TP-LINK TL-SG2008 Specifications Page 1

Browse online or download Specifications for Network switches TP-LINK TL-SG2008. TP-LINK TL-SG2008 network switch User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 153
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - 8-Port Gigabit Smart Switch

TL-SG2008 8-Port Gigabit Smart Switch REV1.0.0 1910010984

Page 2 - CE Mark Warning

3 Chapter Introduction Chapter 4 System This module is used to configure system properties of the switch. Here mainly introduces: z System Info: C

Page 3 - Safety Information

93 2. 802.1P Priority Figure 9-2 802.1Q frame As shown in the figure above, each 802.1Q Tag has a Pri field, comprising 3 bits. The 3-bit priorit

Page 4

94 Figure 9-4 SP-Mode 2. WRR-Mode: Weight Round Robin Mode. In this mode, packets in all the queues are sent in order based on the weight value for

Page 5

95 The QoS module is mainly for traffic control and priority configuration, including two submenus: DiffServ and Bandwidth Control. 9.1 DiffServ Thi

Page 6

96 Configuration Procedure: Step Operation Description 1 Select the port priority Required. On QoS→DiffServ→Port Priority page, configure the p

Page 7

97 Configuration Procedure: Step Operation Description 1 Log on to the 802.1P/CoS Mapping page 2 Enable 802.1P priority function Required. By de

Page 8 - Package Contents

98 ¾ Priority Level DSCP: Indicates the priority determined by the DS region of IP datagram. It ranges from 0 to 63. Priority Level: Indicates t

Page 9 - Chapter 1 About this Guide

99 SP+WRR-Mode: Strict-Priority + Weight Round Robin Mode. In this mode, this switch provides two scheduling groups, SP group and WRR group. Queues

Page 10

100 Select: Select the desired port for Rate configuration. It is multi-optional.Port: Displays the port number of the switch. Ingress Rate (bps):

Page 11

101 The following entries are displayed on this screen: ¾ Storm Control Config Port Select: Click the Select button to quick-select the correspondin

Page 12 - Chapter 2 Introduction

102 Number OUI Address Vendor 2 00-03-6b-00-00-00 Cisco phone 3 00-04-0d-00-00-00 Avaya phone 4 00-60-b9-00-00-00 Philips/NEC phone 5 00-d0-1e-00

Page 13 - 2.3.2 Rear Panel

4 Chapter Introduction Chapter 9 QoS This module is used to configure QoS function to provide different quality of service for various network appl

Page 14 - 3.2 Configuration

103 ¾ Security Mode of Voice VLAN When voice VLAN is enabled for a port, you can configure its security mode to filter data stream. If security mo

Page 15

104 VLAN ID: Enter the VLAN ID of the voice VLAN. Aging Time: Specifies the living time of the member port in auto mode after the OUI address is ag

Page 16 - Chapter 4 System

105 Security Mode: Configure the security mode for forwarding packets. z Disable: All packets are forwarded. z Enable: Only voice data are forward

Page 17 - 4.1.2 Device Description

106 Configuration Procedure of Voice VLAN: Step Operation Description 1 Configure the link type of the port Required. On VLAN→802.1Q VLAN→VLAN C

Page 18 - 4.1.3 System Time

107 Chapter 10 ACL 10.1 ACL Config An ACL may contain a number of rules, and each rule specifies a different package range. Packets are matched in m

Page 19 - 4.1.4 Daylight Saving Time

108 Figure 10-2 ACL Create The following entries are displayed on this screen: ¾ Create ACL ACL ID: Enter ACL ID of the ACL you want to create. Ru

Page 20 - 4.1.5 System IP

109 MASK: Enter MAC address mask. If it is set to 1, it must strictly match the address. 10.1.4 Standard-IP ACL Standard-IP ACLs analyze and proces

