TL-SG2424P 24-Port Gigabit Smart PoE Switch with 4 Combo SFP Slots REV1.0.0 1910010774
Chapter 1 About this Guide This User Guide contains information for setup and management of TL-SG2424P 24-Port Gigabit Smart PoE Switch with 4 Combo
4 Look over the configuration If it is successfully configured, the VLAN ID of the multicast VLAN will be displayed in the IGMP Snooping Status tabl
2 Configure ports On VLAN→802.1Q VLAN function pages. For port 3, configure its link type as GENERAL and its egress rule as TAG, and add it to VLAN3
VLAN ID: Enter the VLAN ID the desired entry must carry. Port: Select the port number the desired entry must carry. Type: Select the type the desi
VLAN ID: Enter the VLAN ID of the multicast IP. Forward Port: Enter the forward port of the multicast group. Search Option Search Option: Selec
Figure 8-10 Multicast Filter The following entries are displayed on this screen: Create IP-Range IP Range ID: Enter the IP-range ID. Start Multi
Figure 8-11 Port Filter The following entries are displayed on this screen: Port Filter Config Port Select: Click the Select button to quick-sel
Configuration Procedure: Step Operation Description 1 Configure IP-Range Required. Configure IP-Range to be filtered on Multicast→Multicast Filter
IGMP Statistics Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Port: Displays
Chapter 9 QoS QoS (Quality of Service) functions to provide different quality of service for various network applications and requirements and optim
2. 802.1P Priority Figure 9-2 802.1Q frame As shown in the figure above, each 802.1Q Tag has a Pri field, comprising 3 bits. The 3-bit priority f
Chapter Introduction Chapter 4 System This module is used to configure system properties of the switch. Here mainly introduces: System Info: Con
Figure 9-4 SP-Mode 2. WRR-Mode: Weight Round Robin Mode. In this mode, packets in all the queues are sent in order based on the weight value for ea
The QoS module is mainly for traffic control and priority configuration, including three submenus: DiffServ, Bandwidth Control and Voice VLAN. 9.1 D
Configuration Procedure: Step Operation Description 1 Select the port priority Required. On QoS→DiffServ→Port Priority page, configure the port
The following entries are displayed on this screen: DSCP Priority Config DSCP Priority: Select Enable or Disable DSCP Priority. Priority Level
The following entries are displayed on this screen: Priority and CoS-mapping Config Tag-id/Cos-id: Indicates the precedence level defined by IEEE
SP+WRR-Mode: Strict-Priority + Weight Round Robin Mode. In this mode, this switch provides two scheduling groups, SP group and WRR group. Queues in
The following entries are displayed on this screen: Rate Limit Config Port Select: Click the Select button to quick-select the corresponding port
Figure 9-11 Storm Control The following entries are displayed on this screen: Storm Control Config Port Select: Click the Select button to quick
9.3 Voice VLAN Voice VLANs are configured specially for voice data stream. By configuring Voice VLANs and adding the ports with voice devices attach
Port Voice VLAN Mode Voice Stream Type Link type of the port and processing mode ACCESS: Not supported. TRUNK: Supported. The default VLAN of the por
Chapter Introduction Chapter 9 QoS This module is used to configure QoS function to provide different quality of service for various network applic
Note: Don’t transmit voice stream together with other business packets in the voice VLAN except for some special requirements. The Voice VLAN functio
Figure 9-13 Port Config Note: To enable voice VLAN function for the LAG member port, please ensure its member state accords with its port mode. If a
Security Mode: Configure the security mode for forwarding packets. Disable: All packets are forwarded. Enable: Only voice data are forwarded.
