SODOLA SL-SG008W Lightly Managed Switch User Manual
- August 14, 2024
- SODOLA
Table of Contents
SL-SG008W Lightly Managed Switch
“`html
Specifications
- Product Name: SODOLA Lightly Managed Switch
- Model: SL-SG008W
- Tech Support: support@sodola-network.com
- Version: V1.10
- Release Date: 2024-04-20
Product Information
The SODOLA Lightly Managed Switch is a network management switch
with various features and functionalities. It supports VLAN, QoS,
RSTP, SNMP, POE control, port aggregation, and more.
Web Light Webmaster Features
The Web Light Webmaster software provides the following
features:
-
Support for Logo, interface panel, and system information
display -
System information management including IP address setting,
user account management, and port setting -
Configuration options for VLAN, QoS, IGMP, Link aggregation,
Ring road protection, RSTP, Port mirror image, Port isolation,
bandwidth control, Giant frame, MAC restrain, Green Ethernet, EEE,
SNMP, MAC address management, and broadcast storm prevention
Product Usage Instructions
Login to Web Interface
To access the Web interface of the switch:
- Open a web browser and enter the IP address of the switch.
- Enter your login credentials (if required).
Control and Monitoring
The switch allows you to monitor and control various
aspects:
-
View port statistics by navigating to the Port Statistics
section. -
Perform cable diagnostics in the Cable Diagnostics
section.
Frequently Asked Questions (FAQ)
Q: What is the target audience for this manual?
A: The target audience for this manual is users who need to
configure the functions of the Web Light Management Switch
software.
Q: What features are supported by the Web light network
management switch function software?
A: The software supports VLAN, QoS, RSTP, SNMP, POE control,
port aggregation, and more.
“`
SODOLA Lightly Managed Switch Web Manual
SL-SG008W Tech Support:support@sodola-network.com
V1.10 2024-04-20
1
CATALOGS
Chapter 1 Manual Introduction ………………………………………………………………………………………………….. 3 1.1.
target audience ……………………………………………………………………………………………………………… 3 1.2. Manual
Conventions ……………………………………………………………………………………………………… 3
Chapter 2 Web Light Webmaster Features ……………………………………………………………………………………. 4 2.1
Function Introduction …………………………………………………………………………………………………….. 4
Chapter 3 Login Web Interface……………………………………………………………………………………………………….5 3.1
Sign in ………………………………………………………………………………………………………………………….. 5
Chapter 4 Systems……………………………………………………………………………………………………………………….. 6 4.1 System
Information ……………………………………………………………………………………………………….. 6 IP install
…………………………………………………………………………………………………………………………….. 7 4.2 User settings
…………………………………………………………………………………………………………………..8 4.3 Port Settings
…………………………………………………………………………………………………………………..8
Chapter 5 Configure ……………………………………………………………………………………………………………………. 9 5.1 VLAN
………………………………………………………………………………………………………………………….. 9 5.2 QoS
……………………………………………………………………………………………………………………………. 10 5.2.1 Prioritisation
………………………………………………………………………………………………………10 5.2.2 DSCP remap
………………………………………………………………………………………………………11 5.2.3 Priority and Queue Mapping
………………………………………………………………………………..11 5.2.4 Port Priorities
……………………………………………………………………………………………………. 11 5.3 IGMP
…………………………………………………………………………………………………………………………. 12 5.4 Link aggregation
…………………………………………………………………………………………………………..12 5.4 Loop protections
………………………………………………………………………………………………………….. 13 5.5 Spanning tree
………………………………………………………………………………………………………………. 13 5.6 Port Mirror
………………………………………………………………………………………………………………….. 14 5.6 Port segregation
…………………………………………………………………………………………………………… 14 5.7 Bandwidth control
……………………………………………………………………………………………………….. 15 5.8 Giant frame
…………………………………………………………………………………………………………………. 15 5.9 MAC constraints
…………………………………………………………………………………………………………..16 5.10 Green Ethernet
…………………………………………………………………………………………………………… 16 5.11 Energy Efficient EthernetEEE
……………………………………………………………………………….16 5.12 SNMP
………………………………………………………………………………………………………………………. 17
Chapter 6 Surety ……………………………………………………………………………………………………………………….. 17 6.1 MAC
address ………………………………………………………………………………………………………………. 17 6.1.1 MAC address
……………………………………………………………………………………………………. 17 Figure 28 MAC Address Information
