SICOM3172 Industrial Ethernet Switch Web Operation Manual: Publication Date: Mar. 2013
SICOM3172 Industrial Ethernet Switch Web Operation Manual: Publication Date: Mar. 2013
SICOM3172 Industrial Ethernet Switch Web Operation Manual: Publication Date: Mar. 2013
Version: V1.00
FAX: +86-10-88796678
Website: http://www.kyland.com
E-mail: support@kyland.com
Disclaimer:
Kyland Technology Co., Ltd. tries to keep the content in this manual as
accurate and as up-to-date as possible. This document is not guaranteed to be
error-free, and we reserve the right to amend it without notice.
II
6.8.1 Overview............................................................................... 51
6.8.2 Basic Concepts ..................................................................... 51
6.8.3 Principles .............................................................................. 52
6.8.4 Web Configuration ................................................................ 52
6.8.5 Typical Configuration Example ............................................. 54
6.9 ARP Configuration ........................................................................ 55
6.9.1 Overview............................................................................... 55
6.9.2 Description............................................................................ 55
6.9.3 Web Configuration ................................................................ 56
6.10 RSTP Configuration ...................................................................... 57
6.10.1 Overview............................................................................... 57
6.10.2 Basic Concepts ..................................................................... 58
6.10.3 BPDU ................................................................................... 58
6.10.4 Implementation ..................................................................... 59
6.10.5 Web Configuration ................................................................ 61
6.10.6 Typical Configuration Example ............................................. 64
6.11 RSTP Transparent Transmission .................................................. 66
6.11.1 Overview............................................................................... 66
6.11.2 Web Configuration ................................................................ 67
6.11.3 Typical Configuration Example ............................................. 68
6.12 DT-Ring Configuration................................................................... 68
6.12.1 Overview............................................................................... 68
6.12.2 Basic Concepts ..................................................................... 68
6.12.3 Implementation ..................................................................... 69
6.12.4 Web Configuration ................................................................ 72
6.12.5 Typical Configuration Example ............................................. 75
6.13 QoS Configuration ........................................................................ 76
6.13.1 Overview............................................................................... 76
6.13.2 Principle ................................................................................ 77
III
6.13.3 Web Configuration ................................................................ 78
6.13.4 Typical Configuration Example ............................................. 81
6.14 MAC Aging Time ........................................................................... 82
6.14.1 Overview............................................................................... 82
6.14.2 Web Configuration ................................................................ 82
6.15 LLDP ............................................................................................. 83
6.15.1 Overview............................................................................... 83
6.15.2 Web Configuration ................................................................ 83
6.16 MOTD ........................................................................................... 83
6.16.1 Overview............................................................................... 83
6.16.2 Web Configuration ................................................................ 84
6.16.3 Typical Configuration Example ............................................. 85
6.17 SNTP ............................................................................................ 87
6.17.1 Overview............................................................................... 87
6.17.2 Web Configuration ................................................................ 87
6.18 Alarm............................................................................................. 89
6.18.1 Overview............................................................................... 89
6.18.2 Web Configuration ................................................................ 90
6.19 SNMPv2 ........................................................................................ 91
6.19.1 Overview............................................................................... 91
6.19.2 Implementation ..................................................................... 91
6.19.3 Description............................................................................ 92
6.19.4 MIB ....................................................................................... 92
6.19.5 Web Configuration ................................................................ 93
6.19.6 Typical Configuration Example ............................................. 96
6.20 SNMPv3 ........................................................................................ 97
6.20.1 Overview............................................................................... 97
6.20.2 Implementation ..................................................................... 97
6.20.3 Web Configuration ................................................................ 97
IV
6.20.4 Typical Configuration Example ........................................... 103
6.21 RMON ......................................................................................... 104
6.21.1 Overview............................................................................. 104
6.21.2 RMON Group...................................................................... 104
6.21.3 Web Configuration .............................................................. 106
6.22 SSH............................................................................................. 111
6.22.1 Overview............................................................................. 111
6.22.2 Key ..................................................................................... 111
6.22.3 Implementation ................................................................... 112
6.22.4 Web Configuration .............................................................. 112
6.22.5 Typical Configuration Example ........................................... 117
6.23 AAA Configuration ....................................................................... 125
6.23.1 Overview............................................................................. 125
6.23.2 Implementation ................................................................... 125
6.23.3 Web Configuration .............................................................. 126
6.24 TACACS+ Configuration ............................................................. 127
6.24.1 Overview............................................................................. 127
6.24.2 Web Configuration .............................................................. 128
6.24.3 Typical Configuration Example ........................................... 130
6.25 VDSL Configuration .................................................................... 131
6.25.1 Overview............................................................................. 131
6.25.2 Web Configuration .............................................................. 131
6.26 Serial Card Management ............................................................ 132
6.26.1 Overview............................................................................. 132
6.26.2 Web Configuration .............................................................. 132
Appendix: Acronyms .................................................................................... 134
V
Preface
Preface
This manual mainly introduces the access methods and software features of
methods.
Content Structure
The manual contains the following contents:
Software features
Logout
Port status
Port statistics
Port configuration
Password change
Configuration upload/download
VLAN configuration
1
Preface
PVLAN configuration
Port mirroring
Link check
IGMP snooping
ARP configuration
RSTP/STP configuration
DT-Ring configuration
QoS configuration
LLDP
MOTD
SNTP
Alarm
SNMPv2
SNMPv3
RMON
SSH
AAA configuration
TACACS+ configuration
VDSL configuration
Format Explanation
2
Preface
<> The content in < > is a button name. For example, click <Apply>.
[] The content in [ ] is a window name or a menu name. For example, click [File].
{} The content in { } is a group. For example, {IP address, MAC address} means
that IP address and MAC address are a group and they can be configured and
displayed together
→ Multi-level menus are separated by "→". For example, Start → All Programs
→ Accessories. Click [Start] menu, click the submenu [All programs], then
/ Select one from two or more options that are separated by "/". For example
2. CLI conventions
Format Explanation
bold font.
Italic Parameters for which you supply values are in italic font. For
example, in the show vlan vlan id command, you need to supply the
3. Symbol conventions
Symbol Explanation
3
Preface
Product Documents
The documents of SICOM3172 series industrial Ethernet switches include:
Document Obtainment
Product documents can be obtained by:
4
Product Introduction
1 Product Introduction
1.1 Overview
supports long-distance data transmission over telephone lines via the EoVDSL
various requirements.
...
5
Switch Access
2 Switch Access
Console port
Telnet
Web browser
When logging into the Command Line Interface (CLI) by the console port or
Telnet, you can enter different views or switch between views by using the
6
Switch Access
Update software
SWITCH(config) # Configuration Configure switch Input "exit" or "end" to
view functions return to the
management view
When the switch is configured through the CLI, "?" can be used to get
description formats, for example, <1, 255> means a number range; <H.H.H.H>
You can access a switch by its console port and the hyper terminal of Windows
system or other software that supports serial port connection, such as HTT3.3.
