Ring Protection Switching) is an Ethernet ring link layer technology with high reliability and stability. It can prevent broadcast storms caused by data loops when the Ethernet ring is complete, and can quickly restore communication paths between various nodes in the ring network in case of link failures in the Ethernet ring, with high convergence speed.
It is based on the ERPS ring and consists of several nodes. By blocking the RPL Owner port and controlling other ordinary ports, the port’s state switches between Forwarding and Blocking, achieving the goal of eliminating the loop. Simultaneously utilizing mechanisms such as control VLAN, data VLAN, and MST protection instance to better
49
implement the functionality of ERPS.
9.1 Property
Configure and view the opening and closing of the global ERPS function Instructions: 1. Click on the “ERPS > Property” menu in the navigation bar to enter the function configuration interface
9.2 ERPS Instance
In an ERPS network, a ring can support multiple instances, each of which is a logical ring. Each instance has its own protocol channel, data channel, and owner node; Each instance serves as an independent protocol entity, maintaining its own state and data. Instructions: 1. Click the “ERPS > ERPS Instance”Enter the ERPS instance creation interface and click on the application to create an instance, as shown in the following figure:
2. Select the instance and click the modify button to enter the instance configuration interface, as shown in the following figure:
50
Configuration Items Ring Status Mel Protected Instance
Control VLAN WTR Time
Guard Time
Description Disable or Enable Message level selection 0-7 The VLAN that transmits ERPS protocol packets and data packets must be mapped to the protection instance, so that the ERPS protocol can forward or block these packets according to its blocking principle. Otherwise, VLAN packets may generate a broadcast storm in the looped network, resulting in network unavailability Control VLAN for transmitting ERPS protocol packets In revertive mode, the RPL Owner port is released due to other link failures. When the fault recovers, wait for the WTR timer to time out and then block the RPL Owner port again Start the Guard timer when the port detects link recovery, to prevent unnecessary network oscillation caused by residual
51
Work Mode
Ring ID Ring Type Port0 Port1 Port Role
R-APS messages caused by forwarding delay on the ring network After the ERPS link returns to normal, it can be determined whether to re block the RPL owner port by setting the Revertive/Non Revertive mode of ERPS. ERPS ring number 0 is the main ring, only support main ring ERPS ring member port, used for the transmission of protocol and data packets on the ERPS ring ERPS ring member port, used for the transmission of protocol and data packets on the ERPS ring NormalOwnerneighbournext-neighbour
Note The ERPS function only satisfies a switching recovery delay of less than 20ms for the
optical port Only support main ring.
10 Loopback
The configuration of the Loopback Detection function is as follows: global and port ring network enable and disable configurations are performed on the switch ports, which can be changed by the user
The time interval for ring network detection and the automatic recovery time period for ring network ports. By enabling global and port capabilities, the system can detect loop conditions in the network, thereby reducing the occurrence of loop storms. Supports two working modes: automatic detection and manual detection. 1. Click on the “Loopback > Loopback Config” menu in the navigation bar to enter the function
52
11 Discovery
LLDP (Link Layer Discovery Protocol) is defined in IEEE 802.1ab. It is a standard L2 discovery method which integrates the info such as management addresses, device and interface identifications of local network devices and transmits to the neighbor devices. After receiving the info, they will save it in form of standard MIB (Management Information Base) for NMS query and link communication judgment.
It can also integrate the info and transmit to its own remote devices. The info received by the local network device will be kept in the form of MIB. The following shows how it works. Block diagram of LLDP principles
LLDP is realized based on: LLDP module updates its local system MIB, as well as the customized extension MIB,
through the interaction between LLDP agent and MIBs of physical topology, entity, interface and other types. Encapsulate the info of local network device into LLDP frames and transmit to the remote device.
53
Receive the LLDP frame sent by the remote device to update LLDP remote system MIB and customized extension MIB.
Master the info of remote device such as connection interface and MAC address through the transmitting & receiving function of LLDP agent.
