J-TECH DIGITAL JTD-2886 24 Port Poe Switch User Manual
- June 14, 2024
- J-TECH DIGITAL
Table of Contents
J-TECH DIGITAL JTD-2886 24 Port Poe Switch
Product Information
The user manual is for the following products:
- 24 Port PoE Switch (Model: JTD-2886 | JTECH-NSP24)
- 48 Port PoE Switch (Model: JTD-2887 | JTECH-NSP48)
Features
The switches come with the following features:
- Web Configuration: Access and configure the switch settings through a web interface.
- Device Menu: Provides information about the switch and its settings.
- Network Menu: Configure VLANs, DHCP snooping, and other network-related settings.
- Authentication Menu: Configure authentication methods like 802.1x, AAA, and RADIUS.
- Security Menu: Configure IP filtering, ARP attack defense, and loopback detection.
- QoS Menu: Configure Quality of Service (QoS) settings like ACLs and rate limits.
- Appendix: Additional information and resources.
- Maintenance: Guidelines for maintaining the switch.
- Warranty: Information about the product warranty.
- Mail-In Service: Instructions for mail-in service if required.
- Limited Warranty Limits and Exclusions: Details about the limitations and exclusions of the warranty.
Product Usage Instructions
Web Configuration
To configure the switch, follow these steps:
- Connect to the switch using a computer or device with a web browser.
- Open the web browser and enter the IP address of the switch.
- Log in using the provided credentials.
- Navigate to the desired menu (Device, Network, Authentication, Security, or QoS) to access and configure the corresponding settings.
- Make the necessary changes and save the configuration.
- Repeat the process for other menus if required.
- Refer to the Appendix for additional information and resources.
Maintenance
To ensure proper functioning of the switch, follow these maintenance guidelines:
- Regularly clean the switch and remove any dust or debris.
- Avoid exposing the switch to extreme temperatures or humidity.
- Do not overload the switch with excessive power or network load.
- Perform firmware updates as recommended by the manufacturer.
Warranty
The product comes with a limited warranty. Refer to the warranty section in
the user manual for detailed terms and conditions.
Mail-In Service
If required, follow the instructions provided in the user manual for mail-in service.
USER MANUAL
24 PORT POE SWITCH
JTD-2886 | JTECH-NSP24
48 PORT POE SWITCH
JTD-2887 | JTECH-NSP48
J-TECH DIGITAL INC. 9807 EMILY LANE
STAFFORD, TX 77477 TEL: 1-888-610-2818
E-MAIL: SUPPORT@JTECHDIGITAL.COM
Introduction
Product Introduction
This series supports IPv4 / IPv6 double stack platform, and supports a variety
of senior management functions, including POE management, MAC Table, VLANs,
Port Isolation, Loop Protection, IGMP Snooping, MLD Snooping, ERPS, DHCP
client, DHCP Snooping, STP/RSTP/MSTP, 802.1 x, QoS, port mirror, LLDP, static
routing and NTP etc., 128 static routing and basic QINQ, to provide users with
the perfect solution; At the same time the whole series supports SNMP v1 / v2,
v3 (Simple Network Management Protocol), CLI command line, Web net tube,
TELNET mode of Management, make equipment management more convenient, at the
same time, with the ACL control function, attack prevention function, ensuring
secure management.
The series complies with FCC and CE standards, and support 1 channel ac power
input. Using the mute fan, can adapt to work environment temperature range of
– 40 to 75 , also, it can satisfy the requirements of the various site and
provide reliable, economical solution.
1.2 Features
· IEEE802.3, IEEE802.3u, IEEE802.3ab, IEEE802.3z, IEEE802.3ae · V-Ring looped
redundancy technology. Self-healing time for looped network is less than
20ms. · PoE management, POE load timing restart and on-off. · IGMP Snooping,
Static multicast filtering, MLD Snooping filtering · DHCP Snooping, protect
from ARP attack, attack of illegal DHCP server access · NTP, easy for real-
time synchronization of network time · Supports SNMP v1/v2/v3 · Supports LLDP
· ACL, enhance the flexibility and safety of network management · QoS, enhance
the stability of network · Port mirror, convenient for online debug
· Cable testing, convenient for the examining cable length in a project
· STP/RSTP/MSTP, enhance the stability of network
5|Page
· IEEE802.1Q VLAN, IEEE802.1ad QINQ · 802.1x authentication to port and MAC ·
Static routing L3 switching technology · Operation temperature range: -4075 ·
Storage temperature range: -4085
2. Web Configuration
Open installed web browser on your PC, input the switch’s IP address like
http://xxx.xxx.xxx.xxx, then open that URL to login web management. Note: IP
address of switch is 192.168.2.1 by default. So please input
http://192.168.2.1 in browser. If you cannot access the switches web
interface, please make sure that your PC is has a static IP that matches the
default IP of the switch (for ex. 192.168.2.11). When the login window
appears, please enter the default username “admin” with password “system”.
Then click OK to login.
Default User Name: admin Default Password: system
6|Page
2.1 Device Menu Information
2.1.1 Device > Basic
After successfully logging in to the page, the web page directly jumps to the
system information page, and you can also select the “Device Overview” or
“Device Basic Information” path to view the switch system information. You can
view the device’s MAC address, software version, production serial number,
etc. on the system information page, modify the system name, MAC address aging
time (default 300 seconds).
The meaning of the key items on the page is shown in the table below.
Operation
Explanation
Software Version / Hardware Version / Bootloader Version
Display the software version number, hardware version number, and the bootloader version of the currently running software
MAC Address
Displays the MAC address of the switch
Operation Hours
Displays the switches continuous running time since being powered on
Production Serial Number (SN)
Shows the production serial number of the switch
System Name
Customize the device name so that you can quickly locate it by this name
7|Page
MAC Address Aging Time
Configure the aging time of the dynamic MAC address entries. The default is 300 seconds.
2.1.2 Device > Maintenance
Equipment maintenance includes equipment software update, reboot, and fault
maintenance.
Software Update: Page wizard: Device Maintenance Software Update, the page is
as shown in the figure below. Upgrade the switch software to the latest
version, which will make your device more stable and more functional (click
the <Browse…> button, select the latest version file, and click the
Do not power off the device during the upgrade process.
Reboot: Page wizard: Device Maintenance Reboot, the page is as shown in the
figure below. Select the
8|Page
Before restarting the device, please save the current configuration.
Otherwise, after restarting, unsaved configuration information will be lost.
Fault Maintenance: Page Wizard: Device Equipment Maintenance Fault
Maintenance, the page is shown below. Select the
2.1.3 Device > Syslog
The system log records information about hardware, software, and system
problems in the system. It can also monitor events that occur in the system,
providing powerful support for network administrators to monitor network
operation and diagnose network faults. Loglist: Page Wizard: Device Syslog
Loglist, the page is shown in the figure below.
