Professional Documents
Culture Documents
Administration Manual
Version 1.8
SWxx-xxPB Administration Manual
FCC Certifications
This equipment has been tested and found to comply with the limits for a Class A digital device,
pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against
harmful interference when the equipment is operated in a commercial environment. This equipment
generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance
with the instruction manual, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause harmful interference, in which case
the user will be required to correct the interference at his own expense.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) this device may not cause harmful interference, and (2) this device must accept any interference
received, including interference that may cause undesired operation.
CE Mark Warning
This equipment complies with the requirements relating to electromagnetic compatibility, EN 55022
class A for ITE, the essential protection requirement of Council Directive 89/336/EEC on the
approximation of the laws of the Member States relating to electromagnetic compatibility.
The company has an on-going policy of upgrading its products and it may be possible that information in
this document is not up-to-date. Please check with your local distributors for the latest information. No
part of this document can be copied or reproduced in any form without written consent from the
company.
Trademarks:
All trade names and trademarks are the properties of their respective companies.
Copyright © 2011, All Rights Reserved
WARNING: TO PREVENT FIRE OR SHOCK HAZARD, DO NOT EXPOSE THIS PRODUCT TO RAIN OR
MOISTURE. THE UNIT MUST NOT BE EXPOSED TO DRIPPING OR SPLASHING WATER. CAUTION: DO
NOT OPEN THE UNIT. DO NOT PERFORM ANY SERVICING OTHER THAN THAT CONTAINED IN THE
INSTALLATION AND TROUBLESHOOTING INSTRUCTIONS. REFER ALL SERVICING TO QUALIFIED
SERVICE PERSONNEL. CAUTION: THIS DEVICE MUST BE INSTALLED AND USED IN STRICT ACCORDANCE
WITH THE MANUFACTURER’S INSTRUCTIONS AS DESCRIBED IN THE USER DOCUMENTATION THAT
COMES WITH THE PRODUCT. WARNING: POSTPONE INSTALLATION UNTIL THERE IS NO RISK OF
THUNDERSTORM OR LIGHTNING ACTIVITY IN THE AREA.
2
SWxx-xxPB Administration Manual
Safety Precautions:
When using this device, always follow basic safety precautions to reduce the risk of fire, electric shock,
and injury to persons, including the following:
Read all of the instructions (listed here and/or in the user manual) before you operate this equipment.
Comply with all warning and caution statements in the instructions.
Retain the instructions for future reference.
Observe all warning and caution symbols that are affixed to this equipment.
Comply with all instructions that accompany this equipment.
Upon completion of any service or repairs to this product, ask the service technician to perform safety
checks to determine that the product is in safe operating condition.
Installation of this product must be in accordance with national wiring codes and conform to local
regulations.
Give particular attention to all safety precautions.
Operate this product only from the type of power source indicated on the product’s marking label. If
you are not sure of the type of power supplied to your home, consult your dealer or local power
company.
It is recommended that the customer install an AC surge protector in the AC outlet to which this device
is connected. This is to avoid damage to the equipment from lightning strikes and other electrical
surges.
Wipe the unit with a clean, dry cloth. Never use cleaning fluid or similar chemicals. Do not spray
cleaners directly on the unit or use forced air to remove dust.
Keep the device away from excessive heat and humidity and keep the device free from vibration and
dust.
Do not directly cover the device, or block the airflow to the device with insulation or any other objects.
3
SWxx-xxPB Administration Manual
Table of Contents
Introduction ............................................................................................................................................ 6
Accessing the Web Administration Interface ........................................................................................... 7
System Configuration Menu .................................................................................................................... 9
Basic Information .............................................................................................................................. 10
Serial Information .............................................................................................................................. 10
User Management ............................................................................................................................. 11
User Safety Management .................................................................................................................. 12
Current Configuration........................................................................................................................ 13
Configuration File .............................................................................................................................. 14
Reset to Factory Default ................................................................................................................ 15
File Upload ........................................................................................................................................ 15
System Reset ..................................................................................................................................... 16
Port Configuration ................................................................................................................................. 16
Common Configuration ..................................................................................................................... 16
Port Statistics .................................................................................................................................... 17
Flow Control ...................................................................................................................................... 18
Broadcast Storm ................................................................................................................................ 19
Port Ratelimit .................................................................................................................................... 20
Protected Port ................................................................................................................................... 20
Learn Limit ........................................................................................................................................ 21
Port Trunking ..................................................................................................................................... 21
Mirror................................................................................................................................................ 25
MAC Binding.......................................................................................................................................... 26
MAC Binding Configuration................................................................................................................ 26
MAC Auto Binding ............................................................................................................................. 27
MAC Filter ............................................................................................................................................. 28
Static MAC Filter Configuration .......................................................................................................... 28
Automatic MAC Auto Filter ................................................................................................................ 29
VLAN Configuration ............................................................................................................................... 30
VLAN Information .............................................................................................................................. 30
4
SWxx-xxPB Administration Manual
5
SWxx-xxPB Administration Manual
Introduction
This manual is written for the system administrator and installer in order to provide detailed information
so that they can properly configure the Pakedge SWxx-xxPB series of switches using the web interface.
It assumes that the reader has familiarity with the design and operation of a network as well as how a
network switch fits into that environment.
This Manual has been written for the 3 main models in the Pakedge PoE line: the SW8-8PB, SW16-16PB
and SW24-24PB. From this point forward, we will refer to the switches as the SWxx-xxPB series of
switches. The SW8-8PB includes 8 10/100 Ethernet Ports with Power over Ethernet (PoE), the SW16-
16PB includes 16 10/100 Ethernet Ports with PoE and the SW24-24PB includes 24 10/100 Ethernet Ports
with PoE. Additionally, all the models include 2 Gigabit Ethernet interfaces with both SFP and RJ-45
interfaces.
In this manual, you will learn in depth on how to configure the SWxx-xxPB series of PoE switches, as well
as what each of the parameters is used for. We will cover the following topics:
6
SWxx-xxPB Administration Manual
The SWxx-xxPB switches also have a command line interface that allows an
administrator to access the switch in case of a web misconfiguration. Please contact
Pakedge Support for the CLI commands manual.
1. Connect the switch to power. Power LED will light and switch fans will start.
2. Connect a PC or laptop to any standard Ethernet Port on the switch.
3. Configure the PC with IP address 192.168.1.10, subnet mask 255.255.255.0. Open a web
browser (The Internet Explorer, Mozilla, and Chrome browsers all work for configuring
the SWxx-xxPB, but Internet Explorer is preferred).
4. Enter the switches default IP address of 192.168.1.205 into the Address Bar and press
<ENTER>
5. A window similar to the one in Figure 1 will appear asking you for a username and
password. Enter admin for the username and leave the password field blank. Then Click
“OK” to be logged into the web administration portal.
Once you have logged in, you may use the web interface ( Figure 2) to configure the switch and customize it for
your environment.