Page 21 - 4.2 User Management

110 Figure 10-5 Create Extend-IP Rule The following entries are displayed on this screen: ¾ Create Extend-IP ACL ACL ID: Select the desired Extend

Page 22 - 4.2.2 User Config

111 Choose the menu ACL→Policy Config→Policy Summary to load the following page. Figure 10-6 Policy Summary The following entries are displayed on t

Page 23 - 4.3 System Tools

112 Figure 10-8 Action Create The following entries are displayed on this screen: ¾ Create Action Select Policy: Select the name of the policy. Se

Page 24 - 4.3.3 Firmware Upgrade

5 Chapter 2 Introduction Thanks for choosing the TL-SG2008 8-Port Gigabit Smart Switch! 2.1 Overview of the Switch Designed for workgroups and depa

Page 25 - 4.3.5 System Reset

113 Interface: Displays the port number or VLAN ID bound to the policy. Direction: Displays the binding direction. 10.3.2 Port Binding On this pag

Page 26 - 4.4 Access Security

114 The following entries are displayed on this screen: ¾ VLAN-Bind Config Policy Name: Select the name of the policy you want to bind. VLAN ID

Page 27 - 4.4.2 SSL Config

115 ¾ Network Diagram ¾ Configuration Procedure Step Operation Description 1 Configure for requirement 1 On ACL→ACL Config→ACL Create page, cre

Page 28 - Figure 4-16 SSL Config

116 Step Operation Description 3 Configure for requirement 3 and 4 On ACL→ACL Config→ACL Create page, create ACL 101. On ACL→ACL Config→Standard-

Page 29 - 4.4.3 SSH Config

117 Chapter 11 SNMP ¾ SNMP Overview SNMP (Simple Network Management Protocol) has gained the most extensive application on the UDP/IP networks. SNM

Page 30 - ¾ Network Requirements

118 SNMP v1: SNMP v1 adopts Community Name authentication. The community name is used to define the relation between SNMP Management Station and SNMP

Page 31

119 management station. The specified User Name and the Auth/Privacy Password are used for SNMP Management Station to access the SNMP Agent, function

Page 32

120 11.1.2 SNMP View The OID (Object Identifier) of the SNMP packets is used to describe the managed objects of the switch, and the MIB (Management

Page 33

121 Figure 11-5 SNMP Group The following entries are displayed on this screen: ¾ Group Config Group Name: Enter the SNMP Group name. The Group Nam

Page 34

122 Notify View: Select the View to be the Notify View. The management stationcan receive trap messages of the assigned SNMP view generatedby the sw

Page 35 - Chapter 5 Switching

6 The following parts are located on the front panel of the switch: ¾ Reset: Press this button for five seconds or above to reset the software setti

Page 36 - 5.1.2 Port Mirror

123 ¾ User Config User Name: Enter the User Name here. User Type: Select the type for the User. • Local User: Indicates that the user is connecte

Page 37 - ¾ Mirrored Port

124 11.1.5 SNMP Community SNMP v1 and SNMP v2c adopt community name authentication. The community name can limit access to the SNMP agent from SNMP

Page 38 - 5.1.3 Port Security

125 Configuration Procedure: z If SNMPv3 is employed, please take the following steps: Step Operation Description 1 Enable SNMP function globally.

Page 39 - 5.1.4 Port Isolation

126 11.2 Notification With the Notification function enabled, the switch can initiatively report to the management station about the important events

Page 40 - 5.1.5 Loopback Detection

127 Type: Select the type for the notifications. • Trap: Indicates traps are sent. • Inform: Indicates informs are sent. The Inform type has a hig

Page 41 - 5.2 LAG

128 RMON Group Function History Group After a history group is configured, the switch collects and records network statistics information periodica

Page 42 - 5.2.1 LAG Table

129 11.3.2 Event Config On this page, you can configure the RMON events. Choose the menu SNMP→RMON→Event Config to load the following page. Figure

