Control4 SWXXXXPB NETWORKS SWITCH User Manual SW24 24PB Web UG

Pakedge Device and Software Inc. NETWORKS SWITCH SW24 24PB Web UG

Users Manual

Web Management User Guide     SW24-24PB PoE Switch Web Management User Guide
Web Management User Guide  Contents Chapter 1、WEB page overview............................................................................................................ 1 1、WEB Access features................................................................................................................ 1 2、WEB browsing system requirements........................................................................................ 1 3、WEB browsing session landing ................................................................................................ 1 4、WEB page elements.................................................................................................................. 2 5、The structure of Navigation tree ............................................................................................... 3 6、Page button Introduction........................................................................................................... 3 7、Error messages.......................................................................................................................... 3 8、Entry Field ................................................................................................................................ 4 9、Status Field ............................................................................................................................... 4 Chapter 2、WEB page introduction....................................................................................................... 5 1、Login dialog Box ...................................................................................................................... 5 2、Main Page ................................................................................................................................. 6 3、System Configuration: .............................................................................................................. 6 4、Port Configuration .................................................................................................................. 11 5、MAC binding .......................................................................................................................... 16 6、MAC filtering ......................................................................................................................... 17 7、VLAN Configuration.............................................................................................................. 18 8、SNMP Configuration .............................................................................................................. 20 9、ACL Configuraion .................................................................................................................. 21 10、IP Basic Configuration.......................................................................................................... 22 11、Certification. Authorization. Accounting (AAA) configuration ........................................... 24 11、PoE port configuration.......................................................................................................... 27
Web Management User Guide    - 1 - WEB page operating manual  This manual focus on describing the WEB page of switch, the user can managed the switch through WEB page. This manual only introduce the simple opetations of the various WEB page of the various switches. This manual includes the following:   1, WEB page overview 2, WEB page description Chapter 1、WEB page overview 1、WEB Access features z  Switch provide users with Web access functionality. Via Web browser, users can access switches, manage and configure the switch. WEB accessing‘s main features are: 1, Easy to access: Users can easily access on switch from anywhere using the network. 2, users can visit the WEB pages of the switch by using the familiar Netscape  λ Communicator and Microsoft Internet Explorer and other browsers, WEB pages of graphical and tabular format presented to the user. 3, Switch switch provides a wealth of WEB  pages, the user can configure and manage vast majority of functions of the switch. 4, WEB page’ function classification &integration, make the user find the relevant pages to configuration and management. 2、WEB browsing system requirements Pls see the form 1。 Form 1: Hardware&Software system requirements CPU  Pentium 586 above Memory  128MB above Resolution  800x600 above Color  256 colors above Browser   IE4.0 above or Netscape4.01 above Operating system  Microsoft® ,Windows95®,Windows98®,WindowsNT®, Windows2000®,WindowsXP®,WindowsME®, WindowsVista®, Linux,Unix ect.  Note: Microsoft ®, Windows95 ®, Windows98 ®, WindowsNT ®, Windows2000 ®, WindowsXP ®, Windows ME ®, WindowsVista ® is a registered trademark of Microsoft Corp. All other product names, trademarks, registered trademarks and service marks, copyrights held by their respective owners. 3、WEB browsing session landing z  Before start Web browsing session ,the user need to make sure: 1. has configure the IP of switch, under the  default case, the switch VLAN1 interface IP address is 192.168.0.1, 2. subnet mask is 255.255.255.0. 3. has a Web browser installed on the host to  connect to the network, and the host
Web Management User Guide    - 2 - can PING-pass switches. 4. After completing these two tasks, the user put the right address on the browser's address bar of the switch and press Enter to enter the switch after the Web login page, shown in Figure 1. When the multi-user management is not enabled, the user login need for anonymous Web user (admin) password for authentication, and only entered the correct password can access Web, anonymous user password by default is empty.  If the system enabled a multi-user management and configure the privileged user, the anonymous user's password will not force users to visit the Web.user access not do anonymous user's password authentication, but to do a multi-user management, user name and password authentication.      Figure 1 4、WEB page elements Shown in Figure 2, WEB page is mainly composed of three parts: title page, navigation tree page and main page   Figure 2 Title page is Used to display the logo main page Is used to display the user from the navigation tree, select the page
Web Management User Guide    - 3 - 5、The structure of Navigation tree Figure 3 shows the navigation tree organizational structure. Navigation tree is located in the lower left of each page, using the tree display nodes of the WEB page, users can easily find the page you want to manage the WEB. According to a different web page functionality can be divided into different groups, each including one or more pages. Most of the navigation tree in the name of the corresponding web page top of page title abbreviation.    Figure 3 6、Page button Introduction On the pages, here are Some commonly used button, the role of these buttons are generally the same, Form 2 on the role of these buttons are described: Form 2: button effect Renew    Update all fields on the page Apply  numerical value will be updated into the memory. Because the error-checking should be implement    by the Web Server, before the user selects the button will be no error checking. Deleter  Delete the current record Help  Open help pages, view the individual pages of the configuration instructions 7、Error messages If the switch WEB server error occurred while processing user requests, it will display a dialog box in the corresponding error message. For example, Figure 4 shows an error message dialog box.
