EtherWAN EX26262 Management Manual

  • Hello! I am an AI chatbot trained to assist you with the EtherWAN EX26262 Management Manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Management Guide
www.edge-core.com
ECS2000
18/26/50-Port Layer 2
Gigabit Ethernet Switch
and GE PoE Switch
M
ANAGEMENT
G
UIDE
ECS2000-18T GIGABIT ETHERNET SWITCH
Layer 2 Gigabit Ethernet Switch
with 16 10/100/1000BASE-T Ports (RJ-45)
and 2 Gigabit Combination (RJ-45/SFP) Ports
ECS2000-18P GIGABIT ETHERNET SWITCH
Layer 2 Gigabit Ethernet PoE Switch
with 16 10/100/1000BASE-T Ports (RJ-45)
and 2 Gigabit Combination (RJ-45/SFP) Ports
ECS2000-26T GIGABIT ETHERNET SWITCH
Layer 2 Gigabit Ethernet Switch
with 24 10/100/1000BASE-T Ports (RJ-45)
and 2 Gigabit Combination (RJ-45/SFP) Ports
ECS2000-26P GIGABIT ETHERNET SWITCH
Layer 2 Gigabit Ethernet PoE Switch
with 24 10/100/1000BASE-T Ports (RJ-45)
and 2 Gigabit Combination (RJ-45/SFP) Ports
ECS2000-50T GIGABIT ETHERNET SWITCH
Layer 2 Gigabit Ethernet Switch
with 50 10/100/1000BASE-T Ports (RJ-45)
and 2 Gigabit Combination (RJ-45/SFP) Ports
ECS2000-50P GIGABIT ETHERNET SWITCH
Layer 2 Gigabit Ethernet PoE Switch
with 50 10/100/1000BASE-T Ports (RJ-45)
and 2 Gigabit Combination (RJ-45/SFP) Ports
ECS2000-18T/P
ECS2000-26T/P
ECS2000-50T/P
E032014-CS-R03
– 5 –
ABOUT THIS GUIDE
PURPOSE This guide gives specific information on how to operate and use the
management functions of the switch.
AUDIENCE The guide is intended for use by network administrators who are
responsible for operating and maintaining network equipment;
consequently, it assumes a basic working knowledge of general switch
functions, the Internet Protocol (IP), and Simple Network Management
Protocol (SNMP).
CONVENTIONS The following conventions are used throughout this guide to show
information:
N
OTE
:
Emphasizes important information or calls your attention to related
features or instructions.
C
AUTION
:
Alerts you to a potential hazard that could cause loss of data, or
damage the system or equipment.
W
ARNING
:
Alerts you to a potential hazard that could cause personal injury.
RELATED PUBLICATIONS The following publication details the hardware features of the switch,
including the physical and performance-related characteristics, and how to
install the switch:
The Installation Guide
Also, as part of the switch’s software, there is an online web-based help
that describes all management related features.
A
BOUT
T
HIS
G
UIDE
– 6 –
REVISION HISTORY This section summarizes the changes in each revision of this guide.
MARCH 2014 REVISION
This is the third version of this guide. This guide is valid for software
release v1.0.0.4. It includes the following changes:
â—†Correction to information on restoring factory defaults (see "System
Defaults" on page 28).
â—†Update on retaining IP settings when restoring factory defaults (see
"Restoring Factory Defaults" on page 296).
MARCH 2013 REVISION
This is the second version of this guide. This guide is valid for software
release v1.0.0.4. It includes information on the following changes:
â—†The VeriPHY option was removed from the Diagnostices menu.
â—†Updated description of IGMP SSM Range for Advanced Configuration,
IPMC, IGMP Snooping, Basic Configuration menu (see "Configuring
Global and Port-Related Settings for IGMP Snooping" on page 150).
â—†Updated description of Compatibility was for Advanced Configuration,
IPMC, IGMP Snooping, VLAN Configuration menu (see "Configuring
VLAN Settings for IGMP Snooping and Query" on page 153).
â—†Updated description of MLD SSM Range for Advanced Configuration,
IPMC, MLD Snooping, Basic Configuration menu (see "Configuring
Global and Port-Related Settings for MLD Snooping" on page 157).
