TP-LINK T3700G-28TQ User's Guide

Browse online or download User's Guide for Software TP-LINK T3700G-28TQ. TP-Link T3700G-28TQ User Guide User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 415
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - Managed Switch

T3700G-28TQ JetStream 28-Port Gigabit Stackable L3 Managed Switch REV1.0.1 1910011207

Page 2 - CE Mark Warning

IX 14.2 DHCP Snooping ... 297 14.2.1 Global C

Page 3 - Safety Information

88 The following entries are displayed on this screen:  Global Config VLAN Mapping: Enable/Disable the VLAN mapping function. If VLAN mapping is d

Page 4

89 Configuration Procedure of VLAN VPN Function: Step Operation Description 1 Enable VPN mode. Required. On the VLAN→VLAN VPN→VPN Config page, en

Page 5

90 • Join Message: When a GARP entity expects other switches to register certain attribute information of its own, it sends out a Join message. And w

Page 6

91 In this switch, only the port with TRUNK link type can be set as the GVRP application entity to maintain the VLAN registration information. GVRP h

Page 7

92  Port Config Unit: Select the unit ID of the desired member in the stack. Select: Select the desired port for configuration. It is multi-optio

Page 8

93 7.9 Private VLAN Private VLANs, designed to save VLAN resources of uplink devices and decrease broadcast, are sets of VLAN pairs that share a com

Page 9

94 4. A Primary VLAN can be associated with multi-Secondary VLANs to create multi-Private VLANs.  Private VLAN Implementation To hide Secondary VL

Page 10

95  Search Option Search Option: Select a Search Option from the pull-down list and click the Search button to find your desired entry in Private

Page 11

96 The following entries are displayed on this screen:  Port Config Port selected: Select the desired port for configuration. You can input one or

Page 12

97  Network Diagram  Configuration Procedure  Configure Switch C Step Operation Description 1 Create VLAN6 Required. On VLAN→802.1Q VLAN→V

Page 13 - Package Contents

X 16.4.2 Port Config ... 348 16.4.3 Local Info .

Page 14 - Chapter 1 About This Guide

98  Configure switch B Step Operation Description 1 Create Private VLANs. Required. On the VLAN→Private VLAN→PVLAN Config page, enter the Pri

Page 15

99 Chapter 8 Spanning Tree STP (Spanning Tree Protocol), subject to IEEE 802.1D standard, is to disbranch a ring network in the Data Link layer in a

Page 16

100  Port: Port 3 is the root port of switch B and port 5 is the root port of switch C; port 1 and 2 are the designated ports of switch A and port

Page 17

101  Comparing BPDUs Each switch sends out configuration BPDUs and receives a configuration BPDU on one of its ports from another switch. The fol

Page 18

102  The condition for the root port to transit its port state rapidly: The old root port of the switch stops forwarding data and the designated po

Page 19 - Chapter 2 Introduction

103 The following figure shows the network diagram in MSTP. Figure 8-2 Basic MSTP diagram  MSTP MSTP divides a network into several MST regions.

Page 20 - 2.3 Appearance Description

104 The following diagram shows the different port roles. Figure 8-3 Port roles The Spanning Tree module is mainly for spanning tree configuration o

Page 21

105 The following entries are displayed on this screen:  Global Config Spanning Tree: Select Enable/Disable STP function globally on the switch. M

Page 22

106 turn handicaps spanning trees being regenerated in time and makes the network less adaptive. The default value is recommended. 4. If the TxHold

Page 23 - 2.3.2 Rear Panel

107 Choose the menu Spanning Tree→Port Config to load the following page. Figure 8-6 Port Config The following entries are displayed on this screen:

Page 24 - 3.2 Configuration

XI Appendix D: Glossary ... 400

Page 25

108 Port Role: Displays the role of the port played in the STP Instance.  Root Port: Indicates the port that has the lowest path cost from this br

Page 26 - Chapter 4 System

109 Choose the menu Spanning Tree→MSTP Instance→Region Config to load the following page. Figure 8-7 Region Config The following entries are display

Page 27 - Port Info

110 VLAN ID: Enter the desired VLAN ID. Click 'Add' button, the new VLAN ID will be added to the corresponding instance ID and the previous

Page 28 - 4.1.2 Device Description

111 Choose the menu Spanning Tree→MSTP Instance→Instance Port Config to load the following page. Figure 8-9 Instance Port Config The following entri

Page 29 - 4.1.3 System Time

112 Path Cost: Path Cost is used to choose the path and calculate the path costs of ports in an MST region. It is an important criterion on determin

Page 30 - 4.1.4 Daylight Saving Time

113 spanning trees being regenerated and roles of ports being reselected, and causes the blocked ports to transit to forwarding state. Therefore, loo

Page 31 - 4.2 User Management

114 Choose the menu Spanning Tree→STP Security→Port Protect to load the following page. Figure 8-10 Port Protect The following entries are displayed

Page 32 - User Table

115 8.4.2 TC Protect When TC Protect is enabled for the port on Port Protect page, the TC threshold and TC protect cycle need to be configured on thi

Page 33 - 4.3 System Tools

116  Network Diagram  Configuration Procedure  Configure switch A: Step Operation Description 1 Configure ports On VLAN→802.1Q VLAN page

Page 34 - 4.3.2 Config Restore

117 Step Operation Description 2 Enable STP function On Spanning Tree→STP Config→STP Config page, enable STP function and select MSTP version.

Page 35 - 4.3.4 Firmware Upgrade

1 Package Contents The following items should be found in your box:  One T3700G-28TQ switch  One Power Cord  One Console Cable  One Power Sup

Page 36 - 4.3.6 System Reset

118  Configure switch D: Step Operation Description 1 Configure ports On VLAN→802.1Q VLAN page, configure the link type of the related ports as

Page 37 - 4.4 Access Security

119  For Instance 2 (VLAN 102, 104 and 106), the blue paths in the following figure are connected links; the gray paths are the blocked links. 

Page 38 - 4.4.2 SSL Config

120 Chapter 9 Multicast  Multicast Overview In the network, packets are sent in three modes: unicast, broadcast and multicast. In unicast, the sou

Page 39

121  Multicast Address 1. Multicast IP Address: As specified by IANA (Internet Assigned Numbers Authority), Class D IP addresses are used as desti

Page 40 - 4.4.3 SSH Config

122  IGMP Snooping In the network, the hosts apply to the near Router for joining (leaving) a multicast group by sending IGMP (Internet Group Manag

Page 41

123 3. IGMP Leave Message The host, running IGMPv1, does not send IGMP leave message when leaving a multicast group, as a result, the switch cannot

Page 42 - Configuration Procedure

124 Choose the menu Multicast→IGMP Snooping→Snooping Config to load the following page. Figure 9-4 Basic Config The following entries are displayed

Page 43

125 Choose the menu Multicast→IGMP Snooping→Port Config to load the following page. Figure 9-5 Port Config The following entries are displayed on th

Page 44

126 9.1.3 VLAN Config Multicast groups established by IGMP Snooping are based on VLANs. On this page you can configure different IGMP parameters for

Page 45

127 Router Port Time: Displays the router port time of the VLAN. Member Port Time: Displays the member port time of the VLAN. Leave Time: Displays

Page 46 - Chapter 5 Stack

2 Chapter 1 About This Guide This User Guide contains information for setup and management of T3700G-28TQ switch. Please read this guide carefully b

Page 47 -  Application Diagram

128 Choose the menu Multicast→IGMP Snooping→Multicast VLAN to load the following page. Figure 9-7 Multicast VLAN The following entries are displayed

Page 48 -  Stack Introduction

129 Static Router Ports: Select the desired port as the static router port which is mainly used in the network with stable topology. Note: 1. The r

Page 49

130 Choose the menu Multicast→IGMP Snooping→Querier Config to load the following page. Figure 9-8 Packet Statistics The following entries are displa

Page 50

131 VLAN ID: Displays the ID of the VLAN that enables IGMP Snooping Querier. Query Interval: Displays the Query Interval of the IGMP Snooping Querie

Page 51 - • Stack Maintenance

132  Configuration Procedure Step Operation Description 1 Create VLANs Create three VLANs with the VLAN ID 3, 4 and 5 respectively, and specify

Page 52 - 5.1 Stack Management

133 The following entries are displayed on this screen:  Search Option Search Option: Select the rules for displaying multicast IP table to find t

Page 53 - 5.1.2 Stack Config

134 Choose the menu Multicast→Multicast IP→Static Multicast IP to load the following page. Figure9-10 Static Multicast IP Table The following entrie

Page 54 - 5.1.3 Switch Renumber

135  Static Multicast IP Table Multicast IP: Displays the multicast IP. VLAN ID: Displays the VLAN ID of the multicast group. Forward Port: Disp

Page 55

136 Mode: The attributes of the profile.  Permit: Only permit the IP address within the IP range and deny others.  Deny: Only deny the IP address

Page 56

137  Deny: Only deny the IP address within the IP range and permit others.  Add IP-range Start IP: Enter the start IP address of the IP range.