……………………………………………………………………………17 6.1.2MAC lookups
……………………………………………………………………………………………………..17 6.1.3 static MAC
……………………………………………………………………………………………………….. 18 6.2 Broadcasting storm
………………………………………………………………………………………………………. 18
Chapter7 Control ………………………………………………………………………………………………………………………. 19 7.1 Port
statistics ………………………………………………………………………………………………………………..19 7.2 Cable
Diagnostics ………………………………………………………………………………………………………… 20
Chapter 8 Artifact …………………………………………………………………………………………………………………….. 20 8.1
Firmware Upgrade ……………………………………………………………………………………………………….. 20 8.2
Configuration Backup ……………………………………………………………………………………………………21 8.3 Reset
………………………………………………………………………………………………………………………….. 21 8.4 Save
…………………………………………………………………………………………………………………………….22 8.5 Reopen
………………………………………………………………………………………………………………………..22
2
Chapter 1 Manual Introduction
1.1. target audience
This manual details how to configure each function of the Web Light Management
Switch software. Please read this manual carefully before operation.
1.2. Manual Conventions
In this manual, we take 8-port switch as an example to show the web interface
and software fu nctions.
The –> symbol is used to indicate the order of menu entry, first-level
function menu –> second -level function menu –> third-level function menu, of
which, some functions have no second-level f unction menu.
The <> pointed brackets appear in the text to mark the text, indicating the
name of the button, s uch as
The special icons used in this manual are described below:
Clarification
The description of the content of the operati on, making the necessary additions and expla nations.
Take care
Reminds of the precautions to be taken duri ng operation, improper operation may result i n data loss or equipment damage.
3
Chapter 2 Web Light Webmaster Features
2.1 Function Introduction
Our newly developed Web light network management switch function software,
support a variet y of models. Provide VLAN, QoS, RSTP, SNMP, POE control, port
aggregation and so on.
home page Support for Logo, interface panel, and system information display
system System information, IP address setting, user account, and port setting
configure safe
VLAN QOS IGMP Link aggregation Ring road protection RSTP Port mirror image
Port isolation bandwidth control Giant frame MAC restrain Green Ethernet EEE
SNMP
MAC address
broadcast storm
supervisory control
Port statistics Cable diagnosis
firmware upgrade
Configure backup
reset
tool
preserve
restart
log off
4
Chapter 3 Login Web Interface
3.1 Sign in
1. The switch is powered up properly and any port is connected to the
management PC. 2. The management PC has at least one of the following browsers
installed: IE 8.0 or above, the latest version of Chrome, 360 browser. 3. The
IP address of the management PC has been set to the same network segment as
the switc h port, i.e., 192.168.2.X (X is any integer between 2 and 253; the
default IP of this product is 192.16 8.2.254), and the subnet mask is
255.255.255.0. If you don’t know how to set it up at all, follow these
instructions step by step: Step 1: Finding the Network Settings 1 Click on the
“Start” button (the Windows logo in the lower-left corner of the screen). 2 In
the search box, type “Network Settings” or “View network connections” and
press Enter. 3 In the Network & Internet settings window, look for the option
to “Change adapter options ” or “View network status and tasks” (the exact
text may vary depending on the Windows version).
Step 2: Changing your computer’s IP Address (1) .Right-click on the network
adapter that is connected to the switch (it’s usually labeled “Ethernet
” or “Local Area Connection”). (2) Select “Properties” from the context menu.
(3) In the Properties window, scroll down and find “Internet Protocol Version
4 (TCP/IPv4)” and sel
ect it. (4) Click on the “Properties” button below it. (5) Make sure that “Use
the following IP address” is selected. (6) Enter the IP address 192.168.2.X
(replace X with any number between 2 and 253 that is not alre
ady in use on your network). (7) Enter the subnet mask as 255.255.255.0. (8)
Leave the “Default gateway” and “DNS servers” fields blank or enter the
appropriate values if k
nown. (9) Click “OK” to save the settings.