â—†Updated description of Compatibility for Advanced Configuration, IPMC,
MLD Snooping, VLAN Configuration menu (see "Configuring VLAN
Settings for MLD Snooping and Query" on page 160).
AUGUST 2012 REVISION
This is the first version of this guide. This guide is valid for software release
v1.0.0.0.
– 7 –
CONTENTS
ABOUT THIS GUIDE 5
CONTENTS 7
FIGURES 13
TABLES 19
SECTION I GETTING STARTED 21
1INTRODUCTION 23
Key Features 23
Description of Software Features 24
System Defaults 28
2INITIAL SWITCH CONFIGURATION 31
SECTION II WEB CONFIGURATION 33
3USING THE WEB INTERFACE 35
Navigating the Web Browser Interface 35
Home Page 35
Configuration Options 36
Panel Display 36
Main Menu 37
4CONFIGURING THE SWITCH 47
Configuring System Information 47
Setting an IP Address 48
Setting an IPv4 Address 48
Setting an IPv6 Address 49
Configuring NTP Service 52
Configuring the Time Zone and Daylight Savings Time 53
Configuring Remote Log Messages 55
Configuring Power Reduction 57
C
ONTENTS
– 8 –
Reducing Power to Idle Queue Circuits 57
Configuring Port Connections 58
Configuring Security 60
Configuring User Accounts 61
Configuring User Privilege Levels 62
Configuring The Authentication Method For Management Access 64
Configuring SSH 67
Configuring HTTPS 68
Filtering IP Addresses for Management Access 69
Using Simple Network Management Protocol 70
Remote Monitoring 81
Configuring Port Limit Controls 86
Configuring Authentication Through Network Access Servers 89
Filtering Traffic with Access Control Lists 100
Configuring DHCP Snooping 111
Configuring DHCP Relay and Option 82 Information 114
Configuring IP Source Guard 115
Configuring ARP Inspection 119
Specifying Authentication Servers 122
Creating Trunk Groups 124
Configuring Static Trunks 125
Configuring LACP 127
Configuring Loop Protection 129
Configuring the Spanning Tree Algorithm 131
Configuring Global Settings for STA 133
Configuring Multiple Spanning Trees 137
Configuring Spanning Tree Bridge Priorities 139
Configuring STP/RSTP/CIST Interfaces 140
Configuring MIST Interfaces 143
Multicast VLAN Registration 144
Configuring General MVR Settings 145
Configuring MVR Channel Settings 148
IGMP Snooping 149
Configuring Global and Port-Related Settings for IGMP Snooping 150
Configuring VLAN Settings for IGMP Snooping and Query 153
Configuring IGMP Filtering 156
C
ONTENTS
– 9 –
MLD Snooping 157
Configuring Global and Port-Related Settings for MLD Snooping 157
Configuring VLAN Settings for MLD Snooping and Query 160
Configuring MLD Filtering 162
Link Layer Discovery Protocol 163
Configuring LLDP Timing and TLVs 163
Configuring LLDP-MED TLVs 166
Power over Ethernet 172
Configuring the MAC Address Table 175
IEEE 802.1Q VLANs 177
Assigning Ports to VLANs 178
Configuring VLAN Attributes for Port Members 179
Configuring Private VLANs 182
Using Port Isolation 183
Configuring MAC-based VLANs 184
Protocol VLANs 185
Configuring Protocol VLAN Groups 186
Mapping Protocol Groups to Ports 187
Configuring IP Subnet-based VLANs 188
Managing VoIP Traffic 190
Configuring VoIP Traffic 190
Configuring Telephony OUI 192
Quality of Service 193
Configuring Port Classification 194
Configuring Port Policiers 196
Configuring Egress Port Scheduler 197
Configuring Egress Port Shaper 200
Configuring Port Remarking Mode 201
Configuring Port DSCP Translation and Rewriting 204
Configuring DSCP-based QoS Ingress Classification 205
Configuring DSCP Translation 206
Configuring DSCP Classification 207
Configuring QoS Control Lists 208
Configuring Storm Control 212
Configuring Local Port Mirroring 213
Configuring Remote Port Mirroring 215
C
ONTENTS
– 10 –
Configuring UPnP 219