The local system MIB stores local device info, including device and interface IDs, system name and description, interface description, network management address, etc.
The remote system MIB stores local device info, including device and interface IDs, system name and description, interface description, network management address, etc. Based on LLDP, LLDP-MED allows other units to expand. The info checked by network
devices facilitates fault analysis and deepens the accurate understanding of network topology by management system.
11.1 LLDP
Instructions: 1. Click the “Discovery > LLDP > Property” in the navigation bar as follows.
Interface data are as follows.
Configuration
Description
Items
State LLDP Handling
Enable or disable the LLDP
LLDP messages will be processed by means of “Filtering”, “Bridging” and “Flooding” when disabling the LLDP.
TLV
Advertise 30s by default ranging from 5 to 32,768s.
Interval
54
Hold Multiplier
Transmission period product with 4 by default ranges from 2 to 10. Transmission period * product should be no more than 65,535.
Reinitializing Delay 2s by default ranging from:1 to 10s.
Transmit Delay
2s by default ranging from:1 to 8,191s.
Fast Start Repeat 3s by default of the LLDP-MED port ranging from 1 to 10s. Count
Ethernet message encapsulated with LLDPDU (LLDP Data Unit) are recognized as LLDP message. Each TLV is a unit of LLDPDU carried with specified info. 2. Fill in corresponding configuration items 3. “Apply” and finish.
11.2 Port Setting
Instructions 1. Click the “Discovery > LLDP > Port Setting” in the navigation bar as follows.
Interface data are as follows.
Configuration
Description
Items
Port
Port list
Mode Selected TLV
LLDP mode include: Transmit, Receive, Normal, Disable, the default is Normal Transmit: transmit LLDP messages only; Receive: receive LLDP messages only; Normal: transmit and receive LLDP messages; Disable: neither transmit nor receive LLDP messages. Info of selected TLV and VLAN
LLDP can work in 4 patterns: Transmit: transmit LLDP messages only; Receive: receive LLDP messages only; Normal: transmit and receive LLDP messages; Disable: neither transmit nor receive LLDP messages. 2. Check corresponding port and “Edit” the port configuration. “Apply” and finish as follows.
55
Interface data are as follows.
Configuration Items
Description
Port
Port list
Mode
LLDP mode include: Transmit, Receive, Normal, Disable, the default is Normal Transmit: transmit LLDP messages only; Receive: receive LLDP messages only; Normal: transmit and receive LLDP messages; Disable: neither transmit nor receive LLDP messages.
Optional TLV
Select the info of TLV and VLAN
802.1 VLAN Name Select the VLAN name
11.3 MED Network Policy
MED is based on IEEE 802.1ab. LLDP is the neighbor discovery protocol of IEEE, which can be extended by other organizations. Information identified from network devices, such as switches and wireless access points, can help with fault analysis and allow management systems to accurately understand the network topology. Instructions 1. Click the “Discovery > LLDP > MED Network Policy” in the navigation bar as follows.
56
Interface data are as follows.
Configuration
Description
Items
Policy ID
Policy ID number
Application
Configure and publish network policy TLV
VLAN
VLAN number
VLAN Tag
VLAN Mode, optional Tagged or Untagged
Priority
CoS for services
DSCP
DSCP for services
11.4 MED Port Setting
Instructions 1. Click the “Discovery > LLDP > MED Port Setting” in the navigation bar as follows.
57
Interface data are as follows.
Configuration
Description
Items
Entry
Serial No. of MED port setting
Port
Port list
State
Port enable status
Network Policy Configure and publish network policy TLV
58
Location Inventory
Configure and publish location TLV Configure and publish inventory TLV
11.5 Packet View
Instructions 1. Click the “Discovery > LLDP > Packet View” in the navigation bar as follows.
11.6 Local Information
Instructions for device summary: 1. Click the “Discovery > LLDP > Local Information” in the navigation bar as follows.
Instructions for port status table: 2. Click the “Discovery > LLDP > Local Information” in the navigation bar as follows.
