NS3702-24P-4S User Manual P/N 1072832 • REV 00.01 • ISS 14JUL14
10 1. INTRODUCTION NS3702-24P-4S - 24-Port 10/100/1000Mbps 802.3at PoE+ ports, 4-Port Shared Gi
100 The Page includes the following fields: Object Description Source MAC Address The Sourc
101 The Page includes the following fields: .Object Description Group ID Indicates the grou
102 Figure 4-5-4 : LACP Port Configuration Page Screenshot
103 The Page includes the following fields: Object Description Port The switch port number.
104 4.5.3 LACP System Status This Page provides a status overview for all LACP instances. The
105 4.5.4 LACP Port Status This Page provides a status overview for LACP status for all ports.
106 Auto-refresh : Automatic refresh occurs every 3 seconds. 4.5.5 LACP Port Statistics This
107 4.6 VLAN 4.6.1 VLAN Overview A Virtual Local Area Network (VLAN) is a network topology conf
108 4.6.2 IEEE 802.1Q VLAN In large networks, routers are used to isolate broadcast traffic
109 allows Spanning Tree to be enabled on all ports and work normally. Some relevant terms: -
11 1.2 Product Description Ideal Solution for Secure IP Surveillance Construction Particularly
110 Port VLAN ID Packets that are tagged (are carrying the 802.1Q VID information) can
111 nor the host at the other end of the connection supports VLANs, then you should add this po
112 Tagged: Ports with tagging enabled will put the VID number, priority and other VLAN info
113 The Managed Switch supports multiple VLAN tags and can therefore be used in MAN applicatio
114 Object Description Allowed Access VLANs This field shows the allowed Access VLANs, it o
115 Port VLAN Configuration The VLAN Port Configuration screen in Figure 4-6-2 appears. Figure
116 The VLANs that a trunk port is member of may be limited by the use of Allowed VLANs Fr
117 tagged on egress, they will be tagged with a C-tag. S-Port: On ingress, frames with a VL
118 Untag All All frames, whether classified to the Port VLAN or not, are transmitted withou
119 Figure 4-6-4: VLAN Membership Status for Static User Page Screenshot
12 Intelligent Powered Device Alive-Checking The NS3702 can be configured to monitor connecte
120 The Page includes the following fields: Object Description VLAN User A VLAN User is a m
121 uttons : Select VLAN Users from this drop down list. Auto-refresh : Check this box to refre
122 4.6.5 VLAN Port Status This Page provides VLAN Port Staus. The VLAN Port Status screen in F
123 Untagged VLAN ID Shows UVID (untagged VLAN ID). Port's UVID determines the packet&a
124 Figure 4-6-6 Private VLAN Membership Configuration page screenshot
125 The page includes the following fields: Object Description Delete To delete a private V
126 database servers on the inside segment, but are not allowed to communicate with each other
127 This Page is used for enabling or disabling port isolation on ports in a Private VLAN. A po
128 4.6.8 VLAN setting example: Separate VLAN 802.1Q VLAN Trunk Port Isolate 4.6.8.1
129 Untagged packet entering VLAN 2 1. While [PC-1] transmit an untagged packet enters Port
13 Cost-Effective PoE Switch solution for IPv6 Networking Faced with the increasingly large
130 VLAN 3 : Port-4, Port-5 and Port-6 VLAN 1 : All other ports – Port-7~Port-28 Figure 4-6-10
131 other switches within the same VLAN group. The screen in Figure 4-6-12 appears. Figure 4
132 VLAN 3 : Port-4, Port-5 and Port-6 VLAN 1 : All other ports – Port-7~Port-48 Figure 4-6-14
133 Figure 4-6-15: VLAN Overlap Port Setting & VLAN 1 – The Public Area Member Assign Tha
134 Setup steps 1. Assign Port Mode Set Port-1~Port-4 in Isolate port. Set Port5 and Port-6 i
135 VLAN 3: Port-3~Port-6. The screen in Figure 4-6-18 appears. Figure 4-6-17: Private VLAN Po
136 4.6.9 MAC-based VLAN The MAC-based VLAN enties can be configured here. This Page allows for
137 : Click to add a new MAC-based VLAN entry. : Click to apply changes : Click to undo any c
138 4.6.11 Protocol-based VLAN This Page allows you to add new protocols to Group Name (unique
139 3. For SNAP: Valid value in this case also is comprised of two different sub-values. a.
