ienRon 6 Port 2.5G PoE Switch Instruction Manual
- June 16, 2024
- ienRon
Table of Contents
6 Port 2.5G PoE Switch
Product Information
Specifications
- Managed Switch Software: 174 Rev. 1.0
Product Usage Instructions
Port Fields
-
Port Trust: Display port ID.
-
Source MAC Address: Display enable/disabled
source MAC address validation attribute of interface. -
Destination MAC Address: Display
enable/disabled destination MAC address validation attribute of
interface. -
IP Address: Display enable/disabled IP address
validation attribute of interface. Allow zero which means allow
0.0.0.0 IP address. -
Rate Limit: Display rate limitation value of
interface.
Edit Property Port Dialog
-
Port Trust: Display selected port to be
edited. -
Source MAC Address: Set checkbox to enable or
disable source MAC address validation of interface. -
Destination MAC Address: Set checkbox to
enable or disable destination MAC address validation of
interface. -
IP Address: Set checkbox to enable or disable
IP address validation of interface. All ARP packets will be checked
whether the IP address is 0.0.0.0, 255.255.255.255, or multicast
address. Default is disabled. -
Rate Limit: Set checkbox to enable or disable
allow zero of IP address validation. 0.0.0.0 IP address is valid if
allow zero is enabled. Default is disabled.
Statistics
To display the Statistics page, click Security > Dynamic ARP
Inspection > Statistics. This page allows the user to browse all
statistics recorded by the Dynamic ARP Inspection function.
-
Port: Display port ID.
-
Forwarded: Display how many packets were
forwarded normally. -
Source MAC Failures: Display how many packets
were dropped by source MAC validation. -
Destination MAC Failures: Display how many
packets were dropped by destination MAC validation. -
Source IP Validation Failures: Display how
many packets were dropped by source IP validation. -
Destination IP Validation Failures: Display
how many packets were dropped by destination IP validation. -
IP-MAC Mismatch Failures: Display how many
packets were dropped by IP-MAC mismatch in the IP Source Guard
binding table.
DHCP Snooping
Use the DHCP Snooping pages to configure settings of DHCP
Snooping.
Property
To display the Property page, click Security > DHCP Snooping
Property. This page allows the user to configure global and
per interface settings of DHCP Snooping.
- State: Set checkbox to enable/disable DHCP
Snooping function. Select VLANs in the left box then move to the
right to enable DHCP Snooping. Or select VLANs in the right box
then move to the left to disable DHCP Snooping.
FAQ
-
1. What is the default state of IP address validation?
The default state of IP address validation is disabled.
-
1. What is the unit of rate limitation for ARP packets?
The unit of rate limitation for ARP packets is pps (packets per
second).
Field Port Trust
Description
Web User Interface User Guide
Display port ID.
Display enable/disabled trust attribute of interface
Managed Switch Software
174
Rev. 1.0
Web User Interface User Guide
Source MAC Address
Display enable/disabled source mac address validation attribute of interface
Destination MAC Address
IP Address
Rate Limit
Display enable/disabled destination mac address validation attribute of
interface
Display enable/disabled IP address validation attribute of interface. Allow
zero which means allow 0.0.0.0 IP address
Display rate limitation value of interface.
Table 10-34 Property Port Fields
Figure 10-35 Edit Property Port Dialog
Field
Description
Port Trust
Source MAC Address
Destination MAC Address
Display selected port to be edited.
Set checkbox to enable/disabled trust of interface. All ARP packet will be
forward directly if enable trust. Default is disabled. Set checkbox to enable
or disable source mac address validation of interface. All ARP packets will be
checked whether sender mac is same as source mac in Ethernet header if enable
source mac address validation. Default is disabled. Set checkbox to enable or
disable destination mac address validation of interface. All ARP packets will
be checked whether target mac is same as destination mac in Ethernet header if
enable destination mac address validation. Default is disabled.
Managed Switch Software
174
Rev. 1.0
IP Address
Web User Interface User Guide
Set checkbox to enable or disable IP address validation of interface. All ARP
packets will be checked whether IP address is 0.0.0.0, 255.255.255.255 or
multicast address. Default is disabled.
Managed Switch Software
175
Rev. 1.0
Web User Interface User Guide
IP Address Allow Zero
Rate Limit
Set checkbox to enable or disable allow zero of IP address validation. 0.0.0.0
IP address is valid if allow zero enable. Default is disabled.
Input rate limitation of ARP packets. The unit is pps. 0 means unlimited.
Default is unlimited.
le 10-35 Edit Property Port Fields
10.10.2. Statistics
To display Statistics page, click Security > Dynamic ARP Inspection >
Statistics
This page allow user to browse all statistics that recorded by Dynamic ARP
Inspection function.
Figure 10-36 Statistics Page
Field
Description
Port
Display port ID
Forwarded
Display how many packets forwarded normally.
Source MAC Failures
Display how many packets dropped by source MAC validation.
Destination MAC Failures
Display how many packets dropped by destination MAC validation.
Source IP Validation Failures
Display how many packets dropped by source IP validation.
Managed Switch Software
176
Rev. 1.0
Web User Interface User Guide
Destination IP Validation Failures
Display how many packets dropped by destination IP validation
Managed Switch Software
177
Rev. 1.0
Web User Interface User Guide
IP-MAC Mismatch Display how many packets dropped by IP-MAC doesn’t match in IP
Failures
Source Guard binding table.
Table 10-36 Statistics Fields
10.11. DHCP Snooping
Use the DHCP Snooping pages to configure settings of DHCP Snooping
10.11.1. Property
To display property page, click Security > DHCP Snooping > Property
This page allow user to configure global and per interface settings of DHCP
Snooping.
Field State
VLAN
Figure 10-37 Property Page
Description
Set checkbox to enable/disable DHCP Snooping function. Select VLANs in left
box then move to right to enable DHCP Snooping. Or select VLANs in right box
then move to left to disable DHCP Snooping.
Table 10-37 Property Fields
Managed Switch Software
178
Rev. 1.0
Web User Interface User Guide
Figure 10-38 Property Port Page
Field Port Trust
Verify Chaddr Rate Limit
Description Display port ID. Display enable/disabled trust attribute of
interface Display enable/disabled chaddr validation attribute of interface
Display rate limitation value of interface.
Table 10-38 Property Port Fields
Figure 10-39 Edit Property Port Dialog
Field Port Trust
Verify Chaddr
Managed Switch Software
Description
Display selected port to be edited.
Set checkbox to enable/disabled trust of interface. All DHCP packet will be
forward directly if enable trust. Default is disabled.
Set checkbox to enable or disable chaddr validation of interface. All DHCP
packets will be checked whether client hardware mac address is same as source
mac in Ethernet header if enable chaddr
179
Rev. 1.0
Rate Limit
Web User Interface User Guide
validation. Default is disabled.
Input rate limitation of DHCP packets. The unit is pps. 0 means unlimited.
Default is unlimited.
le 10-39 Edit Property Port Fields
10.11.2. Statistics
To display Statistics page, click Security > DHCP Snooping > Statistic
This page allow user to browse all statistics that recorded by DHCP snooping function.
Figure 10-40 DHCP Snooping Statistics Page
Field
Port
Forwarded
Chaddr Check Drop
Untrusted Port Drop
Untrusted Port with Option82
Drop
Description Display port ID Display how packets forwarded normally.
Display how many packets dropped by chaddr validation.
Display how many DHCP server packets that are received by untrusted port
dropped.
Display how many packets dropped by untrusted port with option82 checking.
Managed Switch Software
178
Rev. 1.0
Invalid Drop
Web User Interface User Guide
Display how many packets dropped by invalid checking.
Table 10-40 Statistics Fields
10.11.3. Option82 Property
To display Option82 Property page, click Security > DHCP Snooping > Option82
Property
This page allow user to set string of DHCP option82 remote ID filed. The
string will attach in option82 if option inserted.
Figure 10-41 Option82 Property Page
Field User Defined Remote ID
Description
Set checkbox to enable user-defined remote-ID. By default, remote ID is switch
mac in byte order. Input user-defined remote ID. Only available when enable
userdefine remote ID
Table 10-41 DHCP Snooping Option82 Fields
Managed Switch Software
Figure 10-42 Option82 Port Page 179
Rev. 1.0
Web User Interface User Guide
Field
Description
Port
Display port ID
Enable
Display option82 enable/disable status of interface
Allow untrusted Display allow untrusted action of interface
Table 10-42 Option82 Port Fields
Figure 10-43 Edit Option82 Port Dialog
Field
Description
Port
Display selected port to be edited
State Allow untrusted
Set checkbox to enable/disable option82 function of interface
Select the action perform when untrusted port receive DHCP packet has option82
filed. Default is drop.
Keep: Keep original option82 content. Replace: Replace option82 content by
switch setting Drop: Drop packets with option82.
Table 10-43 Edit Option82 Port Fields
10.11.4. Option82 Circuit ID
To display Option82 Circuit ID page, click Security > DHCP Snooping > Option82
Circuit ID
This page allow user to set string of DHCP option82 circuit ID filed. The
string will attach in option82 if option inserted.
Managed Switch Software
180
Rev. 1.0
Web User Interface User Guide
Figure 10-44 Option82 Circuit ID Page
Field Port VLAN
Circuit ID
Description Display port ID of entry Display associate VLAN of entry Display
circuit ID string of entry
Table 10-44 Option82 Circuit ID Fields
Figure 10-45 Add and Edit Option82 Circuit ID Dialog
Field
Description
Managed Switch Software
181
Rev. 1.0
Port VLAN Circuit ID
Web User Interface User Guide
Select port from list to associate to CID entry. Only available on Add dialog.
Input VLAN ID to associate to circuit ID entry. VLAN ID is not mandatory. Only
available on Add dialog. Input String as circuit ID. Packets match port and
VLAN will be inserted circuit ID.
Table 10-45 Option82 Circuit ID Fields
10.12. IP Source Guard
Use the IP Source Guard pages to configure settings of IP Source Guard.
10.12.1. Port Setting
To display Port Setting page, click Security > IP Source Guard > Port Setting
This page allow user to configure per port settings of IP Source Guard.