Page 57 - Chapter 6 Switching

3 Chapter Introduction Chapter 4 System This module is used to configure system properties of the switch. Here mainly introduces:  System Info: Co

Page 58 - 6.1.2 Port Mirror

138 The following entries are displayed on this screen:  Profile and Max Group Binding UNI T: Select the unit ID of the desired member in the stac

Page 59 - Mirror Session List

139 Choose the menu Multicast→Packet Statistics to load the following page. Figure 9-14 Packet Statistics The following entries are displayed on thi

Page 60 - 6.1.3 Port Security

140 Chapter 10 Routing Routing is the method by which the host or gateway decides where to send the datagram. Routing is the task of finding a path

Page 61 - Port Security

141 Subnet Mask: Specify the subnet mask of the interface's IP address. Admin Status: Specify interface administrator status. Choose 'Dis

Page 62 - 6.1.4 Port Isolation

142 Subnet Mask: View and modify the subnet mask of the interface. Admin Status: View and modify the Admin status. Choose 'Disable' to di

Page 63 - 6.1.5 Loopback Detection

143  Interface Setting Detail Information Displays the detailed setting information of the interface. 10.2 Routing Table This page displays the rou

Page 64

144 The following entries are displayed on this screen:  Static Routing Config  Static Route Table 10.3.2 Application Example for Static Routing

Page 65 - 6.2 LAG

145  Configuration Procedure  Configure Switch A Steps Operation Note 1 Add interface VLAN 10 Required. On page Routing→Interface→Interface C

Page 66 - 6.2.1 LAG Table

146 additional configuration options. DHCP captures the behavior of DHCP participants so the administrator can manage the parameters of the host in t

Page 67 - 6.2.2 Static LAG

147 fixed format section of the message and appending tagged data items in the variable length option area. The process is shown as follows. Figure

Page 68 - 6.2.3 LACP Config

4 Chapter Introduction Chapter 8 Spanning Tree This module is used to configure spanning tree function of the switch. Here mainly introduces:  STP

Page 69 - LACP Config

148 for the fields given in the figure will be used throughout this document to refer to the fields in DHCP messages. Figure 10-8 The Format of DHCP

Page 70 - 6.3 Traffic Monitor

149 14) file:Boot file name, null terminated string, "generic" name or null in DHCPDISCOVER, fully qualified directory-path name in DHCPOF

Page 71 - 6.3.2 Traffic Statistics

150 9) option 55:Parameter Request List option. This option is used by a DHCP client to request values for specified configuration parameters. 10)

Page 72 - Port Select

151  With a DHCP Relay running between the client and the server, when receiving a DHCP-DISCOVER packet transmitting from the Relay, the switch w

Page 73 - 6.4 MAC Address

152 Choose the menu Routing→DHCP Server→DHCP Server to load the following page. Figure10-11 DHCP Server The following entries are displayed on this

Page 74 - 6.4.1 Address Table

153 10.4.2 Pool Setting This page shows you how to configure the IP pool in which the IP address can be assigned to the clients in the network. Ch

Page 75 - 6.4.2 Static Address

154 Operation: Allows you to view or modify the information of the corresponding IP Pool.  Edit: Click to modify the settings of the Pool.  Deta

Page 76

155 Choose the menu Routing→DHCP Server→Binding Table to load the following page. Figure 10-14 DHCP Server Binding Table  DHCP Server Binding Ta

Page 77 - 6.4.3 Dynamic Address

156 The following entries are displayed on this screen:  Packets Received BOOTREQUEST: Displays the Bootp Request packet received. DHCPDISCOVER:

Page 78

157 10.4.6 Application Example for DHCP Server and Relay  Network Requirements  Every building in the campus belongs to separate VLANs with diff

Page 79 - 6.4.4 Filtering Address

5 Chapter Introduction Chapter 12 QoS This module is used to configure QoS function to provide different quality of service for various network app

Page 80 - Filtering Address Table

158 Step Operation Note 4 Configure the IP address pool Required. On page Routing→DHCP Server→Pool Setting, configure IP address pool parameters f

Page 81 - Chapter 7 VLAN

159 Figure 10-16 DHCP Relay Application To allow all clients in different VLAN request IP address from one server successfully, the DHCP Relay funct

Page 82 - 7.1 802.1Q VLAN

160 2) Specify the DHCP Server which assigns IP addresses actually.  Option 82 On this switch, Option 82 is used to record the location of the DHC

Page 83 - 7.1.1 VLAN Config

161 Choose the menu Routing→DHCP Relay→Global Config to load the following page. Figure 10-19 Global Config The following entries are displayed on t

Page 84 - Figure 7-3 VLAN Table

162 10.5.2 DHCP Server This page enables you to configure DHCP Servers on the specified interface. Choose the menu Routing→DHCP Relay→DHCP Server to

Page 85 - 7.1.2 Port Config

163 When an ARP request of a host is to be forwarded to another host in the same network segment but isolated at Layer 2, to realize the connectivity

Page 86

164 Search Default Route: If enabled, default route is included when searching arp proxy.  Proxy ARP Information Select: Select the desired item f

Page 87

165 Step Operation Description 4 Enable Proxy ARP Required. On Routing→Proxy ARP→Proxy ARP page, enable Proxy ARP feature for VLAN interface 2 a

Page 88 - 7.3 MAC VLAN

166  RIP routing table An RIP router has a routing table containing routing entries of all reachable destinations, and each routing entry contains:

Page 89 - 7.3.2 Port Enable

167  RIP Version RIP has two versions, RIPv1 and RIPv2. RIPv1, a classful routing protocol, supports message advertisement via broadcast only. RIPv

Page 90

6 Chapter Introduction Chapter 17 Cluster This module is used to configure cluster function to centrally manage the scattered devices in the networ

Page 91 -  Configure switch C

168 Figure 10-25 RIPv2 Message Format The detailed explanations of each field are stated as following:  Version: Version of RIP. For RIPv2 the val

Page 92 - 7.5 Protocol VLAN

169 Choose the menu Routing→RIP→Basic Config to load the following page. Figure 10-27 RIP Basic Config The following entries are displayed on thi

Page 93 - 7.5.2 Protocol Group

170 RIP Distance: Set the RIP router distance. Auto Summary: If you select enable groups of adjacent routes will be summarized into single entries,

Page 94 - 7.5.3 Protocol Template

171 Status: The interface RIP status(up or down) is decided by the network status. You cannot change it here. Send Version: Select the version of RI

Page 95

172 Choose the menu Routing→RIP→RIP Database to load the following page. Figure 10-29 RIP Database The following entries are displayed on this scre

Page 96

173  Configure Switch B Step Operation Note 1 Enable RIP Required. On page Routing→RIP→Basic Config, enable RIP, select RIPv2 as RIP version. 2

Page 97 - 7.7 VLAN VPN

174 Figure 10-30 Common Scenario for OSPF routing protocol The network topology is more prone to changes in an autonomous system of larger size. The

Page 98 - 7.7.2 Port Enable

175 In the automatic election, the router would in the first place select the highest loopback interface IP address as the router ID. If the router d

Page 99 - 7.7.3 VLAN Mapping

176 Figure 10-31 Diagram of DR/BDR Adjacency Relation DR or BDR is determined by the interface priority and router ID. First of all, whether a route

Page 100

177 5) After two routers have finished the synchronization of link state database, a complete adjacency relation will be established. 6) When the i

Page 101 - 7.8 GVRP

7 Chapter 2 Introduction Thanks for choosing the T3700G-28TQ JetStream 28-Port Gigabit Stackable L3 Managed Switch! 2.1 Overview of the Switch T370

Page 102

178 Figure 10-32 Steps to Establish a Complete Adjacency Relation 2. Flooding As Figure 10-32 shows, two random routers will synchronize the lin

Page 103 - Global Config

179 Figure 10-33 Flooding of the LSA 1) DROthers multicast the LSA update of its directly-connected network to DR and BDR. 2) After receiving the

Page 104 - Configuration Procedure:

180 network connectivity at all time. The non-backbone Area 1 and Area 2 cannot communicate directly with each other, but they can exchange routing