7
SWxx-xxPB Administration Manual
As pictured in Figure 2, you can see a representation of the switch called the Port Quick View at the top
of the web browser. This representation (Figure 3) allows you to see at a glance which ports have a link
established, which ports are disabled, and which ports have their links down. In Figure 3, ports 17 and
21 are connected and have green icons, indicating a status of “Link Up”. The rest of their ports have
nothing connected and show grey icons, indicating those ports have a status of “Link Down”
On the left hand side of the screen, you will see a navigation menu similar to the one shown in Figure 4.
This menu will allow you to navigate to the various configuration screens of the switch. To navigate, you
simply click on the “+” sign next to each folder, thus expanding the configuration category and allowing
you to see the configuration options under each folder.
8
SWxx-xxPB Administration Manual
NOTE: The switch will save every configuration you perform automatically and load it
the next time the switch is rebooted. You DO NOT need to hit the save button after
every change.
Basic Information
Serial Information
User Management
Safe Management
Current Configuration
Configuration File
File Upload
System Reset
In this section, you will learn about the options within each category and what function they perform.
9
SWxx-xxPB Administration Manual
Basic Information
The first option under the System Configuration category is the “Basic Information” page (shown in
Figure 5). This page allows you to see the basic information about the switch. It shows you a
description of the switch, its Object ID, the System Version (i.e. the version of the switch’s firmware), the
number of network ports, and the System start time (which is the amount of time the switch has been
powered up). Those items are not configurable as they are set by the switch itself.
However, there are three parameters the administrator can edit. They are:
System Name – This is a unique name you can give the switch.
System Location – This is a field that allows you to enter the location of the switch. Depending
on your network standards, you could enter the location of the switch within the building or
pinpoint the building and closet within your entire company.
System Contact – This is the information about whom to contact for questions about this
switch. It is an open text field, so you can enter names, addresses, phone numbers, email
address or any other pertinent information about the person or persons to contact about this
switch.
Serial Information
This page displays the current configuration of the switch’s administrative Serial Port. However, it does
not allow configuration of the serial port. Essentially, you need to configure your computer’s serial port
with these settings and then connect a serial cable between the switch’s serial port and the one on your
computer to have access to the switch’s Command Line Interface.
10
SWxx-xxPB Administration Manual
User Management
Although the web interface comes with a default user (admin) with no password, it is considered proper
networking practice to change the default password. In addition, it is recommended to add separate
user accounts for each person who will be administrating the switch.
The User Management screen (shown in Figure 6) allows the administrator to both change the password
for the user “admin”, and create additional users as well.
If the default password has already been changed to something else and you want to
change it again, you must first enter the old password in the field next to “Old
password” then continue on to enter the new password twice.
11
SWxx-xxPB Administration Manual
In addition to changing the admin user’s password, it is also possible to allow new users to access the
Web Administration interface. There are two types of users: common and privilege.
1. Select their user # from the drop down list in the “item” column.
2. Edit the parameters you wish to change
3. Click “Apply” to save the settings
1. Select their user# from the drop down list in the “item” column
2. Click the “Delete” button
3. Click the “Refresh” button to ensure the user has been deleted
This configuration page of the switch allows management of the switch to be restricted to a particular
range of IP addresses and a particular protocol (as shown in Figure 7). This is particularly useful if you
have this switch on the public side of your internet connection and need to restrict access to the vital
functions of the switch.
12
SWxx-xxPB Administration Manual
This feature uses ACL groups, which are defined IP networks and allow/deny rules. Creating ACL Groups
can be found on page 39 of this manual. In the User Safety Configuration page, when you configure a
protocol type, you will use an ACL group to determine whether or not a particular IP address group can
access a particular service. For example, if you want that rule to govern how http access is denied or
granted, simply select “http” under the column “server type”, then select “Enable” under the
“Management State” column. Finally, assign an ACL group that defines which IP addresses or address
ranges are governed by this rule by typing the number of the ACL Group in the “ACL Group” column and
click “Apply”.
Only one ACL group is allowed per protocol. If multiple addresses ranges need to be
defined, put them all into a single ACL. Also, be sure you understand what the
particular ACL you are using allows and denies as it is possible to deny yourself access
to the switch you are managing.
Current Configuration
The primary purpose of the current configuration page, as shown in Figure 8, is two-fold:
1. It is used to view the current configuration of the switch.
2. It is used to save the current configuration to permanent memory, thus making it the configuration
that is loaded when the switch powers up.
Once you are finished configuring the switch, navigate to the Current Configuration page and click
“Save”.
13
SWxx-xxPB Administration Manual
Configuration File
The Configuration File page allows you to download the saved configuration to a file on your computer
for archival purposes. If you were to keep multiple copies over time, you could roll a configuration back
to an earlier version.
As you can see in Figure 9, the page displays the configuration you are going to download. If you want
to download the configuration that is in memory, you must save the current configuration file first, as
discussed in the last section, before downloading it.
14
SWxx-xxPB Administration Manual
TIP: Download the configuration file before deleting the configuration. That way, if you have to
restore it, you have a backup.
File Upload
The “File Upload” page of the Web Administration Interface (Figure 10) will allow you to upload a saved
configuration file that contains the specific configuration for the switch you are configuring. It will also
allow you upload an updated firmware for the switch to increase capabilities or to fix software errors.
The switch determines whether the file is a configuration file or a firmware update, based on the
three letter file extension. Make sure that the file you are uploading has the correct three letter
extension before uploading as uploading the wrong file can have serious consequences, including
corrupting or crashing the switch.
To upload a file:
1. Click the “Browse” button to locate the file on your computer you wish to upload.
2. Click the “Upload” button.
3. WAIT FOR THE UPLOAD TO FINISH – interrupting the upload could cause problems with the
switch configuration.
4. Once the upload has been completed, reboot the switch for the new firmware or configuration
to take effect.
Note: if your configuration file changed the IP address of the switch, make sure to log into the
switch with the new IP address once the configuration file has been uploaded.
15
SWxx-xxPB Administration Manual
System Reset
As its name suggests, the System Reset button is simply resetting the switch (i.e. rebooting the switch).
This will cause the configuration that was last saved to ROM to load (you will lose any changes not
saved).
Once you are ready to reboot the switch click “Reset”. The switch will reboot and load the configuration
file shown in the “Configuration File” section.
Port Configuration
The Port Configuration category contains all the settings and information regarding a particular port.
You can view the status of particular port, as well as enable a particular function for that port.
Common Configuration
Port Statistics
Flow Control
Broadcast Storm
Port Ratelimit
Protected Port
Learn Limit
Port Trunking
Mirror
In this section you will learn about the settings for each category and what functions they perform.
Common Configuration
The “Common Configuration” label could also be called the “Basic Port Configuration” as it allows the
switch administrator to view and change the basic port configuration of the switch.
The table shown in Figure 12 lists each port and its current configuration. You can use the settings at
the top of the page to configure the state of an individual port (Up or Down) as well as the Port
Communication Rate.
16
SWxx-xxPB Administration Manual
In order to change the settings for a particular port, select it from the drop down list next to the “Port:”
field at the top of the page and then set the “State” and “Set Rate” of that port.
