Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
An AP group can be used to define configuration options and apply them to several APs at once. If your wireless network covers a large physical environment and you want to provide wireless services with some common settings and policies to different areas of your environment, you can use AP Groups to do this instead of having to modify the settings of each AP individually. For example, if your wireless network covers two floors and you need to provide wireless access to visitors on the 1st floor, you can simply setup two different AP groups with different settings and policies to suit your application.
Follow the steps below to create a new AP group.
Click on Add button to create a new AP group.
Enter the name and description of the new AP group.
In the Member Setting section, all managed access points that are not currently assigned to an AP group will be listed in Managed APs list on the left. Users can select the access points from the list and click Add to assign to this group. The access points will be moved to the Group Member list on the right .
Configure Radio, WLAN, and Advanced settings then click on Apply for settings to take effect.
Regarding Mesh AP setting in Advanced settings from AP Group, users can enable this feature to let APs in the group to become mesh members. If this feature is enabled, when mesh AP detects it’s no longer having wired connection to reach other mesh AP, it will then use the mesh link to set up connection to one of the best preferred mesh peer AP for connection. The RF link of either 2.4GHz or 5GHz can be decided by Mesh Profile settings under controller tab on EWS switch’s web management page.
Note: As most settings from above step-4 are the same as mentioned in last section of Access Point Settings, these common settings will apply to all AP members in the group. Depending on your design on applying group settings to APs in deployed WLAN, certain parameters like channel and transmit power may need to be overridden to reduce RF interference or optimize overall WLAN performance.
Please click on the device item to override group settings; the following shows that items like Channel HT Mode, Transmit Power, and Client Limits are eligible to be overridden.
Use the following tool or buttons in controller web management page for further configuration or management:
This page displays the status of all EnSky access points that your Controller is currently managing as well as all the EnSky access points in the network that the Controller has discovered. Use this page to add EnSky access points to your EWS switch’s Controller access point list.
The EWS switch can manage supported EnSky Series access points. For the discovery procedure to succeed, the EWS switch and the EnSky access point must be connected in the same network. The EWS switch can discover supported EnSky access points with any IP address and Subnet settings.
EnSky access points can either be configured individually or configured as a group.
To manage an access point individually, click on the Device Name field of the access point you wish to configure, and you will be directed to a screen where you can configure settings for the access point.
To manage access points as a group, go to Device Management > AP Groups to create an AP group and add members into the group. Click on the Group field of the AP you wish to configure, and you will be directed to a screen where you can configure settings for the AP group.
Group settings can be overridden by individual AP settings. For example, if you want to set the transmit power to a lower setting for only a few specific APs, leave the Transmit Power at Auto in the Wireless Radio Settings of the AP Group, then click on the Device Name field of the access point (which is already in a group) you wish to configure and you will be directed to a screen where you can configure override settings for the selected access point.
This indicates the current status of the managed access point.
Under the WLAN settings, you can create and manage SSID configurations and profiles for the access points to fit your needs. An SSID is basically the name of the wireless network to which a wireless client can connect to. Multiple SSIDs allow administrators to use a single physical network to support multiple applications with different configuration requirements. Up to 8 SSIDs are available per radio. Click on the SSID you wish to make changes to, and you'll be directed to the SSID configuration page.
Prefer 5GHz: All dual-band clients with 5GHz RSSI above the threshold will be connected to the 5GHz band.
Force 5GHz: All dual-band clients will be connected to the 5GHz.
Band Balance: This option automatically balances the number of newly connected clients across both 2.4GHz and 5GHz bands based on configured percentage for 5GHz clients.
Band Steering only defines the action when a wireless client associates with an AP for the first time, and the wireless client must be in both 2.4GHz and 5GHz wireless coverage zone when being authenticated with the AP for the Band Steering algorithm to take effect.
Captive Portal: When enabled, users will see a captive portal page upon connecting to SSID. The captive portal profile can be customized by clicking “Profile Setting” which can also be configured in Hotspot Service from controller settings.
Wireless MAC Filter: This is default disabled and users can select either “Allow MAC in the List” or “Deny MAC in the List” to make this filter as whitelist or backlist for SSID.
Traffic Shaping: This feature regulates the allowed maximum download/upload speed per SSID or per user. Select to enable or disable wireless traffic shaping for this SSID profile with respective download/upload limits per SSID or user.
Download Limit: This specifies the allowed maximum download speed.
Upload Limit: This specifies the allowed maximum upload speed.
Fast Roaming: This feature uses protocols defined in 802.11r to facilitate continuous connectivity for wireless devices roaming from one AP to another. Coupled with 802.11k, wireless devices are able to quickly identify nearby APs that are available for roaming and, once the signal strength of the current AP weakens and your device needs to roam to a new AP, it will already know which AP is best to connect with.
Security: Select the security method (None, WPA2 Enterprise, or WPA2-PSK):
WPA2 Enterprise: WPA2 is the Wi-Fi Alliance IEEE 802.11i standard, which include AES mechanisms.
RADIUS Server: Enter the IP address of the RADIUS server.
RADIUS Port: Enter the port number used for connections to the RADIUS server.
RADIUS Secret: Enter the secret required to connect to the Radius server.
Group Key Update Interval: Specify how often, in seconds, the group key changes. Select 0 to disable.
NAS-ID: This attribute contains a string identifying the NAS originating the Access-Request.
NAS-PORT: This attribute indicates the physical port number of the NAS which is authenticating the user.
NAS-IP: This attribute indicates the identifying IP Address of the NAS which is requesting authentication of the user.
RADIUS Accounting: This can be checked to enables the accounting feature.
RADIUS Accounting Server: Enter the IP address of the RADIUS accounting server.
RADIUS Accounting Port: Enter the port number used for connection to the RADIUS accounting server.
RADIUS Accounting Secret: Enter the secret required to connect to the RADIUS accounting server.
Accounting Group Key Update Interval: Specify how often, in seconds, the accounting data send. The range is from 60~600 seconds.
WPA2-PSK: WPA2 with PSK (Pre-shared key), designed for home and smaller office networks that don't require the complexity of an 802.1X authentication server.
WPA2 Passphrase: Enter the passphrase you wish to use. If you are using the ASCII format, the Key must be between 8~64 characters in length.
Group Key Update Interval: Specify how often, in seconds, the Group Key changes.
LED Control: In some environments, the blinking LEDs on APs are not welcomed. This option allows you to enable or disable the device’s LED indicators. Note that only indoor models support this feature.
RSSI Threshold: With this feature enabled, in order to minimize the time the wireless client spends on passively scanning for a new AP to connect to, the AP will send a disassociation request to the wireless client upon detecting the wireless client's RSSI value lower than the specified. The RSSI value can be adjusted to allow for more clients to stay connected to this access point. Note that setting the RSSI threshold value too low may cause sticky wireless clients to reconnect frequently. Disabling this feature is recommended unless you deem it necessary.
Management VLAN: This specific VLAN ID can be used to separate management traffic from regular network traffic.
IMPORTANT INFORMATION
When configuring or updating AP's management VLAN settings, make sure that the same management VLAN settings are applied to the EWS switch as well.
The Summary page shows general system information for the EWS switch including the Controller Status, the software version, the maximum number of APs the system can manage, MAC Address, IP Address, serial number, and system uptime for the system.
The Dashboard on the upper right corner of the GUI shows the current status of EWS APs that have been managed by the EWS switch.
Status: Select whether to Enable or Disable the Controller feature on the switch. ezMaster Address: If you have an ezMaster server running and want to have ezMaster manage this EWS switch directly, enter the IP Address/domain name of the ezMaster server.
Click Apply to save the changes to the system.
Controller Version: This is the software version of the device.
Max. Managed APs: The maximum number of APs the device can manage.
IP Address: Displays the IP address of the device.
Base MAC Address: Displays universally assigned network address.
Serial Number: Displays the serial number of the device.
System Uptime: Displays the number of days, hours, and minutes since the last system restart.
Note: For Band Steering to take effect, both 2.4GHz and 5GHz SSIDs must have the same SSID and security settings. Wireless clients must be in both 2.4GHz and 5GHz wireless coverage zone upon being authenticated with the AP for the Band Steering algorithm to take effect. Several Band Steering options are listed below:
IMPORTANT INFORMATION
Note that not every wireless client supports 802.11k and 802.11r. Both the SSID and security options must be the same for this fast roaming to work. Fast roaming is available when either WPA2-Enterprise or WPA2-PSK security methods are configured.
Items
Descriptions
Managed
This shows the number of APs in the managed AP database that are configured with the EWS switch.
Active
This shows the number of managed APs that currently have an active connection with the EWS switch’s controller.
Offline
This shows the number of managed APs that currently do not have an active connection with the EWS switch’s controller.
Status
Explanation
Online
AP is connected and managed by the EWS switch.
Provisioning
AP is currently in the process of connecting to the EWS switch.
Applying Change
AP is currently being applied with system changes.
Connecting
AP is currently connecting to the EWS switch.
Offline
AP is currently offline.
Resetting
AP is resetting.
Firmware Upgrading
AP is currently undergoing firmware upgrade process.
Invalid IP
The subnet of managed AP’s IP address is not the same as the EWS switch. Please remove AP and reconfigure AP to the correct IP settings.
Incompatible Version
AP firmware is not compatible with EWS switch.
Checking Certificate
EWS switch is checking the SSL Certificate of AP.
Items
Descriptions
ID
The ID displays the SSID profile identifier.
SSID
This displays the SSID name as it appears to the wireless clients in the network.
2.4GHz
This check-box option displays the current SSID profile is enabled or disabled for 2.4GHz and allows user to check/uncheck.
5GHz
This check-box option displays the current SSID profile is enabled or disabled for 5GHz and allows user to check/uncheck.
Captive Portal
This indicates whether the Captive Portal is enabled or disabled for this SSID profile.
Security
It displays the security mode the SSID uses.
Encryption
It displays the data encryption type the SSID uses.
Hidden SSID
It indicates whether the hidden SSID is enabled or disabled.
VLAN
This displays the VLAN ID associated with the SSID.
Note: For multi-SSID applications, different VLAN IDs can be assigned to an individual SSID where this ID should match its corresponding subnet’s VLAN ID with respect to local network segmentation on VLAN assignment. If a specific VLAN ID is configured to SSID, please also make sure that AP’s connected port and uplink port (on all cascading switches as well) have enclosed this VLAN ID in their VLAN settings (refer to VLAN settings under “Switch” tab.)
Items
Descriptions
Enable SSID
Select to enable or disable this SSID profile.
SSID
Enter the SSID for the current profile. This is the name that is visible to wireless clients on the network.
Hidden SSID
Enable this option if you do not want to broadcast this SSID. This can help discourage wireless users from connecting to a particular SSID.
VLAN Isolation
When enabled, all traffic frames from wireless clients connected to this SSID will be tagged with a corresponded 802.1Q VLAN tag when going out from the AP’s Ethernet port.
VLAN ID
When VLAN Isolation is enabled, enter the VLAN ID for the SSID profile. The range is from 1~4094. When VLAN tagging is configured per SSID, all data traffic from wireless users associated with that SSID is tagged with the configured VLAN ID. Please be advised multiple SSIDs also can be configured to use the same VLAN tag; for example, a single VLAN ID could be used to identify all wireless traffic traversing the network, regardless of the SSID. When AP receives VLAN-tagged traffics from the upstream switch or router, it forwards the traffics to the corresponding SSID.
L2 Isolation
When enabled, wireless client traffic from all hosts and clients on the same subnet will be blocked.
Add Whitelist
When L2 Isolation is enabled, users can still enter a specific MAC address per line to be exempt from L2 isolation like a specific file server on the same subnet.
Band Steering
When enabled, upon the wireless client first connecting to the SSID, the AP will detect whether or not the wireless client is dual-band capable, and, if it is, it will facilitate the client to connect to the less congested 5GHz SSID to relieve WLAN congestion and overcrowding on the mainstream 2.4GHz frequency. Please be advised it does this by actively discouraging the client's attempts to associate with the 2.4GHz SSID.
Managed
This shows the number of APs currently managed by the EWS switch.
Active
This shows the number of managed APs that currently have an active connection with the EWS switch’s controller.
Offline
This shows the number of managed APs that currently do not have an active connection with the EWS switch’s controller.
Clients
This shows the total number of wireless clients currently connected to all the managed APs.
Access Point Auto Discovery and Provisioning
Access Point Auto IP Assignment
Access Point Group Management
Visual Topology View
Floor Plan View
Map View
Access Point Status Monitoring
Wireless Client Monitoring
Wireless Traffic & Usage Statistics
Real-time Throughput Monitoring
Bulk Firmware Upgrade Capability
Remote Access Point Rebooting
Fast Roaming
Band Steering
Traffic Shaping
Intelligent Diagnostics
Access Point Device Name Editing
Access Point Radio Settings
RSSI Threshold
Access Point Client Limiting
Wireless Security (WEP, WPA/WPA2 Enterprise, WPA/WPA2 PSK)
VLANs for Access Point- Multiple SSIDs
Guest Network
Secure Control Messaging (SSL Certificate)
Local MAC Address Database
Remote MAC Address Database (RADIUS)
Configuration Import / Export
802.3ad Link Aggregation
Maximum of 8 groups/8 ports per group
Port Mirroring
One-to-One
Many-to-One
Spanning Tree Protocol
802.1D Spanning Tree Protocol (STP)
802.1w Rapid Spanning Tree Protocol (RSTP)
802.1s Multiple Spanning Tree Protocol (MSTP)
MAC Address Table
8K entries
Static MAC Address
256 entries
802.1ab Link Layer Discovery Protocol
IGMP Snooping
IGMP v1/v2/v3 Snooping
Supports 256 IGMP groups
IGMP per VLAN
IGMP Snooping Querier
IGMP Snooping Fast Leave
MLD Snooping
MDL Snooping v1/v2
Supports 256 MLD groups
IGMP per VLAN
Jumbo Frame
Up to 9216 bytes
802.3x Flow Control
802.3az Energy Efficient Ethernet
802.1Q support
VLAN Group
Max 4094 static VLAN groups
Voice VLAN
802.1p Quality of Service
8 queues per port
Queue Handling
Strict
Weighted Round Robin (WRR)
QoS based on:
802.1p Priority
DSCP
Bandwidth Control
Port-based (Ingress/Egress, 64 Kbps~1000 Mbps)
Broadcast/Unknown Multicast/ Unknown Unicast Storm Control
Layer 2/3
Support maximum 32 entries (ACL)
Support maximum 256 entries (ACE)
ACL based on:
MAC address
VLAN ID
802.1p priority
Ethertype
IP address
Protocol type
DSCP
802.1X
Guest VLAN
Port-based Access Control
Supports RADIUS Authentication
Port Security
Up to 256 MAC Addresses per port
Port Isolation
DoS Attack Prevention
BPDU Attack Prevention
Port Statistics
System Log
RMON
Web Graphical User Interface (GUI)
Command Line Interface (CLI)
BootP/DHCP Client/DHCPv6 Client
SSH Server
Telnet Server
TFTP Client
HTTPS
SNMP
Supports v1/v2c/v3
SNMP Trap
SNTP
Configuration restore/backup
Cable Diagnostic
Ping Test
Trace Route
RFC1213
RFC1493
RFC1757
RFC2674
RFC 2863
0 to 40°C (EWS2910P, EWS2908P)
0 to 50°C (EWS5912FP, EWS7928P, EWS1200-28TFP, EWS7926EFP, EWS7952P, EWS7952FP)
-40°C to 70°C
5% - 95%
EWS2908P: 240x105x27mm
EWS2910P: 240x105x27mm
EWS5912FP: 330x230x44mm
EWS7928P: 440x260x44mm
EWS1200-28TFP: 440x260x44mm
EWS7926EFP: 440x260x44mm
EWS7952P: 440x310x44mm
EWS7952FP: 440x310x44mm
The EnGenius EWS Series of wireless management switches is an affordable centralized wired/wireless management system developed specifically for entry-level small-to-medium businesses. This powerful device can be easily deployed and operated by non-tech experts and installed effortlessly and quickly. Any organization with a limited IT team and budget can create a stable and secure wireless network in no time. The system integrates seamlessly with existing routers, switches, firewalls, authentication servers, and other network devices. It can be placed within any network, configured to act as both a wireless controller as well as a Layer 2 gigabit switch, providing robust and centralized management of the whole network through one powerful system. With no additional costs or license purchasing necessary, network administrators can manage and monitor both wired and wireless nodes through a single web interface.
The system can automatically discover any supported EnGenius EWS Series access points connected to the network with a simple click of a mouse, self-configure and become instantly manageable. Simply log into the device via any standard web browser and assign APs into cluster groups. Wireless radio, wireless security, and other wireless related configurations can all be easily applied to multiple APs simultaneously, eliminating the time-consuming process of configuring every wireless access point individually.
The user-friendly GUI provides instant access to a variety of client and network information including managed AP List, Auto Discovered AP List, Cluster Grouping List, and Client List with complete MAC/IP Address, Incoming/Outgoing Traffic, Wireless Output Power and other relevant information. Traffic statistics of APs and clients are automatically converted into easy-to-understand graphs, providing a visual representation of the network traffic.
The topology view feature allows administrators to quickly see the whole wired/wireless network topology in real-time for easier planning, troubleshooting, and monitoring. The Floor Plan View and Map View allow for quickly locating deployed APs, a helpful feature for large scale AP deployment and multi-site management. There's also an Intelligent Diagnostics feature for administrators to check the status of wireless APs and provide easy troubleshooting for offline units and rebooting of APs remotely.
10/100/1000 Mbps Gigabit Ethernet Ports
Dedicated SFP / SFP+ slots for longer connectivity via fiber uplinks and for uplink redundancy and failover
IGMP and MLD snooping for advanced multicast filtering
IEEE802.3ad Link Aggregation
STP/RSTP/MSTP
Access Control List/Port Security
IEEE802.1X and RADIUS Authentication
RMON
SNMP v1/v2c/v3
Voice VLAN for fast and reliable deployment of VoIP
Energy Efficient Ethernet (IEEE802.3az) support for better energy saving when more IEEE-compliant end devices are available in the market
Advanced QoS with IPv4/IPv6 ingress traffic filtering (ACLs) and prioritization
Easy to manage via web-based management GUI for switch deployment
Standard-based technology, ensuring interoperability with any standard-based devices in the existing network
Dual firmware images, improving reliability and uptime for your network
The following are the minimum system requirements in order to configure the device:
Computer with an Ethernet interface or wireless network capability
Windows OS (XP, Vista, 7, 8, 10), Mac OS, or Linux-based operating systems
Web-Browsing Application (i.e. Internet Explorer, Firefox, Chrome, Safari, or another similar browser application)
The package contains the following items (all items must be in the package to receive a refund):
EWS2908P, EWS2910P
EnGenius Switch
Power Adapter / Power Cord
Rubber Footpads
Wall-mount Kit
Quick Installation Guide
EWS5912FP, EWS7928P, EWS1200-28TFP, EWS7926EFP, EWS7952P, EWS7952FP
EnGenius Switch
Power Cord
RJ-45 Console Cable
Rack-mount Kit
Quick Installation Guide
Use the procedures below to set up the switch within a network that uses DHCP.
Connect the switch to your network (DHCP enabled) and connect the supplied power cord to the switch and plug the other end into an electrical outlet. Verify the power LED indicator is lit on the switch.
Wait for the switch to completely boot up, which might take a minute.
