FS728TP Smart Switch Software Administration Manual: Netgear, Inc
FS728TP Smart Switch Software Administration Manual: Netgear, Inc
FS728TP Smart Switch Software Administration Manual: Netgear, Inc
Software Administration
Manual
NETGEAR, Inc.
4500 Great America Parkway
Santa Clara, CA 95054 USA
202-10231-02
December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
Trademarks
NETGEAR and the NETGEAR logo are registered trademarks of NETGEAR, Inc. in the United States and/or other
countries. Microsoft, Windows, and Windows NT are registered trademarks and Vista is a trademark of Microsoft
Corporation. Other brand and product names are trademarks or registered trademarks of their respective holders.
Statement of Conditions
In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to
make changes to the products described in this document without notice.
NETGEAR does not assume any liability that may occur due to the use or application of the product(s) or circuit
layout(s) described herein. Information is subject to change without notice.
ii
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one
or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect the equipment into an outlet on a circuit different from that which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
EU Statement of Compliance
The NETGEAR FS728TP 10/100 PoE Smart Switch with Gigabit Ports is compliant with the following EU Council
Directives: 89/336/EEC and LVD 73/23/EEC. Compliance is verified by testing to the following standards: EN55022
Class A, EN55024 and EN60950-1.
Warning: This is a Class A product. In a domestic environment, this product may cause radio interference,
in which case the user may be required to take appropriate measures.
Customer Support
For assistance with installing and configuring your NETGEAR system or for questions or problems following
installation:
• Check the NETGEAR Web page at http://www.NETGEAR.com/support
• Call Technical Support in North America at 1-888-NETGEAR. If you are outside North America, please refer to
the phone numbers listed on the Support Information Card that was included with your switch.
• Email Technical Support at support@NETGEAR.com.
• Defective or damaged merchandise can be returned to your point-of-purchase representative.
iii
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
iv
v1.0, December 2007
v
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
Contents
Contents vi
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
vii Contents
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
Chapter 5
Configuring QoS
Configuring the Basic and Advanced QoS Settings .......................................................5-1
CoS .................................................................................................................................5-1
Basic ........................................................................................................................5-2
Advanced .................................................................................................................5-7
Chapter 6
Managing Security
Setting Security Configuration Options ...........................................................................6-1
Management Security .....................................................................................................6-1
User Configuration ...................................................................................................6-1
RADIUS ....................................................................................................................6-2
TACACS+ .................................................................................................................6-4
Authentication List ....................................................................................................6-6
Port Authentication .........................................................................................................6-7
Basic ........................................................................................................................6-8
Advanced .................................................................................................................6-9
Traffic Control ...............................................................................................................6-13
Storm Control .........................................................................................................6-13
Port Security ...........................................................................................................6-15
ACL ...............................................................................................................................6-17
MAC ACL ...............................................................................................................6-18
MAC Rules .............................................................................................................6-19
MAC Binding Configuration ....................................................................................6-21
IP ACL ....................................................................................................................6-22
IP Rules ..................................................................................................................6-23
IP Binding Configuration ........................................................................................6-25
Binding Table ..........................................................................................................6-26
Chapter 7
Monitoring the Switch
Setting Monitoring Options .............................................................................................7-1
Logs ................................................................................................................................7-1
Logs Configuration ...................................................................................................7-2
Log Filter ..................................................................................................................7-3
Memory Log .............................................................................................................7-4
Contents viii
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
ix Contents
v1.0, December 2007
About This Manual
The NETGEAR® FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
describes how to install, configure, operate, and troubleshoot the FS728TP 10/100 PoE Smart
Switch with Gigabit Ports using its included software. This book describes the software
configuration procedures and explains the options available within those procedures.
The information in this manual is intended for readers with intermediate to advanced system
management skills.
This document was created primarily for the system administrator who wishes to install and
configure the FS728TP Smart Switch in a network. This user guide assumes that the reader has a
general understanding of switch platforms and a basic knowledge of Ethernet and networking
concepts. To install this switch, it is not necessary to understand and use all of its capabilities.
Once basic configuration is performed, the switch operates using the remaining factory default
parameters. However, a greater level of configuration—anywhere from the basic up to the
maximum possible—will allow your network the full benefit of the switch’s features. The web
interface simplifies this configuration at all levels.
This document describes configuration commands for the FS728TP Smart Switch software. The
commands can all be accessed from the Web interface.
• Chapter 1, “Getting Started with Switch Management” describes how to use the SmartWizard
Discovery utility to set up your switch so that you can communicate with it.
• Chapter 2, “Introduction to the Web Browser Interface” introduces the Web browser interface.
• Chapter 3, “Managing System Settings” describes how to configure the System functions.
• Chapter 4, “Configuring Switching Settings” describes how to configure the Switching
functions.
• Chapter 5, “Configuring QoS” describes how to configure QoS functions.
x
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
Note: Refer to the product release notes for the FS728TP Smart Switch Software
application level code. The release notes detail the platform specific functionality
of the Switching, SNMP, Config, and Management packages.
The conventions, formats, and scope of this manual are described in the following paragraphs:
• Typographical Conventions. This manual uses the following typographical conventions:
• Formats. This manual uses the following formats to highlight special messages:
Tip: This format is used to highlight a procedure that will save time or resources.
Warning: Ignoring this type of note may result in a malfunction or damage to the
equipment.
Danger: This is a safety warning. Failure to take heed of this notice may result in
personal injury or death.
• Scope. This manual is written for the FS728TP Smart Switch according to these
specifications:
Product Version FS728TP 10/100 PoE Smart Switch with Gigabit Ports
Manual Publication Date December 2007
Tip: If your printer supports printing two pages on a single sheet of paper, you can
save paper and printer ink by selecting this feature.
Revision History
Version
Part Number Date Description
Number
202-10231-02 1.0 May 2007 Product created
202-10231-02 1.0 December 2007 Feature update
This section provides an overview of switch management, including the methods you can choose
to start managing your NETGEAR FS728TP 10/100 PoE Smart Switch with Gigabit Ports. It also
leads you through the steps necessary to get started, using the SmartWizard Discovery utility. The
section includes this information under the following menu options:
• “System Requirements”
• “Switch Management Interface”
• “Network with a DHCP Server”
• “Network without a DHCP Server”
• “Web Access”
• “Additional Utilities”
System Requirements
The following hardware and software facilities are required to run the applications described in
this manual:
• Network facilities:
– Ethernet network with or without DHCP server as appropriate
– Ethernet cable to connect the switch to a PC
• For running the SmartWizard Discovery utility and local or remote Web Management:
– IBM-type PC with CD drive: RAM size and disk specification are not critical
– OS software: Microsoft Windows Vista, Windows XP, or Windows 2000
– Desktop computer running Microsoft Internet Explorer 5.0 or later or Netscape Navigator
6.0 or later, or equivalent
1-1
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
Note: For complete hardware installation instructions, refer to the FS728TP Smart Switch
Hardware Installation Manual included on your Resource CD, or go to
http://www.netgear.com/support.
Your NETGEAR FS728TP 10/100 PoE Smart Switch with Gigabit Ports contains an embedded
web server and management software for managing and monitoring switch functions. This switch
operates as a simple switch without using the management software. The management software
enables you to configure more advanced features, and consequently improve switch efficiency as
well as overall network performance.
Web-Based Management enables you to monitor, configure, and control your switch remotely
using a common web browser, instead of having to use expensive and complicated SNMP
software products. Simply by using your web browser, you can monitor the performance of your
switch and optimize network configuration. Using your browser, for example, you can set up
VLANs, traffic priority, and configure port trunking.
In addition, NETGEAR provides the SmartWizard Discovery utility with this product. This
program runs under Microsoft Windows XP or Windows 2000 and provides a “front end” that
discovers the switches on your network segment. When you power up your switch for the first
time, the SmartWizard Discovery utility enables you to configure its basic network parameters
without prior knowledge of IP address or subnet mask. Following such configuration, this program
leads you into the Web Management interface.
Some features of the SmartWizard Discovery utility and Web Management interface are shown in
the table below.
For a more detailed discussion of the SmartWizard Discovery utility, continue with this section:
“Network with a DHCP Server” or “Network without a DHCP Server”. For a detailed discussion
of the Web Browser Interface, see Chapter 2, “Introduction to the Web Browser Interface”.
Figure 1-1
6. Note the displayed IP address assigned by the DHCP server. You will need this value to access
the switch directly from a web browser (without using the SmartWizard Discovery utility).
7. Select your switch by highlighting the name of the switch. Then click Web Access. The
discovery utility displays a login window similar to the following:
Figure 1-2
8. Use your web browser to manage your switch. The default password is password. Then use
this screen to proceed to management of the switch covered in Chapter 2, “Introduction to the
Web Browser Interface”.
This section describes how to set up your switch in a network without a DHCP server, and is
divided into the following tasks:
• Manually assign network parameters for your switch
• Configure the NIC settings on the host PC
• Log in to the web-based switch management utility
Figure 1-3
7. Select Disable to disable DHCP.
8. The default IP address is 192.168.0.239 and the default subnet mask is 255.255.255.0. If you
want different values, enter the switch IP address, gateway IP address and subnet mask.
9. Type your password and click Set. Please ensure that your PC and the FS728TP 10/100 PoE
Smart Switch with Gigabit Ports are in the same subnet. Note the settings for later use.
NIC Setting on the Host that Accesses the FS728TP 10/100 PoE
Smart Switch with Gigabit Ports
The settings of your Network Interface Card (NIC) under MS Windows OS are made with entries
into Windows screens similar to the ones shown below. For comparison, the settings screens of the
switch are also shown although they do not appear in the Windows view.
Figure 1-4
You need Windows Administrator privileges to change these settings.
1. On your PC, access the MS Windows operating system TCP/IP Properties.
2. Set IP address and subnet mask appropriately. The subnet mask value is identical to that set in
the switch. The PC IP address must be different from that of the switch but lie in the same
subnet.
3. Click Web Access in the SmartWizard Discovery utility to enable the management screens as
described in the following section.
Web Access
You must work from the same network segment that contains the switch (i.e., the subnet mask
values of switch and PC host must be the same) and you must point your browser using the switch
IP address. If you used the SmartWizard Discovery utility to set up IP address and subnet mask,
either with or without DHCP server, use that IP address in your browser window.
If you are starting with an “out of the box” switch and are not using the SmartWizard Discovery
utility, you must initially configure your host PC to be on a network segment to match the default
parameters of the switch, which are:
• IP address: 192.168.0.239
• Subnet Mask: 255.255.255.0
You can change the network parameters to match those of your network (this procedure is
described in Chapter 3, “Managing System Settings”). Your host PC network parameters must
then be set to match your network.
Clicking Web Access on the SmartWizard Discovery utility or accessing the switch directly
displays the screen shown below.
.
Use this screen to proceed to management of the switch covered in Chapter 2, “Introduction to the
Web Browser Interface”.