Configuring sFlow 221
5MONITORING THE SWITCH 225
Displaying Basic Information About the System 225
Displaying System Information 225
Displaying CPU Utilization 226
Displaying Log Messages 227
Displaying Log Details 229
Displaying Information About Ports 229
Displaying Port Status On the Front Panel 229
Displaying an Overview of Port Statistics 230
Displaying QoS Statistics 230
Displaying QCL Status 231
Displaying Detailed Port Statistics 232
Displaying Information About Security Settings 235
Displaying Access Management Statistics 235
Displaying Information About Switch Settings for Port Security 236
Displaying Information About Learned MAC Addresses 238
Displaying Port Status for Authentication Services 239
Displaying Port Statistics for 802.1X or Remote
Authentication Service 240
Displaying ACL Status 244
Displaying Statistics for DHCP Snooping 246
Displaying DHCP Relay Statistics 247
Displaying MAC Address Bindings for ARP Packets 248
Displaying Entries in the IP Source Guard Table 249
Displaying Information on Authentication Servers 250
Displaying a List of Authentication Servers 250
Displaying Statistics for Configured Authentication Servers 251
Displaying Information on RMON 255
Displaying RMON Statistics 255
Displaying RMON Historical Samples 256
Displaying RMON Alarm Settings 257
Displaying RMON Event Settings 258
Displaying Information on LACP 259
Displaying an Overview of LACP Groups 259
Displaying LACP Port Status 259
C
ONTENTS
– 11 –
Displaying LACP Port Statistics 260
Displaying Information on Loop Protection 261
Displaying Information on the Spanning Tree 262
Displaying Bridge Status for STA 262
Displaying Port Status for STA 265
Displaying Port Statistics for STA 266
Displaying MVR Information 267
Displaying MVR Statistics 267
Displaying MVR Group Information 268
Displaying MVR SFM Information 269
Showing IGMP Snooping Information 270
Showing IGMP Snooping Status 270
Showing IGMP Snooping Group Information 271
Showing IPv4 SFM Information 272
Showing MLD Snooping Information 273
Showing MLD Snooping Status 273
Showing MLD Snooping Group Information 274
Showing IPv6 SFM Information 275
Displaying LLDP Information 276
Displaying LLDP Neighbor Information 276
Displaying LLDP-MED Neighbor Information 277
Displaying LLDP Neighbor PoE Information 280
Displaying LLDP Neighbor EEE Information 281
Displaying LLDP Port Statistics 282
Displaying PoE Status 284
Displaying the MAC Address Table 285
Displaying Information About VLANs 286
VLAN Membership 286
VLAN Port Status 287
Displaying Information About MAC-based VLANs 288
Displaying Information About Flow Sampling 289
6PERFORMING BASIC DIAGNOSTICS 293
Pinging an IPv4 or IPv6 Address 293
7PERFORMING SYSTEM MAINTENANCE 295
Restarting the Switch 295
Restoring Factory Defaults 296
C
ONTENTS
– 12 –
Upgrading Firmware 296
Activating the Alternate Image 297
Managing Configuration Files 298
Saving Configuration Settings 298
Restoring Configuration Settings 299
SECTION III APPENDICES 301
ASOFTWARE SPECIFICATIONS 303
Software Features 303
Management Features 304
Standards 305
Management Information Bases 305
BTROUBLESHOOTING 307
Problems Accessing the Management Interface 307
Using System Logs 308
CLICENSE INFORMATION 309
The GNU General Public License 309
GLOSSARY 313
INDEX 321
– 13 –
FIGURES
Figure 1: Home Page 35
Figure 2: Front Panel Indicators 36
Figure 3: System Information Configuration 47
Figure 4: IP Configuration 49
Figure 5: IPv6 Configuration 51
Figure 6: NTP Configuration 52
Figure 7: Time Zone and Daylight Savings Time Configuration 55
Figure 8: Configuring Settings for Remote Logging of Error Messages 56
Figure 9: Configuring EEE Power Reduction 58
Figure 10: Port Configuration 60
Figure 11: Showing User Accounts 62
Figure 12: Configuring User Accounts 62
Figure 13: Configuring Privilege Levels 64
Figure 14: Authentication Server Operation 65
Figure 15: Authentication Method for Management Access 66
Figure 16: SSH Configuration 67
Figure 17: HTTPS Configuration 69
Figure 18: Access Management Configuration 70
Figure 19: SNMP System Configuration 75
Figure 20: SNMPv3 Community Configuration 76
Figure 21: SNMPv3 User Configuration 78
Figure 22: SNMPv3 Group Configuration 79
Figure 23: SNMPv3 View Configuration 80
Figure 24: SNMPv3 Access Configuration 81
Figure 25: RMON Statistics Configuration 82
Figure 26: RMON History Configuration 83
Figure 27: RMON Alarm Configuration 85
Figure 28: RMON Event Configuration 86
Figure 29: Port Limit Control Configuration 89
Figure 30: Using Port Security 89
Figure 31: Network Access Server Configuration 100
F
IGURES
– 14 –
Figure 32: ACL Port Configuration 102
Figure 33: ACL Rate Limiter Configuration 103
Figure 34: Access Control List Configuration 111
Figure 35: DHCP Snooping Configuration 113
Figure 36: DHCP Relay Configuration 115
Figure 37: Configuring Global and Port-based Settings for IP Source Guard 117
Figure 38: Configuring Static Bindings for IP Source Guard 118
Figure 39: Configuring Global and Port Settings for ARP Inspection 120
Figure 40: Configuring Static Bindings for ARP Inspection 121
Figure 41: Authentication Configuration 123
Figure 42: Static Trunk Configuration 127
Figure 43: LACP Port Configuration 129
Figure 44: Loop Protection Configuration 131
Figure 45: STP Root Ports and Designated Ports 132
Figure 46: MSTP Region, Internal Spanning Tree, Multiple Spanning Tree 132
Figure 47: Common Internal Spanning Tree, Common Spanning Tree,
Internal Spanning Tree 133
Figure 48: STA Bridge Configuration 136
Figure 49: Adding a VLAN to an MST Instance 138
Figure 50: Configuring STA Bridge Priorities 139
Figure 51: STP/RSTP/CIST Port Configuration 143
Figure 52: MSTI Port Configuration 144
Figure 53: MVR Concept 145
Figure 54: Configuring General MVR Settings 148
Figure 55: Configuring MVR Channel Settings 149
Figure 56: Configuring Global and Port-related Settings for IGMP Snooping 153
Figure 57: Configuring VLAN Settings for IGMP Snooping and Query 155
Figure 58: IGMP Snooping Port Group Filtering Configuration 156
Figure 59: Configuring Global and Port-related Settings for MLD Snooping 160
Figure 60: Configuring VLAN Settings for MLD Snooping and Query 162
Figure 61: MLD Snooping Port Group Filtering Configuration 163
Figure 62: LLDP Configuration 166
Figure 63: LLDP-MED Configuration 172
Figure 64: Configuring PoE Settings 175
Figure 65: MAC Address Table Configuration 177
Figure 66: VLAN Membership Configuration 179
Figure 67: VLAN Port Configuration 181
F
IGURES
– 15 –
Figure 68: Private VLAN Membership Configuration 183
Figure 69: Port Isolation Configuration 183
Figure 70: Configuring MAC-Based VLANs 185
Figure 71: Configuring Protocol VLANs 187
Figure 72: Assigning Ports to Protocol VLANs 188
Figure 73: Assigning Ports to an IP Subnet-based VLAN 189
Figure 74: Configuring Global and Port Settings for a Voice VLAN 192
Figure 75: Configuring an OUI Telephony List 193
Figure 76: Configuring Ingress Port QoS Classification 195
Figure 77: Configuring Ingress Port Tag Classification 196
Figure 78: Configuring Ingress Port Policing 197
Figure 79: Displaying Egress Port Schedulers 199
Figure 80: Configuring Egress Port Schedulers and Shapers 200
Figure 81: Displaying Egress Port Shapers 201