Figure 10-46 Port Setting Page
Field
Description
Port
Display port ID
State
Display IP Source Guard enable/disable status of interface
Verify Source Display mode of IP Source Guard verification
Current Binding Entry
Display current binding entries of a interface.
Managed Switch Software
182
Rev. 1.0
Web User Interface User Guide
Max Binding Entry Display the number of maximum binding entry of interface
Table 10-46 Port Setting Fields
Figure 10-47 Edit Port Setting Dialog
Field
Description
Port
Display selected port to be edited.
Status Verify Source Max Binding Entry
Set checkbox to enable or disable IP Source Guard function. Default is
disabled
Select the mode of IP Source Guard verification IP: Only verify source IP
address of packet IP-MAC: Verify source IP and source MAC address of packet
Input the maximum number of entries that a port can be bounded. Default is un-
limited on all ports. No entry will be bound if limitation reached.
Table 10-47 Edit Port Setting Fields
10.12.2. IMPV Binding
To display IPMV Binding page, click Security > IP Source Guard > IMPV Binding
This page allow user to add static IP source guard entry and browse all IP source guard entries that learned by DHCP snooping or statically create by user.
Managed Switch Software
183
Rev. 1.0
Web User Interface User Guide
Figure 10-48 IPMV Binding Page
Field Port VLAN
MAC Address IP Address Binding
Type
Lease Time
Description
Display port ID of entry.
Display VLAN ID of entry Display MAC address of entry. Only available of IP-
MAC binding entry Display IP address of entry. Mask always to be
255.255.255.255 for IP-MAC binding. IP binding entry display user input.
Display binding type of entry Type of existing binding entry
Static: Entry added by user. Dynamic: Entry learned by DHCP snooping.
Lease time of DHCP Snooping learned entry. After lease time entry will be
deleted. Only available of dynamic entry.
Table 10-48 IPMV Binding Fields
Managed Switch Software
184
Rev. 1.0
Web User Interface User Guide
Field Port VLAN
Binding
Figure 10-49 Add and Edit IPMV Binding Dialog
Description
Select port from list of a binding entry.
Specify a VLAN ID of a binding entry Select matching mode of binding entry
IP-MAC-Port-VLAN: packet must match IP address MAC addressPort and VLAN ID.
IP-Port-VLAN: packet must match IP address or subnet Port and VLAN ID.
MAC Address IP Address
Input MAC address. Only available on IP-MAC-Port-VLAN mode.
Input IP address and mask. Mask only available on IP-MAC-Port mode.
Table 10-49 Add and Edit IPMV Binding Fields
10.12.3. Save Database
To display Save Database page, click Security > DHCP Snooping > Save Database
Managed Switch Software
185
Rev. 1.0
Web User Interface User Guide
This page allow user to configure DHCP snooping database which can backup and
restore dynamic DHCP snooping entries.
Figure 10-50 Save Database Page
Field
Type
Filename Address Type Server Address Write Delay
Timeout
11. ACL
Description
Select the type of database agent. None: Disable database agent service.
Flash: Save DHCP dynamic binding entries to flash. TFTP: Save DHCP dynamic
binding entries to remote TFTP server.
Input filename for backup file. Only available when selecting type “flash” and
“TFTP”.
Select the type of TFTP server. Hostname: TFTP server address is hostname.
IPv4: TFTP server address is IPv4 address.
Input remote TFTP server hostname or IP address. Only available when selecting
type “TFTP”
Input delay timer for doing backup after change happened. Default is 300
seconds.
Input aborts timeout for doing backup failure. Default is 300 seconds.
Table 10-50 Save Database Fields
Use the ACL pages to configure settings for the switch ACL features.
Managed Switch Software
186
Rev. 1.0
Web User Interface User Guide
11.1. MAC ACL
To display MAC ACL page, click ACL > MAC ACL
This page allow user to add or delete ACL rule. A rule cannot be deleted if
under binding.
Field ACL Name
Figure 11-1 MAC ACL Page
Description Input MAC ACL name
Table 11-1 MAC ACL Fields
Field ACL Name Rule Port
Figure 11-2 MAC ACL Table Page
Description Display MAC ACL name Display the number ACE rule of ACL Display
the port list that bind this ACL
Table 11-2 MAC ACL Table Fields
11.2. MAC ACE
To display MAC ACE page, click ACL > MAC ACE
Managed Switch Software
187
Rev. 1.0
Web User Interface User Guide
This page allow user to add, edit or delete ACE rule. An ACE rule cannot be
edited or deleted if ACL under binding. New ACE cannot be added if ACL under
binding.
Figure 11-3 MAC ACE Page
Field
Description
ACL Name
Select the ACL name to which an ACE is being added.
Sequence
Display the sequence of ACE.
Action
Display the action of ACE
Source MAC Display the source MAC address and mask of ACE.
Destination MAC Display the destination MAC address and mask of ACE.
Ethertype
Display the Ethernet frame type of ACE.
VLAN ID
Display the VLAN ID of ACE
802.1p Value Display the 802.1p value of ACE.
802.1p Mask Display the 802.1p mask of ACE.
Table 11-3 MAC ACE Fields
Managed Switch Software
188
Rev. 1.0
Web User Interface User Guide
Figure 11-4 Add and Edit MAC ACE Dialog
Field ACL Name Sequence
Description
Display the ACL name to which an ACE is being added. Specify the sequence of
the ACE. ACEs with higher sequence are processed first (1 is the highest
priority). Only available on Add
Managed Switch Software
189
Rev. 1.0
Web User Interface User Guide
Action Source MAC Destination MAC Ethertype
VLAN ID 802.1p
Dialog.
Select the action after ACE match packet. Permit: Forward packets that meet
the ACE criteria. Deny: Drop packets that meet the ACE criteria. Shutdown:
Drop packets that meet the ACE criteria, and disable the port from where the
packets were received. Such ports can be reactivated from the Port Settings
page.
Select the type for source MAC address. Any: All source addresses are
acceptable. User Defined: Only a source address or a range of source addresses
which users define are acceptable. Enter the source MAC address and mask to
which will be matched.
Select the type for Destination MAC address. Any: All destination addresses
are acceptable. User Defined: Only a destination address or a range of
destination addresses which users define are acceptable. Enter the destination
MAC address and mask to which will be matched.
Select the type for Ethernet frame type. Any: All Ethernet frame type is
acceptable. User Defined: Only an Ethernet frame type which users define is
acceptable. Enter the Ethernet frame type value to which will be matched.
Select the type for VLAN ID. Any: All VLAN ID is acceptable. User Defined:
Only a VLAN ID which users define is acceptable. Enter the VLAN ID to which
will be matched.
Select the type for 802.1p value. Any: All 802.1p value is acceptable. User
Defined: Only an 802.1p value or a range of 802.1p value which users define is
acceptable. Enter the 802.1p value and mask to which will be matched.
Table 11-4 Add and Edit MAC ACE Fields
11.3. IPv4 ACL
To display IPv4 ACL page, click ACL > IPv4 ACL
This page allow user to add or delete Ipv4 ACL rule. A rule cannot be deleted
if under binding.
Managed Switch Software
190
Rev. 1.0
Web User Interface User Guide
Field ACL Name
Figure 11-5 IPv4 ACL Page
Description Input IPv4 ACL name
Table 11-5 IPv4 ACL Fields
Field ACL Name Rule Port
Figure 11-6 IPv4 ACL Table Page
Description Display IPv4 ACL name Display the number ACE rule of ACL Display
the port list that bind this ACL
Table 11-6 IPv4 ACL Table Fields
11.4. IPv4 ACE
To display IPv4 ACE page, click ACL > IPv4 ACE
This page allow user to add, edit or delete ACE rule. An ACE rule cannot be
edited or deleted if ACL under binding. New ACE cannot be added if ACL under
binding.
Managed Switch Software
191
Rev. 1.0
Web User Interface User Guide
Figure 11-7 IPv4 ACE Page
Field
Description
ACL Name Select the ACL name to which an ACE is being added.
Sequence Display the sequence of ACE.
Action Display the action of ACE
Protocol Display the protocol value of ACE
Source IP Display the source IP address and mask of ACE
Destination IP
Display the destination IP address and mask of ACE
Source Port
Display single source port or a range of source ports of ACE. Only available when protocol is TCP or UDP.
Destination Display single destination port or a range of destination ports of ACE. Only available
Port
when protocol is TCP or UDP.
TCP Flags Display the TCP flag value if ACE. Only available when protocol is TCP.
Type of Service
Display the ToS value of ACE which could be DSCP or IP Precedence.
ICMP Display the ICMP type and code of ACE. Only available when protocol is ICMP
Table 11-7 IPv4 ACL Fields
Managed Switch Software
192
Rev. 1.0
Web User Interface User Guide
Managed Switch Software
193
Rev. 1.0
Web User Interface User Guide
Figure 11-8 Add and Edit IPv4 ACE Dialog
Managed Switch Software
194
Rev. 1.0
Web User Interface User Guide
Field
Description
ACL Name Display the ACL name to which an ACE is being added.
Sequence Action
Protocol
Source IP Destination
IP
Source Port
Destination Port
Specify the sequence of the ACE. ACEs with higher sequence are processed first
(1 is the highest sequence). Only available on Add dialog.
Select the action for a match. Permit: Forward packets that meet the ACE
criteria. Deny: Drop packets that meet the ACE criteria. Shutdown: Drop
packets that meet the ACE criteria, and disable the port from where the
packets were received. Such ports can be reactivated from the Port Settings
page.
Select the type of protocol for a match. Any (IP): All IP protocols are
acceptable. Select from list: Select one of the following protocols from the
drop-down list. (ICMP/IPinIP/TCP/EGP/IGP/UDP/HMP/RDP/IPV6/IPV6:ROUT/IPV6:FRAG/
RSVP/IPV6:ICMP/OSPF/PIM/L2TP) Protocol ID to match: Enter the protocol ID.
Select the type for source IP address. Any: All source addresses are
acceptable. User Defined: Only a source address or a range of source addresses
which users define are acceptable. Enter the source IP address value and mask
to which will be matched.
Select the type for destination IP address. Any: All destination addresses are
acceptable. User Defined: Only a destination address or a range of destination
addresses which users define are acceptable. Enter the destination IP
address value and mask to which will be matched.
Select the type of protocol for a match. Only available when protocol is TCP
or UDP.
