Araknis Networks 920 Series Managed Switch User Guide

June 11, 2024
araknis NETWORKS

Araknis Networks 920 Series Managed Switch

Specifications

  • Model: AN-920-SW-F-12-POE, AN-920-SW-F-24-POE
  • Ethernet ports: 12 or 24
  • Total possible QSFP28 ports: 1 with QSFP28 module (12 ports) or 2 with QSFP28 modules (24 ports)
  • Total possible PoE budget (Watts):
    • AN-920-SW-F-12-POE: 750 with 1 power module, 1080 with 2 power modules
    • AN-920-SW-F-24-POE: 750 with 1 power module, 1650 with 2 power modules

Product Usage Instructions

1. Unboxing:

The package contains:

  • Switch
  • Rubber feet for flat surfaces (4)
  • Rack mount kit: ears (2), screws (8)
  • Quick Start QR card
  • AC power cord
  • Power module

2. Install the Modules:

Caution: The switch must be powered off when installing QSFP28 modules.

Note: To remove the power module, push the tab toward the handle and pull the module straight back.

3. Installing the Switch:

Caution: To avoid possible interference or damage, do not stack equipment on top of the switch.

Rack Mounting Guidelines:

  • Ensure proper airflow through the rack.
  • Adjust leveling feet or casters to make contact with the supporting surface.
  • Load heavier equipment at the bottom of the rack.
  • Ground the rack and ensure surge protection for equipment.

4. Connections:

Caution: All router and switch connections should be on network ports, not the management port.

5. PoE Budgeting:

Total PoE device consumption = 47

6. LED States:

RJ45 Ports:

  • LED 10G/PoE Link/Act:
    • Blinking: The port is negotiated at 10 Gbps and/or providing PoE*
    • Off: The port is not negotiated at 10 Gbps and/or providing PoE*
    • Blinking: Packets are flowing through the port
    • Off: The port does not detect connection or is disabled

*Configurable in the web interface

7. QSFP28 Module LEDs:

  • LED 100G: Blinking – The port is negotiating at 100 Gbps and passing traffic, Off – The port does not detect a connection or is disabled
  • LED 50/25G: Blinking – The port is negotiating at 50-25 Gbps and passing traffic, Off – The port does not detect a connection or is disabled

8. Configuration:

Araknis switches can be configured through OvrC or the local interface. The local interface is accessible using OvrC’s
WebConnect feature, typing the switch’s DHCP address into your browser’s address bar, or using the switch’s default IP address.

FAQs

  • Q: How do I access the switch’s local interface?
    • A: You can access the local interface by using OvrC’s WebConnect feature, typing the switch’s DHCP address into your browser’s address bar, or using the switch’s default IP address.
  • Q: Can I stack equipment on top of the switch?
    • A: To avoid possible interference or damage, do not stack equipment on top of the switch.

“`

AN-920-SW
920 Series Managed Switch Quick Start Guide
Welcome to Araknis NetworksTM
Thank you for choosing an Araknis 920 series managed switch. With multi- gigabit connectivity on all network ports, updated modern aesthetics, and a managed interface, the Araknis 920 series switch is a sleek and highly capable addition to any network.

Series overview

Each 920 series switch comes with a power module in the box. QSFP28 and additional power modules are sold separately.

Model AN-920-SW-F-12-POE AN-920-SW-F-24-POE

Ethernet ports

Total possible QSFP28 ports

1 with QSFP28

12

module

(sold separately)

2 with QSFP28

24

modules

(sold separately)

Total possible PoE budget (Watts) 750 with 1 power module
1080 with 2 power modules 750 with 1 power module
1650 with 2 power modules

1

Unboxing
The package contains:

Switch

Rubber feet for flat surfaces (4)

Rack mount kit: ears (2), screws
(8)

Quick Start QR card

AC power cord

Power module

2

Install the modules

Caution: -.The switch must be powered off when installing QSFP28 modules.

Power module

QSFP28 module

Note: -__.To remove the power module, push the tab toward the handle and pull the module straight back.
Caution: -.Do not use a Y power cable. Sometimes called a Y splitter cable. Pro Tip: -_Connect each power module to separate circuits in the same phase. Use a
separate UPS for each power cable.
3

Installing the switch
Rack mount

Shelf mount

Caution: -.To avoid possible interference or damage, do not stack equipment on top of the switch.
Rack mounting guidelines
l The maximum ambient temperature of the space the switch is installed in should not exceed 122°F/50°C.
l There should be air flowing through the rack. l Make sure all the leveling feet or casters are adjusted correctly and they come in
contact with the supporting surface. Always load heavier equipment at the bottom of the rack. l Make sure the rack is grounded and the equipment is surge protected.
4

l Do not overload the power equipment or the switch. Read our WattBox Best Practices for more information.
5

Connections

Caution: -.All router and switch connections should be on network ports. Not the management port.
QSFP28 ports
The QSFP28 (Quad Small Form-Factor Pluggable Plus) ports support up to a 100Gbps connection and are typically used to connect switches.
6

PoE Budgeting

Total PoE device consumption = 47

Model AN-920-SW-R-12-POE AN-920-SW-R-24-POE

Total PoE budget (Watts)
750 with 1 power module 1080 with 2 power modules 750 with 1 power module 1650 with 2 power modules

Remaining PoE budget (Watts) 703 1033 703 1603

7

LED States
RJ45 ports

LED 10G/PoE Link/Act

LED state Blinking Off Blinking Off

Description The port is negotiated at 10 Gbps and/or providing PoE The port is not negotiated at 10 Gbps and/or providing PoE Packets are flowing through the port The port does not detect connection or the port is disabled

*Configurable in the web interface

8

QSFP28 module LEDs

LED 100G 50/25G

LED state Blinking Off
Blinking
Off

Description
The port is negotiating at 100 Gbps and passing traffic The port does not detect a connection or is disabled The port is negotiating at 50-25 Gbps and passing traffic The port does not detect a connection or is disabled

9

Configuration
Araknis switches can be configured through OvrC or the local interface. The local interface is accessible using OvrC’s WebConnect feature, typing the switch’s DHCP address into your browser’s address bar, or using the switch’s default IP address.
Note: -__.Only features in the local UI are supported by Snap One.

Configuring the switch in OvrC
OvrC provides Wi-Fi management, remote device management, real-time notifications, and intuitive customer management, using your computer or mobile device. Setup is plug-and-play, with no port forwarding or DDNS address required.
To add this device to your OvrC account: 1. Connect the switch to the internet. 2. Log into OvrC (www.ovrc.com). 3. Scan the site using an OvrC Pro
device or add the switch manually by entering the MAC address and Service Tag.

Logging in to the local interface

Log into the switch using the default credentials. You must update the credentials after initial login.

Username Password

araknis araknis

10

Other access methods: DHCP IP address
The switch is configured to DHCP by default so that the DHCP server can assign an IP address when the switch is connected to the network (the DHCP server is usually the router). This address can be used for accessing the web interface. Use one of these methods to find the IP address of the switch:
l Check the device list in OvrC. l Check the client table on your router. l Use a network scanner (e.g. Fing) to scan the network. The
Araknis switch manufacturer field displays SnapAV. See the highlighted field in the Fing screenshot to the right for an example of an Araknis device being identified.
11

Accessing the switch using the default IP Address
If the switch is not given an IP address on the network or needs to be accessed while not connected to a network, you can configure your computer’s network connection to access the switch using the default IP address, 192.168.20.254, while connected to the MGMT port.
Note: -__.You must connect your computer to the MGMT port to connect to the switch using its default IP address.
12

1. Connect your PC to the switch using an Ethernet cable.
2. Open the Control Panel and click Network and Internet. 13

3. Click Network and Sharing Center. 4. Click Change adapter settings. 14

5. Right-click the icon for the wired network connection, then left-click Properties.
6. Select Internet Protocol Version 4 (TCP/IPv4), then click Properties. 15

7. In the General tab, click Use the following IP address: and enter the IP address and subnet mask, then click OK.

IP Address Subnet Mask

192.168.20.253 255.255.255.252

16

8. Open a browser and navigate to https://192.168.20.254/. Log in using the default credentials:

Username Password

araknis araknis

9. After configuring the switch, set your computer’s IPv4 Properties back to Obtain an IP address automatically, then click OK.

17

18

Reset Procedures
The reset button is on the front of the switch.

Reset button action Hold for 1-9 seconds Hold for 10-19 seconds
Hold for more than 20 seconds

Front LED State Blinking slowly
Blinking moderately
Blinking rapdily

Description
Restarts the switch Resets the login credentails to defaults Resets the switch to factory defaults

Status

System
This page provides an overview of the switch’s configuration.

19

Field descriptions: l System Name — This is the name that the switch appears under when it is identified on the network. This field can be changed under Settings > System. l Model Number — Use this field to verify the switch’s model number. Notated as AN (Araknis) ­ SW (switch) ­ R/F (rear or front- facing ports) ­ X (the number of RJ-45 ports the switch has) -POE (Power-over- Ethernet). l Service Tag — A unique identifying number that is used to add the switch to OvrC, manually. l Firmware Version — Displays the firmware version installed on the switch. Use OvrC to verify if the switch is up to date and update the switch if it isn’t. l MAC Address — A unique identifier that appears in network scans. This address is required if the switch is being manually added to OvrC. l Device IP Address — Displays the IP address of the switch. l Gateway — Displays the IP address of the router. l Active Interface — The number of ports that detect a connection compared to the total number of ports on the switch.
20

l PoE Budget — The amount of Power-over-Ethernet being currently used on the switch.
Pro Tip: -_Do not use more than 80% of the total budget. When calculating the budget, use the total possible amount of power the connected devices may draw.
l Chassis Fans — Shows the rotations per minute (RPM) of the fan and gauge how high the use of the fans is, in parenthesis. Low, Medium, High, Max, or OTP (Over Temperature Protection). The switch stays in OTP until the system temperature falls within the normal range.
l VLANs in Database — Displays the number of VLANs that are configured on the switch.
l STP — Provides details about the Spanning Tree Protocol (STP) configuration on the switch. See Switching > Spanning Tree Protocol for more information.
l IGMP — Provides details about the Internet Group Management Protocol (IGMP) configuration on the switch. See Switching > IGMP Snooping for more information.
l L3 Interfaces — Displays the DHCP servers the switch is interacting with.
21

Ports
This page provides information about specific switchport configurations. Refresh the page to update the page.
l Interface — The number assigned to the port of the switch. The SFP ports are always the last two ports.
l Name — The assignable name for the port. Edit the name at Settings > Ports > General.
l Link Status — Displays the connection speed between the switch and the connected device. If there is no connection status is “down.”
l IP Address (LLDP) — The IP address of the connected device, learned using LLDP. l MAC Address — The MAC address of the device connected to the port. l Up Time (D:H:M) — The amount of time the switch has detected a connection to
the device in Days:Hours:Minutes. l PoE — The amount of PoE power the switch is delivering to the connected device. l VLAN — The VLAN ID assigned to the port.
22

l TX/s — The number of bytes, in seconds, being transmitted on the port. l RX/s — The number of bytes, in seconds, being received on the port.
Settings
System
Use this page to update the general configuration of the switch. Below are the configurable settings and best practices. Click the Apply button at the top of the page to save changes. Edit Password
Pro Tip: -_Strong passwords are long and unrelated to the client’s public details. For example, thepepperonipizzas is stronger and easier to remember than P@ssword or thesmiths.
Edit Username
23

There is only one configurable user for switch access. The username should be unique and standardized across all devices. General Device Information
l Friendly Name — Give a name that makes the switch easily identifiable. Such as “Core Switch – Rack.”
l Device Location — Enter where the switch is located. l System Name — This is the name that the switch appears under during network
scans by other applications. This name should be unique to the switch. l Device Notes — Enter additional configuration notes that wouldn’t be displayed on
the Status > System page. Such as what a VLAN is being used for on this switch. Pro Tip: -_If you’re using OvrC, these notes should be entered there as well. LEDs
This setting determines the behavior of the 10G/PoE LED on the front of the switch. Options include: 24

l Max Speed — Illuminates if the connection to the device is at the maximum possible speed.
l PoE — Illuminates if the switch is providing power to the connected device. l Disabled — Turns the LED off. Pro Tip: -_The LED Behavior should be standardized across all switch installations. Be
sure to leave notes about the LED Behavior If it’s not standardized. Adjust Time Zone
Configure the Time Zone that the switch is physically installed under. LAN
Pro Tip: -_Leave the switch as DHCP and make a MAC or IP reservation in the router. Use the Mode drop-down to set the switch to a Static IP address.
25

Service Port These settings allow you to change the IP address of the 920 switch’s Service Port. Use the Service Port to access the switch’s local user interface if you can no longer reach it from the LAN.
The default settings are: l IP Address — 192.168.20.254 l Subnet Mask — 255.255.255.252 l Gateway — 0.0.0.0 Pro Tip: -_If you change these settings make sure you notate them in a secure and easy-to-remember location. Like OvrC Notes.
Ports
Port Summary Use this page to quickly edit port settings. Note: -__.EEE (Energy Efficient Ethernet) is turned off by default and cannot be turned on via local UI.
26

