KTI Networks KGS-2404 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Síťové přepínače KTI Networks KGS-2404. KTI Networks KGS-2404 User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 113
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - DOC.080711

KGS-2404 Web Smart 24-Port Gigabit Ethernet Switch UUsseerr’’ss MMaannuuaall DOC.080711

Strany 2

4 • Supports 802.1Q VLAN • Supports user management and limits one user to login • Maximal packet length can be up to 9600 bytes for jumbo frame

Strany 3 - User's Manual

94 4-4. Maintenance There are five functions contained in the maintenance function. Warm RestartFactory DefaultMaintenanceSoftwar

Strany 4 - Table of Contents

95 4-4-1. Warm Restart Web Smart Switch offers many approaches to reboot your switch, such as: power up, hardware reset and software reset. You can

Strany 5

96 4-4-2. Factory Default Function name: Factory Default Function description: Factory Default provides the function to retrieve default settings

Strany 6 - Revision History

97 4-4-3. Software Upgrade Function name: Software Upgrade Function description: You can just click Browse button to retrieve the file you want in

Strany 7 - About this user’s manual

98 4-4-4. Configuration File Transfer Function name: Configuration File Transfer Function description: You can backup your switch’s configuration f

Strany 8 - 1. Introduction

99 4-4-5. Logout In addition to auto logout function we just mentioned in system configuration section, the switch also allows administrators to log

Strany 9 - 1-3. Features

100 5. Maintenance 5-1. Resolving No Link Condition The possible causes for a no link LED status are as follows: z The attached device is not pow

Strany 10

101 Appendix A Technical Specifications Features • 20 (10/100/1000Mbps) Gigabit Ethernet (TP) switching ports are compliant with IEEE802.3, 802.

Strany 11

102 Hardware Specifications  Standard Compliance: IEEE802.3/802.3ab / 802.3z / 802.3u / 802.3x  Network Interface: Configuration Mode Co

Strany 12

103  Diagnostic LED: System LED : Power Per Port LED: 10/100/1000M TP Port 1 to 24 : LINK/ACT, 10/100/1000Mbps 1000M SFP Fiber Po

Strany 13

5 1-4. View of 24-Port GbE Web Smart Switch 1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs) There are 24 TP

Strany 14 - 2. Installation

104 Management Software Specifications System Configuration Auto-negotiation support on 10/100Base-TX ports, Web browser can set transmission sp

Strany 15 - 2-1-2. Cabling Requirements

105 Appendix B MIB Specifications MIB II Enterprise MIB brief description is listed as below. PRIVATE-GESM-SW24L-MIB DEFINITIONS ::= BEGIN IMP

Strany 18

6 • LED Indicators LED Color Function System LED POWER Green Lit when +3.3V power is coming up 10/100/1000Ethernet TP Port 1 to 24 LED LI

Strany 19

7 1-5. View of the Optional Modules In the switch, Port 21~24 include two types of media --- TP and SFP Fiber (LC, BiDi…); they support 10/100/1000

Strany 20

8 2. Installation 2-1. Starting 24-Port GbE Web Smart Switch Up This section describes how to install the Web Smart Switch and its components, and

Strany 21 - Ethernet LAN

9 • TP Port and Cable Installation ⇒ In the switch, TP port supports MDI/MDI-X auto-crossover, so both types of cable, straight-through (Cable pi

Strany 22 - 2-1-4. IP Address Assignment

10 2-1-2-1. Cabling Requirements for TP Ports ⇒ For Fast Ethernet TP network connection ⎯ The grade of the cable must be Cat. 5 or Cat. 5e with

Strany 23

11 2-1-2-3. Switch Cascading in Topology • Takes the Delay Time into Account Theoretically, the switch partitions the collision domain for each po

Strany 24 - 1 1111111

12 Case1: All switch ports are in the same local area network. Every port can access each other (See Fig. 2-2). If VLAN is e

Strany 25

13 Case 2b: Port-based VLAN (See Fig.2-4). 1. VLAN1 members could not access VLAN2, VLAN3 and VLAN4 members. 2. VLAN2 members could not acc

Strany 27 - 2-2. Typical Applications

14 2-1-3. Configuring the Management Agent of 24-Port GbE Web Smart Switch In the way of web, user is allowed to startup the switch management func

Strany 28

15 2-1-3-1. Management through Ethernet Port There are two ways to configure and monitor the switch through the switch’s Ethernet port. They are W

Strany 29 - Management

16 Fig. 2-7 the Login Screen for Web 2-1-4. IP Address Assignment For IP address configuration, there are three parameters need

