WEB-10XGF8 Web Smart Switch

Product Information

Specifications

  • Product Name: WebSmart Switch
  • Model: WEB-10XGF8
  • Manual: Web Manual
  • Revision History: Dec 20 2024 V 2.0 – The second edition

Product Usage Instructions

1. Foreword

The foreword section provides an introduction to the user
manual.

2. Web Page Login

To log in to the Network Management Client:

  1. Type in the default switch address:
    http://192.168.2.1 and press Enter.
  2. Description: Browser standards should be superior to IE 9.0,
    Chrome 23.0, and Firefox 20.0.
  3. Keep the IP network segment of the PC consistent with that of
    the switch but differentiate the IP address as you log in.
  4. Set PC’s IP address to 192.168.2.x and the
    subnet mask to 255.255.255.0 for the first login
    (1< x < 254).
  5. A login window will appear where you need to type in the
    default username of admin and the password of
    admin.
  6. Click Login to access the switch system.

3. Constitution of Client Interface

The typical operation interface of the Web network management
system is provided.

Frequently Asked Questions (FAQ)

Q: How can I reset the switch to factory settings?

A: To reset the switch to factory settings, locate the reset
button on the device and press and hold it for at least 10 seconds.
This will restore the switch to its default configuration.

“`

WebSmart Switch
WEB-10XGF8
Web Manual

Revision history Date

Version Description

Dec 20 2024 V 2.0

The second edition

2

Contents
1 Foreword………………………………………………………………………………………………………………………………… 7 1.1 Target Audience …………………………………………………………………………………………………………….. 7 1.2 Manual Convention……………………………………………………………………………………………………….. 7
2 Web Page Login ……………………………………………………………………………………………………………………. 7 2.1 Log in the Network Management Client…………………………………………………………………….. 7 2.2 Constitution of Client Interface ……………………………………………………………………………………. 8 2.3 Navigation Bar on Web Interface ………………………………………………………………………………… 8
3 Status ……………………………………………………………………………………………………………………………………. 12 3.1 System Information ……………………………………………………………………………………………………… 12 3.2 Statistics ………………………………………………………………………………………………………………………… 12 3.3 MAC Address Table……………………………………………………………………………………………………… 13 3.4 Reboot …………………………………………………………………………………………………………………………… 14
4 Network………………………………………………………………………………………………………………………………… 15 4.1 IP Address……………………………………………………………………………………………………………………… 15 4.2 DNS ……………………………………………………………………………………………………………………………….. 15 4.3 System Time …………………………………………………………………………………………………………………. 16
5 Port ……………………………………………………………………………………………………………………………………….. 18 5.1 Port Setting …………………………………………………………………………………………………………………… 18 5.2 Link Aggregation………………………………………………………………………………………………………….. 19 5.2.1 Group ……………………………………………………………………………………………………………………… 20 5.2.2 Port Setting ……………………………………………………………………………………………………………. 22 5.2.3 LACP ……………………………………………………………………………………………………………………….. 23 5.3 Jumbo Frame………………………………………………………………………………………………………………… 26 5.4 Port Security …………………………………………………………………………………………………………………. 26 5.5 Protected Port………………………………………………………………………………………………………………. 27 5.6 Storm Control……………………………………………………………………………………………………………….. 28 5.7 Mirroring……………………………………………………………………………………………………………………….. 29
6 VLAN …………………………………………………………………………………………………………………………………….. 31 6.1 VLAN ……………………………………………………………………………………………………………………………… 32
3

6.1.1 Create VALN ………………………………………………………………………………………………………….. 32 6.1.2 VLAN Configuration ……………………………………………………………………………………………… 34 6.1.3 Membership…………………………………………………………………………………………………………… 34 6.1.4 Port Setting ……………………………………………………………………………………………………………. 35 7 MAC Address Table…………………………………………………………………………………………………………….. 37 7.1 Static Address……………………………………………………………………………………………………………….. 38 7.2 Filtering Address ………………………………………………………………………………………………………….. 38 8 Spanning Tree ……………………………………………………………………………………………………………………… 39 8.1 Property ………………………………………………………………………………………………………………………… 40 8.2 Port Setting …………………………………………………………………………………………………………………… 41 8.3 MST Instance ………………………………………………………………………………………………………………… 43 8.4 MST Port Setting ………………………………………………………………………………………………………….. 44 8.5 Statistics ………………………………………………………………………………………………………………………… 48 9 ERPS………………………………………………………………………………………………………………………………………. 49 9.1 Property ………………………………………………………………………………………………………………………… 50 9.2 ERPS Instance ……………………………………………………………………………………………………………….. 50 10 Loopback……………………………………………………………………………………………………………………………. 52 11 Discovery ……………………………………………………………………………………………………………………………. 53 11.1 LLDP …………………………………………………………………………………………………………………………….. 54 11.2 Port Setting…………………………………………………………………………………………………………………. 55 11.3 MED Network Policy………………………………………………………………………………………………….. 56 11.4 MED Port Setting ……………………………………………………………………………………………………….. 57 11.5 Packet View ………………………………………………………………………………………………………………… 59 11.6 Local Information……………………………………………………………………………………………………….. 59 11.7 Neighbor …………………………………………………………………………………………………………………….. 60 11.8 Statistics ………………………………………………………………………………………………………………………. 60 12 Multicast …………………………………………………………………………………………………………………………….. 61 12.1 General………………………………………………………………………………………………………………………… 61 12.1.1 Property ……………………………………………………………………………………………………………….. 61 12.1.2 Group Address ……………………………………………………………………………………………………. 62
4

12.1.3 Router Port ………………………………………………………………………………………………………….. 63 12.2 IGMP Snooping ………………………………………………………………………………………………………….. 63
12.2.1 Property ……………………………………………………………………………………………………………….. 64 13 Security ………………………………………………………………………………………………………………………………. 65
13.1 Management Access …………………………………………………………………………………………………. 65 13.1.1 Management Service………………………………………………………………………………………….. 65
13.2 DHCP Snooping …………………………………………………………………………………………………………. 66 13.2.1 Property ……………………………………………………………………………………………………………….. 66 13.2.2 IMPV Binding ………………………………………………………………………………………………………. 68
14 QoS …………………………………………………………………………………………………………………………………….. 69 14.1 General………………………………………………………………………………………………………………………… 71 14.1.1 Property ……………………………………………………………………………………………………………….. 71 14.1.2 Queue Scheduling………………………………………………………………………………………………. 72 14.1.3 CoS Mapping ………………………………………………………………………………………………………. 72 14.1.4 DSCP Mapping ……………………………………………………………………………………………………. 73 14.2 Rate limit……………………………………………………………………………………………………………………… 75 14.2.1 Ingress / Egress Port…………………………………………………………………………………………… 75
15 Diagnostics ………………………………………………………………………………………………………………………… 76 15.1 Ping ……………………………………………………………………………………………………………………………… 76 15.2 Copper Test ………………………………………………………………………………………………………………… 77 15.3 Fiber Module………………………………………………………………………………………………………………. 77
16 Management……………………………………………………………………………………………………………………… 78 16.1 User Account………………………………………………………………………………………………………………. 78 16.2 Firmware……………………………………………………………………………………………………………………… 78 16.3 Configuration ……………………………………………………………………………………………………………… 79 16.3.1 Manual Upgrade …………………………………………………………………………………………………. 79 16.3.2 Save Configuration……………………………………………………………………………………………… 80 16.4 SNMP…………………………………………………………………………………………………………………………… 80 16.4.1 View………………………………………………………………………………………………………………………. 82 16.4.2 Group……………………………………………………………………………………………………………………. 83
5

16.4.3 Community ………………………………………………………………………………………………………….. 84 16.4.4 User ………………………………………………………………………………………………………………………. 85 16.4.5 Engine ID ……………………………………………………………………………………………………………… 86 16.4.6 Trap Event ……………………………………………………………………………………………………………. 87 16.4.7 Notification ………………………………………………………………………………………………………….. 87
6

1 Foreword
1.1 Target Audience
This manual is prepared for the installers and system administrators who are responsible for network installation, configuration and maintenance. It assumes that the user has understood all network communication and management protocols, as well as the technical terms, theoretical principles, practical skills, and expertise of devices, protocols and interfaces related to networking. Work experience in Graphical User Interface (GUI), Command-line Interface, Simple Network Management Protocol (SNMP) and Web Explorer is also required.

1.2 Manual Convention

The following approaches should prevail.

GUI Convention Interpretation
Caution

Description Describe operations and add necessary information. Remind the user of cautions as improper operations will result in data loss or equipment damage.