59
11.7 Neighbor
Instructions for LLDP neighbor displaying 1. Click the “Discovery > LLDP > Neighbor” in the navigation bar as follows.
11.8 Statistics
Instructions: 1. Click the “Discovery > LLDP > Statistics” in the navigation bar as follows.
60
12 Multicast
12.1 General
12.1.1 Property Instructions: 1. Click the “Multicast > General > Property” in the navigation bar as follows.
61
12.1.2 Group Address
According to the previous request mode of multicast, the multicast router will copy and forward data to each VLAN containing receivers when users in different VLANs request the same multicast group, which wastes a great deal of bandwidth. IGMP Snooping configures multicast VLAN by connecting the different users of switch ports to a same multicast VLAN to receive multicast data. In this way, multicast flow can only be transmitted within a multicast VLAN, thus saving bandwidth. In addition, security and bandwidth are guaranteed because multicast VLANs are completely isolated from user VLANs. Instructions 1. Click the “Multicast > Group Address”, “Add” a new static multicast item, and “Edit” the
existing ones as follows:
Interface data are as follows.
Configuration Items
Description
VLAN
VLAN ID to which the multicast group belongs. Drop down to select an existing VLAN.
Multicast Address Enter the multicast address
Member
Add multicast member(s)
2. Fill in corresponding configuration items. 3. “Apply” and finish as follows.
62
12.1.3 Router Port Configure and view multicast router port
Instructions: 1. Click the “Multicast > General > Router Port” in the navigation bar as follows.
12.2 IGMP Snooping
IGMP Snooping (Internet Group Management Protocol Snooping) is a constraint mechanism on L2 devices to manage and control multicast groups. By analyzing the IGMP messages received, L2 devices establish a mapping between ports and MAC multicast addresses and forward the multicast data accordingly. As shown below, multicast data are transmitted on L2 without IGMP snooping. When IGMP snooping runs, known multicast group data are transmitted to specified receivers while unknown multicast data are still on Layer 2.
63
12.2.1 Property
IGMP Snooping is on the L2 switch between the multicast routers and the user hosts, applicable to deploy IPv4 networks. It is configured in a VLAN to snoop the IGMP/MLD messages transmitted between routers and hosts, and to establish a L2 forwarding table for multicast data, in order to manage and control the multicast data forwarding in L2 network.
Global IGMP Snooping function should be enabled since it is disabled by default. Instructions: 1. Click the “Multicast > IGMP Snooping > Property”, select the VLAN to be configured
from the created VLAN info, and “Edit” the details as follows:
Interface data are as follows. Configuration Items Description
VLAN
VLAN ID to be configured
State
Enable or disable the IGMP Snooping in this VLAN
Router Port Auto Enable or disable route port automatic learning Learn
Immediate leave
Multicast members leave quickly
Query Robustness Query Interval
The Robustness Variable allows tuning for the expected packet loss on a network The interval between message queries
Query Max Response Timeout (over the max response time) of a query message Interval
Last Member Query Max number of queries for a specified group Counter
Last Member Query The interval between message queries for a specified group
64
Interval 2. Fill in corresponding configuration items. 3. “Apply” and finish.
13 Security
13.1 Management Access
13.1.1 Management Service Instructions for Telnet: 1. Click the “Security > Management Access > Management Service”, enter management
service interface as follows:
Instructions for SNMP: 2. Click the “Security > Management Access > Management Service”, enter management
service interface as follows:
65
13.2 DHCP Snooping
For sake of security, the network administrator may need to record the IP address of a user surfing the Internet and to confirm the correspondence between the IP address obtained from DHCP Server and the host’s MAC address.
Switch can record the user’s IP address through the secure DHCP relay at the network layer.
Switch can monitor DHCP messages and record the user’s IP address through DHCP Snooping at the data link layer. In addition, private DHCP Server in the network may lead to wrong IP address for the user. To ensure that users obtain IP addresses through legal DHCP Server, the DHCP Snooping security mechanism divides the ports into Trust Port and Untrust Port.