9|Page
The meaning of the key items on the page is shown in the table below.
Operation
Explanation
Refresh Rate
Control the refresh rate of the page through the selection of “Refresh Rate” drop down box
Query Item
Query the log information you need to follow through the selection of the
“Query Item” drop
down box
Positive Sequence Display
Log information is displayed in the order from the first to the last. The reverse display is the opposite
Download
Click the
Refresh
Click the
Clear
Click the
Log Setup: Page Wizard: Device Syslog Log Setup
10 | P a g e
The meaning of the key items on the page is shown in the table below.
Operation
Explanation
Log Enables
Open / close the information center. By default, the information center is turned on
Send Log Level
Only log information no higher than the specified level can be sent to the log host
Log Host IP
Set the IP address of the log host
2.1.4 Device > Configuration
Save Configuration: Page Wizard: Device Configuration Save Configuration
The meaning of the key items on the page is shown in the table below.
Operation
Explanation
Save current configuration
Click the
Backup system configuration information
Click the <Backup…> button and select the backup path of the configuration file. You can save the current configuration of the device to your computer so that you can use this file (*.cfg) to restore the configuration in the future.
Restore configuration information from a file
Click the
11 | P a g e
device is automatically restarted, the configuration takes effect)
After you have configured all items on the configuration page, be sure to save
the configuration, otherwise, the unsaved configuration information will be
lost due to restarting and other operations.
Restore Default Configuration: During the process of restoring the factory
default configuration, please do not perform other operations on the device,
otherwise, the device may not work properly
The meaning of the key items on the page is shown in the table below.
Operation
Explanation
Restore configuration, but retain management IP
Select this button, you can continue to use the current IP address to log in to the device for configuration and management
Restore the default configuration
Select this button, you need to use the default IP address to log in to the device for configuration and management
2.1.5 Device > Port Management
Port Setup: Page Wizard: Device Port Management Port Setup, shows the current
port attribute status.
12 | P a g e
Configure the properties of the specified ports in batches (click the <Batch
Configuration> button on the main page to enter the corresponding
configuration page).
Configure the properties of a single port (click the entry corresponding to
the port on the main page to enter the corresponding configuration page).
13 | P a g e
The meaning of the key items on the page is shown in the table below.
Operation
Explanation
Link status
The actual working speed and mode of the port, if not connected, it will display as “–“.
Rate
Configure port rate.
There are three situations in the duplex mode of the port:
· When you want the port to receive packets while sending packets, you can configure the port to be full-duplex (full) attribute.
Duplex
· When you want the port to only send or receive packets at the same time, you can configure the port to half-duplex (Half) attribute.
· When you configure a port to be in autonegotiation (auto) state, the duplex state of the port is determined by the auto-negotiation between the local port and the peer port.
By default, the speed and duplex mode of the port is auto-negotiation.
Open /close
Turn on/off the port. If a port is displayed closed, it cannot forward data. By default, the port is open.
Priority
The priority level of the port is 0 to 7, with 0 being the lowest and 7 being the highest. For packets without the 802.1Q label header, the 48G-4GF will use the port priority as the 802.1p priority for the port to receive packets, and then look up the local priority mapping table based on the priority to mark the packet as a local priority.
By default, the port priority is 0.
Flow Control
Turn on or off the port flow control function. If the flow control function is enabled, when the device is congested, it will send a message to the peer switch to notify the peer switch to
14 | P a g e
Isolation
Energy saving EEE
temporarily stop sending packets or slow down the rate of sending packets,
thereby avoiding the occurrence of packet loss and ensuring. The normal
operation of the network business. By default, port flow control is disabled.
Through the port isolation feature, you can add the ports that need to be
controlled to an isolation group (“open” means to join the isolation group;
“close” means to exit the isolation group), to achieve the layer 2 data
between the ports in the isolation group Isolation not only enhances the
security of the network but also provides users with flexible networking
solutions.
By default, the port is not added to the isolation group.
Turn on or turn off the energy-saving function of the port in the downstate.
By default, the function is turned off.
Enable or disable the EEE (Energy Efficient Ethernet) energy-saving function
of the port. By default, the EEE energy-saving function is not enabled.
2.1.6 Device > Port Mirroring
Port mirroring is to copy the mirrored port packets to the monitoring port.
The monitoring port is connected to the data detection device. Users use these
data detection devices to analyze the packets copied to the monitoring port
for network monitoring and troubleshooting.
The switch provides local port mirroring, that is, the mirrored port and
monitoring port are on the same device.
Page Wizard: Device Port Mirroring, click the
15 | P a g e
The meaning of the key items on the page is shown in the table below.
Operation
Explanation
Monitoring port
Select the monitoring port, “no mirror” indicates that the port mirroring function of the switch is disabled
Select the mirrored port, “no mirror” indicates that the port is not mirrored
The meaning of the mirroring direction is as follows:
Mirroring direction
· Mirror incoming port: only the packets received by the port are mirrored to the monitoring port
· Mirror out port: only the packets sent by this port are mirrored to the monitoring port
· Mirroring in and out ports: packets going in and out of this port are mirrored to the monitoring port
2.1.7 Device > PoE
PoE Summary: Page Wizard: Device PoE PoE Summary. Shows the current PoE status
for all available ports.
16 | P a g e
PoE Setup: Page Wizard: Device PoE PoE Setup. Allows you to set the PoE status
and priority of single or multiple ports.
2.1.8 Device > Users
Page Wizard: Device Users. On this page, you can configure the user timeout
time, turn on/off the WEB authentication function, and turn on/off the WEB
verification code function.
17 | P a g e
Steps to add a local user: Click the
Steps to modify local users: Click on the local user entry to be modified on
the main page to enter the “Modify Local User” page for modification.
The meaning of the key items on the page is shown in the table below.
Operation
Explanation
Overtime time
Configure the timeout time of the web settings page, the default is 5 minutes
WEB user authentication
Turn on/off the user authentication function. After closing, the user does not need to verify
18 | P a g e
WEB login verification code Username Confirm password State Rank
when logging in Turn on/off the WEB login verification code function. After opening, you need to enter the verification code when logging in to WEB Set the local username to be added Set local user password Set the status of local users Set the level of local users
2.1.9 Device > VCT
When the line is faulty, you can diagnose the cable connected to the port,
which is convenient for you to check the working condition of the cable in the
network.
Page Wizard: Device VCT. Enter the port number to be diagnosed in the “Port”
text box and click the
The meaning of the key items on the page is shown in the table below.
Operation
Explanation
State
Display the connection status of the port. The display as “normal” indicates that the port is connected; the display as “open” indicates that the port is not connected; the display as “short circuit” indicates that a pair of differential lines
19 | P a g e
Length
have a short circuit.