Click the Enable toggle to enable or disable a port. Use the Options ( ) button to select multiple ports for configuration or the Action button to edit an individual port. Configurable settings appear in the Edit Port Configuration window.
Click the Apply button at the top of the page to save changes. Configurable settings include:
27

l Enable — Toggle to allow traffic to pass through the port. Disable the port to prevent someone from plugging additional devices into the switch or to troubleshoot potential issues with a connected device.
l Name — Enter an easily identifiable name for the device connected to the port. l Physical Mode — Configure the port speed and duplex mode.
l Auto Negotiate — Advertises the duplex mode and speed for an autonegotiation process with the device connected to the port. Click the “x” on the speed and duplex modes you do not want the switch to advertise.
l Speed — Select speed to force the port to 100 Mbps half or full duplex. l STP Mode — Toggle to enable or disable STP on the port. l LACP Mode — Toggle to enable or disable LACP on the port. l LACP Interface Mode — Configures the interface action when LACP is enabled and
the interface is added to a Link Aggregation Group (LAG). l Active — The interface always attempts to negotiate an LACP connection by sending the LACPDU frames. l Passive — The interface waits to see a LACPDU frame.
l Link Trap — Toggle to enable or disable the port from broadcasting if it has a connection or not.
l MTU (Maximum Transmission Unit) — Enter the value for the largest possible packet size, in bytes, that a port can transmit.
l Broadcast Storm Recovery Level — Enable to limit the amount of broadcast frames accepted and forwarded by the port by percentage, BPS (bits per second), or PPS (packets per second).
l Multicast Storm Recovery Level — Enable to limit the amount of multicast frames accepted and forwarded by the port by percentage, BPS (bits per second), or PPS (packets per second).
28

l Unicast Storm Recovery Level — Enable to limit the amount of unicast frames accepted and forwarded by the switch by percentage, BPS (bits per second), or PPS (packets per second).
Port Details Use this page to quickly view port information such as Physical Address, Port List Bit Offset, and the Interface Index. Use the Options ( ) button to refresh the page.
Note: -.The physical address is the MAC address for the individual port. Mirror
Use port mirroring to mimic the traffic flowing through one port to another. Port mirroring is typically used to capture a recording of network traffic for troubleshooting purposes. To configure port mirroring: 1. Select a Session ID. You cannot have multiple sessions with the same ID. If you
have no current port mirroring sessions, use Session ID 1. Note: -
.You do not have to click Enable. This toggle is automatically enabled after
you save the session settings.
29

2. Select a Destination Type. This is typically Interface. 3. Enter the Port number to receive transmit/receive data from the Source Ports. For
example, if port 3 has a PC running Wireshark for packet capture, enter 3 in the Port field.
4. Click the Options ( ) button and select Add to select the port(s) you want to mirror.
5. In the new window, select Interface as the Type. 6. Use the Available Source Port(s) dropdown to select the port(s) to mirror.
30

7. For Direction, select whether you want to mirror the packets being received (Rx), transmitted (Tx), or both (Tx/Rx), then click Add.
8. Click Apply at the top of the page. After the page refreshes Enable will be toggled on.
To disable a port mirroring session: Select the Session ID you wish to end and click the Clear Session checkbox. Then click Apply at the top of the page.
31

Mirror Summary Use this page to view configured port mirroring sessions. Use the Options ( ) button to refresh the page.
Link Aggregation Use Link Aggregation Groups (LAG) to combine the throughput of multiple ports. To configure a LAG:
1. Click the Options ( ) button to select multiple LAGs or use the Action button to configure a single LAG.
2. Verify Enabled is toggled on. 3. Enable or disable STP based on the networking needs. 4. Select a Link Aggregation Type. LACP is recommended. l LACP (Link Aggregation Control Protocol) broadcasts that the connection type is a
LAG to the switch you’re connecting to for automatic configuration. l Manualrequires manual LAG configuration on the switch you’re connecting to.
32

5. Enable or disable Link Trap based on the network’s needs. 6. Leave Load Balance at the default (Source/Destination MAC, VLAN, Incoming Port),
unless you have specific requirements. Note: -__.The selections are the information the switch uses to determine how to load
balance the throughput of the LAG.
7. Adjust the members of the port channel (ports 3 and 4 used in the example). Use the checkboxes to select a port and the directional arrows to add/remove ports.
33

8. Click Save to close the window, then Apply.
Link Aggregation Statistics Use this page to view information about configured LAGs. Use the Options ( ) button to refresh the page.
34

VLANs
Database Use this page to add and view VLANs that have been configured on the switch, and to enable or disable Remote Switched Port Analyzer (RSPAN). Note: -.VLANs must still be applied to ports on the VLANs >Switchport Configuration page. RSPAN allows you to mirror traffic from multiple source ports (or from all ports that are members of a VLAN) from different network devices and send the mirrored traffic to a destination port (a probe port connected to a network analyzer) on a remote device. The mirrored traffic is tagged with the RSPAN VLAN ID and transmitted over trunk ports in the RSPAN VLAN.
You can use the RSPAN toggle to enable or disable the feature or use the Options button to select multiple VLANs to enable RSPAN on. Use the Actions ( ) button to select an individual VLAN and give it a meaningful Name. Use the Options ( ) button to add a new VLAND ID to the switch.
Note: -
.Configure the VLAN in the router before configuring the VLAN in the switch.
35

To add a VLAN(s) to the switch: 1. Click the Options ( ) button, then click Add. 2. Enter the VLAN ID, within the range of 2-4093. Use “-” between numbers to indicate
a range. Use “,” to enter multiple VLAN IDs not adjacent to each other. 3. You can a meaningful Name for the VLAN or leave the field blank. 4. Append and/or Add Zeros in front of the VLAN ID. This allows the switch to quickly
create identifiers if you’re adding multiple VLANs at once. l Append VLAN ID – Checking this appends the VLAN ID after the name. For
example, VLAN -> VLAN2. l Add Zero in Front of ID – Checking this adds zeroes in front of the VLAN ID, up to a
total of 4 digits. For example, VLAN2 -> VLAN0002, VLAN123 -> VLAN0123. This only works when Append VLAN ID is selected. 5. Enable RSPAN, if desired. 6. Click Add, then Apply at the top of the page.
36

Switchport Configuration Use this page to quickly view and configure VLANs on specific ports. Use the Options ( ) button to modify multiple ports at once, or the Action button to edit a specific port. Note: -__.VLAN IDs must be configured on the VLANs > Database page.
37

configuration

Simple configuration

To quickly configure a port(s) for VLANs, set the Switchport Mode to Trunk or Access. Selecting Trunk automatically allows all the VLAN IDs configured in the switch to pass through the port. Connections to other switches are typically trunk ports.
Selecting Access requires you to select a single VLAN ID as the Access VLAN (Untagged). This means that only packets tagged with the selected VLAN ID can pass through this switchport.
38

Complex configuration
If the port must pass multiple VLANs but not all, select General as the switchport mode. Configurable settings include:
l Port VLAN ID (PVID) — Select the VLAN ID assigned to untagged, or priority tagged frames received on this port.
l Acceptable Frame Type — Tell the port how to handle traffic with tagged frames. All tagged VLAN frames are forwarded in accordance with the IEEE 802.1Q VLAN standard. Options include: l Admit All — The port accepts priority tagged and untagged frames and assigns them the value of the PVID assigned to the interface. l Only Tagged — The port discards any untagged or priority tagged frames it receives. l Only Untagged — The port discards any tagged frames it receives.
39

l Ingress Filtering — Enable to discard tagged frames that aren’t members of the VLAN ID assigned to the port. Leave this feature disabled to accept all tagged frames.
l Untagged VLANs — Enter a VLAN ID in the range 1 to 4093. Use ‘-‘ to specify a range and ‘,’ to separate VLAN IDs or VLAN ranges in the list.
l Tagged VLANs — Enter a VLAN ID in the range 1 to 4093. Use ‘-‘ to specify a range and ‘,’ to separate VLAN IDs or VLAN ranges in the list.
l Priority — The default 802.1p priority assigned to untagged packets arriving at the interface. 802.1p is a Quality of Service (QoS) value used to differentiate traffic.
MAC Based VLAN Use this page to bind traffic from a MAC address to a VLAN ID. To configure a MAC based VLAN:
40

1. Click the Options ( ) button, then Add. 2. Enter the MAC address you wish to bind to a VLAN ID, then select the VLAN ID to
bind it to. Click Add.
3. The MAC Based VLAN appears at the bottom of the page.
Reset Click the Reset button to reset all the VLAN settings on the switch.
PoE
Port Configuration Use this page to quickly enable, disable, or restart PoE on ports and view the PoE configuration on each port. 41

Use the Options ( ) button to select multiple ports for configuration or the Action button to edit an individual port.
Configurable settings include: l Enable — Toggle to enable/disable PoE on the port. l Priority — Set a priority level for PoE power allocation. Higher priority levels should be reserved for devices that are critical for the system to operate, such as access points. l Power Mode — Set the PoE power standard for the port. Selecting a PoE class supports the PoE+ power standard, which provides up to 90W of power. Legacy supports 12.95W ­ 30W of power. Supported power modes include: l bt90W (default) l bt60W l at30W l af15W l Legacy l Power Limit Type — Select the type of power limiting for the port. Options include: l Class (default) — Follows the negotiated PoE class limitations. l User — Follows the Power Limit (Watts) setting. l None — No power limit. l Power Limit (Watts) — Enter the maximum amount of watts that the port can support. This field only works when the Power Limit Type is set to User.
42

l Detection Type– Select a detection protocol for the port to use. Options include: l 4Pt-Dot3af (default) l 4Pt-Dot3af+Legacy l Legacy
l Timer Schedule –The only option is None. l Delay Time (secs) — The amount of time (in seconds) before power is applied to
the port after the switch starts up. General
Use this page to configure global PoE settings for the switch. The top of the page displays PoE totals.
Configurable features include: 43

l System Usage Threshold — Enter the total percentage of the switch’s usable PoE budget. For example, setting the threshold to 90% means that only 90% of the switch’s total PoE budget can be used. This prevents the switch from being overloaded.
l Power Management Mode — Select the method that the switch determines PoE. By default, the switch decides PoE power dynamically, but you can set it to static. Doing so requires manual wattage entry on the Port Configuration page.
l Port Auto Reset Mode — Enable or disable the ability for the switch to automatically reset a port.
l Traps — Enable to allow the switch to send alerts about PoE statuses, such as PoE being enabled or disabled on a port.
l Fast PoE Mode — Enable Fast PoE for the switch to provide PoE power before the boot process completes.
l Perpetual PoE Mode — Enable to allow the switch to continue providing PoE power if the switch is restarting.
Statistics Use this page to view PoE error counts when troubleshooting potential PoE issues. Note: -__.An error on the switch confirms there is a PoE issue, but it does not mean the issue is caused by the switch. Troubleshoot the connected device and Ethernet cable.
Counter explanations:
44

l Overload Counter — The number of times there has been a power overload. l Short Counter — The number of times there has been a short-circuit condition. l Power Denied Counter — The number of times the connected device has been
denied power. l MPS Absent Counter — The number of times power has stopped because the
powered device couldn’t be detected. l Invalid Signature Counter — The number of times an invalid signature was
received. Signature detection is used to detect the presence of a powered device, where a resistance value on the connected device is expected to be found within a particular range. Details Use the details page to gather information about the PoE status of each port. Click Options( ), then Refresh to update the page.
Tools
Firmware Management
Use this page to manually update the firmware on the switch. The image selected when loading the page is the active image. If the firmware fails to boot, the switch switches to the other image as a failsafe.
45

Pro Tip: -_Use OvrC to confirm if the switch is up to date. If not, click the Update button for OvrC to update the switch to the latest firmware. OvrC automatically switches between the active and backup images when performing upgrades.
46

Configuration Management
Use this page to save a backup of the switch’s configuration or to reset the switch to the default settings.

Hardware reset The reset button is on the front of the switch.

Reset button action Hold for 1-9 seconds Hold for 10-19 seconds

Front LED State Blinking slowly
Blinking moderately

Description
Restarts the switch Resets the login credentails to defaults

47

Reset button action Hold for more than 20 seconds

Front LED State
Blinking rapdily

Description
Resets the switch to factory defaults

Diagnostic Utilities
Ping Use a ping test to measure the amount of time it takes to reach an address on the local network or the internet. You can enter the IP address or the hostname, such as www.wikipedia.com.
Pro Tip: -_Before selecting a DNS server, use a ping test to measure the fastest response time.

48

Traceroute Use a traceroute to diagnose network interruptions between the switch and an address on the local network or the internet. You can enter an IP address or a hostname, such as www.youtube.com.
IP Address Conflict Use this page to detect an IP conflict with the switch. Note: -__.You’ll most likely have to connect to the switch’s MGMT port to use this feature when there’s an IP conflict.
49

Advanced System

Management Access
System Connectivity Use the System Connectivity page to quickly manage connections to the switch. More defined connection settings are on the specific protocol tabs. Configurable settings include: l Telnet — Enable to allow telnet connections on port 23. Enable Allow New Sessions to allow new outbound telnet sessions. Disabling new sessions does not terminate existing sessions. l Outbound Telnet — Enable Allow New Sessions to allow new outbound telnet sessions. Disabling new sessions does not terminate existing sessions. l HTTP Redirect to HTTPS — Enable to redirect HTTP logins to the HTTPS port. l HTTPS — Enable to require an HTTPS connection for the switch’s local interface. When enabled, you must type https:// before the IP address in your browser’s address bar. l SSH — Enable to allow SSH connections. You can specify the port to use and The Session Timeout, in seconds. l Management VLAN — Use the drop-down to select which VLAN the switch’s user interface can be accessed on.
Telnet Use this page for more defined telnet connection settings. Changes made on this page affect the System Connectivity page.
50

Configurable settings include: l Enable — Allows telnet connections on the specified port. Port 23 is the default. l Port — The port used to make telnet connections to the switch. 23 is the default. Note: -__.Changing this value does not affect current connections. New sessions must use the new value. l Session Timeout ­ The amount of time (in minutes) that the switch detects inactivity before ending the session. Configurable between 0 ­ 160 minutes. The default is 5. l Max Number of Sessions ­ The number of simultaneous telnet sessions (0-4) the switch allows. l Allow New Sessions ­ Enable to allow new outbound telnet sessions. Disabling new sessions does not terminate existing sessions.
51

Outbound Telnet Use this page for more defined outbound telnet connection settings. Changes made on this page affect the System Connectivity page.
Configurable settings include: l Session Timeout — The amount of time (in minutes) that the switch detects inactivity before ending the session. Configurable between 0 ­ 160 minutes. The default is 5. l Max Number of Sessions — The number of simultaneous telnet sessions (0-4) the switch allows. l Allow New Sessions — Enable to allow new outbound telnet sessions. Disabling new sessions does not terminate existing sessions.
52