Connect one end of a Category 5/6 Ethernet cable into the Gigabit (10/100/1000Mpbs) Ethernet port on the switch front panel and the other end to the Ethernet port on the computer. Verify that the LED on the Ethernet ports of the switch are Green.
Once your computer is on, ensure that your TCP/IP is set to On or Enabled. Open Network Connections and then click Local Area Connection. Select Internet Protocol Version 4 (TCP/IPv4). Click DHCP under Auto-Configuration and click Apply to save the settings.
On the DHCP server, find and write down the IP address allocated to the device. Use this IP address to access the management interface.
A login screen will appear. By default, the username is admin, and the password is password. Enter the current password of the switch and then click Login. To make access to the web-based management interface more secure, it's highly recommended that you change the password to something more unique.
This section describes how to set up the switch in a network without a DHCP server. If your network has no DHCP service, you must assign a static IP address to your switch in order to log in to the web-based management interface.
Connect the supplied power cord to the switch and plug the other end into an electrical outlet. Verify the power LED indicator is lit on the switch.
Wait for the switch to completely boot up, which might take a minute.
Connect one end of a Category 5/6 Ethernet cable into the gigabit (10/100/1000Mbps) Ethernet port on the switch front panel and the other end to the Ethernet port on the computer. Verify that the LED lights on the Ethernet ports of the switch are Green.
Once your computer is on, ensure that your TCP/IP is set to On or Enabled. Open Network Connections and then click Local Area Connection. Select Internet Protocol Version 4 (TCP/IPv4).
If your computer is already on a network, ensure that you have set it to a static IP address on the interface (Example: 192.168.0.239 and the subnet mask address as 255.255.255.0).
Open a web browser on your computer. In the address bar of the web browser, enter 192.168.0.239 and press Enter.
A login screen will appear. By default, the username is admin, and the password is password. Enter the current password of the switch and then click Login. To make access to the web-based management interface more secure, change the password to something more unique.
Click IP Settings under the System Menu and select Static IP to configure the IP settings of the management interface.
Enter the IP address, Subnet Mask, and Gateway.
Click Apply to update the system.
Icons
Functions
Descriptions
Search Bar
Use the Search Bar to search for keywords in the list using the following criteria: AP Group Name, AP MAC, AP Name, Description.
Add Button
Use the Add Button to create a new AP Group.
Edit Button
Use the Edit Button to edit the configurations of the AP Group.
Delete Button
Use the Delete Button to remove an AP Group.
This is the time left before the page auto-refreshes itself. The countdown is from 15 seconds.
Items
Descriptions
Reveals a list of all APs in the network that the EWS switch automatically discovers. Mouse over the discovered access point to show general information such as the MAC address, IP address, model name, and firmware version.
Items
Descriptions
The Remove button removes selected access point(s) from managed AP list. Access points removed will be restored to standalone mode.
Items
Descriptions
The Reboot button will reboot the selected access point(s).
Items
Descriptions
Use the Search Bar to search for access points managed by the EWS switch using the following criteria: Status, model name, MAC Address, Device name, IP address, Firmware Version, and Group.
Model Name
This shows the model name of the managed access point.
MAC Address
This shows the MAC address of the managed access point.
Device Name
This displays the device name of the managed access point.
When the AP is not a group member, click on this field and you’ll be redirected to the configuration page where you can edit settings such as device name, IP Address, and Wireless Radio settings.
When the AP is a group member, click on this field to configure settings for individual access points by overriding the cluster settings.
IP Address
This shows the IP address of the managed access point.
Firmware Version
This shows the firmware version of the managed access point.
Last Update
It displays the time the access point was last detected, and the information was last updated.
Group
Displays the AP Group the access point is currently assigned to. Click on this field and you'll be redirected to the group configuration page.
Column Filter
Items
Descriptions
Country
Select a country/region to conform to local regulations. Different regions have different rules that govern which channels can be used for wireless communications.
Channel HT Mode
Use the drop-down menu to select the Channel HT as 20MHz, 20/40MHz or 40MHz for 2.4GHz and 20MHz, 40MHz, or 80MHz(AC/AX) for 5GHz. A wider channel improves the performance, but some legacy devices operate only on either 20MHz or 40 MHz, and this option only applies to AP with 802.11n or above modes.
Channel
Use the drop-down menu to select the wireless channel the radio will operate on. Optimizing channel assignments reduce channel interference and channel utilization for the network, thereby improving overall network performance and increasing the network's client capacity. The list of available channels that can be assigned to radios is based on which country is selected above.
Operating Channel
This shows the current operating channel
Transmit Power
This allows you to manually set the transmit power on 2.4GHz or 5GHz radios. Increasing the power improves performance, but if two or more access points are operating in the same area on the same channel, it may cause interference.
Client Limits
Specify the maximum number of wireless clients that can associate with the radio. Enter a range from 1 to 127 or fill in 0 for an unlimited client limit.
Data Rate
Use the drop-down list to set the available transmit data rates permitted for wireless clients. The data rate affects the throughput of the access point. The lower the data rate, the lower the throughput, but the longer the transmission distance.
Bit Rate
Configure the minimum bit rates for respective 2.4GHz and 5GHz radios.
Items
Descriptions
Device Name
The device name of the access point. Users can enter a custom name for the access point for recognition like its location.
Administrator Username
Displays the current administrator login username for the access point. Enter a new Administrator username for the access point if you wish to change the username. The default username is admin.
New Password
Enter a new password of between 1~12 alphanumeric characters.
Verify Password
Enter the password again for confirmation.
Auto Configuration
Select whether the device IP address will use the static IP address specified in the IP Address field or will be obtained automatically when a DHCP server is available for LAN IP rendering.
IP Address
When “Static” is selected, enter the IP address for the access point.
Subnet Mask
When “Static” is selected, enter the Subnet Mask for the access point.
Default Gateway
When “Static” is selected, enter the default Gateway for the access point.
Primary/Secondary DNS Server
When “Static” is selected, enter the Primary/Secondary DNS server name.
With Background Scanning enabled, the controller periodically samples RF activity of all surrounding access points including channel utilization and nearby devices in all available channels. Background scanning is the basis for Auto Tx Power and Rogue AP detection, and must be enabled for these features to operate. If you prefer, you may disable it if you feel it's not helpful, or adjust the scanning frequency, if you prefer scanning at greater or fewer intervals.
Note: For latency-sensitive applications such as VoIP, it is recommended to set the background scan interval to a higher value, e.g. 5 or 10 minutes. For regular applications, the recommended value is 30 seconds. This value will also be directly related to how long it takes the AP to scan for rogue devices.
Using the information collected by Background Scanning, APs can automatically adjust their transmit power to optimize coverage. When enabled, APs will optimize their transmit power based on the time interval configured for Background Scanning.
Note: Background Scanning must be enabled, and Tx Power of APs must be set to Auto (under Wireless Radio Settings) for this feature to operate.
From here, users can see a visual view of the topology of all supported devices in the network. The EWS switch automatically maps your network deployment and displays the device relationships across your network infrastructure—an essential feature for troubleshooting network issues that would otherwise require manual mapping, monitoring software, or manually keeping track of MAC address tables.
Use the directional pad and the plus or minus buttons to navigate your topology view of the network. You can also search access points in the network via their IP or MAC address. Check the Show Port Info box to display connected port information.
Access points in the network will be automatically discovered by the EWS switch and will be listed under the AP(s) Detected list in the Access Point menu.
Select the access point(s) you wish to manage and click Add.
You will be prompted to assign the IP Address under the IP Assignment screen.
Click Apply and the access point(s) you’ve configured will be moved to the managed list. Note that the status of the AP will change from Connecting to Provisioning to Online. Once the status turns Online, your Access Point(s) have been successfully added to the Managed list.
The Mesh View feature enables the administrator to view the mesh connection status between APs in the AP Group with mesh setting enabled.
From here, users can see a visual view of the topology of all supported devices in the network. The EWS switch automatically maps your network deployment and displays the device relationships across your network infrastructure—an essential feature for troubleshooting network issues that would otherwise require manual mapping, monitoring software, or manually keeping track of MAC address tables.
Use the directional pad and the plus or minus buttons to navigate your topology view of the network. You can also search access points in the network via their IP or MAC address. Check the Show Port Info box to display connected port information.
Navigating Tips
Mouse over a device to show information about the device.
Left-click on the switch to bring up a menu where you can redirect to switch or collapse the topology tree.
Left-click on the access point to bring up a menu where you can configure AP settings, remove AP from management list, reboot AP, redirect to the active clients page or redirect to troubleshooting page.
You can search for an access point using the IP Address or MAC address.
Note: The EWS switch can only generate topologies with EnGenius L2 Series switches.
From here, users can view a geographical representation of access points in the network. Click AP List to display the list of access points managed by the EWS switch and then simply click-and-drag the AP marker to the desired location on the map.
Note: Your browser needs to be able to access the Internet for this function to work.
Navigating Tips
Use the Locate button to pinpoint the map to your current location. Note that the location provided is calculated based on your IP address and results might be inaccurate.
Left-click on the access point marker to bring up a menu from which you can configure AP settings, remove AP from management list, reboot AP, redirect to the active clients page, or redirect to troubleshooting page.
The Floor View feature enables an administrator to upload custom floor plans and place AP markers in corresponding locations for better network visualization of a wireless network. Multiple images can be uploaded to visualize access point placement on multiple floors of an office building or different branch offices within an organization.
From here, an administrator can add or delete a custom map or floor plan image. An unlimited number of floor plan images can be imported to the EWS switch. However, the total file size of all imported floor plans is limited to 6MB, and the maximum file size per image is 512KB (a smaller image loads faster). Valid image file formats are .PNG, .GIF or .JPG.
Total: This displays the total memory storage space allocated for uploading custom floor plans.
Available: This displays currently available memory storage space.
In Use: Displays the memory storage space that is currently in use.
After importing your floor plan image, you can distribute markers that represent the APs to the correct locations by clicking on AP List and dragging each marker icon to its corresponding location on the floor plan. Also, Wireless Coverage Display can be toggled on to indicate the coverage range of each AP, assisting IT managers to plan and deploy wireless networks in any indoor environment easily and accurately. Click on Save Plan when you're done to save settings.
AP Info
Navigating Tips
Mouse over a device to show information about the device.
Click to reveal a list of APs that the EWS switch is currently managing.
The number in the marker represents the number of wireless clients that are currently connected to the access point.
Left-click on the access point marker to bring up a menu where you can configure AP settings, remove AP from management list, reboot AP, redirect to the active clients page or redirect to troubleshooting page.
:
Shows or hides fields in the access point list.
Note: If the status shows Incompatible Version, please check to make sure that the firmware of the access point and switch are compatible.
Use to scroll up, down, left, or right.
Use to zoom in/out. Alternatively, you can use the mouse to navigate by clicking and dragging the left mouse button. Use the mouse wheel to zoom in/out.
Click on to show or hide port information on the Controller.
Click on for the controller to save the current network topology. Changes will be displayed upon detecting a topology change.
Use the slider bar to zoom in/out. Alternatively, you can use the mouse to navigate by clicking and dragging the left mouse button. Use the mouse wheel to zoom in/out.
Use the Search box to search for locations by typing an address or the name of a landmark.
Click on for the settings to take effect.
Use to scroll up, down, left, or right.
Use to Zoom in/out. Alternatively, you can use the mouse to navigate by clicking and dragging the left mouse button. Use the mouse wheel to zoom in/out.
Click on for the settings to take effect.
IP Address | 192.168.0.239 |
Username | admin |
Password | password |
EWS2908P | EWS2910P | EWS5912FP | EWS7928P |
10/100/1000Mbps Ports | 8 | 8 | 10 | 24 |
100/1000Mbps SFP Slots | - | 2 | 2 | 4 |
RJ45 Console Ports | - | - | 1 | 1 |
PoE Standard | 802.3 af | 802.3 at | 802.3 at |
PoE Capable Ports | Port 1-8 | Port 1-8 | Port 1-8 | Port 1-24 |
Total PoE Power Budget | 55w | 55W | 130W | 250W |
Switching Capacity | 16Gbps | 20Gbps | 24Gbps | 56Gbps |
Forwarding Mode | Store-and-Forward | Store-and-Forward | Store-and-Forward | Store-and-Forward |
Packet Buffer Memory | 512 KB | 512 KB | 512 KB | 512 KB |
Mac Address Table Size | 8K | 8K | 8K | 8K |
Jumbo Frame Size | 9K | 9K | 9K | 9K |
EWS1200-28TFP | EWS7926EFP | EWS7952P | EWS7952FP |
10/100/1000Mbps Ports | 24 | 24 | 48 | 48 |
100/1000Mbps SFP Slots | 4 | 2(10G) | 4 | 4 |
RJ45 Console Ports | 11 | 1 | 1 | 1 |
PoE Standard | 802.3at | 802.3at | 802.3 at | 802.3 at |
PoE Capable Ports | Port 1-24 | Port 1-24 | Port 1-48 | Port 1-48 |
Total PoE Power Budget | 410W | 410W | 410W | 740W |
Switching Capacity | 56Gbps | 88Gbps | 104Gbps | 104Gbps |
Forwarding Mode | Store-and-Forward | Store-and-Forward | Store-and-Forward | Store-and-Forward |
Packet Buffer Memory | 512K | 1.5MB | 1.5 MB | 1.5 MB |
Mac Address Table Size | 8K | 16K | 16K | 16K |
Jumbo Frame Size | 9K | 9K | 9K | 9K |
LED | Behavior | Description |
LAN Mode | Green solid light | Speed 1000Mbps |
LAN Mode | Amber solid light | Speed 100Mbps |
LAN Mode | Light off | Speed 10Mbps |
PoE Mode | Green solid light | Power feeding |
PoE Mode | Amber solid light | Error condition |
Poe Mode | Light off | No power feeding |
Link/ Act | Solid light | Link |
Link/ Act | Blinking | Transmit or receive on this port |
Link/ Act | Light off | No link |
LED | Behavior | Description |
Link/ Act | Solid light | Link |
Link/ Act | Blinking | Transmit or receive on this port |
Link/ Act | Light off | No link |
Enable | Select to display wireless coverage on your floor plan. |
RSSI Value | Adjust RSSI value you wish to emulate using the slider bar. |
Calibration Offset | Use the slider bar to adjust the offset value based on the deployment. |
RSSI Range Simulate | Check the RSSI Simulate box to display RSSI references on your floor plan. Adjust RSSI coverage range to emulate using the slider bar. |
Add Button | Use the Add Button to import a new image. |
Edit Button | Use the Edit Button to edit the Name/Description of the imported image. |
Delete Button | Use the Delete Button to remove the image. |
Items | Descriptions |
AP Information | Select to toggle on/off AP detailed information to be displayed on your floor plan. |
2.4GHz / 5GHz | Select whether to display signal coverage of 2.4GHz or 5GHz radio. The wireless coverage displayed will be based on the transmit power settings of the access point. |
Scaling Tool | Use the scaling tool to determine the exact distance on the floor plan. |
Signal Indicator |
AP Status
Description
Online (Green)
The managed AP is currently online.
Offline (Gray)
The managed AP is currently offline.
Busy (Yellow)
The managed AP is currently busy (applying new configuration settings).
Unmanaged (White)
The AP is not managed by the controller.
Topology Change (!)
There is a change in topology for this device (i.e., connected port change).
LED | Behavior | Description |
LAN Mode | Solid light | Speed 1000Mbps |
LAN Mode | Light off | Speed 10Mbps/100Mbps |
PoE Mode | Solid light | Power feeding |
Poe Mode | Light off | No power feeding |
Link/ Act | Solid light | Link |
Link/ Act | Blinking | Transmit or receive on this port |
Link/ Act | Light off | No link |
LED | Behavior | Description |
Speed | Solid light | Speed 1Gbps |
Speed | Light off | No link/ Speed 100Mbps |
Link/ Act | Solid light | Link |
Link/ Act | Blinking | Transmit or receive on this port |
Link/ Act | Light off | No link |
LED | Behavior | Description |
LAN Mode | Solid light | Speed 1000Mbps |
LAN Mode | Light off | Speed 10Mbps |
PoE Mode | Solid light | Power feeding |
Poe Mode | Light off | No power feeding |
Link/ Act | Solid light | Link |
Link/ Act | Blinking | Transmit or receive on this port |
Link/ Act | Light off | No link |
LED | Behavior | Description |
Speed | Green solid light | Speed 1Gbps |
Speed | Amber solid light | Speed 100Mbps |
Link/ Act | Solid light | Link |
Link/ Act | Blinking | Transmit or receive on this port |
Link/ Act | Light off | No link |
Auto-Configuration | DHCP: You can choose to auto-assign IP address if there is a DHCP server in the network. Static: If you wish to manually assign the IP address, choose Static. Enter the IP address you wish to assign to the AP and fill |
IP Address | When “Static” is selected, enter the IP address for the Access Point. |
Subnet Mask | When “Static” is selected, enter the subnet mask for the Access Point. |
Default Gateway | When “Static” is selected, enter the default gateway for the Access Point. |
Primary DNS Server | When “Static” is selected, enter the primary DNS server name. |
Secondary DNS Server | When “Static” is selected, enter the secondary DNS server name (if necessary). |
AP Status | Description |
Online (Green) | The managed AP is currently online. |
Offline (Gray) | The managed AP is currently offline. |
Busy (Yellow) | The managed AP is currently busy (applying new configuration settings). |
Unmanaged (White) | The AP is not managed by the controller. |
Topology Change (!) | There is a change in topology for this device (i.e., connected port change). |
AP Status | Description |
Online (Green) | The managed AP is currently online |
Offline (Gray) | The managed AP is currently offline |
Busy (Yellow) | The managed AP is currently busy (applying new configuration settings) |
From here, users can view wireless client information, temporarily disconnect, and permanently block the wireless clients that are associated with the access points managed by EWS switch. In addition, EWS switch is capable to identify client devices by their operating system, device type and host name when client devices are using DHCP. If multiple access points are within the same network, please use the search bar to find the specific access point by its name or MAC address.
Rogue access points mostly refer to those unauthorized and unmanaged APs attached to existing or nearby networks which could bring harm to the deployed WLAN or gain access to confidential business information. With Background Scanning enabled, the rogue AP detection feature can be used to periodically scan 2.4 GHz and 5 GHz frequency bands to identify rogue wireless access points not managed by the EWS switch.
From here, you can Enable or Disable the Log settings for the EWS switch.
The System Log is designed to monitor the operation of the EWS switch by recording the event messages it generates during normal operation. These events may provide vital information about system activity that can assist in the identification and solutions of system problems.
The EWS switch supports log output to two repositories: Flash and RAM. The information stored in the system’s RAM log will be lost after the switch is rebooted or powered off, whereas the information stored in the system’s Flash will be kept even after the switch is rebooted or powered off. The flash repository has a fixed capacity; at a certain level, the EWS switch will start deleting the oldest entries to make room for the newest.
Severity Level
RFC 5424 defines eight severity levels:
The internal log of the EWS switch has a fixed capacity; at a certain level, the EWS switch will start deleting the oldest entries to make room for the newest. If you want a permanent record of all logging activities, you can set up your syslog server to receive log contents from the EWS switch. Use this page to direct all logging to the syslog server. Click the Add button, define your syslog server, and select the severity level of events you wish to log.
This page displays the most recent records in the EWS switch's internal log. Log entries are listed in reverse chronological order (with the latest logs at the top of the list). Click a column header to sort the contents by that category.
Export Click Export button to export the current buffered log to a .txt file.
Clear Click Clear button to clear the buffered log in the system's memory.