Page 43 - 5.2.2 Static LAG

130 Figure 11-11 Alarm Config The following entries are displayed on this screen: ¾ Alarm Table Select: Select the desired entry for configuration

Page 44 - 5.2.3 LACP Config

131 Owner: Enter the name of the device or user that defined the entry. Status: Select Enable/Disable the corresponding alarm entry. Note: When ala

Page 45 - Figure 5-10 LACP Config

132 Chapter 12 Maintenance Maintenance module, assembling the commonly used system tools to manage the switch, provides the convenient method to loc

Page 46 - 5.3 Traffic Monitor

7 Chapter 3 Login to the Switch 3.1 Login 1) To access the configuration utility, open a web-browser and type in the default address http://192.168

Page 47 - 5.3.2 Traffic Statistics

133 Click the Monitor button to enable the switch to monitor and display its CPU utilization rate every four seconds. 12.1.2 Memory Monitor Choose t

Page 48 - 5.4 MAC Address

134 Severity Level Description debugging 7 Debug-level messages Table 12-1 Log Level The Log function is implemented on the Log Table, Local Log, R

Page 49 - 5.4.1 Address Table

135 Severity: Displays the severity level of the log information. You can select a severity level to display the log information whose severity leve

Page 50 - 5.4.2 Static Address

136 12.2.3 Remote Log Remote log feature enables the switch to send system logs to the Log Server. Log Server is to centralize the system logs from

Page 51 - 5.4.3 Dynamic Address

137 Figure 12-6 Backup Log The following entry is displayed on this screen: ¾ Backup Log Backup Log: Click the Backup Log button to save the log

Page 52 - Figure 5-15 Dynamic Address

138 Length: If the connection status is normal, here displays the length range ofthe cable. Error: If the connection status is close, open or imped

Page 53 - 5.4.4 Filtering Address

139 12.4.1 Ping Ping test function, testing the connectivity between the switch and one node of the network, facilitates you to test the network con

Page 54 - 5.5 DHCP Filtering

140 Figure 12-10 Tracert The following entries are displayed on this screen: ¾ Tracert Config Destination IP: Enter the IP address of the desti

Page 55

141 Appendix A: Specifications IEEE802.3 10Base-T Ethernet IEEE802.3u 100Base-TX/100Base-FX Fast Ethernet IEEE802.3ab 1000Base-T Gigabit Ethernet IEE

Page 56 - ¾ DHCP Cheating Attack

142 Appendix B: Configuring the PCs In this section, we’ll introduce how to install and configure the TCP/IP correctly in Windows 2000. First make su

Page 57 - Figure 5-20 DHCP Filtering

8 Figure 3-3 Main Setup-Menu Note: Clicking Apply can only make the new configurations effective before the switch is rebooted. If you want to keep

Page 58 - Chapter 6 VLAN

143 5) The following TCP/IP Properties window will display and the IP Address tab is open on this window by default. Figure B-3 6) Select Use the fo

Page 59 - 6.1 802.1Q VLAN

144 Appendix C: Glossary Boot Protocol (BOOTP) BOOTP is used to provide bootup information for network devices, including IP address information, the

Page 60 - 6.1.1 VLAN Config

145 IGMP Snooping Listening to IGMP Query and IGMP Report packets transferred between IP Multicast routers and IP Multicast host groups to identify I

Page 61 - ¾ VLAN Membership

146 in standard SNMP, and can set alarms on a variety of traffic conditions, including specific error types. Rapid Spanning Tree Protocol (RSTP) RSTP

Page 62

9 Chapter 4 System The System module is mainly for system configuration of the switch, including four submenus: System Info, User Management, System

Page 63

10 Figure 4-2 Port Information ¾ Port Info Port: Displays the port number of the switch. Type: Displays the type of the port. Rate: Displays the

Page 64 - Chapter 7 Spanning Tree

11 Figure 4-4 Device Description The following entries are displayed on this screen: ¾ Device Description Device Name: Enter the name of the switc

