LINOVISION L2 Industrial 8 Port Full Gigabit Managed POE Switch User Guide
- June 14, 2024
- LINOVISION
Table of Contents
- L2 Industrial 8 Port Full Gigabit Managed POE Switch
- Configuration Instruction
- Environments Requirements
- Set Up Network Connection
- Login the Web system
- System State
- Port Configuration
- Ethernet Switch
- IP Service
- IP Multicast
- Security Configuration
- Reliability
- Alarm Management
- DMS
- System Management
- Read User Manual Online (PDF format)
- Download This Manual (PDF format)
L2 Managed Switch
Web-based Configuration Guide
L2 Industrial 8 Port Full Gigabit Managed POE Switch
About This Document
This product includes three documents as the table below.
Documents | Description | How to get it |
---|---|---|
Quick Guide | Including product introductions and installation steps. | In the |
packing box or contact your dealer.
Web-based Configuration Guide| Including Web network management system
configuration instructions.| Please contact your dealer.
CLI-based Configuration Guide| Including CLI-based configuration instructions|
Please contact your dealer.
This document is Web-based Configuration Guide, including Web network
management system (short for Web system) configuration instructions. It is
intended for engineers or anyone who needs to configure the device by Web
system.
The configuration instructions here take industrial 12-Port Ethernet Switch as
example. If there is inconsistency between the instruction (eg. port number,
PoE function, etc.) and the actual product, please refer to the actual
product.
Announcement
The information in this document is subject to change without notice.
The document is only used as operation guide, except for other promises. No
warranties of any kind, either express or implied are made in relation to the
description, information or suggestion or any other contents of the manual.
The images shown here are indicative only. If there is inconsistency between
the image and the actual product, the actual product shall govern.
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol | Description |
---|---|
DANGER | Indicates a hazard with a high level of risk, which if not |
avoided, will result in death or serious injury.
WARNING| Indicates a hazard with a medium or low level of risk, which if
not avoided, could result in minor or moderate injury.
CAUTION| Indicates a potentially hazardous situation, which if not
avoided, could result in equipment damage, data loss, performance degradation,
or unexpected results.
NOTE| Provides additional information to emphasize or supplement
important points in the main text.
Change History
Updates between document issues are cumulative. Therefore, the latest document
issue contains all updates made in previous issues.
Version | State | Release Date | Descriptions |
---|---|---|---|
V1.0 | Released | 2022-10-14 | Initial commercial release. |
Configuration Instruction
To facilitate configuration and the maintenance of the device, the Web system
is provided to users.
You can log in to the Web system to configure and maintain devices through the
graphic user interface (GUI).
The Web-based configuration guide describes the configuration and maintenance
of the device through the Web system. It is intended for engineers or anyone
who needs to configure the device through the Web system.
Web System Overview
The Web system provides the functions as below.
· System State
· Port Configuration
· Ethernet Switch
· IP Service
· IP Multicast
· Security Configuration| · Reliability
· Network Diagnosis
· Alarm Management
· DMS
· System Management
---|---
Please follow the instructions below to configure the Web system.
Environments Requirements
2.1 Hardware Requirements
The management PC recommended as below.
- Make sure the management PC has already been with Ethernet port.
- Use a network cable to connect the Ethernet port of PC and the Ethernet port of the switch.
2.2 Software Requirements
The browser version recommend as below.
- IE10 or higher
- Firefox browser
- Chrome
Set Up Network Connection
Before login the Web system to start configuration, users need to set up the network connection as follow steps.
- Set the IP of the PC and the switch in the same network segment. The default IP address of the switch is 192.168.1.200, network gate is 255.255.255.0.
- The port to connect management PC for Web setting must be management VLAN. By default, management VLAN is VLAN 1, and each port of the switch is VLAN1.
- If you need to connect the remote network, please make sure the management PC and the router can do the jobs above.
- This product can’t assign the IP address for the management PC, please configure the management static IP manually before web configuration.
3.1 Set Static IP for the Management Computer
Operation steps (take Windows 7 as sample)
-
Click
to enter the menu, select “control panel”. Double click “network connection” icon, then double click the “local connection” icon, “local Area Connection Status” window pops out.
-
Click
button, enter “Local Area Connection Property” window. -
Select “Internet protocol (TCP/IP), click
button, enter “Internet Protocol (TCP/IP) Properties” window. Select the option “Use the following IP address”, input IP address (use arbitrary value between 192.168.1.1~ 192.168.1.254, besides 192.168.1.200) and the subnet mask(255.255.255.0). -
Click “OK” to finish the configuration.
Note:
- DNS server address can be empty or be filled in with the real server address.
3.2 Confirm the Network Connection by Ping Command
Operation Steps as below:
- Click
button to enter menu, select , popping out the dialog. - Input “ping 192.168.1.200”, and press enter. If there is equipment response displaying in the pop out dialog, that means network connection succeed, otherwise please check if the network connection is correct.
3.3 Cancel the Proxy Server
If this management PC uses proxy server to visit the internet, then the proxy
service must be prohibited as follows:
- In browser, select <Tool/Internet Option> to enter
window. - Select “Connections” tab in
window, and click button. - Check if the “Use a proxy server for your LAN” option is selected. If selected, please deselect the option. Then click
button.
Note:
- Please follow the steps to check if the switch is installed correctly:
- Whether the physical connection of the equipment is correct?
- Use network cable to connect the product’s Ethernet port (except the console port) with managed computer network card, and ensure the link LED of the port is on.
- Whether the computer TCP/IP agreement setting is correct?
- Management PC’s IP address must be 192.168.1.x (x range is 1~254 and x can’t be 200, otherwise it will conflict with the product IP address 192.168.1.200), subnet mask: 255.255.255.0.