14 1.3 How to Use This Manual This User’s Manual is structured as follows: Section 2, INSTALLAT
140 Figure 4-6-21: Group Name to VLAN Mapping Table Page Screenshot
141 The Page includes the following fields: Object Description Delete To delete a Group Nam
142 4.7 Spanning Tree Protocol 4.7.1 Theory The Spanning Tree protocol can be used to detect an
143 STP communicates between switches on the network using Bridge Protocol Data Units (BPDUs).
144 Disabled – the port only responds to network management messages and must return to the
145 STP Operation Levels The Switch allows for two levels of operation: the switch level and th
146 The following are the user-configurable STP parameters for the switch level: Parameter Des
147 Port priority 128 Port cost 0 Bridge Priority 32,768 User-Changeable STA Parameters The
148 STP calculation of the most current Bridge and Port settings. Now, if switch A broadcasts
149 Figure 4-7-3: After Applying the STA Rules The switch with the lowest Bridge ID (switch C)
15 1.4 Product Features Physical Port 24-Port 10/100/1000Base-T RJ-45 copper with IEEE 80
150 ‧ Extension – Multiple Spanning Tree Protocol (MSTP) : Defines an extension to RSTP to fur
151 Forwarding (used in STP compatible mode). Valid values are in the range 4 to 30 seconds -De
152 : Click to apply changes : Click to undo any changes made locally and revert to previousl
153 4.7.4 CIST Port Configuration This Page allows the user to inspect the current STP CIST po
154 Valid values are in the range 1 to 200000000. Priority Controls the port priority. This
155 : Click to undo any changes made locally and revert to previously saved values. By default
156 4.7.5 MSTI Priorities This Page allows the user to inspect the current STP MSTI bridge inst
157 4.7.6 MSTI Configuration This Page allows the user to inspect the current STP MSTI bridge i
158 MSTI Mapping Object Description MSTI The bridge instance. The CIST is not available fo
159 Figure 4-7-10 : MST1 MSTI Port Configuration Page Screenshot The Page includes the foll
16 STP, IEEE 802.1D Spanning Tree Protocol RSTP, IEEE 802.1w Rapid Spanning Tree Protocol
160 values are in the range 1 to 200000000. Priority Controls the port priority. This can be
161 AlternatePort BackupPort RootPort DesignatedPort Disable CIST State The c
162 STP The number of legacy STP Configuration BPDU's received/transmitted on the port.
163 4.8 Multicast 4.8.1 IGMP Snooping The Internet Group Management Protocol (IGMP) lets host a
164 Figure 4-8-2: Multicast Flooding
165 Figure 4-8-3: IGMP Snooping Multicast Stream Control IGMP Versions 1 and 2 Multicast group
166 0x11 Specific Group Membership Query (if Group Address is Present) 0x16 Membership Report
167 Figure 4-8-4: IGMP State Transitions IGMP Querier – A router, or multicast-enabled s
168 4.8.2 Profile Table This page provides IPMC Profile related configurations. The IPMC profil
169 profile by using the following buttons: : List the rules associated with the designated p
17 IEEE 802.1X Authentication with Guest VLAN Built-in RADIUS client to cooperate with th
170 End Address The ending IPv4/IPv6 Multicast Group Address that will be used as an address
171 Figure 4-8-7: IGMP Snooping Configuration Page Screenshot The Page includes the following
172 unnecessary leave messages to the router side. Proxy Enable Enable IGMP Proxy. This feat
173 4.8.5 IGMP Snooping VLAN Configuration Each Page shows up to 99 entries from the VLAN table
174 IGMPv2, Forced IGMPv3. Default compatibility value is IGMP-Auto. PRI (PRI) Priority of I
175 Click "Save". The specific IGMP VLAN starts working after the corresponding stati
176 Object Description Port The logical port for the settings. Filtering Profile Select
177 The Page includes the following fields: Object Description VLAN ID The VLAN ID of the e
178 Figure 4-8-9: IGMP Snooping Groups Information Page Screenshot The Page includes the foll