If an alert is detected, the EWS switch will record it in the event log. The EWS switch can also be configured to send email notifications for selected events.
Mail Alert State: Select whether to Enable/Disable email notification.
Mail Information Setting
SMTP Server: Enter the name of the mail server.
SMTP Port: Enter the SMTP port.
SSL/TSL: Enable this option if your mail server uses SSL/TLS encryption.
Authentication: Select this option to enable authentication.
User Name: Enter the username required by the mail server.
Password: Enter the password required by the mail server.
From Mail Address: Enter the email address that will appear as the sender of the email alert.
To Mail Address: Enter the email address to which the EWS switch will send alarm messages. You can only send alarm messages to a single email address.
Subject: Enter the subject of the email notification.
Test: To verify that the EWS switch can send email notifications using the SMTP settings you just configured, please click the Test button for a quick test.
Apply: Click Apply to save settings.
Use this page to choose which types of events will trigger the EWS switch to send an email notification. When any of the selected events occur, the EWS switch sends an email notification to the email address that you specified in the Monitoring > Email Alert > Alert Settings section.
The table below provides explanations for EWS controller syslog event messages.
The colored indicator displays the reference signal strength covered.
Code
Severity
Description
General Description
0
EMERG
System is unusable
A "panic" condition usually affecting multiple apps/servers/sites. At this level, all tech staff on call would be notified.
1
ALERT
Action must be taken immediately
This should be corrected immediately; please notify staff who can fix the problem.
2
CRIT
Critical conditions
This should be corrected immediately; please notify staff who can fix the problem.
3
ERROR
Error conditions
Non-urgent failures, these should be relayed to developers or admins; each item must be resolved within a given time.
4
WARNING
Warning conditions
Warning messages, not an error, but indication that an error will occur if action is not taken, (e.g., file system 85% full). Each item must be resolved within a given time.
5
NOTICE
Normal but significant condition
Events that are unusual but not error conditions - might be summarized in an email to developers or admins to spot potential problems - no immediate action required.
6
INFO
Informational messages
Normal operational messages - may be harvested for reporting, measuring throughput, etc. - no action required.
Items
Descriptions
IP/Hostname
Specify the IP address or host name of syslog server
Server Port
Specify the port of the syslog server. The default port is 514.
Severity Level
RFC 5424 defines eight severity levels:
Facility
The log facility is used to separate out log messages by application or by function, allowing you to send logs to different files in the syslog server. Use the drop-down menu to select local0, local1, local2, local3, local4, local5, local6, or local7.
RAM
The information stored in the system’s RAM log will be lost after the switch is rebooted or powered off.
Flash
The information stored in the system’s Flash will be kept even after the switch is rebooted or powered off.
Controller
Display controller related logs.
Switch
Display switch related logs.
Wireless Client
Display wireless client activities from managed APs.
All
Display logs from both controller and switch
Event Type
EWS Syslog Message
Severity Level
Status of AP Controller
Controller is enabled
INFO
Status of AP Controller
Controller is disabled
WARNING
Certificate Changed
SSL certificate updated
INFO
Certificate Changed
SSL certificate will expire in {value} days
WARNING
Certificate Changed
SSL certificate has expired
ERROR
Certificate Changed
[AP Name] [AP MAC]'s SSL certificate has been updated
INFO
AP Managed
[AP Name] [AP MAC] added to management list
INFO
AP Managed
[AP Name] [AP IP] removed from management list
INFO
Status of AP
[AP Name] [AP MAC] online
INFO
Status of AP
[AP Name] [AP MAC] reset
INFO
Status of AP
[AP Name] [AP MAC] offline
WARNING
Status of AP
[AP Name] [AP MAC] has invalid IP [IP Address]
WARNING
Status of AP
[AP Name] [AP MAC]'s active client number reaches client limits {value} of [2.4/5]GHz
WARNING
AP Configuration Changed
[AP Name] [AP MAC] configuration updated
INFO
AP Firmware
[AP Name] [AP MAC] firmware version is incompatible
WARNING
AP Firmware
[AP Name] [AP MAC] started to upgrade firmware from [old-ver] to [new-ver]
INFO
AP Firmware
[AP Name] [AP MAC] firmware upgrade failed
ERROR
Column Filter
Shows or hides fields in the list.
Items
Functions
Descriptions
Kick Client
Use this function to temporarily disconnect a wireless client from the WLAN. The disconnected client can simply reconnect manually if they wish to.
Search Bar
Use the Search Bar to search for wireless clients managed by the EWS switch using the following criteria: Client Name, Client IP, Client MAC Address, Client OS, AP Device Name, AP MAC Address, Model Name, SSID, Band, TX Traffic, RX Traffic.
Search Bar
Use the Search Bar to search for specific rogue access points detected using the following criteria: BSSID, SSID, Type, Channel, Mode, Band, Security, and Detector.
In addition to viewing information based on specific access points, you can view data via specific clients for security purposes.
Navigating Tips
Click Sort to sort the order from ascending/descending, depending on your preference.
Click Rx to display Rx transmission, Tx to display Tx transmission or Total to display combined Rx and Tx transmission.
Click 1-day or 1-week button to select a time increment by which to monitor statistics.
Place the mouse cursor over the bar on the chart to show detailed information.
Click on the bar in the managed APs chart to display the wireless clients that are associated with the selected AP.
The page displays a visual chart of the network traffics of all the access points managed by the EWS switch.
Navigating Tips
Click Sort to sort the order from ascending/descending, depending on your preference.
Click Rx to display Rx transmission, Tx to display Tx transmission or Total to display combined Rx and Tx transmission.
Click 1-day or 1-week button to select a time increment by which to monitor statistics.
Place the mouse cursor over the bar on the chart to show detailed information.
Click on the bar in the managed APs chart to display the traffic of the selected AP.
A hotspot is a wireless network that provides access through a captive portal. Use this feature to set up captive portal-related configurations.
A captive portal can be used to provide authorized guest users with network access while containing unauthorized users. Users will need to enter a valid username and password before they are allowed access to the Internet through the hotspot. Once a captive portal profile is created, the administrator can apply this profile to multiple SSIDs of specific managed APs or AP Group.
The node list will list all participating AP nodes in the mesh network with their respective types (either root node or mesh node), hops count, and corresponding neighbor nodes.
Login Type: Defines the mechanism by which a wireless client gains access to the network after the client has associated with the SSID.
Network Connection Mode: Either “Bridged” or “NAT” mode can be chosen: if bridged mode is selected, users will obtain IP addresses from local DHCP server in the same network; on the other hand, if NAT mode is selected, users will get assigned IP addresses from DHCP server of managed AP which his/her wireless client devices connect to.
Login Page: A splash page is the web page which prompts the user to log in with a username and password or accept a network user policy once the client has associated with the SSID.
Redirect Behavior: Configure the destination where users will be redirected after successful login. You can redirect them to the page that they want to visit, or you can set a different page where users will be redirected.
User Session: Configure session timeout and ideal timeout period.
Walled Garden: This option allows users to define network destinations that users can access before authentication, for example, your business website.
This page displays the real-time throughput status and variation of the selected access point.
On this page, an administrator can create, edit, and remove user accounts used for the captive portal's local database for authentication.
For WLAN coverage extension for which a wired connection is hard to reach, the EWS controller switch exploits the mesh feature from EnSky AP to extend WLAN connectivity for those areas. A mesh network allows managed APs to connect directly to a switch or connect over wireless links dynamically and non-hierarchically to other managed AP nodes and cooperate with one another to efficiently route data.
Items
Descriptions
Local Web Page
Use the splash page hosted locally by EWS switch. The local splash page enables administrators to eliminate the need to set up a local web server. Basic customizations like displaying a business logo, custom message, and term of use is available.
Redirect users to external URL
External splash page enables the administrator to host their own web server for splash page, rather than having it hosted by the EWS switch.
Items
Descriptions
Redirect to the URL that the user was trying to visit
Select this option to cache the initial website from the client during the authentication process and then forward it to the originally targeted web server after the user gets successfully authenticated.
Redirect to a different URL
Select this option to redirect users to a specific URL after users successfully get authenticated.
Items
Descriptions
Enable Session Timeout
Specify a time limit after which users will be disconnected and required to log on again.
Enable Idle Timeout
Specify a time limit for an idle client after which users will be disconnected and required to log on again.
Items
Descriptions
Splash & Go
The wireless client is granted network access without any further authentication as soon as it associates with the SSID.
Local User DB
The wireless client is authenticated using the EWS switch's local database (from Hotspot Service > Guest Account).
External RADIUS Server
The wireless client is authenticated using an external RADIUS server.
Social Login
The wireless client is authenticated using his/her social network account.
Items | Descriptions |
Add | Create a new user account. |
Remove | Delete the selected user account. |
Edit | Edit the settings of the selected user account. |
Items | Descriptions |
Mesh Band | This can be selected either 2.4Ghz or 5GHz to set up mesh connection. |
Mesh ID | It is a locally unique ID used for mesh connection. |
Password | This is the password used to establish mesh links with respect to Mesh ID. |
RSSI Threshold | It is used as the threshold value to let adjacent APs decide whether it’s eligible to set up mesh links. |
Use the Schedule Tasks feature to control the time(s), or day(s) of a week, or date of a month to automatically perform the following task.
NOTE: This feature will not work properly if the EWS switch does not have the correct time settings.
Items
Reboot AP(s)
Soft reboot AP
Change WLAN State
It can be used to change state of WLAN service.
Change Switch PoE State
This is for PoE state change on per-port basis.
Switch PoE Reset
Power cycle PoE port
The mesh tools enclose 3 available useful tools including ping, traceroute, and throughput to let users easily verify mesh link effectiveness between participating AP nodes in the mesh network.
Ping: This tool can be used to check the reachability from one node to another in a mesh network.
Traceroute: This tool can be used to check the hop count and reachability from one node to another in a mesh network.
Throughput: This tool can be used to measure the throughput from one node to another in a mesh network.
The list of isolated nodes shows the nodes that have lost connection to other nodes in the mesh network which may be caused by power disruption or change from surrounding environment. Users are encouraged to do a physical check on mesh AP placement for further verification.
The Bulk Upgrade feature allows administrators to upgrade the firmware of multiple access points at the same time. After uploading the firmware of an AP, the system will automatically display a list of eligible managed access points for this uploaded firmware.
To upgrade, please follow the steps below:
Click on Upload New File to mount AP firmware onto EWS switch flash.
Once the access point firmware is uploaded onto the Controller, the list of eligible access points for this uploaded firmware will appear in the device list.
Select the access points you wish to upgrade and click Add to upgrade to start the firmware upgrading process.
NOTE: Upgrading APs will temporarily disconnect them (and any associated clients) from the network. To minimize network disruption, we recommend performing the firmware upgrading procedure at an off-peak time.
From here, you can troubleshoot any issues you have with access points connected to the network. This feature is designed primarily for administrators to verify and test the link route between the switch and the access point. A troubleshooting solution is provided by the system so that administrators can know where the problem lies. Note that the topology of the network needs to be saved for this function to work properly.
Choosing an Access Point to Diagnose
A list will show the current status of access points on the network. Select an access point to begin a diagnostic test. If multiple access points are connected, use the search bar in the top right of the page to find the access point you wish to troubleshoot. The controller will run a diagnostic test for the selected access point. Click Start to run the test. The test takes a few seconds to complete. Afterwards, the results will display on the page.
The EWS switch can be configured to automatically check for new firmware updates for your EnSky devices. The icon below will appear on the upper right corner of the user interface when a new update is available. Simply click on the icon and follow the on-screen instructions to update your devices.
Note: An active Internet connection is required for this feature.
This page displays the devices which has new firmware updates available. A release note states the purpose of the firmware. Click on Check for Updates for the EWS switch to check for the latest firmware. Select the devices you wish to update and click on Update button to begin the updating process.
Note: Both the EWS switch and the browser on the PC must be able to access the Internet for this function to work. One Click Update might also not be available if you are using a proxy server for Internet connections.
Automatically Check for Updates
Enable/disable automatically checks for new updates for your devices.
Update Server
Choose whether you wish to check for updates from an EnGenius server or specify your own http/ftp server path.
Check updates from specific server
Apart from copying firmware image files into the specific http/ftp path, an index file is required in the same folder.
Follow the instructions below for creating the index file.
Create a new .txt file with the name "lastfwlist.txt".
In the file, create entries based on the format below and save the file.
<Model Name>,<Firmware Version>,<File Name>,<MD5>,<SKU>
Examples:
EWS210AP,v2.0.129-c1.3.5,ews210ap-fcc-v2.0.129.0-c1.3.5.bin,af44f429a5404e2f7bde651921366c33,FCC
EWS210AP,v2.0.129-c1.3.5,ews210ap-etsi-v2.0.129.0-c1.3.5.bin,186cab281b7038e7c9b8909acfd9e63e,ETSI
EWS310AP,v2.0.132-c1.3.5,ews310ap-fcc-v2.0.132.0-c1.3.5.bin,4959e8d68536227d182b53a719dcdae4,FCC
EWS310AP,v2.0.132-c1.3.5,ews310ap-etsi-v2.0.132.0-c1.3.5.bin,0ee6663cc9b6c652b1139214455ed92e,ETSI
EWS320AP,v2.0.132-c1.3.5,ews320ap-fcc-v2.0.132.0-c1.3.5.bin,e584a03d0218a0f1a29a4c5550c99614,FCC
EWS320AP,v2.0.132-c1.3.5,ews320ap-etsi-v2.0.132.0-c1.3.5.bin,967312acc588b6caad7e55a98fc19997,ETSI
EWS360AP,v2.0.130-c1.3.5,ews360ap-fcc-v2.0.130.0-c1.3.5.bin,3bff8f450f171c0f839032124cbe4860,FCC
EWS360AP,v2.0.130-c1.3.5,ews360ap-etsi-v2.0.130.0-c1.3.5.bin,e2483bfc74259263dda18e8d86682183,ETSI
EWS660AP,v2.0.124-c1.3.5,ews660ap-int-v2.0.124.0-c1.3.5.bin,cc00b2871dec668b9a1b82f330a2611e,FCC
EWS660AP,v2.0.124-c1.3.5,ews660ap-etsi-v2.0.124.0-c1.3.5.bin,d67554b30fd98d06093f7da306cb8fd2,ETSI
EWS860AP,v2.0.124-c1.3.5,ews860ap-fcc-v2.0.124.0-c1.3.5.bin,39f5f935f7b83515c4a6c30ef4c61114,FCC
Field
Description
Reference String
Model Name
Enter model name.
EWS310AP, EWS320AP, EWS660AP
Firmware Version
Enter firmware version.
v2.0.129-c1.3.5
File Name
Enter complete filename with extension.
ews310ap-fcc-v2.0.132.0-c1.3.5.bin
MD5
Enter MD5 value of the firmware image
4959e8d68536227d182b53a719dcdae4
SKU
Enter in device SKU.
FCC, ETSI, INT
SSL certificates enable device or user identification, as well as secure communications. Administrators can create a self-signed SSL certificate to secure communications between the switch and access points. Note that access points will disconnect and reconnect using a new certificate upon applying changes.
Generate New Certificate
Enter the information below to generate a request for an SSL certificate for the controller.
Restore to Default Certificate
Click on Restore button under Advance Options to restore to the default SSL Certificate settings.
Use this screen to view and configure switch port settings. The port settings page allows you change the configuration of the ports on the switch in order to find the best balance of speed and flow control according to your preferences. Configuring Gigabit ports require additional factors to be considered when arranging your preferences for the switch compared to 10/100 ports.
To access the page, click Port Settings under the System menu.
Click Apply to save settings.
Use the System Time screen to view and adjust date and time settings.The switch supports Simple Network Time Protocol (SNTP). SNTP ensures accurate network device clock time synchronization up to the millisecond. Time synchronization is performed by a network SNTP server. This switch operates only as an SNTP client and cannot provide time services to other systems.
To configure date/time through SNMP:
Next to the Enable SNTP, select Enable.
In the Time Zone Offset list, select by country or by the GMT time zone where the switch is located.
Next select Disabled, Recurring, or Non-Recurring for Daylight Savings Time. Daylight saving is a period from late Spring to early Fall when many countries set their clocks forward or backward by one hour to give more daytime light in the evening.
In the SNTP/NTP Server Address field, enter the IP address or the host name of the SNTP/NTP server.
Finally, enter the port number on the SNTP server to which SNTP requests are sent. The valid range is from 1–65535. The default is: 123.
Click Apply to update the system settings.
To configure date/time manually:
Next to the Enable SNTP, select Disable.
In the Manual Time field, use the drop-down boxes to manually select the date and time you wish to set.
In the Time Zone Offset list, select by country or by the Coordinated Universal Time (UTC/GMT) time zone in which the switch is located.
Next select Disabled, Recurring or Non-recurring for Daylight Savings Time. Daylight saving is a period from late Spring to early Fall when many countries set their clocks forward or backward by one hour to give more daytime light in the evening.
Click Apply to update the system settings.
Common Name
Enter the name of the system.
Organization
Enter the organization’s name.
Organization Unit
Enter a unit name (department, etc.).
Locality/City
Enter the locality or city.
State/Province
Enter the state or province.
Country
Enter the name of the country.
Valid Date
Enter the expiration date of the certificate.
Items
Descriptions
Port
Displays the port number.
Link Status
Indicates whether the link is up or down.
Mode
Select the speed and the duplex mode of the Ethernet connection on this port.
Selecting Auto (auto-negotiation) allows one port to negotiate with a peer port automatically to obtain the connection speed and duplex mode that both ends support. When auto-negotiation is turned on, a port on the switch negotiates with the peer automatically to determine the connection speed and duplex mode. If the peer port does not support auto-negotiation or turns off this feature, the switch determines the connection speed by detecting the signal on the cable and using half duplex mode. When the switch's auto-negotiation is turned off, a port uses the pre-configured speed and duplex mode when making a connection, thus requiring you to make sure that the settings of the peer port are the same in order to connect.
Flow Control
A concentration of traffic on a port decreases port bandwidth and overflows buffer memory causing packet discards and frame losses. Flow Control is used to regulate transmission of signals to match the bandwidth of the receiving port. The switch uses IEEE 802.3x flow control in full duplex mode and backpressure flow control in half duplex mode.
IEEE 802.3x flow control is used in full duplex mode to send a pause signal to the sending port, causing it to temporarily stop sending signals when the receiving port memory buffers fill.
Back Pressure flow control is typically used in half duplex mode to send a "collision" signal to the sending port (mimicking a state of packet collision) causing the sending port to temporarily stop sending signals and resend later.
Items | Descriptions |
Current time | Displays the current system time. |
Enable SNTP | Select whether to enable or disable system time synchronization with an SNTP server. |
Time Zone | Configure the time zone setting either by setting GMT difference or by country. |
Daylight Savings Time | Select from Disabled, Recurring or Non-recurring. |
Daylight Savings Time Offset | Enter the time of Daylight Savings Time Offset. |
Recurring From | Select the Day, Week, Month, and Hour from the list. |
Recurring To | Select the Day, Week, Month, and Hour from the list. |
SNTP/NTP Server Address | Enter the IP address or hostname of the SNTP/NTP server. |
Server Port | Enter the server port of the SNTP/NTP server. |
In addition to EWS management switch’s check code, use this feature to generate a list of 'Check Codes' for the APs that your EWS switch is current managing. Check Codes are used for registering devices to ezMaster for remote management.
The network setting screen contains fields for assigning IP addresses and Management VLAN. IP addresses are either defined as static or are retrieved using the Dynamic Host Configuration Protocol (DHCP). DHCP assigns dynamic IP addresses to devices on a network. DHCP ensures that network devices can have a different IP address every time the device connects to the network.