Description: Displays the description of the OUI. Configuration Procedure of Voice VLAN: Step Operation Description 1 Configure the link type of t
Chapter 10 PoE PoE (Power over Ethernet) technology describes a system to transmit electrical power along with data to remote devices over standard
10.1.1 PoE Config On this page, you can configure the parameters to implement PoE function. Choose the menu PoE→PoE Config→PoE Config to load the fo
Power Limit (0.1w-30w): Defines the max power the corresponding port can supply. Class1 represents 4w, Class2 represents 7w, Class3 represents 15.4wa
PoE Priority: The priority levels include High, Middle and Low in descending order. When the supply power exceeds the system power limit, the PD lin
Slice: Displays the time-slice of the time-range. Mode: Displays the mode the time-range adopts. Operation: Click Edit to modify this time-range a
Time-Slice Table Index: Displays the index of the time-slice. Start Time: Displays the start time of the time-slice. End Time: Displays the end
Chapter 2 Introduction Thanks for choosing the TL-SG2424P 24-Port Gigabit Smart PoE Switch with 4 Combo SFP Slots! 2.1 Overview of the Switch Desig
Chapter 11 SNMP SNMP Overview SNMP (Simple Network Management Protocol) has gained the most extensive application on the UDP/IP networks. SNMP pr
application requirement. SNMP v1: SNMP v1 adopts Community Name authentication. The community name is used to define the relation between SNMP Mana
The User configured in a SNMP Group can manage the switch via the client program on management station. The specified User Name and the Auth/Privacy
Note: The amount of Engine ID characters must be even. 11.1.2 SNMP View The OID (Object Identifier) of the SNMP packets is used to describe the mana
11.1.3 SNMP Group On this page, you can configure SNMP Group to control the network access by providing the users in various groups with different m
Write View: Select the View to be the Write View. The management accessis writing only and changes can be made to the assignedSNMP View. The View de
Figure 11-6 SNMP User The following entries are displayed on this screen: User Config User Name: Enter the User Name here. User Type: Select th
User Table Select: Select the desired entry to delete the corresponding User. It is multi-optional. User Name: Displays the name of the User. Us
Access: Defines the access rights of the community. read-only: Management right of the Community is restricted to read-only, and changes cannot b
If SNMPv1 or SNMPv2c is employed, please take the following steps: Step Operation Description 1 Enable SNMP function globally. Required. On the
2.3 Appearance Description 2.3.1 Front Panel Figure 2-1 Front Panel The following parts are located on the front panel of the switch: Reset: Pr
Figure 11-8 Notification Config The following entries are displayed on this screen: Create Notification IP Address: Enter the IP Address of the
Notification Table Select: Select the desired entry to delete the correspondingmanagement station. IP Address: Displays the IP Address of the
The RMON Groups can be configured on the History Control, Event Config and Alarm Config pages. 11.3.1 History Control On this page, you can configur
Figure 11-10 Event Config The following entries are displayed on this screen: Event Table Select: Select the desired entry for configuration. In
Figure 11-11 Alarm Config The following entries are displayed on this screen: Alarm Table Select: Select the desired entry for configuration. In
Interval: Enter the alarm interval time in seconds. Owner: Enter the name of the device or user that defined the entry. Status: Select Enable/Disa
Chapter 12 LLDP LLDP (Link Layer Discovery Protocol) is a Layer 2 protocol that is used for network devices to advertise their own device informati
Tx&Rx: the port can both transmit and receive LLDPDUs. Rx_Only: the port can receive LLDPDUs only. Tx_Only: the port can transmit LLDPDUs
The following table shows the details about the currently defined TLVs. TLV type TLV Name Description Usage in LLDPDU 0 End of LLDPDU Mark the e
Note: For detailed introduction of TLV, please refer to IEEE 802.1AB standard and ANSI/TIA-1057. In TP-LINK switch, the following LLDP optional TLV
When the PoE LED is on, the port LED is indicating the power supply status. LED Status Indication On The switch is powered on. Off The switch is
The LLDP module is mainly for LLDP function configuration of the switch, including three submenus: Basic Config, Device Info, Device Statistics and L
Fast Start Times: When the port's LLDP state transforms from Disable (or Rx_Only) to Tx&Rx (or Tx_Only), the fast start mechanism will be e
12.2 Device Info You can view the LLDP information of the local device and its neighbors on the Local Info and Neighbor Info pages respectively. 12.
