T3700G-28TQ JetStream 28-Port Gigabit Stackable L3 Managed Switch REV1.0.1 1910011207
IX 14.2 DHCP Snooping ... 297 14.2.1 Global C
88 The following entries are displayed on this screen: Global Config VLAN Mapping: Enable/Disable the VLAN mapping function. If VLAN mapping is d
89 Configuration Procedure of VLAN VPN Function: Step Operation Description 1 Enable VPN mode. Required. On the VLAN→VLAN VPN→VPN Config page, en
90 • Join Message: When a GARP entity expects other switches to register certain attribute information of its own, it sends out a Join message. And w
91 In this switch, only the port with TRUNK link type can be set as the GVRP application entity to maintain the VLAN registration information. GVRP h
92 Port Config Unit: Select the unit ID of the desired member in the stack. Select: Select the desired port for configuration. It is multi-optio
93 7.9 Private VLAN Private VLANs, designed to save VLAN resources of uplink devices and decrease broadcast, are sets of VLAN pairs that share a com
94 4. A Primary VLAN can be associated with multi-Secondary VLANs to create multi-Private VLANs. Private VLAN Implementation To hide Secondary VL
95 Search Option Search Option: Select a Search Option from the pull-down list and click the Search button to find your desired entry in Private
96 The following entries are displayed on this screen: Port Config Port selected: Select the desired port for configuration. You can input one or
97 Network Diagram Configuration Procedure Configure Switch C Step Operation Description 1 Create VLAN6 Required. On VLAN→802.1Q VLAN→V
X 16.4.2 Port Config ... 348 16.4.3 Local Info .
98 Configure switch B Step Operation Description 1 Create Private VLANs. Required. On the VLAN→Private VLAN→PVLAN Config page, enter the Pri
99 Chapter 8 Spanning Tree STP (Spanning Tree Protocol), subject to IEEE 802.1D standard, is to disbranch a ring network in the Data Link layer in a
100 Port: Port 3 is the root port of switch B and port 5 is the root port of switch C; port 1 and 2 are the designated ports of switch A and port
101 Comparing BPDUs Each switch sends out configuration BPDUs and receives a configuration BPDU on one of its ports from another switch. The fol
102 The condition for the root port to transit its port state rapidly: The old root port of the switch stops forwarding data and the designated po
103 The following figure shows the network diagram in MSTP. Figure 8-2 Basic MSTP diagram MSTP MSTP divides a network into several MST regions.
104 The following diagram shows the different port roles. Figure 8-3 Port roles The Spanning Tree module is mainly for spanning tree configuration o
105 The following entries are displayed on this screen: Global Config Spanning Tree: Select Enable/Disable STP function globally on the switch. M
106 turn handicaps spanning trees being regenerated in time and makes the network less adaptive. The default value is recommended. 4. If the TxHold
107 Choose the menu Spanning Tree→Port Config to load the following page. Figure 8-6 Port Config The following entries are displayed on this screen:
XI Appendix D: Glossary ... 400
108 Port Role: Displays the role of the port played in the STP Instance. Root Port: Indicates the port that has the lowest path cost from this br
109 Choose the menu Spanning Tree→MSTP Instance→Region Config to load the following page. Figure 8-7 Region Config The following entries are display
110 VLAN ID: Enter the desired VLAN ID. Click 'Add' button, the new VLAN ID will be added to the corresponding instance ID and the previous
111 Choose the menu Spanning Tree→MSTP Instance→Instance Port Config to load the following page. Figure 8-9 Instance Port Config The following entri
112 Path Cost: Path Cost is used to choose the path and calculate the path costs of ports in an MST region. It is an important criterion on determin
113 spanning trees being regenerated and roles of ports being reselected, and causes the blocked ports to transit to forwarding state. Therefore, loo
114 Choose the menu Spanning Tree→STP Security→Port Protect to load the following page. Figure 8-10 Port Protect The following entries are displayed
115 8.4.2 TC Protect When TC Protect is enabled for the port on Port Protect page, the TC threshold and TC protect cycle need to be configured on thi
116 Network Diagram Configuration Procedure Configure switch A: Step Operation Description 1 Configure ports On VLAN→802.1Q VLAN page
117 Step Operation Description 2 Enable STP function On Spanning Tree→STP Config→STP Config page, enable STP function and select MSTP version.
1 Package Contents The following items should be found in your box: One T3700G-28TQ switch One Power Cord One Console Cable One Power Sup
118 Configure switch D: Step Operation Description 1 Configure ports On VLAN→802.1Q VLAN page, configure the link type of the related ports as
119 For Instance 2 (VLAN 102, 104 and 106), the blue paths in the following figure are connected links; the gray paths are the blocked links.
120 Chapter 9 Multicast Multicast Overview In the network, packets are sent in three modes: unicast, broadcast and multicast. In unicast, the sou
121 Multicast Address 1. Multicast IP Address: As specified by IANA (Internet Assigned Numbers Authority), Class D IP addresses are used as desti
122 IGMP Snooping In the network, the hosts apply to the near Router for joining (leaving) a multicast group by sending IGMP (Internet Group Manag
123 3. IGMP Leave Message The host, running IGMPv1, does not send IGMP leave message when leaving a multicast group, as a result, the switch cannot
124 Choose the menu Multicast→IGMP Snooping→Snooping Config to load the following page. Figure 9-4 Basic Config The following entries are displayed
125 Choose the menu Multicast→IGMP Snooping→Port Config to load the following page. Figure 9-5 Port Config The following entries are displayed on th
126 9.1.3 VLAN Config Multicast groups established by IGMP Snooping are based on VLANs. On this page you can configure different IGMP parameters for
127 Router Port Time: Displays the router port time of the VLAN. Member Port Time: Displays the member port time of the VLAN. Leave Time: Displays
2 Chapter 1 About This Guide This User Guide contains information for setup and management of T3700G-28TQ switch. Please read this guide carefully b
128 Choose the menu Multicast→IGMP Snooping→Multicast VLAN to load the following page. Figure 9-7 Multicast VLAN The following entries are displayed
129 Static Router Ports: Select the desired port as the static router port which is mainly used in the network with stable topology. Note: 1. The r
130 Choose the menu Multicast→IGMP Snooping→Querier Config to load the following page. Figure 9-8 Packet Statistics The following entries are displa
131 VLAN ID: Displays the ID of the VLAN that enables IGMP Snooping Querier. Query Interval: Displays the Query Interval of the IGMP Snooping Querie
132 Configuration Procedure Step Operation Description 1 Create VLANs Create three VLANs with the VLAN ID 3, 4 and 5 respectively, and specify
133 The following entries are displayed on this screen: Search Option Search Option: Select the rules for displaying multicast IP table to find t
134 Choose the menu Multicast→Multicast IP→Static Multicast IP to load the following page. Figure9-10 Static Multicast IP Table The following entrie
135 Static Multicast IP Table Multicast IP: Displays the multicast IP. VLAN ID: Displays the VLAN ID of the multicast group. Forward Port: Disp
136 Mode: The attributes of the profile. Permit: Only permit the IP address within the IP range and deny others. Deny: Only deny the IP address
137 Deny: Only deny the IP address within the IP range and permit others. Add IP-range Start IP: Enter the start IP address of the IP range.