The following example shows how to use the console port and Hyper Terminal
1. Connect the serial port of a PC to the console port of the switch with
a DB9-RJ45 cable.
2. Run the Hyper Terminal in Windows desktop. Click [Start] → [All Programs]
Figure 1.
7
Switch Access
8
Switch Access
Note:
To confirm the communication port in use, right-click [My Computer] and click
communication port.
5. Set port parameters (Bits per second: 9600, Data bits: 8, Parity: None, Stop
9
Switch Access
6. Click <OK>. The switch CLI is displayed. Press <Enter> to enter the user
Figure 5 CLI
10
Switch Access
Note:
To confirm the switch IP address, please refer to "5.1 IP Address" to learn how
2.In the Telnet interface, input "admin" in User, and "123" in Password. Click
11
Switch Access
PC and switch.
Note:
IE8.0 or a later version is recommended for the best Web display results.
1. Input "IP address" in the browser address bar. The login interface is
displayed, as shown in Figure 8. Input the default user name "admin" and
12
Switch Access
Note:
2. After you log in successfully, there is a navigation tree on the left of the
13
Switch Access
<Collapse> on the top of the navigation tree. Also, you can perform
the navigation tree. In the upper right corner, you can click <中文> to switch to
Caution:
After you have restored the default settings, you need to restart the device to
14
Device Management
3 Device Management
exit the Web interface. Before rebooting the device, you need to save the
current settings as required. If you have saved the settings, the switch
automatically configures itself with the saved settings after restart. If you have
not saved any settings, the switch restores the factory default settings after
restart.
15
Device Status
4 Device Status
The switch basic information includes the MAC address, SN, IP address,
subnet mask, gateway, system name, device model, and software version, as
shown in
Figure 10.
Port status page displays the port number, port type, administration status, link,
Port ID
16
Device Status
Port types:
Administration Status
Link
Speed
Duplex
Full-duplex: The port can receive and transmit data at the same time.
Half-duplex: The port only receives or transmits data at the same time.
Flow Control
Note:
For details about duplex and flow control, refer to "5.3 Port Configuration".
The Port Statistics interface displays the number of bytes and packets that
each port sends, and the number of bytes and packets that each port receives,
CRC errors, and the number of packets whose lengths are less than 64 bytes,
17
Device Status
The device operating time and CPU usage can be automatically displayed, as
18
Basic Configuration
5 Basic Configuration
5.1 IP Address
Use console port to log into switch command line interface. Enter the "show
Figure 15.
19
Basic Configuration
Figure 15 IP Address
Caution:
IP address and gateway must be in the same network segment; otherwise, the
For the series switches, the change in IP address will take effect only after the
device is restarted.
Device information includes the project name, system name, location, and
Project Name
System Name
Location
Contact
20
Basic Configuration
In port configuration, you can configure port status, port speed, flow control,
Administration Status
Options: Enable/Disable
Default: Enable
Function: Enable means that the port is open and permits data
transmission; Disable means that the port is blocked without data transmission.
This option can directly affect the hardware status of the port and trigger port
alarms.
Operation Status
Options: Enable/Disable
Default: Enable
Auto
Options: Enable/Disable
Default: Enable
Description: When Auto is enabled, the port speed and duplex mode will be
21
Basic Configuration
Speed
Options: 10M/100M
Duplex
Options: Half/Full
Description: When Auto is disabled, the port duplex mode can be configured.
Caution:
You are advised to enable auto-negotiation for each port to avoid the
force port speed/duplex mode, please make sure the same speed
Flow Control
Options: Off/On
Default: Off
Description: Once the flow control function is enabled, the port will inform the
protocol when the port-received flow is bigger than the size of port cache. If the
devices work in different duplex modes (half/full), their flow control is realized
in different ways. If the devices work in full duplex mode, the receiving end will
send a special frame (Pause frame) to inform the sending end to stop sending
22
Basic Configuration
packets. When the sender receives the Pause frame, it will stop sending
packets for a period of "wait time" carried in the Pause frame and continue
sending packets once the "wait time" ends. If the devices work in half duplex
mode, they support back pressure flow control. The receiving end creates a
conflict or a carrier signal. When the sender detects the conflict or the
You can change the password for user name "admin", as shown in Figure 18.
The switch provides better performance after software update. For this series
updated before the system software version. If the BootROM version is not
box is displayed. Click <New User> to create a new FTP user, as shown in
23
Basic Configuration
Figure 19. Create a user name and password, for example, user name
2.Input the storage path of the update file in "Home Directory", as shown in
24
Basic Configuration
3.To update the BootROM software, input the following command in the
management view.
Password
Parameter Description
4.Figure 21 shows the software update page. Enter the IP address of the FTP
25
Basic Configuration
server, file name (on the server), FTP user name, and password. Click
<Apply>.
Warning:
The file name must contain an extension. Otherwise, the update may fail.
5.Make sure the normal communication of FTP server and switch, as shown in
Figure 22.
26
Basic Configuration
Caution:
To display update log information as shown in Figure 22, you need to click
[Logging] → [Log Options] in WFTPD and select Enable Logging and the log
information to be displayed.
6.When update completes as shown in Figure 23, please reboot the device
Warning:
In the software update process, keep the FTP server software running.
When update completes, reboot the device to activate the new version.
If update fails, do not reboot the device to avoid the loss of software file and
the server. When the switch configuration is changed, you can download the
File uploading is to upload the switch configuration files to the server and save
them to *.doc and *.txt files. File downloading is to download the saved
configuration files from the server to switch, as shown in Figure 24 and Figure
25.
27
Basic Configuration
Caution:
After configuration is downloaded to the switch, you need to restart the switch
28
Device Advanced Configuration
6.1.1 Overview
packets and drop the data that is over the limitation. Ingresses limit the rate of
the selected packets, while egresses limit the rate of all packets.
Snooping
FF:FF:FF:FF:FF:FF.
29
Device Advanced Configuration
Packet Type
Options: Limit all frames, Limit just multicast and flooded unicast frames, Limit
InRate
Range: 62~100000Kbps
Function: limit the ingress rate of port-received packets and the packets that
Egress Rate
Range: 62~100000Kbps
Caution:
30
Device Advanced Configuration
Limit the ingress rate of multicast, flooded unicast and broadcast packets
received by port 1 to 70Kbps and set the egress rate of port 1 to 80Kbps.
broadcast packets, set the ingress rate to 70Kbps and the egress rate to
6.2.1 Overview
One LAN can be divided into multiple logical Virtual Local Area Networks
(VLANs). A device can only communicate with the devices on the same VLAN.
security.
a logical network. If a host in one VLAN needs to send data packets to a host
6.2.2 Principle
802.1Q header
DA SA Length/Type Data FCS
Type PRI CFI VID
31
Device Advanced Configuration
A 4-byte 802.1Q header, as the VLAN tag, is added to the traditional Ethernet
data frame.
