Home

88 PPoorrttss VVDDSSLL22 MMaannaaggeedd IIPP

image

Contents

1. Port Settings Bits per second Y Data bits 8 i Parity None i Stop bits 1 v Flow control None v Restore Defaults 1 Set Bits per second at 115200 to the content window 2 Set Flow control at None 3 Connects PC with the IP DSLAM you will find login manual window on the screen then enter Login name admin password 123 a 1 ER We connect your business MENA 115200 RREH BRE REO RAO FUCO MED HAD Dae S 28 E Initializing switch functions SNMP files Hodules AC Completed Username admin Password _ 3848 00 03 39 ANSIW 115200 8 N 1 4 Setting IP Address by Console Port When you are going to login a switch through the web page you have to configure the IP address first The default IP address netmask default gateway of a switch is 192 168 16 249 255 255 255 0 192 168 16 1 without making any configuration changes in advance you can login a switch with default IP address as long as the default IP address can function properly in your network environment Otherwise you have to re configure the IP address subnet mask and default gateway The following show how to configure the IP address of a switch First login with the console port Username admin Password 123 Second you will now enter the IP Address then setup the IP address subnet mask and gateway Switch configure Switch config
2. 270 490 264 108 64 512 Apply 512 gt 5 JE E T e 512 CR ES 270 490 264 108 e 512 4 0 270 490 264 108 64 512 5 Io 270 490 264 108 64 512 6 a 270 490 264 108 64 512 30 EE 270 490 264 108 64 512 e a 270 490 264 108 64 512 Figure 5 6 1 DPBO ESEL E side Electrical Length DPBOESEL This configuration parameter defines the assumed electrical length of cables E side cables connecting exchange based DSL services to a remote flexibility point cabinet that may also host remotely located DSL that is subject to spectrally shaped downstream power backoff depending on this length For this parameter the electrical length is defined as the loss in dB of an equivalent length of hypothetical cable at a reference frequency defined by the network operator or in spectrum management regulations DPBOESEL shall be coded as an unsigned integer representing an electrical length from 0 dB to 255 dB The corresponding values line length to the damping in dB is about 10 dB per 500 m If DPBOESEL is zero the DPBO in this is disabled ESCMA ESCMB ESCMC E side Cable Model DPBOESCM This configuration parameter defines a cable model in terms of three scalars DPBOESCMA DPBOESCMB and DPBOESCMC that are used to estimate the frequency dependent loss of E side cables calculated from the DPBOESEL parameter using the formula ESCM f DPBOESCMA DPBOESCMB sart f DPBOESCMC f DPBOESCL Where ESCM is expressed in dB and f is ex
3. Disabled 2000000 2000000 Disabled Port3 2000000 Disabled Port4 200000 Forwarding 2000000 1 Disabled 2000000 1 2000000 1 2000000 Porto 2000000 PortiO 2000000 2000000 2000000 Disabled Porti3 2000000 Disabled Porti4 2000000 Disabled PortiS 2000000 1 Disabled e bc e e e C Disabled Disabled Disabled Porti6 2000000 1 Porti 2000000 1 Porti8 2000000 1 Porti9 2000000 Port20 2000000 Port21 2000000 Disabled Fig 4 3 4 2b MSTP system You can configure MSTP parameters then click Apply button to set the values Such as following screen Configure Spanning Tree Parameters Fig 4 3 4 2b MSTP system 96 a ER We connect your business You can select STP state item to enable MSTP If you want to disable MSTP please cancel the item Default value of STP sate is disabled You can select STP Debug item to output MSTP debug information If you want to disable the debug please cancel the item Default value of STP Debug is disabled STP protocol version item has two values for you to choose If you want the protocol version to be STP you can choose STP If you want the protocol version to be MSTP you can choose MSTP Default value of STP protocol version is MSTP Parameter Description You can change priority value A value used to identify the root bridge The bridge Priority with lowest v
4. The related parameters are shown in the following table ltems Option ae value Group ID 1 220 max 220 ACL group Permit Deny Action c Permit Permit packet cross switch Permit d Deny Drop packet Any VID VLAN a Any Any Vlan id Any b VID 1 4094 A certain vlan id IPv4 Non IPv4 Binding d IPv4 Set Ipv4 packet field Packet Type IPv4 e Non IPv4 Set non lpv4 packet field f Binding Set binding function Set this field if Packet Type is Non IPv4 else ignore Ether Type Any Any ARP 0x0806 IPX 0x8137 Set this field if Packet Type is Non IPv4 else ignore 0 OxFFFF Type ee If ether type not find in Ether Type field you can direct assign number Current List You create ACL and Binding groups 4 4 2 Binding Let device that has specific IP address and MAC address can use network We can set specific IP address MAC address VLAN id and port id to bind and device can cross switch if all conditions match Use binding function we should enable it first in following page 106 a ER We connect your business In Packet Type Binding box should select Binding 00 11 22 33 44 55 Uncheck v Fig 4 4 2 Binding The related parameters are shown in the following table Group ID 1 220 max 220 ACL group Permit Deny Action e Permit Permit packet cross switch Permit f Deny Drop packet Any VID
5. Several LED indicators for monitoring the device itself and the network status At a quick glance of the front panel the user would be knew if the product is receiving power if it is monitoring another IP DSLAM or other devices or if a problem exists on the network Provides two 1000Mbps auto sensing RJ 45 Ethernet ports and two GIGA Port GIGA Port supports RJ 45 or SFP Interface auto link function You can use RJ 45 interface or SFP Interface Figure ee Cem i corr 7 Cer Pm E POTS 14 a ER We connect your business GIGA port 9 10 port supports Hot Swappable function The status default in copper RJ45 if you want to change connect media to fiber you must plug in SFP fiber module 9x 10x port First make sure fiber to fiber connecting is ready and then the IP DSLAM will be sensing and link that in Fiber optic mode GIGA port RJ 45 and SFP can t use in the same time else that will be link in Copper mode default SFP Fiber Optics A gigabit interface converter SFP is a transceiver that converts electric currents digital highs and lows to optical signals and optical signals to digital electric currents The SFP is typically employed in fiber optic and Ethernet systems as an interface for high speed networking The data transfer rate is 1 25 gigabit per second SFP modules allow technicians to easily configure and upgrade electro optical communications networks The typical SFP transceiver is a plu
6. b Check Check IP fragment field Uncheck L4 Protocol Set this field if Packet Type is IPv4 else ignore Any ICMP 1 IGMP 2 TCP 6 UDP 17 Any Protocol Set this field if Packet Type is IPv4 else ignore 0 255 If protocol not find in L4 Protocol field you can direct 104 a f A We connect your business NA assign number Set this field if Packet Type is IPv4 else ignore TCP Any Any FTP 21 HTTP 80 Set this field if Packet Type is IPv4 else ignore 0 65535 If TCP port not find in TCP field you can direct Port assign number Set this field if Packet Type is IPv4 else ignore UDP f Any Any DHCP 67 TFTP 69 NetBios 137 Set this field if Packet Type is IPv4 else ignore 0 65535 SE If UDP port not find in UDP field you can direct assign number Port Id Source port id from 1 10 O means don t care 0 Current List You create ACL and Binding groups The octetcnt is octet number of the packets hiting the Count ACL rule 0 The packetcnt is the packet number Hiting the ACL rule 4 4 1 Non IPv4 In Packet Type Binding box should select Non IPv4 Action Permit v C QOS VoIP VLAN any Ovid 1 1n4094 ny means Vid 0 if uses binding Dany O 1P 0 0 0 0 Si Type 00 11 22 33 44 55 Mask 255 255 255 255 Fig 4 4 1 Non IPv4 105 a EA We connect your business
7. f Annex C_8K wl v43 iv 1 304 Annex C_8K V43 2 304 Annex C_8K V43 3 304 Annex C_8K v43 4 304 Annex C_8K V43 5 304 Annex C_8K V43 6 304 Annex C_8K 1443 7 304 Annex C_8K V43 8 304 Annex C_8K V43 Figure 5 1 1 VDSL2 Profile Configuration Profile 8d 17a Region all EU US APAC Bandwidth MHz 8 832 8 832 8 500 8 832 42 000 EN 17 664 30 000 Netsys Infineon Competitor A Competitor B Figure 5 1 2 Band Profile Region 118 a Be DI DV ep ER We connect your business Ya MNUDI The following shows the band profile and band plan compatibility Band Profile List Band Plan List 0 VDSL2 Profile8a 0 Annex A M1_EU32 1 VDSL2 Profile8b 1 Annex A M9_EU64 2 VDSL2 Profile8c 2 Annex A EU128 3 VDSL2 Profile8d 3 Annex B 997 M1c A 7 4 VDSL2 Profile12a 4 Annex B 997 M2x A 5 VDSL2 Profile12b 5 Annex B 997 M2x M 6 VDSL2 Profile17a 6 Annex B 998 M1x A 7 VDSL2 Profile30a 7 Annex B 998 M1x B 8 VDSL2 Profile17b 8 Annex B 998 M2x A 9 Annex B 998 M2x M 10 Annex B 998 M2x B 11 Annex B 998 M2x NUSO 12 Annex B 998e17 M2x NUSO 13 Annex B 998ADE17 M2x A 14 Annex B 998ADE30 M2x JUSO 15 AnnexC_ A 16 Annex C_M 17 Annex C_8K Note O Compatible X Not Compatible Figure 5 1 3 Band Profile Plan compatibility 119 a ER We connect your business 5 2 Channel Config The page to configure VDSL2 Max Interleave Delay
8. Apply button to start the restore process Configuration Restore mr Restore Configuration TETP Backup Configuration Fig 4 2 7 0 HTTP Update 4 2 7 1 TFTP Backup Configuration Use this page to assign a TFTP server IP address and a filename to be stored Then press Apply button to start the backup process 77 a EA We connect your business Configuration Restore FTP Restore Configuration TFTP Backup Configuration 192 168 16 12 Fig 4 2 7 1 TFTP Backup Configuration 4 3 L2 Features This switch provides the following L2 features e VLAN Configuration e Trunking Port Aggregation e Forwarding amp Filtering e Spanning Tree STP e DHCP Relay amp Option 82 e LLDP optional 4 3 0 VLAN Configuration A Virtual LAN VLAN is a logical network grouping that limits the broadcast domain It allows you to isolate network traffic so only members of the VLAN receive traffic from the same VLAN members Basically creating a VLAN from a switch is logically equivalent of reconnecting a group of network devices to another Layer 2 switch However all the network devices are still plug into the same switch physically This switch supports port based 802 1Q tagged based or no VLAN in web management page In default 802 1Q VLAN is enabled for common and advanced operations e Static VLAN e GVRP VLAN e QinQ VLAN 78 a EA We connect your business 4 3 0 1 Static VLA
9. H eee a AE eg Ae D H D ee GE eebe WAT user port Multiplexer channel of VLAN 10 used by VLAN 100 200 300 32 a EA We connect your business QinQ Commands qing enable Enable QinQ no qinq Disable QinQ qing tpid lt TPIDVAL gt Set QinQ tpid Parameters lt TPIDVAL gt specifies QinQ tpid value Hex 1 FFFF qing userport lt enable disable gt lt LIST gt A port configured to support client end of QinQ tunnel is called a QinQ user port Use this command to enable disable QinQ userport to specified port s qing uplinkport lt enable disable gt lt LIST gt A port configured to support network end of QinQ tunnel is called a QinQ uplink port Use this command to enable disabel QinQ uplinkport to specified port s qing tunnel add lt 1 25 gt lt 1 4094 gt lt LIST gt Add QINQ tunnel Parameters lt 1 25 gt specifies the tunnel ID lt 1 4094 gt specifies the VLAN ID lt LIST gt specifies the ports to be set to QINQ tunnel qing tunnel delete lt 1 25 gt Delete QinQ tunnel Parameters lt 1 25 gt specifies the tunnel ID show qinq configuration Show QinQ global and portal configuration show qinq tunnel Show QinQ tunnel information 33 a ER We connect your business For example refer to the figure of QinQ application in previous page a QinQ tunnel using VLAN10 wants to be created for Sales VLAN100 across the public network Port1 on left side switch connects to S
10. VLAN e Any Any Vlan id Any f VID 1 4094 A certain vlan id IPv4 Non IPv4 Binding g IPv4 Set Ipv4 packet field Packet Type IPv4 h Non IPv4 Set non lpv4 packet field i Binding Set binding function RRA RK kk kk kk Mac address is represent a digit from 0 9 and A F 00 11 22 33 44 55 is range from O to FF kkk kkk kkk KKK IP address is represent a digit from 0 9 0 0 0 0 is range from O to 255 Port Id Source port id from 1 10 1 Current List You create ACL and Binding groups 4 4 3 QoS VoIP QoS VoIP option in Action field is to provide ingress VoIP packets can be forwarded out with higher priority through the ACL function 107 a ER We connect your business QoS VoIP option in Action field is to provide ingress VoIP packets can be forwarded out with higher priority through the ACL function In Action box select the QoS VoIP checkbox to make QoS VoIP parameter area available to configure Action Permit QOS VoIP VLAN Any OVID 1 1 4094 4ny means Vid 0 if uses binding Fig 4 4 3 QoS VoIP QoS VoIP Parameter Option Default value Priority 0 7 7 PortID 0 1F 0 PortlD Mask 0 1F 0 Protocol 0 FF 0 Protocol Mask 0 FF 0 Source Port 0 FFFF 0 Source Port Mask 0 FFFF 0 Destination Port 0 FFFF 0 Destination Port Mask 0 FFFF 0 All parameters with HEX format provide settings in continuous rang
11. dhcp router 18 dhcp relay enable 10 0 0 1 12 4 0 4 6 LLDP Link Layer Discovery Protocol LLDP operates on data link layer It stores and maintains the information about the local device and the devices directly connected to it for network administrators to manage networks through NMS network management systems In LLDP device information is encapsulated in LLDP PDUs in the form of TLV meaning type length and value triplets and is exchanged between directly connected devices Information in LLDP PDUs received is restored in its MIB NOTE Currently the LLDP neighbor s can be seen through the console only SNMP browser will be supported in the future LLDP Operation Mode LLDP can operate in one of the following modes TxRx mode A port in this mode sends and receives LLDP PDUs Tx mode A port in this mode only sends LLDP PDUs Rx mode A port in this mode only receives LLDP PDUs 54 a EA We connect your business Disable mode A port in this mode does not send or receive LLDP PDUs LLDP is initialized when an LLDP enabled port changes to operate in another LLDP operating mode To prevent LLDP from being initialized too frequently LLDP undergoes a period before being initialized on an LLDP enabled port when the port changes to operate in another LLDP operating mode The period is known as initialization delay which is determined by the re initialization delay timer Sending LLDP PDUs A LLDP enabled device operating in
12. ip address 192 168 1 1 255 255 255 0 Switch config ip default gateway 192 168 1 254 19 a Ku DN EA We connect your business y MUDI R 4 0 1 Operation Notice To enter the configuration mode you need to be in the privileged mode and then type the command configure Switch configure Switch config 4 0 1 0 Command Line Editing The following generic function keys provide functions in all of the menus Keys Function lt Ctrl gt B lt Moves the cursor back one character lt Ctrl gt D Deletes the character at the cursor lt Ctrl gt E Jumps to the end of the current command line lt Ctrl gt F gt Moves the cursor forward one character lt Ctrl gt K Deletes from the cursor to the end of the command line lt Ctrl gt N 4 Enters the next command line in the command history lt Ctrl gt P t Enters the previous command line in the command history lt Ctrl gt U Deletes from the cursor to the beginning of the command line lt Ctrl gt W Deletes the last word typed lt Esc gt B Moves the cursor backward one word lt Esc gt D Deletes from the cursor to the end of the word lt Esc gt F Moves the cursor forward one word lt Backspace gt Delete the character before the cursor lt Del gt Delete the character at the cursor 4 0 1 1 Command Help You may enter at any command mode and the CLI will return possible commands at that point along wi
13. Disable E Pont d e Apply al 24 61 0 Disable Disable Disable 2 7 24 61 o bo 7 31 5 e 5 to Disable Disable Disable 3 0 00 24 61 0 00 14 81 0 00 0 00 a Disable Disable Disable 4 0 00 24 61 0 00 14 81 0 00 0 00 0 0 Disable Disable Disable 5 0 00 24 61 0 00 14 81 0 00 0 00 0 0 Disable Disable Disable 6 D 00 24 61 0 00 14 81 0 00 0 00 0 0 Disable Disable Disable 7 0 00 24 61 0 00 14 81 0 00 0 00 0 0 Disable Disable Disable 8 0 00 24 61 0 00 14 81 0 00 0 00 0 0 Disable Disable Disable Figure 5 7 UPBO Param A Param B A UPBOPSD defined for each band shall consist of two parameters a b Parameter a ranges from 0 dBm Hz to 40 95 dBm Hz in steps of 0 01 dBm Hz and parameter b ranges from 0 to 40 95 dBm Hz in steps of 0 01 dBm Hz ESEL This parameter defines the electrical loop length expressed in dB at 1MHz KO configured by the CO MIB The value shall be coded as an unsigned 16 bit number in the range 0 coded as 0 to 128 dB coded as 1280 in steps of 0 1 dB The corresponding values line length to the damping in dB is about 10 dB per 500 m 123 a EA We connect your business KLF This parameter is a flag that forces the VDSL2 CPE to use the electrical length of the ESEL to compute the UPBO The value shall be forced if the flag is set to 1 Otherwise the VDSL2 Units shall determine the electrical length Boost Enable Boost Mode not part of G 997 1 If disabled the UPBO standard mode is used with the LOSS function calculated
14. The VLAN ranges required by different customers in the same service provider network might overlap and traffic of customers through the infrastructure might be mixed Assigning a unique range of VLAN IDs to each customer would restrict customer configurations and could easily exceed the VLAN limit 4096 of the IEEE 802 1Q specification Using the QinQ feature service providers can use a single VLAN to support customers who have multiple VLANs Customer VLAN IDs are preserved and traffic from different customers is segregated within the service provider network even when they appear to be in the same VLAN Using QinQ expands VLAN space by using a VLAN in VLAN hierarchy and retagging the tagged packets Virtual private networks VPNs provide enterprise scale connectivity on a shared infrastructure often Ethernet based with the same security prioritization reliability and manageability requirements of private networks QinQ is a feature designed for service providers who carry traffic of multiple customers across their networks and are required to maintain the VLAN and Layer 2 protocol configurations of each customer without impacting the traffic of other customers The following figure is an example of QinQ VLAN application Sales VLAN100 E Sales VLAN100 Sales QINQ tunnel user port TTT D I See EE SR EC EEN E Akte E D VLAN 10 Finance VLAN200 Finance VLAN200 userport R amp D VLAN300 R amp D VLAN300
15. 20 Note The parameters must enforce the following relationships 2 hello time 1 lt maximum age lt 2 forward delay 1 42 a ER We connect your business spanning tree priority lt 0 61440 gt Set spanning tree bridge priority of CIST and all MSTIs Parameters lt 0 61440 gt specifies the bridge priority The value must be in steps of 4096 Default value is 32768 spanning tree protocol version stp mstp Set spanning tree protocol version of CIST Parameters stp specifies the original spanning tree protocol STP 802 1d mstp specifies the multiple spanning tree protocol MSTP 802 1s spanning tree max hops lt 1 40 gt Set spanning tree bridge maximum hops of CIST and all MSTIS Parameters lt 1 40 gt specifies the bridge maximum hops Default value is 20 spanning tree name lt name string gt Set spanning tree bridge name of CIST Parameters lt name string gt specifies the bridge name Default name is null spanning tree revision lt 1 65535 gt Set spanning tree bridge revision of CIST Parameters lt 1 65535 gt specifies the bridge revision Default value is 0 spamning tree port path cost lt 1 200000000 gt lt port list gt Set spanning tree port path cost of CIST Parameters lt 1 200000000 gt specifies port path cost lt port list gt specifies the ports to be set Null means all ports spamning tree port priority lt 0 240 gt lt port list gt Set sp
16. 8000 gt lt port list gt specifies the ports to be set If not entered all ports are set port security lt on off gt lt port list gt Set port priority When port security is on the port will stop MAC address learning and forward only packets with MAC address in the static MAC address table Parameters lt port list gt specifies the ports to be set If not entered all ports are set port protected group lt 1 2 gt lt port list gt Set protected port group member Parameters lt port list gt specifies the group member ports port protected lt port list Set protected port list Parameters lt port list gt specifies the protected port list 22 a EA We connect your business port priority lt disable low high gt lt port list gt Set port priority Parameters lt port list gt specifies the ports to be set If not entered all ports are set port jumboframe lt enable disable gt lt port list gt Set port jumbo frame When port jumbo frame is enable the port forward jumbo frame packet Parameters lt port list gt specifies the ports to be set If not entered all ports are set port interval lt 0 3600 gt While flooding CPU port at the speed of 4MB s or larger system will close relative port And system will open this port using this interval value 0 represents system will never enable this after close it for flooding CPU show port status Show port status including port