Trust Port directly or indirectly connects legal DHCP Server. It forwards the DHCP messages received to ensure the correct IP address for DHCP Client. Untrust Port connects illegal DHCP Server. DHCPACK and DHCPOFFER messages received from the DHCP Server on the Untrust Port will be discarded to prevent incorrect IP addresses.
Typical Networking of DHCP Snooping The following methods are used to obtain the IP address and user MAC address from DHCP Server: Snooping the DHCPREQUEST message Snooping the DHCPACK message
13.2.1 Property Enable DHCP Snooping
66
Instructions: 1. Click the “Security > DHCP Snooping > Property”. DHCP Snooping interface is divided
into global configuration and port configuration. Select the port to be modified in the port configuration and “Edit” the details as follows:
Interface data are as follows. Configuration Items Description
State
Enable and disable the DHCP Snooping
VLAN
Valid VLAN No. of DHCP Snooping
Port
Configure the port No. of DHCP Snooping
Trust
Whether the port is a Trust Port
Client
Address Whether the consistency inspection for Client addresses is
Inspection
enabled
Rate Limit
Whether the port enables rate limit and configures the value
2. Fill in corresponding configuration items. 3. “Apply” and finish as follows.
67
13.2.2 IMPV Binding
In DHCP network, users (non-DHCP users) obtaining IP addresses statically may attack the network by imitating DHCP Server, constructing DHCP Request message, etc. Legal DHCP users may suffer from security risks when using the network normally.
Enabling the static MAC entries based on the interface generated by DHCP Snooping binding table can prevent such attacks. The device then, based on the DHCP Snooping binding table corresponding to all DHCP users, automatically executes the command to generate static MAC entries and disable the interface’s learning ability of dynamic entries. Only messages that match the source MAC and static MAC entries can flow through the interface. Therefore, for non-DHCP users, only the messages of static MAC entries that are manually configured by the administrators can flow through, while others will be discarded. Instructions: 1. Click the “Security > IP Source Guard > IMPV Binding”, “Add” a new binding group of
IP-MAC-Port-VLAN as follows:
Interface data are as follows. Configuration Description Items
Port
The port No. of binding group
VLAN
VLAN ID bound
Binding
Select the binding relation from IPMV and IPV
MAC Address MAC address bound
IP Address IP address bound
2. Fill in corresponding configuration items. 3. “Apply” and finish as follows.
68
14 QoS
QoS (Quality of Service) assesses the ability of service providers to meet customer needs and the ability of transmitting packets over the Internet. Diversified services can be assessed based on different aspects. QoS usually refers to the evaluation of service capabilities that support core requirements such as bandwidth, delay, delay variation, and packet loss rate during delivery. Bandwidth, also known as throughput, refers to the average business flow within a certain period of time, with the unit of Kbit/s. Delay refers to the average time required for business flowing through the network. For a network device, the followings are general levels of delay requirements. There are two delay levels, that is, the high-priority business can be served as soon as possible by scheduling method of priority queue, while the low-priority business gets services after that. Delay variation refers to the time change of business flowing through the network. Packet loss rate refers to the percentage of lost business flow during transmission. As modern transmission systems are very reliable, information is often lost in network congestion. Packet loss due to queue overflow is the most common situation.
All messages in a traditional IP network are treated equally. Every network device processes the messages on a FIFO basis, and makes every effort to transmit them to destinations without guaranteeing reliability, transfer delay, or other performance.
Network service quality is constantly improved as new applications keep springing up in the rapidly changing IP network. For example, VoIP, video and other delay-sensitive services have set higher standards on message transmission delay. Message transmission in a short period has been the common trend. In order to support voice, video and data services with different requirements, the network needs to identify business types and provide corresponding services.
The ability to distinguish business types is the prerequisite to provide corresponding services, so the traditional best-effort service no longer meets the application needs. Therefore, QoS comes into being. It regulates the network flow to avoid and handle network congestion and reduce packet loss rate. Meanwhile, users can enjoy dedicated bandwidths while business can improve service quality, thus perfecting the network service capacity.