Serial Port Use this page for more defined serial port connection settings. Changes made on this page affect the System Connectivity page.
Configurable settings include: l Serial Timeout — The amount of time (in minutes) that the switch detects inactivity before ending the session. Configurable between 0 ­ 160 minutes. The default is 5. l Baud Rate — The number of signals per second transmitted over the physical medium, measured in bits per second.
Non-configurable connection settings: l Character Size: 8 l Parity: None l Stop Bits: 1 l Flow Control: Disabled
53

CLI Banner Use this page to type the desired message in the text area to create the CLI (Command Line Interface) banner message.
Note: -__.If you reach the end of the line, the text wraps to the next line. The line might not wrap at the same location in the CLI. To create a line break (carriage return) in the message, press the Enter key on the keyboard. The line break in the text area will be at the same location in the banner message when viewed through the CLI.
54

HTTPS Connection Use this page for more defined HTTPS connection settings. Changes made on this page affect the System Connectivity page.
Configurable settings include: l Enable — Allows HTTPS connections on the specified port. Port 443 is the default. l TLS Version 1 — Enables or disables (TLS Transport Layer Security) Version 1.0. l Port — The TCP port used to make HTTPS connections to the switch. 443 is the default. Note: -__.Changing this value does not affect current connections. New sessions must use the new value. l Session Soft Time Out — The amount of time (in minutes) that the switch detects inactivity before re-checking authentication. 5 is the default. l Session Hard Time Out — The amount of time (in minutes) that the switch detects inactivity before ending the session. 24 is the default. l Max Number of Sessions ­ The number of simultaneous HTTPS sessions the switch allows. 8 is the default.
55

l Allow New Sessions — Enable to allow new outbound telnet sessions. Disabling new sessions does not terminate existing sessions.
This page also displays the status of the SSL certificate generation process and allows you to Download, Generate, or Delete the certificate. Certificate Status states:
l Present — The certificate has been generated and is present on the device. l Absent — A certificate is not available on the device. l Generation In Progress — An SSL certificate is currently being generated.
56

SSH Use this page for more defined SSH connection settings. Changes made on this page affect the System Connectivity page.
Configurable settings include: l Enable — Allows SSH connections on the specified port. Port 22 is the default. l SSH Version 2 — Enables or disables SSH version 2. l Port — The TCP port used to make HTTPS connections to the switch. 22 is the default. Note: -__.Changing this value does not affect current connections. New sessions must use the new value. l Max Number of Sessions — The number of simultaneous HTTPS sessions the switch allows. 8 is the default. l Session Timeout — The amount of time (in minutes) that the switch detects inactivity before ending the session. 5 is the default
57

This page also displays the status of the RSA (Rivest-Shamir-Adleman algorithm) and DSA (Digital Signature Algorithm) certificate generation process and allows you to Download, Generate, or Delete the certificate. Certificate Status states:
l Present ­ The certificate has been generated and is present on the device. l Absent ­ A certificate is not available on the device. l Generation In Progress ­ An SSL certificate is currently being generated. SNTP Simple Network Time Protocol (SNTP) assures the switch’s clock time is accurate to the millisecond, by synchronizing to an SNTP server. Time sources are established by stratums, which define the accuracy of the reference clock. The higher the stratum (zero being the highest) the more accurate the clock. The switch receives time from stratum 1 and above because the switch itself is a stratum 2 device. Examples of stratums: l Stratum 0 — An actual time clock, such as a GPS system, is used as the time
source. l Stratum 1 — A server directly linked to a stratum 0 source is used. Stratum 1 time
servers provide primary network time standards. l Stratum 2 — A time source connected to a stratum 1 server over a network. Such
as stratum 2 server receiving time over the network, via NTP, from a stratum 1 server. SNTP time definitions are determined by the following time levels: l T1 — The time that the original request was sent by the client. l T2 — The time that the original request was received by the server.
58

l T3 — The time that the server sent a reply. l T4 — The time that the client received the server’s reply. The switch can poll unicast and broadcast server types for the server time. Unicast information is used for polling a server with a known IP address. SNTP servers configured on the switch are the only servers polled for synchronization information. This is the most secure method for synchronization. When selected, SNTP information is only accepted from SNTP servers defined on the SNTP Server Configuration page. Global Configuration Use this page to configure the Simple Network Time Protocol (SNTP) to make the switch’s clock time accurate to the millisecond. Note: -__.The SNTP server the switch synchronizes to is configured on the Server
Configuration tab. Configurable settings include:
l Client Mode — Use the dropdown to determine how SNTP operates. Options include: l Unicast — Makes STNP operate in a point-to-point fashion. A unicast client sends a request to a designated server at its unicast address and expects a reply to determine the time, and potential round-trip delays to calculate an offset from the local time. l Broadcast — SNTP operates like it’s multicast but uses a local broadcast address instead of a multicast address. The broadcast address has a single subnet scope, while a multicast address has an internet-wide scope. l Disable — Disables the SNTP protocol on the switch.
l Port — Enter a local UDP port to listen for responses and/or broadcasts. 123 is the default.
59

l Unicast Poll Interval (Seconds) — Enter the number of seconds between unicast poll requests, expressed as a power of two when configured in unicast mode.
l Broadcast Poll Interval (Seconds) — Enter the number of seconds between broadcast poll requests, expressed as a power of two when configured in broadcast mode.
l Unicast Poll Timeout (Seconds) — Enter the number of seconds between broadcast poll requests, expressed as a power of two when configured in unicast mode. Broadcasts received prior to the expiry of the interval are discarded.
l Unicast Poll Retry — Enter the number of times to retry a request to an SNTP server after the first time-out before attempting to use the next configured server when configured in unicast mode.
l Number of Servers Configured — Displays the number of SNTP servers configured on the Server Configuration tab.
Global Status Use this page to view the SNTP server configuration of the switch.
60

Server Configuration Use this page to add SNTP servers and configure the priority of which server should be used first, and which should be used in case the servers with a higher priority cannot be contacted. Use the Options ( ) button to refresh the page, add, or select multiple servers to configure. Use the Action button to edit or delete an existing SNTP server.
To add an SNTP server: 1. Click Options ( ), then Add. 2. Enter an SNTP Server Name or IP Address. 3. Select an SNTP Server Type, meaning whether it’s an IPv4, IPv6, or DNS address. 4. Enter a UDP Port the SNTP server to communicate on. 5. Enter the Priority level that the SNTP server should be used. If it’s a fallback
address in case the default SNTP server fails, enter 2. 6. Enter the protocol Version number. The default is 4.
61

7. Click Add, then Apply at the top of the page.
Server Status Use this page to see the last updated time the switch has received from the configured SNTP server(s) and how many requests the switch has made to the server(s). Click Options( ) > Refresh to gather the latest data.
62

Source Interface Configuration Use this page to select the Type of Interface to use as the SNTP source. Interface options include NetworkPort or ServicePort. The default Type is None.
SNMP Simple Network Management Protocol (SNMP) provides a method for managing network devices. The Araknis 920 switch supports SNMP versions 1, 2, and 3. SNMP Versions 1 and 2 The SNMP agent maintains a list of variables used to manage the switch, which are defined in the Management Information Base (MIB). The SNMP agent defines the MIB specification format, and the format used to access information over the network. Access rights to the SNMP agent are controlled by access strings.
63

SNMP Version 3
SNMP v3 adds access control and trap mechanisms. The User Security Model (USM) for SNMP v3 includes:
l Authentication — Provides data integrity and data origin authentication. l Privacy — Protects against the exposure of message content by encrypting the
information with Cipher-Block Chaining (CBC). Authentication and privacy is enabled on an SNMP message. l Timeliness — Protects against message delay and redundancy by comparing incoming messages with their time information. l Key Management — Defines key generation, updates, and use.
64

Community Use this page to manage access rights by creating Communities for SNMP v1 and 2, or Groups for SNMP v3. Note: -__.Changing community names also changes the access rights. Use the Options ( ) button to refresh the page, add, or select multiple communities to configure. Use the Action button to edit or delete an existing community server.
Configurable settings include: l Mode ­ Use Community for SNMPv1/2 or Group for v3. l Community Name — Community name used in SNMPv1/v2 packets. This is configured in the client device and determines the access the user may connect with. l IP Address ­ Enter the IP address of the device that can connect to the Community or Group. l Community Access ­ Select the permissions given to the Community or Group. l Community View ­ Enter a community view. No access is granted if this field is left empty.
Trap Receiver V1/V2 Use this page to configure the SNMP v1 or 2 trap receiver (sometimes known as a management host) that’s receiving notifications about traps generated by the switch. Use the Options ( ) button to refresh the page, add, or select multiple trap receivers to configure. Use the Action button to edit or delete an existing trap receiver.
65

Configurable settings include: l Host IP Address ­ The IP address of the device that is going to receive the traps generated by the switch. l Community Name ­ The SNMP community name that includes the trap receiver and the SNMP agent on the switch. l Notify Type ­ Select the notification type to send to the trap receiver. l Trap ­ An SNMP message that notifies the trap receiver when a certain event has occurred on the device. The message is not acknowledged by the SNMP management host. l Inform ­ An SNMP message that notifies the trap receiver when a certain event has occurred on the device. The message is acknowledged by the SNMP management host. This type of notification is not available for SNMPv1. l SNMP Version ­ Select the SNMP version being used. l Filter ­ This field is optional. Enter the name of the filter configured on the trap receiver. The filter is configured using the CLI and defines which MIB objects to include or exclude from the community view. l UDP Port ­ The UDP port on the trap receiver that is receiving the SNMP notifications. The default UDP port value (162) is used if no value is specified when configuring a receiver.
Trap Receiver V3 Use this page to configure the SNMP v3 trap receiver (sometimes known as a management host) that’s receiving notifications about traps generated by the switch.
66

Use the Options ( ) button to refresh the page, add, or select multiple trap receivers to configure. Use the Action button to edit or delete an existing trap receiver.
Configurable settings include: l Host IP Address ­ The IP address of the device that is going to receive the traps generated by the switch. l User Name ­ The name of the SNMP user that is authorized to receive the SNMP notification. l Notify Type ­ Select the notification type to send to the trap receiver. l Trap ­ An SNMP message that notifies the trap receiver when a certain event has occurred on the device. The message is not acknowledged by the SNMP management host. l Inform ­ An SNMP message that notifies the trap receiver when a certain event has occurred on the device. The message is acknowledged by the SNMP management host. This type of notification is not available for SNMPv1. l Security Level ­ Select one of the following security levels for the NSMP user: l No Auth No Priv ­ No authentication and no data encryption (no security). l Auth No Priv ­ Authentication with no data encryption. With this security level, users send SNMP messages using an MD5 key/password for authentication. It does not send a DES key/password for encryption. l Auth Priv ­ Authentication and data encryption. With this security level, users send an MD5 key/password for authentication and a DES key/password for encryption.
67

l Filter ­ This field is optional. Enter the name of the filter configured on the trap receiver. The filter is configured using the CLI and defines which MIB objects to include or exclude from the community view.
l UDP Port ­ The UDP port on the trap receiver that is receiving the SNMP notifications. The default UDP port value (162) is used if no value is specified when configuring a receiver.
68

Access Control Group Use this page to configure SNMP Access Control Groups and view a summary of all the configured groups. These SNMP groups allow network managers to assign different authorization levels and access rights to specific switch features and attributes. The switch is preconfigured with several default SNMP groups. The SNMP community can reference an SNMP group to provide security and context for agents receiving requests, initiating traps, and management system tasks. An SNMP agent cannot respond to a request from a management system outside the group or groups it’s configured for. Use the Options ( ) button to refresh the page or add a new Access Control Group.
Configurable settings include: l Group Name ­ Enter an easily identifiable name for the Access Control Group. l SNMP Version ­ Select the SNMP version for the Access Control Group. l Security Level ­ Select one of the following security levels for the NSMP user: l No Auth No Priv ­ No authentication and no data encryption (no security). This is only available to SNMP v1 or 2 groups. l Auth No Priv ­ Authentication with no data encryption. With this security level, users send SNMP messages using an MD5 key/password for authentication. It does not send a DES key/password for encryption.
69

l Auth Priv ­ Authentication and data encryption. With this security level, users send an MD5 key/password for authentication and a DES key/password for encryption.
l Context Name ­ Enter the SNMP context associated with the SNMP group and its views. A user or a management application specifies the context name to get the performance information from the MIB objects associated with that context name. The Context EngineID identifies the SNMP entity that should process the request (the physical router), and the Context Name tells the agent in which context it should search for the objects requested by the user or the management application.
l Group Access Rights Read ­ Select the level of read access rights for the group. The menu includes the available SNMP views. When adding a group.
l Group Access Rights Write ­ Select the level of write access rights for the group. The menu includes the available SNMP views. When adding a group.
l Group Access Rights Notify ­ Select the level of notify access rights for the group. The menu includes the available SNMP views. When adding a group.
70

User Security Model Use this page to configure SNMP v3 users. Click the Options ( ) button to refresh the page, add, or edit a new SNMP user.
Configurable settings include: l Engine ID Type ­ Select the Engine ID type being used. Local or Remote. Each SNMP v3 agent has an engine ID as a unique identifier for the device. l User Name ­ A unique identifier for the user. Leading or embedded blanks cannot be used. l Group Name ­ The SNMP group name to associate the user with. l Authentication Method ­ Select one of the following options: l None ­ No authentication is used. l MD5 ­ This protocol requires a password of 1-32 hexadecimal characters. l SHA ­ This protocol requires a password of 1-32 hexadecimal characters. l MD5-Key ­ This protocol requires a pre-generated MD5 authentication key of 32 hexadecimal characters. l SHA-Key ­ This protocol requires a pre-generated SHA authentication key of 40 hexadecimal characters.
View Entry An SNMP View is a mapping between SNMP scalar and tabular objects and the access rights configured for the view. Use this page to configure access to one or more MIB OID (MIB Object Identifier) nodes for an SNMP View Name. Note: -__.An SNVMP View Entry must be configured for an SNMP v3 agent to work.
71