17. Apply button to start the firmware update process 75 a w A We connect your business yy Firmware Update TFTP Firmware Update 192 168 16 12 image bin Fig 4 2 6 0 TFTP Update The firmware image will first update to the RAM area in system Hit the Update Firmware button to confirm to write to the system s flash memory Image download complete Would you make sure to update firmware Update Firmware When the whole process is completed system needs to be rebooted by pressing the reboot button to activate the new firmware Reboot Switch System 4 2 6 1 HTTP Update An alternative for firmware updating is using HTTP transfer Just like the file copy in Windows select the valid firmware image file to be uploaded to the switch and hit Submit to start the updating process This is easier than ordinary TFTP file transfer 76 a ER We connect your business HTTP Firmware Update Note Firmware update needs several minutes Please wait a while then manually refresh the webpage Fig 4 2 6 1 HTTP Update When the firmware image is completely uploaded system will automatically be rebooted 4 2 7 Configuration Backup Just like the firmware update this system also supports configuration backup restore through either TFTP or HTTP transfer 4 2 7 0 TFTP Restore Configuration Use this page to assign a TFTP server IP address and an existing configuration filename to be restored Then press
18. FFFF gt specifies the destination mask e g acl add 1 qosvoip 1711000000 60 a EA We connect your business 4 0 8 1 Non IPv4 ACL commands no acl lt group id gt and show acl lt group id gt commands are the same as in lpv4 ACL commands acl addledit lt 1 220 gt permit deny lt 0 4094 gt nonipv4 lt 0 65535 gt Add or edit ACL group for non Ipv4 Parameters addledit specifies the operation lt group id gt specifies the group id 1 220 permit deny specifies the action permit permit packet cross switch deny drop packet lt 0 4094 gt specifies the VLAN id 0 means don t care lt 0 65535 gt specifies the Ether Type 0 means don t care e g acl add 1 deny 0 nonipv4 2054 This ACL rule will drop all packets for ether type is 0x0806 and non IPv4 4 0 8 2 SIP SMAC Binding Source IP SIP Source MAC SMAC address binding is another type of ACL rule to provide secured access to the switch Only the traffic which matches all criteria of specified source IP address source MAC address VLAN ID and port number can be allowed to access to the switch This function is also called IP MAC lock bind Enable binding function no bind Disable binding function no bind lt group id gt Delete Binding group Parameters lt group id gt specifies the group id 1 220 e g no bind 1 show bind lt group id gt Show Binding group information Parameters lt group id gt specifies the grou
19. Front Pan el ua sinnii nia adi id SFP Fiber Optics LED Indications Rear Panel AC Power Socket 3 Installation Hardware Installation Pre Installation Requirements General Rules Connection Configuration 4 Management Configuration 4 0 In Band Management 4 0 1 Operation NoticCe lt cvitoorisiaicaia ici id lid lia 4 0 1 0 Command Line Editing 4 0 1 1 Command Help 4 0 2 System Commands 4 0 3 Switch Static Configuration corn ee ronca rra 4 0 3 0 Port Configuration and Status oooooconncccinnccncccononconocanono conan conan cnn nn nana annn 4 0 3 1 Trunk 4 0 3 1 0 TRUNKING Kei al ul EE 4 0 3 1 1 LACP Commands 4 0 3 2 VAN EEN 4 0 3 2 0 Virtual LANs 4 0 3 2 1 VLAN Mode coccion li id aiii 4 0 3 2 2 Advanced 802 10 VLAN Gettng nan ncnnar cn nn nc ranrnannnnrnnancn 4 0 3 2 3 ONES 4 0 3 3 Misc Configuration 4 0 3 4 Administration EE a EA We connect your business 4 0 3 4 0 Change Username PaSssword oooooococconnccccocccococcconoccconcccnoncn nan cnnann cnn nc rra narran cnn ar rana nnnm ns 4 0 3 4 1 IP Configuration crac crm 40 3 5 Port lee Le EE 4 0 3 6 Quality EE 4 0 3 6 0 QoS Configuration iitaatli tt title 4 0 3 6 1 Per Port Priority sc ooo iii da dia ii 4 0 3 7 MAC Address Table codi iia 4 0 3 8 MAC LIM usan Segen ae 4 0 4 Protocol Related Configuration nan n conc c ronca cananea nan 40 40 STP RSTP ai a ai a ae a eerste ada 4 0 4 1 MSTP oi aaa UNN ere 4 0 4 2 0 System OD
20. State Link Trunking VLAN Negotiation Speed Duplex Flow control Rate control Priority Security BSF control show port statistics lt port id gt Show port statistics including TxGoodPkt TxBadPkt RxGoodPkt RxBadPkt TxAbort Collision and DropPkt Parameters lt port id gt specifies the port to be shown show port protection Show protected port information 4 0 3 1 Trunk Trunk allows the switch to combine ports so that they function like a single high speed link It can be used to increase the bandwidth to some devices to provide a high speed link For example trunk is useful when making connections between switches or connecting servers to the switch Trunk can also provide a redundant link for fault tolerance If one link in the trunk failed the switch can balance the traffic among the remaining links 23 a EA We connect your business 4 ports are trunked Switch 4 ports x 100Mbps 400Mbps Switch 400Mbps LINK NOTE 1 The 10 100 Mbps port cannot be trunked with gigabit port port 9 10 2 All ports in the same trunk group will be treated as a single port If a trunk group exists the ports belonging to that trunk will be replaced by TRUNK in the VLAN configuration screen The following example configures port 9 10 as TRUNK 1 4 0 3 1 0 Trunking Commands show trunk Show trunking information trunk add lt trunk id gt lt lacp no lacp gt lt port list gt lt active port list gt Ad
21. according to 7 3 1 2 14 of G 997 1 Rev4 LOSS kI0 f kl0 sqrt f If enabled the LOSS function is calculated differently as LOSS kIO f kl0 sqrt f 10 log10 kl0 Check Enable check for UPBO support of the CPE not part of G 997 1 Enables Disables at the VTU_O a verification of the UPBO PSD received from the VTU_R to check if the VTU_R applies UPBO in the correct way If not no link is established and a corresponding failure code is reported to the host Note After any change to VDSL2 configure Line must be deactivated then activated once or reboot 5 8 VDSL2 Version Info The page show VDSL2 hardware firmware version VDSL2 Version Info 3 16 9 13 12 3 8 19 0 3 VINAX DFE_V2 2 2 7 4 3 Figure 5 8 1 Version Info 6 Applications The Switch provides segmented network architecture When a port is connected to an end node or to a device that breaks up the collision domain e g another switch bridge or router the attached device has access to the full bandwidth provided by that port Bridging Functions The Switch provides fully transparent bridging functions which automatically learn node addresses which are subsequently used to filter and forward all traffic based on the destination address When traffic passes between devices attached to the same shared collision domain those packets are filtered from the switch But when traffic must be passed between unique segments i e different ports on the switch a tem
22. and Target SNRM VDSL2 Channel Confi ma BH 000005585 D d Oh OS oO bi Go a i aa Figure 5 2 1 Channel Config 5 3 Channel Status The page to show VDSL2 Upstream Downstream Actual Data Rate and Actual Interleave VDSL2 Channel Status The following information provides a view of the current actual status of the unit 102400 102400 Pp ETA EE J Down Down Down z S z Down Down on OO bk wh Figure 5 3 1 Channel Status 120 a ER We connect your business 5 4 SNR Status This function provides SNR value for checking phone wiring quality VDSL2 Line Status The following information provides a view of the current status of the unit UP 7 70dB 7 00 dB 7 20 dB 10 20 dB 13 10 dB 15 90 dB Down Down Down Down Down Down Down 0 JO OO Ek oO bit Figure 5 4 1 SNR Status 5 5 Activate Deactivate This function is for Activate Deactivate VDSL2 port VDSL2 Port Activate Deactivate Activate Activate Activate Activate Activate Activate Activate Activate 1 2 3 4 5 6 7 8 Figure 5 5 1 Port Activate Deactivate 121 a EA We connect your business 5 6 DPBO The page to configure VDSL2 Downstream Power BackOff VDSL2 Downstream Power BackOff Config
23. as an 802 1p packet with that priority and will be put into a queue according to the 802 1p Priority setting 4 0 3 6 0 QoS Configuration QoS Mode First Come First Service The sequence of packets sent is depending on arrive orders All High before Low The high priority packets sent before low priority packets WRR Weighted Round Robin Select the preference given to packets in the switch s high priority queue These options represent the number of higher priority packets sent before one lower priority packet is sent For example 8 Highest 4 second high means that the switch sends 8 highest priority packets before sending 4 second high priority packets Qos Level 0 7 priority level can map to highest second high second low lowest queue Commands qos priority lt first come first service all high before low weighted round robin gt lt highest weight gt lt sechighweight gt lt sec low weighi gt lt lowest weight gt Set 802 1p priority e g gos priority weighted round robin 8 4 2 1 qos level lt highest second high second low lowest gt lt evel list gt Set priority levels to highest second high second low and lowest Parameters lt level list gt specifies the priority levels to be high or low Level must be between 1 and 7 e g qos level highest 7 e g qos level lowest 4 37 a EA We connect your business show qos Show QoS configurations including 802 1p priority priority le
24. at a different time 2 WEB Login does not have user login limitation When you want to end console port configuration you must log out to leave Otherwise you can t log in by Telnet 2 Network control by WEB 1 It provide a WEB browser to manage and monitor the switch that default values are as followings If you need change IP address in first time you can use console mode to modify it Default IP Address 192 168 16 249 Subnet Mask 255 255 255 0 Default Gateway 192 168 16 1 User Name admin Password 123 62 a EA We connect your business 2 You can browse http 192 168 16 249 type user name and password as above Enter Network Password Ka gt Please type your username and password Site 192 168 223 100 Realm index htm User Name k en Password E F Save this password in your password list zen This is the Web Management Home Overview 4 2 Administration There are many management functions can be set or performed if you expand the submenus of Administrator in MENU area These functions are e IP address Setting e Switch Settings e Console Port information e Port Controls e SNMP Configuration e Security Manager e 802 1x Configuration e Quality of Service QoS e Syslog Setting e Firmware Update e Configuration Backup 4 2 0 IP Address Setting User can see and modify the IP address subnet mask and default gateway in this page then clicks Apply button t
25. delivers remote intuitive management of the switch and connected NIC devices through a single IP address The 24 2G Intelligent Ethernet Switch are easy to configured and deployed and offering a compelling option in terms of cost performance scalability and services compared to traditional repeater HUB solutions 2 Dual Media for Flexible Fiber Connection Dual media port 25 and 26 are provided for flexible fiber copper auto link connection You can select to install optional transceiver modules in these slots for short medium or long distance fiber backbone attachment Use of the SFP will auto disable their corresponding built in 10 100 1000Base T connections DHCP Client Dynamic Host Configuration Protocol DHCP for auto configuration management IP TFTP Protocol Trivial File Transfer Protocol TFTP for new version firmware remote upgraded eo Firmware upgrade support HTTP TFTP protocol o Scalability Up to 100 Mbps symmetric performance over single pair wiring for VDSL2 Channel port aggregation o Interleave delay time To prevent the transmission against burst errors Noise Margins SNRM In electrical engineering noise margin is the amount by which a signal exceeds the minimum amount for proper operation VS 840S default value is 6db for telecom standard o Upstream Power back of UPBO helps to run services over loops with different length co located in the same cable binder mixed length deployments especial
26. designed for service providers who carry traffic of multiple customers across their networks and are required to maintain the VLAN and Layer 2 protocol configurations of each customer without impacting the traffic of other customers When you configure QinQ tunnel you assign the QinQ user port and uplink port to a VLAN ID that is dedicated to QinQ tunnel To add QinQ tunnel you first select QinQ Tunnel ID then fill VLAN ID QinQ dedicated to QinQ tunnel and select user port and uplink port to be added to QinQ tunnel QinQ Configuration Gino PortSetting ven Porto Poti A Remove gt QinQ Tunnel Setting 4 3 2 Trunking The Link Aggregation Control Protocol LACP provides a standardized means for exchanging information between Partner Systems on a link to allow their Link Aggregation Control instances to reach agreement on the identity of the Link Aggregation Group to which the link belongs move the link to that Link Aggregation Group and enable its transmission and reception functions in an orderly manner In conclusion Link aggregation lets you group up to eight consecutive ports into a single dedicated connection This feature can expand bandwidth to a device on the network LACP operation requires full duplex mode more detail information refers to IEEE 802 3ad 85 a EA We connect your business 4 3 2 0 Aggregator Setting Trunking Aggregator Setting Aggregator information State Activity O 32768 Gro
27. disable IGMP snooping querier no igmp CrossVLAN Enable disable IGMP snooping CrossVLAN no igmp debug Enable disable IGMP snooping debugging output show igmp lt status router groups table gt Show IGMP snooping information Parameters status specifies IGMP snooping status and statistics information router specifies IGMP snooping router s IP address groups specifies IGMP snooping multicast group list table specifies IGMP snooping IP multicast table entries igmp clear_statistics Clear IGMP snooping statistics counters 4 0 4 4 802 1x This switch supports IEEE 802 1x standard which provides port based access control by validating end user s authorization through authentication RADIUS server EAP MD5 TLS PEAP authentication types are supported for this switch no dot1x Enable or disable 802 1x 50 a EA We connect your business radius server host lt ip addr gt lt 1024 65535 gt lt 1024 65535 gt Set radius server IP port number and accounting port number Parameters lt ip addr gt specifies server s IP address 1st lt 1024 65535 gt specifies the server port number 2nd lt 1024 65535 gt specifies the accounting port number radius server key lt key str gt Set 802 1x shared key Parameters lt key str gt specifies shared key string radius server nas lt id str gt Set 802 1x NAS identifier Parameters lt id str gt specifies NAS identifier string show radi
28. none Auth Key Specifies the authentication key 8 32 chars Private Key Specifies the encrypt key 8 32 chars V3 usm user none SNMP User Name Input user name Auth Type none vw Auth Key 8 32 Input auth key Private Key 8 32 Input priv key Fig 4 2 4 6 SNMPv3 USM User 4 2 5 Syslog This system supports syslog sent to a remote syslog server Currently system will do syslog for 3 events cold start warm start and link change In this page user needs to setup the following parameters to activate the syslog Syslog server IP The IP address of remote syslog server Log level None Major All Then click Apply button to activate the syslog function 74 a Q e We connect your business Syslog Setting Fig 4 2 5 Syslog The following example figure shows the syslog server application e g Tftpd32 exe got the messages from switch which link status is changed on port13 Cisco TFTP Server 192 168 16 12 D Firmware N 600 TE FINAX D A TV Enable logging Log filename C Program Files Cisco Systems Cisco TFTP Server Log Browse Maximum log file size KB 20 TFTP server root directory D Finnware NS 2024E Browse ow 4 2 6 Firmware Update This system supports firmware update through two different ways TFTP and HTTP 4 2 6 0TFTP Update Use this page to assign a TFTP server IP address and an existing firmware image file Then press
29. of space at the front and back for ventilation e Place the IP DSLAM out of direct sunlight and away from heat sources or areas with a high amount of electromagnetic interference e Check if network cables and connectors needed for installation are available General Rules Before making any connections to the IP DSLAM note the following rules Ethernet Port RJ 45 e All network connections to the IP DSLAM Ethernet port must be made using Category 5 UTP for 100Mbps and Category 3 4 UTP for 10Mbps e No more than 100 meters about 328 feet of cabling may be used between the IP DSLAM and an end node Connection Configuration The IP DSLAM has 8 100 Mbps VDSL2 ports And 2 Giga Ethernet ports which support connection to 10 100 1000 Ethernet Support full or half duplex operation and Auto MDI MDIX The transmission mode is using auto negotiation Therefore the devices attached to these ports must support auto negotiation unless they will always operate at half duplex If transmissions must run at full duplex but the attached device does not support auto negotiation then you should upgrade this device to a newer version that supports auto negotiation Use any of the 9 10 ports to connect to devices such as a workstation server bridge or router You can also cascade to another compatible IP DSLAM or hub by connecting an MDI or MDIX port 1 You can connect an 9 10 station port on the IP DSLAM to any device that uses a standard network interface
30. set auto negotiation mode is Auto Nway specify the speed duplex on this port and enable auto negotiation Force of per port Speed User can set 100Mbps or 10Mbps speed on Port1 Port24 User can set 1000Mbps 100Mbps or 10Mbps speed on Port25 Port26 depend on module card mode Duplex User can set full duplex or half duplex mode of per port Flows control Full User can set flow control function is enable or disable in full mode Half User can set backpressure is enable or disable in half mode Rate Control port1 port 24 supports by port ingress and egress rate control For example assume port 1 is 10Mbps users can set its effective egress rate at 1Mbps and ingress rate at 500Kbps Device will perform flow control or backpressure to confine the ingress rate to meet the specified rate Ingress Type the port effective ingress rate The valid range is 0 8000 The unit is 128Kbps 0 disable rate control 1 8000 valid rate value Egress Type the port effective egress rate The valid range is 0 8000 The unit is 128Kbps 0 disable rate control 1 8000 valid rate value Port Security A port in security mode will be locked without permission of address learning Only the incoming packets with SMAC already existing in the address table can be forwarded normally User can disable the port from learning any new MAC addresses then use the static MAC addresses screen to define a list of MAC addresses that can u
31. set to VLAN members 2nd lt LIST gt specifies the ports to be set to tagged members If not entered all members set to untagged e g vlan add 1 van cpu port 1 4 This VLAN entry has four members from port1 to port4 and all members are untagged no vian lt 1 4094 gt Delete VLAN entry Parameters lt 1 4094 gt specifies the VLAN id or group id if port based VLAN e g no vian 1 show vlan lt 1 4094 gt Show VLAN entry information Parameters lt 1 4094 gt specifies the VLAN id null means all valid entries e g show vian 1 29 a EA We connect your business show vlan static Show static VLAN entry information vlan pvid lt LIST gt lt 1 4094 gt Set port default VLAN id Parameters lt LIST gt specifies the ports to be set lt 1 4094 gt specifies the port VLAN id show vlan pvid lt LIST gt Show port default VLAN id Parameters lt LIST gt specifies the ports to be showed If not entered all port s PVID will be showed vian filter lt enable disable gt lt enable disable gt lt LIST gt Set ingress filter rules Parameters 1st lt enable disable gt specifies the non members packet will be forwarded or not If set enable forward only packets with VID matching this port s configured VID 2nd lt enable disable gt specifies the untagged frame will be dropped or not If set enable drop untagged frame lt LIST gt specifies the port or trunk list eg 3 6 8 Trk2
32. show vlan filter lt LIST gt Show VLAN filter setting Parameters lt LIST gt specifies the ports to be showed If not entered all ports filter rules will be showed GVRP Commands no gvrp Enable or disable GVRP show gvrp status Show GVRP enable or disable status 30 a EA We connect your business no port gvrp lt LIST gt Enable or disable GVRP by port Parameters lt LIST gt specifies the port or trunk list to be set show port gvrp Show GVRP status by port garp timer lt join leave leave all gt lt 0 65535 gt Set GARP timer Parameters lt join leave leave all gt specifies a timer Join Leave or Leave All to be set lt 0 65535 gt specifies the timer in seconds show garp timer Show GARP timer show gvrp db Show GVRP DB show gvrp gip Show GVRP GIP show gvrp machine Show GVRP machine clear gvrp statistics lt LIST gt Clear GVRP statistics by port Parameters lt LIST gt specifies the port or trunk list to be set show gvrp statistics lt LIST gt Show GVRP statistics by port Parameters lt LIST gt specifies the port or trunk list to be set no gvrp debug lt sys err pdu db gen garp gvrp vlan gt Enable disable GVRP debugging output 31 a EA We connect your business 4 0 3 2 3 QinQ VLAN Setting Business customers of service providers often have specific requirements for VLAN IDs and the number of VLANs to be supported
