You are on page 1of 62

pakedgedevice&software inc.

SW24-24PB, SW16-16PB and SW8-8PB Switches

Enterprise-Class, Fully Managed, Power-Over-Ethernet Switches with


Gigabit Uplinks and Port Power Cycling

Administration Manual
Version 1.8
SWxx-xxPB Administration Manual

FCC Certifications
This equipment has been tested and found to comply with the limits for a Class A digital device,
pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against
harmful interference when the equipment is operated in a commercial environment. This equipment
generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance
with the instruction manual, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause harmful interference, in which case
the user will be required to correct the interference at his own expense.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) this device may not cause harmful interference, and (2) this device must accept any interference
received, including interference that may cause undesired operation.

CE Mark Warning
This equipment complies with the requirements relating to electromagnetic compatibility, EN 55022
class A for ITE, the essential protection requirement of Council Directive 89/336/EEC on the
approximation of the laws of the Member States relating to electromagnetic compatibility.
The company has an on-going policy of upgrading its products and it may be possible that information in
this document is not up-to-date. Please check with your local distributors for the latest information. No
part of this document can be copied or reproduced in any form without written consent from the
company.
Trademarks:
All trade names and trademarks are the properties of their respective companies.
Copyright © 2011, All Rights Reserved

WARNING: TO PREVENT FIRE OR SHOCK HAZARD, DO NOT EXPOSE THIS PRODUCT TO RAIN OR
MOISTURE. THE UNIT MUST NOT BE EXPOSED TO DRIPPING OR SPLASHING WATER. CAUTION: DO
NOT OPEN THE UNIT. DO NOT PERFORM ANY SERVICING OTHER THAN THAT CONTAINED IN THE
INSTALLATION AND TROUBLESHOOTING INSTRUCTIONS. REFER ALL SERVICING TO QUALIFIED
SERVICE PERSONNEL. CAUTION: THIS DEVICE MUST BE INSTALLED AND USED IN STRICT ACCORDANCE
WITH THE MANUFACTURER’S INSTRUCTIONS AS DESCRIBED IN THE USER DOCUMENTATION THAT
COMES WITH THE PRODUCT. WARNING: POSTPONE INSTALLATION UNTIL THERE IS NO RISK OF
THUNDERSTORM OR LIGHTNING ACTIVITY IN THE AREA.

2
SWxx-xxPB Administration Manual

Safety Precautions:
When using this device, always follow basic safety precautions to reduce the risk of fire, electric shock,
and injury to persons, including the following:
Read all of the instructions (listed here and/or in the user manual) before you operate this equipment.
Comply with all warning and caution statements in the instructions.
Retain the instructions for future reference.
Observe all warning and caution symbols that are affixed to this equipment.
Comply with all instructions that accompany this equipment.
Upon completion of any service or repairs to this product, ask the service technician to perform safety
checks to determine that the product is in safe operating condition.
Installation of this product must be in accordance with national wiring codes and conform to local
regulations.
Give particular attention to all safety precautions.
Operate this product only from the type of power source indicated on the product’s marking label. If
you are not sure of the type of power supplied to your home, consult your dealer or local power
company.
It is recommended that the customer install an AC surge protector in the AC outlet to which this device
is connected. This is to avoid damage to the equipment from lightning strikes and other electrical
surges.
Wipe the unit with a clean, dry cloth. Never use cleaning fluid or similar chemicals. Do not spray
cleaners directly on the unit or use forced air to remove dust.
Keep the device away from excessive heat and humidity and keep the device free from vibration and
dust.
Do not directly cover the device, or block the airflow to the device with insulation or any other objects.

3
SWxx-xxPB Administration Manual

Table of Contents
Introduction ............................................................................................................................................ 6
Accessing the Web Administration Interface ........................................................................................... 7
System Configuration Menu .................................................................................................................... 9
Basic Information .............................................................................................................................. 10
Serial Information .............................................................................................................................. 10
User Management ............................................................................................................................. 11
User Safety Management .................................................................................................................. 12
Current Configuration........................................................................................................................ 13
Configuration File .............................................................................................................................. 14
Reset to Factory Default ................................................................................................................ 15
File Upload ........................................................................................................................................ 15
System Reset ..................................................................................................................................... 16
Port Configuration ................................................................................................................................. 16
Common Configuration ..................................................................................................................... 16
Port Statistics .................................................................................................................................... 17
Flow Control ...................................................................................................................................... 18
Broadcast Storm ................................................................................................................................ 19
Port Ratelimit .................................................................................................................................... 20
Protected Port ................................................................................................................................... 20
Learn Limit ........................................................................................................................................ 21
Port Trunking ..................................................................................................................................... 21
Mirror................................................................................................................................................ 25
MAC Binding.......................................................................................................................................... 26
MAC Binding Configuration................................................................................................................ 26
MAC Auto Binding ............................................................................................................................. 27
MAC Filter ............................................................................................................................................. 28
Static MAC Filter Configuration .......................................................................................................... 28
Automatic MAC Auto Filter ................................................................................................................ 29
VLAN Configuration ............................................................................................................................... 30
VLAN Information .............................................................................................................................. 30

4
SWxx-xxPB Administration Manual

Static VLAN Configuration .................................................................................................................. 31


VLAN Port Configuration .................................................................................................................... 32
SNMP Configuration .............................................................................................................................. 35
SNMP Community Name ................................................................................................................... 35
TRAP Target ....................................................................................................................................... 37
ACL Configuration.................................................................................................................................. 38
Standard IP ........................................................................................................................................ 38
ACL Information ................................................................................................................................ 40
IP Basic Configuration ............................................................................................................................ 40
IP Address Configuration ................................................................................................................... 40
ARP Configuration and Display........................................................................................................... 41
Host Static Router Configuration ....................................................................................................... 43
AAA Configuration ................................................................................................................................. 43
RADIUS Configuration ........................................................................................................................ 44
802.1x Configuration ......................................................................................................................... 47
802.1x Port Configuration .................................................................................................................. 48
802.1x User Auth-Information ........................................................................................................... 49
MSTP Configuration............................................................................................................................... 50
MSTP Configuration ........................................................................................................................... 50
MSTP Port Configuration ................................................................................................................... 51
Port Information ................................................................................................................................ 53
IGMP SNOOPING Configuration ............................................................................................................. 53
Multicast Group Information ............................................................................................................. 54
EAPS Configuration................................................................................................................................ 54
EAPS Configuration ............................................................................................................................ 54
EAPS Information............................................................................................................................... 55
Log Management .................................................................................................................................. 55
Log Information ................................................................................................................................. 56
POE Power Control ................................................................................................................................ 56
POE Power Control ............................................................................................................................ 56
Appendix A – Technical Support ............................................................................................................ 58

5
SWxx-xxPB Administration Manual

Appendix B – Specifications ................................................................................................................... 58


Appendix C – Limited Warranty ............................................................................................................. 61

Introduction

This manual is written for the system administrator and installer in order to provide detailed information
so that they can properly configure the Pakedge SWxx-xxPB series of switches using the web interface.
It assumes that the reader has familiarity with the design and operation of a network as well as how a
network switch fits into that environment.

This Manual has been written for the 3 main models in the Pakedge PoE line: the SW8-8PB, SW16-16PB
and SW24-24PB. From this point forward, we will refer to the switches as the SWxx-xxPB series of
switches. The SW8-8PB includes 8 10/100 Ethernet Ports with Power over Ethernet (PoE), the SW16-
16PB includes 16 10/100 Ethernet Ports with PoE and the SW24-24PB includes 24 10/100 Ethernet Ports
with PoE. Additionally, all the models include 2 Gigabit Ethernet interfaces with both SFP and RJ-45
interfaces.

In this manual, you will learn in depth on how to configure the SWxx-xxPB series of PoE switches, as well
as what each of the parameters is used for. We will cover the following topics:

 Accessing the Web Administration Interface


 System Configuration
 Port Configuration
 MAC Binding
 MAC Filter
 VLAN Configuration
 SNMP Configuration
 ACL Configuration
 IP Basic Configuration
 AAA Configuration
 MSTP Configuration
 IGMP SNOOPING Configuration
 EAPS Configuration
 Log Management
 POE Power Control

6
SWxx-xxPB Administration Manual

Accessing the Web Administration Interface


The SWxx-xxPB switches contain a built in web administration interface that allows you to administer
every configuration parameter of the switch. It is accessed through a standard web browser; therefore
the switch can be configured using a PC, Mac or Linux based computer.

The SWxx-xxPB switches also have a command line interface that allows an
administrator to access the switch in case of a web misconfiguration. Please contact
Pakedge Support for the CLI commands manual.

In order to connect to the switch, use the following procedure:

1. Connect the switch to power. Power LED will light and switch fans will start.
2. Connect a PC or laptop to any standard Ethernet Port on the switch.
3. Configure the PC with IP address 192.168.1.10, subnet mask 255.255.255.0. Open a web
browser (The Internet Explorer, Mozilla, and Chrome browsers all work for configuring
the SWxx-xxPB, but Internet Explorer is preferred).
4. Enter the switches default IP address of 192.168.1.205 into the Address Bar and press
<ENTER>
5. A window similar to the one in Figure 1 will appear asking you for a username and
password. Enter admin for the username and leave the password field blank. Then Click
“OK” to be logged into the web administration portal.

Figure 1: Logging in to the Web Configuration Interface

Once you have logged in, you may use the web interface ( Figure 2) to configure the switch and customize it for
your environment.

7
SWxx-xxPB Administration Manual

Figure 2: The Main Web Configuration Interface

As pictured in Figure 2, you can see a representation of the switch called the Port Quick View at the top
of the web browser. This representation (Figure 3) allows you to see at a glance which ports have a link
established, which ports are disabled, and which ports have their links down. In Figure 3, ports 17 and
21 are connected and have green icons, indicating a status of “Link Up”. The rest of their ports have
nothing connected and show grey icons, indicating those ports have a status of “Link Down”

Figure 3: The Port Quick View

On the left hand side of the screen, you will see a navigation menu similar to the one shown in Figure 4.
This menu will allow you to navigate to the various configuration screens of the switch. To navigate, you
simply click on the “+” sign next to each folder, thus expanding the configuration category and allowing
you to see the configuration options under each folder.