Any: All source ports are acceptable. Single: Enter a single TCP/UDP source
port to which packets are matched. Range: Select a range of TCP/UDP source
ports to which the packet is
matched. There are eight different port ranges that can be configured (shared
between source and destination ports). TCP and UDP protocols each have eight
port ranges.
Select the type of protocol for a match. Only available when protocol is TCP
or UDP.
Any: All source ports are acceptable. Single: Enter a single TCP/UDP source
port to which packets are matched.
Managed Switch Software
195
Rev. 1.0
Web User Interface User Guide
TCP Flags Type of Service
ICMP Type
ICMP Code
Range: Select a range of TCP/UDP source ports to which the packet is matched.
There are eight different port ranges that can be configured (shared between
source and destination ports). TCP and UDP protocols each have eight port
ranges.
Select one or more TCP flags with which to filter packets. Filtered packets
are either forwarded or dropped. Filtering packets by TCP flags increases
packet control, which increases network security. Only available when protocol
is TCP. Select the type of service for a match.
Any: All types of service are acceptable. DSCP to match: Enter a
Differentiated Serves Code Point (DSCP) to match. IP Precedence to match:
Enter a IP Precedence to match.
Either select the message type by name or enter the message type number. Only
available when protocol is ICMP.
Any: All message types are acceptable. Select from list: Select message type
by name. Protocol ID to match: Enter the number of message type. Select the
type for ICMP code. Only available when protocol is ICMP. Any: All codes are
acceptable. User Defined: Enter an ICMP code to match.
Table 11-8 Add and Edit IPv4 ACL Fields
11.5. IPv6 ACL
To display IPv6 ACL page, click ACL > IPv6 ACL
This page allow user to add or delete Ipv6 ACL rule. A rule cannot be deleted
if under binding.
Field ACL Name
Figure 11-9 IPv6 ACL Page
Description Input IPv6 ACL name
Table 11-9 IPv6 ACL Fields
Managed Switch Software
196
Rev. 1.0
Web User Interface User Guide
Field ACL Name Rule Port
Figure 11-10 IPv6 ACL Table Page
Description Display IPv6 ACL name Display the number ACE rule of ACL Display
the port list that bind this ACL
Table 11-10 IPv6 ACL Table Fields
11.6. IPv6 ACE
To display IPv6 ACE page, click ACL > IPv6 ACE
This page allow user to add, edit or delete ACE rule. An ACE rule cannot be
edited or deleted if ACL under binding. New ACE cannot be added if ACL under
binding.
Figure 11-11 IPv6 ACE Page
Field
Description
ACL Name Select the ACL name to which an ACE is being added.
Managed Switch Software
197
Rev. 1.0
Web User Interface User Guide
Sequence Display the sequence of ACE.
Action Display the action of ACE
Protocol Display the protocol value of ACE
Source IP Display the source IP address and prefix of ACE
Destination IP
Display the destination IP address and prefix of ACE
Source Port
Display single source port or a range of source ports of ACE. Only available when protocol is TCP or UDP.
Destination Display single destination port or a range of destination ports of ACE. Only available
Port
when protocol is TCP or UDP.
TCP Flags Display the TCP flag value if ACE. Only available when protocol is TCP.
Type of Service
Display the ToS value of ACE which could be DSCP or IP Precedence.
ICMP Display the ICMP type and code of ACE. Only available when protocol is ICMP
Table 11-11 IPv6 ACE Fields
Managed Switch Software
198
Rev. 1.0
Web User Interface User Guide
Managed Switch Software
199
Rev. 1.0
Web User Interface User Guide
Figure 11-12 Add and Edit IPv6 ACE Dialog
Managed Switch Software
200
Rev. 1.0
Web User Interface User Guide
Field
Description
ACL Name Sequence
Action
Protocol
Source IP Destination IP
Source Port
Destination Port
Display the ACL name to which an ACE is being added.
Specify the sequence of the ACE. ACEs with higher sequence are processed first
(1 is the highest sequence). Only available on Add dialog.
Select the action for a match. Permit: Forward packets that meet the ACE
criteria. Deny: Drop packets that meet the ACE criteria. Shutdown: Drop
packets that meet the ACE criteria, and disable the port from where the
packets were received. Such ports can be reactivated from the Port Settings
page.
Select the type of protocol for a match. Any (IP): All IP protocols are
acceptable. Select from list: Select one of the following protocols from the
dropdown list. (TCP / UDP / ICMP) Protocol ID to match: Enter the protocol ID.
Select the type for source IP address. Any: All source addresses are
acceptable. User Defined: Only a source address or a range of source addresses
which users define are acceptable. Enter the source IP address value and
prefix length to which will be matched.
Select the type for destination IP address. Any: All destination addresses are
acceptable. User Defined: Only a destination address or a range of destination
addresses which users define are acceptable. Enter the destination IP address
value and prefix to which will be matched.
Select the type of protocol for a match. Only available when protocol is TCP
or UDP.
Any: All source ports are acceptable. Single: Enter a single TCP/UDP source
port to which packets are
matched. Range: Select a range of TCP/UDP source ports to which the packet is
matched. There are eight different port ranges that can be configured (shared
between source and destination ports). TCP and UDP protocols each have eight
port ranges.
Select the type of protocol for a match. Only available when protocol is TCP
or UDP.
Any: All source ports are acceptable. Single: Enter a single TCP/UDP source
port to which packets are
Managed Switch Software
201
Rev. 1.0
TCP Flags Type of Service
ICMP Type
ICMP Code
Web User Interface User Guide
matched. Range: Select a range of TCP/UDP source ports to which the packet is
matched. There are eight different port ranges that can be configured (shared
between source and destination ports). TCP and UDP protocols each have eight
port ranges. Select one or more TCP flags with which to filter packets.
Filtered packets are either forwarded or dropped. Filtering packets by TCP
flags increases packet control, which increases network security. Only
available when protocol is TCP. Select the type of service for a match. Any:
All types of service are acceptable. DSCP to match: Enter a Differentiated
Serves Code Point (DSCP) to match. IP Precedence to match: Enter a IP
Precedence to match. Either select the message type by name or enter the
message type number. Only available when protocol is ICMP. Any: All message
types are acceptable. Select from list: Select message type by name. Protocol
ID to match: Enter the number of message type. Select the type for ICMP code.
Only available when protocol is ICMP. Any: All codes are acceptable. User
Defined: Enter an ICMP code to match.
Table 11-12 Add and Edit IPv6 ACE Fields
11.7. ACL Binding
To display ACL Binding page, click ACL > ACL Binding
This page allow user to bind or unbind ACL rule to or from interface. IPv4 and
Ipv6 ACL cannot be bound to the same port simultaneously.
Managed Switch Software
202
Rev. 1.0
Web User Interface User Guide
Field Port
Figure 11-13 ACL Binding Page
Description Display port entry ID.
Managed Switch Software
203
Rev. 1.0
MAC ACL IPv4 ACL IPv6 ACL
Web User Interface User Guide
Display mac ACL name that bound of interface. Empty means no rule bound.
Display ipv4 ACL name that bound of interface. Empty means no rule bound.
Display ipv6 ACL name that bound of interface. Empty means no rule bound.
Table 11-13 ACL Binding Fields
Field Port
MAC ACL IPv4 ACL IPv6 ACL
Figure 11-14 Add and Edit ACL Binding Dialog
Description Display port entry ID. Select mac ACL name from list to bind.
Select IPv4 ACL name from list to bind. Select IPv6 ACL name from list to
bind.
Table 11-14 Add and Edit ACL Binding Fields
Managed Switch Software
204
Rev. 1.0
12. QoS
Use the QoS pages to configure settings for the switch QoS interface.
12.1. General
Use the QoS general pages to configure settings for general purpose.
12.1.1. Property
To display Property web page, click QoS > General > Property
Web User Interface User Guide
Figure 12-1 QoS Global Setting
Field State
Trust Mode
Managed Switch Software
Description
Set checkbox to enable/disable QoS.
Select QoS trust mode CoS: Traffic is mapped to queues based on the CoS field
in the VLAN tag, or based on the per-port default CoS value (if there is no
VLAN tag on the incoming packet), the actual mapping of the CoS to queue can
be configured on port setting dialog. DSCP: All IP traffic is mapped to queues
based on the DSCP field in the IP header. The actual mapping of the DSCP to
queue can be configured on the DSCP mapping page. If traffic is not IP
traffic, it is mapped to the best effort queue. CoS-DSCP: Uses the trust CoS
mode for non-IP traffic and
205
Rev. 1.0
Web User Interface User Guide
trust DSCP mode for IP traffic. IP Precedence: Traffic is mapped to queues
based on the IP
precedence. The actual mapping of the IP precedence to queue can be configured
on the IP Precedence mapping page.
Table 12-1 QoS Global Setting Fields
Figure 12-2 QoS Port Setting Table
Field Port CoS
Trust
Remarking (CoS)
Description
Port name
Port default CoS priority value for the selected ports Port trust state
Enabled: Traffic will follow trust mode in global setting Disabled: Traffic
will always use best efforts Port CoS remaking admin state Enabled: CoS
remarking is enabled Disabled: CoS remarking is disabled
Managed Switch Software
206
Rev. 1.0
Remarking (DSCP)
Port DSCP remaking admin state Enabled: DSCP remarking is enabled Disabled: DSCP remarking is disabled
Web User Interface User Guide
Managed Switch Software
207
Rev. 1.0
Remarking (IP PRecedence)
Web User Interface User Guide
Port IP Precedence remaking admin state Enabled: IP Precedence remarking is
enabled Disabled: IP Precedence remarking is disabled
Table 12-2 QoS Port Setting Table Fields
Figure 12-3 Edit QoS Port Setting
Field
Description
Port
Select port list
CoS
Set default CoS/802.1p priority value for the selected ports
Trust
Set checkbox to enable/disable port trust state
Remarking (CoS)
Set checkbox to enable/disable port CoS remarking
Remarking (DSCP) Set checkbox to enable/disable port DSCP remarking
Remarking (IP PRecedence)
Set checkbox to enable/disable port IP Precedence remarking
Table 12-3 Edit QoS Port Setting Fields
Managed Switch Software
208
Rev. 1.0
Web User Interface User Guide
12.1.2. Queue Scheduling
To display Queue Scheduling web page, click QoS > General > Queue Scheduling.