- Whether the computer’s port VLAN ID is 1?
- By default, the management VLAN is VLAN 1, same as each port of switch.
Now the setting up tasks are finished.
Users can login the Web system and start configuration as following.
Login the Web system
4.1 Login and Start
Open the browser, input the switch default address.
Press Enter, the user login page will show in front of you as follows.
Items | Default value |
---|---|
Switch default address | 192.168.1.200 |
Subnet mask | 255.255.255.0 |
Administrator’s account | admin |
Administrator’s password | admin |
Input Administrator’s account and password, press Enter, and click
Click advanced setting to set more.
4.2 Web System User Interface
Interface Layout
The layout and style of the Web system client GUI are described as follows.
Items | Descriptions |
---|---|
1 | Navigation tree |
2 | Your Position |
3 | Configuration area |
Operation Field and Buttons
The elements that users usually use on the Web system GUI are described as
follows.
Items | Descriptions |
---|---|
Input box. |
Please input the value as required.
| Drop down list box.
Please choose the value as required.
| Enable/ disable option. Please choose as required.
| Modify button.
Click to change the configured parameter.
| Add button.
Click to add the parameter into the system.
| Delete button.
Click to delete the parameter from the system.
| Edit button.
The same as
| Save button.
Click to the save the configurations.
| Refresh button.
Click to reload the page.
4.3 Saving Configuration
After performing configuration, users need to save the configuration data. If
you do not save the configuration data, the configuration that you made will
be lost after reboot.
To save configurations, please click the
4.4 Viewing Configuration
Finished configuration, click
4.5 User Timeout
If users do not perform any operations on the Web system GUI for a long time,
your account will be logged out and the login page is displayed.
The auto-log out interval time is 5 minutes by default.
If you need to continue operations, please log in again.
4.6 Logging-out Web System
To protect security of user accounts and switches, please log out of the Web
system immediately after finishing the configurations.
Users can log out of the Web system in either of the following ways:
- Click on the top right corner of the page to close the browser.
- Click on the top right corner of the page of Web system.
System State
5.1 System Status
Users can query the main information of the device, including device name, MAC
address, firmware version, hardware version, system time, update time, memory
information and CPU information.
5.2 Traffic Statistics
Users can view traffic statistics on interfaces and update the statistics.
Procedure
Click
5.3 MAC Address Table
Users can view the MAC table of the interfaces.
Procedure
Procedure
-
Click the drop down list to select the sort type, including
· Automatic
· By MAC Address
· By VLAN
· By port -
Click
button to reload the page.
Port Configuration
6.1 Port Setting
Users can view the basic attributes of Ethernet interfaces, and configure the
Ethernet interfaces as required.
Procedure
Choose
- Configure the interfaces. · Set the parameters as required.
Set the parameters as required. Items| Descriptions| Default value
---|---|---
Port State| Chooseto enable the function.| Enable
Port Speed| Indicates the interface speed, including
· Auto Negotiation
· 10 M
· 100 M
· 1000 M
· 2.5G
· 10G please refer to the actual product.)
When setting the SFP ports, the port speed of the switch and connected device must be set to the same before they can communicate. When both the switch and connected device are set to, the communication rate is depend on the maximum rate of the both sides.| Auto Negotiation
Duplex Mode| Indicates the duplex mode of the interface, including
· Auto| Auto
| · Full duplex
· Half duplex
To enable an interface to send and receive packets at the same time, enable the full duplex mode on the interface.
To disable an interface from sending and receiving packets at the same time, enable the half duplex mode on the interface.
A Gigabit Ethernet electrical interface can work in full duplex, half duplex, or auto-negotiation mode.
However, if the speed is set to 1000 Mbit/s, the duplex mode must be full duplex or auto-negotiation.
A 10 Gigabit Ethernet optical interface operates in full duplex mode by default. You can configure it to operate in full duplex mode or auto- negotiation mode.|
Traffic Control| Enable or disable the traffic control function.| Disable
Port Range| Input the ports numbers that need to be set. Multiple interfaces can be selected. Format as “2” or “1-5” or “3, 1-5”.| Null
· Click
· Click
- View the basic attributes.
· Click thebutton to reload the page.
· View the information.
6.2 Rate Limit
This function is used to limit the rate of outgoing traffic or incoming
traffic on a physical interface.
Users can view detailed information about interface-based rate limiting.
Before sending traffic from an interface, users can configure rate limit on
the interface in the outbound direction to control all outgoing packets, and
configure rate limit on the interface inbound direction to control all
incoming packets.
Procedure
Choose
- Configure the interfaces.· Set the parameters as required.
Items| Descriptions| Default value
---|---|---
Speed Limit| Chooseto enable the function.| Disable
Port Range| Input the ports numbers that need to be set. Multiple interfaces can be selected. Format as “2” or “1-5” or “3, 1-5”.| Null
Input Speed| Input the speed limit in the inbound direction. The value ranges 64 Kbps ~1000000 Kbps.| Null
Output Speed| Input the speed limit in the outbound direction. The value ranges 64 Kbps ~1000000 Kbps.| Null
· Click
· Click
2) View the input and output speed.
· Click the
· View the information.
6.3 Storm Control
Storm control prevents broadcast storms and ensures device forwarding
performance.
To limit the rate of incoming broadcast packets, multicast packets, and
unknown unicast packets and prevent heavy traffic on a device, users can
configure storm control on an interface.
Procedure
Choose
- Configure the interfaces.· Set the parameters as required.