Click the Options ( ) button to refresh the page or add a new View Entry.
Configurable settings include: l View Name ­ Enter a unique name to identify the SNMP view. l View Type ­ Select an View Type to use. Options include: l Included ­ Grants access to the OID subtree. l Excluded ­ Denies access to the OID subtree. l OID Tree ­ The ASN.1 subtree to grant or deny access to.
72

Source Interface Configuration Use this page to specify the physical or logical interface to use as the SNMP client source interface. When an IP address is configured on the source interface, the IP address is used in the IP header of SNMP management packets for all SNTP communications between the local SNMP client and the remote SNTP server. This allows security devices, like firewalls, to identify incoming source packets from a specific device.
Configurable settings include: l Type ­ Select a source interface type. Options include: l None ­ The primary IP address of the origination (outbound) interface is used as the source address. l Interface­ The primary IP address of the physical switchport is used as the source address.
The Interface drop-down can only be set to Network. This option includes the physical port, VLAN routing interface, and the network source IP. Click Apply at the top of the page to save changes.
73

Server Configuration Use this page to specify the UDP port number the SNMP server uses to listen for requests. Caution: -.Changing this value may cause existing SNMP transactions to cease communicating with the device until the client applications are reconfigured to use the new port number. Click Apply to save changes.
74

Time Ranges Use these pages to configure time ranges for Access Command Lists (ACLs). Time ranges can be set for one or more rules within an ACL using a periodic or absolute time, except for the deny all rule each ACL has. Time ranges must have a name before they can be referenced by an ACL rule.
Configuration Click the Options ( ) button to add or edit a named Time Range or refresh the page. Use the Action button to delete a Time Range. Click Enable to make Time Ranges active.
Table field descriptions: l Time Range Name ­ The unique name entered to identify the Time Range. l Time Range Status ­ Displays whether the Time Range is active. l Periodic Entry Count ­ The number of periodic time range entries currently configured with the Time Range.
75

l Absolute Entry ­ The number of absolute time range entries currently configured with the Time Range.
Entry Configuration Use this page to add periodic and absolute time range entries. To add an entry, select a Time Range Name, then click the Options ( ) button > Add.

The Configurable settings depend on which Entry Type you select. The below table describes these settings.

Entry Type
Periodic
Absolute

Field

Description

Start Days

Select the day the time range entry begins. If more than one day is selected, they must match the End Days field.

Starting Time of Day

Enter the time of day the entry begins. Uses a 24-hour format.

End Days

The day, or days, the entry ends. If multiple days are selected, they must match the Start Days field.

Ending Time of Day

The time of day the entry ends. Uses a 24-hour format.

Starts

The calendar day the entry begins.

Ends

The calendar day the entry ends.

76

To delete a Time Range Entry, click the Action button next to the entry. 77

Logs The logs display a record of system events and can be configured to only display the most pertinent system information.
Event Log Use this page to view system events recorded since the last restart of the switch. Refresh the page to see new events. The Options ( ) button gives you the ability to display a specified number of rows, and to Refresh the logs.
Table field descriptions: l Type ­ The incident category of the log entry. Event, Error, etc. l Filename ­ The source code file name of the event’s origin. l Line ­ The line number of the event within the source code. l Task ID ­ The system identifier of the task that was running when the event occurred. l Code ­ An event-specific code assigned to the event.
78

l Event Time ­ A time stamp (days:hours:minutes:seconds) that indicates when the event occurred in reference to the system’s uptime.
Persistent Log This page shows current events, and events recorded before the last system restart. Refresh the page to see new events. The Options ( ) button gives you the ability to display a specified number of rows, and to Refresh the logs.
Table field descriptions: l Severity ­ The severity level of the log entry. The severity levels displayed can be configured under Advanced > System > Logs

Configuration tab. l Log Time ­ A time stamp (days:hours:minutes:seconds) that indicates when the event occurred. l Component ­ The component that issued the log entry. l Description ­ A text description of the log entry.
79

Hosts Use this page to configure remote hosts for the switch to send and capture logs to. Click the Options ( ) button to Edit, Add a new host, or Refresh the list.
Table field descriptions: l Host ­ The IP address or DNS-resolvable host name of the remote host that is receiving log messages. l Status ­ Indicates if the host is configured to actively log or not. l Port ­ The UDP port on the logging host that the syslog messages are being sent. l Severity Filter ­ Severity level threshold for log messages, configured under Advanced > System

Logs > Configuration tab. All log messages with a severity level at and above the configured threshold are sent to the logging host. l Transport Mode ­ UDP or TLS. If TLS is not configured the default transport mode is UDP.
80

l Authentication Mode ­ Using TLS, the security user can configure an anonymous authentication mode, where no client authentication is done by the syslog server. Using x509/name authentication mode, two-way authentication is done by the syslog client and the syslog server.
l Certificate Index ­ Index used to identify corresponding certificate files. l Action ­ Edit or remove a logging host. Configuration Use these fields to configure the behavior and data for the switch to log. Buffered Log Configuration: l Enable ­ Enabled by default, this feature logs data to the buffered (RAM) file. l Behavior ­ Specifies what happens when the buffered log is full.
l Wrap: Deletes the oldest messages. l Stop on Full: Stops writing new messages. Command Logger Configuration: Enable or Disable logging of command- line interface (CLI) commands issued to the switch. This setting is disabled by default. Console Log Configuration: l Enable ­ Enable or disable logging to any serial device attached to the switch. l Severity Filter ­ Sets the severity of the messages to log. All messages at or above the selected severity level are logged to the console. Persistent Log Configuration: l Enable ­ Enable or disable logging to the persistent log. These messages are not deleted when the switch restarts. l Severity Filter ­ Sets the severity of the messages to log. All messages at or above the selected severity level are logged to the switch. Syslog Configuration:
81

l Enable ­ Enable or disable logging to the configured syslog hosts. When disabled, the switch does not relay logs to syslog hosts and no messages are sent to any collector/relay.
When enabled messages are sent to the collectors/relays using the values configured for each collector/relay.
l Protocol Version ­ The RFC version of the syslog protocol. l Local UDP Port ­ The UDP port the switch sends syslog messages from. Source Interface Configuration Use this page to configure the port that the Syslog host is connected to.
Configurable settings include: l Type ­ Select Interface to configure a Syslog Source Interface. Default is None. l Interface ­ Use the dropdown to select the type of interface to use. Service port or Network port.
82

System Statistics Pages in the Statistics section contain information about the amount and types of traffic the switch is transmitting and receiving.
Switch Use the Options ( ) button to refresh the statics for a specific heading or click the Clear Counters button to clear all the statistics information on the page.
System counters descriptions: l Interface ­ The interface index object value of the interface table entry associated with the switch’s processor. Use this value to identify the interface when managing the switch with SNMP. l Time Since Counters Last Cleared ­ The amount of time in days:hours:minutes:seconds since the statistics for the switch have been reset.
83

Statistics counters descriptions: l Octets Without Error ­ The total number of octets (bytes) successfully transmitted or received data by the processor. This number includes FCS octets but excludes framing bits. l Packets Without Errors ­ The total number of packets successfully transmitted or received by the processor. Includes unicast, broadcast, and multicast packets. l Packets Discarded ­ The number of packets chosen to be discarded to prevent them from being deliverable to a higher-layer protocol. Such as discarding packets to free up buffer space. l Unicast Packets ­ The number of subnetwork-unicast packets transmitted or received from a higher-layer protocol. l Multicast Packets ­ The number of packets transmitted or received being directed to a multicast address. l Broadcast Packets ­ The number of packets transmitted or received being directed to a broadcast address.
84

Status counters descriptions: l Current Usage ­ In the FDB entries column, the value is the number of learned and static entries in the MAC address table. In the VLANs column, the number shows the number of static and dynamic VLANs that exist in the VLAN database. l Peak Usage ­ The highest number of entries in the MAC address table or VLAN database that an admin statically configured. l Maximum Allowed ­ The maximum number of statically configured or dynamically learned entries allowed in the MAC address table or VLAN database. l Static Entries ­ The current number of statically configured entries in the MAC address table or VLAN database that an admin configured. l Dynamic Entries ­ The current number of dynamically learned entries in the MAC address table or VLAN database that an admin configured. l Total Entries Deleted ­ The number of VLANs created and deleted since the last time the switch was restarted. This field is not applicable to MAC address table entries.
Port Summary This table shows statistics about the packets transmitted and received for individual interfaces (switchports and LAGs).
85

Use the Options ( ) button to Refresh or Clear the statistics in the table.
Column descriptions: l Interface ­ The interface (switchport or LAG) number. l Name ­ The name given to the interface. l RX Good ­ The total number of inbound packets received by the interface without error. l RX Errors ­ The total number of inbound packets containing errors, preventing them from being deliverable on the interface. l RX Bcast ­ The total number of inbound packets received by the interface directed to a broadcast address. This does not include multicast packets. l TX Good ­ The total number of outbound packets received by the interface without error. l TX Errors ­ The total number of outbound packets containing errors, preventing them from being deliverable on the interface. l TX Collisions ­ The best estimate of the total number of collisions on the interface.
Port Detailed This page allows you to select an interface and view detailed statistics about it, such as the Maximum Frame Size, MTU, and the Packet Lengths Received and Transmitted.
86

Use the Interface dropdown to select a switchport or LAG. Click the Options ( ) button to Refresh the page for the most current statistics.
87

Switching

IGMP Snooping
Configuration Use this page to enable IGMP Snooping on the switch and view related counts.
Configurable settings: l Enable – Enables/disables IGMP snooping on the switch. l Advanced Mode – Enabled Advanced mode if the IGMP environment which is likely to have large bursts of IGMP messages. The switch’s CPU has a buffer shared by all kinds of packets. When there is a burst of IGMP snooping packets, some would be dropped. To prevent this, Advanced Mode increases the buffer size for IGMP snooping packets, sacrificing the buffer size allocated for other kinds of packets. These “other” packets may be dropped.
88

l Router Alert Check — Enable for the switch to inspect packets when they are being forwarded, even though the packet is not directly addressed to this switch.
Read-only fields: l Multicast Control Frame Count — The number of multicast frames the switch has processed. l VLANS Enabled for IGMP Snooping — The number of VLANs configured on the switch for IGMP snooping.
VLAN Status Use this page to enable IGMP snooping on VLANs configured on the switch. Click the Options ( ) button to Refresh or Clear the statistics in the table. Configurable settings include: l VLAN ID — Select a VLAN ID that’s been configured on the switch. You can only select a VLAN that hasn’t already been configured for IGMP Snooping. l Fast Leave — Enable to remove the multicast group specified in an IGMP Leave report without sending an IGMP query message and waiting for a response. l Group Membership Interval (Seconds) — The number of seconds the VLAN waits for a report for a particular multicast group on the VLAN before the IGMP snooping feature deletes the VLAN from the group. l Max Response Time (Seconds) — The number of seconds the VLAN waits after sending a query if it does not receive a report for a particular multicast group. The specified value should be less than the Group Membership Interval. l Multicast Router Expiration Timer (Seconds) — The number of seconds the VLAN waits to receive a query before it is removed from the list of VLANs with multicast routers attached.
89

l Report Suppression Mode — The IGMPv1 and IGMPv2 report suppression mode. The device uses IGMP report suppression to limit the membership report traffic sent to multicast-capable routers. When this mode is enabled, the device does not send duplicate reports to the multicast router. Note that this mode is supported only when the multicast query has IGMPv1 and IGMPv2 reports. This feature is not supported when the query includes IGMPv3 reports. The options are as follows: l Enabled – Only the first IGMP report from all hosts for a group IGMP report is forwarded to the multicast routers. l Disabled — The device forwards all IGMP reports from all hosts in a multicast group to the multicast routers.
90

Multicast Router VLAN Configuration Use this page to configure VLANs for multicast routing. When enabled, multicast routers learn which multicast groups are active by periodically checking with each member of the multicast group. Read Understanding Multicast & IGMP for more information about multicast groups.
To configure multicast routing: 1. Use the Options button to configure multiple ports or the Actions button to edit a
single port. 2. Select the VLAN ID(s) you want the port to act as the multicast router for, then
click the right arrow to add them.
91

3. Click Save, then Apply at the top of the page. 92

IGMP Snooping Querier
Configuration Use this page for IGMP Snooping Querier administration.
Configurable settings include: l Enable – Enable to allow the switch to send periodic IGMP queries that trigger IGMP report messages from the switches that want to receive IP multicast traffic. IGMP snooping listens to these IGMP reports to establish appropriate forwarding. l IP Address – The address to be used as the source address in periodic IGMP queries when no IP address is configured on the VLAN on which the query is being sent. l IGMP Version — Select the IGMP version to use in the queries. l Query Interval (Seconds) — The amount of time between queries.
93

l Query Expiry Interval (Seconds) — The amount of time the device remains in non-querier mode after it discovers that there is a multicast querier on the network.
VLAN Configuration Use this page to add VLANs that the switch should act as the IGMP querier for. To learn more about IGMP queriers, read Understanding Multicast & IGMP. Caution: -.Only enable IGMP Snooping Querier on the switch where your IGMP topology starts, called the core IGMP switch. This IGMP querying switch asks each device on the network which multicast traffic they want. To add a VLAN to the switch’s IGMP snooping querier configuration:
1. Click the Options button, then Add.
2. Select a VLAN ID. 3. Enable Querier Election Participation if the VLAN should participate in the IGMP
querier Election process. 4. If desired, enter a Querier VLAN IP Address.
94

5. Click Add, then Apply at the top of the page. Configured VLANs are listed at the bottom of the page.
95

VLAN Status Use this page to view information about the IGMP snooping querier status for all VLANs that have the snooping querier enabled.
96