The switch supports eight queues for each interface. Queue number 8 is the
highest priority queue. Queue number 1 is the lowest priority queue. There are
two ways of determining how traffic in queues is handled, Strict Priority (SP)
and Weighted Round Robin (WRR). · Strict Priority (SP)–Egress traffic from the
highest priority queue is transmitted first. Traffic from the lower queues is
processed only after the highest queue has been transmitted, which provide the
highest level of priority of traffic to the highest numbered queue. · Weighted
Round Robin (WRR)–In WRR mode the number of packets sent from the queue is
proportional to the weight of the queue (the higher the weight, the more
frames are sent).
The queuing modes can be selected on the Queue page.When the queuing mode is
by Strict Priority, the priority sets the order in which queues are serviced,
starting with queue_8 (the highest priority queue) and going to the next lower
queue when each queue is completed. When the queuing mode is Weighted Round
Robin, queues are serviced until their quota has been used up and then another
queue is serviced. It is also possible to assign some of the lower queues to
WRR, while keeping some of the higher queues in Strict Priority. In this case
traffic for the SP queues is always sent before traffic from the WRR queues.
After the SP queues have been emptied, traffic from the WRR queues is
forwarded. (The relative portion from each WRR queue depends on its weight).
Managed Switch Software
Figure 12-4: Queue Scheduling Table 209
Rev. 1.0
Web User Interface User Guide
Field
Description
Queue
Queue ID to configure
Strict Priority Set queue to strict priority type
WRR
Set queue to Weight round robin type
Weight
If the queue type is WRR, set the queue weight for the queue.
WRR Bandwidth
Percentage of WRR queue bandwidth
Table 12-4: Queue Scheduling Table fields.
12.1.3. CoS Mapping
To display CoS Mapping web page, click QoS > General > CoS Mapping
The CoS to Queue table determines the egress queues of the incoming packets
based on the 802.1p priority in their VLAN tags. For incoming untagged
packets, the 802.1p priority will be the default CoS/802.1p priority assigned
to the ingress ports. Use the Queues to CoS table to remark the CoS/802.1p
priority for egress traffic from each queue.
Figure 12-5 CoS to Queue Mapping Table
Managed Switch Software
210
Rev. 1.0
Field CoS
Queue
Description CoS value Select queue id for the CoS value
Table 12-5 CoS to Queue Mapping Table Fields
Web User Interface User Guide
Figure 12-6 Queue to CoS Mapping Table
Field Queue Cos
Description Queue ID Select CoS value for the queue id
Table 12-6 Queue to CoS Mapping Table Fields
12.1.4. DSCP Mapping
To display DSCP Mapping web page, click QoS > General > DSCP Mapping
Managed Switch Software
211
Rev. 1.0
Web User Interface User Guide
The DSCP to Queue table determines the egress queues of the incoming IP
packets based on their DSCP values. The original VLAN Priority Tag (VPT) of
the packet is unchanged.
Use the Queues to DSCP page to remark DSCP value for egress traffic from each
queue.
Field DSCP Queue
Figure 12-7 DSCP to Queue Mapping Table
Description DSCP value Select queue id for DSCP value
Table 12-7 DSCP to Queue Mapping Table Fields
Managed Switch Software
210
Rev. 1.0
Web User Interface User Guide
Figure 12-8 Queue to DSCP Mapping Table
Field Queue DSCP
Description Queue ID Select DSCP value for queue id
Table 12-8 Queue to DSCP Mapping Table Fields
12.1.5. IP Precedence Mapping
To display IP Precedence Mapping web page, click QoS > General > IP Precedence
Mapping
This page allow user to configure IP Precedence to Queue mapping and Queue to
IP Precedence mapping.
Managed Switch Software
211
Rev. 1.0
Web User Interface User Guide
Figure 12-9 IP Precedence to Queue Mapping Table
Field
Description
IP Precedence IP Precedence value
Queue
Queue value which IP Precedence is mapped
Table 12-9 IP Precedence to Queue Mapping Table Fields
Figure 12-10 Queue to IP Precedence Mapping Table
Managed Switch Software
212
Rev. 1.0
Web User Interface User Guide
Field
Description
Queue
Queue ID
IP Precedence IP Precedence value which queue is mapped
Table 12-10 Queue to IP Precedence Mapping Table Fields
12.2. Rate Limit
Use the Rate Limit pages to define values that determine how much traffic the switch can receive and send on specific port or queue.
12.2.1. Ingress / Egress Port
To display Ingress / Egress Port web page, click QoS > Rate Limit > Ingress /
Egress Port
This page allow user to configure ingress port rate limit and egress port rate
limit. The ingress rate limit is the number of bits per second that can be
received from the ingress interface. Excess bandwidth above this limit is
discarded.
Managed Switch Software
213
Rev. 1.0
Web User Interface User Guide
Field
Port
Ingress (State)
Ingress (Rate)
Egress (State)
Egress (Rate)
Figure 12-11 Ingress/Egress Port Table
Description Port name Port ingress rate limit state
Enabled: Ingress rate limit is enabled Disabled: Ingress rate limit is
disabled Port ingress rate limit value if ingress rate state is enabled Port
egress rate limit state Enabled: Egress rate limit is enabled Disabled: Egress
rate limit is disabled Port egress rate limit value if egress rate state is
enabled
Table 12-11 Ingress/Egress Port Table Fields
Managed Switch Software
214
Rev. 1.0
Web User Interface User Guide
Figure 12-12 Edit Ingress/Egress Port
Field Port
Ingress Egress
Description
Select port list
Set checkbox to enable/disable ingress rate limit. If ingress rate limit is
enabled, rate limit value need to be assigned. Set checkbox to enable/disable
egress rate limit. If egress rate limit is enabled, rate limit value need to
be assigned.
Table 12-12 Edit Ingress/Egress Port Fields
12.2.2. Egress Queue
To display Egress Queue web page, click QoS > Rate Limit > Egress Queue.
Egress rate limiting is performed by shaping the output load.
Managed Switch Software
Figure 12-13: Egress Queue Table 215
Rev. 1.0
Field
Port
Queue 1 (State)
Queue 1 (CIR)
Queue 2 (State)
Queue 2 (CIR)
Queue 3 (State)
Queue 3 (CIR)
Queue 4 (State)
Queue 4 (CIR)
Queue 5 (State)
Queue 5 (CIR)
Queue 6 (State)
Queue 6 (CIR)
Queue 7 (State)
Description Port name Port egress queue 1 rate limit state
Enabled: Egress queue rate limit is enabled Disabled: Egress queue rate limit
is disabled Queue 1 egress committed information rate Port egress queue 2 rate
limit state Enabled: Egress queue rate limit is enabled Disabled: Egress queue
rate limit is disabled Queue 2 egress committed information rate Port egress
queue 3 rate limit state Enabled: Egress queue rate limit is enabled Disabled:
Egress queue rate limit is disabled Queue 3 egress committed information rate
Port egress queue 4 rate limit state Enabled: Egress queue rate limit is
enabled Disabled: Egress queue rate limit is disabled Queue 4 egress committed
information rate Port egress queue 5 rate limit state Enabled: Egress queue
rate limit is enabled Disabled: Egress queue rate limit is disabled Queue 5
egress committed information rate Port egress queue 6 rate limit state
Enabled: Egress queue rate limit is enabled Disabled: Egress queue rate limit
is disabled Queue 6 egress committed information rate Port egress queue 7 rate
limit state Enabled: Egress queue rate limit is enabled Disabled: Egress queue
rate limit is disabled
Managed Switch Software
216
Web User Interface User Guide
Rev. 1.0
Queue 7 (CIR)
Queue 8 (State)
Queue 8 (CIR)
Queue 7 egress committed information rate
Port egress queue 8 rate limit state Enabled: Egress queue rate limit is
enabled Disabled: Egress queue rate limit is disabled
Queue 8 egress committed information rate
Table 12-13: Egress Queue Table Fields.
Web User Interface User Guide
Field Port
Figure 12-14: Edit Egress Queue
Description Select port list
Managed Switch Software
217
Rev. 1.0
Queue 1 Queue 2 Queue 3 Queue 4 Queue 5 Queue 6 Queue 7 Queue 8
Web User Interface User Guide
Set checkbox to enable/disable egress queue 1 rate limit. If egress rate limit
is enabled, rate limit value need to be assigned. Set checkbox to
enable/disable egress queue 2 rate limit. If egress rate limit is enabled,
rate limit value need to be assigned. Set checkbox to enable/disable egress
queue 3 rate limit. If egress rate limit is enabled, rate limit value need to
be assigned. Set checkbox to enable/disable egress queue 4 rate limit. If
egress rate limit is enabled, rate limit value need to be assigned. Set
checkbox to enable/disable egress queue 5 rate limit. If egress rate limit is
enabled, rate limit value need to be assigned. Set checkbox to enable/disable
egress queue 6 rate limit. If egress rate limit is enabled, rate limit value
need to be assigned. Set checkbox to enable/disable egress queue 7 rate limit.
If egress rate limit is enabled, rate limit value need to be assigned. Set
checkbox to enable/disable egress queue 8 rate limit. If egress rate limit is
enabled, rate limit value need to be assigned.
Table 12-14: Edit Egress Queue Fields.
13. Diagnostics
Use the Diagnostics pages to configure settings for the switch diagnostics
feature or operating diagnostic utilities.
13.1. Logging
13.1.1. Property
To enable/disable the logging service, click Diagnostic > Logging > Property.
Managed Switch Software
218
Rev. 1.0
Web User Interface User Guide
Field State
Field State
Minimum Severity
Figure 13-1: Logging Property page.
Description Enable/Disable the global logging services. When the logging
service is enabled, logging configuration of each destination rule can be
individually configured. If the logging service is disabled, no messages will
be sent to these destinations.
Table 13-1: Logging Property fields.
Description Enable/Disable the console logging service.
The minimum severity for the console logging.
Table 13-2: Console Logging fields.
Managed Switch Software
219
Rev. 1.0
Field
State
Minimum Severity
Description Enable/Disable the RAM logging service.
The minimum severity for the RAM logging.
