Vigitron VI3010 User manual

Category
Network switches
Type
User manual
© 2014 Vigitron, Inc. All rights reserved. All brand and product names are trademarks or registered trademarks of
their respective companies.
MaxiiNetTM VI3010
Operational Manual
10 Port Series PoE+ L2 Plus Managed Switch
Release V1.00
1
About This Manual
Copyright
Purpose
Audience
Conventions
Warranty
Copyright © 2014 Vigitron, Inc. All rights reserved. The products and programs
described in this users manual are licensed products of Vigitron, Inc. This users
manual contains proprietary information protected by copyright, and this users
manual and all accompanying hardware, software and documentation are
copyrighted. No parts of this users manual may be copied, photocopied,
reproduced, translated or reduced to any electronic medium or machine-readable
from by any means electronic or mechanical. This also Includes photocopying,
recording, or information storage and retrieval systems, for any purpose other than
the purchasers personal use, and without the prior express written permission of
Vigitron, Inc.
This manual gives specific information on how to operate and use the management
functions of the Vi3010.
The manual is intended for use by network administrators who are responsible for
operating and maintaining network equipment. Consequently, it assumes a basic
working knowledge of general switch functions, the Internet Protocol (IP), and
Simple Network Management Protocol (SNMP).
The following conventions are used throughout this manual to show information.
NOTE: Emphasizes important information or calls your
attention to related features or instructions.
WARNING:
Alerts you to a potential hazard that could
cause personal injury.
CAUTION:
Alerts you to a potential hazard that could
cause loss of data, or damage the system or
equipment.
See the Customer Support/Warranty booklet included with the product. A copy of
the specific warranty terms applicable to Vigitron’s products and replacement
parts can be obtained from Vigitron’s Sales and Service Office or an authorized
dealer.
2
Disclaimer
FCC Warning
FCC Caution
CE Mark Warning
UL Mark
Vigitron does not warrant that the hardware will work properly in all environments
and applications, and makes no warranty and representation, either implied or
expressed, with respect to the quality, performance, merchantability, or fitness for
a particular purpose. Vigitron disclaims liability for any inaccuracies or omissions
that may have occurred. Information in this user’s manual is subject to change
without notice and does not represent a commitment on the part of Vigitron.
Vigitron assumes no responsibility for any inaccuracies that may be contained in
this user’s manual. Vigitron makes no commitment to update or keep current the
information in this user’s manual, and reserves the rights to make improvements
to this user’s manual and/or to the products described in this user’s manual, at any
time without notice.
This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference when the equipment is
operated in a commercial environment. This equipment generates, uses, and can
radiate radio frequency energy, and if not installed and used in accordance with
the instruction manual, may cause harmful interference to radio communications.
To assure continued compliance (example-use only shielded interface cables when
connection to computer or peripheral devices). Any changes or modifications not
expressly approved by the party responsible for compliance could void the user’s
authority to operate the equipment. This device complies with Part 15 of the FCC
Rules. Operation is subject to the Following two conditions: (1) This device may not
cause harmful interference, and (2) this device must accept any interference
received, including interference that may cause undesired operation.
This is a Class B device. In a domestic environment, this product may cause radio
interference. In which case, the user may be required to take adequate measures.