179 The IGMPv3 Information screen in Figure 4-8-12 appears. Figure 4-8-12: IGMP SSM Informatio
18 1.5 Product Specifications Product NS3702-24P-4S Hardware Specifications SFP/mini-GBIC Slo
180 4.8.10 MLD Snooping Configuration This Page provides MLD Snooping related configuration. Th
181 MLD SSM Range SSM (Source-Specific Multicast) Range allows the SSM-aware hosts and route
182 The Page includes the following fields: Object Description Delete Check to delete the e
183 Buttons : Refreshes the displayed table starting from the "VLAN" input fields. :
184 Figure 4-8-15: MLD Snooping Port Group Filtering Configuration Page Screenshot
185 The Page includes the following fields: Object Description Port The logical port for th
186 The Page includes the following fields: Object Description VLAN ID The VLAN ID of the e
187 The "Start from VLAN", and "group" input fields allow the user to selec
188 Figure 4-8-18: MLD SSM Information Page Screenshot The Page includes the following fields
189 4.8.16 MVR (Multicaset VLAN Registration) The MVR feature enables multicast traffic forw
19 PD @ 15.4 watts 24 units PD @ 30.8 watts 14 units Layer 2 Functions Port Configuration Por
190 Figure 4-8-19: MVR Configuration Page Screenshot The Page includes the following fields:
191 Be Caution: MVR source ports are not recommended to be overlapped with management VLAN port
192 source ports. Subscribers cannot be directly connected to source ports. Receiver: Config
193 IGMPv1 Joins Received The number of Received IGMPv1 Joins. IGMPv2/MLDv1 Reports Recei
194 Object Description VLAN VLAN ID of the group. Groups Group ID of the group displayed
195 The Page includes the following fields: Object Description VLAN ID VLAN ID of the group
196 4.9 Quality of Service 4.9.1 Understanding QoS Quality of Service (QoS) is an advanced t
197 3. Create a QoS profile which associates a service level and a classifier. 4. Apply a QoS
198 4.9.3 Port Classification This Page allows you to configure the basic QoS Ingress Classific
199 CoS is shown in parentheses after the configured default CoS. DPL Controls the default d
2 Copyright © 2014 United Technologies Corporation Interlogix is part of UTC Building & In
20 Routing Protocols IPv4 software Static Routing IPv6 software Static Routing Management Funct
200 4.9.4 Port Scheduler This Page provides an overview of QoS Egress Port Schedulers for all s
201 4.9.5 Port Shaping This Page provides an overview of QoS Egress Port Shapers for all switch
202 4.9.5.1 QoS Egress Port Schedule and Shapers The Port Scheduler and Shapers for a specific
203 Queue Shaper Excess Controls whether the queue is allowed to use excess bandwidth. Qu
204 Figure 4-9-6: QoS Egress Port Tag Remarking Page Screenshot
205 The Page includes the following fields: Object Description Port The logical port for th
206 : Click to apply changes : Click to undo any changes made locally and revert to previousl
207 Classify Classification for a port have 4 different values. Disable: No Ingress DSC
208 4.9.8 DSCP-based QoS This Page allows you to configure the basic QoS DSCP-based QoS Ingress
209 QoS Class QoS Class value can be any of (0-7) DPL Drop Precedence Level (0-1)
21 RFC 3376 IGMP version 3 RFC 2710 MLD version 1 RFC 3810 MLD version 2 Environment Operating
210 4.9.9 DSCP Translation This Page allows you to configure the basic QoS DSCP Translation set
211 for QoS class and DPL map. There are two configuration parameters for DSCP Translation –
212 Object Description QoS Class Available QoS Class value ranges from 0 to 7. QoS Class (0
213 Broadcast: Only Broadcast MAC addresses are allowedd. The default value is 'Any&a
214 4.9.11.1 QoS Control Entry Configuration The QCE Configuration screen in Figure 4-9-13 ap
215 or range(0-1, 2-3, 4-5, 6-7, 0-3, 4-7) or 'Any' DEI Drop Eligible Indicator:
216 Source IP IPv6 source address: (a.b.c.d) or 'Any', 32 LS bits DSCP Diffserv Cod
217 The Page includes the following fields: Object Description User Indicates the QCL user.
218 'yes'. : Click to refresh the Page. 4.9.13 Storm Control Configuration Storm
219 Enable Controls whether the storm control is enabled on this switch port. Rate Contro
22 2. INSTALLATION This section describes the hardware features and installation of the Managed
220 4.9.14 WRED This page allows you to configure the Random Early Detection (RED) settings f
221 This value is restricted to 0-100. RED Drop Probability Function The following illustratio
222 4.9.15 QoS Statistics This Page provides statistics for the different queues for all swit
223 4.9.16 Voice VLAN Configuration The Voice VLAN feature enables voice traffic forwarding o
224 The Page includes the following fields: Object Description Mode Indicates the Voice
225 Port Discovery Protocol Indicates the Voice VLAN port discovery protocol. It will only w
226 4.9.17 Voice VLAN OUI Table Configure VOICE VLAN OUI table on this Page. The maximum entry
227 Buttons : Click to add a new access management entry. : Click to apply changes : Click to
228 4.10 Access Control Lists ACL is an acronym for Access Control List. It is the list table o
229 EType: The ACE will match Ethernet Type frames. Note that an Ethernet Type based ACE wil
23 Console Port The console port is a RJ-45 port connector. It is an interface for connecti
230 4.10.2 Access Control List Configuration This Page shows the Access Control List (ACL), whi
231 Permit: Frames matching the ACE may be forwarded and learned. Deny: Frames matching t
232 4.10.3 ACE Configuration Configure an ACE (Access Control Entry) on this Page. An ACE consi
233 The allowed range is 0x0 to 0xff. Frame Type Select the frame type for this ACE. These f
234 MAC Parameters Object Description SMAC Filter (Only displayed when the frame type is
235 specified (tag priority is "don't-care".) ARP Parameters The ARP parame
236 Target IP Mask When "Network" is selected for the target IP filter, you can en
237 choose this value. A field for entering an IP protocol filter appears. ICMP: Select IC
238 Network: Source IP filter is set to Network. Specify the source IP address and source IP
239 specific value. The allowed range is 0 to 255. A frame that hits this ACE matches this IPv6
24 NS3702-24P-4S LED Indication Table LED definition System LED Color Function P
240 "don't-care"). Specific: If you want to filter a specific ICMP code filt
241 TCP/UDP Destination Number When "Specific" is selected for the TCP/UDP destina
242 Ethernet Type Parameters The Ethernet Type parameters can be configured when Frame Type
243 4.10.4 ACL Ports Configuration Configure the ACL parameters (ACE) of each switch port. Thes
244 value is "Disabled". Logging Specify the logging operation of this port. The a
245 4.10.5 ACL Rate Limiter Configuration Configure the rate limiter for the ACL of the switch.
246 4.11 Authentication This section is to control the access of the Managed Switch, includes t
247 3rd party switch or a hub) and still require individual authentication, and that the client
248 Figure 4-11-1 Client—the device (workstation) that requests access to the LAN and switc
249 header is removed, leaving the EAP frame, which is then encapsulated for Ethernet and sent
25 2.1.3 Switch Rear Panel The rear panel of the Managed Switch indicates an AC inlet power soc
250 Ports in Authorized and Unauthorized States The switch port state determines whether
251 Figure 4-11-3: Authentication Method Configuration Page Screenshot
252 The Page includes the following fields: Object Description Client The management client
253 Figure 4-11-4: Network Access Server Configuration Page Screenshot The Page includes the f
254 Enabled after the interval specified by the Reauthentication Period. Reauthentication for 8
255 Single 802.1X Multi 802.1X MAC-Based Auth. If a client is denied access - either b
256 The "Guest VLAN Enabled" checkbox provides a quick way to globally enable/disable
257 authentication. Force Unauthorized In this mode, the switch will send one EAPOL Failure fr
258 EAPOL Start frame retransmission rate. Single 802.1X In port-based 802.1X authentication,
259 supplicants that might be on the port. The maximum number of supplicants that can be attach
26 2.2 Installing the Switch This section describes how to install your Managed Switch and make
260 supplicant is successfully authenticated. If present and valid, traffic received on the sup
261 For trouble-shooting VLAN assignments, use the "Monitor→VLANs→VLAN Membership and VLAN
262 transmission of EAPOL Request Identity frames is configured with EAPOL Timeout. If Allow Gu
263 port and will not cause the clients to get temporarily unauthorized. Reinitialize: Force
264 4.11.4 Network Access Overview This Page provides an overview of the current NAS port state
265 is not overridden by NAS. If the VLAN ID is assigned by the RADIUS server, "(RADIUS-as
266 QoS Class The QoS class assigned by the RADIUS server. The field is blank if no QoS clas
267 mesRx frames that have been received by the switch. Rx Logoff dot1xAuthEapolLogoffFramesRx