Table 13-3: RAM Logging fields.
Web User Interface User Guide
Field
State
Minimum Severity
Description Enable/Disable the flash logging service.
The minimum severity for the flash logging.
Table 13-4: Flash Logging fields.
13.1.2. Remove Server
To configure the remote logging server, click Diagnostic > Logging > Remote
Server.
Figure 13-2: Remote Server page.
Field
Description
Server Address The IP address of the remote logging server.
Server Ports Facility Severity
The port number of the remote logging server.
The facility of the logging messages. It can be one of the following values:
local0, local1, local2, local3, local4, local5, local6, and local7. The
minimum severity. Emergence: System is not usable.
Managed Switch Software
220
Rev. 1.0
Web User Interface User Guide
Alert: Immediate action is needed. Critical: System is in the critical
condition. Error: System is in error condition Warning: System warning has
occurred Notice: System is functioning properly, but a system notice has
occurred. Informational: Device information. Debug: Provides detailed
information about an event.
Table 13-5: Remote Server fields.
13.2. Mirroring
To display Port Mirroring web page, click Diagnostics > Mirroring
Field Session ID
State
Monitor Port Ingress port Egress ports
Figure 13-3 Mirroring Page
Description
Select mirror session ID Select mirror session state : port-base mirror or
disable
Enabled: Enable port based mirror Disabled: Disable mirror. Select mirror
session monitor port, and select whether normal packet
could be sent or received by monitor port.
Select mirror session source rx ports
Select mirror session source tx ports
Table 13-6 Mirroring Fields
Managed Switch Software
221
Rev. 1.0
13.3. Ping
For the ping functionality, click Diagnostic > Ping.
Web User Interface User Guide
Figure 13-4: Ping page.
Field
Description
Address Type Specify the address type to “Hostname”, “IPv6”, or “IPv4”.
Server Address Specify the Hostname/IPv4/IPv6 address for the remote logging server.
Count
Specify the numbers of each ICMP ping request.
Managed Switch Software
222
Rev. 1.0
Table 13-7: Ping fields.
13.4. Traceroute
For trace route functionality, click Diagnostic > Traceroute.
Web User Interface User Guide
Figure 13-5: Traceroute page.
Field
Description
Address Type Specify the address type to “Hostname”, or “IPv4”.
Server Address Specify the Hostname/IPv4 address for the remote logging server.
Time to Live
Specify the max hops of hosts for traceroute.
Table 13-8: Traceroute fields.
Managed Switch Software
223
Rev. 1.0
13.5. Copper Test
For copper length diagnostic, click Diagnostic > Copper Test.
Web User Interface User Guide
Field Port
Figure 13-6: Copper Test page.
Description Specify the interface for the copper test.
Table 13-9: Copper Test fields.
Field Port
Result
Length
Description
The interface for the copper test.
The status of copper test. It include: OK: Correctly terminated pair. Short
Cable: Shorted pair. Open Cable: Open pair, no link partner. Impedance
Mismatch: Terminating impedance is not in the reference range. Line Drive:
Distance in meter from the port to the location on the cable where the fault
was discovered.
Table 13-10: Copper Result fields.
Managed Switch Software
224
Rev. 1.0
13.6. Fiber Module
Web User Interface User Guide
The Optical Module Status page displays the operational information reported
by the Small Form-factor Pluggable (SFP) transceiver. Some information may not
be available for SFPs without the supports of digital diagnostic monitoring
standard SFF-8472.
To display the Optical Module Diagnostic page, click Diagnostic > Fiber
Module.
Figure 13-7: Fiber Module page.
Field
Description
Port
Interface or port number.
Temperature Internally measured transceiver temperature.
Voltage
Internally measured supply voltage.
Current
Measured TX bias current.
Output Power Measured TX output power in milliwatts.
Input Power Measured RX received power in milliwatts.
Transmitter Fault State of TX fault.
OE Present Indicate transceiver has achieved power up and data is ready.
Loss of Signal Loss of signal.
Refresh
Refresh the page.
Managed Switch Software
225
Rev. 1.0
Detail
The detail information on the specified port.
Table 13-11: Fiber Module fields.
Web User Interface User Guide
Figure 13-8: Fiber Module Status page.
13.7. UDLD
Use the UDLD pages to configure settings of UDLD function.
Managed Switch Software
226
Rev. 1.0
13.7.1. Property
To display Property page, click Diagnostics > UDLD > Property
Web User Interface User Guide
This page allow user to configure global and per interface settings of UDLD.
Figure 13-9: Property page.
Field Message Time
Description Input the interval for sending message. Range is 1 -90 seconds.
Table 13-12 Property Fields
Figure 13-10: Property Port page.
Field
Description
Port
Display port ID of entry.
Mode
Display UDLD running mode of interface.
Bidirectional State Display bidirectional state of interface.
Operational Status
Display operational status of interface
Neighbor
Display the number of neighbor of interface
Managed Switch Software
227
Rev. 1.0
Table 13-13 Property Port Fields
Web User Interface User Guide
Field Port
Mode
Figure 13-11: Edit Property Port page.
Description
Display selected port to be edited. Select UDLD running mode of interface.
Disabled: Disable UDLD function. Normal: Running on normal mode that port goes
to Link Up
One phase after last neighbor ages out. Aggressive: Running on aggressive mode
that port goes to
Re-Establish phase after last neighbor ages out.
Table 13-14 Edit Property Port Fields
13.7.2. Neighbor
To display Neighbor page, click Diagnostics > UDLD > Neighbor
Figure 13-12: Neighbor page.
Field
Description
Entry
Display entry index.
Managed Switch Software
228
Rev. 1.0
Web User Interface User Guide
Expiration Time
Display expiration time before age out.
Current Neighbor State
Display neighbor current state
Device ID Display neighbor device ID.
Device Name Display neighbor device name.
Port ID
Display neighbor port ID that connected.
Message Interval
Display neighbor message interval.
Timeout Interval
Display neighbor timeout interval
14. Management
Table 13-15: Neighbor fields.
Use the Management pages to configure settings for the switch management features.
14.1. User Account
To display User Account web page, click Management > User Account
The default username/password is admin/admin. And default account is not able
to be deleted.
Use this page to add additional users that are permitted to manage the switch
or to change the passwords of existing users.
Managed Switch Software
229
Rev. 1.0
Web User Interface User Guide
Field Username
Privilege
Figure 14-1 User Account Table
Description
User name of the account Select privilege level for new account.
Admin: Allow to change switch settings. Privilege value equals to 15.
User: See switch settings only. Not allow to change it. Privilege level equals
to 1.
Table 14-1 User Account Table Fields
Managed Switch Software
239
Rev. 1.0
Web User Interface User Guide
Figure 14-2 Add/Edit User Account Dialog
Field
Description
Username
User name of the account
Password
Set password of the account
Confirm Password Privilege
Set the same password of the account as in “Password” field
Select privilege level for new account. Admin: Allow to change switch
settings. Privilege value equals to 15. User: See switch settings only. Not
allow to change it. Privilege level equals to 1.
Table 14-2 Add/Edit User Account Fields
14.2. Firmware
14.2.1. Upgrade / Backup
To display firmware upgrade or backup web page, click Management > Firmware >
Upgrade/Backup This page allow user to upgrade or backup firmware image
through HTTP or TFTP server.
Managed Switch Software
231
Rev. 1.0
Web User Interface User Guide
Field Action Method
Filename
Figure 14-3 Upgrade Firmware through HTTP
Description Firmware operations
Upgrade: Upgrade firmware from remote host to DUT Backup: Backup firmware
image from DUT to remote host Firmware upgrade / backup method TFTP: Using
TFTP to upgrade/backup firmware HTTP: Using WEB browser to upgrade/backup
firmware Use browser to upgrade firmware, you should select firmware image
file on your host PC.
Table 14-3 Upgrade Firmware through HTTP Fields
Field
Figure 14-4 Upgrade Firmware through TFTP
Description
Managed Switch Software
232
Rev. 1.0
Action Method
Address Type Server Address
Filename
Web User Interface User Guide
Firmware operations Upgrade: Upgrade firmware from remote host to DUT Backup:
Backup firmware image from DUT to remote host
Firmware upgrade / backup method TFTP: Using TFTP to upgrade/backup firmware
HTTP: Using WEB browser to upgrade/backup firmware
Specify TFTP server address type Hostname: Use domain name as server address
IPv4: Use IPv4 as server address IPv6: Use IPv6 as server address
Specify TFTP server address.
Firmware image file name on remote TFTP server
Table 14-4 Upgrade Firmware through TFTP Fields
Figure 14-5 Backup Firmware through HTTP
Field Action Method
Firmware
Description
Firmware operations Upgrade: Upgrade firmware from remote host to DUT Backup:
Backup firmware image from DUT to remote host
Firmware upgrade / backup method TFTP: Using TFTP to upgrade/backup firmware
HTTP: Using WEB browser to upgrade/backup firmware
Firmware partition need to backup Image0: Firmware image in flash partition 0
Image1: Firmware image in flash partition 1
Table 14-5 Backup Firmware through HTTP Fields
Managed Switch Software
233
Rev. 1.0
Web User Interface User Guide
Figure 14-6 Backup Firmware through TFTP
Field Action Method
Firmware
Address Type Server Address
Filename
Description Firmware operations
Upgrade: Upgrade firmware from remote host to DUT Backup: Backup firmware
image from DUT to remote host Firmware upgrade / backup method TFTP: Using
TFTP to upgrade/backup firmware HTTP: Using WEB browser to upgrade/backup
firmware Firmware partition need to backup Image0: Firmware image in flash
partition 0 Image1: Firmware image in flash partition 1 Specify TFTP server
address type Hostname: Use domain name as server address IPv4: Use IPv4 as
server address IPv6: Use IPv6 as server address Specify TFTP server address.
File name saved on remote TFTP server
Table 14-6 Backup Firmware through TFTP Fields
14.2.2. Active Image
To display the Active Image web page, click Management > Firmware > Active
Image.
Managed Switch Software
234
Rev. 1.0
Web User Interface User Guide
This page allow user to select firmware image on next booting and show
firmware information on both flash partitions
Figure 14-7 Active Image Page
Field Active Image Firmware Version Name Size Created
Description Select firmware image to use on next booting Firmware flash
partition name Firmware version Firmware name Firmware image size Firmware
image created date
Table 14-7 Active Image Fields
Managed Switch Software
235
Rev. 1.0
Web User Interface User Guide
14.3. Configuration
14.3.1. Upgrade / Backup
To display firmware upgrade or backup web page, click Management >
Configuration > Upgrade/Backup
This page allow user to upgrade or backup configuration file through HTTP or
TFTP server.
Figure 14-8 Upgrade Configuration through HTTP
Field Action Method
Configuration
Description
Configuration operations Upgrade: Upgrade firmware from remote host to DUT
Backup: Backup firmware image from DUT to remote host
Configuration upgrade / backup method TFTP: Using TFTP to upgrade/backup
firmware HTTP: Using WEB browser to upgrade/backup firmware
Configuration types Running Configuration: Merge to current running
configuration file Startup Configuration: Replace startup configuration file
Managed Switch Software
236
Rev. 1.0
Filename
Web User Interface User Guide
Backup Configuration: Replace backup configuration file
Use browser to upgrade configuration, you should select configuration file on
your host PC.
Table 14-8 Upgrade Configuration through HTTP Fields
Figure 14-9 Upgrade Configuration through TFTP
Field Action Method
Configuration
Address Type
Description
Configuration operations Upgrade: Upgrade firmware from remote host to DUT
Backup: Backup firmware image from DUT to remote host
Configuration upgrade / backup method TFTP: Using TFTP to upgrade/backup
firmware HTTP: Using WEB browser to upgrade/backup firmware
Configuration types Running Configuration: Merge to current running
configuration file Startup Configuration: Replace startup configuration file
Backup Configuration: Replace backup configuration file
Specify TFTP server address type Hostname: Use domain name as server address
IPv4: Use IPv4 as server address
Managed Switch Software
237
Rev. 1.0
Server Address Filename
IPv6: Use IPv6 as server address Specify TFTP server address. Configuration
file name on remote TFTP server
Table 14-9 Upgrade Firmware through TFTP Fields
Web User Interface User Guide
Figure 14-10 Backup Configuration through HTTP
Field Action Method
Configuration
Description
Configuration operations Upgrade: Upgrade configuration from remote host to
DUT Backup: Backup configuration from DUT to remote host
Configuration upgrade / backup method TFTP: Using TFTP to upgrade/backup
configuration HTTP: Using WEB browser to upgrade/backup configuration
Configuration types Running Configuration: Backup running configuration file
Startup Configuration: Backup start configuration file Backup Configuration:
Backup backup configuration file RAM Log: Backup log file stored in RAM Flash
Log: Backup log files store in Flash
Table 14-10 Backup Configuration through HTTP Fields
Managed Switch Software
238
Rev. 1.0
Web User Interface User Guide
Figure 14-11 Backup Configuration through TFTP
Field Action Method
Configuration
Address Type Server Address
Filename
Description Firmware operations
Upgrade: Upgrade firmware from remote host to DUT Backup: Backup firmware
image from DUT to remote host Firmware upgrade / backup method TFTP: Using
TFTP to upgrade/backup firmware HTTP: Using WEB browser to upgrade/backup
firmware Configuration types Running Configuration: Backup running
configuration file Startup Configuration: Backup start configuration file
Backup Configuration: Backup backup configuration file RAM Log: Backup log
file stored in RAM Flash Log: Backup log files store in Flash Specify TFTP
server address type Hostname: Use domain name as server address IPv4: Use IPv4
as server address IPv6: Use IPv6 as server address
Specify TFTP server address.
File name saved on remote TFTP server
Managed Switch Software
239
Rev. 1.0
Table 14-11 Backup Firmware through TFTP Fields
Web User Interface User Guide
14.3.2. Save Configuration
To display the Save Configuration web page, click Management > Configuration >
Save Configuration.
This page allow user to manage configuration file saved on DUT and click
“Restore Factory Default” button to restore factory defaults.
Figure 14-12 Save Configuration Page
Field Source File
Destination File
Description
Source file types Running Configuration: Copy running configuration file to
destination Startup Configuration: Copy startup configuration file to
destination Backup Configuration: Copy backup configuration file to
destination
Destination file Startup Configuration: Save file as startup configuration
Backup Configuration: Save file as backup configuration
Table 14-12 Save Configuration Fields
14.4. SNMP
14.4.1. View
To configure and display the SNMP view table, click Management > SNMP > View.
Managed Switch Software
240
Rev. 1.0
Web User Interface User Guide
Figure 14-13 SNMP View Table Page
Field View
Subtree OID View Type
Description The SNMP view name. Its maximum length is 30 characters.
Specify the ASN.1 subtree object identifier (OID) to be included or excluded
from the SNMP view. Include or exclude the selected MIBs in the view.
Table 14-13 SNMP View Fields
14.4.2. Group
To configure and display the SNMP group settings, click Management > SNMP >
Group.
Managed Switch Software
241
Rev. 1.0
Figure 14-14 SNMP Group Table Page
Web User Interface User Guide
Field Group Version
Security Level
Description
Specify SNMP group name, and the maximum length is 30 characters.
Spedify SNMP version SNMPv1: SNMP Version 1. SNMPv2: Community-based SNMP
Version 2c. SNMPv3: User security model SNMP version 3. Specify SNMP security
level No Security : Specify that no packet authentication is performed.
Authentication: Specify that no packet authentication without entryption is
performed. Authentication and Privacy: Specify that no packet authentication
with
entryption is performed.
View
Read Write Notify
Group read view name
Group write view name.
The view name that sends only traps with contents that is included in SNMP
view selected for notification.
Table 14-14 SNMP Group Table Fields
Managed Switch Software
242
Rev. 1.0
Web User Interface User Guide
Figure 14-15 SNMP Group Add Page
Field Group Version
Security Level
Description
Specify SNMP group name, and the maximum length is 30 characters.
Spedify SNMP version SNMPv1: SNMP Version 1. SNMPv2: Community-based SNMP
Version 2c. SNMPv3: User security model SNMP version 3. Specify SNMP security
level No Security : Specify that no packet authentication is performed.
Authentication: Specify that no packet authentication without entryption is
performed. Authentication and Privacy: Specify that no packet authentication
with
entryption is performed.
View
Read Write
Select read view name if Read is checked Select write view name, if Write is checked
Managed Switch Software
243
Rev. 1.0
Notify
Select notify view name, if Notify is checked
Table 14-15 SNMP Group Add Fields
Web User Interface User Guide
Figure 14-16 SNMP Group Edit Page
Field Group Version
Security Level
Description
Display the edit group name
Spedify SNMP version SNMPv1: SNMP Version 1. SNMPv2: Community-based SNMP
Version 2c. SNMPv3: User security model SNMP version 3. Specify SNMP security
level No Security : Specify that no packet authentication is performed.
Authentication: Specify that no packet authentication without entryption is
performed. Authentication and Privacy: Specify that no packet authentication
with
entryption is performed.
Managed Switch Software
244
Rev. 1.0
View
Read Write Notify
Select read view name if Read is checked Select write view name, if Write is
checked Select notify view name, if Notify is checked
Table 14-16 SNMP Group Edit Fields
Web User Interface User Guide
14.4.3. Community
To configure and display the SNMP community settings, click Management > SNMP
Community.
Figure 14-17 SNMP Community Table Page
Field
Description
Community The SNMP community name. Its maximum length is 20 characters.
Community Mode
Group Name
SNMP Community mode Basic: snmp community specifies view and access right.
Advanced: snmp community specifies group.
Specify the SNMP group configured by the command snmp group to define the
object available to the community.
View Name Specify the SNMP view to define the object available to the community.
Access Right
SNMP access mode Read-Only: Read only. Read-Wrtie: Read and write.
Table 14-17 SNMP Community Table Fields
Managed Switch Software
245
Rev. 1.0
Web User Interface User Guide
Field Community Type View Access Group
Figure 14-18 SNMP Community Add Page
Description The SNMP community name. Its maximum length is 20 characters.
SNMP Community mode Basic: SNMP community specifies view and access right.
Advanced: SNMP community specifies group.
Specify the SNMP view to define the object available to the community.
SNMP access mode Read-Only: Read only. Read-Write: Read and write. Specify the
SNMP group configured by user to define the object available to the community.
Table 14-18 SNMP Community Add Fields
Managed Switch Software
246
Rev. 1.0
Web User Interface User Guide
Figure 14-19 SNMP Community Edit Page
Field Community Type View Access Group
Description The Edit SNMP community name
SNMP Community mode Basic: SNMP community specifies view and access right.
Advanced: SNMP community specifies group.
Specify the SNMP view to define the object available to the community.
SNMP access mode Read-Only: Read only. Read-Write: Read and write. Specify the
SNMP group configured by user to define the object available to the community.
Table 14-19 SNMP Community Edit Fields
14.4.4. User
To configure and display the SNMP users, click Management > SNMP > User.
Managed Switch Software
247
Rev. 1.0
Web User Interface User Guide
Figure 14-20 SNMP User Table Page
Field User Group
Security Level
Authentication Method
Privacy Method
Description
Specify the SNMP user name on the host that connects to the SNMP agent. The
max character is 30 characters. For the SNMP v1 or v2c, the user name must
match the community name Specify the SNMP group to which the SNMP user
belongs.
SNMP privilege mode No Security : Specify that no packet authentication is
performed. Authentication: Specify that no packet authentication without
encryption is
performed. Authentication and Privacy: Specify that no packet authentication
with
encryption is performed. Authentication Protocol which is available when
Privilege Mode is Authentication or Authentication and Privacy. None: No
authentication required. MD5: Specify the HMAC-MD5-96 authentication protocol.
SHA: Specify the HMAC-SHA-96 authentication protocol. Encryption Protocol
None: No privacy required. DES: DES algorithm
Table 14-20 SNMP User Table Fields
Managed Switch Software
248
Rev. 1.0
Web User Interface User Guide
Figure 14-21 SNMP User Add Page
Field User Group
Security Level
Authentication Method
Description Specify the SNMP user name on the host that connects to the SNMP
agent. The max character is 30 characters. Specify the SNMP group to which the
SNMP user belongs.
SNMP privilege mode No Security : Specify that no packet authentication is
performed. Authentication: Specify that no packet authentication without
encryption is
performed. Authentication and Privacy: Specify that no packet authentication
with
encryption is performed.
Authentication Protocol which is available when Privilege Mode is
Authentication or Authentication and Privacy. None: No authentication
required.
Managed Switch Software
249
Rev. 1.0
Password Privacy Method
Password
Web User Interface User Guide
MD5: Specify the HMAC-MD5-96 authentication protocol. SHA: Specify the HMAC-
SHA-96 authentication protocol. The authentication password, The number of
character range is 8 to 32 characters.
Encryption Protocol None: No privacy required. DES: DES algorithm The privacy
password, The number of character range is 8 to 64 characters.
Table 14-21 SNMP User Add Fields
Figure 14-22 SNMP User Edit Page
Field User
Description Edit User name
Group
Specify the SNMP group to which the SNMP user belongs.
Security Level
SNMP privilege mode No Security : Specify that no packet authentication is performed.
Managed Switch Software
250
Rev. 1.0
Authentication Method Password
Web User Interface User Guide
Authentication: Specify that no packet authentication without encryption is
performed.
Authentication and Privacy: Specify that no packet authentication with
encryption is performed.
Authentication Protocol which is available when Privilege Mode is
Authentication or Authentication and Privacy. None: No authentication
required. MD5: Specify the HMAC-MD5-96 authentication protocol. SHA: Specify
the HMAC-SHA-96 authentication protocol.
The authentication password, The number of character range is 8 to 32
characters.
Privacy Method Password
Encryption Protocol None: No privacy required. DES: DES algorithm The privacy
password, The number of character range is 8 to 64 characters.
Table 14-22 SNMP User Edit Fields
14.4.5. Engine ID
To configure and display SNMP local and remote engine ID, click Management >
SNMP > Engine ID.
Managed Switch Software
251
Rev. 1.0
Web User Interface User Guide
Figure 14-23 SNMP Engine ID Page
Field
Description
Local Engine ID
Engine ID
If checked “User Defined”, the local engine ID is configure by user, else use the default Engine ID which is made up of MAC and Enterprise ID. The user defined engine ID is range 10 to 64 hexadecimal characters, and the hexadecimal number must be divided by 2.
Remote Engine ID Table
Server Address Remote host
Engine ID
Specify Remote SNMP engine ID. The engine ID is range10 to 64 hexadecimal
characters, and the hexadecimal number must be divided by 2.
Table 14-23 SNMP Engine ID Fields
Managed Switch Software
252
Rev. 1.0
Web User Interface User Guide
Figure 14-24 SNMP Remote Engine ID Add Page
Field Address Type Server Address Engine ID
Description Remote host address type for Hostname/IPv4/IPv6
Remote host
Specify Remote SNMP engine ID. The engine ID is range10 to 64 hexadecimal
characters, and the hexadecimal number must be divided by 2.
Table 14-24 SNMP Remote Engine ID Add Fields
Figure 14-25 SNMP Remote Engine ID Edit Page
Field Server Address Engine ID
Description Edit Remote host address
Specify Remote SNMP engine ID. The engine ID is range10 to 64 hexadecimal
characters, and the hexadecimal number must be divided by 2.
Managed Switch Software
253
Rev. 1.0
Table 14-25 SNMP Remote Engine ID Edit Fields
Web User Interface User Guide
14.4.6. Trap Event
To configure and display SNMP trap event, click Management > SNMP > Trap
Event.
Figure 14-26 SNMP Trap Event Page
Field Authentication Failure Link Up/Down Cold Start
Warm Start
Description SNMP authentication failure trap, when community not match or user
authentication password not match.
Port link up or down trap
Device reboot configure by user trap
Device reboot by power down trap
Table 14-26 SNMP Trap Event Fields
14.4.7. Notification
To configure the hosts to receive SNMPv1/v2/v3 notification, click Management
SNMP > Notification.
Managed Switch Software
254
Rev. 1.0
Web User Interface User Guide
Figure 14-27 SNMP Notification Table Page
Field
Description
Server Address IP address or the hostname of the SNMP trap recipients.
Server Port Recipients server UDP port number
Timeout
Specify the SNMP informs timeout
Retry
Specify the retry counter of the SNMP informs.
Version Type
Community/User
Specify SNMP notification version SNMPv1: SNMP Version 1 notification. SNMPv2: SNMP Version 2 notification. SNMPv3: SNMP Version 3 notification. Notification Type Trap: Send SNMP traps to the host. Inform: Send SNMP informs to the host. SNMP community/user name for notification. If version is SNMPv3 the name is user name, else is community name
UDP Port
Specify the UDP port number.
Timeout
Specify the SNMP informs timeout
Security Level
SNMP trap packet security level No Security: Specify that no packet
authentication is performed. Authentication: Specify that no packet
authentication without encryption is
performed. Authentication and Privacy: Specify that no packet authentication
with
Managed Switch Software
255
Rev. 1.0
encryption is performed.
Table 14-27 SNMP Notification Table Fields
Web User Interface User Guide
Figure 14-28 SNMP Notification Add Page
Field Address Type
Description Notify recipients host address type
Server Address Version Type
IP address or the hostname of the SNMP trap recipients.
Specify SNMP notification version SNMPv1: SNMP Version 1 notification. SNMPv2:
SNMP Version 2 notification. SNMPv3: SNMP Version 3 notification. Notification
Type Trap: Send SNMP traps to the host. Inform: Send SNMP informs to the
host.(version 1 have no inform)
Managed Switch Software
256
Rev. 1.0
Web User Interface User Guide
Community/User
Security Level
Server Port Timeout Retry
SNMP community/user name for notification. If version is SNMPv3 the name is
user name, else is community name
SNMP notification packet security level, the security level must less than or
equal to the community/user name No Security: Specify that no packet
authentication is performed. Authentication: Specify that no packet
authentication without encryption is
performed. Authentication and Privacy: Specify that no packet authentication
with
encryption is performed.
Recipients server UDP port number, if “use default” checked the value is 162,
else user configure
Specify the SNMP informs timeout, if “use default” checked the value is 15,
else user configure
Specify the SNMP informs retry count, if “use default” checked the value is 3,
else user configure
Table 14-28 SNMP Notification Add Fields
Field
Figure 14-29 SNMP Notification Edit Page
Description
Managed Switch Software
257
Rev. 1.0
Web User Interface User Guide
Server Address Edit SNMP notify recipients address.
Version Type
Community/User
Security Level
Server Port Timeout Retry
Specify SNMP notification version SNMPv1: SNMP Version 1 notification. SNMPv2:
SNMP Version 2 notification. SNMPv3: SNMP Version 3 notification.
Notification Type Trap: Send SNMP traps to the host. Inform: Send SNMP informs
to the host.(version 1 have no inform)
SNMP community/user name for notification. If version is SNMPv3 the name is
user name, else is community name
SNMP notification packet security level, the security level must less than or
equal to the community/user name No Security: Specify that no packet
authentication is performed. Authentication: Specify that no packet
authentication without encryption is
performed. Authentication and Privacy: Specify that no packet authentication
with
encryption is performed.
Recipients server UDP port number, if “use default” checked the value is 162,
else user configure
Specify the SNMP informs timeout, if “use default” checked the value is 15,
else user configure
Specify the SNMP informs retry count, if “use default” checked the value is 3,
else user configure
Table 14-29 SNMP Notification Edit Fields
14.5. RMON
14.5.1. Statistics
To display RMON Statistics, click Management > RMON > Statistics.
Managed Switch Software
258
Rev. 1.0
Web User Interface User Guide
Figure 14-30: RMON Statistics page.
Field Port
Bytes Received Drop Events
Description
The port for the RMON statistics. Number of octets received, including bad
packets and FCS octets, but excluding framing bits. Number of packets that
were dropped.
Managed Switch Software
259
Rev. 1.0
Web User Interface User Guide
Packets Received
Number of packets received, including bad packets, Multicast packets, and Broadcast packets.
Broadcast Packets
Number of good Broadcast packets received. This number does not include Multicast packets.
Multicast Packets
Number of good Multicast packets received.
CRC & Align Errors
Number of CRC and Align errors that have occurred.
Undersize Packages
Number of undersized packets (less than 64 octets) received.
Oversize Packages Fragments
Jabbers
Collision Frames of 64
Bytes
Number of oversized packets (over 1518 octets) received.
Number of fragments (packets with less than 64 octets, excluding framing bits,
but including FCS octets) received. Number of received packets that were
longer than 1632 octets. This number excludes frame bits, but includes FCS
octets that had either a bad FCS (Frame Check Sequence) with an integral
number of octets (FCS Error) or a bad FCS with a non-integral octet (Alignment
Error) number. A Jabber packet is defined as an Ethernet frame that satisfies
the following criteria: Packet data length is greater than MRU. Packet has an
invalid CRC. RX error event has not been detected. Number of collisions
received. If Jumbo Frames are enabled, the threshold of Jabber Frames is
raised to the maximum size of Jumbo Frames.
Number of frames, containing 64 bytes that were received.
Frames of 65 to 127 Bytes
Number of frames, containing 65 to 127 bytes that were received.
Frames of 128 to 255 Bytes
Number of frames, containing 128 to 255 bytes that were received.
Frames of 256 to 511 Bytes
Number of frames, containing 256 to 511 bytes that were received.
Frames of 512 to Number of frames, containing 512 to 1023 bytes that were received.
Managed Switch Software
260
Rev. 1.0
Web User Interface User Guide
1024 Bytes
FramesGreater than 1024 Bytes
Number of frames, containing 1024 to 1518 bytes that were received.
Clear
Clear the statistics for the selected ports
View
View the statistics on the specified port.
Table 14-30: RMON Statistics fields.
Figure 14-31: View RMON Statistics page.
Managed Switch Software
261
Rev. 1.0
14.5.2. History
For the RMON history, click Management > RMON > History.
Web User Interface User Guide
Figure 14-32: RMON History page.
Field
Description
Port
The port for the RMON history.
Interval
The number of seconds for each sample.
Owner
The owner name of event (0~31 characters).
Sample Maximum
The maximum number of buckets.
Sample Current The current number of buckets.
Table 14-31: RMON History fields.