33. the TxRx mode or Tx mode sends LLDP PDUs to its directly connected devices periodically lt also sends LLDP PDUs when the local configuration changes to inform the neighboring devices of the change timely In any of the two cases an interval exists between two successive operations of sending LLDP PDUs This prevents the network from being overwhelmed by LLDP PDUs even if the LLDP operating mode changes frequently To enable the neighboring devices to be informed of the existence of a device or an LLDP operating mode change from the disable mode to TxRx mode or from the Rx mode to Tx mode timely a device can invoke the fast sending mechanism In this case the interval to send LLDP PDUs changes to one second After the device sends specific number of LLDP PDUs the interval restores to the normal A neighbor is discovered when a device receives an LLDPDU and no information about the sender is locally available Receiving LLDP PDUs An LLDP enabled device operating in the TxRx mode or Rx mode validates the TLVs carried in the LLDP PDUs which receive and store the valid neighboring information An LLDP PDU also carries a TTL time to live setting with it The information about a neighboring device maintained locally ages out when the corresponding TTL expires The TTL of the information about a neighboring device is determined by the following expression TTL LLDP hold time x LLDP PDU sending interval hello time You can set the TTL by configuri
34. the preceding diagnoses contact your dealer for assistance Installation no need for driver Use a computer notebook to do the installation Connect with the RS232 port of the switch with the notebook Remote Network Control by Telnet and Web 128 a ER We connect your business FCC Warning This equipment has been tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instruction manual may cause harmful interference to radio communications Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense CE Mark Warning This is a CE class A product In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures Warranty The original owner that the product delivered in this package will be free from defects in material and workmanship for one year parts after purchase There will be a minimal charge to replace consumable components such as fuses power transformers and mechanical cooling devices The warranty will not
35. 0 3 4 0 Change Username Password hostname lt name str gt Set switch name lt name str gt specifies the switch name If you would like to have spaces within the name use quotes around the name no hostname Reset the switch name to factory default setting no password lt manager operator all gt Set or remove username and password for manager or operator The manager username and password is also used by the web UI 4 0 3 4 1 IP Configuration User can configure the IP setting and fill in the new value ip address lt ip addr gt lt ip mask gt Set IP address and subnet mask ip default gateway lt ip addr gt Set the default gateway IP address show ip Show IP address subnet mask and the default gateway show info Show basic information including system info MAC address and firmware version dhcp Set switch as dhcp client it can get ip from dhcp server NOTE If this command is set the switch will reboot show dhcp show dhcp enable disable 35 EA We connect your business e MNUDI 4 0 3 5 Port Mirroring Port monitoring is a feature to redirect the traffic occurred on every port to a designated monitoring port on the switch With this feature the network administrator can monitor and analyze the traffic on the entire LAN segment In NV802S you can specify one port to be the monitoring port and any single port to be the monitored port You also can specify the direction of the traffi
36. 2 1 2 Mod le Joe ee 00d ii a ia is eae sins 4 2 1 3 MISC CONFIG EE 4 2 2 Console Port InformatiON i0icociiiai it diag 4 23 POrt CONTIQUEA ION EE 4 2 3 0 Port CONTTO S ic cocinan iii ir da o abad lease lida 4 2 31 Port SOMO coil dit id 4 2 3 2 Protected Pont iio A Se es deh A ee ee 4 2 4 SNMP CoOntiQuination EE 4 2 4 0 System OPTIONS ccoo ended Altai ene dd a apse da ee der 4 2 4 1 COMMUNITY SUP GS iid ec RW NEE TE 4 243 SNMPVS TT DEEN 4 2 4 4 SNMPV3 View dese eee cdhccneessdneliceastetneshibscheazacdadeaacesluecdvbeleeesttdsatesivalsecdeddbeendbaed eebbicnen EE eege 4 2 4 5 SNMPV3 ACCESS preria ai a R a Ea E aaa a a 4 2 4 6 SNMPvy3 USM User onirin a ee sd ee eee ee deste sek ade d i PESTE oyo EE 4 2 6 01 FTP Update iris ccoo ia Dd aaa aa aaae dd aaa 4 2 6 1 HTTP Update ccoo ilatina ii 4 2 7 Configuration Backup cuca A died 4 2 7 0 TFTP Restore ContiguratioN W eiitociodstad tdci 4 2 7 1 TFTP Backup Configuration ooonoocinncnninnccnncccnoncconocnnonoccnnncn non rana rra 4 3 L2 ECOS ii 4 3 0 VLAN Be e UE RE 4 3 0 1 Static VLAN cocina ill dE ENEE ENEE 4 3 0 0 0 Port Based VLAN coincida eeh ENER Ree ceeding al EENEG 4 3 0 0 1 30210 VLAN ET 45371 0 GVRP VEAN ici ii A ae inal a 453 1 0 0 RE TE du EE 4 3 1 1 1 GVRP Table check 2010 10 cece ceeeeeeeeeeeeecaeesaeecaaecaaecaaecaeseaeeeaeeseeseaeseeesereeeneeee 4 3 1 2 QMQ VLAN EEN CR Be Vie Port Setting oinnia A bi 4 3 1 2 1 Qin MOIE ul DEE RER
37. 3 each with a list of hosts and or networks permitted to use the service Both individual servers as well as routers can have network ACLs Access control lists can generally be configured to control both inbound and outbound traffic and in this context they are similar to firewalls Like Firewalls ACLs are subject to security regulations and standards e Link Layer Discovery Protocol LLDP is a vendor neutral Link Layer protocol in the Internet Protocol Suite used by network devices for advertising their identity capabilities and neighbors on a IEEE 802 local area network principally wired Ethernet The protocol is formally referred to by the IEEE as Station and Media Access Control Connectivity Discovery specified in standards document IEEE 802 1AB e Speed Rate Control Supports speed rate control function from 128k to 100Mbps Note Regarding our VS 840S principle of bandwidth control which must rely on flow control to limit bandwidth over hardware as long as client side doesn t support flow control the upstream bandwidth control is invalid so for this case client side must support flow control function e In band Management Provides a console port for setup IP or other function a mY if D i Y KUDI EA We connect your business j IECH e Out Of Band Management Supports remote control by Telnet and Web based Management easy to use configuration and ongoing monitoring This software is embedded in the switch and
38. 802 1Q VLAN and computer B do not you have to configure two ports both beneath the same VLAN group and set left port to Tagged right port to Untagged Therefore two devices will receive packet type as they desired VLAN frac TL LS 28 a EA We connect your business 4 0 3 2 2 Advanced 802 10 VLAN Setting Ingress filters configuration When a packet was received on a port you can govern the switch to drop it or not if it is an untagged packet Furthermore if the received packet is tagged but not belonging to the same VALN group of the receiving port you can also control the switch to forward or drop the packet The example below configures the switch to drop the packets not belonging to the same VLAN group and forward the packets not containing VLAN tags VLAN Commands show vlan mode Display the current VLAN mode vlan mode disabled port based dot1q Change VLAN mode Parameters disabled port based dot1q specifies the VLAN mode NOTE Change the VLAN mode for every time user have to restart the switch for valid value vlan add lt 1 4094 gt lt NAME gt lt cpu port no cpu port gt lt LIST gt lt LIST gt Add or edit VLAN entry Parameters lt 1 4094 gt specifies the VLAN id or Group id if port based VLAN mode lt NAME gt specifies the VLAN group name lt Cpu port no cpu port gt specifies the CPU port belong this VLAN group 1st lt LIST gt specifies the ports to be
39. 840S supports both port based VLAN and tag based 802 10 VLAN modes The default configuration is tag based 802 1Q VLAN In the 802 1Q VLAN initially all ports on the switch belong to default VLAN VID is 1 NOTE You cannot delete the default VLAN group in 802 1Q VLAN mode 27 a EA We connect your business 4 0 3 2 1 VLAN Mode VLAN Mode Port based Packets can go among only members of the same VLAN group Note all unselected ports are treated as belonging to another single VLAN If the port based VLAN enabled the VLAN tagging is ignored show vlan mode Display the current VLAN mode vlan mode disabled port based dot1q Change VLAN mode Parameters disabled port based dot1q specifies the VLAN mode NOTE Change the VLAN mode for every time user have to restart the switch for valid value VLAN Mode 802 1Q If a trunk group exists you can see it e g TRUNK1 TRUNK2 after port 24 And you can configure it to be a member of the VLAN group In the setting port was set to Untagged if devices underneath this port do not support VLAN tagging Thus the switch can send untagged frames to this port Consequently device that do not support VLAN tagging or do not enable VLAN tagging could successfully fetch the incoming frames and could communicate with device that transfers tagged frames and vice versa In the following figure two different types of devices want to communicate with each other Since computer A support
40. D TYPE 4 3 3 3 MAC Filtering MAC address filtering allows the switch to drop unwanted traffic Traffic is filtered based on the destination MAC addresses 91 a ER We connect your business Dynamic MAC Table Static MAC Table MAC Filtering Specify a MAC address to filter Mac Address VA E Vlan ID 1 00 00 04 55 55 55 Filter 2 Static Fig 4 3 3 3 MAC Filtering MAC Address MAC address that wants to be filtered Vlan ID If tag based 802 1Q VLAN are enabled type the VID in this field to associate with the MAC address Click Add to add a new entry Click Delete to remove a specified entry The MAC entries in this table can be sorted by clicking the column NO MAC PORT VID TYPE 4 3 4 Spanning Tree 4 3 4 0 STP system The Spanning Tree Protocol STP is a standardized method IEEE 802 1d for avoiding loops in switching networks Enable STP to ensure that only one path at a time is active between any two nodes on the network You can enable STP on web management e switch setting advanced item select enable STP We are recommended that you enable STP on all switches ensures a single active path on the network You can view STP information about the Root Bridge Such as following screen Root Bridge Information 32768 00 00 24 15 17 67 0 O 20 2 15 Fig 4 3 4 0a STP system 92 a ER We connect your business You can view STP port status about the switch Such as followin
41. DSL2 With SNMP Management IP DSALM Features amp Specifications e Compliant with ITU T G993 2 VDSL2 standard e Compliant with IEEE 802 3 802 3u 802 3ab 802 3z Ethernet Standard e Support 8a 8b 8c 8d 12a 12b 17a and 30a band profiles e Support 997 and 998 band plans e Supports Jumbo packet up to 9k byte e Supports interleave delay for noise resistant and Virtual Noise e Support UPBO Upstream PBO and DPBO Downstream PBO e Supports high bandwidth up to symmetric 100Mbps within 0 3km 984 feet for VDSL2 ports e Supports ADSL LIKE long reach mode up to 2 6 km e Supports bandwidth management rate control from 100k to 100Mbps e Supports IEEE 802 1q tagging VLAN with Q in Q e Supports quality of phone wiring detected with SNR Signal to Noise Ratio indicators e Supports COS IEEE 802 1p with 4 priority queues e Supports HTTPS SSL web management e Supports Multicast IP table IGMP v2 with 512 groups 12 a EA We connect your business e Supports LACP IEEE 802 3ad port trunking link aggregation e Support IEEE 802 1d STP IEEE 802 1w RSTP 8 IEEE 802 1s MSTP e Support port mirroring sniffer and broadcast storm filtering e Supports port security with MAC address filtering e Supports remote syslog e Supports traffic storm control e Supports SELT Single ended line test e Supports Trellis modulation for against noise e Supports Echo cancellation for against noise e Support web based and tel
42. IDs and the number of VLANs to be supported The VLAN ranges required by different customers in the same service provider network might overlap and traffic of customers through the infrastructure might be mixed Assigning a unique range of VLAN IDs to each customer would restrict customer configurations and could easily exceed the VLAN limit 4096 of the IEEE 802 1Q specification Using the QinQ feature service providers can use a single VLAN to support customers who have multiple VLANs Customer VLAN IDs are preserved and traffic from different customers is segregated within the service provider network even when they appear to be in the same VLAN Using QinQ expands VLAN space by using a VLAN in VLAN hierarchy and retagging the tagged packets A port configured to support QinQ is called a QinQ user port A port configured to support QinQ Uplink is called a QinQ uplink port To enable QinQ function the global QinQ option QinQ Tpid and specified port based QinQ User or Uplink port option need to be configured QinQ Configuration Portl Port2 Port3 Port4 Port5 Port6 Port Ports Port9 Port10 Fig 4 3 1 2 QinQ VLAN 84 a EA We connect your business 4 3 1 2 1 QinQ Tunnel Setting Virtual private networks VPNs provide enterprise scale connectivity on a shared infrastructure often Ethernet based with the same security prioritization reliability and manageability requirements of private networks QinQ tunnel is a feature
43. IEEE 802 1d STP IEEE 802 1w RSTP IEEE 802 1s MSTP For mission critical environments with multiple switches supporting STP you can configure the switches with a redundant backup bridge path so transmission and reception of packets can be guaranteed in event of any fail over switch on the network IEEEE 802 1p QoS COS with Four Priority Queues The QoS Quality Of Service feature provides four internal queues to support four different classifications of traffic High priority packet streams experience less delay inside the switch which supports lower latency for certain delay sensitive traffic The NV 802S can classify the packet as one of the 8 level priority to 4 level queue mapping Le Highest SecHigh Lowest SecLow Differentiated Services or DiffServ is a computer networking architecture that specifies a simple scalable and coarse grained mechanism for classifying managing network traffic and providing Quality of Service QoS on modern IP networks DiffServ can for example be used to provide low latency to critical network traffic such as voice or streaming media while providing simple best effort service to non critical services such as web traffic or file transfers DiffServ uses the 6 bit Differentiated Services Code Point DSCP field in the IP header for packet classification purposes DSCP replaces the outdated Type of Service field IGMP Snooping Snooping by 256 IP multicast table for VOD Video on demand and Video con
44. N 4 3 0 0 0 Port Based VLAN VLAN Configuration VLAN Operation Mode Port Based VLAN ze VLAN Information Fig 4 3 0 0 0 Port Based VLAN First select Port based VLAN in VLAN Operation Mode Then click Add to create a new VLAN group Enter the VLAN name group ID and select the members for the new VLAN Then click Apply to activate the setting If there are many groups that over the limit of one page you can click the Next Page to view other VLAN groups NOTE If the trunk groups exist you can see it ex TRK1 TRK2 in select menu of ports and you can configure it is the member of the VLAN or not 4 3 0 0 1 802 1Q VLAN In this page user can create 802 1Q tag based VLAN There are up to 512 VLAN groups to provide configuration While VLAN Operation Mode is changed to 802 1Q VLAN all ports on the switch belong to default VLAN group which VID is 1 The default VLAN group can t be deleted 79 amp ER We connect your business VLAN Configuration VLAN Operation Mode file_copy fopen error No such file or directory LAN Information DEFAULT 1 Fig 4 3 0 0 1 802 1Q VLAN 1 MIES Fig 4 3 0 0 2 802 1Q VLAN Add 80 a w A We connect your business yr Basic Create a VLAN and add tagged member ports to it 1 From the main menu click Administrator VLAN configuration click Add then you will see the page as follow 2 Type a name
45. ON S ainnise ania etnia ege geb tado 4 0 4 2 1 Community Gtrings ccce cece cee eeeeee cece cece ae na nc no cnc 4 0 4 2 2 Trap MAM EE 4 0 4 2 3 SNMP V3 VACM optional 4 0 4 2 4 SNMP V3 USM optional 40 43 IGMP ic A Geel in eed aed el dae 40 4 4 802 EE 4 0 4 5 DHCP Relay e TR EE 4 046 n 40 5 SYSlOO icici sice eis saa cenina niiair antaiia hdan Li fad abd naw nd aaia aeiaai aandie aaea ada aiad araida annaa 40 6 SSM EE 4 0 7 Reboot switchw i 24 340 in Ala A A AeA ees a a 4 0 7 0 Reset to Default ocio tai eee 4 0 7 1 Restart EE 4 0 8 TETP Unt oca ia 4 0 8 0 TFTP Firmware Update ccoo iii id iii 4 0 8 1 Restore Configure File wowmarirat dali tl dt tte 4 0 8 2 Backup Configure File ooooooooncccnnnnninnnnonnnconncccnnoncnnccnnn coco nnrcc narran rana crac 4 0 9 Access Control LIST ti AAA Aa 4 0 8 0 IPv4 ACL commands eii A A A e ae 4 0 8 1 Non IPv4 ACL COMMANAS 0 ii teta 4 0 8 2 SIP SMAC Binding anneres tn stntnsttsttrttntt uttasta tn stun EESE ESEA EES ENEAS NEEE ES EEE EA SEENE SEESE EEES Ennen 4 1 Remote Network ManageMent oonoconccnccconnninnnnnnccr unnn nnnn nunn nnnn nnne geass seeeeeeeesaaeesaeeeeaeeeeseeseseaesaseeeeeneaeas 4 2 AAMINIS AO ienna una aiena aiaiai anaia ea aa aaan aada diaa ariaa beda aa aaa aaa raea aaaea diaaa 4 2 0 IP Address Setting EE 4 2 1 Switch Setting ienicerii aiiiar aaaea iaaiiai aiina aniraa a ER We connect your business 42 10 EE 4
46. Tue EE EEN el TEE d ET 4 3 2 1 Aggregator Informati n nais conri hi Gets SE ed ei Ati den eis esi Aint eege dE Eet S252 State OT 4 3 3 Forwarding and Filtering cece cece ae ceeeee eee ee eaaeeeeaaeseeeecaaeeegeaaeseeeeecaeeesaaeegeaeeseeeesaeeesaeseeeeeees a EA We connect your business 4 3 3 0 IGMP SOO e ue EE 4 3 3 1 Dynamic MAC Address cece ee eneeceee eee ee conc na norris Fig 4 3 3 1 Dynamic MAC Address ccccccceececeeeeeceee cece aeeeeaae scenes ceaeeeeaaeseeaeeseaeeeseaaeseeaeeseaeeesaeeseaaeseeneees 4 3 3 2 Static MAC Table cocida dde 433 3 MAC Fite iNe E 4 3 4 Spanning Tree sii conicornicinnia ciar cod lila ll ideada lil ads dpi daa ecc REN EE EEN EE NR EE TEE 4 3 5 DHCP Relay and Option Be ocio A eae pense ER eeler 4 3 5 1 DHCP E TI EE 4 3 6 0 LE DP ee e TC BEEN 4 3 6 1 PerPort Configuration cccceccceccee ee eeee cece teers eee aeeeeaee see ee ceases eaaeegeeeeeceaeeeeaaesseaeeeceeeescaeeseaeeneneeseae 4 4 Access Control List Check 2010 10 19 verify momncccnnionnnnmnncnccc rc VADO IP EE 441 NONI PVA EEN E Ce UE 44 3 QOS VolP oce eege Eege lada G5 SOCUEIY EE 4 5 0 Security M na gef iisciics ccccsgavetesbeeaea taa daa Fig 4 5 0 Security Manager 4 5 Ae Wt ener peeee peer reece erect cee pect ceria a dad 4 5 2 802 1x Configuration iii o ee 4 5 2 0 System CONTIQUEAtION iii ii tati data 4 5 2 1 Perport Configuration ooonnocinnicnninninnnnoconcccnoncconorcn nac
47. Value range is from 5 to 32768 Default value is 30 LLDP hold time LLDP hold time value Value range is from 2 to 10 Default value is 4 TTL time to live is a period of time for keeping the information about a neighboring device The information will be aged out when the corresponding TTL expires TTL can be calculated by configuring LLDP hello time and hold time according to the following expression TTL LLDP hello time x LLDP hold time 100 amp ER We connect your business 4 3 6 1 PerPort Configuration PerPort LLDP configuration is in this page LLDP Configuration Pero Coniurain Configure Port Status Tx_only f Fig 4 3 6 1a PerPort Configuration Port Number specify the port s to be configured in the switch Port Status specify one of four port mode to operate LLDP for specified port s Tx_only LLDP transmit the packet of the port only Rx_only LLDP receive the packet of the port only Tx_and_Rx LLDP transmit and receive the packets of the port Disable LLDP do not transmit and receive the packets of the port PerPort LLDP configuration status can be shown in the lower area of this page like the following example Port Status PortNum Status Porti Tx_and_Rx Port2 Tx_and_Rx Port3 Tx_and_Rx Port4 Tx_and_Rx Port5 Tx_and_Rx Port Tx_and_Rx Port Tx_and_Rx Ports Tx_and_Rx Port9 Tx_and_Rx Porti0 Tx_and_Rx Fig 4 3 6 1b PerPort Configuration 101 a EA We connect your busi
48. a EA We connect your business 8 Ports VDSL2 Managed IP DSLAM with 2 Giga Ethernet VS 840S USER S MANUAL a BY no i MU EGE EA We connect your business DNS MEG VDSL2 Brief VDSL2 Very High Bit Rate Digital Subscriber Line 2 ITU T G 993 2 Standard is an access technology that exploits the existing infrastructure of copper wires that were originally deployed for POTS services lt can be deployed from central offices from fibre fed cabinets located near the customer premises or within buildings ITU T G 993 2 VDSL2 is the newest and most advanced standard of DSL broadband wireline communications Designed to support the wide deployment of Triple Play services such as voice video data high definition television HDTV and interactive gaming VDSL2 enables operators and carriers to gradually flexibly and cost efficiently upgrade existing xDSL infrastructure ITU T G 993 2 VDSL2 is an enhancement to G 993 1 VDSL that permits the transmission of asymmetric and symmetric Full Duplex aggregate data rates up to 200 Mbit s on twisted pairs using a bandwidth up to 30 MHz VDSL2 deteriorates quickly from a theoretical maximum of 200 Mbit s at source to symmetric 100 Mbit s at 0 3 km and 50 Mbit s at 1 km but degrades at a much slower rate from there and still outperforms VDSL Starting from 1 6 km its performance is equal to ADSL2 ADSL like long reach LR performance ADSL like long reach performance is one of the key advantag