Web Management User Guide    - 4 -  Figure 4 8、Entry Field Some pages of the most left column in the table has an entry field, as shown in Figure 5, through the field can access different rows in the table. When you choose a lines for the filed, which lines the corresponding information is displayed in the first line, then only the line can be edited, the line also known as the activities line. A time when it was first loaded, it shows the filed new, activity line is empty. If want to add a new line , should select new from the drop-down menu of entry field, , enter the new line’s information, and then press apply button. If you want to edit the line already exists, it is necessary select the appropriate line number of the drop-down menu, according to need to edit the line, and then press the apply button, you will see a corresponding change in the table displayed. If you want to delete a row, select the line number accordly from entry field’s drop-down menu, then press the delete key, this line will disappear from the table.   Figure 5 9、Status Field Some pages of the most right column in the table there is a state field, as shown in Figure 6, the field displays the line status. Since all row state changes are processed in-house, so the status field is read-only. Once the line information of the entry filed into force, the line will automatically become the active state the status active.
Web Management User Guide    - 5 -  Figure 6 the web page of status field   Chapter 2、WEB page introduction Switch switches WEB pages organized into groups, each including one or more of the WEB pages. The following are introduced one by one on each page. 1、Login dialog Box  Figure 7 WEB browsing session of the login page  Figure 7 shows the login dialog box, the logon dialog box will be displayed while the user login the web page at the first time. When The user filled out the correct user name and password, then click the Enter button can log on to the switch Web server. Passwords are case-sensitive, the anonymous user password can be maximum set up to 16 characters, while
Web Management User Guide    - 6 - the multi-user name and password can be set up to 11 characters. Switch switch default user name is the anonymous user name admin, default password for the anonymous user's password, the anonymous user's password is empty by default.  2、Main Page Figure 8 shows the WEB main page of tico Switch switches. This page will be displayed after the user logs in web pages   Figure 8 Switch switches main page    3、System Configuration: (1)Basic information page  Figure 9 is the basic information of configuration page, users can configure the basic information for the switch. System Description display the description of the relevant parameters of system. System descriptor ID display system in the network identity management. The system version number is displayed the current software version number of switches. The number of switches interface displays the current number of interfaces in the switch. The system start-up time display switches from start to the present time. The system name as the switch’s system name in the network, the user can modify the system name. The systematic location as the switch’s physical location showing at the network, the user can modify the system locations. system Contact show the contacts person and details of the current node, the user can modify the system contact.