To access the page, click IP Settings under the System menu.
Select whether to you wish to enable Static or DHCP for auto-configuration. Next, enter the information for the IP address, gateway, and DNS servers.
Click Apply to save settings.
IPv6 is an upgraded version to IPv4, providing more available IP addresses as well as other benefits. To access the switch over an IPv6 network you must first configure it with IPv6 information (IPv6 prefix, prefix length, and default gateway). To configure IPv6 for the switch, select whether to you wish to enable Auto-Configuration, Static, or DHCPv6 Client. Next, enter the information for the IP address, range, and gateway.
Click Apply to save settings.
Users can select the Management VLAN ID from drop-down list and please note all ports connected to APs on the switch should be configured to the same VLAN ID as this EWS switch’s management VLAN ID to let AP management function works properly.
Items
Descriptions
IPv6 State
Select whether you wish to enable Auto Configuration, DHCPv6 Client, or Static for the IPv6 address.
Auto Configuration
Use this option to set the IPv6 address for the IPv6 network interface in Auto Configuration. The switch will automatically generate and use a globally unique IPv6 address based on the network prefix and its Ethernet MAC address.
DHCPv6 Client
This enables the IP address to be configured automatically by the DHCP server. Select this option if you have an IPv6 DHCP server that can assign the switch an IPv6 address/prefix and a default gateway IP address.
Static
Allows the entry of an IPv6 address/prefix and a default gateway for the switch. Select this option if you wish to assign static IPv6 address information to the switch.
IPv6 Address
This field allows the entry of an IPv6 address/prefix to be assigned to this IP interface.
Gateway
Set the default gateway IPv6 address for the interface. Enter the default gateway IPv6 address.
Items
Descriptions
Important: If the device fails to retrieve an IP address through DHCP, the default IP address is 192.168.0.239 and the factory default subnet mask is 255.255.255.0.
Dynamic IP Address (DHCP)
Enables the IP address to be configured automatically by the DHCP server. Select this option if you have a DHCP server that can assign the switch an IP address, subnet mask, default gateway IP address, and a domain name server IP address automatically. Selecting this field disables the IP Address, Subnet Mask, and Gateway fields.
Static IP Address
Allows the entry of an IP address, subnet mask, and a default gateway for the switch. Select this option if you don't have a DHCP server or if you wish to assign a static IP address to the switch.
IP Address
This field allows the entry of an IPv4 address to be assigned to this IP interface. Enter the IP address of your switch in dotted decimal notation. The factory default value is: 192.168.0.239
Subnet Mask
A subnet mask separates the IP address into the network and host addresses. A bitmask that determines the extent of the subnet that the switch is on. This should be labeled in the form: xxx.xxx.xxx.xxx, where each xxx is a number (represented in decimals) between 0 and 255. The value should be 255.0.0.0 for a Class A network, 255.255.0.0 for a Class B network, and 255.255.255.0 for a Class C network, but custom subnet masks are allowed. Enter the IP subnet mask of your switch in dotted decimal notation. The factory default value is: 255.255.255.0
Gateway
Enter an IP address that determines where packets with a destination address outside the current subnet should be sent. This is usually the address of a router or a host acting as an IP gateway your network is not part of an Intranet, or you do not want the switch to be accessible outside your local network, you can leave this field blank.
DNS Server (Domain Name System)
Used for mapping a domain name to its corresponding IP addresses and vice versa. Enter a DNS IP address in order to be able to use a domain name to access the switch instead of using an IP address.
The L2 Feature tab exhibits complete standard-based Layer 2 switching capabilities, including: Link Aggregation, 802.1D Spanning Tree Protocol, 802.1w Rapid Spanning Tree Protocol, 802.1s Multiple Spanning Tree Protocol, MAC Address Table, Internet Group Management Protocol (IGMP) Snooping, Port Mirroring, 802.1ab Link Layer Discovery Protocol (LLDP), and Multicast Listener Discovery (MLD) snooping. Utilize these features to configure the switch to your preferences.
Energy Efficient Ethernet (EEE), an Institute of Electrical and Electronics Engineers (IEEE) 802.3az standard, reduces the power consumption of physical layer devices during periods of low link utilization. EEE saves energy by allowing PHY non-essential circuits to shut down when there is no traffic.
Network administrators have long focused on the energy efficiency of their infrastructure, and the EnGenius Layer 2 switch complies with the IEEE’s Energy-Efficient Ethernet (EEE) standard. The EEE compliant switch offers users the ability to utilize power that Ethernet links use only during data transmission. Lower Power Idle (LPI) is the method for achieving the power saving during Ethernet ideal time.
Use the EEE configuration page to configure Energy Efficient Ethernet.
Click Apply to save settings.
The PoE Management screen contains system PoE information for monitoring the current power usage and assigns the total amount of power the switch can provide to all its PoE ports. To access the page, click PoE under the System menu.
Total Power Budget: Enter the amount of power the switch can provide to all ports.
Consumed Power: Displays the total amount of power (in watts) currently being delivered to all PoE ports.
Click Apply to save settings.
Port
Display the port for which the EEE setting is displayed.
EEE Status
Enable or disable EEE for the specified port.
Items
Descriptions
Port
Displays the specific port for which PoE parameters are defined. PoE parameters are assigned to the powered device that is connected to the selected port.
State
Displays the active participating members of the trunk group.
Member Port
Enable: Enables the Device Discovery protocol and provides power to the device using the PoE module. The Device Discovery protocol lets the device discover powered devices attached to device interfaces and learn their classification.
Disable: Disables the Device Discovery protocol and halts the power supply delivering power to the device using the PoE module.
Priority
Select the port priority if the power supply is low. The field default is low. For example, if the power supply is running at 99% usage, and port 1 is prioritized as high, but port 6 is prioritized as low, port 1 is prioritized to receive power and port 6 may be denied power.
Low: Sets the PoE priority level as low.
Medium: Sets the PoE priority level as medium.
High: Sets the PoE priority level as high.
Critical: Sets the PoE priority level as critical.
Class (Auto)
Shows the classification of the powered device. The class defines the maximum power that can be provided to the powered device. The possible field values are:
Class 0: The maximum power level at the Power Sourcing Equipment is 15.4 Watts.
Class 1: The maximum power level at the Power Sourcing Equipment is 4.0 Watts.
Class 2: The maximum power level at the Power Sourcing Equipment is 7.0 Watts.
Class 3: The maximum power level at the Power Sourcing Equipment is 15.4 Watts.
Class 4: The maximum power level at the Power Sourcing Equipment is 30 Watts.
Class (User Defined)
Select this option to base the power limit on the value configured in the User Power Limit field.
User Power Limit
Set the maximum amount of power that can be delivered by a port.
Note: The User Power Limit can only be implemented when the Class value is set to User-Defined.
Status
Shows the port's PoE status. The possible field values are:
Delivering Power: The device is enabled to deliver power via the port.
Disabled: The device is disabled from delivering power via the port.
Test Fail: The powered device test has failed. For example, a port could not be enabled and cannot be used to deliver power to the powered device.
Testing: The powered device is being tested. For example, a powered device is tested to confirm it is receiving power from the power supply.
Searching: The device is currently searching for a powered device. Searching is the default PoE operational status.
Fault: The device has detected a fault on the powered device when the port is forced on. For example, the power supply voltage is out of range, a short occurs, there is a communication error with PoE devices, or an unknown error occurs.
Items
Descriptions
Device Name
Displays the model name of the device.
FW Version
Displays the installed firmware version of the device.
Serial Number
Displays the serial number of the device.
Base MAC Address
Displays the MAC address of the device.
IP Address
Displays the IP address of the device.
Gateway
Displays the Gateway IP address.
System Uptime
Displays the number of days, hours, and minutes since the last system restart. The system uptime is displayed in the following format: days, hours, and minutes.
A Link Aggregation Group (LAG) optimizes port usage by linking a group of ports together to form a single, logical, higher-bandwidth link. Aggregating ports multiplies the bandwidth and increases port flexibility for the switch. Link Aggregation is most used to link a bandwidth intensive network device (or devices), such as a server, to the backbone of a network.
The participating ports are called members of a port trunk group. Since all ports of the trunk group must be configured to operate in the same manner, the configuration of one port of the trunk group is applied to all ports of the trunk group. Thus, you will only need to configure one of any of the ports in a trunk group. A specific data communication packet will always be transmitted over the same port in a trunk group. This ensures the delivery of individual frames of a data communication packet will be received in the correct order. The traffic load of the LAG will be balanced among the ports according to aggregate arithmetic. If the connections of one or several ports are broken, the traffic of these ports will be transmitted on the normal portsto guarantee reliable connection.
When you aggregate ports, the ports and LAG must fulfill the following conditions:
All ports within a LAG must be the same media/format type.
A VLAN is not configured on the port.
The port is not assigned to another LAG.
The Auto-negotiation mode is not configured on the port.
The port is in full-duplex mode.
All ports in the LAG have the same ingress filtering and tagged modes.
All ports in the LAG have the same back pressure and flow control modes.
All ports in the LAG have the same priority.
All ports in the LAG have the same transceiver type.
Ports can be configured as LACP ports only if the ports are not part of a previously configured LAG.
LACP is a dynamic protocol which helps to automate the configuration and maintenance of LAGs. The main purpose of LACP is to automatically configure individual links to an aggregate bundle, while adding new links and helping to recover from link failures if the need arises. LACP can monitor to verify if all the links are connected to the authorized group. LACP is a standard in computer networking; hence, LACP should be enabled on the switch's trunk ports initially for both the participating switches/devices that support the standard, to use it.
Port trunking allows you to assign physical links to one logical link that functions as a single, higher-speed link, providing dramatically increased bandwidth. Use port trunking to bundle multiple connections and use the combined bandwidth as if it were a single larger “pipe.”
Important: You must enable Trunk Mode before you can add a port to a trunk group.
Click Apply to save settings.
Link Aggregation Control Protocol (LACP) allows the exchange of information regarding the link aggregation between two members of the aggregation. The LACP Time Out value is measured in a periodic interval. Check first whether the port in the trunk group is up. When the interval expires, it will be removed from the trunk. Set a Short Timeout (one second) for busy trunked links to ensure that disabled ports are removed from the trunk group as soon as possible. The default value for LACP time out is Long Timeout.
Click Apply to save settings.
Mirror settings mirror network traffic by forwarding copies of incoming and outgoing packets from specific ports to a monitoring port. The packet that is copied to the monitoring port will be the same format as the original packet.
Port mirroring is useful for network monitoring and can be used as a diagnostic tool. Use port mirroring to send traffic to applications that analyze traffic for purposes such as monitoring compliance, detecting intrusions, monitoring, and predicting traffic patterns, and other correlating events. Port mirroring is needed for traffic analysis on a switch because a switch normally sends packets only to the port to which the destination device is connected. The analyzer captures and evaluates the data without affecting the client on the original port. Port mirroring can consume significant CPU resources while active, so be cautious of such usage when configuring the switch.
Note
You cannot mirror a faster port onto a slower port. For example, if you try to mirror the traffic from a 100Mbps port onto a 10Mbps port, this can cause throughput problems. The port you are copying frames from should always support an equal or lower speed than the port to which you are sending the copies. Please note a target port and a source port cannot be the same port.
Click the Apply button to accept the changes or the Cancel button to discard them. Assign a system priority to run with Link Aggregation Control Protocol (LACP), which will become a backup link if another link goes down. The lowest system priority can make decisions about which ports it is actively running in case a link goes down. If two or more ports have the same LACP port priority, the port with the lowest physical port number will be selected as the backup port. If a LAG already exists with the maximum number of allowed port members, and LACP is subsequently enabled on another port using a higher priority than an existing member, the newly configured port will replace the existing port member that has a lower priority. A smaller number indicates a higher priority level. The range is from 0-65535 and default is 32768.
Click the Apply button to accept the changes or the Cancel button to discard them.
Items
Descriptions
Group
Displays the number of the given trunk group. You can utilize up to 8 link aggregation groups with each group consisting up to 8 ports on the switch.
Active Ports
Displays the active participating members of the trunk group.
Member Port
Select the ports you wish to add to the trunk group. Up to eight ports per group can be assigned.
Static: The Link Aggregation is configured manually for specified trunk group.
LACP: The Link Aggregation is configured dynamically for specified trunk group.
Mode
LACP allows for the automatic detection of links in a port trunking group when connected to a LACP-compliant switch. You will need to ensure that both the switch and the device it’s connected to are in the same mode for them to function; otherwise, they will not work. Static configuration is used when connecting to a switch that does not support LACP.
System Priority
Enter the LACP priority value to the system. The default is 32768 and the range is from 1 to 65535.
Timeout
Select the administrative LACP timeout.
Long Timeout: The LACP PDU will be sent for every 30 seconds. The LACP timeout value is 90 seconds. Short Timeout: The LACP PDU will be sent every second. The timeout value is 3 seconds.
Items
Descriptions
Session ID
A number identifying the mirror session. This switch only supports up to 4 mirror sessions.
Destination Port
Select the port for traffic purposes from source ports mirrored to this port.
Source TX/RX Port
Sets the source port from which traffic will be mirrored.
TX Port: Only frames transmitted from this port are mirrored to the destination port.
RX Port: Only frames received on this port are mirrored to the destination port.
Both: Frames received and transmitted on this port are mirrored to the specified destination port.
None: Disables mirroring for this port.
Ingress State
Select whether to enable or disable ingress traffic forwarding.
Session State
Select whether to enable or disable port mirroring.
The MAC address table contains address information that the switch uses to forward traffic between the inbound and outbound ports. All MAC addresses in the address table are associated with one or more ports. When the switch receives traffic on a port, it searches the Ethernet switching table for the MAC address of the destination. If the MAC address is not found, the traffic is flooded out all the other ports associated with the VLAN. All the MAC address that the switch learns by monitoring traffic are stored in the dynamic address. A static address allows you to manually enter a MAC address to configure a specific port and VLAN.
The address table lists the destination MAC address, the associated VLAN ID, and port number associated with the address. When you specify a static MAC address, you set the MAC address to a VLAN and a port; thus, it makes an entry into its forwarding table. These entries are then used to forward packets through the switch. Static MAC addresses along with the switch's port security allow only devices in the MAC address table on a port to access the switch.
The switch will automatically learn the device's MAC address and store it to the dynamic MAC address table. If there is no packet received from the device within the aging time, the switch adopts an aging mechanism for updating the tables from which MAC address entries will be removed from related network devices. The dynamic MAC address table shows the MAC addresses and their associated VLANs learned on the selected port.
The function will help user to locate the connected device or the incoming port on the EWS switch for wireless connected clients to managed APs.
Link Layer Discovery Protocol (LLDP) is the IEEE 802.1AB standard for switches to advertise their identity, major capabilities, and neighbors on the 802 LAN. LLDP allows users to view the discovered information to identify system topology and detect faulty configurations on the LAN. LLDP is essentially a neighbor discovery protocol that uses Ethernet connectivity to advertise information to devices on the same LAN and store information about the network. The information transmitted in LLDP advertisements flow in one direction only: from one device to its neighbors. This information allows the device to quickly identify a variety of other devices, resulting in a LAN that interoperates smoothly and efficiently.
LLDP transmits information as packets called LLDP Data Units (LLDPDUs). A single LLDPDU is transmitted within a single 802.3 Ethernet frame. A basic LLDPDU consists of a set of Type-Length-Value elements (TLV), each of which contains information about the device. A single LLDPDU contains multiple TLVs. TLVs are short information elements that communicate complex data. Each TLV advertises a single type of information.
Select whether to enable or disable the LLDP feature on the switch. Next, enter the Transmission Interval, Holdtime Multiplier, Reinitialization Delay parameter, and the Transmit Delay parameter. When finished, click Apply to update the system settings.
LLDP devices must support chassis and port ID advertisement, as well as the system name, system ID, system description, and system capability advertisements. Here, you can view detailed LLDP information for the switch.
LLDP devices must support chassis and port ID advertisement, as well as the system name, system ID, system description, and system capability advertisements. From here you can view detailed LLDP Information for the remote device.
Click the Apply button to accept the changes or the Cancel button to discard them.
Index
Displays the index for the static MAC address table.
Port
Select the port where the MAC address entered in the previous field will be automatically forwarded.
VID
Enter the VLAN ID on which the IGMP Snooping querier is administratively enabled and for which the VLAN exists in the VLAN database.
MAC Address
Enter a unicast MAC address for which the switch has forwarding or filtering information.
Items
Descriptions
Index
Displays the index for the dynamic MAC address table.
Port
Select the port to which the entry refers.
VID
Displays the VLAN ID corresponding to the MAC address.
MAC Address
Displays the MAC addresses that the switch learned from a specific port.
State
Select Enabled or Disabled to activate LLDP for the switch.
Transmission Interval
Enter the interval at which LLDP advertisement updates are sent. The default value is 30. The range is from 5 to 32768.
Holdtime Multiplier
Enter the amount of time that LLDP packets are held before packets are discarded and measured in multiples of the Advertised Interval. The default is 4. The range is from 2 to 10.
Reinitialization Delay
Enter the amount of time of delay before reinitializing LLDP. The default is 2. The range is from 1 to 10.
Transmit Delay
Enter the amount of time that passes between successive LLDP frame transmissions. The default is 2 seconds. The range is from 1 to 8191 seconds.
Chassis ID Subtype
Displays the chassis ID type.
Chassis ID
Displays the chassis ID of the device transmitting the LLDP frame.
System Name
Displays the administratively assigned device name.
System Description
Describes the device.
Capabilities Supported
Describes the device functions.
Capabilities Enabled
Describes the device functions.
Port ID Subtype
Displays the port ID type.
Items
Descriptions
Port
Displays the port.
Chassis ID Subtype
Displays the chassis ID type.
Chassis ID
Displays the chassis ID of the device that is transmitting the LLDP frame.
Port ID Subtype
Displays the port ID type.
Remote ID
Displays the remote ID.
System Name
Displays the administratively assigned device name.
Time to Live
Displays the time to live.
Auto-Negotiation Supported
Displays state for the auto-negotiation supported.
Auto-Negotiation Enabled
Displays state for the auto-negotiation enabled.
Auto-Negotiation Advertised Capabilities
Displays the type of auto-negotiation advertised capabilities.
Operational MAU Type
Displays the type of MAU.
802.3 Maximum Frame Size
Displays the maximum size of 802.3 maximum frame.
802.3 Link Aggregation Capabilities
Displays the 802.3 Link Aggregation capabilities.
802.3 Link Aggregation Status
Displays the status of 802.3 Link Aggregation.
802.3 Link Aggregation Port ID
Displays the port ID of 802.3 Link Aggregation.
Multicast Listener Discovery (MLD) Snooping operates on the IPv6 traffic level for discovering multicast listeners on a directly attached port and performs a similar function to IGMP Snooping for IPv4. MLD snooping allows the switch to examine MLD packets and make forwarding decisions based on content. MLD Snooping limits IPv6 multicast traffic by dynamically configuring the switch port so that multicast traffic is forwarded only to those ports that wish to receive it. This reduces the flooding of IPv6 multicast packets in the specified VLANs. Both IGMP and MLD Snooping can be active at the same time.
Click Apply to update the system settings.
If the Fast Leave feature is not used, a multicast querier will send a GS-query message when an MLD group leave message is received. The querier stops forwarding traffic for that group only if no host replies to the query within the specified timeout period. If Fast Leave is enabled, the switch assumes that only one host is connected to the port. Therefore, Fast Leave should only be enabled on a port if it is connected to only one MLD-enabled device.