8
SWxx-xxPB Administration Manual

Figure 4: The Web Configuration Navigation Menu

NOTE: The switch will save every configuration you perform automatically and load it
the next time the switch is rebooted. You DO NOT need to hit the save button after
every change.

System Configuration Menu


Let’s examine the configuration options one by one. Each folder is a collection of configuration settings
or category. Under the System Configuration folder, the categories you see are:

 Basic Information
 Serial Information
 User Management
 Safe Management
 Current Configuration
 Configuration File
 File Upload
 System Reset

In this section, you will learn about the options within each category and what function they perform.

9
SWxx-xxPB Administration Manual

Basic Information
The first option under the System Configuration category is the “Basic Information” page (shown in
Figure 5). This page allows you to see the basic information about the switch. It shows you a
description of the switch, its Object ID, the System Version (i.e. the version of the switch’s firmware), the
number of network ports, and the System start time (which is the amount of time the switch has been
powered up). Those items are not configurable as they are set by the switch itself.

However, there are three parameters the administrator can edit. They are:

 System Name – This is a unique name you can give the switch.
 System Location – This is a field that allows you to enter the location of the switch. Depending
on your network standards, you could enter the location of the switch within the building or
pinpoint the building and closet within your entire company.
 System Contact – This is the information about whom to contact for questions about this
switch. It is an open text field, so you can enter names, addresses, phone numbers, email
address or any other pertinent information about the person or persons to contact about this
switch.

Figure 5: The Basic System Information Screen

Serial Information

This page displays the current configuration of the switch’s administrative Serial Port. However, it does
not allow configuration of the serial port. Essentially, you need to configure your computer’s serial port
with these settings and then connect a serial cable between the switch’s serial port and the one on your
computer to have access to the switch’s Command Line Interface.

10
SWxx-xxPB Administration Manual

User Management

Although the web interface comes with a default user (admin) with no password, it is considered proper
networking practice to change the default password. In addition, it is recommended to add separate
user accounts for each person who will be administrating the switch.

The User Management screen (shown in Figure 6) allows the administrator to both change the password
for the user “admin”, and create additional users as well.

To change the default password for “admin”:

1. Log in to the Web Administration interface


2. Navigate to the “User Management” folder under “System Configuration”
3. At the top of the screen under “Change Password”, click in the field that says “New Password”
and type in a new password for the “admin” user.
4. Click in the field next to “Re-enter password” and enter the same password you entered in step
#3.
5. Click the “Apply” button at the bottom of the screen.

If the default password has already been changed to something else and you want to
change it again, you must first enter the old password in the field next to “Old
password” then continue on to enter the new password twice.

11
SWxx-xxPB Administration Manual

Figure 6: User Management Screen

In addition to changing the admin user’s password, it is also possible to allow new users to access the
Web Administration interface. There are two types of users: common and privilege.

In order to edit a user’s information:

1. Select their user # from the drop down list in the “item” column.
2. Edit the parameters you wish to change
3. Click “Apply” to save the settings

If you wish to delete a user:

1. Select their user# from the drop down list in the “item” column
2. Click the “Delete” button
3. Click the “Refresh” button to ensure the user has been deleted

User Safety Management

This configuration page of the switch allows management of the switch to be restricted to a particular
range of IP addresses and a particular protocol (as shown in Figure 7). This is particularly useful if you
have this switch on the public side of your internet connection and need to restrict access to the vital
functions of the switch.

12
SWxx-xxPB Administration Manual

Figure 7: User Safety Configuration

This feature uses ACL groups, which are defined IP networks and allow/deny rules. Creating ACL Groups
can be found on page 39 of this manual. In the User Safety Configuration page, when you configure a
protocol type, you will use an ACL group to determine whether or not a particular IP address group can
access a particular service. For example, if you want that rule to govern how http access is denied or
granted, simply select “http” under the column “server type”, then select “Enable” under the
“Management State” column. Finally, assign an ACL group that defines which IP addresses or address
ranges are governed by this rule by typing the number of the ACL Group in the “ACL Group” column and
click “Apply”.

Only one ACL group is allowed per protocol. If multiple addresses ranges need to be
defined, put them all into a single ACL. Also, be sure you understand what the
particular ACL you are using allows and denies as it is possible to deny yourself access
to the switch you are managing.

Current Configuration

The primary purpose of the current configuration page, as shown in Figure 8, is two-fold:
1. It is used to view the current configuration of the switch.
2. It is used to save the current configuration to permanent memory, thus making it the configuration
that is loaded when the switch powers up.
Once you are finished configuring the switch, navigate to the Current Configuration page and click
“Save”.

13
SWxx-xxPB Administration Manual

Figure 8: Viewing and Saving the Current Configuration File

Configuration File

The Configuration File page allows you to download the saved configuration to a file on your computer
for archival purposes. If you were to keep multiple copies over time, you could roll a configuration back
to an earlier version.

As you can see in Figure 9, the page displays the configuration you are going to download. If you want
to download the configuration that is in memory, you must save the current configuration file first, as
discussed in the last section, before downloading it.

Figure 9: Download the Existing Configuration

14
SWxx-xxPB Administration Manual

Reset to Factory Default


To reset the switch back to factory default, you need to delete the configuration file currently saved as
the boot up configuration, and restart the switch.

TIP: Download the configuration file before deleting the configuration. That way, if you have to
restore it, you have a backup.

File Upload
The “File Upload” page of the Web Administration Interface (Figure 10) will allow you to upload a saved
configuration file that contains the specific configuration for the switch you are configuring. It will also
allow you upload an updated firmware for the switch to increase capabilities or to fix software errors.

The switch determines whether the file is a configuration file or a firmware update, based on the
three letter file extension. Make sure that the file you are uploading has the correct three letter
extension before uploading as uploading the wrong file can have serious consequences, including
corrupting or crashing the switch.

To upload a file:
1. Click the “Browse” button to locate the file on your computer you wish to upload.
2. Click the “Upload” button.
3. WAIT FOR THE UPLOAD TO FINISH – interrupting the upload could cause problems with the
switch configuration.
4. Once the upload has been completed, reboot the switch for the new firmware or configuration
to take effect.

Note: if your configuration file changed the IP address of the switch, make sure to log into the
switch with the new IP address once the configuration file has been uploaded.

Figure 10: Upload a New Configuration File

15
SWxx-xxPB Administration Manual

System Reset
As its name suggests, the System Reset button is simply resetting the switch (i.e. rebooting the switch).
This will cause the configuration that was last saved to ROM to load (you will lose any changes not
saved).

Figure 11: The System Reset Page

Once you are ready to reboot the switch click “Reset”. The switch will reboot and load the configuration
file shown in the “Configuration File” section.

Port Configuration
The Port Configuration category contains all the settings and information regarding a particular port.
You can view the status of particular port, as well as enable a particular function for that port.

The categories under Port Configuration are:

 Common Configuration
 Port Statistics
 Flow Control
 Broadcast Storm
 Port Ratelimit
 Protected Port
 Learn Limit
 Port Trunking
 Mirror

In this section you will learn about the settings for each category and what functions they perform.

Common Configuration
The “Common Configuration” label could also be called the “Basic Port Configuration” as it allows the
switch administrator to view and change the basic port configuration of the switch.

The table shown in Figure 12 lists each port and its current configuration. You can use the settings at
the top of the page to configure the state of an individual port (Up or Down) as well as the Port
Communication Rate.

16
SWxx-xxPB Administration Manual

Figure 12: Common Port Configuration Page

In order to change the settings for a particular port, select it from the drop down list next to the “Port:”
field at the top of the page and then set the “State” and “Set Rate” of that port.

Port Statistics
The port statistics page allows you see individual port transmission and reception statistics. To see a
particular port’s statistics, select it from the “Port:” drop down list. Once you do that, the statistics for
that port will show on the screen (as shown in Figure 13).

17
SWxx-xxPB Administration Manual

Figure 13: Port Statistics Page

Flow Control
Flow control is the method by which the switch prevents a sender from sending more data than the
receiver can handle. Flow control can be enabled on a port to allow the switch to manage the
throughput of the connection of the devices on that port. Figure 14 shows the Flow Control Page.

To enable flow control for a particular port, simply select the port from the drop down list next to
“Port:”. Once you have selected the port, you can select “On” or “Off” from the drop down list next to
“Flow Control” and click the “Apply” button.

Figure 14: Per Port Flow Control Page

18
SWxx-xxPB Administration Manual

Broadcast Storm
This page (as shown in Figure 15) allows the administrator to configure port-by-port configuration of the
settings that prevent broadcast storms.

Figure 15: Broadcast Storm Control Page

Figure 15 shows the table that displays the status of each broadcast storm-related setting for each port.
In this table, you can see the following settings:
 Port Name – This column indicates the port name whose setting you are viewing.
 Broadcast Suppression – This column indicates the current broadcast suppression settings for
the designated port. When enabled, the switch will sense if too many broadcasts are being
received on the designated port and prevent broadcasts from the specified port for a short
period of time until the number of broadcasts falls below a preset threshold.
 Multicast Suppression – This column indicates the current multicast suppression settings for
the designated port. It functions similar to broadcast suppression, except the thresholds are for
multicast packets instead of broadcast packets.
 DLF Suppression – This column indicates the current setting for DLF suppression for the
designated port. When enabled, the port will not forward DLF frames (for MAC address lookup
on a Destination Lookup Failure) to other ports
 Rate Limit – This column indicates the maximum transmission rate for a particular port during a
broadcast storm detection

To change any of these settings, select the port whose value you wish to change from the drop down
list next to “Port:”, then choose the settings you want for the different columns from their respective
drop down lists, and click “Apply”.