Field
Description
Add
Add the new RMON history entries
Edit
Edit the RMON history
Delete
Delete the RMON histories.
View
View the history log.
Table 14-32: RMON History buttons.
Managed Switch Software
262
Rev. 1.0
Web User Interface User Guide
Figure 14-33: RMON History Add page.
Field Port
Max Sample Interval Owner
Description Specify port for the RMON history. Specify the maximum number of
buckets. Specify the number of seconds for each sample. Specify the owner name
of event (0~31 characters).
Table 14-33: RMON History Add fields.
Figure 14-34: RMON History Edit page
Managed Switch Software
263
Rev. 1.0
Field Port
Max Sample Interval Owner
Description Specify port for the RMON history. Specify the maximum number of
buckets. Specify the number of seconds for each sample. Specify the owner name
of event (0~31 characters).
Table 14-34: RMON History Edit fields.
Web User Interface User Guide
Figure 14-35: RMON History Log page.
Field
Description
Port Bytes Received
Drop Events
The port for the RMON statistics.
Number of octets received, including bad packets and FCS octets, but excluding
framing bits.
Number of packets that were dropped.
Packets Received
Number of packets received, including bad packets, Multicast packets, and Broadcast packets.
Broadcast Packets
Number of good Broadcast packets received. This number does not include Multicast packets.
Managed Switch Software
264
Rev. 1.0
Multicast Packets CRC & Align Errors Undersize Packages Oversize Packages
Fragments
Jabbers
Collision Utilization
Web User Interface User Guide
Number of good Multicast packets received.
Number of CRC and Align errors that have occurred.
Number of undersized packets (less than 64 octets) received.
Number of oversized packets (over 1518 octets) received.
Number of fragments (packets with less than 64 octets, excluding framing bits,
but including FCS octets) received. Number of received packets that were
longer than 1632 octets. This number excludes frame bits, but includes FCS
octets that had either a bad FCS (Frame Check Sequence) with an integral
number of octets (FCS Error) or a bad FCS with a non-integral octet (Alignment
Error) number. A Jabber packet is defined as an Ethernet frame that satisfies
the following criteria: Packet data length is greater than MRU. Packet has an
invalid CRC. RX error event has not been detected. Number of collisions
received. If Jumbo Frames are enabled, the threshold of Jabber Frames is
raised to the maximum size of Jumbo Frames. Percentage of current interface
traffic compared to the maximum traffic that the interface can handle.
Table 14-35: RMON History Log fields.
14.5.3. Event
For the RMON event, click Management > RMON > Event.
Managed Switch Software
265
Rev. 1.0
Web User Interface User Guide
Field Community Description
Notification
Time Owner
Figure 14-36: RMON Event page.
Description The SNMP community when the notification type is specified as
trap. The description for the event. The notification type for the event, and
the possible value are: None: Nothing for notification. Event Log: Logging the
event in the RMON Event Log table. Trap: Send a SNMP trap. Event Log and Trap:
Logging the event and send the SNMP trap. The time that the event was
triggered. The owner for the event.
Table 14-36: RMON Event fields.
Managed Switch Software
266
Rev. 1.0
Web User Interface User Guide
Field Community Description
Notification
Owner
Figure 14-37: RMON Event Add page.
Description Specify the SNMP community when the notification type is specified
as “Trap” pr “Event Log and Trap”. Specify the description for the event.
Specify the notification type for the event, and the possible value are: None:
Nothing for notification. Event Log: Logging the event in the RMON Event Log
table. Trap: Send a SNMP trap. Event Log and Trap: Logging the event and send
the SNMP trap. Specify owner for the event.
Table 14-37: RMON Event Add fields.
Managed Switch Software
267
Rev. 1.0
Web User Interface User Guide
Field Community Description
Notification
Owner
Figure 14-38: RMON Event Edit page.
Description Specify the SNMP community when the notification type is specified
as “Trap” pr “Event Log and Trap”. Specify the description for the event.
Specify the notification type for the event, and the possible value are: None:
Nothing for notification. Event Log: Logging the event in the RMON Event Log
table. Trap: Send a SNMP trap. Event Log and Trap: Logging the event and send
the SNMP trap. Specify owner for the event.
Table 14-38: RMON Event Edit fields.
Managed Switch Software
Figure 14-39: RMON Event Log page. 268
Rev. 1.0
Field Log ID Time
Description
Description The log identifier. The time that the event was triggered. The
description for the event.
Table 14-39: RMON Event Log fields.
14.5.4. Alarm
For the RMON Alarm, click Management > RMON > Alarm.
Web User Interface User Guide
Figure 14-40: RMON Alarm page.
Field
Description
Port
The port configuration for the RMON alarm.
Counter
The counter for sampling DropEvents (Drop Event): Total number of events
received in which the
packets were dropped. Octes (Received Bytes): Octets. Pkts (Received Packets):
Number of packets. BroadcastPkts (Broadcast Packets Received): Broadcast
packets. MulticastPkts (Multicast Packets Received): Multicast packets.
CRCAlignError (CRC and Align Error): CRC alignment error. UndersizePkts
(Undersize Packets): Number of undersized packets.
Managed Switch Software
269
Rev. 1.0
Web User Interface User Guide
Sampling Interval
OversizePkts (Oversize Packets): Number of oversized packets. Fragments
(Fragments): Total number of packet fragment. Jabbers (Jabbers): Total number
of packet jabber. Collisions (Collisions): Collision. Pkts64Octetes (Frames of
64 Bytes): Number of packets size 64 octets. Pkts65to127Octetes (Frames of 65
to 127 Bytes): Number of packets size 65
to 127 octets. Pkts128to255Octetes (Frames of 128 to 255 Bytes): Number of
packets size
128 to 255 octets. Pkts256to511Octetes (Frames of 256 to 511 Bytes): Number of
packets size
256 to 511 octets. Pkts512to1023Octetes (Frames of 512 to 1023 Bytes): Number
of packets size
512 to 1023 octets. Pkts1024to1518Octets (Frames Greater than 1024 Bytes):
Number of packets
size 1024 to 1518 octets.
The sampling type including: Absolute: The selected variable value is compared
directly with the
thresholds at the end of the sampling interval. Delta: The selected variable
value of the last sample is subtracted from the
current value and the difference is compared with the thresholds.
The number of seconds for each sample.
Owner
The owner for the alarm entry.
Trigger
The type of event triggering.
Rising Threshold The threshold for firing rising event.
Rising Event The rising event when alarm was fired.
Falling Threshold The threshold for firing falling event.
Falling Event The falling event when alarm was fired.
Table 14-40: RMON Alarm fields.
Managed Switch Software
270
Rev. 1.0
Web User Interface User Guide
Field Port
Counter
Figure 14-41: RMON Alarm Add page.
Description
Specify the port for sampling Specify the counter for sampling Drop Event:
Total number of events received in which the packets were
dropped. Received Bytes (Octets): Octets. Received Packets: Number of packets.
Broadcast Packets Received: Broadcast packets. Multicast Packets Received:
Multicast packets. CRC and Align Error: CRC alignment error. Undersize
Packets: Number of undersized packets. Oversize Packets: Number of oversized
packets.
Managed Switch Software
271
Rev. 1.0
Web User Interface User Guide
Sampling Interval
Fragments: Total number of packet fragment. Jabbers: Total number of packet
jabber. Collisions: Collision. Frames of 64 Bytes: Number of packets size 64
octets. Frames of 65 to 127 Bytes: Number of packets size 65 to 127 octets.
Frames of 128 to 255 Bytes: Number of packets size 128 to 255 octets. Frames
of 256 to 511 Bytes: Number of packets size 256 to 511 octets. Frames of 512
to 1023 Bytes: Number of packets size 512 to 1023 octets. Frames Greater than
1024 Bytes: Number of packets size 1024 to 1518 octets. Specify the sampling
type. Absolute: The selected variable value is compared directly with the
thresholds at the end of the sampling interval. Delta: The selected variable
value of the last sample is subtracted from the
current value and the difference is compared with the thresholds.
Specify the sampling interval.
Owner
Specify the owner for the sampling.
Trigger
Specify the type for the alarm trigger.
Rising Threshold Specify the threshold for firing rising event.
Rising Event Specify the index of rising event when alarm was fired.
Falling Threshold Specify the threshold for firing falling event.
Falling Event Specify the index of falling event when alarm was fired.
Table 14-41: RMON Alarm Add fields.
Managed Switch Software
272
Rev. 1.0
Web User Interface User Guide
Field Port
Counter
Figure 14-42: RMON Alarm Edit page.
Description
Specify the port for sampling Specify the counter for sampling Drop Event:
Total number of events received in which the packets were
dropped. Received Bytes (Octets): Octets. Received Packets: Number of packets.
Broadcast Packets Received: Broadcast packets. Multicast Packets Received:
Multicast packets. CRC and Align Error: CRC alignment error. Undersize
Packets: Number of undersized packets. Oversize Packets: Number of oversized
packets.
Managed Switch Software
273
Rev. 1.0
Web User Interface User Guide
Sampling Interval
Fragments: Total number of packet fragment. Jabbers: Total number of packet
jabber. Collisions: Collision. Frames of 64 Bytes: Number of packets size 64
octets. Frames of 65 to 127 Bytes: Number of packets size 65 to 127 octets.
Frames of 128 to 255 Bytes: Number of packets size 128 to 255 octets. Frames
of 256 to 511 Bytes: Number of packets size 256 to 511 octets. Frames of 512
to 1023 Bytes: Number of packets size 512 to 1023 octets. Frames Greater than
1024 Bytes: Number of packets size 1024 to 1518 octets. Specify the sampling
type. Absolute: The selected variable value is compared directly with the
thresholds
at the end of the sampling interval. Delta: The selected variable value of the
last sample is subtracted from the
current value and the difference is compared with the thresholds.
Specify the sampling interval.
Owner
Specify the owner for the sampling.
Trigger
Specify the type for the alarm trigger.
Rising Threshold Specify the threshold for firing rising event.
Rising Event Specify the index of rising event when alarm was fired.
Falling Threshold Specify the threshold for firing falling event.
Falling Event Specify the index of falling event when alarm was fired.
Table 14-42: RMON Alarm Edit fields.
Managed Switch Software
274
Rev. 1.0
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>