49. adcast storm filter control is enable or disable Jumbo Frame Display the jumbo frame is supported or not for the port NOTE You can click the Browser s Refresh button or press lt F5 gt to update to the latest status 115 a ER We connect your business 4 7 1 Port Statistics The following information provides a view of the current status of the whole unit Press Reset button to clean all count Port Statistics The following information provides a view of the current status of the unit Up Porti On A 0 0 0 D 0 Pot2 On Up 4 O O 973 D D O Port3 On Up 4 O 0 1156 O D O Port4 On Up 4 0 0 6 0 D 0 Pots On Up 4 O 0 D D D 0 Port6 On Up 4 O 0 797 O D O Port On Up 4 O 0 16 O D 0 Pote On Up 4 O D 21 D D O Port2 On Down D 0 0 0 0 0 0 Portio On Up 11251 O 18374 0 0 D 1915 Fig 4 7 1 Port Statistics 4 8 Reset System The page to reset the switch to default configuration is shown as below Reset System Reset Switch to Default Configuration Fig 4 8 Reset System 4 9 Reboot The page to reboot warm restart the switch is shown as below Reboot Switch System Fig 4 9 Reboot 116 5 VDSL2 a EA We connect your business The page to configure and show VDSL2 functions 5 1 Profile Config The page to configure VDSL2 Profile BandPlan and Tone Mode For this function NV 802S provides world wide telecom standard band plan such as meet European telecom standard band plan 998 17a USA telecom standar
50. ales VLAN100 client Port16 of switch connects to the public network The following commands needs to be set qing enable qing tpid 8100 qing userport enable 1 qing uplinkport enable 16 qing tunnel add 1 10 1 16 4 0 3 3 Misc Configuration no mac age time Enable or disable MAC address age out mac age time lt 6 1572858 gt Set MAC address age out time Parameters lt 6 1572858 gt specifies the MAC address age out time The value must be divisible by 6 Type the number of seconds that an inactive MAC address remains in the switch s address table show mac age time Show MAC address age out time broadcast mode lt off 1 2 1 4 1 8 1 16 gt Set broadcast storm filter mode to off 1 2 1 4 1 8 1 16 broadcast select lt unicast multicast control packet ip multicast broadcast gt Select the Broadcast storm filter packet type Unicast Multicast Flood unicast multicast filter Control Packets Control packets filter IP multicast p multicast packets filter Broadcast Packets Broadcast Packets filter Collision Retry lt off 16 32 48 gt Parameters lt off 16 32 48 gt In half duplex collision retry maximum is 16 32 or 48 times and packet will be dropped if collisions still happen In default off if collision happens it will retry forever 34 a EA We connect your business Hash lt crc hash direct map gt Set hash algorithm to CRC Hash or DirectMap 4 0 3 4 Administration 4
51. alue has the highest priority and is selected as the root Value range lt 0 61440 gt the value must be in steps of 4096 Default value is 32768 You can change Max Age value The maximum age of received protocol Max Age ee information before it is discarded Value range lt 6 40 gt Default value is 20 You can change Hello time value The time interval between the transmission of Hello Time Configuration BPDUs by a Bridge that is attempting to become the Root or is the Root Value range lt 1 10 gt Default value is 2 You can change forward delay time The time spent by a Port in the Listening State and the Learning State before moving to the Learning or Forwarding State Forward Delay S a f respectively It is also the value used for the ageing time of dynamic entries in the ime Filtering Database while received BPDU indicate a topology change Value range lt 4 30 gt Default value is 15 NOTE The above parameters must enforce the following relationships 2 hello time 1 lt maximum age lt 2 forward delay 1 The following parameters can be configured on each CIST port click Apply button to set the values Configure Spanning Tree Port Parameters 200000 128 NO el NO el Fig 4 3 4 2c MSTP system You can select one port in the Port Number item to configure the parameters of the CIST port 97 a RURY i 7 DOM EC a e We connect your business ischial Fr Paramete
52. ame situation also occurred in VLAN 2 The computer C and D can communicate with each other However the computers in VLAN 1 can not see the computers in VLAN 2 since they belonged to different VLANs Layer 2 Switch VLAN 1 VLAN 2 IEEE 802 10 tag based VLANs enable the Ethernet functionality to propagate tagged packets across the bridges and provides a uniform way for creating VLAN within a network then span across the network For egress packet you can choose to tag it or not with the associated VLAN ID of this port For ingress packet you can forward this packet to a specific port as long as it is also in the same VLAN group The 802 1Q VLAN works by using a tag added to the Ethernet packets The tag contains a VLAN Identifier VID which belongs to a specific VLAN group And ports can belong to more than one VLAN 26 Layer 2 Switch The difference between a port based VLAN and a tag based VLAN is that the tag based VLAN truly divided the network into several logically connected LANs Packets rambling around the switches can be forwarded more intelligently In the figure shown below by identifying the tag broadcast packets coming from computer A in VLAN1 at sw1 can be forwarded directly to VLAN1 However the switch could not be so smart in the port based VLAN mechanism Broadcast packets will also be forwarded to port 4 of sw2 It means the port based VLAN can not operate a logical VLAN group among switches swi The VS
53. andards for the first trellis modulated modem at 14 4 kbit s 2 400 baud and 6 bits per symbol Over the next several years further advances in encoding plus a corresponding symbol rate increase from 2 400 to 3 429 baud allowed modems to achieve rates up to 34 3 kbit s limited by maximum power regulations to 33 8 kbit s Today the most common trellis modulated V 34 modems use a 4 dimensional set partition which is achieved by treating two 2 dimensional symbols as a single lattice This set uses 8 16 or 32 state convolutional codes to squeeze the equivalent of 6 to 10 bits into each symbol sent by the modem for example 2 400 baud x 8 bits symbol 19 200 bit s Once manufacturers introduced modems with trellis modulation transmission rates increased to the point where interactive transfer of multimedia over the telephone became feasible a 200 kilobyte image and a 5 megabyte song could be downloaded in less than 1 minute and 30 minutes respectively Sharing a floppy disk via a BBS could be done in just a few minutes instead of an hour Thus Ungerboeck s a EA We connect your business e Echo cancellation The term echo cancellation is used in telephony to describe the process of removing echo from a voice communication in order to improve voice quality on a telephone call In addition to improving subjective quality this process increases the capacity achieved through silence suppression by preventing echo from traveling across a networ
54. anently remains in the switch s address table regardless of whether the device is physically connected to the switch This saves the switch from having to re learn a device s MAC address when the disconnected or powered off device is active on the network again This table can associate with the Security field in Port Controls configuration to achieve the access control by source MAC port VID binding That is only ingress traffic with matched lookup with specified MAC address port number and VID in this table can be allowed to access to the switch 90 a ER We connect your business Dynamic MAC Table Static MAC Table MAC Filtering Dynamic addresses currently defined on the switch are listed below Click Add to add a new static entry to the address table MAC Address PORT VID Mac Address Port num Portt x Vlan ID LE 00 11 22 44 BB CC E Sr Static Fig 4 3 3 2 Static MAC Table The following parameters can be associated to setup the Static MAC table MAC Address Static MAC address in a MAC entry Port number Switch port number to associate with the MAC address in a MAC entry Vlan ID If tag based IEEE 802 1Q VLANs are enabled static MAC address can be associated with individual VLANs Type the VID in this field to associate with the MAC address Click Add to add a new entry Click Delete to remove a specified entry The MAC entries in this table can be sorted by clicking the column NO MAC PORT VI
55. anning tree port priority of CIST Parameters lt 0 240 gt specifies the port priority The value must be in steps of 16 lt port list gt specifies the ports to be set Null means all ports 43 a EA We connect your business no spanning tree port mcheck lt port list gt Force the port of CIST to transmit MST BPDUs No format means not force the port of CIST to transmit MST BPDUs Parameters lt port list gt specifies the ports to be set Null means all ports no spanning tree port edge port lt port list gt Set the port of CIST to be edge connection No format means set the port of CIST to be non edge connection Parameters lt port list gt specifies the ports to be set Null means all ports no spanning tree port non stp lt port list gt Disable or enable spanning tree protocol on the CIST port Parameters lt port list gt specifies the ports to be set Null means all ports spanning tree port point to point mac lt auto true false gt lt port list gt Set the port of CIST to be point to point connection Parameters auto specifies point to point link auto connection true specifies point to point link true false specifies point to point link false lt port list gt specifies the ports to be set Null means all ports spanning tree mst lt 0 15 gt priority lt 0 61440 gt Set spanning tree bridge priority of MSTI Parameters lt 0 15 gt specifies the MSTI instan
56. apply to any products which have been subjected to any misuse neglect or accidental damage or which contain defects which are in any way attributable to improper installation or to alteration or repairs made or performed by any person not under control of the original owner The above warranty is in lieu of any other warranty whether express implied or statutory including but not limited to any warranty of merchantability fitness for a particular purpose or any warranty arising out of any proposal specification or sample Shall not be liable for incidental or consequential damages We neither assumes nor authorizes any person to assume for it any other liability Note Please do not tear off or remove the warranty sticker as shown otherwise the warranty will be void WARNING Warranty Void If Removed 129
57. ard delay time The time spent by a Port in the Listening State and the Learning State before moving to the Learning or Forwarding State Forward Delay l SC T respectively It is also the value used for the ageing time of dynamic entries in the ime Filtering Database while received BPDU indicate a topology change Value range lt 4 30 gt Default value is 15 NOTE The above parameters must enforce the following relationships 2 hello time 1 lt maximum age lt 2 forward delay 1 The following parameters can be configured on each port click Apply button to set the values STP Port Status PortNum PathCost Priority PortState PortEdge PortNonSTP PortP2P Migration Check Port1 200000 128 Discarding NO NO YES undefined Port2 200000 128 Discarding NO NO YES undefined Port3 200000 128 Discarding NO NO YES undefined Port4 200000 128 Discarding NO NO YES undefined Ports 200000 128 Discarding NO NO YES undefined Port6 200000 128 Discarding NO NO YES undefined Port 200000 128 Discarding NO NO YES undefined Ports 200000 128 Discarding NO NO YES undefined Porto 2000000 128 Disabled NO NO NO undefined Portio 200000 128 Forwarding NO NO YES undefined Fig 4 3 4 0d STP system You can select one port in the Port Number item to configure the parameters of the port Parameter Description a oe The contribution of the path through this port when the port is the root port to the total cost of the path to the
58. bled environment 58 a ER We connect your business 4 0 8 0 IPv4 ACL commands no acl lt group id gt Delete ACL group Parameters lt group id gt specifies the group id 1 220 e g no acl 1 no acl count lt group id gt Reset the ACL group count Parameters lt group id gt specifies the group id 1 220 Enable Disable acl lt group id gt Reset the ACL group count Parameters lt group id gt specifies the group id 1 220 show acl lt group id gt Show all or ACL group information by group id Parameters lt group id gt specifies the group id null means all valid groups e g show acl 1 Group ld 1 Action Permit Rules Vlan ID Any IP Fragement Uncheck Src IP Address Any Dst IP Address Any L4 Protocol Any Port ID Any Hit Octet Count 165074 Hit Packet count 472 59 a EA We connect your business acl add edit lt group id gt permit deny lt 0 4094 gt ipv4 lt 0 255 gt A B C D A B C D A B C D A B C D check unCheck lt 0 65535 gt lt 0 26 gt Add or edit ACL group for IPv4 packets Parameters addledit specifies the operation lt group id gt specifies the group id 1 220 permit deny specifies the action permit permit packet cross switch deny drop packet lt 0 4094 gt specifies the VLAN id 0 means don t care lt 0 255 gt specifies the IP protocol 0 means don t care 1st A B C D specifies the Source IP address 0 0 0 0 means
59. c that you want to monitor After properly configured packets with the specified direction from the monitored ports are forwarded to the monitoring port NOTES 1 The default Port Monitoring setting is disabled 2 The analysis port is dedicated as mirroring port with duplicated traffic flow from mirrored port The ordinary network traffic is not available for the analysis port 3 Any trunk group and member port is not available for this function mirror port lt rx tx both gt lt port id gt lt port list gt Set port monitoring information RX only TX only both RX and TX Parameters rx specifies monitoring rx only tx specifies monitoring tx only both specifies monitoring both rx and tx lt port id gt specifies the analysis port ID This port receives traffic from all monitored ports lt port list gt specifies the monitored port list show mirror port Show port monitoring information 4 0 3 6 Quality of Service There are four transmission queues with different priorities in NV802S Highest SecHigh SecLow and Lowest The switch will take packets from the four queues according to its QoS mode setting If the QoS mode was set to Disable the switch will not perform QoS on its switched network If the QoS mode was set to High Empty Then Low the switch will never exhaust packets from a queue until the queues with higher priorities are empty If the QoS mode was set to weight ratio the switch will exhaus
60. ce ID lt 0 61440 gt specifies the MSTI bridge priority The value must be in steps of 4096 Default value is 32768 spanning tree mst lt 0 75 gt vlan lt vlan list gt Set MSTI to map VLAN list Parameters lt 0 15 gt specifies the MSTI instance ID lt vlan list gt specifies the mapped VLAN list Null means all VLANs spanning tree mst lt 0 15 gt port path cost lt 1 200000000 gt lt port list gt Set spanning tree port path cost of MSTI 44 a EA We connect your business Parameters lt 1 200000000 gt specifies port path cost lt port list gt specifies the ports to be set Null means all ports spanning tree mst lt 0 15 gt port priority lt 0 240 gt lt port list gt Set spanning tree port priority of MSTI Parameters lt 0 240 gt specifies the port priority The value must be in steps of 16 lt port list gt specifies the ports to be set Null means all ports no spanning tree mst lt 0 15 gt Delete the specific MSTI Parameters lt 0 15 gt specifies the MSTI instance ID show spanning tree Show spanning tree information of CIST show spanning tree port lt port list gt Show spanning tree port information of CIST Parameters lt port list gt specifies the port to be shown Null means all ports show spanning tree mst configuration Show MST instance map show spanning tree mst lt 0 15 gt Show MST instance information Parameters lt 0 15 gt specif
61. ch Location Enter the location of the switch Contact Enter the name of a person or organization SNMP Status Enable Disable SNMP Function 70 a ER We connect your business Options No Contact Disable a_i Fig 4 2 4 0 System Options 4 2 4 1 Community strings Serve as passwords and can be entered as one of the following RO Read only Enables requests accompanied by this string to display MIB object information RW Read write Enables requests accompanied by this string to display MIB object information and to set MIB objects Community Strings sring Oro Orw Fig 4 2 4 1 Community strings 4 2 5 3 Trap Manager Trap Manager is a management station that receives traps the system alerts generated by the switch If no trap manager is defined no traps are issued Create a trap manager by entering the IP address of the station and a community string Trap Managers none IP Address Fig 4 2 4 2 Trap Manager 71 a Q e We connect your business e 4 2 4 3 SNMPv3 Group Maintain SNMPv3 group Group Name specifies the group name v1 v2c USM specifies the security model Security Name specifies the security name V3 Group root_v1_root admin_v1_admin public_v1_ public root_ 2c_root admin_v2c_admin public_v2c_public Group Name Input group name ViJ V2cJUSM wi e Security Name Input security name g 4 2 4 3 SNMP
62. d a new trunk group Parameters lt trunk id gt specifies the trunk group to be added lt lacp gt specifies the added trunk group to be LACP enabled lt no lacp gt specifies the added trunk group to be LACP disabled lt port list gt specifies the ports to be set lt active port list gt specifies the ports to be set to LACP active no trunk lt trunk id gt Delete an existing trunk group Parameters lt trunk id gt specifies the trunk group to be deleted 4 0 3 1 1 LACP Commands no lacp Enable disable LACP lacp system priority lt 7 65535 gt Set LACP system priority Parameters lt 1 65535 gt specifies the LACP system priority 24 a EA We connect your business no lacp system priority Set LACP system priority to the default value 32768 show lacp status Show LACP enable disable status and system priority show lacp Show LACP information show lacp agg lt trunk id gt Show LACP aggregator information Parameters lt trunk id gt specifies the trunk group to be shown show lacp port lt port id gt Show LACP information by port Parameters lt port id gt specifies the port to be shown NOTE If VLAN group exist all of the members of static trunk group must be in same VLAN group 4 0 3 2 VLAN 4 0 3 2 0 Virtual LANs A Virtual LAN VLAN is a logical network group that limits the broadcast domain It allows you to isolate network traffic so only members of the VLAN receive traf
63. d band plan 997 8a 8b and APAC Telecom standard band plan 30a etc Annex A specifies bandplans for the North American region and enables NV 802S to be deployed with traditional POTS telephony or in an all digital mode Annex B specifies bandplans for Europe and enables NV 802S deployment with underlying POTS and ISDN services Annex C allows NV 802S to coexist with TCM ISDN services found primarily in APAC NV 802S has numerous configuration profiles and bandplans to meet regional service provider requirements The frequency bandwidth has increased to 30 MHz with configuration options at 8 5 MHz 12 MHz 17 7 MHz and 30 MHz Band profile and band plan can only be configured at NV 802S as NV 600R will auto follow up on the settings of NV 802S The only thing that NV 600R must be configured so that the routers will link is the tone mode However the default tone mode for NV 802S NV 600R is V43 so at default there s no need to change the tone mode unless it is required by the telecom companies to use different tone mode Another important thing is that band profile and band plan setting must be compatible to each other if not access error will show when applied Please deactivate and activate once the setting has been changed Default plan profile and band plan 30a and C8K 117 a EA We connect your business VDSL2 Profile Config Port Profile BamdPlan ToneMode Poti A Port 2 e Port 3 Pon4 e Vdsi2 Profile30a
64. d of the older technique of applying it to the bit stream then modulating the bits The key idea he termed Mapping by Set Partitions This idea was to group the symbols in a tree like fashion then separate them into two limbs of equal size At each limb of the tree the symbols were further apart Although in multi dimensions it is hard to visualize a simple one dimension example illustrates the basic procedure Suppose the symbols are located at 1 2 3 4 Then take all odd symbols and place them in one group and the even symbols in the second group This is not quite accurate because Ungerboeck was looking at the two dimensional problem but the principle is the same take every other one for each group and repeat the procedure for each tree limb He next described a method of assigning the encoded bit stream onto the symbols in a very systematic procedure Once this procedure was fully described his next step was to program the algorithms into a computer and let the computer search for the best codes The results were astonishing Even the most simple code 4 state produced error rates nearly 1 000 times lower than an equivalent uncoded system For two years Ungerboeck kept these results private and only conveyed them to close colleagues Finally in 1982 Ungerboeck published a paper describing the principles of trellis modulation A flurry of research activity ensued and by 1990 the International Telecommunication Union had published modem st