19
SWxx-xxPB Administration Manual

Port Ratelimit
Port Ratelimit is used to configure a port-by-port maximum send and receive rate. An example of the
Port Rate Limit page is shown in Figure 16. By default, all ports have rate limit set to off, unless explicitly
changed.

Figure 16: Port Rate Limit Page

To enable port rate limiting:

1. Select the port you want to enable rate limiting for from the drop down menu next to “Port:”
2. To enable transmission rate limiting, in the field next to “Sent Packets Rate Control” enter a
number for the maximum rate of transmission in Kbps (e.g. for a 10Mbps maximum
transmission rate, you would enter 10000 in this field).
3. To enable receive transmission rate limiting, in the field next to “Receive Packets Rate Control”
type a number for the maximum rate of reception for this port, in Kbps.
4. Click “Apply” to make the changes active

Protected Port
A protected port is one that can only communicate with an unprotected port. It cannot communicate
with other protected ports. You can enable protected and unprotected ports on a port-by-port base.

Figure 17: The Protected Port Page

20
SWxx-xxPB Administration Manual

To enable a port as a “protected” port, navigate to the “Protected Port” page, and check the box next to
the port you want to turn into a protected port. Then click the “Protect” button.
Learn Limit
Layer 2 Ethernet switches work by learning all the MAC addresses attached to specific ports using the
ARP protocol. There are cases when there might be a lot of nodes connected to a port, and the ARP
database can grow quite large, therefore slowing the performance of the switch.

The page shown in Figure 18 allows you to limit the maximum number of MAC addresses that can be
learned on a particular port.

Figure 18: Learn Limit Page

By default, all ports have a limit set to “8191” which means that there is no limit. However, the
maximum number of address can be changed on a port-by-port basis. Select the port you wish to limit,
enter the maximum number next to “MAC Address Num Able To Learn” and click “Apply”.
If you already have a limit on a port and wish to remove the limit, select the port and click “Cancel Limit”
Note: Gigabit ports do not support Learn Limit.

Port Trunking
Often you will need to configure links between multiple switches for greater bandwidth, load balancing,
or redundancy. The SWxx-xxPB switches support port trunking to enable these features for the switch.

It is important to note that the trunked ports must be connected to another switch
that supports the same methods of trunked ports as the SWxx-xxPB switches.

21
SWxx-xxPB Administration Manual

Figure 19: Configuring Port Trunking

Although the Trunking Configuration Page (shown in Figure 19) may look daunting, it’s really easy to
configure. You can have up to three trunk groups set up per switch. The three trunk groups will show
their status on this page. A status of “Created” means that trunk group is already configured. A status of
“Uncreated” means you can use that trunk group ID to create a new trunk group.

The trunk group “0001” shown in Figure 19 shows it has been “created” and it has 3 members: fe1, fe3,
and fe5. Those ports will operate together as one aggregated port.

To create a trunk group you must understand the three types of port trunking that are used in this
switch: Source-MAC, Destination-MAC, and Source-and-Destination-MAC trunking.

Port Trunk
fe0

fe4 fe1 fe5


fe2

PC
Server
SWxx-xxPB SWxx-xxPB

Figure 20: A Sample Configuration of Port Trunking`

22
SWxx-xxPB Administration Manual

As an example in Figure 20, there is a PC connected to a server through two switches that are port
trunked together. Each of the three ports on the switch is connected to its corresponding numbered
port on another switch.

With source-MAC address trunking, the packets coming in to the trunk are distributed across the ports
based on the source MAC address. To provide load balancing, packets from the different hosts
connected to the switch use different ports that are part of the trunk. However, each source host will
always use the same port in the channel. For example, with the network setup shown in Figure 21, and
Switch A using source-MAC trunking, the switch would determine which hosts go over which channels.
The host connected to port fe7 would go over channel fe0, while the port attached to fe4 would go over
port fe2. Every time these hosts sent a packet, it would go over the same trunk.

fe7

Port Trunk
fe0

fe4 fe1 fe5


fe2

PC
Server
SWxx-xxPB SWxx-xxPB
Switch A Switch B

Figure 21: Sample Trunking with Source-MAC Trunking

With destination-MAC based forwarding, a similar thing happens, only in reverse (as shown in Figure
22). If the trunk on switch A is configured with destination-MAC forwarding, it will send packets down
ports for the trunks based on the MAC of the destination, hence if the PC in Figure 22 is sending data to
multiple servers, each time it talks to a different server, it will use a different trunk in the port trunk.

fe7

Port Trunk
fe0

fe4 fe1 fe5


fe2

PC
Server
SWxx-xxPB SWxx-xxPB
Switch A Switch B

fe9

Figure 22: An Example of Destination-MAC Trunking

23
SWxx-xxPB Administration Manual

Finally, in source-and-destination trunking (shown in Figure 23) the switch will distribute the traffic
among the different channels, allowing load balancing among all the channels. For example, when a
particular PC talks to a particular server, it will use one channel, but when that same PC talks to the
same server again, it might use a completely different port channel.

fe4
fe7

PC

Port Trunk
fe0

fe1 fe5
fe7 fe2

Server
PC SWxx-xxPB SWxx-xxPB
Switch A Switch B

fe9
fe9

PC

Figure 23: An Example of Source-and-Destination MAC Trunking

When configuring trunking on a switch, select the group number, the ports that belong to that group,
and the type of trunking it uses.

TO CREATE A TRUNK ON THE SWXX-XXPB SWITCHES:

1. Navigate to the Port Trunking Configuration page. Under “Trunk Group ID” type the number of
the trunk group you wish to create (e.g. 0002) and click “Create Trunk Group”.
2. Type the number of the trunk group in the “Trunk Group ID” box, then select the port(s) that
you wish to be part of the trunk group and click “Member Port =>”.
3. Select the trunk group in the “Trunk Group ID”, then select the Trunk method from the drop
down list, and click “Set Trunk Method”.

Note: There are a total of three trunks available to be used. Trunks 1 and 2 can be
used with any of the regular Ethernet ports, and trunk 3 is the only trunk available to
be used with the two Gigabit ports.

24
SWxx-xxPB Administration Manual

Mirror
The Mirror Category allows you to set up a port or ports that Mirror the traffic on a particular port to
another port on the same switch. This would be important if you were monitoring traffic on a particular
port, but needed access to all the traffic directly (instead of filtered by the switch). In the SWxx-xxPB
interface, the configuration interface looks similar to the one in Error! Reference source not found..

Figure 24: Port Mirror Configuration Page

A port cannot be both a “listened to” and “listening” port at the same. You can have
one listening port that listens to multiple “listened to” ports.

The column labeled “Listened Port” is the port you will be using to send duplicated information too.
The “Able Config Port” column is the port(s) you want to mirror to the “listened port name”. The
“Listen Direction” is which type of packets the system will listen to. The type of listen direction options
you have are:

 RECEIVE: Listen to all received packets


 TRANSMIT: Listen to a sent packets
 BOTH – Listen to both sent and received packets
 NOT_RECEIVE – Cancel listening to “Receive” packets
 NOT_TRANSMIT – Cancel listening to “Transmit” packets
 NEITHER – Cancel listening on this port

25
SWxx-xxPB Administration Manual

TO SET UP PORT MIRRORING, you need to know two things: which port the duplicated packets will be
sent to and which ports to listen to.

To set up port mirroring, follow these steps:

1. Navigate to Port Configuration -> Port Mirror Configuration -> Mirror.


2. Type in the listening port id (e.g. fe1) in the field in the “Listen Port” column

Note – The station doing the monitoring must be plugged into the port you type into
this field or you will not be able to use it.

3. Click on the port you want to mirror by clicking on its entry in the “Able Config Port” column.
4. Select the listen direction from the drop down list.
5. Click “Apply”.

Repeat this procedure using the same “Listen Port” and a different “Able Config Port” to listen to
multiple ports.

MAC Binding
In a layer 2 switch, the switch has to learn all the MAC addresses that are located on a particular port.
The SWxx-xxPB series of switches have a function known as MAC Bind Configuration. This feature allows
the administrator to specify manually which MAC addresses are on a particular port, or particular VLAN
ID, thus decreasing the time it takes for the switch to switch packets efficiently.

This category controls the binding of MAC address to ports for the SWxx-xxPB. There are two main
methods of doing this:

 Static Binding
 Automatic Binding

MAC Binding Configuration


This section may also be referred to as the “Static MAC Binding Configuration” as it allows you to tell the
switch that a particular MAC address is located on a specific port on that switch.

26
SWxx-xxPB Administration Manual

Figure 25: Mac Bind Configuration Page

TO ASSIGN A STATIC MAC ADDRESS TO A PARTICULAR PORT:


1. Navigate to the MAC Bind Configuration Page.
2. Select the port you would like to configure from the drop down list next to the “Port:” label.
3. Type the MAC address you would like to static assign to this port into the “MAC Address” field
(MAC addresses are 12 digits long but should be entered in the format XXXX.XXXX.XXXX).
4. Type in the ID# of the VLAN this MAC address is located on (VLAN ID#s can be found in the
“VLAN Configuration” section).
5. Click the “Apply” button.
6. If you wish to delete a static MAC mapping, simply check the checkbox next to the mapping you
wish to delete and click the “Delete” button.
The Gigabit ports do not support static MAC bindings

MAC Auto Binding


The most common method of associating a MAC address with a switch port is to use the “MAC Auto
Bind” feature (as shown in Figure 26). The switch will use the Address Resolution Protocol (ARP) to find
MAC addresses on a particular port. You can view all the MAC addresses that were discovered on a
particular port by using the following procedure:

1. Navigate to the “MAC Auto Bind” under the “MAC Binding” category in the web administration
interface.
2. Select the port you wish to view MAC Addresses for from the drop down list next to “Port:”
3. The list of MAC addresses will be displayed along with the VLAN ID they are associated with.

27
SWxx-xxPB Administration Manual

Figure 26: The MAC Auto Bind Screen

Note: The gigabit ports do not support MAC Auto Bind.