Ul 60950-1 Information Technology Equipment - Safety - Part 1:
General Requirements - Edition 2 - Revision Date 2014/05/13
3
Contents
About This Manual......................................................................................................................................................... 1
Introduction ................................................................................................................................................................... 8
Chapter 1: Operation of Web-Based Management ....................................................................................................... 9
Chapter 2: System Configuration ................................................................................................................................. 11
2-1 System Information ........................................................................................................................................... 11
2-1.1 Information ............................................................................................................................................... 11
2-1.2 Configuration ............................................................................................................................................ 13
2-2 Time .................................................................................................................................................................. 14
2-2.1 Manual ...................................................................................................................................................... 14
2-2.2 NTP ............................................................................................................................................................ 16
2-3 Account ............................................................................................................................................................. 17
2-3.1 Users ......................................................................................................................................................... 17
2-3.2 Privilege Level ........................................................................................................................................... 19
2-4 IP ....................................................................................................................................................................... 21
2-4.1 IPV4 ........................................................................................................................................................... 21
2-4.2 IPV6 ........................................................................................................................................................... 23
2-5 Syslog ................................................................................................................................................................ 24
2-5.1 Configuration ............................................................................................................................................ 24
2-5.2 Log ............................................................................................................................................................. 25
2-5.3 Detailed Log .............................................................................................................................................. 26
2-6 SNMP ................................................................................................................................................................ 27
2-6.1 System ....................................................................................................................................................... 27
2-6.2 Configuration ............................................................................................................................................ 28
2-6.3 Communities ............................................................................................................................................. 29
2-6.4 Users ......................................................................................................................................................... 30
2-6.5 Groups ....................................................................................................................................................... 32
2-6.6 Views ......................................................................................................................................................... 33
2-6.7 Access ........................................................................................................................................................ 34
2-6.8 Trap ........................................................................................................................................................... 36
Chapter 3: Configuration ............................................................................................................................................. 38
3-1 Port ................................................................................................................................................................... 38
3-1.1 Configuration ............................................................................................................................................ 38
3-1.2 Port Description ........................................................................................................................................ 40
3-1.3 Traffic Overview ........................................................................................................................................ 41
3-1.4 Detailed Statistics ...................................................................................................................................... 42
3-1.5 QoS Statistics ............................................................................................................................................. 44
3-1.6 SFP Information ......................................................................................................................................... 45
3-1.7 EEE ............................................................................................................................................................ 47
4
3-2 ACL .................................................................................................................................................................... 49
3-2.1 Ports .......................................................................................................................................................... 49
3-2.2 Rate Limiters ............................................................................................................................................. 51
3-2.3 Access Control List .................................................................................................................................... 52
3-2.4 ACL Status ................................................................................................................................................. 55
3-3 Aggregation ....................................................................................................................................................... 57
3-3.1 Static Trunk ............................................................................................................................................... 57
3-3.2 LACP .......................................................................................................................................................... 59
3-4 Spanning Tree ................................................................................................................................................... 64
3-4.1 Bride Settings ............................................................................................................................................ 64
3-4.2 MSTI Mapping ........................................................................................................................................... 67
3-4.3 MSTI Priorities ........................................................................................................................................... 69
3-4.4 CIST Ports .................................................................................................................................................. 70
3-4.5 MSTI Ports ................................................................................................................................................. 72
3-4.6 Bridge Status ............................................................................................................................................. 74
3-4.7 Port Status ................................................................................................................................................. 75
3-4.8 Port Statistics ............................................................................................................................................ 76
3-5 IGMP Snooping ................................................................................................................................................. 77
3-5.1 Basic Configuration ................................................................................................................................... 77
3-5.2 VLAN Configuration ................................................................................................................................... 79
3-5.3 Port Group Filtering .................................................................................................................................. 81
3-5.4 Status ........................................................................................................................................................ 83
3-5.5 Group Information .................................................................................................................................... 84
3-5.6 IPV4 SSM Information ............................................................................................................................... 85
3-6 MLD Snooping ................................................................................................................................................... 87
3-6.1 Basic Configuration ................................................................................................................................... 87
3-6.2 VLAN Configuration ................................................................................................................................... 90