· When the cable status is “normal”, the length of the connecting cable is not
reflected in the displayed information.
· When the cable status is “short circuit or open circuit”, the length in the
displayed information refers to the length from the port to the abnormal
position.
· During the cable diagnosis process, please do not plug or unplug the port
network cable, and the diagnosed port cannot be in the shutdown state.
· The cable diagnosis is only valid when there is no device connection at the
other end of the network cable or the network cable is abnormal. When both
ends of the network cable is connected, the diagnosis result may be invalid.
For normal network cable quality testing, please use professional network
cable testing.
2.1.10 Device > Flow Interval
Port Traffic Statistics: Page Wizard: Device Flow Interval Port Traffic
Statistics. The port statistics page can view the number of data packets
received/sent by each port of the switch.
To view, the number of various types of error packets received/sent on the
designated port of the 48G-4GF device (click the entry corresponding to the
port on the main page to enter the corresponding statistical information
page).
20 | P a g e
The meaning of the key items on the page is shown in the table below.
Operation
Explanation
Refresh rate
You can select the refresh rate to automatically update the statistics of the current page regularly.
Statistics reset
You can click this button to clear the statistics of the current page.
Statistics refresh
You can click this button to immediately update the statistics of the current page.
Description of the packets received/sent on the port:
Message
Explanation
Receive Statistics
Total packet
Total number of received messages.
Total bytes
Total bytes of received messages.
Broadcast package
Total number of broadcast messages received.
Multicast package
Total number of multicast messages received.
Receive error packets
The total number of received error packets.
Runts error package
Number of packets with correct CRC and data
21 | P a g e
Giants error package CRC error packet Frame error packet
Aborts error package
Ignored error package Total packet Total bytes Broadcast package Multicast
package Send error packet
frame length less than 64 bytes.
Number of packets with correct CRC and data frame length greater than 1518
bytes.
Number of packets with CRC error and data frame length between 64 and 1518
bytes.
The length of the data frame is between 64 and 1518 bytes, and the number of
FCS (Frame Check Sequence) bytes of the message is a non-integer message.
The total number of illegal packets received. The illegal packets include:
· Message fragmentation: frames with a length less than 64 bytes (the length
can be an integer or non-integer) and the CRC check error.
· Jabber frame: greater than 1518 or 1522 bytes, and CRC check error (message
bytes can be an integer or non-integer).
· Symbol error frame: the message contains at least one erroneous symbol.
· Length error frame: The 802.3 length field in the message does not match the
actual length of the message (46 to 1500 bytes).
Number of packets discarded due to insufficient receive buffers on the port.
Send Statistics
Total number of messages sent.
Total number of bytes sent.
Total number of broadcast messages sent.
Total number of multicast messages sent.
Total number of error messages sent.
22 | P a g e
Aborts error package
Deferred error packet Collisions error package Late collisions error package
The total number of packets that failed to send, that is, the packets have
been sent, but due to various reasons (such as conflict).
Number of packets delayed by the first transmission request due to a busy
network.
Number of conflicting packets generated by the port during packet
transmission.
The number of delayed collision frames. The delayed collision frame means that
the first 512 bits of the frame has been sent. Due to the detection of a
collision, the frame is delayed.
Traffic Monitoring Page Wizard: Device Flow Interval Traffic Monitoring.
Through port traffic monitoring, users can graphically monitor the current
traffic of each port of the device and the changes in traffic over a specified
period of time. Flow monitoring consists of flow monitoring histogram and flow
monitoring line chart:
· Flow monitoring histogram: Use the histogram to display the status of each
port’s current receiving rate and sending rate.
· Flow monitoring line chart: display the flow change of a specified port over
a period of time in a line fluctuation manner.
23 | P a g e
The flow monitoring histogram page can realize the following functions: ·
Monitoring port traffic through rate histogram. · Select the upper limit of
the histogram in the drop-down box of “Traffic Upper Limit”, you can observe
the proportion of each port’s receive/send rate relative to the upper limit.
When the proportion exceeds 95%, the histogram border will have a red warning.
· Select the time interval in the “Sampling interval” drop-down box, you can
make the page refresh at this time interval. · Move the mouse to a port
histogram, and a yellow text box will appear, showing the port number,
receiving rate, and sending rate. Click the histogram, you can observe the
line rate chart of the port. · Click the
24 | P a g e
The flow monitoring line chart page can realize the following functions: ·
Monitor port traffic through rate line chart. · Click the port number in the
histogram or select the specified port in the “Port Number” dropdown box, you
can observe the rate change of the port in real-time. · The current value,
peak value and average value of the receiving rate and sending rate are
displayed at the bottom of the line chart.
2.1.11 Device > NTP
Page Wizard: Device NTP Setup. NTP is an acronym for Simple Network Time
Protocol, a network protocol for synchronizing the clocks of computer systems.
You can specify NTP Servers and set GMT Time zone.
25 | P a g e
2.1.12 Device > SNMP
Setup: Page Wizard: Device SNMP Setup. On this page you can configure SNMP
agent enable, SNMP version, local engine ID, physical location information,
contact information.
Community: Page Wizard: Device SNMP Community. On this page you can display or
create a new SNMP community.
Click the “New” button to enter the new SNMP community page. The user can
configure the name of the newly created community, the access rights, and
views of the community. The configuration page is shown in the following
figure:
26 | P a g e
Group: Page Wizard: Device SNMP Group. On this page you can display or create
a new SNMP group.
Click “New” to enter the new SNMP group page, the user can configure the group
name, security level and view permissions of the newly created group.
User: Page Wizard: Device SNMP User. On this page, can display or create new
SNMP users.
Click “New” to enter the new user page, the user can configure the user-name,
security level, and authentication mode of the new user and other relevant
information.
27 | P a g e
Trap: Page Wizard: Device SNMP Trap. On this page you can configure to turn
on/off the SNMP trap function, display trap host information, and create a new
trap host.
Click “New” to enter the new Trap host page, the user can configure the IP
address, security name, UDP port, security model, the security level of the
new Trap host.
2.2 Network Menu Information
2.2.1 Network > VLAN
802.1Q VLAN: Page Wizard: Network VLAN 802.1Q VLAN. This page can display and
query the VLAN information and the ports it contains (the main page. VLAN 1
includes all ports by default).
Create a new VLAN (click the
28 | P a g e
to take effect), and create a new Access port (Click on the main page Select
the port to be added to the VLAN, and click the
Trunk: Page Wizard: Network VLAN Trunk. Displays the current port information.