MAC Filter
MAC Filtering is the technology by which specific network devices on specific switch ports will be denied
access to the rest of the network. Each port will have a list of MAC addresses that are “disallowed”
access. This list is often called a blacklist.

There are two ways of configuring MAC filters on the SWxx-xxPB

 Static MAC Filter Configuration


 Automatic MAC Filter

It is important to remember that MAC filtering will prevent the entire device from
communicating on that port. It does not do user-by-user communication permissions.

Static MAC Filter Configuration


The first method of configuring MAC filtering is to specify manually the MAC address (es) that should be
filtered. This is done using the “MAC Filter Configuration Page (shown in Figure 27). This page not only
lists the addresses that are currently filtered, but allows you to configure new filters and delete existing
ones.

28
SWxx-xxPB Administration Manual

Figure 27: MAC Filter Configuration Page

To configure a MAC filter on a specific port:

1. Navigate to the MAC Filter Configuration page under the “MAC Filter” menu.
2. Select the port you wish to enable the filter for from the drop down menu next to “Port:”.
3. In the box next to “MAC Address”, type the MAC address of the device you wish to filter. It
must be 12 hexadecimal digits in the format XXXX.XXXX.XXXX.
4. In the box next to “VLAN ID” type in the number of the VLAN that the particular MAC Address is
configured for. If there are no VLANs, enter “1” (the default VLAN).
5. Click “Apply” to enable the filter.

To Delete an Existing MAC filter

1. Navigate to the “MAC Filter Configuration Page” under the “MAC Filter” menu.
2. In this list of filtered MAC addresses, click the checkbox next to the MAC filter you want to
delete.
3. Click “Delete”.
4. If you wish to delete all the filters at once, click the “Select-all” button, followed by the “Delete”
button.

Automatic MAC Auto Filter


The MAC Auto Filter works similarly to the standard MAC Filter, but instead of manually specifying a
MAC address to filter on a specific port, with Auto Filter, the switch detects all MAC address attached to
that port and allows the administrator to select those which should be filtered. Figure 28 shows an
example of the MAC Auto Filter Page. Note that it shows the auto learned MAC addresses on port fe17.
None of these addresses is filtered, and all of them are located on VLAN 1 (the default VLAN)

29
SWxx-xxPB Administration Manual

Figure 28: MAC Auto Filter Page

To enable a MAC Address Filter with the MAC Auto Filter:


1. Navigate to the “MAC Auto Filter” page under the “MAC Filter” menu.
2. Select the port you wish to enable the filter for from the drop down menu next to “Port:”.
3. Locate the MAC address you wish to filter from the list of MAC addresses the switch has
discovered on that port. (If the MAC address is not listed, you will have to use the manual
configuration discussed under “MAC Filter Configuration”)
4. Select the check box next to the MAC address(es) you wish to filter and click “Apply”.
5. If you wish to filter all the MAC addresses that the switch has detected, simply click the “Select
All” button, followed by the “Apply” button.

VLAN Configuration
VLANs (“Virtual LANs”) allow you to set up multiple sub-networks within multiple switches, thus
partitioning the broadcast traffic in one network from propagating to the other nodes. The SWxx-xxPB
series of switches has the ability to have multiple VLANs configured as well as to participate in a network
that already has VLANs set up through a router.

VLAN Information
The VLAN Information Page (shown in Figure 29) allows you to see the VLANs that are configured within
the switch and the ports that belong to the configured VLANs. By default, you should see a screen
similar to the one in Figure 29. The column “VID” refers to the VLAN ID (in this case, VLAND ID #1, which
is the default VLAN). The “State” column shows if the VLAN is active or not. The final column shows the
ports that are a member of the particular VLAN as well as whether they are tagged or untagged
members.

30
SWxx-xxPB Administration Manual

One thing that should be mentioned in more detail is the difference between tagged and untagged
ports. A port that is set to “Tagged” means that all data that passes through that port will be tagged
with the corresponding VLAN ID.

The other option is “Untagged”. This means that the VLAN ID information on the packet has already
been tagged by the sender, so the port recognizes the tagging and passes the packets to the other ports
that participate in the same VLAN.

Figure 29: VLAN Information

Static VLAN Configuration


The Static VLAN Configuration page (shown in Figure 30) allows you to set up VLAN IDs (VID). By default
the system only has one VLAN, VID1 with a name of vlan1. You can create more VLANS by doing the
following:

1. Navigate to the “Static VLAN Configuration” page under the “VLAN Configuration” menu.
2. Type in a VLAN ID number (any number from 2 to 4094 that isn’t already in use).
3. Click “Apply” (The switch will auto populate the “name” field).

VLAN1 cannot be deleted as it is the default VLAN for all ports that don’t have a
specific VLAN.

31
SWxx-xxPB Administration Manual

Figure 30: Static VLAN Configuration

VLAN Port Configuration


The SWxx-xxPB switches have the ability to be configured for multiple types of VLAN configurations. The
three types of VLAN ports you may have are: access ports, trunk ports and hybrid ports.

Access port – a tagged port which means that whatever device is connected to this port will be
connected to only the VLAN specified for that port.

Trunk port – means that it can have multiple VLANs configured on it and that the packets crossing it are
tagged with information telling them what VLAN they belong to.

Hybrid port – is a combination of an access port and a trunk port. A hybrid port lets you tag a device with
a specific VLAN and at the same time allow other VLANs to communicate with this device.

32
SWxx-xxPB Administration Manual

Let’s look at an illustrated example of the different types of ports. Figure 31 provides a network
configuration example that you may use as a guide to configure the switches on your network properly.

Switch VLAN Device Connected Required Port Configuration


SW8-8PB* 802.1Q Trunk (All VLANs) Wireless Access Point Hybrid Mode
SW24-24PB* VLAN 2 VOIP Phones Specific ports set to Access Mode
VLAN 3 Security Cameras Specific ports set to Access Mode
SW16-16PB VLAN 4 Automation Devices All Ports set to Access Mode
SW24-GB VLAN 5 Home computers Trunk port (Default)
* The port connected to the router needs to be set in Hybrid Mode to work properly

Figure 31: SWxx-xxPB Switch Set-up Example with Pakedge’s RSB-K24C

33
SWxx-xxPB Administration Manual

Figure 32: VLAN Port Configuration Page

Figure 32 is an example of the VLAN Port Configuration page for the SWxx-xxPB series of switches. This
page allows you to configure which ports directly belong to which VLANs (“untagged” ports) and which
ports have hosts that send their own tagged packets (“tagged” ports).

To set a port as an Access Port:

1. Create the VLAN as described in the previous section about “Static VLAN Configuration”.
2. Select the port you wish to configure from the drop down list under the “Port” column.
3. Select Access from the drop down list in the “Model” column.
4. Select the specific VLAN this port will be a member of (By default, the port will show up under
the “Port Members” column with the (p)(u)vlan1 designation. That means that the port is in
vlan1, p=default VLAN member, u=untagged member).
5. Click the “Default VLAN =>” button to assign that VLAN to that port.
6. If you need to remove a port from the configured VLAN, select the port, and then choose the
“unMember <=” button for the corresponding VLAN.

To set a port as a Trunk Port:

1. Create the VLAN as described in the previous section about “Static VLAN Configuration”.
2. Select the port you wish to configure from the drop down list under the “Port” column.
3. Select Trunk from the drop down list in the “Model” column.
4. Select the specific VLANs this port will be a member of.

34
SWxx-xxPB Administration Manual

5. Click the “tagged =>” button to assign the VLAN(s) to that port.
6. If you need to remove a port from the configured VLAN, select the port, and then choose the
“unMember <=” button for the corresponding VLAN.

Note: Use Trunk ports to connect the SWxx-xxPB switches with each other

To set a port as a Hybrid Port:

1. Create the VLAN as described in the previous section about “Static VLAN Configuration”.
2. Select the port you wish to configure from the drop down list under the “Port” column.
3. Under the model dropdown select Hybrid, under Current VLAN highlight vlan1 and then click
“Default VLAN.” (Make sure vlan1 is an untagged member of the port).
4. Now click on the next VLAN in the list under “Current VLAN”, and then click on “tagged.” You
will need to do this for all remaining VLANs in the “Current VLAN” list that you want to use with
this port. You can also highlight all the VLANs at once and click “tagged” to make them all
members of the port.
5. You may repeat this process to configure any necessary ports the same way in the switch.
6. If you need to remove a port from the configured VLAN, select the port, and then choose the
“unMember <=” button for the corresponding VLAN.

SNMP Configuration
Almost every network device has at least some implementation of SNMP. SNMP stands for Simple
Network Management Protocol. It is used with network management programs as the protocol to
monitor various network entities.

There are two major categories of settings for the SWxx-xxPB switches:

 SNMP Community Name


 Trap Target

In this section you will learn how to configure each section properly for use with SNMP management

SNMP Community Name


SNMP uses a parameter known as Community. All hosts that have the same Community Name can be
managed as an entire group. For example, in Figure 33, you will notice there are three hosts, two
management consoles, and two communities. The individual hosts are set to one of the two
communities (either Network1 or NetworkTest). The individual consoles are also part of a community.
This way a particular SNMP management console can separate which hosts it can manage.

Note: There is also a community name known as “Public” that allows any host to send
SNMP commands and receive SNMP data.

35
SWxx-xxPB Administration Manual

In addition, each device can be configured as either read or read/write within a particular community.
This means that hosts that are set as “Read Only” in that particular community can only be read by an
SNMP manager – therefore no changes can be made to that host through SNMP. “Read/Write” allows
an SNMP management console to make changes to a device, providing it has the proper community
name.

Server2
Community: NetworkTest

SNMP Management
Server / Console #1
Community: Network1

BOB_PC
Communitiy:NetworkTest

SNMP Management
Server / Console #2
Community: NetworkTest

Server1
Community:Network1

Figure 33: How SNMP Communities Work

With the SWxx-xxPB switches, you can configure the switch to be part of different communities with
different Read/Write settings. Figure 34 shows the SNMP Community Configuration page. From this
page, you can designate which Community the switch is part of and what rights the hosts have for this
switch within the community. As you can see in this figure, there is currently only the default
community, Public, that has ReadOnly permissions to the switch.