Items| Descriptions| Default value
---|---|---
Port Range| Input the ports numbers that need to be set. Multiple interfaces can be selected. Format as “2” or “1-5” or “3, 1-5”.| Null
Broadcast Storm| Configure the broadcast storm control. The value ranges from 1~1000.| Null
Multicast Storm| Configure the multicast storm control. The value ranges from 1~1000.| Null
Unicast Storm| Configure the unicast storm control. The value ranges from 1~1000.| Null
· Click
· Click
- View the storm control state of the interfaces.
· Click thebutton to reload the page.
· View the information.
6.4 Port Isolation
Interfaces in a port isolation group are isolated from each other, but
interfaces in different port isolation groups can communicate.
The switch supports one isolation group. Users can add or delete the ports
from the group as required, and view the isolation mode of the ports.
Procedure
Choose
- Configure the isolation modes of the ports.· Select the ports that need to be set in
.
Items| Descriptions| Default value
---|---|---
Port isolation| Chooseto enable the function. Choose to disable the function.| Isolation
Port Range| Input the ports numbers that need to be set. Multiple interfaces can be selected. Format as “2” or “1-5” or “3, 1-5”.| Null
The ports can communicate at both Layer 2 and Layer 3 by default, after the
isolation mode is
selected, all is the isolation at both Layer 2 and Layer 3.
· Click
· Click
- View the isolation modes of the ports.
· Click thebutton to reload the page.
· View the information.
6.5 LLDP Configuration
The switch supports the Link Layer Discovery Protocol (LLDP) that conforms to
IEEE 802.1ab. LLDP is a link layer protocol used for interconnected devices to
obtain the connection information of each other.
Based on Layer 2 information obtained using LLDP, the web management system
can quickly detect configuration conflicts between devices and locate network
faults. Users can use the web management system to monitor link status of
LLDP-enabled devices and quickly locate faults on the network.
Procedure
Choose
- LLDP configuration.
· Global LLDP configuration. Items| Descriptions| Default value
---|---|---
LLDP| Chooseto enable the function.| Enable
Hold time| Hold time multiplier of device information on neighbors
The hold time multiplier is used to calculate the Time to Live, which determines how long information about a device can be saved on the neighbors. After receiving an LLDP packet, a neighbor updates the aging time of the device information from the sender based on the hold time.| 120s
Interval Time| Interval between sending LLDP packets
When the LLDP status of the device keeps unchanged or the device does not discover new neighbors, the device sends LLDP packets to the neighbors at a certain interval.| 30s
· Port LDP configuration.
Items | Descriptions | Default value |
---|---|---|
Admin Status | Choose |
Enable |
Holdtime | There are 4 options for the port sending and receiving LLDP packet |
modes:
· Tx only: transport only
· Rx only: receive only
· Tx & Rx: Both transport and receive
· Disabled: Neither send nor receive| Tx & Rx
Port Range| Input the ports numbers that need to be set. Multiple
interfaces can be selected. Format as “2” or “1-5” or “3, 1-5”.
| Null
· Click
· Click
- View the isolation modes of the ports.
· Click thebutton to reload the page.
· View the information.
6.6 LLDP Neighbors
Displays the discovered neighbor devices.
Procedure
Choose
This page does not support configuration.
6.7 PoE Setting
Currently, the network devices are deployed flexibly; therefore, the cabling
of power supply is complicated. To simplify cabling, users can configure the
PoE function on the switch.
Users can set global PoE parameters and the PoE parameters on an interface,
and view the PoE status of the device and ports.
- Set the parameters as required.
Items| Descriptions| Default value
---|---|---
Power Provided| Input the maximum provided power of the device. The value is less than 360W.| 360W
Overload Limit| The limit percentage that allows over the preset <Power Provided> value.
The value is less than 10%. This parameter is optional.| 5%
Reserved Rate| Input the reserved rate from the presetvalue.
The value ranges from 0 to 100%.
The device supports reserved power function for reliability.
The actual value of input power the device divides to the interfaces (named as V) is equal to the value ofminus the value of <Power Provided> multiplies .
If the required input power of the devices over the value of real input power, the reserved power will be divided to each port as further demand.
This parameter is optional.| 0%
· Click
· Click
2) Set the PoE parameters on an interface
· The current power status will be displayed in the items of
Items | Descriptions |
---|
Power Status
Consumed| The total actual output power of all the interfaces.
Remaining| The actual remained input power of the device, not including the
reserved
Port Range| Input the ports numbers that need to be set. Multiple interfaces
can be selected. Format as “2” or “1-5” or “3, 1- 5”.| Null
---|---|---
Priority| Indicates the power priority of an interface, including
· Low
· Middle
· High
In the same priority, the interfaces with larger port number will be shut off
first when the power is not enough.| Low
Power Limit| Input the maximum output power of the interfaces. The value
ranges from 0 to 30W.| Null
| Click to enable the PoE function of the interfaces.| Enable
| Click to disable the PoE function of the interfaces.|
- Click
to change the configuration. - Click
.
Ethernet Switch
7.1 Link Aggregation
Link aggregation is a technology that bundles multiple Ethernet links into a
logical link to increase bandwidth, improve reliability, and load balance
traffic.
The Switch supports the manual load balancing mode and Link Aggregation
Control Protocol (LACP) mode. The Switch also supports inter-device link
aggregation.
Users can create link aggregation group, configure load pattern mode, working
mode and members of link aggregation group, and delete the group.
Procedure
Choose
- Create link aggregation group and configuration.
· Set the parameters as required. Items| Descriptions| Default value
---|---|---
Aggregated Load Pattern| Choose the aggregation load pattern, including
· Source MAC
· Destination MAC
· Source MAC and Dst MAC
· Destination IP Address
· Source IP and Dst IP Address| Source MAC and Dst MAC
Trunk Name| Indicates the trunk number. The value ranges from 1 to 8.| Null
Aggregation Pattern| Choose the aggregation pattern, including
· Manual Aggregation: not under LACP protocol, by setting register to make aggregation.