Type: 16 bits. It is used to identify a data frame carrying a VLAN tag. The value
is 0x8100.
VID: 12 bits, indicating the VLAN number. The value ranges from 1 to 4093. 0,
Note:
VLAN 1 is the default VLAN and cannot be manually created and/or deleted.
based on switch ports. After a port is added to a specified VLAN, the port can
1.Port Type
Ports fall into two types according to how they handle VLAN tags when they
forward packets.
Untag port: Packets forwarded by an Untag port do not have VLAN tags.
Untag ports are usually used to connect to terminals that do not support
802.1Q. By default, all switch ports are Untag ports and belong to VLAN1.
32
Device Advanced Configuration
Tag port: All packets forwarded by a Tag port carry a VLAN tag. Tag ports
2.PVID
Each port has a PVID. When receiving an untagged packet, a port adds a tag
The port PVID is the VLAN ID of the Untag port. By default, all ports' PVID is
VLAN 1.
Table 4 shows how the switch processes received and forwarded packets
of VLANs allowed
list of VLANs
allowed through,
1.Create a VLAN.
. Select the ports to be added to the VLAN and set port parameters, as shown
in Figure 28.
VLAN Name
VLAN ID
VLAN Member
Options: Tagged/Untagged
34
Device Advanced Configuration
Priority
Range: 0~7
Default: 0
Function: set the port default priority. When adding an 802.1Q Tag into an
PVLAN
Options: Enable/Disable
Default: Disable
Function: For Tag port, enable PVLAN or not. More information about
Caution:
An Untag port can be added to only one VLAN and its VLAN ID is the port
PVID. By default, it is VLAN 1, but a tag port can be added to multiple VLANs.
PVLAN List
Options: Select/Deselect
Function: Enable or disable the PVLAN function. For details, see the next
chapter.
Click <Untagged Port VLAN List> in the preceding figure. The following page is
displayed.
35
Device Advanced Configuration
Caution:
Each port must have an Untag attribute. If it is not set, the Untag port is default
in VLAN 1.
4. Modify/Delete VLAN.
Click a VLAN in
Figure 29Figure 29 to enter the corresponding screen in which the VLAN can be
Figure 31.
36
Device Advanced Configuration
As shown in Figure 32, the entire LAN is divided into 2 VLANs: VLAN2 and
each other, but different VLANs are isolated. The terminal PCs cannot
distinguish Tag packets, so the ports on connecting Switch A and Switch B with
PCs are set to Untag port. VLAN2 and VLAN100 packets need to be
and Switch B should be set to Tag ports, permitting the packets of VLAN 2 and
Item Configuration
VLAN2 Set Switch A and B's port 1 and port 2 to Untag ports, VDSL-1 to Tag port
VLAN100 Set Switch A and B's port 3 and port 4 to Untag ports, VDSL-1 to Tag port
37
Device Advanced Configuration
1. Create VLAN 2, add port 1 and port 2 into VLAN 2 as Untag ports, and add
2. Create VLAN 100, add port 3 and port 4 into VLAN 100 as Untag ports, and
add VDSL-1 into VLAN 100 as Tag port, as shown in Figure 28.
6.3.1 Overview
PVLAN (Private VLAN) uses two layers isolation technologies to realize the
The upper VLAN is a shared domain VLAN in which ports are uplink ports. The
lower VLANs are isolation domains in which ports are downlink ports. Downlink
38
Device Advanced Configuration
communicate with the uplink port at the same time. Isolation domains cannot
As shown in Figure 33, the shared domain is VLAN 100 and the isolation
domains are VLAN 10 and VLAN 30; the devices in the isolation domains can
communicate with the device in the shared domain, such as VLAN 10 can
communicate with VLAN 100; VLAN 30 can also communicate with VLAN100,
but the devices in different isolation domains cannot communicate with each
Caution:
When a PVLAN-enabled Tag port forwards a frame carrying a VLAN tag, the
39
Device Advanced Configuration
If the VLAN is a shared domain, the uplink port should be set to untagged, and
If the VLAN is an isolation domain, the downlink port should be set to untagged,
PVLAN List
Default: Deselect
Note:
and port 2 are uplink ports; VLAN100 and VLAN200 are isolation domains and
Switch Configuration:
Port 1 and port 2 are set to Untagged and are assigned to the shared
Port 3 and port 4 are set to Tagged and are assigned to the shared domain
Port VDSL-1 and port VDSL-2 are set to Tagged and are assigned to the
41
Device Advanced Configuration
Port 1 and port 2 are set to Tagged and are assigned to the isolation
Port 3 and port 4 are set to Untag ports and are assigned to the isolation
Port 1 and port 2 are set to Tagged and are assigned to the isolation
Port VDSL-1 and port VDSL-2 are set to Untagged and are assigned to the
Figure 35.
6.4.1 Overview
Port mirroring function is that the switch copies all received or transmitted data
port), and the mirroring destination port connects with a protocol analyzer or
6.4.2 Explanation
A switch supports only one mirroring destination port, but there is no such
ports.
Mirroring source port and destination port can be in the same VLAN or in
different VLANs.
42
Device Advanced Configuration
Caution:
Port mirroring and Port Trunk are mutually exclusive. The mirroring
source/destination port cannot be added into a Trunk group, while the ports
Port mirroring and port redundancy are mutually exclusive. The mirroring
Monitoring Port
Default: Disable
Function: Select a port to be the mirroring destination port. There is one and
2. Select mirroring source ports and the mirroring mode, as shown in Figure
38.
43
Device Advanced Configuration
Mode
Options: RX/TX/RX&TX
As shown in Figure 39, the mirroring destination port is port 2 and the mirroring
source port is port 1. All packets received and transmitted by port 1 are
mirrored to port 2.
Configuration process:
2.Set port 1 to the mirroring source port and the port mirroring mode is set to
6.5.1 Overview
Port trunk is to bind a group of physical ports that have the same configuration
to a logical port. The member ports in a trunk group not only can share the flow
44
Device Advanced Configuration
to, but also can become a dynamic backup of each other to enhance the
connection reliability.