Steps to create a new trunk port: Click the
Steps to modify Trunk port: Click the entry corresponding to the port on the
main page to enter the corresponding page. Modify the PVID and port allowed to
pass VLAN, click
29 | P a g e
Steps to create a new Hybrid port: Click the
Steps to modify Hybrid port: Click the entry corresponding to the port on the
main page to enter the corresponding page. Modify the PVID and port allowed to
pass VLAN, click
30 | P a g e
· PVID: number, the value range is 1-4094. · Tagged VLAN: number, the value
range is 1-4094, you can enter multiple values,
separated by commas. A short line can be used to indicate a range. · Untagged
VLAN: number, the value range is 1-4094, you can enter multiple values,
separated by commas. A short line can be used to indicate a range. · Delete
VLAN: number, the value range is 1-4094, you can enter multiple values,
separated by commas. A short line can be used to indicate a range.
2.2.2 Network > VLAN Interface
The VLAN interface menu is mainly used to configure and manage Layer 3 VLAN
interfaces of the device, including interface display, new interface creation,
interface modification, and interface deletion.
Summary: Page Wizard: Network VLAN Interface Summary. Users can query the
interface, interface status and interface information of the current device
through this page.
Create: Page Wizard: Network VLAN Interface Create. Users can create a new
Layer 3 VLAN interface through this page and configure the address acquisition
method of the interface. If it is a static acquisition method, you can also
configure specific interface address information.
31 | P a g e
Modify: Page Wizard: Network VLAN Interface Modify. The user can modify the
three-layer VLAN interface through this page and can modify the IP address of
the interface. If it is a static IP acquisition method, the interface address
information can also be modified.
Remove: Page Wizard: Network VLAN Interface Remove. Users can delete the
specified Layer 3 VLAN interface through this page. The configuration page is
as follows:
2.2.3 Network > Protocol VLAN
Protocol VLAN, also known as protocol-based VLAN, is another VLAN division
method to distinguish port-based VLAN. By configuring protocol-based VLAN, the
switch can analyze the packets received without VLAN information on the port,
and match the packets with the protocol template set by the user according to
the different encapsulation formats and the values of special fields, and
automatically Successful packets are added with the VLAN tag configured in the
protocol template to automatically distribute data belonging to the specified
protocol to the corresponding VLAN for transmission. Page Wizard: Network
Protocol VLAN, on this page you can view the configured protocol VLAN
information.
32 | P a g e
Click the
The meaning of the key items on the page is shown in the table below.
Operation
Explanation
VLAN ID
VLAN ID of the newly created protocol VLAN
Template ID
Template ID of the protocol VLAN
Protocol type
Protocol type of protocol VLAN, support IPv4, IPv6, AT (appletalk), IPx ethernetii, IPx LLC, IPx raw, IPx snap, MODE ethernetii, MODE LLC, MODE snap
Eth Type
Ethernet protocol type value when the protocol type is MODE ethernetii or MODE snap
DSAP
Destination service access point when the protocol type is MODE snap
SSAP
Source service access point when the protocol type is MODE snap
Click the protocol VLAN entry on the protocol VLAN display page to enter the corresponding protocol VLAN modification page, which can modify the protocol VLAN associated port configuration.
33 | P a g e
2.2.4 Network > DHCP Snooping
DHCP Snooping technology is a DHCP security feature. Untrusted DHCP
information is filtered by establishing and maintaining a DHCP Snooping
binding table. This information refers to DHCP information from untrusted
areas. The DHCP Snooping binding table contains information such as the MAC
address, IP address, lease period, and VLAN-ID interface of users in the
untrusted zone.
· The main function of DHCP-snooping is to isolate illegal DHCP server by
configuring untrusted ports.
· Cooperate with the switch DAI to prevent the spread of the ARP virus. ·
Establish and maintain a DHCP-snooping binding table. This table is generated
by the IP and
MAC addresses in the DHCP ack package, and the second is manually specified.
This table is the basis for subsequent DAI (dynamic arp inspect) and IP Source
Guard. These two similar technologies use this table to determine whether the
IP or MAC address is legal and restrict users from connecting to the network.
DHCP Snooping: Page Wizard: Network DHCP Snooping. On this page you can turn
on/off the DHCP Snooping function.
34 | P a g e
DHCP Snooping Port: Page Wizard: Network DHCP Snooping Port. 1. Configure a
single port: Click the corresponding entry in the port trust status bar on the
page. Enter the corresponding configuration page and select the trust status
of the port.
2. Set ports in batches: Select the trust status of the port under the Port
Batch Settings column.
35 | P a g e
In the Select Port column, you can select ports in batches.
DHCP Snooping User: Page Wizard: Network DHCP Snooping User. On this page, you
can view the user MAC address, IP address, VLAN-ID interface, and other
information of the untrusted zone in the DHCP Snooping binding table.
2.2.5 Network > MAC Filter
This switch supports the following three types of MAC address entries: ·
Static: added manually, and the MAC address entry will not be aged. After you
add it, the entry is in the “bound” state (multicast MAC address entries do
not support binding operations). · Dynamic: automatically learn or add
manually, and the MAC address entry will be aged. When you add it, the entry
is in the “unbound” state; if you perform a binding operation on it, it
becomes a static entry. · Blackhole: Manually added, all packets whose
destination address is the MAC address will be discarded (for example, for
security reasons, a user can be blocked from receiving packets), and does not
support the binding operation.
MAC List: Page Wizard: Network MAC Filter MAC List. The page is as shown in
the figure below, you can display and query (through the combination of MAC
address and VLAN conditions) all the MAC address table information of the
device and the specified MAC address table item Bind (select the entry to be
bound on the main page, and click the
36 | P a g e
Steps to add a new MAC address entry: Click the
Modify static or blackhole MAC address entries (click the corresponding MAC
address entry on the main page to modify the entry), dynamic MAC address
entries cannot be modified.
37 | P a g e
The meaning of the key items on the page is shown in the table below.
Operation
Explanation
MAC address query
You can enter MAC and VLAN ID for query and display, in which MAC address must be entered.
MAC display
Display the MAC address and its corresponding VLAN in the switch. User can
select MAC with status “unbound” Address, and add the corresponding MAC to the
binding list by clicking the
Display MAC address binding status
State
· Not supported: The MAC is not allowed to be added to the binding list, such
as black hole MAC, multicast MAC;
· Bound: The MAC has been added to the binding list;
· Unbound: The MAC is not in the binding list, but it is allowed to be added.
Add
Open the Add MAC Address page.
Binding
Add the selected MAC address that can be bound to the binding list.
Delete
Click the
Delete all
Delete all MAC addresses on the device.
Batch deletion
Delete selected MAC addresses in batches and delete them.
Port MAC List: Page Wizard: Network MAC Filter Port MAC List. This page mainly
provides the following functions:
· Display the MAC address table information under the specified port
38 | P a g e
· Bind the unbound MAC address entries under the port (select the
corresponding port number, and select the unbound MAC address entries under
the port, click the
Port MAC Filtering: Page Wizard: Network MAC Filter Port MAC Filtering.