Spanning Tree Protocol

Switch Use this page to configure global Spanning Tree Protocol (STP) settings for the switch. STP is a Layer 2 protocol that decides the best path for LAN traffic when multiple options exist, preventing network loops while guaranteeing redundancy in case of link failure. For more information about STP, read Understanding Spanning Tree Protocol (STP) & Best Practices.
Configurable settings include: l Enable — Enables STP on the switch. l Force Protocol Version — Select the STP version for the switch to use. l Configuration Name — Typically left alone, you can enter the name of the MSTP region. Each switch that participates in the same MSTP region must share the same Configuration Name, Configuration Revision Level, and MST-to-VLAN mappings 97

l Configuration Revision Level — This number must be the same on all switches participating in the MSTP region.
98

MST Use the MST Summary page to view the Multiple Spanning Tree Instances (MSTIs) on the device. Multiple Spanning Tree Protocol (MSTP) allows the creation of MSTIs based upon a VLAN or groups of VLANs. Configuring MSTIs creates an active topology with a better distribution of network traffic and an increase in available bandwidth when compared to classic STP MST Port. The Spanning Tree Maximum Hops field displays the maximum number of hops a Bridge Protocol Data Unit (BPDU) is allowed to traverse within the spanning tree region before it is discarded. The default value is 20. MST instances appear in the table at the bottom of the page.
Table field descriptions: l MST ID — Identifies the MST instance. l Priority — The bridge priority for the spanning-tree instance. This value affects the likelihood that the bridge is selected as the root bridge. A lower value increases the probability that the bridge is selected as the root bridge.
99

l Associated VLANs — The number of VLANs that are mapped to the MSTI. This number does not contain any information about the VLAN IDs that are mapped to the instance.
l Bridge Identifier — A unique value that is automatically generated based on the bridge priority value of the MSTI and the base MAC address of the bridge. When electing the root bridge for an MST instance, if the bridge priorities for multiple bridges are equal, the bridge with the lowest MAC address is elected as the root bridge.
l Time Since Topology Change — The amount of time that has passed since the topology of the MSTI changed.
l Designated Root — The bridge identifier of the root bridge for the MST instance. The identifier is made up of the bridge priority and the base MAC address.
l Root Path Cost — The path cost to the designated root for this MST instance. Traffic from a connected device to the root bridge takes the least-cost path to the bridge. If the value is 0, the cost is automatically calculated based on port speed.
l Root Port — The port on the bridge with the least-cost path to the designated root for the MST instance.
100

MST Port Use this page to view and configure the Multiple Spanning Tree (MST) settings for each interface on the switch. Use the MST ID dropdown to view its configuration on each switch interface. Note: -__.An MST instance must first be created under the MST tab before an MST ID can be selected. Click the Options ( ) button to Refresh the statistics in the table, or to Edit multiple interfaces at once. Click Action to edit the MST ID on an individual interface.
Configurable options include: l Port Priority — The priority for the port within the MSTI. This value is used to determine which interface becomes the root port when two ports have the same least-cost path to the root. The port with the lower priority value becomes the root port. If the priority values are the same, the port with the lower interface index becomes the root port. l Port Patch Cost — The path cost from the port to the root bridge.
101

Table field descriptions: l Auto-calculate Port Path Cost — Shows whether the path cost from the port to the CIST root is automatically determined by the speed of the interface (Enabled) or configured manually (Disabled). l Port ID — A unique value that is automatically generated based on the port priority value and the interface index. l Port Up Time Since Counters Last Cleared — The amount of time that the port has been up since the counters were cleared.
102

l Port Forwarding State — How traffic is flowing through the port. States include: l Blocking — Blocks the flow of traffic. When a device is first connected to a port, it enters the blocking state. l Learning — The port is relaying information from a high-priority BPDU to the other ports on the switch. l Disabled — Disables the port. l Err-disabled — Allows STP to block the flow of traffic when it detects a loop, or forward traffic to a port if the connection changes.
l Port Role — The role of the port within the CST, which is one of the following: l Root – A port on the non-root bridge that has the least-cost path to the root bridge. l Designated — A port that has the least-cost path to the root bridge on its segment. l Alternate — A blocked port that has an alternate path to the root bridge. l Backup — A blocked port that has a redundant path to the same network segment as another port on the bridge. l Master — The port on a bridge within an MST instance that links the MST instance to other STP regions. l Disabled — The port is administratively disabled and is not part of the spanning.
l Designated Root — The bridge ID of the root bridge for the CST. l Designated Cost — The path cost offered to the LAN by the designated port. l Designated Bridge — The bridge ID of the bridge with the designated port. l Designated Port — The port ID of the designated port.
103

l Loop Inconsistent State — Identifies whether the interface is currently in a loopinconsistent state. An interface transitions to a loop-inconsistent state if Loop Guard is enabled and the port stops receiving BPDUs. In this state, the interface does not transmit frames.
l Transitions Into Loop Inconsistent State — The number of times this interface has transitioned into loop-inconsistent state.
l Transitions Out Of Loop Inconsistent State — The number of times this interface has transitioned out of loop-inconsistent state.
CST Use the CST Configuration page to configure the Common Spanning Tree (CST) settings. The settings and information on this page define the device within the spanning tree topology that connects all STP/RSTP bridges and MSTP regions. Configurable settings include: l Bridge Priority — This value affects the likelihood that the bridge is selected as the root bridge. A lower value increases the probability that the bridge is selected as the root bridge. For more information, read Understanding Spanning Tree Protocol (STP) & Best Practices for more information. l Bridge Max Age — The amount of time a bridge waits before implementing a topological change. l Bridge Forward Delay — The amount of time a bridge remains in a listening and learning state before forwarding packets. l BPDU Filter — When enabled, this feature filters the BPDU traffic on the switch’s edge ports. When spanning tree is disabled on a port, BPDU filtering allows BPDU packets received on that port to be dropped. l BPDU Guard — When enabled, this feature can disable edge ports that receive BPDU packets. This prevents a new device from entering the existing STP topology,
104

so devices that were originally not a part of STP are not allowed to influence the STP topology. Pro Tip: -_Do not enable this feature unless there’s a specific use case for it. l Spanning Tree TX Hold Count — The maximum number of BPDUs that a bridge is allowed to send within a hello time window. The bottom of the page provides general CST information.
CST Port Use the CST Port page to view and configure the Common Spanning Tree (CST) settings for each port on the switch. Click the Options ( ) button to Refresh the statistics in the table, or to Edit multiple interfaces at once. Click Action to edit an individual interface. Configurable settings include:
105

l Port Priority — The priority for the port within the CST. l Admin Edge Port — Enable to force the interface to act as an edge port. An edge
port is an interface that is directly connected to a host and is not at risk of causing a loop. l Port Path Cost — The path cost from the port to the root bridge. l External Port Path Cost — The cost of the path from the port to the CIST root. This value is important if the network includes multiple regions. l Port Mode — Select whether STP should be enabled or disabled on the interface. l Auto Edge — Enable to allow the interface to become an edge port if it does not receive any BPDUs within a given amount of time. l Root Guard — Enable to allow the interface to discard any superior information it receives to protect the root of the device from changing by entering a discarding state, so it does not forward any frames. l Loop Guard — Enable to prevent an interface from erroneously transitioning from blocking state to forwarding when the interface stops receiving BPDUs. The interface is marked as being in a loop- inconsistent state, which does not forward frames. l TCN Guard — When enabled, TCN Guard restricts the interface from propagating any topology change information received through the interface. l BPDU Filter — When enabled, BPDU traffic is filtered on the edge ports. Edge ports do not need to participate in the spanning tree, so BPDU filtering allows BPDU packets received on edge ports to be dropped.
106

Table field descriptions: l Interface — The port number. l Name — The name given to the port. Configurable on Settings > Ports > General > Port Summary page. l Port Mode — The role of the port within the CST, which is one of the following: l Root – A port on the non-root bridge that has the least-cost path to the root bridge. l Designated — A port that has the least-cost path to the root bridge on its segment. l Alternate — A blocked port that has an alternate path to the root bridge. l Backup — A blocked port that has a redundant path to the same network segment as another port on the bridge. l Master — The port on a bridge within an MST instance that links the MST instance to other STP regions. l Disabled — The port is administratively disabled and is not part of the spanning. l Port Forwarding State — How traffic is flowing through the port. States include:
107

l Blocking — Blocks the flow of traffic. When a device is first connected to a port, it enters the blocking state.
l Learning — The port is relaying information from a high-priority BPDU to the other ports on the switch.
l Disabled — Disables the port. l Err-disabled — Allows STP to block the flow of traffic when it detects a loop,
or forward traffic to a port if the connection changes. l Port Priority — The port’s location in the network topology and how well it’s
situated to pass traffic. l Port Path Cost — The path cost from the interface to the CST regional root. l Description — Whether the port is permitting or denying traffic. Statistics Use this page to view how many BPDUS have been transmitted and received on individual ports. Click the Options button, then Refresh to get the latest statistics.
108

Unregistered Multicast Behavior

Configuration Use this page to configure how the switch should handle unregistered multicast traffic. Unregistered Multicast Action options include: l Drop — The switch does not forward unregistered multicast packets to the interfaces. l Forward — Unregistered multicast packets are forwarded to all active interfaces on the switch but not to the CPU, to reduce overhead. l Forward Including CPU — Unregistered multicast packets are forwarded to all active interfaces on the switch and the CPU.
Exception Lists display the default ACL exception list available on the switch.
109

Exception Details Use this page to configure which Multicast addresses and destination ports should be allowed to continue flooding while the Unregistered Multicast Behavior is set to Drop. Use the Exception List Name dropdown to select the list you’d like to edit on the page.
Configurable settings include: l Deny IGMP any any — Deny every IGMP packet. l Add permit IP any any — Add a permit any any rule at the latest sequence.
Click the Options ( ) button to Edit the lists configured in the switch or Refresh the page. Options include:
l Seq. no — The ACL rule number for each exception entry. l Multicast Address — The multicast address allowed to flood. l Destination Port — The optional destination port for traffic destinated for the
multicast address. This can be left blank to specify any port, a single port, or a range of ports using “-“.
110

Interface Configuration Use this page to configure which Exception Lists are applied to each port. Click the Options ( ) button to Edit multiple ports are once or to Refresh the page. Click the Action button to edit a single port at a time.
Multicast Forwarding Database
Summary Use this page for a summary of the multicast data collected by the switch. Click Options, then Refresh to get the latest information.
111

IGMP Snooping Use this table to gather information about the IGMP snooping traffic collected by the switch. Click Options ( ), then Refresh to get the latest information or click Clear to reset the table. Note: -__.Not all multicast traffic is handled by IGMP snooping. Read Understanding Spanning Tree Protocol (STP) & Best Practices for more information.
Group Address Use this table to see the multicast group addresses the switch has recorded. Click Options ( ), then Refresh to get the latest information.
112

Statistics Use this page to view multicast statistics the switch has gathered.
113

Loop Protection Loop Protection detects loops in downstream switches that do not have spanning tree configured. When a loop-protected interface detects a loop, it can disable itself. Caution: -.Do not use Loop Protection on uplink ports between switches with spanning tree enabled. Loop Protection is designed for unmanaged switches that drop spanning tree BPDUs.
Loop Protection Configuration Loop Protection sends loop protection protocol data units (PDUs) to the multicast address 01:80:C2:00:00:08. When an interface receives a PDU, it compares the source MAC address with the switch’s. If the MAC address matches a loop is detected and a configured action is taken. Shutdown Port, Shutdown Port and Log, or Log Only. To configure Loop Protection:
1. Enable Loop Protection globally for the switch. 2. Enter a Transmission Time (in seconds) that the switch sends PDU packets on
Loop Protected interfaces. The default is 5. 3. Enter an amount for the Maximum PDU Received that the interface can receive
before taking the configured action. The default is 1. 4. Enter the Shutdown Time (in seconds) that the interface shuts down when a loop
is detected. The default is 0.
114

5. Click the Action ( )button for the interface you’d like to configure or use the Options button > Edit to select multiple interfaces to configure at once.
Note: -__.You can quickly enable Loop Protection using the toggle in each row.
6. A new window appears with configurable options. Enable Loop Protection on the interface, then select an Action to take. Shutdown Port, Shutdown Port and Log, or Log Only. Then, click Save.
115

7. The window closes and you return to the Loop Protection Configuration table. Click Apply at the top of the page.
The Loop Protection Configuration table gives an overview of what interfaces have Loop Protection enabled, how they’re configured, and the Time of Last Loop.
Table field descriptions: l Interface — The switchport or LAG number. l Name — The name configured for the switchport or LAG. l Loop Protection — Displays if Loop Protection is enabled or disabled on the port. Click to toggle this setting. l Action — The action taken when a loop is detected on the interface. l Status — Displays if the interface link is up or down.
116

l Loop — Indicates if there is a loop currently detected. The field is blank when there is no loop detected.
l Loop Count — The number of loops that have been detected on the interface. l Time of Last Loop — The date and time of the last loop detected on the interface. Private VLAN Private VLANs provide port-based security and isolation between ports within the assigned VLAN. Traffic on ports assigned to a private VLAN can only be forwarded to and from uplink ports. Configuration Click the Options ( ) button to Edit multiple VLAN IDs at once or to Refresh the page. Click the Action button to configure a single VLAN.
117

A VLAN can be one of the following Types: l Unconfigured — The VLAN is not configured as a private VLAN. l Primary — A private VLAN that forwards the traffic from the promiscuous ports to isolated ports, community ports, and other promiscuous ports in the same private VLAN. Only one primary VLAN can be configured per private VLAN. All ports within a private VLAN share the same primary VLAN. l Isolated — A secondary VLAN that carries traffic from isolated ports to promiscuous ports. Only one isolated VLAN can be configured per private VLAN. l Community — A secondary VLAN that forwards traffic between ports that belong to the same community and to the promiscuous ports. Multiple community VLANs can be configured per private VLAN.
118