Step 3: Accessing the Switch Management Interface 1 1.Open a web browser (IE
8.0 or above, the latest version of Chrome, 360 browser). 2 2.In the address
bar, type http://192.168.2.254 and press Enter. 3 3.A login prompt will
appear. Enter the username admin and password admin. Click on the “Login” or
“Submit” button to access the switch’s management interface.
4. To ensure a better experience of the Web interface display, it is
recommended to adjust the re solution of your monitor to 1280 x 800 pixels or
above.
5.Open a browser and enter the switch’s default management address
http://192.168.2.254 (you can modify the management IP address according to
the customer’s requirements) in the address bar t o log in the switch’s Web
management interface.
6. The switch login page is shown in the following figure, enter the user
name and password for the switch management account, the factory defaults are
all admin.
5
Figure 1 web login interface 7.After successful login, the homepage of the web
interface is displayed as follows.
Figure 2 web home page Left navigation bar, showing Logo, adjustable to no
logo neutral. Upper right shows the model i nterface panel. Bottom right shows
basic system information.
Chapter 4 Systems
4.1 System Information
System Information You can view the system information of the device here, as
well as set the device model.
In the navigation bar, click: System –> System Information
6
Clarification
unit type MAC address IP address subnet mask
gateway
Firmware versi on Firmware date Hardware versi on performance pe riod
Figure 3 System Information
Display device model Show the MAC address of the device Display the device
management IP address Displays the device subnet mask Displays the device’s
default gateway Displays the software version Displays the software version
date Displays the device hardware version
Displays the device startup running time
IP install
Each device in the network has an IP address through which it can log into the
management inte rface to operate the switch.
Click the navigation bar: System –> IP Settings
Figure 4 IP Address Setting
Clarification DHCP SettingsSelect to enable or disable the DHCP function Off:
Select Off to manually enter the IP address, subnet mask and default gateway.
Enable: Select Enable to have the switch obtain network parameters from the
DHCP
7
server. IP Address: Set the IP address of the device. Subnet Mask: Set the
subnet mask of the device. Default Gateway: Set the default gateway address of
the device. Click
4.2 User settings
You can change the user name and password used for login here. Click on the
navigation bar: System –> User Accounts
Clarification
Figure 5 User account settings
User Name sets the user name for logging into the switch. The user name cannot be longer th
an 16 characters and can only use numbers, English letters, and underscores.
New Password Reset the password for logging into the switch. The new password must be no l
onger than 16 characters in length and can only use numbers, letters and underscores. Make sure yo
u enter the same password twice.
Note: Please refresh the page after changing the password. Do not change the password ag
ain before refreshing the page.
4.3 Port Settings
You can modify port name, status, duplex speed, flow control here. Click the
navigation bar: System –> Port Settings
8
Figure 6 Port Settings Clarification Name: Set the port alias. Port: Open
Close, if open the port, the port can forward the message normally.
Rate/Duplex: Select 10M/Half, 10M/Full, 100M/Half, 100M/Full, Auto. When the
mode selecti on is Auto, the rate and duplex will be decided by negotiation
Flow control function: on/off, turn on the flow control function, you can
control and adjust the p acket forwarding rate of each port to avoid
congestion. Note: The flow control function will actually be turned on in half
duplex mode.
Chapter 5 Configure
5.1 VLAN
VLANVirtual Local Area Networkvirtual local area networkVLAN technology is a
com munication technology that logically divides a physical LAN into multiple
broadcast domains, and th is technology is used to logically divide the
physical network by defining extended fields on the LA N data frames, thus
limiting the forwarding range of the LAN data frames and narrowing the broadca
st domains.VLAN technology is mainly used in network devices such as switches,
routers, and switc hes.Click on the navigation bar: Configuration –> VLAN –>
Static VLAN
Figure 8 Static VLAN Click on the navigation bar: Configuration –> VLAN –>
VLAN Settings
9
Figure 9 VLAN Settings
VLANs are distinguished by the VLAN ID. all Untagged packets arriving at the
port are tagged with the Tag of the port PVID.