65. des current status of every port that depends on user s setting and the negotiation result Port Status The following information provides a view of the current status of the unit Force NN Force 100 om ei ei Port3 J TE Force 100 Full F off Off oi a Port4 On Up Force 100 Full on Off Off Off on on Pots On Up Force 100 Full on Off Off Off on on Pot On Up Force 100 Full on Off Off Off On On Port On Up Force 100 Full on Off Off Off On on Ports On Up Force 100 Full on Off Off Off on on Port9 On Down Off Off Off On On Porti0 On Up Auto 100 Full on Off Off Off on on Fig 4 7 0 Port Status State Display port statuses disable or enable Unlink will be treated as off Link Status Down means No Link Up means Link up Auto Negotiation Display the auto negotiation mode auto force nway force Speed status Display 100Mbps speed port 1 8 are 10 100Mbps Port 9 10 are 10 100 1000Mbps Duplex status Display full duplex or half duplex mode Flow Control Display the flow control state Full Display the flow control is enabled or disabled in full mode Half Display the backpressure is enabled or disabled in half mode Rate Control Display the rate control setting Ingress Display the port effective ingress rate of user setting Egress Display the port effective egress rate of user setting Port Security Display the port security is enabled or disabled BSF Display the port bro
66. don t care 2nd A B C D specifies the Mask 0 0 0 0 means don t care 255 255 255 255 means compare all 3rd A B C D specifies the Destination IP Address 0 0 0 0 means don t care 4th A B C D specifies the Mask 0 0 0 0 means don t care 255 255 255 255 means compare all check unCheck specifies the IP Fragment check Check IP fragment field unCheck Not check IP fragment field lt 0 65535 gt specifies the Destination port number if TCP or UDP 0 means don t care lt 0 26 gt specifies the Port id O means don t care e g acl add 1 deny 1 ipv4 0 192 168 1 1 255 255 255 255 0 0 0 0 0 0 0 0 unCheck 0 0 This ACL rule will drop all packet from IP is 192 168 1 1 with VLAN id 1 and IPv4 acl add edit lt group id gt qosvoip lt 0 4094 gt lt 0 7 gt lt 0 1F gt lt 0 1F gt lt 0 FF gt lt 0 FF gt lt 0 FFFF gt lt 0 FFFF gt lt 0 FFFF gt lt 0 FFFF gt Add or edit ACL group for Ipv4 Parameters addledit specifies the operation lt group id gt specifies the group id 1 220 qosvoip specifies the action do qos voip packet adjustment lt 0 4094 gt specifies the VLAN id 0 means don t care lt 0 1F gt specifies the port ID value lt 0 1F gt specifies the port ID mask lt 0 FF gt specifies the protocol value lt 0 FF gt specifies the protocol mask lt 0 FFFF gt specifies the source port value lt 0 FFFF gt specifies the source port mask lt 0 FFFF gt specifies the destination port value lt 0
67. down working in Half Duplex LEDs Collision LEDs Flashing Flashing to show collision status VDSL2 Link Steady LED light up Steady to show Link is established LEDs Green ED light down Steady to show Link is not established Rear Panel The following figure shows the rear panel of the IP DSLAM Figure Chapter 2 3 Rear Panel 1 AC Power 100 240V 2 FAN AC Power Socket The power cord should be plug into this socket The AC Socket accepts AC power 100 to 240 voltage 16 EA We connect your business y MUDI 3 Installation Hardware Installation This chapter describes how to install the IP DSLAM and establish network connections You may install this IP DSLAM on any level surface table shelf 19 inch rack or wall mounting However please take note of the following minimum site requirements before you begin Stick the 4 plastic foot that come with this package on each of the 4 bore located on the bottom Pre Installation Requirements Before you start actual hardware installation make sure you can provide the right operating environment including power requirements sufficient physical space and proximity to other network devices that are to be connected Verify the following installation requirement e Power requirements AC 100V to 240 V at 50 to 60 Hz The IP DSLAM power supply automatically adjusts to the input voltage level e The IP DSLAM should be located in a cool dry place with at least 10cm 4in
68. e For example if we want VoIP packets with UDP protocol type 17 and source port number is in range of 10000 10015 to be forwarded out with highest priority while network congestion happens an ACL rule can be created like the following setting Parameter Value GID 1 Action QoS VoIP VLAN Any Priority 7 PortID 0 PortlD Mask 0 Protocol 11h Protocol Mask 1FH Source Port 2710h Source Port Mask FFOOh 108 Destination Port 0 Destination Port Mask 0 4 5 Security 4 5 0 Security Manager In this page user can change user name and password with the following parameters User Name Type the new user name Assign Change password Type the new password Reconfirm password Retype the new password Security Manager Fig 4 5 0 Security Manager Click Apply to activate the setting 4 5 1 MAC Limit MAC limit allows users to set a maximum number of MAC addresses to be stored in the MAC address table The MAC addresses chosen to be stored in MAC address table is the result of first come first save policy Once a MAC address is stored in the MAC address table it stays in until it is aged out When an opening is available the switch stored the first new MAC address it sees in that opening All packets from MAC addresses not in the MAC address table should be blocked 109 a EA We connect your business MAC Limit Configure MAC Limit MAC Limit 0 1 64 0 to tu
69. en click Reset Hit Count to do the action 102 a EA We connect your business 4 4 0 IPv4 In Packet Type Binding box should select IPv4 Permit v 00S gid 1 _permit_ vid any _ sip any _ dip any _ l4 any _ frg uncheck _ portid any _ octetcnt 521 35 _ packetcntH 05 Fig 4 4 0 IPv4 The related parameters are shown in the following table Group ID 1 220 max 220 ACL group 103 Action a EA We connect your business Permit Deny a Permit Permit packet cross switch b Deny Drop packet Permit VLAN Any VID a Any Any Vlan id b VID 1 4094 A certain vlan id Any Packet Type IPv4 Non IPv4 Binding a IPv4 Set Ipv4 packet field b Non IPv4 Set non lpv4 packet field c Binding Set binding entry IPv4 Src IP Address Set this field if Packet Type is IPv4 else ignore Any IP and Mask a Any Any IP address b IP A certain IP address Mask 0er me is represent a digit from 0 9 is range from 0 to 255 Notice This is not subnet mask Any Dst IP Address Set this field if Packet Type is IPv4 else ignore Any IP and Mask a Any Any IP address b IP A certain IP address Mask 0er e is represent a digit from 0 9 kkk is range from 0 to 255 Any IP Fragment Set this field if Packet Type is IPv4 else ignore Uncheck Check a Uncheck Not check IP fragment field
70. es of VDSL2 LR VDSL2 enabled systems are capable of supporting speeds of around 1 4 Mbit s downstream over distances of 2 5 km gradually increasing the bit rate up to symmetric 100Mbit s as loop length shortens This means that VDSL2 based systems unlike VDSL1 systems are not limited to short loops or MTU MDUS only but can also be used for medium range applications VDSL2 IP DSLAM The NV 8028 utilize Lantiq Infineon Vinax VDSL2 Chipset which is a VDSL2 IP DSLAM that aggregates 8 ports into Giga Ethernet uplinks for high speed data Internet services Based on DMT VDSL2 technologies NV 802S extends data service with line rate of solution for services such as remote lecturing telemedicine video conferencing Video on Demand VoD IP TV Internet access and other various high speed data applications When the number of subscribers increases the second uplink Giga Ethernet interface can be used to daisy chain to another NV 802S Alternatively multiple NV 802S can be connected to another LAN switch to from a two tier configuration thus supporting a lot more subscribers The NV 802S is an ideal solution for delivering cost effective high performance broadband multimedia services to Multi Tenant Units MTUs or Multi Dwelling Units MDUs such as hotels campus hospitals and telecom The NV 802S provides the important features necessary for robust networks Key features and benefits e Jumbo packet up to 9k byte In computer networki
71. ess filtering rule as follows Ingress Filtering Rule 1 A forward only packet with VID matching this port s configured VID Ingress Filtering Rule 2 Drop Untagged Frame 82 a ER We connect your business 4 3 1 0 GVRP VLAN 4 3 1 0 0 GVRP Setting GVRP GARP VLAN Registration Protocol or Generic VLAN Registration Protocol is a protocol that facilitates control of virtual local area networks VLANs within a larger network GVRP conforms to the IEEE 802 1Q specification which defines a method of tagging frames with VLAN configuration data GVRP allows automatic VLAN configuration between the switch and nodes lf the switch is connected to a device with GVRP enabled you can send a GVRP request using the VID of a VLAN defined on the switch the switch will automatically add that device to the existing VLAN GVRP can be enabled per port basis To enable GVRP function for a port both global GVRP and special port GVRP are required to configure GVRP Configuration Port1 Port2 Port3 Port4 Port5 Port6 Port Ports Port9 Port10 Fig 4 3 1 0 0 GVRP VLAN 4 3 1 1 1 GVRP Table check 2010 10 GVRP Configuration 1 50 17 Fig 4 3 1 1 1 GVRP Table In this page the VLAN group s dynamically created by GVRP can be displayed with VID and port member s 83 a ER We connect your business 4 3 1 2 QinQ VLAN 4 3 1 2 0 QinQ Port Setting Business customers of service providers often have specific requirements for VLAN
72. ets The Broadcast Storm Filter Mode will show OFF Collisions Retry Forever In half duplex collision retry maximum is 16 32 or 48 times and packet will be dropped if collisions still happen In default Disable system will retry forever if collisions happen Hash Algorithm Select Hash Algorithm IP MAC Bing Enable or disable SMAC and SIP binding 802 1x Protocol Enable or disable 802 1x protocol 4 2 2 Console Port Information Console is a standard UART RS 232 interface to communicate with Serial Port User can use windows HyperTerminal program to link the switch Connect To gt Configure Bits per seconds 115200 Data bits 8 Parity none Stop Bits 1 Flow control none 66 a ER We connect your business Console Information Fig 4 2 2 Console Information 4 2 3 Port Configuration 4 2 3 0 Port Controls The following webpage is to provide the display and modification for the port settings Use the dropdown in Port field to select one or multiple ports in the upper control area The lower display area will show the port settings for the selected port s Use the other control fields in the upper area to modify the port settings for the selected port s Press Apply to save and activate the port settings Port Controls 1000 m Fur be Je JE Fig 4 2 3 0 Port Controls State User can disable or enable this port 67 a ER We connect your business Negotiation User can
73. ference and Internet games application 3 Fa DN i Hafe EA We connect your business AN EA HTTPS SSL Web Access Hypertext Transfer Protocol Secure HTTPS is a combination of the Hypertext Transfer Protocol with the SSL protocol to provide encrypted communication and secure identification of a network web server HTTPS connections are often used for payment transactions on the World Wide Web and for sensitive transactions in corporate information systems SNMP MIB Support SNMP v1 v2c v3 management and trap function Support MIB tables MIB II RFC 1213 Bridge MIBs RFC 1493 Ethernet like MIB RFC 1643 amp RFC 2665 private MIB USM MIB RFC 2574 VACM MIB RFC 2575 and RMON MIB 1 2 3 9 groups RFC 1757 amp RFC 2819 e Broadcast Multicast Unknown unicast Storm Control To limit too many broadcast multicast unknown unicast flooding in the network broadcast multicast storm control is used to restrict excess traffic Threshold values are available to control the rate limit for each port Packets are discarded if the count exceeds the configured upper threshold e Port Mirroring This function could be mirroring and duplicated client side action but Need to be with mirroring AP as Session wall or other e ACL Access Control List On some types of proprietary computer hardware an Access Control List refers to rules that are applied to port numbers or network daemon names that are available on a host or other layer
74. fic from the same VLAN members Basically creating a VLAN within a switch is logically equivalent of reconnecting a group of network devices to another Layer 2 switch However all the network devices are still plugged into the same switch physically A station can belong to more than one VLAN group VLAN prevents users from accessing network resources of another on the same LAN thus the users can not see the hard disks and printers of another user in the same building VLAN can also increase the network performance by reducing the broadcast traffic and enhance the security of the network by isolating groups This Switch supports two types of VLANs e Port based e IEEE 802 1Q tag based Only one of the two VLAN types can be enabled at one time 25 a EA We connect your business Port based VLANs are VLANs where the packet forwarding decision is made based on the destination MAC address and its associated port You must define the outgoing ports allowed for each port when you use port based VLANs In port based VLANs the packets received from one port can only be sent to the ports which are configured to the same VLAN As shown in the following figure the switch administrator configured port 1 2 as VLAN 1 and port 3 4 as VLAN 2 The packets received from port 1 can only be forwarded to port 2 The packets received from port 2 can only be forwarded to port 1 That means the computer A can send packets to computer B and vice versa The s
75. figuration 4 0 4 0 STP RSTP no spanning tree Enable or disable spanning tree spanning tree forward delay lt 4 30 gt Set spanning tree forward delay used in seconds Parameters lt 4 30 gt specifies the forward delay in seconds Default value is 15 Note The parameters must enforce the following relationships 2 hello time 1 lt maximum age lt 2 forward delay 1 spamning tree hello time lt 1 70 gt Set spanning tree hello time in seconds Parameters lt 1 10 gt specifies the hello time in seconds Default value is 2 Note The parameters must enforce the following relationships 2 hello time 1 lt maximum age lt 2 forward delay 1 spanning tree maximum age lt 6 40 gt Set spanning tree maximum age in seconds Parameters lt 6 40 gt specifies the maximum age in seconds Default value is 20 Note The parameters must enforce the following relationships 2 hello time 1 lt maximum age lt 2 forward delay 1 spanning tree priority lt 0 61440 gt Set spanning tree bridge priority Parameters lt 0 61440 gt specifies the bridge priority The value must be in steps of 4096 spanning tree port path cost lt 1 200000000 gt lt port list gt Set spanning tree port path cost Parameters lt 1 200000000 gt specifies port path cost lt port list gt specifies the ports to be set Null means all ports 40 a EA We connect your business spamning tree
76. fonverkabelung Figure Chapter 4 1 125 ER We connect your business 9 LIECH Application for Sharing a single internet account If multiple users would like to share a single internet account using the switch which is to be connected to a IP sharing device then to a xDSL or Cable Modem Note For network applications that actually require Router e g Interconnecting dissimilar network types attaching the SWITCH directly to a router can significantly improve overall home networking performance High bandwidth backbone ready The VDSL2 IP DSLAM provides 10 100 1000Mbps auto sensing for external trunk device Fiber optics Wireless Bridge xDSL amp other WAN services Appendix A Troubleshooting Diagnosing IP DSLAM Indicators The Switch can be easily monitored through its comprehensive panel indicators These indicators assist the network manager in identifying problems the Switch may encounter This section describes common problems you may encounter and possible solutions 1 Symptom POWER indicator does not light up green after power on Cause Defective power outlet power cord internal power supply Solution Cheek the power outlet by plugging in another that is functioning properly Check the power cord with another device If these measures fail to resolve the problem have the unit power supply replaced by an qualified distributor 2 Symptom Link indicator does nat light up green after making a connection Ca
77. for the new VLAN 3 Type a VID 1 4094 The default is 1 4 From the Available ports box select ports to add to the switch and click Add gt gt If the trunk groups exist you can see it in here ex TRK1 TRK2 and you can configure it is the member of the VLAN or not 5 Click Next Then you can view the page as follow vi 2 TagMember Porti Tag se Botz Tag e Port3 Tag vw Port4 Untag w Ports Fig 4 3 0 0 3 802 1Q VLAN Add 6 Uses this page to set the outgoing frames are VLAN Tagged frames or no Then click Apply Tag outgoing frames with VLAN Tagged Untag outgoing frames without VLAN Tagged 81 VLAN Filters Basic 1 Liege e Disable Apply Default Portl 1 ENABLE DISABLE Port2 50 ENABLE DISABLE Port3 1 ENABLE DISABLE Fig 4 3 0 0 4 VLAN Filters Port NO Port number s to be assigned to see or configure the settings Port VID PVID Port VLAN ID will be assigned to untagged traffic on a given port This feature is useful for accommodating devices that you want to participate in the VLAN but that don t support tagging This switch allows user to set one PVID for each port the range is 1 4094 default PVID is 1 The PVID must as same as the VLAN ID that the port belong to VLAN group or the untagged traffic will be dropped Ingress Filtering Ingress filtering lets frames belonging to a specific VLAN to be forwarded if the port belongs to that VLAN This switch has two ingr
78. g in module that supports hot plugging it can be removed and replaced without turning off the system The devices are economical because they eliminate the necessity for replacing entire boards at the system level Upgrading can be done with any number of units at a time from an individual module to all the modules in a system SFP Small Form Pluggable Transceivers meet the Gigabit Interface Converter specification Rev 5 4 MOD_DEF4 industry standard Mode Wave length Bit Rate Voltage Power Margin 1 LX Single Mode 10km 1 25Gbps 3 3V 10 5db 10KM or above 2 GX Multi Mode 550m 1 25Gbps 3 3V 8 5db 550m 15 LED Indications The followings describe the function of each LED indicator This LED light is located at the left side on the front panel It will light up ON to show that the product is receiving power Conversely no light OFF means the product is not receiving power POST Power On Self Testing POST Led will light to show system is booting now When system is ready the LED will light off Giga port indicates that communications have been set 10 100 1000 Mbps Each port on the IP DSLAM is assigned an LED light for 100 or 1000 Base TX connecting flashing to show data on Traffic status Flashing Fiber mode only support Indicates that communications have been set to full duplex operation for the indicated Full Duplex port The indicator lights up working in Full Duplex and light
79. g screen STP Port Status Port 100 128 Disabled Port2 100 128 Disabled 100 128 Disabled 19 128 Forwarding 128 Disabled 128 Disabled 128 Disabled 128 Disabled 128 128 128 128 128 128 128 128 128 128 128 Disabled 128 Disabled 100 128 Disabled Fig 4 3 4 0b STP system You can configure STP parameters then click Apply button to set the values Such as following screen Configure Spanning Tree Parameters Fig 4 3 4 0c STP system You can select STP state item to enable STP If you want to disable STP please cancel the item Default value of STP sate is disabled 93 D O Di l Ay ER We connect your business d e RUDI Parameter Description You can change priority value A value used to identify the root bridge The bridge with Priority lowest value has the highest priority and is selected as the root Value range lt 0 61440 gt the value must be in steps of 4096 Default value is 32768 You can change Max Age value The maximum age of received protocol information Max Age SE l before it is discarded Value range lt 6 40 gt Default value is 20 You can change Hello time value The time interval between the transmission of Hello Time Configuration BPDUs by a Bridge that is attempting to become the Root or is the Root Value range lt 1 10 gt Default value is 2 You can change forw