Page 65 - ¾ STP Generation

12 ¾ Time Config Manual: When this option is selected, you can set the date and time manually. Get Time from NTP Server: When this option is select

Page 66

I COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Othe

Page 67

13 Predefined Mode: Select a predefined DST configuration. z USA: Second Sunday in March, 02:00 ~ First Sunday in November, 02:00. z Australia: Fi

Page 68

14 ¾ IP Config MAC Address: Displays MAC Address of the switch. IP Address Mode: Select the mode to obtain IP Address for the switch. z Static IP

Page 69 - 7.1 STP Config

15 Figure 4-8 User Table 4.2.2 User Config On this page you can configure the access level of the user to log on to the Web management page. The swi

Page 70 - ¾ Parameters Config

16 Confirm Password: Retype the password. Password Display Mode: z Simple: Select a simple password display mode. z Cipher: Select a cipher pass

Page 71 - 7.2 Port Config

17 Note: 1. It will take a few minutes to restore the configuration. Please wait without any operation. 2. To avoid any damage, please don’t power

Page 72

18 Figure 4-12 Firmware Upgrade Note: 1. Don’t interrupt the upgrade. 2. Please select the proper software version matching with your hardware to

Page 73 - 7.3 MSTP Instance

19 Figure 4-14 System Reset Note: After the system is reset, the switch will be reset to the default and all the settings will be cleared. 4.4 Acce

Page 74 - ¾ VLAN-Instance Mapping

20 ¾ Access Control Config Control Mode: Select the control mode for users to log on to the Web management page. z Disable:Disable the access cont

Page 75 - 7.3.3 Instance Port Config

21 default the switch has a certificate (self-signed certificate) and a corresponding private key. The Certificate/Key Download function enables the

Page 76 - 7.4 STP Security

22 4. It may take more time for https connection than that for http connection, because https connection involves authentication, encryption and dec

Page 77 - ¾ BPDU Filter

II Safety Information z When product has power button, the power button is one of the way to shut off the product; When there is no power button

Page 78 - 7.4.2 TC Protect

23 Idle Timeout: Specify the idle timeout time. The system will automatically release the connection when the time is up. The default time is 120 se

Page 79 - Figure 7-11 TC Protect

24 2. Click the Open button in the above figure to log on to the switch. Enter the login user name and password, and then you can continue to config

Page 80

25 Note: 1. The key length is in the range of 256 to 3072 bits. 2. During the key generation, randomly moving the mouse quickly can accelerate t

Page 81

26 3. On the Web management page of the switch, download the public key file saved in the computer to the switch. Note: 1. The key type should a

Page 82

27 After successful authentication, please enter the login user name. If you log on to the switch without entering password, it indicates that the k

Page 83 - Chapter 8 Multicast

28 Chapter 5 Switching Switching module is used to configure the basic functions of the switch, including four submenus: Port, LAG, Traffic Monitor

Page 84 - ¾ Multicast Address Table

29 Duplex mode with the switch. When “Auto” is selected, theSpeed and Duplex mode will be determined by auto-negotiation.For the SFP port, this switc

Page 85 - 8.1 IGMP Snooping

30 Click Edit to display the following figure. Figure 5-3 Port Mirror Config The following entries are displayed on this screen: ¾ Mirror Group N

Page 86 - 8.1.1 Snooping Config

31 Note: 1. The LAG member can not be selected as the mirrored port or mirroring port. 2. A port can not be set as the mirrored port and the mirror

Page 87 - 8.1.2 Port Config

32 Max Learned MAC: Specify the maximum number of MAC addresses that can be learned on the port. Learned Num: Displays the number of MAC addresses

Page 88 - 8.1.3 VLAN Config

III CONTENTS Package Contents...