· Static LACP Aggregation: under LACP protocol, manually configured by the user, and the system is not allowed to automatically add or delete ports in the aggregation group.| Manual Aggregation
Port Range| Input the ports numbers that need to be set. Multiple interfaces can be selected. Format as “2” or “1-5” or “3, 1-5”.| Null
· Click
· Click
- Delete trunk.
· Choose the trunk that need to be deleted.
· Click.
· Click.
7.2 802.1Q VLAN
User can configure the link-type of the interfaces and view the configuration.
Procedure
Choose
- Configure the link-type of interfaces.
· Set the parameters as required. Items| Descriptions| Default value
---|---|---
Port Range| Input the ports numbers that need to be set. Multiple interfaces can be selected. Format as “2” or “1-5” or “3, 1- 5”.| Null
Link Type| Link type of the interfaces, including
· Access
· Trunk| Access
PVID| Input the VLAN ID of the interface. The value ranges from 1 to 4094.| Null
VLAN-allowed| Input ID of VLAN that allowed to access in Trunk. The value ranges from 1 to 4094.| Null
VLAN-untagged| Input ID of untagged VLAN in Trunk. The value ranges from 1 to 4094.| Null
· Click
· Click
- View the link-type of the interfaces.
· Click thebutton to reload the page.
· View the information.
7.3 802.1P QoS
Users can configure the QoS of the device and view the configuration.
Procedure
Choose
- Configure the QoS of the device.
· Set the parameters as required. Items| Descriptions| Default value
---|---|---
QoS Setting| Chooseto enable the QoS function.| Disable
QoS Priority| Choose the mode of QoS priority, including
· Absolute Priority
· Relative Priority| Relative Priority
802.1p QoS Setting| Chooseto enable the 802.1p QoS function.| Disable
802.1p Mark Range| Input the priority of CoS for VLAN. The value ranges from 0~7. Format as “2” or “1-5” or “3, 1-5”.| Null
Priority| Configuring mapping of 802.1p COS priority.
The device supports setting 8 priorities, and the option is fromto | First queue
· Click
· Click
- View the configuration.
· Clickto reload the page.
· View the information.
7.4 WRR
Weighted round robin (WRR) scheduling ensures that packets in all the queues
are scheduled in turn.
By default, eight queues are configured on the switch. Each queue is set with
a weight value, namely, Queue 1, Queue 2, Queue 3, Queue 4, Queue 5, Queue 6,
Queue 7, and Queue 8. The weight represents the percentage of obtaining
resources.
For example, assuming that the weights of queues on the 1000M interface are 1,
2, 3, 4, 5, 6, 7, and 8. Therefore, the queue with the lowest priority can
obtain at least 27.8 Mbit/s bandwidth (1/36 multiplied by 1000 Mbit/s).
Procedure
Choose
- Set the parameters as required.
Items| Descriptions| Default value
---|---|---
Queue| Queue number| Disable
WRR bandwidth weight| Bandwidth weight value of the queue. The value ranges from 1~255.| 1~8
· Click
- View the configuration.
· Clickto reload the page.
· View the information.
IP Service
8.1 DHCP Server
DHCP is a technology used to dynamically manage and configure clients in a
concentrated manner.
The client applies to the server for configurations such as the IP address,
subnet mask, and default gateway, and the server replies with corresponding
configurations according to policies.
Users need to configure a DHCP server based on the global address pool to
enable computers to obtain IP addresses from the global address pool
dynamically.
Users can configure an address pool on a VLAN when a device supports switched
Ethernet interfaces. IP addresses cannot be configured on switched Ethernet
interfaces directly; therefore, you need to create a VLAN and configure a DHCP
address pool on the VLAN.
Procedure
Choose
- Set the global the DHCP server parameter.
· Set the parameters as required. Items| Descriptions| Default value
---|---|---
Client Lease Time| Indicates the lease of dynamic IP addresses. The default lease is one day (86400s). The value ranges from 3600 to 86400 s.| 86400
Preferred DNS Address| Indicates the main IP address of a DNS server.| 192.168.1.1
Backup DNS Address| Indicates the backup IP address of a DNS server.| Null
WINS Server| Indicates the IP address of a WINS server.| Null
· Click
· Click
- Set an address pool on a VLAN.Set the parameters as
Items| Descriptions| Default value
---|---|---
Network Interface (VID)| Select a record in the table to indicate the name of a VLNAIF interface.
The VLANs in the table are created in the<802.1Q VLAN> and modules.| 1 Default Gateway| Indicates the default IP address and subnet mask of the selected VLAN. The value is displayed automatically after you select the .| Null Start IP Address| Indicate the start IP address of the interface.| Null Max Client Number| Input the max client number. The value ranges from 2 to 255.| 50
· Click
· Click
- Clear the record
User can clear the DHCP configuration of the selected VLAN.· Choose the record that need to be cleared, multiple records can be selected.
· Click.
· Click.
IP Multicast
9.1 IGMP Snooping
Internet Group Management Protocol Snooping (IGMP-Snooping) is a Layer 2 IPv4
multicast protocol. The IGMP-Snooping protocol maintains information about the
outgoing interfaces of multicast packets by snooping multicast 5protocol
packets exchanged between the Layer 3 multicast d vice and user hosts. The
IGMP-Snooping protocol manages and controls the forwarding of multicast
packets at the data link layer.
Users could turn on/off the IGMP-Snooping function and configure the IGMP-
Snooping Timer. Procedure
Choose
- Configure the IGMP-Snooping function.
