background image

Modifying Multiple Hosts

63

To modify Multiple Hosts:

1

Click 

Policy > Security > Multiple Host > Modify

. The 

Multiple Host 

Modify Page 

opens:

Figure 34   

Multiple Host Modify Page

The 

Multiple Host Modify Page 

contains the following fields: 

Port

 — Displays the port number for which advanced port-based 

authentication is enabled. 

Enable Multiple Hosts

 — Indicates whether multiple hosts are 

enabled. Multiple hosts must be enabled in order to either disable the 
ingress-filter, or to use port-lock security on the selected port. The 
possible field values are: 

Multiple

 — Multiple hosts are enabled.

Disable

— Multiple hosts are disabled.

Action on Violation 

— Defines the action to be applied to packets 

arriving in single-host mode, from a host whose MAC address is not 
the supplicant MAC address. The possible field values are:

Forward

 — Forwards the packet.

Discard

 — Discards the packets. This is the default value.

Shutdown

 — Discards the packets and shuts down the port. The 

port remains shut down until reactivated, or until the device is 
reset.

Summary of Contents for 3CRUS2475 24

Page 1: ...www 3Com com Part No 10015245 Rev AA Published October 2006 3Com Unified Gigabit Wireless PoE Switch 24 User Guide 3CRUS2475...

Page 2: ...t to remove or deface any portion of any legend provided on any licensed program or documentation contained in or delivered to you in conjunction with this User Guide Unless otherwise indicated 3Com r...

Page 3: ...nitors and troubleshoots network devices from a remote web browser The Embedded Web Interface web pages are easy to use and easy to navigate In addition The Embedded Web Interface provides real time g...

Page 4: ...ACLs and device access methods Managing System Information Provides information for configuring general system information including the user defined system name the user defined system location and...

Page 5: ...mapping policies and configuring Trust mode Managing System Logs Provides information for viewing system logs and configuring device log servers Managing System Files Provides information for definin...

Page 6: ...tions Table 1 lists conventions that are used throughout this guide Related Documentation In addition to this guide other documentation available for the 3Com Unified Switch 24 include the following Q...

Page 7: ...ning Wireless Settings 18 Step 5 Saving Configured Settings 19 2 GETTING STARTED Starting the 3Com Embedded Web Interface 20 Understanding the 3Com Embedded Web Interface 22 Using Screen and Table Opt...

Page 8: ...ultiple Hosts 61 Modifying Multiple Hosts 62 Managing Port Security 64 Enabling Storm Control 68 Configuring EAP Statistics 71 Defining ACLs 73 Configuring ACLs 76 Defining MAC based ACL Rules 78 Remo...

Page 9: ...AG Membership 136 7 CONFIGURING VLANS Defining VLAN Properties 140 Defining VLAN Membership 144 Defining VLAN Interface Settings 147 Defining GVRP 151 Defining Voice VLAN 154 8 DEFINING WLAN Defining...

Page 10: ...RWARDING Defining IGMP Snooping 205 Enabling IGMP Snooping 207 Defining Multicast Groups 209 Defining Router Groups 215 11 CONFIGURING SPANNING TREE Defining Classic Spanning Tree for Ports 219 Config...

Page 11: ...SYSTEM FILES Backing Up and Restoring System Files 265 Downloading the Software Image 267 Activating Image Files 269 15 VIEWING STATISTICS Viewing RMON Statistics 271 Configuring RMON History 274 Mod...

Page 12: ...TTINGS B DEVICE SPECIFICATIONS AND FEATURES Related Standards 308 Environmental 308 Physical 309 Electrical 309 Unified Switch 24 Features 310 C TROUBLESHOOTING Problem Management 316 Troubleshooting...

Page 13: ...ameters that can be manually configured by the system administrator The wizard includes the following steps Step 1 Viewing Factory Defaults Step 2 Configuring System Settings Step 3 Configuring IP Set...

Page 14: ...0 160 characters System Location Defines the location where the system is currently running The field range is 0 160 characters System Contact Defines the name of the contact person The field range is...

Page 15: ...nd can contain up to 32 characters Security Type Indicates the method used to secure WLAN access The possible field values are Open Enables open system authentication without encryption WEP Indicates...

Page 16: ...o Enable Enables the Master Radio Country Code Displays a list of country codes System Name Defines the user defined device name The field range is 0 160 characters System Location Defines the locatio...

Page 17: ...the IP Interface is configured by the user DHCP Indicates that the IP Interface is dynamically created IP Address Displays the currently configured IP address Subnet Mask Displays the currently confi...

Page 18: ...que SSID are denied network access Each SSID must be unique and can contain up to 32 characters Security Type Indicates the method used to secure WLAN access The possible field values are Open Enables...

Page 19: ...higher bit rates Passphrase Key Indicates the encryption key type VLAN ID Specifies the VLAN ID 7 Define the fields 8 Click to move to the final stage Step 5 Saving Configured Settings The Manual Con...

Page 20: ...ice Starting the 3Com Embedded Web Interface Disable the popup blocker before beginning device configuration using the EWS This section contains information on starting the 3Com Embedded Web interface...

Page 21: ...ame and password The device is configured with a user name that is admin and a password that is blank and can be configured without entering a password Passwords are case sensitive To operate the devi...

Page 22: ...figuration located at the top of the home page the tab view contains a Setup Wizard and the Summary Wired and Wireless configuration views Tree View Tree View provides easy navigation through the conf...

Page 23: ...ding modifying and deleting configuration parameters Device Representation The 3Com Embedded Web Interface Home Page contains a graphical panel representation of the device that appears within the Wir...

Page 24: ...g the 3Com Embedded Web Interface Management Buttons Configuration Management buttons and icons provide an easy method of configuring device information and include the following Table 2 3Com Web Inte...

Page 25: ...Table Options 3Com contains screens and tables for configuring devices This section contains the following topics Viewing Configuration Information Adding Configuration Information Modifying Configura...

Page 26: ...e Port Settings Summary Page opens Figure 10 Port Settings Summary Page Adding Configuration Information User defined information can be added to specific 3Com Web Interface pages by opening a Setup p...

Page 27: ...Using Screen and Table Options 27 Figure 11 Password Management Setup Page 2 Define the fields 3 Click The configuration information is saved and the device is updated...

Page 28: ...g Configuration Information 1 Click Wired Ports LACP Modify A modification page such as the LACP Modify Page opens Figure 12 LACP Modify Page 2 Modify the fields 3 Click The fields are modified and th...

Page 29: ...on Information 1 Click Administration Management Access Remove The Management Access Remove Page opens Figure 13 Management Access Remove Page 2 Select the management method to be deleted 3 Click The...

Page 30: ...ation Page A message appears The operation will save your configuration Do you wish to continue 2 Click A Configuration is saved to flash memory successful message appears 3 Click The configuration is...

Page 31: ...e 2 Click A confirmation message is displayed 3 Click The device is reset and a prompt for a user name and password is displayed 4 Enter a user name and password to reconnect to the web interface Rest...

Page 32: ...ation Reset The Reset Page opens Figure 16 Reset Page 2 Click The system is restored to factory defaults Logging Off the Device To log off the device 1 Click The Logout Page opens 2 The following mess...

Page 33: ...d configure essential information required for setting up and maintaining device settings The various views display the settings configured in the Wizard and other basic maintenance views For further...

Page 34: ...The Device Summary Page opens Figure 17 Device Summary Page The Device Summary Page contains the following fields Product Description Displays the device model number and name System Name Defines the...

Page 35: ...e 41 days 2 hours 22 minutes and 15 seconds Software Version Displays the installed software version number Boot Version Displays the current boot version running on the device Hardware Version Displa...

Page 36: ...s RJ45 Displays the port status of the RJ45 Registered Jack 45 connections which are the physical interface used for terminating twisted pair type cable SFP Displays the port status of the Small Form...

Page 37: ...cess point status Ensure that the Wireless Controller Software WCS has been activated To view Wireless Access Point Settings 1 Click Device Summary Wireless The Wireless Page opens Figure 19 Wireless...

Page 38: ...based on MIMO Multiple input multiple output technology which uses multiple antennas at both the source transmitter and the destination receiver to minimize errors and optimize data speed Channel Dis...