Page 89 - 8.1.4 Multicast VLAN

33 ¾ Port Isolation Config Port: Select the port number to set its forwardlist. Forward Portlist: Select the port that to be forwarded to. ¾ Port

Page 90 - ¾ Multicast VLAN

34 Automatic Recovery Time : Time after which the blocked port would automatically recover to normal status. It can be set as integral times of detec

Page 91 - Configuration procedure:

35 If the LAG is needed, you are suggested to configure the LAG function here before configuring the other functions for the member ports. Tips: 1.

Page 92 - 8.2 Multicast IP

36 Group Number: Displays the LAG number here. Description: Displays the description of LAG. Member: Displays the LAG member. Operation: Allows y

Page 93 - 8.2.2 Static Multicast IP

37 ¾ LAG Config Group Number: Select a Group Number for the LAG. Description: Displays the description of the LAG. ¾ Member Port Member Port:

Page 94 - 8.3 Multicast Filter

38 Figure 5-10 LACP Config The following entries are displayed on this screen: ¾ Global Config System Priority: Specify the system priority for th

Page 95 - 8.3.2 Port Filter

39 LAG: Displays the LAG number which the port belongs to. 5.3 Traffic Monitor The Traffic Monitor function, monitoring the traffic of each port, i

Page 96 - ¾ Port Filter Config

40 Octets Rx: Displays the number of octets received on the port. The error octetsare counted in. Octets Tx: Displays the number of octets transm

Page 97 - 8.4 Packet Statistics

41 Broadcast: Displays the number of good broadcast packets received or transmitted on the port. The error frames are not counted in. Multicast: Di

Page 98

42 Type Configuration Way Aging out Being kept after reboot (if the configuration is saved) Relationship between the bound MAC address and the port D

Page 99 - Chapter 9 QoS

IV 5.1.1 Port Config ...28 5.1.2 Port Mirror...

Page 100 - Figure 9-3 IP datagram

43 z Filtering: This option allows the address table to display the filtering address entries only. ¾ Address Table MAC Address: Displays the MAC

Page 101 - Figure 9-5 WRR-Mode

44 ¾ Search Option Search Option: Select a Search Option from the pull-down list and click the Searchbutton to find your desired entry in the Stati

Page 102 - 9.1 DiffServ

45 Figure 5-15 Dynamic Address The following entries are displayed on this screen: ¾ Aging Config Auto Aging: Allows you to Enable/Disable the Aut

Page 103 - 9.1.2 802.1P/CoS Mapping

46 Tips: Setting aging time properly helps implement effective MAC address aging. The aging time that is too long or too short results decreases the

Page 104 - 9.1.3 DSCP Priority

47 ¾ Filtering Address Table Select: Select the entry to delete the corresponding filtering address. It ismulti-optional. MAC Address: Displays th

Page 105 - 9.1.4 Schedule Mode

48 Figure 5-17 Network diagram of DHCP For different DHCP clients, DHCP server provides three IP address assigning methods: (1) Manually assign the

Page 106 - 9.2 Bandwidth Control

49 packet and broadcast the DHCP-REQUEST packet which includes the assigned IP address of the DHCP-OFFER packet. (4) DHCP-ACK Stage: Since the

Page 107 - 9.2.2 Storm Control

50 Figure 5-20 DHCP Filtering The following entries are displayed on this screen: ¾ DHCP Filtering DHCP Filtering: Enable/Disable the DHCP Filterin

Page 108 - 9.3 Voice VLAN

51 Chapter 6 VLAN The traditional Ethernet is a data network communication technology based on CSMA/CD (Carrier Sense Multiple Access/Collision Dete

Page 109 - ¾ Port Voice VLAN Mode

52 6.1 802.1Q VLAN VLAN tags in the packets are necessary for the switch to identify packets of different VLANs. The switch works at the data link l

Page 110 - 9.3.1 Global Config

V 8.1.1 Snooping Config ...79 8.1.2 Port Config...