· Set the parameters as required. Items| Descriptions| Default value
---|---|---
IGMP Interception Setting| Chooseto enable the IGMP-Snooping function.| Disable
IGMP Query| Chooseto enable the IGMP-Snooping query function.| Disable
IGMP Query Interval| Indicate the query interval time. The value ranges from 60~1000 s.| 60s
Group Member Alive Time| Indicate the group members survival time. The value ranges from 120~5000 s.| 150s
· Click
- View the IGMP Snooping configuration.
· Clickto reload the page.
· View the information.
Security Configuration
10.1 802.1x Authentication
In the network planning deployment of the access layer, users need to deploy
access-side security, only legitimate users can access the network after
authentication. 802.1x can be well deployed on the access switch ports to
achieve access-side security control.
802.1x authentication is available as a local-based authentication method or
as a radius-based remote authentication method. We go through case examples to
explain 802.1x local and remote radius authentication in detail.
The function is disable by default. Procedure
Choose
- Enable the function.
- Configure the global parameters.
Items| Descriptions| Default value
---|---|---
Timing Update Authentication| Input the authentication timer, the value ranges from 60~40,000,000s.| Null
Radius Server| Choose the radius server, including two types:
· Local: local radius server.
· Remote: remote radius server.| Remote - Configure local authentication.
Items| Descriptions| Default value
---|---|---
Radius Server| Choose.| Local
Port Setting| Control Mode| Set to.| Null
Port Control Mode| Supportonly.| Mac Based
· Go to
· Click
· Click
- Configure remote authentication.
Items| Descriptions| Default value
---|---|---
Radius Server| Choose.| Local
Port Setting| Control Mode| Set to.| Null
Port Control Mode| Supportonly.| Mac Based
Radius Server
Setting| IP Address| Input the IP address of Radius server.| Null
Secret Shared Key| Indicate the secret shared key of the IP address.| Null
Server Port
Setting| Billing Server Port| Indicate the accounting port.
The value ranges from 0 to 65535.| 1813
Certification Server Port| Indicate the authentication port. The value ranges from 0 to 65535.| 1812
Port Setting| Control Mode| Set to.| Null
Port Control Mode| Supportonly.| Mac Based
Maximum User Number| Input the maximum user quantity, the value ranges from 1 to 4096.| Null
Port Range| Select the interfaces or input the ports numbers that need to be set.| Null
· Click
· Click
10.2 Local RADIUS Setting
The switch supports to add or delete user name and password for local 802.1x
authentication. Procedure
Choose < Security Configuration> < Local Radius Setting> in the navigation
tree to open the page.
-
Create an account.
Items Descriptions Default value
User Login Input the user name. Null
User Password Indicate the password of the user name, the value support 5~16 bites string. Null
Click.
Click. -
Delete an account.
Select the account that need to be deleted.
Click.
Click.
10.3 AAA
Authentication, Authorization, and Accounting (AAA) is a security technology.
The AAA-capable device checks validity of users and assigns rights to
authorized users to ensure network security.
The switch supports two authentication mode:
Local: After local authentication and authorization are configured, the device
authenticates and authorizes access users based on the local user information.
Radius: Use the Radius protocol to achieve AAA authentication. After selecting
this mode, go to <802.1x authentication> page to configure Radius server. For
details, see “802.1X Authentication”. After setting, click
10.4 Static Address Lock
User can create, delete the static MAC table and view the configuration
information. Procedure
Choose
- Configure the static MAC table.
· Set the parameters as required. Items| Descriptions| Default value
---|---|---
Static Address Lock| Chooseto enable the function.| Disable
MAC Address| Input the 48 bit mac address.| Null
VLAN ID| Input the VLAN ID. The value ranges from 1~4094.| Null
Port| Input the ports numbers that need to be set. Multiple interfaces can be selected. Format as “2” or “1-5” or “3, 15”.| Null
· Click
· Click
-
Delete the static MAC table.
· Choose the record that need to be deleted.
· Click.
· Click. -
View the static MAC table.
· Clickto reload the page.
· View the information.
10.5 MAC Dynamic Aging
After the aging time of dynamic MAC address entries is set, the device can
delete unneeded MAC address entries to prevent sharp increase of MAC address
entries. A shorter aging time is applicable to networks where network topology
changes frequently, and a longer aging time is applicable to stable networks.
Procedure
Choose
Items | Descriptions | Default value |
---|---|---|
Aging Time | The aging time of dynamic MAC address. | |
The value ranges from 10~1,000,000s. | 300s |
Reliability
11.1 Rapid Spanning Tree
RSTP is the abbreviation of Rapid Spanning Tree Protocol.
This protocol provides the same function as STP, and is completely backward
compatible with 802.1D STP. Relative to the STP, the most important feature is
“fast”, if a LAN within the bridge are supported RSTP protocol, and the
administrator configured properly, once the network topology changes, and to
regenerate the topology tree only need not more than 1 second time
(traditional STP takes about 50 seconds).
Users can configure global parameter and ports parameters of Rapid Spanning
Tree. Procedure
Choose
- Configure global parameters.
· Set the parameters as required. Items| Descriptions| Default value
---|---|---
Spanning Tree Setting| Chooseto enable the function.| Disable
STP Version| Choose the protocol version, including:
•RSTP
•STP| RSTP
Device
Priority| Choose the priority of the device.
On an STP/RSTP-capable network, there is only one root bridge, which is the logic center of the entire spanning tree. During root bridge selection, a high-performance switching device at a high network layer should be selected as the root bridge; however, the priority of such a device may not be the highest on the network. It is therefore necessary to set a high priority for the switching device to ensure that the device functions as a root bridge.
Low-performance devices at lower network layers are not fit to serve as a root bridge. Therefore, set low priorities for these devices.