Additional Utilities
Alternatively, from the main screen shown on Figure 1-1 you can access these additional
functions:
• “Password Change”
• “Firmware Upgrade”
Password Change
You can set a new password of up to 20 ASCII characters.
1. Click Password Change from the Switch Setting section. The Password Change screen
appears. You can set a new password. You must enter the old and new passwords and confirm
the new one.
2. Click Set to enable the new password.
Firmware Upgrade
The FS728TP Smart Switch software is upgradeable, and enables your switch to take advantage of
improvements and additional features as they become available. The upgrade procedure assumes
that you have downloaded or otherwise obtained the firmware upgrade and that you have it
available as a binary file on your computer. This procedure uses the TFTP protocol to implement
the transfer from computer to switch.
.
Note: You can also upgrade the firmware using the Download menu of the switch (see
“Download”).
If you click Firmware Upgrade from the main screen (see Figure 1-1), after you have selected the
switch to upgrade, the following screen appears:
.
Figure 1-5
1. Enter the following values into the appropriate places in the form:
• Product Assigned Firmware: The location of the new firmware. If you do not know the
location, click Browse to locate the file.
• Upgrade Password: Enter your password; the default password is password.
Exit
Click Exit from the SmartWizard Discovery screen to close the SmartWizard Discovery utility.
This section introduces the web browser interface that enables you to configure and manage your
NETGEAR FS728TP 10/100 PoE Smart Switch with Gigabit Ports. Your FS728TP Smart Switch
provides a built-in browser interface that enables you to configure and manage it remotely using a
standard Web browser such as Microsoft Internet Explorer or Netscape Navigator. Online Help is
also provided for many of the basic functions and features of the switch.
This section introduces the areas of the browser interface and includes the following topics:
• “Logging Into the NETGEAR Home Screen”
• “Using the NETGEAR Web Management System Options”
Begin your overview of the FS728TP Smart Switch browser interface by logging in:
1. Start the application by one of the following methods, as described in Chapter 1, “Getting
Started with Switch Management”:
a. In the SmartWizard Discovery utility click Web Access.
or
b. In the web browser enter the switch’s IP address and press Enter.
The Login screen appears.
Figure 2-1
2-1
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
2. Enter the password (the factory default is password) and click Login. The home screen of the
FS728TP Smart Switch browser interface displays.
Figure 2-2
The NETGEAR FS728TP web browser interface contains the following views:
Main Navigation Area – Located on the top of the NETGEAR FS728TP web browser interface
and marked as 1 in Figure 2-2. The Main Navigation Area includes Primary and Secondary
Navigation Bars. The Primary Navigation Bar contains a list of the different features that can be
configured including System, Switching, QoS, Security, Monitoring, Maintenance and Help. Each
feature expands to a subset of features that can be configured as part of the Secondary Navigation
Bar.
Left Navigation Tree – Located on the left side of the NETGEAR FS728TP web browser
interface and marked as 2 in Figure 2-2. For each Secondary Navigation Feature the Left
Navigation Tree contains a subset of features that can be expanded to display all the components.
Work Area – Located on the right side of the NETGEAR FS728TP web browser interface and
marked as 3 in Figure 2-2. The Work Area contains device tables, general device information, and
configurable device parameters.
For further description of the functions, refer to the appropriate section of this manual:
• Chapter 3, “Managing System Settings” describes how to configure the System functions.
• Chapter 4, “Configuring Switching Settings” describes how to configure the Switch functions.
• Chapter 5, “Configuring QoS” describes how to configure QoS functions.
• Chapter 6, “Managing Security” describes how to configure security.
• Chapter 7, “Monitoring the Switch” describes how to configure monitoring functions.
• Chapter 8, “Maintenance” describes maintenance functions, such as firmware upgrade.
• Chapter 9, “Online Help” describes how to obtain online help and support.
Informational Services
Informational services provide access to technical support, online help and device information and
are displayed in the following topics:
• “Help Navigation Tab”
• “Accessing Device Information”
Figure 2-3
Figure 2-4
• “Adding an Entry”
• “Modifying an Entry”
• “Deleting an Entry”
• “Special Table Options”
Selecting an Entry
To select an entry:
1. Check the entry’s Select box. The selected entry is highlighted and the information appears in
the first row, which contains the editable fields.
Figure 2-5
Figure 2-6
Adding an Entry
An entry may be added to the table by creating a new entry or by duplicating an existing entry.
Figure 2-7
Figure 2-8
Modifying an Entry
An entry may be modified by editing its values in the first row.
To modify an entry:
1. Select the entry to be modified. Its contents are displayed in the first row.
Figure 2-9
Deleting an Entry
To delete entries from a table:
1. Select the entries to be deleted.
Gold Buttons. Gold Buttons provide flexibility in viewing and configuring VLANs/LAGs on a
port level. The following example displays gold button basic usage options.
To view the LAG configuration of the ports:
1. Click anywhere on the ports gold button. The ports panel is displayed:
Figure 2-10
2. Select the ports to be added as LAG members within the selected LAG by clicking on their
respective boxes.
3. Click Apply to update the device.
Quick Boxes. Quick Boxes provide users with flexibility in configuring VLANs for all ports (on
a stacking unit level) or LAGs. Clicking on the quick box toggles between the various options that
exist for this field. A quick box appears to the right of the arrow on the left-hand side of the gold
button. The following example displays quick box basic usage options.
Figure 2-11
2. Click on the ports gold button to display the ports, which are now all Tagged.
Figure 2-12
3. Click again on the quick box, and a U appears in the quick box and in all the port boxes,
marking the ports as untagged.
Figure 2-13
4. Click again on the quick box, and the quick box and all the port boxes appear blank, marking
the ports as neither tagged nor untagged.
5. You may click on individual port boxes to toggle their tagged/untagged status
Interface View and Selection. A port or LAG interface may be selected from a table by using
the interface selection row, located above the row of column headers. Clicking on PORTS or
LAGS displays the ports or the LAGs:
Figure 2-14
To display all ports:
1. Click PORTS in the interface selection row. The screen displays a table of all ports.
To display all interfaces:
1. Click All in the interface selection row. A confirmation window opens.
Figure 2-15
Figure 2-16
To select an interface:
1. Enter the number of the interface in the GO TO INTERFACE box.
2. Click GO to select the interface, as in the following example.
Figure 2-17
The navigation pane at the top of the web browser interface contains a System tab that enables you
to manage your FS728TP Smart Switch with features under the following main menu options:
• “Management”
• “Device View”
• “PoE”
• “SNMP”
The description that follows in this chapter describes configuring and managing system settings in
the FS728TP Smart Switch.
Management
The Management menu enables configuration of some system parameters, the switch IP Address
and the system time, and contains the following options:
• “System Information”
• “IP Configuration”
• “Time”
System Information
The System Information screen contains parameters for configuring general device information
including the system name, system location, system contact, and idle timeout.
3-1
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
Figure 3-1
• System Up Time – Displays the amount of time since the most recent device reset. The
system time is displayed in the following format: days, hours, minutes, seconds. For
example, 41 days, 2 hours, 22 minutes, 15 seconds.
• Idle Timeout – Enter the amount of time (minutes) that elapses before an idle station is
timed out. Idle stations that are timed out must login to the system. The field range is 5 -
30 minutes. The field default value is 10 minutes.
• Base MAC Address – Displays the MAC address of a standalone device.
• Serial Number – Displays the device serial number.
The Versions Table displays the following fields:
• Model Name – Displays the device model name.
• Hardware Version – Displays the installed device hardware version number.
• Boot Version – Displays the current boot version running on the device.
• Software Version – Displays the installed software version number.
2. Enter the System Name, System Location, System Contact and Idle Timeout in the
provided fields.
3. Click Apply to update the system settings.
IP Configuration
The IP Configuration screen contains fields for assigning IP addresses. IP addresses are either
defined as static or are retrieved using the Dynamic Host Configuration Protocol (DHCP). The IP
Interface screen also contains information for defining default gateways DHCP and is also
configured from the IP Interface screen. The DHCP assigns dynamic IP addresses to devices on a
network. DHCP ensures that network devices can have a different IP address every time the device
connects to the network.
Note the following when configuring IP Addresses:
• If the device is accessed using SmartWizard Discovery, the IP address retrieved through
DHCP is displayed.
• If the device fails to retrieve an IP address through DHCP, the default IP address is
192.168.0.239.
To define an IP interface:
1. Click System > Management > IP Configuration. The IP Configuration screen displays:
Figure 3-2
Time
The Time menu enables local system time or SNTP server configuration, and contains the
following options:
• “Time Configuration”
Time Configuration
The Time Configuration screen contains information for defining both the local hardware clock
and the external SNTP clock. If the system time is managed via an external SNTP clock, and the
external SNTP clock fails, the system time reverts to the local hardware clock.
To configure the local system time:
1. Click System > Management > Time > Time Configuration. The Time Configuration
screen displays:
Figure 3-3
• Time Zone Offset – Select the difference between Greenwich Mean Time (GMT) and
local time. For example, the Time Zone Offset for Paris is GMT +1, while the Time Zone
Offset for New York is GMT –5.
2. Select the Clock Source by selecting either Local or SNTP.
3. If you selected Local, then enter the local Date and Time in the provided fields.
4. Select the Time Zone Offset from the list.
5. Click Apply to update the system settings.
Note: If you selected SNTP, you must configure the SNTP servers. See “SNTP
Server Configuration” for detailed instructions on configuring the SNTP
servers.
Figure 3-4
• SNTP Server 2 – Enter the secondary SNTP server IP address. The Secondary SNTP
server retrieves the system time if the Primary SNTP server times out. The following
option is available:
– Delete – Remove the currently configured SNTP Server 2.
2. Enter the SNTP Server 1 and SNTP Server 2 in the provided fields.
3. Click Apply to update the system settings.
To remove SNTP servers:
1. Check the Delete box for each SNTP server that is to be removed.
2. Click Apply to update the system settings.
Device View
The Device View menu option displays the Device View screen, which provides a graphic
representation of the device, including the port and LED statuses.
To display the Device View screen:
1. Click System > Device View. The Device View screen displays:
Figure 3-5
PoE
Power over Ethernet (PoE) provides power to devices over existing LAN cabling without updating
or modifying the network infrastructure. This removes the limitation of placing network devices
close to power sources.
Basic
The PoE Basic menu contains the following option:
• “PoE Configuration”
PoE Configuration
The Basic PoE Configuration screen contains system PoE information for enabling PoE on the
device, monitoring the current power usage, and enabling PoE traps.
To configure PoE on the device:
1. Click System > PoE > Basic > PoE Configuration. The Basic PoE Configuration screen
displays:
Figure 3-6
Advanced
The PoE Advanced menu contains the following options:
• “PoE Configuration”
• “PoE Port Configuration”
PoE Configuration
The Advanced PoE Configuration screen contains system PoE information for enabling PoE on
the device, monitoring the current power usage, and enabling PoE traps.