2 Web Page Login
2.1 Log in the Network Management Client
Type in the default switch address: http://192.168.2.1 and press “Enter”.
Description: Browser standards: superior to IE 9.0, Chrome 23.0 and Firefox 20.0 Keep the IP network segment of PC consistent with that of switch but differentiate the IP address as you log in. Set PC’s IP address of 192.168.2.x and the subnet mask of 255.255.255.0 for the first login (1< x 254). A login window appears as follows. Type in the default username of “admin” and the password of “admin”. Click the “Login” to see the switch system.
7

2.2 Constitution of Client Interface
The typical operation interface of Web network management system is as follows.

2.3 Navigation Bar on Web Interface

Menu items such as Status, Network, Port, VLAN, MAC Address Table, Spanning Tree,

ERPS, Multicast, Security, QoS, Diagnostics and Management are available on the web

network management client. Each item contains submenus. Navigation bar is detailed as

follows:

Menu Items Submenus

Secondary

Description

Submenus

8

Status Network

System Information

Port

Statistics

MAC Address Table

IP Address

DNS

System Time

Port

Port Setting

Link Aggregation

Group

Port Setting LACP

Jumbo Frame

Port Security

Protected Port Storm Control

Mirroring

VLAN

VLAN

Create VLAN

VLAN Configuration Membership

Port Setting

MAC Address Table

Static Address Filtering Address

Spanning

Property

Display the port state and product info Display the detailed port statistics
Display the MAC address table of the current device Configure and view the management IP address Configure and view the DNS and server setting Configure and view the current system time Configure and view all ports
Configure and view the port & strategy balancing algorithms contained in LAG Configure and view the LAG
Check LACP system priority and port configuration Configure and view the length of the max message forwarded by system Configure and view the rate limiting of port security, as well as port state Configure and view the port isolation
Configure and view the port storm policing Configure and view the port mirroring Configure and view the VLAN info of the device Configure and view the VLAN configuration of all ports Configure and view the port info of VLANs Configure and view the PVID and VLAN attributes of ports Configure and view the static MAC address tables of the device Configure and view the MAC address tables to be filtered Configure and view the STP state and

9

Tree ERPS Loopback Discovery
Multicast

attributes

Port Setting

Configure and view the port attributions of STP

MST Instance

Configure and view the instance attributes of STPs

MST Port Setting

Configure and view the instances (incl. port info) of STPs

Statistics

Configure and view the STP message statistics of each port

Property

Configure and view the ERPS global switch

ERPS Instance

Configure and view the ERPS Instance

Loopback Config

Configure and view the loopback configuration

LLDP

Property

Configure and view the attributes related to LLDP

Port Setting

Configure and view the transmitting & receiving state of LLDP at each port

MED Policy

Network Configure and view the MED network strategy table entry

MED Port Setting

Configure and view the MED state at each port

Packet View

Configure and view the detailed LLDP messages at each port

Local Information

Configure and view the LLDP and LLDP-MED state

Neighbor

Configure and view the LLDP neighbor info

Statistics

Configure and view the transmitting & receiving state of LLDP message at each port

General

Property

Configure and view the function configuration

Group Address

Configure and view the relevant static multicast info

Router Port

Configure and view the multicast routed port info

IGMP Snooping Property

Configure and view the switch, version, etc.

10

Security QoS
Diagnostics Management

Management Access DHCP Snooping
General
Rate Limit Ping Copper Test Fiber Module User Account Firmware Configuration
SNMP

Management Service Property IMPV Binding Property Queue Scheduling CoS Mapping DSCP Mapping Ingress/Egress Port
Manual Upgrade Manual Upgrade Save Configuration View Group Community User Engine ID Trap Event Notification

Configure and view the service management mode and relevant attributes Configure and view the switch and state Configure and view the binding tables of IP, MAC, Port and VLAN Configure and view the QoS switch and state Configure and view the algorithm of queue scheduling Configure and view the priority and local queue mapping table Configure and view the priority and local queue mapping table Configure and view the configuration of port rate limiting Network diagnostics by Ping
Electrical interface link diagnostics by VCT Check the SFP module at optical interfaces Configure and view the user info
Update software
Update configuration files
Save the configuration files supporting device running Configure and view the SNMP function view table entry Configure and view the SNMP group
Configure and view the SNMP Community Configure and view the SNMP user attributes Configure and view the SNMP and remote Engine IDs Configure and view the SNMP Trap switch and state Configure and view the SNMP Notification server state

11

3 Status
3.1 System Information
According to the switch connected, web network management panel directly displays the port and product info, incl.: number of ports, port states, product info, device states, function on-off states, etc. Instructions: 1. Click the “Status > System Information” in the navigation bar as follows:
Description: Mouseover a port to check the port No., type, rate and state. “Edit” the “System Name”, “Location” and “Contact” in the product info. “Apply” and finish.
3.2 Statistics
Introduce the detailed flow statistics at a port and the info to be refreshed or cleared manually by users.
12

1. Click the “Status > Port > Statistics” in the navigation bar as follows:
Description: “Clear” the flow statistics at the current port and refresh the page.
3.3 MAC Address Table
View MAC address table information Instructions: 1. Click the “Status > MAC Address Table” in the navigation bar as follows:
13

Interface data are as follows.

Query

Description

Items

MAC

Destination MAC Address

VLAN

VLAN ID belonging to MAC address

Port

Message egress corresponding to MAC address

Type

Dynamic MAC Address refers to the entry which will age with the set aging time. Switches can add entries based on the learning mechanism of MAC address or manual creation. Static MAC address refers to the specified table which is manually configured and won’t age. Management MAC address refers to the address at the management port.

3.4 Reboot
1. Click the “Reboot” on the upper right as guided as follows.

14

4 Network
4.1 IP Address
Change the management IP address on web interface. Instructions: 1. Click the “Network > IP Address” in the navigation bar to discover IPv4 address of 192.168.2.1/24 by default as follows
Note: make sure add changing vlan to corresponding port before change
4.2 DNS
DNS is short for Domain Name System to name computers and network services from units to domain hierarchies. A domain name consists of the dots separated by a series of words or abbreviations, each corresponding to a unique IP address. DNS is the server on the Internet that resolves domain names. Applicable to Internet and other TCP/IP networks, DNS name retrieves computers and services through user-friendly names. As one of the core Internet services, DNS is a distributed database that maps domain names and IP addresses mutually. Instructions: 1. Click on the “Network > DNS” in the navigation bar as follows.
15

Interface data are as follows.

Configuration Items

Description

DNS State

DNS switch

DNS Default Name

Enter the DNS default name

2. “Add” to configure DNS server.

3. “Apply” and finish as follows.

4.3 System Time
It is mainly used to configure the system time, and select the time source, daylight-
16

saving time, etc.
Instructions 1. Click on the “Network > System Time” in the navigation bar as follows.

Interface data are as follows.

Configuration Items

Description

Time Source

Select the time source in SNTP, PC or manual modes

Time Zone

Set the time zone

Address Type

Host name or IPv4 address (with time source set by SNTP)

Server Address

Server Address (with time source set by SNTP)

Server Port No. Server Port No. (with time source set by SNTP)

17

Date Time Type
Reimbursed Time Cyclic Mode Non-cyclic Mode

Date info: DD/MM/YYYY (with time source set in manual mode) Time info: SS/MM/HH (with time source set in manual mode) Daylight-saving time types are divided into None, cyclic, noncyclic, United States and Europe. Reimbursed Time of daylight-saving time Configure the cyclic mode of daylight-saving time Configure the non-cyclic mode of daylight-saving time

5 Port
5.1 Port Setting
Interfaces should be identified so that users can inquire and configure Ethernet interfaces as they want. Instructions: 1. Click the “Port > Port Setting” in the navigation bar:

2. Select the port(s) to be configured, and “Edit” as follows:
18

Interface data are as follows

Configuration

Description

Items

Port

Port list

Description

Port alias

State

Enable or disable port

Speed

Configurable auto negotiation. Interface rates including 100 Mbit/s and 1,000 Mbit/s and 10 Gbit/s are available to interfaces and are optional as required.

Duplex

Configurable auto negotiation with full or half duplexes.

Flow Control

After it is enabled on both local network and opposite network devices, the local one will notify the other to stop transmitting messages in the presence of network congestion. The opposite one will execute the command temporarily to ensure zero message loss. Disable-Disabled reception and transmission of PAUSE frame; Enable-Enabled reception and transmission of PAUSE frame; Auto negotiation-Negotiate PAUSE frame with opposite network devices automatically.