Refresh Rate: Specify the auto refresh rate. Local Info Enter the desired port number and click Select to display the information of the corres
Figure 12-5 LLDP Statistic Information The following entries are displayed on this screen: Auto Refresh Auto Refresh: Enable/Disable the auto re
based on the port number you entered. Port: Displays local device's port number. Transmit Total: Displays the number of LLDPDUs sent by this p
Extended Power-Via-MDI TLV The Extended Power-Via-MDI TLV is intended to enable advanced power management between LLDP-MED Endpoint and Network Conne
Figure 12-7 LLDP-MED Port Configuration The following entries are displayed on this screen: LLDP-MED Port Config Port Select: Select the desired
Included TLVs Select TLVs to be included in outgoing LLDPDU. Location Identification Parameters Configure the Location Identification TLV&apos
Figure 12-8 LLDP-MED Local Information The following entries are displayed on this screen: Auto Refresh Auto Refresh: Enable/Disable the auto re
Chapter 3 Login to the Switch 3.1 Login 1) To access the configuration utility, open a web-browser and type in the default address http://192.168.0
Figure 12-9 LLDP-MED Neighbor Information The following entries are displayed on this screen: Auto Refresh Auto Refresh: Enable/Disable the auto
Chapter 13 Maintenance Maintenance module, assembling the commonly used system tools to manage the switch, provides the convenient method to locate
Click the Monitor button to enable the switch to monitor and display its CPU utilization rate every four seconds. 13.1.2 Memory Monitor Choose the m
notifications 5 Normal but significant conditions informational 6 Informational messages debugging 7 Debug-level messages Table 13-1 Log Level The Lo
select a module from the drop-down list to display the corresponding log information. Severity: Displays the severity level of the log information
13.2.3 Remote Log Remote log feature enables the switch to send system logs to the Log Server. Log Server is to centralize the system logs from vari
Figure 13-6 Backup Log The following entry is displayed on this screen: Backup Log Backup Log: Click the Backup Log button to save the log as
Status: Displays the connection status of the cable connected to the port. Thetest results of the cable include normal, close, open, short, impedanc
13.4 Network Diagnostics This switch provides Ping test and Tracert test functions for network diagnostics. 13.4.1 Ping Ping test function, testing
Figure 13-10 Tracert The following entries are displayed on this screen: Tracert Config Destination IP: Enter the IP address of the destinatio
Figure 3-3 Main Setup-Menu Note: Clicking Apply can only make the new configurations effective before the switch is rebooted. If you want to keep t
Appendix A: Specifications IEEE802.3 10Base-T Ethernet IEEE802.3u 100Base-TX/100Base-FX Fast Ethernet IEEE802.3ab 1000Base-T Gigabit Ethernet IEEE802
Appendix B: Configuring the PCs In this section, we’ll introduce how to install and configure the TCP/IP correctly in Windows 2000. First make sure y
164 5) The following TCP/IP Properties window will display and the IP Address tab is open on this window by default. Figure B-3 6) Select Use the fo
Appendix C: Glossary Boot Protocol (BOOTP) BOOTP is used to provide bootup information for network devices, including IP address information, the add
IEEE 802.1p An IEEE standard for providing quality of service (QoS) in Ethernet networks. The standard uses packet tags that define up to eight traff
meaning that it takes a message and converts it into a fixed string of digits, also called a message digest. Network Time Protocol (NTP) NTP provides
168 Trivial File Transfer Protocol (TFTP) A TCP/IP protocol commonly used for software downloads. User Datagram Protocol (UDP) UDP provides a datagra
Chapter 4 System The System module is mainly for system configuration of the switch, including four submenus: System Info, User Management, System T
Indicates the SFP port is not connected to a device. Indicates the SFP port is at the speed of 1000Mbps. Indicates the SFP port is at the speed of
COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other
Bandwidth Utilization Rx: Select Rx to display the bandwidth utilization of receiving packets on this port. Tx: Select Tx to display the bandwid
Figure 4-5 System Time The following entries are displayed on this screen: Time Info Current System Date: Displays the current date and time of
Choose the menu System→System Info→Daylight Saving Time to load the following page. Figure 4-6 Daylight Saving Time The following entries are displa
Note: 1. When the DST is disabled, the predefined mode, recurring mode and date mode cannot be configured. 2. When the DST is enabled, the default
Subnet Mask: Enter the subnet mask of the switch. Default Gateway: Enter the default gateway of the switch. Note: 1. Changing the IP address to a
Figure 4-9 User Config The following entries are displayed on this screen: User Info User Name: Create a name for users’ login. Access Level: S
4.3 System Tools The System Tools function, allowing you to manage the configuration file of the switch, can be implemented on Config Restore, Confi
Figure 4-11 Config Backup The following entries are displayed on this screen: Config Backup Backup Config: Click the Backup Config button to sav
Note: 1. Don’t interrupt the upgrade. 2. Please select the proper software version matching with your hardware to upgrade. 3. To avoid damage, ple
4.4.1 Access Control On this page you can control the users logging on to the Web management page to enhance the configuration management security. T
Safety Information When product has power button, the power button is one of the way to shut off the product; When there is no power button, the o
Port: The field can be available for configuration only when Port-based mode is selected. Only the users connected to these ports you set here are a