80. ic trunk groups are created Trunking The following information provides a view of LACP current status Fig 4 3 2 1b Aggregator Information This page shows actor and partner trunks one group Trunking The following information provides a view of LACP current status 1 1 004063809988 004063808899 PORTS selected PORTS 5141 PORTE 514 1 PORT 514 1 PORTS 514 1 Fig 4 3 2 1c Aggregator Information 87 a ER We connect your business 4 3 2 2 State Activity Active select The port automatically sends LACP protocol packets N A no select The port does not automatically sends LACP protocol packets and responds only if it receives LACP protocol packets from the opposite device 1 A link that has either two active LACP ports or one active port can perform dynamic LACP trunking A link has two N A LACP ports will not perform dynamic LACP trunking because both ports are waiting for and LACP protocol packet from the opposite device 2 If you are active LACP s actor when you are select trunking port the active status will be created automatically 1 Active 2 MaActive 3 N A 4 N A 5 N A 6 N A 7 N A 8 N A 9 N A 10 N A 4 3 2 2 State Activity 4 3 3 Forwarding and Filtering In this submenu the following functions related to forwarding and filtering are provided e IGMP Snooping e Dynamic MAC Table e Static MAC Table e MAC Filtering 4 3 3 0 IGMP Snooping This swi
81. ies the MSTI instance ID show spanning tree mst lt 0 15 gt port lt 1 26 gt Show specific port information of MST instance Parameters lt 0 15 gt specifies the MSTI instance ID lt 1 26 gt specifies port number 45 a EA We connect your business show vlan spanning tree Show per VLAN per port spanning tree status 4 0 4 2 SNMP Any Network Management running the simple Network Management Protocol SNMP can be management the switch 4 0 4 2 0 System Options Snmp no snmp Enable or disable SNMP Show snmp status Show enable or disable status of SNMP snmp system name lt name str gt Set agent system name string Parameters lt name str gt specifies the system name string e g snmp system name SWITCH snmp system location lt location str gt Set agent location string Parameters lt location str gt specifies the location string e g snmp system location office snmp system contact lt contact str gt Set agent system contact string Parameters lt contact str gt specifies the contact string e g snmp system contact abc sina com show snmp system Show SNMP system information 4 0 4 2 1 Community Strings snmp community lt read sysinfo only read all only read write all gt lt community str gt Set SNMP community string Parameters lt community str gt specifies the community string e g snmp community read all only public 46 a EA We connect your business no snmp c
82. ies the ports to be set If not specified all ports are set An LLDP example refer to the figure in previous page the following commands will be used lldp for switch A amp B Ildp port both 8 for switch A lldp port both 12 for switch B show lldp port 8 for switch A to see the switch B s LLDP info learned by Switch A 56 State RX and TX Pkt Tx 3868 Pkt Rx 46409 Neighbor Count 1 Neighbor 1 information TTL Time 5879 Class ID 56 78 17 45 25 00 Port ID port 12 System Name System Description Switch v2 16 Port Description Port 12 Port SetSpeed Auto Port ActualSpeed FULL 100 Port Link Aggregation not support 4 0 5 Syslog syslog server lt server ip gt lt logging level gt Setting the syslog server and loging level Parameters lt server ip gt specifies the syslog server IP lt logging level gt specifies the logging level 0 none 1 major 2 all show syslog server Display the syslog server IP and logging level 4 0 6 SSH ssh lt v1 v2 all gt Enable ssh function Parameters lt v1 v2 all gt specifies which ssh version to suuport no ssh Disable ssh function 57 a EA We connect your business 4 0 7 Reboot switch 4 0 7 0 Reset to Default erase startup config Reset configurations to default factory settings at next boot time 4 0 7 1 Restart Boot Reboot warm start the switch 4 0 8 TFTP Function 4 0 8 0 TFTP Firmware Update c
83. iffer 4 2 3 2 Protected Port There are two protected port groups Ports in different groups can t communicate each other In the same group protected ports can t communicate each other but can communicate with unprotected ports Unprotected ports can communicate with any ports including protected ports In default all ports are in Group1 and not protected 69 a ER We connect your business Portected Port Setting wem IN TTT Fig 4 2 3 2 Protected Port Setting For example in the above configuration page for protected port Port4 in Group2 other ports in Group1 and both Port1 amp Port2 are protected These settings provide Port4 can t communicate with other ports in Group1 Porti A Port2 can t communicate each other but can communicate with other ports in Group1 4 2 4 SNMP Configuration Any Network Management platform running the simple Network Management Protocol SNMP can manage the switch provided the Management Information Base MIB is installed correctly on the management station The SNMP is a Protocol that governs the transfer of information between management station and agent 4 2 4 0 System Options Use this page to define management stations as trap managers and to enter SNMP community strings User can also define a name location and contact person for the switch Fill in the system options data and then click Apply to update the changes on this page Name Enter a name to be used for the swit
84. in command line then press enter key restore default value 8 Please input reboot of instruction in command line then press enter key system reboot 9 NV 802S is rebooting until show login menu 10 Please input admin in Engineering username menu 11 Please input 123 in password menu 5 Question The customer reported that bandwidth control did not work in either direction when the port was set to 1 on the ingress and 1 on the egress One of our new HP laptops should bandwidth control at around 100K on the download but around 1 7Mbps on the upload On my laptop it was around 100K on the download and 225K on the upload Is there a reason why we are seeing such varied results and has there been any other reported problem with this feature lately Answer Regarding our NV 802S principle of bandwidth control which must rely on flow control to limit bandwidth over hardware as long as client side doesn t support flow control the upstream bandwidth control is invalid so for this case client side must support flow control function 6 Question Why VDSL2 configure change invalid Answer After any change to VDSL2 configure Line must be deactivated then activated once or reboot then new configure will be valid System Diagnosis Power and Cooling Problems If the POWER indicator does not turn on when the power cord is plugged in you may have a problem with the power outlet power cord or internal power supply as expla
85. ined in the previous section However if the unit should turn itself off after running for a while check for loose power connections power losses or surges at the power outlet and verify that the fan on back of the unit is unobstructed and running prior to shutdown If you still cannot isolate the problem then the internal power supply may be defective In this case contact your supplier for assistance 127 a s mY if D i Y NUD oo EA We connect your business NE N Installation Verify that all system components have been properly installed If one or more components appear to be malfunctioning e g the power cord or network cabling test them in an alternate environment where you are sure that all the other components are functioning properly Transmission Mode The default methods of selecting the transmission mode for all RJ 45 ports are auto negotiation Therefore if the Link signal is disrupted e g by unplugging the network cable and plugging it back in again or by resetting the power the port will try to reestablish communications with the attached device via auto negotiation If auto negotiation fails then communications are set to half duplex by default Based on this type of industry standard connection policy if you are using a full duplex device that does not support auto negotiation communications can be easily lost i e reset to the wrong mode whenever the attached device is reset or experiences a power f
86. k Two sources of echo have primary relevance in telephony acoustic echo and hybrid echo Echo cancellation involves first recognizing the originally transmitted signal that re appears with some delay in the transmitted or received signal Once the echo is recognized it can be removed by subtracting it from the transmitted or received signal This technique is generally implemented using a digital signal processor DSP but can also be implemented in software Echo cancellation is done using either echo suppressors or echo cancellers or in some cases both e Syslog is a standard for logging program messages It allows separation of the software that generates messages from the system that stores them and the software that reports and analyzes them It also provides devices which would otherwise be unable to communicate a means to notify administrators of problems or performance Syslog can be used for computer system management and security auditing as well as generalized informational analysis and debugging messages It is supported by a wide variety of devices like printers and routers and receivers across multiple platforms Because of this syslog can be used to integrate log data from many different types of systems into a central repository a EA We connect your business Contents VDSL2 IP Dslam1 1 Unpacking Information CHECK liStiu iicariiinai a a id Product Guide 2 General Description Hardware Description
87. l lt noauth auth authpriv gt specifies the security level e g no snmp access test usm auth show snmp access Show access list 4 0 4 2 4 SNMP V3 USM optional snmp engine id lt enterprise id gt lt engine id gt Setup SNMPv3 engine ID Parameters lt engine id gt specifies the engine ID in the format of text string e g snmp engine id 1234567891 234567891 23456 show snmp engine id Show SNMPv3 engine ID snmp usm user lt user name gt lt md5 none gt Add SNMPv3 USM user Parameters lt user name gt specifies the user name lt md5 none gt specifies the authentication type e g Create a user name is testuser and password is 12345678 use auth md5 then enter CLI command snmp usm user testuser md5 lt cr gt New password for authentication 8 lt length lt 32 12345678 lt cr gt Retype new password 12345678 lt cr gt no snmp usm user lt user name gt Delete SNMPv3 USM user Parameters lt user name gt specifies the user name e g no snmp usm user testuser 49 a EA We connect your business show snmp usm user Show all SNMPv3 USM users 4 0 4 3 IGMP The Internet Group Management Protocol IGMP is an internal protocol of the Internet Protocol IP suite no igmp Enable disable IGMP snooping no igmp fastleave Enable disable IGMP snooping fast leave If enable switch will fast delete member who send leave report else wait one second no igmp querier Enable
88. luctuation The best way to resolve this problem is to upgrade these devices to versions which support auto negotiation Cabling 1 Verify that the cable type is correct Be sure RJ 45 cable connectors are securely seated in the required ports Use 1000 straight through cables for all standard connections Use Category 5 cable for 100Mbps Fast Ethernet connections or Category 3 4 or 5 cables for standard 10Mbps Ethernet connections 2 Make sure all devices are connected to the network Equipment any have been unintentionally disconnected from the network 3 When cascading two devices using RJ 45 station ports at both ends of the cable i e an Auto MDIX port if supports a auto MDIX used crossover cable is not need External Adapters Make sure the network interface hardware and software drivers for the attached devices are functioning properly Check the adapter cards and associated drivers used in any attached workstation or server Physical Configuration If problems occur after altering the network configuration restore the original connections and try to track the problem down by implementing the new changes one step at a time Ensure that cable distances and other physical aspects of the installation do not exceed recommendations System Integrity As a last resort verify the switch integrity with a power on reset Turn the power to the switch off and then on several times If the problem still persists and you have completed all
89. ly in FEXT dominated noise environment Strong FEXT generated by short loops can significantly degrade the performance of long loops if UPBO is not applied On the other hand UPBO reduces the transmit power of short loops and thus degrades their performance as well The UPBO technique should take in account both issues e Downstream Power Back Off DPBO The development of Triple Play services requires higher bandwidth Higher bandwidth and substantial performance gain can be reached by deploying DSLAM s in a remote side cabinet near to the customer premises There is no problem at clean networks where all the customers are 4 z RURY EA We connect your business e IA IECH connected to the same local cabinet Single Ended loop test SELT The most convenient tests to perform are those that only require connection to one end of the line because only one tester is required and one person is required and no travelling needs to be done Some tests require the line to be correctly terminated and it may be possible to set the installed equipment eg modem to do this without having to go to the end of the line Trellis modulation The name trellis was coined because a state diagram of the technique when drawn on paper closely resembles the trellis lattice used in rose gardens The scheme is basically a convolutional code of rates r r 1 Ungerboeck s unique contribution is to apply the parity check on a per symbol basis instea
90. ness 4 4 Access Control List Check 2010 10 19 verify Packets can be forwarded or dropped by ACL rules include IPv4 or non lpv4 NV802S can be used to block packets by maintaining a table of packet fragments indexed by source and destination IP address protocol and so on Grouptd 1 220 Action Permit y VoIP VAN 6 Any VID 1 fi 1 4094 Any means Vid 0 if uses binding Mask 255 255 255 255 Value Hex O 1F Hex O 1F Em me nas eroan any zl Protocol ID any zl Bong Value Hex O FFFF Mask Hex O FFFF Source Port o KIT any 1p unn zo Any y Types Jon 1 22 33 44 55 Ca UDP any y Porte Deg alue Hex O FFFF Mask Hex O FFFF Destination Port f ca Mask 255 255 255 255 A ger Ea 0 0 0 0 Priority P Fig 4 4a Access Control List There are 2 main ACL rule types to setup Packet Type IPv4 and Non IPv4 and Binding SIP SMAC Port Portid fo 1 26 0 don t care ENABLE_ gid 1 _permit_ v A _ siptany diptany dam fro uncheck portid any octetent 22565 packetcnt 37 Dell Enable Disable ResetHitCount Help Fig 4 4b Access Control List Enable Disable ACL rule Select an ACL entry which you want to enable disable in the Current List Then click Enable Disable to execute Reset ACL count Select an ACL entry which you want to reset its counts octetent and packetcent fields in the Current List Th
91. net for remote management e Support SNMP v1 v2 v3 RFC 1493 bridge MIBs RFC 1643 Ethernet MIB RFC 1213 MIBII e Support RMON groups 1 Statistics 2 Alarm 3 Event 9 History Support HTTP TFTP for firmware upgrade e Support In Band Out of Band management e Support L2 L3 4 access control list ACL e Support DHCP client and Relay 8 Option 82 e Supports LLDP Link Layer Discovery Protocol protocol e Supports surge protection and splitter on board e Internal switching power adapter Input AC 85 265 volts 50 60Hz 1A e Rack mount size 19 1U e Dimensions 435 x 255 x 44 mm e Operating Temperature 0 C 50 C 32 F 122 F Storage Temperature 20 C 70 C 4 F 158 F Humidity 10 90 non condensing EMI by FCC CE Class A e Power Consumption Max 37W 2 General Description Hardware Description This section describes the important parts of the IP DSLAM It features the front and rear panel drawings LEDs connectors and IP DSLAM 13 Front Panel The following figure shows the front panel 1 VDSL2 Ports L1 L8 4 SFP Small Fiber Optic 2 POTS Ports L1 L8 5 Console 115200 bps 3 RJ 45 Gigabit Port 9 10 6 Reset button Figure Chapter 2 1 Front Panel description 4 2 3 1 PWR Power LED light 4 8 X100Mbps VDSL2 ports 8 x POTS splitters 2 X1G auto link RJ 45 or SFP Transceivers Console port RS 232 Reset Button 5 6 eS Fe Bae wH
92. ng jumbo frames are Ethernet frames with more than 1500 bytes of payload Conventionally jumbo frames can carry up to 9000 bytes of payload but variations exist and some care must be taken when using the term 1 a mY if D i Y KUDI EA We connect your business EA The original 1500 byte payload size for Ethernet frames was used because of the high error rates and low speed of communications Thus if one receives a corrupted packet only 1500 bytes plus 18 bytes for the frame header and other overhead must be re sent to correct the error However each frame requires that the network hardware and software process it If the frame size is increased the same amount of data can be transferred with less effort This reduces CPU utilization mostly due to interrupt reduction and increases throughput by allowing the system to concentrate on the data in the frames IEEE 802 1q Q in Q VLAN for performance amp security The VLAN feature in the switch offers the benefits of both security and performance VLAN is used to isolate traffic between different users and thus provides better security Limiting the broadcast traffic to within the same VLAN broadcast domain also enhances performance VLAN support enabling advanced techniques such as 802 1Q in 1Q to be deployed And support GVRP up to 4k V Lan groups IEEE 302 1x port base network access control this function for wireless users connecting Authentication Spanning tree Support
93. ng the LLDP hold time and hello time Note that the TTL can be up to 65535 seconds TTL longer than it will be rounded off to 65535 seconds The following figure is an example of LLDP connection Switch A Switch B with LLDP with LLDP Bam 4 25 LLDP packets LLDP Example LLDP Commands no Ildp Enable Disable LLDP global option 55 a EA We connect your business lldp hello time lt 5 32768 gt Set LLDP hello time which is the time interval between the transmission LLDP info packets The range is from 5 to 32768 seconds Default is 30 seconds lldp hod time lt 2 10 gt Set LLDP hold time The range is from 2 to 10 Default is 4 lldp port lt rx tx both gt lt PORT LIST gt Set LLDP port based receive and transmit packet mode Parameters lt rx tx both gt rx the port only receive LLDP packets tx the port only transmit LLDP packets both the port can receive and transmit LLDP packets lt PORT LIST gt specifies the ports to be set If not specified all ports are set no Ildp port lt PORT LIST gt Disable LLDP port based receive and transmit packet mode Parameters lt PORT LIST gt specifies the ports to be set If not specified all ports are set show Ildp Show the LLDP global option all the ports configuration and the neighbor s information show Ildp port lt PORT LIST gt show LLDP port configuration and the neighbor s information Parameters lt PORT LIST gt specif
94. nn cnn cnn 4 5 2 2 MisSc e ue UTC csicsa i a R tan 4 6 0 005 Configuration EE 4 6 1 Per Port Conttguratton cc nc cnn 47 bilt el e BE 4 7 0 Gen SE TEE 4 7 1 Port EE EE AS sieis uuan a aaae aaae aa eaae a a a aaa aaa a a alle eve be eat stim a aa aAA A Aa deus aa Oaa aaaea aaa aaa ai 4 9 ReDOO tdci GR DS EE Prot e Tu e E 5 2 Channel Con EE a EA We connect your business 3 CRAM ESIE aU ii IRA 5 4 SNR A A A a 5 5 Activate Geesse ee ee Eege Ee nl EE re A A aia 5 9 VDSL2 Version Info iii ii A Appendix A Troubleshooting session Diagnosing Switch INdICA OFS s in anana dae pea sia Sa cvsduusuuvvebduadeuusauwavesawevvadeue AAAH EARRANN System Integrity viii iia A eva cue E E A A EL ALA FCC NN ee Nett DN EE EE 11 EA We connect your business ak LIECH 1 Unpacking Information Check list Carefully unpack the package and check its contents against the checklist Package Contents 1 NV 802S Intelligent VDSL2 IP DSLAM 8xVDSL2 Ports RJ45 2x1000Mbps auto link RJ 45 SFP Port 2 Users manual CD 3 AC Power Cord 4 2x Rack Mounting Brackets 5 4x Screws 6 4x Plastic feets Please inform your dealer immediately for any missing or damaged parts If possible retain the carton including the original packing materials Use them to repack the unit in case there is a need to return for repair Product Guide 8Ports VDSL2 Managed IP DSLAM CONSOLE 2 ports 10 100 1000 Mbps Ethernet plus 8 ports 100 Mbps V
95. o confirm save the settings then the switch reboot must be done to activate the updates The IP address can be statically set or dynamically be assigned by enabling DHCP option NOTE If any of the value is changed in this field reboot is necessary 63 amp ER We connect your business IP Address Setting DHCP Disable v 192 168 16 243 255 255 255 0 192 168 16 1 Fig 4 2 0 IP Address Setting 4 2 1 Switch Setting 4 2 1 0 Basic All information in Basic page is all read only user can t modify the contents Model name Display the switch s model name Description Display the name of device type MAC Address The unique hardware address assigned by manufacturer default Firmware version Display the switch s driver firmware version Web Interface version Display the switch s web interface firmware version Switch Setting Basic a Module Info Misc Config VS 840S 8 Ports VDSL2 2G TX FX Combo Managed IP DSLAM 00 05 6E 00 65 30 2 08 Fig 4 2 1 0 Switch Setting 64 a w Y We connect your business yr 4 2 1 2 Module Info All information in this field is read only user can t modify its contents It is only to display the module port information TYPE DESCRIPTION 8 GIGA COMBO 8 GIGA COMBO Basic Fig 4 2 1 2 Module Info 4 2 1 3 MISC CONFIG Basie Module mto eran MAC Table Address Entry Age Out Time seconds 6 1572858 must multiple of 6 defaul