3-6.3 Port Group Filtering .................................................................................................................................. 92
3-6.4 Status ........................................................................................................................................................ 93
3-6.5 Group Information .................................................................................................................................... 94
3-6.6 IPV6 SSM Information ............................................................................................................................... 95
3-7 MVR .................................................................................................................................................................. 96
3-7.1 Configuration ............................................................................................................................................ 96
3-7.2 Port Group Allow ....................................................................................................................................... 98
3-7.3 Groups Information ................................................................................................................................... 99
3-7.4 Statistics .................................................................................................................................................. 100
3-8 LLDP ................................................................................................................................................................ 101
3-8.1 LLDP Configuration .................................................................................................................................. 101
3-8.2 LLDP Neighbors ....................................................................................................................................... 104
3-8.3 LLDP-MED Configuration ......................................................................................................................... 106
5
3-8.4 LLDP-MED Neighbors .............................................................................................................................. 112
3-8.5 EEE .......................................................................................................................................................... 115
3-8.6 Port Statistics .......................................................................................................................................... 117
3-9 PoE .................................................................................................................................................................. 119
3-9.1 Configuration .......................................................................................................................................... 119
3-9.2 Status ...................................................................................................................................................... 121
3-9.3 Power Delay ............................................................................................................................................ 123
3-9.4 Auto Checking ......................................................................................................................................... 124
3-9.5 Scheduling ............................................................................................................................................... 126
3-10 Filtering Data Base ........................................................................................................................................ 127
3-10.1 Configuration ........................................................................................................................................ 127
3-10.2 Dynamic MAC Table .............................................................................................................................. 130
3-11 VLAN ............................................................................................................................................................. 131
3-11.1 VLAN Membership ................................................................................................................................ 131
3-11.2 Ports ...................................................................................................................................................... 133
3-11.3 Switch Status ......................................................................................................................................... 135
3-11.4 Port Status ............................................................................................................................................. 137
3-11.5 Private VLANs ........................................................................................................................................ 139
3-11.6 MAC-Based VLAN .................................................................................................................................. 141
3-11.6.1 Configuration ..................................................................................................................................... 141
3-11.7 Protocol-Based VLAN ............................................................................................................................ 144
3-12 Voice VLAN .................................................................................................................................................... 149
3-12.1 Configuration ........................................................................................................................................ 149
3-12.2 OUI ........................................................................................................................................................ 151
3-13 GARP ............................................................................................................................................................. 152
3-13.1 Configuration ........................................................................................................................................ 152
3-13.2 Statistics ................................................................................................................................................ 154
3-14 GVRP ............................................................................................................................................................. 155
3-14.1 Configuration ........................................................................................................................................ 155
3-14.2 Statistics ................................................................................................................................................ 157
3-15 QoS ............................................................................................................................................................... 158
3-15.1 Port Classification .................................................................................................................................. 158
3-15.2 Port Policing .......................................................................................................................................... 160
3-15.3 Port Schedulers ..................................................................................................................................... 161
3-15.4 Port Shaping .......................................................................................................................................... 163
3-15.5 Port Tag Remarking ............................................................................................................................... 166
3-15.6 Port DSCP .............................................................................................................................................. 167
3-15.7 DSCP-Based QoS ................................................................................................................................... 169
3-15.8 DSCP Translation ................................................................................................................................... 170
3-15.9 DSCP Classification ................................................................................................................................ 172
6
3-15.10 QoS Control List Configuration ............................................................................................................ 173
3-15.11 QCL Status ........................................................................................................................................... 177
3-15.12 Storm Control ...................................................................................................................................... 179
3-16 S-Flow Agent ................................................................................................................................................. 180
3-16.1 Collector ................................................................................................................................................ 180
3-16.2 Sampler ................................................................................................................................................. 182
3-17 Loop Protection ............................................................................................................................................ 184
3-17.1 Configuration ........................................................................................................................................ 184
3-17.2 Status .................................................................................................................................................... 186
3-18 Single IP......................................................................................................................................................... 187
3-18.1 Configuration ........................................................................................................................................ 187
3-18.2 Information ........................................................................................................................................... 188
3-19 Easy Port ....................................................................................................................................................... 189