5.2 Link Aggregation
Link Aggregation broadens bandwidth and reliability by bundling a group of physical interfaces into a single logical interface. LAG (Link Aggregation Group) is a logical link bundled by multiple Ethernet links (EthTrunk).
Ceaselessly expanding network size increases users’ demands of link bandwidth and
19

reliability. Traditionally, high-speed interface board or the compatible equipment is usually replaced to optimize bandwidth, which is expensive and inflexible. Link Aggregation Technology bundles multiple physical interfaces into a single logical interface without upgrading hardware. Its backup mechanism not only improves reliability, but also shares the flow load on different physical links.
As shown below, Switch A is linked with Switch B through three Ethernet links which are bundled into an Eth-Trunk logical link. Its bandwidth equals to that of the three links in total, thus broadening the bandwidth. Meanwhile, these three links back up mutually to be more reliable.
Link Aggregation can meet the following demands: Insufficient bandwidth of two switches connected with one link. Insufficient reliability of two switches connected with one link. Link Aggregation can be divided into Manual Mode and LACP Mode in accordance with Link Aggregation Control Protocol (LACP) state.
In the first mode, Eth-Trunk establishment, member interface access should be added manually without LACP. It is also called the Load-sharing Mode because all links are involved in data forwarding and load sharing. In case any active link fails, LAG will average load with the remaining ones. This mode is preferred under the circumstance that two directly connected devices require a larger link bandwidth but has no access to LACP.
5.2.1 Group
Instructions for adding a Static Link Aggregation: 1. Click the “Port > Link Aggregation > Group”, select a load-balancing algorithm with
a radio button. “Apply” and finish as follows:
20

2. Select one of 8 LAGs available, “Edit” the configuration page as follows:

Interface data are as follows

Configuration Items

Description

LAG

There are 8 LAGs numbering from 1 to 8.

Name

Description of LAG, which can be modified as needed.

Type

Select from the manual mode and the LACP mode.

21

Member

Up to 8 member ports are available in LAG.

Illustration: As shown below, Switch A and Switch B connect VLAN 10 and 20 via Ethernet
respectively, with large data flow between them. Both Switch A and B are expected to provide superior link bandwidth for VLAN communication. Meanwhile, there should be the redundancy for reliable data transmission and links. Networking diagram LAG in manual mode

Instructions: 1. Create the ETH trunk interface in SwitchA and add a member interface to increase the link bandwidth. The configuration of SwitchB is like that of SwitchA. Click the “Port > Link Aggregation > Group”, choose “LAG 1” and port TE1, 2 and 3 and move them to the selected ports on the right. “Apply” and finish as follows.
5.2.2 Port Setting Attribute configuration of aggregation group member port
22

1. Click the “Port > Link Aggregation > Port Setting”, to enter the attribute configuration interface of aggregation group member port as follows:
5.2.3 LACP LACP (Link Aggregation Control Protocol), based on IEEE 802.3ad Standard,
dynamically aggregates and dis-aggregates links. It exchanges info with the opposite network devices through LACPDU (Link Aggregation Control Protocol Data Unit). After a port uses LACP, it will inform the opposite network device of system priority, system MAC, port priority and No., and operation Key by transmitting a LACPDU. The opposite device will compare such info with that saved by other ports after receiving it, thus reaching an agreement on port participation in or quitting from a dynamic aggregation.
Dynamic LACP aggregation is automatically created or deleted by system, that is, internal ports can be added or removed by themselves. Only the ports connected to a same device with the same rate, duplex, and basic configuration can be aggregated. Instructions for adding a dynamic link aggregation: 1. Click the “Port > Link Aggregation > Group” in the navigation bar, select the LAG ID
and LACP mode, “Edit” them as follows:
23

2. Click the “Port >Link Aggregation > LACP” in the navigation bar to configure the LACP attributes such as system priority, port priority and timeout method as follows:
Interface data are as follows Configuration Description Items
24

System Priority
Port Port Priority
Timeout

LACP determines the active and passive modes between two devices subject to priority standard. Port list
LACP determines the dynamic LAG member mode subject to the port priority with a superior system. It decides the transmission frequency of LACP messages.

Description:
Please make sure there is no member interface accessing the Eth-Trunk before changing its work pattern, otherwise it fails.
Work pattern of the local network devices should be consistent with that of the opposite network devices.
Illustration Ethernet Switch A aggregates 3 ports from TE1 to TE3 to Switch B, in order to share
the load by each member port. The following configurations are exampled by means of dynamic aggregation.

Description: The following is the configuration of Switch A only, which should stay the same with that of Switch B for port aggregation. Instructions: 1. Click the “Port > Link Aggregation > Group” in the navigation bar, “Edit” with LAG 2, select TE1-TE3 in LACP mode. “Apply” and finish as follows:
25

5.3 Jumbo Frame
Set the MTU (Maximum Transmission Unit) of the port Instructions: 1. Click the “Port > Jumbo Frame” in the navigation bar, enter Jumbo Frame configuration
interface as follows:
5.4 Port Security
The port security feature records the Ethernet MAC address connected to the switch port through the MAC address table, and only one MAC address can communicate through this port. When packets sent by other MAC addresses pass through this port, port security features prevent it. Using port security features can prevent unauthorized devices from accessing the network and enhance security. In addition, port security features can also be used to prevent MAC address table from filling up due to MAC address flooding Instructions: 1. Click the “Port > Port Security” in the navigation bar, enter port security configuration
26

interface as follows:
2. Click the “Port > Port Security” in the navigation bar, select the port and “Edit” to enter the port level configuration interface as follows:
5.5 Protected Port
Messages of broadcast, multicast, etc. will flood at each port even though the flow needs no mutual communication sometimes. Under this circumstance, port isolation can separate the messages between two ports. Instructions: 1. Click the “Port > Protected Port” in the navigation bar, check the port(s) to be isolated, “Edit” to switch this function as follows:
Instructions for achieve port isolation: 1. Click the “Port > Protected Port” in the navigation bar, check and “Edit” the TE1, 2 and 3 to be isolated. “Apply” and finish as follows:
27

2. TE1, 2 and 3 fail to communicate mutually like other non-isolated ports.
5.6 Storm Control
Storms generated via broadcast, unknown multicast and unicast messages are prevented as follows. These messages will be suppressed subject to packet rates respectively. The average rate of the messages received by monitoring interfaces will be compared with the max threshold configured during an inspection interval. Configured storm policing will be performed at this interface if the average rate exceeds the max threshold.
When a L2 Ethernet interface receives the broadcast, unknown multicast or unicast messages, the device will forward them to other L2 interfaces in a same VLAN (Virtual Local Area Network) if the egress interface cannot be recognized according to destination MAC addresses. As a result, broadcast storm may occur to degrade device operation performance.
Three kinds of message flow can be controlled by storm policing characteristics to stay away from broadcast storms. Instructions: 1. Click the “Port > Storm Control” in the navigation bar to configure the attributes related
to storm policing such as mode as follows:
2. Select the appropriate port and “Edit” it by configuring the policing rates of broadcast, unknown multicast and unicast storms at each port.
28

3. Configure info such as storm switch and rate, “Apply” and finish as follows:
5.7 Mirroring
Port Mirroring copies the message of a specified switch port to the destination port. The copied port is the Source Port, and the copying port is the Destination Port. Destination Port accesses to data inspection devices so that users can analyze the messages received to monitor network and troubleshoot as follows:
29

Instance PC1 and PC2 access Switch A through interface TE1 and TE2 respectively. Users intend to monitor the messages transmitted from PC2 to PC1.
Instructions: 1. Click the “Port > Mirroring” in the navigation bar. 4 sets of flow mirroring rules can
be configured as follows:
2. Select one session and “Edit” it in the mirroring group configuration interface:
30

Interface data are as follows

Configuration

Description

Items

Session ID

The switch has 4 session IDs by default.

State

The mirroring group can be enabled or not.

Monitor Port Ingress Port

Only one ordinary physical port can be selected, excluding link aggregation port and source port. Any message received will be mirrored to the destination port.

Egress Port

Any message transmitted will be mirrored to the destination port.