Page 111 - 9.3.2 Port Config

53 ingress port belongs to, this packet will be dropped. When the VLAN-tagged packets are forwarded by the Tagged port, its VLAN tag will not be chan

Page 112 - 9.3.3 OUI Config

54 Figure 6-3 VLAN Table To ensure the normal communication of the factory switch, the default VLAN of all ports is set to VLAN1. VLAN1 cannot be mo

Page 113

55 Untagged: The port will be an untagged member of the specific VLAN if you select it. Tagged: The port will be an tagged member of the spec

Page 114 - Chapter 10 ACL

56 ¾ Configuration Procedure z Configure Switch A Step Operation Description 1 Configure the Link Type of the ports Required. On VLAN→802.1Q VLAN

Page 115 - 10.1.3 MAC ACL

57 Chapter 7 Spanning Tree STP (Spanning Tree Protocol), subject to IEEE 802.1D standard, is to disbranch a ring network in the Data Link layer in a

Page 116 - 10.1.5 Extend-IP ACL

58 Figure 7-1 Basic STP diagram ¾ STP Timers Hello Time: Hello Time ranges from 1 to 10 seconds. It specifies the interval to send BPDU packets.

Page 117 - 10.2 Policy Config

59 z Comparing BPDUs Each switch sends out configuration BPDUs and receives a configuration BPDU on one of its ports from another switch. The foll

Page 118 - 10.2.3 Action Create

60 RSTP (Rapid Spanning Tree Protocol), evolved from the 802.1D STP standard, enable Ethernet ports to transit their states rapidly. The premises for

Page 119 - 10.3 Policy Binding

61 Figure 7-2 Basic MSTP diagram ¾ MSTP MSTP divides a network into several MST regions. The CST is generated between these MST regions, and multi

Page 120 - 10.3.3 VLAN Binding

62 Figure 7-3 Port roles The Spanning Tree module is mainly for spanning tree configuration of the switch, including four submenus: STP Config, Port

Page 121 - Configuration Procedure:

VI 10.3.2 Port Binding ... 113 10.3.3 VLAN Binding.

Page 122 - ¾ Configuration Procedure

63 The following entries are displayed on this screen: ¾ Global Config STP: Select Enable/Disable STP function globally on the switch. Version: Se

Page 123

64 7.1.2 STP Summary On this page you can view the related parameters for Spanning Tree function. Choose the menu Spanning Tree→STP Config→STP Summar

Page 124 - Chapter 11 SNMP

65 The following entries are displayed on this screen: ¾ Port Config Port Select: Click the Select button to quick-select the corresponding port ba

Page 125 - ¾ MIB Introduction

66 z Disconnected: In this status the port is not participating in the STP. LAG: Displays the LAG number which the port belongs to. Note: 1. Confi

Page 126 - 11.1 SNMP Config

67 Figure 7-8 Instance Config The following entries are displayed on this screen: ¾ Instance Table Instance ID Select: Click the Select button to

Page 127 - 11.1.3 SNMP Group

68 Instance ID: Enter the corresponding instance ID. 7.3.3 Instance Port Config A port can play different roles in different spanning tree instance.

Page 128 - ¾ Group Config

69 Note: The port status of one port in different spanning tree instances can be different. Global configuration Procedure for Spanning Tree function

Page 129 - 11.1.4 SNMP User

70 ¾ Root Protect A CIST and its secondary root bridges are usually located in the high-bandwidth core region. Wrong configuration or malicious atta

Page 130 - ¾ User Table

71 Figure 7-10 Port Protect The following entries are displayed on this screen: ¾ Port Protect Port Select: Click the Select button to quick-selec

Page 131 - 11.1.5 SNMP Community

72 Figure 7-11 TC Protect The following entries are displayed on this screen: ¾ TC Protect TC Threshold: Enter a number from 1 to 100. It is the m