Clarification You need to set the VLAN ID first and then set the port VID.
Static VLAN Set the VLAN ID, the value range is 1-4094. Untagged port If
selected as Untagged port, the output data frame is without tag information.
Tagged Port If selected as Tagged port, the output data frame is with tag
information. No Member Port When selected, it indicates that the port is not a
member port of the VLAN.
5.2 QoS
The QoS (Quality of Service) feature is used to optimise network performance
and provide a bet ter network service experience. The switch is based on port,
802.1P, and DSCP priority modes. 5.2.1 Prioritisation
Click on the navigation bar: Configuration –> QOS –> Priority Selection
Figure 10 Priority Selection Settings Clarification Priority Select sets the
priority of the priority source and specifies the transmission queue for
frames
10
based on the highest priority priority source. 5.2.2 DSCP remap
DSCP gives a recommended definition of the IP DSCP field.IP packets are mapped
to 4 prioriti es (0,2,4,6) based on the DSCP value (0-63).
Click on the navigation bar: Configuration –> QOS –> DSCP Remapping
Figure 11 DSCP Priority Mapping
Clarification Sets the priority level corresponding to the DSCP value 5.2.3
Priority and Queue Mapping Mapping different priorities to different output
queues Click on the navigation bar: Configuration –> QOS –> Priority to Queues
Figure 12 Priority queue mapping 5.2.4 Port Priorities
Port Priority is based on the incoming port These packets are mapped to 4
different priority levels. Click on the navigation bar: Configuration –> QOS
–> Port Priority
11
Figure 13 Port Priority Setting 5.2.5 Q Queue weights Click on the navigation
bar: Configuration –> QOS –> Q Queue Weights
Figure 14 Q Queue Weights
5.3 IGMP
IGMP snoopingInternet Group Management Protocol SnoopingIt is a multicast
constraint mechanism running on Layer 2 devices for managing and controlling
multicast groups. By configuri ng multicast VLANs, the ports of the switch are
added to the multicast VLANs, so that users in diffe rent VLANs share a
multicast VLAN to receive multicast data, and the multicast streams are
transmi tted in only one multicast VLAN, thus saving bandwidth. Moreover,
since the multicast VLAN is co mpletely isolated from the user VLAN, security
and bandwidth are guaranteed.
Click the navigation bar: Configuration –> IGMP
Figure 15 IGMP Settings
Clarification IGMP: Enable Settings Select to enable or disable the IGMP
listen function. IP Address: View multicast IP address Port: View the list of
multicast group ports VID: View the corresponding VLAN ID of multicast group.
5.4 Link aggregation
Link Aggregation (Link Aggregation) is a method of increasing bandwidth and
reliability by bu
12
ndling a group of physical interfaces together as a logical interface. Link
Aggregation can be configured when there is a need for the following: When
there is insufficient bandwidth between two switch devices connected by a
single link. When the reliability of a link connection between two switch
devices does not meet the require
ments. Click the navigation bar: Configuration –> Link Aggregation Settings
Figure 16 Link Aggregation Settings Clarification Group ID: Aggregation group
ID. Port: Physical port belonging to the aggregation group Member ports
belonging to the same aggregation group must have a consistent configuration.
5.4 Loop protections
Loop that is, the switch under the network to form a ring topology, the loop
will cause the intran et broadcast storm, will consume a lot of CPU and line
bandwidth of the switch, and in serious cases, can even cause the device to
die, the network is paralysed.
Click the navigation bar: Configuration –> Loop Protection
Figure 17 Loop Protection Setting Clarification Time Interval: Monitor network
loops at this time interval. Recovery Time: When a loop is detected, the
switch will activate the processing mechanism and the port will automatically
return to normal after this time.
5.5 Spanning tree
Redundant links are often used in Ethernet switched networks for link backup
and to improve n etwork reliability. However, the use of redundant links
creates loops in the switched network, causin g broadcast storms and failures
such as unstable MAC address tables, which leads to poor user comm unication
quality and even communication interruption. In order to solve the problem of
loops in swi tched networks, the Spanning Tree Protocol (STP) was proposed.