268 MAC-based Auth. Direction Name IEEE Name Description Rx Access Challenges dot1xAuth
269 Failures Fails Counts the number of times that the switch receives a failure message. This
27 Connection to the Managed Switch requires UTP Category 5e network cabling with RJ-45 tips.
270 Address rameSource VLAN ID - The VLAN ID on which the last frame from the last supplicant/
271 Selected Counters Object Description Selected Counters The Selected Counters table is v
272 : This button is available in the following modes: • Force Authorized • Force Unauthorized
273 Figure 4-11-7: RADIUS Server Configuration Page Screenshot The Page includes the followin
274 Key The secret key - up to 63 characters long - shared between the RADIUS server and the
275 : Click to undo the addition of the new server. : Click to apply changes : Click to undo
276 trying to contact a server that it has already determined as dead. Setting the Deadtime to
277 4.11.8 RADIUS Overview This Page provides an overview of the status of the RADIUS servers c
278 been disabled, but will get re-enabled when the dead-time expires. The number of seconds le
279 4.11.9 RADIUS Details This Page provides detailed statistics for a particular RADIUS server
28 Step 5: After the brackets are attached to the Managed Switch, use suitable screws to secure
280 counters. Direction Name RFC4668 Name Description Rx Access Accepts radiusAuthClientExtA
281 dropped for some other reason. Rx Packets Dropped radiusAuthClientExtPacketsDropped The num
282 counted as a retransmit as well as a timeout. A send to a different server is counted as a
283 between the backend servers to show details for. Object Description RADIUS accounting serv
284 Tx Retransmissions radiusAccClientExtRetransmissions The number of RADIUS packets retransmi
285 accounting attempts. Dead (X seconds left): Accounting attempts were made to this server
286 Figure 4-11-11: RADIUS Server Configuration Screenshot
287 2. Add New RADIUS Cleint on the Windows 2003 server Figure 4-11-12: Windows Server – Add
288 Figure 4-11-13: Windows Server RADIUS Server Setting 4. The shared secret key should be as
289 5. Configure ports attribute of 802.1X, the same as “802.1X Port Configuration”. Figure
29 Approved IFS SFP Transceivers NS3702 Managed Switch supports both single mode and m
290 Figure 4-11-17: Add User Properties Screen Figure 4-11-18: Add User Properties Screen
291 Set the Port Authenticate Status to “Force Authorized” if the port is connected to the RAD
292 4. Select “Authentication” tab. 5. Select “Enable network access control using IEEE 802.
293 Figure 4-11-21: Windows Client Popup Login Request Message 9. Enter the user name, passwo
294 4.12 Security This section is to control the access of the Managed Switch, includes the use
295 Figure 4-12-1: Port Limit Control Configuration Overview Page Screenshot The Page include
296 Aging Period If Aging Enabled is checked, then the aging period is controlled with this
297 available MAC addresses. Action If Limit is reached, the switch can take one of the foll
298 non-committed changes will be lost.
299 Buttons : Click to apply changes : Click to undo any changes made locally and revert to p
3 TABLE OF CONTENTS 1. INTRODUCTION...
30 1. It is recommended to use IFS SFPs on the Managed Switch. If you insert an SFP transceiv
300 host IP address matched the entry. SNMP Indicates the host can access the switch from SN
301 Buttons Auto-refresh : Check this box to refresh the Page automatically. Automatic refres
302 4.12.4 HTTPs Configure HTTPS on this Page. The HTTPS Configuration screen in Figure 4-12-4
303 port is set-up for software-based learning. In this mode, frames from unknown MAC addresses
304 Figure 4-12-6: Port Security Status Screen Page Screenshot The Page includes the followin
305 Object Description Port The port number for which the status applies. Click the port nu
306 4.12.7 Port Security Detail This Page shows the MAC addresses secured by the Port Security
307 4.12.8 DHCP Snooping DHCP Snooping is used to block intruder on the untrusted ports of DUT
308 Figure 4-12-8: DHCP Snooping Configuration Screen Page Screenshot The Page includes the fo
309 : Click to apply changes : Click to undo any changes made locally and revert to previousl
31 Figure 2-2-5: How to Pull Out the SFP/SFP+ Transceiver Never pull out the module without
310 Figure 4-12-10: IP Source Guard Configuration Screen Page Screenshot The Page includes th
311 that are matched in static entries on the specific port. Buttons : Click to translate all
312 4.12.12 ARP Inspection ARP Inspection is a secure feature. Several types of attacks can be
313 The Page includes the following fields: Object Description Mode of ARP Inspection Confi
314 4.12.13 ARP Inspection Static Table This Page provides Static ARP Inspection Table. The Sta
315 4.13 Address Table Switching of frames is based upon the DMAC address contained in the fram
316 Aging Configuration By default, dynamic entries are removed from the MAC table after 300 se
317 Buttons : Click to apply changes : Click to undo any changes made locally and revert to p