Fast Leave does not apply to a port if the switch has learned that a multicast querier is attached to it. Fast Leave can improve bandwidth usage for a network which frequently experiences many MLD host add and leave requests.
Select from the drop-down list whether to enable or disable MLD Snooping. Next, select to enable or disable Fast Leave for the specified VLAN ID.
The Group List displays the VLAN ID, IPv6 address, and members port in the MLD Snooping List.
The Router Settings feature shows the learned multicast router attached port if the port is active and a member of the VLAN. Select the VLAN ID you would like to configure and enter the static and forbidden ports for the specified VLAN IDs that are utilizing MLD Snooping. All MLD packets snooped by the switch will be forwarded to the multicast router reachable from the port.
Ethernet has used the 1500-byte frame size since its inception. Jumbo frames are network-layer PDUs that have a size much larger than the typical 1500-byte Ethernet Maximum Transmission Unit (MTU) size. Jumbo frames extend Ethernet to 9000 bytes, making them large enough to carry an 8 KB application datagram plus packet header overhead. If you intend to leave the local area network at high speeds, the dynamics of TCP will require you to use large frame sizes.
The switch supports a jumbo frame size of up to 9216 bytes. Jumbo frames need to be configured to work on the ingress and egress port of each device along the end-to-end transmission path. Furthermore, all devices in the network must also be consistent on the maximum jumbo frame size, so it is important to do a thorough investigation of all your devices in the communication paths to validate their settings.
Click Apply to update the system settings.
Internet Group Management Protocol (IGMP) Snooping allows a switch to forward multicast traffic intelligently. Multicasting is used to support real-time applications such as video conferencing or streaming audio. A multicast server does not have to establish a separate connection with each client. It merely broadcasts its service to the network, and any host that wishes to receive the multicast register with their local multicast switch.
A multicast group is a group of end nodes that want to receive multicast packets from a multicast application. After joining a multicast group, a host node must continue to periodically issue reports to remain a member. Any multicast packets belonging to that multicast group are then forwarded by the switch from the port.
A switch supporting IGMP Snooping can passively snoop on IGMP Query, Report, and Leave packets transferred between IP Multicast switches and IP Multicast hosts to determine the IP Multicast group membership. IGMP Snooping checks IGMP packets passing through the network and configures multicasting accordingly. Based on the IGMP query and report messages, the switch forwards traffic only to the ports that request the multicast traffic. It enables the switch to forward packets of multicast groups to those ports that have validated host nodes. The switch can also limit flooding of traffic to IGMP designated ports. This improves network performance by restricting the multicast packets only to switch ports where host nodes are located. IGMP Snooping significantly reduces overall Multicast traffic passing through your switch. Without IGMP Snooping, Multicast traffic is treated in the same manner as a broadcast transmission, which forwards packets to all ports on the network.
Click to enable or disable the IGMP Snooping feature for the switch. Next, select whether you wish to use V2 or V3. Finally, select whether you wish to enable or disable the Report Suppression feature for the switch.
Click Apply to update the system settings.
Use the IGMP Snooping VLAN Settings to configure IGMP Snooping settings for VLANs on the system. The switch performs IGMP Snooping on VLANs that send IGMP packets. You can specify the VLANs that IGMP Snooping should be performed on. Choose from the drop-down box whether to enable or disable IGMP Snooping. Next, choose to enable or disable Fast Leave for the VLAN ID.
If Fast Leave is not used, a multicast querier will send a GS-query message when an IGMPv2/v3 group leave message is received. The querier stops forwarding traffic for that group only if no host replies to the query within the specified timeout period. If Fast Leave is enabled, the switch assumes that only one host is connected to the port. Therefore, Fast Leave should only be enabled on a port if it is connected to only one IGMP-enabled device.
Fast Leave is supported only with IGMPv2 or IGMPv3 Snooping when IGMP Snooping is enabled. Fast Leave does not apply to a port if the switch has learned that a multicast querier is attached to it.
Fast Leave can improve bandwidth usage for a network which frequently experiences many IGMP host add and leave requests.
IGMP Snooping requires that one central switch to periodically query all end devices on the network to announce their multicast memberships and this central device is the IGMP querier. The snooping switch sends out periodic queries with a time interval equal to the configured querier query interval. The IGMP query keeps the switch updated with the current multicast group membership information. If the switch does not receive the updated membership information, then it will stop forwarding multicasts to specified VLANs.
The Group List displays VLAN ID, group IP address, and members port in the IGMP Snooping list.
The Router Settings shows the learned multicast router attached port if the port is active and a member of the VLAN. Select the VLAN ID you would like to configure and enter the Static and Forbidden ports for the specified VLAN IDs. All IGMP packets snooped by the switch will be forwarded to the multicast router reachable from the port.
Click the Apply button to accept the changes or the Cancel button to discard them.
Click the Apply button to accept the changes or the Cancel button to discard them.
Click the Apply button to accept the changes or the Cancel button to discard them.
Click the Apply button to accept the changes or the Cancel button to discard them.
Click the Apply button to accept the changes or the Cancel button to discard them.
MLD Snooping Status
Select to Enable or Disable MLD Snooping on the switch. The switch
snoops all MLD packets it receives to determine which segments should receive packets directed to the group address when enabled.
MLD Snooping Version
Select the MLD version you wish to use. If an MLD packet received by the interface has a version higher than the specified version, this packet will be dropped.
MLD Snooping Report
Suppression
The report suppression feature limits the amount of membership reports the member sends to multicast capable routers.
VLAN ID
Displays the VLAN ID.
MLD Snooping Status
Select to enable or disable the MLD snooping feature for the specified VLAN ID.
Fast Leave
Enables or disables the MLD snooping Fast Leave feature for the specified VLAN ID. Enabling this feature allows the switch to immediately remove the Layer 2 LAN port from its forwarding table entry upon receiving an MLD leave message without first sending out an MLD group-specific (GS) query to the port.
VLAN ID
Displays the VLAN ID.
Router Ports Auto Learned
The switch will automatically detect the presence of a multicast router and forward MLD packets accordingly.
Dynamic Port List
Displays router ports that have been dynamically configured.
Static Port List
Designates a range of ports as being connected to multicast-enabled routers. Ensure that all the packets will reach the multicast-enabled router.
Forbidden Port List
Designates a range of ports as being disconnected to multicast-enabled routers. Ensures that the forbidden router port will not propagate routing packets out.
Items | Descriptions |
Status | Select to enable or disable IGMP Snooping on the switch. The switch snoops all IGMP packets it receives to determine which segments should receive packets directed to the group address when enabled. The default setting is: Disabled. |
Version | Select the IGMP version you wish to use. If an IGMP packet received by the interface has a version higher than the specified version, this packet will be dropped. |
Report Suppression | Select whether Report Suppression is Enabled or Disabled for IGMP Snooping. The Report Suppression feature limits the amount of membership reports the member sends to multicast capable routers. |
Unregistered IPMCv4 Forward Action | Select either Flood or Drop for IP Multicast forward action. |
Items | Descriptions |
VLAN ID | Displays the VLAN ID. |
IGMP Snooping Status | Enables or disables the IGMP Snooping feature for the specified VLAN ID. |
Fast Leave | Enables or disables the IGMP Snooping Fast Leave for the specified VLAN ID. Enabling this feature allows the switch to immediately remove the Layer 2 LAN port from its forwarding table entry upon receiving an IGMP leave message without first sending out IGMP group-specific (GS) queries to the port. |
Items | Descriptions |
VLAN ID | Displays the VLAN ID. |
Querier State | Select whether to enable or disable the IGMP querier state for the specified VLAN ID. A querier can periodically ask their hosts if they wish to receive multicast traffic. The querier feature will check whether hosts wish to receive multicast traffic when enabled. An elected querier will assume the role of querying the LAN for group members and then propagate the service requests onto any upstream multicast switch to ensure that it will continue to receive the multicast service. This feature is only supported for IGMPv1 and v2 snooping. |
Querier Version | Enter the version of IGMP packet that will be sent by this port. If an IGMP packet received by the port has a version higher than the specified version, this packet will be dropped. |
Robustness | Provides fine-tuning to allow for expected packet loss on a subnet. It is used in calculating the following IGMP message intervals. The default is 2. |
Interval | Enter the amount of time in seconds between general query transmissions. The default is 125 seconds. |
Oper Interval | Displays the IGMP Interval of the operational querier. |
Max Response Interval | Enter the maximum response time used in the queries that are sent by the snooping querier. The default is 10 seconds. |
Oper Max Response Interval | Displays the maximum response time used in the queries that are sent by the snooping querier. |
Last Member Query Counter | Enter the number of the operational last member querier. |
Oper Last Member Query Counter | Enter the number of IGMP group-specific queries sent before the switch assumes there are no local members. |
Last Member Query Interval | Enter the time between two consecutive group-specific queries that are sent by the querier including those sent in response to leave group messages. You might lower this interval to reduce the amount of time it takes a querier to detect the loss of the last member of a group. |
Oper Last Member Query Interval | Displays the operational last member query interval sent by the elected querier. |
Items | Descriptions |
VLAN ID | Displays the VLAN ID. |
Router Ports Auto Learned | The switch will auto detect the presence of a multicast router and forward IGMP packets accordingly. |
Dynamic Port List | Displays router ports that have been dynamically configured. |
Forbidden Port List | Designates a range of ports as being disconnected to multicast-enabled routers. Ensures that the forbidden router port will not propagate routing packets out. |
Static Port list | Designates a range of ports as being connected to multicast-enabled routers. Ensures that all the packets will reach the multicast-enabled router. |
A virtual LAN (VLAN) is a group of ports that form a logical Ethernet segment on a Layer 2 switch which provides better administration, security, and management of multicast traffic. A VLAN is a network topology configured according to a logical scheme rather than a physical layout. When you use a VLAN, users can be grouped by logical function instead of physical location. All ports that frequently communicate with each other are assigned to the same VLAN, regardless of where they are physically on the network. VLANs let you logically segment your network into different broadcast domains so that you can group ports with related functions into their own separate, logical LAN segments on the same switch. This allows broadcast packets to be forwarded only between ports within the VLAN which can avoid broadcast packets being sent to all the ports on a single switch. A VLAN also increases network performance by limiting broadcasts to a smaller and more manageable logical broadcast domain. VLANs also improve security by limiting traffic to specific broadcast domains.
Items |
Jumbo Frame | Enter the size of jumbo frame. The range is from 1522 to 9216 bytes. |
IGMPv1 | Defined in RFC 1112. An explicit join message is sent to the switch, but a timeout is used to determine when hosts leave a group. |
IGMPv2 | Defined in RFC 2236. Adds an explicit leave message to the join message so that the switch can more easily determine when a group has no interested listeners on a LAN. |
IGMPv3 | Defined in RFC 3376. Support for a single source of content for a multicast group. |
Each VLAN in a network has an associated VLAN ID, which appears in the IEEE 802.1Q tag in the Layer 2 header of packets transmitted on a VLAN. The IEEE 802.1Q specification establishes a standard method for tagging Ethernet frames with VLAN membership information. The key for IEEE 802.1Q to perform its functions is in its tags. 802.1Q-compliant switch ports can be configured to transmit tagged or untagged frames. A tag field containing VLAN information can be inserted into an Ethernet frame. When using 802.1Q VLAN configuration, you configure ports to be a part of a VLAN group. When a port receives data tagged for a VLAN group, the data is discarded unless the port is a member of the VLAN group.
NOTE: The switch's default setting is to assign all ports to a single 802.1Q VLAN(VID 1). Please keep this in mind when configuring the VLAN settings for the switch.
When an untagged packet enters a switch port, the PVID (Port VLAN ID) will be attached to the untagged packet and forward frames to a VLAN specified VID part of the PVID. A packet received on a given port would be assigned that port's PVID and then be forwarded to the port that corresponded to the packet's destination address. If the PVID of the port that received the packet is different from the PVID of the port that is to transmit the packet, the switch will drop the packet. Within the switch, different PVIDs mean different VLANs, so VLAN identification based upon the PVIDs cannot create VLANs that extend outside a given switch. If no VLANs are defined on the switch, all ports are then assigned to a default VLAN with a PVID equal to 1.
NOTE
To enable PVID functionality, the following requirements must be met:
All ports must have a defined PVID.
If no other value is specified, the default VLAN PVID is used.
If you wish to change the port's default PVID, you must first create a VLAN that includes the port as a member.
Click Apply to update the system settings.
Enabled | Enables 802.1Q VLANs. This feature is enabled by default. |
VID | Displays the VLAN ID for which the network policy is defined. The range of the VLAN ID is from 1 to 4094. |
Name | Enter the VLAN name. You can use up to 32 alphanumeric characters. |
Tagged Port | Frames transmitted from this port are tagged with the VLAN ID. |
Untagged Port | Frames transmitted from this port are untagged |
Port | Displays the VLAN ID to which the PVID tag is assigned. Configure the PVID to assign untagged or tagged frames received on the selected port. |
PVID | Enter the PVID value. The range is from 1 to 4094. |
Accept Type | Select Tagged Only and Untagged Only from the list. Tagged Only: The port discards any untagged frames it receives. The port only accepts tagged frames. Untagged Only: Only untagged frames received on the port are accepted. All: The port accepts both tagged and untagged frames. |
Ingress Filtering | Specify how you wish the port to handle tagged frames. Select Enabled or Disabled from the list. Enabled: Tagged frames are discarded if VID does not match the PVID of the port. Disabled: All frames are forwarded in accordance with the IEEE 802.1Q VLAN. |
The Spanning Tree Algorithm (STA) can be used to detect and disable network loops, and to provide backup links between switches. This allows the switch to interact with other bridging devices in your network to ensure that only one route exists between any two stations on the network and provide backup links which automatically take over when a primary link goes down.
Spanning Tree Protocol (STP) provides a tree topology for the switch. There are different types of Spanning tree versions supported, including Spanning Tree Protocol (STP) IEEE 802.1D, Multiple Spanning Tree Protocol (MSTP) IEEE 802.1w, and Rapid Spanning Tree Protocol (RSTP) IEEE 802.1s. Please note that only one spanning tree can be active on the switch at a time.
Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on switches. Spanning Tree Protocol (STP) allows you to ensure that you do not create loops when you have redundant paths in the network. STP provides a single active path between two devices on a network in order to prevent loops from being formed when the switch is interconnected via multiple paths.
STP uses a distributed algorithm to select a bridging device that serves as the root for the spanning tree network. It does this by selecting a root port on each bridging device to incur the lowest path cost when forwarding a packet from that device to the root device. It then selects a designated bridging device from each LAN which incurs the lowest path cost when forwarding a packet from that LAN to the root device. Next, all ports connected to designated bridging devices are assigned as designated ports. After determining the lowest cost spanning tree, it enables all root ports and designated ports, disabling all other ports. Network packets are therefore only forwarded between root ports and designated ports, eliminating any possible network loops. STP provides a single active path between two devices on a network in order to prevent loops from being formed when the switch is interconnected via multiple paths.
Once a stable network topology has been established, all bridges listen for Hello Bridge Protocol Data Units (BPDUs) transmitted from the Root Bridge of the Spanning Tree. If a bridge does not receive a Hello BPDU after a predefined interval (known as the Maximum Age), the bridge will assume that the link to the Root Bridge is down and unavailable. This bridge then initiates negotiations with other bridges to reconfigure the network to reestablish a valid network topology.
Loops occur when alternate routes exist between hosts. Loops in an extended network can cause the switch to forward traffic indefinitely, resulting in increased traffic and reducing network efficiency. Once the STP is enabled and configured, primary links are established, and duplicated links are blocked automatically. The reactivation of the blocked links is also automatic.
STP provides a tree topology and other Spanning tree versions supported include STP, Multiple Spanning Tree Protocol (MSTP), and Rapid Spanning Tree Protocol (RSTP). Please note that only one spanning tree can be active on the switch at a time. The default setting is RSTP.
Multiple Spanning Tree Protocol (MSTP) defined in IEEE 802.1s, enables multiple VLANs to be mapped to reduce the number of spanning-tree instances needed to support many VLANs. If there is only one VLAN in the network, a single STP works fine.
If the network contains more than one VLAN, however, the logical network configured by a single STP would work, but it becomes more efficient to use the alternate paths available by using an alternate spanning tree for different VLANs or groups of VLANs. MSTP (which is based on RSTP for fast convergence) is designed to support independent spanning trees based on VLAN groups. MSTP provides multiple forwarding paths for data traffic and enables load balancing.
STP and RSTP prevent loops from forming by ensuring that only one path exists between the end nodes in your network. RSTP is designed as a general replacement for the slower, legacy STP. RSTP is also incorporated into MSTP. With STP, convergence can take up to a minute to complete in a larger network. This can result in the loss of communication between various parts of the network during the convergence process so STP can subsequently lose data packets during transmission.
RSTP on the other hand is much faster than STP. It can complete a convergence in seconds, so it greatly diminishes the possible impact the process can have on your network compared to STP. RSTP reduces the number of state changes before active ports start learning, predefining an alternate route that can be used when a node or port fails and retain the forwarding database for ports insensitive to changes in the tree structure when reconfiguration occurs.
Select whether to enable or disable the Spanning Tree function for the switch. Next, select whether you wish to enable STP, RSTP, or MSTP. Again, please note that only one Spanning tree function can be active at a time.
Click Apply to save settings.
The Root Bridge serves as an administrative point for all Spanning Tree calculations to determine which redundant links to block in order to prevent network loops. From here, you can view all the information regarding the Root Bridge within the STP.
All other decisions in a spanning tree network, such as ports being blocked and ports being put in a forwarding mode, are made regarding a root bridge. The root bridge is the “root” of the constructed “tree” within a spanning tree network. Thus, the root bridge is the bridge with the lowest bridge ID in the spanning tree network. The bridge ID includes two parts: the bridge priority (2 bytes) and the bridge MAC address (6 bytes). The 802.1d default bridge priority is 32768. STP devices exchange Bridge Protocol Data Units (BPDUs) periodically. All bridges “listen” for Hello BPDUs (Bridge Protocol Data Units) transmitted from the root bridge. If a bridge does not get a Hello BPDU after a predefined interval (called the Maximum Age), the bridge assumes that the link to the root bridge is down. The bridge then initiates negotiations with other bridges to reconfigure the network to re-establish a valid network topology.
The Common Instance Spanning Tree (CIST) protocol is formed by the spanning tree algorithm running among bridges that support the IEEE 802.1w, IEEE 802.1s, and IEEE 802.1D standards. A Common and Internal Spanning Tree (CIST) represents the connectivity of the entire network and it is equivalent to a spanning tree in an STP/RSTP.
The CIST inside a Multiple Spanning Tree instance (MST) region is the same as the CST outside a region. All regions are bound together using a CIST, which is responsible for creating loop-free topology across regions, whereas the MSTI controls topology inside regions. CST instances allow different regions to communicate between themselves. CST is also used for traffic within the region for any VLANs not covered by a MSTI. In an MSTP-enabled network, there is only one CIST that runs between MST regions and single spanning tree devices. A network may contain multiple MST regions and other network segments running RSTP. Multiple regions and other STP bridges are interconnected using a single CST.
Enter the information to set up CIST for the switch:
Click Apply to update the system settings.
Use the CIST Ports Settings page to configure and view STA attributes for interfaces when the spanning tree mode is set to STP or RSTP. You may use a different priority or path cost for ports of the same media type to indicate a preferred path or edge port to indicate if the attached device can support fast forwarding or link type to indicate a point-to-point connection or shared-media connection.