Port Statistics
The port statistics page allows you see individual port transmission and reception statistics. To see a
particular port’s statistics, select it from the “Port:” drop down list. Once you do that, the statistics for
that port will show on the screen (as shown in Figure 13).
17
SWxx-xxPB Administration Manual
Flow Control
Flow control is the method by which the switch prevents a sender from sending more data than the
receiver can handle. Flow control can be enabled on a port to allow the switch to manage the
throughput of the connection of the devices on that port. Figure 14 shows the Flow Control Page.
To enable flow control for a particular port, simply select the port from the drop down list next to
“Port:”. Once you have selected the port, you can select “On” or “Off” from the drop down list next to
“Flow Control” and click the “Apply” button.
18
SWxx-xxPB Administration Manual
Broadcast Storm
This page (as shown in Figure 15) allows the administrator to configure port-by-port configuration of the
settings that prevent broadcast storms.
Figure 15 shows the table that displays the status of each broadcast storm-related setting for each port.
In this table, you can see the following settings:
Port Name – This column indicates the port name whose setting you are viewing.
Broadcast Suppression – This column indicates the current broadcast suppression settings for
the designated port. When enabled, the switch will sense if too many broadcasts are being
received on the designated port and prevent broadcasts from the specified port for a short
period of time until the number of broadcasts falls below a preset threshold.
Multicast Suppression – This column indicates the current multicast suppression settings for
the designated port. It functions similar to broadcast suppression, except the thresholds are for
multicast packets instead of broadcast packets.
DLF Suppression – This column indicates the current setting for DLF suppression for the
designated port. When enabled, the port will not forward DLF frames (for MAC address lookup
on a Destination Lookup Failure) to other ports
Rate Limit – This column indicates the maximum transmission rate for a particular port during a
broadcast storm detection
To change any of these settings, select the port whose value you wish to change from the drop down
list next to “Port:”, then choose the settings you want for the different columns from their respective
drop down lists, and click “Apply”.
19
SWxx-xxPB Administration Manual
Port Ratelimit
Port Ratelimit is used to configure a port-by-port maximum send and receive rate. An example of the
Port Rate Limit page is shown in Figure 16. By default, all ports have rate limit set to off, unless explicitly
changed.
1. Select the port you want to enable rate limiting for from the drop down menu next to “Port:”
2. To enable transmission rate limiting, in the field next to “Sent Packets Rate Control” enter a
number for the maximum rate of transmission in Kbps (e.g. for a 10Mbps maximum
transmission rate, you would enter 10000 in this field).
3. To enable receive transmission rate limiting, in the field next to “Receive Packets Rate Control”
type a number for the maximum rate of reception for this port, in Kbps.
4. Click “Apply” to make the changes active
Protected Port
A protected port is one that can only communicate with an unprotected port. It cannot communicate
with other protected ports. You can enable protected and unprotected ports on a port-by-port base.
20
SWxx-xxPB Administration Manual
To enable a port as a “protected” port, navigate to the “Protected Port” page, and check the box next to
the port you want to turn into a protected port. Then click the “Protect” button.
Learn Limit
Layer 2 Ethernet switches work by learning all the MAC addresses attached to specific ports using the
ARP protocol. There are cases when there might be a lot of nodes connected to a port, and the ARP
database can grow quite large, therefore slowing the performance of the switch.
The page shown in Figure 18 allows you to limit the maximum number of MAC addresses that can be
learned on a particular port.
By default, all ports have a limit set to “8191” which means that there is no limit. However, the
maximum number of address can be changed on a port-by-port basis. Select the port you wish to limit,
enter the maximum number next to “MAC Address Num Able To Learn” and click “Apply”.
If you already have a limit on a port and wish to remove the limit, select the port and click “Cancel Limit”
Note: Gigabit ports do not support Learn Limit.
Port Trunking
Often you will need to configure links between multiple switches for greater bandwidth, load balancing,
or redundancy. The SWxx-xxPB switches support port trunking to enable these features for the switch.
It is important to note that the trunked ports must be connected to another switch
that supports the same methods of trunked ports as the SWxx-xxPB switches.
21
SWxx-xxPB Administration Manual
Although the Trunking Configuration Page (shown in Figure 19) may look daunting, it’s really easy to
configure. You can have up to three trunk groups set up per switch. The three trunk groups will show
their status on this page. A status of “Created” means that trunk group is already configured. A status of
“Uncreated” means you can use that trunk group ID to create a new trunk group.
The trunk group “0001” shown in Figure 19 shows it has been “created” and it has 3 members: fe1, fe3,
and fe5. Those ports will operate together as one aggregated port.
To create a trunk group you must understand the three types of port trunking that are used in this
switch: Source-MAC, Destination-MAC, and Source-and-Destination-MAC trunking.
Port Trunk
fe0
PC
Server
SWxx-xxPB SWxx-xxPB
22
SWxx-xxPB Administration Manual
As an example in Figure 20, there is a PC connected to a server through two switches that are port
trunked together. Each of the three ports on the switch is connected to its corresponding numbered
port on another switch.
With source-MAC address trunking, the packets coming in to the trunk are distributed across the ports
based on the source MAC address. To provide load balancing, packets from the different hosts
connected to the switch use different ports that are part of the trunk. However, each source host will
always use the same port in the channel. For example, with the network setup shown in Figure 21, and
Switch A using source-MAC trunking, the switch would determine which hosts go over which channels.
The host connected to port fe7 would go over channel fe0, while the port attached to fe4 would go over
port fe2. Every time these hosts sent a packet, it would go over the same trunk.
fe7
Port Trunk
fe0
PC
Server
SWxx-xxPB SWxx-xxPB
Switch A Switch B
With destination-MAC based forwarding, a similar thing happens, only in reverse (as shown in Figure
22). If the trunk on switch A is configured with destination-MAC forwarding, it will send packets down
ports for the trunks based on the MAC of the destination, hence if the PC in Figure 22 is sending data to
multiple servers, each time it talks to a different server, it will use a different trunk in the port trunk.
fe7
Port Trunk
fe0
PC
Server
SWxx-xxPB SWxx-xxPB
Switch A Switch B
fe9
23
SWxx-xxPB Administration Manual
Finally, in source-and-destination trunking (shown in Figure 23) the switch will distribute the traffic
among the different channels, allowing load balancing among all the channels. For example, when a
particular PC talks to a particular server, it will use one channel, but when that same PC talks to the
same server again, it might use a completely different port channel.
fe4
fe7
PC
Port Trunk
fe0
fe1 fe5
fe7 fe2
Server
PC SWxx-xxPB SWxx-xxPB
Switch A Switch B
fe9
fe9
PC
When configuring trunking on a switch, select the group number, the ports that belong to that group,
and the type of trunking it uses.
1. Navigate to the Port Trunking Configuration page. Under “Trunk Group ID” type the number of
the trunk group you wish to create (e.g. 0002) and click “Create Trunk Group”.