318 The Page includes the following fields: Object Description Type Indicates whether the
319 Page" input field. When first visited, the web Page will show the first 20 entries fro
32 3. SWITCH MANAGEMENT This chapter explains the methods that you can use to configure managem
320 Figure 4-13-4: Dynamic IP Source Guard Table Screenshot Navigating the ARP Inspection Tab
321 Buttons Auto-refresh : Check this box to refresh the Page automatically. Automatic refresh
322 4.14 LLDP 4.14.1 Link Layer Discovery Protocol Link Layer Discovery Protocol (LLDP) is us
323 Figure 4-14-1: LLDP Configuration Page Screenshot The Page includes the following fields: L
324 Port The switch port number of the logical LLDP port. Mode Select LLDP mode. Rx
325 System Description Optional TLV: When checked the "system description" is incl
326 The Page includes the following fields: Fast start repeat count Object Description Fas
327 Object Description Latitude Latitude SHOULD be normalized to within 0-90 degrees with a
328 or US. State National subdivisions (state, canton, region, province, prefecture). Cou
329 Emergency Call Service (e.g. E911 and others), such as defined by TIA or NENA. Object Desc
33 3.2 Management Access Overview The Managed Switch gives you the flexibility to access and ma
330 LAN. Object Description Delete Check to delete the policy. It will be deleted during th
331 applications relying on TCP with buffering would not be an intended use of this application
332 Object Description Port The port number for which the configuration applies. Policy
333 Devices. An LLDP-MED Network Connectivity Device is a LAN access device based on any of the
334 LLDP-MED Communication Endpoint (Class III) The LLDP-MED Communication Endpoint (Class II
335 Video Conferencing - for use by dedicated Video Conferencing equipment and other similar
336 Auto-negotiation Capabilities Auto-negotiation Capabilities shows the link partners MAC/
337 4. WLAN Access Point 5. Router 6. Telephone 7. DOCSIS cable device 8. Station only 9. Reser
338 Figure 4-14-5: LLDP Statistics Page Screenshot The Page includes the following fields: Gl
339 The displayed table contains a row for each port. The columns hold the following informatio
34 3.3 Administration Console The administration console is an internal, character-oriented, an
340 4.15 Network Diagnostics This section provide the Physical layer and IP layer network diagn
341 4.15.1 Ping This Page allows you to issue ICMP PING packets to troubleshoot IP connectivity
342 4.15.2 IPv6 Ping This Page allows you to issue ICMPv6 PING packets to troubleshoot IPv6 con
343 4.15.3 Remote IP Ping Test This Page allows you to issue ICMP PING packets to troubleshoot
344 : Click to undo any changes made locally and revert to previously saved values. : Clears th
345 The Page includes the following fields: Object Description Port The port where you are
346 4.16 Power over Ethernet Providing up to 24 PoE, in-line power interfaces, the NS3702-24P-4
347 3~12 Watts PoE Splitter PoE Splitter split the PoE 52V DC over the Ethernet cable into 5/1
348 Classification mode In this mode each port automatic determines how much power to reserv
349 Figure 4-16-2: PoE Configuration Screenshot
35 connected and monitor the system during system reboots. Also, certain error messages are sen
350 The page includes the following fields: Object Description System PoE Admin Mode Allows
351 A PD will return to Class 0 to 4 in accordance with the maximum power draw as specified by
352 Buttons : Click to apply changes : Click to undo any changes made locally and revert to
353 Disable: disable PoE function. Schedule: enable PoE function in schedule mode. Sch
354 4.16.6 PoE Status This page allows the user to inspect the total power consumption, total p
355 Figure 4-16-5:PoE Status Screenshot
356 The page includes the following fields: Object Description Sequential Power On Displays
357 4.16.7 PoE Schedule This page allows the user to define PoE schedule and schedule power rec
358 The screen in Figure 4-16-6 appears. Figure 4-16-6: PoE Schedule Screenshot Please press
359 Object Description Profile Set the schedule profile mode. Possible profiles are: Pro
36 3.5 SNMP-based Network Management You can use an external SNMP-based application to config
360 Figure 4-16-7: LLDP PoE Neighbour Screenshot Please be noticed that administrator has to
361 This page provides you with how to configure PD Alive Check.The screen in Figure 4-16-9 ap
362 Reboot & Alarm: It means system will reset the PoE port and issue an alarm message vi
363 4.16.10 Port Power Consumption This page allows user to see the usage of individual PoE Por
364 4.17 Loop Protection This chapter describes enabling loop protection function that provides
365 The Page includes the following fields: General Settings Object Description Enable Loop
366 4.17.2 Loop Protection Status This Page displays the loop protection port status of the swi
367 4.18 RMON RMON is the most important expansion of the standard SNMP. RMON is a set of MIB d