Figure 82: Displaying Port Tag Remarking Mode 202
Figure 83: Configuring Port Tag Remarking Mode 203
Figure 84: Configuring Port DSCP Translation and Rewriting 205
Figure 85: Configuring DSCP-based QoS Ingress Classification 206
Figure 86: Configuring DSCP Translation and Re-mapping 207
Figure 87: Mapping DSCP to CoS/DPL Values 208
Figure 88: QoS Control List Configuration 212
Figure 89: Storm Control Configuration 213
Figure 90: Mirror Configuration 215
Figure 91: Configuring Remote Port Mirroring 215
Figure 92: Mirror Configuration (Source) 218
Figure 93: Mirror Configuration (Intermediate) 218
Figure 94: Mirror Configuration (Destination) 219
Figure 95: UPnP Configuration 220
Figure 96: sFlow Configuration 223
Figure 97: System Information 226
Figure 98: CPU Load 227
Figure 99: System Log Information 228
Figure 100: Detailed System Log Information 229
Figure 101: Port State Overview 229
Figure 102: Port Statistics Overview 230
Figure 103: Queueing Counters 231
F
IGURES
– 16 –
Figure 104: QoS Control List Status 232
Figure 105: Detailed Port Statistics 234
Figure 106: Access Management Statistics 235
Figure 107: Port Security Switch Status 237
Figure 108: Port Security Port Status 238
Figure 109: Network Access Server Switch Status 240
Figure 110: NAS Statistics for Specified Port 244
Figure 111: ACL Status 245
Figure 112: DHCP Snooping Statistics 247
Figure 113: DHCP Relay Statistics 248
Figure 114: Dynamic ARP Inspection Table 249
Figure 115: Dynamic IP Source Guard Table 249
Figure 116: RADIUS Overview 250
Figure 117: RADIUS Details 254
Figure 118: RMON Statistics 256
Figure 119: RMON History Overview 257
Figure 120: RMON Alarm Overview 258
Figure 121: RMON Event Overview 258
Figure 122: LACP System Status 259
Figure 123: LACP Port Status 260
Figure 124: LACP Port Statistics 261
Figure 125: Loop Protection Status 262
Figure 126: Spanning Tree Bridge Status 264
Figure 127: Spanning Tree Detailed Bridge Status 265
Figure 128: Spanning Tree Port Status 266
Figure 129: Spanning Tree Port Statistics 267
Figure 130: MVR Statistics 268
Figure 131: MVR Group Information 269
Figure 132: MVR SFM Information 270
Figure 133: IGMP Snooping Status 271
Figure 134: IGMP Snooping Group Information 272
Figure 135: IPv4 SFM Information 273
Figure 136: MLD Snooping Status 274
Figure 137: MLD Snooping Group Information 275
Figure 138: IPv6 SFM Information 276
Figure 139: LLDP Neighbor Information 277
F
IGURES
– 17 –
Figure 140: LLDP-MED Neighbor Information 280
Figure 141: LLDP Neighbor PoE Information 281
Figure 142: LLDP Neighbor EEE Information 282
Figure 143: LLDP Port Statistics 283
Figure 144: Power over Ethernet Status 284
Figure 145: MAC Address Table 285
Figure 146: Showing VLAN Members 287
Figure 147: Showing VLAN Port Status 288
Figure 148: Showing MAC-based VLAN Membership Status 289
Figure 149: Showing sFlow Statistics 291
Figure 150: ICMP Ping 294
Figure 151: Restart Device 295
Figure 152: Factory Defaults 296
Figure 153: Software Upload 297
Figure 154: Software Image Selection 298
Figure 155: Configuration Save 299
Figure 156: Configuration Upload 299
F
IGURES
– 18 –
– 19 –
TABLES
Table 1: Key Features 23
Table 2: System Defaults 28
Table 3: Web Page Configuration Buttons 36
Table 4: Main Menu 37
Table 5: HTTPS System Support 68
Table 6: SNMP Security Models and Levels 71
Table 7: Dynamic QoS Profiles 93
Table 8: QCE Modification Buttons 105
Table 9: Recommended STA Path Cost Range 140
Table 10: Recommended STA Path Costs 141
Table 11: Default STA Path Costs 141
Table 12: QCE Modification Buttons 209
Table 13: System Capabilities 277
Table 14: Troubleshooting Chart 307
T
ABLES
– 20 –
/