Figure 3-7
Figure 3-8
• Priority Level – Select the port priority if the power supply is low. The field default is
low. For example, if the power supply is running at 99% usage, and port 1 is prioritized as
high, but port 3 is prioritized as low, port 1 is prioritized to receive power and port 3 may
be denied power. The possible field values are:
– Low – Set the PoE priority level as low. This is the default level.
– Medium – Set the PoE priority level as medium.
– High – Set the PoE priority level as high.
• Class – Displays the classification of the powered device. The class defines the maximum
power that can be provided to the powered device. The possible field values are:
– Class 0 – The minimum power level at the Power Sourcing Equipment is 15.4 Watts.
– Class 1 – The minimum power level at the Power Sourcing Equipment is 4.0 Watts.
– Class 2 – The minimum power level at the Power Sourcing Equipment is 7.0 Watts.
– Class 3 – The minimum power level at the Power Sourcing Equipment is 15.4 Watts.
– Class 4 – Treated as Class 0.
• Output Voltage – Displays the Output Voltage in Volts.
• Output Current – Displays the Output current in milliamps.
• Output Power – Displays the Output power in Watts.
• Power Limit – Displays the power limit in Watts.
• Status – Displays the port’s PoE status. The possible field values are:
– On – The device is enabled to deliver power via the interface.
– Off – The device is disabled for delivering power via the interface.
– Test Fail – The powered device test has failed. For example, a port could not be
enabled and cannot be used to deliver power to the powered device.
– Testing – The powered device is being tested. For example, a powered device is tested
to confirm it is receiving power from the power supply.
– Searching – The device is currently searching for a powered device. Searching is the
default PoE operational status.
– Fault – The device has detected a fault on the powered device. For example, the
powered device memory could not be read.
2. Select an interface.
3. Select the Admin Mode and Priority Level from the lists in the provided fields in the first
row.
4. Click Apply to update the device
SNMP
Simple Network Management Protocol (SNMP) provides a method for managing network
devices. The device supports the following SNMP versions:
• SNMP v1 and v2c
• SNMP version 3
The SNMP agents maintain a list of variables that are used to manage the device. The variables are
defined in the Management Information Base (MIB). The SNMP agent defines the MIB
specification format, as well as the format used to access the information over the network. Access
strings control access rights to the SNMP agents. SNMP v3 applies access control and a new traps
mechanism. In addition, User Security Model (USM) parameters are defined for SNMPv3,
including:
• Authentication – Provides data integrity and data origin authentication.
• Privacy – Protects against the disclosure of message content. Cipher Block-Chaining (CBC) is
used for encryption. Either authentication is enabled on an SNMP message, or both
authentication and privacy. However, privacy cannot be enabled without authentication.
• Timeliness – Protects against message delay or message redundancy. The SNMP agent
compares the incoming message to the message time information. Enter the amount of time
the device waits before re-sending informs.
• Key Management – Enter key generation, key updates, and key usage.
The device supports SNMP notification filters based on Object IDs (OIDs). OIDs are used by the
system to manage device features. SNMP v3 supports the following features:
• Security
• Feature Access Control
• Traps. The device generates copy traps.
The SNMP menu contains the following options:
• “SNMPv1/v2”
• “SNMPv3”
SNMPv1/v2
The SNMPv1/v2 menu contains the following options:
• “Community Configuration”
• “Trap Configuration”
Community Configuration
Access rights are managed by defining communities in the Community Configuration screen.
When community names are changed, access rights are also modified.
To configure SNMP communities:
1. Click System > SNMP > SNMPv1/v2 > Community Configuration. The Community
Configuration screen displays:
Figure 3-9
– SNMP Admin – User has access to all device configuration options, as well as
permissions to modify the community.
2. Select the community entry.
3. Enter the Management Station and Community String in the provided fields in the first row.
4. Select the Access Mode from the list in the provided field in the first row.
5. Click Apply to update the device.
To add a new SNMP community:
1. Click System > SNMP > SNMPv1/v2 > Community Configuration. The Community
Configuration screen displays.
2. Enter the Management Station and Community String in the provided fields in the first row.
3. Select the Access Mode from the list in the provided field in the first row.
4. Click Add to update the device.
To remove an SNMP community:
1. Click System > SNMP > SNMPv1/v2 > Community Configuration. The Community
Configuration screen displays.
2. Select the entry to be removed.
3. Click Delete to remove the entry.
Trap Configuration
The SNMPv1/v2 Trap Configuration screen contains information for defining filters that
determine whether traps are sent to specific users, and the trap type sent. SNMP notification filters
provide the following services:
• Identifying Management Trap Targets
• Defining Trap Filtering
• Defining Trap Generation Parameters
• Providing Access Control Checks
Figure 3-10
SNMPv3
The SNMPv3 menu contains the following options:
• “Engine ID”
• “View Name”
• “View Content”
• “Community Configuration”
• “Group Configuration”
• “User Configuration”
• “Global Trap Configuration”
• “Trap Configuration”
• “Trap Filter Name”
• “Trap Filter Content”
Engine ID
The SNMPv3 Engine ID screen allows network managers to define the SNMP Engine ID and to
assign the default parameters to SNMP.
To define the Local Engine ID:
1. Click System > SNMP > SNMPv3 > Engine ID. The SNMPv3 Engine ID screen displays:
Figure 3-11
View Name
The SNMPv3 View Name screen allows the network managers to define SNMPv3 View Names.
SNMPv3 views provide or block access to device features or portions of features.
To define SNMPv3 view names:
1. Click System > SNMP > SNMPv3 > View Name. The SNMPv3 View Name screen displays:
Figure 3-12
View Content
SNMP views provide or block access to device features or portions of features. For example, a
view can be defined to provide a view that SNMP group A has Read Only (R/O) access to
Multicast groups, while SNMP group B has Read-Write (R/W) access to Multicast groups. Feature
access is granted via the MIB name or MIB Object ID.
To define the SNMP View Content:
1. Click System > SNMP > SNMPv3 > View Content. The SNMPv3 View Content screen
displays:
Figure 3-13
3. Enter the Object ID Subtree in the provided field in the first row.
4. Select either Included or Excluded from the View Type provided field in the first row.
5. Click Apply to update the device.
To add a new SNMP OID entry:
1. Click System > SNMP > SNMPv3 > View Content. The SNMPv3 View Content screen
displays.
2. Select the View Name from the list in the provided field in the Views table.
3. Enter the Object ID Subtree in the provided field in the first row.
4. Select either Included or Excluded from the View Type provided field in the first row.
5. Click Add to update the device.
To remove an SNMP OID entry:
1. Click System > SNMP > SNMPv3 > View Content. The SNMPv3 View Content screen
displays.
2. Select the View Name from the list in the provided field in the Views table.
3. Select the OID entry to be removed.
4. Click Delete to remove the entry.
Community Configuration
Access rights are managed by defining communities in the Community Configuration screen.
When community names are changed, access rights are also changed.
Figure 3-14
Group Configuration
The SNMPv3 Groups screen provides information for creating SNMP groups and assigning
SNMP access control privileges to SNMP groups. Groups allow network managers to assign
access rights to specific device features or feature aspects.
To define an SNMP group:
1. Click System > SNMP > SNMPv3 > Group Configuration. The SNMPv3 Groups screen
displays:
Figure 3-15
• Security Level – Select the security level attached to the group. Security levels apply to
SNMPv3 only. The possible field values are:
– No Authentication – Neither the Authentication nor the Privacy security levels are
assigned to the group.
– Authentication – Authenticates SNMP messages and ensures that the SNMP
message’s origin is authenticated.
– Privacy – Encrypts SNMP messages.
• Operation – Select the group access rights. The possible field values are:
– Read – Management access is restricted to read-only. Changes are made to the
assigned SNMP view.
– Write – Management access is read-write. Changes are made to the assigned SNMP
view.
– Notify – Sends traps for the assigned SNMP view.
2. Select the SNMP group entry.
3. Select the Security Model and Security Level from the lists in the provided fields in the first
row.
4. Specify the group access rights for the selected SNMP views in the Operation provided fields
in the first row.
5. Click Apply to update the device.
To add a new SNMPv3 group:
1. Click System > SNMP > SNMPv3 > Group Configuration. The SNMPv3 Groups screen
displays.
2. Select the Security Model and Security Level from the lists in the provided fields in the first
row.
3. Specify the group access rights for the selected SNMP views in the Operation provided fields
in the first row.
4. Click Add to update the device.
To remove an SNMPv3 group:
1. Click System > SNMP > SNMPv3 > Group Configuration. The SNMPv3 Groups screen
displays.
2. Select the group entry.
User Configuration
The SNMPv3 User Configuration screen provides information for creating SNMP groups and
assigning SNMP access control privileges to SNMP groups. Groups allow network managers to
assign access rights to specific device features or feature aspects.
To define SNMP users:
1. Click System > SNMP > SNMPv3 > User Configuration. The SNMPv3 User Configuration
screen displays:
Figure 3-16
Figure 3-17
The SNMPv3 Global Trap Settings screen contains the following fields:
• SNMP Notifications – Select whether or not the device can send SNMP notifications.
The possible field values are:
– Enable – Enable SNMP notifications.
– Disable – Disable SNMP notifications.
• Authentication Notifications – Select the SNMP authentication failure notification status
on the device. The possible field values are:
– Enable – Enable the device to send authentication failure notifications.
Trap Configuration
The SNMPv3 Trap Configuration screen contains information for defining filters that determine
whether traps are sent to specific users, and the trap type sent. SNMP notification filters provide
the following services:
• Identifying Management Trap Targets
• Defining Trap Filtering
• Selecting Trap Generation Parameters
• Providing Access Control Checks
To define trap station management:
1. Click System > SNMP > SNMPv3 > Trap Configuration. The SNMPv3 Trap Configuration
screen displays:
Figure 3-18
5. Select the Security Level from the list in the provided field in the first row.
6. Enter the UDP Port in the provided field in the first row.
7. Select the Filter Name from the list in the provided field in the first row.
8. Enter the Timeout and Retries in the provided fields in the first row.
9. Click Add to update the device.
To remove a trap:
1. Click System > SNMP > SNMPv3 > Trap Configuration. The SNMPv3 Trap Configuration
screen displays.
2. Select the trap entry.
3. Click Delete to remove the entry.
Figure 3-19
The SNMPv3 Trap Filter Name screen contains the following field:
• Filter Name – Enter the user-defined notification filter name.
Figure 3-20
The SNMPv3 Trap Filter Content screen contains the following fields:
Trap Filter Settings
• Filter Name – Contains a list of user-defined notification filters.
Trap Filter Settings
• Object ID Subtree – Enter the OID for which notifications are sent or blocked. If a filter
is attached to an OID, traps or informs are generated and sent to the trap recipients. OIDs
are selected from either the Select field or the Object ID field.
• Filter Type – Select whether to send traps or informs relating to the selected OID. The
possible field values are:
– Excluded – Does not send traps or informs.
– Included – Sends traps or informs.
