Kti-networks KS-2601 User Manual

Browse online or download User Manual for Computer Accessories Kti-networks KS-2601. KTI Networks KS-2601 User Manual

  • Download
  • Add to my manuals
  • Print

Summary of Contents

Page 1 - DOC.061214

1 Managed Switch User's Manual KS-2601 DOC.061214

Page 2

6 5. LEDs Conditions Definition 5.1 LEDs Defined The LEDs provide useful information about the switch and the status of all individual ports. [

Page 3 - Module Slot

7 6. Manage / Configure the switch 6.1 Introduction of the management functions This switch is a L2 management switch. It supports in-band managem

Page 4 - Contents

8 4. Port Mirror This switch operates in store-and-forward algorithm so it is not possible to monitor network traffic from another connection port.

Page 5 - 1. Introduction

9 8. Rate Control This function can limit the burst traffic rate for physical ports. The traffic could be ingress traffic or egress traffic. This

Page 6

10 6.2 Management with Console Connection Please follow the steps to complete the console hardware connection first. 1. Connect from the console

Page 7 - 3.3 Application

11 With help command, you can find the command list as follow. ------------------------------------------------------------------------------------

Page 8 - 4. Add/Remove Module

12 qos... Set QoS configuration ratecontrol... Set Rate Control configuration rmon... Set RMON Function configuration security...

Page 9

13 the switch by Http, Telnet and SNMP. For example, “set 1qvlan mgrpvid 5” will allow the users in the VLAN with VLAN ID 5 to manage the switch r

Page 10 - 5.1 LEDs Defined

14 For example, “set ARL 00-00-01-11-22-33 5” will add a static Mac ID “00-00-01-11-22-33” to ARL table for Port 5 and this Mac ID will never be ag

Page 11

15 reauthtime... Set 802.1x Re-authentication Timeout Period reqcnt... Set 802.1x Max Request Count rsip... Set Radius Server Addres

Page 12

2 We make no warranties with respect to this documentation and disclaim any implied warranties of merchantability, quality, or fitness for any parti

Page 13

16 transparent sub-command is used to set the operation of 802.1x function to transparent mode. In this mode, the switch will forward the 802.1x pa

Page 14

17 2.12 set igmp command This command is used to enable/disable IGMP snooping function for IP multicast operation. Its syntax is . . . >set igm

Page 15

18 This command is used to configure the mirror operation for ingress traffic. Its syntax is . . . >set mirror ingress [Argument List] div...

Page 16

19 netmask 255.255.255.0 gateway 192.168.1.154” will set these parameters as the IP address configuration of the switch. After the command, you ca

Page 17

20 This command is used to set the configuration for port-based VLAN. This switch supports both 802.1Q VLAN and port-based VLAN. If you want to ap

Page 18

21 2.19.4 set qos dot1p command This sub-command is used to enable/disable the 802.1P QoS operation for each connection port. For example, “set

Page 19

22 Examples : Set security 1 1 Description: Set Security mode of port 1 to Accept mode for Static Mac addresses. mode 0 = No Security

Page 20

23 f. TRAP Community string with “trapcommunity” sub-command. g. TRAP IP Address with “tapip” sub-command. h. Test TRAP Operation with “txtrp” sub-c

Page 21

24 >set sta port Port number is missing! Syntax: set sta port [port#] [cost=xxxx] [priority=xxxx] cost (1~65535) : It is used to determine the b

Page 22

25 2.26 set trunk command This switch supports three trunk groups (Trunk 1~3) maximum. They are disabled and null trunk groups default. Users can

Page 23

3 About this manual … This manual is a general user’s manual for the managed switch: 24+2G fully-modularized model It has three 8-port module slot

Page 24

26 rmon... Show RMON Function configuration security... Show port security mode for static MAC address snmp... Show snmp configu

Page 25

27 6 1(0x001) 0 7 1(0x001) 0 8 1(0x001) 0 9 1(0x001) 0 10 1(0x001)

Page 26

28 For Auto Detect mode, the switch will always keep auto-negotiation function ON but just modify its attribution if the auto mode of port is disabl

Page 27

29 PORT Status Auth.Mode ================================= 1 Yes FA 2 Yes FA 3 Yes

Page 28

30 3.12 show igmp command will show current IGMP snooping function enable/disable status and the IP multicast groups that learned by the switch.

Page 29

31 Port Name Status Disable Auto. Speed Duplex Flow Control ============================================================== 1

Page 30

32 [ID] [Vlan Name] [Port List] ==== ============== ================================== [ 1]

Page 31

33 ============================================================== The first part is the mapping of 802.1P priority values 0~7 to the four priority

Page 32

34 7 0 No Security 8 0 No Security 9

Page 33

35 8 128 19 None 00:00:00:00:00:00 [0] 9 128 19 None 00:00:00:00:00:00 [0] 10 12

Page 34

Contents 1. INTRODUCTION---------------------------------------------------------1 1.1 PACKAGE CONTENTS---------------------------------------------

Page 35

36 Note: Trunk 3 is the trunk for gigabit ports. For 8*FX+2G model, they are Port 9 and 10 for Trunk 3. 4. default command This command will resto

Page 36

37 [Command List] ?... Help commands help... Help commands arl... Search a specified MAC address in ARL table The synta

Page 37

38 This switch supports TFTP protocol for firmware and configuration update and backup. You should select backup firmware or configuration first.