Click Apply to update the system settings.
Multiple Spanning Tree Protocol, or MSTP enables the grouping of multiple VLANs with the same topology requirements into one Multiple Spanning Tree Instance (MSTI). MSTP then builds an Internal Spanning Tree (IST) for the region containing commonly configured MSTP bridges. Instances are not supported in STP or RSTP. Instead, they have the same spanning tree in common within the VLAN. MSTP provides the capability to logically divide a Layer 2 network into regions. Every region can contain multiple instances of spanning trees. In MSTP, all the interconnected bridges that have the same MSTP configuration comprise an MST region.
A Common Spanning Tree (CST) interconnects all adjacent MST regions and acts as a virtual bridge node for communications between STP or RSTP nodes in the global network. MSTP connects all bridges and LAN segments with a single Common and Internal Spanning Tree (CIST). The CIST is formed as a result of the running spanning tree algorithm between switches that support STP, RSTP, and MSTP protocols. Once you specify the VLANs you wish to include in a Multiple Spanning Tree Instance (MSTI), the protocol will automatically build an MSTI tree to maintain connectivity among each of the VLANs. MSTP maintains contact with the global network because each instance is treated as an RSTP node in the Common Spanning Tree (CST).
Click the Edit button to configure the MST settings. Next, enter information for the VLAN List and choose the priority you wish to use from the drop-down list.
This page displays the current MSTI configuration information for the switch. From here you can update the port configuration for an MSTI ID. If a loop occurs, the MSTP function will use the port priority to select an interface to put into the forwarding state. Set a higher priority value for ports you wish to be selected for forwarding first. In instances where the priority value is identical, the MSTP function will implement the lowest MAC address into the forwarding state and other interfaces will be blocked. Note that lower priority values mean higher priorities for forwarding packets.
Click Apply to update the system settings.
The System Information screen contains general device information including the system name, system location, and system contact for the switch.
Click Apply to update the system settings.
The switch maintains two versions of the switch image in its permanent storage. One image is the active image, and the second image is the backup image. The Dual Image screen enables the user to select which partition will be set as active after the next reset. The switch boots and runs from the active image. If the active image is corrupt, the system automatically boots from the non-active image.
Click Apply to update the system settings.
Enhance your Voice over IP (VoIP) service by configuring ports to carry IP voice traffic from IP phones on a specific VLAN. Voice VLAN provides QoS to VoIP, ensuring that the quality of the call does not deteriorate if the IP traffic is received erratically or unevenly.
Click Apply to update the system settings.
The switches determine whether a received packet is a voice packet by checking its source MAC address. VoIP traffic has a pre-configured Organizationally Unique Identifiers (OUI) prefix in the source MAC address. You can manually add specific manufacturer's MAC addresses and description to the OUI table. All traffic received on the Voice VLAN ports from the specific IP phone with a listed OUI is forwarded on the voice VLAN.
Enhance your VoIP service further by configuring ports to carry IP voice traffic from IP phones on a specific VLAN. Voice VLAN provides QoS to VoIP, ensuring that the quality of voice does not deteriorate if the IP traffic is received unevenly.
Click Apply to update the system settings.
Use the User Management page to control management access to the switch based on manually configured usernames and passwords. A user account can only view settings without the right to configure the switch, and an admin account can configure all the functions of the switch. Click the Add button to add an account or the Edit button to edit an existing account.
Important: Note that admin users have full access rights to the switch when determining the authority of the user account.
Simple Network Management Protocol (SNMP) is an application layer protocol designed specifically for managing and monitoring network devices. Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting information from and configuring network devices such as servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network. SNMP is used to exchange management information between a network management system (NMS) and a network device. A manager station can manage and monitor the switch through their network via SNMPv1, v2c and v3. An SNMP managed network consists of two components: agents and a manager.
An agent translates the local management information from the managed switch into a form that is compatible with SNMP. SNMP allows a manager and agents to communicate with each other for the purpose of accessing Management Information Bases (MIBs). SNMP uses an extensible design, where the available information is defined by MIBs. MIBs describe the structure of the management data of a device subsystem; they use a hierarchical namespace containing Object Identifiers (OID). Each OID identifies a variable that can be read or set via SNMP.
The manager is the console through which network administrators perform network management functions.
Several versions of SNMP are supported. They are v1, v2c, and v3. SNMPv1, which is defined in RFC 1157. "A Simple Network Management Protocol (SNMP)" is a standard that defines how communication occurs between SNMP-capable devices and specifies the SNMP message types. Version 1 is the simplest and most basic of versions. There may be times when it's required to support older hardware. SNMPv2c is defined in RFC 1901 "Introduction to Community-Based SNMPv2," RFC 1905 "Protocol Operations for Version 2 of the Simple Network Management Protocol (SNMPv2)", and RFC 1906 "Transport Mappings for Version 2 of the Simple Network Management Protocol (SNMPv2)." SNMPv2c updates protocol operations by introducing a GetBulk request and authentication based on community names. Version 2c adds several enhancements to the protocol such as support for "Informs." Because of this, v2c has become the most widely used version. Unfortunately, a major weakness of v1 and v2c is security. To combat this, SNMP v3 adds security features that overcome the weaknesses in v1 and v2c. If possible, it is recommended that you use v3, especially if you plan to transmit sensitive information across unsecured links. However, the extra security feature makes configuration a little more complex.
In SNMPv3, User-based Security Model (USM) authentication is implemented along with encryption, allowing you to configure a secure SNMP environment. The SNMPv3 protocol uses different terminology than SNMPv1 and SNMPv2c as well. In the SNMPv1 and SNMPv2c protocols, the terms agent and manager are used. In the SNMPv3 protocol, agents, and managers are renamed to entities. With the SNMPv3 protocol, you create users and determine the protocol used for message authentication as well as if data transmitted between two SNMP entities is encrypted.
The SNMPv3 protocol supports two authentication protocols: HMAC-MD5-96 (MD5) and HMAC-SHA-96 (SHA). Both MD5 and SHA use an algorithm to generate a message digest. Each authentication protocol authenticates a user by checking the message digest. In addition, both protocols use keys to perform authentication. The keys for both protocols are generated locally using the Engine ID and the user password to provide even more security.
In SNMPv1 and SNMPv2c, user authentication is accomplished using types of passwords called community strings, which are transmitted in clear text and not supported by authentication. Users can assign views to community strings that specify which MIB objects can be accessed by a remote SNMP manager.
The default community strings for the switch used for SNMPv1 and SNMPv2c management access for the switch are public, which allows authorized management stations to retrieve MIB objects, and private, which allows authorized management stations to retrieve and modify MIB objects.
Simple Network Management Protocol (SNMP) is an OSI Layer 7 (application layer) protocol designed specifically for managing and monitoring network devices. The SNMP agents maintain a list of variables that are used to manage the device. The variables are defined in the Management Information Base (MIB), which provides a standard presentation of the information controlled by the on-board SNMP agent.
Click Apply to update the system settings.
SNMP uses an extensible design, where the available information is defined by Management Information Bases (MIBs). MIBs describe the structure of the management data of a device subsystem; they use a hierarchical namespace containing Object Identifiers (OID) to organize themselves. Each OID identifies a variable that can be read or set via SNMP. The SNMP View List is created for the SNMP management station to manage MIB objects.
Click the Add button to create a new entry.
Configure SNMP groups to control network access on the switch by providing users in various groups with different management rights via the Read View, Write View, and Notify View options.
In SNMPv1 and SNMPv2c, user authentication is accomplished using types of passwords called community strings, which are transmitted in clear text and not supported by authentication. It is important to note that the community name can limit access to the SNMP agent from the SNMP network management station, functioning as a password.
Click Add to add a community list to the switch. Next, name the community and choose the level of access that will be granted to the specified list from the drop-down boxes.
Use the User List page to create SNMP users for authentication with managers using SNMP v3 to associate them to SNMP groups. Click Add to add a new user.
A trap is a type of SNMP message. The switch can send traps to an SNMP manager when an event occurs.
You can restrict user privileges by specifying which portions of the MIBs that a user can view. In this way, you restrict which MIBs a user can display and modify for better security. In addition, you can restrict the types of traps users can send as well. You can do this by determining where messages are sent and what types of messages can be sent per user. Traps indicating status changes can be issued by the switch to the specified trap manager by sending authentication failure messages and other trap messages.
Click the Apply button to accept the changes or the Cancel button to discard them.
To configure the OUI settings, click the Edit button to re-configure the specific entry. Click the Delete button to remove the specific entry and click the Add button to create a new OUI entry. Click the Apply button to accept the changes or the Cancel button to discard them.
Click the Apply button to accept the changes or the Cancel button to discard them.
Click the Apply button to accept the changes or the Cancel button to discard them.
Click the Apply button to accept the changes or the Cancel button to discard them.
Click the Apply button to accept the changes or the Cancel button to discard them.
Click the Apply button to accept the changes or the Cancel button to discard them.
Click the Apply button to accept the changes or the Cancel button to discard them.
STP
Select whether to enable or disable the spanning tree operation on the switch.
Force Version
Select the Force Protocol Version parameter for the switch.
STP (Spanning Tree Protocol): IEEE 802.1D
RSTP (Rapid Spanning Tree Protocol): IEEE 802.1w
MSTP (Multiple Spanning Tree Protocol): IEEE 802.1s
Items
Descriptions
Root Address
Displays the root bridge MAC address. Root in root bridge refers to the base of the spanning tree, which the switch could be configured for.
Priority
Displays the priority for the bridge. When switches are running STP, each is assigned a priority. After exchanging BPDUs, the switch with the lowest priority value becomes the root bridge.
Forward Delay
Displays the Switch Forward Delay Time. This is the time (in seconds) the root switch will wait before changing states (called listening to learning).
Maximum Age
Displays the bridge Switch Maximum Age Time. This is the amount of time a bridge waits before sending a configuration message. The default is 20 seconds.
Hello Time
Displays the Switch Hello Time. This is the amount of time a bridge remains in a listening and learning state before forwarding packets. The default is 15 seconds.
Items
Descriptions
Priority
Select from the list to specify the priority of the switch for comparison in the CIST. CIST priority is an important criterion in determining the root bridge. Under the same condition, the switch with the highest priority will be chosen as the root bridge. A lower value has a higher priority. The default value is 32768 and should be an exact divisor of 4096.
Maximum Hop
Used to set the number of hops between devices in a spanning tree region before the BPDU packet sent by the switch is discarded. Each switch on the hop count will reduce the hop count by one until the value reaches zero. The switch will then discard the BDPU packet and the information held for the port will age out. The user may set a hop countfrom 6 to 40. The default value is: 20.
Forward Delay
Enter the bridge forward delay time, which indicates the amount of time in seconds that a bridge remains in a listening and learning state before forwarding packets. The value must be greater or equal to (Bridge Max
Age/2) + 1. The time range is from 4 seconds to 30 seconds. The default value is 15 seconds.
Maximum Age
The Max Age may be set to ensure that old information does not endlessly circulate through redundant paths in the network, preventing the effective propagation of new information. Set by the Root Bridge, this value will aid in determining that the switch has spanning tree configuration values consistent with other devices on the bridged
LAN. The user may choose a time between 6 and 40 seconds. The default value is 20 seconds.
TX Hold Count
Enter the maximum number of Hello packets transmitted per interval. The count can be specified from 1 to 10. The default is 6.
Hello Time
Enter the switch’s Hello Time. This is the interval between two transmissions of BPDU packets sent by the Root Bridge to verify that it is the Root Bridge. The Hello Time range is from 1 to 10 seconds. The default Hello Time is 2 seconds.
Items
Descriptions
Port
Port or trunked port identifier.
Priority
Defines the priority used for this port in the Spanning Tree Algorithm. If the path cost for all ports on a switch is the same, the port with the highest priority (i.e., lowest value) will be configured as an active link in the Spanning Tree. This makes a port with higher priority less likely to be blocked if the Spanning Tree Algorithm is detecting network loops. When more than one port is assigned the highest priority, the port with lowest numeric identifier will be enabled. The range is from 0 to 240, in steps of 16; and the default is 128.
Internal Path Cost Conf/Oper
The Internal Path Cost setting allows you to specify the relative cost of sending spanning tree traffic through the interface to adjacent bridges within a spanning tree region.
External Path Cost Conf/Oper
The External Path Cost setting is used to calculate the cost of sending spanning tree traffic through the interface to reach an adjacent spanning tree region. The spanning tree algorithm tries to minimize the total path cost between each point of the tree and the root bridge.
Designated Root Bridge
Displays the root bridge for the CST. It is comprised using the bridge priority and the base MAC address of the bridge.
Internal Root Cost
This is the cost to the CIST regional root in a region.
External Root Cost
External root cost is the cost to the CIST root.
Regional Root Bridge
This is the bridge identifier of the CST regional root. It is made up using the bridge priority and the base MAC address of the bridge.
Internal Port Cost
Enter the cost of the port.
Edge Port Conf/Oper
Displays the edge port state.
Designated Bridge
This is the bridge identifier of the bridge of the designated port. It is made up using the bridge priority and the base MAC address of the bridge.
Port Role
Each MST bridge port that is enabled is assigned a port role within each spanning tree. The port role will be one of the following values: Root Port, Designated Port, Alternate Port, Backup Port, Master Port, or Disabled.
Port State
The forwarding state of this port. The state parameters are Discarding, Learning, Forwarding, or Disabled.
MST ID
Displays the ID of the MST group that is created. A maximum of 15 groups can be set for the switch.
VLAN List
Enter the VLAN ID range for the configured VLANs to associate with the MST ID. The VLAN ID number range is from 1 to 4094.
Priority
Select the bridge priority value for the MST. When switches or bridges are running STP, each is assigned a priority. After exchanging BPDUs, the switch with the lowest priority value becomes the root bridge. The default value is 32768. The range is from 0 to 61440. The bridge priority is a multiple of 4096.
Regional Root Bridge
This is the bridge identifier of the CST regional root. It is made up using the bridge priority and the base MAC address of the bridge.
Internal Root Cost
Displays the path cost to the designated root for the MST instance.
Designated Bridge
Displays the bridge identifier of the bridge with the designated port. It is made up using the bridge priority and the base MAC address of the bridge.
Root Port
Displays the port that accesses the designated root for MST instance.
Items
Descriptions
MST ID
Displays the ID of the MST group that is created. A maximum of 15 groups can be set for the switch.
Port
Displays port or trunked port ID.
Priority
Select the bridge priority value for the MST. When switches or bridges are running STP, each is assigned a priority. After exchanging BPDUs, the switch with the lowest priority value becomes the root bridge. The bridge priority is a multiple of 4096. If you specify a priority that is not a multiple of 4096, the priority is automatically set to the next lowest priority that is a multiple of 4096. For example, if you set the priority to any value from 0 through 4095, the priority is set to 0. The default priority is 32768. The valid range is from 0 to 61440.
Internal Path Cost Conf
The Internal Path Cost setting allows you to specify the relative cost of sending spanning tree traffic through the interface to adjacent bridges within a spanning tree region.
Internal Path Cost Oper
Displays the operation cost of the path from this bridge to the root bridge.
Regional Root Bridge
This is the bridge identifier of the CST regional root. It is made up using the bridge priority and the base MAC address of the bridge.
Internal Root Cost
Displays the path cost to the designated root for the selected MST instance.
Designated Bridge
Displays the bridge identifier of the bridge for the designated port. It is made up using the bridge priority and the base MAC address of the bridge.
Internal Port Cost
This parameter is set to represent the relative cost of forwarding packets to specified ports when an interface is selected within an STP instance. Selecting this parameter with a value in the range of 1 to 200000000 will set the quickest route when a loop occurs. A lower internal cost represents a quicker transmission. Selecting 0 (zero) for this parameter will set the quickest optimal route automatically for an interface.
Port Role:
Each MST bridge port that is enabled is assigned a port role for each spanning tree. The port role is one of the following values: Root, Designated, Alternate, Backup, Master, or Disabled.
Port State
Indicates the current STP state of a port. If enabled, the port state determines what forwarding action is taken regarding traffic. The possible port states are:
Disabled: STP is disabled on the port. The port forwards traffic while learning MAC addresses.
Blocking: The port is blocked and cannot be used to forward traffic or learn MAC addresses.
Listening: The port is in listening mode. The port cannot forward traffic or learn MAC addresses in this state.
Learning: The port is in learning mode. The port cannot forward traffic. However, it can learn new MAC addresses.
Forwarding: The port is in forwarding mode. The port can forward traffic and learn new MAC addresses in this state.
Items
Descriptions
Voice VLAN State
Select Enabled or Disabled for Voice VLAN on the switch.
Voice VLAN ID
Sets the Voice VLAN ID for the network. Only one Voice VLAN is supported on the switch.
802.1p Remark
Enable this function to have outgoing voice traffic to be marked with the selected CoS value.
Remark CoS/802.1p
Defines a service priority for traffic on the Voice VLAN. The priority of any received VoIP packet is overwritten with the new priority when the Voice VLAN feature is active on a port. (Range: 0 to 7; Default: 6)
Aging Time
The aging time is used to remove a port from voice VLAN if the port is an automatic VLAN member. When the last voice device stops sending traffic and the MAC address of this voice device is aged out, the voice VLAN aging timer will be started. The port will be removed from the voice VLAN after expiration of the voice VLAN aging timer. If the voice traffic resumes during the aging time, the aging timer will be reset and stop. The range for aging time is from 1 to 65535 minutes. The default is 1440 minutes.
Items
Descriptions
Index
Displays the VoIP sequence ID.
OUI Address
Globally unique ID assigned to a vendor by the IEEE to identify VoIP equipment.
Description
Displays the ID of the VoIP equipment vendor.
Port
Displays the port to which the voice VLAN settings are applied.
State
Select Enabled to enhance VoIP quality on the selected port. The default is Disabled.
CoS Mode
Select Src or All from the list.
Src: Src QoS attributes are applied to packets with OUIs in the source MAC address.
All: All QoS attributes are applied to packets that are classified to the Voice VLAN.
Operate Status
Displays the operating status for the Voice VLAN on the selected port.