Association Use the Association page to assign an Isolated or Community VLAN to a Primary VLAN. Click the Options ( ) button to Edit multiple VLAN IDs at once or to Refresh the page. Click the Action button to configure a single VLAN.
119

Interface Use this page to configure the private VLAN mode for each interface.
Click the Options ( ) button to Edit multiple VLAN IDs at once or to Refresh the page. Click the Action button to configure a single VLAN. The interface(s) can be set to one of the following modes:
l General — The interface is not a member of a private VLAN. l Promiscuous — The interface belongs to a primary VLAN and can communicate
with all interfaces in the private VLAN, including other promiscuous ports, community ports, and isolated ports. l Isolated Trunk — The interface also belongs to a primary VLAN. It carries traffic from isolated ports to promiscuous ports. Only one isolated VLAN can be configured per private VLAN. An isolated trunk port carries tagged traffic of multiple isolated VLANs and normal VLANs. l Promiscuous Trunk — The interface belongs to a primary VLAN and can communicate with all interfaces in the private VLAN, including other promiscuous trunk ports, community ports, and isolated ports. l Host — The interface belongs to a secondary VLAN and, depending upon the type of secondary VLAN, can either communicate with other ports in the same community (if the secondary VLAN is a community VLAN) and with the
120

promiscuous ports or is able to communicate only with the promiscuous ports (if the secondary VLAN is an isolated VLAN).
Neighbors
LLDP
Global Use this page to configure global Link Layer Discovery Protocol (LLDP) settings for the switch. LLDP is a generic protocol used to advertise the device’s capabilities to other devices on the network.
Configurable settings include: l Transmit Interval (Seconds) — The number of seconds between LLDP transmissions. l Transmit Hold Multiplier — Multiply the value entered with the Transmit interval to determine the Time to Live (TTL) value that the switch advertises.
121

The TTL value is the number of network hops that a packet can take before it’s discarded by the router.
l Re-Initialization Delay (Seconds) — The number of seconds to wait before attempting to reinitialize LLDP on a port after the port’s LLDP operating mode changes.
l Notification Interval (Seconds) — The minimum number of seconds to wait between transmissions of SNMP trap notifications on the switch.
Interface Summary Use this page to configure LLDP settings on individual ports.
To configure LLDP on a port(s): 1. Click the Options button to edit multiple ports, or the Action button to edit an
individual port. 2. For Port ID Subtype, select if you’d like LLDP to advertise the port’s MAC address or
the Interface Name. 3. Enable or disable if the port can Transmit or Receive LLDP advertisements. 4. Toggle Receive on so the device can receive LLDPDUs from other devices. 5. Toggle Notify on for the interface to send SNMP notifications when a link partner
device is added or removed.
122

6. Enable Transmit Management Information so other remote management devices on the network can locate the switch.
7. Select Optional TLV(s) for the switch to advertise. 8. Click Save, then Apply at the top of the page.
123

Local Devices Use this page to gather LLDP information about the switchports. Click the Actions ( ) button to get more information about the port.
124

Remote Devices Use this page to view LLDP information collected by the device connected to the switch’s port. Click the Actions button to get more information about the connected device.
125

Statistics Use this page to view LLDP counts. Click Options( ), then Refresh to get the most upto-date information. Click Clear to reset the table.
126

LLDP-MED
Global LLDP-MED is an extension of LLDP. MED stands for Media Endpoint Device and is typically used for voice over IP (VoIP). Note: -__.LLDP and LLDP-MED cannot operate simultaneously. If a device receives LLDP packets it cannot send LLDP-MED packets until it receives LLDP-MED packets. Likewise, for LLDP. Use this page to enter a value for the Fast Start Repeat Count. This is the number of LLDP-MED Protocol Data Units (PDUs) that can be transmitted. Click Apply to save changes.
127

Interface Summary Use this page to configure LLDP-MED settings on individual ports.
To configure LLDP-MED on a port(s): 1. Click the Options ( ) button to edit multiple ports, or the Action button to edit an
individual port. 2. Enable or disable LLDP-MED on the port. 3. Enable or disable Notification Mode to be notified of topology changes. 4. Select optional Transmit TLVs to advertise.
128

5. Click Save, then Apply at the top of the page. 129

Local Devices Use this page to gather LLDP-MED information about the switchports. Click the Actions ( ) button to get more information about the port.
130

Remote Devices Use this page to view LLDP-MED information collected by the device connected to the switch’s port. Click the Actions ( ) button to get more information about the port.
131

MAC Address Table Use the page to see which MAC addresses the switch has recorded traffic from on a port(s) and which VLAN they’re a member of. Use the Options button to refresh the page, or to select how many rows to display. Pro Tip: -_Use the Filter By field to search for MAC addresses.
L2 ARP This pages displays the learned IP and MAC address of connected devices on each interface.
132

ARP Table
Summary The ARP table displays MAC and IP address of devices that have communicated with the switch. Use the Options( ) button to refresh the page or clear the table. Use the Action button to delete an individual entry.
Table fields include: l IP Address — The IP address of the device. l MAC Address — The MAC address of the device. l Interface – The VLAN ID associated with the device. l Type ­ The type of IP address the device is broadcasting. Dynamic or static. Note: -__.Devices with MAC reservations appear as dynamic. l Age ­ How long the switch has seen the connection to the device. (Days:Hours:Minutes:Seconds)
Configuration Use this page to configure the ARP Table’s settings.
133

Configurable settings include: l Age Time (Seconds) — The amount of time that a dynamic ARP entry remains in the ARP table before aging out. l Response Time (Seconds) — The amount of time, that the device waits for an ARP response to an ARP request that it sends. l Retries — The number of attempts the switch will send an ARP request if an ARP response isn’t received. This number includes the initial ARP request. l Cache Size — The maximum number of entries allowed in the ARP table. This number includes all static and dynamic ARP entries.
134

l Dynamic Renew — Enable to allow the switch to automatically renew dynamic ARP entries when they age out.
135

Routing
Araknis 920 switches support layer 3 routing to create routes between interfaces and PIM-SM (sparse mode) for multicast traffic. IP IGMP Interface Configuration Use this page to enable IGMP routing.
Configurable options include: l Enable — Enables IGMP on the device. l Router Alert Check — Enable for the switch to inspect packets when they are being forwarded, even though the packet is not directly addressed to this switch. l Interfaces Enabled for IGMP — Displays the interfaces with IGMP administratively enabled. l VLANs Enabled for IGMP — Displays the VLANs with IGMP administratively enabled.
136

Interface Configuration Use this page to configure IGMP on a per-interface level. Click the Options ( ) button to edit multiple interfaces at once, or the Action button to edit a single interface. There’s also a toggle to quickly enable or disable the IGMP settings on the interface.
Configurable options include: l Enable — Enables the administrative IGMP settings on the interface. l Version — Select the IGMP version being used. l Query Interval — Enter the amount of time the IGMP snooping querier on the device should wait between sending periodic IGMP queries. l Max Response Time — Enter the number of seconds the interface should wait after sending a query if it does not receive a report for a particular group. The value should be less than the Group Membership Interval. l Robustness — Enter the number of times an IGMP query should be sent in case of packet loss. A higher value increases the timeout time for multicast groups. l Startup Query Interval — Enter an interval for the IGMP querier to send general inquiries at startup. l Startup Query Count — Enter the number of queries to send at startup.
137

l Last Member Query Count — For IGMPv2, this is the number of group-specific queries a querier sends after receiving a leave message. For IGMPv3, this is the number of group-and-source-specific queries that a querier sends after receiving a report that changes multicast source and group mappings.
l Last Member Query Interval — For IGMPv2, this is the interval a querier sends group-specific queries after receiving a leave message. For IGMPv3, this is the interval a querier sends group-and-source-specific queries after receiving a report that changes multicast source and group mappings.
Summary This page displays a summary of the IGMP settings configured on each interface. Use the Options ( ) button to refresh the table.
138

IP Multicast

Configuration Use this page to administratively enable IP multicast routing globally.
PIM Configuration Use this page to administratively enable Protocol Independent Multicast (PIM) globally.
Candidate Bootstrap Router Use this page to configure the Bootstrap Router (BSR).
139

Configurable settings include: l Interface — Select the interface to configure. l Hash Mask — Specify the hash mask length to use in BSR messages. l BSR Priority — Specify the BSR priority to use in BSR messages. l C-BSR Adv. Interval — Enter the BSR message transmission interval in seconds.
140

Candidate RP Configuration Use this page to configure a Candidate RP (Rendezvous Point). Select an Interface from the dropdown, then click Options ( ), thenAdd to configure an RP.
Settings include: l Group Address — Enter the IP address of router interface. l Group Mask — Enter the subnet mask fo the router interface. l C-RP Adv. Interval — Enter the BSR message transmission interval in seconds.
Static RP Configuration Use this page to configure a Static RP (Rendezvous Point). Click Options ( ), then Add to configure an RP.
Settings include: l RR Address — Enter the IP address of the router acting as the RP for a group range. l Group Address — Enter the IP address of the router interface. l Group Mask — Enter the subnet mask of the router interface. l Override — Enable to allow the static RP to take precedence over auto-RP for the group range.
141

Source Specific Multicast Configuration Use this page to configure a PIM Source Specific Multicast Group. Click Options ( ), then Add to configure a group. The new window asks for a Group Address and Group Mask.
142

Interface Configuration Use this page to configure multicast on a per- interface level. Click the Options ( ) button to edit multiple interfaces at once, or the Action button to edit a single interface. There’s also a toggle to quickly enable or disable the IGMP settings on the interface.
Configurable options include: l Enable — Enables the PIM on the interface. l BSR Border — Enable to prevent BSR messages from being sent or received through the interface. l DR Priority — Enter a Designated Router (DR) priority for the interface. The interface with the highest priority is elected DR. l Hello Interval — Enter the frequency that PIM hello messages are sent on the interface in seconds. l Join Prune Interval — Enter a Join/Prune Interval for the specified interface.
143

IP Mutlicast Information
Elected Bootstrap Router This page displays information about the elected Bootstrap Router (BSR).
RP Mapping This page displays information about the RP (Rendezvous Points) on the switch. Use the Options ( ) button to refresh the page.
Multicast Route Table This page displays information about the multicast routes on the switch. Use the Options ( ) button to refresh the page.
144

Router
Configuration Use this page to enable or disable the routing feature of the switch.
Configurable settings include: l Routing Mode — Enable for the switch to act as a Layer 3 device by routing packets between interfaces configured for IP routing. l ICMP Echo Replies — Enable to allow the device to send ICMP Echo Reply messages in response to ICMP Echo Request (ping) messages it receives. l ICMP Redirects — Enable to allow the device to send ICMP Redirect messages to hosts. An ICMP Redirect message notifies a host when a better route to a particular destination is available on the network segment. l ICMP Rate Limit Interval — Enter the maximum burst interval for ICMP error messages transmitted by the switch. The rate limit for ICMP error messages is configured as a token bucket. The ICMP Rate Limit Interval specifies how often the token bucket is initialized with tokens of the size configured in the ICMP Rate Limit Burst Size field. l ICMP Rate Limit Burst Size — Enter the number of ICMP error messages that can be sent during the burst interval configured in the ICMP Rate Limit Interval field.
145

l Static Route Preference — The default distance (preference) for static routes. Lower route-distance values are preferred when determining the best route. This value is used when using the CLI to configure a static route and no preference is specified. Changing the Static Route Preference does not update the preference of existing static routes.
l Global Default Gateway — The gateway IP address that the switch uses. If the destination IP address in a packet does not match any routes in the routing table, the packet is sent to the default gateway. The gateway specified in this field is preferable to a default gateway learned from a DHCP server.
146

Interface Configuration Use this page to enable and configure routing on specific interfaces. Each interface is disabled by default. Use the Options ( ) button to add a VLAN, or the Action button in an interface row to configure routing features. Each row has a toggle to quickly enable or disable the interface.
Configurable options include: l Type — The type of interface being configured. l Interface — The type of interface being configured. VLAN or Interface (port). l Routing Mode — Enable to use the routing feature on the interface. l Enable — Enables the port to forward traffic. l IP Address Configuration Method — Select the method that the interfaces obtain an IP Address. Options include: l None — The interface does not receive an IP address. l Manual — Select this option to use the fields below to configure the interface’s IP address and subnet mask. l DHCP –The interface automatically obtains an IP address from the DHCP server.
147

l DHCP Client Identifier — Also known as Option 61, is used by DHCP clients to specify their unique identifier. DHCP servers use this value to index their database of address bindings. This value is expected to be unique for all clients in an administrative domain. The Client Identifier string is displayed beside the check box when DHCP is enabled on the port with the Client Identifier option enabled. This web page must be refreshed once this change is made.
l IP Address — Only available when the interface IP Address Configuration Method is set to Manual.
l Subnet Mask — Only available when the interface IP Address Configuration Method is set to Manual.
l IP MTU — Enter the largest IP packet size the interface can transmit, in bytes. The Maximum Transmission Unit (MTU) is the maximum frame size minus the length of the Layer 2 header.
l Bandwidth — Configure the bandwidth on the interface. This setting communicates the speed of the interface to higher-level protocols.
l Encapsulation Type — The link layer encapsulation type for packets transmitted from the interface. Ethernet is the only option.
l Forward Net Directed Broadcasts — Enable to forward network-directed broadcasts. If this option is clear, network-directed broadcasts are dropped. A network-directed broadcast is a broadcast directed to a specific subnet.
l Destination Unreachables — When enabled, the interface is allowed to send ICMP Destination Unreachable message to a host if the intended destination cannot be reached. If this option is clear, the interface does not send ICMP Destination Unreachable messages.
l ICMP Redirects — When enabled, the interface is allowed to send ICMP Redirect messages to notify a host when a better route to a particular destination is available on the network segment. ICMP Redirects must be enabled both globally, and on the interface, to work.
148

l Proxy ARP — Enable for the interface to be able to respond to an ARP request for a host other than itself. An interface can act as an ARP proxy if it is aware of the destination and can route packets to the intended host, which is on a different subnet than the host that sent the ARP request.
l Local Proxy ARP — When enabled, the interface can respond to an ARP request for a host other than itself. Unlike proxy ARP, local proxy ARP allows the interface to respond to ARP requests for a host that is on the same subnet as the host that sent the ARP request. This is useful when a host is not permitted to reply to an ARP request from another host in the same subnet, like when using the protected ports feature.
Statistics This page displays IP traffic counters.
IP Routing
Route Table This table displays information about routes on the switch. Use the Options ( ) button to refresh the table.
Configured Routes Use this page to view and configure routes on the switch. Click the Options ( ) button to add a new route.
149