Web Management User Guide    - 7 -  Figure9 Basic information Page  (2)Serial port information page Figure 10 is a serial port configuration page, the page displays serial baud rate and other related information. When the host through the serial port terminals (such as Windows, HyperTerminal) to the management of switches, serial console on the COM port configuration must be consistent with this page information.   Figure 10 Serial port information page  (3)User management page Figure 11 is a user management page, the user can modify this switch anonymous user (admin) password, Telnet and the Web without opening a multi-user, they all use the same anonymous user's password. Passwords are case-sensitive, and can be up to 16 characters. If you want to change your password, the user need to enter the new password twice, once the user clicks the application button, the new password is activated, then if the switch is not enabled multi-user, will display the login dialog box (as shown in Figure 7), require the user to re - login the web page, with a new anonymous user password. Meanwhile through this page user can configure the multi-user, switch if in the default is no multi-users, that is, not enabled the multi-user management functionality, at this time does not require multi-user login user name and password authentication. For Telnet, when adding a user name, multi-user management features were enabled, and when removed all of the user,
Web Management User Guide    - 8 - multi-user management functionality has been closed. For the Web, when adding a user name, if it is privileged user, multi-user management functionality was enabled, when all of the privileges users have been deleted, multi-user management functionality has been closed. When the multi-user management features enabled, the anonymous user's password will not take effect, log Telnet and the Web requires a multi-user user name and password authentication. When the multi-user management function is turned off, at this time if the configured anonymous user's password, log on Telnet, and Web need anonymous user's password authentication   Figure 11 user’s management page  (4)Security Management Page   Figure 12 is Security management configuration page, through the page's configuration, , the administrator can control network management services TELNET, WEB and SNMP, you can open (enable) or off (disable) these services, these services can be mounted up with standards IP ACL group ,and the implementation of the source IP address control, control access to the host of these services When the Switch default ,TELNET, WEB and SNMP services are open and no ACL filtering, that is, all hosts have access to the switch of these three services. If the administrator for safety, do not want to provide one or several services, which can shut down one or several services. If the administrator only hope that the specified host could access one or several services , can do the ACL filtering for one or several services. As a service to do ACL filtering, you need to open the service, and to select an IP standard ACL group (1-99),the primary factor it’s the ACL group must be present. Note that, if the administrator on this page control the WEB services (such as closing WEB Services) may cause users to no longer use the WEB page, then you can log switches by other means and to control the use of WEB service allows users to WEB page (such as the Open the WEB service).
Web Management User Guide    - 9 -  Figure 12 Security management page  (5)Configure the current page Figure 13 is the current configuration page. the user can view the current configuration of the switch on this page. Save key is to store the current system    configuration in the configuration file. Because the storage operation requires erase& write FLASH chips, which take up some time. When the user was configured on the page and hope to restart the switch from using these configurations are not lost, you must exit the page before the current configuration page, click the Save button.   Figure 13 the current configuration page  (6)Configuration page   Figure 14 is profile configuration page. This page allows users to view the system's initial configuration. The initial configuration is actually the configuration file in the FLASH, when the configuration file does not exist in FLASH, the system starts using the default configuration. Delete key to delete the configuration file in the FLASH. Click the Delete button, will pop up a dialog box ,that will prompts the user sure to delete the configuration file or not, according to the dialog box to determine if it's ok, otherwise click Cancel button. Download button is used to downloaded a configuration file to the PC. Click to download button, will pop up a dialog box, users select Save and save the configuration file directory path. Download the configuration file names are as switch.cfg.
Web Management User Guide    - 10 -  Figure14 Configuration file page  (7)File upload page  Figure 15 is a file upload page, through this page a user can upload a configuration file and mapping files to the switch. Click the Browse button to select the upload configuration file or image file in the directory path on the PC. Click Upload button upload a configuration file or image file, configuration file extension must be *. cfg, image file must be provided by the manufacturer and the file name extension must be *. img. Transmission before the return of the results page, please do not click on other pages, or restart the switch; otherwise, the file transfer will lead to failure caused by system crashes.   Figure 15 File Upload Page  (8)System reset page Figure 16 is system reset page, through this page users to restart the switch. When you click on Restart button, will pop up a dialog box that prompts the user to determine whether or restart the switch, If it is determined according to OK button, otherwise click Cancel button. Restart will no longer open the Web page.
Web Management User Guide    - 11 -  Figure16 System reset page  4、Port Configuration (1)Port configuration / port -display page         Figure 17 is the port configuration / port -display page. Users can enable or disable the port to the page, set the port speed, or View all ports of the basic information. To set a specific port, users need to select the appropriate port name on port drop-down menu,. The default port status is up, can select the drop-down menu -down to disable the port. Users can also choose to set the speed of the drop-down menu to set the speed of the port, such as the mandatory half-duplex port 10M (half-10) and so on. On this page the user can view all ports other basic information.   Figure 17 port configuration and port - display page   (2)Port Statistics Page       Figure 18 is the port statistics information page. To view a particular port, users need to select the appropriate port name in the port drop-down menu. Users can view    the statistics information of send and receive packets on this page.