QoS priorities vary with message types. For instance, the VLAN message uses 802.1p, also known as the CoS (Class of Service) field, while the IP message uses DSCP. To maintain the priority, these fields need to be mapped at the gateway connected with various networks when messages flow through the network. 802.1p priority in the VLAN frame header
Typically, VLAN frames are interacted between Layer 2 devices. The PRI field (i.e. 802.1p priority), or CoS field, in the VLAN frame header identifies the quality of service requirements according to the definitions in IEEE 802.1Q. 802.1p priority in the VLAN frame
69
The 802.1Q header contains 3-bit PRI fields. PRI field defines 8 CoS of business priority ranging from 7 to 0 from high to low. IP Precedence/DSCP Field
According to RFC791 definition, ToS (Type of Service) domain in the IP message header is composed of 8 bits. Among them, the 3-bit long Precedence field, as located in the following, identifies the IP message priority. IP Precedence/DSCP Field
0 to 2 bits are Precedence fields representing the 8 priorities of message transmission ranging from 7 to 0 from high to low, with either Level 7 or 6 as the highest priority that is generally reserved for routing or updating network control communication. User-level applications only have access to Level 0 to 5.
ToS domain, in addition to Precedence fields, also includes D, T and R bits: D-bit represents the Delay requirement (0 for normal delay and 1 for low delay). T-bit represents the throughput (0 for normal throughput and 1 for high throughput). R-bit represents the reliability (0 for normal reliability and 1 for high reliability). ToS domain reserves the 6 and 7 bits.
RFC1349 redefines the ToS domain by adding a C-bit to represent the Monetary Cost. The IETF DiffServ group then redefines the 0 to 5 bits of ToS domain in the IPv4 message header of RFC2474 as DSCP and renames it as DS (Differentiated Service) byte as shown in the figure above.
The first 6 bits (0-5 bits) of DS field distinguish the DSCP (DS Code Point), and the higher 2 bits (6-7 bits) are reserved. The lower 3 bits (0-2 bits) are CSCP (Class Selector Code Point), with the same CSCP value representing the DSCP of the same class. DS nodes select corresponding PHB (Per-Hop Behavior) according to DSCP values.
70
14.1 General
14.1.1 Property
Network congestion resulting from the competition for resource use rights among messages at the same time is usually solved by queue scheduling, thus avoiding intermittent congestions. Queue scheduling technologies include SP (Strict-Priority), WRR (Weighted Round Robin). Instructions for global and port scheduling configuration 1. Click the “QoS > General > Property” in the navigation bar as follows.
Interface data of global configuration are as follows.
Configuration Items
Description
State
Switch of global QoS function
Trust Mode
It can be divided into CoS, DSCP, CoS-DSCP
Interface data of port configuration are as follows.
Configuration Items
Description
CoS
Ranging from 0 to 7
Port Trust Mode Switch of port QoS function
CoS
Mark the CoS field
DSCP
Mark the DSCP field
71
14.1.2 Queue Scheduling 1. Click the “QoS > General > Queue Scheduling”. “Apply” and finish as follows.
Interface data are as follows.
Configuration Items Description
Strict Priority
SP mode
WRR
WRR mode
Weight
Bandwidth percentage of WRR accounted for by Queue
14.1.3 CoS Mapping
1. Click the “QoS > General > CoS Mapping” in the navigation bar. “Apply” and finish as follows.
72
Interface data are as follows.
Configuration Items
Description
CoS
802.1p priority
Queue
Port queue
14.1.4 DSCP Mapping 1. Click the “QoS > General > DSCP Mapping”. “Apply” and finish as follows.
73
Interface data are as follows.