Figure 34: SNMP Community Configuration

36
SWxx-xxPB Administration Manual

In order to configure the switch to use specific communities with specific security, you must do the
following:
1. Navigate to the “SNMP Community Configuration” page under the “SNMP Configuration” menu
2. Under the “Item” column, make sure that “New” is selected from the drop down list.
3. Type the name of the community to be configured in the column “Community Name”
4. Choose the Read/Write Settings from the drop down menu in the “Read/Write” column.
5. Click the “Apply” button.

That will add an entry to the SNMP list. You will notice that the numbers in the “Item” column are
automatically sequentially numbered.

If you want to delete information about a particular SNMP community:

1. Navigate to the “SNMP Community Configuration” page under the “SNMP Configuration” menu.
2. Under the “Item” column, make sure that the item# is selected from the drop down list.
3. Click the “Delete” button

You can only create or delete a community name. You can’t change an existing
community name. If you would like to change the settings for a community, you must
delete it first and then recreate it.

TRAP Target
With SNMP, communications can happen one of two ways:

 Bidirectional - an SNMP console makes requests of the device and it responds back with the
requested information.
 Traps - This is a one-way device-initiated communication. If the device is experiencing a failure
or major issue, it can send a notification directly to an IP address set up to receive these events.

The SWxx-xxPB has the ability to send SNMP traps to multiple IP addresses (known as “Trap Targets”)
using the TRAP Target Configuration page (shown in Figure 35).

Figure 35: TRAP Target Configuration Page

To create a new SNMP Trap Target:


1. Navigate to the “TRAP Target Configuration” page under the “SNMP Configuration” menu.
2. Make sure the word “New” is selected in the drop down list in the “Item” column.

37
SWxx-xxPB Administration Manual

3. Enter the name of the Trap target in the field shown in the “Name” column.
4. Enter the IP address of the target that will receive the Trap events in the field under the column
heading “Transmit IP Address”.
5. Select the version of SNMP that the Trap Target uses from the drop down list under the column
labeled “SNMP Version”. This needs to match the version of SNMP that your Trap target is
using.

As with SNMP Communities, you can only create or delete SNMP Traps. If you would
like to change the Trap configuration, you must delete the one you would like to
modify, and then recreate it.

ACL Configuration
In order to provide additional security, the SWxx-xxPB has a feature known as Access Control Lists (ACL).
These are lists of hosts or networks that are grouped together to allow or deny access. For example,
you could configure an ACL that only allows one host. ACLs are also used by other modules (like User
Management) to provide security for that module.

For example, you may want to define that all stations in a particular ACL group may not access a
particular feature. Configure an ACL Group (designated arbitrarily as 45). Let’s say that this ACL
contained rules that allowed traffic from the network 10.10.10.0 but denied traffic from the network
10.9.8.0. When you apply the ACL in this example, only hosts within the defined IP range 10.10.10.0
would be able to use that feature and any hosts in the network 10.9.8.0 would be denied.

Standard IP
The ACLs are configured on the switch using the ACL Standard IP Configuration page (as shown in Figure
36). As discussed, each ACL is a group of rules that denies or allows access to an IP host or a range of IP
hosts. These groups of rules are assigned a Group# that can be referenced from other modules.

38
SWxx-xxPB Administration Manual

Figure 36: ACL Standard IP Configuration Page

As shown in Figure 36, this particular ACL group has 2 rules: deny from all hosts in 192.168.0.0 network,
and deny from all hosts in the 192.168.1.0 network. If these rules were applied as a web management
rule for the switch, all hosts but these two ranges would be able to access the management interface.
In order to create an ACL:
1. Navigate to the “ACL Standard IP Configuration” page under the “ACL Information” menu.
2. Choose a group number (1 through 99) to view or configure from the drop down list next to
“ACL Standard Source IP Group”.
3. If the group number you have chosen has been previously configured, the settings will show up
on the screen. If not, you will be able to configure new rules.
4. Enter an IP address network designation for the host(s) to allow or deny in the field next to
“Source IP Address” and
5. Enter the mask in the field next to “Source Wildcard”. The source mask indicates which portion
of the address designates the hosts. It is designated in the reverse of a subnet mask. For
example, if you want to designate the network of 192.168.1.0 with a subnet mask of
255.255.255.0, enter “192.168.1.0” in the Source IP Address field and “0.0.0.255” in the Source
Wildcard field.
6. Choose the radio button that designates whether this host address or host address range is for
Allowing packets from that range, or Denying packets from that range by choosing “Permit” or
“Deny”, respectively.
7. Click “Add”.
8. Repeat steps 2-6 to add more ranges.
When deleting all entries in an ACL group, click "Select-all" first, then click "delete”.
When delete multiple roles, you cannot select more than 30 roles at a time.

39
SWxx-xxPB Administration Manual

ACL Information
The ACL Information page (Figure 37) is found under the ACL Configuration Menu. Its primary function
is to display all the ACL groups and their configurations in one convenient location.

Figure 37: ACL Information Page

IP Basic Configuration
Most networks today use the TCP/IP protocol as the protocol used for network addressing. In order to
communicate on a TCP/IP network, each network device would need its own unique TCP/IP address.

In this section you will learn about the various Web Administration pages that deal with the IP
Configuration of the SWxx-xx-PB switches, including:

 IP Address Configuration
 ARP Configuration
 Static Route Configuration

IP Address Configuration
In order to manage the SWxx-xxPB switches via the Web Interface, the switch needs to have at least one
IP address. By default, there is one IP address on VLAN 1: 192.168.1.205 with a subnet mask of
255.255.255.0 (i.e. a 24 bit subnet mask). To assign an IP address to a different VLAN, you can use this
screen (Figure 38) to do so:

40
SWxx-xxPB Administration Manual

Figure 38: IP Address Configuration Page

To assign an IP address to a particular VLAN:


1. Navigate to the “IP Address Configuration” page under the “IP Basic Configuration” menu.
2. If the VLAN already exists, select the corresponding number in the drop down menu in the “Line
Item” column.
3. Then type in the numeric VLAN ID of an existing VLAN in the field within the column labeled
“VLAN ID”.
4. Finally, type in the IP address to be used on this VLAN interface with the subnet mask bit in the
“IP Address / Subnet Prefix” field and click the “Create/Modify IP Address” button
designation (e.g. 10.10.10.4/24 = address 10.10.10.4 with a subnet mask of 255.255.255.0).
5. If the VLAN does not exist, select “New” from the “Line Item” drop down list. Type a number of
an unused VLAN in the VLAN ID field.
6. Type in the IP address/subnet prefix as discussed in step 4.
7. Finally, click “Create VLAN Interface”.

ARP Configuration and Display


The Address Resolution Protocol (ARP) is used to map a TCP/IP address to a physical MAC address. The
ARP Configure and Display Page (shown in Figure 39) allows you see what TCP/IP addresses are
associated with which MAC addresses, as well as to configure those associations either dynamically or
statically.

41
SWxx-xxPB Administration Manual

Figure 39: ARP Configuration and Display Page

At the bottom of the page, you will see the list of associate IP addresses and MAC addresses as well as
the type of association (dynamic or static). The difference between dynamic mapping and static
mappings is that dynamic mapping takes time to build the associations automatically on switch boot up.
Static mapping is already in the cache and ready to be used, thus increasing performance.
To create a Static ARP entry:

1. Navigate to the “ARP Configure and Display” within the “IP Address Configuration” menu.
2. Enter the IP address of the entry you wish to create in the “IP Address” field in the “Static ARP
Item configuration” section.
3. Next to the “MAC Address” in the same section, enter the MAC address of the entry (in the
format of XXXX.XXXX.XXXX).
4. Click the “Add”.

To convert a Dynamic ARP Entry into a Static entry:

1. Navigate to the “ARP Configure and Display” within the “IP Address Configuration” menu.
2. Select the ARP List item from the drop down menu next to “ARP List Item”.
3. Type in the IP address for the entry next to “IP Network Segment”.
4. Click the “Apply” button.

To delete an ARP Entry:

42
SWxx-xxPB Administration Manual

1. Navigate to the “ARP Configure and Display” within the “IP Address Configuration” menu.
2. Select the ARP item (static or dynamic) from the drop down list next to “ARP Item”.
3. Enter the IP address of the entry you wish to delete in the field next to “IP Address (IP Network
Segment).
4. Click the “Delete” button.

Host Static Router Configuration


Because the switch has the ability to route IP traffic for VLANs and other entities, you should set up the
static router information so that you can access the switch from anywhere in your network.

This is done through the Host Static Router Configuration page shown in Figure 40.

To set up a static route:

1. Navigate to the “Host Static Router Configuration” within the “IP Address Configuration” menu.
2. Type the destination network IP address designation with a CIDR bit mask (e.g. 192.168.0.0/24 is
like entering a subnet mask of 255.255.255.0) into the field under the label of “Target
Address/Subnet Prefix”.
3. Enter the IP address of your router into field under the “Next Hop” label.
4. Click the “Apply” button.

Figure 40: Static Router IP Configuration

AAA Configuration

One switch item that can be important for access is the use of Authentication, Authorization, and
Accounting (AAA) services. The configuration for these items can be found under the “AAA
Configuration” menu of the left hand side of the Web Administration page. AAA servers allow a single
point of authorization and access to network devices. In other words, you could have one username
and password that would allow you to access the administration interface of these network devices.

43
SWxx-xxPB Administration Manual

RADIUS Configuration
RADIUS is an acronym for Remote Access Dial-In User Server. It was developed as a centralized
management server for all the different types of remote access methods (dial-up modems, network
access, broadband, etc.) so that all methods could contact a central repository of user authentication
data, including permissions, usernames, passwords, etc.