3-20 Mirroring ....................................................................................................................................................... 191
3-21 Trap Event Severity ....................................................................................................................................... 193
3-22 UpnP ............................................................................................................................................................. 195
Chapter 4: Security .................................................................................................................................................... 196
4-1 Source Guard .................................................................................................................................................. 196
4-1.1 Configuration .......................................................................................................................................... 196
4-1.2 Static Table .............................................................................................................................................. 198
4-1.3 Dynamic Table ......................................................................................................................................... 199
4-2 ARP Inspection ................................................................................................................................................ 200
4-2.1 Configuration .......................................................................................................................................... 200
4-2.2 Static Table .............................................................................................................................................. 201
4-2.3 Dynamic Table ......................................................................................................................................... 202
4-3 DHCP Snooping ............................................................................................................................................... 203
4-3.1 Configuration .......................................................................................................................................... 203
4-3.2 Statistics .................................................................................................................................................. 204
4-4 DHCP Relay ..................................................................................................................................................... 206
4-4.1 Configuration .......................................................................................................................................... 206
4-4.2 Statistics .................................................................................................................................................. 208
4-5 NAS ................................................................................................................................................................. 210
4-5.1 Configuration .......................................................................................................................................... 210
4-5.2 Switch Status ........................................................................................................................................... 219
4-5.3 Port Status ............................................................................................................................................... 221
4-6 AAA ................................................................................................................................................................. 222
4-6.1 Configuration .......................................................................................................................................... 222
4-6.2 Radius Overview ..................................................................................................................................... 226
4-6.3 Radius Details .......................................................................................................................................... 228
4-7 Port Security ................................................................................................................................................... 233
7
4-7.1 Limit Control ........................................................................................................................................... 233
4-7.2 Switch Status ........................................................................................................................................... 236
4-7.3 Port Status ............................................................................................................................................... 238
4-8 Access Management ....................................................................................................................................... 239
4-8.1 Configuration .......................................................................................................................................... 239
4-8.2 Statistics .................................................................................................................................................. 241
4-9 SSH .................................................................................................................................................................. 242
4-10 HTTPs ............................................................................................................................................................ 243
4-11 Auth Method ................................................................................................................................................ 244
Chapter 5: Maintenance ............................................................................................................................................ 245
5-1 Restart ............................................................................................................................................................. 245
5-2 Firmware ......................................................................................................................................................... 246
5-2.1 Firmware Upgrade .................................................................................................................................. 246
5-2.2 Firmware Selection ................................................................................................................................. 247
5-3 Save/Restore ................................................................................................................................................... 249
5-3.1 Factory Defaults ...................................................................................................................................... 249
5-3.2 Save Start ................................................................................................................................................ 250
5-3.3 Save User................................................................................................................................................. 251
5-3.4 Restore User ............................................................................................................................................ 252
5-4 Export/Import ................................................................................................................................................. 253
5-4.1 Export Config ........................................................................................................................................... 253
5-4.2 Import Config .......................................................................................................................................... 254
5-5 Diagnostics ...................................................................................................................................................... 255
5-5.1 Ping ......................................................................................................................................................... 255
5-5.2 Ping6 ....................................................................................................................................................... 256
5-5.3 VeriPHY.................................................................................................................................................... 257
5-6 Battery Replacement ...................................................................................................................................... 258
Glossary of Web-Based Management ....................................................................................................................... 259
Contact Information .................................................................................................................................................. 273
8
Introduction
Overview
This user’s manual tells you how to install and connect the Vi3010 to your network
system. It also explains how to configure and monitor the Vi3010 through the built-
in CLI and web by (RJ-45) serial interface and Ethernet ports step-by-step. There
are many detailed explanations of hardware and software functions. There are also
examples of web-based interface and command-line interface (CLI) operations.
The Vi3010 series is the next generation of L2+ managed switches from Vigitron.
They are affordable managed switch that provides a reliable infrastructure for your
business network. These switches deliver more intelligent features you need to
improve the availability of your critical business applications, protect your sensitive
information, and optimize your network bandwidth to deliver information and
applications more effectively. They provides the ideal combination of affordability
and capabilities for entry level networking for the small business or enterprise
application and helps you create a more efficient, better-connected workforce.
Vi3010 L2+ Managed Switches provide 10 ports in a single device. The
specifications are highlighted as follows:
L2+ features provide better manageability, security, QoS, and
performance.
High port count design with all Gigabit Ethernet ports
Support guest VLAN, voice VLAN, Port based, tag-based and Protocol
based VLANs.
Support 802.3az Energy Efficient Ethernet standard
Support 802.3at High power PoE Plus standard
Support IPv6/ IPv4 Dual stack
Support s-Flow
Support Easy-Configuration-Port for easy implement the IP Phone, IP
Camera or Wireless environment.