Configuration
Description
Items
DSCP
Value of IP DHCP domain priority
Queue
Port queue
74
14.2 Rate limit
14.2.1 Ingress / Egress Port It refers to the rate restriction on transmitting and receiving data at physical interfaces. Restrict the rate limiting at the egress before transmitting flow, thus controlling all
outgoing message flow; Restrict the rate limiting at the ingress before receiving flow, thus controlling all
incoming message flow; Instructions: 1. Click the “QoS > Rate Limit > Ingress / Egress Port” in the navigation bar to choose a
rate-limiting port and check the current configuration as follows:
2. Select the port (s) for rate limiting, “Edit” it at the bottom to switch the function and specify the rate. “Apply” and finish as follows:
Interface data are as follows.
75
Configuration Items
Ingress
Enabled
Rate
Egress
Enabled
Rate
Description Rate limiting switch Rate ranges from 16 to 10,000,000 Kbps Rate limiting switch Rate ranges from 16 to 10,000,000 Kbps
15 Diagnostics
15.1 Ping
Ping command checks the availability of specified IP addresses and host names and transmits statistics accordingly. Instructions: 1. Click the “Diagnostics > Ping” in the navigation bar to enter a host name or an IP
address, as well as the number of tests as follows:
2. Click the “Ping” to accept the packet-transmitting test from system to verify address validity, and output the result as follows:
76
15.2 Copper Test
Copper test evaluates the ingress cable state and locates the faults (about 5 m by error) according to the reflected voltage strength Instructions: 1. Click the “Diagnostics > Copper Test” in the navigation bar to select a port for test as
follows:
2. Click the “Copper Test” and output the result as follows:
15.3 Fiber Module
Can be used to view optical module DDM information Instructions: 1. Click the “Diagnostics > Fiber Module” in the navigation bar to select a port for test as follows:
77
16 Management
16.1 User Account
Users can check and modify the current username, password and authority of the switch. Instructions: 1. Click the “Management > User Account” in the navigation bar to discover the
username of “admin” and the privilege of “Admin” by default as follows:
2. “Add” a new user account and “Edit” the selected user attribute as follows:
16.2 Firmware
System version firmware upgrade Instructions: 1. Click the “Management > Firmware > Manual Upgrade” in the navigation bar as follows:
78
16.3 Configuration
16.3.1 Manual Upgrade System configuration upgrade or backup
Instructions for configuration file upgrade: 1. Click the “Management > Configuration > Manual Upgrade” click the “Upgrade” in
mode of “TFTP” or “HTTP”, select the corresponding files to be upgraded (servers should be illustrated in TFTP mode). “Apply” and finish as follows:
Instructions for file backup configuration: 2. click the “Backup” in mode of “TFTP” or “HTTP”, select the files or logs to be upgraded
(servers should be illustrated in TFTP mode). “Apply” and finish as follows.
79
16.3.2 Save Configuration Save system configuration or restore configuration to factory default
Instructions: 1. Click the “Management > Configuration > Save Configuration” in the navigation bar
as follows:
Note: Click the “Factory Reset” and “Device Restart” to restore factory settings. Save the “Running Configuration” as the “Start Configuration” (which can be saved as “Backup Configuration” or “Running Configuration”) and the “Backup Configuration” (which can be saved as the “Start Configuration” or “Running Configuration”). Instructions for the second method of system preservation: 2. Click the “Save” on the upper right to save the running configuration as the start configuration as follows.
16.4 SNMP
SNMP (Simple Network Management Protocol) is widely used in TCP/IP network. It manages devices by the central computer which operates network management software (i.e. network management workstation). SNMP is:
80
Simple: The polling-driving SNMP has the fundamental functionality set that is applicable to small-scale environment with fast speed and low cost. Besides, UDPdriven SNMP is compatible with most devices. Powerful: SNMP aims to ensure the management info transmission between two nodes so that administrators can retrieve, modify and troubleshoot the info easily. There are 3 common versions, namely SNMPv1, v2c and v3. Its system contains NMS (Network Management System), Agent, Management object and MIB (Management Information Base).