Figure 4-16 SSL Config The following entries are displayed on this screen: Global Config SSL: Select Enable/Disable the SSL function on the swi
Comprising server and client, SSH has two versions, V1 and V2 which are not compatible with each other. In the communication, SSH server and client c
Key File: Select the desired key file to download. Download: Click the Download button to download the desired key file to the switch. Note: 1. Pl
Application Example 2 for SSH: Network Requirements 1. Log on to the switch via password authentication using SSH and the SSH function is enable
3. On the Web management page of the switch, download the public key file saved in the computer to the switch. Note: 1. 1. The key type should
28 5. After the public key and private key are downloaded, please log on to the interface of PuTTY and enter the IP address for login. After succ
Chapter 5 Switching Switching module is used to configure the basic functions of the switch, including four submenus: Port, LAG, Traffic Monitor and
Description: Give a description to the port for identification. Status: Allows you to Enable/Disable the port. When Enable is selected, the port ca
Mirroring: Displays the mirroring port number. Mode: Displays the mirror mode, the value can be "Ingress" or "Egress".Mirrored
CONTENTS Package Contents ...1
Select: Select the desired port as a mirrored port. It is multi-optional. Port: Displays the port number. Ingress: Select Enable/Disable the Ingre
Figure 5-4 Port Security The following entries are displayed on this screen: Port Security Select: Select the desired port for Port Security con
Note: The Port Security function is disabled for the LAG port member. Only the port is removed from the LAG, will the Port Security function be avail
Port Isolation List Port: Display the port number. Forward Portlist: Display the forwardlist. 5.1.5 Loopback Detection With loopback detection
Detection Interval: Set a Loopback Detection interval between 1 and 1000 seconds. By default, it’s 30 seconds. Automatic Recovery Time : Time after
If the ports, which are enabled for the 802.1Q VLAN, Voice VLAN, STP, QoS and Port Configuration (Speed and Duplex, Flow Control), are in a LAG
SRC IP + DST IP: When this option is selected, theAggregate Arithmetic will apply to the source and destination IP addresses of the packets. LA
Figure 5-8 Manually Config The following entries are displayed on this screen: LAG Config Group Number: Select a Group Number for the LAG. Des
aggregation group. In an aggregation group, the port with smaller port priority will be considered as the preferred one. If the two port priorities a
Port: Displays the port number. Admin Key: Specify an Admin Key for the port. The member ports in a dynamic aggregation group must have the same
5.1.1 Port Config ...29 5.1.2 Port Mirror ...
The following entries are displayed on this screen: Auto Refresh Auto Refresh: Allows you to Enable/Disable refreshing the Traffic Summary automa
Figure 5-11 Traffic Statistics The following entries are displayed on this screen: Auto Refresh Auto Refresh: Allows you to Enable/Disable refre
(Alignment Error). The length of the packet is between 64 bytes and 1518 bytes. UndersizePkts: Displays the number of the received packets (excludin
This function includes four submenus: Address Table, Static Address, Dynamic Address and Filtering Address. 5.4.1 Address Table On this page, you can
Aging Status: Displays the Aging status of the MAC address. 5.4.2 Static Address The static address table maintains the static address entries which
Static Address Table Select: Select the entry to delete or modify the corresponding port number. It is multi-optional. MAC Address: Displays the
Figure 5-14 Dynamic Address The following entries are displayed on this screen: Aging Config Auto Aging: Allows you to Enable/Disable the Auto A
Bind: Click the Bind button to bind the MAC address of your selected entryto the corresponding port statically. Tips: Setting aging time properly h
Search Option Search Option: Select a Search Option from the pull-down list and click the Searchbutton to find your desired entry in the Filterin
Figure 5-16 Network diagram of DHCP For different DHCP clients, DHCP server provides three IP address assigning methods: (1) Manually assign the IP
Chapter 8 Multicast...83 8.1 IGMP
packet and broadcast the DHCP-REQUEST packet which includes the assigned IP address of the DHCP-OFFER packet. (4) DHCP-ACK Stage: Since the DH
53 Figure 5-19 DHCP Filtering The following entries are displayed on this screen: DHCP Filtering DHCP Filtering: Enable/Disable the DHCP Filterin
Chapter 6 VLAN The traditional Ethernet is a data network communication technology based on CSMA/CD (Carrier Sense Multiple Access/Collision Detect)
with 802.1Q VLAN. If a packet is matched, the switch will add a corresponding VLAN tag to it and forward it in the corresponding VLAN. 6.1 802.1Q VL
can receive and forward the packets of multiple VLANs. When the packets are forwarded by the TRUNK port, its VLAN tag will not be changed. (3) GEN
6.1.1 VLAN Config On this page, you can view the current created 802.1Q VLAN. Choose the menu VLAN→802.1Q VLAN→VLAN Config to load the following page
Figure 6-4 Create or Modify 802.1Q VLAN The following entries are displayed on this screen: VLAN Config VLAN ID: Enter the ID number of VLAN. De
Egress Rule: Select the Egress Rule for the VLAN port member. The default egress rule is UNTAG. TAG: All packets forwarded by the port are tagged
Link Type: Select the Link Type from the pull-down list for the port. ACCESS: The ACCESS port can be added in a single VLAN, and the egress rule
Configuration Procedure: Step Operation Description 1 Set the link type for port. Required. On the VLAN→802.1Q VLAN→Port Config page, set the link