Page 105 - 7.9 Private VLAN

181 Figure 10-36 Virtual Link Sketch As in Figure 10-36, ABR of Area 2 has no physical link to connect directly with the backbone area, in which cas

Page 106 - 7.9.1 PVLAN Config

182 learn about the routing information from other areas, the size of the routing table of the routers in the stub area as well as the number of the

Page 107 - 7.9.2 Port Config

183 Figure 10-38 Discontinuous Network Segment  Link State Database When the routers in the network completely synchronize the link state database

Page 108

184 Figure 10-39 OSPF Header 1) Version: The version number of OSPF run by this device. For instance, the OSPF run by our IPv4 devices is of Versio

Page 109 -  Network Diagram

185 2. HELLO Packet OSPF routers send Hello packets to each other to find neighbor routers in the network and to maintain the mutual adjacency relat

Page 110 -  Configure switch B

186 Figure 10-41 DD Packet 1) Interface MTU: Size in bytes of the largest IP packet that can be sent out by the routing interface of the advertisin

Page 111 - Chapter 8 Spanning Tree

187 Figure 10-42 LSR Packet 1) Link State Type: The type of LSA. There are 11 types of LSA in total: Router LSA, Network LSA, Network Summarization

Page 112 - In the beginning

I COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Othe

Page 113

8 • Quality of Service + Supports L2/L3 granular CoS with 8 priority queues per port. + Rate limiting confines the traffic flow accurately according

Page 114 - MSTP Elements

188 6. LSAck Packet When receiving a LSU, the router will send to the router forwarding the LSU packet a LSAck packet including the LSA header it re

Page 115 - Port Roles

189 Type Code Name Features 6 NSSA External LSA Originates from ASBR in the NSSA. The content of this LSA is the same as that of AS external LSA, b

Page 116 - 8.1 STP Config

190 2) Create the routing interfaces and configure their IP parameters. 3) Plan the areas to which the subnets (routing interfaces) of the switches

Page 117 - Parameters Config

191 10.9.2 Basic Choose the menu Routing→OSPF→Basic to load the following page. Figure 10-46 OSPF Base The following entries are displayed on this

Page 118 - 8.2 Port Config

192  OSPF Config ASBR Mode: The router is an Autonomous System Boundary Router if it is configured to redistribute routes from another protocol, o

Page 119 - Port Config

193 Passive Default: Configure the global passive mode settings for all OSPF interfaces. Configuring this field will overwrite any present interface

Page 120 - 8.3 MSTP Instance

194 Area ID: Displays the area to which the network belongs. 10.9.4 Interface Choose the menu Routing→OSPF→Interface to load the following page. F

Page 121 - 8.3.2 Instance Config

195 Passive Mode: Make an interface passive to prevent OSPF from forming an adjacency on an interface. OSPF advertises networks attached to passive i

Page 122 - 8.3.3 Instance Port Config

196 The router establishes adjacencies to all other routers attached to the network. The Backup Designated Router performs slightly different functio

Page 123 - Instance Port Config

197 Retransmit Interval: The retransmit interval for the specified interface. This is the number of seconds between link-state advertisements for adj

Page 124 - 8.4 STP Security

9  LEDs LED Status Indication PWR On The switch is powered on Off The switch is powered off or power supply is abnormal Flashing Power supply is ab

Page 125

198 10.9.5 Area Choose the menu Routing→OSPF→Area to load the following page. Figure10-50 OSPF Area The following entries are displayed on this sc

Page 126 - Port Protect

199 Metric Type: Set the OSPF metric type of the default route. Two types are supported: External Type 1 and External Type 2. The default value is E

Page 127 - 8.4.2 TC Protect

200 10.9.6 Area Aggregation You can configure address ranges for an area on this page. The address range is used to consolidate or summarize routes

Page 128

201 Cost: Displays the path cost to the address range and it can be modified. Advertise: Displays the Advertise parameter and it can be modified. 10

Page 129 -  Configure switch C:

202 Dead Interval: The dead interval for the specified interface in seconds. This specifies how long a router will wait to see a neighbor router&apos

Page 130 -  Configure switch D:

203 Source: The available source routes for redistribution by OSPF. The valid values are 'Static', 'RIP', and other OSPF processe

Page 131

204 Tag: Set the tag field in redistributed address range. The valid value ranges from 0 to 4294967295 and the default is 0. NSSA Only: Set whether

Page 132 - Chapter 9 Multicast

205 State: The state of the neighbor:  Down: This is the initial state of a neighbor conversation. It indicates that there has been no recent info

Page 133 - Figure 9-3 below

206 10.9.11 Link State Database Choose the menu Routing→OSPF→Link State Database to load the following page. Figure10-56 Link State Database The fo

Page 134 - 9.1 IGMP Snooping

207  Network Diagram  Configuration Procedure  Configure Switch A Step Operation Description 1 Create routing interfaces and their IP add

Page 135 - 9.1.1 Snooping Config

10 LED Status Indication 25, 26 On An SFP+ transceiver/cable is connected to the corresponding port, and it is connected to a 10Gbps device, but no a

Page 136 - 9.1.2 Port Config

208  Configure Switch C Step Operation Description 1 Create routing interfaces and their IP addresses Required. On page Routing→Interface→Inte

Page 137

209 still be provided and network interruption can be avoided after a single link fails without reconfiguration of dynamic routing or router discover

Page 138 - 9.1.3 VLAN Config

210 The VRRP priority ranges from 0 to 255 (the bigger the number is, the higher the priority is). Configurable range is 1-254. The priority value 0

Page 139 - 9.1.4 Multicast VLAN

211 interfaces and better performance can be elected as master router; and the stability of backup group is increased. When the router interface conn

Page 140 - Multicast VLAN

212  VRRP Configuration Before configuring VRRP, users should plan well to specify the role and function of the devices in backup groups. Every swi

Page 141 - 9.1.5 Querier Config

213 Virtual IP: Displays the primary Virtual IP associated with the VRRP. Priority: Displays the priority associated with the VRRP. Status: Displa

Page 142

214 Priority: Displays the running priority associated with the VRRP. It ranges from 1 to 255. Advertise Timer: Displays the advertise timer associ

Page 143 - Network Diagram

215 Description: Enter the description associated with the VRRP. Numbers, characters and '_' are the only valid inputs, and the maximal len

Page 144 - 9.3 Multicast IP

216 The following entries are displayed on this screen:  Add Virtual IP This filed is used to add virtual IP addresses associated with the VRRP. Up

Page 145 - 9.3.2 Static Multicast IP

217 The following entries are displayed on this screen:  Add Track This filed is used for adding track information associated with the VRRP. Up to

Page 146 - Search Option

11 2.3.2 Rear Panel The rear panel of T3700G-28TQ is shown as the following figure. Figure 2-2 Rear Panel (1) Note: The Interface Card Slot, RPS Input

Page 147 - 9.4 Multicast Filter

218 The following entries are displayed on this screen:  Global Statistics Router Checksum Errors: Displays the total number of VRRP packets receiv

Page 148

219 Packet Length Errors: Displays the number of packets received with a packet length less than the length of the VRRP header. Clear: Clear the sta

Page 149 - 9.4.2 Profile Binding

220  Network Diagram  Configuration Procedure  Configure Switch A Steps Operation Note 1 Configure the interface and its IP address. On pag

Page 150 - 9.5 Packet Statistics

221 Chapter 11 Multicast Routing  Overview of Multicast Routing Protocols Note: The router and router icon mentioned in this chapter represent the

Page 151 - IGMP Statistics

222 The multicast model divides into two types depending on whether there is an exact multicast source: ASM (Any-Source Multicast) and SSM (Source-S

Page 152 - Chapter 10 Routing

223 11.1.2 Mroute Table On this page you can get the desired mroute information through different search options. Choose the menu Multicast Routing→

Page 153 - Modify Interface

224 11.2 IGMP  Brief Introduction of IGMP IGMP stands for Internet Group Management Protocol. It is responsible for the management of IP multicast

Page 154 - Detail Information

225 (3) After receiving the IGMP query message, the host that is interested in multicast group G1, either Host B or Host C (depending on whose laten

Page 155 - 10.3 Static Routing

226 2. Leave-Group Mechanism When a host leaves a multicast group in IGMPv2: (1) The host will send leave group message to all the multicast router

Page 156

227 Figure 11-4 IGMPv3 Multicast Source Filtering If the IGMP protocol running between the hosts and the multicast routers is IGMPv1 or IGMPv2, Host

Page 157 - 10.4 DHCP Server

12 Chapter 3 Login to the Switch 3.1 Login 1) To access the configuration utility, open a web-browser and type in the default address http://192.1

Page 158 - The Process of DHCP

228  IS_EX: indicating the mapping relationship between the multicast group and the multicast source list is EXCLUDE, which means the host will onl

Page 159 - The Format of DHCP Message

229 Robustness: Specify the robustness of the selected interface, ranging from 1 to 255. The default is 2. The robustness variable determines the agi

Page 160

230 Routed Port: Enter the routed port the desired entry must carry.  Interface State Table Interface: The interface for which data is to be disp

Page 161 - Figure 10-9 DHCP Option

231 The following entries are displayed on this screen:  IGMP Static Multicast Group Interface: Enter the ID of the interface corresponds to, VLAN

Page 162

232 Choose the menu Multicast Routing→IGMP→Multicast Group Table to load the following page. Figure 11-8 Multicast Group Table The following entries

Page 163 - 10.4.1 DHCP Server

233 Choose the menu Multicast Routing→IGMP→Profile Binding to load the following page. Figure 11-9 Profile Binding The following entries are displa

Page 164

234 Profile: Click the Profile button to create new IGMP profiles. 11.2.6 Packet Statistics On this page you can view multicast packet statistics o

Page 165 - 10.4.2 Pool Setting

235 11.2.7 Application Example for IGMP  Network Requirements 1. Receivers of different organizations form the stub networks N1 and N2, and Host

Page 166 - 10.4.4 Binding Table

236  Configure Switch A Steps Operation Note 1 Enable IP multicast routing. On page Multicast Routing→ Global Config→ Global Config, enable

Page 167 - 10.4.5 Packet Statistics

237  RPF Mechanism PIM uses the unicast routing table to perform the RPF check. RPF mechanism ensures the multicast packets being forwarded corre

Page 168 - Packets Sent

13 Figure 3-3 Main Setup-Menu Note: Clicking Apply can only make the new configurations effective before the switch is rebooted. If you want to keep

Page 169 -  Network Requirements

238  If the check result shows that the RPF interface is the different from the input interface in the current (S, G) entry, which indicates that t

Page 170 - 10.5 DHCP Relay

239  Neighbor Discovering In PIM domain, routers periodically sends PIM Hello packets to all the PIM routers with the multicast address 224.0.0.13

Page 171 - DHCP Relay Configuration

240  Grafting When a new receiver on a previously pruned branch of the tree joins a multicast group, the PIM DM takes the Graft mechanism to active

Page 172 - 10.5.1 Global Config

241 (2) The router with the unicast route of the smaller cost to the multicast source; (3) The router with the local interface of the higher IP add

Page 173 - Option 82 configuration

242 Choose the menu Multicast Routing→PIM DM→PIM DM neighbor to load the following page. Figure 11-14 PIM DM neighbor The following entries are dis

Page 174 - 10.6 Proxy ARP

243 Step Operation Description 4 Enable IGMP Required. Enable IGMP on the routing interfaces which connect to the receivers on Multicast Routing

Page 175 - 10.6.1 Proxy ARP

244  Configuration Procedure  Configure Switch A: Step Operation Description 1 Configure interface. Configure IP addresses and subnet masks of

Page 176 - Proxy ARP Information

245  The router connected to the receiver sends the join message to the RP of a certain multicast group. The path along which the join message is s

Page 177 - 10.8 RIP

246 Figure 11-15 DR Elect As shown in Figure 11-15, the DR election process is illustrated below: (1) Routers in the shared network sends Hello mes

Page 178

247 Figure 11-16 The Locations of C-RP, C-BSR and BSR  RPT Building Figure 11-17 RPT Topology in PIM SM As shown in Figure 11-17, the establis

Page 179

14 Chapter 4 System The System module is mainly for system configuration of the switch, including four submenus: System Info, User Management, Syste

Page 180 - 10.8.1 Basic Config

248 check if there are other receivers of this group. If there are no more receivers, the prune message will be sent upstream.  Multicast Source Re

Page 181 - RIP Enable

249 (2) The receiver-side DR sends prune message toward the RP hop-by-hop. The RP will forward the received prune message toward the multicast sourc

Page 182 - 10.8.2 Interface Config

250 The multicast messages (such as C-RP Hello Message and BSR BootStrap Message) of each BSR administrative domain cannot pass through the domain bo

Page 183 - 10.8.3 RIP Database

251 11.4.2 PIM SM Neighbor PIM SM neighbor is automatically learned by sending and receiving Hello Packets when PIM SM is enabled. Choose the menu M

Page 184 - RIP Routing Table

252 Choose the menu Multicast Routing→PIM SM→BSR to load the following page. Figure 11-22 BSR The following entries are displayed on this screen: 

Page 185 - 10.9 OSPF

253  PIM SM Candidate BSR Information Candidate BSR Address: Displays the Candidate BSR address. Priority: Displays the priority of the Candidate

Page 186 - OSPF Principles

254 Priority: Specify the priority of the candidate RP. The default value is 192. Interval: Specify the interval of advertisement message of the can

Page 187

255 11.4.6 RP Info Choose the menu Multicast Routing→PIM SM→RP Info to load the following page. Figure 11-25 RP Info The following entries are dis

Page 188 - OSPF Working Process

256 11.4.7 Application Example for PIM SM  Network Requirements 1. Receivers receive VOD data through multicast. The whole network runs PIM SM as

Page 189

257  Configuration Procedure  Configure Switch A: Step Operation Description 1 Configure interface. Configure IP addresses and subnet masks o

Page 190

15 Indicates the 1000Mbps port is not connected to a device. Indicates the 1000Mbps port is at the speed of 1000Mbps. Indicates the 1000Mbps port

Page 191

258 The static multicast routing is an important foundation for the RPF check. In the RPF check process, with static multicast routing configured, th

Page 192

259 The following entries are displayed on this screen:  Static Mroute Config Source: Enter the IP address that identifies the multicast source of

Page 193

260 11.5.3 Application Example for Static Mroute  Network Requirements 1. The network runs PIM DM and all the switches in the network support mul

Page 194

261  Configure Switch B Step Operation Note 1 Enable IP multicast routing Required. On page Multicast Routing→Global Config→Global Config, ena

Page 195 - OSPF Protocol Packet Type

262 Chapter 12 QoS QoS (Quality of Service) functions to provide different quality of service for various network applications and requirements and

Page 196

263 2. 802.1P Priority Figure 12-2 802.1Q frame As shown in the figure above, each 802.1Q Tag has a Pri field, comprising 3 bits. The 3-bit prior

Page 197

264 Figure 12-4 SP-Mode 2. WRR-Mode: Weight Round Robin Mode. In this mode, packets in all the queues are sent in order based on the weight value f

Page 198

265 12.1 DiffServ This switch classifies the ingress packets, maps the packets to different priority queues and then forwards the packets according t

Page 199

266 LAG: Displays the LAG number which the port belongs to. Note: To complete QoS function configuration, you have to go to the Schedule Mode page t

Page 200

267 SP+WRR-Mode: Strict-Priority + Weight Round Robin Mode. In this mode, this switch provides two scheduling groups, SP group and WRR group. Queues

Page 201 - Configuration Introduction

16 Figure 4-3 Bandwidth Utilization  Bandwidth Utilization Rx: Select Rx to display the bandwidth utilization of receiving packets on this port. T

Page 202 - 10.9.1 Process

268  Priority and CoS-mapping Config Tag-id/CoS-id: Indicates the precedence level defined by IEEE 802.1P and the CoS ID. Queue TC-id: Indicates th

Page 203 - 10.9.2 Basic

269 Choose the menu QoS→DiffServ→DSCP Priority to load the following page. Figure 12-9 DSCP Priority The following entries are displayed on this scr

Page 204 - OSPF Config

270 12.2 Bandwidth Control Bandwidth function, allowing you to control the traffic rate and broadcast flow on each port to ensure network in working

Page 205 - 10.9.3 Network

271 Note: 1. If you enable ingress rate limit feature for the storm control-enabled port, storm control feature will be disabled for this port. 2.

Page 206 - 10.9.4 Interface

272 UL-Frame Rate : Select the bandwidth for receiving UL-Frame on the port. The packet traffic exceeding the bandwidth will be discarded. Select Di

Page 207

273 the aging time, the switch will remove this port from voice VLAN. Voice ports are automatically added into or removed from voice VLAN. Manual Mod

Page 208 - Interface Config

274 source MAC addresses do not match OUI addresses. If security mode is not enabled, the port forwards all the packets. Security Mode Packet Type

Page 209 -  null: No authentication

275 Aging Time: Specifies the living time of the member port in auto mode after the OUI address is aging out. Priority: Select the 802.1P priority o

Page 210 - 10.9.5 Area

276 Port Mode: Select the mode for the port to join the voice VLAN.  Auto: In this mode, the switch automatically adds a port to the voice VLAN or

Page 211 - Area Table

277  OUI Table Select: Select the desired entry to view the detailed information. OUI: Displays the OUI address of the voice device. Mask: Displ

Page 212 - 10.9.6 Area Aggregation

17 System Contact: Enter your contact information. 4.1.3 System Time System Time is the time displayed while the switch is running. On this page you

Page 213 - 10.9.7 Virtual Link

278 Chapter 13 ACL ACL (Access Control List) is used to filter packets by configuring match rules and process policies of packets in order to contro

Page 214 - 10.9.8 Route Redistribution

279 13.1.2 Time-Range Create On this page you can create time-ranges. Choose the menu ACL→Time-Range→Time-Range Create to load the following page.

Page 215 - 10.9.9 ASBR Aggregation

280 End Time: Displays the end time of the time-slice. Delete: Click the Delete button to delete the corresponding time-slice. 13.1.3 Holiday Conf

Page 216 - 10.9.10 Neighbor Table

281 13.2.1 ACL Summary On this page, you can view the current ACLs configured in the switch. Choose the menu ACL→ACL Config→ACL Summary to load the

Page 217

282 13.2.3 MAC ACL MAC ACLs analyze and process packets based on a series of match conditions, which can be the source MAC addresses, destination MA

Page 218 - 10.9.11 Link State Database

283 Choose the menu ACL→ACL Config→Standard-IP ACL to load the following page. Figure 13-7 Create Standard-IP Rule The following entries are display

Page 219

284 Choose the menu ACL→ACL Config→Extend-IP ACL to load the following page. Figure 13-8 Create Extend-IP Rule The following entries are displayed o

Page 220 - 10.10 VRRP

285 IP Pre: Enter the IP Precedence contained in the rule. Time-Range: Select the time-range for the rule to take effect. 13.3 Policy Config A Po

Page 221 -  VRRP Operating Principle

286 Choose the menu ACL→Policy Config→Policy Create to load the following page. Figure 13-10 Create Policy The following entries are displayed on th

Page 222 -  Interface Tracking

287 S-Condition: Select S-Condition to limit the transmission rate of the data packets in the policy.  Rate: Specify the forwarding rate of the da

Page 223 -  Load Balancing

II Safety Information  When product has power button, the power button is one of the way to shut off the product; When there is no power button,

Page 224 - 10.10.1 Basic Config

18 Note: 1. The system time will be restored to the default when the switch is restarted and you need to reconfigure the system time of the switch.

Page 225

288 The following entries are displayed on this screen:  Search Options Show Mode: Select a show mode appropriate to your needs.  Policy Vlan-Bi

Page 226 - 10.10.2 Advanced Config

289 The following entries are displayed on this screen:  Port-Bind Config Policy Name: Select the name of the policy you want to bind. Port: En

Page 227 - 10.10.3 Virtual IP Config

290 Configuration Procedure: Step Operation Description 1 Configure effective time-range Required. On ACL→Time-Range configuration pages, configur

Page 228 - 10.10.4 Track Config

291 Step Operation Description 2 Configure for requirement 1 On ACL→ACL Config→ACL Create page, create ACL 11. On ACL→ACL Config→MAC ACL page, se

Page 229 - Track Table

292 Chapter 14 Network Security Network Security module is to provide the multiple protection measures for the network security, including five subm

Page 230 - Statistics

293 The following entries are displayed on this screen:  Search Source: Displays the Source of the entry. • All: All the bound entries will be

Page 231

294 Figure 14-2 Manual Binding The following entries are displayed on this screen:  Manual Binding Option Host Name: Enter the Host Name. IP Addr

Page 232

295 Source: Displays the source of the entry. Collision: Displays the Collision status of the entry. • Warning: Indicates that the collision may b

Page 233 - or Border

296 Choose the menu Network Security→IP-MAC Binding→ARP Scanning to load the following page. Figure 14-4 ARP Scanning The following entries are dis

Page 234 - 11.1 Global Config

297 14.2 DHCP Snooping Nowadays, the network is getting larger and more complicated. The amount of the PCs always exceeds that of the assigned IP add

Page 235 - 11.1.2 Mroute Table

19 Recurring Mode: Specify the DST configuration in recurring mode. This configuration is recurring in use:  Offset: Specify the time adding in min

Page 236 - 11.2 IGMP

298 The most Clients obtain the IP addresses dynamically, which is illustrated in the following figure. Figure 14-6 Interaction between a DHCP cli

Page 237 - IGMPv2 Work Process

299 Option 82 can contain 255 sub-options at most. If Option 82 is defined, at least a sub-option should be defined. This switch supports two sub-opt

Page 238 - IGMPv3 Work Process

300 Figure 14-8 DHCP Snooping Note: If you want to enable the DHCP Snooping feature for the member port of LAG, please ensure the parameters of all

Page 239

301 • Replace: Indicates to replace the Option 82 field of the packets with the switch defined one. • Drop: Indicates to discard the packets includ

Page 240 - 11.2.1 Interface Config

302 Rate Limit: Select the value to specify the maximum amount of DHCP messages that can be forwarded by the switch of this port per second. The exce

Page 241 - 11.2.2 Interface State

303 Figure 14-11 ARP Attack – Cheating Gateway As the above figure shown, the attacker sends the fake ARP packets of Host A to the Gateway, and then

Page 242 - Interface State Table

304  Man-In-The-Middle Attack The attacker continuously sends the false ARP packets to the Hosts in LAN so as to make the Hosts maintain the wrong

Page 243 -  Interface VLAN

305 and unable to learn the ARP entries of legal Hosts, which causes that the legal Hosts cannot access the external network. The IP-MAC Binding func

Page 244 - 11.2.5 Profile Binding

306  Trusted Port UNI T: Select the unit ID of the desired member in the stack. Trusted Port: Select the port for which the ARP Detect function

Page 245 -  Replace: w

307 Choose the menu Network Security→ARP Inspection→ARP Defend to load the following page. Figure 14-15 ARP Defend The following entries are display

Page 246 - 11.2.6 Packet Statistics

20 Choose the menu System → User Management → User Config to load the following page. Figure 4-8 User Config The following entries are displayed on

Page 247

308 Choose the menu Network Security→ARP Inspection→ARP Statistics to load the following page. Figure 14-16 ARP Statistics The following entries a

Page 248 - 11.3 PIM DM

309 Choose the menu Network Security→IP Source Guard to load the following page. Figure 14-17 IP Source Guard The following entries are displayed on

Page 249 - RPF Mechanism

310 14.5 DoS Defend DoS (Denial of Service) Attack is to occupy the network bandwidth maliciously by the network attackers or the evil programs sendi

Page 250 - PIM DM

311 14.5.1 DoS Defend On this page, you can enable the DoS Defend type appropriate to your need. Choose the menu Network Security→DoS Defend→DoS Def

Page 251 - SPT Building

312 Figure 14-19 Architecture of 802.1X authentication 1. Supplicant System: The supplicant system is an entity in LAN and is authenticated by the

Page 252 - Assert Mechanism

313 1. EAP Relay Mode This mode is defined in 802.1X. In this mode, EAP-packets are encapsulated in higher level protocol (such as EAPOR) packets to

Page 253 - 11.3.2 PIM DM Neighbor

314 (7) The switch changes the state of the corresponding port to accepted state to allow the supplicant system access the network. And then the swi

Page 254 - PIM DM Neighbor

315 3. Quiet-period timer (Quiet Period): This timer sets the quiet-period. When a supplicant system fails to pass the authentication, the switch qu

Page 255

316 The following entries are displayed on this screen:  Global Config 802.1X: Enable/Disable the 802.1X function. Auth Method: Select the Authen

Page 256 - 11.4 PIM SM

317 Figure 14-23 Port Config The following entries are displayed on this screen:  Port Config UNIT: Select the unit ID of the desired member in t

Page 257 - DR Electing

21 Operation: Click the Edit button of the desired entry, and you can edit the corresponding user information. After modifying the settings, please

Page 258 - RP Discovering

318 14.6.3 Radius Server RADIUS (Remote Authentication Dial-In User Service) server provides the authentication service for the switch via the sto

Page 259 - RPT Building

319 Key Modify: Select to modify the accounting key. Accounting Key: Set the shared password for the switch and the accounting servers to exchange m

Page 260 - Switching from RPT to SPT

320 Chapter 15 SNMP  SNMP Overview SNMP (Simple Network Management Protocol) has gained the most extensive application on the UDP/IP networks. SNM

Page 261 - BSR Administrative Domain

321 SNMP v1: SNMP v1 adopts Community Name authentication. The community name is used to define the relation between SNMP Management Station and SNMP

Page 262 - 11.4.1 PIM SM Interface

322 3. Create SNMP User The User configured in an SNMP Group can manage the switch via the client program on management station. The specified User

Page 263 - 11.4.3 BSR

323 Note: The amount of Engine ID characters must be even. 15.1.2 SNMP View The OID (Object Identifier) of the SNMP packets is used to describe the

Page 264

324 15.1.3 SNMP Group On this page, you can configure SNMP Group to control the network access by providing the users in various groups with differe

Page 265 - 11.4.4 RP

325 Write View: Select the View to be the Write View. The management access is writing only and changes can be made to the assigned SNMP View. The Vi

Page 266 - 11.4.5 RP Mapping

326 Choose the menu SNMP→SNMP Config→SNMP User to load the following page. Figure15-6 SNMP User The following entries are displayed on this screen:

Page 267 - 11.4.6 RP Info

327  User Table Select: Select the desired entry to delete the corresponding User. It is multi-optional. User Name: Displays the name of the User

Page 268

22 Current Startup Image: Displays the current startup image. Next Startup Image: Select the next startup image. Backup Image: Select the backup bo

Page 269 - 11.5 Static Mroute

328 • read-only: Management right of the Community is restricted to read-only, and changes cannot be made to the corresponding View. • read-writ

Page 270 - 11.5.1 Static Mroute Config

329 Step Operation Description 2 Create SNMP View. Required. On the SNMP→SNMP Config→SNMP View page, create SNMP View of the management agent. T

Page 271 - 11.5.2 Static Mroute Table

330 Choose the menu SNMP→Notification→Notification Config to load the following page. Figure15-8 Notification Config The following entries are displ

Page 272

331 Type: Displays the type of the notifications. Retry: Displays the maximum time for the switch to wait for the response from the management stati

Page 273

332 Choose the menu SNMP→RMON→Statistics to load the following page. Figure 15-9 Statistics The following entries are displayed on this screen:  S

Page 274 - Chapter 12 QoS

333 Choose the menu SNMP→RMON→History to load the following page. Figure 15-10 History Control The following entries are displayed on this screen: 

Page 275 - Figure 12-3 IP datagram

334 Choose the menu SNMP→RMON→Event to load the following page. Figure15-11 Event Config The following entries are displayed on this screen:  Even

Page 276 - Figure 12-5 WRR-Mode

335 Choose the menu SNMP→RMON→Alarm to load the following page. Figure 15-12 Alarm Config The following entries are displayed on this screen:  Ala

Page 277 - 12.1 DiffServ

336 Interval: Enter the alarm interval time in seconds, ranging from 10 to 3600. Owner: Enter the name of the device or user that defined the entry.

Page 278 - 12.1.2 Schedule Mode

337 Chapter 16 LLDP LLDP (Link Layer Discovery Protocol) is a Layer 2 protocol that is used for network devices to advertise their own device inform

Page 279 - 12.1.3 802.1P Priority

23 4.3.3 Config Backup On this page you can download the current configuration of the specified unit in the stack and save it as a file to your compu

Page 280 - 12.1.4 DSCP Priority

338  Disable: the port cannot transmit or receive LLDPDUs. 2) LLDPDU transmission mechanism  If the ports are working in TxRx or Tx mode, they w

Page 281

339 TLV Type TLV Name Description Usage in LLDPDU 2 Port ID Identifies the specific port that transmitted the LLDP frame. When the device does no

Page 282 - 12.2 Bandwidth Control

340 System Description TLV The System Description TLV allows network management to advertise the system's description, which should include the

Page 283 - 12.2.2 Storm Control

341 Choose the menu LLDP→Basic Config→Global Config to load the following page. Figure 16-1 Global Configuration The following entries are displayed

Page 284 - 12.3 Voice VLAN

342 Choose the menu LLDP→Basic Config→Port Config to load the following page. Figure 16-2 Port Configuration The following entries are displayed on

Page 285

343 16.2.1 Local Info On this page you can see all ports' configuration and system information. Choose the menu LLDP→Device Info→Local Info to

Page 286 - 12.3.1 Global Config

344 Chassis ID Subtype: Indicates the basis for the chassis ID, and the default subtype is MAC address. Chassis ID: Indicates the specific identifier

Page 287 - 12.3.2 Port Config

345  Auto Refresh Auto Refresh: Enable/Disable the auto refresh function. Refresh Rate: Configure the auto refresh rate.  Neighbor(s) Info Se

Page 288 - 12.3.3 OUI Config

346 The following entries are displayed on this screen:  Auto Refresh Auto Refresh: Enable/Disable the auto refresh function. Refresh Rate: Confi

Page 289 - OUI Table

347 Media Endpoint Device (Class II): The class of Endpoint Device that supports media stream capabilities. Communication Device Endpoint (Class III

Page 290 - Chapter 13 ACL

24 Choose the menu System→System Tools→Firmware Upgrade to load the following page. Figure 4-12 Firmware Upgrade Note: 1. Don’t interrupt the upgra

Page 291 - 13.1.2 Time-Range Create

348 The following entries are displayed on this screen:  LLDP-MED Parameters Config Fast Start Count: When LLDP-MED fast start mechanism is activa

Page 292 - 13.2 ACL Config

349 Included TLVs: Select TLVs to be included in outgoing LLDPDU. Click the Detail button to display the included TLVs and select the desired TLVs.

Page 293 - 13.2.2 ACL Create

350 should be used, but may not be known. Options (0) and (1) should not be used unless it is known that the DHCP client is in close physical proxim

Page 294 - 13.2.4 Standard-IP ACL

351 Application Type: Application Type indicates the primary function of the applications defined for the network policy. Unknown Policy Flag: Displa

Page 295 - 13.2.5 Extend-IP ACL

352 Unit: Select the unit ID of the desired member in the stack. Device Type: Displays the device type of the neighbor. Application Type: Displays

Page 296 - Create Extend-IP Rule

353 Chapter 17 Cluster With the development of network technology, the network scale is getting larger and more network devices are required, which

Page 297 - 13.3 Policy Config

354  The commander switch becomes to be the candidate switch only when the cluster is deleted.  Introduction to Cluster Cluster functions to conf

Page 298 - 13.3.3 Action Create

355 The following entries are displayed on this screen:  Neighbor Search Option: Select the information the desired entry should contain and then

Page 299 - 13.4 Policy Binding

356 Aging Time: Displays the period for the neighbor switch to keep the NDP packets from this switch. Hello Time: Displays the interval to send NDP

Page 300 - 13.4.2 Port Binding

357 The following entries are displayed on this screen:  Global Config NDP: Select Enable/Disable NDP function globally. Aging Time: Enter the per

Page 301 - 13.4.3 VLAN Binding

25 Choose the menu System→System Tools→System Reset to load the following page. Figure 4-14 System Reset Note: After the system is reset, the switch

Page 302

358 Choose the menu Cluster→NTDP→Device Table to load the following page. Figure17-5 Device Table The following entries are displayed on this screen

Page 303

359 Click the Detail button to view the complete information of this device and its neighbors. Figure17-6 Information of the Current Device 17.2.2

Page 304 - Chapter 14 Network Security

360 The following entries are displayed on this screen:  Global Config NTDP: Displays the NTDP status (enabled or disabled) of the switch globally.

Page 305 - 14.1.2 Manual Binding

361 NTDP Interval Time: Enter the interval to collect topology information. NTDP Hops: Enter the hop count the switch topology collects. NTDP Hop D

Page 306 - Manual Binding Table

362 Cluster Role: Displays the role the switch plays in the cluster.  Cluster Management-vlan VLAN ID: Displays the management VLAN ID of the swi

Page 307 - 14.1.3 ARP Scanning

363 TFTP Server: Displays the IP address of TFTP server.  Member Info Device Name: Displays the description of the member switch. Device MAC: Di

Page 308 - Scanning Result

364  For an individual switch, the following page is displayed: Figure17-12 Cluster Summary for Individual Switch The following entries are displa

Page 309 - 14.2 DHCP Snooping

365 The following entries are displayed on this screen:  Current Role Role: Displays the role the current switch plays in the cluster.  Cluster

Page 310 - Option 82

366  Role Change Candidate: Select this option to change the role of the switch to be candidate switch.  Cluster Config Hold Time: Enter the tim

Page 311 - 14.2.1 Global Config

367  For an individual switch, the following page is displayed. Figure 17-16 Cluster Configuration for Individual Switch The following entries are

Page 312

26 The following entries are displayed on this screen:  Access Control Config Control Mode: Select the control mode for users to log on to the Web

Page 313 - 14.2.2 Port Config

368 The following entries are displayed on this screen:  Create Member Member MAC: Enter the MAC address of the candidate switch.  Member Info S

Page 314 - 14.3 ARP Inspection

369 The following entries are displayed on this screen:  Graphic Show Collect Topology: Click the Collect Topology button to display the cluster t

Page 315 - Cheating Terminal Hosts

370 Step Operation Description 2 Enable the NTDP function globally and for the port, and then configure NTDP parameters Optional. On Cluster→NTDP→N

Page 316 - ARP Flooding Attack

371  Configuration Procedure  Configure the member switch Step Operation Description 1 Enable NDP function on the switch and for port 1 O

Page 317 - 14.3.1 ARP Detect

372 Chapter 18 Maintenance Maintenance module, assembling the commonly used system tools to manage the switch, provides the convenient method to loc

Page 318 - 14.3.2 ARP Defend

373 UNI T: Select the unit ID of the desired member in the stack. Click the Monitor button to enable the switch to monitor and display its CPU utili

Page 319 - 14.3.3 ARP Statistics

374 Severity Level Description alerts 1 Action must be taken immediately. critical 2 Critical conditions errors 3 Error conditions warnings 4

Page 320 - 14.4 IP Source Guard

375 The following entries are displayed on this screen:  Log Info UNI T: Select the unit ID of the desired member in the stack. Index: Displays t

Page 321 - IP Source Guard Config

376 Log File: Indicates the flash sector for saving system log. The inforamtion in the log file will not be lost after the switch is restarted and ca

Page 322 - 14.5 DoS Defend

377 Note: The Log Server software is not provided. If necessary, please download it on the Internet. 18.2.4 Backup Log Backup Log feature enables th

Page 323 - 14.6 802.1X

27 After SSL is effective, you can log on to the Web management page via https://192.168.0.1. For the first time you use HTTPS connection to log into

Page 324

378 Choose the menu Maintenance→Device Diagnostics→Cable Test to load the following page. Figure18-7 Cable Test The following entries are displayed

Page 325

379 18.3.2 Loopback Loopback test function, looping the sender and the receiver of the signal, is used to test whether the port of the switch is ava

Page 326 - 802.1X Timer

380 Choose the menu Maintenance→Network Diagnostics→Ping to load the following page. Figure18-9 Ping The following entries are displayed on this scr

Page 327 - 14.6.1 Global Config

381 Choose the menu Maintenance→Network Diagnostics→Tracert to load the following page. Figure18-10 Tracert The following entries are displayed on t

Page 328 - 14.6.2 Port Config

382 Chapter 19 System Maintenance via FTP The firmware can be downloaded to the switch via FTP function. FTP (File Transfer Protocol), a protocol in

Page 329

383 2) The Connection Description Window will prompt shown as Figure 19-3. Enter a name into the Name field and click OK. Figure 19-3 Connection Des

Page 330 - 14.6.3 Radius Server

384 4) Configure the port selected in the step above shown as the following Figure 19-5. Configure Bits per second as 38400, Data bits as 8, Parity

Page 331

385 2) Power off and restart the switch. When you are prompted that “Press CTRL-B to enter the bootutil” in the hyper terminal, please press CTRL-B k

Page 332 - Chapter 15 SNMP

386 For example: Configure the IP address as 10.10.70.22, mask as 255.255.255.0 and gateway as10.10.70.1. The detailed steps are shown as the figure

Page 333 - SNMP Configuration Outline

387 5) Enter 1 and y, the switch will reboot with the startup image. 6) Please 3 to start the switch shown as the following figure. After the switch

Page 334 - 15.1 SNMP Config

III CONTENTS Package Contents ...

Page 335 - 15.1.2 SNMP View

28 4.4.3 SSH Config As stipulated by IFTF (Internet Engineering Task Force), SSH (Secure Shell) is a security protocol established on application a

Page 336 - 15.1.3 SNMP Group

388 Appendix A: Specifications Standards IEEE802.3i 10Base-T Ethernet IEEE802.3u 100Base-TX/100Base-FX Fast Ethernet IEEE802.3ab 1000Base-T Gigabit

Page 337 - 15.1.4 SNMP User

389 LED Power, System, RPS, FAN, Master, Module, Link/Act, 21F-24F, 25, 26, M1, M2, Unit ID LED Transmission Method Store and Forward Packets Forw

Page 338 - Figure15-6 SNMP User

390 Appendix B: Configuring the PCs In this section, we’ll introduce how to install and configure the TCP/IP correctly in Windows 2000. First make su

Page 339 - 15.1.5 SNMP Community

391 5) The following TCP/IP Properties window will display and the IP Address tab is open on this window by default. Figure B-3 6) Select Use the

Page 340

392 Appendix C: 802.1X Client Software In 802.1X mechanism, the supplicant Client should be equipped with the corresponding client software complied

Page 341 - 15.2 Notification

393 3. Then the following screen will appear. Click Next to continue. If you want to stop the installation, click Cancel. Figure C-3 Welcome to th

Page 342 - Notification Table

394 5. Till now, The Wizard is ready to begin the installation. Click Install to start the installation on the following screen. Figure C-5 Install

Page 343 - 15.3 RMON

395 7. On the following screen, click Finish to complete the installation. Figure C-7 InstallShield Wizard Complete Note: Please pay attention to t

Page 344 - 15.3.2 History

396 2. Then the following screen will appear. If you want to stop the remove process, click Cancel. Figure C-9 Preparing Setup 3. On the continued

Page 345 - 15.3.3 Event

397 1.3 Configuration 1. After completing installation, double click the icon to run the TP-LINK 802.1X Client Software. The following screen wi

Page 346 - 15.3.4 Alarm

29 Max Connect: Specify the maximum number of the connections to the SSH server. No new connection will be established when the number of the connect

Page 347 - Alarm Table

398 Auto reconnect after timeout: Select this option to allow the Client to automatically start the connection again when it does not receive the han

Page 348

399 1.4 FAQ: Q1: Why does this error dialog box pop up when starting up the TP-LINK 802.1X Client Software? A1: It’s because the supported DLL file

Page 349 - Chapter 16 LLDP

400 Appendix D: Glossary Access Control List (ACL) ACLs can limit network traffic and restrict access to certain users or devices by checking each pa

Page 350

401 Generic Multicast Registration Protocol (GMRP) GMRP allows network devices to register end stations with multicast groups. GMRP requires that any

Page 351

402 Layer 2 Data Link layer in the ISO 7-Layer Data Communications Protocol. This is related directly to the hardware interface for network devices a

Page 352 - 16.1 Basic Config

403 Secure Shell (SSH) A secure replacement for remote access functions, including Telnet. SSH can authenticate users with a cryptographic key, and e

Page 353 - 16.1.2 Port Config

30 2. Click the Open button in the above figure to log on to the switch. Enter the login user name and password, and then you can continue to config

Page 354 - 16.2 Device Info

31 2. After the key is successfully generated, please save the public key and private key to the computer. 3. On the Web management page of the sw

Page 355 - 16.2.1 Local Info

32 4. After the public key is downloaded, please log on to the interface of PuTTY and enter the IP address for login. 5. Click Browse to downloa

Page 356 - 16.2.2 Neighbor Info

33 After successful authentication, please enter the login user name. If you log on to the switch without entering password, it indicates that the ke

Page 357 - 16.3 Device Statistics

34 Chapter 5 Stack The stack technology is to connect multiple stackable devices through their StackWise ports, forming a stack which works as a u

Page 358 - 16.4 LLDP-MED

35 In a ring connected stack, it can still operate normally by transforming into a daisy chained stack when link failure occurs, which further ensur

Page 359 - 16.4.1 Global Config

36  Stack Introduction 1. Stack Elements 1) Stack Role Each device in the stack system is called stack member. Each stack member processes service

Page 360 - 16.4.2 Port Config

37 1) Connecting the stack members To establish a stack, please physically connect the stack ports of the member devices with cables. The stack ports

Page 361 - Included TLVs

IV 5.1.1 Stack Info ... 40 5.1.2 Stack Conf

Page 362 - 16.4.3 Local Info

38 The master is elected based on the following rules and in the order listed: 1. The switch that is currently the stack master. 2. The switch wi

Page 363 - 16.4.4 Neighbor Info

39 • Port Number Format: The format of port number should be Unit Number/Slot Number/Port Number. Among them: (1) Unit Number: The default unit num