Displays the status of the MAC address filter function of each port.
Configuration steps: 1. Turn on the MAC address filtering function of the
specified port, click the entry corresponding to the port on the main page,
select the “MAC filtering enabled” checkbox, and click the
39 | P a g e
2. Add the static MAC address entry of the specified port, click the entry
corresponding to the port on the main page, enter the corresponding parameters
in the “MAC address” and “VLAN” text boxes, and click the
MAC Attack Prevention: Page Wizard: Network MAC Filter MAC Attack Prevention.
The anti-MAC address attack function mainly prevents the device from
continuously learning the MAC address of a large number of invalid packets in
the local area network, making the device’s MAC address forwarding table too
large, resulting in a sharp decline in its forwarding performance. The switch
achieves the function of preventing MAC address attacks by limiting the number
of MAC addresses learned on the port.
Configure the number of MAC addresses that can be learned by a single port.
Click the entry corresponding to the port on the main page to enter the
corresponding page.
40 | P a g e
Batch configure the number of MAC addresses that can be learned by the
specified port. Click the
2.2.6 Network > Link Aggregation
Page Wizard: Network Link Aggregation. You can view the current link
aggregation status and configure the aggregation algorithm on this page.
Create a new link aggregation: Click the
Modify the created link aggregation: select an entry on the main page, double-
click it or click the
41 | P a g e
The meaning of the key items on the page is shown in the table below.
Operation
Explanation
Select the aggregation algorithm of the switch:
Based on source MAC address: indicates that each member port in the aggregation group performs load sharing based on the source MAC address
Aggregation algorithm
Based on destination MAC address: indicates that each member port in the
aggregation group performs load sharing based on the destination MAC address
Based on source MAC address and destination MAC address: indicates that each
member port in the aggregation group performs load sharing based on the source
MAC address and destination MAC address
Based on source IP address and destination IP address: indicates that each
member port in the aggregation group performs load sharing based on the source
IP address and destination IP address
Aggregate interface number Type Port
By default, each member port in the aggregation group performs load sharing
based on the source IP address + destination IP address
Display aggregate interface number
Show aggregation type
Port numbers included in the aggregation group
Ports in the following situations cannot join the aggregation group:
· Mirror monitoring port · Port with MAC address filtering enabled
42 | P a g e
· Ports configured with MAC address learning limit
2.2.7 Network > LACP
Link Aggregation Control Protocol (LACP) provides a standardized means for
exchanging information between Partner Systems that require high-speed
redundant links. Link aggregation lets you group up to eight consecutive ports
into a single dedicated connection. This feature can expand bandwidth to a
device on the network. LACP operation requires full-duplex mode. For more
detailed information, refer to the IEEE 802.3ad standard. Dynamic Aggregation
Information: Page Wizard: Network LACP Dynamic Aggregation Information. On
this page, users can view the dynamic aggregation information.
Dynamic Aggregation Configuration: Page Wizard: Network LACP Dynamic
Aggregation Configuration. Users can create dynamic aggregation group for
switches.
43 | P a g e
2.2.8 Network > LLDP
Global Summary: Page Wizard: Network LLDP Global Summary. On this page, you
can view added neighbor devices, deleted neighbor devices, dropped LLDP
packets, and aged neighbor devices.
Port Summary: Page Wizard: Network LLDP Port Summary. On this page, you can
select a port such as port 2 and the LLDP packet statistics of port 2 will be
displayed in the Summary column.
Global Setup: Page Wizard: Network LLDP Global Setup.
44 | P a g e
The meaning of the key items on the page is shown in the table below.
Operation
Explanation
LLDP
Select disabled in the drop-down box to turn off the LLDP function, select enabled even if the LLDP function is enabled.
Transmit Interval
LLDP packet transmission interval.
TTL Hold Multiplier
TTL multiplier.
Fast Count
Number of LLDP packets sent quickly.
Initialization Delay
Initialization delay time.
Send Packet Delay
Delay in sending LLDP packets.
Trap Interval
Trap information sending interval.
After configuring the above information, select the
Port Setup: Page Wizard: Network LLDP Port Setup.
45 | P a g e
The meaning of the key items on the page is shown in the table below.
Operation
Explanation
LLDP
Select disabled in the drop-down box to turn off the LLDP function, select enabled even if the LLDP function is enabled.
Port LLDP working mode:
· send&receive: indicates that both LLDP packets are sent and received.
Administration Status
· receive_Only: indicates that only LLDP packets are received and not sent.
· send_Only: indicates that only LLDP packets are not sent.
· disabled: indicates that neither LLDP packets are sent nor received.
Notification Remote Change
For remote change notification, select disabled in the drop-down box to turn off the remote notification function, select enabled even if you can remote change notification function.
Frame Format
Choose frame format.
Polling Interval (1-30 Sec)
The value of the polling interval, 0 means the polling function is off.
The meaning of the key items in the TLV setting page is shown in the table below.
Operation
Explanation
Port management address
Port management address.
All Basic Information
Check to select all options under the basic information, including port description, system name, system description, and system capacity.
All IEEE802.1
Check to select all options under IEEE802.1, including port VLAN ID, protocol VLAN ID, and VLAN name.
All IEEE802.3
Check to select all options under IEEE802.3, including MAC, POE power supply, link aggregation, longest frame,
46 | P a g e
All LLDP-MED
and status control.
Check to select all options under LLDP MED, including performance, network
strategy, power over Ethernet, and equipment MED asset information.
After configuring the above information, select the
2.2.9 Network > IGMP Snooping
The Layer 2 device running IGMP Snooping analyzes the received IGMP messages
to establish a mapping relationship between the port and the MAC multicast
address, and forwards the multicast data based on this mapping relationship.
Basic:
Page Wizard: Network IGMP Snooping Basic. You can turn on/off the IGMP
Snooping function, turn on/off the location multicast drop, and set the
version. After enabling the IGMP Snooping function, after pressing the
VLAN configuration: Click the entry corresponding to VLAN on the main page to
enter the VLAN configuration page.
47 | P a g e
Advanced: Page Wizard: Network IGMP Snooping Advanced. Single port
configuration: click the entry corresponding to the port on the main page to
enter the corresponding page, open/close the port and leave quickly, and
configure the maximum number of multicast groups (the maximum number of
multicast groups is 256).
Batch configuration: Click the
2.2.10 Network > Multicast VLAN
Page Wizard: Network Multicast VLAN. Users can create, edit, and delete
multicast VLAN ports on this page.
· You can move the ports in the optional port list to the multicast VLAN to
include the port list to join the multicast VLAN or move the ports in the
ports in the multicast VLAN containing port list to the optional port list
from the multicast VLAN delete.