Web Management User Guide    - 12 -  Figure 18 Port Statistics Page  (3)Flow control page  Figure 19 is the flow control page. Users can enable and disable each port’s send and receive flow control through this page. Flow control by sending the side of the drop-down on or off to open or close the sending side of flow control, flow control through the receiving side of the drop-down on or off to open or close the receiver-side flow control, while on and off also shows the port to send side and receiving-side flow control is turned on or off.   Figure 19 Flow control page  (4)Broadcast storm control page  Figure 20 is the Broadcast Storm Control page. This page is used to do the suppression for configure port broadcast packets, multicast packets and DLF packet. From the Port drop-down bar select to configure ports. Through the on and off    key to open and close the port broadcast suppression, multicast, DLF inhibition and suppression. Inhibition rate is used to configure the port    inhibition speed, range 1-1024000, unit kbits. The inhibition rate of the same port broadcast suppression, multicast and DLF inhibition is the same.
Web Management User Guide    - 13 -  Figure 20 Broadcase Storm control Page  (5)Port speed limits page Figure 21 is the port speed- limit page. This page is used to configure the port ‘ssend and receive rate From the Port drop-down bar select the configure ports. Bandwidth control of the send datapackets is used to configure and display the bandwidth control it , the range is 1-1024000, unit kbits, enter into force after the key press applications. If the port is not configured bandwidth control, shown as off. Cancel button is used to cancel the corresponding data packet to send bandwidth control. Receiving data packets is used to configure and display the bandwidth control of receive data packets control ,the range is 1-1024000, unit kbits, enter into force after the key press applications. If the port is not configured bandwidth control, shown as off. Cancel button is used to cancel the corresponding receiving data packets bandwidth control   Figure 21 Port speed limit page  (6)Port protection page Figure 22 is the Port protection page. This page is used to configure the port for the protection port.       If the port is configured as a protected port, the ports can not exchange the data with each other , protected port only with non-protected port for data exchange.
Web Management User Guide    - 14 -  Figure 22 protected port page          (7)Port Learning restrain page          Figure 23 is the port learning restrain page. This page used to restrict the port can learn of the MAC address of the number, range is 0-8191. The default value is 8191, also is the maximum that the port is not configured the learning restrain   Figure 23 Port Learning restrain page  (8)Port Trunking configuration page Figure 24 is the port trunking configuration page,. This page allows the user to configure the port trunking. This page consists of four parts: port trunking ID selection, port trunking method selection, configurable ports and group members port. To create or modify the port trunking, the user need to select a port trunking ID, port trunking ID from 1 to 3. The user clicks the list box the appropriate port trunking ID, the port trunking of information displayed in the group port. To create a Trunk group, select the appropriate ID in the port trunking ID, click the button "Trunk ID Settings." To set the port trunking method, select one port trunking method, click the button "polymerization Settings." To increase the trunking ports, the port can be configured to select the trunking port in the configurable, click on "members of the port =" "key. Aggregation from the existing port to remove a port group member ports in the trunking port selected, click on "non-member port" = "key. To delete the entire TRUNK group, then click the "Delete trunk group" button.
Web Management User Guide    - 15 - In page configuring process, at least one Trunk has been established then polymerization settings can take effect; configured Trunking method is also applied to all on the Trunk groups; in that already exist on the Trunk can add or remove Port members    ; in the absence of the port members situation can deletee a Trunk Group. Switch provides three kinds of port trunking methods: Based on the source MAC address, based on the purpose MAC address, based on the source and purpose MAC addresses. Switch switch maximum support 3 groups port trunking, can be configured to a maximum of three Trunk Group, Trunk1 and Trunk2 can not trucking Gigabit ports, and each group can be aggregated up to the same four attributes port. Trunk3 only be aggregated Gigabit ports, and up to 2 Gigabit ports can be aggregated. Port aggregation method is common to all of the Trunk.   Figure 24 Port Trunking configuration page  (9)Port mirroring configuration page Figure 25 is the port mirroring configuration page .the page allows users to configure port mirroring. Port mirroring through the mirror port to monitor the data packets of being mirrored output port and the data packets of    being mirrored input port.. mirroring Port can only choose one, being mirrored output port and being mirrored input port can select multiple. This page consists of four components: monitor port, configurable port, monitoring tdirection and mirror configuration information. When you start to configure a mirror port ,firstly configured mirroring port from monitor ports, mirror ports can only have one, and then select the mirror port from the configurable port, select the monitor direction, and press the application key to entry into force, the results is displayed in the mirrored configuration information. When choose the RECEIVE in direction of monitor, said monitor data packets received, TRANSMIT, said monitor data packets sent, BOTH that monitor all data sent and received packets, NOT_RECEIVE to cancel monitoring received data packets, NOT_TRANSMIT to cancel monitor send data packets, NEITHER cancels monitor data packets received and sent, that is canceling monitor port.