A smaller value of the priority indicates a higher priority of the switching device. The switching device with a higher priority is more likely to be elected as the root bridge. A larger value of the priority indicates a lower priority of the switching device. The switching device with a lower priority is less likely to be elected as the| 32768
| root bridge.|
Message Sending Period| Input the interval time to send message. The value ranges from 1 to 10.| 2s
Message Maximum Lifetime| Input the maximum lifetime of the message. The value ranges from 6 to 40.| 20s
Port State Transition Delay| Input the interval time of state transition delay for the ports.
The value ranges from 4 to 30.| 15s
Click
- Configure ports parameters.· Set the parameters as required
Items| Descriptions| Default value
---|---|---
Path Cost| Indicates the path cost of local port and target port. The value ranges from 0 to 200,000,000.
0 means auto detect.
On an STP/RSTP network, the accumulated cost of path from a port to the root bridge consists of all path costs of ports on the passed bridges. This cost is called root path cost, which determines root port selection.| 0
Port Priority| Choose the priority of the port. The lager number takes lower priority.
Step length: 16.| 128
Point-to-point Port| Choose the state of point-to-point, including
•No.
•Yes.| No
| •Auto Detect|
Edge Port| Chooseto enable the edge port. Choose to disable the edge port.| No
Port Range| Input the ports numbers that need to be set. Multiple interfaces can be selected. Format as “2” or “1-5” or “3, 15”.| Null
· Click
· Click
- View the configuration.
· Clickto reload the page.
· View the information.
11.2 Fast-Ring Protect
Users can configure the Fast-Ring protect function of the device. Fast Ring is
a private protocol applied on Ethernet loop protection to provide fast
recovery switching for Ethernet traffic in ring topology.
Fast Ring provides a faster redundant recovery than spanning tree topology.
The action is similar to STP or RSTP, but the algorithms between them are not
the same. In the ring topology, every switch should support fast ring and be
enabled with Fast Ring and two ports should be assigned as the member ports in
the fast ring group. When the failure of network connection occurs, the
traffic will go through via the backup link. Procedure
Choose
- Configure the Fast-Ring protect.
· Set the parameters as required Items| Descriptions| Default value
---|---|---
Fast-Ring Network| Chooseto enable the function.| Disable
Fast-Ring Network Group 1
Ring Network No:| Indicates the number of main ring network the device accesses. The value ranges from 0 to 255.| 0
Ring Port 1| Indicates the port number that access the ring network.| Null
Ring Port 2| Indicates the port number that access the ring network.
The port number can’t be the same if it is used in other
ring network.| Null
Current State:| Actual status of the ring network group 1.| Not Enabled
This parameter is not able to be set.
Ring Port 1| Actual port number that being accessing the network.
This parameter is not able to be set.| Unknown
Ring Port 2| Actual port number that being accessing the network.
This parameter is not able to be set.| Unknown
Fast-Ring Network Group 2
Network Type| Choose the network type of the sub ring network, including
· Double
· Coupling
Click, the function of sub ring network is disabled.| Disable
Ring No| Indicates the number of sub ring network the device accesses.
The value ranges from 0 to 255.| 0
Ring Port 1| Indicates the port number that access the ring network.| Null
Ring Port 2| Indicates the port number that access the ring network.
The port number can’t be the same if it is used in other ring network.| Null
Current State| Actual status of the ring network group 2. This parameter is not able to be set.| Not Enabled
Ring Port 1| Actual port number that being accessing the network. This parameter is not able to be set.| Unknown
Ring Port 2| Actual port number that being accessing the network. This parameter is not able to be set.| Unknown
· Click
- View the current status of Fast-Ring protection.
· Clickto reload the page.
· View the current state information.
11.3 Loopback Protect
The device supports loopback protection function.
While the function is turned on, users can check if there is a Loopback for
the device under this port.
If there is Loopback, the port will be shutdown. Procedure
Choose
- Configure the loopback function.
· Set the parameters as required. Items| Descriptions| Default value
---|---|---
Loop Direction| Chooseto enable the loopback detection function for the device.| Enable
Protect Automatic Recovery| Chooseto enable the protection automatic recovery function. The ports will be recovered automatically.| Disable
Disable Loop Port Time| Indicate the disable loop protect time.
The port will be recovered automatically, if the port detection no loopback packet after the time range, whenis enable.
The port will keep shutdown, if the port detection no loopback packet after the time range, whenis disable. The value ranges from 20 to 300s.| 20s
Port Range| Input the ports numbers that need to be set. Multiple interfaces can be selected. Format as “2” or “1-5” or “3, 1- 5”.| Null
Port Loop Detection| The device supports to enable or disable the loopback function of each port.
Chooseto enable the function of the ports needed to be set.| Enable
· Click
· Click
- View the loopback protect information.
· Clickto reload the page.
· View the information.
11.4 ERPS Ring
Ethernet Ring Protection Switching (ERPS) is defined in ITU-T G.8032
Recommendation. It prevents logical loops on a ring network by blocking
redundant links.
ERPSv1 supports only the single-ring topology. When there is no faulty link on
a ring network, ERPS can eliminate loops on the network. When a link fails on
the ring network, ERPS can immediately restore the communication between the
nodes on the network. Compared with other ring network protocols, ERPS has the
following advantages:
- The network converges fast.
- ERPS is a standard protocol published by the ITU-T; therefore devices from different vendors can communicate with each other when they run ERPS.