NMS, as the management center, will manage all devices. Each device under management includes the resident Agent, MIB and management objects. NMS interacts with the Agent running on the management object which will operate the MIB to execute NMS orders.
SNMP management model
NMS As the network administrator, NMS manages/monitors network devices by SNMP on
its server. It can request the Agent to inquire or modify specified parameter(s). NMS can receive the Trap actively sent by the Agent to be updated with the states of the managed devices. Agent As an agent process of the managed devices, it maintains device data and responds to the NMS requests by reporting management data. Agent will fulfill relevant orders through MIB Table and transmit the results back to NMS after receiving its request. Devices will take the initiative to transmit info related to the current statues of devices to NMS through Agent once a fault or another event occurs. Management object It refers to the object under management. Each device may have more than one objects, including a piece of hardware (e.g. an interface board), partial hardware and
81
software (e.g. routing protocol), as well as other configuration item sets MIB MIB is a database specifying the variables maintained by the management object (i.e.
the info that can be inquired and set by the Agent). MIB defines the attributes of the management object, including the name, state, access right and data type. The following functions can be realized through MIB: Agent will master the instant device info by inquiring MIB and set the state configuration items by changing MIB.
Note: Please enable the SNMP global switch before connecting to SNMP Please enter the path below to configure the global switch for SNMP, or refer to
section 12.1.1 Menu Path: “Security > Management Access > Management Service”
16.4.1 View
1. Click the “Management > SNMP > View” in the navigation bar as follows.
Interface data are as follows.
Configuration
Description
Items
View
View name
OID Subtree Type
View OID View type: “Included” or “Excluded”
2. “Add” the corresponding configuration, “Apply” and finish.
82
16.4.2 Group 1. Click the “Management > SNMP > Group” in the navigation bar as follows.
Interface data are as follows.
Configuration Items
Description
Group
Group name
Version
V1, V2, V3
Security Level
Security level
View
Views are divided into view reading, writing and notification.
2. Click the “Add” to fill in corresponding configuration. “Apply” and finish.
83
16.4.3 Community 1. Click the “Management > SNMP > Community” in the navigation bar as follows.
Interface data are as follows.
Configuration
Description
Items
Community
Community configuration
Group
Group name
View
View name
Access:
Authority: read only or read-write
2. “Add” the corresponding configuration. “Apply” and finish.
84
16.4.4 User 1. Click the “Management > SNMP > User” in the navigation bar as follows.
Interface data are as follows. Configuration Items User Group Security Level Authentication Method Privacy Method
Description Username Group name Security level Authentication mode Encryption mode
2. “Add” the corresponding configuration. “Apply” and finish.
85
16.4.5 Engine ID 1. Click the “Management > SNMP > Engine ID” in the navigation bar as follows.
2. Click the “User Defined” to fill in corresponding ID value. “Apply” and finish.
86
16.4.6 Trap Event 1. Click the “Management > SNMP > Trap Event” in the navigation bar as follows.
Interface data are as follows.
Configuration Items
Description
Authentication Failure
Authentication error
Link Up / Down Port link up/down
Cold start
Cold start
Warm start
Warm start
2. “Apply” and finish.
16.4.7 Notification 1. Click the “Management > SNMP > Notification” in the navigation bar as follows.
87
Interface data are as follows.
Configuration Items Address Type
Description Address type: “Host Name”, “IPv4” or “IPv6”
Server Address Server address info
Version Type
SNMP versions: v1, v2 and v3 Notification type: “Trap” or “Inform”
Community / User Community or username
Security Level
Security Level
Server port
162 by default ranging from 1 to 65,535
Timeout
Timeout period: 15s by default ranging from 1 to 300s.
Retry
The retry interval ranges from 1 to 255s with 3s by default.
2. “Add” the corresponding configuration. “Apply” and finish.
88
Documents / Resources
![]() |
airlive WEB-10XGF8 Web Smart Switch [pdf] User Manual WEB-10XGF8 Web Smart Switch, WEB-10XGF8, Web Smart Switch, Smart Switch, Switch |