Web Management User Guide    - 16 -  Figure25 Port mirroring configuration page         5、MAC binding (1)MAC binding configuration page  Figure 26 is the MAC binding configuration page. This page is used to achieve the port and MAC address binding. MAC entries on the page is used to enter the MAC address binding, VLAN ID entry is used to enter the MAC address of VLAN   Figure 26    the MAC binding configuration page  (2)MAC binding automatic conversion page Figure 27 is the MAC binding automatic conversion page. This page is used to achieve the port MAC address auto-binding.Shows the hardware switch on the lay2 the exist port dynamic MAC address and affiliated VLAN. Can choose one of the entry and convert it into static binding.
Web Management User Guide    - 17 -  Figure 27    the MAC binding automatic conversion page 6、MAC filtering (1)MAC filtering configuration page Figure 28 is the MAC filtering configuration page. This page is used to configure the ports on the MAC address filtering. MAC entries on the page is used to enter the MAC address filtering, VLAN ID entry is used to enter the MAC address affiliated VLAN.   Figure 28    the MAC filtering configuration page  (2)MAC filtering automatic conversion page  Figure 29 is the MAC filtering automatic conversion page. This page is used to achieve the port MAC address auto-binding. Shows the hardware switch on the lay2 the exist port dynamic MAC address and affiliated VLAN. Can choose one of the entry and convert it into static filtering configuration
Web Management User Guide    - 18 -  Figure 29   the MAC filtering automatic conversion page 7、VLAN Configuration (1)VLAN information page Figure 30 shows the current VLAN information page. This page is read-only page displays the current VLAN configuration information l, including the VID, state and port members. select VLAN from the drop-down VID, shows the port information of the Port VLAN members.         A port may not be a member of VLAN, which can be VLAN-tagged or untagged members . the meanings of characters pls see the following info: t  tagged    the port is the VLAN tagged member   u  untagged    the port is the VLAN untagged member   Figure 30 VLAN information page  (2)Static VLAN configuration page Figure 31 is the static VLAN configuration page that allows users to create VLAN. If you want to create a new VLAN, the user input VID on activity line, ranging from 2 to 4094. VLAN name is generated depend on VLAN ID and can not be modified. Click Apply button, then the list box displays the user-created VLAN's VID and VLAN name. Switch by default created VLAN1, and VLAN1 can not be removed If you want to delete a VLAN, the user need to click the appropriate VLAN of the list box. The VLAN will be displayed in the activity line, click the Remove (Delete) key to delete the
Web Management User Guide    - 19 - VLAN, the same time, the information of the VLAN to remove from the list box.   Figure 31 the static VLAN configuration page  (3)VLAN port configuration page Figure 32 is a VLAN port configuration page, which is used to configure the VLAN port configuration and display results. This page mainly consists of eight parts: port, mode, all current VLAN, port-owned VLAN, key "default VLAN =>"," tagged =>"," untagged =>" and "non-members" =. " Port is defined a designated port that will configure the VLAN   Mode Access designated the VLAN mode as the ACCESS mode, Under this mode, the port default VLAN is the untagged member of VLAN1, the port's default VLAN is 1. Hybrid specified port VLAN mode HYBRID model, in this mode, the port default VLAN is the untagged member of VLAN1, the port's default VLAN is 1. Trunk specified port VLAN mode is TRUNK mode, in which the port VLAN mode, the default is VLAN1 a tagged member of the port's default VLAN is 1. All current VLAN that has been created VLAN, also it’s can be configured VLAN, the user from the list select VLAN, can be multiple-choice. VLAN Port-owned shows the results of VLAN port configuration, [p] indicates that the port VLAN is the default VLAN, [t] that the port is a VLAN tag members, [u] that the port is not tagged VLAN member. When you remove VLAN, the user from the list, select the VLAN, can be multiple-choice. Button "default VLAN =>" to configure port the default VLAN, selected one VLAN from the current all the VLAN.         Button "tagged =>" Configured port is designated as a tagged member of VLAN, selected one or more VLAN from the current all VLAN.     Button "untagged =>" Configure VLAN port is a designated member of the untagged, selected one or more VLAN from the current all VLAN.         Button "non-members <= to delete the port from the specified one or more of the VLAN ,no longer a member of the VLAN, from the port affiliated VLAN to selected one or more VLAN.