368 InUcastPkts: The number of uni-cast packets delivered to a higher-layer protocol. InN
369 : Click to add a new community entry. : Click to apply changes : Click to undo any change
37 4. WEB CONFIGURATION This section introduces the configuration and functions of the Web-base
370 : Click to refresh the Page immediately. Auto-refresh : Check this box to refresh the Page
371 Buttons : Click to add a new community entry. : Click to apply changes : Click to undo an
372 4.18.4 RMON Event Status This Page provides an overview of RMON Event table entries.Each Pa
373 4.18.5 RMON History Configuration Configure RMON History table on this Page. The entry inde
374 4.18.6 RMON History Status This Page provides an detail of RMON history entries; screen in
375 Jabb. The number of frames which size is larger than 64 octets received with invalid CR
376 Buttons : Click to add a new community entry. : Click to apply changes : Click to undo an
377 but including FCS octets) of between 64 and 1518 octets. Undersize The total number of p
378 5. SWITCH OPERATION 5.1 Address Table The Managed Switch is implemented with an address tab
379 The Managed Switch performs "Store and Fforward" therefore, no error packets oc
38 2. When the following login screen appears, please enter the default username "admin&q
380 6. Power over Ethernet Overview What is PoE? The PoE is an abbreviation of Power over Ether
381 specification allows two options for using these cables for power, shown in Figure 1 and Fi
User’s Manual of NS3702-24P-4S 7. TROUBLESHOOTING This chapter contains information to help you solve issues. If the Managed Switch is not functionin
User’s Manual of NS3702-24P-4S APPENDIX A: Networking Connection A.1 PoE RJ-45 Port Pin Assignments PIN NO RJ-45 POWER ASSIGNMENT 1 Power + 2 P
User’s Manual of NS3702-24P-4S A.3 10/100Mbps, 10/100Base-TX When connecting your Switch to another Fast Ethernet switch, a bridge or a hub, a straig
User’s Manual of NS3702-24P-4S The standard cable, RJ-45 pin assignment 2 1 3 6 12362 1 3 6 The standard RJ-45 receptacle/connector There are 8
386 APPENDIX B : GLOSSARY A ACE ACE is an acronym for Access Control Entry. It describes acc
387 See the Web Page help text for each specific port property. ACL|Rate Limiters: Under this
388 Auto-Negotiation Auto-negotiation is the process where two different devices establish th
389 DHCP used by networked computers (clients) to obtain IP addresses and other parameters such
39 Figure 4-1-3: Web Main Page Now, you can use the Web management interface to continue the
390 DoS is an acronym for Denial of Service. In a denial-of-service (DoS) attack, an attacker a
391 HTTP HTTP is an acronym for Hypertext Transfer Protocol. It is a protocol that used to tr
392 credentials for authentication from any point within the network. IGMP IGMP is an acron
393 IPMC is an acronym for IP MultiCast. IP Source Guard IP Source Guard is a secure feature u
394 administrator wants to do a fixed mapping between the DMAC address and switch ports. The
395 credentials are valid. Based on the answer, the NAS then allows or disallows access to the
396 OUI is the organizationally unique identifier. An OUI address is a globally unique identifi
397 An alternative protocol is Internet Message Access Protocol (IMAP). IMAP provides the user
398 Q QCE QCE is an acronym for QoS Control Entry. It describes QoS class associated with a
399 R RARP RARP is an acronym for Reverse Address Resolution Protocol. It is a protocol that
4 4.2.2 IP Configuration...
40 4.1 Main Web Page The Managed Switch provides a Web-based browser interface for configuring
400 (known as a message digest) of an input data sequence (the message) of any length. Shaper
401 strong authentication or guarantee confidentiality (Wikipedia). SSM SSM In SyncE this is
402 TELNET is an acronym for TELetype NETwork. It is a terminal emulation protocol that uses th
403 UDP provides two services not provided by the IP layer. It provides port numbers to help di
404 W WEP WEP is an acronym for Wired Equivalent Privacy. WEP is a deprecated algorithm to sec
405 (Wikipedia). WRES WRED is an acronym for Weighted Random Early Detection. It is an active
41 those listed in the Main Function. The screen in Figure 4-1-5 appears. Figure 4-1-5: Manage
42 4.2 System Use the System menu items to display and configure basic administrative details o
43 4.2.1 System Information The System Infomation Page provides information for the current dev
44 Software Version The software version of the Managed Switch. Software Date The date wh
45 mode traffic is routed between all interfaces. DNS Server This setting controls the DNS na
46 Mask Length The destination IP network or host mask, in number of bits (prefix length). Gate
47 Figure 4-2-3: IP Status Page Screenshot The Page includes the following fields: Object Desc
48 refer to each group privilege level. User's privilege should be same or greater than th
49 groups, i.e. that is granted the fully control of the device. But others value need to refer
5 4.4.1 Port Configuration...