2. Select the Filter Name from the list in the provided field.
3. Select the trap filter content entry from the OID table.
4. Enter the Object ID Subtree in the provided field in the first row.
5. Select the Filter Type from the list in the provided field in the first row.
6. Click Apply to update the device.
To add a new trap filter content entry:
1. Click System > SNMP > SNMPv3 > Trap Filter Content. The SNMPv3 Trap Filter Content
screen displays.
2. Select the Filter Name from the list in the provided field.
3. Enter the Object ID Subtree in the provided field in the first row.
4. Select the Filter Type from the list in the provided field in the first row.
5. Click Add to update the device.
To remove a trap filter content entry:
1. Click System > SNMP > SNMPv3 > Trap Filter Content. The SNMPv3 Trap Filter Content
screen displays.
2. Select the Filter Name from the list in the provided field.
3. Select the trap filter content entry.
4. Click Delete to remove the entry.
The navigation pane at the top of the web browser interface contains a Switching tab that enables
you to manage your FS728TP Smart Switch with features under the following main headings:
• “Ports”
• “LAG”
• “VLAN”
• “STP”
• “Multicast”
• “Address Table”
The description that follows in this chapter describes configuring and managing switching settings
in the FS728TP Smart Switch.
Ports
Port Configuration
The Port Configuration screen contains fields for defining port parameters enabled on the ports.
4-1
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
Figure 4-1
• Port Speed – Select the data transmission rate for the port. The port type determines
which speed setting options are available. Port speeds can only be configured when auto
negotiation is disabled. The possible field values are:
– 10M – The port is currently operating at 10 Mbps.
– 100M – The port is currently operating at 100 Mbps.
– 1000M – The port is currently operating at 1000 Mbps.
• Duplex Mode – Select the port duplex mode. This field is configurable only when auto
negotiation is disabled and the port speed is set to 10M or 100M. The possible field values
are:
– Half – The interface supports transmission between the device and the client in only
one direction at a time.
– Full – The interface supports transmission between the device and its link partner in
both directions simultaneously.
– Auto – The interface supports transmission between the device and the link partner
based on the transmission mode of the link partner.
• Auto Negotiation – Select the port auto negotiation status. Auto negotiation is a protocol
between two link partners that enables a port to advertise its transmission rate, duplex
mode, and flow control abilities to its partner. The possible field values are:
– Enable – Auto negotiation is enabled.
– Disable – Auto negotiation is disabled.
• Back Pressure – Select the back pressure mode of the Port. Back Pressure mode is used
with half duplex mode to disable ports from receiving messages. Back Pressure mode is
disabled by default. The possible field values are:
– Enable – Back pressure mode is enabled.
– Disable – Back pressure mode is disabled.
• Flow Control – Select the flow control status of the port. Operates when the port is in full
duplex mode. Flow control is disabled by default. The possible field values are:
– Enable – Flow control is enabled.
– Disable – Flow control is disabled.
• MDI/MDIX – Select the MDI/MDIX status of the port. Hubs and switches are
deliberately wired opposite the way end stations are wired, so that when a hub or switch is
connected to an end station, a straight through Ethernet cable can be used and the pairs
will match up properly. When two hubs or switches are connected to each other or two end
stations are connected to each other, a crossover cable is used to ensure that the correct
pairs are connected. The possible field values are:
– Auto – Provides automatic cable type detection.
– MDI (Media Dependent Interface) – Connects end stations.
– MDIX (Media Dependent Interface with Crossover) – Connects HUBs and switches.
• LAG ID – Select the LAG ID to which the selected port is assigned.
2. Select the interface.
3. Enter or modify the fields in the first row.
4. Click Apply to update the device.
LAG
A Link Aggregated Group (LAG) optimizes port usage by linking a group of ports together to
form a single LAG. Aggregating ports multiplies the bandwidth between the devices, increases
port flexibility, and provides link redundancy. Ports added to a LAG lose their individual port
configuration. When ports are removed from the LAG, the original port configuration is applied to
the ports. Ensure the following, when configuring LAGs:
• All ports within a LAG must be of the same media type.
• A VLAN is not configured on the port.
• The port is not assigned to a different LAG.
• Auto-negotiation mode is not configured on the port.
• The port is in full-duplex mode.
• All ports in the LAG have the same ingress filtering and tagged modes.
• All ports in the LAG have the same back pressure and flow control modes.
• All ports in the LAG have the same priority.
• All ports in the LAG have the same transceiver type.
• The device supports up to eight LAGs with eight ports in each LAG.
• LACP LAGs support up to 16 ports, with eight ports active at any given time.
The LAG menu contains the following options:
• “Basic”
• “Advanced”
Basic
The LAG Basic menu contains the following options:
• “LAG Configuration”
• “LAG Membership”
LAG Configuration
The Basic LAG Configuration screen contains fields for configuring LAG parameters. The system
supports 8 LAGs, and each LAG can contain up to 8 ports.
To define LAG parameters:
1. Click Switching > LAG > Basic > LAG Configuration. The Basic LAG Configuration
screen displays:
Figure 4-2
LAG Membership
The Basic LAG Membership screen allows network managers to assign ports to LAGs.
To assign ports to LAGs:
1. Click Switching > LAG > Basic > LAG Membership. The Basic LAG Membership screen
displays:
Figure 4-3
6. Click CURRENT MEMBERS. The Current Members window opens and displays the
member ports included in the LAG:
Figure 4-4
Advanced
The LAG Advanced menu contains the following options:
• “LAG Configuration”
• “LAG Membership”
• “LACP”
• “LACP Port Priority”
LAG Configuration
The Advanced LAG Configuration screen contains fields for configuring LAG parameters. The
system supports 8 LAGs, and each LAG can contain up to 8 ports.
Figure 4-5
LAG Membership
The Advanced LAG Membership screen allows network managers to assign ports to LAGs.
To assign ports to LAGs:
1. Click Switching > LAG > Advanced > LAG Membership. The LAG Membership screen
displays:
Figure 4-6
6. Click CURRENT MEMBERS. The Current Members window opens and displays the
member ports included in the LAG:
Figure 4-7
LACP
Aggregated links can be set up manually or automatically established by enabling LACP on the
relevant links. Aggregated ports can be linked into link-aggregation port-groups. Each group is
comprised of ports with the same speed. The LACP screen contains fields for configuring LACP.
To configure LACP:
1. Click Switching > LAG > Advanced > LACP Configuration. The LACP Configuration
screen displays:
Figure 4-8
Figure 4-9
VLAN
VLANs are logical subgroups with a Local Area Network (LAN) which combine user stations and
network devices into a single unit, regardless of the physical LAN segment to which they are
attached. VLANs allow network traffic to flow more efficiently within subgroups. VLANs use
software to reduce the amount of time it takes for network changes, additions, and moves to be
implemented.
VLANs have no minimum number of ports, and can be created per unit, per device, or through any
other logical connection combination, since they are software-based and not defined by physical
attributes.
VLANs function at Layer 2. Since VLANs isolate traffic within the LAN, a Layer 3 router
working at a protocol level is required to allow traffic flow between VLANs. Layer 3 routers
identify segments and coordinate with VLANs. VLANs are Broadcast and Multicast domains.
Broadcast and Multicast traffic is transmitted only in the VLAN in which the traffic is generated.
VLAN tagging provides a method of transferring VLAN information between VLAN groups.
VLAN tagging attaches a 4-byte tag to packet headers. The VLAN tag indicates to which VLAN
the packets belong. VLAN tags are attached to the VLAN by either the end station or the network
device. VLAN tags also contain VLAN network priority information.
The VLAN menu contains the following options:
• “Basic”
• “Advanced”
Basic
The VLAN Basic menu contains the following options:
• “VLAN Configuration”
VLAN Configuration
The Basic VLAN Configuration screen provides information and global parameters for
configuring and working with VLANs. The maximum number of VLANs is 128.
Figure 4-10
Advanced
The VLAN Advanced menu contains the following options:
• “VLAN Configuration”
• “VLAN Membership”
• “Port PVID Configuration”
VLAN Configuration
The Advanced VLAN Configuration screen provides information and global parameters for
configuring and working with VLANs.
To define VLAN properties:
1. Click Switching > VLAN > Advanced > VLAN Configuration. The Advanced VLAN
Configuration screen displays:
Figure 4-11
– Default – The VLAN is the default VLAN. The default VLAN is enabled by default.
2. Select the VLAN entry.
3. Enter the VLAN ID and VLAN Name in the provided fields in the first row.
4. Click Apply to update the device.
To add a new VLAN:
1. Click Switching > VLAN > Advanced > VLAN Configuration. The Advanced VLAN
Configuration screen displays.
2. Enter the VLAN ID and VLAN Name in the provided fields in the first row.
3. Click AddApply to update the device.
To remove a VLAN:
1. Click Switching > VLAN > Advanced > VLAN Configuration. The Advanced VLAN
Configuration screen displays.
2. Select the VLAN entry.
3. Click Delete to remove the entry.
VLAN Membership
The VLAN Membership screen contains a table that maps ports to VLANs. Ports are assigned
VLAN membership by toggling through the Port Control settings.
Figure 4-12
3. Select the Group Operation from the list in the provided field.
4. Click Apply to update the device.
To tag or untag selected ports or LAGs:
1. Click Switching > VLAN > Advanced > VLAN Membership. The VLAN Membership
screen displays.
2. Click a gold button to display the ports or LAGs.
3. Click the boxes below the selected ports or LAGs to mark them as tagged (T) or untagged (U).
4. Click Apply to update the device.
To tag or untag all the ports or all the LAGs:
1. Click Switching > VLAN > Advanced > VLAN Membership. The VLAN Membership
screen displays.
2. Click the ports quick box or the LAG quick box, repeatedly if necessary, until a T or U
appears in the quick box, marking all the ports or LAGs as tagged or untagged, respectively.
3. Click Apply to update the device.
To view VLAN tagged port members:
1. Click Switching > VLAN > Advanced > VLAN Membership. The VLAN Membership
screen displays.
2. Click TAGGED PORT MEMBERS. The VLAN Tagged Ports window opens:
Figure 4-13
Figure 4-14
Figure 4-15
STP
Spanning Tree Protocol (STP) provides tree topography for any arrangement of bridges. STP also
provides a single path between end stations on a network, eliminating loops. Loops occur when
alternate routes exist between hosts. Loops in an extended network can cause bridges to forward
traffic indefinitely, resulting in increased traffic and reducing network efficiency.
The STP menu contains the following options:
• “Basic”
• “Advanced”
Basic
The STP Basic menu contains the following options:
• “STP Configuration”
STP Configuration
The Basic STP Configuration screen contains parameters for enabling STP on the device.
To configure STP on the device:
1. Click Switching > STP > Basic > STP Configuration. The Basic STP Configuration screen
displays:
Figure 4-16
Global Settings
• Spanning Tree State – Select the STP state on the device. The possible field values are:
– Enable – Enable STP on the device.
– Disable – Disable STP on the device.
Status
• Bridge Identifier – Displays the Bridge priority and MAC address.