The SWxx-xxPB switches have the ability to use RADIUS servers to authenticate access to the switch.
They also have the ability to send accounting data about user activity to a centralized server. The screen
that allows you to configure these options is shown in Figure 41

Figure 41: RADIUS Configuration Page

There are several settings on this page, each of which performs a specific function. These settings
include:

 Primary Server - This is the primary RADIUS server used for authentication and accounting.
 Option Server - This is the secondary or backup server that is used in case the primary server
can’t be contacted.
 UDP Port - This is the UDP port that the switch will use to communicate with the RADIUS server.
Most RADIUS servers (including Windows) use UDP port 1812 for authentication. However, the
switch allows you to configure the UDP port your system uses for authentication.
 Accounting - This selection allows you to enable or disable accounting tracking. By default it is
enabled. You can disable it by selecting “Disable” from the drop down list and clicking “Apply”.
 Accounting UDP Port - Use this port to contact the accounting server. As with the
authentication port, you can change it. Usually the default UDP port is 1813.

44
SWxx-xxPB Administration Manual

 Shared Key - Use this key to encrypt traffic between the switch and the RADIUS server. Both the
switch and the RADIUS Server must have the same shared key in order for encryption to work
properly. To configure the shared key, type in the key and click “Apply”.
 Vendor - Use this field to enter notes about the vendor of the switch that are sent to the
RADIUS server.
 NAS Port - Use this port to contact the Network Authentication Server (NAS).
 NAS Port Type - Use this field to contain the number of the IETF definition of the type of
physical port using the NAS. Table 1 lists the port types:

NAS Port
NAS Port Type Description
Type #
0 Async
1 Sync
2 ISDN Sync
3 ISDN Async V.120
4 ISDN Async V.110
5 Virtual
6 PIAFS
7 HDLC Clear Channel
8 X.25
9 X.75
10 G.3 Fax
11 SDSL - Symmetric DSL
12 ADSL-CAP - Asymmetric DSL, Carrierless Amplitude Phase Modulation
13 ADSL-DMT - Asymmetric DSL, Discrete Multi-Tone
14 IDSL - ISDN Digital Subscriber Line
15 Ethernet
16 xDSL - Digital Subscriber Line of unknown type
17 Cable
18 Wireless - Other
19 Wireless - IEEE 802.11
20 Token-Ring
21 FDDI
22 Wireless - CDMA2000
23 Wireless - UMTS
24 Wireless - 1X-EV
25 IAPP
26 FTTP - Fiber to the Premises
27 Wireless - IEEE 802.16

45
SWxx-xxPB Administration Manual

28 Wireless - IEEE 802.20


29 Wireless - IEEE 802.22
30 PPPoA - PPP over ATM
31 PPPoEoA - PPP over Ethernet over ATM
32 PPPoEoE - PPP over Ethernet over Ethernet
33 PPPoEoVLAN - PPP over Ethernet over VLAN
34 PPPoEoQinQ - PPP over Ethernet over IEEE 802.1QinQ
35 xPON - Passive Optical Network
36 Wireless - XGP

Table 1: List of NAS Port Types

 NAS Service Type - This is the number of the service type requested and the function it
performs. For example, a service type of 1 indicates that the switch will use RADIUS to allow or
disallow logins to the switch. However, with other types of services like modem access or
broadband connections, the RADIUS server will behave differently. For this switch, it is
recommended to use Service Type 1. Table 2 lists the most commonly used NAS Service-types.

NAS Service
Type NAS Service Type Description
Number
1 Login
2 Framed
3 Callback Login
4 Callback Framed
5 Outbound
6 Administrative
7 NAS Prompt
8 Authenticate Only
9 Callback NAS Prompt
10 Call Check
11 Callback Administrative
12 Voice
13 Fax
14 Modem Relay
15 IAPP-Register
16 IAPP-AP-Check
17 Authorize Only
18 Framed-Management
Table 2: List of NAS Service Types

46
SWxx-xxPB Administration Manual

 Roaming – This setting indicates whether the requests to the RADIUS server will allow roaming
to users and resources on other RADIUS servers.

To configure the RADIUS configuration:

1. Navigate to the “RADIUS Configuration” page under the “AAA Configuration” page.
2. Fill out the parameters in the appropriate fields as discussed above.
3. Click “Apply” to save the changes.

802.1x Configuration
802.1x is a standards-based technology that allows or disallows connections to a switch and is
configured on a port-by-port basis. Access to the port is based on various rules and authentication
parameters.

There are three primary pages that are used for 802.1x configuration. The first page is “802.1x
Configuration” (shown in Figure 42).

Figure 42: 802.1x Configuration Page

The page allows you to configure the general settings of 802.1x on this switch. These parameters
include:

 802.1x - This setting allows you to enable or disable 802.1x on the entire switch. To enable or
disable, simply select the proper option from the drop down menu next to “802.1x”.
 802.1x Extended - This setting enables the extended feature set for 802.1x.

47
SWxx-xxPB Administration Manual

 Re-authentication - This setting forces the port to reauthenticate periodically. The values are
either “Enable” or “Disable”. If enabled, the switch will force reauthentication periodically.
 Quiet Period - This setting controls the number of seconds that the switch remains in the quiet
state following a failed authentication exchange with the client. Given in seconds.
 Tx-Period - This setting controls the number of seconds that the switch waits for a response to
an EAP-request/identity frame from the client before retransmitting the request.
 Server Timeout - This setting controls the amount of time the switch waits for a reply before
retransmitting the response to the server when relaying a response from the client to the
authentication server.
 Supplicant Timeout - This setting control how long the port waits for a response when relaying a
request from the authentication server to the supplicant before resending the request.
 Max Request - The setting controls the maximum number of times that the device sends an
EAP-request/identity frame (assuming no response is received) to the supplicant before
restarting the authentication process.
 Re-auth Max - This setting limits the maximum number of times that the device retransmits
reauthentication requests to the supplicant on an interface before the session times out.
 Client Version - This setting allows the switch to check the version and validity of the 802.1x
client running on supplicant systems to prevent those that use earlier versions of 802.1x client
or illegal clients from logging in.
 Check Client - Regularly checks for valid packets from the client.

802.1x Port Configuration


Now that you have the general settings for 802.1x configured on the switch, you can continue to the
802.1x port configuration screen (shown in Figure 43). This allows you to set port-by-port 802.1x
settings. The settings for the individual port configuration include:

Port Num – This setting allows you to choose which port you wish to configure.

Port Mode – This is to set the port authorization mode. There are three settings: Auto, Force
Authorized, and Force Unauthorized.
a. Auto mode means the particular port will function in true 802.1x, that is to say, it follows the
dynamic authorization model.
b. Force Authorized, on the other hand, when set, means that the port is always authorized.
Essentially, it means that the port is not participating in 802.1x.
c. Force Unauthorized prevents a port from becoming authorized, even if it has proper credentials.
It effectively disables the port.

Support Host Num – Sets the maximum number of hosts allowed on this port. Default is 100.

Note: The Gigabit ports cannot support 80 2.1x.

48
SWxx-xxPB Administration Manual

Figure 43: Configuration of 802.1x by Port

802.1x User Auth-Information


The User Authentication Information page (as shown in Figure 44) shows which user(s) are
authenticated for a particular port. It also shows the state of the authenticated port connection. This is
a display-only page. To view the statistics on a particular port, choose the port you would like to view
statics for from the drop down menu next to “Port:”

Figure 44: 802.1x User Auth-Information Page

49
SWxx-xxPB Administration Manual

MSTP Configuration
MSTP stands for Multiple Spanning Tree Protocol (MSTP). It is based on The Spanning Tree Protocol
(STP) which is used by networks that have multiple bridges to provide redundant links without causing
bridging loops. As you may already know, most switches at the lower layers are simply multiport
bridges. The STP protocol operates in multiple connected switches in the same way as having multiple
bridges on a LAN segment. The MSTP protocol is basically STP, but can operate over multiple VLANs.

In order to configure MSTP on the SWxx-xxPB switches, you must configure two main items: General
MSTP Configuration and MSTP Port Configuration.

MSTP Configuration
The MSTP Configuration page (Figure 45) allows you to configure general MSTP settings. These settings
are switch-specific (as opposed to port-specific) and affect how MSTP operates on this particular switch.
The settings you can configure for this switch include:

 MSTP – This setting enables or disables MSTP for the entire switch. To change, simply select the
option you wish to use (Enable or Disable) from the drop down list next to “MSTP:” and click
apply.
 Priority – This is the priority of this switch within the overall network topology. Switches with
lower number priorities are considered more likely to become the root bridge. By default, this
switch will have a priority of 32768, which means it will be very unlikely that this switch will
become the root bridge.
 Portfast Bpdu-Filter – Portfast is a technology whereby a port skips the process of negotiating
and learning its role in the MSTP protocol, and skips right to the “Forwarding” state. BDPU
filtering allows a port to filter whether or not BDPU messages are sent on that specific port. For
example, ports that have hosts connected directly to them should have BDPU filtering on, but
“Trunk” or “Root Facing” ports should have it disabled. This setting determines whether or not
you can use that setting at all. The default setting is Disabled.

50
SWxx-xxPB Administration Manual

Figure 45: MSTP Configuration

 Portfast Bpdu-Guard – If a host port (i.e. a non- “root-facing” port) receives a BDPU message, it
can cause potential switching loops because the switch thinks that there is more than one path
to a bridge and tries to find out where it is. With Portfast BPDU-Guard enabled – if a BDPU
message is received on a host port, the port is disabled and must manually be put back into
service.
 Forward-Time – This is the amount of time, in seconds, a port waits before changing from its
learning and listening states to its forwarding state. The default is 15 seconds.
 Hello-Time – interval in ms between how long hello messages are sent.
 Errdisable-Timeout – If enabled, allows the automatic change of a port from “Errdisable” back
to “Forwarding”. Otherwise, the port has to be manually re-enabled.
 Errdisable-Timeout Interval – How long the switch waits before automatically changing a port in
the “Errdisable” state back to a “Forwarding State”.
 Max-Age – This setting controls the maximum length of time passed before a bridge port saves
its configuration BDPU information. The default is 20 seconds.
 Max-Hops – This indicates how many bridges a packet can pass through before the packet is
dropped. This setting indicates the “Diameter” of a switched network.
 Cisco-Interoperability – As its name suggests, enabling this setting will allow the MSTP protocol
implementation of the SWxx-xxPB switches to be compatible with Cisco’s implementation of the
MISTP protocol, which allows configuring multiple VLANs to a single spanning tree instance.