Overview of this users manual
Chapter 1 “Operation of Web-based Management
Chapter 2 “System Configuration”
Chapter 3 “Configuration”
Chapter 4 “Security”
Chapter 5 “Maintenance”
9
Chapter 1: Operation of Web-Based
Management
Initial
Configuration
This chapter instructs you how to configure and manage the Vi3010 through the
web user interface. With this facility through any switch port, you can easily access
and monitor the complete status of the switch, including MIBs status, port activity,
Spanning tree status, port aggregation status, multicast traffic, VLAN and priority
status, even illegal access record and so on.
The default values of the Vi3010 are listed in the table below:
IP Address
192.168.1.1
Subnet Mask
255.255.255.0
Default Gateway
192.168.1.254
Username
admin
Password
To access the Vi3010 through a network connection, type the IP address of the
Vi3010 into the address box of a web browser and press "Enter". The default
address of the Vi3010 is 192.168.1.1. The computer must be on the same network.
If necessary, a computer can be connected directly to one of the switch ports. The
computer must be setup with the same network as the Vi3010, for example,
192.168.1.100.
The default username is “admin” and password should be left empty. The first
time logging in, enter the default username, and then click the <Login> button.
The Vi3010 supports a simple user management function to allow only one
administrator to configure the system at any one time. The use of simultaneous
administrators could result in unpredictable operation. Additional users, even with
administrators identity, should only monitor the system. Those who have no
administrators identity can only monitor the system. It is suggested, regardless of
security level, that viewing is limited to one client at a time. Also, after accessing the
Vi3010 and viewing is complete, log out.
NOTE: When you log into the switch, you must first type the
admin’s username and password. There is no default password
so initially it should be left blank. After you type the username,
please press enter. When you login Vi3010 series switch Web
UI management, you can use either ipv4 or ipv6 to log into the
switch.
To optimize the display effect, we recommend you use
Microsoft IE 6.0 above, Netscape V7.1 above or FireFox V1.00
above and have the resolution 1024x768. The switch supports
neutral web browser interface.
10
NOTE: The Vi3010 enables DHCP, so you do not need
to have a DHCP server to provide IP addresses to the
switch. The switch’s default IP is 192.168.1.1.
Figure 1: Login Page
11
Chapter 2: System Configuration
2-1 System
Information
2-1.1 Information
This chapter describes all of the basic configuration tasks, including system
information and any management of the switch (e.g. Time, Account, IP, Syslog and
SNMP).
After you login, the switch shows the system information. This is the default startup
page. It lists the basic information of the system, including “Model Name”, “System
Description”, “Contact, “Device Name”, “System Up Time”, “BIOS Version”,
“Firmware Version”, “Hardware-Mechanical Version”, “Serial Number, “Host IP
Address”, “Host Mac Address”, “Device Port, “RAM Size”, and “Flash Size”. With this
information, you will know the software version used, MAC address, serial number,
how many ports good and so on. This is helpful if the switch malfunctions.
The switch system information is provided here.
Web interface
To configure System Information in the web interface:
1. Click SYSTEM, System, Information.
2. Specify the contact information for the system administrator, the name and
location of the switch. Also indicate the local time zone by configuring the
appropriate offset.
3. Click “Refresh”.
Figure 2-1.1: System Information
12
Parameter
Description
Model name: The model name of this device.
System description: This describes the device. This device is “8 port 10/100/1000
Base-T + 2-Port TP/(100/1G) SFP Combo PoE L2 Plus Managed Switch”.
Location: This is the location of the switch (User-defined).
Contact: To easily manage and maintain the device, write down the contact
information of the person you would go to for help. This parameter can be
configured through the device’s user interface or SNMP.
Device name: The name of the switch (User-defined).
System Date: This shows the system time of the switch. The format is day of week,
month, day, hours: minutes: seconds, year.
System up time: The time accumulated since this switch is powered up. The format
is day, hour, minute, second.
BIOS version: The version of the BIOS in this switch.
Firmware version: The firmware version in this switch.
Hardware-Mechanical version: The version of hardware and mechanical. The figure
before the hyphen is the version of electronic hardware. The one after the hyphen is
the version of mechanical.
Serial number: The serial number is assigned by the manufacture.
Host IP address: The IP address of the switch is displayed here.
Subnet Mask: Displays the IP subnet mask assigned to the device.
Gateway IP Address: Displays the default gateway IP address assigned to the device
Host MAC address: This is the Ethernet MAC address of the management agent in
this switch.