6.5.2 Implementation
As shown in Figure 40, three ports in Switch A aggregate to a trunk group and
the bandwidth of the trunk group is the total bandwidth of three ports.
determines the member port for transmitting the traffic based on the calculation
result of load sharing. When one member port of the aggregated link fails, the
traffic transmitted through the port is taken over by another normal port based
6.5.3 Explanation
Port trunk and the following port operations are mutually exclusive:
Port trunk is mutually exlusive with port redundancy. A port added to a trunk
Port trunk is mutually exclusive with port mirroring. A port added to a trunk
45
Device Advanced Configuration
Caution:
Trunk ID
Configuration range: 1 to 16
46
Device Advanced Configuration
Description: The series switches support max 16 trunk groups and each trunk
Click a trunk group in Figure 43. You can view the members of the group,
After modifying group member settings (add a new port to the group or delete
a port member from the group), click <Apply> to make the modification take
As shown in Figure 40, port 1, port 2, and port 3 of Switch A are connected to
among ports.
47
Device Advanced Configuration
Configuration on switches:
1.Add trunk group 1 on Switch A and add port 1, port 2, and port 3 to the group,
2.Add trunk group 1 on Switch B and add port 1, port 2, and port 3 to the
6.6.1 Overview
ports. Link check helps to detect the anomaly for timely processing when a
fault occurs.
Administration Status
Options: Enable/Disable
Default: Disable
function
Run Status
Description: If Link Check is enabled on a ring port and the port sends and
receives data normally, Normal Link is displayed. If the peer end does not
receive the detection packets from the device, Send Fault is displayed. If the
device does not receive detection packets from the peer end, Receive Fault is
Caution:
If the peer device does not support the Link Check function, the function shall
6.7.1 Overview
You can configure the static multicast address table. You can add an entry to
the table in <multicast MAC address, VLAN, multicast member port> format.
When receiving multicast packets, the switch searches the table for the
Options: Enable/Disable
Default: Disable
49
Device Advanced Configuration
MAC
Function: Configure the multicast group address. The lowest bit of the highest
byte is 1.
VLAN ID
Function: Set the VLAN ID of the entry. Only the member ports of the VLAN
Select member ports for the multicast address. If hosts connected to a port
need to receive the packets from a multicast address, you can configure the
50
Device Advanced Configuration
The static multicast address list contains the MAC address, VLAN ID, and
member port. To delete an entry, select the entry and click <Delete>. To modify
6.8.1 Overview
multicast protocol at the data link layer. It is used for managing and controlling
packets, establish mapping between ports and MAC multicast addresses, and
Querier: periodically sends IGMP general query packets to query the status
elect the one with the smallest IP address to be the querier. Only the
elected querier periodically sends IGMP general query packets. The other
multicast entry and adds the port that receives the IGMP report to the
member port list. If a router port exists, it is also added to the member port
51
Device Advanced Configuration
list. Then the switch forwards the IGMP report to other devices through the
router port, so that the other devices establish the same multicast entry.
6.8.3 Principles
General query packet: The querier periodically sends general query packets
group has member ports. After receiving the query packet, a non-querier
an IGMP leave packet. After receiving the leave packet, the querier sends
device will send an IGMP report packet upon receiving an IGMP query
packet to tell others in the group that it is alive. If the device wants to join in
a group, it will send an IGMP report packet to the IGMP querier proactively.
multicast group.
Leave packet: If a device wants to leave a multicast group, the device will
Figure 49.
52
Device Advanced Configuration
Options: Enable/Disable
Default: Disable
Options: Enable/Disable
Default: Disable
Description: The auto query function can be enabled only if IGMP Snooping is
enabled.
Caution:
The auto query function on a network shall be enabled on at least one switch.
53
Device Advanced Configuration
In the FDB multicast table dynamically learned through IGMP Snooping, the
Switch 2 receives the packets and is thus elected as the routing port.
packets, port 1 and port 2 (routing port) of Switch 1 are added to multicast
port 2. Then port 3 and port 4 of Switch 2 are also added to multicast group
54
Device Advanced Configuration
multicast data. As the process proceeds, multicast data finally reaches port
6.9.1 Overview
and MAC addresses by the address request and response mechanism. The
switch can learn the mapping between IP addresses and MAC addresses of
other hosts on the same network segment. It also supports static ARP entries
ARP entries periodically age out, ensuring consistency between ARP entries
The series switches provide not only Layer 2 switching function, but also the
ARP function for resolving the IP addresses of other hosts on the same
managed hosts.
6.9.2 Description
Dynamic entries are generated and maintained based on the exchange of ARP
Static entries are manually configured and maintained. They never expire or
55
Device Advanced Configuration
The switch supports up to 512 ARP entries (256 static ones at most).When the
number of ARP entries is larger than 512, new entries automatically overwrite
Default: 20 minutes
Description: ARP aging time is the duration from when a dynamic ARP entry is
added to the table to when the entry is deleted from the table.
ARP address
Caution:
56
Device Advanced Configuration
If the IP address of a static entry is the IP address of the switch, the system
ARP Address
Operation: Select a static entry in the Number column. Click <Delete> to delete
the entry.
Caution:
6.10.1 Overview
protocol used for preventing broadcast storms caused by link loops and
certain ports to prune "loops" into "trees", preventing proliferation and endless
57
Device Advanced Configuration
loops. The drawback of STP is that a port must wait for twice the forwarding
Compared with STP, RSTP achieves much more rapid convergence by adding
alternate port and backup port for the root port and designated port
respectively. When the root port is invalid, the alternate port can enter the
Root bridge: serves as the root for a tree. A network has only one root
bridge. The root bridge changes with network topology. The root bridge
periodically sends BPDU to the other devices, which forward the BPDU to
Root port: indicates the best port for transmission from the non-root bridges
to the root bridge. The best port is the port with the smallest cost to the root
bridge. A non-root bridge communicates with the root bridge through the
root port. A non-root bridge has only one root port. The root bridge has no
root port.
Designated port: indicates the port for forwarding BPDU to other devices or
Alternate port: indicates the backup port of the root port. If the root port fails,
Backup port: indicates the backup port of the designated port. When a
designated port fails, the backup port becomes the new designated port
6.10.3 BPDU
To prevent loops, all the bridges of a LAN calculate a spanning tree. The
58
Device Advanced Configuration
Root bridge ID: priority of the root bridge (2 bytes)+MAC address of the root
bridge (6 bytes).
Max age: maximum duration that a BPDU can be saved on a device. When
--forwarding).
6.10.4 Implementation
The process for all bridges calculating the spanning tree with BPDUs is as
follows:
1.In the initial phase, each port of all devices generates the BPDU with itself
as the root bridge; both root bridge ID and designated bridge ID are the ID
of the local device; the root path cost is 0; the designated port is the local
59
Device Advanced Configuration
port.