11.1.1 Global Config ...124 11.1.2 SNMP View...
Configuration Procedure Configure switch A Step Operation Description 1 Configure the Link Type of the ports Required. On VLAN→802.1Q VLAN→Po
Chapter 7 Spanning Tree STP (Spanning Tree Protocol), subject to IEEE 802.1D standard, is to disbranch a ring network in the Data Link layer in a lo
Port: Port 3 is the root port of switch B and port 5 is the root port of switch C; port 1 is the designated port of switch A and port 4 is the des
STP Generation In the beginning In the beginning, each switch regards itself as the root, and generates a configuration BPDU for each port on i
RSTP (Rapid Spanning Tree Protocol), evolved from the 802.1D STP standard, enable Ethernet ports to transit their states rapidly. The premises for th
Figure 7-2 Basic MSTP diagram MSTP MSTP divides a network into several MST regions. The CST is generated between these MST regions, and multiple
Figure 7-3 Port roles The Spanning Tree module is mainly for spanning tree configuration of the switch, including four submenus: STP Config, Port Co
The following entries are displayed on this screen: Global Config STP: Select Enable/Disable STP function globally on the switch. Version: Selec
4. If the TxHold Count parameter is too large, the number of MSTP packets being sent in each hello time may be increased with occupying too much net
Figure 7-6 Port Config The following entries are displayed on this screen: Port Config Port Select: Click the Select button to quick-select the
IX 13.4.2 Tracert...160 Appendix A: Specifi
Port Role: Displays the role of the port played in the STP Instance. Root Port: Indicates the port that has the lowest path cost from this bridge
Figure 7-7 Region Config The following entries are displayed on this screen: Region Config Region Name: Create a name for MST region identificat
The following entries are displayed on this screen: Instance Table Instance ID Select: Click the Select button to quick-select the corresponding
Figure 7-9 Instance Port Config The following entries are displayed on this screen: Port Config Instance ID: Select the desired instance ID for
Note: The port status of one port in different spanning tree instances can be different. Global configuration Procedure for Spanning Tree function: S
Root Protect A CIST and its secondary root bridges are usually located in the high-bandwidth core region. Wrong configuration or malicious attacks
Figure 7-10 Port Protect The following entries are displayed on this screen: Port Protect Port Select: Click the Select button to quick-select t
7.4.2 TC Protect When TC Protect is enabled for the port on Port Protect page, the TC threshold and TC protect cycle need to be configured on this pa
Configuration Procedure Configure switch A: Step Operation Description 1 Configure ports On VLAN→802.1Q VLAN page, configure the link type
Configure switch C: Step Operation Description 1 Configure ports On VLAN→802.1Q VLAN page, configure the link type of the related ports as Trun
Package Contents The following items should be found in your box: One 24-Port Gigabit Smart PoE Switch with 4 Combo SFP Slots One power cord
links; the gray paths are the blocked links. For Instance 2 (VLAN102, 104 and 106), the blue paths in the following figure are connected links;
Chapter 8 Multicast Multicast Overview In the network, packets are sent in three modes: unicast, broadcast and multicast. In unicast, the source
Multicast Address 1. Multicast IP Address: As specified by IANA (Internet Assigned Numbers Authority), Class D IP addresses are used as destinatio
IGMP Snooping In the network, the hosts apply to the near Router for joining (leaving) a multicast group by sending IGMP (Internet Group Managemen
3. IGMP Leave Message The host, running IGMPv1, does not send IGMP leave message when leaving a multicast group, as a result, the switch cannot get t
Figure 8-4 Basic Config The following entries are displayed on this screen: Global Config IGMP Snooping: Select Enable/Disable IGMP Snooping fun
Figure 8-5 Port Config The following entries are displayed on this screen: Port Config Port Select: Click the Select button to quick-select the
Figure 8-6 VLAN Config The following entries are displayed on this screen: VLAN Config VLAN ID: Enter the VLAN ID to enable IGMP Snooping for th
Note: The settings here will be invalid when multicast VLAN is enabled Configuration procedure: Step Operation Description 1 Enable IGMP Snooping
Multicast VLAN Multicast VLAN: Select Enable/Disable Multicast VLAN feature. VLAN ID: Enter the VLAN ID of the multicast VLAN. Router Port Time:
Comments to this Manuals