• Time Since Topology Change – Displays the amount of time that has elapsed since the
bridge was initialized or reset or the last topology change that occurred. The time is
displayed in a day-hour-minute-second format, such as 2 days 5 hours 10 minutes and 4
seconds. The current root port and current root path cost display as zero when the device is
not connected to the network.
• Designated Root – Displays the Root Bridge priority and MAC address.
• Root Port – Displays the port number that offers the lowest cost path from this bridge to
the Root Bridge. This field is significant when the bridge is not the Root Bridge.
• Max Age (Sec) – Displays the device Maximum Age Time. The Maximum Age Time is
the amount of time in seconds a bridge waits before sending configuration messages. The
default Maximum Age Time is 20 seconds.
• Forward Delay (Sec) – Displays the device Forward Delay Time. The Forward Delay
Time is the amount of time in seconds a bridge remains in a listening and learning state
before forwarding packets. The default is 15 seconds.
• Hello Time (Sec) – Displays the device Hello Time. The Hello Time indicates the amount
of time in seconds a Root Bridge waits between configuration messages. The default is 2
seconds.
2. Select Enable or Disable in the Spanning Tree State provided field.
3. Click Apply to update the device.
Advanced
The STP Advanced menu contains the following options:
• “STP Configuration”
• “CST Configuration”
• “CST Port Configuration”
STP Configuration
The Advanced STP Configuration screen contains parameters for enabling STP on the device.
To configure STP on the device:
1. Click Switching > STP > Advanced > STP Configuration. The Advanced STP
Configuration screen displays:
Figure 4-17
• Root Port – Indicates the port number that offers the lowest cost path from this bridge to
the Root Bridge. This field is significant when the bridge is not the Root Bridge. The
default is zero.
• Max Age (Sec) – Displays the device Maximum Age Time. The Maximum Age Time is
the amount of time in seconds a bridge waits before sending configuration messages. The
default Maximum Age Time is 20 seconds.
• Forward Delay (Sec) – Displays the device Forward Delay Time. The Forward Delay
Time is the amount of time in seconds a bridge remains in a listening and learning state
before forwarding packets. The default is 15 seconds.
• Hello Time (Sec) – Displays the device Hello Time. The Hello Time indicates the amount
of time in seconds. The device waits between configuration messages. The default is 2
seconds.
2. Select Enable or Disable in the Spanning Tree State provided field.
3. Click Apply to update the device.
CST Configuration
The Common Spanning Tree (CST) describes the topology connecting STP/RSTP Bridges and
MSTP regions.
To configure CST on the device:
1. Click Switching > STP > Advanced > CST Configuration. The CST Configuration screen
displays:
Figure 4-18
Figure 4-19
• Port State – Displays the current STP state of a port. If enabled, the port state determines
what forwarding action is taken on traffic. Possible port states are:
– Forwarding – STP is enabled on the port, and the port is forwarding packets based on
the STP topology.
– Disabled – STP is currently disabled on the port. The port forwards traffic while
learning MAC addresses.
– Blocking – The port is currently blocked and cannot forward traffic or learn MAC
addresses. Blocking is displayed when STP is enabled.
– Listening – The port is in Listening mode. The port cannot forward traffic nor can it
learn MAC addresses.
– Learning – The port is in Learning mode. The port cannot forward traffic, however it
can learn new MAC addresses.
• Speed – Displays the speed at which the port is operating.
• Path Cost – Enter the method used to assign default path cost to STP ports. The possible
field range is 1 - 200000000. The default path cost assigned to an interface varies
according to the selected method.
• Priority – Enter the port priority value. When switches or ports are running STP, each is
assigned a priority. After exchanging BPDUs, the device with the lowest priority value
becomes the Root Port. The default value is 32768. The port priority value is provided in
increments of 4096.
2. Select the STP Status and Fast Link status in the provided fields.
3. Enter the Path Cost and Priority in the provided fields.
4. Click Apply to update the device.
Multicast
Basic
The Multicast Basic menu contains the following options:
• “IGMP Snooping Configuration”
Figure 4-20
The Basic IGMP Snooping Configuration screen contains the following fields:
IGMP Snooping Configuration
• IGMP Snooping Status – Select the IGMP Snooping status on the device. The possible
field values are:
– Enable – Enable IGMP Snooping on the device.
– Disable – Disable IGMP Snooping on the device.
Interface Settings
• VLAN ID – Displays the VLAN ID.
• Status – Select the IGMP Snooping status on the VLAN. The possible field values are:
– Enable – Enable IGMP Snooping on the VLAN.
– Disable – Disable IGMP Snooping on the VLAN.
2. Select the IGMP Snooping Status in the provided field.
3. Click Apply to update the device.
To configure IGMP Snooping on a VLAN:
1. Click Switching > Multicast > Basic > IGMP Snooping Configuration. The Basic IGMP
Snooping Configuration screen displays.
Advanced
The Multicast Advanced menu contains the following options:
• “IGMP Snooping Configuration”
• “Multicast Group Configuration”
• “Multicast Group Membership”
• “Multicast Forward All”
Figure 4-21
Figure 4-22
Figure 4-23
Figure 4-24
3. Select the port or LAG interface entry in the Multicast Group table.
4. Select the Interface Status from the list in the provided field in the first row.
5. Click Apply to update the device.
Address Table
Packets addressed to destinations stored in either the Static or Dynamic databases are immediately
forwarded to the port. The Dynamic MAC Address Table can be sorted by interface, VLAN, or
MAC Address. MAC addresses are dynamically learned from packets from sources that arrive at
the device as apposed to Static addresses that are configured manually.
An address becomes associated with a port by learning the port from the frame’s source address
but if a frame that is addressed to a destination MAC address is not associated with a port, that
frame is flooded to all relevant VLAN ports. To prevent the bridging table from overflowing, a
dynamic MAC address, from which no traffic arrives for a set period, is erased.
The Address Table menu contains the following options:
• “Basic”
• “Advanced”
Basic
The Address Table Basic menu contains the following options:
• “Address Table”
Address Table
The Basic Address Table screen displays the MAC Address table according to the defined
categories.
Figure 4-25
Advanced
The Address Table Advanced menu contains the following options:
• “Static Addresses”
• “Dynamic Addresses”
• “Address Table”
Static Addresses
The Static Addresses screen contains a list of static MAC addresses. Static Addresses are added
and removed from the Static Addresses screen. To prevent static MAC addresses from being
deleted when the device is reset, ensure the port attached to the MAC address is locked.
To configure the Static MAC Address table:
1. Click Switching > Address Table > Advanced > Static Addresses. The Static Addresses
screen displays:
Figure 4-26
• Status – Select the MAC Address duration period within the table. The possible field
values are:
– Permanent – The MAC address is permanent.
– Delete on Reset – The MAC address is deleted when the device is reset.
– Delete on Timeout – The MAC address is deleted when the Address Aging Interval
expires.
– Secure – The MAC Address is defined for locked interfaces.
2. Select the address table entry.
3. Enter the MAC Address and Interface in the provided fields in the first row.
4. Select the MAC Address duration period Status from the list in the provided field in the first
row.
5. Click Apply to update the device.
Dynamic Addresses
The Dynamic Addresses screen contains information about the aging time before a dynamic MAC
address is erased.
To configure the Dynamic MAC Address table:
1. Click Switching > Address Table > Advanced > Dynamic Addresses. The Dynamic
Addresses screen displays:
Figure 4-27
• Address Aging – Enter the amount of time the MAC address remains in the Dynamic
MAC Address table before it is timed out if no traffic from the source is detected. The
range is 10 – 630 seconds. The default value is 300 seconds.
2. Enter the Address Aging in the provided field in the first row.
3. Click Apply to update the device.
Address Table
The Advanced Address Table screen displays the MAC Address table according to the defined
categories.
To query the Advanced MAC Address Table:
1. Click Switching > Address Table > Advanced > Address Table. The Advanced Address
Table screen displays:
Figure 4-28
– VLAN ID – Display the MAC Address table entries that relate to the specific VLAN
ID.
– MAC Address – Display the MAC Address table entries that relate to MAC Address.
– Interface – Display the MAC Address table entries that relate to the specific interface.
• VLAN ID – Displays the VLAN ID number to which the entry refers.
• MAC Address – Displays the MAC address to which the entry refers.
• Interface – Displays the interface to which the entry refers.
2. Select the Search By key from the list in the provided field.
3. Enter the value to be searched for in the provided box.
4. Click Go to execute the query.
The navigation pane at the top of the web browser interface contains a QoS tab that enables you to
manage your FS728TP Smart Switch with features under the following main heading:
• “CoS”
The description that follows in this chapter describes configuring and managing QoS settings in
the FS728TP Smart Switch.
CoS
Quality of Service (QoS) provides the ability to implement QoS and priority queuing within a
network. For example, certain types of traffic that require minimal delay, such as Voice, Video, and
real-time traffic can be assigned to a high priority queue, while other traffic can be assigned to a
lower priority queue. The result is an improved traffic flow for traffic with high demand. QoS is
defined by:
• Classification – Specifies which packet fields are matched to specific values. All packets
matching the user-defined specifications are classified together.
• Action – Defines traffic management where packet forwarding is based on packet information
and packet field values such as VLAN Priority Tag (VPT) and DiffServ Code Point (DSCP).
After packets are assigned to a specific egress queue, CoS services can be assigned to the queue.
Egress queues are configured with a scheduling scheme by one of the following methods:
• Strict Priority – Ensures that time-sensitive applications are always forwarded. Strict Priority
(SP) allows the prioritization of mission-critical, time-sensitive traffic over less time-sensitive
applications. For example, under SP, voice over IP (VoIP) traffic can be prioritized so that it is
forwarded before FTP or email (SMTP) traffic.
5-1
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
• Weighted Round Robin – Ensures that a single application does not dominate the device
forwarding capacity. Weighted Round Robin (WRR) forwards entire queues in a round robin
order. All queues can participate in WRR, except SP queues. If the traffic flow is minimal, and
SP queues do not occupy the whole bandwidth allocated to a port, the WRR queues can share
the bandwidth with the SP queues. This ensures that the remaining bandwidth is distributed
according to the weight ratio. If WRR is selected, the following weights are assigned to the
queues: 1, 2, 4, 8.
The CoS menu contains the following options:
• “Basic”
• “Advanced”
Basic
The CoS Basic menu contains the following options:
• “CoS Global Configuration”
• “CoS Interface Configuration”
• “Queue”
• “Bandwidth”
Figure 5-1
Figure 5-2
Queue
The Queue screen contains fields for defining the QoS queue forwarding types.
To set the queue settings:
1. Click QoS > CoS > Basic > Queue. The Queue screen displays:
Figure 5-3
Bandwidth
After packets are assigned to a queue, a scheduling scheme can be assigned to an interface, using
either:
• Committed Burst Size – Indicates the maximum number of data bits transmitted within a
specific time interval.
• Committed Information Rate – Indicates the rate that data is transmitted. The rate is
averaged over a minimum time increment.
The Bandwidth screen allows the user to define Ingress Rate Limit and Egress Shaping Rates.