MSTP Port Configuration


Now that you have configured the basic MSTP settings, you can configure the MSTP settings for each
port. The MSTP Port Configuration page (Figure 46) can be found under the “MSTP Configuration”
menu option.

51
SWxx-xxPB Administration Manual

The settings you can choose for each port are:

 Portfast –This setting allows a port to skip all the standard bridge port states and go right into
operation. It allows for quicker switch start up time and configuration time when connecting
new hosts.
 Portfast bpdu-filter – Lets you enable the portfast BDPU-filter for this port (BDPU filtering is
discussed in the previous section). It must also be enabled at the system level in order to work
properly.
 Portfast bpdu-guard – Lets you enable the portfast BDPU-guard for this port (BDPU filtering is
discussed in the previous section). It must be enabled at the system level in order to work
properly.
 Root Guard – Controls whether or not this is a “root facing” port (“enabled” value) or not
(“Disabled” value).
 Link-Type – This indicates whether the port is using a shared medium (a value of “Shared”) or a
point-to-point link (a value of “Point-to-Point”).
 Priority – This indicates the priority of this port. This setting, when compared with other ports,
will determine which port a packet is forwarded through.
 Path-Cost – This sets the path cost for a “root facing” port. The “root facing” port with the
lowest path cost will become the root port for that switch.
 Force-Version – This setting allows you to determine if you want to use the standard “STP”
setting that will cause that port to operate in a traditional STP fashion, or you can use the
“MSTP” setting that will allow VLAN STP compatibility.

Figure 46: MSTP Port Configuration Page

To configure a port with specific MSTP settings, select the port from the drop down list next to “Port:”
Then select the setting and value you wish to use for that port and click “Apply”.

52
SWxx-xxPB Administration Manual

Port Information
As with other protocols and settings, the MSTP pages have a display that shows all the ports in a
summary screen. The screen shows all the parameters configured earlier (as shown in Figure 47).

Figure 47: MSTP All Port Information Page

IGMP SNOOPING Configuration


The SWxx-xxPB switches have the ability to use IGMP snooping. This feature allows the switch to listen
to IGMP messages to and from various hosts and routers to maintain a map of links that need IP
multicast information, thus increasing multicast performance. You can either enable or disable this
function (as shown in Figure 48). Navigate to the “IGMP Snooping Configuration” group, and click on
the “IGMP Snooping Configuration” page. Then select Enable or Disable from the “IGMP Snooping”
drop down list and click “Apply”.

Figure 48: Enabling IGMP Snooping

53
SWxx-xxPB Administration Manual

Multicast Group Information


The SWxx-xxPB switches have the capability of using Multicast Groups. Multicast is similar to broadcast,
but it is limited to only devices that are configured within a specific Multicast Group. These groups allow
IP devices on different networks that have the same multicast address to communicate in a broadcast
fashion. In the case of a switch, a device connected to a port defined with a particular Multicast Address
will receive multicast traffic within that group only. Error! Reference source not found. shows the
“Multicast Group Information” screen which shows which ports are participating within a particular
multicast group. This is not a configurable item.

Figure 49: Showing Multicase Group Information

EAPS Configuration
The technology of Ethernet Automatic Protection System (EAPS) allows Ethernet switches to have high
speed redundant failover. The failover response time for the switch is around 50 milliseconds. This
feature is built into the SWxx-xxPB switches to allow them to communicate in an enterprise
environment.

EAPS Configuration
In order to configure EAPS on the switch, access the “EAPS Configuration” page, shown in Figure 50.
Start by creating the EAPS configuration. Then set parameters by choosing the value for each parameter
and click “Apply”.

The configuration parameters used when configuring EAPS on the SWxx-xxPB switches are:

 EAPS Ring ID – The ID of the ring itself. Any switches participating in the EAPS ring must have
the same RING ID.
 Create Status – This indicates the status of the EAPS configuration. If it has not been created, it
will not participate in the EAPS as an active node.
 Mode – This indicates whether this switch is the MASTER switch in the ring, or a TRANSIT node
(i.e. not a master).
 Primary Port – This drop down indicates which port is connected to the primary ports of the
ring.
 Secondary Port – This drop down indicates which port is used as the backup link should the link
in the primary link fail.

54
SWxx-xxPB Administration Manual

 Control VLAN – this is the ID of the VLAN used to send control messages around the RING.
 Protected VLANs – These are the VLANs that are protected by the EAPS configuration.

Figure 50: EAPS Configuration Page

EAPS Information
The EAPS Information page (Figure 51) is simply a running log file of the details of what is happening on
the switch with respect to EAPS. You can see the current configuration as well as any events that occur.
This screen can be found under the “EAPS Configuration” menu.

Figure 51: EAPS Information Page

Log Management
Log Management can help you troubleshoot the switch if it is not working properly. Log files keep track
of everything that is happening on a device. They can also be displayed to the screen in real time to aid
in troubleshooting. The SWxx-xxPB series of switches has this ability.

55
SWxx-xxPB Administration Manual

Log Information
The Log Information page (Figure 52) allows you to view logging information in real time. The page
displays what is happening in the system. This can be done at various levels of detail.

Figure 52: The Log Information Page

To view the log file, simply click the “Refresh” button.

To change the level of detail displayed, choose the level of detail from the drop down menu next to “Log
Priority”, then click the “Refresh” button.

POE Power Control


Power over Ethernet (PoE) allows devices to get their power from the Ethernet switch as opposed to
having to run with DC power adapters (power “bricks”). The SWxx-xxPB is a PoE switch so it will provide
power to PoE enabled devices.

POE Power Control


This particular page (as shown in Figure 53) in the “POE Power Control” menu allows you to see the
state of PoE on specific ports and lets you enable/disable the power to each port.

To Enable or Disable PoE on a particular port:

1. Navigate to the “POE Power Control” page under the “POE Power Control” menu.
2. Select the port you wish to configure from the drop down menu next to “POE Port”.
3. To enable or disable PoE power for the selected port, choose “enable” or “disable” from the
drop down menu next to “POE Power Status” (By default, PoE is enabled on all ports).
4. Click “Apply” to activate the changes.

Note: You may use this feature to Power Cycle devices that are connected to the ports
on the switch.

56
SWxx-xxPB Administration Manual

Figure 53: PoE Power Control Page

If you are unable to get the SWxx-xxPB switch to function using these steps, you can contact the
Technical Support team for help.
Please be prepared to provide your product's model and serial number when contacting Pakedge
Support. Your model and serial numbers are printed on a label located on the electronic housing.

57
SWxx-xxPB Administration Manual

Appendix A – Technical Support


Please visit our website for up-to-date support information:

Website: www.pakedge.com
Email: support@pakedge.com

CONTACT INFORMATION:
Pakedge Device & Software Inc.
1163 Triton Drive
Foster City, CA 94404

Appendix B – Specifications

Feature SW8-8PB SW16-16PB SW24-24PB


General 8 - Ports 10/100Mbps Two 16 - 10/100Mbps 24 - 10/100Mbps
Ports 10/100/1000m combo 2 Ports 10/100/1000m combo Two Ports 10/100/1000m
(RJ45 or SFP) (RJ45 or SFP) combo (RJ45 or SFP)
MAC Address 8K 8K 8K
Table Size
Switch Fabric 8.8Gbps Forwarding Capacity 8.8Gbps Forwarding Capacity 8.8Gbps Forwarding Capacity
Transmission Store-and-forward Store-and-forward Store-and-forward
Method
Diagnostic LEDs Per Unit: Power; Per Unit: Power; Per Unit: Power;
Per Port: Activity/Link, Speed Per Port: Activity/Link, Speed Per Port: Activity/Link, Speed
Packet Buffer On-chip 512Kbytes Buffer On-chip 512Kbytes Buffer On-chip 512Kbytes Buffer
Memory Memory per device Memory per device Memory per device
Dimensions 14.3 in x 10.4 in x 1.73 in (363 17.4 in x 11.8 in x 1.73 in 17.4 in x 11.8 in x 1.73 in
(L x W x H) mm x 263 mm x 44 mm) (442 mm x 300 mm x 44 mm) (442 mm x 300 mm x 44 mm)
Weight 7 lbs (3.1 Kg) 10 lbs (4.5 Kg) 14 lbs (6.3 Kg)

Power consumption 20W + 15.4W*8 ports= 32W + 15.4W*16 ports = 20W + 15.4W*24 ports =
(max.) 144W 278W 390W
802.3af PoE Support Per 10/100BASE-T Port Per 10/100BASE-T Port Per 10/100BASE-T Port

Power Provision Per 15.4W 15.4W 15.4W


Port (Max.)
Auto Power/Device Yes Yes Yes
Discovery
Over-Current Yes Yes Yes
Protection
Power input AC 110 ~ 240 V, 47 ~ 63 Hz, AC 110 ~ 240 V, 47 ~ 63 Hz, AC 110 ~ 240 V, 47 ~ 63 Hz,
1A/230V, double power hot 1A/230V, double power hot 1A/230V, double power hot
standby standby standby

58
SWxx-xxPB Administration Manual

Feature SW8-8PB SW16-16PB SW24-24PB


PoE Power Pins 1, 2, 3, 6 (RJ45) 1, 2, 3, 6 (RJ45) 1, 2, 3, 6 (RJ45)

Port & Slot 10/100M RJ45 10/100M RJ45 10/100M RJ45


1000M RJ45 1000M RJ45 1000M RJ45
Stacking Up to 16 in a stack Up to 16 in a stack Up to 16 in a stack