6 VLAN
VLAN is formulated not restricted to physical locations, which means the hosts in a same VLAN can be placed at will. As shown below, each VLAN, as a broadcast domain, divides a physical LAN into logical LANs. Hosts can exchange messages by means of
31

traditional communication. For the hosts in different VLANs, the device such as router or L3 switch is a must.
VLAN is superior to the traditional Ethernet in terms of: Broadcast domain coverage: the broadcast message in a LAN is limited in a VLAN to
save the bandwidth and handle the network-related issues more efficiently. LAN security: VLAN hosts fail to communicate with each other since the messages
are separated by the broadcast domain in the data link layer. They need a router or a Layer 3 switch for Layer 3 forwarding. Flexibility of creating a virtual working team: VLAN can create a virtual working team beyond the control of physical network. Users have access to the network without changing the configuration if their physical locations are moving within the scope. This management switch is compatible with VLAN types based on 802.1Q, protocols, MAC, and ports. For default configuration, 802.1Q VLAN mode should be adopted. Port VLAN is divided subject to a switch’s interface No. Network administrator gives each switch interface a different PVID, namely a port default VLAN. If a data frame without a VLAN tag flows into a switch interface with a PVID, it will be marked with the same PVID, or it will get rid of an additional tag even though the interface has a PVID. The solution to a VLAN frame depends on the interface type, which eases member definition but re-configures VLAN in case of member mobility.
6.1 VLAN
6.1.1 Create VALN
Instructions for creating a new VLAN: 1. Click the “VLAN > VLAN > Create VLAN” to select a name in the valid VLAN box, move
32

it to the VLAN creating box on the right. “Apply” and finish as follows:

2. The VLAN created will be displayed in the VLAN Table. Users can “Edit” the VLAN as follows:

Interface data are as follows.

Configuration Items Description

VLAN ID

It is required to select an ID ranging from 1 to 4,094. For example, 1-3,5,7 and 9. LAN 1 is the default, which won’t be
repeated in another new VLAN.

Name

It is optional to modify the VLAN description as required.

33

6.1.2 VLAN Configuration
There are two methods. One is to add multiple ports under a single VLAN. The other is to add a port to multiple VLANs. They are configured according to different purposes. Instructions for the first method to add the current port to a specified VLAN 1. Click the “VLAN > VLAN > VLAN Configuration” in the navigation bar, select the VLAN
ID on the upper left, and then click the port info as follows:

Interface data are as follows.

Configuration Items Description

VLAN

VLAN ID to be configured

Port

Port list

Mode

VLAN mode of port

Membership

Member roles at the VLAN port: Excluded: the port is out of this VLAN Tagged: the port is a tagged member of this VLAN Untagged: the port is an untagged member of this VLAN

PVID

Whether this VLAN is the port PVID

Forbidden

Whether the VLAN message is forbidden to be forwarded at this port

6.1.3 Membership
Instructions for the second method to add the current port to a specified VLAN 1. Click the “VLAN > VLAN > Membership” in the navigation bar, select the port to be
configured and “Edit” to configure its attributes:

34

Interface data are as follows.

Configuration Items Description

Port

Port list

Mode

VLAN mode of port

Membership

The port is the attribute of VLAN ID and VLAN: Forbidden: do not forward the VLAN message Excluded: the port out of the VLAN Tagged: The Tagged member of the VLAN Untagged: The Untagged member of the VLAN PVID: whether the VLAN is the port PVLAN

6.1.4 Port Setting
Trunk configuration. Connected with other switches, Trunk interfaces mainly connect trunk links to allow the VLAN frames to flow through. IEEE 802.1q is the encapsulation protocol of Trunk link and considers the formal standard for Virtual Bridged Local Area Networks. It changes the frame format of Ethernet by adding a 4-bit 802.1q Tag between the source MAC address field and the protocol field.
802.1q frame format

Meanings of 802.1q tag fields

Field

Length Name

Analysis

TPID

2 bytes

Tag Protocol Identifier to It refers to the 802.1q Tag frame

describe the frame type

when the value is 0x8,100, which

will be discarded if relevant

equipment fails to receive it.

35

PRI

3 bits Frame Priority

It ranges from 0 to 7, with the

higher priority represented by

larger number. Data frame with

higher priority will be sent

preferentially in case of switch

congestion.

CFI

1 bit Canonical Format Indicator to MAC address is classical when

reveal whether the MAC CFI is 0 and non-classical when

address is classical or not.

CFI is 1. It promotes the

compatibility between Ethernet

and token ring. CFI will be 0 in

the Ethernet.

VID

12 bits VLAN ID indicates the VLAN to It ranges from 0 to 4,095, with 1

which the frame belongs.

to 4,094 valid since 0 and 4,095

are the protocol retention

values.

Packets sent by each switch supporting 802.1q protocol contain a VLAN ID to indicate the VLAN to which the switch belongs. Therefore, Ethernet frames are divided into two types as follows in a VLAN switching network: Tagged frame: it refers to the frame adding a 4-bit 802.1q Tag. Untagged frame: it refers to the original frame without a 4-bit 802.1q Tag.
Connected with other switches, Trunk interfaces mainly connect trunk links to allow the VLAN frames to flow through.

Instructions for trunk interface configuration: 1. Click the “VLAN > VLAN > Port Setting” in the navigation bar, select the port and “Edit”
it to configure the attributes:

Interface data are as follows.

Configuration Items

Description

Port

Port No. to be configured

36

Mode
PVID Accept Frame Type
Ingress Filtering Uplink TPID

VLAN mode of port Hybrid: port in this mode serves as the member of Tagged and Untagged ports of VLANs Access: port in this mode serves as the only member of VLAN Trunk: port in this mode serves as the only Untagged member of PVID and the Tagged member of VLANs Tunnel: Port Q-in-Q VLAN Port native VLAN
Message types received by ports All: all messages Tag Only: only Tagged messages will be received Untag Only: only Untagged messages will be received A switch to decide to filter VLAN messages excluded at the port Whether in uplink mode or not
Identification No. of VLAN Tag

7 MAC Address Table
Ethernet switches are mainly innovated to forward according to the purposes in the data link layer. That is, MAC address will transmit the messages to corresponding ports according to the purposes. MAC address forwarding table is a L2 table illustrating MAC addresses and forwarding ports, which is the basis of fast forwarding of L2 messages. MAC address forwarding table contains following data: Destination MAC Address VLAN ID belonging to port Forwarding ingress No. of this device There are two message forwarding types according to MAC address table info: Unicast mode: the switch directly transmits the messages from the table’s egress
when MAC address forwarding table contains corresponding entries with the destination MAC address. Broadcast mode: When the switch receives the messages with the destination address full of F-bits, or there is no entry corresponding to the MAC destination address in the forwarding table, the switch will forward the messages to all ports excluding the receiving port in this way.

37

7.1 Static Address
Static table is manually configured by users and distributed to each interface board, which won’t age. Instructions: 1. Click the “MAC Address Table > Static Address” as follows:

Interface data are as follows.

Configurati Description

on Items

MAC

Required. Enter the new MAC address e.g.: HH:HH:HH:HH:HH:HH

VLAN

Required. Specify the VLAN ID

Port

Required. Select the interface type and enter the interface name

Description: it must be the member port of the configured VLANs.

2. Fill in corresponding configuration items. 3. “Apply” and finish.

7.2 Filtering Address
The switch discards the matched data frame by configuration Instructions: 1. Click the “MAC Address Table > Filtering Address” as follows:

38

Interface data are as follows. Configuration Items MAC Address VLAN

Description MAC address to be filtered VLAN of MAC address

8 Spanning Tree

Redundant links are often used for link backup and network reliability in the Ethernet

switching network. However, such links will generate loops on the switching network,

leading to broadcast storm, unstable MAC address list and other faults, thus worsening users’ communication quality, or even interrupting the communication. As a result, STP
(Spanning Tree Protocol) appears.

Same with the development of other protocols, from the original STP defined in IEEE

802.1D, to RSTP (Rapid Spanning Tree Protocol) defined in IEEE 802.1W and to MSTP (Multiple Spanning Tree Protocol) defined in IEEE 802.1S, STP keeps upgrading.

MSTP is compatible with RSTP and STP while RSTP is compatible with STP. The

contrast among these 3 protocols is shown in the table.

The contrast among 3 protocols

STP

Characteristic

Application

STP

A tree rid of loops as the solution to All VLANs can be shared

broadcast storms and redundant backups. without discrimination in user

It converges slowly.

or business flow.

RSTP A tree rid of loops as the solution to

broadcast storms and redundant backups.

It converges rapidly.

MSTP A tree rid of loops as the solution to Distinguish the user and

broadcast storms and redundant backups. business flow for load sharing.

It converges rapidly.

Different VLANs forward the

Spanning trees balance the load among flow through separate

VLANs. Flow of different VLANs will be spanning trees.