Figure 5-4
– Disable – Disable egress shaping rate on the interface. This is the default value.
• Egress Shaping Rates CIR – Enter the Egress Shaping Committed Information Rate
(CIR) in kilobits per second. The possible field range is 0 to 62500 for FE ports and 64 to
1000000 for GE ports.
2. Select the interface.
3. Choose either Enable or Disable in the Ingress Rate Limit Status provided field in the first
row.
4. If you selected Enable in the Ingress Rate Limit Status field, enter the Ingress Rate Limit in
the provided field in the first row.
5. Choose either Enable or Disable in the Egress Shaping Rate Status provided field in the first
row.
6. If you selected Enable in the Egress Shaping Rate Status field, enter the Egress Shaping
Rates CIR in the provided field in the first row.
7. Click Apply to update the device.
Advanced
The CoS Advanced menu contains the following options:
• “CoS to Queue Mapping”
• “DSCP to Queue Mapping”
Figure 5-5
Figure 5-6
• Restore Defaults– Restore the DSCP Mapping device factory default values. The possible
field values are:
– Checked – Restore the factory default settings for DSCP mapping values.
– Unchecked – Maintain the current DSCP mapping settings.
2. Select the Queue values for each DSCP In value in the provided fields.
3. Check or uncheck the Restore Defaults box in the provided field.
4. Click Apply to update the device.
The navigation pane at the top of the web browser interface contains a Security tab that enables
you to manage your FS728TP Smart Switch with features under the following main menu options:
• “Management Security”
• “Port Authentication”
• “Traffic Control”
• “ACL”
The description that follows in this chapter describes configuring and managing security settings
in the FS728TP Smart Switch.
Management Security
User Configuration
The User Configuration menu contains the following options:
• “Change Password”
6-1
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
Change Password
The Change Password screen contains parameters for configuring device passwords.
Authentication on this device uses only a password, not a username.
To change the device password:
1. Click Security > Management Security > User Configuration > Change Password. The
Change Password screen displays:
Figure 6-1
RADIUS
Remote Authorization Dial-In User Service (RADIUS) servers provide additional security for
networks. RADIUS servers provide a centralized authentication method for web access.
The default parameters are user-defined, and are applied to newly defined RADIUS servers. If new
default parameters are not defined, the system default values are applied to newly defined
RADIUS servers.
Figure 6-2
• Active – Select the priority in which the system performs authentication with a Radius
Server. The system performs authentication initially with the Radius Primary Server, and
if it fails, it performs authentication with the Radius Backup Server. The possible values
are:
– Primary – Defines the RADIUS Primary Server.
– Backup – Defines the RADIUS Backup Server.
2. Select the RADIUS server entry.
3. Enter the Host IP Address, Authentication Port, Number of Retries, Timeout for Reply,
Dead Time and Key String in the provided fields in the first row.
4. Select the Usage Type and Active server from the lists in the provided fields in the first row.
5. Click Apply to update the device.
To add a new RADIUS server entry:
1. Click Security > Management Security > RADIUS. The RADIUS screen displays.
2. Enter the Host IP Address, Authentication Port, Number of Retries, Timeout for Reply,
Dead Time and Key String in the provided fields in the first row.
3. Select the Usage Type and Active server from the lists in the provided fields in the first row.
4. Click Add to update the device.
To remove a RADIUS server entry:
1. Click Security > Management Security > RADIUS. The RADIUS screen displays.
2. Select the RADIUS server entry.
3. Click Delete to remove the entry.
TACACS+
Terminal Access Controller Access Control System (TACACS+) provides centralized security
user access validation. The system supports up-to 2 TACACS+ servers.
TACACS+ provides a centralized user management system, while still retaining consistency with
RADIUS and other authentication processes.
The TACACS+ protocol ensures network integrity through encrypted protocol exchanges between
the client and TACACS+ server. The TACACS+ default parameters are user-assigned defaults.
The default settings are applied to newly defined TACACS+ servers.
If default values are not defined, the system defaults are applied to the new TACACS+ new
servers.
To configure TACACS+ Settings:
1. Click Security > Management Security > TACACS+. The TACACS+ screen displays:
Figure 6-3
Authentication List
The Authentication List screen contains information for defining an authentication method for the
selected Authentication List. For example, if the user selects TACACS+ as the first entry, None as
the second, this causes authentication to first occur at the TACACS+ server. If the TACACS+
server is inaccessible or not defined, the session is permitted.
Once the Authentication List is defined as Local, it is not possible to define an alternative
authentication method as it is a built-in system authentication method.
In order to configure RADIUS/TACACS+ authentication, the user name should be configured as
$enab15$ on the RADIUS/TACACS+ server.
Figure 6-4
Port Authentication
Basic
The Port Authentication Basic menu contains the following option:
• “802.1X Configuration”
802.1X Configuration
The Basic 802.1X Configuration screen allows network managers to configure network
authentication parameters. In addition, Guest VLANs are enabled from the Basic 802.1X
Configuration screen.
To define the 802.1X configuration:
1. Click Security > Port Authentication > Basic > 802.1X Configuration. The Basic 802.1X
Configuration screen displays:
Figure 6-5
Advanced
The Port Authentication Advanced menu contains the following options:
• “802.1X Configuration”
• “Port Authentication”
802.1X Configuration
The Advanced 802.1X Configuration screen allows network managers to configure network
authentication parameters. In addition, Guest VLANs are enabled from the Advanced 802.1X
configuration screen.
Figure 6-6
• Guest VLAN ID – Select the guest VLAN ID from the list of the currently defined
VLANs.
2. Select Disable or Enable for the Port Based Authentication State in the provided field.
3. If you selected Enable for the Port Based Authentication State, then select the
Authentication Method from the list in the provided field.
4. Select Disable or Enable for the Guest VLAN status in the provided field.
5. If you selected Enable for the Guest VLAN field, then select the VLAN ID from the list in the
provided field.
6. Click Apply to update the device.
Port Authentication
The Port Authentication screen allows to configure port authentication interface parameters.
To configure port-based authentication global properties:
1. Click Security > Port Authentication > Advanced > Port Authentication. The Port
Authentication screen displays
Figure 6-7
• Server Timeout – Enter the amount of time (in seconds) that lapses before the device re-
sends a request to the authentication server. The field default is 30 seconds.
• Termination Cause – Displays the reason port authentication was terminated.
2. Select the interface.
3. Select the Port Control state, Guest VLAN mode and Periodic Reauthentication status in
the provided fields in the first row.
4. If you selected Enable as the Periodic Reauthentication status, enter the Reauthentication
Period in the provided field in the first row.
5. Enter the Quiet Period, Resending EAP time, Max EAP Requests, Supplicant Timeout
and Server Timeout in the provided field in the first row.
6. Click Apply to update the device.
Traffic Control
Storm Control
Storm Control limits the amount of Multicast and Broadcast frames accepted and forwarded by the
device. When Layer 2 frames are forwarded, Broadcast, and Multicast frames are flooded to all
ports on the relevant VLAN. This occupies bandwidth and loads all nodes on all ports.
A Broadcast Storm is a result of an excessive amount of broadcast messages simultaneously
transmitted across a network by a single port. Forwarded message responses are heaped onto the
network, straining network resources or causing the network to time out.
Storm control can be enabled per port by defining the packet type and the rate the packets are
transmitted. The system measures the incoming Broadcast and Multicast frame rates separately on
each port, and discards the frames when the rate exceeds a user-defined rate. By default, Storm
Control is enabled on all ports for Broadcast packets with a threshold of 200 kbps. Storm Control
is enabled by default.
The Storm Control screen provides fields for configuring broadcast storm control.
Figure 6-8
• Broadcast Rate Threshold – Enter the maximum rate (kilobits per second) at which
broadcast packets are forwarded. The range is 70-285000 kbps. The default value is 200
kbps.
2. Select the interface.
3. Select Enable or Disable Broadcast Control in the provided field in the first row.
4. If you selected Enable Broadcast Control, select the Broadcast Mode from the list in the
provided field in the first row.
5. If you selected Enable Broadcast Control, enter the Broadcast Rate Threshold in the
provided field in the first row.
6. Click Apply to update the device.
Port Security
Network security can be increased by limiting access on a specific port only to users with specific
MAC addresses. The MAC addresses can be dynamically learned or statically configured. Locked
port security monitors both received and learned packets that are received on specific ports.
Access to the locked port is limited to users with specific MAC addresses. These addresses are
either manually defined on the port, or learned on that port up to the point when it is locked. When
a packet is received on a locked port and the packet source MAC address is not tied to that port
(either it was learned on a different port, or it is unknown to the system), the protection mechanism
is invoked. It provides the following options for unauthorized packets arriving at a locked port:
• Forwarded
• Discarded with no trap
• Discarded with a trap
• Shuts down the port
Locked port security also enables storing a list of MAC addresses in the configuration file. The
MAC address list can be restored after the device has been reset.
Figure 6-9
• Max Entries – Enter the maximum number of MAC addresses that can be learned on the
port. The Max Entries field is enabled only if the Limited Dynamic Lock mode is selected.
The range is 1-128 entries. The default value is 1.
• Action – Select the action to be applied to packets arriving on a locked port. The possible
field values are:
– Forward – Forwards packets from an unknown source without learning the MAC
address.
– Discard – Discards packets from any unlearned source. This is the default value.
– Shutdown – Discards packets from any unlearned source and shuts down the port. The
port remains shut down until reactivated or until the device is reset.
• Trap – Select whether traps are enabled or disabled when a packet from an unknown
source is received on a locked port. The possible field values are:
– Enable – Enable traps.
– Disable – Disable traps. This is the default value.
• Trap Frequency (Sec) – Enter the frequency at which traps are sent. The field format is in
seconds. The range is 1-1,000,000. The default value is 10 seconds.
2. Select the port security Status, Learning Mode, Action and Trap status from the lists in the
provided fields in the first row.
3. Enter the Max Entries and Trap Frequency in the provided fields in the first row.
4. Click Apply to update the device.
ACL
Access Control Lists (ACL) allow network managers to define classification actions and rules for
specific ingress ports. Packets entering an ingress port, with an active ACL, are either admitted or
denied entry and the ingress port is disabled. If they are denied entry, the user can disable the port.
The ACL menu contains the following options:
• “MAC ACL”
• “MAC Rules”
• “MAC Binding Configuration”
• “IP ACL”
• “IP Rules”
• “IP Binding Configuration”
• “Binding Table”
MAC ACL
The MAC ACL screen allows a MAC Based ACL to be defined.
To view or rename MAC Based ACLs:
1. Click Security > ACL > MAC ACL. The MAC Configuration screen displays:
Figure 6-10
MAC Rules
The MAC Rules screen allows a MAC Rule to be defined within a configured ACL. Rules can be
added only if the ACL is not bound to an interface.