Like the development process of many protocols, the Spanning Tree Protocol is
also updated wi th the development of the network, from the STP defined in the
initial IEEE 802.1D to the Rapid Spa nning Tree Protocol RSTP (Rapid Spanning
Tree Protocol) defined in the IEEE 802.1W, and then to the latest IEEE 802.1S
defined in the multi-spanning tree protocol MSTP. Spanning Tree .
Protocol (MSTP) defined in the latest IEEE 802.1S. Click the navigation bar:
Configuration –> RSTP Global Configuration –> RSTP Port
13
Figure 18 Spanning Tree Global Settings
Figure 19 Spanning Tree Port Settings
5.6 Port Mirror
Port mirroring is the process of copying messages from a specified port of a
switch to a destinati on port; where the port being copied is called the
source port and the copied port is called the destina tion port. The
destination port will be connected to data inspection devices, and users use
these devic es to analyse the messages received on the destination port for
network monitoring and troubleshooti ng
Click the navigation bar: Configuration –> Port Mirroring
Figure 20 Port Mirroring Clarification Mirror Direction: Direction of data
flow on the mirrored port (inbound, outbound, both directions)
5.6 Port segregation
Click on the navigation bar: Configuration –> Port Isolation
14
Figure 21 Port isolation
Clarification Port: Source Port Port Isolation: Forwardable Port Configure a
forwarding port for the source port. packets received by the source port
cannot be f orwarded to ports that are not in the forwarding port.
5.7 Bandwidth control
Configuring port bandwidth means limiting the rate at which a physical
interface can send outb ound or receive inbound data.
Before traffic is sent out of an interface, configure rate limiting in the
outbound direction of the interface to control all outgoing message traffic.
Before traffic is received from the interface, configure rate limiting on the
inbound direction of t he interface to control all incoming message traffic.
Click on the navigation bar: Configuration –> Bandwidth Control
Figure 22 Bandwidth control
5.8 Giant frame
Configure the maximum message length that the system can forward Click on the
navigation bar: Configuration –> Jumbo Frames
15
Figure 23 Giant Frame
5.9 MAC constraints
The system supports the port Mac learning restriction function. The system
learns the source M AC in the user message, and when the learned MAC reaches
the restriction threshold. If the source MAC of the user packet already exists
in the MAC table, the user packet will continue to be forward ed; if the
source MAC of the packet does not exist in the MAC table, the system will
process the pac ket according to the MAC restriction action. For example, if
the action is Discard, then the user pack ets will be discarded on the
incoming port.
Click the navigation bar: Configuration –> Mac Constraints
Figure 24 Mac Constraints
5.10 Green Ethernet
Green Ethernet is a feature that is environmentally friendly and reduces the
power consumption of devices. The system provides connection and dynamic
detection of the cable length and dynamic a djustment of the power required
for the detected cable length. High performance and low power cons umption.
The system supports link down power saving for ports, which greatly reduces
power consu mption when disconnecting the network cable. When an input signal
is detected, it wakes up from lin k down power saving and enters normal mode.
Click the navigation bar: Configuration –> Green Ethernet
Figure 25 Green Ethernet
5.11 Energy Efficient EthernetEEE
Energy Efficient Ethernet (EEE) supports operation in low-power idle mode.
Systems at both en ds of the link can save power by disabling some functions
during times of low link utilisation.
Click on the navigation bar: Configuration –> EEE
16
Figure 26 EEE Settings
5.12 SNMP
SNMP is a standard network management protocol widely used in TCP/IP networks
to support a network management system that monitors devices connected to the
network for any conditions of managerial concern.The basic components of SNMP
include the Network Management System (NM S), Agent, Managed Object and
Management Information Base (MIB). Object (Managed Object) and Management
Information Base (MIB).
Click on the navigation bar: Configuration –> SNMP
Figure 27 SNMP
Chapter 6 Surety
6.1 MAC address
MAC address in English is Media Access Control Address, directly translated as
Media Access Control Address, also known as Local Area Network Address (LAN
Address), Ethernet Address (Et hernet Address) or Physical Address (Physical
Address), which is a bit address used to confirm the lo cation of a network
device. It is a bit address used to confirm the location of a network device.