2. Type the number of the trunk group in the “Trunk Group ID” box, then select the port(s) that
you wish to be part of the trunk group and click “Member Port =>”.
3. Select the trunk group in the “Trunk Group ID”, then select the Trunk method from the drop
down list, and click “Set Trunk Method”.
Note: There are a total of three trunks available to be used. Trunks 1 and 2 can be
used with any of the regular Ethernet ports, and trunk 3 is the only trunk available to
be used with the two Gigabit ports.
24
SWxx-xxPB Administration Manual
Mirror
The Mirror Category allows you to set up a port or ports that Mirror the traffic on a particular port to
another port on the same switch. This would be important if you were monitoring traffic on a particular
port, but needed access to all the traffic directly (instead of filtered by the switch). In the SWxx-xxPB
interface, the configuration interface looks similar to the one in Error! Reference source not found..
A port cannot be both a “listened to” and “listening” port at the same. You can have
one listening port that listens to multiple “listened to” ports.
The column labeled “Listened Port” is the port you will be using to send duplicated information too.
The “Able Config Port” column is the port(s) you want to mirror to the “listened port name”. The
“Listen Direction” is which type of packets the system will listen to. The type of listen direction options
you have are:
25
SWxx-xxPB Administration Manual
TO SET UP PORT MIRRORING, you need to know two things: which port the duplicated packets will be
sent to and which ports to listen to.
Note – The station doing the monitoring must be plugged into the port you type into
this field or you will not be able to use it.
3. Click on the port you want to mirror by clicking on its entry in the “Able Config Port” column.
4. Select the listen direction from the drop down list.
5. Click “Apply”.
Repeat this procedure using the same “Listen Port” and a different “Able Config Port” to listen to
multiple ports.
MAC Binding
In a layer 2 switch, the switch has to learn all the MAC addresses that are located on a particular port.
The SWxx-xxPB series of switches have a function known as MAC Bind Configuration. This feature allows
the administrator to specify manually which MAC addresses are on a particular port, or particular VLAN
ID, thus decreasing the time it takes for the switch to switch packets efficiently.
This category controls the binding of MAC address to ports for the SWxx-xxPB. There are two main
methods of doing this:
Static Binding
Automatic Binding
26
SWxx-xxPB Administration Manual
1. Navigate to the “MAC Auto Bind” under the “MAC Binding” category in the web administration
interface.
2. Select the port you wish to view MAC Addresses for from the drop down list next to “Port:”
3. The list of MAC addresses will be displayed along with the VLAN ID they are associated with.
27
SWxx-xxPB Administration Manual
MAC Filter
MAC Filtering is the technology by which specific network devices on specific switch ports will be denied
access to the rest of the network. Each port will have a list of MAC addresses that are “disallowed”
access. This list is often called a blacklist.
It is important to remember that MAC filtering will prevent the entire device from
communicating on that port. It does not do user-by-user communication permissions.
28
SWxx-xxPB Administration Manual
1. Navigate to the MAC Filter Configuration page under the “MAC Filter” menu.
2. Select the port you wish to enable the filter for from the drop down menu next to “Port:”.
3. In the box next to “MAC Address”, type the MAC address of the device you wish to filter. It
must be 12 hexadecimal digits in the format XXXX.XXXX.XXXX.
4. In the box next to “VLAN ID” type in the number of the VLAN that the particular MAC Address is
configured for. If there are no VLANs, enter “1” (the default VLAN).
5. Click “Apply” to enable the filter.
1. Navigate to the “MAC Filter Configuration Page” under the “MAC Filter” menu.
2. In this list of filtered MAC addresses, click the checkbox next to the MAC filter you want to
delete.
3. Click “Delete”.
4. If you wish to delete all the filters at once, click the “Select-all” button, followed by the “Delete”
button.
29
SWxx-xxPB Administration Manual
VLAN Configuration
VLANs (“Virtual LANs”) allow you to set up multiple sub-networks within multiple switches, thus
partitioning the broadcast traffic in one network from propagating to the other nodes. The SWxx-xxPB
series of switches has the ability to have multiple VLANs configured as well as to participate in a network
that already has VLANs set up through a router.
VLAN Information
The VLAN Information Page (shown in Figure 29) allows you to see the VLANs that are configured within
the switch and the ports that belong to the configured VLANs. By default, you should see a screen
similar to the one in Figure 29. The column “VID” refers to the VLAN ID (in this case, VLAND ID #1, which
is the default VLAN). The “State” column shows if the VLAN is active or not. The final column shows the
ports that are a member of the particular VLAN as well as whether they are tagged or untagged
members.
30
SWxx-xxPB Administration Manual
One thing that should be mentioned in more detail is the difference between tagged and untagged
ports. A port that is set to “Tagged” means that all data that passes through that port will be tagged
with the corresponding VLAN ID.
The other option is “Untagged”. This means that the VLAN ID information on the packet has already
been tagged by the sender, so the port recognizes the tagging and passes the packets to the other ports
that participate in the same VLAN.
1. Navigate to the “Static VLAN Configuration” page under the “VLAN Configuration” menu.
2. Type in a VLAN ID number (any number from 2 to 4094 that isn’t already in use).
3. Click “Apply” (The switch will auto populate the “name” field).
VLAN1 cannot be deleted as it is the default VLAN for all ports that don’t have a
specific VLAN.
31
SWxx-xxPB Administration Manual
Access port – a tagged port which means that whatever device is connected to this port will be
connected to only the VLAN specified for that port.
Trunk port – means that it can have multiple VLANs configured on it and that the packets crossing it are
tagged with information telling them what VLAN they belong to.
Hybrid port – is a combination of an access port and a trunk port. A hybrid port lets you tag a device with
a specific VLAN and at the same time allow other VLANs to communicate with this device.
32
SWxx-xxPB Administration Manual
Let’s look at an illustrated example of the different types of ports. Figure 31 provides a network
configuration example that you may use as a guide to configure the switches on your network properly.
33
SWxx-xxPB Administration Manual
Figure 32 is an example of the VLAN Port Configuration page for the SWxx-xxPB series of switches. This
page allows you to configure which ports directly belong to which VLANs (“untagged” ports) and which
ports have hosts that send their own tagged packets (“tagged” ports).
1. Create the VLAN as described in the previous section about “Static VLAN Configuration”.
2. Select the port you wish to configure from the drop down list under the “Port” column.
3. Select Access from the drop down list in the “Model” column.
4. Select the specific VLAN this port will be a member of (By default, the port will show up under
the “Port Members” column with the (p)(u)vlan1 designation. That means that the port is in
vlan1, p=default VLAN member, u=untagged member).
5. Click the “Default VLAN =>” button to assign that VLAN to that port.
6. If you need to remove a port from the configured VLAN, select the port, and then choose the
“unMember <=” button for the corresponding VLAN.