Configurable settings include: l Route Type — Select one of the following routes to configure: l Default — The route the device uses to send a packet if the routing table does not contain a longer matching prefix for the packet’s destination. The routing table can contain only one default route. l Static — A manually added route. l Static Reject — A route where packets that match the route are discarded instead of forwarded. The device might send an ICMP Destination Unreachable message. l Network Address — Enter the IP route prefix for the destination network. This IP address must contain only the network portion of the address and not the host bits. When adding a default route, this field must be 0.0.0.0. l Subnet Mask — Enter the IP subnet mask (also known as the network mask or netmask) associated with the network address. The subnet mask defines which portion of an IP address belongs to the network prefix, and which portion belongs to the host identifier. When adding a default route, this field must be 0.0.0.0. l Next Hop IP Address — Enter the outgoing router IP address to use when forwarding traffic to the next router (if any) in the path toward the destination. The next router is always an adjacent neighbor or the IP address of the local interface for a directly attached network. When adding a static reject route, this field must be 0.0.0.0 because the packets are dropped rather than forwarded.
150

l Preference — Enter a preference value for the route. A lower preference value is a more preferred route. When the routing table has more than one route to the same network, the device selects the route with the lowest route preference.
IP Route Summary This page displays a summary of the IP routes and route table counters the switch has collected.
QoS
Class of Service Class of Service (CoS) allows you to directly configure certain aspects of switch queueing, which allows you to configure Quality of Service (QoS) behavior when the complexities of DiffServ aren’t required. The priority of a packet arriving at an interface 151

can be steered to the appropriate outbound CoS queue through a mapping table. The CoS queue characteristics, such as minimum guaranteed bandwidth and transmission rate shaping, are configurable at the queue or port level. IP DSCP Use the IP DSCP Mapping Table to map an IP DSCP value to a Traffic Class.
Click the Action ( ) button to assign individual IP DSCP values to a Traffic Class, or the Options button to assign multiple IP DSCP values to the same Traffic Class. Click Apply, at the top of the page, when done.
152

Interface Use the table to apply an interface shaping rate to individual interfaces or to all at once.
Click the Action ( ) button to edit individual interfaces, or the Options button to edit multiple interfaces at once. Configurable settings include:
l Trust Mode — Select the Trust Mode for ingress traffic on the interface. The options are: l Untrusted — The interface ignores all priority designations in incoming packets and sends them to a traffic queue based on the ingress port’s default priority. l Trust dot1p — The port accepts the designated 8021.p priority encoded in the arriving packets. l Trust IP ­ DSCP: The port accepts the designated IP DSCP priority encoded in the arriving packets.
l Shaping Rate — The maximum amount of traffic that can leave an interface. The specified value is a percentage of the maximum negotiated bandwidth.
Queue Use this page to designate what a queue does by configuring switch egress queues. Configurable queue parameters include bandwidth allocations and the scheduling of packet transmissions from the set of all queues on a port.
153

The Total Minimum Bandwidth Allocation is displayed as a percentage at the top of the page. Use the Restore Default toggle or click Options ( ), then Refresh to clear all configurations.
To configure CoS interface queues: 1. Select an Interface. This can be an individual switchport or LAG.
154

2. Select an individual Queue ID by clicking the Action ( ) button in the corresponding row or click the Options button to select multiple Queue IDs to configure.
3. Enter a Minimum Bandwidth to allocate to the queue. Setting this value higher than the maximum bandwidth automatically increases the maximum to the same value. A value of zero means there is no guaranteed minimum.
Note: -__.The sum of individual Minimum Bandwidth values for all queues in the selected interface cannot exceed 100.
4. Select one of the following options for Scheduler Type: l Weighted — Weighted round robin associates a weight to each queue. l Strict — Services traffic with the queue’s highest priority first. 5. Select one of the following Queue Management Types:
l Taildrop — All packets on a queue are safe until congestion occurs. At this point, any additional packets queued are dropped.
l WRED — Weighted Random Early Detection (WRED) drops packets selectively
155

based their drop precedence level.
6. Click Save and when the window closes, click the Apply button to save changes. ACL Rules
Access Control Lists (ACLS) make sure that only authorized users have access to specific resources and block unwanted attempts by filtering packets based on rules. ACLs are used to control traffic flow, restrict the contents of routing updates, decide which types of traffic to block or forward, and provide network security. Pakedge MS switches support IPv4 and MAC ACLs. To create an ACL, you must: 1. Create an ACL rule with an identifier (ACL ID) on the Summary page. 2. Define the ACL rule. 3. Assign the ACL ID to a switch port or VLAN interface.
156

Summary Use this page to configure Access Command List (ACL) Rules and enable ACL Counters.
To add an ACL rule: 1. Click Options ( ), then Add. 2. Select an ACL Type: l IPv4 Standard — Match criteria is based on the source address of IPv4 packets. l IPv4 Extended — Match criteria can be based on the source and destination
addresses, source and destination Layer 4 ports, and protocol type of IPv4 packets. The ACL identifier can be an alphanumeric name instead of a number, known as IPv4 Named in other switches. l IPv6 Named — Match criteria can be based on information including the source and destination IPv6 addresses, source and destination Layer 4 ports, and protocol type within IPv6 packets. l Extended MAC — Match criteria can be based on the source and destination MAC addresses, 802.1p user priority, VLAN ID, and EtherType value within Ethernet frames.
157

3. Enter a number for the ACL Identifier. 4. Click Add, then Apply at the top of the page.
Interfaces Use this page to add an ACL rule to an interface (port).
To add an ACL rule to a port: 1. Click Options ( ), then Add. 2. Select the Interface (port) to apply the ACL rule to. 3. Select a Direction for the packets to be checked against. If the packets should be
checked against the ACL rules when the port(s) receives it, select Inbound. Select Outbound if the packets should be checked when the packets are exiting the port (s).
158

4. Enter a Sequence Number between 1 to 4294967295. Typing 0 auto-generates a sequence number. The order the ACL is applied to traffic on the interface relative to other ACLs associated with the interface in the same direction. When multiple ACLs are applied to the same interface in the same direction, the ACL with the lowest sequence number is applied first, and the other ACLs are applied in ascending numerical order.
5. Select the ACL Identifier of the ACL rule to apply to the port(s). 6. Click Add, then Apply at the top of the page.
159

VLANs Use this page to associate one or more ACLs with one or more VLANs configured on the switch.
To Apply an ACL to a VLAN: 1. Click the Options ( ) button, then Add. 2. Select the VLAN ID or VLAN ID range to apply the ACL rule to. 3. Select a Direction for the packets to be checked against. If the packets should be
checked against the ACL rules when the port(s) receives it, select Inbound. Select Outbound if the packets should be checked when the packets are exiting the port (s). 4. Enter a Sequence Number between 1 to 4294967295. Typing 0 auto-generates a sequence number. The order the ACL is applied to traffic on the interface relative to other ACLs associated with the interface in the same direction. When multiple ACLs are applied to the same interface in the same direction, the ACL with the lowest sequence number is applied first, and the other ACLs are applied in ascending numerical order. 5. Select the ACL Identifier of the ACL rule to apply to the port(s). 6. Click Add, then Apply at the top of the page.
160

Control Plane Use this page to assign Sequence Numbers to ACLs.
To assign a Sequence Number to an ACL: 1. Click Options ( ), then Add to add open a new Contorl Plane window. 2. Enter a Sequence Number between 1 and 4294967295 to indicate the position of
the rule in the ACL. Type in 0 to auto-generate a sequence number. 3. Select an ACL Identifier to apply the Sequence Number to. After a Control Plane has been added you can use the Action button to edit or delete an entry from the table.
161

Statistics Use this page to view how many packets an ACL has forwarded or discarded until the number reaches the rollover value of the counter. ACL counters do not interact with DiffServ policies or policy-based routing counters. To Clear the Counters:
1. Click the Options ( ) button, then Clear. 2. Select a Clear Counter Mode.
If Rule counter is selected, ACL Identifier and Sequence Number must be provided. If clear ACL counter is selected, the user can provide ACL Type to clear the hit count of all ACLs in that type or provide an ACL Identifier to clear the hit count of that ACL. 3. Click OK.
Table field descriptions: l Sequence Number — The number that indicates the rule position within the ACL. l Perform Action — Whether the rule permits or denies traffic. l Match Conditions — The criteria used to determine if the network traffic matches the ACL rule.
162

l Rule Attributes — Each action the ACL rule performs. l Hit Count — The number of packets that match the ACL rule.
If a rule does not have a rate limit, the hit count is the number of matched packets the port forwarded or discarded. If a rule has a rate limit, and the sent traffic exceeds the configured rate, the hit count displays the matched packet count equal to the sent rate. If the sent traffic rate is less than the configured rate, the hit count displays only the matched packet count. ACL Configuration IPv4 Standard Use this page to configure IPv4 Standard ACLs. Select an ACL Identifier from the dropdown, then click the Options ( ) button to edit or Resequence multiple ACLs or the Actions button to edit a single ACL.
Configurable settings include: l Perform Action — The action to take when a packet or frame matches the criteria in the rule: l Permit — The packet or frame is forwarded. l Deny — The packet or frame is dropped. l Remark – Accepts alpha-numeric and special characters (-, _, and space) and is also case-sensitive. It can have 1 to 100 characters.
163

l Every — When selected, all packets will match the rule and are either permitted or denied. This option is exclusive to all other match criteria and no other match criteria can be configured. To configure specific match criteria, do not enable Every.
l Source IP Address — The source port IP address in the packet and source IP wildcard mask (in the next field) to compare to the IP address in a packet header.
l Source Wildcard Mask — Wildcard masks determine which bits in the IP address are used and which are ignored. A wildcard mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all the bits are important. Wildcard masking for ACLs operates like the inverse of a subnet mask. With a subnet mask, the mask has ones (1’s) in the bit positions used for the network address, and zeros (0’s) for the bit positions that are not used. In contrast, a wildcard mask has (0’s) in a bit position that must be checked. A ‘1’ in a bit position of the ACL mask indicates the corresponding bit can be ignored. This field is required when you configure a source IP address.
l Assign Queue — The number that identifies the hardware egress queue that will handle all packets that match this rule.
l Interface — Select an interface (port) to associate with the rule. l Interface Action — Select one of the following options:
l Redirect ­ Redirects traffic that meets the rule to the selected interface instead of being processed on the original port.
l Mirror ­ Mirrors (copies) traffic that matches the rule to the selected interface.
l Log — Enables logging for the ACL rule (subject to resource availability in the device). If the Access List Trap Flag is also enabled, periodic traps are generated indicating the number of times this rule went into effect during the current report interval. A fixed five-minute report interval is used for the entire system. A trap is
164

not issued if the current interval’s ACL rule hit count is zero. l Time Range Name — The name of the time range that imposes a time limitation
on the ACL rule, up to 31 characters. If a time range with the specified name does not exist, and the ACL containing this ACL rule is associated with an interface, the ACL rule is applied immediately. If a time range with the specified name exists, and the ACL containing this ACL rule is associated with an interface, the ACL rule is applied when the time range with the specified name becomes active. The ACL rule is removed when the time range with the specified name becomes inactive. l Committed Rate — The allowed transmission rate for packets on the interface. l Burst Size — The number of bytes allowed in a temporary traffic burst.
165

IPv4 Extended Use this page to configure IPv4 Extended ACLs. Select an ACL Identifier from the dropdown, then click the Options ( )button to edit or Resequence multiple ACLs or the Actions button to edit a single ACL.
Configurable settings include: l Sequence — The position of a rule within the ACL. If the sequence number is not specified during rule creation, the rule is automatically assigned a sequence number after it is added to the ACL. The rules are displayed based on their position within the ACL, which can be renumbered. Packets are checked against the rule criteria in order, from the lowest-numbered rule to the highest. When the packet matches the criteria in a rule, it is handled according to the rule action and attributes. If no rule matches a packet, the packet is discarded based on the implicit deny all rule, which is the final rule in every ACL. l Perform Action — The action to take when a packet or frame matches the criteria in the rule: l Permit — The packet or frame is forwarded. l Deny — The packet or frame is dropped. l Remark – Accepts alpha-numeric and special characters (-, _, and space) and is also case-sensitive. It can have 1 to 100 characters. l Every — When selected, all packets will match the rule and are either permitted or denied. This option is exclusive to all other match criteria and no other match criteria can be configured. To configure specific match criteria, do not enable
166