Items | descriptions |
SNMP State | Enables or disables the SNMP function. The default SNMP global state is: Enabled. |
Local Engine ID (10-64 hex characters) | Enter the switch's Engine ID for the remote clients. A SNMPv3 engine is an independent SNMP agent that resides on the switch. This engine protects against message replay, delay, and redirection issues. The engine ID is also used in combination with user passwords to generate security keys for authenticating and encrypting SNMPv3 packets. Normally, a local engine ID is automatically generated that is unique to the switch. This is referred to as the default engine ID. If the local engine ID is deleted or changed, all local SNMP users will be cleared, and you will need to reconfigure all existing users. |
View Name | Enter the view name. The view name can contain up to 30 alphanumeric characters. |
Subtree OID | Enter the Object Identifier (OID) Subtree. The OID identifies an object tree (MIB tree) that will be included or excluded from access by an SNMP manager. Note that the first character must be a period (.). Wild cards can be used to mask a specific portion of the OID string using a period (.). |
Subtree Mask | Select 0 or 1 for Subtree mask. The mask of the Subtree OID 1 means this object number "is concerned", and 0 means "do not concern," |
View Type | Select whether the defined OID branch within MIB tree will be Included or Excluded from the selected SNMP view. Generally, if the view type of an entry is Excluded, another entry of view type Included should exist and its OID subtree should overlap the Excluded view entry. |
Group Name | Enter the group name to which access control rules are applied. The group name can contain up to 30 alphanumeric characters. |
Security Mode | Select the SNMP version (v1, v2c, v3) associated with the group. |
Security Level | Select the security level for the group. Security levels apply to SNMPv3 only. No Auth: Neither authentication nor the privacy security levels are assigned to the group. Auth: Authenticates SNMP messages. Priv: Encrypts SNMP messages. |
Read View | Management access is restricted to read-only. |
Write View | Select an SNMP to allow SNMP write privileges to the switch's SNMP agent. |
Notify View | Select a SNMP group to receive SNMP trap messages generated by the switch's SNMP agent. |
Items | Descriptions |
Community Name | Enter the name of SNMP community string. |
Community Mode | Selected Basic or Advance from the list. Select the Advance attached to the SNMP group. |
Group Name | Select the SNMP group from a list. |
View Name | Select the view name from a list. |
Access Rights | Specify the level of permission for the MIB objects accessible to the SNMP. Your choices are Read/Write or Read-only. |
Privilege Mode | Select No Auth, Auth, or Priv security level from the list. No Auth: Neither authentication nor the privacy security levels are assigned to the group. Auth: Authenticates and ensures that the origin of the SNMP message is authenticated. Priv: Encrypts SNMP messages. |
Authentication Protocol | Select the method used to authenticate users. MD5: Using the HMAC-MD5 algorithm. SHA: Using the HMAC-SHA-96 authentication level. Enter the SHA password and the HMAC-SHA-96 password to be used for authentication. |
Authentication Password | Enter MD5 password and the HMAC-MD5-96 password to be used for authentication. |
Encryption Protocol | Select the method used to authenticate users. None: No user authentication is used. DES: Using the Data Encryption Standard algorithm. |
Encryption Key | Enter the Data Encryption Standard key. |
Items | Descriptions |
Server IP/Hostname | Enter the server IP or Hostname. The Hostname can contain up to 128 alphanumeric characters. |
SNMP Version | Select the SNMP version from the list. |
Notify Type | Select the type of notification to be sent. Traps: Traps are sent. Informs: Informs are sent ONLY when v2c is enabled. Note: The recipient of a trap message does not send a response to the switch. Traps are therefore not as reliable as inform messages, which include a request for acknowledgment of receipt. Inform messages can be used to ensure that critical information is received by the host. However, please note that informs consume more system resources because they must be kept in memory until a response is received. Informs also add to network traffic. You should consider these effects when deciding whether to issue notifications as traps or informs. |
Community Name | Select the Community Name from the list. |
UDP | Enter the UDP port used to send notifications. |
Timeout | Configurable only if the notify type is Informs. Enter the amount of time the device waits before re-sending. The default is 15 seconds. |
Retry | Configurable only if the notify type is Informs. Enter the amount of time the device waits before re-sending an inform request. The default is 3 seconds. |
An Access Control List (ACL) allows you to define classification rules or establish criteria to provide security to your network by blocking unauthorized users and allowing authorized users to access specific areas or resources. ACLs can provide basic security for access to the network by controlling whether packets are forwarded or blocked at the switch ports. Access Control Lists (ACLs) are filters that allow you to classify data packets according to content in the packet header, such as the source address, destination address, source port number, destination port number, and more. Packet classifiers identify flows for more efficient processing. Each filter defines the conditions that must match for inclusion in the filter. ACLs (Access Control Lists) provide packet filtering for IP frames (based on the protocol, TCP/UDP port number or frame type) or layer 2 frames (based on any destination MAC address for unicast, broadcast, or multicast, or based on VLAN ID or VLAN tag priority). ACLs can be used to improve performance by blocking unnecessary network traffic or to implement security controls by restricting access to specific network resources or protocols. Policies can be used to differentiate service for client ports, server ports, network ports, or guest ports. They can also be used to strictly control network traffic by only allowing incoming frames that match the source MAC and source IP address on a specific port. ACLs are composed of Access Control Entries (ACEs), which are rules that determine traffic classifications. Each ACE is a considered a single rule, and up to 256 rules may be defined on each ACL, with up to 3000 rules globally. ACLs are used to provide traffic flow control, restrict contents of routing updates, and determine which types of traffic are forwarded or blocked. This criterion can be specified based on the MAC address or IP address.
Items
Descriptions
System Name
Enter the name you wish to use to identify the switch. You can use up to 255 alphanumeric characters.
System Location
Enter the location of the switch. You can use up to 255 alphanumeric characters. The factory default is: Default Location.
System Contact
Enter the contact person for the switch. You can use up to 255 alphanumeric characters. The factory default is: Default Location.
Items
Descriptions
Active
Selects the partition you wish to be active.
Flash Partition
Displays the number of the partition.
Status
Displays the partition which is currently active on the switch.
Image Name
Displays the name/version number of the image.
Image Size
Displays the size of the image file.
Created Time
Displays the time the image was created.
Username
Enter a username. You can use up to 18 alphanumeric characters.
Password Type
Select Clear Text or Encrypted from the list.
Password
Enter a new password for accessing the switch.
Password Retype
Repeat the new password used to access the switch.
Privilege Type
Select Admin or User from the list to regulate access rights.
Use this page to view and add rules to MAC-based ACLs.
Click Apply to update the system settings.
This page displays the currently defined MAC-based ACLs profiles. To add a new ACL, click Add and enter the name of the new ACL.
This page displays the currently defined IPv4-based ACLs profiles. To add a new ACL, click Add and enter the name of the new ACL.
Use this page to view and add rules to IPv4-based ACLs.
Click Apply to update the system settings.
This page displays the currently defined IPv6-based ACLs profiles. To add a new ACL, click Add and enter the name of the new ACL.
Click the Apply button to accept the changes or the Cancel button to discard them.
Click the Apply button to accept the changes or the Cancel button to discard them.
Click the Apply button to accept the changes or the Cancel button to discard them.
Quality of Service (QoS) allows implement priority queuing within a network. QoS is a means of providing consistent and predictable data delivery to the switch by distinguishing between packets that have stricter timing requirements from those that are more tolerant of delays. QoS enables traffic to be prioritized while avoiding excessive broadcast and multicast traffic. Traffic such as Voice and Video streaming which require minimal delays can be assigned to a high priority queue, while other traffic can be assigned to a lower priority queue, resulting in uninterrupted actions. Without QoS, all traffic data is as likely to be dropped when the network is congested. This can result in reductions in network performance and hinder the network in time-critical situations.
In a switch, multiple queues per port are often provided to give preference to certain packets over others based on user-defined criteria. When a packet is queued for transmission within a port, the rate at which it is processed depends on how the queue is configured and the amount of traffic present within other queues on the port. If a delay is necessary, packets are held in the queue until they are authorized for transmission.
ACL Name
Select the ACL from the list.
Sequence
Enter the sequence number which signifies the order of the specified ACL relative to other ACLs assigned to the selected interface. The valid range is from 1 to 2147483647, 1 being processed first.
Action
Select what action to take if a packet matches the criteria.
Permit: Forward packets that meet the ACL criteria.
Deny: Drops packets that meet the ACL criteria.
Destination MAC Value
Enter the destination MAC address.
Destination MAC Wildcard Mask
Enter a MAC address mask for the destination MAC address. A mask of 00:00:00:00:00:00 means the bits must be matched exactly; ff:ff:ff:ff:ff:ff means the bits are irrelevant. Any combination of 0s and ffs can be used.
Source MAC Value
Enter the source MAC address.
Source MAC Wildcard Mask
Enter a MAC address mask for the source MAC address. A mask of 00:00:00:00:00:00 means the bits must be matched exactly; ff:ff:ff:ff:ff:ff means the bits are irrelevant. Any combination of 0s and ffs can be used.
VLAN ID
Enter the VLAN ID to which the MAC address is attached in MAC ACE. The range is from 1 to 4094.
802.1p Value
Enter the 802.1p value. The range is from 0 to 7.
Ethertype Value
Selecting this option instructs the switch to examine the Ethernet type value in each frame's header. This option can only be used to filter Ethernet II formatted packets. A detailed listing of Ethernet protocol types can be found in RFC 1060. A few of the more common types include 0800 (IP), 0806 (ARP), and 8137 (IPX).
Items
Descriptions
Index
Profile identifier.
Name
Enter the MAC based ACL name. You can use up to 32 alphanumeric characters.
Items
Descriptions
Index
Displays the current number of ACLs.
Name
Enter the IP based ACL name. You can use up to 32 alphanumeric characters.
ACL Name
Select the ACL from the list for which a rule is being created.
Sequence
Enter the sequence number which signifies the order of the specified ACL relative to other ACLs assigned to the selected interface. The valid range is from 1 to 2147483647, 1 being processed first.
Action
Select what action to take if a packet matches the criteria.
Permit: Forwards packets that meet the ACL criteria.
Deny: Drops packets that meet the ACL criteria.
Protocol
Select Any, Protocol ID, or Select from a List in the drop-down menu.
Any: Check Any to use any protocol.
Protocol ID: Enter the protocol in the ACE to which the packet is matched.
Select from List: Selects the protocol from the list in the provided field.
ICMP: Internet Control Message Protocol (ICMP). The ICMP enables the gateway or destination host to communicate with the source host.
IPinIP: IP in IP encapsulates IP packets to create tunnels between two routers. This ensures that the IP in IP tunnel appears as a single interface, rather than several separate interfaces.
TCP: Transmission Control Protocol (TCP). Enables two hosts to communicate and exchange data streams. TCP guarantees packet delivery and guarantees that packets are transmitted and received in the order they are sent. EGP Exterior Gateway Protocol (EGP). Permits exchanging routing information between two neighboring gateway hosts in an autonomous systems network.
IGP: Interior Gateway Protocol (IGP). Enables a routing information exchange between gateways within an autonomous network.
UDP: User Datagram Protocol (UDP). UDP is a communication protocol that transmits packets but does not guarantee their delivery.
HMP: The Host Mapping Protocol (HMP) collects network information from various network hosts. HMP monitors hosts spread over the Internet as well as hosts in a single network.
RDP: Reliable Data Protocol (RDP). Provides a reliable data transport service for packet-based applications.
IPv6: Matches the packet to the IPV6 protocol.
IPv6: Rout: Routing Header for IPv6.
IPv6: Frag: Fragment Header for IPv6.
RVSP: Matches the packet to the ReSerVation Protocol(RSVP).
IPv6: ICMP: The Internet Control Message Protocol (ICMP) allows the gateway or destination host to communicate with the source host.
OSPF: The Open Shortest Path First (OSPF) protocol is a link-state hierarchical interior gateway protocol (IGP) for network routing Layer Two (2) tunneling protocols. It is an extension to the PPP protocol that enables ISPs to operate Virtual Private Networks (VPNs).
PIM: Matches the packet to Protocol Independent Multicast (PIM).
L2TP: Matches the packet to Internet Protocol (L2IP).
Source IP Address Value
Enter the source IP address.
Source IP Mask
Enter the mask of the new source IP address.
Destination IP Address Value
Enter the destination IP address.
Destination IP Mask
Enter the mask of the new source IP address.
Type of Service
Select Any or DSCP to match from drop-down list. When DSCP to match is selected, enter the DSCP. The range is from 0 to 63.
ICMP Type
Select Any, Protocol ID, or Select from List from drop-down menu.
Protocol ID: Enter the protocol in the ACE to which the packet is matched. The range is from 0 to 255.
Select from List: Select the ICMP from the list in the provided field.
ICMP Code
Select Any or User Defined from drop-down menu. When User Defined is selected, enter the ICMP code value. The range is from 0 to 255.
Items | Descriptions |
Index | Displays the current number of ACLs. |
Name | Enter the IPv6 based ACL name. You can use up to 32 alphanumeric characters. |
When an ACL is bound to an interface, all the rules that have been defined for the ACL are applied to that interface. Whenever an ACL is assigned on a port or LAG, flows from that ingress or egress interface that do not match the ACL are matched to the default rule of dropping unmatched packets. To bind an ACL to an interface, simply select an interface and select the ACL(s) you wish to bind.
Click Apply to update the system settings.
There are two options for applying QoS information onto packets: the 802.1p Class of Service (CoS) priority field within the VLAN tag of tagged Ethernet frames, and Differentiated Services (DiffServ) Code Point (DSCP). Each port on the switch can be configured to trust one of the packet fields (802.1p , DSCP or DSCP+802.1p). Packets that enter the switch's port may carry no QoS information as well. If so, the switch places such information into the packets before transmitting them to the next node. Thus, QoS information is preserved between nodes within the network and the nodes know which label to give each packet. A trusted field must exist in the packet for the mapping table to be of any use. When a port is configured as untrusted, it does not trust any incoming packet priority designations and uses the port default priority value instead to process the packet.
Click Apply to update the system settings.
Use the Class of Service (CoS) Mapping feature to specify which internal traffic class to map to the corresponding CoS value. CoS allows you to specify which data packets have greater precedence when traffic is buffered due to congestion.
Click Apply to update the system settings.
Allows IPv6 Based Access Control Entry (ACE) to be defined within a configured ACL.
Click Apply to update the system settings.
Items
Descriptions
CoS
Displays the CoS priority tag values, where 0 is the lowest and 7 is the highest
Queue
Check the CoS priority tag box and select the Queue values for each CoS value in the provided fields. Eight traffic priority queues are supported, and the field values are from 1 to 8, where one is the lowest priority and eight is the highest priority.
Port
Select the port to which the ACLs are bound.
MAC ACL
Select the MAC ACL rule to apply to the port.
IPv4 ACL
Select the IPv4 ACL rule to apply to the port.
IPv6 ACL
Select the IPv6 ACL rule to apply to the port.
Items
Descriptions
State
Select whether QoS is enabled or disabled on the switch.
Scheduling Method
Selects the Strict Priority or WRR to specify the traffic scheduling method.
Strict Priority: Specifies traffic scheduling based strictly on the queue priority.
WRR: Uses the Weighted Round-Robin (WRR) algorithm to handle packets in priority classes of service. It assigns WRR weights to queues.
Trust Mode
Select which packet fields to use for classifying packets entering the switch.
DSCP: Classify traffic based on the DSCP (Differentiated Services Code Point) tag value.
802.1p: Classify traffic based on the 802.1p. The eight priority tags that are specified in IEEE 802.1p are from 1 to 8.
Items | Descriptions |
ACL Name | Select the ACL from the list. |
Sequence | Enter the sequence number which signifies the order of the specified ACL relative to other ACLs assigned to the selected interface. The valid range is from 1 to 2147483647, 1 being processed first. |
Action | Select what action to take if a packet matches the criteria. Permit: Forward packets that meet the ACL criteria. Deny: Drops packets that meet the ACL criteria. |
Protocol | Select the Any, Protocol ID, or Select from List from drop-down menu. Protocol ID: Enter the protocol in the ACE to which the packet is matched. Select from List: Select the protocol from the list in the provided field. |
Source IP Address Value | Enter the source IP address. |
Source IP Prefix Length | Enter the prefix length of the new source IP address. The range is from 0 to 128. |
Destination IP Address Value | Enter the destination IP address. |
Destination IP Prefix Length | Enter the prefix length of the new source IP address. The range is from 0 to 128. |
Source Port | Select Single or Range from the list. Enter the source port that is matched to packets. The range is from 0 to 65535. |
Destination Port | Select Single or Range from the list. Enter the destination port that is matched to packets. The range is from 0 to 65535. |
TCP Flags | Select whether to handle each six TCP control flags; URG (Urgent), ACK (Acknowledgment), PSH (Push), RST (Reset), SYN (Synchronize), and FIN (Fin) from drop-down menu. Don't Care: The ACE does not treat the TCP control flag. Set: The packet with the TCP control flag being set matches the criteria. Unset: The packet with the TCP control flag being unset matches the criteria. |
Type of Service | Select Any or DSCP to match from drop-down list. When DSCP to match is selected, enter the DSCP. The range is from 0 to 63. |
Use Differentiated Services Code Point (DSCP) Mapping feature to specify which internal traffic class to map to the corresponding DSCP values. DSCP Mapping increases the number of definable priority levels by reallocating bits of an IP packet for prioritization purposes.
Click Apply to update the system settings.
The IEEE 802.1X standard authentication uses the RADIUS (Remote Authentication Dial in User Service) protocol to validate users and provide a security standard for network access control. The user that wishes to be authenticated is called a supplicant. The actual server doing the authentication, typically a RADIUS server, is called the authentication server. The mediating device, such as a switch, is called the authenticator. Clients connected to a port on the switch must be authenticated by the Authentication server (RADIUS) before accessing any services offered by the switch on the LAN. Use a RADIUS server to authenticate users trying to access a network by relaying Extensible Authentication Protocol over LAN (EAPOL) packets between the client and server. This establishes the requirements needed for a protocol between the authenticator (the system that passes an authentication request to the authentication server) and the supplicant (the system that requests authentication), as well as between the authenticator and the authentication server.
Items
Descriptions
DSCP
Displays the packet's DSCP values, where 0 is the lowest and 10 is the highest.
Queue
Check the CoS priority tag box and select the Queue values for each DSCP in the provided fields. Eight traffic priority queues are supported, and the field values are from 1 to 8, where one is the lowest priority and eight is the highest priority.
The Bandwidth Control feature allows users to define the bandwidth settings for a specified port's Ingress Rate Limit and Egress Rate.
Click Apply to update the system settings.
From here, you can configure the QoS port settings for the switch. Select a port you wish to set and choose a CoS value from the drop-down box. Next, select to enable or disable the Trust setting to let any CoS packet be marked at ingress.
Click Apply to update the system settings.
Items
Descriptions
Port
Displays the ports for which the bandwidth settings are displayed.
Ingress
Select enable or disable ingress on the interface.
Ingress Rate
Enter the ingress rate in kilobits per second. The gigabit Ethernet ports have a maximum speed of 1000000 kilobits per second.
Egress
Select from the drop-down box to Enable or Disable egress on the interface.
Egress Rate
Enter the egress rate in kilobits per second. The gigabit Ethernet ports have a maximum speed of 1000000 kilobits per second.
Port | Displays the ports for which the CoS parameters are defined. |
CoS Value | Select the CoS priority tag values, where 0 is the lowest and 7 is the highest. |
Trust | Select Enabled to trust any CoS packet marking at ingress. Select Disabled to not trust any CoS packet marking at ingress. |
Storm Control limits the amount of Broadcast, Unknown Multicast, and Unknown Unicast frames accepted and forwarded by the switch. Storm Control can be enabled per port by defining the packet type and the rate that the packets are transmitted at. The switch measures the incoming Broadcast, Unknown Multicast, and Unknown Unicast frames rates separately on each port, and discards the frames when the rate exceeds a user-defined rate.
Click Apply to update the system settings.
When a supplicant is connected to a switch port, the port issues an 802.1X authentication request to the attached the 802.1X supplicant. The supplicant replies with the given username and password, and an authentication request is then passed to a configured RADIUS server. The authentication server's user database supports Extended Authentication Protocol (EAP), which allows particular guest VLAN memberships to be defined based on each individual user. After authorization, the port connected to the authenticated supplicant then becomes a member of the specified guest VLAN. When the supplicant is successfully authenticated, traffic is automatically assigned to the guest VLAN. The EAP authentication methods supported by the switch are EAP-MD5, EAPTLS, EAP-TTLS, and EAP-PEAP.
Click Apply to update the system settings.