39

forwarded subject to paths. After STP is deployed, the following objectives can be achieved by calculating the loops with topology: Loop elimination: eliminate possible communication loops by blocking redundant
links. Link backups: activate redundant links to restore network connectivity if the active
path fails.
8.1 Property
Configure STP global parameters. In specific network environment, STP parameters of some devices must be adjusted to achieve the best performance. Instructions: 1. Click the “Spanning Tree > Property” in the navigation bar as follows:

Interface data are as follows.

Configuration

Description

Items

State

It is checked by default to enable the spanning tree on behalf of

switches.

40

Operation Mode Path Cost BPDU Handling Priority Hello Time Max Age

3 modes are available, namely STP and RSTP. In Long mode and Short mode The method to handle the BPDU messages received by the device Port priority Intervals between Hello messages Max aging time

Forward Delay

Forward delay time

Tx Hold Count Region Name
Revision

Specify the Tx-hold-count used to limit the maximum numbers of packets transmission per second MST domain name. Switch master board sets the MAC address by default. Together with the VLAN mapping table of MST domain and the revision level of MSTP, switch domain name will jointly determine the domain to which it belongs. The MSTP revision number

Max Hop

Specify the number of hops in an MSTP region before the BPDU

is discarded

2. Fill in corresponding configuration items. 3. “Apply” and finish.

8.2 Port Setting
In specific network environment, STP parameters of some devices need to be adjusted for the best performance. 1. Click the “Spanning Tree > Port Setting” in the navigation bar, select the port and “Edit”
to configure its attributes:

41

Interface data are as follows. Configuration Description Items

Port

The port No. to configure attributes

State

Enable STP or not

Path Cost Priority

Enter the path cost value of the interface Use IEEE 802.1t Standard with the value ranging from 0 to 200,000,000 Select the port priority with smaller value representing higher priority. Interface priority affects the role of the interface on the specified MSTI. On different MSTI, users can configure the priorities for a same interface. As a result, flow of different VLANs can be forwarded along physical links to achieve VLAN load sharing. Description: MSTP will recalculate the interface role and migrate its state when its priority changes.

Edge Port

Rather than another switch or network segment, the edge port should be connected directly to user terminals. It can quickly transit to the forward state since topology changes create no loops. An

42

BPDU Filter BPDU Guard
Point-to-Point

edge port under configuration can be quickly transitioned to forward state by STP. To achieve this, it is recommended that Ethernet ports connected directly to user terminals should be configured as edge ports. Enable BPDU Filter or not
Enable BPDU Guard or not. Unchecked by default. If BPDU Guard is enabled, the device will shut down the interfaces receiving BPDU and notify the NMS. Such interfaces can only be restored manually by network administrators. Select enabled, shutdown, and auto modes. Auto mode: it indicates the connect state between the default auto inspection and point-to-point links. Enabled mode: it indicates the specific port is connected to the point-to-point links. Shutdown mode: it indicates the specific port fails to connect the point-to-point links.

2. Fill in corresponding configuration items. 3. “Apply” and finish.

8.3 MST Instance
A switching network is divided into multiple domains by MSTP, with independent spanning trees formed within each domain. Each Spanning Tree is called a MSTI (Multiple Spanning Tree Instance), and each domain is called a MST Region: Multiple Spanning Tree Region).
Description:
An instance is a group of VLANs that reduces communication cost and resource utilization rate. Each instance, independently calculated with topology, can balance the load. VLANs with the same topology can be mapped to a same instance, and they are forwarded according to the port state in corresponding MSTP instances.
In simple terms, mapped to the specified MST instance, one or more VLANs are distributed to a spanning tree at a time. Instructions: 1. Click the “Spanning Tree > MST Instance” in the navigation bar, “Edit” the selected
spanning tree instances to be configured as follows:

43

Interface data are as follows.

Configuration Description Items

MSTI

Instance No. of spanning trees ranges from 0 to 15

VLAN

VLAN No. mapped from instances

Priority

Set the priority of a multiple of 4,096 for the specified instance, ranging from 0 to 65,535 with 32,768 as default.

2. Fill in corresponding configuration items. 3. “Apply” and finish as follows.

8.4 MST Port Setting
Instructions: 1. Click the “Spanning Tree > MST Port Setting” in the navigation bar, check the port to
be modified from the list of all ports of the device, “Edit” to enter the detailed configuration interface as follows:

44

Interface data are as follows.

Configuration Description Items

MSTI

Select the instance for configuration through the drop-down box in the upper left.

Port

Select the port to be configured by users

Path Cost

Enter the path cost value of the interface Use IEEE 802.1t Standard with the value ranging from 0 to 200,000,000

Priority

Select the port priority with smaller value representing higher priority. Interface priority affects the role of the interface on the specified MSTI. On different MSTI, users can configure the priorities for a same interface. As a result, flow of different VLANs can be forwarded along physical links to achieve VLAN load sharing.

45

Port Role
Port State Mode Type

Description: MSTP will recalculate the interface role and migrate its state when its priority changes. 3 types of root ports, namely specified port, backup port and disabled port. Including 3 states, namely Discarding, Forwarding and Disabled Current STP mode The port types in the instance contain boundary and internal ports

2. Fill in corresponding configuration items. 3. “Apply” and finish. Example of MSTP function configuration:
Switch A, B, C and D all run MSTP which introduces instances to share the load of VLAN10 and 20. MSTP can set up the VLAN mapping table to associate VLANs with spanning tree instances, and to map VLAN10 from instance 1 and VLAN20 from instance 2.

Instructions: 1. Switch A, B, C and D create VLAN10 and 20 to configure the L2 forwarding function of
the devices on the Ring. Click the “VLAN > VLAN > Create VLAN” in the navigation bar, fill in the corresponding configurations. “Apply” and finish as follows.
46

2. VLANs are added to the switch ports ingress loops. Click the “VLAN > VLAN > Membership” in the navigation bar, select the ring port to be configured, move VLAN10 and 20 to the right box and mark them with “Tagged”. “Apply” and finish:
3. Click the “Spanning Tree > Property” in the navigation bar, and choose MSTP mode as follows:
47

4. Configure the VLAN mapping between instance MSTI1 and MSTI2. Click the “Spanning Tree > MST Instance” to fill in corresponding parameters, and “Add” them as follows:
Note: Set the priority of MSTI1 to 0 and MSTI2 to 4,096 before configuring Switch A. Set the priority of MSTI1 to 4,096 and MSTI2 to 0 before configuring Switch B. The priority must be a multiple of 4,096.
5. Switch B serves as the root bridge of MSTI2 and the backup root bridge of MSTI1 in the domain. Please refer to 5 for instructions.
6. The tree-shaped network will eliminate loops.
8.5 Statistics
Instructions: 1. Click the “Spanning Tree > Statistics” in the navigation bar, entry port statistics as
48

follows:
9 ERPS
ERPS (Ethernet Ring Protection Switching) is an Ethernet ring link layer technology with high reliability and stability. It can prevent broadcast storms caused by data loops when the Ethernet ring is complete, and can quickly restore communication paths between various nodes in the ring network in case of link failures in the Ethernet ring, with high convergence speed.
It is based on the ERPS ring and consists of several nodes. By blocking the RPL Owner port and controlling other ordinary ports, the port’s state switches between Forwarding and Blocking, achieving the goal of eliminating the loop. Simultaneously utilizing mechanisms such as control VLAN, data VLAN, and MST protection instance to better
49

implement the functionality of ERPS.
9.1 Property
Configure and view the opening and closing of the global ERPS function Instructions: 1. Click on the “ERPS > Property” menu in the navigation bar to enter the function configuration interface
9.2 ERPS Instance
In an ERPS network, a ring can support multiple instances, each of which is a logical ring. Each instance has its own protocol channel, data channel, and owner node; Each instance serves as an independent protocol entity, maintaining its own state and data. Instructions: 1. Click the “ERPS > ERPS Instance”Enter the ERPS instance creation interface and click on the application to create an instance, as shown in the following figure:
2. Select the instance and click the modify button to enter the instance configuration interface, as shown in the following figure:
50

Configuration Items Ring Status Mel Protected Instance
Control VLAN WTR Time
Guard Time

Description Disable or Enable Message level selection 0-7 The VLAN that transmits ERPS protocol packets and data packets must be mapped to the protection instance, so that the ERPS protocol can forward or block these packets according to its blocking principle. Otherwise, VLAN packets may generate a broadcast storm in the looped network, resulting in network unavailability Control VLAN for transmitting ERPS protocol packets In revertive mode, the RPL Owner port is released due to other link failures. When the fault recovers, wait for the WTR timer to time out and then block the RPL Owner port again Start the Guard timer when the port detects link recovery, to prevent unnecessary network oscillation caused by residual

51

Work Mode
Ring ID Ring Type Port0 Port1 Port Role

R-APS messages caused by forwarding delay on the ring network After the ERPS link returns to normal, it can be determined whether to re block the RPL owner port by setting the Revertive/Non Revertive mode of ERPS. ERPS ring number 0 is the main ring, only support main ring ERPS ring member port, used for the transmission of protocol and data packets on the ERPS ring ERPS ring member port, used for the transmission of protocol and data packets on the ERPS ring NormalOwnerneighbournext-neighbour

Note The ERPS function only satisfies a switching recovery delay of less than 20ms for the
optical port Only support main ring.