Strany 30

17 With the classful addressing, it divides IP address into three classes, class A, class B and class C. The rest of IP addresses are for multicast

Strany 31 - Table 3-1 LLC Format

18 Class D and E: Class D is a class with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RFC 1112. Class

Strany 32 - Fig. 3-2 SAP Format

19 In this diagram, you can see the subnet mask with 25-bit long, 255.255.255.128, contains 126 members in the sub-netted network. Another is that

Strany 33

20 For different network applications, the subnet mask may look like 255.255.255.240. This means it is a small network accommodating a maximum of 1

Strany 34

21 2-2. Typical Applications The 24-Port GbE Web Smart Switch provides auto MDIX on its TP ports and supports fiber types like: LC and BiDi SFP fo

Strany 35 - How does a MAC work?

22 Fig. 2-12 Office Network Connection Fig. 2-11 Peer-to-peer Network Connection

Strany 36 - 64 bytes

23 3. Basic Concept and Management This chapter will tell you the basic concept of features to manage this switch and how they work. 3-1. What’

Strany 37

Web Smart 24-Port Gigabit Ethernet Switch User's Manual Release 1.02

Strany 38 - 3-3. Flow Control

24 This above diagram shows the Ethernet architecture, LLC sub-layer and MAC sub-layer, which are responded to the Data Link layer,

Strany 39

25 The table 3-1 is the format of LLC PDU. It comprises four fields, DSAP, SSAP, Control and Information. The DSAP address field identifies the

Strany 40 - Table 3-5

26 3-2. Media Access Control (MAC) MAC Addressing Because LAN is composed of many nodes, for the data exchanged among these nodes, each node mus

Strany 41

27 Bit 47 bit 0 1st byte 2nd by

Strany 42 - Fig.3-5 Collision Domain

28 - Destination address (DA) — The DA field is used to identify which network device(s) should receive the packet. It is a unique address. P

Strany 43 - Fig. 3-6

29 How does a MAC work? The MAC sub-layer has two primary jobs to do: 1. Receiving and transmitting data. When receiving data, it parses frame to

Strany 44

30 Ethernet MAC transmits frames in half-duplex and full-duplex ways. In half-duplex operation mode, the MAC can either transmit or receive frame a

Strany 45 - 3-5. Virtual LAN

31 Parameter value/LAN 10Base 100Base 1000Base Max. collision domain DTE to DTE 100 meters 100 meters for UTP412 meters for fiber1

Strany 46 - Fig. 3-8

32 3-3. Flow Control Flow control is a mechanism to tell the source device stopping sending frame for a specified period of time designated by targ

Strany 47 - Fig.3-9 Tag Format

33 Frame Reception In essence, the frame reception is the same in both operations of half duplex and full duplex, except that full-duplex operation

Strany 48

ii Table of Contents Caution ...

Strany 49

34 What if a VLAN tagging is applied? VLAN tagging is a 4-byte long data immediately following the MAC source address. When tagged VLAN is applied,

Strany 50 - Table 3-7

35 The maximum length of the extension is equal to the quantity (slotTime - minFrameSize). The MAC continues to monitor the medium for collisions w

Strany 51 - 3-6. Link Aggregation

36 Extended Distance Limitations: The diameter of a half-duplex LAN segment is determined by its maximum propagation delay time. For example, in

Strany 52

37 How does a switch operate? A Layer 2 switch uses some features of the Data Link layer in OSI model to forward the packet to the destination

Strany 53 - Web-based Management

38 Mac address aging There is a field in MAC address table used to put the entry’s Age time which determines how long a MAC entry can reside in a s

Strany 54

39 3-5. Virtual LAN What is a VLAN? It is a subset of a LAN. Before we discuss VLAN, we must understand what LAN is. In general, a LAN is composed

Strany 55

40 Now we apply VLAN technology to configure the system shown as the figure above. We can partition the users into the different logical network

Strany 56 - 4-2. Configuration

41 There are many types of VLAN applied. Most popular is port-based VLAN, tag-based VLAN and protocol-based VLAN.  Port-based VLAN Some physical p

Strany 57 - 4-2-1. System Configuration

42 VLAN-tagged frame: An Ethernet frame, carrying VLAN tag field, contains VLAN identification without the value of 0 and 4095, and priority infor

Strany 58

43 Ingress Rule: Each packet received by a VLAN-aware bridge will be classified to a VLAN. The classification rule is described as follows. 1. If t