Page 132

1 Package Contents The following items should be found in your box: ¾ One TL-SG2008 8-Port Gigabit Smart Switch ¾ One power adapter ¾ Four rubber c

Page 133 - 11.2 Notification

73 ¾ Configuration Procedure z Configure Switch A: Step Operation Description 1 Configure ports On VLAN→802.1Q VLAN page, configure the link t

Page 134 - 11.3 RMON

74 z Configure Switch C: Step Operation Description 1 Configure ports On VLAN→802.1Q VLAN page, configure the link type of the related ports as T

Page 135 - 11.3.1 History Control

75 ¾ The topology diagram of the two instances after the topology is stable z For Instance 1 (VLAN101, 103 and 105), the red paths in the followi

Page 136 - 11.3.3 Alarm Config

76 Chapter 8 Multicast ¾ Multicast Overview In the network, packets are sent in three modes: unicast, broadcast and multicast. In unicast, the sour

Page 137 - ¾ Alarm Table

77 ¾ Multicast Address 1. Multicast IP Address: As specified by IANA (Internet Assigned Numbers Authority), Class D IP addresses are used as destina

Page 138

78 should be a group port list, so the switch will duplicate this multicast data and deliver each port one copy. The general format of the multicast

Page 139 - Chapter 12 Maintenance

79 in the VLAN as well as analyze the message to get the address of the multicast group the host applies for joining. The receiving port will be proc

Page 140 - 12.2 Log

80 Figure 8-4 Basic Config The following entries are displayed on this screen: ¾ Global Config IGMP Snooping: Select Enable/Disable IGMP Snooping

Page 141 - 12.2.1 Log Table

81 The following entries are displayed on this screen: ¾ Port Config Port Select: Click the Select button to quick-select the corresponding port ba

Page 142 - 12.2.2 Local Log

82 ¾ VLAN Config VLAN ID: Enter the VLAN ID to enable IGMP Snooping for the desired VLAN. Router Port Time: Specify the aging time of the router p

Page 143 - 12.2.4 Backup Log

2 Chapter 1 About this Guide This User Guide contains information for setup and management of TL-SG2008 8-Port Gigabit Smart Switch. Please read thi

Page 144 - 12.3 Device Diagnostics

83 VLAN owning a receiver one copy. This mode wastes a lot of bandwidth. The problem above can be solved by configuring a multicast VLAN. By adding s

Page 145 - 12.4 Network Diagnostics

84 2. The Multicast VLAN won't take effect unless you first complete the configuration for the corresponding VLAN owning the port on the 802.1Q

Page 146 - 12.4.2 Tracert

85 ¾ Network Diagram ¾ Configuration Procedure Step Operation Description 1 Create VLANs Create three VLANs with the VLAN ID 3, 4 and 5 respec

Page 147 - ¾ Tracert Config

86 Choose the menu Multicast→Multicast IP→Multicast IP Table to load the following page. Figure 8-8 Multicast IP Table The following entries are dis

Page 148 - Appendix A: Specifications

87 Figure 8-9 Static Multicast IP Table The following entries are displayed on this screen: ¾ Create Static Multicast Multicast IP: Enter static m

Page 149 - Figure B-1

88 port. If the port can be added to the multicast group, it will be added to the multicast address table; if the port can not be added to the multic

Page 150

89 Choose the menu Multicast→Multicast Filter→Port Filter to load the following page. Figure 8-11 Port Filter The following entries are displayed on

Page 151 - Appendix C: Glossary

90 Configuration Procedure: Step Operation Description 1 Configure IP-Range Required. Configure IP-Range to be filtered on Multicast→Multicast Fil

Page 152

91 Report Packet (V1): Displays the number of IGMPv1 report packets the port received.Report Packet (V2): Displays the number of IGMPv2 report pack

Page 153

92 Chapter 9 QoS QoS (Quality of Service) functions to provide different quality of service for various network applications and requirements and op

Comments to this Manuals

No comments