To define MAC Rules:
1. Click Security > ACL > MAC Rules. The MAC Rules screen displays:
Figure 6-11
• Priority – Defines the rule priority. When the packet is matched to a rule, user groups are
either granted permission or denied device management access. The rule number is
essential to matching packets to rules, as packets are matched on a first-fit basis.
• Source MAC Address – Enter the source MAC Address.
• Source Mask – Enter the mask of the new source MAC address.
• Destination MAC Address – Enter the destination MAC address.
• Destination Mask – Enter the mask of the new destination MAC address.
• VLAN ID – Enter the VLAN ID to which the MAC address is attached in the MAC Rules
database.
• Action – Select the action applied to packets with MAC addresses that have been filtered.
The possible field values are:
– Permit – Permit access to the device.
– Deny – Deny access to packets originating from the blocked MAC address.
– Shutdown – Drop packets that meet the ACL criteria, and disable the port to which the
packet was addressed.
2. Select the ACL Name from the list in the provided field.
3. Select the rule entry.
4. Enter the provided fields in the first row.
5. Click Apply to update the device.
To add a MAC rule:
1. Click Security > ACL > MAC Rules. The MAC Rules screen displays.
2. Select the ACL Name from the list in the provided field.
3. Enter the provided fields in the first row.
4. Click Add to update the device.
To delete a MAC rule:
1. Click Security > ACL > MAC Rules. The MAC Rules screen displays.
2. Select the ACL Name from the list in the provided field.
3. Select the rule entry.
4. Click Delete to remove the entry.
Figure 6-12
IP ACL
The IP ACL screen allows an IP Based ACL to be defined.
To view or rename IP Based ACLs:
1. Click Security > ACL > IP ACL. The IP ACL screen displays:
Figure 6-13
IP Rules
The IP Rules screen allows an IP Rule to be defined within a configured ACL. Rules can be added
only if the ACL is not bound to an interface.
To define IP Rules:
1. Click Security > ACL > IP Rules. The IP Rules screen displays:
Figure 6-14
IP Binding Configuration
To bind interfaces to an ACL:
1. Click Security > ACL > IP Binding Configuration. The IP Binding Configuration screen
displays:
Figure 6-15
Binding Table
To view the ACL Binding Table:
1. Click Security > ACL > Binding Table. The Binding Table screen displays:
Figure 6-16
The navigation pane at the top of the web browser interface contains a Monitoring tab that enables
you to manage your FS728TP Smart Switch with features under the following main menu options:
• “Logs”
• “RMON”
• “Port Mirroring”
The description that follows in this chapter describes configuring and managing monitoring
settings in the FS728TP Smart Switch.
Logs
Event messages have a unique format, as per the SYSLOG RFC recommended message format for
all error reporting, for example, Syslog+ local device reporting. Messages are assigned a severity
code, and include a message mnemonic, which identifies the source application generating the
message. Messages are filtered based on their urgency or relevancy. The following table contains
the Log Severity Levels:
Table 7-1. Severity Levels
Severity Severity Level Severity Level Description
Emergency 0 The system is not functioning.
Alert 1 The system needs immediate attention.
Critical 2 The system is in a critical state.
Error 3 A system error has occurred.
Warning 4 A system warning is logged.
Notice 5 The system is functioning properly, but a system notice is logged.
Informational 6 Device information is provided.
Debug 7 Detailed log information is provided.
7-1
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
This section provides information for managing logs. The logs enable viewing device events in
real time, and recording the events for later usage. Logs record and manage events and report
errors and informational messages.
The Logs menu contains the following options:
• “Logs Configuration”
• “Log Filter”
• “Memory Log”
• “Flash Log”
• “Server Log”
Logs Configuration
The Log Configuration screen contains fields for enabling and disabling logs globally.
To enable or disable event logging:
1. Click Monitoring > Logs > Logs Configuration. The Logs Configuration screen displays:
Figure 7-1
Log Filter
To configure log filters:
1. Click Monitoring > Logs > Log Filter. The Log Filter screen displays:
Figure 7-2
– Emergency – The highest warning level. If the device is down or not functioning
properly, an emergency log message is saved to the specified logging location.
– Alert – The second highest warning level. An alert log is saved, if there is a serious
device malfunction; for example, all device features are down.
– Critical – The third highest warning level. A critical log is saved if a critical device
malfunction occurs; for example, two device ports are not functioning, while the rest
of the device ports remain functional.
– Error – A device error has occurred; for example, if a single port is offline.
– Warning – The lowest level of a device warning. The device is functioning, but an
operational problem has occurred.
– Notice – Provides device information.
– Informational – Provides device information.
– Debug – Provides debugging messages.
2. Select the minimum severity level for RAM logs.
3. Select the minimum severity level for FLASH logs.
4. Click Apply to update the device.
Memory Log
The Memory Log screen contains all system logs in a chronological order that are saved in RAM
(Cache).
Figure 7-3
Flash Log
The Flash Log screen contains information about log entries saved to the log file in Flash,
including the time the log was generated, the log severity, and a description of the log message.
The message log is available after reboot.
To view the message logs in Flash:
1. Click Monitoring > Logs > Flash Log. The Flash Log screen displays:
Figure 7-4
– Emergency – The highest warning level. If the device is down or not functioning
properly, an emergency log message is saved to the specified logging location.
– Alert – The second highest warning level. An alert log is saved, if there is a serious
device malfunction; for example, all device features are down.
– Critical – The third highest warning level. A critical log is saved if a critical device
malfunction occurs; for example, two device ports are not functioning, while the rest
of the device ports remain functional.
– Error – A device error has occurred; for example, if a single port is offline.
– Warning – The lowest level of a device warning. The device is functioning, but an
operational problem has occurred.
– Notice – Provides device information.
– Informational – Provides device information.
– Debug – Provides debugging messages.
• Description – Displays the log message text.
2. Click Refresh or Clear Logs to refresh or reset the Flash Logs screen.
Server Log
The Server Log screen contains information for viewing and configuring the remote log servers.
New log servers can be defined and the log severity sent to each server.
To configure remote log servers:
1. Click Monitoring > Logs > Server Log. The Server Log screen displays:
Figure 7-5
7. Select the Minimum Severity level message sent to the server from the list in the provided
field in the first row.
8. Click Apply to update the device.
To add a remote log server:
1. Click Monitoring > Logs > Server Log. The Server Log screen displays.
2. Enter the Server IP address in the provided field in the first row.
3. Enter the UDP Port number in the provided field in the first row.
4. Select the Facility assigned to the server from the list in the provided field in the first row.
5. Enter an optional server Description in the provided field in the first row.
6. Select the Minimum Severity level message sent to the server from the list in the provided
field in the first row.
7. Click Add to update the device.
To remove a remote log server:
1. Click Monitoring > Logs > Server Log. The Server Log screen displays.
2. Select the log server entry.
3. Click Delete to remove the log server entry.
RMON
This section contains information for viewing Remote Monitoring Statistics. RMON Statistics
allow network managers to view network traffic information from a single workstation.
The RMON menu contains the following options:
• “Basic”
• “Advanced”
Basic
The RMON Basic menu contains the following options:
• “Statistics”
Statistics
The RMON Basic Statistics screen contains fields for viewing information about device utilization
and errors that occurred on the device.
To view RMON Basic Statistics:
1. Click Monitoring > RMON > Basic > Statistics. The RMON Basic Statistics screen displays:
Figure 7-6
• Broadcast Packets Received – Displays the number of good broadcast packets received
on the interface since the device was last refreshed. This number does not include
Multicast packets.
• Multicast Packets Received – Displays the number of good Multicast packets received
on the interface since the device was last refreshed.
• CRC & Alignment Errors – Displays the number of CRC and Align errors that have
occurred on the interface since the device was last refreshed.
2. Click Refresh or Clear All Counters to refresh or reset the RMON Basic Statistics screen.
Advanced
The RMON Advanced menu contains the following options:
• “Statistics”
• “History Control”
• “History Table”
• “Events Control”
• “Events Log”
• “Alarms”
Statistics
The RMON Advanced Statistics screen contains fields for viewing information about device
utilization and errors that occurred on the device.
Figure 7-7
• Multicast Packets Received – Displays the number of good Multicast packets received
on the interface since the device was last refreshed.
• CRC & Align Errors – Displays the number of CRC and Align errors that have occurred
on the interface since the device was last refreshed.
• Undersize Packets – Displays the number of undersized packets (less than 64 octets)
received on the interface since the device was last refreshed.
• Oversize Packets – Displays the number of oversized packets (over 1518 octets) received
on the interface since the device was last refreshed.
• Fragments – Displays the number of fragments (packets with less than 64 octets,
excluding framing bits, but including FCS octets) received on the interface since the
device was last refreshed.
• Jabbers – Displays the total number of received packets that were longer than 1518
octets. This number excludes frame bits, but includes FCS octets that had either a bad
Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS
with a non-integral octet (Alignment Error) number. The field range to detect jabbers is
between 20 ms and 150 ms.
• Collisions – Displays the number of collisions received on the interface since the device
was last refreshed.
• Frames of 64 Bytes – Displays the number of 64-byte frames received on the interface
since the device was last refreshed.
• Frames of 65 to 127 Bytes – Displays the number of 65 to 127 byte frames received on
the interface since the device was last refreshed.
• Frames of 128 to 255 Bytes – Displays the number of 128 to 255 byte frames received on
the interface since the device was last refreshed.
• Frames of 256 to 511 Bytes – Displays the number of 256 to 511 byte frames received on
the interface since the device was last refreshed.
• Frames of 512 to 1023 Bytes – Displays the number of 512 to 1023 byte frames received
on the interface since the device was last refreshed.
• Frames of 1024 to 1522 Bytes – Displays the number of 1024 to 1522 byte frames
received on the interface since the device was last refreshed.
RMON Summary Statistics
• Interface – Displays the port or LAG for which statistics are displayed.
• Drop Events – Displays the number of dropped events that have occurred on the interface
since the device was last refreshed.
• Received Bytes – Displays the number of octets received on the interface since the device
was last refreshed. This number includes bad packets and FCS octets, but excludes
framing bits.
• Received Packets – Displays the number of packets received on the interface, including
bad packets, Multicast, and Broadcast packets, since the device was last refreshed.
• Broadcast Packets Received – Displays the number of good broadcast packets received
on the interface since the device was last refreshed. This number does not include
Multicast packets.
• Multicast Packets Received – Displays the number of good Multicast packets received
on the interface since the device was last refreshed.
• CRC & Alignment Errors – Displays the number of CRC and Align errors that have
occurred on the interface since the device was last refreshed.
2. To view RMON Interface Statistics, select Port or LAG as the type of Interface and select the
interface from the list in the provided field. The RMON Interface Statistics for the selected
interface are displayed.
3. To view RMON Summary Statistics, select the interface and click GO.
To refresh or clear the RMON Advanced Statistics screen:
1. Open the RMON Advanced Statistics screen.
2. Click Refresh or Clear All Counters to clear or reset the RMON Advanced Statistics screen.
History Control
The RMON History Control screen contains information about samples of data taken from ports.
For example, the samples may include interface definitions or polling periods.