Strany 59

iii 4-4. Maintenance...94 4-4-1. Warm Re

Strany 60 - 4-2-2. Port Configuration

44 How does a Tagged VLAN work? If the ingress filtering is enabled and when a packet is received, VLAN bridge will first check if the VID of the p

Strany 61 - Fig. 4-4 Port Configuration

45 3-6. Link Aggregation Basically, Link Aggregation is to aggregate the bandwidth of more than one port to an assigned logical link. This highly

Strany 62 - Fig. 4-6 Metro mode

46 Terminology Link Aggregation: It is a method to have multiple physical links with the same media and speed bundled to be a logical link formin

Strany 63

47 4. Operation of Web-based Management This chapter would introduce how to manage your Web Smart Switch and how to configure the 10/100/1000Mbps

Strany 64

48 Fig. 4-1 4-1. Web Management Home Overview After login, System Information would be displayed as Fig. 4-2 illustrated. This page lists defa

Strany 65

49 • The Information of Page Layout ⎯ On the top part of the information page, it shows the front panel of the switch. Linked ports will be displa

Strany 66 - 4-2-5. Aggregation

50 4-2. Configuration Configuration includes the following functions: System Configuration, Ports Configuration, VLAN Mode Configuration, VLAN Grou

Strany 67 - 4-2-6. LACP

51 4-2-1. System Configuration System configuration is one of the most important functions. Without a proper setting, network administrator would n

Strany 68 - 4-2-7. RSTP

52 Active IP Address: Show the active IP address of this switch. Active Subnet Mask: Show the active subnet mask of this switch. Active Ga

Strany 69 - Fig. 4-12 RSTP Configuration

53 Subnet mask is used to set the subnet mask value, which should be the same value as that of the other devices resided in the same networ

Strany 70 - 4-2-8. 802.1X

iv Revision History Release Date Revision 1.02 06/28/2007 A2 1.01 03/13/2007 A1 1.00 02/10/2007 A1 Caution Circuit devices are sensitive to

Strany 71

54 4-2-2. Port Configuration Function name: Port Configuration Function description: Port Configuration is applied for the settings of the ports

Strany 72

55 Fig. 4-4 Port Configuration 4-2-3. VLAN Mode Configuration Web Smart Switch supports Port-based VLAN and Tag-based VLAN (802.1q). Its VLAN mod

Strany 73

56 Tag-based: Tag-based VLAN identifies its member by VID. This is quite different from port-based VLAN. If there are any more rules in ingress filt

Strany 74 - Force Authorized:

57 4-2-4. VLAN Group Configuration Function name: VLAN Group Configuration Function description: It shows the information of VLAN Groups, and allow

Strany 75

58 Add Group: Create a new port-based VLAN or tag-based VLAN, which depends on the VLAN mode you choose in VLAN mode function. Fig. 4-8 Add or Rem

Strany 77 - ;) to enable this function

60 4-2-5. Aggregation The Aggregation (Port Trunking) Configuration is used to configure the settings of Link Aggregation. You can bundle ports by s

Strany 78 - ;) beside the

61 4-2-6. LACP Smart Web Switch supports link aggregation IEEE802.3ad standard. The standard describes Link Aggregate Control Protocol (LACP) which

Strany 79 - Fig. 4-21 QoS Configuration

62 4-2-7. RSTP RSTP detects and resolves network loops, and provides backup links between switches, bridges and routers. The protocol allows a swit

Strany 80 - Fig. 4-22 802.1p Setting

63 Function name: RSTP Port Configuration Function description: Enable or disable RSTP protocol on the ports that are selected and set path cos

Strany 81 - Fig. 4-23 DSCP Setting

1 About this user’s manual This user’s manual provides instructions on how to install your Web Smart Switch. This guide also covers management o

Strany 82 - 4-2-12 Filter

64 4-2-8. 802.1X 802.1x port-based network access control provides a method to restrict users to access network resources via authenticating user’s

Strany 83 - Default: enable

65 While in the authentication process, the message packets, encapsulated by Extensible Authentication Protocol over LAN (EAPOL), are exchanged betw

Strany 84 - 4-2-13 Rate Limit

66 for the login based on 802.1x port access control management. The protocol used in the right side is EAPOL and the left side is EAP. 1. At the i

Strany 85 - 4-2-14 Storm Control

67 10. When the supplicant issue an EAP-Logoff message to Authentication server, the port you are using is set to be unauthorized. Fig. 4-15 The 8

Strany 86

68 Function description: This function is used to configure the global parameters for RADIUS authentication in 802.1x port security application.Para