ERPS works for ERPS rings. An ERPS ring consists of interconnected Layer 2 switching devices configured with the same control VLAN and data VLAN. Logically, an ERPS ring is a necessity before you configure other related functions. **![LINOVISION L2 Industrial 8 Port Full Gigabit Managed POE Switch
-
Windows 7 as sample 1](https://manuals.plus/wp- content/uploads/2023/11/LINOVISION-L2-Industrial-8-Port-Full-Gigabit-Managed- POE-Switch-Windows-7-as-sample-1.png)Procedure**
Choosein the navigation tree to open the page. - Create an ERPS Ring.
Items| Descriptions| Default value
---|---|---
Ring Number| Input the number of ERPS Ring. The value ranges from 1 to 16.| Null
East Interface| Select the interface that in the ERPS Ring.| Null
West Interface| Select the interface that in the ERPS Ring.| Null - Click
.
- Create an ERPS Ring.
11.5 ERPS Instance
The VLAN in which ERPS PDUs and data packets are transmitted must be mapped to
a protected instance so that ERPS forwards or blocks the packets based on
rules. If the mapping is not performed, the preceding packets may cause
broadcast storms on the ring network, leading to the network failure.Procedure
Choose
- Configure the ERPS instance as required. Procedure
Choosein the navigation tree to open the page.
- Configure the ERPS instance as required.
Items| Descriptions| Default value
---|---|---
ERPS Protocol| Chooseto enable the loopback detection function for the device.| Null
Name| Name the ERPS instance.| Null
ID| Input the ID of the ERPS instance.| Null
Ring Number| Choose the number of the ERPS Ring that the instance linking with.| Null
Level| Define the ERPS Ring level. This parameter is optional.| Null
RAPS VLAN| Configure the control VLAN of the ERPS Ring.
The RAPS VLAN specified here must be a VLAN that has| Null
| not been created or used.|
---|---|---
Owner Interface| Choose the owner interface of the ERPS Ring.
The link where the RPL Owner port resides is a ring protection link.
An ERPS ring has only one RPL Owner interface. Blocking the RPL Owner interface prevents loops in the ERPS ring.| None
Subring Blocking| Select the subring of the ERPS Ring.
The protecting instance of the subring is 0 in default.| None
Associating Instance| Define the associating ERPS interface of subring. This parameter is optional.| Null - Click
.
Alarm Management
12.1 Alarm Host
The switch supports relay alarm function. After setting, the Web system will
alarm in the following three cases:
- Power supply off
- Port network disconnected
- Port PoE off
Procedure
Choose
- Enable the Alarm host function.
- Configure the function as required.
Items| Descriptions| Default value
---|---|---
Alarm Type| Select “Normal Open”.| Normal Close
Power Supply| Select to enable the power supply alarm function.
When the main power supply or backup power supply is off, the “Power Supply” area will turn red, please check the power supply.|
Port Network| Select to enable the port network alarm function. Select the ports as required.
When the linking port is disconnected, “Port Network” area and the link down ports will turn red, and the please check the network cable.| All
Port PoE| Select to enable the Port PoE alarm function. Select the ports as required.| All
| When the port stops supplying PoE power, the “Port PoE” area and the PoE off ports will turn red, please check the PoE function.|
---|---|---
DMS
13.1 Device List
The DMS (Desk Management System) function automatically discovers the devices
on the network and forms the topography view. Procedure
Choose
- Choose
to enable the function. - Click
to filtrate the device type which show in the list. - Click
. - View the device topography.
· Clickto reload the page.
· View the information.
System Management
14.1 Port mirroring
Packet mirroring copies the packets on a mirrored port (source port) to an
observing port (destination port).
During network maintenance, maintenance personnel need to capture and analyze
packets (for example, when there are suspicious attack packets). However,
these operations always affect packet forwarding.
Packet mirroring copies packets on a mirrored port to an observing port so
that users can analyze packets copied to the destination port by a monitoring
device to monitor the network and rectify faults. Users can configure the
source interface and target interface of mirror. The function supports 1 to 1
and many to 1 modes.
Procedure
Choose
- Configure the port mirroring function.
· Set the parameters as required. Items| Descriptions| Default value
---|---|---
Port mirror| Chooseto enable the function.| Disable
Monitor Port| Indicate the monitor port number.| Null
---|---|---
Mirror Port Range| The port number range of mirror ports, Multiple ports can be selected. Format as “2” or “1-5” or “3, 1-5”.| Null
Collect Data| The packets that the need to be copied and monitored on the mirrored ports, including
· All data
· Input data
· Output data| All data
· Click
· Click
- View the port mirroring configuration.
· Clickto reload the page.
· View the information.
14.2 SNMP
As a network management standard protocol used on TCP/IP networks, SNMP uses a
central computer (NMS) that runs network management software to manage network
elements.
In a large network, it is very difficult for network administrator to detect,
locate and rectify the fault as the devices does not report the fault. This
affects maintenance efficiency and increases maintenance workload. To solve
this problem, equipment vendors have provided network management functions in
some products. The NMS then can query the status of remote devices, and
devices can send traps to the NMS in the case of particular events.
Users can configure the function of the SNMP community permission and SNMP
V3. Procedure
Choose
- Configure SNMP community permission.
· Set the parameters as required. Items| Descriptions| Default value
---|---|---
SNMP Configuration| Chooseto enable the function.| Disable
SNMP Gateway| Input the IP address of the server.| Null
SNMP Version| Choose the SNMP version, including
· SNMP V1
· SNMP V2| SNMP V2
Read-only Group Name| Indicate the name of SNMP community for read-only permission.
The value supports strings.| public
Read and Write Group Name| Indicate the name of SNMP community for read and write permission.