Console Baud rate: Displays the baud rate of RS232 (COM) port.
RAM size: The size of the RAM in this switch.
Flash size: The size of the flash memory in this switch.
CPU Load: Displays the load is measured as averaged over the last 100ms, 1sec and
10 seconds intervals.
Bridge FDB size: Displays the bridge FDB size information.
Transmit Queue: Displays the device’s transmit hardware priority queue
information.
Maximum Frame size: Displays the device’s maximum frame size information.
13
2-1.2 Configuration
Parameter
Description
You can identify the system by configuring the contact information, name, and
location of the switch.
Web interface
To configure System Information in the web interface:
1. Click System, System Information, Configuration.
2. Write System Contact , System Name, System Location information on this
page.
3. Click “Apply.
Figure 2-1.2: System Information Configuration
System Contact: The textual identification of the contact person for this managed
node and information on how to contact this person. The allowed string length is 0
to 255, and the allowed content is the ASCII characters from 32 to 126.
System Name: An administratively assigned name for this managed node. By
convention, this is the node's fully-qualified domain name. A domain name is a text
string drawn from the alphabet (A-Z a-z), digits (0-9), minus sign (-). No space
characters are permitted as part of a name. The first character must be an alpha
character. The first or last character must not be a minus sign. The allowed string
length is 0 to 255.
System Location: The physical location of this node (e.g., telephone closet, 3rd
floor). The allowed string length is 0 to 255, and the allowed content is the ASCII
characters from 32 to 126.
14
2-2 Time
2-2.1 Manual
This page configure the switchs time. Time configure includes Manual Configuration
and NTP Configuration.
The switch provides manual and automatic options to set the system time via NTP.
Manual setting is simple. All you have to input is the “Year, “Month”, “Day”, “Hour,
“Minute” and “Second” within the valid value range indicated in each item.
Web Interface
To configure Time in the web interface:
1. Click Time, Manual.
2. Specify the time parameter in manual parameters.
3. Click “Apply.
Figure 2-2.1: The Time Configuration
15
Parameter
Description
Clock Source: Click to choose the clock source for the Vi3010. You can select “Use
local Settings” or “Use NTP Server” for Vi3010 time clock source.
Date and Time Format: The drop bar is for choose appropriate time format. Three
selections are provided.
YYYY-MM-DD HH:MM:SS
MM-DD-YYYY HH:MM:SS
DD-MM-YYYY HH:MM:SS
24 hours: The time is always represented in the 24-hour system.
12 hours: The time is always represented in the 12-hour system.
Local Time: Shows the current time of the system. The local time column can only
be filled out or inserted in 24 hours format.
Time Zone Offset: Provides the time zone offset relative to UTC/GMT. The offset is
given in minutes east of GMT. The valid range is from -720 to 720 minutes.
Daylight Saving: Daylight saving is adopted in some countries. If set, it will adjust the
time lag or advance by the unit of hours, according to the starting date and the
ending date. For example, if you set the daylight saving to be 1 hour. When the time
passes over the starting time, the system time will be increased one hour after one
minute at the time since it passed over. And when the time passes over the ending
time, the system time will be decreased one hour after one minute at the time since
it passed over.
The valid configurable daylight saving time is –5 to +5 step one hour. A zero for this
parameter means it doesn’t have to adjust current time, equivalent to in-act daylight
saving. You don’t have to set the starting/ending date. If you set daylight saving to
be non-zero, you have to set the starting/ending date as well. Otherwise, the
daylight saving function will not be activated.
Time Set Offset: Provides the daylight saving time set offset. The offset is given in
minutes east of GMT. The valid range is from 1 to 1440 minutes. The default is 60
minutes.
Daylight Savings Type: Provides the daylight savings type selection. You can select
“By Dates” or “Recurringtwo types for daylight saving type.
From: To configure the daylight saving start date and time, the format is “YYYY-MM-
DD HH:MM”. The column “HH: MM” can only be set up in 24 hour format.
To: To configure the daylight saving end date and time, the format is “YYYY-MM-DD
HH:MM”. The column “HH: MM” can only be set up in 24 hour format.