50 If you forget the new password after changing the default password, please press the “Rese
51 4.2.5 Privilege Levels This Page provides an overview of the privilege levels. After setup i
52 The Page includes the following fields: Object Description Group Name The name identif
53 4.2.6 NTP Configuration Configure NTP on this Page. NTP is an acronym for Network Time Proto
54 4.2.7 Time Configuration Configure Time Zone on this Page. A Time Zone is a region that has
55 to identify the time zone. ( Range : Up to 16 characters ) Daylight Saving Time This is
56 Figure 4-2-10: UPnP Configuration Page Screenshot The Page includes the following fields:
57 Figure 4-2-11: UPnP devices show on Windows My Network Place 4.2.9 DHCP Relay Configure
58 screen in Figure 4-2-12 appears. Figure 4-2-12 DHCP Relay Configuration Page Screenshot Th
59 Drop: Drop the package when receiving a DHCP message that already contains relay informat
6 4.7.9 Port Statistics...
60 Receive Bad Circuit ID The packets number that the Circuit ID option did not match known
61 4.2.11 CPU Load This Page displays the CPU load, using a SVG graph. The load is measured as
62 4.2.12 System Log The Managed Switch system log information is provided here. The System Log
63 : Hides the selected log entries. : Downloads the selected log entries. : Updates the system
64 : Updates the system log entry to the previous available entry ID. : Updates the system log
65 Buttons : Click to apply changes : Click to undo any changes made locally and revert to pr
66 4.2.15 SMTP Configuration This Page facilitates an SMTP Configuration on the switch. The SMT
67 Buttons : Send a test mail to mail server to check this account is available or not. : Clic
68 DO NOT Power OFF the Managed Switch until the update progress is complete. Do not quit th
69 Do not quit the Firmware Upgrade Page without pressing the “OK” button after the image is l
7 4.9.12 QCL Status ...
70 Figure 4-2-24: Configuration Download Page Screenshot 4.2.20 Configuration Upload Configura
71 4.2.21 Configuration Activate Configuration Activate page allows to activate the startup-co
72 4.2.23 Image Select This Page provides information about the active and alternate (backup)
73 Object Description Image The flash index name of the firmware image. The name of primary
74 Figure 4-2-30: System Reboot Page Screenshot Buttons : Click to reboot the system. : Click
75 SNMP Operations SNMP itself is a simple request/response protocol. NMSs can send multiple
76 4.3.2 SNMP System Configuration Configure SNMP on this Page. The SNMP System Configuration s
77 SNMP version is SNMPv3, the community string will be associated with SNMPv3 communities tabl
78 4.3.3 SNMP Trap Configuration Configure SNMP trap on this Page. The SNMP Trap Configuration
79 Trap Community Indicates the community access string when send SNMP trap packet. The allo
8 4.12.12 ARP Inspection ...
80 System Enable/disable that the Interface group's traps. Possible traps are: Warm
81 System Name An administratively assigned name for this managed node. By convention, this
82 SNMPv1 or SNMPv2c community string. Source IP Indicates the SNMP access source address. A
83 engine with which this user can communicate. In other words, if user engine ID equal system
84 : Click to add a new user entry. : Click to apply changes : Click to undo any changes made
85 : Click to apply changes : Click to undo any changes made locally and revert to previously
86 : Click to undo any changes made locally and revert to previously saved values. 4.3.5.5 SNM
87 Write View Name The name of the MIB view defining the MIB objects for which this request
88 4.4 Port Management Use the Port Menu to display or configure the Managed Switch's port
89 red that it is down. Current Link Speed Provides the current link speed of the port. C
9 4.18.1 RMON Alarm Configuration ...
90 4.4.2 Port Statistics Overview This Page provides an overview of general traffic statistic
91 4.4.3 Port Statistics Detail This Page provides detailed traffic statistics for a specific s
92 Rx and Tx Broadcast The number of received and transmitted (good and bad) broadcast packe
93 : Clears the counters for all ports. Auto-refresh : Check this box to enable an automatic
94 Distance(m) Display the supports distance of current SFP module, the distance value is ge
95 Figure 4-4-7: Port Mirror Application The traffic to be copied to the mirror port is selec
96 Figure 4-4-8: Mirror Configuration Page Screenshot The Page includes the following fields:
97 Buttons : Click to apply changes : Click to undo any changes made locally and revert to pr
98 Figure 4-5-1: Link Aggregation The Link Aggregation Control Protocol (LACP) provides a stan
99 Enable the link aggregation prior to connecting any cable between the switches to avoid c
Comentarios a estos manuales