Temperature Operating: 0 ~ 50°C Operating: 0 ~ 50°C Operating: 0 ~ 50°C


Non-operating: -40 ~ 70°C Non-operating: -40 ~ 70°C Non-operating: -40 ~ 70°C
Humidity 0 ~ 90% (no condensing) 0 ~ 90% (no condensing) 0 ~ 90% (no condensing)

Spanning Tree IEEE 802.1D STP, IEEE 802.1w IEEE 802.1D STP, IEEE 802.1w IEEE 802.1D STP, IEEE 802.1w
RSTP, 802.1s MSTP RSTP, 802.1s MSTP RSTP, 802.1s MSTP
VLAN Port-based VLAN, 802.1Q tag Port-based VLAN, 802.1Q tag Port-based VLAN, 802.1Q tag
VLAN, Private VLAN, GVRP VLAN, Private VLAN, GVRP VLAN, Private VLAN, GVRP
dynamic VLAN configuration dynamic VLAN configuration dynamic VLAN configuration
VLAN Number 4K (256 active VLANs) 4K (256 active VLANs) 4K (256 active VLANs)

Rate Limit Unit: 100K Unit: 100K Unit: 100K

Storm Control Stop sending at threshold to Stop sending at threshold to Stop sending at threshold to
restrict broadcast storms. restrict broadcast storms. restrict broadcast storms.
Traffic control Back pressure at half-duplex, Back pressure at half-duplex, Back pressure at half-duplex,
802.3x at full-duplex, CAR 802.3x at full-duplex, CAR 802.3x at full-duplex, CAR
support, 64K step size for 100- support, 64K step size for 100- support, 64K step size for 100-
M ports, 8 M step size for M ports, 8 M step size for M ports, 8 M step size for
Gigabit ports Gigabit ports Gigabit ports
Multicast control IGMP snooping IGMP snooping IGMP snooping

Port Trunking Up to 14 groups with up to Up to 14 groups with up to Up to 14 groups with up to


eight ports per group, sixteen ports per group, eight ports per group,
dynamic LACP or static dynamic LACP or static dynamic LACP or static
aggregation aggregation aggregation
Port mirroring Supported; can be based on Supported; can be based on Supported; can be based on
flow classification. flow classification. flow classification.
Clustering Up to 32, manageable Up to 32, manageable Up to 32, manageable
through single IP through single IP through single IP
DHCP DHCP snooping, DHCP option DHCP snooping, DHCP option DHCP snooping, DHCP option
82, IP source guard 82, IP source guard 82, IP source guard

59
SWxx-xxPB Administration Manual

Feature SW8-8PB SW16-16PB SW24-24PB


Security IEEE 802.1x port-based user IEEE 802.1x port-based user IEEE 802.1x port-based user
authentication. Port Security authentication. Port Security authentication. Port Security
Hardware support for IP ACL, Hardware support for IP ACL, Hardware support for IP ACL,
MAC ACL, VLAN ACL MAC ACL, VLAN ACL MAC ACL, VLAN ACL
Hardware support for IPv6 Hardware support for IPv6 Hardware support for IPv6
Source/destination/TCP/UDP/ Source/destination/TCP/UDP/ Source/destination/TCP/UDP/
protocol-based ACL protocol-based ACL protocol-based ACL
Hardware support for time- Hardware support for time- Hardware support for time-
based ACL. Hardware support based ACL. Hardware support based ACL. Hardware support
for DHCP snooping for DHCP snooping for DHCP snooping
Hardware support for DAI, Hardware support for DAI, Hardware support for DAI,
static/dynamic anti-ARP static/dynamic anti-ARP static/dynamic anti-ARP
attack. Support for Web- attack. Support for Web- attack. Support for Web-
interface authentication interface authentication interface authentication
Remote authentication Remote authentication Remote authentication
through RADIUS. Support for through RADIUS. Support for through RADIUS. Support for
Cisco TACACS+ access control Cisco TACACS+ access control Cisco TACACS+ access control
User privilege classification User privilege classification User privilege classification
and password protection and password protection and password protection

QoS Head Of Line (HOL) blocking Head Of Line (HOL) blocking Head Of Line (HOL) blocking
prevention mechanism prevention mechanism prevention mechanism
Four dispatching queues per Four dispatching queues per Four dispatching queues per
port, mapping the sixteen port, mapping the sixteen port, mapping the sixteen
priority queues in 802.1p priority queues in 802.1p priority queues in 802.1p
Best Effort Service Best Effort Service Best Effort Service
Differentiated Service Differentiated Service Differentiated Service
Strict Priority Strict Priority Strict Priority
Weighted Round Robin Weighted Round Robin Weighted Round Robin
First Come, First Served First Come, First Served First Come, First Served
TOS re-tagging TOS re-tagging TOS re-tagging
RTS RTS RTS
Network SNMP v1/v2 SNMP v1/v2 SNMP v1/v2
Management RMON (Group 1, 2, 3, 9) RMON (Group 1, 2, 3, 9) RMON (Group 1, 2, 3, 9)
Telnet Telnet Telnet
Command Line Interface (CLI) Command Line Interface (CLI) Command Line Interface (CLI)
Web interface Web interface Web interface
Support BDCOM network Support BDCOM network Support BDCOM network
management tools suite: management tools suite: management tools suite:
Broad Director Broad Director Broad Director
NTP, SSH, LLDP NTP, SSH, LLDP NTP, SSH, LLDP
Software upgrade HTML/TFTP/FTP HTML/TFTP/FTP HTML/TFTP/FTP
Configuration HTML/TFTP/FTP HTML/TFTP/FTP HTML/TFTP/FTP
upload/download

60
SWxx-xxPB Administration Manual

Appendix C – Limited Warranty

Model SWxx-xxPB
Congratulations on your purchase of a Pakedge Device & Software product! Pakedge designs and
manufactures the finest home networking products. With proper installation, setup, and care, you
should enjoy many years of unparalleled performance. Please read this consumer protection plan
carefully and retain it with your other important documents.
This is a LIMITED WARRANTY as defined by the U.S. Consumer Product Warranty and Federal Trade
Commission Improvement Act.

What Is Covered Under the Terms of This Warranty?


SERVICE LABOR: Pakedge will pay for service labor by an approved Pakedge service center when needed
as a result of manufacturing defect for a period of one (1) year from the effective date of delivery to the
end user.
PARTS: Pakedge will provide new or rebuilt replacement parts for parts that fail due to defects in
materials or workmanship for a period of one (1) year from the effective date of delivery to the end
user. Such replacement parts are then subsequently warranted for the remaining portion (if any) of the
original warranty period.

What Is Not Covered Under the Terms of This Warranty?


This warranty only covers failure due to defects in materials and workmanship that occur during normal
use and does not cover normal maintenance. This warranty does not cover any appearance item; any
damage to living structure; failure resulting from accident (for example: flood, electrical shorts,
insulation); misuse, abuse, neglect, mishandling, misapplication, faulty or improper installation or setup
adjustments; improper maintenance, alteration, improper use of any input signal and/or power, damage
due to lightning or power line surges, spikes and brownouts; damage that occurs during shipping or
transit; or damage that is attributed to acts of God.
The foregoing limited warranty is Pakedge’s sole warranty and is applicable only to Products sold as new
by Authorized Dealers. The remedies provided herein are in lieu of a) any and all other remedies and
warranties, whether expressed, implied or statutory, including but not limited to, any implied warranty
of merchantability, fitness for a particular purpose or non-infringement, and b) any and all obligations
and liabilities of Pakedge for damages including but not limited to incidental, consequential or special
damages, or any financial loss, lost profits or expense, or loss of network connection arising out of or in
connection with the purchase, use or performance of the Product, even if Pakedge has been advised of
the possibility of such damages.

61
SWxx-xxPB Administration Manual

CAUTION: DAMAGE RESULTING DIRECTLY OR INDIRECTLY FROM IMPROPER INSTALLATION OR SETUP IS


SPECIFICALLY EXCLUDED FROM COVERAGE UNDER THIS WARRRANTY. IT IS IMPERATIVE THAT
INSTALLTION AND SETUP WORK BE PERFORMED ONLY BY AN AUTHORIZED PAKEDGE DEALER TO
PROTECT YOUR RIGHTS UNDER THIS WARRANTY. THIS WILL ALSO ENSURE THAT YOU ENJOY THE FINE
PERFORMANCE YOUR PAKEDGE PRODUCT IS CAPABLE OF PROVIDING.
Rights, Limits, and Exclusions
Pakedge limits its obligation under any implied warranties under state laws to a period not to exceed
the warranty period. There are no express warranties. Pakedge also excludes any obligation on its part
for incidental or consequential damages related to the failure of this product to function properly.
Some states do not allow limitations on how long an implied warranty lasts, and some states do not
allow the exclusion or limitation of incidental or consequential damages. In this case, the above
limitations or exclusions may not apply to you. This warranty gives you specific legal rights, and you may
also have other rights that vary from state to state.
Effective Warranty Date
This warranty begins on the effective date of delivery to the end user. For your convenience, keep the
original bill of sale as evidence of the purchase date from your authorized dealer.
Important- Warranty Registration
Please register your product at www.pakedge.com. It is imperative that Pakedge knows how to reach
you promptly if we should discover a safety problem or product update for which you must be notified.
In addition, you may be eligible for discounts on future upgrades as new networking standards come
about.
To Obtain Service, Contact Your Pakedge Dealer.
Repairs made under the terms of the Limited Warranty covering your Pakedge product will be
performed by an Authorized Pakedge Service Center. These arrangements must be made through the
selling Pakedge Dealer. If this is not possible, contact Pakedge directly for further instructions. Prior to
returning a defective Product directly to Pakedge, you must obtain a Return Material Authorization
number and shipping instructions. Return shipping costs will be the responsibility of the owner.
For additional information about this warranty, visit our website:
Pakedge Device & Software Inc.
1163 Triton Drive
Foster City, CA 94404-1213
U.S.A.

877-274-6100
Email: support@pakedge.com
www.pakedge.com

62

You might also like