The value supports strings.| private
· Click
- Configure SNMP V3
· Set the parameters as required. Items| Descriptions| Default value
---|---|---
User name| Indicates the user name. The value supports 31 stings| Null
Read and Write Mode| Choose the read and write mode, including
· Read-only
· Read and Write| Read-only
Identity Authentication| Choose the identity authentication, including
· MD5
· SHA| MD5
Verify Password| Indicates the Authentication password, supporting 8-32 digits strings.| Null
Encryption Protocol| Choose the Encryption Protocol, including
· DES
· AES
· 3DES| DES
Encryption Password| Indicates the Encryption password, supporting 8-32 digits strings.| Null
· Click
- View SNMP configuration.
· Clickto reload the page.
· View the information.
14.3 Time
Users can set time of the device by choosing local time or NTP server. By
default the device supports local time setting. Procedure
Choose
- Local time.· Set the parameters as required.
Items| Descriptions| Default value
---|---|---
World Time Zone| Choose time zone in drop down list.|
System Time| Display the current time of the system.| –
PC Time| Display the current time of management PC.| –
| Click to update theto synchronize with the .| –
· Click
- Using NTP.· Choose
.
· Set the parameters as required. Items| Descriptions| Default value
---|---|---
NTP Server| Input the IP address of NTP server.| Null
· Click
14.4 Syslog
Users can view, download and clear the system log, including
- Operation information
- Network link
- Warning information
Procedure
Choose
- Configure system log function.
· Set the parameters as required. Items| Descriptions| Default value
---|---|---
Log| Chooseto enable the function.| Disable
Show type| Choose the contents of the system log, including
· All Information
· Operation information
· Network link| All Information
| · Warning information|
---|---|---
· Click
-
Clear the system log records.
· Clickto delete the displayed log.
· Click. -
Download the system log records.
· Clickto download the displayed log.
Note:
- The system log can’t be recovered after clear operation.
14.5 Management
Users can restore the factory value, reboot the system, download the actual
configuration file, upload configuration file, and upgrade the software
version. Procedure
Choose
-
Restore factory value.
· Clickunder .· Click . -
Reboot the system.
· Clickunder .· Click . -
Manage the configuration file.
· Clickunder .
· The configuration file will be downloaded. -
Upload configuration file.
· Clickunder .
· Click.
Note:
· The actual configuration will be covered after uploading configuration file operation. Please download your configuration file before uploading, or the latest configuration can’t be recovered.
- Upgrade the software version.
· Click
· Click
Note:
- To upgrade the software version, please contact the seller for the software package.
- After software upgrade, please press the
key on the front panel for 5s, to make sure the new version software will work normally.
14.6 User Setting
The Web system manages users at levels.
User levels are marked by numbers from 1 to 15, in ascending order.
The access privilege of user is determined by the level of this user.
Procedure
Choose
- Create username.
· Set the parameters as required. Items| Descriptions| Default value
---|---|---
Access Privilege| Choose the user level, from 1 ~ 15.
· With lower than 3 level, the users are only allowed the read permission.
· With 3 and higher than 3 lever, the users are allowed the read, create and delete permission.| 15
User name| Input the username, supporting 32 digits of letters or numbers.| Null
Input password| Input the password, support 16 digits of letters or numbers.| Null
Confirm password| Confirm the password.
The value must be the same as .| Null
Password type| Choose the Password type
· Hidden password
· Unencrypted password| Hidden password
· Click
· Click
-
Delete username.
· Choose the username that need to be deleted.
· Click.
· Click. -
View the usernames.
· Click.
· View the information.
14.7 Time Restart
The switch supports to set the restart time of the system. After setting, the
switch will restart regularly at setting time. Procedure
Choose
- Configure restart time of the switch.
· Set the parameters as required. Items| Descriptions| Default value
---|---|---
Every day| Enable the function, the switch will restart at setting time every day.Set the restarting time, format as “HH:MM”. For example, set “15:00”, the switch will restart at “15:00:59”| Null
Every week| Enable the function.
Choose the restarting day and time. The switch will restart at setting time on setting day every week.
The restarting time is format as “HH:MM”. For example, set “15:00”, the switch will restart at “15:00:59”.| Null
Every month| Enable the function.
Choose the restarting date and time. The switch will restart at setting time on setting day every month.\
The restarting time is format as “HH:MM”. For example, set “15:00”, the switch will restart at “15:00:59”.| Null
· Click
14.8 Manage IP Address
Users can configure the out band IP address of loopback interfaces. The device
supports IPv4 and IPv6 manage addresses. Procedure
Choose
- Configure the IP addresses of loopback interfaces.
· Set the parameters as required. Items| Descriptions| Default value
---|---|---
IP Addr| Input the manage IP address and subnet mask.| 192.168.2.200/ 24
Subnet mask| Input the subnet mask.| 255.255.255.0
Default gateway| Input the manage default gateway.| Null
DNS address| Input the DNS address.| Null
IPv6address| Input the manage IPv6 address and subnet mask.| Null
IPv6 default gateway| Input the IPv6 default gateway| Null
· Click
· Click
14.9 One Key Smart
On this page, users could check up the main configuration and change the mode
of the switch. Procedure
Login the Web system or choose
- View the main configuration.
Items| Descriptions
---|---
Model| The model of the switch.
IP Address| The IP address of the switch.
It can be configured on
MAC Address| The MAC address of the switch.
Version| Hardware and software version of the system.
2. Switch the following mode of switch.
Items| Descriptions| Default value
---|---|---
CCTV Mode| Switch to this mode, downlink ports are isolated while
communication; optimize flow control for more fluent video.| Disable
Device Lock| Lock the authentication port device to prevent illegal access to
equipment and make system more secure.| Disable
Fast Ring| Start Fast Ring group 1 (Fast Ring group of X1.X2 ports).| Disable
Device Online| POE watchdog, 24-hour online monitoring switch.| Disable
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>