· You can move interfaces in the list of optional aggregation interfaces to
the multicasts VLAN to include the aggregation interface list to join the
multicast VLAN, or move the ports in the 48 | P a g e
multicast VLAN containing the aggregation interface list to the list of
optional aggregation interfaces. Remove from multicast VLAN. · The specified
VLAN must exist, otherwise the multicast VLAN cannot be created. · Only the
aggregated interfaces that have been created can become optional aggregation
interfaces.
2.2.11 Network > IPv4 Routing
Summary: Page Wizard: Network IPv4 Routing Summary. Users can view summary of
destination IP addresses on this page.
49 | P a g e
Create: Page Wizard: Network IPv4 Routing Create. Users can create static
routes via this page. After inputting the information, click on apply to save
the settings.
Remove: Page Wizard: Network IPv4 Routing Remove. Users can remove configured
static route information via this page.
2.2.12 Network > MSTP
Spanning Tree Protocol is a Layer 2 management protocol that eliminates Layer
2 loops by selectively blocking redundant links in the network, and also has
the function of the link backup.
50 | P a g e
Global: Page Wizard: Network MSTP Global. This page can be set to turn on/off
the MSTP function and related parameters.
Port Setup: Page Wizard: Network MSTP Port Setup. this page can be configured
to open/close the port MSTP function and related attributes of MSTP under the
port, as shown in the following figure:
51 | P a g e
Instance Info: Page Wizard: Network MSTP Instance Info. This page can display
MSTP instance information.
Domain: Page Wizard: Network MSTP Domain. this page can display MSTP domain
configuration effective information. Click the
52 | P a g e
2.2.13 Network > DHCP
DHCP Settings: Page Wizard: Network DHCP DHCP Settings. This page can globally
turn on/off the DHCP server function, and display address pool information.
Click the
53 | P a g e
DHCP Static Table:
Page Wizard: Network DHCP DHCP Static Table. This page can display the
currently configured DHCP client static table entries, or click the
DHCP Customer List:
Page Wizard: Network DHCP DHCP Customer List. This page can display the list
of currently online DHCP clients.
2.2.14 Network > Telnet Page Wizard: Network Telnet. Under Telnet service, you
can choose to turn on/off the Telnet function.
54 | P a g e
Page Wizard: Network Telnet VTY configuration. In the VTY configuration page,
you can select Telnet authentication mode, which is none, password, and
scheme. You can set and change the password when you select a password or
scheme mode.
· The authentication method is none: indicates that the next time you log in
to the device using Telnet, no user name and password authentication is
required, and anyone can log in to the device through Telnet. This situation
may bring hidden security risks.
· The authentication method is password: indicates that the next time you log
in to the device using Telnet, password authentication is required. Only when
the password authentication succeeds can the user log in to the device.
· The authentication method is scheme: indicates that the next time you log in
to the device using Telnet, you need to authenticate the username and
password. If the username or password is incorrect, the login will fail. User
authentication is divided into local authentication and remote authentication.
If local authentication is used, local users and corresponding parameters need
to be configured. If remote authentication is used, user names and passwords
need to be configured on the remote authentication server.
55 | P a g e
2.3 Authentication Menu Information
2.3.1 Authen > 802.1x
802.1x Port Setting: Page Wizard: Authen 802.1x Port Setting. This page shows
the global on/off status of 802.1x and the configuration information of 802.1x
under the port. Click the corresponding port entry to configure the 802.1x
function of a single port, and click the
Click the corresponding port to enter the port configuration page:
Click the
56 | P a g e
802.1x Global Setting: Page Wizard: Authen 802.1x Global Setting. This page
can configure 802.1x global function.
2.3.2 Authen > AAA
AAA is short for Authentication, Authorization, and Accounting
(authentication, authorization, and accounting). It is a management mechanism
for network security and provides three security functions: authentication,
authorization, and accounting. User Authentication Scheme Settings: Page
Wizard: Authen AAA User Authentication Scheme Settings. This page is mainly
used to configure the authentication scheme for login users. Telnet users and
Terminal users can configure non-authentication, local authentication, and
remote authentication. Web users can only configure non-authentication and
local authentication schemes.
57 | P a g e
Local User Settings: Page Wizard: Authen AAA Local User Settings. This page is
mainly used to configure local users (Lan-access users or login users) when
using the local authentication scheme. After clicking
2.3.3 Authen > Radius
RADIUS (Remote Authentication Dial-In User Service, Remote Authentication
Dial-In User Service) is a distributed, client/server structure information
interaction protocol that can protect the network from unauthorized access. It
is often used in both various network environments with high security and
allowing remote users to access. The protocol defines the RADIUS message
format and message transmission mechanism and specifies the use of UDP as the
transport layer protocol to encapsulate RADIUS messages (UDP ports 1812 and
1813 are used as authentication and accounting ports, respectively). Radius
Client Settings: Page Wizard: Authen Radius Radius Client Settings. This page
is mainly used to configure the RADIUS scheme.
58 | P a g e
Domain Configuration: Page Wizard: Authen Radius Domain Configuration. This page is mainly used to configure the domain in the Radius scheme. Click the
The meaning of the key items in the TLV setting page is shown in the table below.
Operation
Explanation
Available types are
· Source IP address: just enter the IP address and port number.
· Source MAC address: just enter the MAC address and port number.
Type
· Source IP address + VLAN: IP address
and VLAN ID need to be entered.
· Source MAC address + VLAN: need to input MAC address and VLAN ID.
· Source IP address + MAC address + VLAN: IP address, MAC address, and VLAN ID need to be entered.
Source IP address
Enter the IP address of the management device.
Source MAC address
Enter the MAC address of the management device.
VLAN
Enter VLAN ID.
Port
Select the port number to be whitelisted.
60 | P a g e
Port Filter: Page Wizard: Security IP Filter Port Filter. On this page, you
can choose to turn on/off the port IP filtering function and select off/on in
the drop-down box of IP filtering. You can select
2.4.2 Security > ARP Attack Defense
Global Setup: Page Wizard: Security ARP Defense Global Setup. This page can be
configured to enable/disable ARP detection globally. The VLAN setting box can
be configured to enable/disable ARP detection by VLAN. It can also be
configured to enable or disable the validity check of different ARP packets.
61 | P a g e
Port Setup: Page Wizard: Security ARP Defense Port Setup. On this page, you
can configure whether the port is a trusted port for ARP packets.
User Rules: Page Wizard: Security ARP Defense User Rules. On this page, you
can view and add ARP inspection user rules. After enabling ARP inspection, you
can configure the rules to control ARP packet forwarding behavior.
By clicking the “Add” button on the page above, you can add ARP inspection
rules based on user configuration. The configuration page is shown below:
62 | P a g e
The meaning of the key items in the TLV setting page is shown in the table below.