Strany 87 - 4-2-15 SNMP

69 Force the subscriber has to reinitialize connected to the port. Force Reinitialize All: Force Reinitialize for all ports in at once. -----------

Strany 88 - Fig. 4-27 SNMP Configuration

70 Fig. 4-17 802.1X Statistics Function name: 802.1x Parameters Function description: In here, user can enable or disable Reauthentication fun

Strany 89 - 4-3. Monitoring

71 4-2-9 IGMP Snooping Function name: IGMP Snooping Configuration Function description: IGMP Snooping lets administrators configure a switch t

Strany 90

72 4-2-10. Mirror Configuration Function name: Mirror Configuration Function description: Mirror Configuration is provided to monitor the traffic i

Strany 91 - 4-3-2. Detailed Statistics

73 4-2-11. QoS(Quality of Service) Configuration The switch offers powerful QoS function. This function supports VLAN-tagged priority that can make

Strany 92

2 1. Introduction 1-1. Overview of 24-Port GbE Web Smart Switch The 24-port Gigabit Web Smart Switch is a standard switch that meets all IEEE 802.3

Strany 93

74 Function name: QoS Configuration Function description: While setting QoS function, please select QoS Mode in drop-down menu at first. Then you ca

Strany 94 - 4-3-3. LACP Status

75 Function name: DSCP Setting Function description: In the late 1990s, the IETF redefined the meaning of the 8-bit SERVICE TYPE field to accommoda

Strany 95 - 4-3-4. RSTP Status

76 4-2-12 Filter Function name: Filter Configuration Function description: This function lets administrators easily set management source IP address

Strany 96 - Fig. 4-31 RSTP Status

77 DHCP Server Allowed: Just tick the check box (;) under the port x to allow the DHCP Server on this port and valid port is Port 1~16. Default: en

Strany 97 - 4-3-5. IGMP Status

78 4-2-13 Rate Limit Function name: Ingress and Egress Bandwidth Setting Function description: Ingress and Egress Bandwidth Setting function are use

Strany 98 - 4-3-6. Ping Status

79 4-2-14 Storm Control Function name: Storm Control Function description: Storm Control is used to block unnecessary multicast and broadcast frames

Strany 99 - Fig. 4-33 Ping

80 Multicast Rate: To enable the Multicast Storm capability. User can use drop-down menu to select number of frames. Default is No Limit. The settin

Strany 100

81 4-2-15 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped wit

Strany 101 - 4-4-1. Warm Restart

82 Default community name for Get: public Default community name for Set: private Default community name for Trap: public Fig. 4-27 SNMP Configur

Strany 102 - 4-4-2. Factory Default

83 4-3. Monitoring There are six functions contained in the monitoring function. 4-3-1. Statistics Overview The function of Sta

Strany 103 - 4-4-3. Software Upgrade

3 1-2. Checklist Before you start installing the switch, verify that the package contains the following: ⎯ A 24-Port GbE Web Smart Switch ⎯ Modu

Strany 104

84 Tx Errors: Number of bad packets transmitted. Rx Errors: Number of bad packets received. Fig. 4-28 Statistics Overview for all ports

Strany 105 - 4-4-5. Logout

85 4-3-2. Detailed Statistics Function name: Detailed Statistics Function description: Display the detailed counting number of each port’s traffi

Strany 106 - 5. Maintenance

86 Show the counting number of the transmitted multicast packet. Tx Broad- and Multicast: Show the counting number of the transmitted broadcast with

Strany 107 - Technical Specifications

87 Number of long frames(according to max_length register) with valid CRC. Rx Fragments: Number of short frames (< 64 bytes) with invalid CRC. R

Strany 108 - Hardware Specifications

88 4-3-3. LACP Status Function name: LACP Status Function description: Display LACP status. Fig. 4-30 illustrates that LACP Status window can show

Strany 109

89 4-3-4. RSTP Status Function name: RSTP Status Function description: Display RSTP status. Fig. 4-28 shows you that RSTP window can present VLAN

Strany 110

90 Fig. 4-31 RSTP Status

Strany 111 - MIB Specifications

91 4-3-5. IGMP Status Function name: IGMP Status Function description: Display IGMP status. In Fig. 4-29, the window shows VLAN ID for each multic

Strany 112

92 Fig. 4-32 IGMP Status 4-3-6. Ping Status Function name: Ping Status Function description: To set up target IP address for ping function and

Strany 113

93 Target IP address: Show the active target IP address. Status: Show the result of the ping status. Received replies:

Komentáře k této Příručce

Žádné komentáře