10 Loopback
The configuration of the Loopback Detection function is as follows: global and port ring network enable and disable configurations are performed on the switch ports, which can be changed by the user
The time interval for ring network detection and the automatic recovery time period for ring network ports. By enabling global and port capabilities, the system can detect loop conditions in the network, thereby reducing the occurrence of loop storms. Supports two working modes: automatic detection and manual detection. 1. Click on the “Loopback > Loopback Config” menu in the navigation bar to enter the function

52

11 Discovery
LLDP (Link Layer Discovery Protocol) is defined in IEEE 802.1ab. It is a standard L2 discovery method which integrates the info such as management addresses, device and interface identifications of local network devices and transmits to the neighbor devices. After receiving the info, they will save it in form of standard MIB (Management Information Base) for NMS query and link communication judgment.
It can also integrate the info and transmit to its own remote devices. The info received by the local network device will be kept in the form of MIB. The following shows how it works. Block diagram of LLDP principles
LLDP is realized based on: LLDP module updates its local system MIB, as well as the customized extension MIB,
through the interaction between LLDP agent and MIBs of physical topology, entity, interface and other types. Encapsulate the info of local network device into LLDP frames and transmit to the remote device.
53

Receive the LLDP frame sent by the remote device to update LLDP remote system MIB and customized extension MIB.
Master the info of remote device such as connection interface and MAC address through the transmitting & receiving function of LLDP agent.
The local system MIB stores local device info, including device and interface IDs, system name and description, interface description, network management address, etc.
The remote system MIB stores local device info, including device and interface IDs, system name and description, interface description, network management address, etc. Based on LLDP, LLDP-MED allows other units to expand. The info checked by network
devices facilitates fault analysis and deepens the accurate understanding of network topology by management system.
11.1 LLDP
Instructions: 1. Click the “Discovery > LLDP > Property” in the navigation bar as follows.

Interface data are as follows.

Configuration

Description

Items

State LLDP Handling

Enable or disable the LLDP
LLDP messages will be processed by means of “Filtering”, “Bridging” and “Flooding” when disabling the LLDP.

TLV

Advertise 30s by default ranging from 5 to 32,768s.

Interval

54

Hold Multiplier

Transmission period product with 4 by default ranges from 2 to 10. Transmission period * product should be no more than 65,535.

Reinitializing Delay 2s by default ranging from:1 to 10s.

Transmit Delay

2s by default ranging from:1 to 8,191s.

Fast Start Repeat 3s by default of the LLDP-MED port ranging from 1 to 10s. Count

Ethernet message encapsulated with LLDPDU (LLDP Data Unit) are recognized as LLDP message. Each TLV is a unit of LLDPDU carried with specified info. 2. Fill in corresponding configuration items 3. “Apply” and finish.

11.2 Port Setting
Instructions 1. Click the “Discovery > LLDP > Port Setting” in the navigation bar as follows.

Interface data are as follows.

Configuration

Description

Items

Port

Port list

Mode Selected TLV

LLDP mode include: Transmit, Receive, Normal, Disable, the default is Normal Transmit: transmit LLDP messages only; Receive: receive LLDP messages only; Normal: transmit and receive LLDP messages; Disable: neither transmit nor receive LLDP messages. Info of selected TLV and VLAN

LLDP can work in 4 patterns: Transmit: transmit LLDP messages only; Receive: receive LLDP messages only; Normal: transmit and receive LLDP messages; Disable: neither transmit nor receive LLDP messages. 2. Check corresponding port and “Edit” the port configuration. “Apply” and finish as follows.

55

Interface data are as follows.

Configuration Items

Description

Port

Port list

Mode

LLDP mode include: Transmit, Receive, Normal, Disable, the default is Normal Transmit: transmit LLDP messages only; Receive: receive LLDP messages only; Normal: transmit and receive LLDP messages; Disable: neither transmit nor receive LLDP messages.

Optional TLV

Select the info of TLV and VLAN

802.1 VLAN Name Select the VLAN name

11.3 MED Network Policy
MED is based on IEEE 802.1ab. LLDP is the neighbor discovery protocol of IEEE, which can be extended by other organizations. Information identified from network devices, such as switches and wireless access points, can help with fault analysis and allow management systems to accurately understand the network topology. Instructions 1. Click the “Discovery > LLDP > MED Network Policy” in the navigation bar as follows.

56

Interface data are as follows.

Configuration

Description

Items

Policy ID

Policy ID number

Application

Configure and publish network policy TLV

VLAN

VLAN number

VLAN Tag

VLAN Mode, optional Tagged or Untagged

Priority

CoS for services

DSCP

DSCP for services

11.4 MED Port Setting
Instructions 1. Click the “Discovery > LLDP > MED Port Setting” in the navigation bar as follows.

57

Interface data are as follows.

Configuration

Description

Items

Entry

Serial No. of MED port setting

Port

Port list

State

Port enable status

Network Policy Configure and publish network policy TLV

58

Location Inventory

Configure and publish location TLV Configure and publish inventory TLV

11.5 Packet View
Instructions 1. Click the “Discovery > LLDP > Packet View” in the navigation bar as follows.

11.6 Local Information
Instructions for device summary: 1. Click the “Discovery > LLDP > Local Information” in the navigation bar as follows.
Instructions for port status table: 2. Click the “Discovery > LLDP > Local Information” in the navigation bar as follows.
59

11.7 Neighbor
Instructions for LLDP neighbor displaying 1. Click the “Discovery > LLDP > Neighbor” in the navigation bar as follows.
11.8 Statistics
Instructions: 1. Click the “Discovery > LLDP > Statistics” in the navigation bar as follows.
60

12 Multicast
12.1 General
12.1.1 Property Instructions: 1. Click the “Multicast > General > Property” in the navigation bar as follows.
61

12.1.2 Group Address
According to the previous request mode of multicast, the multicast router will copy and forward data to each VLAN containing receivers when users in different VLANs request the same multicast group, which wastes a great deal of bandwidth. IGMP Snooping configures multicast VLAN by connecting the different users of switch ports to a same multicast VLAN to receive multicast data. In this way, multicast flow can only be transmitted within a multicast VLAN, thus saving bandwidth. In addition, security and bandwidth are guaranteed because multicast VLANs are completely isolated from user VLANs. Instructions 1. Click the “Multicast > Group Address”, “Add” a new static multicast item, and “Edit” the
existing ones as follows:

Interface data are as follows.

Configuration Items

Description

VLAN

VLAN ID to which the multicast group belongs. Drop down to select an existing VLAN.

Multicast Address Enter the multicast address

Member

Add multicast member(s)

2. Fill in corresponding configuration items. 3. “Apply” and finish as follows.

62

12.1.3 Router Port Configure and view multicast router port
Instructions: 1. Click the “Multicast > General > Router Port” in the navigation bar as follows.
12.2 IGMP Snooping
IGMP Snooping (Internet Group Management Protocol Snooping) is a constraint mechanism on L2 devices to manage and control multicast groups. By analyzing the IGMP messages received, L2 devices establish a mapping between ports and MAC multicast addresses and forward the multicast data accordingly. As shown below, multicast data are transmitted on L2 without IGMP snooping. When IGMP snooping runs, known multicast group data are transmitted to specified receivers while unknown multicast data are still on Layer 2.
63

12.2.1 Property
IGMP Snooping is on the L2 switch between the multicast routers and the user hosts, applicable to deploy IPv4 networks. It is configured in a VLAN to snoop the IGMP/MLD messages transmitted between routers and hosts, and to establish a L2 forwarding table for multicast data, in order to manage and control the multicast data forwarding in L2 network.
Global IGMP Snooping function should be enabled since it is disabled by default. Instructions: 1. Click the “Multicast > IGMP Snooping > Property”, select the VLAN to be configured
from the created VLAN info, and “Edit” the details as follows:

Interface data are as follows. Configuration Items Description

VLAN

VLAN ID to be configured

State

Enable or disable the IGMP Snooping in this VLAN

Router Port Auto Enable or disable route port automatic learning Learn

Immediate leave

Multicast members leave quickly

Query Robustness Query Interval

The Robustness Variable allows tuning for the expected packet loss on a network The interval between message queries

Query Max Response Timeout (over the max response time) of a query message Interval

Last Member Query Max number of queries for a specified group Counter

Last Member Query The interval between message queries for a specified group

64

Interval 2. Fill in corresponding configuration items. 3. “Apply” and finish.
13 Security
13.1 Management Access
13.1.1 Management Service Instructions for Telnet: 1. Click the “Security > Management Access > Management Service”, enter management
service interface as follows:
Instructions for SNMP: 2. Click the “Security > Management Access > Management Service”, enter management
service interface as follows:
65

13.2 DHCP Snooping
For sake of security, the network administrator may need to record the IP address of a user surfing the Internet and to confirm the correspondence between the IP address obtained from DHCP Server and the host’s MAC address.
Switch can record the user’s IP address through the secure DHCP relay at the network layer.
Switch can monitor DHCP messages and record the user’s IP address through DHCP Snooping at the data link layer. In addition, private DHCP Server in the network may lead to wrong IP address for the user. To ensure that users obtain IP addresses through legal DHCP Server, the DHCP Snooping security mechanism divides the ports into Trust Port and Untrust Port.
Trust Port directly or indirectly connects legal DHCP Server. It forwards the DHCP messages received to ensure the correct IP address for DHCP Client. Untrust Port connects illegal DHCP Server. DHCPACK and DHCPOFFER messages received from the DHCP Server on the Untrust Port will be discarded to prevent incorrect IP addresses.
Typical Networking of DHCP Snooping The following methods are used to obtain the IP address and user MAC address from DHCP Server: Snooping the DHCPREQUEST message Snooping the DHCPACK message
13.2.1 Property Enable DHCP Snooping
66

Instructions: 1. Click the “Security > DHCP Snooping > Property”. DHCP Snooping interface is divided
into global configuration and port configuration. Select the port to be modified in the port configuration and “Edit” the details as follows:

Interface data are as follows. Configuration Items Description

State

Enable and disable the DHCP Snooping

VLAN

Valid VLAN No. of DHCP Snooping

Port

Configure the port No. of DHCP Snooping

Trust

Whether the port is a Trust Port

Client

Address Whether the consistency inspection for Client addresses is

Inspection

enabled

Rate Limit

Whether the port enables rate limit and configures the value

2. Fill in corresponding configuration items. 3. “Apply” and finish as follows.

67

13.2.2 IMPV Binding
In DHCP network, users (non-DHCP users) obtaining IP addresses statically may attack the network by imitating DHCP Server, constructing DHCP Request message, etc. Legal DHCP users may suffer from security risks when using the network normally.
Enabling the static MAC entries based on the interface generated by DHCP Snooping binding table can prevent such attacks. The device then, based on the DHCP Snooping binding table corresponding to all DHCP users, automatically executes the command to generate static MAC entries and disable the interface’s learning ability of dynamic entries. Only messages that match the source MAC and static MAC entries can flow through the interface. Therefore, for non-DHCP users, only the messages of static MAC entries that are manually configured by the administrators can flow through, while others will be discarded. Instructions: 1. Click the “Security > IP Source Guard > IMPV Binding”, “Add” a new binding group of
IP-MAC-Port-VLAN as follows:

Interface data are as follows. Configuration Description Items

Port

The port No. of binding group

VLAN

VLAN ID bound

Binding

Select the binding relation from IPMV and IPV

MAC Address MAC address bound

IP Address IP address bound

2. Fill in corresponding configuration items. 3. “Apply” and finish as follows.

68

14 QoS
QoS (Quality of Service) assesses the ability of service providers to meet customer needs and the ability of transmitting packets over the Internet. Diversified services can be assessed based on different aspects. QoS usually refers to the evaluation of service capabilities that support core requirements such as bandwidth, delay, delay variation, and packet loss rate during delivery. Bandwidth, also known as throughput, refers to the average business flow within a certain period of time, with the unit of Kbit/s. Delay refers to the average time required for business flowing through the network. For a network device, the followings are general levels of delay requirements. There are two delay levels, that is, the high-priority business can be served as soon as possible by scheduling method of priority queue, while the low-priority business gets services after that. Delay variation refers to the time change of business flowing through the network. Packet loss rate refers to the percentage of lost business flow during transmission. As modern transmission systems are very reliable, information is often lost in network congestion. Packet loss due to queue overflow is the most common situation.
All messages in a traditional IP network are treated equally. Every network device processes the messages on a FIFO basis, and makes every effort to transmit them to destinations without guaranteeing reliability, transfer delay, or other performance.
Network service quality is constantly improved as new applications keep springing up in the rapidly changing IP network. For example, VoIP, video and other delay-sensitive services have set higher standards on message transmission delay. Message transmission in a short period has been the common trend. In order to support voice, video and data services with different requirements, the network needs to identify business types and provide corresponding services.
The ability to distinguish business types is the prerequisite to provide corresponding services, so the traditional best-effort service no longer meets the application needs. Therefore, QoS comes into being. It regulates the network flow to avoid and handle network congestion and reduce packet loss rate. Meanwhile, users can enjoy dedicated bandwidths while business can improve service quality, thus perfecting the network service capacity.
QoS priorities vary with message types. For instance, the VLAN message uses 802.1p, also known as the CoS (Class of Service) field, while the IP message uses DSCP. To maintain the priority, these fields need to be mapped at the gateway connected with various networks when messages flow through the network. 802.1p priority in the VLAN frame header
Typically, VLAN frames are interacted between Layer 2 devices. The PRI field (i.e. 802.1p priority), or CoS field, in the VLAN frame header identifies the quality of service requirements according to the definitions in IEEE 802.1Q. 802.1p priority in the VLAN frame
69

The 802.1Q header contains 3-bit PRI fields. PRI field defines 8 CoS of business priority ranging from 7 to 0 from high to low. IP Precedence/DSCP Field
According to RFC791 definition, ToS (Type of Service) domain in the IP message header is composed of 8 bits. Among them, the 3-bit long Precedence field, as located in the following, identifies the IP message priority. IP Precedence/DSCP Field
0 to 2 bits are Precedence fields representing the 8 priorities of message transmission ranging from 7 to 0 from high to low, with either Level 7 or 6 as the highest priority that is generally reserved for routing or updating network control communication. User-level applications only have access to Level 0 to 5.
ToS domain, in addition to Precedence fields, also includes D, T and R bits: D-bit represents the Delay requirement (0 for normal delay and 1 for low delay). T-bit represents the throughput (0 for normal throughput and 1 for high throughput). R-bit represents the reliability (0 for normal reliability and 1 for high reliability). ToS domain reserves the 6 and 7 bits.
RFC1349 redefines the ToS domain by adding a C-bit to represent the Monetary Cost. The IETF DiffServ group then redefines the 0 to 5 bits of ToS domain in the IPv4 message header of RFC2474 as DSCP and renames it as DS (Differentiated Service) byte as shown in the figure above.
The first 6 bits (0-5 bits) of DS field distinguish the DSCP (DS Code Point), and the higher 2 bits (6-7 bits) are reserved. The lower 3 bits (0-2 bits) are CSCP (Class Selector Code Point), with the same CSCP value representing the DSCP of the same class. DS nodes select corresponding PHB (Per-Hop Behavior) according to DSCP values.
70

14.1 General
14.1.1 Property
Network congestion resulting from the competition for resource use rights among messages at the same time is usually solved by queue scheduling, thus avoiding intermittent congestions. Queue scheduling technologies include SP (Strict-Priority), WRR (Weighted Round Robin). Instructions for global and port scheduling configuration 1. Click the “QoS > General > Property” in the navigation bar as follows.

Interface data of global configuration are as follows.

Configuration Items

Description

State

Switch of global QoS function

Trust Mode

It can be divided into CoS, DSCP, CoS-DSCP

Interface data of port configuration are as follows.

Configuration Items

Description

CoS

Ranging from 0 to 7

Port Trust Mode Switch of port QoS function

CoS

Mark the CoS field

DSCP

Mark the DSCP field

71

14.1.2 Queue Scheduling 1. Click the “QoS > General > Queue Scheduling”. “Apply” and finish as follows.

Interface data are as follows.

Configuration Items Description

Strict Priority

SP mode

WRR

WRR mode

Weight

Bandwidth percentage of WRR accounted for by Queue

14.1.3 CoS Mapping
1. Click the “QoS > General > CoS Mapping” in the navigation bar. “Apply” and finish as follows.

72

Interface data are as follows.

Configuration Items

Description

CoS

802.1p priority

Queue

Port queue

14.1.4 DSCP Mapping 1. Click the “QoS > General > DSCP Mapping”. “Apply” and finish as follows.

73

Interface data are as follows.

Configuration

Description

Items

DSCP

Value of IP DHCP domain priority

Queue

Port queue

74

14.2 Rate limit
14.2.1 Ingress / Egress Port It refers to the rate restriction on transmitting and receiving data at physical interfaces. Restrict the rate limiting at the egress before transmitting flow, thus controlling all
outgoing message flow; Restrict the rate limiting at the ingress before receiving flow, thus controlling all
incoming message flow; Instructions: 1. Click the “QoS > Rate Limit > Ingress / Egress Port” in the navigation bar to choose a
rate-limiting port and check the current configuration as follows:
2. Select the port (s) for rate limiting, “Edit” it at the bottom to switch the function and specify the rate. “Apply” and finish as follows:
Interface data are as follows.
75

Configuration Items

Ingress

Enabled

Rate

Egress

Enabled

Rate

Description Rate limiting switch Rate ranges from 16 to 10,000,000 Kbps Rate limiting switch Rate ranges from 16 to 10,000,000 Kbps

15 Diagnostics
15.1 Ping
Ping command checks the availability of specified IP addresses and host names and transmits statistics accordingly. Instructions: 1. Click the “Diagnostics > Ping” in the navigation bar to enter a host name or an IP
address, as well as the number of tests as follows:

2. Click the “Ping” to accept the packet-transmitting test from system to verify address validity, and output the result as follows:

76

15.2 Copper Test
Copper test evaluates the ingress cable state and locates the faults (about 5 m by error) according to the reflected voltage strength Instructions: 1. Click the “Diagnostics > Copper Test” in the navigation bar to select a port for test as
follows:
2. Click the “Copper Test” and output the result as follows:
15.3 Fiber Module
Can be used to view optical module DDM information Instructions: 1. Click the “Diagnostics > Fiber Module” in the navigation bar to select a port for test as follows:
77

16 Management
16.1 User Account
Users can check and modify the current username, password and authority of the switch. Instructions: 1. Click the “Management > User Account” in the navigation bar to discover the
username of “admin” and the privilege of “Admin” by default as follows:
2. “Add” a new user account and “Edit” the selected user attribute as follows:
16.2 Firmware
System version firmware upgrade Instructions: 1. Click the “Management > Firmware > Manual Upgrade” in the navigation bar as follows:
78

16.3 Configuration
16.3.1 Manual Upgrade System configuration upgrade or backup
Instructions for configuration file upgrade: 1. Click the “Management > Configuration > Manual Upgrade” click the “Upgrade” in
mode of “TFTP” or “HTTP”, select the corresponding files to be upgraded (servers should be illustrated in TFTP mode). “Apply” and finish as follows:
Instructions for file backup configuration: 2. click the “Backup” in mode of “TFTP” or “HTTP”, select the files or logs to be upgraded
(servers should be illustrated in TFTP mode). “Apply” and finish as follows.
79

16.3.2 Save Configuration Save system configuration or restore configuration to factory default
Instructions: 1. Click the “Management > Configuration > Save Configuration” in the navigation bar
as follows:
Note: Click the “Factory Reset” and “Device Restart” to restore factory settings. Save the “Running Configuration” as the “Start Configuration” (which can be saved as “Backup Configuration” or “Running Configuration”) and the “Backup Configuration” (which can be saved as the “Start Configuration” or “Running Configuration”). Instructions for the second method of system preservation: 2. Click the “Save” on the upper right to save the running configuration as the start configuration as follows.
16.4 SNMP
SNMP (Simple Network Management Protocol) is widely used in TCP/IP network. It manages devices by the central computer which operates network management software (i.e. network management workstation). SNMP is:
80

Simple: The polling-driving SNMP has the fundamental functionality set that is applicable to small-scale environment with fast speed and low cost. Besides, UDPdriven SNMP is compatible with most devices. Powerful: SNMP aims to ensure the management info transmission between two nodes so that administrators can retrieve, modify and troubleshoot the info easily. There are 3 common versions, namely SNMPv1, v2c and v3. Its system contains NMS (Network Management System), Agent, Management object and MIB (Management Information Base).
NMS, as the management center, will manage all devices. Each device under management includes the resident Agent, MIB and management objects. NMS interacts with the Agent running on the management object which will operate the MIB to execute NMS orders.
SNMP management model
NMS As the network administrator, NMS manages/monitors network devices by SNMP on
its server. It can request the Agent to inquire or modify specified parameter(s). NMS can receive the Trap actively sent by the Agent to be updated with the states of the managed devices. Agent As an agent process of the managed devices, it maintains device data and responds to the NMS requests by reporting management data. Agent will fulfill relevant orders through MIB Table and transmit the results back to NMS after receiving its request. Devices will take the initiative to transmit info related to the current statues of devices to NMS through Agent once a fault or another event occurs. Management object It refers to the object under management. Each device may have more than one objects, including a piece of hardware (e.g. an interface board), partial hardware and
81

software (e.g. routing protocol), as well as other configuration item sets MIB MIB is a database specifying the variables maintained by the management object (i.e.
the info that can be inquired and set by the Agent). MIB defines the attributes of the management object, including the name, state, access right and data type. The following functions can be realized through MIB: Agent will master the instant device info by inquiring MIB and set the state configuration items by changing MIB.
Note: Please enable the SNMP global switch before connecting to SNMP Please enter the path below to configure the global switch for SNMP, or refer to
section 12.1.1 Menu Path: “Security > Management Access > Management Service”
16.4.1 View
1. Click the “Management > SNMP > View” in the navigation bar as follows.

Interface data are as follows.

Configuration

Description

Items

View

View name

OID Subtree Type

View OID View type: “Included” or “Excluded”

2. “Add” the corresponding configuration, “Apply” and finish.

82

16.4.2 Group 1. Click the “Management > SNMP > Group” in the navigation bar as follows.

Interface data are as follows.

Configuration Items

Description

Group

Group name

Version

V1, V2, V3

Security Level

Security level

View

Views are divided into view reading, writing and notification.

2. Click the “Add” to fill in corresponding configuration. “Apply” and finish.

83

16.4.3 Community 1. Click the “Management > SNMP > Community” in the navigation bar as follows.

Interface data are as follows.

Configuration

Description

Items

Community

Community configuration

Group

Group name

View

View name

Access:

Authority: read only or read-write

2. “Add” the corresponding configuration. “Apply” and finish.
84

16.4.4 User 1. Click the “Management > SNMP > User” in the navigation bar as follows.

Interface data are as follows. Configuration Items User Group Security Level Authentication Method Privacy Method

Description Username Group name Security level Authentication mode Encryption mode

2. “Add” the corresponding configuration. “Apply” and finish.

85

16.4.5 Engine ID 1. Click the “Management > SNMP > Engine ID” in the navigation bar as follows.
2. Click the “User Defined” to fill in corresponding ID value. “Apply” and finish.
86

16.4.6 Trap Event 1. Click the “Management > SNMP > Trap Event” in the navigation bar as follows.

Interface data are as follows.

Configuration Items

Description

Authentication Failure

Authentication error

Link Up / Down Port link up/down

Cold start

Cold start

Warm start

Warm start

2. “Apply” and finish.

16.4.7 Notification 1. Click the “Management > SNMP > Notification” in the navigation bar as follows.

87

Interface data are as follows.

Configuration Items Address Type

Description Address type: “Host Name”, “IPv4” or “IPv6”

Server Address Server address info

Version Type

SNMP versions: v1, v2 and v3 Notification type: “Trap” or “Inform”

Community / User Community or username

Security Level

Security Level

Server port

162 by default ranging from 1 to 65,535

Timeout

Timeout period: 15s by default ranging from 1 to 300s.

Retry

The retry interval ranges from 1 to 255s with 3s by default.

2. “Add” the corresponding configuration. “Apply” and finish.

88

Documents / Resources

airlive WEB-10XGF8 Web Smart Switch [pdf] User Manual
WEB-10XGF8 Web Smart Switch, WEB-10XGF8, Web Smart Switch, Smart Switch, Switch

References

Leave a comment

Your email address will not be published. Required fields are marked *