Operation
Explanation
ID
User rule ID, value range 0~255
Behavior
Rule behavior, the action to be performed when the rule is matched
Source IP address
Source IP address of ARP protocol
Source MAC address
Source MAC address of ARP protocol
VLAN
Enter VLAN ID
2.4.3 Security > Loopback Detection
Basic:
Page Wizard: Security Loopback Detection Basic. This page can be configured
with global on/off loop detection function, multi-port loop detection on/off
function, loop detection time interval, and display port loop detection and
on/off status by VLAN detection. After moving the mouse to the port state, you
can also click to enter the single port configuration mode.
On the single port configuration page, you can configure whether to enable
loop detection on the port and whether to enable the VLAN detection function.
63 | P a g e
Port Detection: Page Wizard: Security Loopback Detection Port Detection. This
page is used to configure the port open/close loop detection function in
batches.
VLAN Detection: Page Wizard: Security Loopback Detection VLAN Detection. This
page can configure the port opening/closing by VLAN detection function in
batches.
Loop Display: Page Wizard: Security Loopback Detection Loop Display. This page
can be configured to display the web page refresh rate of the loop status, and
at the same time, you can check whether the port
64 | P a g e
has a loop and the current status of the port through the port with the loop.
2.5 QoS Menu Information
2.5.1 QoS > ACL IPv4
ACL (Access Control List, access control list) is a collection of one or more
rules used to identify the packet flow. The so-called rules refer to the
judgment statements describing the matching conditions of the packet. These
conditions may be the source address, a destination address, port number, etc.
of the packet. The network device recognizes specific messages in accordance
with these rules and processes them according to a preset policy. ACL Display:
Page Wizard: QoS ACL IPV4 ACL Display. On this page, users are able to select
the access control list to view their details.
Create ACL: Page Wizard: QoS ACL IPV4 Create ACL. When creating an ACL, the
user must assign a number to it. Different numbers correspond to different
types of ACLs. At the same time, in order to facilitate memory and
identification, the user can also choose whether to set a name for the ACL
when
65 | P a g e
creating it. Once the ACL is created, users are not allowed to set names,
modify or delete their original names. After the ACL is created, the user can
specify the ACL by specifying the number or name in order to operate it.
Advanced Configuration: Page Wizard: QoS ACL IPV4 Advanced Configuration. IPv4
advanced ACL can be based on the source IP address, destination IP address,
packet priority, protocol type and characteristics of IP bearer (such as
TCP/UDP source port and destination port, TCP packet identification, ICMP
protocol message type, and message codes, etc.) to formulate rules to match
IPv4 packets. Users can use IPv4 advanced ACL to formulate more accurate,
rich, and flexible rules than IPv4 basic ACL.
Operation
Enter superuser view
Create an IPv4 advanced ACL and enter IPv4 advanced ACL view
Command super acl numberacl-number
Configure ACL description description text
Explanation —-Required. By default, no ACL exists Ipv4 advanced ACL number
range 3000~3999 Optional, by default, ACL
66 | P a g e
Create a rule
rule [ rule-id ] { deny | permit }gre|
icmp| igmp| ip| ipinip| ospf| tcp| udp { {destination { dest-addr dest
wildcard }|dscpdscp|precedencepr ecedence|sourcesour-addr sourwildcard |
source-portoperator port1 [ port2 ] | destination-portoperator port1 [ port2
]|{ackack-value | finfin value |pshpsh-value |rstrst-value |synsyn-value
|urgurg-value } *}
does not have any
By default, there are no rules in the IPv4 advanced ACL
Two Tier Configuration:
Page Wizard: QoS ACL IPV4 Two Tier Configuration. On this page, users are able
to two tier ACL configuration.
Delete ACL: Page Wizard: QoS ACL IPV4 Delete ACL. On this page, users are able
to delete ACL and rules by selecting the desired one through the drop-down
menu.
67 | P a g e
2.5.2 QoS > ACL IPv6
ACL Display: Page Wizard: QoS ACL IPV6 ACL Display. On this page, users are
able to select the access control list to view their details.
Create ACL: Page Wizard: QoS ACL IPV6 Create ACL. When creating an ACL, the
user must assign a number to it. Different numbers correspond to different
types of ACLs. At the same time, in order to facilitate memory and
identification, the user can also choose whether to set a name for the ACL
when creating it. Once the ACL is created, users are not allowed to set names,
modify or delete their original names. After the ACL is created, the user can
specify the ACL by specifying the number or name in order to operate it.
Advanced Configuration: Page Wizard: QoS ACL IPV6 Advanced Configuration. IPv6
advanced ACL can be based on the source IPv6 address of the packet, the
destination IPv6 address, the priority of the packet, the protocol type and
characteristics of the IPv6 bearer (such as the source and destination ports
of TCP/UDP, the TCP message identifier, and the message type of the ICMPv6
protocol and message
68 | P a g e
codes, etc.) to formulate rules to match IPv6 packets. Users can use IPv6 advanced ACL to formulate more accurate, rich, and flexible rules than IPv6 basic ACL.
Operation
Enter superuser view
Create an IPv6 advanced ACL and enter IPv6 advanced ACL view
Command
super Aclipv6 number num-adv-v6 [matchorder {auto | config}]
Explanation
—–
Required, by default, no ACL exists Ipv6 advanced ACL number range 3000~3999
Configure ACL description information
description text
Optional, by default, ACL does not have any description information
rule {deny | permit | priority {deny | permit} }{protocol | gre | icmpv6 | ipv6 | ipv6-ah | ipv6-esp | ospf} [destination dest-ip prefix | dscp dscpval | precedence precedence-val | source src-ipprefix]
By default, there are no rules in the IPv6 advanced ACL
Create a rule
rule {deny | permit | priority {deny | permit} } tcp [destination dest- ipprefix | dscp dscp-val | precedence precedence-val | source src-ip prefix | destination-port eq port-number | source-port eq port-number |ack val | fin val | psh val | rst val | syn val | urg val]
rule {deny | permit | priority {deny | permit} } udp [destination dest- ipprefix | dscp dscp-val | precedence precedence-val | source src-ipprefix | destination-port eq port-number | source-port eq port-number]
Delete ACL: Page Wizard: QoS ACL IPV6 Delete ACL. On this page, users are able
to delete ACL and rules by
69 | P a g e
selecting the desired one through the drop-down menu.
2.5.3 QoS > ACL Policy
Display Port ACL Binding: Page Wizard: QoS ACL Policy Display Port ACL
Binding. View the ACL IPv4 and IPv6 policies for each port in detail.
Create Port ACL Binding:
Page Wizard: QoS ACL Policy Create Port ACL Binding. Select ports that you
want to bind to ACL. Users can select IPv4 or IPv6 ACL types. The bound ACL
must contain rules, and if there is no rule ACL, the binding will fail.
Delete Port ACL Binding:
70 | P a g e
Page Wizard: QoS ACL Policy Delete Port ACL Binding. Select individual or
multiple bind ports, and delete the ACL binding via this page.
2.5.4 QoS > ACL Resource
Page Wizard: QoS ACL Resources. View the type, total, reserved, used, and
remaining ACL resources via this page.
2.5.5 QoS > Ports Rate Limit
Page Wizard: QoS Port Rate Limit. On this page, you can check the speed limit
status of each port’s in/out ports (“–” means that no speed limit is applied.)
The Port rate limit refers to the rate limit based on the port. It uses token
buckets to control packet traffic. The token bucket can be regarded as a
container for storing a certain number of tokens. The system puts tokens into
the bucket at a set rate. When the tokens in the bucket are full, the extra
tokens overflow and the tokens in the bucket no longer increase. The port rate
limit supports both inbound and outbound directions. For the convenience of
description, the outbound port rate-limiting process is used as an example:
All packets sent through the port must first be processed through the
71 | P a g e
token bucket. When a token is stored in the token bucket, the packet can be
sent according to the token; otherwise, the packet will enter the port cache
for congestion management. In this way, you can control the packet flow
through the port.
Configure the inbound/outbound port speed limit of a single port: click the
entry corresponding to the port on the main page to enter the corresponding
page. Configure the inbound/outbound port speed limit of the specified port in
batches: Click the
Inbound port speed limit performs a drop action for packets that exceed the speed limit. This behavior will affect the transmission efficiency of most applications based on the TCP protocol. The reaction is that the actual transmission speed is much slower than the speed limit value. It is recommended that users do not enable the inbound Port speed limit function, there is no application limit for the output port speed limit.
2.5.6 QoS > QoS
Page Wizard: QoS QoS. This page can configure priority trust mode and queue
scheduling mode.
72 | P a g e
The meaning of the key items on the page is shown in the table below.
Operation
Explanation
Choose the priority mode you want to trust:
· COS: Put the packet into the port output queue of the corresponding priority according to the 802.1p priority.
Priority type selection
· DSCP: Put the packet into the port output queue of the corresponding priority according to the DSCP priority.
By default, 48G-4GF puts packets into the port output queue of the corresponding priority according to the 802.1p priority.
Scheduling mode
Select queue scheduling mode By default, 48G-4GF uses WRR scheduling algorithm. Example: If the weight ratio of queue 1, queue 2, queue 3, and queue 4 is 1:2:4:8, and the queue scheduling mode is WRR. Then, when the data packets of queues 1, 2, 3, and 4 are congested on a certain port, the port will send packets according to the flow ratio of 1:2:4:8; if the scheduling mode is selected as HQ-WRR 48G-4GF will first ensure that the packets of queue 4 are sent out first, and then
73 | P a g e
Weights
implement WRR scheduling for the remaining 3 queues.
Configure the priority weight of each queue.
3. Appendix
1. Why can’t the bandwidth be increased after trunking is configured? A:
Please check if the information of trunking set port is as same, including
rate, duplex mode, and VLAN etc. 2. How to deal with the problem of partial
ports of switch? A: When some ports are blocked on the switch, it may be the
network cable’s fault, the network card failure, or the switch port failure.
Users can test by following steps: a. If the connection of the computer and
switch ports remains unchanged, try replacing other network cables. b. Try
different switch ports to see if the issue is persistent. This will help
narrow down if the specific port is an issue or not. d. If confirmed that is
caused by the switch port failure, please contact the supplier for maintenance
3. What is the order of the port self-adaptive status detection? A: Port of
state testing was conducted in the following order: 1000Mbps full-duplex,
100Mbps fullduplex, 100Mbps half-duplex, 10Mbps full-duplex, 10 Mbps half-
duplex. 4. Forgot the Password? A: You can restore the switch to factory
settings by pressing the reset button on the front panel of the switch for 10
seconds. This will reset the username to admin, and the password to system.
4. Maintenance
Clean this unit with a soft, dry cloth. Never use alcohol, paint thinner, or
benzine to clean.
5. Warranty
If your product does not work properly because of a defect in materials of
workmanship, our company (referred to as “the warrantor”) will, for the length
of the period indicated as below, “Parts
74 | P a g e
and Labor (1) Year”, which starts with the date of original purchase (“Limited
Warranty period”), at its option either (a) repair your product with new or
refurbished parts, or (b) replace it with a new or a refurbished product. The
decision to repair or replace will be made by the warrantor. During the
“Labor” limited warranty period, there will be no charge for labor. During the
“Parts” warranty period, there will be no charge for parts. You must mail-in
your product during the warranty period. This Limited Warranty is extended
only to the original purchaser and only covers products purchased as new. A
purchase receipt or other proof of original purchase date is required for
Limited Warranty service.
6. Mail-In Service
When shipping the unit, carefully pack and send it prepaid, adequately
insured, and preferably in the original carton. Include a letter detailing the
complaint and provide a day time phone and/or email address where you can be
reached.
7. Limited Warranty Limits and Exclusions
This Limited Warranty ONLY COVERS failures due to defects in material or
workmanship, and DOES NOT COVER normal wear and tear or cosmetic damage. The
Limited Warranty ALSO DOES NOT COVER damages which occurred in shipment, or
failures which are caused by products not supplied by warrantor, or failures
which result from accidents, misuse, abuse, neglect, mishandling,
misapplication, alteration, faulty installation, set-up adjustments,
misadjustment of consumer controls, improper maintenance, power line surge,
lightning damage, modification, or service by anyone other than a Factory
Service center or other Authorized Servicer, or damage that is attributed to
acts of God.
THERE ARE NO EXPRESS WARRANTIES EXCEPT AS LISTED UNDER “LIMITED WARRANTY
COVERAGE”. THE WARRANTOR IS NOT LIABLE FOR INCIDENTAL OR CONSEQUENTAIL DAMAGES
RESULTING FROM THE USE OF THIS PRODUCT, OR ARISING OUT OF ANY BREACH OF THIS
WARRANTY. (As examples, this excludes damages for lost time, cost of having
someone remove or re-install an installed unit if applicable, travel to and
from the service, loss of or damage to media or images, data or other recorded
content.
75 | P a g e
The items listed are not exclusive, but are for illustration only.) PARTS AND
SERVICE, WHICH ARE NOT COVERED BY THIS LIMITED WARRANTY, ARE YOUR
RESPONSIBILITY.
76 | P a g e
WWW.JTECHDIGITAL.COM PUBLISHED BY J-TECH DIGITAL INC.
9807 EMILY LANE STAFFORD, TX 77477 TEL:
1-888-610-2818 E-MAIL:
SUPPORT@JTECHDIGITAL.COM
77 | P a g e
References
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>