Page 39: ...re device management security password management defining RADIUS and TACACS authentication This section includes the following topics Defining Management Access Configuring Password Management Port b...

Page 40: ...ccessed by all interfaces To view Management Access 1 Click Administration Management Access Summary The Management Access Summary Page opens Figure 20 Management Access Summary Page The Management Ac...

Page 41: ...ss to the device SNMP Assigns SNMP access to the rule If selected users accessing the device using SNMP meeting access profile criteria are permitted or denied access to the device HTTP Assigns HTTP a...

Page 42: ...ther locally or on an external server User authentication occurs in the order the methods are selected If the first authentication method is not available the next selected method is used The possible...

Page 43: ...ted access profile Access Profiles cannot be removed when Active Unchecked Maintains the access profiles Management Method Defines the management method for which the rule is defined Source IP Address...

Page 44: ...Password Management Summary The Password Management Summary Page opens Figure 23 Password Management Summary Page The Password Management Summary Page contains the following fields User Name Displays...

Page 45: ...elds User Name Displays the user name Access Level Displays the user access level The lowest user access level is Monitoring and the highest is Configuration Configuration Provides users read and writ...

Page 46: ...lays the user name Access Level Displays the user access level The lowest user access level is Monitoring and the highest is Configuration Configuration Provides users read and write access rights Mon...

Page 47: ...Removes the user from the User Name list The possible field values are Checked Removes the selected local user Unchecked Maintains the local users User Name Displays the user name Access Level Display...

Page 48: ...defined RADIUS servers To configure RADIUS Servers 1 Click Administration Authentication RADIUS Setup The Radius Authentication Setup Page opens Figure 27 Radius Authentication Setup Page The Radius...

Page 49: ...rvice requests The range is 0 2000 The default value is 0 Key String Defines the default key string used for authenticating and encrypting all RADIUS communications between the device and the RADIUS s...

Page 50: ...rvices Authentication Provides authentication during login and via user names and user defined passwords Authorization Performed at login Once the authentication session is completed an authorization...

Page 51: ...ds Host IP Address Defines the TACACS Server IP address Key String Defines the default authentication and encryption key for TACACS communication between the device and the TACACS server Authenticatio...

Page 52: ...52 CHAPTER 3 MANAGING DEVICE SECURITY Checked Enables a single connection Unchecked Disables a single connection 2 Define the fields 3 Click The TACACS Server is enabled and the device is updated...

Page 53: ...ve data Ports are authenticated via the RADIUS server using the Extensible Authentication Protocol EAP Port based authentication includes Authenticators Specifies the device port which is authenticate...

Page 54: ...port based authentication on the device Disable Disables port based authentication on the device Authentication Method Specifies the authentication method used for port authentication The possible fi...

Page 55: ...ID 2 Define the fields 3 Click The 802 1x Global Settings are enabled and the device is updated To view Port based Authentication 1 Click Policy Security Port Authentication Summary The Port Authenti...

Page 56: ...cation is enabled on the device Reauthentication Period Displays the time span in seconds in which the selected port is reauthenticated The field default is 3600 seconds The field range is 300 4294967...

Page 57: ...ys the admin port authorization state ForceUnauthorized Indicates that either the port control is force Unauthorized and the port link is down or the port control is Auto but a client has not been aut...

Page 58: ...is not received after the defined period the authentication process is restarted The field default is 2 retries The field range is 0 65535 Supplicant Timeout Displays the Supplicant Timeout The field...

Page 59: ...t access lists The Authenticated Hosts Page contians the following fields User Name Contains a list of the various RADIUS servers used as authenticators as defined in the Add User Name Port Indicates...

Page 60: ...Name Lists the supplicants that were authenticated and are permitted on each port Session Time Displays the amount of time in seconds the supplicant was logged on the port Authentication Method Displa...

Page 61: ...ch advanced port based authentication is enabled Multiple Hosts Indicates whether multiple hosts are enabled Multiple hosts must be enabled in order to either disable the ingress filter or to use port...

Page 62: ...ined only if multiple hosts are disabled The field range is 1 1 000 000 The default is 10 seconds Status Indicates the host status If there is an asterisk the port is either not linked or is down The...

Page 63: ...enabled in order to either disable the ingress filter or to use port lock security on the selected port The possible field values are Multiple Multiple hosts are enabled Disable Multiple hosts are di...

Page 64: ...AC addresses can be dynamically learned or statically configured Locked port security monitors both received and learned packets that are received on specific ports Access to the locked port is limite...

Page 65: ...d is currently receiving and transmitting traffic Locked The port is currently disabled and is not currently receiving or transmitting traffic Learning Mode Defines the locked port type The Learning M...

Page 66: ...to packets arriving in single host mode from a host whose MAC address is not the supplicant MAC address The possible field values are Forward Forwards the packet Discard Discards the packets This is...

Page 67: ...rmed to static MAC addresses When the port is unlocked they are removed from the static list Learning Mode Defines the locked port type The Learning Mode field is enabled only if Locked is selected in...

Page 68: ...onds between traps The default value is 10 seconds 2 Define the fields 3 Click The Port Security settings are modified and the device is updated Enabling Storm Control Storm control limits the amount...

Page 69: ...o the selected ports Port Indicates the port from which storm control is enabled Enable Broadcast Control Indicates if forwarding Broadcast packet types is enabled on the interface Enable Enables broa...

Page 70: ...cast storm control To modify Storm Control Settings 1 Click Policy Storm Control Modify The Storm Control Modify Page opens Figure 38 Storm Control Modify Page The Storm Control Modify Page contains t...

Page 71: ...Threshold Indicates the maximum rate kilobits per second at which unknown packets are forwarded The range is 3 500 1 000 000 The default value is 3 500 2 Modify the fields 3 Click Storm control is en...

Page 72: ...e port Log off Frames Receive Indicates the number of EAPOL Logoff frames that have been received on the port Respond ID Frames Receive Indicates the number of EAP Resp Id frames that have been receiv...

Page 73: ...that are made of the filters that determine traffic classifications The following fiters can be defined as ACEs Source Port IP Address and Wildcard Mask Filters the packets by the Source port IP addre...

Page 74: ...h ACE is matched to a packet on a first match basis The possible field values are 1 2147483647 Source Address Indicates the source MAC address Source Mask Indicates the MAC address Source Mask Destina...

Page 75: ...values are Permit Forwards packets which meet the ACL criteria Deny Drops packets which meet the ACL criteria Shutdown Drops packet that meet the ACL criteria and disables the port to which the packet...

Page 76: ...kets are matched on a first fit basis Source Address Indicates the source MAC address Source Wild Card Mask Indicates the source MAC Address wild card mask Wild cards are used to mask all or part of a...

Page 77: ...F the first two bits of the MAC are used while the last two bits are ignored VLAN ID Matches the packet s VLAN ID to the ACL CoS Classifies traffic based on the CoS tag value CoS Mask Defines the CoS...

Page 78: ...rder in the ACL list Source Address Indicates the source MAC address Source Wild Card Mask Indicates the source MAC Address wild card mask Wild cards are used to mask all or part of a source MAC addre...

Page 79: ...ts of the MAC are used while the last two bits are ignored VLAN ID Specifies the VLAN ID CoS Classifies traffic based on the CoS tag value CoS Mask Defines the CoS mask used to classify network traffi...

Page 80: ...based ACLs Remove ACL Enables the ACL to be removed Priority Defines the rule priority for the MAC based ACL VLAN ID Specifies the VLAN ID CoS Classifies Class of Service of the packet CoS Mask Define...

Page 81: ...ch the packet was addressed Ports are reactivated from the Interface Configuration Page 2 Select the ACL Name to be deleted 3 Enable ACL Removal and select the ACL to be removed from the table 4 Click...

Page 82: ...of the IP based ACLs Priority Indicates the ACE priority that determines which ACE is matched to a packet based on a first match basis The possible field value is 1 2147483647 Protocol Creates an ACE...

Page 83: ...Flag Set Sets the indicated TCP flag that can be triggered ICMP Type Specifies an ICMP message type for filtering ICMP packets ICMP Code Specifies an ICMP message code for filtering ICMP packets ICMP...

Page 84: ...New Rule Priority Enables the new rule priority New Rule Priority Defines the ACL priority ACLs are checked on the first fit basis The ACL priority defines the ACL order in the ACL list Protocol Creat...

Page 85: ...es that all the bits are important For example if the source IP address 149 36 184 198 and the wildcard mask is 255 36 184 00 the first eight bits of the IP address are ignored while the last eight bi...

Page 86: ...sed to match packets to ACLs Action Indicates the ACL forwarding action Possible field values are Permit Forwards packets which meet the ACL criteria Deny Drops packets which meet the ACL criteria Shu...

Page 87: ...are checked on the first fit basis The ACL priority defines the ACL order in the ACL list Protocol Enables creating an ACL based on a specific protocol Select from List Selects a protocol from a list...

Page 88: ...ss Matches the destination IP address to which packets are addressed to the ACL Wild Card Mask Indicates the destination IP Address wild card mask Wild cards are used to mask all or part of a destinat...

Page 89: ...riteria and disables the port to which the packet was addressed Ports are reactivated from the Interface Configuration Page 2 Select an ACL from the ACL Name drop down list 3 Define the rule setup fie...

Page 90: ...Removes an ACL The possible field values are Checked Removes the selected IP based ACL Unchecked Maintains the IP based ACL Priority Indicates the ACL priority which determines which ACL is matched to...

Page 91: ...DSCP value or the IP Precedence value is used to match packets to ACLs IP Prec Indicates matching ip precedence with the packet ip precedence value Action Indicates the ACL forwarding action Possible...

Page 92: ...mary Page contains the following fields Ports Displays the ACL Port parameters The possible field values are Interface Displays the port interface for which the ACL parameters are defined ACL Name Con...

Page 93: ...rts or LAGs interface to be configured Ports Selects the ports interface to be bound LAGs Selects the LAGs interface to be bound Bind ACL Binds the interface to the ACL interface MAC based ACL Binds t...

Page 94: ...tains information for configuring general system information and includes the following Viewing System Description Defining System Settings Configuring Country Codes Configuring System Name Configurin...

Page 95: ...k Device Summary The Device Summary Information Page opens Figure 50 Device Summary Information Page The Device Summary Information Page contains the following fields Product Description Displays the...

Page 96: ...isplays the device MAC address System Up Time Displays the amount of time since the most recent device reset The system time is displayed in the following format Days Hours Minutes and Seconds For exa...

Page 97: ...97 Defining System Settings The following section allows system administrators to configure advanced system settings The section includes the following Configuring Country Codes Configuring System Nam...

Page 98: ...and settings see WLAN Country Settings To configure the Country Code 1 Click Administration Country Code The Country Codes Page opens Figure 51 Country Codes Page The Country Codes Page contains the...

Page 99: ...2 4835 Brazil BR C 36 40 44 48 52 56 60 64 149 153 157 161 200 mW EIRP 1 W EIRP 5 725 5 85 1 11 1 W EIRP 2 4 2 4835 Canada CA A 36 40 44 48 52 56 60 64 149 153 157 161 50 mW 6 dBi 200 mW 250 mW 6 dBi...

Page 100: ...0 124 128 132 140 200 mW EIRP200 mW EIRP1 W EIRP 5 15 5 255 25 5 355 47 5 725 1 11 100 mW EIRP 2 4 2 4835 Estonia EE E 36 40 44 48 52 56 60 64 149 153 157 161 50 mW 6 dBi 200 mW250 mW 6 dBi 1 W1 W 6 d...

Page 101: ...60 64 149 153 157 161 200 mW EIRP200 mW EIRP1 W 6 dBi 4 W 5 15 5 25 5 25 5 35 5 725 5 85 1 11 100 mW EIRP 2 4 2 4835 Hungary HU E 36 40 44 48 52 56 60 64 200 mW EIRP 5 15 5 255 25 5 35 1 11 1 W EIRP 2...

Page 102: ...120 124 128 132 140 1 11 100 mW EIRP 2 4 2 4835 Italy IT E 36 40 44 48 52 56 60 200 mW EIRP200 mW EIRP1 W EIRP 5 15 5 25 5 25 5 35 5 47 5 725 64 104 108 112 116 120 124 128 132 140 1 11 100 mW EIRP 2...

Page 103: ...104 108 112 116 120 124 128 132 140 1 11 100 mW EIRP 2 4 2 4835 Latvia LV E 36 40 44 48 52 56 60 50 mW 6 dBi 200 mW250 mW 6 5 15 5 25 5 25 5 35 5 725 5 85 64 149 153 dBi 1 W1 W 6 157 161 dBi 4 W 1 11...

Page 104: ...53 dBi 1 W1 W 6 157 161 dBi 4 W 1 11 1 W Restricted Antennas 2 4 2 4835 Philippines PH C TBA TBA 5 725 5 875 100 mW EIRP 2 4 2 4835 Poland PL E 36 40 44 48 52 56 60 200 mW EIRP 1 W EIRP 2 4 2 4835 64...

Page 105: ...15 5 255 25 5 355 725 5 85 64 149 153 dBi 1 W1 W 6 157 161 dBi 4 W 1 11 1 W Restricted Antennas 2 4 2 4835 Slovak Republic SK E 36 40 44 48 52 56 60 64 149 153 157 161 50 mW 6 dBi 200 mW250 mW 6 dBi...

Page 106: ...25 5 35 1 11 1 W Conducted Output 2 4 2 4835 United States of America LOW USL A 36 40 44 48 52 56 60 64 50 mW 6 dBi 200 mW250 mW 6 dBi 1 W 5 15 5 25 5 25 5 35 1 11 1 W Conducted Output 2 4 2 4835 Unit...

Page 107: ...tup Page includes the following fields System Name Defines the user defined device name The field range is 0 160 characters System Location Defines the location where the system is currently running T...

Page 108: ...f March until the last weekend of October Bahamas From April to October in conjunction with Daylight Savings Time in the United States Belarus From the last weekend of March until the last weekend of...

Page 109: ...ast weekend of March until the last weekend of October India India does not use Daylight Saving Time Iran From Farvardin 1 until Mehr 1 Iraq From April 1 until October 1 Ireland From the last weekend...

Page 110: ...uay From April 6 until September 7 Poland From the last weekend of March until the last weekend of October Portugal From the last weekend of March until the last weekend of October Romania From the la...

Page 111: ...dministration Time The Time Page opens Figure 53 Time Page The Time Page contains the following sections Local Settings Displays the system time in the following format Time Indicates the system time...

Page 112: ...Month The month of the year in which DST ends every year The possible field range is Jan Dec Time The time at which DST ends every year The field format is Hour Minute for example 05 30 To Defines th...

Page 113: ...ab allows the latest configuration to be saved to the flash memory To save the device configuration 1 Click Save Configuration The Save Configuration Page opens Figure 54 Save Configuration Page The f...

Page 114: ...ng the Device The Reset page enables resetting the device from a remote location To prevent the current configuration from being lost save all changes from the running configuration file to the startu...

Page 115: ...n contains information for configuring Port Settings and includes the following sections Viewing Port Settings Defining Port Settings Configuring Address Tables Viewing Static Addresses Defining Stati...

Page 116: ...following fields Port Indicates the selected port number PortType Displays the type of the port Port Status Indicates whether the port is currently operational or non operational The possible field va...

Page 117: ...ities to its partner Advertisement Defines the auto negotiation setting the port advertises The possible field values are Max Capability Indicates that all port speeds and duplex mode settings are acc...

Page 118: ...connected to each other or two end stations are connected to each other a crossover cable is used to ensure that the correct pairs are connected The possible field values are MDIX Media Dependent Int...

Page 119: ...ains the following fields Port Indicates the selected port number Description Displays a port description Port Type Indicates the type of the port Admin Status Indicates whether the port is currently...

Page 120: ...sion between the device and its link partner in both directions simultaneously Half The interface supports transmission between the device and the client in only one direction at a time Current Duplex...

Page 121: ...in full duplex mode Current Flow Control Displays the current flow control status on the port MDI MDIX Displays the MDI MDIX status on the port Hubs and switches are deliberately wired opposite the wa...

Page 122: ...arning the ports from the frames source address Frames addressed to a destination MAC address that is not associated with any port are flooded to all ports of the relevant VLAN Static addresses are ma...

Page 123: ...ossible values are Permanent The MAC address is permanent Delete on Reset The MAC address is deleted when the device is reset Delete on Time out The MAC address is deleted when a timeout occurs Secure...

Page 124: ...ins the following fields Interface Displays specific port or LAG to which the static MAC address is applied MAC address Displays the MAC addresses listed in the current static addresses list VLAN ID D...

Page 125: ...e out The MAC address is deleted when a timeout occurs Secure Used for defining static MAC Addresses for Locked ports Removing Static Addresses To remove Static addresses 1 Click Wired Ports Address T...

Page 126: ...e internally used VLANs assigned to an port or trunk on which an IP address is configured MAC address The MAC addresses listed in the current static addresses list Interface The specific port or LAG t...

Page 127: ...ing and viewing the Dynamic Address list The Current Address Table contains dynamic address parameters by which packets are directly forwarded to the ports To open the Dynamic MAC Address Summary Page...

Page 128: ...e two interface types from which to select MAC Address Specifies the MAC address for which the table is queried VLAN ID The VLAN ID for which the table is queried Address Table Sort Key Specifies the...

Page 129: ...a LAG must be the same media type A VLAN is not configured on the port The port is not assigned to a different LAG Auto negotiation mode is not configured on the port The port is in full duplex mode A...

Page 130: ...o link aggregation port groups Each group is comprised of ports with the same speed To configure LACP Setup 1 Click Wired Ports LACP Setup The LACP Setup Page opens Figure 61 LACP Setup Page The LACP...

Page 131: ...ACP Modify Page contains the following fields Port Displays the port number to which timeout and priority values are assigned LACP Port Priority Specifies port priority value The field range is 1 6553...

Page 132: ...width between the devices increases port flexibility and provides link redundancy To view Link Aggregation 1 Click Wired Ports Link Aggregation Summary The Link Aggregation Summary Page opens Figure 6...

Page 133: ...isplays the auto negotiation status on the LAG Auto negotiation is a protocol between two link partners that enables a LAG to advertise its transmission rate duplex mode and flow control abilities to...

Page 134: ...Current Auto Negotiation Displays the current LAG auto negotiation status Admin Advertisement Defines the auto negotiation setting the LAG advertises The possible field values are Max Capability Indi...

Page 135: ...rently operating at 100 Mbps 1000M Indicates the LAG is currently operating at 1000 Mbps Current Speed Displays the current LAG speed Admin Flow Control Displays the flow control status on the LAG Ope...

Page 136: ...ink Aggregation Membership Page opens Figure 65 Link Aggregation Membership Page The Link Aggregation Setup Page contains the following fields LAG Specifies if the port is part of a LAG LAG Name Displ...

Page 137: ...Defining LAG Membership 137...

Page 138: ...within the VLAN a Layer 3 router working at a protocol level is required to allow traffic flow between VLANs Layer 3 routers identify segments and coordinate with VLANs VLANs are Broadcast and Multica...

Page 139: ...139 Defining Voice VLAN Defining GVRP...

Page 140: ...Summary Page contains the following fields and buttons Back Displays the following page of VLANs in the VLAN Summary table if there is a page following the current page Next Displays the previous page...

Page 141: ...The possible field values are Enabled Indicates authentication is disabled for the specified VLAN ID Disabled Indicates authentication is enabled for the specified VLAN ID The Setup Page creates VLANS...

Page 142: ...following fields VLAN ID Displays the VLAN ID VLAN Name Displays the user defined VLAN name Disable Authentication Indicates whether authentication is enabled for the specific VLAN ID The possible fi...

Page 143: ...nt VLAN entries VLAN ID Displays the VLAN ID VLAN Name Displays the user defined VLAN name Type Indicates the if the VLAN was dynamically or statically created Authentication Indicates whether authent...

Page 144: ...ummary The VLAN Membership Summary Page opens Figure 70 VLAN Membership Summary Page The VLAN Membership Summary Page contains the following fields VLAN ID Displays the user defined VLAN ID VLAN Name...

Page 145: ...signed VLAN membership by toggling through the Port Control settings To modify VLAN Membership 1 Click Policy VLAN Membership Modify The VLAN Membership Modify Page opens Figure 71 VLAN Membership Mod...

Page 146: ...face VLAN membership even if GARP indicates the port is to be added Tagged Indicates the interface is a tagged member of a VLAN All packets forwarded by the interface are tagged The packets contain VL...

Page 147: ...LAN Interface Settings Summary The VLAN Interface Settings Summary Page opens Figure 72 VLAN Interface Settings Summary Page The VLAN Interface Settings Summary Page contains the following fields Port...

Page 148: ...4095 is defined as per standard and industry practice as the Discard VLAN Packets classified to the Discard VLAN are dropped Frame Type Specifies the packet type accepted on the port The possible fiel...

Page 149: ...ongs to VLANs and each VLAN is user defined as tagged or untagged full IEEE802 1q mode Access Indicates a port belongs to a single untagged VLAN When a port is in Access mode the packet types which ar...

Page 150: ...re accepted on the port Ingress Filtering Indicates whether ingress filtering is enabled on the port The possible field values are Enable Enables ingress filtering on the device Ingress filtering disc...

Page 151: ...vidually configure each bridge and register VLAN membership The GVRP Summary Page displays the GVRP configuration for ports and LAGS To view GVRP Settings 1 Click Policy VLAN GVRP Summary The GVRP Sum...

Page 152: ...c VLAN creation is enabled on the interface The possible field values are Enabled Enables Dynamic VLAN creation on the interface Disabled Disables Dynamic VLAN creation on the interface GVRP Registrat...

Page 153: ...Indicates if Dynamic VLAN creation is enabled on the interface The possible field values are Enable Enables Dynamic VLAN creation on the interface Disable Disables Dynamic VLAN creation on the interf...

Page 154: ...ved unevenly The system currently supports one voice VLAN When configuring Voice VLAN ensure the following IP phones are configured with VLAN mode as enabled ensuring that tagged packets are used for...

Page 155: ...AN Only ports which were defined in the VLAN membership page are active Secured Indicates if secure ports drop all non voice IP traffic The possible field values are Checked Indicates that all ports a...

Page 156: ...bridging between 802 11 and ethernet points Access points also extend the physical size of wireless networks When several access points are grouped they allow network users to roam This section includ...

Page 157: ...he type and radio configuration and the current access point status Ensure that the Wireless Controller Software WCS has been activated To view Wireless Access Points 1 Click Wireless Access Point Sum...

Page 158: ...Indicates the radio transceiver type The field values are A Indicates the radio type is 802 11a G Indicates the radio type is 802 11g b g Indicates the radio type is 802 11b g n Indicates the radio t...

Page 159: ...urrent Access Points Activation State Indicates the access point state The possible field values are Activated Indicates access point is currently active Discovered Indicates access point was discover...

Page 160: ...t Reset Page The Wireless Access Point Reset Page contains the following fields Access Point Contains a list of either the user defined access points or the MAC address assigned to wireless networks A...

Page 161: ...ts The optional displays are All Displays all Access Points Discovered APs Displays discovered Access Points Active APs Displays active Access Points Name Displays the user defined access point name I...

Page 162: ...and VLANs in a WLAN network An ESS are a group of access points that share the same Service Set Identification SSID APs announce their ESS membership by SSID parameter via Beacon frames When stations...

Page 163: ...Service Set Identifier SSID for the ESS SSIDs act as a password when a mobile device attempts to connect to the BSS SSIDs differentiates between WLANs therefore all access points and devices which co...

Page 164: ...hrase Key Indicates the encryption key type 2 Define the fields 3 Click The Wireless Configuration is saved at the end of the wizard setup and the device is updated Defining Wireless Rogue Handling Ac...

Page 165: ...ddress assigned to wireless networks Scanning Interval Indicates the scanning Intervals The possible field values are Long Scans for rouges at 240 second intervals Short Scans for rouges at 20 second...

Page 166: ...e table The possible field values are SSID Sorts according to the access point Service Set IDentifier SSID associated with the rogue The SSID is the name of the ESS to which the transceiver belongs St...

Page 167: ...system Unknown Indicates the rogue is unknown to the system 2 Select an Access Point to from the List 3 Click The table information is cleared 4 Select a field from the Sort by drop down list 5 Once t...

Page 168: ...Mitigate The Rogue Handling Mitigate Page opens Figure 84 Rogue Handling Mitigate Page The Rogue Handling Mitigate Page contains the following fields Sort by Defines the parameter that will be applie...

Page 169: ...pdated and the device is updated Defining Wireless Radio Settings Access Points can have up to two radio interfaces However each radio interface is configured and controlled separately Radio interface...

Page 170: ...splays the specific access point to which the radio settings are assigned VAP Displays the virtual access point number SSID Broadcast Indicates SSID Broadcasting is enabled SSID Broadcasting allows ac...

Page 171: ...within a specific common access point range but outside range of each other Beacon Interval Indicates the access point beacon transmission rates Short Preamble Indicates that a short preamble is enab...

Page 172: ...ive to the selected country s device power regulations Auto Channel Enables access point channeling Channel Displays the user defined channel 2 Select the Access Point 3 Select the relevant Radio 802...

Page 173: ...Point Name Displays the specific access point to which the radio settings are assigned Remove Removes VAP management for the specific VAP Select Enables VAP management for the specific VAP VAP Display...

Page 174: ...tory Indicates the device must transmit or communicate at this data rate Optional Indicates the device can communicate at this date rate but does not transmit at the selected data rate Not Allowed Ind...

Page 175: ...ncy Selection DFS status DFS permits the system to scan and switch to different channels DFS listens for signals and monitors operating spectrums IF DFS detects a signal the channel associated with th...

Page 176: ...ollowing fields Access Point Name Displays the specific access point to which the radio settings are assigned RTS Threshold Defines the Request to Send RTS Threshold that reduces collisions when multi...

Page 177: ...untry s device power regulations Minimum Sets the power to the minimum power settings relative to the selected country s device power regulations Auto Channel Enables the access point channeling Chann...

Page 178: ...ecific access point to which the radio settings are assigned Remove Removes VAP management for the specific VAP Select Enables VAP management for the specific VAP VAP Displays the VAP Virtual Access P...

Page 179: ...lues are Mandatory Indicates the device must transmit or communicate at this data rate Optional Indicates the device can communicate at this date rate but does not transmit at the selected data rate N...

Page 180: ...ummary Page Profile Name SSID Displays the Profile Name QoS Mode Determines the QoS mode on the interface The possible values are WMM Indicates that QoS is enabled for Wi Fi Multimedia EDCF None Indic...

Page 181: ...Click Wireless Profiles Setup The Profiles Summary Page Profiles Setup Page opens Figure 92 Profiles Setup Page The Profiles Setup Page contains the following fields Profile Name SSID Displays the use...

Page 182: ...name SSID Enables renaming of SSID Load Balancing Enables the even distribution of data or processing packets across available network resources For example load balancing may distribute the incoming...

Page 183: ...s the VLAN mapped to the SSID Security Type Defines the WLAN Security type The security type options are Open Enables open system authentication without encryption WEP Indicates that Wired Equivalent...

Page 184: ...tes that WPA2 PSK is the selected WLAN security method WPA2 PSK improves system security by encrypting signals at a higher bit rates Network Key Indicates that network key is the selected WLAN securit...

Page 185: ...Profiles Remove Page The Profiles Remove Page contains the following fields Profile Name SSID Displays the Profile Name QoS Mode Determines the QoS mode on the interface The possible values are WMM I...

Page 186: ...The Wireless Stations Summary Page contains the following fields MAC Address Displays the MAC address attached to the WLAN station Type Displays the WLAN IP Address Displays the WLAN station s IP addr...

Page 187: ...protect station communications VLAN Displays the VLAN on which the WLAN station is located Session Time Indicates the amount of time the station has been connected to the access point Removing WLAN St...

Page 188: ...at the station is currently associated with the wireless network but has not been authorized and authenticated Authorized Indicates that the station is currently in the authorization process and waiti...

Page 189: ...Wireless Power Settings The WLAN Radio Power Settings Page opens Figure 97 WLAN Radio Power Settings Page The WLAN Radio Power Settings Page contains the following fields Auto Adjust Signal Strength...

Page 190: ...9 CONFIGURING IP INFORMATION This section contains information for defining IP interfaces and includes the following sections Defining IP Addressing Configuring ARP Configuring Address Tables...

Page 191: ...Interface Setup Page opens Figure 98 IP Interface Setup Page The IP Interface Setup Page contains the following fields Configuration Method Indicates if the IP address has been configured statically o...

Page 192: ...192 CHAPTER 9 CONFIGURING IP INFORMATION 3 If Manual has been selected configure the IP Address Subnet Mask and Default Gateway 4 Click The IP configuration is enabled and the device is updated...

Page 193: ...s Figure 99 ARP Settings Summary Page The ARP Settings Summary Page contains the following fields Interface Displays the interface type for which ARP parameters are displayed The possible field value...

Page 194: ...194 CHAPTER 9 CONFIGURING IP INFORMATION Static Indicates the ARP entry is a static entry...

Page 195: ...splays the interface type for which ARP parameters are displayed The possible field value is VLAN Indicates the VLAN for which ARP parameters are defined IP Address Indicates the station IP address wh...

Page 196: ...3 Click The ARP parameters are defined and the device is updated Removing ARP Entries To remove ARP Entries 1 Click Administration IP Addressing ARP Settings Remove The ARP Settings Remove Page opens...

Page 197: ...Defining ARP Interface Settings 197 Unchecked Maintains the current ARP entries...

Page 198: ...earning the ports from the frames source address Frames addressed to a destination MAC address that is not associated with any port are flooded to all ports of the relevant VLAN Static addresses are m...

Page 199: ...us The possible field values are Permanent The MAC address is permanent Delete on Reset The MAC address is deleted when the device is reset Delete on Time out The MAC address is deleted when a timeout...

Page 200: ...Page The Static Addresses Setup Page contains the following fields Interface The specific port or LAG to which the static MAC address is applied MAC address The MAC addresses listed in the current st...

Page 201: ...Defining Static Addresses 201 Delete on Time out The MAC address is deleted when a timeout occurs Secure Used for defining static MAC Addresses for Locked ports...

Page 202: ...MAC Address page also contains information about the aging time before a dynamic MAC address is erased and includes parameters for querying and viewing the Dynamic Address list The Current Address Tab...

Page 203: ...ifies the interface for which the table is queried There are two interface types from which to select Port or LAG MAC Address Specifies the MAC address for which the table is queried VLAN ID The VLAN...

Page 204: ...IGURING MULITCAST FORWARDING This section contains information for configuring Multicast forwarding and includes the following sections Defining IGMP Snooping Defining Multicast Groups Defining Router...

Page 205: ...t traffic Ports requesting to join a specific Multicast group issue an IGMP report specifying that Multicast group is accepting members This results in the creation of the Multicast filtering database...

Page 206: ...o receive a message before timing out The field range is 1 2147483648 The default time is 260 seconds MRouter Timeout Indicates the amount of the time the Multicast router waits to receive a message b...

Page 207: ...ng fields IGMP Snooping Status Indicates if IGMP Snooping is enabled on the device IGMP Snooping can be enabled only if Bridge Multicast Filtering is enabled The possible field values are Enable Indic...

Page 208: ...time is 260 seconds MRouter Timeout Indicates the amount of the time the Multicast router waits to receive a message before it times out The default value is 300 seconds Leave Timeout Indicates the am...

Page 209: ...The Multicast Group Summary Page permits new Multicast service groups to be created The Multicast Group Summary Page also assigns ports to a specific Multicast service address group To view Multicast...

Page 210: ...The possible field values are Enabled Enables Multicast filtering on the device Disabled Disables Multicast filtering on the device If Multicast filtering is disabled Multicast frames are flooded to a...

Page 211: ...ation about the Multicast group address Bridge Multicast IP Address Identifies the Multicast group IP address Bridge Multicast IP Address Identifies the Multicast group MAC address Interface Displays...

Page 212: ...st Multicast Group Port Details The Multicast Port Details Page opens Figure 110 Multicast Port Details Page The Multicast Port Details Page contains the following information VLAN ID Identifies a VLA...

Page 213: ...part of a Multicast group To remove Multicast Groups 1 Click Policy Multicast Multicast Group Remove Group The Multicast Port Remove Group Page opens Figure 111 Multicast Port Remove Group Page The M...

Page 214: ...APTER 10 CONFIGURING MULITCAST FORWARDING Multicast Address Identifies the Multicast group MAC IP address 2 Select the VLAN ID to be removed 3 Click The Multicast group is deleted and the device is up...

Page 215: ...cast Router Group Summary Page contains the following information VLAN ID Identifies a VLAN and contains information about the Multicast group address Ports LAG Displays status table according to Port...

Page 216: ...p Modify Page contains the following information VLAN ID Identifies a VLAN and contains information about the Multicast group address Interface Displays the port number Interface Status Indicates the...

Page 217: ...Defining Router Groups 217 2 Modify the Interface Status 3 Click The Interface Status is modified and the device is updated...

Page 218: ...ions avoiding and eliminating loops For more information on configuring Classic STP see Defining Classic Spanning Tree for Ports Rapid STP Detects and uses network topologies that provide faster conve...

Page 219: ...olicy Spanning Tree Classic STP Summary The Classic STP Summary Page opens Figure 114 Classic STP Summary Page The Classic STP Summary Page contains the following fields Port The interface for which t...

Page 220: ...Provides an alternate path to the root switch from the root interface Backup Provides a backup path to the designated port path toward the Spanning Tree leaves Backup ports occur only when two ports a...

Page 221: ...Cost Indicates the cost of the port participating in the STP topology Ports with a lower cost are less likely to be blocked if STP detects loops Forward Transitions Indicates the number of times the p...

Page 222: ...p Page The Classic STP Setup Page contains the following fields Global Settings Bridge Settings Designated Root Settings Global Setting Parameters Spanning Tree State Indicates whether STP is enabled...

Page 223: ...to an interface varies according to the selected method Hello Time Max Age or Forward Delay Bridge Setting Parameters Priority Specifies the bridge priority value When switches or bridges are running...

Page 224: ...Bridge The default is zero Root Path Cost Specifies the cost of the path from this bridge to the Root Bridge Topology Changes Counts Specifies the total amount of STP state changes that have occurred...

Page 225: ...icates if STP is enabled on the port The possible field values are Enabled Indicates that STP is enabled on the port Disabled Indicates that STP is disabled on the port Port Fast Indicates if Fast Lin...

Page 226: ...s used to forward traffic when a path is re routed The field range is 1 200 000 000 Priority Priority value of the port The priority value influences the port choice when a bridge has two ports connec...

Page 227: ...without creating forwarding loops The Global System LAG information displays the same field information as the ports but represent the LAG RSTP information To define RSTP 1 Click Policy Spanning Tree...

Page 228: ...is enabled on the device Port Status Displays the current STP state of a port If enabled the port state determines what forwarding action is taken on traffic Possible port states are Disabled Indicat...

Page 229: ...on which Rapid STP is enabled Role Displays the port role assigned by the STP algorithm to provide to STP paths The possible field values are Root Provides the lowest cost path to forward packets to t...

Page 230: ...addresses Blocking Indicates that the port is currently blocked and cannot forward traffic or learn MAC addresses Blocking is displayed when Classic STP is enabled Point to Point Admin Status Indicate...

Page 231: ...switch port link type It may differ from the administrative state Disable Disables point to point link Point to Point Operational Status Displays the point to point operating state 2 Click The Rapid...

Page 232: ...Multiple STP Setup Page opens Figure 119 Multiple STP Setup Page The Multiple STP Setup Page contains the following fields Region Name User defined STP region name Revision An unsigned 16 bit number t...

Page 233: ...Defining Multiple Spanning Tree 233 2 Define the fields 3 Click The Multiple STP properties are defined and the device is updated...

Page 234: ...A configuration consists of the name revision and region to which the device belongs Network administrators can define the MSTP instance settings using the Multiple STP Instance Summary Page To view...

Page 235: ...cates the selected instance s path cost Bridge ID Indicates the bridge ID of the selected instance Remaining Hops Indicates the number of hops remaining to the next destination 2 Define the fields 3 C...

Page 236: ...Spanning Tree Multiple STP Port Summary The Multiple STP Port Summary Page opens Figure 122 Multiple STP Port Summary Page The Multiple STP Port Summary Page contains the following fields Interface Th...

Page 237: ...to LANs in an outlying region If the port is a Boundary port this field also indicates whether the device on the other side of the link is working in RSTP or STP mode Master Port Indicates the port is...

Page 238: ...esignated Bridge ID Indicates the bridge priority and the MAC Address of the designated bridge Designated Port ID Indicates the selected port priority and interface Remaining Hops Indicates the number...

Page 239: ...Page contains the following fields Instance ID Lists the MSTP instances configured on the device Possible field range is 0 15 Port State Indicates whether the port is enabled for the specific instanc...

Page 240: ...nt to point link or when a LAN has two or more connections connected to a shared segment Disabled Indicates the port is not participating in the Spanning Tree Mode Indicates the STP mode by which STP...

Page 241: ...s the LAG State has changed from a Forwarding state to a Blocking state Remain Hops Indicates the hops remaining to the next destination Define the Instance ID MSTP Port Status and the Interface Prior...

Page 242: ...NG QUALITY OF SERVICE This section contains information for configuring QoS and includes the following topics Quality of Service Overview Defining QoS Basic Mode Defining QoS General Mode Configuring...

Page 243: ...hing the user defined specifications are classified together Action Defines traffic management where packets are forwarded are based on packet information and packet field values such as VLAN Priority...

Page 244: ...ains the following fields Trust Mode Defines which packet fields to use for classifying packets entering the device When no rules are defined the traffic containing the predefined packet CoS field is...

Page 245: ...o incoming packets To view DSCP Rewrite Values 1 Click Policy QoS Basic Mode DSCP Rewrite Summary The DSCP Rewrite Summary Page opens Figure 125 DSCP Rewrite Summary Page The DSCP Rewrite Summary Page...

Page 246: ...SCP Rewrite Setup Page opens Figure 126 DSCP Rewrite Setup Page The DSCP Rewrite Setup Page contains the following fields DSCP In Displays the incoming packet s DSCP value DSCP Out Displays the outgoi...

Page 247: ...Settings DSCP to Queue Defining CoS Services To view CoS Settings 1 Click Policy QoS General CoS Summary The CoS Summary Page opens Figure 127 CoS Summary Page The CoS Summary Page contains the follow...

Page 248: ...orwarding queue 2 Select the Restore Defaults field to restore Interface factory defaults To configure CoS Settings 1 Click Policy QoS General CoS Modify The CoS Modify Page opens Figure 128 CoS Modif...

Page 249: ...he LAG for which the global QoS parameters are defined Set Default User Priority Determines the default CoS value for incoming packets for which a VLAN tag is not defined The possible field values are...

Page 250: ...e 129 Queue Setup Page The Queue Setup Page contains the following fields Strict Priority Specifies whether traffic scheduling is based strictly on the queue priority WRR Assigns WRR weights to queues...

Page 251: ...type is selected in the Bandwidth Summary Page To view Bandwidth Settings 1 Click Policy QoS General Bandwidth Summary The Bandwidth Summary Page opens Figure 130 Bandwidth Summary Page The Bandwidth...

Page 252: ...0 kbits per second To configure Bandwidth Settings 1 Click Policy QoS General Bandwidth Setup The Bandwidth Setup Page opens Figure 131 Bandwidth Setup Page The Bandwidth Setup Page contains the follo...

Page 253: ...ion Rate CIR Defines CIR as the queue shaping type The possible field value is 4096 1 000 000 000 bits per second Committed Burst Size CbS Defines CbS as the queue shaping type The possible field valu...

Page 254: ...ned to queue 2 To view the DSCP Queue 1 Click Policy QoS General DSCP to Queue Summary The DSCP to Queue Summary Page opens Figure 132 DSCP to Queue Summary Page The DSCP to Queue Summary Page contain...

Page 255: ...General DSCP to Queue Setup The DSCP to Queue Setup Page opens Figure 133 DSCP to Queue Setup Page The DSCP to Queue Setup Page contains the following fields DSCP Displays the incoming packet s DSCP v...

Page 256: ...12 CONFIGURING QUALITY OF SERVICE Configuring QoS Mapping This section contains information for mapping CoS and DSCP values to queues and includes the following sections Defining CoS to Queue Defining...

Page 257: ...e Summary Page opens Figure 134 CoS to Queue Summary Page The CoS to Queue Summary Page contains the following fields Class of Service Specifies the CoS priority tag values where zero is the lowest an...

Page 258: ...Defaults Restores the device factory defaults for mapping CoS values to a forwarding queue Class of Service Specifies the CoS priority tag values where zero is the lowest and 7 is the highest Queue D...

Page 259: ...be filtered based on their urgency or relevancy Each message severity determines the set of event logging devices that are sent per each event message The following table lists the log severity level...

Page 260: ...gging Display Page opens Figure 136 Logging Display Page The Logging Display Page contains the following fields and buttons Save Preview Saves the displayed Log table Clear Logs Deletes all logs from...

Page 261: ...137 Logging Setup Page The Logging Setup Page contains the following fields Enable Local Logging Indicates if device local logs for Cache File and Server Logs are enabled Console logs are enabled by d...

Page 262: ...dicates if device local logs are enabled The possible field values Checked Enables device logs Unchecked Disables device logs Emergency The highest warning level If the device is down or not functioni...

Page 263: ...ng messages Syslog IP Address Defines IP Address to upload syslog messages Syslog Port Defines the Port through which syslog messages are uploaded 2 Enable Logging and define the fields 3 Click The lo...

Page 264: ...d to the device During the session all new commands entered are added to the commands existing in the Running Configuration file Commands are not overwritten To update the Startup file before powering...

Page 265: ...ng system files To download System Files 1 Click Administration Backup Restore Configurations Restore The Backup Restore Configurations Page opens Figure 138 Backup Restore Configurations Page The Bac...

Page 266: ...ation File Specifies the destination file to which to the configuration file is downloaded The possible field values are Running Configuration Downloads commands into the Running Configuration file St...

Page 267: ...mage Page contains the following fields Download via TFTP Enables initiating a download via the TFTP server Download via HTTP Enables initiating a download via the HTTP server or HTTPS server TFTP Ser...

Page 268: ...ation Downloads commands into the Running Configuration file Startup Configuration Downloads the Startup Configuration file and overwrites the old Startup Configuration file 2 Define the fields 3 Clic...

Page 269: ...ge The Active Image Page opens Figure 140 Active Image Page The Active Image Page contains the following fields Active Image The Image file which is currently active on the unit After Reset The Image...

Page 270: ...ISTICS This section contains information for viewing and configuring RMON statistics and contains the following sections Viewing RMON Statistics Configuring RMON History Configuring RMON Events Defini...

Page 271: ...Interface Indicates the device for which statistics are displayed The possible field values are Port Defines the specific port for which RMON statistics are displayed LAG Defines the specific LAG for...

Page 272: ...since the device was last refreshed Undersize Packets Displays the number of undersized packets less than 64 octets received on the interface since the device was last refreshed Oversize Packets Displ...

Page 273: ...1 Bytes Number of 256 to 511 byte frames received on the interface since the device was last refreshed Frames of 512 to 1023 Bytes Number of 512 to 1023 byte frames received on the interface since the...

Page 274: ...The RMON History Control Summary Page contains the following fields History Entry No Displays the entry number for the History Control Table page Source Interface Displays the interface from which the...

Page 275: ...History Control Setup Page The RMON History Control Setup Page contains the following fields New History Entry No Displays the new entry number for the History Control Table page Source Interface Disp...

Page 276: ...g Interval Indicates in seconds the time that samplings are taken from the ports The field range is 1 3600 The default is 1800 seconds equal to 30 minutes 2 Define the fields 3 Click RMON History Cont...

Page 277: ...ntains the following fields History Entry No Displays the entry number for the History Control Table page Source Interface Displays the interface from which the history samples were taken The possible...

Page 278: ...g Interval Indicates in seconds the time that samplings are taken from the ports The field range is 1 3600 The default is 1800 seconds equal to 30 minutes 2 Modify the fields 3 Click RMON History Cont...

Page 279: ...story Remove Control Page contains the following fields Remove Removes a RMON event The possible field values are Checked Removes a selected RMON event Unchecked Maintains RMON events History Entry No...

Page 280: ...sted Displays the number of samples to be saved The field range is 1 65535 The default value is 50 Current Number of Samples Displays the current number of samples taken Owner Displays the RMON statio...

Page 281: ...y Summary Page opens Figure 146 RMON History Summary Page The RMON History Summary Page contains the following fields History Entry No Displays the entry number for the History Control Table page Owne...

Page 282: ...eceived on the interface since the device was last refreshed Oversize Packets Displays the number of oversized packets over 1518 octets received on the interface since the device was last refreshed Fr...

Page 283: ...view RMON Events 1 Click Wired Ports Stats RMON Events Control Summary The RMON Events Control Summary Page opens Figure 147 RMON Events Control Summary Page The RMON Events Control Summary Page conta...

Page 284: ...icates that the event is a trap Log and Trap Indicates that the event is both a log entry and a trap None Indicates that no event occurred Time Displays the time that the event occurred Owner Displays...

Page 285: ...following fields Event Entry Displays the event Community Displays the community to which the event belongs Description Displays the user defined event description Type Describes the event type Possib...

Page 286: ...286 CHAPTER 15 VIEWING STATISTICS 3 Click The RMON Events are defined and the device is updated...

Page 287: ...contains the following fields Event Entry No Displays the event Community Displays the community to which the event belongs Description Displays the user defined event description Type Describes the...

Page 288: ...288 CHAPTER 15 VIEWING STATISTICS 2 Modify the fields 3 Click The RMON Events Control is modified and the device is updated...

Page 289: ...fields Remove Removes a RMON event The possible field values are Checked Removes a selected RMON event Unchecked Maintains RMON events Event Entry Displays the event Community Displays the community t...

Page 290: ...None Indicates that no event occurred Time Displays the time that the event occurred Owner Displays the device or user that defined the event 2 Select the event to be deleted 3 Click The RMON Event is...

Page 291: ...sample To view RMON Events Summary 1 Click Wired Ports Stats RMON Events Events Summary The RMON Events Summary Page opens Figure 151 RMON Events Summary Page The RMON Events Summary Page contains th...

Page 292: ...Alarm Summary Page The RMON Alarm Summary Page contains the following fields Alarm Entry Indicates a specific alarm Counter Name Displays the selected MIB variable Interface Displays interface for whi...

Page 293: ...ates that both the Log and Trap mechanism are used to report alarms Falling Threshold Displays the falling counter value that triggers the falling threshold alarm The falling threshold is graphically...

Page 294: ...ntry Indicates a specific alarm Interface Displays interface for which RMON statistics are displayed The possible field values are Port Displays the RMON statistics for the selected port LAG Displays...

Page 295: ...using the Trap mechanism Both Indicates that both the Log and Trap mechanism are used to report alarms Falling Threshold Displays the falling counter value that triggers the falling threshold alarm Th...

Page 296: ...MON statistics are displayed The possible field values are Port Displays the RMON statistics for the selected port LAG Displays the RMON statistics for the selected LAG Counter Name Displays the selec...

Page 297: ...Trap mechanism are used to report alarms Falling Threshold Displays the falling counter value that triggers the falling threshold alarm The falling threshold is graphically presented on top of the gr...

Page 298: ...emove Removes a RMON event The possible field values are Checked Removes a selected RMON event Unchecked Maintains RMON events Alarm Entry Indicates a specific alarm Counter Name Displays the selected...

Page 299: ...If the device is not reset the entry remains in the Log Table TRAP Indicates that an SNMP trap is generated and sent via the Trap mechanism The Trap can also be saved using the Trap mechanism Both Ind...

Page 300: ...4835 Australia AU N 36 40 44 48 52 56 60 64 149 153 157 161 200 mW EIRP 200 mW EIRP 1 W EIRP 5 15 5 25 5 25 5 35 5 725 5 825 1 11 200 mW EIRP 2 4 2 4835 Belgium BE E 36 40 44 48 52 56 60 64 120 mW EI...

Page 301: ...200 mW EIRP200 mW EIRP1 W EIRP 5 15 5 255 25 5 355 725 5 825 1 11 200 mW EIRP 2 4 2 4835 Germany DE E 36 40 44 48 52 56 60 64 104 108 112 116 120 124 128 132 140 200 mW EIRP200 mW EIRP1 W EIRP 5 15 5...

Page 302: ...4 2 48352 4 2 454 United Kingdom GB E 36 40 44 48 52 56 60 64 104 108 200 mW EIRP200 mW EIRP1 W EIRP 5 15 5 25 5 25 5 35 5 47 5 725 112 116 120 124 128 132 140 1 11 100 mW EIRP 2 4 2 4835 Greece GR E...

Page 303: ...40 44 48 52 56 60 64 200 mW EIRP200 mW EIRP 5 15 5 255 25 5 35 5 13 100 mW EIRP 2 4 2 4835 India IN TBA N A N A N A 4 W EIRP 2 4 2 4835 Iceland IS E 36 40 44 48 52 56 60 200 mW EIRP200 mW EIRP1 W EIR...

Page 304: ...6 60 50 mW 6 dBi 200 mW250 mW 6 5 15 5 25 5 25 5 35 5 725 5 85 64 149 153 dBi 1 W1 W 6 157 161 dBi 4 W 1 11 1 W Restricted Antennas 2 4 2 4835 Luxembourg LU E 36 40 44 48 52 56 60 200 mW EIRP200 mW EI...

Page 305: ...W EIRP 5 15 5 25 5 25 5 35 5 47 5 725 112 116 120 124 128 132 140 1 11 100 mW EIRP 2 4 2 4835 New Zealand NZ N 36 40 44 48 52 56 60 50 mW 6 dBi 200 mW250 mW 6 5 15 5 25 5 25 5 35 5 725 5 85 64 149 153...

Page 306: ...47 5 725 64 104 108 112 116 120 124 128 132 140 1 11 100 mW EIRP 2 4 2 4835 Singapore SG S 36 40 44 48 52 56 60 64 149 153 157 161 200 mW EIRP200 mW EIRP1 W EIRP 5 15 5 25 5 25 5 35 5 725 5 85 1 13 2...

Page 307: ...ates US A 36 40 44 50 mW 6 dBi 200 5 15 5 25 5 25 5 35 of America 48 52 56 60 mW250 mW 6 5 725 5 85 64 149 153 dBi 1 W1 W 6 157 161 dBi 4 W 1 11 1 W Conducted Output 2 4 2 4835 United States of Americ...

Page 308: ...64 50 mW 6 dBi 200 mW250 mW 6 dBi 1 W 5 15 5 25 5 25 5 35 1 11 1 W Conducted Output 2 4 2 4835 South Africa ZA TBA N A N A 5 25 5 355 725 5 825 1 13 1 W EIRP 2 4 2 4835 Country Country Code Access Po...

Page 309: ...thernet 1000Base X IEEE 802 3x Flow Control IEEE 802 1d 1998 Bridging IEEE 802 1p Virtual LAN IEEE 802 af DTE Power MAC Address 8192 Safety UL 60950 1 CSA 22 2 No 60950 1 EN 60950 1 IEC 60950 1 EMC Em...

Page 310: ...320 AC Line Frequency 50 60 Hz 3 Hz Input Voltage 100 240 Vac auto range Current Rating 8 Amp maximum Maximum Power Consumption 465 Watts Maximum Power Dissipation 207 BTU hr PoE Maximum Output Power...

Page 311: ...imits are established or enforced 802 1p is a spin off of the 802 1Q VLANs standard 802 1p establishes eight levels of priority similar to the IP Precedence IP Header bit field Command Line Interface...

Page 312: ...nning Tree Protocol Features topology IGMP Snooping IGMP Snooping examines IGMP frame contents when they are forwarded by the device from work stations to an upstream Multicast router From the frame t...

Page 313: ...ons Regions are one or more MSTP bridges by which frames can be transmitted The standard lets administrators assign VLAN traffic to unique paths Password Management Password management provides increa...

Page 314: ...network traffic monitoring capabilities as opposed to SNMP which allows network device management and monitoring RMON is a standard MIB that defines current and historical MAC layer statistics and co...

Page 315: ...ries are not subject to aging and are preserved across resets and reboots TACACS TACACS provides centralized security for validation of users accessing the device TACACS provides a centralized user ma...

Page 316: ...s addressed to a destination MAC address that is not associated with any port are flooded to all ports of the relevant VLAN Web based Management With web based management the system can be managed fro...

Page 317: ...is detected and what are the possible causes of the problem With the problem known the effect of the problem is recorded with all known results from the problem Once the problem is quantified the sol...

Page 318: ...ial cable Software settings Replace the serial cable Replace serial cable for a pin to pin straight flat cable Reconfigure the emulation software connection settings Response from the terminal emulati...

Page 319: ...of pairs Fiber optical cable connection is reversed Bad cable Wrong cable type Check pinout and replace if necessary Change if necessary Check Rx and Tx on fiber optic cable Replace with a tested cabl...

Page 320: ...ystem y n n 2 Enter Y The device reboots After the POST when the text Autoboot in 2 seconds press RETURN or Esc to abort and enter prom is displayed press Enter The Startup Menu is displayed 1 Downloa...

Page 321: ...320 APPENDIX C TROUBLESHOOTING...

Page 322: ...of service and then placing them in the appropriate output queue Data is transmitted from the queues using weighted round robin service to enforce priority service and prevent blockage of lower level...

Page 323: ...GARP is a protocol that can be used by endstations and switches to register and propagate multicast group membership information in a switched environment so that multicast data frames are propagated...

Page 324: ...rnet Control Message Protocol ICMP A network layer protocol that reports errors in processing IP packets ICMP is also used by routers to feed back information about better routing choices Internet Gro...

Page 325: ...broken MD5 is a one way hash function meaning that it takes a message and converts it into a fixed string of digits also called a message digest Multicast Switching A process whereby the switch filte...

Page 326: ...ffic downstream and calculates the shortest path back to the multicast source network via reverse path forwarding PIM uses the router s IP routing table rather than maintaining a separate multicast ro...

Page 327: ...rk systems Spanning Tree detects and directs data along the shortest available path maximizing the performance and efficiency of the network Telnet Defines a remote communication facility for interfac...

Page 328: ...so known as EAP TTLS User Datagram Protocol UDP UDP provides a datagram mode for packet switched communications It uses IP as the underlying transport mechanism to provide access to IP like services U...

Page 329: ...328 APPENDIX GLOSSARY...

Page 330: ...Service 311 Classic_STP 219 CLI 310 Command Line Interface 310 Committed Information Rate 252 Configuring ARP 193 Configuring_RMON_Events 283 conventions notice icons About This Guide 4 CoS 311 CoS_t...

Page 331: ...36 LCP 230 LEDs 22 Link Aggregation Control Protocol 130 Link Control Protocol 230 Log_Display 260 Logging_Setup 261 Lost password 319 M MAC addresses 64 MAC_based_Rules 78 Management Access Lists 40...

Page 332: ...ions software is not readable 317 RMON_Alarm_Setup 294 RMON_Events_Control 287 RMON_History_Control 274 RMON_History_Summeries 281 RMON_statistics 271 Rouge_setup 164 RSTP 227 313 rstp 227 S Self test...

Page 333: ...22 User 83 V VAPs 172 177 Viewing System Description 95 Virtual Cable Testing 314 VLAN 140 151 VLAN priority 243 VLAN_interface 147 VLAN_membership 140 VLAN_Membership_Modify 145 VLAN_Membership_Summa...

Reviews: