Araknis Networks 920 Series Managed Switch User Guide
- June 11, 2024
- araknis NETWORKS
Table of Contents
- Araknis Networks 920 Series Managed Switch
- Specifications
- Product Usage Instructions
- FAQs
- Series overview
- Install the modules
- Connections
- configuration
- Advanced System
- Switching
- Spanning Tree Protocol
- Unregistered Multicast Behavior
- IP Multicast
- References
- Read User Manual Online (PDF format)
- Download This Manual (PDF format)
Araknis Networks 920 Series Managed Switch
Specifications
- Model: AN-920-SW-F-12-POE, AN-920-SW-F-24-POE
- Ethernet ports: 12 or 24
- Total possible QSFP28 ports: 1 with QSFP28 module (12 ports) or 2 with QSFP28 modules (24 ports)
- Total possible PoE budget (Watts):
- AN-920-SW-F-12-POE: 750 with 1 power module, 1080 with 2 power modules
- AN-920-SW-F-24-POE: 750 with 1 power module, 1650 with 2 power modules
Product Usage Instructions
1. Unboxing:
The package contains:
- Switch
- Rubber feet for flat surfaces (4)
- Rack mount kit: ears (2), screws (8)
- Quick Start QR card
- AC power cord
- Power module
2. Install the Modules:
Caution: The switch must be powered off when installing QSFP28 modules.
Note: To remove the power module, push the tab toward the handle and pull the module straight back.
3. Installing the Switch:
Caution: To avoid possible interference or damage, do not stack equipment on top of the switch.
Rack Mounting Guidelines:
- Ensure proper airflow through the rack.
- Adjust leveling feet or casters to make contact with the supporting surface.
- Load heavier equipment at the bottom of the rack.
- Ground the rack and ensure surge protection for equipment.
4. Connections:
Caution: All router and switch connections should be on network ports, not the management port.
5. PoE Budgeting:
Total PoE device consumption = 47
6. LED States:
RJ45 Ports:
- LED 10G/PoE Link/Act:
- Blinking: The port is negotiated at 10 Gbps and/or providing PoE*
- Off: The port is not negotiated at 10 Gbps and/or providing PoE*
- Blinking: Packets are flowing through the port
- Off: The port does not detect connection or is disabled
*Configurable in the web interface
7. QSFP28 Module LEDs:
- LED 100G: Blinking – The port is negotiating at 100 Gbps and passing traffic, Off – The port does not detect a connection or is disabled
- LED 50/25G: Blinking – The port is negotiating at 50-25 Gbps and passing traffic, Off – The port does not detect a connection or is disabled
8. Configuration:
Araknis switches can be configured through OvrC or the local interface. The
local interface is accessible using OvrC’s
WebConnect feature, typing the switch’s DHCP address into your browser’s
address bar, or using the switch’s default IP address.
FAQs
- Q: How do I access the switch’s local interface?
- A: You can access the local interface by using OvrC’s WebConnect feature, typing the switch’s DHCP address into your browser’s address bar, or using the switch’s default IP address.
- Q: Can I stack equipment on top of the switch?
- A: To avoid possible interference or damage, do not stack equipment on top of the switch.
“`
AN-920-SW
920 Series Managed Switch Quick Start Guide
Welcome to Araknis NetworksTM
Thank you for choosing an Araknis 920 series managed switch. With multi-
gigabit connectivity on all network ports, updated modern aesthetics, and a
managed interface, the Araknis 920 series switch is a sleek and highly capable
addition to any network.
Series overview
Each 920 series switch comes with a power module in the box. QSFP28 and additional power modules are sold separately.
Model AN-920-SW-F-12-POE AN-920-SW-F-24-POE
Ethernet ports
Total possible QSFP28 ports
1 with QSFP28
12
module
(sold separately)
2 with QSFP28
24
modules
(sold separately)
Total possible PoE budget (Watts) 750 with 1 power module
1080 with 2 power modules 750 with 1 power module
1650 with 2 power modules
1
Unboxing
The package contains:
Switch
Rubber feet for flat surfaces (4)
Rack mount kit: ears (2), screws
(8)
Quick Start QR card
AC power cord
Power module
2
Install the modules
Caution: -.The switch must be powered off when installing QSFP28 modules.
Power module
QSFP28 module
Note: -__.To remove the power module, push the tab toward the handle and pull
the module straight back.
Caution: -.Do not use a Y power cable. Sometimes called a Y splitter cable.
Pro Tip: -_Connect each power module to separate circuits in the same phase.
Use a
separate UPS for each power cable.
3
Installing the switch
Rack mount
Shelf mount
Caution: -.To avoid possible interference or damage, do not stack equipment on
top of the switch.
Rack mounting guidelines
l The maximum ambient temperature of the space the switch is installed in
should not exceed 122°F/50°C.
l There should be air flowing through the rack. l Make sure all the leveling
feet or casters are adjusted correctly and they come in
contact with the supporting surface. Always load heavier equipment at the
bottom of the rack. l Make sure the rack is grounded and the equipment is
surge protected.
4
l Do not overload the power equipment or the switch. Read our WattBox Best
Practices for more information.
5
Connections
Caution: -.All router and switch connections should be on network ports. Not
the management port.
QSFP28 ports
The QSFP28 (Quad Small Form-Factor Pluggable Plus) ports support up to a
100Gbps connection and are typically used to connect switches.
6
PoE Budgeting
Total PoE device consumption = 47
Model AN-920-SW-R-12-POE AN-920-SW-R-24-POE
Total PoE budget (Watts)
750 with 1 power module 1080 with 2 power modules 750 with 1 power module 1650
with 2 power modules
Remaining PoE budget (Watts) 703 1033 703 1603
7
LED States
RJ45 ports
LED 10G/PoE Link/Act
LED state Blinking Off Blinking Off
Description The port is negotiated at 10 Gbps and/or providing PoE The port is not negotiated at 10 Gbps and/or providing PoE Packets are flowing through the port The port does not detect connection or the port is disabled
*Configurable in the web interface
8
QSFP28 module LEDs
LED 100G 50/25G
LED state Blinking Off
Blinking
Off
Description
The port is negotiating at 100 Gbps and passing traffic The port does not
detect a connection or is disabled The port is negotiating at 50-25 Gbps and
passing traffic The port does not detect a connection or is disabled
9
Configuration
Araknis switches can be configured through OvrC or the local interface. The
local interface is accessible using OvrC’s WebConnect feature, typing the
switch’s DHCP address into your browser’s address bar, or using the switch’s
default IP address.
Note: -__.Only features in the local UI are supported by Snap One.
Configuring the switch in OvrC
OvrC provides Wi-Fi management, remote device management, real-time
notifications, and intuitive customer management, using your computer or
mobile device. Setup is plug-and-play, with no port forwarding or DDNS address
required.
To add this device to your OvrC account: 1. Connect the switch to the
internet. 2. Log into OvrC (www.ovrc.com). 3. Scan the site using an OvrC Pro
device or add the switch manually by entering the MAC address and Service Tag.
Logging in to the local interface
Log into the switch using the default credentials. You must update the credentials after initial login.
Username Password
araknis araknis
10
Other access methods: DHCP IP address
The switch is configured to DHCP by default so that the DHCP server can assign
an IP address when the switch is connected to the network (the DHCP server is
usually the router). This address can be used for accessing the web interface.
Use one of these methods to find the IP address of the switch:
l Check the device list in OvrC. l Check the client table on your router. l
Use a network scanner (e.g. Fing) to scan the network. The
Araknis switch manufacturer field displays SnapAV. See the highlighted field
in the Fing screenshot to the right for an example of an Araknis device being
identified.
11
Accessing the switch using the default IP Address
If the switch is not given an IP address on the network or needs to be
accessed while not connected to a network, you can configure your computer’s
network connection to access the switch using the default IP address,
192.168.20.254, while connected to the MGMT port.
Note: -__.You must connect your computer to the MGMT port to connect to the
switch using its default IP address.
12
1. Connect your PC to the switch using an Ethernet cable.
2. Open the Control Panel and click Network and Internet. 13
3. Click Network and Sharing Center. 4. Click Change adapter settings. 14
5. Right-click the icon for the wired network connection, then left-click
Properties.
6. Select Internet Protocol Version 4 (TCP/IPv4), then click Properties. 15
7. In the General tab, click Use the following IP address: and enter the IP address and subnet mask, then click OK.
IP Address Subnet Mask
192.168.20.253 255.255.255.252
16
8. Open a browser and navigate to https://192.168.20.254/. Log in using the default credentials:
Username Password
araknis araknis
9. After configuring the switch, set your computer’s IPv4 Properties back to Obtain an IP address automatically, then click OK.
17
18
Reset Procedures
The reset button is on the front of the switch.
Reset button action Hold for 1-9 seconds Hold for 10-19 seconds
Hold for more than 20 seconds
Front LED State Blinking slowly
Blinking moderately
Blinking rapdily
Description
Restarts the switch Resets the login credentails to defaults Resets the switch
to factory defaults
Status
System
This page provides an overview of the switch’s configuration.
19
Field descriptions: l System Name — This is the name that the switch appears
under when it is identified on the network. This field can be changed under
Settings > System. l Model Number — Use this field to verify the switch’s
model number. Notated as AN (Araknis) SW (switch) R/F (rear or front-
facing ports) X (the number of RJ-45 ports the switch has) -POE (Power-over-
Ethernet). l Service Tag — A unique identifying number that is used to add the
switch to OvrC, manually. l Firmware Version — Displays the firmware version
installed on the switch. Use OvrC to verify if the switch is up to date and
update the switch if it isn’t. l MAC Address — A unique identifier that
appears in network scans. This address is required if the switch is being
manually added to OvrC. l Device IP Address — Displays the IP address of the
switch. l Gateway — Displays the IP address of the router. l Active Interface
— The number of ports that detect a connection compared to the total number of
ports on the switch.
20
l PoE Budget — The amount of Power-over-Ethernet being currently used on the
switch.
Pro Tip: -_Do not use more than 80% of the total budget. When calculating the
budget, use the total possible amount of power the connected devices may draw.
l Chassis Fans — Shows the rotations per minute (RPM) of the fan and gauge how
high the use of the fans is, in parenthesis. Low, Medium, High, Max, or OTP
(Over Temperature Protection). The switch stays in OTP until the system
temperature falls within the normal range.
l VLANs in Database — Displays the number of VLANs that are configured on the
switch.
l STP — Provides details about the Spanning Tree Protocol (STP) configuration
on the switch. See Switching > Spanning Tree Protocol for more information.
l IGMP — Provides details about the Internet Group Management Protocol (IGMP)
configuration on the switch. See Switching > IGMP Snooping for more
information.
l L3 Interfaces — Displays the DHCP servers the switch is interacting with.
21
Ports
This page provides information about specific switchport configurations.
Refresh the page to update the page.
l Interface — The number assigned to the port of the switch. The SFP ports are
always the last two ports.
l Name — The assignable name for the port. Edit the name at Settings > Ports >
General.
l Link Status — Displays the connection speed between the switch and the
connected device. If there is no connection status is “down.”
l IP Address (LLDP) — The IP address of the connected device, learned using
LLDP. l MAC Address — The MAC address of the device connected to the port. l
Up Time (D:H:M) — The amount of time the switch has detected a connection to
the device in Days:Hours:Minutes. l PoE — The amount of PoE power the switch
is delivering to the connected device. l VLAN — The VLAN ID assigned to the
port.
22
l TX/s — The number of bytes, in seconds, being transmitted on the port. l
RX/s — The number of bytes, in seconds, being received on the port.
Settings
System
Use this page to update the general configuration of the switch. Below are the
configurable settings and best practices. Click the Apply button at the top of
the page to save changes. Edit Password
Pro Tip: -_Strong passwords are long and unrelated to the client’s public
details. For example, thepepperonipizzas is stronger and easier to remember
than P@ssword or thesmiths.
Edit Username
23
There is only one configurable user for switch access. The username should be
unique and standardized across all devices. General Device Information
l Friendly Name — Give a name that makes the switch easily identifiable. Such
as “Core Switch – Rack.”
l Device Location — Enter where the switch is located. l System Name — This is
the name that the switch appears under during network
scans by other applications. This name should be unique to the switch. l
Device Notes — Enter additional configuration notes that wouldn’t be displayed
on
the Status > System page. Such as what a VLAN is being used for on this
switch. Pro Tip: -_If you’re using OvrC, these notes should be entered there
as well. LEDs
This setting determines the behavior of the 10G/PoE LED on the front of the
switch. Options include: 24
l Max Speed — Illuminates if the connection to the device is at the maximum
possible speed.
l PoE — Illuminates if the switch is providing power to the connected device.
l Disabled — Turns the LED off. Pro Tip: -_The LED Behavior should be
standardized across all switch installations. Be
sure to leave notes about the LED Behavior If it’s not standardized. Adjust
Time Zone
Configure the Time Zone that the switch is physically installed under. LAN
Pro Tip: -_Leave the switch as DHCP and make a MAC or IP reservation in the
router. Use the Mode drop-down to set the switch to a Static IP address.
25
Service Port These settings allow you to change the IP address of the 920
switch’s Service Port. Use the Service Port to access the switch’s local user
interface if you can no longer reach it from the LAN.
The default settings are: l IP Address — 192.168.20.254 l Subnet Mask —
255.255.255.252 l Gateway — 0.0.0.0 Pro Tip: -_If you change these settings
make sure you notate them in a secure and easy-to-remember location. Like OvrC
Notes.
Ports
Port Summary Use this page to quickly edit port settings. Note: -__.EEE
(Energy Efficient Ethernet) is turned off by default and cannot be turned on
via local UI.
26
Click the Enable toggle to enable or disable a port. Use the Options ( )
button to select multiple ports for configuration or the Action button to edit
an individual port. Configurable settings appear in the Edit Port
Configuration window.
Click the Apply button at the top of the page to save changes. Configurable
settings include:
27
l Enable — Toggle to allow traffic to pass through the port. Disable the port
to prevent someone from plugging additional devices into the switch or to
troubleshoot potential issues with a connected device.
l Name — Enter an easily identifiable name for the device connected to the
port. l Physical Mode — Configure the port speed and duplex mode.
l Auto Negotiate — Advertises the duplex mode and speed for an autonegotiation
process with the device connected to the port. Click the “x” on the speed and
duplex modes you do not want the switch to advertise.
l Speed — Select speed to force the port to 100 Mbps half or full duplex. l
STP Mode — Toggle to enable or disable STP on the port. l LACP Mode — Toggle
to enable or disable LACP on the port. l LACP Interface Mode — Configures the
interface action when LACP is enabled and
the interface is added to a Link Aggregation Group (LAG). l Active — The
interface always attempts to negotiate an LACP connection by sending the
LACPDU frames. l Passive — The interface waits to see a LACPDU frame.
l Link Trap — Toggle to enable or disable the port from broadcasting if it has
a connection or not.
l MTU (Maximum Transmission Unit) — Enter the value for the largest possible
packet size, in bytes, that a port can transmit.
l Broadcast Storm Recovery Level — Enable to limit the amount of broadcast
frames accepted and forwarded by the port by percentage, BPS (bits per
second), or PPS (packets per second).
l Multicast Storm Recovery Level — Enable to limit the amount of multicast
frames accepted and forwarded by the port by percentage, BPS (bits per
second), or PPS (packets per second).
28
l Unicast Storm Recovery Level — Enable to limit the amount of unicast frames
accepted and forwarded by the switch by percentage, BPS (bits per second), or
PPS (packets per second).
Port Details Use this page to quickly view port information such as Physical
Address, Port List Bit Offset, and the Interface Index. Use the Options ( )
button to refresh the page.
Note: -.The physical address is the MAC address for the individual port.
Mirror
Use port mirroring to mimic the traffic flowing through one port to another.
Port mirroring is typically used to capture a recording of network traffic for
troubleshooting purposes. To configure port mirroring: 1. Select a Session ID.
You cannot have multiple sessions with the same ID. If you
have no current port mirroring sessions, use Session ID 1. Note: -.You do
not have to click Enable. This toggle is automatically enabled after
you save the session settings.
29
2. Select a Destination Type. This is typically Interface. 3. Enter the Port
number to receive transmit/receive data from the Source Ports. For
example, if port 3 has a PC running Wireshark for packet capture, enter 3 in
the Port field.
4. Click the Options ( ) button and select Add to select the port(s) you want
to mirror.
5. In the new window, select Interface as the Type. 6. Use the Available
Source Port(s) dropdown to select the port(s) to mirror.
30
7. For Direction, select whether you want to mirror the packets being
received (Rx), transmitted (Tx), or both (Tx/Rx), then click Add.
8. Click Apply at the top of the page. After the page refreshes Enable will
be toggled on.
To disable a port mirroring session: Select the Session ID you wish to end and
click the Clear Session checkbox. Then click Apply at the top of the page.
31
Mirror Summary Use this page to view configured port mirroring sessions. Use
the Options ( ) button to refresh the page.
Link Aggregation Use Link Aggregation Groups (LAG) to combine the throughput
of multiple ports. To configure a LAG:
1. Click the Options ( ) button to select multiple LAGs or use the Action
button to configure a single LAG.
2. Verify Enabled is toggled on. 3. Enable or disable STP based on the
networking needs. 4. Select a Link Aggregation Type. LACP is recommended. l
LACP (Link Aggregation Control Protocol) broadcasts that the connection type
is a
LAG to the switch you’re connecting to for automatic configuration. l
Manualrequires manual LAG configuration on the switch you’re connecting to.
32
5. Enable or disable Link Trap based on the network’s needs. 6. Leave Load
Balance at the default (Source/Destination MAC, VLAN, Incoming Port),
unless you have specific requirements. Note: -__.The selections are the
information the switch uses to determine how to load
balance the throughput of the LAG.
7. Adjust the members of the port channel (ports 3 and 4 used in the
example). Use the checkboxes to select a port and the directional arrows to
add/remove ports.
33
8. Click Save to close the window, then Apply.
Link Aggregation Statistics Use this page to view information about configured
LAGs. Use the Options ( ) button to refresh the page.
34
VLANs
Database Use this page to add and view VLANs that have been configured on the
switch, and to enable or disable Remote Switched Port Analyzer (RSPAN). Note:
-.VLANs must still be applied to ports on the VLANs >Switchport
Configuration page. RSPAN allows you to mirror traffic from multiple source
ports (or from all ports that are members of a VLAN) from different network
devices and send the mirrored traffic to a destination port (a probe port
connected to a network analyzer) on a remote device. The mirrored traffic is
tagged with the RSPAN VLAN ID and transmitted over trunk ports in the RSPAN
VLAN.
You can use the RSPAN toggle to enable or disable the feature or use the
Options button to select multiple VLANs to enable RSPAN on. Use the Actions (
) button to select an individual VLAN and give it a meaningful Name. Use the
Options ( ) button to add a new VLAND ID to the switch.
Note: -.Configure the VLAN in the router before configuring the VLAN in the
switch.
35
To add a VLAN(s) to the switch: 1. Click the Options ( ) button, then click
Add. 2. Enter the VLAN ID, within the range of 2-4093. Use “-” between numbers
to indicate
a range. Use “,” to enter multiple VLAN IDs not adjacent to each other. 3. You
can a meaningful Name for the VLAN or leave the field blank. 4. Append and/or
Add Zeros in front of the VLAN ID. This allows the switch to quickly
create identifiers if you’re adding multiple VLANs at once. l Append VLAN ID –
Checking this appends the VLAN ID after the name. For
example, VLAN -> VLAN2. l Add Zero in Front of ID – Checking this adds zeroes
in front of the VLAN ID, up to a
total of 4 digits. For example, VLAN2 -> VLAN0002, VLAN123 -> VLAN0123. This
only works when Append VLAN ID is selected. 5. Enable RSPAN, if desired. 6.
Click Add, then Apply at the top of the page.
36
Switchport Configuration Use this page to quickly view and configure VLANs on
specific ports. Use the Options ( ) button to modify multiple ports at once,
or the Action button to edit a specific port. Note: -__.VLAN IDs must be
configured on the VLANs > Database page.
37
configuration
Simple configuration
To quickly configure a port(s) for VLANs, set the Switchport Mode to Trunk or
Access. Selecting Trunk automatically allows all the VLAN IDs configured in
the switch to pass through the port. Connections to other switches are
typically trunk ports.
Selecting Access requires you to select a single VLAN ID as the Access VLAN
(Untagged). This means that only packets tagged with the selected VLAN ID can
pass through this switchport.
38
Complex configuration
If the port must pass multiple VLANs but not all, select General as the
switchport mode. Configurable settings include:
l Port VLAN ID (PVID) — Select the VLAN ID assigned to untagged, or priority
tagged frames received on this port.
l Acceptable Frame Type — Tell the port how to handle traffic with tagged
frames. All tagged VLAN frames are forwarded in accordance with the IEEE
802.1Q VLAN standard. Options include: l Admit All — The port accepts priority
tagged and untagged frames and assigns them the value of the PVID assigned to
the interface. l Only Tagged — The port discards any untagged or priority
tagged frames it receives. l Only Untagged — The port discards any tagged
frames it receives.
39
l Ingress Filtering — Enable to discard tagged frames that aren’t members of
the VLAN ID assigned to the port. Leave this feature disabled to accept all
tagged frames.
l Untagged VLANs — Enter a VLAN ID in the range 1 to 4093. Use ‘-‘ to specify
a range and ‘,’ to separate VLAN IDs or VLAN ranges in the list.
l Tagged VLANs — Enter a VLAN ID in the range 1 to 4093. Use ‘-‘ to specify a
range and ‘,’ to separate VLAN IDs or VLAN ranges in the list.
l Priority — The default 802.1p priority assigned to untagged packets arriving
at the interface. 802.1p is a Quality of Service (QoS) value used to
differentiate traffic.
MAC Based VLAN Use this page to bind traffic from a MAC address to a VLAN ID.
To configure a MAC based VLAN:
40
1. Click the Options ( ) button, then Add. 2. Enter the MAC address you wish
to bind to a VLAN ID, then select the VLAN ID to
bind it to. Click Add.
3. The MAC Based VLAN appears at the bottom of the page.
Reset Click the Reset button to reset all the VLAN settings on the switch.
PoE
Port Configuration Use this page to quickly enable, disable, or restart PoE on
ports and view the PoE configuration on each port. 41
Use the Options ( ) button to select multiple ports for configuration or the
Action button to edit an individual port.
Configurable settings include: l Enable — Toggle to enable/disable PoE on the
port. l Priority — Set a priority level for PoE power allocation. Higher
priority levels should be reserved for devices that are critical for the
system to operate, such as access points. l Power Mode — Set the PoE power
standard for the port. Selecting a PoE class supports the PoE+ power standard,
which provides up to 90W of power. Legacy supports 12.95W 30W of power.
Supported power modes include: l bt90W (default) l bt60W l at30W l af15W l
Legacy l Power Limit Type — Select the type of power limiting for the port.
Options include: l Class (default) — Follows the negotiated PoE class
limitations. l User — Follows the Power Limit (Watts) setting. l None — No
power limit. l Power Limit (Watts) — Enter the maximum amount of watts that
the port can support. This field only works when the Power Limit Type is set
to User.
42
l Detection Type– Select a detection protocol for the port to use. Options
include: l 4Pt-Dot3af (default) l 4Pt-Dot3af+Legacy l Legacy
l Timer Schedule –The only option is None. l Delay Time (secs) — The amount of
time (in seconds) before power is applied to
the port after the switch starts up. General
Use this page to configure global PoE settings for the switch. The top of the
page displays PoE totals.
Configurable features include: 43
l System Usage Threshold — Enter the total percentage of the switch’s usable
PoE budget. For example, setting the threshold to 90% means that only 90% of
the switch’s total PoE budget can be used. This prevents the switch from being
overloaded.
l Power Management Mode — Select the method that the switch determines PoE. By
default, the switch decides PoE power dynamically, but you can set it to
static. Doing so requires manual wattage entry on the Port Configuration page.
l Port Auto Reset Mode — Enable or disable the ability for the switch to
automatically reset a port.
l Traps — Enable to allow the switch to send alerts about PoE statuses, such
as PoE being enabled or disabled on a port.
l Fast PoE Mode — Enable Fast PoE for the switch to provide PoE power before
the boot process completes.
l Perpetual PoE Mode — Enable to allow the switch to continue providing PoE
power if the switch is restarting.
Statistics Use this page to view PoE error counts when troubleshooting
potential PoE issues. Note: -__.An error on the switch confirms there is a PoE
issue, but it does not mean the issue is caused by the switch. Troubleshoot
the connected device and Ethernet cable.
Counter explanations:
44
l Overload Counter — The number of times there has been a power overload. l
Short Counter — The number of times there has been a short-circuit condition.
l Power Denied Counter — The number of times the connected device has been
denied power. l MPS Absent Counter — The number of times power has stopped
because the
powered device couldn’t be detected. l Invalid Signature Counter — The number
of times an invalid signature was
received. Signature detection is used to detect the presence of a powered
device, where a resistance value on the connected device is expected to be
found within a particular range. Details Use the details page to gather
information about the PoE status of each port. Click Options( ), then Refresh
to update the page.
Tools
Firmware Management
Use this page to manually update the firmware on the switch. The image
selected when loading the page is the active image. If the firmware fails to
boot, the switch switches to the other image as a failsafe.
45
Pro Tip: -_Use OvrC to confirm if the switch is up to date. If not, click the
Update button for OvrC to update the switch to the latest firmware. OvrC
automatically switches between the active and backup images when performing
upgrades.
46
Configuration Management
Use this page to save a backup of the switch’s configuration or to reset the
switch to the default settings.
Hardware reset The reset button is on the front of the switch.
Reset button action Hold for 1-9 seconds Hold for 10-19 seconds
Front LED State Blinking slowly
Blinking moderately
Description
Restarts the switch Resets the login credentails to defaults
47
Reset button action Hold for more than 20 seconds
Front LED State
Blinking rapdily
Description
Resets the switch to factory defaults
Diagnostic Utilities
Ping Use a ping test to measure the amount of time it takes to reach an
address on the local network or the internet. You can enter the IP address or
the hostname, such as www.wikipedia.com.
Pro Tip: -_Before selecting a DNS server, use a ping test to measure the
fastest response time.
48
Traceroute Use a traceroute to diagnose network interruptions between the
switch and an address on the local network or the internet. You can enter an
IP address or a hostname, such as www.youtube.com.
IP Address Conflict Use this page to detect an IP conflict with the switch.
Note: -__.You’ll most likely have to connect to the switch’s MGMT port to use
this feature when there’s an IP conflict.
49
Advanced System
Management Access
System Connectivity Use the System Connectivity page to quickly manage
connections to the switch. More defined connection settings are on the
specific protocol tabs. Configurable settings include: l Telnet — Enable to
allow telnet connections on port 23. Enable Allow New Sessions to allow new
outbound telnet sessions. Disabling new sessions does not terminate existing
sessions. l Outbound Telnet — Enable Allow New Sessions to allow new outbound
telnet sessions. Disabling new sessions does not terminate existing sessions.
l HTTP Redirect to HTTPS — Enable to redirect HTTP logins to the HTTPS port. l
HTTPS — Enable to require an HTTPS connection for the switch’s local
interface. When enabled, you must type https:// before the IP address in your
browser’s address bar. l SSH — Enable to allow SSH connections. You can
specify the port to use and The Session Timeout, in seconds. l Management VLAN
— Use the drop-down to select which VLAN the switch’s user interface can be
accessed on.
Telnet Use this page for more defined telnet connection settings. Changes made
on this page affect the System Connectivity page.
50
Configurable settings include: l Enable — Allows telnet connections on the
specified port. Port 23 is the default. l Port — The port used to make telnet
connections to the switch. 23 is the default. Note: -__.Changing this value
does not affect current connections. New sessions must use the new value. l
Session Timeout The amount of time (in minutes) that the switch detects
inactivity before ending the session. Configurable between 0 160 minutes.
The default is 5. l Max Number of Sessions The number of simultaneous telnet
sessions (0-4) the switch allows. l Allow New Sessions Enable to allow new
outbound telnet sessions. Disabling new sessions does not terminate existing
sessions.
51
Outbound Telnet Use this page for more defined outbound telnet connection
settings. Changes made on this page affect the System Connectivity page.
Configurable settings include: l Session Timeout — The amount of time (in
minutes) that the switch detects inactivity before ending the session.
Configurable between 0 160 minutes. The default is 5. l Max Number of
Sessions — The number of simultaneous telnet sessions (0-4) the switch allows.
l Allow New Sessions — Enable to allow new outbound telnet sessions. Disabling
new sessions does not terminate existing sessions.
52
Serial Port Use this page for more defined serial port connection settings.
Changes made on this page affect the System Connectivity page.
Configurable settings include: l Serial Timeout — The amount of time (in
minutes) that the switch detects inactivity before ending the session.
Configurable between 0 160 minutes. The default is 5. l Baud Rate — The
number of signals per second transmitted over the physical medium, measured in
bits per second.
Non-configurable connection settings: l Character Size: 8 l Parity: None l
Stop Bits: 1 l Flow Control: Disabled
53
CLI Banner Use this page to type the desired message in the text area to
create the CLI (Command Line Interface) banner message.
Note: -__.If you reach the end of the line, the text wraps to the next line.
The line might not wrap at the same location in the CLI. To create a line
break (carriage return) in the message, press the Enter key on the keyboard.
The line break in the text area will be at the same location in the banner
message when viewed through the CLI.
54
HTTPS Connection Use this page for more defined HTTPS connection settings.
Changes made on this page affect the System Connectivity page.
Configurable settings include: l Enable — Allows HTTPS connections on the
specified port. Port 443 is the default. l TLS Version 1 — Enables or disables
(TLS Transport Layer Security) Version 1.0. l Port — The TCP port used to make
HTTPS connections to the switch. 443 is the default. Note: -__.Changing this
value does not affect current connections. New sessions must use the new
value. l Session Soft Time Out — The amount of time (in minutes) that the
switch detects inactivity before re-checking authentication. 5 is the default.
l Session Hard Time Out — The amount of time (in minutes) that the switch
detects inactivity before ending the session. 24 is the default. l Max Number
of Sessions The number of simultaneous HTTPS sessions the switch allows. 8
is the default.
55
l Allow New Sessions — Enable to allow new outbound telnet sessions. Disabling
new sessions does not terminate existing sessions.
This page also displays the status of the SSL certificate generation process
and allows you to Download, Generate, or Delete the certificate. Certificate
Status states:
l Present — The certificate has been generated and is present on the device. l
Absent — A certificate is not available on the device. l Generation In
Progress — An SSL certificate is currently being generated.
56
SSH Use this page for more defined SSH connection settings. Changes made on
this page affect the System Connectivity page.
Configurable settings include: l Enable — Allows SSH connections on the
specified port. Port 22 is the default. l SSH Version 2 — Enables or disables
SSH version 2. l Port — The TCP port used to make HTTPS connections to the
switch. 22 is the default. Note: -__.Changing this value does not affect
current connections. New sessions must use the new value. l Max Number of
Sessions — The number of simultaneous HTTPS sessions the switch allows. 8 is
the default. l Session Timeout — The amount of time (in minutes) that the
switch detects inactivity before ending the session. 5 is the default
57
This page also displays the status of the RSA (Rivest-Shamir-Adleman
algorithm) and DSA (Digital Signature Algorithm) certificate generation
process and allows you to Download, Generate, or Delete the certificate.
Certificate Status states:
l Present The certificate has been generated and is present on the device. l
Absent A certificate is not available on the device. l Generation In
Progress An SSL certificate is currently being generated. SNTP Simple
Network Time Protocol (SNTP) assures the switch’s clock time is accurate to
the millisecond, by synchronizing to an SNTP server. Time sources are
established by stratums, which define the accuracy of the reference clock. The
higher the stratum (zero being the highest) the more accurate the clock. The
switch receives time from stratum 1 and above because the switch itself is a
stratum 2 device. Examples of stratums: l Stratum 0 — An actual time clock,
such as a GPS system, is used as the time
source. l Stratum 1 — A server directly linked to a stratum 0 source is used.
Stratum 1 time
servers provide primary network time standards. l Stratum 2 — A time source
connected to a stratum 1 server over a network. Such
as stratum 2 server receiving time over the network, via NTP, from a stratum 1
server. SNTP time definitions are determined by the following time levels: l
T1 — The time that the original request was sent by the client. l T2 — The
time that the original request was received by the server.
58
l T3 — The time that the server sent a reply. l T4 — The time that the client
received the server’s reply. The switch can poll unicast and broadcast server
types for the server time. Unicast information is used for polling a server
with a known IP address. SNTP servers configured on the switch are the only
servers polled for synchronization information. This is the most secure method
for synchronization. When selected, SNTP information is only accepted from
SNTP servers defined on the SNTP Server Configuration page. Global
Configuration Use this page to configure the Simple Network Time Protocol
(SNTP) to make the switch’s clock time accurate to the millisecond. Note:
-__.The SNTP server the switch synchronizes to is configured on the Server
Configuration tab. Configurable settings include:
l Client Mode — Use the dropdown to determine how SNTP operates. Options
include: l Unicast — Makes STNP operate in a point-to-point fashion. A unicast
client sends a request to a designated server at its unicast address and
expects a reply to determine the time, and potential round-trip delays to
calculate an offset from the local time. l Broadcast — SNTP operates like it’s
multicast but uses a local broadcast address instead of a multicast address.
The broadcast address has a single subnet scope, while a multicast address has
an internet-wide scope. l Disable — Disables the SNTP protocol on the switch.
l Port — Enter a local UDP port to listen for responses and/or broadcasts. 123
is the default.
59
l Unicast Poll Interval (Seconds) — Enter the number of seconds between
unicast poll requests, expressed as a power of two when configured in unicast
mode.
l Broadcast Poll Interval (Seconds) — Enter the number of seconds between
broadcast poll requests, expressed as a power of two when configured in
broadcast mode.
l Unicast Poll Timeout (Seconds) — Enter the number of seconds between
broadcast poll requests, expressed as a power of two when configured in
unicast mode. Broadcasts received prior to the expiry of the interval are
discarded.
l Unicast Poll Retry — Enter the number of times to retry a request to an SNTP
server after the first time-out before attempting to use the next configured
server when configured in unicast mode.
l Number of Servers Configured — Displays the number of SNTP servers
configured on the Server Configuration tab.
Global Status Use this page to view the SNTP server configuration of the
switch.
60
Server Configuration Use this page to add SNTP servers and configure the
priority of which server should be used first, and which should be used in
case the servers with a higher priority cannot be contacted. Use the Options (
) button to refresh the page, add, or select multiple servers to configure.
Use the Action button to edit or delete an existing SNTP server.
To add an SNTP server: 1. Click Options ( ), then Add. 2. Enter an SNTP Server
Name or IP Address. 3. Select an SNTP Server Type, meaning whether it’s an
IPv4, IPv6, or DNS address. 4. Enter a UDP Port the SNTP server to communicate
on. 5. Enter the Priority level that the SNTP server should be used. If it’s a
fallback
address in case the default SNTP server fails, enter 2. 6. Enter the protocol
Version number. The default is 4.
61
7. Click Add, then Apply at the top of the page.
Server Status Use this page to see the last updated time the switch has
received from the configured SNTP server(s) and how many requests the switch
has made to the server(s). Click Options( ) > Refresh to gather the latest
data.
62
Source Interface Configuration Use this page to select the Type of Interface
to use as the SNTP source. Interface options include NetworkPort or
ServicePort. The default Type is None.
SNMP Simple Network Management Protocol (SNMP) provides a method for managing
network devices. The Araknis 920 switch supports SNMP versions 1, 2, and 3.
SNMP Versions 1 and 2 The SNMP agent maintains a list of variables used to
manage the switch, which are defined in the Management Information Base (MIB).
The SNMP agent defines the MIB specification format, and the format used to
access information over the network. Access rights to the SNMP agent are
controlled by access strings.
63
SNMP Version 3
SNMP v3 adds access control and trap mechanisms. The User Security Model (USM)
for SNMP v3 includes:
l Authentication — Provides data integrity and data origin authentication. l
Privacy — Protects against the exposure of message content by encrypting the
information with Cipher-Block Chaining (CBC). Authentication and privacy is
enabled on an SNMP message. l Timeliness — Protects against message delay and
redundancy by comparing incoming messages with their time information. l Key
Management — Defines key generation, updates, and use.
64
Community Use this page to manage access rights by creating Communities for
SNMP v1 and 2, or Groups for SNMP v3. Note: -__.Changing community names also
changes the access rights. Use the Options ( ) button to refresh the page,
add, or select multiple communities to configure. Use the Action button to
edit or delete an existing community server.
Configurable settings include: l Mode Use Community for SNMPv1/2 or Group
for v3. l Community Name — Community name used in SNMPv1/v2 packets. This is
configured in the client device and determines the access the user may connect
with. l IP Address Enter the IP address of the device that can connect to
the Community or Group. l Community Access Select the permissions given to
the Community or Group. l Community View Enter a community view. No access
is granted if this field is left empty.
Trap Receiver V1/V2 Use this page to configure the SNMP v1 or 2 trap receiver
(sometimes known as a management host) that’s receiving notifications about
traps generated by the switch. Use the Options ( ) button to refresh the page,
add, or select multiple trap receivers to configure. Use the Action button to
edit or delete an existing trap receiver.
65
Configurable settings include: l Host IP Address The IP address of the
device that is going to receive the traps generated by the switch. l Community
Name The SNMP community name that includes the trap receiver and the SNMP
agent on the switch. l Notify Type Select the notification type to send to
the trap receiver. l Trap An SNMP message that notifies the trap receiver
when a certain event has occurred on the device. The message is not
acknowledged by the SNMP management host. l Inform An SNMP message that
notifies the trap receiver when a certain event has occurred on the device.
The message is acknowledged by the SNMP management host. This type of
notification is not available for SNMPv1. l SNMP Version Select the SNMP
version being used. l Filter This field is optional. Enter the name of the
filter configured on the trap receiver. The filter is configured using the CLI
and defines which MIB objects to include or exclude from the community view. l
UDP Port The UDP port on the trap receiver that is receiving the SNMP
notifications. The default UDP port value (162) is used if no value is
specified when configuring a receiver.
Trap Receiver V3 Use this page to configure the SNMP v3 trap receiver
(sometimes known as a management host) that’s receiving notifications about
traps generated by the switch.
66
Use the Options ( ) button to refresh the page, add, or select multiple trap
receivers to configure. Use the Action button to edit or delete an existing
trap receiver.
Configurable settings include: l Host IP Address The IP address of the
device that is going to receive the traps generated by the switch. l User Name
The name of the SNMP user that is authorized to receive the SNMP
notification. l Notify Type Select the notification type to send to the trap
receiver. l Trap An SNMP message that notifies the trap receiver when a
certain event has occurred on the device. The message is not acknowledged by
the SNMP management host. l Inform An SNMP message that notifies the trap
receiver when a certain event has occurred on the device. The message is
acknowledged by the SNMP management host. This type of notification is not
available for SNMPv1. l Security Level Select one of the following security
levels for the NSMP user: l No Auth No Priv No authentication and no data
encryption (no security). l Auth No Priv Authentication with no data
encryption. With this security level, users send SNMP messages using an MD5
key/password for authentication. It does not send a DES key/password for
encryption. l Auth Priv Authentication and data encryption. With this
security level, users send an MD5 key/password for authentication and a DES
key/password for encryption.
67
l Filter This field is optional. Enter the name of the filter configured on
the trap receiver. The filter is configured using the CLI and defines which
MIB objects to include or exclude from the community view.
l UDP Port The UDP port on the trap receiver that is receiving the SNMP
notifications. The default UDP port value (162) is used if no value is
specified when configuring a receiver.
68
Access Control Group Use this page to configure SNMP Access Control Groups and
view a summary of all the configured groups. These SNMP groups allow network
managers to assign different authorization levels and access rights to
specific switch features and attributes. The switch is preconfigured with
several default SNMP groups. The SNMP community can reference an SNMP group to
provide security and context for agents receiving requests, initiating traps,
and management system tasks. An SNMP agent cannot respond to a request from a
management system outside the group or groups it’s configured for. Use the
Options ( ) button to refresh the page or add a new Access Control Group.
Configurable settings include: l Group Name Enter an easily identifiable
name for the Access Control Group. l SNMP Version Select the SNMP version
for the Access Control Group. l Security Level Select one of the following
security levels for the NSMP user: l No Auth No Priv No authentication and
no data encryption (no security). This is only available to SNMP v1 or 2
groups. l Auth No Priv Authentication with no data encryption. With this
security level, users send SNMP messages using an MD5 key/password for
authentication. It does not send a DES key/password for encryption.
69
l Auth Priv Authentication and data encryption. With this security level,
users send an MD5 key/password for authentication and a DES key/password for
encryption.
l Context Name Enter the SNMP context associated with the SNMP group and its
views. A user or a management application specifies the context name to get
the performance information from the MIB objects associated with that context
name. The Context EngineID identifies the SNMP entity that should process the
request (the physical router), and the Context Name tells the agent in which
context it should search for the objects requested by the user or the
management application.
l Group Access Rights Read Select the level of read access rights for the
group. The menu includes the available SNMP views. When adding a group.
l Group Access Rights Write Select the level of write access rights for the
group. The menu includes the available SNMP views. When adding a group.
l Group Access Rights Notify Select the level of notify access rights for
the group. The menu includes the available SNMP views. When adding a group.
70
User Security Model Use this page to configure SNMP v3 users. Click the
Options ( ) button to refresh the page, add, or edit a new SNMP user.
Configurable settings include: l Engine ID Type Select the Engine ID type
being used. Local or Remote. Each SNMP v3 agent has an engine ID as a unique
identifier for the device. l User Name A unique identifier for the user.
Leading or embedded blanks cannot be used. l Group Name The SNMP group name
to associate the user with. l Authentication Method Select one of the
following options: l None No authentication is used. l MD5 This protocol
requires a password of 1-32 hexadecimal characters. l SHA This protocol
requires a password of 1-32 hexadecimal characters. l MD5-Key This protocol
requires a pre-generated MD5 authentication key of 32 hexadecimal characters.
l SHA-Key This protocol requires a pre-generated SHA authentication key of
40 hexadecimal characters.
View Entry An SNMP View is a mapping between SNMP scalar and tabular objects
and the access rights configured for the view. Use this page to configure
access to one or more MIB OID (MIB Object Identifier) nodes for an SNMP View
Name. Note: -__.An SNVMP View Entry must be configured for an SNMP v3 agent to
work.
71
Click the Options ( ) button to refresh the page or add a new View Entry.
Configurable settings include: l View Name Enter a unique name to identify
the SNMP view. l View Type Select an View Type to use. Options include: l
Included Grants access to the OID subtree. l Excluded Denies access to the
OID subtree. l OID Tree The ASN.1 subtree to grant or deny access to.
72
Source Interface Configuration Use this page to specify the physical or
logical interface to use as the SNMP client source interface. When an IP
address is configured on the source interface, the IP address is used in the
IP header of SNMP management packets for all SNTP communications between the
local SNMP client and the remote SNTP server. This allows security devices,
like firewalls, to identify incoming source packets from a specific device.
Configurable settings include: l Type Select a source interface type.
Options include: l None The primary IP address of the origination (outbound)
interface is used as the source address. l Interface The primary IP address
of the physical switchport is used as the source address.
The Interface drop-down can only be set to Network. This option includes the
physical port, VLAN routing interface, and the network source IP. Click Apply
at the top of the page to save changes.
73
Server Configuration Use this page to specify the UDP port number the SNMP
server uses to listen for requests. Caution: -.Changing this value may cause
existing SNMP transactions to cease communicating with the device until the
client applications are reconfigured to use the new port number. Click Apply
to save changes.
74
Time Ranges Use these pages to configure time ranges for Access Command Lists
(ACLs). Time ranges can be set for one or more rules within an ACL using a
periodic or absolute time, except for the deny all rule each ACL has. Time
ranges must have a name before they can be referenced by an ACL rule.
Configuration Click the Options ( ) button to add or edit a named Time Range
or refresh the page. Use the Action button to delete a Time Range. Click
Enable to make Time Ranges active.
Table field descriptions: l Time Range Name The unique name entered to
identify the Time Range. l Time Range Status Displays whether the Time Range
is active. l Periodic Entry Count The number of periodic time range entries
currently configured with the Time Range.
75
l Absolute Entry The number of absolute time range entries currently
configured with the Time Range.
Entry Configuration Use this page to add periodic and absolute time range
entries. To add an entry, select a Time Range Name, then click the Options ( )
button > Add.
The Configurable settings depend on which Entry Type you select. The below table describes these settings.
Entry Type
Periodic
Absolute
Field
Description
Start Days
Select the day the time range entry begins. If more than one day is selected, they must match the End Days field.
Starting Time of Day
Enter the time of day the entry begins. Uses a 24-hour format.
End Days
The day, or days, the entry ends. If multiple days are selected, they must match the Start Days field.
Ending Time of Day
The time of day the entry ends. Uses a 24-hour format.
Starts
The calendar day the entry begins.
Ends
The calendar day the entry ends.
76
To delete a Time Range Entry, click the Action button next to the entry. 77
Logs The logs display a record of system events and can be configured to only
display the most pertinent system information.
Event Log Use this page to view system events recorded since the last restart
of the switch. Refresh the page to see new events. The Options ( ) button
gives you the ability to display a specified number of rows, and to Refresh
the logs.
Table field descriptions: l Type The incident category of the log entry.
Event, Error, etc. l Filename The source code file name of the event’s
origin. l Line The line number of the event within the source code. l Task
ID The system identifier of the task that was running when the event
occurred. l Code An event-specific code assigned to the event.
78
l Event Time A time stamp (days:hours:minutes:seconds) that indicates when
the event occurred in reference to the system’s uptime.
Persistent Log This page shows current events, and events recorded before the
last system restart. Refresh the page to see new events. The Options ( )
button gives you the ability to display a specified number of rows, and to
Refresh the logs.
Table field descriptions: l Severity The severity level of the log entry.
The severity levels displayed can be configured under Advanced > System > Logs
Configuration tab. l Log Time A time stamp (days:hours:minutes:seconds) that indicates when the event occurred. l Component The component that issued the log entry. l Description A text description of the log entry.
79
Hosts Use this page to configure remote hosts for the switch to send and
capture logs to. Click the Options ( ) button to Edit, Add a new host, or
Refresh the list.
Table field descriptions: l Host The IP address or DNS-resolvable host name
of the remote host that is receiving log messages. l Status Indicates if the
host is configured to actively log or not. l Port The UDP port on the
logging host that the syslog messages are being sent. l Severity Filter
Severity level threshold for log messages, configured under Advanced > System
Logs > Configuration tab. All log messages with a severity level at and above the configured threshold are sent to the logging host. l Transport Mode UDP or TLS. If TLS is not configured the default transport mode is UDP.
80
l Authentication Mode Using TLS, the security user can configure an
anonymous authentication mode, where no client authentication is done by the
syslog server. Using x509/name authentication mode, two-way authentication is
done by the syslog client and the syslog server.
l Certificate Index Index used to identify corresponding certificate files.
l Action Edit or remove a logging host. Configuration Use these fields to
configure the behavior and data for the switch to log. Buffered Log
Configuration: l Enable Enabled by default, this feature logs data to the
buffered (RAM) file. l Behavior Specifies what happens when the buffered log
is full.
l Wrap: Deletes the oldest messages. l Stop on Full: Stops writing new
messages. Command Logger Configuration: Enable or Disable logging of command-
line interface (CLI) commands issued to the switch. This setting is disabled
by default. Console Log Configuration: l Enable Enable or disable logging to
any serial device attached to the switch. l Severity Filter Sets the
severity of the messages to log. All messages at or above the selected
severity level are logged to the console. Persistent Log Configuration: l
Enable Enable or disable logging to the persistent log. These messages are
not deleted when the switch restarts. l Severity Filter Sets the severity of
the messages to log. All messages at or above the selected severity level are
logged to the switch. Syslog Configuration:
81
l Enable Enable or disable logging to the configured syslog hosts. When
disabled, the switch does not relay logs to syslog hosts and no messages are
sent to any collector/relay.
When enabled messages are sent to the collectors/relays using the values
configured for each collector/relay.
l Protocol Version The RFC version of the syslog protocol. l Local UDP Port
The UDP port the switch sends syslog messages from. Source Interface
Configuration Use this page to configure the port that the Syslog host is
connected to.
Configurable settings include: l Type Select Interface to configure a Syslog
Source Interface. Default is None. l Interface Use the dropdown to select
the type of interface to use. Service port or Network port.
82
System Statistics Pages in the Statistics section contain information about
the amount and types of traffic the switch is transmitting and receiving.
Switch Use the Options ( ) button to refresh the statics for a specific
heading or click the Clear Counters button to clear all the statistics
information on the page.
System counters descriptions: l Interface The interface index object value
of the interface table entry associated with the switch’s processor. Use this
value to identify the interface when managing the switch with SNMP. l Time
Since Counters Last Cleared The amount of time in days:hours:minutes:seconds
since the statistics for the switch have been reset.
83
Statistics counters descriptions: l Octets Without Error The total number of
octets (bytes) successfully transmitted or received data by the processor.
This number includes FCS octets but excludes framing bits. l Packets Without
Errors The total number of packets successfully transmitted or received by
the processor. Includes unicast, broadcast, and multicast packets. l Packets
Discarded The number of packets chosen to be discarded to prevent them from
being deliverable to a higher-layer protocol. Such as discarding packets to
free up buffer space. l Unicast Packets The number of subnetwork-unicast
packets transmitted or received from a higher-layer protocol. l Multicast
Packets The number of packets transmitted or received being directed to a
multicast address. l Broadcast Packets The number of packets transmitted or
received being directed to a broadcast address.
84
Status counters descriptions: l Current Usage In the FDB entries column, the
value is the number of learned and static entries in the MAC address table. In
the VLANs column, the number shows the number of static and dynamic VLANs that
exist in the VLAN database. l Peak Usage The highest number of entries in
the MAC address table or VLAN database that an admin statically configured. l
Maximum Allowed The maximum number of statically configured or dynamically
learned entries allowed in the MAC address table or VLAN database. l Static
Entries The current number of statically configured entries in the MAC
address table or VLAN database that an admin configured. l Dynamic Entries
The current number of dynamically learned entries in the MAC address table or
VLAN database that an admin configured. l Total Entries Deleted The number
of VLANs created and deleted since the last time the switch was restarted.
This field is not applicable to MAC address table entries.
Port Summary This table shows statistics about the packets transmitted and
received for individual interfaces (switchports and LAGs).
85
Use the Options ( ) button to Refresh or Clear the statistics in the table.
Column descriptions: l Interface The interface (switchport or LAG) number. l
Name The name given to the interface. l RX Good The total number of
inbound packets received by the interface without error. l RX Errors The
total number of inbound packets containing errors, preventing them from being
deliverable on the interface. l RX Bcast The total number of inbound packets
received by the interface directed to a broadcast address. This does not
include multicast packets. l TX Good The total number of outbound packets
received by the interface without error. l TX Errors The total number of
outbound packets containing errors, preventing them from being deliverable on
the interface. l TX Collisions The best estimate of the total number of
collisions on the interface.
Port Detailed This page allows you to select an interface and view detailed
statistics about it, such as the Maximum Frame Size, MTU, and the Packet
Lengths Received and Transmitted.
86
Use the Interface dropdown to select a switchport or LAG. Click the Options (
) button to Refresh the page for the most current statistics.
87
Switching
IGMP Snooping
Configuration Use this page to enable IGMP Snooping on the switch and view
related counts.
Configurable settings: l Enable – Enables/disables IGMP snooping on the
switch. l Advanced Mode – Enabled Advanced mode if the IGMP environment which
is likely to have large bursts of IGMP messages. The switch’s CPU has a buffer
shared by all kinds of packets. When there is a burst of IGMP snooping
packets, some would be dropped. To prevent this, Advanced Mode increases the
buffer size for IGMP snooping packets, sacrificing the buffer size allocated
for other kinds of packets. These “other” packets may be dropped.
88
l Router Alert Check — Enable for the switch to inspect packets when they are
being forwarded, even though the packet is not directly addressed to this
switch.
Read-only fields: l Multicast Control Frame Count — The number of multicast
frames the switch has processed. l VLANS Enabled for IGMP Snooping — The
number of VLANs configured on the switch for IGMP snooping.
VLAN Status Use this page to enable IGMP snooping on VLANs configured on the
switch. Click the Options ( ) button to Refresh or Clear the statistics in the
table. Configurable settings include: l VLAN ID — Select a VLAN ID that’s been
configured on the switch. You can only select a VLAN that hasn’t already been
configured for IGMP Snooping. l Fast Leave — Enable to remove the multicast
group specified in an IGMP Leave report without sending an IGMP query message
and waiting for a response. l Group Membership Interval (Seconds) — The number
of seconds the VLAN waits for a report for a particular multicast group on the
VLAN before the IGMP snooping feature deletes the VLAN from the group. l Max
Response Time (Seconds) — The number of seconds the VLAN waits after sending a
query if it does not receive a report for a particular multicast group. The
specified value should be less than the Group Membership Interval. l Multicast
Router Expiration Timer (Seconds) — The number of seconds the VLAN waits to
receive a query before it is removed from the list of VLANs with multicast
routers attached.
89
l Report Suppression Mode — The IGMPv1 and IGMPv2 report suppression mode. The
device uses IGMP report suppression to limit the membership report traffic
sent to multicast-capable routers. When this mode is enabled, the device does
not send duplicate reports to the multicast router. Note that this mode is
supported only when the multicast query has IGMPv1 and IGMPv2 reports. This
feature is not supported when the query includes IGMPv3 reports. The options
are as follows: l Enabled – Only the first IGMP report from all hosts for a
group IGMP report is forwarded to the multicast routers. l Disabled — The
device forwards all IGMP reports from all hosts in a multicast group to the
multicast routers.
90
Multicast Router VLAN Configuration Use this page to configure VLANs for
multicast routing. When enabled, multicast routers learn which multicast
groups are active by periodically checking with each member of the multicast
group. Read Understanding Multicast & IGMP for more information about
multicast groups.
To configure multicast routing: 1. Use the Options button to configure
multiple ports or the Actions button to edit a
single port. 2. Select the VLAN ID(s) you want the port to act as the
multicast router for, then
click the right arrow to add them.
91
3. Click Save, then Apply at the top of the page. 92
IGMP Snooping Querier
Configuration Use this page for IGMP Snooping Querier administration.
Configurable settings include: l Enable – Enable to allow the switch to send
periodic IGMP queries that trigger IGMP report messages from the switches that
want to receive IP multicast traffic. IGMP snooping listens to these IGMP
reports to establish appropriate forwarding. l IP Address – The address to be
used as the source address in periodic IGMP queries when no IP address is
configured on the VLAN on which the query is being sent. l IGMP Version —
Select the IGMP version to use in the queries. l Query Interval (Seconds) —
The amount of time between queries.
93
l Query Expiry Interval (Seconds) — The amount of time the device remains in
non-querier mode after it discovers that there is a multicast querier on the
network.
VLAN Configuration Use this page to add VLANs that the switch should act as
the IGMP querier for. To learn more about IGMP queriers, read Understanding
Multicast & IGMP. Caution: -.Only enable IGMP Snooping Querier on the switch
where your IGMP topology starts, called the core IGMP switch. This IGMP
querying switch asks each device on the network which multicast traffic they
want. To add a VLAN to the switch’s IGMP snooping querier configuration:
1. Click the Options button, then Add.
2. Select a VLAN ID. 3. Enable Querier Election Participation if the VLAN
should participate in the IGMP
querier Election process. 4. If desired, enter a Querier VLAN IP Address.
94
5. Click Add, then Apply at the top of the page. Configured VLANs are listed
at the bottom of the page.
95
VLAN Status Use this page to view information about the IGMP snooping querier
status for all VLANs that have the snooping querier enabled.
96
Spanning Tree Protocol
Switch Use this page to configure global Spanning Tree Protocol (STP) settings
for the switch. STP is a Layer 2 protocol that decides the best path for LAN
traffic when multiple options exist, preventing network loops while
guaranteeing redundancy in case of link failure. For more information about
STP, read Understanding Spanning Tree Protocol (STP) & Best Practices.
Configurable settings include: l Enable — Enables STP on the switch. l Force
Protocol Version — Select the STP version for the switch to use. l
Configuration Name — Typically left alone, you can enter the name of the MSTP
region. Each switch that participates in the same MSTP region must share the
same Configuration Name, Configuration Revision Level, and MST-to-VLAN
mappings 97
l Configuration Revision Level — This number must be the same on all switches
participating in the MSTP region.
98
MST Use the MST Summary page to view the Multiple Spanning Tree Instances
(MSTIs) on the device. Multiple Spanning Tree Protocol (MSTP) allows the
creation of MSTIs based upon a VLAN or groups of VLANs. Configuring MSTIs
creates an active topology with a better distribution of network traffic and
an increase in available bandwidth when compared to classic STP MST Port. The
Spanning Tree Maximum Hops field displays the maximum number of hops a Bridge
Protocol Data Unit (BPDU) is allowed to traverse within the spanning tree
region before it is discarded. The default value is 20. MST instances appear
in the table at the bottom of the page.
Table field descriptions: l MST ID — Identifies the MST instance. l Priority —
The bridge priority for the spanning-tree instance. This value affects the
likelihood that the bridge is selected as the root bridge. A lower value
increases the probability that the bridge is selected as the root bridge.
99
l Associated VLANs — The number of VLANs that are mapped to the MSTI. This
number does not contain any information about the VLAN IDs that are mapped to
the instance.
l Bridge Identifier — A unique value that is automatically generated based on
the bridge priority value of the MSTI and the base MAC address of the bridge.
When electing the root bridge for an MST instance, if the bridge priorities
for multiple bridges are equal, the bridge with the lowest MAC address is
elected as the root bridge.
l Time Since Topology Change — The amount of time that has passed since the
topology of the MSTI changed.
l Designated Root — The bridge identifier of the root bridge for the MST
instance. The identifier is made up of the bridge priority and the base MAC
address.
l Root Path Cost — The path cost to the designated root for this MST instance.
Traffic from a connected device to the root bridge takes the least-cost path
to the bridge. If the value is 0, the cost is automatically calculated based
on port speed.
l Root Port — The port on the bridge with the least-cost path to the
designated root for the MST instance.
100
MST Port Use this page to view and configure the Multiple Spanning Tree (MST)
settings for each interface on the switch. Use the MST ID dropdown to view its
configuration on each switch interface. Note: -__.An MST instance must first
be created under the MST tab before an MST ID can be selected. Click the
Options ( ) button to Refresh the statistics in the table, or to Edit multiple
interfaces at once. Click Action to edit the MST ID on an individual
interface.
Configurable options include: l Port Priority — The priority for the port
within the MSTI. This value is used to determine which interface becomes the
root port when two ports have the same least-cost path to the root. The port
with the lower priority value becomes the root port. If the priority values
are the same, the port with the lower interface index becomes the root port. l
Port Patch Cost — The path cost from the port to the root bridge.
101
Table field descriptions: l Auto-calculate Port Path Cost — Shows whether the
path cost from the port to the CIST root is automatically determined by the
speed of the interface (Enabled) or configured manually (Disabled). l Port ID
— A unique value that is automatically generated based on the port priority
value and the interface index. l Port Up Time Since Counters Last Cleared —
The amount of time that the port has been up since the counters were cleared.
102
l Port Forwarding State — How traffic is flowing through the port. States
include: l Blocking — Blocks the flow of traffic. When a device is first
connected to a port, it enters the blocking state. l Learning — The port is
relaying information from a high-priority BPDU to the other ports on the
switch. l Disabled — Disables the port. l Err-disabled — Allows STP to block
the flow of traffic when it detects a loop, or forward traffic to a port if
the connection changes.
l Port Role — The role of the port within the CST, which is one of the
following: l Root – A port on the non-root bridge that has the least-cost path
to the root bridge. l Designated — A port that has the least-cost path to the
root bridge on its segment. l Alternate — A blocked port that has an alternate
path to the root bridge. l Backup — A blocked port that has a redundant path
to the same network segment as another port on the bridge. l Master — The port
on a bridge within an MST instance that links the MST instance to other STP
regions. l Disabled — The port is administratively disabled and is not part of
the spanning.
l Designated Root — The bridge ID of the root bridge for the CST. l Designated
Cost — The path cost offered to the LAN by the designated port. l Designated
Bridge — The bridge ID of the bridge with the designated port. l Designated
Port — The port ID of the designated port.
103
l Loop Inconsistent State — Identifies whether the interface is currently in a
loopinconsistent state. An interface transitions to a loop-inconsistent state
if Loop Guard is enabled and the port stops receiving BPDUs. In this state,
the interface does not transmit frames.
l Transitions Into Loop Inconsistent State — The number of times this
interface has transitioned into loop-inconsistent state.
l Transitions Out Of Loop Inconsistent State — The number of times this
interface has transitioned out of loop-inconsistent state.
CST Use the CST Configuration page to configure the Common Spanning Tree (CST)
settings. The settings and information on this page define the device within
the spanning tree topology that connects all STP/RSTP bridges and MSTP
regions. Configurable settings include: l Bridge Priority — This value affects
the likelihood that the bridge is selected as the root bridge. A lower value
increases the probability that the bridge is selected as the root bridge. For
more information, read Understanding Spanning Tree Protocol (STP) & Best
Practices for more information. l Bridge Max Age — The amount of time a bridge
waits before implementing a topological change. l Bridge Forward Delay — The
amount of time a bridge remains in a listening and learning state before
forwarding packets. l BPDU Filter — When enabled, this feature filters the
BPDU traffic on the switch’s edge ports. When spanning tree is disabled on a
port, BPDU filtering allows BPDU packets received on that port to be dropped.
l BPDU Guard — When enabled, this feature can disable edge ports that receive
BPDU packets. This prevents a new device from entering the existing STP
topology,
104
so devices that were originally not a part of STP are not allowed to influence
the STP topology. Pro Tip: -_Do not enable this feature unless there’s a
specific use case for it. l Spanning Tree TX Hold Count — The maximum number
of BPDUs that a bridge is allowed to send within a hello time window. The
bottom of the page provides general CST information.
CST Port Use the CST Port page to view and configure the Common Spanning Tree
(CST) settings for each port on the switch. Click the Options ( ) button to
Refresh the statistics in the table, or to Edit multiple interfaces at once.
Click Action to edit an individual interface. Configurable settings include:
105
l Port Priority — The priority for the port within the CST. l Admin Edge Port
— Enable to force the interface to act as an edge port. An edge
port is an interface that is directly connected to a host and is not at risk
of causing a loop. l Port Path Cost — The path cost from the port to the root
bridge. l External Port Path Cost — The cost of the path from the port to the
CIST root. This value is important if the network includes multiple regions. l
Port Mode — Select whether STP should be enabled or disabled on the interface.
l Auto Edge — Enable to allow the interface to become an edge port if it does
not receive any BPDUs within a given amount of time. l Root Guard — Enable to
allow the interface to discard any superior information it receives to protect
the root of the device from changing by entering a discarding state, so it
does not forward any frames. l Loop Guard — Enable to prevent an interface
from erroneously transitioning from blocking state to forwarding when the
interface stops receiving BPDUs. The interface is marked as being in a loop-
inconsistent state, which does not forward frames. l TCN Guard — When enabled,
TCN Guard restricts the interface from propagating any topology change
information received through the interface. l BPDU Filter — When enabled, BPDU
traffic is filtered on the edge ports. Edge ports do not need to participate
in the spanning tree, so BPDU filtering allows BPDU packets received on edge
ports to be dropped.
106
Table field descriptions: l Interface — The port number. l Name — The name
given to the port. Configurable on Settings > Ports > General > Port Summary
page. l Port Mode — The role of the port within the CST, which is one of the
following: l Root – A port on the non-root bridge that has the least-cost path
to the root bridge. l Designated — A port that has the least-cost path to the
root bridge on its segment. l Alternate — A blocked port that has an alternate
path to the root bridge. l Backup — A blocked port that has a redundant path
to the same network segment as another port on the bridge. l Master — The port
on a bridge within an MST instance that links the MST instance to other STP
regions. l Disabled — The port is administratively disabled and is not part of
the spanning. l Port Forwarding State — How traffic is flowing through the
port. States include:
107
l Blocking — Blocks the flow of traffic. When a device is first connected to a
port, it enters the blocking state.
l Learning — The port is relaying information from a high-priority BPDU to the
other ports on the switch.
l Disabled — Disables the port. l Err-disabled — Allows STP to block the flow
of traffic when it detects a loop,
or forward traffic to a port if the connection changes. l Port Priority — The
port’s location in the network topology and how well it’s
situated to pass traffic. l Port Path Cost — The path cost from the interface
to the CST regional root. l Description — Whether the port is permitting or
denying traffic. Statistics Use this page to view how many BPDUS have been
transmitted and received on individual ports. Click the Options button, then
Refresh to get the latest statistics.
108
Unregistered Multicast Behavior
Configuration Use this page to configure how the switch should handle
unregistered multicast traffic. Unregistered Multicast Action options include:
l Drop — The switch does not forward unregistered multicast packets to the
interfaces. l Forward — Unregistered multicast packets are forwarded to all
active interfaces on the switch but not to the CPU, to reduce overhead. l
Forward Including CPU — Unregistered multicast packets are forwarded to all
active interfaces on the switch and the CPU.
Exception Lists display the default ACL exception list available on the
switch.
109
Exception Details Use this page to configure which Multicast addresses and
destination ports should be allowed to continue flooding while the
Unregistered Multicast Behavior is set to Drop. Use the Exception List Name
dropdown to select the list you’d like to edit on the page.
Configurable settings include: l Deny IGMP any any — Deny every IGMP packet. l
Add permit IP any any — Add a permit any any rule at the latest sequence.
Click the Options ( ) button to Edit the lists configured in the switch or
Refresh the page. Options include:
l Seq. no — The ACL rule number for each exception entry. l Multicast Address
— The multicast address allowed to flood. l Destination Port — The optional
destination port for traffic destinated for the
multicast address. This can be left blank to specify any port, a single port,
or a range of ports using “-“.
110
Interface Configuration Use this page to configure which Exception Lists are
applied to each port. Click the Options ( ) button to Edit multiple ports are
once or to Refresh the page. Click the Action button to edit a single port at
a time.
Multicast Forwarding Database
Summary Use this page for a summary of the multicast data collected by the
switch. Click Options, then Refresh to get the latest information.
111
IGMP Snooping Use this table to gather information about the IGMP snooping
traffic collected by the switch. Click Options ( ), then Refresh to get the
latest information or click Clear to reset the table. Note: -__.Not all
multicast traffic is handled by IGMP snooping. Read Understanding Spanning
Tree Protocol (STP) & Best Practices for more information.
Group Address Use this table to see the multicast group addresses the switch
has recorded. Click Options ( ), then Refresh to get the latest information.
112
Statistics Use this page to view multicast statistics the switch has gathered.
113
Loop Protection Loop Protection detects loops in downstream switches that do
not have spanning tree configured. When a loop-protected interface detects a
loop, it can disable itself. Caution: -.Do not use Loop Protection on uplink
ports between switches with spanning tree enabled. Loop Protection is designed
for unmanaged switches that drop spanning tree BPDUs.
Loop Protection Configuration Loop Protection sends loop protection protocol
data units (PDUs) to the multicast address 01:80:C2:00:00:08. When an
interface receives a PDU, it compares the source MAC address with the
switch’s. If the MAC address matches a loop is detected and a configured
action is taken. Shutdown Port, Shutdown Port and Log, or Log Only. To
configure Loop Protection:
1. Enable Loop Protection globally for the switch. 2. Enter a Transmission
Time (in seconds) that the switch sends PDU packets on
Loop Protected interfaces. The default is 5. 3. Enter an amount for the
Maximum PDU Received that the interface can receive
before taking the configured action. The default is 1. 4. Enter the Shutdown
Time (in seconds) that the interface shuts down when a loop
is detected. The default is 0.
114
5. Click the Action ( )button for the interface you’d like to configure or
use the Options button > Edit to select multiple interfaces to configure at
once.
Note: -__.You can quickly enable Loop Protection using the toggle in each row.
6. A new window appears with configurable options. Enable Loop Protection on
the interface, then select an Action to take. Shutdown Port, Shutdown Port and
Log, or Log Only. Then, click Save.
115
7. The window closes and you return to the Loop Protection Configuration
table. Click Apply at the top of the page.
The Loop Protection Configuration table gives an overview of what interfaces
have Loop Protection enabled, how they’re configured, and the Time of Last
Loop.
Table field descriptions: l Interface — The switchport or LAG number. l Name —
The name configured for the switchport or LAG. l Loop Protection — Displays if
Loop Protection is enabled or disabled on the port. Click to toggle this
setting. l Action — The action taken when a loop is detected on the interface.
l Status — Displays if the interface link is up or down.
116
l Loop — Indicates if there is a loop currently detected. The field is blank
when there is no loop detected.
l Loop Count — The number of loops that have been detected on the interface. l
Time of Last Loop — The date and time of the last loop detected on the
interface. Private VLAN Private VLANs provide port-based security and
isolation between ports within the assigned VLAN. Traffic on ports assigned to
a private VLAN can only be forwarded to and from uplink ports. Configuration
Click the Options ( ) button to Edit multiple VLAN IDs at once or to Refresh
the page. Click the Action button to configure a single VLAN.
117
A VLAN can be one of the following Types: l Unconfigured — The VLAN is not
configured as a private VLAN. l Primary — A private VLAN that forwards the
traffic from the promiscuous ports to isolated ports, community ports, and
other promiscuous ports in the same private VLAN. Only one primary VLAN can be
configured per private VLAN. All ports within a private VLAN share the same
primary VLAN. l Isolated — A secondary VLAN that carries traffic from isolated
ports to promiscuous ports. Only one isolated VLAN can be configured per
private VLAN. l Community — A secondary VLAN that forwards traffic between
ports that belong to the same community and to the promiscuous ports. Multiple
community VLANs can be configured per private VLAN.
118
Association Use the Association page to assign an Isolated or Community VLAN
to a Primary VLAN. Click the Options ( ) button to Edit multiple VLAN IDs at
once or to Refresh the page. Click the Action button to configure a single
VLAN.
119
Interface Use this page to configure the private VLAN mode for each interface.
Click the Options ( ) button to Edit multiple VLAN IDs at once or to Refresh
the page. Click the Action button to configure a single VLAN. The interface(s)
can be set to one of the following modes:
l General — The interface is not a member of a private VLAN. l Promiscuous —
The interface belongs to a primary VLAN and can communicate
with all interfaces in the private VLAN, including other promiscuous ports,
community ports, and isolated ports. l Isolated Trunk — The interface also
belongs to a primary VLAN. It carries traffic from isolated ports to
promiscuous ports. Only one isolated VLAN can be configured per private VLAN.
An isolated trunk port carries tagged traffic of multiple isolated VLANs and
normal VLANs. l Promiscuous Trunk — The interface belongs to a primary VLAN
and can communicate with all interfaces in the private VLAN, including other
promiscuous trunk ports, community ports, and isolated ports. l Host — The
interface belongs to a secondary VLAN and, depending upon the type of
secondary VLAN, can either communicate with other ports in the same community
(if the secondary VLAN is a community VLAN) and with the
120
promiscuous ports or is able to communicate only with the promiscuous ports
(if the secondary VLAN is an isolated VLAN).
Neighbors
LLDP
Global Use this page to configure global Link Layer Discovery Protocol (LLDP)
settings for the switch. LLDP is a generic protocol used to advertise the
device’s capabilities to other devices on the network.
Configurable settings include: l Transmit Interval (Seconds) — The number of
seconds between LLDP transmissions. l Transmit Hold Multiplier — Multiply the
value entered with the Transmit interval to determine the Time to Live (TTL)
value that the switch advertises.
121
The TTL value is the number of network hops that a packet can take before it’s
discarded by the router.
l Re-Initialization Delay (Seconds) — The number of seconds to wait before
attempting to reinitialize LLDP on a port after the port’s LLDP operating mode
changes.
l Notification Interval (Seconds) — The minimum number of seconds to wait
between transmissions of SNMP trap notifications on the switch.
Interface Summary Use this page to configure LLDP settings on individual
ports.
To configure LLDP on a port(s): 1. Click the Options button to edit multiple
ports, or the Action button to edit an
individual port. 2. For Port ID Subtype, select if you’d like LLDP to
advertise the port’s MAC address or
the Interface Name. 3. Enable or disable if the port can Transmit or Receive
LLDP advertisements. 4. Toggle Receive on so the device can receive LLDPDUs
from other devices. 5. Toggle Notify on for the interface to send SNMP
notifications when a link partner
device is added or removed.
122
6. Enable Transmit Management Information so other remote management devices
on the network can locate the switch.
7. Select Optional TLV(s) for the switch to advertise. 8. Click Save, then
Apply at the top of the page.
123
Local Devices Use this page to gather LLDP information about the switchports.
Click the Actions ( ) button to get more information about the port.
124
Remote Devices Use this page to view LLDP information collected by the device
connected to the switch’s port. Click the Actions button to get more
information about the connected device.
125
Statistics Use this page to view LLDP counts. Click Options( ), then Refresh
to get the most upto-date information. Click Clear to reset the table.
126
LLDP-MED
Global LLDP-MED is an extension of LLDP. MED stands for Media Endpoint Device
and is typically used for voice over IP (VoIP). Note: -__.LLDP and LLDP-MED
cannot operate simultaneously. If a device receives LLDP packets it cannot
send LLDP-MED packets until it receives LLDP-MED packets. Likewise, for LLDP.
Use this page to enter a value for the Fast Start Repeat Count. This is the
number of LLDP-MED Protocol Data Units (PDUs) that can be transmitted. Click
Apply to save changes.
127
Interface Summary Use this page to configure LLDP-MED settings on individual
ports.
To configure LLDP-MED on a port(s): 1. Click the Options ( ) button to edit
multiple ports, or the Action button to edit an
individual port. 2. Enable or disable LLDP-MED on the port. 3. Enable or
disable Notification Mode to be notified of topology changes. 4. Select
optional Transmit TLVs to advertise.
128
5. Click Save, then Apply at the top of the page. 129
Local Devices Use this page to gather LLDP-MED information about the
switchports. Click the Actions ( ) button to get more information about the
port.
130
Remote Devices Use this page to view LLDP-MED information collected by the
device connected to the switch’s port. Click the Actions ( ) button to get
more information about the port.
131
MAC Address Table Use the page to see which MAC addresses the switch has
recorded traffic from on a port(s) and which VLAN they’re a member of. Use the
Options button to refresh the page, or to select how many rows to display. Pro
Tip: -_Use the Filter By field to search for MAC addresses.
L2 ARP This pages displays the learned IP and MAC address of connected devices
on each interface.
132
ARP Table
Summary The ARP table displays MAC and IP address of devices that have
communicated with the switch. Use the Options( ) button to refresh the page or
clear the table. Use the Action button to delete an individual entry.
Table fields include: l IP Address — The IP address of the device. l MAC
Address — The MAC address of the device. l Interface – The VLAN ID associated
with the device. l Type The type of IP address the device is broadcasting.
Dynamic or static. Note: -__.Devices with MAC reservations appear as dynamic.
l Age How long the switch has seen the connection to the device.
(Days:Hours:Minutes:Seconds)
Configuration Use this page to configure the ARP Table’s settings.
133
Configurable settings include: l Age Time (Seconds) — The amount of time that
a dynamic ARP entry remains in the ARP table before aging out. l Response Time
(Seconds) — The amount of time, that the device waits for an ARP response to
an ARP request that it sends. l Retries — The number of attempts the switch
will send an ARP request if an ARP response isn’t received. This number
includes the initial ARP request. l Cache Size — The maximum number of entries
allowed in the ARP table. This number includes all static and dynamic ARP
entries.
134
l Dynamic Renew — Enable to allow the switch to automatically renew dynamic
ARP entries when they age out.
135
Routing
Araknis 920 switches support layer 3 routing to create routes between
interfaces and PIM-SM (sparse mode) for multicast traffic. IP IGMP Interface
Configuration Use this page to enable IGMP routing.
Configurable options include: l Enable — Enables IGMP on the device. l Router
Alert Check — Enable for the switch to inspect packets when they are being
forwarded, even though the packet is not directly addressed to this switch. l
Interfaces Enabled for IGMP — Displays the interfaces with IGMP
administratively enabled. l VLANs Enabled for IGMP — Displays the VLANs with
IGMP administratively enabled.
136
Interface Configuration Use this page to configure IGMP on a per-interface
level. Click the Options ( ) button to edit multiple interfaces at once, or
the Action button to edit a single interface. There’s also a toggle to quickly
enable or disable the IGMP settings on the interface.
Configurable options include: l Enable — Enables the administrative IGMP
settings on the interface. l Version — Select the IGMP version being used. l
Query Interval — Enter the amount of time the IGMP snooping querier on the
device should wait between sending periodic IGMP queries. l Max Response Time
— Enter the number of seconds the interface should wait after sending a query
if it does not receive a report for a particular group. The value should be
less than the Group Membership Interval. l Robustness — Enter the number of
times an IGMP query should be sent in case of packet loss. A higher value
increases the timeout time for multicast groups. l Startup Query Interval —
Enter an interval for the IGMP querier to send general inquiries at startup. l
Startup Query Count — Enter the number of queries to send at startup.
137
l Last Member Query Count — For IGMPv2, this is the number of group-specific
queries a querier sends after receiving a leave message. For IGMPv3, this is
the number of group-and-source-specific queries that a querier sends after
receiving a report that changes multicast source and group mappings.
l Last Member Query Interval — For IGMPv2, this is the interval a querier
sends group-specific queries after receiving a leave message. For IGMPv3, this
is the interval a querier sends group-and-source-specific queries after
receiving a report that changes multicast source and group mappings.
Summary This page displays a summary of the IGMP settings configured on each
interface. Use the Options ( ) button to refresh the table.
138
IP Multicast
Configuration Use this page to administratively enable IP multicast routing
globally.
PIM Configuration Use this page to administratively enable Protocol
Independent Multicast (PIM) globally.
Candidate Bootstrap Router Use this page to configure the Bootstrap Router
(BSR).
139
Configurable settings include: l Interface — Select the interface to
configure. l Hash Mask — Specify the hash mask length to use in BSR messages.
l BSR Priority — Specify the BSR priority to use in BSR messages. l C-BSR Adv.
Interval — Enter the BSR message transmission interval in seconds.
140
Candidate RP Configuration Use this page to configure a Candidate RP
(Rendezvous Point). Select an Interface from the dropdown, then click Options
( ), thenAdd to configure an RP.
Settings include: l Group Address — Enter the IP address of router interface.
l Group Mask — Enter the subnet mask fo the router interface. l C-RP Adv.
Interval — Enter the BSR message transmission interval in seconds.
Static RP Configuration Use this page to configure a Static RP (Rendezvous
Point). Click Options ( ), then Add to configure an RP.
Settings include: l RR Address — Enter the IP address of the router acting as
the RP for a group range. l Group Address — Enter the IP address of the router
interface. l Group Mask — Enter the subnet mask of the router interface. l
Override — Enable to allow the static RP to take precedence over auto-RP for
the group range.
141
Source Specific Multicast Configuration Use this page to configure a PIM
Source Specific Multicast Group. Click Options ( ), then Add to configure a
group. The new window asks for a Group Address and Group Mask.
142
Interface Configuration Use this page to configure multicast on a per-
interface level. Click the Options ( ) button to edit multiple interfaces at
once, or the Action button to edit a single interface. There’s also a toggle
to quickly enable or disable the IGMP settings on the interface.
Configurable options include: l Enable — Enables the PIM on the interface. l
BSR Border — Enable to prevent BSR messages from being sent or received
through the interface. l DR Priority — Enter a Designated Router (DR) priority
for the interface. The interface with the highest priority is elected DR. l
Hello Interval — Enter the frequency that PIM hello messages are sent on the
interface in seconds. l Join Prune Interval — Enter a Join/Prune Interval for
the specified interface.
143
IP Mutlicast Information
Elected Bootstrap Router This page displays information about the elected
Bootstrap Router (BSR).
RP Mapping This page displays information about the RP (Rendezvous Points) on
the switch. Use the Options ( ) button to refresh the page.
Multicast Route Table This page displays information about the multicast
routes on the switch. Use the Options ( ) button to refresh the page.
144
Router
Configuration Use this page to enable or disable the routing feature of the
switch.
Configurable settings include: l Routing Mode — Enable for the switch to act
as a Layer 3 device by routing packets between interfaces configured for IP
routing. l ICMP Echo Replies — Enable to allow the device to send ICMP Echo
Reply messages in response to ICMP Echo Request (ping) messages it receives. l
ICMP Redirects — Enable to allow the device to send ICMP Redirect messages to
hosts. An ICMP Redirect message notifies a host when a better route to a
particular destination is available on the network segment. l ICMP Rate Limit
Interval — Enter the maximum burst interval for ICMP error messages
transmitted by the switch. The rate limit for ICMP error messages is
configured as a token bucket. The ICMP Rate Limit Interval specifies how often
the token bucket is initialized with tokens of the size configured in the ICMP
Rate Limit Burst Size field. l ICMP Rate Limit Burst Size — Enter the number
of ICMP error messages that can be sent during the burst interval configured
in the ICMP Rate Limit Interval field.
145
l Static Route Preference — The default distance (preference) for static
routes. Lower route-distance values are preferred when determining the best
route. This value is used when using the CLI to configure a static route and
no preference is specified. Changing the Static Route Preference does not
update the preference of existing static routes.
l Global Default Gateway — The gateway IP address that the switch uses. If the
destination IP address in a packet does not match any routes in the routing
table, the packet is sent to the default gateway. The gateway specified in
this field is preferable to a default gateway learned from a DHCP server.
146
Interface Configuration Use this page to enable and configure routing on
specific interfaces. Each interface is disabled by default. Use the Options (
) button to add a VLAN, or the Action button in an interface row to configure
routing features. Each row has a toggle to quickly enable or disable the
interface.
Configurable options include: l Type — The type of interface being configured.
l Interface — The type of interface being configured. VLAN or Interface
(port). l Routing Mode — Enable to use the routing feature on the interface. l
Enable — Enables the port to forward traffic. l IP Address Configuration
Method — Select the method that the interfaces obtain an IP Address. Options
include: l None — The interface does not receive an IP address. l Manual —
Select this option to use the fields below to configure the interface’s IP
address and subnet mask. l DHCP –The interface automatically obtains an IP
address from the DHCP server.
147
l DHCP Client Identifier — Also known as Option 61, is used by DHCP clients to
specify their unique identifier. DHCP servers use this value to index their
database of address bindings. This value is expected to be unique for all
clients in an administrative domain. The Client Identifier string is displayed
beside the check box when DHCP is enabled on the port with the Client
Identifier option enabled. This web page must be refreshed once this change is
made.
l IP Address — Only available when the interface IP Address Configuration
Method is set to Manual.
l Subnet Mask — Only available when the interface IP Address Configuration
Method is set to Manual.
l IP MTU — Enter the largest IP packet size the interface can transmit, in
bytes. The Maximum Transmission Unit (MTU) is the maximum frame size minus the
length of the Layer 2 header.
l Bandwidth — Configure the bandwidth on the interface. This setting
communicates the speed of the interface to higher-level protocols.
l Encapsulation Type — The link layer encapsulation type for packets
transmitted from the interface. Ethernet is the only option.
l Forward Net Directed Broadcasts — Enable to forward network-directed
broadcasts. If this option is clear, network-directed broadcasts are dropped.
A network-directed broadcast is a broadcast directed to a specific subnet.
l Destination Unreachables — When enabled, the interface is allowed to send
ICMP Destination Unreachable message to a host if the intended destination
cannot be reached. If this option is clear, the interface does not send ICMP
Destination Unreachable messages.
l ICMP Redirects — When enabled, the interface is allowed to send ICMP
Redirect messages to notify a host when a better route to a particular
destination is available on the network segment. ICMP Redirects must be
enabled both globally, and on the interface, to work.
148
l Proxy ARP — Enable for the interface to be able to respond to an ARP request
for a host other than itself. An interface can act as an ARP proxy if it is
aware of the destination and can route packets to the intended host, which is
on a different subnet than the host that sent the ARP request.
l Local Proxy ARP — When enabled, the interface can respond to an ARP request
for a host other than itself. Unlike proxy ARP, local proxy ARP allows the
interface to respond to ARP requests for a host that is on the same subnet as
the host that sent the ARP request. This is useful when a host is not
permitted to reply to an ARP request from another host in the same subnet,
like when using the protected ports feature.
Statistics This page displays IP traffic counters.
IP Routing
Route Table This table displays information about routes on the switch. Use
the Options ( ) button to refresh the table.
Configured Routes Use this page to view and configure routes on the switch.
Click the Options ( ) button to add a new route.
149
Configurable settings include: l Route Type — Select one of the following
routes to configure: l Default — The route the device uses to send a packet if
the routing table does not contain a longer matching prefix for the packet’s
destination. The routing table can contain only one default route. l Static —
A manually added route. l Static Reject — A route where packets that match the
route are discarded instead of forwarded. The device might send an ICMP
Destination Unreachable message. l Network Address — Enter the IP route prefix
for the destination network. This IP address must contain only the network
portion of the address and not the host bits. When adding a default route,
this field must be 0.0.0.0. l Subnet Mask — Enter the IP subnet mask (also
known as the network mask or netmask) associated with the network address. The
subnet mask defines which portion of an IP address belongs to the network
prefix, and which portion belongs to the host identifier. When adding a
default route, this field must be 0.0.0.0. l Next Hop IP Address — Enter the
outgoing router IP address to use when forwarding traffic to the next router
(if any) in the path toward the destination. The next router is always an
adjacent neighbor or the IP address of the local interface for a directly
attached network. When adding a static reject route, this field must be
0.0.0.0 because the packets are dropped rather than forwarded.
150
l Preference — Enter a preference value for the route. A lower preference
value is a more preferred route. When the routing table has more than one
route to the same network, the device selects the route with the lowest route
preference.
IP Route Summary This page displays a summary of the IP routes and route table
counters the switch has collected.
QoS
Class of Service Class of Service (CoS) allows you to directly configure
certain aspects of switch queueing, which allows you to configure Quality of
Service (QoS) behavior when the complexities of DiffServ aren’t required. The
priority of a packet arriving at an interface 151
can be steered to the appropriate outbound CoS queue through a mapping table.
The CoS queue characteristics, such as minimum guaranteed bandwidth and
transmission rate shaping, are configurable at the queue or port level. IP
DSCP Use the IP DSCP Mapping Table to map an IP DSCP value to a Traffic Class.
Click the Action ( ) button to assign individual IP DSCP values to a Traffic
Class, or the Options button to assign multiple IP DSCP values to the same
Traffic Class. Click Apply, at the top of the page, when done.
152
Interface Use the table to apply an interface shaping rate to individual
interfaces or to all at once.
Click the Action ( ) button to edit individual interfaces, or the Options
button to edit multiple interfaces at once. Configurable settings include:
l Trust Mode — Select the Trust Mode for ingress traffic on the interface. The
options are: l Untrusted — The interface ignores all priority designations in
incoming packets and sends them to a traffic queue based on the ingress port’s
default priority. l Trust dot1p — The port accepts the designated 8021.p
priority encoded in the arriving packets. l Trust IP DSCP: The port accepts
the designated IP DSCP priority encoded in the arriving packets.
l Shaping Rate — The maximum amount of traffic that can leave an interface.
The specified value is a percentage of the maximum negotiated bandwidth.
Queue Use this page to designate what a queue does by configuring switch
egress queues. Configurable queue parameters include bandwidth allocations and
the scheduling of packet transmissions from the set of all queues on a port.
153
The Total Minimum Bandwidth Allocation is displayed as a percentage at the top
of the page. Use the Restore Default toggle or click Options ( ), then Refresh
to clear all configurations.
To configure CoS interface queues: 1. Select an Interface. This can be an
individual switchport or LAG.
154
2. Select an individual Queue ID by clicking the Action ( ) button in the
corresponding row or click the Options button to select multiple Queue IDs to
configure.
3. Enter a Minimum Bandwidth to allocate to the queue. Setting this value
higher than the maximum bandwidth automatically increases the maximum to the
same value. A value of zero means there is no guaranteed minimum.
Note: -__.The sum of individual Minimum Bandwidth values for all queues in the
selected interface cannot exceed 100.
4. Select one of the following options for Scheduler Type: l Weighted —
Weighted round robin associates a weight to each queue. l Strict — Services
traffic with the queue’s highest priority first. 5. Select one of the
following Queue Management Types:
l Taildrop — All packets on a queue are safe until congestion occurs. At this
point, any additional packets queued are dropped.
l WRED — Weighted Random Early Detection (WRED) drops packets selectively
155
based their drop precedence level.
6. Click Save and when the window closes, click the Apply button to save
changes. ACL Rules
Access Control Lists (ACLS) make sure that only authorized users have access
to specific resources and block unwanted attempts by filtering packets based
on rules. ACLs are used to control traffic flow, restrict the contents of
routing updates, decide which types of traffic to block or forward, and
provide network security. Pakedge MS switches support IPv4 and MAC ACLs. To
create an ACL, you must: 1. Create an ACL rule with an identifier (ACL ID) on
the Summary page. 2. Define the ACL rule. 3. Assign the ACL ID to a switch
port or VLAN interface.
156
Summary Use this page to configure Access Command List (ACL) Rules and enable
ACL Counters.
To add an ACL rule: 1. Click Options ( ), then Add. 2. Select an ACL Type: l
IPv4 Standard — Match criteria is based on the source address of IPv4 packets.
l IPv4 Extended — Match criteria can be based on the source and destination
addresses, source and destination Layer 4 ports, and protocol type of IPv4
packets. The ACL identifier can be an alphanumeric name instead of a number,
known as IPv4 Named in other switches. l IPv6 Named — Match criteria can be
based on information including the source and destination IPv6 addresses,
source and destination Layer 4 ports, and protocol type within IPv6 packets. l
Extended MAC — Match criteria can be based on the source and destination MAC
addresses, 802.1p user priority, VLAN ID, and EtherType value within Ethernet
frames.
157
3. Enter a number for the ACL Identifier. 4. Click Add, then Apply at the top
of the page.
Interfaces Use this page to add an ACL rule to an interface (port).
To add an ACL rule to a port: 1. Click Options ( ), then Add. 2. Select the
Interface (port) to apply the ACL rule to. 3. Select a Direction for the
packets to be checked against. If the packets should be
checked against the ACL rules when the port(s) receives it, select Inbound.
Select Outbound if the packets should be checked when the packets are exiting
the port (s).
158
4. Enter a Sequence Number between 1 to 4294967295. Typing 0 auto-generates a
sequence number. The order the ACL is applied to traffic on the interface
relative to other ACLs associated with the interface in the same direction.
When multiple ACLs are applied to the same interface in the same direction,
the ACL with the lowest sequence number is applied first, and the other ACLs
are applied in ascending numerical order.
5. Select the ACL Identifier of the ACL rule to apply to the port(s). 6.
Click Add, then Apply at the top of the page.
159
VLANs Use this page to associate one or more ACLs with one or more VLANs
configured on the switch.
To Apply an ACL to a VLAN: 1. Click the Options ( ) button, then Add. 2.
Select the VLAN ID or VLAN ID range to apply the ACL rule to. 3. Select a
Direction for the packets to be checked against. If the packets should be
checked against the ACL rules when the port(s) receives it, select Inbound.
Select Outbound if the packets should be checked when the packets are exiting
the port (s). 4. Enter a Sequence Number between 1 to 4294967295. Typing 0
auto-generates a sequence number. The order the ACL is applied to traffic on
the interface relative to other ACLs associated with the interface in the same
direction. When multiple ACLs are applied to the same interface in the same
direction, the ACL with the lowest sequence number is applied first, and the
other ACLs are applied in ascending numerical order. 5. Select the ACL
Identifier of the ACL rule to apply to the port(s). 6. Click Add, then Apply
at the top of the page.
160
Control Plane Use this page to assign Sequence Numbers to ACLs.
To assign a Sequence Number to an ACL: 1. Click Options ( ), then Add to add
open a new Contorl Plane window. 2. Enter a Sequence Number between 1 and
4294967295 to indicate the position of
the rule in the ACL. Type in 0 to auto-generate a sequence number. 3. Select
an ACL Identifier to apply the Sequence Number to. After a Control Plane has
been added you can use the Action button to edit or delete an entry from the
table.
161
Statistics Use this page to view how many packets an ACL has forwarded or
discarded until the number reaches the rollover value of the counter. ACL
counters do not interact with DiffServ policies or policy-based routing
counters. To Clear the Counters:
1. Click the Options ( ) button, then Clear. 2. Select a Clear Counter Mode.
If Rule counter is selected, ACL Identifier and Sequence Number must be
provided. If clear ACL counter is selected, the user can provide ACL Type to
clear the hit count of all ACLs in that type or provide an ACL Identifier to
clear the hit count of that ACL. 3. Click OK.
Table field descriptions: l Sequence Number — The number that indicates the
rule position within the ACL. l Perform Action — Whether the rule permits or
denies traffic. l Match Conditions — The criteria used to determine if the
network traffic matches the ACL rule.
162
l Rule Attributes — Each action the ACL rule performs. l Hit Count — The
number of packets that match the ACL rule.
If a rule does not have a rate limit, the hit count is the number of matched
packets the port forwarded or discarded. If a rule has a rate limit, and the
sent traffic exceeds the configured rate, the hit count displays the matched
packet count equal to the sent rate. If the sent traffic rate is less than the
configured rate, the hit count displays only the matched packet count. ACL
Configuration IPv4 Standard Use this page to configure IPv4 Standard ACLs.
Select an ACL Identifier from the dropdown, then click the Options ( ) button
to edit or Resequence multiple ACLs or the Actions button to edit a single
ACL.
Configurable settings include: l Perform Action — The action to take when a
packet or frame matches the criteria in the rule: l Permit — The packet or
frame is forwarded. l Deny — The packet or frame is dropped. l Remark –
Accepts alpha-numeric and special characters (-, _, and space) and is also
case-sensitive. It can have 1 to 100 characters.
163
l Every — When selected, all packets will match the rule and are either
permitted or denied. This option is exclusive to all other match criteria and
no other match criteria can be configured. To configure specific match
criteria, do not enable Every.
l Source IP Address — The source port IP address in the packet and source IP
wildcard mask (in the next field) to compare to the IP address in a packet
header.
l Source Wildcard Mask — Wildcard masks determine which bits in the IP address
are used and which are ignored. A wildcard mask of 255.255.255.255 indicates
that no bit is important. A wildcard of 0.0.0.0 indicates that all the bits
are important. Wildcard masking for ACLs operates like the inverse of a subnet
mask. With a subnet mask, the mask has ones (1’s) in the bit positions used
for the network address, and zeros (0’s) for the bit positions that are not
used. In contrast, a wildcard mask has (0’s) in a bit position that must be
checked. A ‘1’ in a bit position of the ACL mask indicates the corresponding
bit can be ignored. This field is required when you configure a source IP
address.
l Assign Queue — The number that identifies the hardware egress queue that
will handle all packets that match this rule.
l Interface — Select an interface (port) to associate with the rule. l
Interface Action — Select one of the following options:
l Redirect Redirects traffic that meets the rule to the selected interface
instead of being processed on the original port.
l Mirror Mirrors (copies) traffic that matches the rule to the selected
interface.
l Log — Enables logging for the ACL rule (subject to resource availability in
the device). If the Access List Trap Flag is also enabled, periodic traps are
generated indicating the number of times this rule went into effect during the
current report interval. A fixed five-minute report interval is used for the
entire system. A trap is
164
not issued if the current interval’s ACL rule hit count is zero. l Time Range
Name — The name of the time range that imposes a time limitation
on the ACL rule, up to 31 characters. If a time range with the specified name
does not exist, and the ACL containing this ACL rule is associated with an
interface, the ACL rule is applied immediately. If a time range with the
specified name exists, and the ACL containing this ACL rule is associated with
an interface, the ACL rule is applied when the time range with the specified
name becomes active. The ACL rule is removed when the time range with the
specified name becomes inactive. l Committed Rate — The allowed transmission
rate for packets on the interface. l Burst Size — The number of bytes allowed
in a temporary traffic burst.
165
IPv4 Extended Use this page to configure IPv4 Extended ACLs. Select an ACL
Identifier from the dropdown, then click the Options ( )button to edit or
Resequence multiple ACLs or the Actions button to edit a single ACL.
Configurable settings include: l Sequence — The position of a rule within the
ACL. If the sequence number is not specified during rule creation, the rule is
automatically assigned a sequence number after it is added to the ACL. The
rules are displayed based on their position within the ACL, which can be
renumbered. Packets are checked against the rule criteria in order, from the
lowest-numbered rule to the highest. When the packet matches the criteria in a
rule, it is handled according to the rule action and attributes. If no rule
matches a packet, the packet is discarded based on the implicit deny all rule,
which is the final rule in every ACL. l Perform Action — The action to take
when a packet or frame matches the criteria in the rule: l Permit — The packet
or frame is forwarded. l Deny — The packet or frame is dropped. l Remark –
Accepts alpha-numeric and special characters (-, _, and space) and is also
case-sensitive. It can have 1 to 100 characters. l Every — When selected, all
packets will match the rule and are either permitted or denied. This option is
exclusive to all other match criteria and no other match criteria can be
configured. To configure specific match criteria, do not enable
166
Every. l Protocol – The IANA-assigned protocol to match within the IP packet.
l Fragments — IP ACL rule to match on fragmented IP packets. l Source IP
Address — The source port IP address in the packet and source IP
wildcard mask (in the next field) to compare to the IP address in a packet
header. l Source Wildcard Mask — Wildcard masks determine which bits in the IP
address
are used and which are ignored. A wildcard mask of 255.255.255.255 indicates
that no bit is important. A wildcard of 0.0.0.0 indicates that all the bits
are important. Wildcard masking for ACLs operates like the inverse of a subnet
mask. With a subnet mask, the mask has ones (1’s) in the bit positions used
for the network address, and zeros (0’s) for the bit positions that are not
used. In contrast, a wildcard mask has (0’s) in a bit position that must be
checked. A ‘1’ in a bit position of the ACL mask indicates the corresponding
bit can be ignored. This field is required when you configure a source IP
address. l Source L4 Port Option — The TCP/UDP source port to match in the
packet header. Select Equal, Not Equal, Less Than, Greater Than, or Range and
specify the port number or keyword in Source L4 Port Value. l Source L4 Port
Value — TCP port keywords include BGP, Domain, Echo, FTP, FTP Data, HTTP,
SMTP, Telnet, POP2, and POP3. UDP port keywords include Domain, Echo, NTP,
RIP, SNMP, TFTP, TIME, and WHO. If it is not a keyword, it must be a string
between 0 and 65535. l Source L4 Port Range Upper Bound — TCP port keywords
include BGP, Domain, Echo, FTP, FTP Data, HTTP, SMTP, Telnet, POP2, and POP3.