Page 38

39 6.3 Management with Http Connection You can manage the switch with Http Web Browser connection. Before http connection, IP address configurat

Page 39

40 1. System Configuration

Page 40

41 “System Configuration” is the homepage of the switch. You can find firmware version and Mac address of the switch in this page. And you can con

Page 41

42 2. Port Configuration You can configure the operation of ports and find their status here. 1. Auto Mode You can select the auto function fo

Page 42 - >upgrade

43 For Auto Detect mode, the switch will always keep auto-negotiation function ON but just modify its attribution if the auto mode of port is disabl

Page 43

44 3. Spanning Tree In the page, users can enable/disable spanning tree function and configure the bridge parameters. Please refer to 2.24 of Se

Page 44 - 1. System Configuration

45 4. Dynamic Mac Address Table This web page will show the Mac address table content of the switch for connection ports. Select the port firs

Page 45

1 1. Introduction This managed switch is a Layer2 management switch with lots of advanced network functions including VLAN, trunking, spanning tree

Page 46

46 5. Static Mac Address Table This switch supports static Mac address assignment. You can assign static Mac addresses by two methods. a. Sele

Page 47

47 6. Mac Security Configuration This function is used to set the security modes for static Mac address on the port. There could be three opt

Page 48

48 7. Port-based VLAN This switch supports both 802.1Q VLAN and Port-based VLAN function. This web page is for you to configure port-based VLAN

Page 49

49 d. Click [Apply] to activate it. 3. Current Port-based VLAN Table You can see current Port-based VLAN settings in the table.

Page 50

50 8. 802.1Q VLAN Configuration This function is used to configure 802.1Q VLAN function. VLAN Function: This function is used to select VLAN m

Page 51

51 Ingress Filter: The ingress-filter function is for doing VLAN filtering at ingress port. If the packet and its ingress port are in the same VLAN

Page 52

52 9. Static 802.1Q VLAN Create an 802.1Q VLAN: 1. Input the VLAN ID and VLAN Name in “Create New Static VLAN”. Click [Create] to create the

Page 53

53 About Switch Management from Users Only the users in the same VLAN as Management Port PVID (set in “802.1Q VLAN Configuration” page) can manage

Page 54

54 10. 802.1Q VLAN Table This table will show the activity of 802.1Q VLAN. Both static and dynamic 802.1Q VLAN will be shown in the table. F

Page 55

55 11. 802.1x Configuration The 802.1x function can limit the port access for authentication users only. It needs a RADIUS server for the authe

Page 56

2 3. Configure Network Connection 3.1 Connecting Devices to the Intelligent Switch [ Connection Guidelines: ]  For 10BaseT connection: Category

Page 57

56 This is the timeout value between the switch and users (called “supplicant” in 802.1x) after first identification. The valid value is 0~65535. 5

Page 58

57 The Port Authentication Configuration is used to select the authentication mode for each port of the switch. 1. Auto: This is the normal 802.1x

Page 59

58 12. Protected Port Setting The Protected Port function can isolate the traffic between these protected ports. For example, Port 1,2,3 are m

Page 60

59 13. Trunk This switch supports three trunk connections and they are null by default. If users want to use trunk function, follow the steps t

Page 61

60 14. Mirror Follow the steps to configure Mirror function. 1. Select Enable in “Mirroring” and click [Apply] to enable the function. 2. Sele

Page 62

61 15. QoS This switch supports four priority queues on each port for QoS operation. Follow the steps to configure QoS function. 1. Select Ena

Page 63

62 16. Rate Control The rate control function can limit the maximum traffic rate for each physical port. The traffic could be ingress traffic o

Page 64

63 The rate control range is 64Kbps ~ 1000Mbps. Here is the rule for the setting. Maximum Rate Rate Control Number (N) Rule No Limit 0 0 means

Page 65

64 17. Storm Control The storm control function can limit the maximum traffic rate for packet storm. There are two traffic storms could be limi

Page 66 - Rate Control

65 packet storm. You can enable the storm control by port. Follow the steps to do the storm control settings. 1. Set the suppression rate. 2.

Page 67

3 3.3 Application A switch can be used to overcome the hub-to-hub connectivity limitations as well as improve overall network performance. Switc

Page 68

66 18. SNMP In this page, you can enable/disable RMON function; configure GET/SET/Trap Community Name and the IP address for trap operation. Th

Page 69

67 19. IGMP The IGMP function is for IP multicast operation in network. This switch can do IGMP Snooping function to get the IP multicast grou

Page 70

68 20. Statistics Users can find the traffic statistics here. Select port number to get the counters for different port. Users can modify the

Page 71 - 19. IGMP

69 21. Tools Four functions are supported as the system maintenance tools. a. System Reset This function will reset the switch. b. System Res

Page 72

70 6.4 About Telnet Interface If you want to use Telnet to management the switch from remote site, you have to set the IP/Mask/Gateway address to t

Page 73

71 7. Software Update and Backup This switch supports software/configuration backup and update/restore functions. It could be done in three ways.

Page 74 - 6.5 About SNMP Interface

72 A. Product Specifications [ 24+2G fully-modularized model ] Access Method Ethernet, CSMA/CD Standards Conformance IEEE 802.3 10BASE-T, IEEE 80

Page 75

73 B. Compliances EMI Certification FCC Class A Certification (USA) Warning: This equipment generates, uses, and can radiate radio frequency energ

Page 76 - A. Product Specifications

4 4. Add/Remove Module 4.1 Add/Remove Module [ For 24+2G Fully Modulized Model ] This model supports three 8-port 10/100Mbps TX/FX modules at fro

Page 77 - B. Compliances

5 2. If the switch is rack-mounted, you have to remove the switch from rack first. 3. Loosen the screws of the module with screwdriver. Two at the

Comments to this Manuals

No comments