Web Management User Guide    - 20 -  Figure 32 The VLAN port configuration page  8、SNMP Configuration (1)SNMP share body configuration page Figure 33 is a shared body of SNMP configuration page that allows users to configure the switch common body's name and read and write access, A total of 8 entries can be configured By default, the switch there is a share name as named public, the common body is read-only access. With this correspondence, the activities of this page is only one entry, shared body names are public, access is read-only access. When the switch through SNMP for network management, you need to configure a read-write permissions to the shared body  .  Figure 33 a shared body of SNMP configuration page       (2)TRAP target configuration page       Figure 34 is theTRAP target configuration page that allows users to configure the workstation to receive TRAP messages as well as the IP address ofTRAP protocol packets of some of the parameters. In the configuration entry, the name used to enter the TRAP name, IP address used to enter the target address, SNMP version used to select the version of the TRAP packet, if you
Web Management User Guide    - 21 - set successful, it will show in the state to active. If the configuration was successful, SNMP TRAP functions will take effects ,in the event of link up or link down, the switch will automatically send a TRAP packet to the target address   Figure 34 theTRAP target configuration page        9、ACL Configuraion (1)IP Standard ACL configuration page Figure 35 is the IP standard ACL configuration page, users can through this page to build ACL standard IP-rule base. user can select a ACL group number (the range between 1-99), in the group to create one or more rules. In a rule can match only the source IP address field (with mask)   Figure 35    the IP standard ACL configuration page          Users to configure the rules, the source IP address must be in with a mask, the rule can match the collection of IP addresses. The address mask is use anti-code , if the rule were to match the IP address range 192.168.0.0 to 192.168.0.255, then the IP address can be 192.168.0.1, and its mask of 0.0.0.255. Users to configure the rules, each rule must have a filter mode: allow or deny. The user to create a rule in the group, the system will automatically give the rule a rule
Web Management User Guide    - 22 - number, when to delete a rule in the group 1 rules, other rules remain unchanged, the system will automatically give the rule a rule group sort. If the user wants to delete the entire rule set, you can first select all, then click the delete key.  (2)ACL resource library information page Figure 36 is the ACL resource library information page, which displays the current ACL rules configured in all the information.   Figure 36    ACL resource library information page  10、IP Basic Configuration (1)VLAN Interface Configuration Page Figure 37 is a VLAN interface configuration page, users can configure the VLAN interface through this page, delete VLAN interfaces, configure the interface IP address, remove the interface IP address, and view interface information. VLAN already exists can only be set when the interface can only be configured on the interface set interface address.   Figure 37    VLAN interface configuration page  Switch switch in the default have a VLAN1 interface, the interface can not be deleted. One can only configure a VLAN interface.
Web Management User Guide    - 23 -  (2)ARP configuration and display page Figure 38 is the ARP configuration and display page, this page can display all of the information of the ARP table switch, while users can configure a static ARP entries on this page, delete ARP entries, and revised the dynamic ARP table entry to a static ARP table entry. When a user configure a static ARP entry, the need to enter the IP address and MAC address, MAC address must be a unicast MAC address, and then click Add button. When a user delete an ARP entry, you can choose to delete an IP-ARP table entry, remove a segment of the ARP table entry, delete all of the ARP table entry, delete all dynamic ARP table entries and delete all of the static ARP table entry . For the deletion of an IP-ARP table entries, or delete a segment of the ARP table entry required to enter in the input box, specify the IP address or IP network segment. Then click the Delete button When dynamic ARP table entry was revised to a static ARP table entry, you can choose to a particular network segment or all of the dynamic ARP table entry was revised to a static ARP table entry. For the situation to a network segment is required in the input box, enter the specified network segment. And then click Apply button   Figure 38      the ARP configuration and display page  (3)Host Static Routing configuration page Figure 39 is the host static route configuration page, the user can through this page to add, delete static routing switch hosts. By default, the switch is not configured to host a static route, the user can configure the default route through this page, that is the purpose of address / subnet prefix is 0.0.0.0 / 0 routing
Web Management User Guide    - 24 -  Figure 39 the host static route configuration page 11、Certification. Authorization. Accounting (AAA) configuration (1)Radius Configuration Page z Figure 40 is the Radius configuration page, users can configure with the Radius-related information, you can set information includes:   1. Be sure to set the Radius server's IP address before do the authentication and accounting in this field,   2. Optional Radius server IP  address, if there is spare Radius server can set this field.   3. Authentication UDP port, the  default value is 1812, the user generally do not need to modify this field.   4. whether to activate the , the default is to start, and when you do authentication and accounting in general to start charging.   5. Accounting UDP port, the default value is 1813.   6.shared secret key is used to setting the shared encryption password between the  switch and the Radius server, so be sure to set the authentication and accounting in this field, and with the same settings on the Radius server.   7. vendor-specific information,  the users typically do not need to modify this field.   8. NAS ports, NAS port type, NAS  type of service, these three values do not change in general.   9. whether to on or off the roaming feature of Radius.