The IEEE 802.1X port-based authentication provides a security standard for network access control with RADIUS servers and holds a network port disconnected until authentication is completed. With 802.1X port-based authentication, the supplicant provides the required credentials, such as username, password, or digital certificate to the authenticator, and the authenticator forwards the credentials to the authentication server for verification to the guest VLAN. If the authentication server determines the credentials are valid, the supplicant is allowed to access resources located on the protected side of the network.
From here, you can configure the port settings as they relate to 802.1X. First, select the mode you wish to utilize from the drop-down box. Next, choose whether to enable or disable re-authentication for the port. Enter the time span that you wish to elapse for the re-authentication Period, Quiet Period, and Supplicant Period. After this, enter the max number of times you wish for the switch to retransmit the EAP request. Finally, choose whether you wish to enable or disable the VLAN ID.
Click Apply to update the system settings.
The Authenticated Host section displays the Authenticated Username, Port, Session Time, Authenticated Method, and Mac Address.
Items
Descriptions
Unknown Multicast
Enter the Unknown Multicast rate in kilobits per second. The gigabit Ethernet ports have a maximum speed of 1000000 kilobits per second. If the rate of broadcast traffic ingress on the interface increases beyond the configured threshold, the traffic is dropped.
Unknown Unicast
Enter the Unknown Unicast rate in kilobits per second. The gigabit Ethernet ports have a maximum speed of 1000000 kilobits per second. If the rate of broadcast traffic ingress on the interface increases beyond the configured threshold, the traffic is dropped.
Items
Descriptions
Port
Displays the ports for which the 802.1X information is displayed.
Mode
Select Auto or Force_UnAuthorized or Force_Authorized mode from the list.
Re-Authentication
Select whether port re-authentication is Enabled or Disabled.
Re-authentication period
Enter the time span in which the selected port is re-authenticated. The default is 3600 seconds.
Quiet Period
Enter the number of the device that remains in the quiet state following a failed authentication exchange. The default is 60 seconds.
Supplicant Period
Enter the amount of time that lapses before an EAP request is resent to the supplicant. The default is 30 seconds.
Max Retry
Enter the maximum number of times that the switch retransmits an EAP request to the client before it times out the authentication session. The default is 2 times.
Guest VLAN ID
Select whether guest VLAN ID is Enabled or Disabled.
Items
Descriptions
Port
Displays the ports for which the Storm Control information is displayed.
Status
Select whether Storm Control is Enabled or Disabled ingress on the interface.
Broadcast
Enter the broadcast rate in kilobits per second. The Gigabit Ethernet ports have a maximum speed of 1000000 kilobits per second. If the rate of broadcast traffic ingress on the interface increases beyond the configured threshold, the traffic is dropped.
Items
Descriptions
State
Select whether authentication is Enabled or Disabled on the switch.
Guest VLAN
Select whether Guest VLAN is Enabled or Disabled on the switch. The default is Disabled.
Guest VLAN ID
Select the guest VLAN ID from the list of currently defined VLANs.
RADIUS proxy servers are used for centralized administration. Remote Authentication Dial in User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users that connect and use a network service for greater convenience. RADIUS is a server protocol that runs in the application layer, using UDP as transport. The Network switch with port-based authentication and all have a RADIUS client component that communicates with the RADIUS server. Clients connected to a port on the switch must be authenticated by the Authentication server before accessing services offered by the switch on the LAN. Use a RADIUS server to authenticate users trying to access a network by relaying Extensible Authentication Protocol over LAN (EAPOL) packets between the client and server. The RADIUS server maintains a user database, which contains authentication information. The switch passes information to the configured RADIUS server, which can authenticate a username and password before authorizing use of the network.
Click the Apply button to accept the changes or the Cancel button to discard them.
Items
Description
Index
Displays the index for which RADIUS server is displayed.
Server IP
Enter the RADIUS server IP address.
Authorized Port
Enter the authorized port number. The default port is 1812.
Accounting Port
Enter the name you wish to use to identify this switch.
Key String
Enter the key string used for encrypting all RADIUS communication between the device and the RADIUS server.
Timeout Reply
Enter the amount of time the device waits for an answer from the RADIUS server before switching to the next server. The default value is 3.
Retry
Enter the number of transmitted requests sent to the RADIUS server before a failure occurs. The default is 3.
Server Priority
Enter the priority for the RADIUS server.
Dead Timeout
Enter the amount of time that the RADIUS server is bypassed for service requests. The default value is 0.
Port Isolation feature provides L2 isolation between ports within the same broadcast domain. When enabled, Isolated ports can forward traffic to Not Isolated ports, but not to other Isolated ports. Not Isolated ports can send traffic to any port whether Isolated or Not Isolated. The default setting is Not Isolated.
Click Apply to update the system settings.
Network security can be increased by limiting access on a specific port to users with specific MAC addresses. Port Security prevents unauthorized devices to the switch prior to stopping the auto-learning processing.
Click Apply to update the system settings.
DoS (Denial of Service) is used for classifying and blocking specific types of DoS attacks. From here, you can configure the switch to monitor and block different types of attacks.
On this page, the user can enable or disable the prevention of different types of DoS attacks. When enabled, the switch will drop the packets matching the types of DoS attack detected.
Click Apply to update the system settings.
From here you can configure the Port Settings for DoS for the switch. Select from the drop-down list whether you wish to enable or disable DoS protection for the switch.
Click Apply to update the system settings.
HTTP(S) Settings
The EnGenius Switch provides a built-in browser interface that enables you to configure and manage the switch via Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS) requests selectively to help prevent security breaches on the network. You can manage your HTTP and HTTPS settings for the switch further by choosing the length of session timeouts for HTTP and HTTPS requests. Select whether to enable or disable the HTTP service and enter the HTTP Timeout session. Next, select whether to enable or disable the HTTPS service and enter the HTTPS timeout session for the switch.
Click Apply to update the system settings.
From here, you can configure and manage the switch's Telnet protocol settings. The Telnet protocol is a standard Internet protocol which enables terminals and applications to interface over the Internet with remote hosts by providing Command Line Interface (CLI) communication using a virtual terminal connection. This protocol provides the basic rules for making it possible to link a client to a command interpreter. The Telnet service for the switch is enabled by default. Please note that for secure communication, it is better to use SSH over Telnet. To enable and configure SSH settings, please refer to SSH settings on the next page.
Click Apply to update the system settings.
Secure Shell (SSH) is a cryptographic network protocol for secure data communication network services. SSH is a way of accessing the command line interface on the network switch. The traffic is encrypted, so it is difficult to eavesdrop as it creates a secure connection within an insecure network such as the Internet. Even if an attacker were able to view the traffic, the data would be incomprehensible without the correct encryption key to decode it.
To configure SSH settings for the switch, first select whether you wish to enable or disable the SSH service for the switch. Note that SSH is more secure than the Telnet service when
deciding which service to use. Enter the session timeout you wish to implement for SSH. Next, enter the History Count number you wish. The default count is: 128. Enter the number of passwords requests to be sent across SSH. The default attempts are: 3. Finally, enter the silent time you wish to implement for the SSH service.
Click Apply to update the system settings.
From here, you can configure the Console service settings for the switch.
Click Apply to update the system settings.
Remote Network Monitoring, or RMON is used for support monitoring and protocol analysis of LANs by enabling various network monitors and console systems to exchange network monitoring data through the switch.
The Event List defines RMON events on the switch.
From here, you can view specific event logs for the switch. Choose an event log you wish to view from the drop-down list.
You can configure network alarms to occur when a network problem is detected. Choose your preferences for the alarm from the drop-down boxes.
From here, you can view the History Index for history logs on the switch. Select a history index to view from the drop-down box.
From here, you can view all the RMON statistics of the switch.
Click the Apply button to accept the changes or the Cancel button to discard them.
Click the Apply button to accept the changes or the Cancel button to discard them.
Click the Apply button to accept the changes or the Cancel button to discard them.
Descriptions
Port
Displays the port for which the DoS protection is defined.
DoS Protection
Select Enabled or Disabled for the DoS protection feature for the selected port.
Items
Descriptions
Telnet Service
Select whether the Telnet service is Enabled or Disabled. It is enabled by default.
Session Timeout
Enter the amount of time that elapses before the Telnet service is timed out. The default is 5 minutes. The range is from 0 to 65535 minutes.
History Count
Enter the entry number for history of Telnet service. The default is 128. The range is from 0 to 256.
Password Retry Count
Enter the number of password requests send to Telnet service. The default is 3. The range is from 0 to 120.
Silent Time
Enter the silent time for Telnet service. The range is from 0 to 65535 seconds.
Items
Descriptions
SSH Service
Select whether the SSH service is Enabled or Disabled. It is disabled by default.
Session Timeout
Enter the amount of time that elapses before the SSH Service is timed out. The default is 5 minutes. The range is from 0-65535 minutes.
History Count
Enter the entry number for history of SSH service. The default is 128. The range is from 0 to 256.
Password Retry Count
Enter the number of password requests send to SSH service. The default is 3. The range is from 0 to 120.
Silent Time
Enter the silent time for SSH service. The range is from 0 to 65535 seconds.
Items
Descriptions
Session Timeout
Enter the amount of time that elapses before Console service is timed out. The default is 5 minutes. The range is from 0 to 65535 minutes.
History Count
Enter the entry number for the history of Console service. The default is 128. The range is from 0 to 256.
Password Retry Count
Enter the number of password requests to send to the Console service. The default is 3. The range is from 0 to 120.
Silent Time
Enter the silent time for Console service. The range is from 0 to 65535 seconds.
Items
Descriptions
Index
Enter the entry number for event.
Event Type
Select the event type.
Log: The event is a log entry.
SNMP Trap: The event is a trap.
Log & Trap: The event is both a log entry and a trap.
Community
Enter the community to which the event belongs.
Description
Displays the number of good broadcast packets received on the interface.
Last Time Sent
Displays the time that event occurred.
Owner
Enter the switch that defined the event.
Index
Enter the entry number for the Alarm List.
Sample Port
Select the port from which the alarm samples were taken.
Sample Variable
Select the variable of samples for the specified alarm sample.
Sample Interval
Enter the alarm interval time.
Sample Type
Select the sampling method for the selected variable and compare the value against the thresholds.
Absolute: Compares the values with the thresholds at the end of the sampling interval.
Delta: Subtracts the last sampled value from the current value.
Rising Threshold
Enter the rising number that triggers the rising threshold alarm.
Falling Threshold
Enter the falling number that triggers the falling threshold alarm.
Rising Event
Enter the event number by the falling alarms are reported.
Falling Event
Enter the event number by the falling alarms are reported.
Owner
Enter the switch that defined the alarm.
Index
Enter the entry number for the History List.
Sample Port
Select the port from which the history samples were taken.
Bucket Requested
Enter the number of samples to be saved. The range is from 1 to 50.
Interval
Enter the time that samples are taken from the ports. The field range is from 1 to 3600.
Owner
Enter the RMON user that requested the RMON information. The range is from 0 to 32 characters.
Items
Descriptions
Port
Indicates the specific port for which RMON statistics are displayed.
Drop Events
Displays the number of dropped events that have occurred on the port.
Octets
Displays the number of octets received on the port.
Pkts
Displays the number of packets received on the port.
Broadcast Pkts
Displays the number of good broadcast packets received on the port. This number does not include multicast packets.
Multicast Pkts
Displays the number of good multicast packets received on the port.
CRC & Align Errors
Displays the number of CRC and Align errors that have occurred on the port.
Undersize Pkts
Displays the number of undersized packets (less than 64 octets) received on the port.
Oversize Pkts
Displays the number of oversized packets (over 1518 octets) received on the port.
Fragments
Displays the number of fragments received on the port.
Jabbers
Displays the total number of received packets that were longer than 1518 octets.
Collisions
Displays the number of collisions received on the port.
Pkts of 64 Octets
Displays the number of 64-byte frames received on the port.
Pkts of 65 to 127 Octets
Displays the number of 65- to 127-byte packets received on the port.
Pkts of 128 to 255 Octets
Displays the number of 128- to 255-byte packets received on the port.
Pkts of 256 to 511 Octets
Displays the number of 256- to 511-byte packets received on the port.
Pkts of 512 to 1023 Octets
Displays the number of 512- to 1023-byte packets received on the port.
Pkts of 1024 to 1518 Octets
Displays the number of 1024- to 1518-byte packets received on port.
Port
Displays the port for which the port security is defined.
State
Select Enabled or Disabled for the port security feature for the selected port.
Max MAC Address
Enter the maximum number of MAC addresses that can be learned on the port. The range is from 1 to 256.
Items
Descriptions
Port
Displays the port for which statistics are displayed.
RXByte
Displays the number of all packets received on the port.
RXUcast
Displays the number of unicast packets received on the port.
RXNUcast
Displays the number of unicast packets received on the port.
RXDiscard
Displays the number of received packets discarded on the port.
TXByte
Displays the number of all packets transmitted on the port.
TXUcast
Displays the number of unicast packets transmitted on port.
TXNUcast
Displays the number of unicast packets transmitted on the port.
TXDiscard
Displays the number of transmitted packets discarded on the port.
RXMcast
Displays the number of multicast packets received on the port.
RXBcast
Displays the number of broadcast packets received on the port.
TXMcast
Displays the number of multicast packets transmitted on the port.
TXBcast
Displays the number of broadcast packets transmitted on the port.
Items
Descriptions
HTTP Service
Select whether HTTP service for the switch is Enabled or Disabled. This is enabled by default.
HTTP Session Timeout
Enter the amount of time that elapses before HTTP is timed out. The default is 5 minutes. The range is from 0 to 86400 minutes.
HTTPS Service
Select whether the HTTP service is Enabled or Disabled. This is disabled by default.
HTTPS Session Timeout
Enter the amount of time that elapses before HTTPS is timed out. The default is 5 minutes. The range is from 0 to 86400 minutes.
Send a ping request to a specified IPv6 address. Check whether the switch can communicate with a particular network host before testing.
You can vary the test parameters by entering the data in the appropriate boxes. To verify accuracy of the test, it is recommended that you run multiple tests in case of a test fault or user error.
Click Test to perform the ping test.
The Syslog protocol allows devices to send event notification messages in response to events, faults, or errors occurring on the platform as well as changes in configuration or other occurrences across an IP network to syslog servers. It then collects the event messages, providing powerful support for users to monitor network operations and diagnose malfunctions. A Syslog-enabled device can generate a syslog message and send it to a Syslog server.
Syslog is defined in RFC 3164. The RFC defines the packet format, content, and system log related information of Syslog messages. Each Syslog message has a facility and severity level. The Syslog facility identifies a file in the Syslog server. Refer to the documentation of your Syslog program for details. The following table describes the Syslog severity levels.
From here, you can Enable or Disable the log settings for the switch.
Click Apply to update the system settings.
The System Log is designed to monitor the operation of the switch by recording the event messages it generates during normal operation. These events may provide vital information about system activity that can help in the identification and solutions of system problems.
The switch supports log output in two directions: Flash and RAM. The information stored in the system's RAM log will be lost after the switch is rebooted or powered off, whereas the information stored in the system's flash will be kept effective even if the switch is rebooted or powered off. The log has a fixed capacity; at a certain level, the EWS switch will start deleting the oldest entries to make room for the newest.
The internal log of the EWS switch has a fixed capacity; at a certain level, the EWS switch will start deleting the oldest entries to make room for the newest. If you want a permanent record of all logging activities, you can set up your syslog server to receive log content from the EWS switch. Use this page to direct all logging to the syslog server. Click the Add button, define your syslog server, and select the severity level of events you wish to log.
This page displays the most recent records in the switch's internal log. Log entries are listed in reverse chronological order (with the latest logs at the top of the list). Click a column header to sort the content by that category.
RAM: The information stored in the system’s RAM log will be lost after the switch is rebooted or powered off.
Flash: The information stored in the system’s Flash will be kept effective even if the switch is rebooted or powered off.
Controller: Display controller related logs.
Switch: Display switch related logs.
Wireless Client: Display wireless client related logs.
All: Display all above types of logs .
Click the Export button to export the current buffered log to a .txt file.
Click the Clear button to clear the buffered log in the system's memory.
Cable Diagnostics helps you detect whether your cable has connectivity problems and provides information about where errors have occurred in the cable. The tests use Time Domain Reflectometry (TDR) technology to test the quality of a copper cable attached to a port. TDR detects a cable fault by sending a signal through the cable and reading the signal that is reflected back. All or part of the signal is reflected back either by cable defects or by the end of the cable when an issue is present. Cables are tested when the ports are in the down state, with the exception of the cable length test.
To verify accuracy of the test, it is recommended that you run multiple tests in case of test fault or user error.
Click Test to perform the cable tests for the selected port.
The Packet Internet Groper (Ping) Test allows you to verify connectivity to remote hosts. The ping test operates by sending Internet Control Message Protocol (ICMP) request packets to the tested host and waits for an ICMP response. In the process it measures the time from transmission to reception and records any packet loss. Send a ping request to a specified IPv4 address. Check whether the switch can communicate with a particular network host before testing.
You can vary the test parameters by entering the data in the appropriate boxes. To verify accuracy of the test, it is recommended that you run multiple tests in case of a test fault or user error.
Cable Diagnostics helps you detect whether your cable has connectivity problems and provides information about where errors have occurred in the cable. The tests use Time Domain Reflectometry (TDR) technology to test the quality of a copper cable attached to a port. TDR detects a cable fault by sending a signal through the cable and reading the signal that is reflected back. All or part of the signal is reflected back either by cable defects or by the end of the cable when an issue is present. Cables are tested when the ports are in the down state, with the exception of the cable length test.
To verify accuracy of the test, it is recommended that you run multiple tests in case of test fault or user error.
Click Test to perform the cable tests for the selected port.
Click Test to perform the ping test.
Click the Apply button to accept the changes or the Cancel button to discard them.
Click the Apply button to accept the changes or the Cancel button to discard them.
Items
Descriptions
IP Address
Enter the IP address or the host name of the station you want the switch to ping to.
Count
Enter the number of pings to send. The range is from 1 to 5 and the default is 4.
Interval
Enter the number of seconds between pings sent. The range is from 1 to 5 and the default is 1.
Size
Enter the size of ping packet to send. The range is from 8 to 5120 and the default is 56.
Result
Displays the ping test results.
Items
Descriptions
IP Address
Enter the IPv6 address or the host name of the station you want the switch to ping to.
Count
Enter the number of pings to send. The range is from 1 to 5 and the default is 4.
Interval
Enter the number of seconds between pings sent. The range is from 1 to 5 and the default is 1.
Size
Enter the size of ping packet to send. The range is from 8 to 5120 and the default is 56.
Result
Displays the ping test results.
Code
Severity
Description
General Description
0
EMERG
System is unusable.
A "panic" condition usually affecting multiple apps/servers/sites. At this level, all tech staff on call would be notified.
1
ALERT
Action must be taken immediately.
Should be corrected immediately. Therefore, notify staff who can fix the problem. An example would be the loss of a primary ISP connection.
2
CRIT
Critical conditions.
Should be corrected immediately but indicates failure in a secondary system; an example is a loss of a backup ISP connection.
3
ERROR
Error conditions.
Non-urgent failures, which should be relayed to developers or admins; each item must be resolved within a given time.
4
WARNING
Warning conditions.
Warning messages, not an error, but indication that an error will occur if action is not taken (e.g. file system 85% full). Each item must be resolved within a given time.
5
NOTICE
Normal but significant condition.
Events that are unusual but not error conditions - might be summarized in an email to developers or admins to spot potential problems - no immediate action required.
6
INFO
Informational messages
Normal operational messages - may be harvested for reporting, measuring throughput, etc. - no action required.