UDP port keywords include Domain, Echo, NTP, RIP, SNMP, TFTP, TIME, and WHO.
If it is not a keyword, it must be a string between 0 and 65535.
167
l Destination IP Address — The destination port IP address in the packet and
destination IP wildcard mask (in the next field) to compare to the IP address
in a packet header.
l Destination Wildcard Mask — Wildcard masks determine which bits in the IP
address are used and which are ignored. A wildcard mask of 255.255.255.255
indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all
the bits are important. Wildcard masking for ACLs operates like the inverse of
a subnet mask. With a subnet mask, the mask has ones (1’s) in the bit
positions used for the network address, and zeros (0’s) for the bit positions
that are not used. In contrast, a wildcard mask has (0’s) in a bit position
that must be checked. A ‘1’ in a bit position of the ACL mask indicates the
corresponding bit can be ignored. This field is required when you configure a
source IP address.
l Destination L4 Port Option — The TCP/UDP destination port to match in the
packet header. Select Equal, Not Equal, Less Than, Greater Than, or Range and
specify the port number or keyword in Source L4 Port Value.
l Destination L4 Port Value — TCP port keywords include BGP, Domain, Echo,
FTP, FTP Data, HTTP, SMTP, Telnet, POP2, and POP3. UDP port keywords include
Domain, Echo, NTP, RIP, SNMP, TFTP, TIME, and WHO. If it is not a keyword, it
must be a string between 0 and 65535.
l DestinationL4 Port Range Upper Bound — TCP port keywords include BGP,
Domain, Echo, FTP, FTP Data, HTTP, SMTP, Telnet, POP2, and POP3. UDP port
keywords include Domain, Echo, NTP, RIP, SNMP, TFTP, TIME, and WHO. If it is
not a keyword, it must be a string between 0 and 65535.
l TTL Field Value — IP ACL rule to match on the specified TTL field value. l
IGMP Type — The IP ACL rule to match on the specified IGMP type. This option
is
available only if the protocol is IGMP.
168
l ICMP Type — The IP ACL rule to match on the specified ICMP type. This option
is available only if the protocol is ICMP.
l ICMP Code — The IP ACL rule to match on the specified ICMP code. This option
is available only if the protocol is ICMP.
l ICMP Message — IP ACL rule to match on the ICMP message type and code.
Select one of the following supported ICMP messages: Echo, Echo-Reply, Host-
Redirect, Mobile-Redirect, Net-Redirect, Net-Unreachable, Redirect, Packet-
Too-Big, PortUnreachable, Source-Quench, Router-Solicitation, Router-
Advertisement, TimeExceeded, TTL-Exceeded, and Unreachable. This option is
available only if the protocol is ICMP.
l TCP Flags — The IP ACL rule to match on the TCP flags. When a + flag is
specified, a match occurs if the flag is set in the TCP header. When a – flag
is specified, a match occurs if the flag is not set in the TCP header. When
Established is specified, a match occurs if either RST or ACK bits are set in
the TCP header. This option is available only if the protocol is TCP.
l IP DSCP — Matches the packet IP DiffServ Code Point (DSCP) value to the
rule. The DSCP value is defined as the high-order six bits of the Service Type
octet in the IP header. This field can be a keyword or a string between 0 –
63.
l IP Precedence — Matches the IP Precedence value to the rule. The IP
Precedence field in a packet is defined as the high-order three bits of the
Service Type octet in the IP header.
l IP TOS Bits — Matches on the Type of Service (TOS) bits in the IP header.
The IP TOS field in a packet is defined as all eight bits of the Service Type
octet in the IP header. For example, to check for an IP TOS value having bits
7 and 5 set and bit 1 clear, where bit 7 is most significant, use a TOS Bits
value of 0xA0 and a TOS Mask of 0xFF. Requires the bits in a packet’s TOS
field to match the two-digit hexadecimal number entered in this field.
169
l IP TOS Wildcard Mask — The bit positions that are used for comparison
against the IP TOS field in a packet. Specifying TOS Mask is optional. The
format would be the same as IP TOS Bits: two-digit hexadecimal numbers.
l Assign Queue — The number that identifies the hardware egress queue that
will handle all packets matching this rule.
l Interface — Select an interface (port) to associate with the rule. l
Interface Action — Select one of the following options:
l Redirect Redirects traffic that meets the rule to the selected interface
instead of being processed on the original port.
l Mirror Mirrors (copies) traffic that matches the rule to the selected
interface.
l Log — Enables logging for the ACL rule (subject to resource availability in
the device). If the Access List Trap Flag is also enabled, periodic traps are
generated indicating the number of times this rule went into effect during the
current report interval. A fixed five-minute report interval is used for the
entire system. A trap is not issued if the current interval’s ACL rule hit
count is zero.
l Time Range Name — The name of the time range that imposes a time limitation
on the ACL rule, up to 31 characters. If a time range with the specified name
does not exist, and the ACL containing this ACL rule is associated with an
interface, the ACL rule is applied immediately. If a time range with the
specified name exists, and the ACL containing this ACL rule is associated with
an interface, the ACL rule is applied when the time range with the specified
name becomes active. The ACL rule is removed when the time range with the
specified name becomes inactive.
l Committed Rate — The allowed transmission rate for packets on the interface.
l Burst Size — The number of bytes allowed in a temporary traffic burst.
170
IPv6 Named Use this page to configure IPv6 Extended ACLs. Select an ACL
Identifier from the dropdown, then click the Options ( ) button to edit or
Resequence multiple ACLs or the Actions button to edit a single ACL.
Configurable options include: l Sequence — The position of a rule within the
ACL. If the sequence number is not specified during rule creation, the rule is
automatically assigned a sequence number after it is added to the ACL. The
rules are displayed based on their position within the ACL, which can be
renumbered. Packets are checked against the rule criteria in order, from the
lowest-numbered rule to the highest. When the packet matches the criteria in a
rule, it is handled according to the rule action and attributes. If no rule
matches a packet, the packet is discarded based on the implicit deny all rule,
which is the final rule in every ACL. l Perform Action — The action to take
when a packet or frame matches the criteria in the rule: l Permit — The packet
or frame is forwarded. l Deny — The packet or frame is dropped. l Remark –
Accepts alpha-numeric and special characters (-, _, and space) and is also
case-sensitive. It can have 1 to 100 characters. l Every — When selected, all
packets will match the rule and are either permitted or denied. This option is
exclusive to all other match criteria and no other match criteria can be
configured. To configure specific match criteria, do not enable
171
Every. l Protocol – Enter the IANA-assigned protocol to match within the IP
packet. l Fragments — IP ACL rule to match on fragmented IP packets. l Source
Prefix — The IPv6 prefix combined with IPv6 prefix length of the network or
host from which the packet is being sent. l Source Prefix Length — To indicate
a destination host, specify an IPv6 prefix length
of 128. l Source L4 Port Option — The TCP/UDP destination port to match in the
packet
header. Select Equal, Not Equal, Less Than, Greater Than, or Range and specify
the port number or keyword in Source L4 Port Value. l Source L4 Port Value —
TCP port keywords include BGP, Domain, Echo, FTP, FTP Data, HTTP, SMTP,
Telnet, POP2, and POP3. UDP port keywords include Domain, Echo, NTP, RIP,
SNMP, TFTP, TIME, and WHO. If it is not a keyword, it must be a string between
0 and 65535. l Source L4 Port Range Upper Bound — TCP port keywords include
BGP, Domain, Echo, FTP, FTP Data, HTTP, SMTP, Telnet, POP2, and POP3. UDP port
keywords include Domain, Echo, NTP, RIP, SNMP, TFTP, TIME, and WHO. If it is
not a keyword, it must be a string between 0 and 65535. l Destination Prefix —
The IPv6 prefix combined with the IPv6 prefix length to compare to a packet’s
destination IPv6 address as a match criteria for the IPv6 ACL rule. l
Destination Prefix Length — To indicate a destination host, specify an IPv6
prefix length of 128. l Destination L4 Port Option — The TCP/UDP destination
port to match in the packet header. Select Equal, Not Equal, Less Than,
Greater Than, or Range and specify the port number or keyword in Source L4
Port Value.
172
l Destination L4 Port Value — TCP port keywords include BGP, Domain, Echo,
FTP, FTP Data, HTTP, SMTP, Telnet, POP2, and POP3. UDP port keywords include
Domain, Echo, NTP, RIP, SNMP, TFTP, TIME, and WHO. If it is not a keyword, it
must be a string between 0 and 65535.
l DestinationL4 Port Range Upper Bound — TCP port keywords include BGP,
Domain, Echo, FTP, FTP Data, HTTP, SMTP, Telnet, POP2, and POP3. UDP port
keywords include Domain, Echo, NTP, RIP, SNMP, TFTP, TIME, and WHO. If it is
not a keyword, it must be a string between 0 and 65535.
l TTL Field Value –IP ACL rule to match on the specified TTL field value. l
ICMP Type — The IP ACL rule to match on the specified ICMP type. This option
is
available only if the protocol is ICMP. l ICMP Code — The IP ACL rule to match
on the specified ICMP code. This option is
available only if the protocol is ICMP. l ICMP Message — IP ACL rule to match
on the ICMP message type and code. Select
one of the following supported ICMP messages: Echo, Echo-Reply, Host-Redirect,
Mobile-Redirect, Net-Redirect, Net-Unreachable, Redirect, Packet-Too-Big,
PortUnreachable, Source-Quench, Router-Solicitation, Router-Advertisement,
TimeExceeded, TTL-Exceeded, and Unreachable. This option is available only if
the protocol is ICMP. l TCP Flags — The IP ACL rule to match on the TCP flags.
When a + flag is specified, a match occurs if the flag is set in the TCP
header. When a – flag is specified, a match occurs if the flag is not set in
the TCP header. When Established is specified, a match occurs if either RST or
ACK bits are set in the TCP header. This option is available only if the
protocol is TCP. l Flow Label — A 20-bit number that is unique to an IPv6
packet, used by end stations to signify quality-of-service handling in
routers. This value must be between 0 – 1048575.
173
l IP DSCP — Matches the packet IP DiffServ Code Point (DSCP) value to the
rule. The DSCP value is defined as the high-order six bits of the Service Type
octet in the IP header. This field can be a keyword or a string between 0 –
63.
l Routing — IPv6 ACL rule to match on routed packets. l Assign Queue — The
number that identifies the hardware egress queue that will
handle all packets matching this rule. l Interface — Select an interface
(port) to associate with the rule. l Interface Action — Select one of the
following options:
l Redirect — Redirects traffic that meets the rule to the selected interface
instead of being processed on the original port.
l Mirror — Mirrors (copies) traffic that matches the rule to the selected
interface.
l Log — Enables logging for the ACL rule (subject to resource availability in
the device). If the Access List Trap Flag is also enabled, periodic traps are
generated indicating the number of times this rule went into effect during the
current report interval. A fixed five-minute report interval is used for the
entire system. A trap is not issued if the current interval’s ACL rule hit
count is zero.
l Time Range Name — The name of the time range that imposes a time limitation
on the ACL rule, up to 31 characters. If a time range with the specified name
does not exist, and the ACL containing this ACL rule is associated with an
interface, the ACL rule is applied immediately. If a time range with the
specified name exists, and the ACL containing this ACL rule is associated with
an interface, the ACL rule is applied when the time range with the specified
name becomes active. The ACL rule is removed when the time range with the
specified name becomes inactive.
l Committed Rate — The allowed transmission rate for packets on the interface.
l Burst Size — The number of bytes allowed in a temporary traffic burst.
174
Extended MAC Use this page to configure MACExtended ACLs. Select an ACL
Identifier from the dropdown, then click the Options ( ) button to edit or
Resequence multiple ACLs or the Actions button to edit a single ACL.
Configurable options include: l Sequence Number — The position of a rule
within the ACL. If the sequence number is not specified during rule creation,
the rule is automatically assigned a sequence number after it is added to the
ACL. The rules are displayed based on their position within the ACL, which can
be renumbered. Packets are checked against the rule criteria in order, from
the lowest-numbered rule to the highest. When the packet matches the criteria
in a rule, it is handled according to the rule action and attributes. If no
rule matches a packet, the packet is discarded based on the implicit deny all
rule, which is the final rule in every ACL. l Perform Action — The action to
take when a packet or frame matches the criteria in the rule: l Permit — The
packet or frame is forwarded. l Deny — The packet or frame is dropped. l
Remark – Accepts alpha-numeric and special characters (-, _, and space) and is
also case-sensitive. It can have 1 to 100 characters. l Every — When selected,
all packets will match the rule and are either permitted or denied. This
option is exclusive to all other match criteria and no other match criteria
can be configured. To configure specific match criteria, do not enable
175
Every. l Class of Service — The 802.1p user priority value to match within the
Ethernet
frame. l EtherType — The EtherType value to match in an Ethernet frame.
Specify the
number associated with the EtherType or specify one of the following keywords:
appletalk, arp, ibmsna, ipv4, ipv6, IPX, mplsmcast, mplsucast, netbios,
novell, pppoe, or rarp. l Source MAC Address — The MAC address to match to an
Ethernet frame’s source port MAC address. If desired, enter the MAC Mask
associated with the source MAC to match. l Source MAC Mask — The MAC address
mask specifies which bits in the source MAC to compare against an Ethernet
frame. Use F’s and zeros in the MAC mask, which is in a wildcard format. An F
means that the bit is not checked, and a zero in a bit position means that the
data must equal the value given for that bit. For example, if the MAC address
is aa:bb:cc:dd:ee:ff, and the mask is 00:00:ff:ff:ff:ff, all MAC addresses
with aa:bb:xx:xx:xx:xx result in a match (where x is any hexadecimal number).
l Destination MAC Address — The MAC address to match t
References
- OvrC
- ctrl4.co/techsupport
- Policies
- snp1.co/tc
- snp1.co/techsupport
- OvrC Cloud Management for Residential & IT Integrators
- tech.control4.com/s/article/Spanning-Tree-Best-Practices
- tech.control4.com/s/article/Understanding-Multicast-IGMP
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>