1. Create the VLAN as described in the previous section about “Static VLAN Configuration”.
2. Select the port you wish to configure from the drop down list under the “Port” column.
3. Select Trunk from the drop down list in the “Model” column.
4. Select the specific VLANs this port will be a member of.
34
SWxx-xxPB Administration Manual
5. Click the “tagged =>” button to assign the VLAN(s) to that port.
6. If you need to remove a port from the configured VLAN, select the port, and then choose the
“unMember <=” button for the corresponding VLAN.
Note: Use Trunk ports to connect the SWxx-xxPB switches with each other
1. Create the VLAN as described in the previous section about “Static VLAN Configuration”.
2. Select the port you wish to configure from the drop down list under the “Port” column.
3. Under the model dropdown select Hybrid, under Current VLAN highlight vlan1 and then click
“Default VLAN.” (Make sure vlan1 is an untagged member of the port).
4. Now click on the next VLAN in the list under “Current VLAN”, and then click on “tagged.” You
will need to do this for all remaining VLANs in the “Current VLAN” list that you want to use with
this port. You can also highlight all the VLANs at once and click “tagged” to make them all
members of the port.
5. You may repeat this process to configure any necessary ports the same way in the switch.
6. If you need to remove a port from the configured VLAN, select the port, and then choose the
“unMember <=” button for the corresponding VLAN.
SNMP Configuration
Almost every network device has at least some implementation of SNMP. SNMP stands for Simple
Network Management Protocol. It is used with network management programs as the protocol to
monitor various network entities.
There are two major categories of settings for the SWxx-xxPB switches:
In this section you will learn how to configure each section properly for use with SNMP management
Note: There is also a community name known as “Public” that allows any host to send
SNMP commands and receive SNMP data.
35
SWxx-xxPB Administration Manual
In addition, each device can be configured as either read or read/write within a particular community.
This means that hosts that are set as “Read Only” in that particular community can only be read by an
SNMP manager – therefore no changes can be made to that host through SNMP. “Read/Write” allows
an SNMP management console to make changes to a device, providing it has the proper community
name.
Server2
Community: NetworkTest
SNMP Management
Server / Console #1
Community: Network1
BOB_PC
Communitiy:NetworkTest
SNMP Management
Server / Console #2
Community: NetworkTest
Server1
Community:Network1
With the SWxx-xxPB switches, you can configure the switch to be part of different communities with
different Read/Write settings. Figure 34 shows the SNMP Community Configuration page. From this
page, you can designate which Community the switch is part of and what rights the hosts have for this
switch within the community. As you can see in this figure, there is currently only the default
community, Public, that has ReadOnly permissions to the switch.
36
SWxx-xxPB Administration Manual
In order to configure the switch to use specific communities with specific security, you must do the
following:
1. Navigate to the “SNMP Community Configuration” page under the “SNMP Configuration” menu
2. Under the “Item” column, make sure that “New” is selected from the drop down list.
3. Type the name of the community to be configured in the column “Community Name”
4. Choose the Read/Write Settings from the drop down menu in the “Read/Write” column.
5. Click the “Apply” button.
That will add an entry to the SNMP list. You will notice that the numbers in the “Item” column are
automatically sequentially numbered.
1. Navigate to the “SNMP Community Configuration” page under the “SNMP Configuration” menu.
2. Under the “Item” column, make sure that the item# is selected from the drop down list.
3. Click the “Delete” button
You can only create or delete a community name. You can’t change an existing
community name. If you would like to change the settings for a community, you must
delete it first and then recreate it.
TRAP Target
With SNMP, communications can happen one of two ways:
Bidirectional - an SNMP console makes requests of the device and it responds back with the
requested information.
Traps - This is a one-way device-initiated communication. If the device is experiencing a failure
or major issue, it can send a notification directly to an IP address set up to receive these events.
The SWxx-xxPB has the ability to send SNMP traps to multiple IP addresses (known as “Trap Targets”)
using the TRAP Target Configuration page (shown in Figure 35).
37
SWxx-xxPB Administration Manual
3. Enter the name of the Trap target in the field shown in the “Name” column.
4. Enter the IP address of the target that will receive the Trap events in the field under the column
heading “Transmit IP Address”.
5. Select the version of SNMP that the Trap Target uses from the drop down list under the column
labeled “SNMP Version”. This needs to match the version of SNMP that your Trap target is
using.
As with SNMP Communities, you can only create or delete SNMP Traps. If you would
like to change the Trap configuration, you must delete the one you would like to
modify, and then recreate it.
ACL Configuration
In order to provide additional security, the SWxx-xxPB has a feature known as Access Control Lists (ACL).
These are lists of hosts or networks that are grouped together to allow or deny access. For example,
you could configure an ACL that only allows one host. ACLs are also used by other modules (like User
Management) to provide security for that module.
For example, you may want to define that all stations in a particular ACL group may not access a
particular feature. Configure an ACL Group (designated arbitrarily as 45). Let’s say that this ACL
contained rules that allowed traffic from the network 10.10.10.0 but denied traffic from the network
10.9.8.0. When you apply the ACL in this example, only hosts within the defined IP range 10.10.10.0
would be able to use that feature and any hosts in the network 10.9.8.0 would be denied.
Standard IP
The ACLs are configured on the switch using the ACL Standard IP Configuration page (as shown in Figure
36). As discussed, each ACL is a group of rules that denies or allows access to an IP host or a range of IP
hosts. These groups of rules are assigned a Group# that can be referenced from other modules.
38
SWxx-xxPB Administration Manual
As shown in Figure 36, this particular ACL group has 2 rules: deny from all hosts in 192.168.0.0 network,
and deny from all hosts in the 192.168.1.0 network. If these rules were applied as a web management
rule for the switch, all hosts but these two ranges would be able to access the management interface.
In order to create an ACL:
1. Navigate to the “ACL Standard IP Configuration” page under the “ACL Information” menu.
2. Choose a group number (1 through 99) to view or configure from the drop down list next to
“ACL Standard Source IP Group”.
3. If the group number you have chosen has been previously configured, the settings will show up
on the screen. If not, you will be able to configure new rules.
4. Enter an IP address network designation for the host(s) to allow or deny in the field next to
“Source IP Address” and
5. Enter the mask in the field next to “Source Wildcard”. The source mask indicates which portion
of the address designates the hosts. It is designated in the reverse of a subnet mask. For
example, if you want to designate the network of 192.168.1.0 with a subnet mask of
255.255.255.0, enter “192.168.1.0” in the Source IP Address field and “0.0.0.255” in the Source
Wildcard field.
6. Choose the radio button that designates whether this host address or host address range is for
Allowing packets from that range, or Denying packets from that range by choosing “Permit” or
“Deny”, respectively.
7. Click “Add”.
8. Repeat steps 2-6 to add more ranges.
When deleting all entries in an ACL group, click "Select-all" first, then click "delete”.
When delete multiple roles, you cannot select more than 30 roles at a time.
39
SWxx-xxPB Administration Manual
ACL Information
The ACL Information page (Figure 37) is found under the ACL Configuration Menu. Its primary function
is to display all the ACL groups and their configurations in one convenient location.
IP Basic Configuration
Most networks today use the TCP/IP protocol as the protocol used for network addressing. In order to
communicate on a TCP/IP network, each network device would need its own unique TCP/IP address.
In this section you will learn about the various Web Administration pages that deal with the IP
Configuration of the SWxx-xx-PB switches, including:
IP Address Configuration
ARP Configuration
Static Route Configuration
IP Address Configuration
In order to manage the SWxx-xxPB switches via the Web Interface, the switch needs to have at least one
IP address. By default, there is one IP address on VLAN 1: 192.168.1.205 with a subnet mask of
255.255.255.0 (i.e. a 24 bit subnet mask). To assign an IP address to a different VLAN, you can use this
screen (Figure 38) to do so:
40
SWxx-xxPB Administration Manual
41
SWxx-xxPB Administration Manual
At the bottom of the page, you will see the list of associate IP addresses and MAC addresses as well as
the type of association (dynamic or static). The difference between dynamic mapping and static
mappings is that dynamic mapping takes time to build the associations automatically on switch boot up.
Static mapping is already in the cache and ready to be used, thus increasing performance.
To create a Static ARP entry:
1. Navigate to the “ARP Configure and Display” within the “IP Address Configuration” menu.
2. Enter the IP address of the entry you wish to create in the “IP Address” field in the “Static ARP
Item configuration” section.
3. Next to the “MAC Address” in the same section, enter the MAC address of the entry (in the
format of XXXX.XXXX.XXXX).
4. Click the “Add”.
1. Navigate to the “ARP Configure and Display” within the “IP Address Configuration” menu.
2. Select the ARP List item from the drop down menu next to “ARP List Item”.
3. Type in the IP address for the entry next to “IP Network Segment”.
4. Click the “Apply” button.
42
SWxx-xxPB Administration Manual
1. Navigate to the “ARP Configure and Display” within the “IP Address Configuration” menu.
2. Select the ARP item (static or dynamic) from the drop down list next to “ARP Item”.
3. Enter the IP address of the entry you wish to delete in the field next to “IP Address (IP Network
Segment).
4. Click the “Delete” button.
This is done through the Host Static Router Configuration page shown in Figure 40.
1. Navigate to the “Host Static Router Configuration” within the “IP Address Configuration” menu.
2. Type the destination network IP address designation with a CIDR bit mask (e.g. 192.168.0.0/24 is
like entering a subnet mask of 255.255.255.0) into the field under the label of “Target
Address/Subnet Prefix”.
3. Enter the IP address of your router into field under the “Next Hop” label.
4. Click the “Apply” button.
AAA Configuration
One switch item that can be important for access is the use of Authentication, Authorization, and
Accounting (AAA) services. The configuration for these items can be found under the “AAA
Configuration” menu of the left hand side of the Web Administration page. AAA servers allow a single
point of authorization and access to network devices. In other words, you could have one username
and password that would allow you to access the administration interface of these network devices.
43
SWxx-xxPB Administration Manual
RADIUS Configuration
RADIUS is an acronym for Remote Access Dial-In User Server. It was developed as a centralized
management server for all the different types of remote access methods (dial-up modems, network
access, broadband, etc.) so that all methods could contact a central repository of user authentication
data, including permissions, usernames, passwords, etc.
The SWxx-xxPB switches have the ability to use RADIUS servers to authenticate access to the switch.
They also have the ability to send accounting data about user activity to a centralized server. The screen
that allows you to configure these options is shown in Figure 41
There are several settings on this page, each of which performs a specific function. These settings
include:
Primary Server - This is the primary RADIUS server used for authentication and accounting.
Option Server - This is the secondary or backup server that is used in case the primary server
can’t be contacted.
UDP Port - This is the UDP port that the switch will use to communicate with the RADIUS server.
Most RADIUS servers (including Windows) use UDP port 1812 for authentication. However, the
switch allows you to configure the UDP port your system uses for authentication.
Accounting - This selection allows you to enable or disable accounting tracking. By default it is
enabled. You can disable it by selecting “Disable” from the drop down list and clicking “Apply”.
Accounting UDP Port - Use this port to contact the accounting server. As with the
authentication port, you can change it. Usually the default UDP port is 1813.
44
SWxx-xxPB Administration Manual
Shared Key - Use this key to encrypt traffic between the switch and the RADIUS server. Both the
switch and the RADIUS Server must have the same shared key in order for encryption to work
properly. To configure the shared key, type in the key and click “Apply”.
Vendor - Use this field to enter notes about the vendor of the switch that are sent to the
RADIUS server.
NAS Port - Use this port to contact the Network Authentication Server (NAS).
NAS Port Type - Use this field to contain the number of the IETF definition of the type of
physical port using the NAS. Table 1 lists the port types:
NAS Port
NAS Port Type Description
Type #
0 Async
1 Sync
2 ISDN Sync
3 ISDN Async V.120
4 ISDN Async V.110
5 Virtual
6 PIAFS
7 HDLC Clear Channel
8 X.25
9 X.75
10 G.3 Fax
11 SDSL - Symmetric DSL
12 ADSL-CAP - Asymmetric DSL, Carrierless Amplitude Phase Modulation
13 ADSL-DMT - Asymmetric DSL, Discrete Multi-Tone
14 IDSL - ISDN Digital Subscriber Line
15 Ethernet
16 xDSL - Digital Subscriber Line of unknown type
17 Cable
18 Wireless - Other
19 Wireless - IEEE 802.11
20 Token-Ring
21 FDDI
22 Wireless - CDMA2000
23 Wireless - UMTS
24 Wireless - 1X-EV
25 IAPP
26 FTTP - Fiber to the Premises
27 Wireless - IEEE 802.16
45
SWxx-xxPB Administration Manual
NAS Service Type - This is the number of the service type requested and the function it
performs. For example, a service type of 1 indicates that the switch will use RADIUS to allow or
disallow logins to the switch. However, with other types of services like modem access or
broadband connections, the RADIUS server will behave differently. For this switch, it is
recommended to use Service Type 1. Table 2 lists the most commonly used NAS Service-types.
NAS Service
Type NAS Service Type Description
Number
1 Login
2 Framed
3 Callback Login
4 Callback Framed
5 Outbound
6 Administrative
7 NAS Prompt
8 Authenticate Only
9 Callback NAS Prompt
10 Call Check
11 Callback Administrative
12 Voice
13 Fax
14 Modem Relay
15 IAPP-Register
16 IAPP-AP-Check
17 Authorize Only
18 Framed-Management
Table 2: List of NAS Service Types
46
SWxx-xxPB Administration Manual
Roaming – This setting indicates whether the requests to the RADIUS server will allow roaming
to users and resources on other RADIUS servers.
1. Navigate to the “RADIUS Configuration” page under the “AAA Configuration” page.
2. Fill out the parameters in the appropriate fields as discussed above.
3. Click “Apply” to save the changes.
802.1x Configuration
802.1x is a standards-based technology that allows or disallows connections to a switch and is
configured on a port-by-port basis. Access to the port is based on various rules and authentication
parameters.
There are three primary pages that are used for 802.1x configuration. The first page is “802.1x
Configuration” (shown in Figure 42).
The page allows you to configure the general settings of 802.1x on this switch. These parameters
include:
802.1x - This setting allows you to enable or disable 802.1x on the entire switch. To enable or
disable, simply select the proper option from the drop down menu next to “802.1x”.
802.1x Extended - This setting enables the extended feature set for 802.1x.
47
SWxx-xxPB Administration Manual
Re-authentication - This setting forces the port to reauthenticate periodically. The values are
either “Enable” or “Disable”. If enabled, the switch will force reauthentication periodically.
Quiet Period - This setting controls the number of seconds that the switch remains in the quiet
state following a failed authentication exchange with the client. Given in seconds.
Tx-Period - This setting controls the number of seconds that the switch waits for a response to
an EAP-request/identity frame from the client before retransmitting the request.
Server Timeout - This setting controls the amount of time the switch waits for a reply before
retransmitting the response to the server when relaying a response from the client to the
authentication server.
Supplicant Timeout - This setting control how long the port waits for a response when relaying a
request from the authentication server to the supplicant before resending the request.
Max Request - The setting controls the maximum number of times that the device sends an
EAP-request/identity frame (assuming no response is received) to the supplicant before
restarting the authentication process.
Re-auth Max - This setting limits the maximum number of times that the device retransmits
reauthentication requests to the supplicant on an interface before the session times out.
Client Version - This setting allows the switch to check the version and validity of the 802.1x
client running on supplicant systems to prevent those that use earlier versions of 802.1x client
or illegal clients from logging in.
Check Client - Regularly checks for valid packets from the client.
Port Num – This setting allows you to choose which port you wish to configure.
Port Mode – This is to set the port authorization mode. There are three settings: Auto, Force
Authorized, and Force Unauthorized.
a. Auto mode means the particular port will function in true 802.1x, that is to say, it follows the
dynamic authorization model.
b. Force Authorized, on the other hand, when set, means that the port is always authorized.
Essentially, it means that the port is not participating in 802.1x.
c. Force Unauthorized prevents a port from becoming authorized, even if it has proper credentials.
It effectively disables the port.
Support Host Num – Sets the maximum number of hosts allowed on this port. Default is 100.
48
SWxx-xxPB Administration Manual
49
SWxx-xxPB Administration Manual
MSTP Configuration
MSTP stands for Multiple Spanning Tree Protocol (MSTP). It is based on The Spanning Tree Protocol
(STP) which is used by networks that have multiple bridges to provide redundant links without causing
bridging loops. As you may already know, most switches at the lower layers are simply multiport
bridges. The STP protocol operates in multiple connected switches in the same way as having multiple
bridges on a LAN segment. The MSTP protocol is basically STP, but can operate over multiple VLANs.
In order to configure MSTP on the SWxx-xxPB switches, you must configure two main items: General
MSTP Configuration and MSTP Port Configuration.
MSTP Configuration
The MSTP Configuration page (Figure 45) allows you to configure general MSTP settings. These settings
are switch-specific (as opposed to port-specific) and affect how MSTP operates on this particular switch.
The settings you can configure for this switch include:
MSTP – This setting enables or disables MSTP for the entire switch. To change, simply select the
option you wish to use (Enable or Disable) from the drop down list next to “MSTP:” and click
apply.
Priority – This is the priority of this switch within the overall network topology. Switches with
lower number priorities are considered more likely to become the root bridge. By default, this
switch will have a priority of 32768, which means it will be very unlikely that this switch will
become the root bridge.
Portfast Bpdu-Filter – Portfast is a technology whereby a port skips the process of negotiating
and learning its role in the MSTP protocol, and skips right to the “Forwarding” state. BDPU
filtering allows a port to filter whether or not BDPU messages are sent on that specific port. For
example, ports that have hosts connected directly to them should have BDPU filtering on, but
“Trunk” or “Root Facing” ports should have it disabled. This setting determines whether or not
you can use that setting at all. The default setting is Disabled.
50
SWxx-xxPB Administration Manual
Portfast Bpdu-Guard – If a host port (i.e. a non- “root-facing” port) receives a BDPU message, it
can cause potential switching loops because the switch thinks that there is more than one path
to a bridge and tries to find out where it is. With Portfast BPDU-Guard enabled – if a BDPU
message is received on a host port, the port is disabled and must manually be put back into
service.
Forward-Time – This is the amount of time, in seconds, a port waits before changing from its
learning and listening states to its forwarding state. The default is 15 seconds.
Hello-Time – interval in ms between how long hello messages are sent.
Errdisable-Timeout – If enabled, allows the automatic change of a port from “Errdisable” back
to “Forwarding”. Otherwise, the port has to be manually re-enabled.
Errdisable-Timeout Interval – How long the switch waits before automatically changing a port in
the “Errdisable” state back to a “Forwarding State”.
Max-Age – This setting controls the maximum length of time passed before a bridge port saves
its configuration BDPU information. The default is 20 seconds.
Max-Hops – This indicates how many bridges a packet can pass through before the packet is
dropped. This setting indicates the “Diameter” of a switched network.
Cisco-Interoperability – As its name suggests, enabling this setting will allow the MSTP protocol
implementation of the SWxx-xxPB switches to be compatible with Cisco’s implementation of the
MISTP protocol, which allows configuring multiple VLANs to a single spanning tree instance.
51
SWxx-xxPB Administration Manual
Portfast –This setting allows a port to skip all the standard bridge port states and go right into
operation. It allows for quicker switch start up time and configuration time when connecting
new hosts.
Portfast bpdu-filter – Lets you enable the portfast BDPU-filter for this port (BDPU filtering is
discussed in the previous section). It must also be enabled at the system level in order to work
properly.
Portfast bpdu-guard – Lets you enable the portfast BDPU-guard for this port (BDPU filtering is
discussed in the previous section). It must be enabled at the system level in order to work
properly.
Root Guard – Controls whether or not this is a “root facing” port (“enabled” value) or not
(“Disabled” value).
Link-Type – This indicates whether the port is using a shared medium (a value of “Shared”) or a
point-to-point link (a value of “Point-to-Point”).
Priority – This indicates the priority of this port. This setting, when compared with other ports,
will determine which port a packet is forwarded through.
Path-Cost – This sets the path cost for a “root facing” port. The “root facing” port with the
lowest path cost will become the root port for that switch.
Force-Version – This setting allows you to determine if you want to use the standard “STP”
setting that will cause that port to operate in a traditional STP fashion, or you can use the
“MSTP” setting that will allow VLAN STP compatibility.
To configure a port with specific MSTP settings, select the port from the drop down list next to “Port:”
Then select the setting and value you wish to use for that port and click “Apply”.
52
SWxx-xxPB Administration Manual
Port Information
As with other protocols and settings, the MSTP pages have a display that shows all the ports in a
summary screen. The screen shows all the parameters configured earlier (as shown in Figure 47).