Figure 7-8
2. Enter the Source Interface, Sampling Interval, Samples Requested and Owner in the
provided field in the first row.
3. Click Add to update the device.
To remove a history control entry:
1. Click Monitoring >RMON > Advanced > History Control. The RMON History Control
screen displays.
2. Select the history control entry.
3. Click Delete to remove the history control entry.
History Table
The RMON History Table screen contains interface specific statistical network samples. Each
table entry represents all counter values compiled during a single sample.
To view the RMON History Table:
1. Click Monitoring > RMON > Advanced > History Table. The RMON History Table screen
displays:
Figure 7-9
History Table
• Sample No. – Displays the sample number from which the statistics were taken.
• Drop Events – Displays the number of dropped events that have occurred on the interface
since the device was last refreshed.
• Received Bytes – Displays the number of octets received on the interface since the device
was last refreshed. This number includes bad packets and FCS octets, but excludes
framing bits.
• Received Packets – Displays the number of packets received on the interface since the
device was last refreshed, including bad packets, Multicast, and Broadcast packets.
• Broadcast Packets – Displays the number of good Broadcast packets received on the
interface since the device was last refreshed. This number does not include Multicast
packets.
• Multicast Packets – Displays the number of good Multicast packets received on the
interface since the device was last refreshed.
• CRC Errors – Displays the number of CRC and Align errors that have occurred on the
interface since the device was last refreshed.
• Undersize Packets – Displays the number of undersized packets (less than 64 octets)
received on the interface since the device was last refreshed.
• Oversize Packets – Displays the number of oversized packets (over 1518 octets) received
on the interface since the device was last refreshed.
• Fragments – Displays the number of fragments (packets with less than 64 octets,
excluding framing bits, but including FCS octets) received on the interface since the
device was last refreshed.
• Jabbers – Displays the total number of received packets that were longer than 1518
octets. This number excludes frame bits, but includes FCS octets that had either a bad
Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS
with a non-integral octet (Alignment Error) number. The field range to detect jabbers is
between 20 ms and 150 ms.
• Collisions – Displays the number of collisions received on the interface since the device
was last refreshed.
• Utilization – Displays the percentage of the interface utilized.
2. Select the History Entry No. from the list in the provided field. The statistics are displayed.
3. To refresh the RMON History Table screen, click REFRESH.
Events Control
The RMON Events Control screen contains fields for defining RMON events.
To configure RMON events control:
1. Click Monitoring > RMON > Advanced > Events Control. The RMON Events Control
screen displays:
Figure 7-10
4. Select the event Type from the list in the provided field in the first row.
5. Click Apply to update the device.
To add an events control entry:
1. Click Monitoring > RMON > Advanced > Events Control. The RMON Events Control
screen displays.
2. Enter the Community, Description and Owner in the provided field in the first row.
3. Select the event Type from the list in the provided field in the first row.
4. Click Add to update the device.
To remove an events control entry:
1. Click Monitoring > RMON > Advanced > Events Control. The RMON Events Control
screen displays.
2. Select the events control entry.
3. Click Delete to remove the events control entry.
Events Log
The RMON Events Log screen contains a list of RMON events.
To view RMON events logs:
1. Click Monitoring > RMON > Advanced > Events Log. The RMON Events Log screen
displays
Figure 7-11
Alarms
The RMON Alarms screen contains fields for setting network alarms. Network alarms occur when
a network problem or event, is detected. Rising and falling thresholds generate events.
To set RMON alarms:
1. Click Monitoring > RMON > Advanced > Alarms. The RMON Alarms screen displays:
Figure 7-12
– Delta – Subtracts the last sampled value from the current value. The difference in the
values is compared to the threshold.
• Rising Threshold – Enter the rising counter value that triggers the rising threshold alarm.
The rising threshold is presented on top of the graph bars. Each monitored variable is
designated a color.
• Rising Event – Enter the event number by which rising alarms are reported.
• Falling Threshold – Enter the falling counter value that triggers the falling threshold
alarm. The falling threshold is graphically presented on top of the graph bars. Each
monitored variable is designated a color.
• Falling Event – Enter the event number by which falling alarms are reported.
• Startup Alarm – Select the trigger that activates the alarm generation. Rising is defined
by crossing the threshold from a low-value threshold to a higher-value threshold. The
possible field values are:
– Rising Alarm – The alarm is triggered by the rising counter crossing the rising
threshold value.
– Falling Alarm – The alarm is triggered by the falling counter crossing the falling
threshold value.
– Rising and Falling – The alarm is triggered by either the rising counter crossing the
rising threshold value or the falling counter crossing the falling threshold value.
• Interval – Enter the alarm interval time in seconds.
• Owner – Enter the device or user that defined the alarm.
2. Select the alarm entry.
3. Select the Counter Name from the list of MIB variable values in the provided field in the first
row.
4. Enter the Interface in the provided field in the first row.
5. Select the Sample Type from the list in the provided field in the first row.
6. Select the Startup Alarm from the list in the provided field in the first row.
7. If you selected Rising Alarm or Rising and Falling as the Startup Alarm, enter the Rising
Threshold and select the Rising Event number in the provided fields in the first row.
8. If you selected Falling Alarm or Rising and Falling as the Startup Alarm, enter the Falling
Threshold and select the Falling Event number in the provided fields in the first row.
9. Enter the Interval and Owner in the provided fields in the first row.
Port Mirroring
Port mirroring monitors and mirrors network traffic by forwarding copies of incoming and
outgoing packets from one port to a monitoring port. Port mirroring can be used as a diagnostic
tool as well as a debugging feature. Port mirroring also enables switch performance monitoring.
Network administrators can configure port mirroring by selecting a specific port from which to
copy all packets, and other ports to which the packets are copied. The device supports one
destination port and up to eight source ports.
The Port Mirroring menu contains the following option:
• “Port Mirroring”
Port Mirroring
To define port mirroring:
1. Click Monitoring > Port Mirroring > Port Mirroring. The Port Mirroring screen displays:
Figure 7-13
2. Enter the Source Port in the provided field in the first row.
3. Select the port mirroring Type from the list in the provided field in the first row.
4. Click Add to update the device.
To remove a source port entry:
1. Click Monitoring > Port Mirroring > Port Mirroring. The Port Mirroring screen displays.
2. Select the source port entry.
3. Click Delete to remove the source port entry.
The navigation pane at the top of the web browser interface contains a Maintenance tab that
enables you to manage your FS728TP Smart Switch with features under the following main menu
options:
• “Reset”
• “Upload”
• “Download”
• “File Management”
• “Troubleshooting”
The description that follows in this chapter describes configuring and managing maintenance
options in the FS728TP Smart Switch.
Reset
Device Reboot
The Device Reboot screen resets the device.
8-1
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
Figure 8-1
Factory Default
The Factory Default screen allows network managers to reset the device to the factory defaults
shipped with the switch. Restoring factory defaults results in erasing the configuration file.To reset
the device to the factory defaults:
1. Click Maintenance > Reset > Factory Default. The Factory Default screen displays:
Figure 8-2
8-2 Maintenance
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
• Note: all configuration settings will return to their default values after reset – Check
to confirm that the original factory default values will be restored after reset.
2. Check the confirmation box.
3. Click Apply to reset the device to the factory defaults.
Upload
Upload
System Files can be backed up using the Upload screen.
To back up files:
1. Click Maintenance > Upload. The Upload screen displays:
Figure 8-3
Maintenance 8-3
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
Download
Download
System files can be downloaded using the Download screen.
To download system files:
1. Click Maintenance > Download. The Download screen displays:
Figure 8-4
8-4 Maintenance
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
File Management
Active Image
The Active Image screen enables the user to select which image will be set as active after the next
reset.
To define the active image:
1. Click Maintenance > File Management > Active Image. The Active Image screen displays:
Figure 8-5
Maintenance 8-5
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
Troubleshooting
Diagnostics
The Diagnostics menu contains the following option:
• “Cable Test”
Cable Test
The Cable Test screen contains fields for performing tests on copper cables. Cable testing provides
information about where errors occurred in the cable, the last time a cable test was performed, and
the type of cable error that occurred. The tests use Time Domain Reflectometry (TDR) technology
to test the quality and characteristics of a copper cable attached to a port. Cables up to 120 meters
long can be tested. Cables are tested when the ports are in the down state, with the exception of the
Approximated Cable Length test.
8-6 Maintenance
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
To test cables:
1. Click Maintenance > Troubleshooting > Diagnostics > Cable Test. The Cable Test screen
displays:
Figure 8-6
Maintenance 8-7
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
• Cable Length – Displays the approximate cable length. This test can only be performed
when the port is up and operating at 100Mbps or 1 Gbps.
2. On the row containing the interface to be tested, click TEST to test the cable connected to the
interface.
8-8 Maintenance
v1.0, December 2007
Chapter 9
Online Help
Online Help
The navigation pane at the top of the web browser interface contains a Help tab that provides
access to informational services including support and an online user guide in PDF format. The
Help menu contains the following options:
• “Support”
• “User Guide”
The description that follows in this chapter covers these features.
c
Support
The Support screen provides access to the NETGEAR online support site at
http://www.netgear.com.
To access the Support screen:
1. Click Help > Online Help > Support. The Online Help menu opens and the Support screen
displays:
Figure 9-1
9-1
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
User Guide
The User Guide screen provides access to the PDF format of the User Guide.
To view the User Guide screen:
1. Click Help > Online Help > User Guide. The User Guide screen displays:
Figure 9-2
2. Click Apply to open a window and display the User Guide in PDF format.
This appendix provides default settings for the NETGEAR Model FS728TP Smart Switch. You
can always configure the switch to default settings by using the Factory Reset function from a Web
browser.
A-1
v1.0, December 2007
FS728TP Smart Switch FS728TP Smart Switch Software Administration Manual
A Firmware Upload 3
B G
Bandwidth Settings 5 getting started 1
F M
Firmware Download 4 map CoS 7
Index-1
v1.0, December 2007
FS728TP Smart Switch Software Administration Manual
N switch monitoring 1
system configuration 7
navigation menu 2
System Logs 1
network alarms 20
system requirements 1
network parameters 5
NIC settings 6
T
P TACACS+ 4
TDR 6
password
changing 8 Terminal Access Controller Access Control System
(TACACS+) 4
PoE 7
traffic queues 9
Port mirroring 22
Trap Filter 30, 31
Port VLAN ID (PVID) 20
PVID 20
U
Q upgrading the firmware 9
utilities
QoS 1
Smartwizard Discovery 2
QoS configuration 1 switch maintenance 1
Queue shaping 5 system settings 1
R V
RADIUS 2 view 7
Remote Monitoring Statistics 9 VLAN 14, 16
Restoring factory defaults 2 VLAN Membership 17
VLANs 14
S VPT 1
scheduling scheme 5
security configuration 1 W
Server Logs 7 Web access 7, 1
SNMP 13
SNMP groups 23, 25
SNMP v3 13
stacking 7
Index-2
v1.0, December 2007