Web Management User Guide    - 25 -  Figure 40 the Radius configuration page  (2)802.1x Configuration Page z Figure 41 is the 802.1x configuration page, users can configure 802.1x related information on this page, including:   1. whether to activate the  802.1x protocol, when doing authentication and accounting must be to start 802.1x protocol.   2. switch is to adopt a common authentication method or the expansion of authentication.  3. whether to open  re-authentication function, the default is not open .when you do authentication and accounting based on the actual circumstances. Open the re-authentication feature will make users more reliable when using the authentication and accounting, but it will slightly increase the network traffic.   4. Setting re-certification time  interval, only to re-open the case of authentication to be valid, the default is 3600 seconds, when you do authentication and accounting based on the actual situation to set the value, but the value is not too small.   5. Quiet Period Timer, users  typically do not need to modify this field.   6. Tx-Period Timer, users typically do not need to modify this field.   7. Server timeout timer, users     typically do not need to modify this field.   8.supplicant timeout timer,  users typically do not need to modify this field.   9. Max Request number, users  generally do not need to modify this field.   10.showing Reauth Max size.   11. Client Version, the client version number.   12.Check Client, whether the certification passed then examine the client's regular flow of packets.
Web Management User Guide    - 26 -  Figure 41 the 802.1x configuration page  (3)802.1x port configuration page       Figure 42 is the 802.1x port configuration page, the user through this page to configeure the support 802.1x port mode and hosts of the largest, at the same time you can view each port 802.1x configuration. 802.1x port model includes four types: N / A State, Auto state, Force-authorized state and Force-unauthorized state. When a port needs to do 802.1x Authentication,need to set Auto state, if not do authentication to access the network, to set N / A state, the other two states are rarely used in practical applications   Figure 42 the 802.1x port configuration page  Doing 802.1x authentication, port access, the default maximum host number is 100, the user can modify this field, the biggest support to the 100.  (4) 802.1x user authentication information page       Figure 43 is a 802.1x user authentication information page, the user can see through this page, under a certain port access for all users of the state information,
Web Management User Guide    - 27 -  Figure 43 802.1x user authentication information page 11、PoE port configuration (1)PoE port Configuration Page z  Figure 17 is the PoE port configuration / PoE-display page. Users can enable or disable the port's PoE function to the page, or View all ports of PoE information. To set a specific port, users need to select the appropriate port name on port drop-down menu. The default port's PoE status is up. Can select the drop-down menu -down to disable the port's PoE function. On this page the user can view all ports PoE information.  Information can be seen in the following tables: 1, PoE Staus:  Enalbe means PoE function is available;Disable means PoE function is close.   2, Class: Displays the current Class levels(Note: The information will not be updated until inserted in the new PD)。 3, Discoery:Fail means PD is disconnect;Normal means PD is connecting.   4, Fault:Shows the abnormal state of the port PoE.     Figure 44 the PoE port configuration page
FCC Notice  This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.  NOTE 1: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: - Reorient or relocate the receiving antenna. - Increase the separation between the equipment and receiver. -Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -Consult the dealer or an experienced radio/TV technician for help.  Any changes or modifications not expressly approved by the manufacturer could void the user’s authority to operate the equipment.    NOTE 2: The manufacturer is not responsible for any radio or TV interference caused by unauthorized modifications to this equipment. Such modifications could void the user’s authority to operate the equipment.

Navigation menu