53
SWxx-xxPB Administration Manual
EAPS Configuration
The technology of Ethernet Automatic Protection System (EAPS) allows Ethernet switches to have high
speed redundant failover. The failover response time for the switch is around 50 milliseconds. This
feature is built into the SWxx-xxPB switches to allow them to communicate in an enterprise
environment.
EAPS Configuration
In order to configure EAPS on the switch, access the “EAPS Configuration” page, shown in Figure 50.
Start by creating the EAPS configuration. Then set parameters by choosing the value for each parameter
and click “Apply”.
The configuration parameters used when configuring EAPS on the SWxx-xxPB switches are:
EAPS Ring ID – The ID of the ring itself. Any switches participating in the EAPS ring must have
the same RING ID.
Create Status – This indicates the status of the EAPS configuration. If it has not been created, it
will not participate in the EAPS as an active node.
Mode – This indicates whether this switch is the MASTER switch in the ring, or a TRANSIT node
(i.e. not a master).
Primary Port – This drop down indicates which port is connected to the primary ports of the
ring.
Secondary Port – This drop down indicates which port is used as the backup link should the link
in the primary link fail.
54
SWxx-xxPB Administration Manual
Control VLAN – this is the ID of the VLAN used to send control messages around the RING.
Protected VLANs – These are the VLANs that are protected by the EAPS configuration.
EAPS Information
The EAPS Information page (Figure 51) is simply a running log file of the details of what is happening on
the switch with respect to EAPS. You can see the current configuration as well as any events that occur.
This screen can be found under the “EAPS Configuration” menu.
Log Management
Log Management can help you troubleshoot the switch if it is not working properly. Log files keep track
of everything that is happening on a device. They can also be displayed to the screen in real time to aid
in troubleshooting. The SWxx-xxPB series of switches has this ability.
55
SWxx-xxPB Administration Manual
Log Information
The Log Information page (Figure 52) allows you to view logging information in real time. The page
displays what is happening in the system. This can be done at various levels of detail.
To change the level of detail displayed, choose the level of detail from the drop down menu next to “Log
Priority”, then click the “Refresh” button.
1. Navigate to the “POE Power Control” page under the “POE Power Control” menu.
2. Select the port you wish to configure from the drop down menu next to “POE Port”.
3. To enable or disable PoE power for the selected port, choose “enable” or “disable” from the
drop down menu next to “POE Power Status” (By default, PoE is enabled on all ports).
4. Click “Apply” to activate the changes.
Note: You may use this feature to Power Cycle devices that are connected to the ports
on the switch.
56
SWxx-xxPB Administration Manual
If you are unable to get the SWxx-xxPB switch to function using these steps, you can contact the
Technical Support team for help.
Please be prepared to provide your product's model and serial number when contacting Pakedge
Support. Your model and serial numbers are printed on a label located on the electronic housing.
57
SWxx-xxPB Administration Manual
Website: www.pakedge.com
Email: support@pakedge.com
CONTACT INFORMATION:
Pakedge Device & Software Inc.
1163 Triton Drive
Foster City, CA 94404
Appendix B – Specifications
Power consumption 20W + 15.4W*8 ports= 32W + 15.4W*16 ports = 20W + 15.4W*24 ports =
(max.) 144W 278W 390W
802.3af PoE Support Per 10/100BASE-T Port Per 10/100BASE-T Port Per 10/100BASE-T Port
58
SWxx-xxPB Administration Manual
Spanning Tree IEEE 802.1D STP, IEEE 802.1w IEEE 802.1D STP, IEEE 802.1w IEEE 802.1D STP, IEEE 802.1w
RSTP, 802.1s MSTP RSTP, 802.1s MSTP RSTP, 802.1s MSTP
VLAN Port-based VLAN, 802.1Q tag Port-based VLAN, 802.1Q tag Port-based VLAN, 802.1Q tag
VLAN, Private VLAN, GVRP VLAN, Private VLAN, GVRP VLAN, Private VLAN, GVRP
dynamic VLAN configuration dynamic VLAN configuration dynamic VLAN configuration
VLAN Number 4K (256 active VLANs) 4K (256 active VLANs) 4K (256 active VLANs)
Storm Control Stop sending at threshold to Stop sending at threshold to Stop sending at threshold to
restrict broadcast storms. restrict broadcast storms. restrict broadcast storms.
Traffic control Back pressure at half-duplex, Back pressure at half-duplex, Back pressure at half-duplex,
802.3x at full-duplex, CAR 802.3x at full-duplex, CAR 802.3x at full-duplex, CAR
support, 64K step size for 100- support, 64K step size for 100- support, 64K step size for 100-
M ports, 8 M step size for M ports, 8 M step size for M ports, 8 M step size for
Gigabit ports Gigabit ports Gigabit ports
Multicast control IGMP snooping IGMP snooping IGMP snooping
59
SWxx-xxPB Administration Manual
QoS Head Of Line (HOL) blocking Head Of Line (HOL) blocking Head Of Line (HOL) blocking
prevention mechanism prevention mechanism prevention mechanism
Four dispatching queues per Four dispatching queues per Four dispatching queues per
port, mapping the sixteen port, mapping the sixteen port, mapping the sixteen
priority queues in 802.1p priority queues in 802.1p priority queues in 802.1p
Best Effort Service Best Effort Service Best Effort Service
Differentiated Service Differentiated Service Differentiated Service
Strict Priority Strict Priority Strict Priority
Weighted Round Robin Weighted Round Robin Weighted Round Robin
First Come, First Served First Come, First Served First Come, First Served
TOS re-tagging TOS re-tagging TOS re-tagging
RTS RTS RTS
Network SNMP v1/v2 SNMP v1/v2 SNMP v1/v2
Management RMON (Group 1, 2, 3, 9) RMON (Group 1, 2, 3, 9) RMON (Group 1, 2, 3, 9)
Telnet Telnet Telnet
Command Line Interface (CLI) Command Line Interface (CLI) Command Line Interface (CLI)
Web interface Web interface Web interface
Support BDCOM network Support BDCOM network Support BDCOM network
management tools suite: management tools suite: management tools suite:
Broad Director Broad Director Broad Director
NTP, SSH, LLDP NTP, SSH, LLDP NTP, SSH, LLDP
Software upgrade HTML/TFTP/FTP HTML/TFTP/FTP HTML/TFTP/FTP
Configuration HTML/TFTP/FTP HTML/TFTP/FTP HTML/TFTP/FTP
upload/download
60
SWxx-xxPB Administration Manual
Model SWxx-xxPB
Congratulations on your purchase of a Pakedge Device & Software product! Pakedge designs and
manufactures the finest home networking products. With proper installation, setup, and care, you
should enjoy many years of unparalleled performance. Please read this consumer protection plan
carefully and retain it with your other important documents.
This is a LIMITED WARRANTY as defined by the U.S. Consumer Product Warranty and Federal Trade
Commission Improvement Act.
61
SWxx-xxPB Administration Manual
877-274-6100
Email: support@pakedge.com
www.pakedge.com
62