Every. l Protocol – The IANA-assigned protocol to match within the IP packet. l Fragments — IP ACL rule to match on fragmented IP packets. l Source IP Address — The source port IP address in the packet and source IP
wildcard mask (in the next field) to compare to the IP address in a packet header. l Source Wildcard Mask — Wildcard masks determine which bits in the IP address
are used and which are ignored. A wildcard mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all the bits are important. Wildcard masking for ACLs operates like the inverse of a subnet mask. With a subnet mask, the mask has ones (1’s) in the bit positions used for the network address, and zeros (0’s) for the bit positions that are not used. In contrast, a wildcard mask has (0’s) in a bit position that must be checked. A ‘1’ in a bit position of the ACL mask indicates the corresponding bit can be ignored. This field is required when you configure a source IP address. l Source L4 Port Option — The TCP/UDP source port to match in the packet header. Select Equal, Not Equal, Less Than, Greater Than, or Range and specify the port number or keyword in Source L4 Port Value. l Source L4 Port Value — TCP port keywords include BGP, Domain, Echo, FTP, FTP Data, HTTP, SMTP, Telnet, POP2, and POP3. UDP port keywords include Domain, Echo, NTP, RIP, SNMP, TFTP, TIME, and WHO. If it is not a keyword, it must be a string between 0 and 65535. l Source L4 Port Range Upper Bound — TCP port keywords include BGP, Domain, Echo, FTP, FTP Data, HTTP, SMTP, Telnet, POP2, and POP3. UDP port keywords include Domain, Echo, NTP, RIP, SNMP, TFTP, TIME, and WHO. If it is not a keyword, it must be a string between 0 and 65535.
167

l Destination IP Address — The destination port IP address in the packet and destination IP wildcard mask (in the next field) to compare to the IP address in a packet header.
l Destination Wildcard Mask — Wildcard masks determine which bits in the IP address are used and which are ignored. A wildcard mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all the bits are important. Wildcard masking for ACLs operates like the inverse of a subnet mask. With a subnet mask, the mask has ones (1’s) in the bit positions used for the network address, and zeros (0’s) for the bit positions that are not used. In contrast, a wildcard mask has (0’s) in a bit position that must be checked. A ‘1’ in a bit position of the ACL mask indicates the corresponding bit can be ignored. This field is required when you configure a source IP address.
l Destination L4 Port Option — The TCP/UDP destination port to match in the packet header. Select Equal, Not Equal, Less Than, Greater Than, or Range and specify the port number or keyword in Source L4 Port Value.
l Destination L4 Port Value — TCP port keywords include BGP, Domain, Echo, FTP, FTP Data, HTTP, SMTP, Telnet, POP2, and POP3. UDP port keywords include Domain, Echo, NTP, RIP, SNMP, TFTP, TIME, and WHO. If it is not a keyword, it must be a string between 0 and 65535.
l DestinationL4 Port Range Upper Bound — TCP port keywords include BGP, Domain, Echo, FTP, FTP Data, HTTP, SMTP, Telnet, POP2, and POP3. UDP port keywords include Domain, Echo, NTP, RIP, SNMP, TFTP, TIME, and WHO. If it is not a keyword, it must be a string between 0 and 65535.
l TTL Field Value — IP ACL rule to match on the specified TTL field value. l IGMP Type — The IP ACL rule to match on the specified IGMP type. This option is
available only if the protocol is IGMP.
168

l ICMP Type — The IP ACL rule to match on the specified ICMP type. This option is available only if the protocol is ICMP.
l ICMP Code — The IP ACL rule to match on the specified ICMP code. This option is available only if the protocol is ICMP.
l ICMP Message — IP ACL rule to match on the ICMP message type and code. Select one of the following supported ICMP messages: Echo, Echo-Reply, Host- Redirect, Mobile-Redirect, Net-Redirect, Net-Unreachable, Redirect, Packet- Too-Big, PortUnreachable, Source-Quench, Router-Solicitation, Router- Advertisement, TimeExceeded, TTL-Exceeded, and Unreachable. This option is available only if the protocol is ICMP.
l TCP Flags — The IP ACL rule to match on the TCP flags. When a + flag is specified, a match occurs if the flag is set in the TCP header. When a – flag is specified, a match occurs if the flag is not set in the TCP header. When Established is specified, a match occurs if either RST or ACK bits are set in the TCP header. This option is available only if the protocol is TCP.
l IP DSCP — Matches the packet IP DiffServ Code Point (DSCP) value to the rule. The DSCP value is defined as the high-order six bits of the Service Type octet in the IP header. This field can be a keyword or a string between 0 – 63.
l IP Precedence — Matches the IP Precedence value to the rule. The IP Precedence field in a packet is defined as the high-order three bits of the Service Type octet in the IP header.
l IP TOS Bits — Matches on the Type of Service (TOS) bits in the IP header. The IP TOS field in a packet is defined as all eight bits of the Service Type octet in the IP header. For example, to check for an IP TOS value having bits 7 and 5 set and bit 1 clear, where bit 7 is most significant, use a TOS Bits value of 0xA0 and a TOS Mask of 0xFF. Requires the bits in a packet’s TOS field to match the two-digit hexadecimal number entered in this field.
169

l IP TOS Wildcard Mask — The bit positions that are used for comparison against the IP TOS field in a packet. Specifying TOS Mask is optional. The format would be the same as IP TOS Bits: two-digit hexadecimal numbers.
l Assign Queue — The number that identifies the hardware egress queue that will handle all packets matching this rule.
l Interface — Select an interface (port) to associate with the rule. l Interface Action — Select one of the following options:
l Redirect ­ Redirects traffic that meets the rule to the selected interface instead of being processed on the original port.
l Mirror ­ Mirrors (copies) traffic that matches the rule to the selected interface.
l Log — Enables logging for the ACL rule (subject to resource availability in the device). If the Access List Trap Flag is also enabled, periodic traps are generated indicating the number of times this rule went into effect during the current report interval. A fixed five-minute report interval is used for the entire system. A trap is not issued if the current interval’s ACL rule hit count is zero.
l Time Range Name — The name of the time range that imposes a time limitation on the ACL rule, up to 31 characters. If a time range with the specified name does not exist, and the ACL containing this ACL rule is associated with an interface, the ACL rule is applied immediately. If a time range with the specified name exists, and the ACL containing this ACL rule is associated with an interface, the ACL rule is applied when the time range with the specified name becomes active. The ACL rule is removed when the time range with the specified name becomes inactive.
l Committed Rate — The allowed transmission rate for packets on the interface. l Burst Size — The number of bytes allowed in a temporary traffic burst.
170

IPv6 Named Use this page to configure IPv6 Extended ACLs. Select an ACL Identifier from the dropdown, then click the Options ( ) button to edit or Resequence multiple ACLs or the Actions button to edit a single ACL.
Configurable options include: l Sequence — The position of a rule within the ACL. If the sequence number is not specified during rule creation, the rule is automatically assigned a sequence number after it is added to the ACL. The rules are displayed based on their position within the ACL, which can be renumbered. Packets are checked against the rule criteria in order, from the lowest-numbered rule to the highest. When the packet matches the criteria in a rule, it is handled according to the rule action and attributes. If no rule matches a packet, the packet is discarded based on the implicit deny all rule, which is the final rule in every ACL. l Perform Action — The action to take when a packet or frame matches the criteria in the rule: l Permit — The packet or frame is forwarded. l Deny — The packet or frame is dropped. l Remark – Accepts alpha-numeric and special characters (-, _, and space) and is also case-sensitive. It can have 1 to 100 characters. l Every — When selected, all packets will match the rule and are either permitted or denied. This option is exclusive to all other match criteria and no other match criteria can be configured. To configure specific match criteria, do not enable
171

Every. l Protocol – Enter the IANA-assigned protocol to match within the IP packet. l Fragments — IP ACL rule to match on fragmented IP packets. l Source Prefix — The IPv6 prefix combined with IPv6 prefix length of the network or
host from which the packet is being sent. l Source Prefix Length — To indicate a destination host, specify an IPv6 prefix length
of 128. l Source L4 Port Option — The TCP/UDP destination port to match in the packet
header. Select Equal, Not Equal, Less Than, Greater Than, or Range and specify the port number or keyword in Source L4 Port Value. l Source L4 Port Value — TCP port keywords include BGP, Domain, Echo, FTP, FTP Data, HTTP, SMTP, Telnet, POP2, and POP3. UDP port keywords include Domain, Echo, NTP, RIP, SNMP, TFTP, TIME, and WHO. If it is not a keyword, it must be a string between 0 and 65535. l Source L4 Port Range Upper Bound — TCP port keywords include BGP, Domain, Echo, FTP, FTP Data, HTTP, SMTP, Telnet, POP2, and POP3. UDP port keywords include Domain, Echo, NTP, RIP, SNMP, TFTP, TIME, and WHO. If it is not a keyword, it must be a string between 0 and 65535. l Destination Prefix — The IPv6 prefix combined with the IPv6 prefix length to compare to a packet’s destination IPv6 address as a match criteria for the IPv6 ACL rule. l Destination Prefix Length — To indicate a destination host, specify an IPv6 prefix length of 128. l Destination L4 Port Option — The TCP/UDP destination port to match in the packet header. Select Equal, Not Equal, Less Than, Greater Than, or Range and specify the port number or keyword in Source L4 Port Value.
172

l Destination L4 Port Value — TCP port keywords include BGP, Domain, Echo, FTP, FTP Data, HTTP, SMTP, Telnet, POP2, and POP3. UDP port keywords include Domain, Echo, NTP, RIP, SNMP, TFTP, TIME, and WHO. If it is not a keyword, it must be a string between 0 and 65535.
l DestinationL4 Port Range Upper Bound — TCP port keywords include BGP, Domain, Echo, FTP, FTP Data, HTTP, SMTP, Telnet, POP2, and POP3. UDP port keywords include Domain, Echo, NTP, RIP, SNMP, TFTP, TIME, and WHO. If it is not a keyword, it must be a string between 0 and 65535.
l TTL Field Value –IP ACL rule to match on the specified TTL field value. l ICMP Type — The IP ACL rule to match on the specified ICMP type. This option is
available only if the protocol is ICMP. l ICMP Code — The IP ACL rule to match on the specified ICMP code. This option is
available only if the protocol is ICMP. l ICMP Message — IP ACL rule to match on the ICMP message type and code. Select
one of the following supported ICMP messages: Echo, Echo-Reply, Host-Redirect, Mobile-Redirect, Net-Redirect, Net-Unreachable, Redirect, Packet-Too-Big, PortUnreachable, Source-Quench, Router-Solicitation, Router-Advertisement, TimeExceeded, TTL-Exceeded, and Unreachable. This option is available only if the protocol is ICMP. l TCP Flags — The IP ACL rule to match on the TCP flags. When a + flag is specified, a match occurs if the flag is set in the TCP header. When a – flag is specified, a match occurs if the flag is not set in the TCP header. When Established is specified, a match occurs if either RST or ACK bits are set in the TCP header. This option is available only if the protocol is TCP. l Flow Label — A 20-bit number that is unique to an IPv6 packet, used by end stations to signify quality-of-service handling in routers. This value must be between 0 – 1048575.
173

l IP DSCP — Matches the packet IP DiffServ Code Point (DSCP) value to the rule. The DSCP value is defined as the high-order six bits of the Service Type octet in the IP header. This field can be a keyword or a string between 0 – 63.
l Routing — IPv6 ACL rule to match on routed packets. l Assign Queue — The number that identifies the hardware egress queue that will
handle all packets matching this rule. l Interface — Select an interface (port) to associate with the rule. l Interface Action — Select one of the following options:
l Redirect — Redirects traffic that meets the rule to the selected interface instead of being processed on the original port.
l Mirror — Mirrors (copies) traffic that matches the rule to the selected interface.
l Log — Enables logging for the ACL rule (subject to resource availability in the device). If the Access List Trap Flag is also enabled, periodic traps are generated indicating the number of times this rule went into effect during the current report interval. A fixed five-minute report interval is used for the entire system. A trap is not issued if the current interval’s ACL rule hit count is zero.
l Time Range Name — The name of the time range that imposes a time limitation on the ACL rule, up to 31 characters. If a time range with the specified name does not exist, and the ACL containing this ACL rule is associated with an interface, the ACL rule is applied immediately. If a time range with the specified name exists, and the ACL containing this ACL rule is associated with an interface, the ACL rule is applied when the time range with the specified name becomes active. The ACL rule is removed when the time range with the specified name becomes inactive.
l Committed Rate — The allowed transmission rate for packets on the interface. l Burst Size — The number of bytes allowed in a temporary traffic burst.
174

Extended MAC Use this page to configure MACExtended ACLs. Select an ACL Identifier from the dropdown, then click the Options ( ) button to edit or Resequence multiple ACLs or the Actions button to edit a single ACL.
Configurable options include: l Sequence Number — The position of a rule within the ACL. If the sequence number is not specified during rule creation, the rule is automatically assigned a sequence number after it is added to the ACL. The rules are displayed based on their position within the ACL, which can be renumbered. Packets are checked against the rule criteria in order, from the lowest-numbered rule to the highest. When the packet matches the criteria in a rule, it is handled according to the rule action and attributes. If no rule matches a packet, the packet is discarded based on the implicit deny all rule, which is the final rule in every ACL. l Perform Action — The action to take when a packet or frame matches the criteria in the rule: l Permit — The packet or frame is forwarded. l Deny — The packet or frame is dropped. l Remark – Accepts alpha-numeric and special characters (-, _, and space) and is also case-sensitive. It can have 1 to 100 characters. l Every — When selected, all packets will match the rule and are either permitted or denied. This option is exclusive to all other match criteria and no other match criteria can be configured. To configure specific match criteria, do not enable
175

Every. l Class of Service — The 802.1p user priority value to match within the Ethernet
frame. l EtherType — The EtherType value to match in an Ethernet frame. Specify the
number associated with the EtherType or specify one of the following keywords: appletalk, arp, ibmsna, ipv4, ipv6, IPX, mplsmcast, mplsucast, netbios, novell, pppoe, or rarp. l Source MAC Address — The MAC address to match to an Ethernet frame’s source port MAC address. If desired, enter the MAC Mask associated with the source MAC to match. l Source MAC Mask — The MAC address mask specifies which bits in the source MAC to compare against an Ethernet frame. Use F’s and zeros in the MAC mask, which is in a wildcard format. An F means that the bit is not checked, and a zero in a bit position means that the data must equal the value given for that bit. For example, if the MAC address is aa:bb:cc:dd:ee:ff, and the mask is 00:00:ff:ff:ff:ff, all MAC addresses with aa:bb:xx:xx:xx:xx result in a match (where x is any hexadecimal number). l Destination MAC Address — The MAC address to match t

References

Read User Manual Online (PDF format)

Loading......

Download This Manual (PDF format)

Download this manual  >>

araknis NETWORKS User Manuals

Related Manuals