2.Best BPDU selection: All devices send their own BPDUs and receive
BPDUs from other devices. Upon receiving a BPDU, each port compares
If the priority of its own BPDU is higher, then the port does not perform
any operation.
If the priority of the received BPDU is higher, then the port replaces
Devices compare the BPDUs of all ports and figure out the best BPDU.
If the root bridge IDs of two BPDUs are the same, their root path costs
are compared. If the root path cost in a BPDU plus the path cost of the
If the root path costs of two BPDUs are also the same, the designated
bridge IDs, designated port IDs, and IDs of the port receiving the
BPDUs are further compared in order. The BPDU with a smaller ID has
a higher priority.
3.Selection of the root bridge: The root bridge of the spanning tree is the
5.BPDU calculation of the designated port: Based on the BPDU of the root
port and the path cost of the root port, a device calculated a designated port
Replace the root bridge ID with the root bridge ID of the BPDU of the
root port.
Replace the root path cost with the root path cost of the root port BPDU
60
Device Advanced Configuration
6.Selection of the designated port: If the calculated BPDU is better, then the
device selects the port as the designated port, replaces the port BPDU with
the calculated BPDU, and sends the calculated BPDU. If the port BPDU is
better, the device does not update the port BPDU and blocks the port.
Blocked ports can receive and forward only RSTP packets, but not other
packets.
Protocol Types
Options: Disable/RSTP/STP
Default: Disable
2. Set the time parameters of the network bridge, as shown in Figure 56.
61
Device Advanced Configuration
Default: 32768
Description: The priority is used for selecting the root bridge. The smaller the
Hello time
Range: 1~10s
Default: 2s
Range: 6~40s
Default: 20s
Description: If the value of message age in the BPDU is larger than the
Range: 4~30s
Default: 15s
Learning to Forwarding.
Message-age Increment
Options: Compulsion/Default
Default: Default
Forward Delay Time, Max Age Time, and Hello Time shall meet the following
requirements: 2 x (Forward Delay Time – 1.0 seconds) >= Max Age Time;
62
Device Advanced Configuration
Protocol Status
Options: Enable/Disable
Default: Disable
Caution:
destination port.
Port Priority
Default: 128
63
Device Advanced Configuration
Function: Configure the port priority, which determines the roles of ports.
Path Cost
Range: 1~200000000
Description: The path cost of a port is used to calculate the best path. The
value of the parameter depends on the bandwidth. The larger the value, the
lower the cost. You can change the role of a port by changing the value of this
Cost Count
Range: Yes/No
Default: Yes
Description: Yes indicates the path cost of the port adopts the default value. No
The priority of Switch A, B, and C are 0, 4096, and 8192. Path costs of links
64
Device Advanced Configuration
Configuration on Switch A:
56.
2. Set the path cost of port 1 to 5 and that of port 2 to 10, as shown in Figure
57.
Configuration on Switch B:
Figure 56.
2.Set the path cost of port 1 to 5 and that of port 2 to 4, as shown in Figure 57.
Configuration on Switch C:
Figure 56.
2.Set the path cost of port 1 to 10 and that of port 2 to 4, as shown in Figure
65
Device Advanced Configuration
57.
The path cost from AP1 to BP1 is 5 and that from AP2 to BP2 is 14.
The path cost from AP1 to CP2 is 9 and that from AP2 to CP1 is 10.
Therefore, CP2 is the root port and BP2 is the designated port.
6.11.1 Overview
protection protocol of Kyland, but cannot coexist with RSTP on the same
transmission function. The function enables the switch to keep other redundant
communication requirements.
Switches running other redundant protocols can receive and forward RSTP
link.
four switches, so that Switch E and Switch F can receive RSTP packets from
each other.
66
Device Advanced Configuration
Options: Enable/Disable
Default: Disable
Caution:
67
Device Advanced Configuration
ring, and Switch E and Switch F form an RSTP ring. In the RSTP ring, the
E and Switch F.
Enable RSTP transparent transmission on ports A1, A2, A3, B1, B2, B3, C1,
6.12.1 Overview
enable a network to recover within 50ms when a link fails, ensuring stable and
reliable communication.
Master station: One ring has only one master station. The master station
forwards DT-Ring packets and detects the current status of the ring.
Master port: On the master station, the first port whose link status changes
Slave port: On the master station, the port whose link status changes to up
later is called the slave port. When the ring is closed, the slave port is in
blocking state. When a ring is open due to a link or port failure, the status of
Slave station: A ring can include multiple slave stations. Slave stations
68
Device Advanced Configuration
listen to and forward DT-Ring packets and report fault information to the
master station.
Backup port: The port for communication between DT rings is called the
backup port.
Master backup port: When there are multiple backup ports in a ring, the
Slave backup port: When there are multiple backup ports in a ring, all the
other ports (except the master backup port) are slave backup ports and they
Blocking state: A port can receive and forward only DT-Ring packets, but
6.12.3 Implementation
1. Implementation of DT-Ring
The master port on the master station periodically sends DT-Ring packets to
detect ring status. If the slave port of the master station receives the packets,
When a ring is closed, the master port of the master station is in forwarding
state, the slave port in a blocking state, and all ring ports of slave stations are
in a forwarding state.
The master port of the master station fails. The statuses of the slave port
on the master station and all ring ports of slave stations change to
forwarding.
The slave port of the master station fails. The statuses of the master port
on the master station and all ring ports of slave stations change to
69
Device Advanced Configuration
forwarding.
Another port or link fails. The statuses of the two ports of the master station
All switches in the same ring must have the same domain number.
Each ring can only have one master station and multiple slave stations.
For two connected rings, backup ports can be configured only in one ring.
On a switch, only one backup port can be configured for one ring.
follows:
state, and ring port 2 is in a Blocking state. The two ring ports of each slave
following figure, port 2 switches to a Forwarding state, and port 6 and port 7
70
Device Advanced Configuration
Caution:
Link status change affects the role and status of ring ports.
2. Implementation of DT-Ring+
DT-Ring+ can provide backup for two DT rings, as shown in Figure 63. One
is the master backup port depends on the MAC addresses of the two ports. If
the master backup port or its link fails, the slave backup port will forward
redundant rings.
71
Device Advanced Configuration
Caution:
Options: Disable/Enable
Default: Disable
detects ring status. When a non-ring port receives DT-Ring packets, the
72
Device Advanced Configuration
Redundancy
Domain ID
Range: 1~32
Domain name
Station Type
Options: Master/Slave
Default: Master
73
Device Advanced Configuration
Caution:
A ring port or backup port cannot be added to a trunk group. A port added to
DT-Ring+
Options: Enable/Disable
Default: Disable
Backup Port
Description: You can configure a backup port only after the DT-Ring+ function
is enabled.
After parameters are set, the DT-Ring List shows all created rings, as shown in
Click the DT-Ring options in Figure 67. You can view and modify the
74
Device Advanced Configuration
Click <Apply> for changes to take effect after modification. Click <Delete> to
75
Device Advanced Configuration
Configuration on Switch A:
1. Domain ID: 1; Domain name: Ring; Ring port: port 1 and port2; Station type:
Slave; DT-Ring+: Disable; do not set backup ports, as shown in Figure 66.
Configuration on Switch B:
2. Domain ID: 1; Domain name: Ring; Ring port: port 1 and port 2; Station type:
Master; DT-Ring+: Disable; do not set backup ports, as shown in Figure 66.
3. Domain ID: 1; Domain name: Ring; Ring port: port 1 and port2; Station type:
4. Domain ID: 2; Domain name: Ring; Ring port: port 1 and port2; Station type:
Slave; DT-Ring+: Disable; do not set backup ports, as shown in Figure 66.
Configuration on Switch H:
5. Domain ID: 2; Domain name: Ring; Ring port: port 1 and port2; Station type:
6.13.1 Overview
congestion avoidance.
Service identification: Objects are identified based on certain match rules. For
example, the objects can be priority tags carried by packets, priority mapped
76
Device Advanced Configuration
proactive packet discarding and tunes traffic volume to solve the overload.
6.13.2 Principle
Each port of the switch has four cache queues, from 0 to 3 in priority ascending
order.
You can configure the mapping between priority and queues. When a frame
reaches the port, the switch determines the queue for the frame according to
the information in the frame header. The switch supports two queue mapping
depends on the default priority of the port. You can configure the mapping
When forwarding data, a port uses a scheduling mode to schedule the data of
four queues and the bandwidth of each queue. The switch supports two
Scheduling (STRICT).
77
Device Advanced Configuration
WRR schedules data flows based on weight ratio. Queues obtain their
queues. More bandwidths are allocated to queues with higher weight ratio.
the switch stops scheduling the low-priority queues and starts to process
the data of the high-priority queue. When the high-priority queue contains
no data, the switch starts to process the data of the queue with lower
priority.
Options: Disable/WRR/STRICT
Default: STRICT
varied weight configurations. The switch employs fixed weight ratio, that is,
78
Device Advanced Configuration
Description: Only one priority mapping mode can be selected for each port.
Default: Priority 0 and 1 are mapped to queue 0; priority 2 and 3 are mapped to
queue 1; Priority 4 and 5 are mapped to queue 2; priority 6 and 7 are mapped
to queue 3.
80
Device Advanced Configuration
4, which is mapped to queue 2. The DSCP priority carried by packets from port
mode.
Configuration steps:
2. Configure 802.1p on port 2 and port 3, and TOS/DIFF on port 1 and port 4,
Packets received through port 1 and port 4 are put into queue 3; packets
received through port 2 are put into queue 1; packets received through port 3
are put into queue 2. According to the mapping between queues and weights,
the weight of queue 1 is 2, the weight of queue 2 is 4, and the weight of queue
81
Device Advanced Configuration
bandwidth. Packets received through port 1 and port 4 are put into queue 3
and forwarded according to the FIFO mechanism. The total bandwidth ratio of
6.14.1 Overview
Switch ports can learn addresses automatically. The switch adds the source
the address table. Aging time starts from when a dynamic MAC address is
added to the MAC address table. If no port receives a frame with the MAC
address within one to two times the aging time, then the switch deletes the
entry of the MAC address from the dynamic forwarding address table. Static
MAC address table does not involve the concept of aging time.
Description: The value must be a multiple of 15.You can adjust the aging time
as required.
82
Device Advanced Configuration
6.15 LLDP
6.15.1 Overview
The Link Layer Discovery Protocol (LLDP) provides a standard link layer
Link Layer Discovery Protocol Data Unit (LLDPDU), and advertises the
LLDPDU to its directly connected neighbors. Upon receiving the LLDPDU, the
neighbors save this information to MIB for query and link status check by the
NMS.
In LLDP information, you can view the information about neighboring devices,
including port number of the neighboring device connected to the local switch,
Caution:
6.16 MOTD
6.16.1 Overview
Message Of The Day (MOTD) is used to configure the login page information,
83
Device Advanced Configuration
MOTD Status
Options: Enable/Disable
Default: Enable
MOTD
84
Device Advanced Configuration
Configure user login information, including "Welcome", SN, and system name.
Configuration on switches:
4. After configuration is completed, the user login page will display the selected
85
Device Advanced Configuration
86
Device Advanced Configuration
6.17 SNTP
6.17.1 Overview
The Simple Network Time Protocol (SNTP) synchronizes time between server
synchronizes time from the server according to packets of the server. Multiple
SNTP servers can be configured for one switch, but only one can be active at a
time.
The SNTP client sends a request to each server one by one through unicast.
The server that responds first is in an active state. The other servers are in an
inactive state.
Caution:
1. Enable SNTP. Select the server and set other parameters, as shown in
Figure 82.
SNTP Status
Options: Enable/Disable
87
Device Advanced Configuration
Default: Disable
Server IP
Format: A.B.C.D
Function: Set the IP address of the SNTP server. The client synchronizes time
Interval Time
Options: 16~16284s
Function: Configure the interval for sending synchronization requests from the
Time Zone
Options: 0, +1, +2, +3, +4, +5, +6, +7, +8, +9, +10, +11, +12, +13, -1, -2, -3, -4,
Default: 0
2. Select the synchronization mode between the client and the server, as
Server Time
Device Time
Update
88
Device Advanced Configuration
Options: Automatism/Manual
Default: Automatism
Function: Select the time synchronization mode between the device and the
server.
Number
Server Status
Options: Active/Repose
Description: The active server provides SNTP time for the client. Only one
Synchronization
6.18 Alarm
6.18.1 Overview
Port alarm: If the function is enabled, then an alarm will be generated for the
Ring alarm: If the function is enabled, then an alarm will be generated for an
open ring.
Caution:
Only the master station of a DT ring supports the ring alarm function.
89
Device Advanced Configuration
Port Alarm
Options: Enable/Disable
Default: Disable
DT-RING Alarm
Options: Enable/Disable
Default: Disable
2. Enable port alarm and ring alarm. The alarm information includes both types
90
Device Advanced Configuration
connected abnormally.
Description: After ring alarm is enabled, Ring Open is displayed for an open
6.19 SNMPv2
6.19.1 Overview
TCP/IP to manage network devices. With the SNMP function, the administrator
can query device information, modify parameter settings, monitor device status,
6.19.2 Implementation
processes request packets from the NMS. When an alarm occurs, the agent
91
Device Advanced Configuration
The NMS is the manager of an SNMP network, while the agent is the managed
device of the SNMP network. The NMS and agents exchange management
Get-Request
Get-Response
Get-Next-Request
Set-Request
Trap
6.19.3 Description
discarded.
To enabled the communication between the NMS and agent, their SNMP
6.19.4 MIB
access permissions, and data types. Each agent has its own MIB. The NMS
MIB defines a tree structure. The tree nodes are managed objects. Each node
has a unique Object Identifier (OID), which indicates the location of the node in
the MIB structure. As shown in Figure 88, the OID of object A is 1.2.1.1.
93
Device Advanced Configuration
SNMP State
Options: Enable/Disable
Default: Enable
V2 State
Options: Enable/Disable
Default: Disable
Read-Only Community
Default: public
Description: The MIB information of the switch can be read only if the
on the switch.
Read-Write Community
Default: private
Description: The MIB information of the switch can be read and written only if
94
Device Advanced Configuration
Request Port
Range: 1~65535
Default: 161
Function: Configure the number of the port for receiving SNMP requests.
Trap on-off
Options: Enable/Disable
Default: Enable
Trap Port ID
Options: 1~65535
Default: 162
Server IP Address
Format: A.B.C.D
Function: Configure the address of the server for receiving trap messages. You
95
Device Advanced Configuration
manually. The switch automatically displays it only if the NMS is running on the
server and reads and writes the MIB node information of the device.
and reads and writes the MIB node information of the Agent. When the Agent
93.
community name to private, and request port to 161, as shown in Figure 90.
3.Enable trap sending, set trap port number to 162, and IP address of server
To monitor and manage the status of the Agent, run the management software,
96
Device Advanced Configuration
6.20 SNMPv3
6.20.1 Overview
between the NMS and the Agent, avoiding interception. The authentication and
6.20.2 Implementation
SNMPv3 provides four configuration tables. Each table can contain 16 entries.
These tables determine whether specific users can access MIB information.
You can create multiple users in the user table. Each user uses different
You can define MIB access rights in the access table by group name, context
The group table is the collection of multiple users. In the group table, access
rights are defined based on user groups. All the users of a group have the
The context table identifies the strings that can be read by users, irrespective
of security models.
97
Device Advanced Configuration
94
Figure 94.
98
Device Advanced Configuration
User Name
Authentication protocol
Options: NONE/HMAC-MD5/HMAC-SHA
Default: NONE
Authentication password
Group Name
Description: Currently, each group can contain only one user. Therefore, the
group name must be identical with the user name in the user table.
Context Name
Security Model
Options: SNMPv3
100
Device Advanced Configuration
Security Level
Options: NoAuthNoPriv/AuthNoPriv
Default: NoAuthNoPriv
Context Name
Function: Define the objects that can be accessed by SNMP. The configuration
101
Device Advanced Configuration
Security Name
Function: Configure the name of the group name. Currently, each group can
contain only one user. Therefore, the security name must be identical with the
Security Model
Options: SNMPv3/SNMPv2
Default: SNMPv3
SNMPv3.
102
Device Advanced Configuration
1. Configure the SNMPv3 user table. Set user name to 1111, authentication
Figure 94.
2. Configure the SNMPv3 access table. Set group name to 1111, context name
3. Configure the SNMPv3 context table. Set the context name to aaaa, as
4. Configure the SNMPv3 group table. Set the security name to 1111, as
To monitor and manage the status of the Agent, run the management software,
103
Device Advanced Configuration
6.21 RMON
6.21.1 Overview
Management Station and Agents. The NMS manages Agents and Agents can
RMON mainly provides statistics and alarm functions. Statistics function is that
these ports, such as the number of packets received from a certain network
segment during a certain period. Alarm function is that Agents can monitor the
values of specified MIB variables. When a value reaches the alarm threshold
(such as the number of packets reaches the specified value), Agent can
RMON (RFC2819) defines multiple RMON groups. The series devices support
statistics group, history group, event group, and alarm group in public MIB.
Statistics group
With the statistics group, the system collects statistics on all types of traffic on
ports and stores the statistics in the Ethernet statistics table for further query
statistics entry on a specified port successfully, the statistics group counts the
value.
History group
History group requires the system to periodically sample all kinds of traffic on
ports and saves the sampling values in the history record table for further
query by the management device. The history group counts the statistics
Alarm group
RMON alarm management can monitor the specified alarm variables. After
alarm entries are defined, the system will acquire the values of monitored
alarm variables in the defined period. When the value of an alarm variable is
larger than or equal to the upper limit, a rising alarm event is triggered. When
the value of an alarm variable is smaller than or equal to the lower limit, a
falling alarm event is triggered. Alarms will be handled according to the event
definition.
Caution:
same direction, then the alarm event is only triggered the first time. Therefore
Event group
Event group is used to define event indexes and event handing methods.
Events defined in the event group is used in the configuration item of alarm
group. An event is triggered when the monitored device meets the alarm
Log: logs the event and related information in the event log table.
Trap: sends a Trap message to the NMS and inform the NMS of the event.
Log-Trap: logs the event and sends a Trap message to the NMS.
105
Device Advanced Configuration
Index
Range: 1~65535
Owner
Data Source
Options: ifIndex.portid
Index
Range: 1~65535
Data Source
Options: ifIndex.portid
106
Device Advanced Configuration
Owner
Sampling Number
Range: 1~65535
Sampling Space
Range: 1~3600s
Index
Range: 1~65535
Owner
Event Type
Default: NONE
Function: Configure the event type for alarms, that is, the processing mode
107
Device Advanced Configuration
towards alarms.
Event Description
Event Community
Function: Configure the community name for sending a trap event. The value
103
Figure 103.
108
Device Advanced Configuration
Index
Range: 1~65535
OID
109
Device Advanced Configuration
Owner
Data source
Options: ifIndex.portid
Stat Group
Sampling Type
Options: Absolute/Delta
Default: Absolute
of the variable in the sampling period is extracted when the end of the period
approaches.
Alarm Type
Options: RisingAlarm/FallingAlarm/RisOrFallAlarm
Default: RisingAlarm
Function: Select the alarm type, including the rising edge alarm, falling edge
Sampling Space
Range: 1~65535
Function: Configure the sampling period. The value should be identical with
Rising Threshold
Range: 0~65535
110
Device Advanced Configuration
Function: Configure the rising edge threshold. When the sampling value
Falling Threshold
Range: 0~65535
Function: Configure the falling edge threshold. When the sampling value is
lower than the threshold and the alarm type is set to FallingAlarm or
Range: 0~65535
Function: Configure the index of the rising event, that is, processing mode for
Range: 0~65535
Function: Configure the index of the falling event, that is, processing mode for
6.22 SSH
6.22.1 Overview
Secure Shell (SSH) is a network protocol for secure remote login. SSH
The switch supports the SSH server function and allows the connection of
multiple SSH users that log in to the switch remotely through SSH, but only
6.22.2 Key
Unencrypted packet is called plain text while encrypted packet is called cipher
111
Device Advanced Configuration
text. Both encryption and decryption require the key. A key is a specific string
and is the only parameter for transformation between plain text and cipher text.
Encryption changes plain text to cipher text, while decryption changes cipher
communication has a pair of keys: private one and public one. The public key
is used to encrypt data, and a legitimate user can use the private key to
6.22.3 Implementation
To implement SSH connection during communication, the server and the client
Version negotiation phase: SSH has two versions: SSH1 and SSH2. Two
Session request phase: After passing the authentication, the client sends a
Session phase: After the session request is accepted, the server and the
2. Click <Destroy> to delete the old key pair, as shown in Figure 104.
112
Device Advanced Configuration
3. Click <Create> to generate the new key pair, as shown in Figure 105
113
Device Advanced Configuration
SSH State
Options: Enable/Disable
Default: Disable
Function: Enable or disable SSH. If SSH is enabled, the device serves as the
SSH server.
Range: 1~10
Default: 10
Time Out
Options: 60~300
Default: 300
Description: Set the SSH connection validity during no data transmission. If the
Options: Create/Destroy
Function: Create or destroy the local key pair of the SSH server. The local key
pair must be generated before the SSH server is enabled and the old key pair
Display the local key value. Click <Create>. The key value is created
automatically.
Key Name
configured.
Key Type
Key Value
115
Device Advanced Configuration
Description: The public key is usually generated by Puttygen and copied to the
key value of the server. The private key is saved in the client.
2. View the public key list. You can delete a selected key entry, as shown in
Figure 108.
User Name
Function: Create the user name. You can configure a maximum of four users.
Authentication Type
Default: Password
Function: Configure the authentication type of the user. If you select Password,
116
Device Advanced Configuration
enter 3 to 8 characters. If you select Public Key, select a key from the public
key list.
2. View the SSH user list. You can delete a selected user, as shown in Figure
110.
Establish an SSH connection between the host (SSH client) and the switch, as
1. Destroy the old key pair, create the new key pair, and start the SSH server,
2.Set the SSH user name to ddd, select the password authentication mode,
3. Establish the connection between the host and the SSH server. Open
117
Device Advanced Configuration
5. Enter user name "ddd" and password "123". The switch configuration page
118
Device Advanced Configuration
1. Destroy the old key pair, create the new key pair, and start the SSH server,
the client. Click <Generate> to generate a key pair, as shown in Figure 115.
119
Device Advanced Configuration
3. During the process of generating a key pair, move your mouse in the window,
as shown in Figure 116. Otherwise, the progress bar does not continue and
120
Device Advanced Configuration
4. As shown in Figure 117, the key is created. Click <Save private key>. Copy
the public key to the key value in SSH key configuration and enter the key
121
Device Advanced Configuration
5. Set the SSH user name to bbb, and select key authentication and key name,
6. Establish the connection between the host and the SSH server. Open
122
Device Advanced Configuration
7. In the left column of Figure 118, click [SSH] → [Auth]. The following page is
123
Device Advanced Configuration
8. Click <Open>. Enter the user name. The switch configuration interface is
124
Device Advanced Configuration
6.23.1 Overview
functions.
users.
Accounting: records all operations performed by users when they use network
services, including service type, start time, and data flow. It is not only an
6.23.2 Implementation
First, authentication usually uses user name and password to verify user rights.
The principle of authentication is that each user has a unique standard for
obtaining rights. The AAA server checks the standard with user standards in
the database one by one. If a match is found, the user passes the
user may execute certain commands for operations after logging into system.
In this case, the authorization process will detect whether the user has rights to
125
Device Advanced Configuration
resources contain the connecting time or the transmitted and received data in
according to statistics logs in the connection process and the user information,
and the authorization control, bill and trend analysis, resource utilization, and
capacity planning.
Default: local
Description: Local indicates local authentication, in which the user name and
tacacs+ server are used. Local, tacacs+ indicates that local authentication is
first adopted and tacacs+ authentication is used only after local authentication
fails. tacacs+, local indicates that tacacs+ authentication is first adopted and
126
Device Advanced Configuration
122.
Options: telnet/web
6.24.1 Overview
The client runs on the NAS and user information is managed centrally on the
server. The NAS is the server for users but client for the server. Figure 123
127
Device Advanced Configuration
The protocol authenticates, authorizes, and charges terminal users that need
to log in to the device for operations. The device serves as the TACACS+ client,
and sends the user name and password to the TACACS+ server for
user can log into the device for operations once passing authentication.
Protocol status
Options: Enable/Disable
Default: Disable
128
Device Advanced Configuration
Server Attribute
Options: Primary/Secondary
Default: Primary
Server Address
TCP Port
Range: 1~65535
Default: 49
Encrypt
Options: Enable/Disable
Default: Enable
Key Value
between the client and TACACS+ server. The two parties use the shared key
to verify the validity of packets. They can respond to each other's packets only
129
Device Advanced Configuration
if their keys are identical. Therefore, you must ensure the key configured on
View TACACS+ server list. You can delete or modify selected servers.
users through the switch. The IP address of the server is 192.168.0.23. The
key for packet exchange between the switch and the server is aaa.
130
Device Advanced Configuration
122
3.Figure 122.
5. For Web login, enter user name "admin" and password "123" to access the
6. For Telnet login, enter user name and password "bbb" to access the switch
6.25.1 Overview
The Very high-speed Digital Subscriber Line (VDSL) is a digital subscriber line
lines.
The device provides a VDSL port. You can configure the port as a Central
131
Device Advanced Configuration
Output Power
Default: AnnexA-30a
SNR
Options: 6dB/9dB
Default: 9dB
Running Role
Options: CO/CPE
Description: Two connected VDSL ports cannot have the same role. They can
6.26.1 Overview
The series switches support dual systems, that is, switch system and
The switch system mainly implements the exchange of Ethernet data. For
detailed operations, see related chapters in this document. The serial card
system achieves conversion between Ethernet and serial protocol data. For
Converter Web Operation Manual. In the switch system, you can view the IP
and MAC addresses as well as configuring the VLAN ID of the serial card
system.
132
Device Advanced Configuration
VLAN ID
Range: 1~4093
Default: 1
Function: Configure the VLAN ID of the serial card system. After the VLAN ID
is configured, the serial card system can only receive the packets of the
specified VLAN.
2. View the IP address, MAC address, and VLAN ID of the serial card system.
133
Appendix: Acronyms
Appendix: Acronyms
134
Appendix: Acronyms
135