6.1.1 MAC address
Hit the navigation bar: Security –> MAC Addresses –> MAC Table
Figure 28 MAC Address Information 6.1.2MAC lookups
Hit the navigation bar: Security –> MAC Address –> MAC Lookup
17
Figure 29 MAC Address Search
6.1.3 static MAC Hit the navigation bar: Security –> MAC Address –> Static MAC
Figure 30 Static MAC
6.2 Broadcasting storm
A broadcast storm is a sharp increase in the number of broadcast frames on a
network due to co nstant forwarding that affects normal network communications
and severely degrades network perfor mance. A broadcast storm can take up a
considerable amount of network bandwidth, causing normal packets to fail. When
broadcast data floods the network and cannot be processed and occupies a larg
e amount of network bandwidth, resulting in the normal operation of the
service can not be run, whic h occurs broadcast storms, resulting in local or
entire network paralysis of the LAN.
Click on the navigation bar: Security –> Broadcast Storm
Figure 31 Storm Suppression
18
Clarification Figure 31 Storm Suppression Storm Type: Broadcast, Multicast,
Unknown Unicast, Unknown Multicast Port: Select port, multiple selections
available State: Turn on or off the broadcast storm suppression function
Speed: Set port broadcast, multicast packet, unknown unicast, unknown
multicast bandwidth.
Chapter7 Control
7.1 Port statistics
The port statistics information displays the traffic information of each port,
which is convenient for monitoring traffic and analysing network anomalies.
Click Navigation bar: Monitor –> Port Statistics.
Figure 32 Port statistics Clarification Port: Port number Status: Displays the
status of the port, which can only forward packets normally when it is open.
Receive Status: Current LINK status of the port Number of correct packets
sent: Displays the number of correct packets sent by the port. Error packets
sent: Displays the number of packets sent incorrectly by the port. Receive
correct packets: Show the number of correct packets received by the port.
Number of packets received in error: Displays the number of packets received
in error by the port.
19
7.2 Cable Diagnostics
When a cable is connected to a switch port, the cable test function can test
the cable connection status, cable length for easy diagnosis of network
failure points, the results are for reference only.
Click on the navigation bar: Monitor –> Cable Diagnostics
Figure 33 Port Statistics Information Clarification Diagnostics are not
supported on ports connected to the service host.
Chapter 8 Artifact
8.1 Firmware Upgrade
The software of the switch can be upgraded here. Click on the navigation bar:
Tools –> Firmware Upgrade
Figure 34 Entering Firmware Upgrade Mode Click on the
Figure 35 Jump to loader mode Finally jump to the firmware upgrade page Click
System –> HTTP Firmware Upgrade in the navigation bar, the following picture
appears
Figure 36 Firmware Upgrade Page Click the
The following figure is displayed after the upgrade is completed.
Figure 38 Upgrade complete Attention : During the firmware upgrade process,
please do not power off the device, keep the power stable and do not refresh
the page . Upgrading the firmware may lose the current unsaved configuration
information, please save th e configuration before upgrading. Click the
navigation bar: System –> Reboot to reboot the switch.
Figure 39Reboot the switch
8.2 Configuration Backup
You can save the current configuration information here, it is recommended to
backup the curre nt configuration information before modifying the
configuration and upgrading the software.
Click the navigation bar: Tools –> Configuration Backup
Figure 40 Configuration Backup and Restore
Backup Settings: Click
To restore settings: Click
Hit the navigation bar: Tools –> Reset
Figure 41 Restore default settings Click the
8.4 Save
Click on the navigation bar: Tools –> Save
Figure 42 Save Configuration to FLASH
It is recommended to save the settings to FLASH after modifying the settings,
otherwise the mo dified settings will be lost after power failure or reboot.
8.5 Reopen
After clicking Reboot, the switch will reboot. Before rebooting, it is
recommended to save the c onfiguration to prevent the loss of the currently
modified configuration.
Click the navigation bar: Tools –> Save
Figure 43 Rebooting the Switch
Attention : Please do not turn off the power during the reboot process, ensure
the power supply is stable du ring the reboot process, and avoid forcible
power failure.
22
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>