96. ommunity lt community str gt Delete SNMP community string Parameters lt community str gt specifies the community string e g no snmp community public show snmp community Show SNMP community strings 4 0 4 2 2 Trap Managers snmp trap lt ip addr gt lt community str gt lt 1 65535 gt Set SNMP trap receiver IP address community string and port number Parameters lt ip addr gt specifies the IP address lt community str gt specifies the community string lt 1 65535 gt specifies the trap receiver port number e g snmp trap 192 168 200 1 public no snmp trap lt ip addr gt lt 1 65535 gt Remove trap receiver IP address and port number Parameters lt ip addr gt specifies the IP address lt 1 65535 gt specifies the trap receiver port number e g no snmp trap 192 168 200 1 show snmp trap Show all trap receivers 4 0 4 2 3 SNMP V3 VACM optional snmp group lt group name gt lt v1 v2c usm gt lt security name gt Join a group Parameters lt group name gt specifies the group name lt v1 v2c usm gt specifies the security model lt security name gt specifies the security name e g snmp group test usm testuser 47 a ER We connect your business no snmp group lt v1 v2c usm gt lt security name gt Leave a group Parameters lt v1 v2c usm gt specifies the security model lt security name gt specifies the security name e g no snmp group
97. opy tftp firmware lt ip addr gt lt remote file gt Download firmware from TFTP server Parameters lt ip addr gt specifies the IP address of the TFTP server lt remote file gt specifies the file to be downloaded from the TFTP server 4 0 8 1 Restore Configure File copy tftp lt running config flash gt lt ip addr gt lt remote file gt Retrieve configuration from the TFTP server If the remote file is the text file of CLI commands use the keyword running config If the remote file is the configuration flash image of the switch instead use the keyword flash Parameters lt ip addr gt specifies the IP address of the TFTP server lt remote file gt specifies the file to be downloaded from the TFTP server 4 0 8 2 Backup Configure File Send configuration to the TFTP server If you want to save the configuration in a text file of CLI commands use the keyword running config If you want to save the configuration flash image instead use the keyword flash Parameters lt ip addr gt specifies the IP address of the TFTP server lt remote file gt specifies the file to be backed up to the TFTP server 4 0 9 Access Control List Packets can be forwarded or dropped by ACL rules include IPv4 or non IPv4 packets This switch can be used to block packets by maintaining a table of packet fragments indexed by source and destination IP address protocol and so on NOTE This function is available only in the 802 1q VLAN ena
98. p id 1 220 null means all valid groups e g show bind 1 61 a EA We connect your business bind add lt group id gt A B C D E F lt 0 4094 gt A B C D lt 1 26 gt Add Binding group Parameters lt group id gt specifies the group id 1 220 1st A B C D specifies the MAC address lt 0 4094 gt specifies the VLAN id 0 means don t care 2nd A B C D specifies the Source IP address 0 0 0 0 means don t care 3rd A B C D specifies the IP Address lt 1 26 gt specifies the Port id e g bind add 1 00 11 22 33 44 55 0 192 168 1 1 1 This Binding rule will permit all packet cross switch from device s IP is 192 168 1 1 and MAC is 00 11 22 33 44 55 and this device connect to switch port id 1 4 1 Remote Network Management IP Setting You must setup the IP Address with the local serial console port RS 232 Port and then you can use this IP address to control this Ethernet Switch by Telnet and WEB Or you can change your computer s IP domain same with Ethernet Switch Then use the default IP address to control this Switch 1 Remote control by Telnet To enter Telnet type the IP address of the Ethernet Switch to connect management system And type User name and password Default User Name admin Default Password 123 Note 1 For security concern we limit the user log in number on Telnet and Console port So you can t log in Telnet and Console port at the same time But you can log in Telnet and Console port
99. plied the last parameter must be port list Otherwise it must be port id show smac address table Display secondary MAC address table entries show smac address table multicast Display multicast related secondary MAC address table no filter lt mac addr gt lt vlan id gt Set MAC address filter The packets will be filtered if both of the destination MAC address and the VLAN tag matches the filter entry If the packet does not have a VLAN tag then it matches an entry with VLAN ID 1 show filter Display filter MAC address table 4 0 3 8 MAC Limit MAC limit allows users to set a maximum number of MAC addresses to be stored in the MAC address table The MAC addresses chosen to be stored in MAC address table is the result of first come first save policy Once a MAC address is stored in the MAC address table it stays in until itis aged out When an opening is available the switch stored the first new MAC address it sees in that opening All packets from MAC addresses not in the MAC address table should be blocked User can configure the MAC limit setting and fill in the new value mac limit Enable MAC limit no mac limit Disable MAC limit Mac limit lt port list gt lt 1 64 gt Set port MAC limit value O to turn off MAC limit of port show mac limit Show MAC limit information including MAC limit enable disable per port MAC limit setting 39 a EA We connect your business 4 0 4 Protocol Related Con
100. porary link is set up between the switch ports which need to pass this traffic via the high speed switching fabric 124 a EA We connect your business Flexible Configuration This Switch is not only designed to segment your network but also to provide a wide range of options in setting up network connections It can be used as a simple stand alone switch or can be connected with standard hub switches or other network interconnection devices in various configurations Some of the common applications for the Switch are described in this chapter Switch Used as Collapsed Backbone for Starter Network This Switch is an excellent choice for new Ethernet installations where significant growth is expected in the near future You can easily build on this basic configuration adding direct full duplex connections to workstations or servers i e up to 20 Mbps or even 200 Mbps of dedicated bandwidth per node Then when the time comes for further expansion just daisy chain any IEEE 802 3 or IEEE 802 3u compliant switch or hub This Switch can also be easily integrated with upper level protocol devices you later add into the network Used as apartment for Internet access The Intelligent VDSL2 IP DSLAM provides a high speed 100Mbps transmission over phone wiring over a single Internet account to provide simultaneous independent Internet access to multiple users Projekt VDSL2 DSLAM 200 Mbit s voll duplex LAN Verbindung Ober bestehende Tele
101. port priority lt 0 240 gt lt port list gt Set spanning tree port priority Parameters lt 0 240 gt specifies the port priority The value must be in steps of 16 lt port list gt specifies the ports to be set Null means all ports show spanning tree Show spanning tree information show spanning tree port lt port list gt Show spanning tree per port information Parameters lt port list gt specifies the port to be shown Null means all ports The remaining commands in this section are only for system with RSTP rapid spanning tree 802 1w capability no spanning tree debug Enable or disable spanning tree debugging information spanning tree protocol version lt stp rstp gt Change spanning tree protocol version Parameters stp specifies the original spanning tree protocol STP 802 1d rstp specifies rapid spanning tree protocol RSTP 802 1w no spanning tree port mcheck lt port list gt Force the port to transmit RST BPDUs No format means not force the port to transmit RST BPDUs Parameters lt port list gt specifies the ports to be set Null means all ports no spanning tree port edge port lt port list gt Set the port to be edge connection No format means set the port to be non edge connection Parameters lt port list gt specifies the ports to be set Null means all ports no spanning tree port non stp lt port list gt Disable or enable spanning tree protocol on
102. pressed in MHz DPBOESCMA DPBOESCMB DPBOESCWC shall be coded as unsigned integers representing a scalar value from 1 coded as 0 to 1 5 coded as 640 in step of 2 8 All values are valid MUS Minimum Usable Signal DPBOMUS DPBOMUS defines the assumed Minimum Usable receive Signal PSD in dBm Hz for exchange based services used to modify parameter DPBOFMAX defined below It shall be 122 a EA We connect your business coded as an unsigned integer representing a PSD level from 0 dBm Hz to 127 dBm Hz All values are valid MinFreq Minimum Frequency DPBOFMIN DPBOFMIN defines the starting frequency from which the DPBO shall be applied It shall be coded as a 16 bits unsigned integer representing a start frequency in multiple of 4 3125 KHz The range of valid values is from 0 to 2048 MaxFreq Maxmum Frequency DPBOFMAN DPBOFMAX defines the maximum frequency at which DPBO may be applied It shall be coded as a 16 bits unsigned integer representing a start frequency in multiple of 4 3125 KHz The range of valid values is from 0 to 2048 5 7 UPBO The page to configure VDSL2 Upstream Power BackOff Config This parameter defines the UPBO reference PSD used to compute the upstream power backoff for each upstream band except USO VDSL2 Upstream Power BackOff Confi Poti bo B Port3 0 2461 0 1481 0 0 o Disable v Disable v
103. r Description BO The contribution of the path through this port when the port is the root port to the ath Cost totalcost of the path to the root for this bridge Value range lt 1 200000000 gt You can make it more or less likely to become the root port the lowest number has Port Priority thehighest priority Value range lt 0 240 gt the value must be in steps of 16 Default value is 28 You can choose the value of YES if you want the port to be edge port If the port is Admin Edge edgeport when the port becomes a Designated Port it can rapidly transition to the Forwarding Port State Value range lt NO YES gt Default value is NO Admin If you want to disable spanning tree protocol on the port you can choose the value of Non STP YES to this port Value range lt NO YES gt Default value is NO If you want point to point link auto detection on the port you can choose the value of AUTO to this port If you want point to point link of the port always be true you can Admin P2P choose the value of YES to this port If you want point to point link of the port always be false you can choose the value of NO to this port Value range lt AUTO NO YES gt Default value is AUTO 4 3 5 DHCP Relay and Option 82 The Relay Agent Information option Option82 is inserted by the DHCP relay agent when forwarding client originated DHCP packets to a DHCP server RFC 3046 Servers recognizing the Relay Agent Informa
104. requests and replies between clients and servers when they are not on the same physical subnet Relay agent forwarding is different from the normal Layer 2 forwarding in which IP datagrams are switched transparently between networks Relay agents receive DHCP messages and generate new DHCP messages to send on output interfaces So DHCP server can provide IP addresses to clients spanning multiple subnets instead of deploying a DHCP server on every subnet The following figure is an example of DHCP relay DHCP Server Switch with DHCP Client 2 1 1 1 24 DHCP Relay 10 0 0 5 24 1 e E An example of DHCP Relay The following commands are provided for DHCP option82 relay configuration no dhcp option82 Enable disable DHCP option82 function no dhcp relay Enable disable DHCP relay function 53 a EA We connect your business dhcp option82 lt enable disable gt lt LIST gt Enable disable port based option82 function dhcp relay lt enable disable gt lt LIST gt lt IP address gt Enable disable port based DHCP relay function dhcp router lt LIST gt Set DHCP router port show dhcp configuration Show DHCP configuration information For example refer to the figure of DHCP option 82 in the previous page use the following commands to achieve dhcp option82 dhcp router 18 dhcp option82 enable 12 Refer to the example figure of DHCP relay application use the following commands to achieve dhcp relay
105. rn off MAC limit MAC Limit Port Status Port Number mp Portl off Port2 off Porta off Port4 off Port5 off Dort off Port off Ports off Porto off Fig 4 5 1 MAC Limit MAC Limit enable disable MAC limit function Limit select port number and input Limit value 0 64 O to turn off MAC limit Click Apply to activate the setting 4 5 2 802 1x Configuration 802 1x makes use of the physical access characteristics of IEEE 802 LAN infrastructures in order to provide a means of authenticating and authorizing devices attached to a LAN port that has point to point connection characteristics and of preventing access to that port in cases in which the authentication and authorization process fails In the beginning 802 1x configuration page is disabled because 802 1x is disabled in default To enable 802 1x go to Administration gt Switch setting gt Misc Configs page to enable the 802 1x protocol field After clicked Apply the 802 1x configuration page will be shown up 110 a ER We connect your business 4 5 2 0 System Configuration In this page the parameters related to authentication Radius server are provided 802 1x Configuration System Configuration PerPort Configuration Misc Configuration Configure 802 1x Parameters 192 168 221 72 1812 1813 NAS_L2_SWITCH Fig 4 5 2 0 System Configuration Radius Server IP the IP address of the authentication server Server Por
106. root for this bridge Value range lt 1 65535 gt You can make it more or less likely to become the root port the lowest number has the Port Priority highest priority Value range lt 0 240 gt the value must be in steps of 16 Default value is128 94 a a Ed We connect your business vet 4 3 4 1 MSTP system The Multiple Spanning Tree Protocol MSTP is a standardized method IEEE 802 1S for providing simple and full connectivity for frames assigned to any given VLAN throughout a Bridged Local Area Network comprising arbitrarily interconnected Bridges each operating MSTP STP or RSTP MSTP allows frames assigned to different VLANs to follow separate paths each based on an independent Multiple Spanning Tree Instance MSTI within Multiple Spanning Tree MST Regions composed of LANs and or MST Bridges These Regions and the other Bridges and LANs are connected into a single Common Spanning Tree CST You can enable MSTP on web management s switch setting advanced item select enable MSTP We are recommended that you enable MSTP on all switches ensures a single active path on the network You can view MSTP information about the CIST Root Bridge Such as following screen Root Bridge Information 32768 00 00 24 15 17 67 0 0 20 2 15 Fig 4 3 4 2a MSTP system You can view MSTP CIST port status about the switch Such as following screen 95 amp ER We connect your business STP Port Status
107. se the secure port Enter the settings and then click Apply to change on this page BSF User can disable Enable port broadcast storm filtering option by port The filter mode and filter packets type can be select in Switch Setting gt Misc Config page Jumbo Frame User can disable Enable port jumbo frame option by port When port jumbo frame is enable the port forward jumbo frame packet 4 2 3 1 Port Sniffer The Port Sniffer mirroring is a method for monitor traffic in switched networks Traffic through a port can be monitored by one specific port That is traffic goes in or out a monitored port will be duplicated into sniffer port 68 a ER We connect your business Sniffer Type Select a sniffer mode Disable Rx Tx Both Analysis Monitoring Port It means Analysis port can be used to see the traffic on another port you want to monitor You can connect Analysis portto LAN analyzer Monitored Port The port you want to monitor The monitor port traffic will be copied to Analysis port You can select one monitor ports in the switch User can choose which port that they want to monitor in only one sniffer type NOTE 1 The Analysis port is dedicated for monitoring usage That is the ordinary port function will be unavailable 2 If you want to disable this function you must select monitor port to none Port Sniffer Port Port2 Port3 Port4 Ports Port6 Port Ports Port9 Port10 Fig 4 2 3 1 Port Sn
108. sent is depending on arrive orders This mode can be regarded as QoS is disabled All High before Low The high priority packets sent before low priority packets WRR Weighted Round Robin Select the preference given to packets in the switch s high priority queue These options represent the number of higher priority packets sent before one lower priority packet is sent For example 8 Highest 4 second high means that the switch sends 8 highest priority packets before sending 4 second high priority packets QoS Priority 8 level 0 7 priority can be mapped to 4 level Highest Second High Second Low Lowest queue 113 a ER We connect your business 4 6 1 Per Port Configuration Per port priority can be configured and shown in this page Configure Port Priority Disable x fan Fig 4 6 1a Per Port Configuration Port Number the ports in the switch Port Priority port priority can be disable or 0 7 Per Port priority setting can be displayed like the following figure Port Priority PortNum men Port1 Disable Port2 Disable Port3 Disable Port4 Disable Ports Disable Port6 Disable j Port Disable Ports Disable Port9 Disable Port10 Disable Fig 4 6 1b Per Port Configuration 114 a EA We connect your business 4 7 Monitoring The following items are provided in Monitoring section e Port status e Port statistics 4 7 0 Port Status This page provi
109. such as a optical fiber converter workstation or server or also to a network interconnection device such as a bridge or router depending on the port type implemented 17 a EA We connect your business 2 Prepare the network devices you wish to network Make sure you have installed VDSL2 CPE Modem making a connection to any of the IP DSLAM 1 8 station ports You also need to prepare 24 26 gage phone wire with RJ11 plugs at both ends 3 Connect one end of the cable to the RJ 45 port of the network interface card and the other end to any available 9 10 station port on the IP DSLAM Every port support either 10 100 1000 Mbps connections When inserting an RJ 45 plug be sure the tab on the plug clicks into position to ensure that it is properly seated Notes 1 Be sure each twisted pair cable RJ 45 is not over by 100 meters 328 feet 2 We advise using Category 5 cable for Cable Modem or router connections or to attach to any high bandwidth device to avoid any confusion or inconvenience 4 Management Configuration 4 0 In Band Management Console port RS 232 Configuration You can configure the product with the local serial console port If one of the Ethernet port is not in use you can disable it that procedure is to connect a notebook computer to the RS 232 port then boot windows 98 ME 2000 XP Vista system and run Hyper terminal program into terminal window and setup step are as follow COM1 Properties K l
110. t The UDP port number used by the authentication server to authenticate default 1812 Accounting Port The UDP port number used by the authentication server to retrieve accounting information default 1813 Shared Key A key shared between this switch and authentication server NAS Identifier A string used to identify this switch 4 5 2 1 Perport Configuration In this page you can select the specific port and configure the authorization state There are 4 kinds of authorization state to provide for each port Configure 802 1x Per Port State Fig 4 5 2 1 Perport Configuration 111 a EA We connect your business Fu Force the specific port to be unauthorized Fa Force the specific port to be authorized Au The state of the specific port was determined by the outcome of the authentication No The specific port didn t support 802 1x function 4 5 2 2 Misc Configuration In this page you can change the default configuration for the 802 1x standard 802 1x Configuration System Configuration PerPort Configuration Misc Configuration Configure 802 1x misc configuration Fig 4 5 2 2 Misc Configuration Quiet Period Used to define periods of time during which it will not attempt to acquire a supplicant default time 60 seconds Tx Period Used to determine when an EAPOL PDU is to be transmitted Default value is 30 seconds Supplicant Timeout Used to determine timeo
111. t is 300s Turn On Port Interval lo seconds 0 3600 seconds interval time between turning off and turning on port for flooding CPU port O disable Broadcast Storm Filter Mode Broadcast Storm Filter Packet select Obroadcast Packets CUIP Multicast O control Packets C Flooded Unicast Multicast Packets Collisions Retry Forever 16 v Hash Algorithm IP MAC Binding 802 1x Protocol Fig 4 2 1 3 MISC CONFIG MAC Address Age out Time Type the number of seconds that an inactive MAC address remains in the switch s address table The valid range is 6 1572858 seconds Default is 300 seconds The value is a multiple of 6 65 a ER We connect your business Turn on Port Interval while flooding CPU port at the speed of 4MB s or larger system will close relative port And system will open this port using this interval value 0 represents system will never enable this after close it for flooding CPU Broadcast Storm Filter Mode To configure broadcast storm control enable it and set the upper threshold for individual ports The threshold is the percentage of the port s ingress bandwidth used by broadcast traffic When broadcast traffic for a port rises above the threshold you set broadcast storm control becomes active The valid threshold value are 1 2 1 4 1 8 1 16 and off Broadcast Storm Filter Packets Select To select broadcast storm Filter Packets type lf no packets type by selected mean can not filter any pack