Page 364

40 5.1 Stack Management Before configuring the stack, we highly recommend you to prepare the configuration planning with a clear set of the role and

Page 365 - Chapter 17 Cluster

41 Role: Displays the stack role of the member switch in the stack. There are two options: Master and Slave. MAC Address: Displays the MAC address o

Page 366 - 17.1 NDP

42 The following entries are displayed on this screen:  Stack Config Stack Name: Enter the name of the stack. The length of this field should be 1-

Page 367 - 17.1.2 NDP Summary

43 Choose the menu Stack Management→Switch Renumber to load the following page. Figure 5-9 Switch Renumber The following entries are displayed on th

Page 368 - 17.1.3 NDP Config

44 5.2 Application Example for Stack  Network Requirements Establish a stack of ring topology with four T3700-28TQ switches.  Network Diagram 

Page 369 - 17.2 NTDP

45 Chapter 6 Switching Switching module is used to configure the basic functions of the switch, including four submenus: Port, LAG, Traffic Monitor

Page 370 - Figure17-5 Device Table

46 Description: Give a description to the port for identification. Status: Allows you to Enable/Disable the port. When Enable is selected, the port

Page 371 - 17.2.2 NTDP Summary

47 The following entries are displayed on this screen.  Mirror Session List Session: This column displays the mirror session number. Destination:

Page 372 - 17.2.3 NTDP Config

V 7.7 VLAN VPN ... 85 7.7.1 VPN Co

Page 373 - 17.3 Cluster

48 The following entries are displayed on this screen.  Mirror Session Session: Displays session number.  Destination Port Destination Port: I

Page 374

49 Choose the menu Switching→Port→Port Security to load the following page. Figure 6-4 Port Security The following entries are displayed on this scr

Page 375

50 • Permanent: When Permanent mode is selected, the learned MAC address will be out of the influence of the aging time and can only be deleted man

Page 376 - 17.3.2 Cluster Config

51 Click the Edit button to configure the port isolation list in the following page: Figure 6-6 Port Isolation Config  Port Isolation Config UNI T

Page 377

52 Choose the menu Switching → Port → Loopback Detection to load the following page. Figure 6-7 Loopback Detection Config The following entries are

Page 378

53 Port: Displays the port number. Status: Enable or disable Loopback Detection function for the port. Operation Mode: Select the mode how the swi

Page 379 - 17.3.3 Member Config

54 Tips: 1. Calculate the bandwidth for a LAG: If a LAG consists of the four ports in the speed of 1000Mbps Full Duplex, the whole bandwidth of th

Page 380 - 17.3.4 Cluster Topology

55 Operation: Allows you to view or modify the information for each LAG. • Edit: Click to modify the settings of the LAG. • Detail: Click to get

Page 381 - Graphic Show

56 The following entries are displayed on this screen:  LAG Config Group Number: Select a Group Number for the LAG. Description: Displays the d

Page 382 - Figure17-19 Network diagram

57 Choose the menu Switching→LAG→LACP Config to load the following page. Figure 6-11 LACP Config The following entries are displayed on this screen:

Page 383

VI Chapter 10 Routing ... 140 10.1

Page 384 - Chapter 18 Maintenance

58 member. The port with smaller Port Priority will be considered as the preferred one. If the two port priorities are equal; the port with smaller p

Page 385 - 18.2 Log

59 The following entries are displayed on this screen:  Auto Refresh Auto Refresh: Allows you to Enable/Disable refreshing the Traffic Summary aut

Page 386 - 18.2.1 Log Table

60 Choose the menu Switching→Traffic Monitor→Traffic Statistics to load the following page. Figure6-13 Traffic Statistics The following entries are

Page 387 - 18.2.2 Local Log

61  Statistics Port: Enter a port number and click the Select button to view the traffic statistics of the corresponding port. Received: Displays

Page 388 - 18.2.3 Remote Log

62 The address filtering feature allows the switch to filter the undesired packets and forbid its forwarding so as to improve the network security. T

Page 389 - 18.3 Device Diagnostics

63 The following entries are displayed on this screen:  Search Option MAC Address: Enter the MAC address of your desired entry. VLAN ID: Enter th

Page 390 - Figure18-7 Cable Test

64 Choose the menu Switching→MAC Address→Static Address to load the following page. Figure 6-15 Static Address The following entries are displayed o

Page 391 - 18.4 Network Diagnostics

65 MAC Address: Displays the static MAC Address. VLAN ID: Displays the corresponding VLAN ID of the MAC address. Port: Displays the corresponding P

Page 392 - 18.4.2 Tracert

66 Choose the menu Switching→MAC Address→Dynamic Address to load the following page. Figure 6-16 Dynamic Address The following entries are displayed

Page 393 - Figure18-10 Tracert

67 Aging Status: Displays the Aging Status of the MAC address. Bind: Click the Bind button to bind the MAC address of your selected entry to the co

Page 394 - 1. Hardware Installation

VII 10.9.12 Application Example for OSPF ... 206 10.10 VRRP...

Page 395

68  Search Option Search Option: Select a Search Option from the pull-down list and click the Search button to find your desired entry in the Filt

Page 396 - Figure 19-5 Port Settings

69 Chapter 7 VLAN The traditional Ethernet is a data network communication technology basing on CSMA/CD (Carrier Sense Multiple Access/Collision Det

Page 397

70 packets with the MAC VLAN, Protocol VLAN and 802.1Q VLAN in turn. If a packet is matched, the switch will add a corresponding VLAN tag to it and f

Page 398

71 (3) GENERAL: The GENERAL port can be added in multiple VLANs and set various egress rules according to the different VLANs. The default egress ru

Page 399

72 Choose the menu VLAN→802.1Q VLAN→VLAN Config to load the following page. Figure 7-3 VLAN Table To ensure the normal communication of the factory

Page 400 - Appendix A: Specifications

73 The following entries are displayed on this screen:  VLAN Info VLAN ID: Enter the ID number of VLAN. Name: Displays the user-defined name of V

Page 401

74 Link Type: Select the Link Type from the pull-down list for the port. • ACCESS: The ACCESS port can be added in a single VLAN, and the egress r

Page 402 - Figure B-2

75 Step Operation Description 4 Delete VLAN Optional. On the VLAN→802.1Q VLAN→VLAN Config page, select the desired entry to delete the correspo

Page 403 - Figure B-3

76  Configure switch B Step Operation Description 1 Configure the Link Type of the ports Required. On VLAN→802.1Q VLAN→Port Config page, confi

Page 404 - 1.1 Installation Guide

77 The following entries are displayed on this screen:  Create MAC VLAN MAC Address: Enter the MAC address. Description: Give a description to th

Page 405

VIII 12.1 DiffServ ... 265 12.1.

Page 406

78 Step Operation Description 3 Create MAC VLAN. Required. On the VLAN→MAC VLAN page, create the MAC VLAN. For the device in a MAC VLAN, it’s req

Page 407 - 1.2 Uninstall Software

79 Step Operation Description 2 Create VLAN10 Required. On VLAN→802.1Q VLAN→VLAN Config page, create a VLAN with its VLAN ID as 10, owning Por

Page 408

80 7.5 Protocol VLAN Protocol VLAN is another way to classify VLANs basing on network protocol. Protocol VLANs can be sorted by IP, IPX, DECnet, App

Page 409 - 1.3 Configuration

81 Choose the menu VLAN→Protocol VLAN→Protocol Group Table to load the following page. Figure 7-9 Create Protocol VLAN The following entries are dis

Page 410

82  Protocol Group Member UNI T: Select the unit ID of the desired member in the stack. 7.5.3 Protocol Template The Protocol Template should be cr

Page 411 - 1.4 FAQ:

83 Configuration Procedure: Step Operation Description 1 Set the link type for port. Required. On the VLAN→802.1Q VLAN→Port Config page, set the

Page 412 - Appendix D: Glossary

84  Network Diagram  Configuration Procedure  Configure switch A Step Operation Description 1 Configure the Link Type of the ports Require

Page 413

85 Step Operation Description 4 Create Protocol Template Required. On VLAN→Protocol VLAN→Protocol Template page, configure the protocol templat

Page 414

86 Protocol type Value LACP 0x8809 802.1X 0x888E Table 7-3 Values of Ethernet frame protocol type in common use This VLAN VPN function is implemen

Page 415

87 Figure 7-13 Enable Port for VLAN Mapping  VPN Port Enable UNI T: Select the unit ID of the desired member in the stack. Select your desired po

Comments to this Manuals

No comments