3 Chapter Introduction Chapter 4 System This module is used to configure system properties of the switch. Here mainly introduces: System Info: Co
138 The following entries are displayed on this screen: Profile and Max Group Binding UNI T: Select the unit ID of the desired member in the stac
139 Choose the menu Multicast→Packet Statistics to load the following page. Figure 9-14 Packet Statistics The following entries are displayed on thi
140 Chapter 10 Routing Routing is the method by which the host or gateway decides where to send the datagram. Routing is the task of finding a path
141 Subnet Mask: Specify the subnet mask of the interface's IP address. Admin Status: Specify interface administrator status. Choose 'Dis
142 Subnet Mask: View and modify the subnet mask of the interface. Admin Status: View and modify the Admin status. Choose 'Disable' to di
143 Interface Setting Detail Information Displays the detailed setting information of the interface. 10.2 Routing Table This page displays the rou
144 The following entries are displayed on this screen: Static Routing Config Static Route Table 10.3.2 Application Example for Static Routing
145 Configuration Procedure Configure Switch A Steps Operation Note 1 Add interface VLAN 10 Required. On page Routing→Interface→Interface C
146 additional configuration options. DHCP captures the behavior of DHCP participants so the administrator can manage the parameters of the host in t
147 fixed format section of the message and appending tagged data items in the variable length option area. The process is shown as follows. Figure
4 Chapter Introduction Chapter 8 Spanning Tree This module is used to configure spanning tree function of the switch. Here mainly introduces: STP
148 for the fields given in the figure will be used throughout this document to refer to the fields in DHCP messages. Figure 10-8 The Format of DHCP
149 14) file:Boot file name, null terminated string, "generic" name or null in DHCPDISCOVER, fully qualified directory-path name in DHCPOF
150 9) option 55:Parameter Request List option. This option is used by a DHCP client to request values for specified configuration parameters. 10)
151 With a DHCP Relay running between the client and the server, when receiving a DHCP-DISCOVER packet transmitting from the Relay, the switch w
152 Choose the menu Routing→DHCP Server→DHCP Server to load the following page. Figure10-11 DHCP Server The following entries are displayed on this
153 10.4.2 Pool Setting This page shows you how to configure the IP pool in which the IP address can be assigned to the clients in the network. Ch
154 Operation: Allows you to view or modify the information of the corresponding IP Pool. Edit: Click to modify the settings of the Pool. Deta
155 Choose the menu Routing→DHCP Server→Binding Table to load the following page. Figure 10-14 DHCP Server Binding Table DHCP Server Binding Ta
156 The following entries are displayed on this screen: Packets Received BOOTREQUEST: Displays the Bootp Request packet received. DHCPDISCOVER:
157 10.4.6 Application Example for DHCP Server and Relay Network Requirements Every building in the campus belongs to separate VLANs with diff
5 Chapter Introduction Chapter 12 QoS This module is used to configure QoS function to provide different quality of service for various network app
158 Step Operation Note 4 Configure the IP address pool Required. On page Routing→DHCP Server→Pool Setting, configure IP address pool parameters f
159 Figure 10-16 DHCP Relay Application To allow all clients in different VLAN request IP address from one server successfully, the DHCP Relay funct
160 2) Specify the DHCP Server which assigns IP addresses actually. Option 82 On this switch, Option 82 is used to record the location of the DHC
161 Choose the menu Routing→DHCP Relay→Global Config to load the following page. Figure 10-19 Global Config The following entries are displayed on t
162 10.5.2 DHCP Server This page enables you to configure DHCP Servers on the specified interface. Choose the menu Routing→DHCP Relay→DHCP Server to
163 When an ARP request of a host is to be forwarded to another host in the same network segment but isolated at Layer 2, to realize the connectivity
164 Search Default Route: If enabled, default route is included when searching arp proxy. Proxy ARP Information Select: Select the desired item f
165 Step Operation Description 4 Enable Proxy ARP Required. On Routing→Proxy ARP→Proxy ARP page, enable Proxy ARP feature for VLAN interface 2 a
166 RIP routing table An RIP router has a routing table containing routing entries of all reachable destinations, and each routing entry contains:
167 RIP Version RIP has two versions, RIPv1 and RIPv2. RIPv1, a classful routing protocol, supports message advertisement via broadcast only. RIPv
6 Chapter Introduction Chapter 17 Cluster This module is used to configure cluster function to centrally manage the scattered devices in the networ
168 Figure 10-25 RIPv2 Message Format The detailed explanations of each field are stated as following: Version: Version of RIP. For RIPv2 the val
169 Choose the menu Routing→RIP→Basic Config to load the following page. Figure 10-27 RIP Basic Config The following entries are displayed on thi
170 RIP Distance: Set the RIP router distance. Auto Summary: If you select enable groups of adjacent routes will be summarized into single entries,
171 Status: The interface RIP status(up or down) is decided by the network status. You cannot change it here. Send Version: Select the version of RI
172 Choose the menu Routing→RIP→RIP Database to load the following page. Figure 10-29 RIP Database The following entries are displayed on this scre
173 Configure Switch B Step Operation Note 1 Enable RIP Required. On page Routing→RIP→Basic Config, enable RIP, select RIPv2 as RIP version. 2
174 Figure 10-30 Common Scenario for OSPF routing protocol The network topology is more prone to changes in an autonomous system of larger size. The
175 In the automatic election, the router would in the first place select the highest loopback interface IP address as the router ID. If the router d
176 Figure 10-31 Diagram of DR/BDR Adjacency Relation DR or BDR is determined by the interface priority and router ID. First of all, whether a route
177 5) After two routers have finished the synchronization of link state database, a complete adjacency relation will be established. 6) When the i
7 Chapter 2 Introduction Thanks for choosing the T3700G-28TQ JetStream 28-Port Gigabit Stackable L3 Managed Switch! 2.1 Overview of the Switch T370
178 Figure 10-32 Steps to Establish a Complete Adjacency Relation 2. Flooding As Figure 10-32 shows, two random routers will synchronize the lin
179 Figure 10-33 Flooding of the LSA 1) DROthers multicast the LSA update of its directly-connected network to DR and BDR. 2) After receiving the
180 network connectivity at all time. The non-backbone Area 1 and Area 2 cannot communicate directly with each other, but they can exchange routing
181 Figure 10-36 Virtual Link Sketch As in Figure 10-36, ABR of Area 2 has no physical link to connect directly with the backbone area, in which cas
182 learn about the routing information from other areas, the size of the routing table of the routers in the stub area as well as the number of the
183 Figure 10-38 Discontinuous Network Segment Link State Database When the routers in the network completely synchronize the link state database
184 Figure 10-39 OSPF Header 1) Version: The version number of OSPF run by this device. For instance, the OSPF run by our IPv4 devices is of Versio
185 2. HELLO Packet OSPF routers send Hello packets to each other to find neighbor routers in the network and to maintain the mutual adjacency relat
186 Figure 10-41 DD Packet 1) Interface MTU: Size in bytes of the largest IP packet that can be sent out by the routing interface of the advertisin
187 Figure 10-42 LSR Packet 1) Link State Type: The type of LSA. There are 11 types of LSA in total: Router LSA, Network LSA, Network Summarization
I COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Othe
8 • Quality of Service + Supports L2/L3 granular CoS with 8 priority queues per port. + Rate limiting confines the traffic flow accurately according
188 6. LSAck Packet When receiving a LSU, the router will send to the router forwarding the LSU packet a LSAck packet including the LSA header it re
189 Type Code Name Features 6 NSSA External LSA Originates from ASBR in the NSSA. The content of this LSA is the same as that of AS external LSA, b
190 2) Create the routing interfaces and configure their IP parameters. 3) Plan the areas to which the subnets (routing interfaces) of the switches
191 10.9.2 Basic Choose the menu Routing→OSPF→Basic to load the following page. Figure 10-46 OSPF Base The following entries are displayed on this
192 OSPF Config ASBR Mode: The router is an Autonomous System Boundary Router if it is configured to redistribute routes from another protocol, o
193 Passive Default: Configure the global passive mode settings for all OSPF interfaces. Configuring this field will overwrite any present interface
194 Area ID: Displays the area to which the network belongs. 10.9.4 Interface Choose the menu Routing→OSPF→Interface to load the following page. F
195 Passive Mode: Make an interface passive to prevent OSPF from forming an adjacency on an interface. OSPF advertises networks attached to passive i
196 The router establishes adjacencies to all other routers attached to the network. The Backup Designated Router performs slightly different functio
197 Retransmit Interval: The retransmit interval for the specified interface. This is the number of seconds between link-state advertisements for adj
9 LEDs LED Status Indication PWR On The switch is powered on Off The switch is powered off or power supply is abnormal Flashing Power supply is ab
198 10.9.5 Area Choose the menu Routing→OSPF→Area to load the following page. Figure10-50 OSPF Area The following entries are displayed on this sc
199 Metric Type: Set the OSPF metric type of the default route. Two types are supported: External Type 1 and External Type 2. The default value is E
200 10.9.6 Area Aggregation You can configure address ranges for an area on this page. The address range is used to consolidate or summarize routes
201 Cost: Displays the path cost to the address range and it can be modified. Advertise: Displays the Advertise parameter and it can be modified. 10
202 Dead Interval: The dead interval for the specified interface in seconds. This specifies how long a router will wait to see a neighbor router&apos
203 Source: The available source routes for redistribution by OSPF. The valid values are 'Static', 'RIP', and other OSPF processe
204 Tag: Set the tag field in redistributed address range. The valid value ranges from 0 to 4294967295 and the default is 0. NSSA Only: Set whether
205 State: The state of the neighbor: Down: This is the initial state of a neighbor conversation. It indicates that there has been no recent info
206 10.9.11 Link State Database Choose the menu Routing→OSPF→Link State Database to load the following page. Figure10-56 Link State Database The fo
207 Network Diagram Configuration Procedure Configure Switch A Step Operation Description 1 Create routing interfaces and their IP add
10 LED Status Indication 25, 26 On An SFP+ transceiver/cable is connected to the corresponding port, and it is connected to a 10Gbps device, but no a
208 Configure Switch C Step Operation Description 1 Create routing interfaces and their IP addresses Required. On page Routing→Interface→Inte
209 still be provided and network interruption can be avoided after a single link fails without reconfiguration of dynamic routing or router discover
210 The VRRP priority ranges from 0 to 255 (the bigger the number is, the higher the priority is). Configurable range is 1-254. The priority value 0
211 interfaces and better performance can be elected as master router; and the stability of backup group is increased. When the router interface conn
212 VRRP Configuration Before configuring VRRP, users should plan well to specify the role and function of the devices in backup groups. Every swi
213 Virtual IP: Displays the primary Virtual IP associated with the VRRP. Priority: Displays the priority associated with the VRRP. Status: Displa
214 Priority: Displays the running priority associated with the VRRP. It ranges from 1 to 255. Advertise Timer: Displays the advertise timer associ
215 Description: Enter the description associated with the VRRP. Numbers, characters and '_' are the only valid inputs, and the maximal len
216 The following entries are displayed on this screen: Add Virtual IP This filed is used to add virtual IP addresses associated with the VRRP. Up
217 The following entries are displayed on this screen: Add Track This filed is used for adding track information associated with the VRRP. Up to
11 2.3.2 Rear Panel The rear panel of T3700G-28TQ is shown as the following figure. Figure 2-2 Rear Panel (1) Note: The Interface Card Slot, RPS Input
218 The following entries are displayed on this screen: Global Statistics Router Checksum Errors: Displays the total number of VRRP packets receiv
219 Packet Length Errors: Displays the number of packets received with a packet length less than the length of the VRRP header. Clear: Clear the sta
220 Network Diagram Configuration Procedure Configure Switch A Steps Operation Note 1 Configure the interface and its IP address. On pag
221 Chapter 11 Multicast Routing Overview of Multicast Routing Protocols Note: The router and router icon mentioned in this chapter represent the
222 The multicast model divides into two types depending on whether there is an exact multicast source: ASM (Any-Source Multicast) and SSM (Source-S
223 11.1.2 Mroute Table On this page you can get the desired mroute information through different search options. Choose the menu Multicast Routing→
224 11.2 IGMP Brief Introduction of IGMP IGMP stands for Internet Group Management Protocol. It is responsible for the management of IP multicast
225 (3) After receiving the IGMP query message, the host that is interested in multicast group G1, either Host B or Host C (depending on whose laten
226 2. Leave-Group Mechanism When a host leaves a multicast group in IGMPv2: (1) The host will send leave group message to all the multicast router
227 Figure 11-4 IGMPv3 Multicast Source Filtering If the IGMP protocol running between the hosts and the multicast routers is IGMPv1 or IGMPv2, Host
12 Chapter 3 Login to the Switch 3.1 Login 1) To access the configuration utility, open a web-browser and type in the default address http://192.1
228 IS_EX: indicating the mapping relationship between the multicast group and the multicast source list is EXCLUDE, which means the host will onl
229 Robustness: Specify the robustness of the selected interface, ranging from 1 to 255. The default is 2. The robustness variable determines the agi
230 Routed Port: Enter the routed port the desired entry must carry. Interface State Table Interface: The interface for which data is to be disp
231 The following entries are displayed on this screen: IGMP Static Multicast Group Interface: Enter the ID of the interface corresponds to, VLAN
232 Choose the menu Multicast Routing→IGMP→Multicast Group Table to load the following page. Figure 11-8 Multicast Group Table The following entries
233 Choose the menu Multicast Routing→IGMP→Profile Binding to load the following page. Figure 11-9 Profile Binding The following entries are displa
234 Profile: Click the Profile button to create new IGMP profiles. 11.2.6 Packet Statistics On this page you can view multicast packet statistics o
235 11.2.7 Application Example for IGMP Network Requirements 1. Receivers of different organizations form the stub networks N1 and N2, and Host
236 Configure Switch A Steps Operation Note 1 Enable IP multicast routing. On page Multicast Routing→ Global Config→ Global Config, enable
237 RPF Mechanism PIM uses the unicast routing table to perform the RPF check. RPF mechanism ensures the multicast packets being forwarded corre
13 Figure 3-3 Main Setup-Menu Note: Clicking Apply can only make the new configurations effective before the switch is rebooted. If you want to keep
238 If the check result shows that the RPF interface is the different from the input interface in the current (S, G) entry, which indicates that t
239 Neighbor Discovering In PIM domain, routers periodically sends PIM Hello packets to all the PIM routers with the multicast address 224.0.0.13
240 Grafting When a new receiver on a previously pruned branch of the tree joins a multicast group, the PIM DM takes the Graft mechanism to active
241 (2) The router with the unicast route of the smaller cost to the multicast source; (3) The router with the local interface of the higher IP add
242 Choose the menu Multicast Routing→PIM DM→PIM DM neighbor to load the following page. Figure 11-14 PIM DM neighbor The following entries are dis
243 Step Operation Description 4 Enable IGMP Required. Enable IGMP on the routing interfaces which connect to the receivers on Multicast Routing
244 Configuration Procedure Configure Switch A: Step Operation Description 1 Configure interface. Configure IP addresses and subnet masks of
245 The router connected to the receiver sends the join message to the RP of a certain multicast group. The path along which the join message is s
246 Figure 11-15 DR Elect As shown in Figure 11-15, the DR election process is illustrated below: (1) Routers in the shared network sends Hello mes
247 Figure 11-16 The Locations of C-RP, C-BSR and BSR RPT Building Figure 11-17 RPT Topology in PIM SM As shown in Figure 11-17, the establis
14 Chapter 4 System The System module is mainly for system configuration of the switch, including four submenus: System Info, User Management, Syste
248 check if there are other receivers of this group. If there are no more receivers, the prune message will be sent upstream. Multicast Source Re
249 (2) The receiver-side DR sends prune message toward the RP hop-by-hop. The RP will forward the received prune message toward the multicast sourc
250 The multicast messages (such as C-RP Hello Message and BSR BootStrap Message) of each BSR administrative domain cannot pass through the domain bo
251 11.4.2 PIM SM Neighbor PIM SM neighbor is automatically learned by sending and receiving Hello Packets when PIM SM is enabled. Choose the menu M
252 Choose the menu Multicast Routing→PIM SM→BSR to load the following page. Figure 11-22 BSR The following entries are displayed on this screen:
253 PIM SM Candidate BSR Information Candidate BSR Address: Displays the Candidate BSR address. Priority: Displays the priority of the Candidate
254 Priority: Specify the priority of the candidate RP. The default value is 192. Interval: Specify the interval of advertisement message of the can
255 11.4.6 RP Info Choose the menu Multicast Routing→PIM SM→RP Info to load the following page. Figure 11-25 RP Info The following entries are dis
256 11.4.7 Application Example for PIM SM Network Requirements 1. Receivers receive VOD data through multicast. The whole network runs PIM SM as
257 Configuration Procedure Configure Switch A: Step Operation Description 1 Configure interface. Configure IP addresses and subnet masks o
15 Indicates the 1000Mbps port is not connected to a device. Indicates the 1000Mbps port is at the speed of 1000Mbps. Indicates the 1000Mbps port
258 The static multicast routing is an important foundation for the RPF check. In the RPF check process, with static multicast routing configured, th
259 The following entries are displayed on this screen: Static Mroute Config Source: Enter the IP address that identifies the multicast source of
260 11.5.3 Application Example for Static Mroute Network Requirements 1. The network runs PIM DM and all the switches in the network support mul
261 Configure Switch B Step Operation Note 1 Enable IP multicast routing Required. On page Multicast Routing→Global Config→Global Config, ena
262 Chapter 12 QoS QoS (Quality of Service) functions to provide different quality of service for various network applications and requirements and
263 2. 802.1P Priority Figure 12-2 802.1Q frame As shown in the figure above, each 802.1Q Tag has a Pri field, comprising 3 bits. The 3-bit prior
264 Figure 12-4 SP-Mode 2. WRR-Mode: Weight Round Robin Mode. In this mode, packets in all the queues are sent in order based on the weight value f
265 12.1 DiffServ This switch classifies the ingress packets, maps the packets to different priority queues and then forwards the packets according t
266 LAG: Displays the LAG number which the port belongs to. Note: To complete QoS function configuration, you have to go to the Schedule Mode page t
267 SP+WRR-Mode: Strict-Priority + Weight Round Robin Mode. In this mode, this switch provides two scheduling groups, SP group and WRR group. Queues
16 Figure 4-3 Bandwidth Utilization Bandwidth Utilization Rx: Select Rx to display the bandwidth utilization of receiving packets on this port. T
268 Priority and CoS-mapping Config Tag-id/CoS-id: Indicates the precedence level defined by IEEE 802.1P and the CoS ID. Queue TC-id: Indicates th
269 Choose the menu QoS→DiffServ→DSCP Priority to load the following page. Figure 12-9 DSCP Priority The following entries are displayed on this scr
270 12.2 Bandwidth Control Bandwidth function, allowing you to control the traffic rate and broadcast flow on each port to ensure network in working
271 Note: 1. If you enable ingress rate limit feature for the storm control-enabled port, storm control feature will be disabled for this port. 2.
272 UL-Frame Rate : Select the bandwidth for receiving UL-Frame on the port. The packet traffic exceeding the bandwidth will be discarded. Select Di
273 the aging time, the switch will remove this port from voice VLAN. Voice ports are automatically added into or removed from voice VLAN. Manual Mod
274 source MAC addresses do not match OUI addresses. If security mode is not enabled, the port forwards all the packets. Security Mode Packet Type
275 Aging Time: Specifies the living time of the member port in auto mode after the OUI address is aging out. Priority: Select the 802.1P priority o
276 Port Mode: Select the mode for the port to join the voice VLAN. Auto: In this mode, the switch automatically adds a port to the voice VLAN or
277 OUI Table Select: Select the desired entry to view the detailed information. OUI: Displays the OUI address of the voice device. Mask: Displ
17 System Contact: Enter your contact information. 4.1.3 System Time System Time is the time displayed while the switch is running. On this page you
278 Chapter 13 ACL ACL (Access Control List) is used to filter packets by configuring match rules and process policies of packets in order to contro
279 13.1.2 Time-Range Create On this page you can create time-ranges. Choose the menu ACL→Time-Range→Time-Range Create to load the following page.
280 End Time: Displays the end time of the time-slice. Delete: Click the Delete button to delete the corresponding time-slice. 13.1.3 Holiday Conf
281 13.2.1 ACL Summary On this page, you can view the current ACLs configured in the switch. Choose the menu ACL→ACL Config→ACL Summary to load the
282 13.2.3 MAC ACL MAC ACLs analyze and process packets based on a series of match conditions, which can be the source MAC addresses, destination MA
283 Choose the menu ACL→ACL Config→Standard-IP ACL to load the following page. Figure 13-7 Create Standard-IP Rule The following entries are display
284 Choose the menu ACL→ACL Config→Extend-IP ACL to load the following page. Figure 13-8 Create Extend-IP Rule The following entries are displayed o
285 IP Pre: Enter the IP Precedence contained in the rule. Time-Range: Select the time-range for the rule to take effect. 13.3 Policy Config A Po
286 Choose the menu ACL→Policy Config→Policy Create to load the following page. Figure 13-10 Create Policy The following entries are displayed on th
287 S-Condition: Select S-Condition to limit the transmission rate of the data packets in the policy. Rate: Specify the forwarding rate of the da
II Safety Information When product has power button, the power button is one of the way to shut off the product; When there is no power button,
18 Note: 1. The system time will be restored to the default when the switch is restarted and you need to reconfigure the system time of the switch.
288 The following entries are displayed on this screen: Search Options Show Mode: Select a show mode appropriate to your needs. Policy Vlan-Bi
289 The following entries are displayed on this screen: Port-Bind Config Policy Name: Select the name of the policy you want to bind. Port: En
290 Configuration Procedure: Step Operation Description 1 Configure effective time-range Required. On ACL→Time-Range configuration pages, configur
291 Step Operation Description 2 Configure for requirement 1 On ACL→ACL Config→ACL Create page, create ACL 11. On ACL→ACL Config→MAC ACL page, se
292 Chapter 14 Network Security Network Security module is to provide the multiple protection measures for the network security, including five subm
293 The following entries are displayed on this screen: Search Source: Displays the Source of the entry. • All: All the bound entries will be
294 Figure 14-2 Manual Binding The following entries are displayed on this screen: Manual Binding Option Host Name: Enter the Host Name. IP Addr
295 Source: Displays the source of the entry. Collision: Displays the Collision status of the entry. • Warning: Indicates that the collision may b
296 Choose the menu Network Security→IP-MAC Binding→ARP Scanning to load the following page. Figure 14-4 ARP Scanning The following entries are dis
297 14.2 DHCP Snooping Nowadays, the network is getting larger and more complicated. The amount of the PCs always exceeds that of the assigned IP add
19 Recurring Mode: Specify the DST configuration in recurring mode. This configuration is recurring in use: Offset: Specify the time adding in min
298 The most Clients obtain the IP addresses dynamically, which is illustrated in the following figure. Figure 14-6 Interaction between a DHCP cli
299 Option 82 can contain 255 sub-options at most. If Option 82 is defined, at least a sub-option should be defined. This switch supports two sub-opt
300 Figure 14-8 DHCP Snooping Note: If you want to enable the DHCP Snooping feature for the member port of LAG, please ensure the parameters of all
301 • Replace: Indicates to replace the Option 82 field of the packets with the switch defined one. • Drop: Indicates to discard the packets includ
302 Rate Limit: Select the value to specify the maximum amount of DHCP messages that can be forwarded by the switch of this port per second. The exce
303 Figure 14-11 ARP Attack – Cheating Gateway As the above figure shown, the attacker sends the fake ARP packets of Host A to the Gateway, and then
304 Man-In-The-Middle Attack The attacker continuously sends the false ARP packets to the Hosts in LAN so as to make the Hosts maintain the wrong
305 and unable to learn the ARP entries of legal Hosts, which causes that the legal Hosts cannot access the external network. The IP-MAC Binding func
306 Trusted Port UNI T: Select the unit ID of the desired member in the stack. Trusted Port: Select the port for which the ARP Detect function
307 Choose the menu Network Security→ARP Inspection→ARP Defend to load the following page. Figure 14-15 ARP Defend The following entries are display
20 Choose the menu System → User Management → User Config to load the following page. Figure 4-8 User Config The following entries are displayed on
308 Choose the menu Network Security→ARP Inspection→ARP Statistics to load the following page. Figure 14-16 ARP Statistics The following entries a
309 Choose the menu Network Security→IP Source Guard to load the following page. Figure 14-17 IP Source Guard The following entries are displayed on
310 14.5 DoS Defend DoS (Denial of Service) Attack is to occupy the network bandwidth maliciously by the network attackers or the evil programs sendi
311 14.5.1 DoS Defend On this page, you can enable the DoS Defend type appropriate to your need. Choose the menu Network Security→DoS Defend→DoS Def
312 Figure 14-19 Architecture of 802.1X authentication 1. Supplicant System: The supplicant system is an entity in LAN and is authenticated by the
313 1. EAP Relay Mode This mode is defined in 802.1X. In this mode, EAP-packets are encapsulated in higher level protocol (such as EAPOR) packets to
314 (7) The switch changes the state of the corresponding port to accepted state to allow the supplicant system access the network. And then the swi
315 3. Quiet-period timer (Quiet Period): This timer sets the quiet-period. When a supplicant system fails to pass the authentication, the switch qu
316 The following entries are displayed on this screen: Global Config 802.1X: Enable/Disable the 802.1X function. Auth Method: Select the Authen
317 Figure 14-23 Port Config The following entries are displayed on this screen: Port Config UNIT: Select the unit ID of the desired member in t
21 Operation: Click the Edit button of the desired entry, and you can edit the corresponding user information. After modifying the settings, please
318 14.6.3 Radius Server RADIUS (Remote Authentication Dial-In User Service) server provides the authentication service for the switch via the sto
319 Key Modify: Select to modify the accounting key. Accounting Key: Set the shared password for the switch and the accounting servers to exchange m
320 Chapter 15 SNMP SNMP Overview SNMP (Simple Network Management Protocol) has gained the most extensive application on the UDP/IP networks. SNM
321 SNMP v1: SNMP v1 adopts Community Name authentication. The community name is used to define the relation between SNMP Management Station and SNMP
322 3. Create SNMP User The User configured in an SNMP Group can manage the switch via the client program on management station. The specified User
323 Note: The amount of Engine ID characters must be even. 15.1.2 SNMP View The OID (Object Identifier) of the SNMP packets is used to describe the
324 15.1.3 SNMP Group On this page, you can configure SNMP Group to control the network access by providing the users in various groups with differe
325 Write View: Select the View to be the Write View. The management access is writing only and changes can be made to the assigned SNMP View. The Vi
326 Choose the menu SNMP→SNMP Config→SNMP User to load the following page. Figure15-6 SNMP User The following entries are displayed on this screen:
327 User Table Select: Select the desired entry to delete the corresponding User. It is multi-optional. User Name: Displays the name of the User
22 Current Startup Image: Displays the current startup image. Next Startup Image: Select the next startup image. Backup Image: Select the backup bo
328 • read-only: Management right of the Community is restricted to read-only, and changes cannot be made to the corresponding View. • read-writ
329 Step Operation Description 2 Create SNMP View. Required. On the SNMP→SNMP Config→SNMP View page, create SNMP View of the management agent. T
330 Choose the menu SNMP→Notification→Notification Config to load the following page. Figure15-8 Notification Config The following entries are displ
331 Type: Displays the type of the notifications. Retry: Displays the maximum time for the switch to wait for the response from the management stati
332 Choose the menu SNMP→RMON→Statistics to load the following page. Figure 15-9 Statistics The following entries are displayed on this screen: S
333 Choose the menu SNMP→RMON→History to load the following page. Figure 15-10 History Control The following entries are displayed on this screen:
334 Choose the menu SNMP→RMON→Event to load the following page. Figure15-11 Event Config The following entries are displayed on this screen: Even
335 Choose the menu SNMP→RMON→Alarm to load the following page. Figure 15-12 Alarm Config The following entries are displayed on this screen: Ala
336 Interval: Enter the alarm interval time in seconds, ranging from 10 to 3600. Owner: Enter the name of the device or user that defined the entry.
337 Chapter 16 LLDP LLDP (Link Layer Discovery Protocol) is a Layer 2 protocol that is used for network devices to advertise their own device inform
23 4.3.3 Config Backup On this page you can download the current configuration of the specified unit in the stack and save it as a file to your compu
338 Disable: the port cannot transmit or receive LLDPDUs. 2) LLDPDU transmission mechanism If the ports are working in TxRx or Tx mode, they w
339 TLV Type TLV Name Description Usage in LLDPDU 2 Port ID Identifies the specific port that transmitted the LLDP frame. When the device does no
340 System Description TLV The System Description TLV allows network management to advertise the system's description, which should include the
341 Choose the menu LLDP→Basic Config→Global Config to load the following page. Figure 16-1 Global Configuration The following entries are displayed
342 Choose the menu LLDP→Basic Config→Port Config to load the following page. Figure 16-2 Port Configuration The following entries are displayed on
343 16.2.1 Local Info On this page you can see all ports' configuration and system information. Choose the menu LLDP→Device Info→Local Info to
344 Chassis ID Subtype: Indicates the basis for the chassis ID, and the default subtype is MAC address. Chassis ID: Indicates the specific identifier
345 Auto Refresh Auto Refresh: Enable/Disable the auto refresh function. Refresh Rate: Configure the auto refresh rate. Neighbor(s) Info Se
346 The following entries are displayed on this screen: Auto Refresh Auto Refresh: Enable/Disable the auto refresh function. Refresh Rate: Confi
347 Media Endpoint Device (Class II): The class of Endpoint Device that supports media stream capabilities. Communication Device Endpoint (Class III
24 Choose the menu System→System Tools→Firmware Upgrade to load the following page. Figure 4-12 Firmware Upgrade Note: 1. Don’t interrupt the upgra
348 The following entries are displayed on this screen: LLDP-MED Parameters Config Fast Start Count: When LLDP-MED fast start mechanism is activa
349 Included TLVs: Select TLVs to be included in outgoing LLDPDU. Click the Detail button to display the included TLVs and select the desired TLVs.
350 should be used, but may not be known. Options (0) and (1) should not be used unless it is known that the DHCP client is in close physical proxim
351 Application Type: Application Type indicates the primary function of the applications defined for the network policy. Unknown Policy Flag: Displa
352 Unit: Select the unit ID of the desired member in the stack. Device Type: Displays the device type of the neighbor. Application Type: Displays
353 Chapter 17 Cluster With the development of network technology, the network scale is getting larger and more network devices are required, which
354 The commander switch becomes to be the candidate switch only when the cluster is deleted. Introduction to Cluster Cluster functions to conf
355 The following entries are displayed on this screen: Neighbor Search Option: Select the information the desired entry should contain and then
356 Aging Time: Displays the period for the neighbor switch to keep the NDP packets from this switch. Hello Time: Displays the interval to send NDP
357 The following entries are displayed on this screen: Global Config NDP: Select Enable/Disable NDP function globally. Aging Time: Enter the per
25 Choose the menu System→System Tools→System Reset to load the following page. Figure 4-14 System Reset Note: After the system is reset, the switch
358 Choose the menu Cluster→NTDP→Device Table to load the following page. Figure17-5 Device Table The following entries are displayed on this screen
359 Click the Detail button to view the complete information of this device and its neighbors. Figure17-6 Information of the Current Device 17.2.2
360 The following entries are displayed on this screen: Global Config NTDP: Displays the NTDP status (enabled or disabled) of the switch globally.
361 NTDP Interval Time: Enter the interval to collect topology information. NTDP Hops: Enter the hop count the switch topology collects. NTDP Hop D
362 Cluster Role: Displays the role the switch plays in the cluster. Cluster Management-vlan VLAN ID: Displays the management VLAN ID of the swi
363 TFTP Server: Displays the IP address of TFTP server. Member Info Device Name: Displays the description of the member switch. Device MAC: Di
364 For an individual switch, the following page is displayed: Figure17-12 Cluster Summary for Individual Switch The following entries are displa
365 The following entries are displayed on this screen: Current Role Role: Displays the role the current switch plays in the cluster. Cluster
366 Role Change Candidate: Select this option to change the role of the switch to be candidate switch. Cluster Config Hold Time: Enter the tim
367 For an individual switch, the following page is displayed. Figure 17-16 Cluster Configuration for Individual Switch The following entries are
26 The following entries are displayed on this screen: Access Control Config Control Mode: Select the control mode for users to log on to the Web
368 The following entries are displayed on this screen: Create Member Member MAC: Enter the MAC address of the candidate switch. Member Info S
369 The following entries are displayed on this screen: Graphic Show Collect Topology: Click the Collect Topology button to display the cluster t
370 Step Operation Description 2 Enable the NTDP function globally and for the port, and then configure NTDP parameters Optional. On Cluster→NTDP→N
371 Configuration Procedure Configure the member switch Step Operation Description 1 Enable NDP function on the switch and for port 1 O
372 Chapter 18 Maintenance Maintenance module, assembling the commonly used system tools to manage the switch, provides the convenient method to loc
373 UNI T: Select the unit ID of the desired member in the stack. Click the Monitor button to enable the switch to monitor and display its CPU utili
374 Severity Level Description alerts 1 Action must be taken immediately. critical 2 Critical conditions errors 3 Error conditions warnings 4
375 The following entries are displayed on this screen: Log Info UNI T: Select the unit ID of the desired member in the stack. Index: Displays t
376 Log File: Indicates the flash sector for saving system log. The inforamtion in the log file will not be lost after the switch is restarted and ca
377 Note: The Log Server software is not provided. If necessary, please download it on the Internet. 18.2.4 Backup Log Backup Log feature enables th
27 After SSL is effective, you can log on to the Web management page via https://192.168.0.1. For the first time you use HTTPS connection to log into
378 Choose the menu Maintenance→Device Diagnostics→Cable Test to load the following page. Figure18-7 Cable Test The following entries are displayed
379 18.3.2 Loopback Loopback test function, looping the sender and the receiver of the signal, is used to test whether the port of the switch is ava
380 Choose the menu Maintenance→Network Diagnostics→Ping to load the following page. Figure18-9 Ping The following entries are displayed on this scr
381 Choose the menu Maintenance→Network Diagnostics→Tracert to load the following page. Figure18-10 Tracert The following entries are displayed on t
382 Chapter 19 System Maintenance via FTP The firmware can be downloaded to the switch via FTP function. FTP (File Transfer Protocol), a protocol in
383 2) The Connection Description Window will prompt shown as Figure 19-3. Enter a name into the Name field and click OK. Figure 19-3 Connection Des
384 4) Configure the port selected in the step above shown as the following Figure 19-5. Configure Bits per second as 38400, Data bits as 8, Parity
385 2) Power off and restart the switch. When you are prompted that “Press CTRL-B to enter the bootutil” in the hyper terminal, please press CTRL-B k
386 For example: Configure the IP address as 10.10.70.22, mask as 255.255.255.0 and gateway as10.10.70.1. The detailed steps are shown as the figure
387 5) Enter 1 and y, the switch will reboot with the startup image. 6) Please 3 to start the switch shown as the following figure. After the switch
III CONTENTS Package Contents ...
28 4.4.3 SSH Config As stipulated by IFTF (Internet Engineering Task Force), SSH (Secure Shell) is a security protocol established on application a
388 Appendix A: Specifications Standards IEEE802.3i 10Base-T Ethernet IEEE802.3u 100Base-TX/100Base-FX Fast Ethernet IEEE802.3ab 1000Base-T Gigabit
389 LED Power, System, RPS, FAN, Master, Module, Link/Act, 21F-24F, 25, 26, M1, M2, Unit ID LED Transmission Method Store and Forward Packets Forw
390 Appendix B: Configuring the PCs In this section, we’ll introduce how to install and configure the TCP/IP correctly in Windows 2000. First make su
391 5) The following TCP/IP Properties window will display and the IP Address tab is open on this window by default. Figure B-3 6) Select Use the
392 Appendix C: 802.1X Client Software In 802.1X mechanism, the supplicant Client should be equipped with the corresponding client software complied
393 3. Then the following screen will appear. Click Next to continue. If you want to stop the installation, click Cancel. Figure C-3 Welcome to th
394 5. Till now, The Wizard is ready to begin the installation. Click Install to start the installation on the following screen. Figure C-5 Install
395 7. On the following screen, click Finish to complete the installation. Figure C-7 InstallShield Wizard Complete Note: Please pay attention to t
396 2. Then the following screen will appear. If you want to stop the remove process, click Cancel. Figure C-9 Preparing Setup 3. On the continued
397 1.3 Configuration 1. After completing installation, double click the icon to run the TP-LINK 802.1X Client Software. The following screen wi
29 Max Connect: Specify the maximum number of the connections to the SSH server. No new connection will be established when the number of the connect
398 Auto reconnect after timeout: Select this option to allow the Client to automatically start the connection again when it does not receive the han
399 1.4 FAQ: Q1: Why does this error dialog box pop up when starting up the TP-LINK 802.1X Client Software? A1: It’s because the supported DLL file
400 Appendix D: Glossary Access Control List (ACL) ACLs can limit network traffic and restrict access to certain users or devices by checking each pa
401 Generic Multicast Registration Protocol (GMRP) GMRP allows network devices to register end stations with multicast groups. GMRP requires that any
402 Layer 2 Data Link layer in the ISO 7-Layer Data Communications Protocol. This is related directly to the hardware interface for network devices a
403 Secure Shell (SSH) A secure replacement for remote access functions, including Telnet. SSH can authenticate users with a cryptographic key, and e
30 2. Click the Open button in the above figure to log on to the switch. Enter the login user name and password, and then you can continue to config
31 2. After the key is successfully generated, please save the public key and private key to the computer. 3. On the Web management page of the sw
32 4. After the public key is downloaded, please log on to the interface of PuTTY and enter the IP address for login. 5. Click Browse to downloa
33 After successful authentication, please enter the login user name. If you log on to the switch without entering password, it indicates that the ke
34 Chapter 5 Stack The stack technology is to connect multiple stackable devices through their StackWise ports, forming a stack which works as a u
35 In a ring connected stack, it can still operate normally by transforming into a daisy chained stack when link failure occurs, which further ensur
36 Stack Introduction 1. Stack Elements 1) Stack Role Each device in the stack system is called stack member. Each stack member processes service
37 1) Connecting the stack members To establish a stack, please physically connect the stack ports of the member devices with cables. The stack ports
IV 5.1.1 Stack Info ... 40 5.1.2 Stack Conf
38 The master is elected based on the following rules and in the order listed: 1. The switch that is currently the stack master. 2. The switch wi
39 • Port Number Format: The format of port number should be Unit Number/Slot Number/Port Number. Among them: (1) Unit Number: The default unit num
40 5.1 Stack Management Before configuring the stack, we highly recommend you to prepare the configuration planning with a clear set of the role and
41 Role: Displays the stack role of the member switch in the stack. There are two options: Master and Slave. MAC Address: Displays the MAC address o
42 The following entries are displayed on this screen: Stack Config Stack Name: Enter the name of the stack. The length of this field should be 1-
43 Choose the menu Stack Management→Switch Renumber to load the following page. Figure 5-9 Switch Renumber The following entries are displayed on th
44 5.2 Application Example for Stack Network Requirements Establish a stack of ring topology with four T3700-28TQ switches. Network Diagram
45 Chapter 6 Switching Switching module is used to configure the basic functions of the switch, including four submenus: Port, LAG, Traffic Monitor
46 Description: Give a description to the port for identification. Status: Allows you to Enable/Disable the port. When Enable is selected, the port
47 The following entries are displayed on this screen. Mirror Session List Session: This column displays the mirror session number. Destination:
V 7.7 VLAN VPN ... 85 7.7.1 VPN Co
48 The following entries are displayed on this screen. Mirror Session Session: Displays session number. Destination Port Destination Port: I
49 Choose the menu Switching→Port→Port Security to load the following page. Figure 6-4 Port Security The following entries are displayed on this scr
50 • Permanent: When Permanent mode is selected, the learned MAC address will be out of the influence of the aging time and can only be deleted man
51 Click the Edit button to configure the port isolation list in the following page: Figure 6-6 Port Isolation Config Port Isolation Config UNI T
52 Choose the menu Switching → Port → Loopback Detection to load the following page. Figure 6-7 Loopback Detection Config The following entries are
53 Port: Displays the port number. Status: Enable or disable Loopback Detection function for the port. Operation Mode: Select the mode how the swi
54 Tips: 1. Calculate the bandwidth for a LAG: If a LAG consists of the four ports in the speed of 1000Mbps Full Duplex, the whole bandwidth of th
55 Operation: Allows you to view or modify the information for each LAG. • Edit: Click to modify the settings of the LAG. • Detail: Click to get
56 The following entries are displayed on this screen: LAG Config Group Number: Select a Group Number for the LAG. Description: Displays the d
57 Choose the menu Switching→LAG→LACP Config to load the following page. Figure 6-11 LACP Config The following entries are displayed on this screen:
VI Chapter 10 Routing ... 140 10.1
58 member. The port with smaller Port Priority will be considered as the preferred one. If the two port priorities are equal; the port with smaller p
59 The following entries are displayed on this screen: Auto Refresh Auto Refresh: Allows you to Enable/Disable refreshing the Traffic Summary aut
60 Choose the menu Switching→Traffic Monitor→Traffic Statistics to load the following page. Figure6-13 Traffic Statistics The following entries are
61 Statistics Port: Enter a port number and click the Select button to view the traffic statistics of the corresponding port. Received: Displays
62 The address filtering feature allows the switch to filter the undesired packets and forbid its forwarding so as to improve the network security. T
63 The following entries are displayed on this screen: Search Option MAC Address: Enter the MAC address of your desired entry. VLAN ID: Enter th
64 Choose the menu Switching→MAC Address→Static Address to load the following page. Figure 6-15 Static Address The following entries are displayed o
65 MAC Address: Displays the static MAC Address. VLAN ID: Displays the corresponding VLAN ID of the MAC address. Port: Displays the corresponding P
66 Choose the menu Switching→MAC Address→Dynamic Address to load the following page. Figure 6-16 Dynamic Address The following entries are displayed
67 Aging Status: Displays the Aging Status of the MAC address. Bind: Click the Bind button to bind the MAC address of your selected entry to the co
VII 10.9.12 Application Example for OSPF ... 206 10.10 VRRP...
68 Search Option Search Option: Select a Search Option from the pull-down list and click the Search button to find your desired entry in the Filt
69 Chapter 7 VLAN The traditional Ethernet is a data network communication technology basing on CSMA/CD (Carrier Sense Multiple Access/Collision Det
70 packets with the MAC VLAN, Protocol VLAN and 802.1Q VLAN in turn. If a packet is matched, the switch will add a corresponding VLAN tag to it and f
71 (3) GENERAL: The GENERAL port can be added in multiple VLANs and set various egress rules according to the different VLANs. The default egress ru
72 Choose the menu VLAN→802.1Q VLAN→VLAN Config to load the following page. Figure 7-3 VLAN Table To ensure the normal communication of the factory
73 The following entries are displayed on this screen: VLAN Info VLAN ID: Enter the ID number of VLAN. Name: Displays the user-defined name of V
74 Link Type: Select the Link Type from the pull-down list for the port. • ACCESS: The ACCESS port can be added in a single VLAN, and the egress r
75 Step Operation Description 4 Delete VLAN Optional. On the VLAN→802.1Q VLAN→VLAN Config page, select the desired entry to delete the correspo
76 Configure switch B Step Operation Description 1 Configure the Link Type of the ports Required. On VLAN→802.1Q VLAN→Port Config page, confi
77 The following entries are displayed on this screen: Create MAC VLAN MAC Address: Enter the MAC address. Description: Give a description to th
VIII 12.1 DiffServ ... 265 12.1.
78 Step Operation Description 3 Create MAC VLAN. Required. On the VLAN→MAC VLAN page, create the MAC VLAN. For the device in a MAC VLAN, it’s req
79 Step Operation Description 2 Create VLAN10 Required. On VLAN→802.1Q VLAN→VLAN Config page, create a VLAN with its VLAN ID as 10, owning Por
80 7.5 Protocol VLAN Protocol VLAN is another way to classify VLANs basing on network protocol. Protocol VLANs can be sorted by IP, IPX, DECnet, App
81 Choose the menu VLAN→Protocol VLAN→Protocol Group Table to load the following page. Figure 7-9 Create Protocol VLAN The following entries are dis
82 Protocol Group Member UNI T: Select the unit ID of the desired member in the stack. 7.5.3 Protocol Template The Protocol Template should be cr
83 Configuration Procedure: Step Operation Description 1 Set the link type for port. Required. On the VLAN→802.1Q VLAN→Port Config page, set the
84 Network Diagram Configuration Procedure Configure switch A Step Operation Description 1 Configure the Link Type of the ports Require
85 Step Operation Description 4 Create Protocol Template Required. On VLAN→Protocol VLAN→Protocol Template page, configure the protocol templat
86 Protocol type Value LACP 0x8809 802.1X 0x888E Table 7-3 Values of Ethernet frame protocol type in common use This VLAN VPN function is implemen
87 Figure 7-13 Enable Port for VLAN Mapping VPN Port Enable UNI T: Select the unit ID of the desired member in the stack. Select your desired po
Comments to this Manuals