112. t packets from the queues according to the ratio The default value of QoS mode is weight 8 4 2 1 That means the switch will first exhaust 8 packets from the queue with highest priority and then exhaust 4 packets from the queue with second high priority and so on When the switch received a packet the switch has to decide which queue to put the received packet into In NV802S the switch will put received packets into queues according to the settings of 802 1p Priority and Static Port Ingress Priority When the received packet is an 802 1p tagged packet the switch will put the packet into a queue according to the 802 1p Priority setting Otherwise the switch will put the packet into a queue according the setting of Static Port Ingress Priority 36 a EA We connect your business 802 1p Priority the 802 1p packet has a priority tag in its packet header The range of the priority is 7 0 The NV802S can specify the mapping between 802 1p priority and the four transmission queues In the default setting the packets with 802 1p priority O 1 are put into the queue with lowest priority the packets with 802 1p priority 2 3 are put into queue with second low priority and so on Static Port Ingress Priority each port is assigned with one priority 7 0 The priority of the packet received from one port is set to the same priority of the receiving port When the priority of the received packet was determined the packet is treated
113. t port list gt Set unicast or multicast per VLAN default flooding portmask show per vlan flooding portmask Display unicast and multicast per VLAN default flooding portmask table 4 0 3 Switch Static Configuration 4 0 3 0 Port Configuration and Status port state lt on off gt lt port list gt Turn the port state on or off Parameters lt port list gt specifies the ports to be turn on or off If not entered all ports are turn on or off 21 a ER We connect your business port nego lt force auto nway force gt lt port list gt Set port negotiation Parameters lt port list gt specifies the ports to be set If not entered all ports are set port speed lt 10 100 1000 gt lt full half gt lt port list gt Set port speed in mbps and duplex Parameters lt port list gt specifies the ports to be set If not entered all ports are set port flow lt enable disable gt lt enable disable gt lt port list gt Enable or disable port flow control Parameters 1st lt enable disable gt enables or disables flow control in full duplex mode 2nd lt enable disable gt enables or disables flow control in half duplex mode lt port list gt specifies the ports to be set If not entered all ports are set port rate lt ingress egress gt lt 0 8000 gt lt port list gt Set port effective ingress or egress rate Parameters lt 0 8000 gt specifies the ingress or egress rate lt 0
114. tch supports multicast IP one can enable IGMP protocol on web management s switch setting advanced page then display the IGMP snooping information in this page you can view difference multicast group VID and member port in here IP multicast addresses range from 224 0 0 0 through 239 255 255 255 88 a ER We connect your business IGMP Snooping 239 255 255 250 nan lavan led 224 000 000 251 ti DU 224 000 000 009 Sara Un ee aie a 224 000 001 024 A jennie Fig 4 3 3 0 IGMP Snooping The Internet Group Management Protocol IGMP is an internal protocol of the Internet Protocol IP suite IP manages multicast traffic by using switches routers and hosts that support IGMP Enabling IGMP allows the ports to detect IGMP queries and report packets and manage IP multicast traffic through the switch IGMP have three fundamental types of message as follows Message Description A message sent from the queries IGMP router or switch asking for a response from each host belonging multicast Query group A message sent by a host to the queries to indicate that the host wants to be or is a member of a given group indicated Report in the report message Leave Group A message sent by a host to the queries to indicate that the host has quit being a member of a specific multicast group IGMP protocol Enable disable IGMP snooping IGMP fast leave Enable disable IGMP snooping fast leave If enable swi
115. tch will fast delete member who send leave report else wait one second IGMP Querier Enable disable IGMP snooping querier If select disable the switch can t send query report Attention Do Not use Port based VLAN and IGMP snooping at the same time 4 3 3 1 Dynamic MAC Address The switch will dynamically learn the device s MAC address when it corresponding with the switch MAC address will be stored in MAC address table Dynamic MAC Table shows the MAC addresses learned by the switch The table will be shown by pages if larger than 500 MAC Addresses 89 a EA We connect your business Forwarding and Filtering Dynamic MAC Table Static MAC Table MAC Filtering Click Clear will clear Dynamic addresses from the switch Dynamic addresses currently learned on the switch are listed below 1 00 24 8C 12 15 82 10 128 Dynamic 2 00 26 54 79 76 CE 10 128 Dynamic 3 00 40 F4 49 EF 9F 10 128 Dynamic Ge 00 1B FC 0E 2C 45 10 128 Dynamic 5 00 50 7F 4D 15 28 10 128 Dynamic There are total 3 Mac Adresses Fig 4 3 3 1 Dynamic MAC Address Click Clear to clear Dynamic MAC address table Click Top to show the first page of MAC address table Click Prev to show the previous page of MAC address table If there is nothing to shown or NO is 1 it is the first page Click Next to show the next page of MAC address table If there is nothing to shown it is the end page 4 3 3 2 Static MAC Table When you add a static MAC address it perm
116. th some description of the keywords Switch config copy tftp running config Running configurations flash Flash configurations firmware Download firmware You may use the lt Tab gt key to do keyword auto completion Switch config copy tftp r lt Tab gt Switch config copy tftp running config 20 a ER We connect your business You do not need to type in the entire commands you only need to type in enough characters for the CLI to recognize the command as unique The following example shows you how to enter the show running config command Switch config sh ru 4 0 2 System Commands show running config Display the running configuration of the switch copy running config startup config Backup the switch configurations erase startup config Reset to default factory settings at next boot time clear arp lt ip addr gt Clear entries in the ARP cache Parameters lt ip addr gt specifies the IP address to be cleared If no IP address is entered the entire ARP cache is cleared show arp Show the IP ARP translation table ping p addr lt 1 999 gt Send ICMP ECHO_REQUEST to network hosts Parameters lt 1 999 gt specifies the number of repetitions If not entered it will continue to ping until you press lt Ctrl gt C to stop no per vlan flooding portmask Enable or disable per VLAN default flooding portmask per vlan flooding portmask lt unicast multicast gt lt v an id gt l
117. this port Parameters lt port list gt specifies the ports to be set Null means all ports 41 a EA We connect your business spanning tree port point to point mac lt auto true false gt lt port list gt Set the port to be point to point connection Parameters auto specifies point to point link auto connection true specifies point to point link true false specifies point to point link false lt port list gt specifies the ports to be set Null means all ports 4 0 4 1 MSTP no spanning tree Enable or disable multiple spanning tree no spanning tree debug Enable or disable multiple spanning tree debugging information spanning tree forward delay lt 4 30 gt Set spanning tree forward delay of CIST in seconds Parameters lt 4 30 gt specifies the forward delay in seconds Default value is 15 Note The parameters must enforce the following relationships 2 hello time 1 lt maximum age lt 2 forward delay 1 spanning tree hello time lt 1 10 gt Set spanning tree hello time of CIST in seconds Parameters lt 1 10 gt specifies the hello time in seconds Default value is 2 Note The parameters must enforce the following relationships 2 hello time 1 lt maximum age lt 2 forward delay 1 spanning tree maximum age lt 6 40 gt Set spanning tree maximum age of CIST in seconds Parameters lt 6 40 gt specifies the maximum age in seconds Default value is
118. thorized au specifies authorization no specifies disable authorization lt port list gt specifies the ports to be set show dot1x port Show 802 1x per port information 4 0 4 5 DHCP Relay amp Option 82 DHCP is widely used in LAN environments to dynamically assign host IP addresses from a centralized server which significantly reduces the overhead of administration of IP addresses DHCP also helps conserve the limited IP address space because IP addresses no longer need to be permanently assigned to hosts When the DHCP Option 82 feature is enabled on the switch a subscriber device is identified by the switch port through which it connects to the network in addition to its MAC address Multiple hosts on the subscriber LAN can be connected to the same port on the access switch and are uniquely identified Option82 Information is inserted by the switch enabled option 82 feature when forwarding client originated DHCP packets to a DHCP server RFC 3046 Servers may use this information to implement IP address or other parameter assignment policies This will significantly enhance the security of DHCP and effectively prevent the attack of DHCP flood 52 The following figure is an example of DHCP Option 82 DHCP Server Switch with DHCP Client 2 1 1 1 24 DHCP option 82 2 1 1 5 24 a Lee Port DHCP packet Option 82 An example of DHCP Option 82 If the DHCP relay feature is enabled on the switch it forwards
119. tion option may use the information to implement IP address or other parameter assignment policies The DHCP Relay can forward the DHCP broadcast packets to a DHCP server in a different subnet RFC 1542 So DHCP server can provide IP addresses to clients spanning multiple subnets instead of deploying a DHCP server on every subnet 4 3 5 0DHCP Option82 To enable DHCP option82 function need to enable global option82 and special port option82 Then select DHCP router port 98 amp ER We connect your business DHCP Relay 8 Option 82 Fig 4 3 5 0DHCP Option82 4 3 5 1 DHCP Relay To enable DHCP relay function need to enable global dhcp relay and special port dhcp relay Then select DHCP router port DHCP Relay amp Option 82 Disable v Enable v Fig 4 3 5 1 DHCP Relay 99 a ER We connect your business 4 3 6 LLDP This switch supports LLDP Link Layer Discovery Protocol function Please refer to the section 4 3 7 which has descriptions about the LLDP function and operation in console Here is the web UI to configure this function 4 3 6 0 LLDP Configuration This page is to provide the global parameters for LLDP for configuration Configure LLDP Parameters Enable v 100 LLDP haline 20 Fig 4 3 6 0 LLDP Configuration LLDP Status Enable Disable LLDP LLDP hello time LLDP hello time value which is time interval between the transmission LLDP info packets
120. upt x Enable 2 Port A Fig 4 3 2 0 Aggregator Setting System Priority A value used to identify the active LACP The switch with the lowest value has the highest priority and is selected as the active LACP Group ID There are up to 7 trunk groups can be configured Choose the Group ID and click lt lt Get to retrieve the trunk group LACP If enabled the group is LACP static trunk group If disabled the group is local static trunk group All ports support LACP dynamic trunk group If connecting to the device that also supports LACP the LACP dynamic trunk group will be created automatically Work ports Allow max eight ports can be aggregated at the same time If LACP static trunk group the exceed ports is standby and able to aggregate if work ports fail If local static trunk group the number must be as same as the group member ports Select the ports to join the trunk group Allow max 8 ports can be aggregated at the same time If LACP enabled you can configure LACP Active Passive status in each port on State Activity page 4 3 2 1 Aggregator Information When you are setting LACP aggregator you can see relation information in here The following page shows no group active and no LACP related data 86 a ER We connect your business Trunking The following information provides a view of LACP current status Fig 4 3 2 1a Aggregator Information This page shows some stat
121. us server Show radius server information including radius server IP port number accounting port number shared key NAS identifier dot1x timeout quiet period lt 0 65535 gt Set 802 1x quiet period default 60 seconds Parameters lt 0 65535 gt specifies the quiet period in seconds dot1x timeout tx period lt 0 65535 gt Set 802 1x Tx period default 15 seconds Parameters lt 0 65535 gt specifies the Tx period in seconds dot1x timeout supplicant lt 1 300 gt Set 802 1x supplicant timeout default 30 seconds Parameters lt 1 300 gt specifies the supplicant timeout in seconds dot1x timeout radius server lt 1 300 gt Set radius server timeout default 30 seconds Parameters lt 1 300 gt specifies the radius server timeout in seconds 51 a EA We connect your business dot1x max req lt 1 10 gt Set 802 1x maximum request retries default 2 times Parameters lt 1 10 gt specifies the maximum request retries dot1x timeout re authperiod lt 30 65535 gt Set 802 1x re auth period default 3600 seconds Parameters lt 30 65535 gt specifies the re auth period in seconds show dot1x Show 802 1x information quiet period Tx period supplicant timeout server timeout maximum requests and re auth period dot1x port lt fu fa au no gt lt port list gt Set 802 1x per port information Parameters fu specifies forced unauthorized fa specifies forced au
122. use Network interface e q a network adapter card on the attached device network cable or switch port is defective Solution 2 1 Verify if both of the switch and attached device are powered on 2 2 Be sure the cable is plugged into both the switch and corresponding device 2 3 Verify that the proper cable type is used and its length does not exceed specified limits 2 4 Check the adapter on the attached device and cable connections for possible defects 2 5 Replace the defective adapter or cable if necessary 3 Symptom Upstream bandwidth control failed Cause NIC Networking Interface Card does not have flow control function Solution Be sure the NIC Networking Interface Card supports flow control function 4 Question Right now we ve got some problem with an incorrect system password setting How can we do a system password recover of your NV802S product It s possible to made a system reset or to upload a new firmware 126 a EA We connect your business Answer Regarding your question please follow up step of the following 1 Please connecting NV 802S s console port to PC or Notebook PC series port 2 Please run Hyper terminal AP by Windows 2000 XP setting baud rate 115200bps 3 Power on NV 802S until show login menu 4 Please input hsichih in Engineering username menu 5 Please input netsys in password menu 6 NV 802S will be into engineer menu then display command line 7 Please input default of instruction
123. usm testuser show snmp group Show group list snmp view lt view name gt lt included excluded gt lt view subtree gt lt view mask gt Add a view Parameters lt view name gt specifies the view name lt included excluded gt specifies the view type lt view subtree gt specifies the view subtree e g 1 3 6 1 2 1 lt view mask gt specifies the view mask in hexadecimal digits e g snmp view testview included 1 3 6 1 2 1 Oxff no snmp view lt view name gt Delete a view Parameters lt view name gt specifies the view name e g no snmp view system show snmp view Show view list snmp access lt group name gt lt v1 v2c usm gt lt noauth auth authpriv gt lt read name gt lt write name gt lt notify name gt Add an access control Parameters lt group name gt specifies the group name lt v1 v2c usm gt specifies the security model lt noauth auth authpriv gt specifies the security level lt read name gt specifies the access read view name lt write name gt specifies the access write view name lt notify name gt specifies the access notify view name 48 a EA We connect your business e g snmp access test usm testauth all all all no snmp access lt group name gt lt v1 v2c usm gt lt noauth auth authpriv gt Delete an access control Parameters lt group name gt specifies the group name lt v1 v2c usm gt specifies the security mode
124. ut conditions in the exchanges between the supplicant and authentication server default value 30 seconds Server Timeout Used to determine timeout conditions in the exchanges between the authenticator and authentication server default value 30 seconds ReAuthMax Used to determine the number of re authentication attempts that are permitted before the specific port becomes unauthorized default value 2 times Reauth Period Used to determine a nonzero number of seconds between periodic re authentication of the supplications default value 3600 seconds 4 6 QoS This switch provides quality of service QoS to prioritize the packet forwarding when traffic congestion happens 112 a ER We connect your business This switch supports port based 4 level output queue and 802 1p 8 level priority to 4 level queue mapping QoS functions Strict and weight round robin WRR QoS mode are supported 4 6 0 QoS Configuration This page is mainly to set the QoS mode First Come First Service All High before Low and WRR and 8 level priority to 4 level queue mapping oeren Perr configuration Priority Queue Service O First Come First Service O All High before Low Highest SecHigh SecLow Lowest k in ef el dl ee Lowest v Lowest v SecLow x SecLow x SecHigh x SecHigh x Highest x Highest x Fig 4 6 0 QoS Configuration First Come First Service The sequence of packets
125. v3 Group 4 2 4 4 SNMPv3 View Maintain SNMPv3 view View Name specifies the view name Included Excluded specifies the view type View Subtree specifies the view subtree e g 1 3 6 1 2 1 View Mask specifies the view mask in hexadecimal digits 72 a ER We connect your business V3 View all_included_ 1_80 mib2_included_ 1 3 6 1 2 1_fc system_included_ 1 3 6 1 2 1 1_fe view Name Included Excluded View Subtree eg 1 3 6 1 2 1 Input view subtree View Mask Hex Adecimal Input view mask Digits Fig 4 2 4 4 SNMPv3 View 4 2 4 5 SNMPV3 ACCESS Group Name specifies the group name v1 v2c USM specifies the security model SNMP Access specifies the security level noauth auth authpriv Read View specifies the access read view name Write Name specifies the access write view name Notify Name specifies the access notify view name V3 Access root_v1_noauth_all_all_all root_v2c_noauth_all_all_all admin_v2c_noauth_all_none_all public_v1_noauth_system_none_system v1 V2c USM public_v2c_noauth_system_none_system SNMP Access Read View Input read view Write View Input write view Notify View Input notify view Fig 4 2 4 5 SNMPV3 ACCESS 73 a w Y We connect your business O 4 2 4 6 SNMPv3 USM User Maintain SNMPv3 USM user User Name Specifies the user name should be the security name defined in group Auth Type Specifies the authentication type md5
126. vel e g show qos QoS configurations QoS mode first come first service Highest weight 8 Second High weight 4 Second Low weight 2 Lowest weight 1 802 1p priority O 7 Lowest Lowest SecLow SecLow SecHigh SecHigh Highest Highest 4 0 3 6 1 Per Port Priority port priority lt disable 0 7 gt lt port list gt Set port priority Parameters lt port list gt specifies the ports to be set If not entered all ports are set e g port priority disable 1 5 4 0 3 7 MAC Address Table clear mac address table Clear all dynamic MAC address table entries mac address table static lt mac addr gt lt vlan id gt lt port id port list gt Set static unicast or multicast MAC address If multicast MAC address address beginning with 01 00 5E is supplied the last parameter must be port list Otherwise it must be port id no mac address table static lt mac addr gt lt vlan id gt Delete static unicast or multicast MAC address table entries show mac address table Display MAC address table entries show mac address table static Display static MAC address table entries 38 a EA We connect your business show mac address table multicast Display multicast related MAC address table smac address table static lt mac addr gt lt vlan id gt lt port id port list gt Set static unicast or multicast MAC address in secondary MAC address table If multicast MAC address address beginning with 01 00 5E is sup

Download Pdf Manuals

image

Related Search

Related Contents

  3750-manual  SOB Release Notes  User manual  N° 01-003-V32 du 8-01-2001  Liebherr IKB 2460 PremiumPlus  Macromedia Dreamweaver MX 2004 for PC, Mac    INSTALLATION & OPERATING INSTRUCTIONS - Garland  Tritton AX 720  

Copyright © All rights reserved.
Failed to retrieve file