NOTE:
1. The “From and “To” display what you set on
the “From” and “To” field information.
2. The local time column and daylight saving
column will not actively change by the date
time format selection.
16
2-2.2 NTP
Parameter
Description
NTP is Network Time Protocol and is used to sync the network time based on
Greenwich Mean Time (GMT). If you use the NTP mode and select a built-in NTP
time server, or manually specify a user-defined NTP server and Time Zone, the
switch will sync the time in a short period after pressing <Apply> button. Though it
synchronizes the time automatically, NTP does not update the time periodically
without users processing.
Time Zone is an offset time of GMT. You have to select the time zone first and then
perform time sync via NTP because the switch will combine this time zone offset and
updated NTP time to come out the local time. Otherwise, you will not able to get the
correct time. The switch supports configurable time zone from –12 to +13 in 1 hour
steps.
Default Time Zone: +8 Hrs.
Web Interface
To configure Time in the web interface:
1. Click SYSTEM, NTP.
2. Specify the Time parameter in manual parameters.
3. Click “Apply.
Figure 2-2.2: The NTP Configuration
Server 1 to 5: Provides the NTP IPv4 or IPv6 address of this switch. IPv6 address is in
128-bit records represented as eight fields of up to four hexadecimal digits with a
colon separating each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'. The symbol
'::' is a special syntax that can be used as a shorthand way of representing multiple
16-bit groups of contiguous zero’s. However, it can only appear once. It can also
represent a legally valid IPv4 address. For example, '::192.1.2.34'.
Buttons: These buttons are displayed on the NTP page:
Apply – Click “Apply” to save changes.
Reset – Click “Reset” to undo any changes made locally and reverts to
previously saved values.
17
2-3 Account
2-3.1 Users
In this function, only the administrator can create, modify or delete the username
and password. The administrator can modify other guest identities’ password
without confirming the password, but it is necessary to modify the administrator-
equivalent identity. Guest-equivalent identity can modify his password only. Please
note that you must confirm administrator/guest identity in the field of Authorization
in advance before configuring the username and password. Only one administrator
is allowed to exist and cannot be deleted. In addition, up to 4 guest accounts can be
created.
This page provides an overview of the current users. Currently, the only way to login
as another user on the web server is to close and reopen the browser.
Web Interface
To configure Account in the web interface:
1. Click SYSTEM, Account, Users.
2. Click Add New User.
3. Specify the user name parameter.
4. Click “Apply.
Figure 2- 3.1: The Users Account Configuration
18
Parameter
Description
User Name: The name identifying the user. This is also a link to Add/Edit User.
Password: To type the password. The allowed string length is 0 to 255 and the
allowed content is the ASCII characters from 32 to 126.
Password (again): To type the password again. You must type the same password
again in the field.
Privilege Level: The privilege level of the user. The allowed range is 1 to 15. If the
privilege level value is 15, it can access all groups (e.g. Level 15 is granted the full
control of the device. But others value need to refer to each group privilege level).
User's privilege should be same or greater than the group privilege level to have the
access of that group. By default setting, most group privilege is level 5 and has the
read-only access and privilege level 10 has the read-write access. The system
maintenance (software upload, factory defaults and so on) need user privilege level
15. Generally, the privilege level 15 can be used for an administrator account,
privilege level 10 for a standard user account and privilege level 5 for a guest
account.
19
2-3.2 Privilege
Level This page provides an overview of the privilege levels. The switch provides user set
Account, Aggregation, Diagnostics, EEE, GARP, GVRP, IP, IPMC Snooping, LACP,
LLDP, LLDP MED, MAC Table, MRP, MVR, MVRP Maintenance Mirroring, POE Ports,
Private VLANs, QoS, SMTP, SNMP, Security, Spanning Tree, System Trap Event, VCL,
VLANs, Voice VLAN, and Privilege Levels from 1 to 15.
Web Interface
To configure Privilege Level in the web interface:
1. Click SYSTEM, Account, Privilege Level.
2. Specify the privilege parameter.
3. Click “Apply.
Figure 2- 3.2: The Privilege Level Configuration
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274

Vigitron VI3010 User manual

Category
Network switches
Type
User manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI