Intellinet 561051 User Manual

Displayed below is the user manual for 561051 by Intellinet which is a product in the Network Switches category. This manual has 178 pages.

8PORTGIGABITETHERNETPOE+WEB
MANAGEDSWITCHWITH2SFPPORTS
USERMANUAL
MODEL561051
INT561051UM10150
TableofContents
1ProductIntroduction................................................................................................................1
1.1ProductOverview.....................................................................................................1
1.1.1Features.............................................................................................................1
1.2ExternalComponentDescription.............................................................................2
1.2.1FrontPanel........................................................................................................2
1.2.2RearPanel.........................................................................................................4
1.3PackageContents......................................................................................................4
2InstallingandConnectingtheSwitch.......................................................................................5
2.1Installation................................................................................................................5
2.1.1DesktopInstallation..........................................................................................5
2.1.2RackmountableInstallationin11inchCabinet...............................................5
2.1.3PowerontheSwitch.........................................................................................6
3HowtoLogintheSwitch..........................................................................................................7
3.1ConnectingComputer...............................................................................................7
3.2HowtoLogintotheSwitch.......................................................................................7
4SwitchConfiguration................................................................................................................9
4.1Toolbar....................................................................................................................10
4.1.1SAVE................................................................................................................10
4.1.2LOGOUT...........................................................................................................11
4.1.3REBOOT...........................................................................................................11
4.1.4REFRESH..........................................................................................................11
4.2System.....................................................................................................................12
4.2.1SystemInformation.........................................................................................12
4.2.2IPConfiguration..............................................................................................12
4.2.3UserConfiguration..........................................................................................13
4.2.4TimeSettings...................................................................................................14
4.2.5LogManagement............................................................................................15
4.2.6SNMPManagement........................................................................................18
4.3PortManagement...................................................................................................24
4.3.1PortConfiguration...........................................................................................24
4.3.2PortCounters..................................................................................................25
4.3.3BandwidthUtilization......................................................................................26
4.3.4PortMirroring.................................................................................................27
4.3.5JumboFrame...................................................................................................28
4.3.6PortErrorDisabledConfiguration...................................................................29
4.3.7ProtectedPorts...............................................................................................30
4.3.8EEEEnergyEfficientEthernet.......................................................................32
4.4LinkAggregation.....................................................................................................33
4.4.1LAGSetting......................................................................................................34
4.4.2LAGManagement...........................................................................................35
4.4.3LAGPortSettings.............................................................................................36
4.4.4LACPSettings...................................................................................................37
4.4.5LACPPortSettings...........................................................................................37
4.4.6LAGStatus.......................................................................................................38
4.5VLAN.......................................................................................................................40
4.5.1WhatisVLAN?.................................................................................................40
4.5.2ManagementVLAN.........................................................................................44
4.5.3CreateVLAN....................................................................................................44
4.5.4InterfaceSettings............................................................................................45
4.5.5PorttoVLAN....................................................................................................49
4.5.6PortVLANMembership..................................................................................50
4.5.7ProtocolVLANGroupSettings........................................................................51
4.5.8ProtocolVLANPortSettings............................................................................52
4.5.9GVRPSetting...................................................................................................52
4.5.10GVRPPortSetting............................................................................................53
4.5.11GVRPVLAN......................................................................................................53
4.5.12GVRPStatistics................................................................................................54
4.6SpanningTreeProtocol(STP)..................................................................................55
4.6.1WhatisSTP?....................................................................................................55
4.6.2STPGlobalSettings..........................................................................................62
4.6.3STPPortSettings.............................................................................................63
4.6.4CISTInstanceSetting.......................................................................................65
4.6.5CISTPortSettings............................................................................................66
4.6.6MSTInstanceConfiguration............................................................................68
4.6.7MSTPortSettings............................................................................................70
4.6.8STPStatistics....................................................................................................71
4.7Multicast.................................................................................................................72
4.7.1Properties........................................................................................................72
4.7.2IGMPSnooping...............................................................................................72
4.7.3IGMPSnoopingStatics....................................................................................82
4.7.4MLDSnooping.................................................................................................83
4.7.5MLDSnoopingStatics......................................................................................87
4.7.6MulticastThrottlingSetting............................................................................88
4.7.7MulticastFilter................................................................................................88
4.8QoS‐QualityofService..........................................................................................91
4.8.1General/WhatisQoS?...................................................................................91
4.8.2QoSBasicMode..............................................................................................95
4.8.3QoSAdvancedMode.......................................................................................97
4.8.4RateLimit......................................................................................................101
4.8.5VoiceVLAN....................................................................................................104
4.9Security.................................................................................................................108
4.9.1StormControl................................................................................................108
4.9.2802.1x............................................................................................................109
4.9.3DHCPSnooping.............................................................................................116
4.9.4DynamicARPInspection...............................................................................122
4.9.5PortSettings..................................................................................................123
4.9.6DynamicARPInspectionStatistics................................................................123
4.9.7IPSourceGuard.............................................................................................124
4.9.8DOS................................................................................................................127
4.9.9Authentication,authorization,andaccounting(AAA)..................................129
4.9.10TACACS+server.............................................................................................132
4.9.11Radiusserver.................................................................................................133
4.9.12Access............................................................................................................135
4.10AccessControlList................................................................................................137
4.10.1WhatisACL?.................................................................................................137
4.10.2MACBasedACL.............................................................................................137
4.10.3MACBasedACE............................................................................................137
4.10.4IPv4BasedACL..............................................................................................139
4.10.5IPv4BasedACE.............................................................................................139
4.10.6IPv6BasedACL..............................................................................................143
4.10.7IPv6BasedACE.............................................................................................143
4.10.8ACLBinding...................................................................................................144
4.11MACAddressTable...............................................................................................144
4.11.1WhatisaMACAddressTable?......................................................................144
4.11.2StaticMACSettings.......................................................................................145
4.11.3MACFiltering.................................................................................................145
4.11.4DynamicAddressSetting..............................................................................145
4.11.5DynamicallyLearned.....................................................................................146
4.12LinkLayerDiscoveryProtocol(LLDP)....................................................................147
4.12.1WhatisLLDP.................................................................................................147
4.12.2LLDPGlobalSetting.......................................................................................147
4.12.3LLDPPortSettings.........................................................................................148
4.12.4LLDPLocalDevice..........................................................................................150
4.12.5LLDPRemoveDevice.....................................................................................151
4.12.6LLDPMEDNetworkPolicySettings...............................................................151
4.12.7MEDPortSettings.........................................................................................154
4.12.8LLDPOverloading..........................................................................................155
4.12.9LLDPStatistics...............................................................................................156
4.13Diagnostics............................................................................................................157
4.13.1CableDiagnostics..........................................................................................157
4.13.2SystemStatus................................................................................................158
4.13.3IPv4PingTest................................................................................................158
4.13.4IPv6PingTest................................................................................................158
4.13.5TraceRoute...................................................................................................159
4.14RMON...................................................................................................................160
4.14.1WhatisRMON?.............................................................................................160
4.14.2RMONStatistics.............................................................................................160
4.14.3RMONEventandEventLog..........................................................................160
4.14.4RMONAlarm.................................................................................................162
4.14.5RMONHistoryandHistoryLog.....................................................................165
4.15Maintenance.........................................................................................................166
4.15.1FactoryDefault..............................................................................................166
4.15.2RebootSwitch...............................................................................................167
4.15.3BackupManager...........................................................................................167
4.15.4UpgradeManager.........................................................................................168
4.15.5ConfigurationManager.................................................................................169
4.15.6EnablePassword...........................................................................................169
5Warranty..............................................................................................................................170
6Copyright..............................................................................................................................171
7FederalCommunicationCommissionInterferenceStatement............................................172
1
1 ProductIntroduction
ThankyouforpurchasingtheIntellinet8PortGigabitEthernetPoE+WebManagedSwitch(561051).
Thisuserguidecoversallaspectsoftheinstallationofthisproduct.Notethatsomeofthe
configurationoptionsrequiretheusertohaveadvancedknowledgeofTCP/IPnetworks.
1.1 ProductOverview
TheIntellinet8PortGigabitEthernetPoE+WebManagedSwitch(561051)isdesignedtopassboth
dataandelectricalpowertoanumberofPoEcompatibledevicesviastandardCat5eorCat6network
cables.EquippedwitheightGigabitEthernetports(allofwhichsupport802.3at/afPoE/PoE+),this
switchcanpowerwirelessLANaccesspointsandbridges,VoIPphones,IPvideocamerasandmore
whiledeliveringnetworkspeedsofupto1000Mbps.
1.1.1 Features
ProvidespoweranddataconnectionforuptoeightPoEnetworkdevices
Foruseondesktopormountedinstandard19"rackSupportsAllpowerupto140W
IEEE802.3at/afcompliantRJ45PoE/PoE+outputportsSupportsIEEE802.3xflowcontrolforFull
duplexModeandbackpressureforHalfduplexMode
PoEpowerbudgetof140wattsSupportsWEBmanagementinterface
SupportsIEEE802.3atandIEEE802.3afcompliantPoEdevices(wirelessaccesspoints,VoIP
phones,IPcameras)Internalpoweradaptersupply
GreenEthernetpowersavingtechnologydeactivatesunusedportsandadjustspowerlevels
basedonthecablelength
2
1.2 ExternalComponentDescription
1.2.1 FrontPanel
ThefrontpaneloftheSwitchconsistsof8x10/100/1000MbpsRJ45ports,1xConsoleport,2x
SFPports,1xResetbuttonandaseriesofLEDindicators.
10/100/1000MbpsRJ45ports(1~8):
Designedtoconnecttothedevicewithabandwidthof10Mbps,100Mbpsor1000Mbps.Eachhasa
corresponding10/100/1000MbpsLED.
Consoleport(Console):
ConnecttotheIntellinetswitchwithaserialportofacomputerorterminalformonitoringand
configurationpurposes.
SFPports(SFP1,SFP2):
DesignedtoinstalltheSFPmoduleandconnecttothedevicewithabandwidthof1000Mbps.Eachhasa
corresponding1000MbpsLED.
Resetbutton(Reset):
Whilethedeviceispoweredon,pressthebuttonfor2secondstoreboottheswitch,andpressthebutton
for5secondstorestoretheswitchtoitsoriginalfactorydefaultsettings.
LEDindicators:
TheLEDIndicatorswillallowyoutomonitor,diagnoseandtroubleshootanypotentialproblemwiththe
switch.
3
ThefollowingchartshowstheLEDindicatorsoftheSwitchalongwithexplanationofeachindicator.
LEDCOLORSTATUSSTATUSDESCRIPTION
PWRGreen
OnPowerOn
OffPowerOff
Link/Act
(18)
10/100M:
Orange
OnAdeviceisconnectedtotheport.
OffNodeviceconnectedtotheport.
1000M:
GreenFlashingSendingorreceivingdata.
PoEGreen
On
APoweredDevice(PD)isconnectedtotheport,and
powerisbeingprovided.
Off
NoPDisconnectedtothecorrespondingport,orno
powerissuppliedtotheport.
Flashing
PoEoverloadorshortcircuit.DisconnectthePDright
away.
Max1
(14Ports)
Green
On
WhenthepowerwhichoutputtoPDshasreached
themaximumpowerbudget(Thepowerofallthe
connectedPoEportsis≥55W).Nopowermaybe
suppliedifadditionalPDsareconnected.
Off
ThepowerofalltheconnectedPoEportsis<55W,or
NoPDconnectedtothecorrespondingport.
Flashing
WhenthepowerwhichoutputtoPDshasexceeded
themaximumpowerbudget(Thepowerofallthe
connectedPoEportis≥70W).
Max2
(58Ports)
Green
On
WhenthepowerwhichoutputtoPDshasreached
themaximumpowerbudget(Thepowerofallthe
connectedPoEportsis≥55W).Nopowermaybe
suppliedifadditionalPDsareconnected.
Off
ThepowerofalltheconnectedPoEportsis<55W,or
NoPDconnectedtothecorrespondingport.
Flashing
WhenthepowerwhichoutputtoPDshasexceeded
themaximumpowerbudget(Thepowerofallthe
connectedPoEportis≥70W).
SFP1
SFP2
Green
OnAdeviceisconnectedtotheport
OffAdeviceisdisconnectedtotheport
FlashingSendingorreceivingdata
4
1.2.2 RearPanel
ACPowerConnector:

PowerissuppliedthroughanexternalACpoweradapter.Its
upportsAC100~240V,50/60Hz.
1.3 PackageContents
BeforeinstallingtheSwitch,makesurethatthefollowingthe"packinglist"listedOK.Ifanypartislost
anddamaged,pleasecontactyourlocalagentimmediately.Inaddition,makesurethatyouhavethe
toolsinstallswitchesandcablesbyyourhands.
8PortGigabitEthernetPoE+WebManagedSwitchwith2SFPPorts
Fourrubberfeet,twomountingearsandeightsscrews
OneACpowercord
OneQuickInstallationGuide
InstallationCDwithUserManual
5
2 InstallingandConnectingtheSwitch
ThispartdescribeshowtoinstallyourPoEEthernetSwitchandmakeconnectionstoit.Pleaseread
thefollowingtopicsandperformtheproceduresintheorderbeingpresented.
2.1 Installation
Thefollowingstepswillhelppreventdamagetothedevicewhilealsohelpingtomaintainproper
security.
Placetheswitchonastablesurfaceordesktoptominimizethechancesoffalling.
MakesuretheswitchworksintheproperACinputrangeandmatchesthevoltagelabeledonthe
switch.
Tokeeptheswitchfreefromlightningdamage,donotopentheswitchschassisevenifitfailsto
receivepower.
Makesurethatthereisproperheatdissipationfromandadequateventilationaroundtheswitch.
2.1.1 DesktopInstallation
Wheninstallingtheswitchonadesktop(ifnotinarack),attachtheenclosedrubberfeettothe
bottomcornersoftheswitchtominimizevibration.Allowadequatespaceforventilationbetweenthe
deviceandtheobjectsaroundit.
2.1.2 Rack‐mountableInstallationin11‐inchCabinet
TheSwitchcanbemountedinanEIAstandardsized,11inchrack,whichcanbeplacedinawiring
closetwithotherequipment.ToinstalltheSwitch,pleasefollowthesesteps:
a. AttachthemountingbracketsontheSwitch’ssidepanels(oneoneachside)andsecurethem
withthescrewsprovided.
b. Usethescrewsprovidedwiththe10”rackorcabinettomounttheswitchontherackandtighten
it.
6
2.1.3 PowerontheSwitch
TheswitchispoweredonbyconnectingittoanoutletusingtheAC100240V50/60Hzinternalhigh
performancepowersupply.
ACElectricalOutlet:
Itisrecommendedtouseasinglephase,threewirereceptaclewithaneutraloutletormultifunctional
computerprofessionalreceptacle.Besuretoconnectthemetalgroundconnectortothegrounding
sourceontheoutlet.
ACPowerCordConnection:
ConnecttheACpowerconnectoronthebackpaneloftheswitchtoanexternalreceptaclewiththe
includedpowercord,thencheckthatthepowerindicatorisON.WhenitisON,itindicatesthepower
connectionisokay.
PDportbynetworkcable.
7
3 HowtoLogintheSwitch
3.1 ConnectingComputer
UsestandardCat5/5eEthernetcable(UTP/STP)toconnecttheswitchtoendnodesasdescribedbelow.
Switchportswillautomaticallyadjusttothecharacteristics(MDI/MDIX,speed,duplex)ofthedeviceto
whichtheyareconnected.
Figure6‐PCConnect
TheLNK/ACT/SpeedLEDsforeachportlightwhenthelinkisavailable.
3.2 HowtoLogintotheSwitch
Connectionisdonebymeansofanystandardwebbrowser.ThedefaultsettingsoftheSwitchareshown
below.
ParameterDefaultValue
DefaultIPaddress 192.168.2.1
Defaultusername admin
Defaultpassword admin
YoucanlogontotheconfigurationwindowoftheSwitchthroughfollowingsteps:
1. ConnecttheSwitchwiththecomputerNICinterface.
2. CheckwhethertheIPaddressofthecomputeriswithinthisnetworksegment:192.168.2.xxx(“xxx”
ranges2~254),forexample,192.168.2.100.
3. PowerontheSwitchandverifythatyouhaveanactivelinkontheportyouareconnectedto.
4. Openthebrowser,andenterhttp://192.168.2.1andthenpress“Enter”.TheSwitchloginwindow
appears,asshownbelow.
8
5. EntertheUsernameandPassword(ThefactorydefaultUsernameisadminandPasswordisadmin),
andthenclick“LOGIN”tologintothewebconfiguration.
9
4 SwitchConfiguration
ThePoE+WebManagedGigabitEthernetSwitchsoftwareprovidesrichLayer2functionalityfor
switchesinyournetworks.ThischapterdescribeshowtousetheWebbasedmanagementinterface
(WebUI)forthisswitch.
IntheWebUI,theleftcolumnshowstheconfigurationmenu.Thetoprowshowstheswitchscurrent
linkstatus.Greensquaresindicatetheportlinkisup(port5intheexamplebelow),whileblack
squaresindicatetheportlinkisdown.Belowtheswitchpanel,youcanfindtoolbar(seesection4.1)
thatprovidesaccesstosomebasic,yetimportantfeatures.Therestofthescreenareadisplaysthe
configurationsettings.
10
4.1 Toolbar
4.1.1 SAVE
4.1.1.1 SaveConfigurationstoFLASH
Wheneveryoumakeanychangestotheconfigurationoftheswitch,andyouwantthosechangestobe
availableafterthenextrebootoftheswitch,youneedtosavetheconfiguration.Todothat,clickonSave
ConfigurationstoFlash,thenclickApply.
4.1.1.2 RestoretoDefaults
Inordertodeleteallcustomconfigurationdataandrestoretheswitchtoitsfactorydefaultstate,click
onRestoretoDefaults.
ClickonRestore,andconfirmthenextmessagebyclickingOK.
11
4.1.2 LOGOUT
Inordertologoutfromthewebadministratorinterface,clickonLOGOUTandthenconfirmthenext
messagebyclickingOK.
4.1.3 REBOOT
ClickRebootinordertorestarttheIntellinetswitch.Aftertherestarthasbeencompleted,youhavetore
authenticateattheloginpageinordertoregainaccess.
4.1.4 REFRESH
Reloadsthecontentsofthecurrentscreentoshowthemostcurrentinformation.
12
4.2 System
UsetheStatuspagestoviewsysteminformationandstatus.
4.2.1 SystemInformation
ThispageallowsyoutoconfigureSystemrelatedinformationandbrowseinformationsuchasMAC
address,IPaddress,firmwareversion,loaderversion,amongothers.Inaddition,youcanmodifythe
valuesSystemName,SystemLocationandSystemContact:
4.2.2 IPConfiguration
OnthispageyousetupthemanagementIPaddressoftheIntellinetPoEswitch.Setthemodeto
eitherDHCPorStatic,andinthelattercaseprovidetheIPAddress,SubnetMaskandGateway.This
pageallowstodefinetheIPv4address.AlsorefertotheIPv6configuration.

13
4.2.3 UserConfiguration
Onthisscreenyoucanchangethepasswordoftheadministratoraccount,andyoucanalsocreate
newuseraccounts.TheIntellinetPoEswitchonlyprovidesadministratorleveluseraccounts,which
simplifiesthesetup.
4.2.3.1 AddUserAccount
Typeinausername,apasswordandretypethepassword.Youalsocanselectthepassword
encryptiontype.Settoencryptedformaximumsecurity,orNoPasswordifyouwanttocreatean
administratoraccountthatrequiresnopasswordinordertologin.
4.2.3.2 EditPasswordforexistingUserAccount
Ifyouwanttochangeapasswordofanexistingaccount,youhavetoaddtheexistinguseraccountasa
newuseraccount.Byaddingauseraccountwithausernamethatalreadyexists,youcanoverwrite
thepasswordofthataccount.Theexamplebelowshowshowyouwouldchangethepasswordof
existinguser‘HahnSolo’.
4.2.3.3 DeleteUserAccount
ClickonDeleteoftheuseraccountwhichyouwanttodelete.Theaccountwillberemovedfromthe
configurationonceyouhavesavedtheconfigurationtotheflashmemoryoftheswitch.

14
4.2.4 TimeSettings
TheIntellinetPoEswitchisequippedwithaninternalclock,whichisusedtogivelogentriesaproper
timestamp.Therearetwowaystoconfiguretheclock.Youcaneitherconfiguretheswitchtoobtain
thetimeautomaticallyfromanSNTPserverontheInternetoronyourlocalnetworkbysettingthe
valueEnableSNTPtoEnable,oryoucanspecifythetimemanuallybysettingthevalueEnableSNTP
toDisable.
4.2.4.1 SettingupSystemTimeManually
WhenyoudisableSNTP,thescreenallowsyoutomanuallyenterthetime.
ManualTime:Specifythecorrectyear,month,day,hour,minuteandsecond
TimeZone:SelectthetimezonethatcorrespondstothelocationoftheIntellinetPoEswitch.
DaylightSavingTime:Iftheswitchislocatedinanareawithdaylightsavingtime,youcandefinethe
specificsofithere.Ifyoucan,ideallyyouwillwanttoselecteitherEuropeanorUSA,becauseinthat
casetheswitchwillautomaticallyadjustthetimeforyou.
SelectRecurringorNonRecurringinordertoenterthespecificdetailsaboutthedaylightsavingtime
manually.

15
4.2.4.2 SNTPSettings
IfyousettheIntellinetPoEtoobtainitstimefromanSNTPserver,thenyoumustspecificwhichSNTP
serveryouwanttouse.YoucanusebothinternalandexternalSNTPservers.Inbothcasesyouhaveto
ensurethattheIPconfigurationoftheswitchallowsittoaccesstheSNTPserver.Ifyouwishtousean
externalSNTPserversuchaspool.ntp.org,thenyoumustmakesurethattheswitchhasaccesstothe
InternetbyprovidingavalidGatewayIPaddressseesection4.2.2IPConfiguration.
SNTPServerAddress:ThenetworkaddressoftheSNTP/NTPserver.
ServerPort:ThePortNumberofSNTP/NTPserver(default=123).

4.2.5 LogManagement
4.2.5.1 LoggingService
TheIntellinetPoEswitchhastheabilitytocreateahistorylogofimportantevents.Theselogscanbe
storedeitherintheswitchesownmemory,oronaremoteSyslogserver.Inordertoutilizethelogging
service,youmustfirstenableit.
16
4.2.5.2 LocalLogging
Target:Selectthetargettostorelogmessage
Buffered:StorelogmessagesintheRAM.Alllogmessageswilldisappear
afterasystemreboot.
FLASH:StorelogmessagesintheFLASHmemory.Logmessageswillnot
disappearaftersystemreboot.
Severity:Definewhichlevelsofmessageswillbelogged.Debugwilllog
everysinglemessage,regardlesshowirrelevantitmaybe.Emergonthe
otherhandwillonlylogmissioncriticalinformation.
4.2.5.3 RemoteLogging
TodisplayRemoteLoggingwebpage,clickDiagnostics>LoggingSetting>RemoteLogging
ServerAddress:TheIPaddressofremotelogserver.
ServerPort:Theportnumberoftheremotelogserver
(default=514)..
Severity:Selecttheseverityoflogmessageswhichwill
berecorded.
Facility:Afacilitycodeisusedtospecifythetypeof
programthatisloggingthemessage.Messageswith
differentfacilitiesmaybehandleddifferently.Thelistof
facilitiesavailableisdefinedbyRFC3164,seechartontheright.

17
4.2.5.4 LoggingMessage
Thisinterfacescreenisdesignedtoletyouviewlogmessagesthathavebeenrecordedearlier.The
sectionLoggingFilterSelectallowsyoutodefineexactlywhattypeofloggingmessagesyouwishto
see.
Target:Thisdefinesthesourceofthelogmessages(eitherbufferedorFLASH).
Severity:Selecttheseverityoflogmessageswhichwillberecorded.
Category:Logmessagesarecategorized,andthecategoryfilterallowsyoutofilterout,which
messagesyouwishtosee.
Thesectionshownbelowdisplaysthecurrentfiltersettings.
Thesectionbelowshowsmessagesthathavebeenrecorded.

18
4.2.6 SNMPManagement
SimpleNetworkManagementProtocol(SNMP)isanOSILayer7(Application
Layer)designedspecificallyformanagingandmonitoringnetworkdevices.
SNMPenablesnetworkmanagementstationstoreadandmodifythesettings
ofgateways,routers,switches,andothernetworkdevices.UseSNMPto
configuresystemfeaturesforproperoperation,monitorperformanceand
detectpotentialproblemsintheSwitch,switchgroupornetwork.
4.2.6.1 SNMPSetting
State:SNMPdaemonstate
Enabled:EnableSNMPdaemon
Disabled:DisableSNMPdaemon

19
4.2.6.2 SNMPView
AnSNMPviewcanbeusedtolimitthetypeofinformationthatisaccessible,itisacombinationofa
setorafamilyofviewsubtreeswhereeachviewsubtreeisasubtreewithinthemanagedobject
namingtree.Aviewnamed“Alliscreatedautomaticallybytheswitch.Itcontainsallsupported
objects.
ItemDescription
ViewNameEnteranametoidentifytheSNMview.Thenamecancontainupto16
alphanumericcharacters.
SubtreeOIDAnobjectidentifiers(OID)identifiesavariablethatcanbereadorsetvia
SNMP.EnteranOIDstringforthesubtreeyouwishtoeitherincludeinor
excludefromtheSNMPview.
SubtreeOIDMaskThesubtreeOIDmaskcoupleswithasubtreeOIDtomakeMIBviewsubtrees.
ViewTypeSelectwhethertoincludeorexcludetheinformation.

20
4.2.6.3 SNMPAccessGroup
ThispageallowsconfiguringSNMPv3accessgroups.TheindexkeysareGroupName,SecurityModel
andSecurityLevel.
ItemDescription
GroupNameThisstringidentifiesthegroupname,lengthis1to16characters.
SecurityModelIndicatesthesecuritymodelforthisentry.
v1:SNMPv1.
v2c:SNMPv2c.
V3:SNMPv3orUserbasedSecurityModel(USM)
SecurityLevelNotethatthesecuritylevelappliestoSNNPv3.Itindicatesthesecurity
modelthatthisentryshouldbelongto.
Possiblesecuritymodelsare:
Noauth:Noneauthenticationandnoneprivacysecuritylevelsare
assignedtothegroup.
auth:Authenticationandnoneprivacy.
priv:Authenticationandprivacy.
Note:
ReadViewNameReadviewnameisthenameoftheviewinwhichyoucanonlyviewthe
contentsoftheagent.Maximumlengthis16characters.
WriteViewNameWriteviewnameisthenameoftheviewinwhichyouenterdataand
configurethecontentsoftheagent.Maximumlengthis16characters.
NotifyViewNameNotifyviewnameisthenameoftheviewinwhichyouspecifyanotify,
inform,ortrap.

21
4.2.6.4 SNMPCommunity
ConfiguretheSNMPcommunityonthispage.
4.2.6.5 SNMPUser
ThispageisusedtocreateSNMPuserunderthegroup,Andthegroupwiththesamelevelofsecurity
andaccesscontrolpermissions.

22
4.2.6.6 SNMPv1,2NotificationRecipients
SNMPv1,2versionnotificationeventreceivinghostrelatedconfiguration,youcanconfiguretoinform
thehostintheformofthetrapmessageorloginformationaboutthecurrentequipment,canbeset
upgroupname,UDPportnumberandmessageofthetimeout.
4.2.6.7 SNMPv3NotificationRecipients
SNMPv3versionnotificationeventreceivinghostrelatedconfiguration,youcanconfiguretoinform
thehostintheformofthetrapmessageorloginformationaboutthecurrentequipment,canbeset
upgroupname,UDPportnumberandmessageofthetimeout.

23
4.2.6.8 SNMPEngineID
4.2.6.9 SNMPRemoteEngineID
ConfigureSNMPv3remoteEngineIDonthispage.
ItemDescription
RemoteIPAddressIndicatestheSNMPremoteengineIDaddress.ItallowsavalidIP
addressindotteddecimalnotation('x.y.z.w').
EngineIDAnoctetstringidentifyingtheengineIDthatthisentryshouldbelong
to.

24
4.3 PortManagement
TheIntellinet8PortGigabitPoE+SwitchisequippedwthbothRJ45portsandSFPmodules.Theport
managementfunctionallowstoconfiguretheseports.
4.3.1 PortConfiguration
Thispagedisplayscurrentportconfigurationsandstatus.Portscanalsobeconfiguredhere.
ItemDescription
PortSelectSelectportnumberforthisdropdownlist.
EnabledIndicatestheportstateoperation.
EnabledActivatetheport.
DisabledShutdowntheport.
SpeedSetupthelinkspeedforthegivenswitchport.SelectAuto
(recommended)toalwaysconnectatthebestpossiblespeed,andselect
oneoftheindividualvaluesfrom10Mto1000Mtosettheportspeed
manually.
DuplexDefinetheduplexmodeoftheport.
‐Auto‐SetupAutonegotiation(recommended).
‐Full‐ForceFullDuplexmode.
‐Half‐ForceHalfDuplexmode.
FlowControlWhenAutoSpeedisselectedforaport,thissectionindicatestheflow
controlcapabilitythatisadvertisedtothelinkpartner.
Whenafixedspeedsettingisselected,thatiswhatisused.
CurrentRxcolumnindicateswhetherpauseframesontheportare
obeyed.CurrentTxcolumnindicateswhetherpauseframesontheport
aretransmitted.TheRxandTxsettingsaredeterminedbytheresultof
thelastAutoNegotiation.Checktheconfiguredcolumntouseflow
control.ThissettingisrelatedtothesettingforConfiguredLinkSpeed.

25
4.3.2 PortCounters
Thispageprovidesanoverviewoftrafficandtrunkstatisticsforallswitchports.

26
4.3.3 BandwidthUtilization
TheBandwidthUtilizationpagedisplaysthepercentageofthetotalavailablebandwidthbeingusedonthe
ports.Bandwidthutilizationstatisticsisrepresentedbygraphs.
27
4.3.4 PortMirroring
Networkengineersoradministratorsuseportmirroringtoanalyzeanddebugdataordiagnoseerrors
onanetwork.Ithelpsadministratorskeepacloseeyeonnetworkperformanceandalertsthemwhen
problemsoccur.Itcanbeusedtomirroreitherinboundoroutboundtraffic(orboth)onsingleor
multipleinterfaces.Portmirroringisusedonanetworkswitchtosendacopyofnetworkpacketsseen
ononeswitchport(oranentireVLAN)toanetworkmonitoringconnectiononanotherswitchport.
Thetraffictobecopiedtothemirrorportisselectedasfollows:
‐Allframesreceivedonagivenport(alsoknownasingressorsourcemirroring).
‐Allframestransmittedonagivenport(alsoknownasegressordestinationmirroring).

28
4.3.5 JumboFrame
Incomputernetworking,jumboframesare
Ethernetframeswithmorethan1500bytes
ofpayload.Conventionally,jumboframes
cancarryupto9000bytesofpayload,but
variationsexist.Forinstance,theIntellinet8
PortGigabitPoE+switchsupportsJumbo
framesofupto9216bytes.
Setthejumboframesize(649216)andhitApplytosavethesettings.
Thetableaboveshowsthecurrentjumboframeconfiguration.

29
4.3.6 PortErrorDisabledConfiguration
TheIntellinet8PortGigabitPoE+Switchhastheabilitytodisableports,ifanerroroccurs.Bydoingso,it
canprotecttherestofthenetwork,ifanetworkclientononeportgeneratesalotofunwantedtraffic,i.e.
broadcastflooding.Belowyoucanactivate/deactivatetheeventsyouwishtomonitor,andyoucandefine
therecoveryinterval,whichisthetimeintervalinwhichtheportremainsdisabled(default=300seconds
(5minutes).

30
4.3.7 ProtectedPorts
Protectedportscanbeusedtopreventinterfaces(i.e.,networkclients)fromcommunicatingwitheach
other.Protectedportscanbeviewedas‘isolatedports.
Forprotectedportgrouptobeapplied,thenetworkswitchmustfirstbeconfiguredforstandardVLAN
operation.Portsinaprotectedportgroupfallintooneofthesetwogroups:
1. Promiscuous(Unprotected)ports
a. PortsfromwhichtrafficcanbeforwardedtoallportsintheprivateVLAN
b. PortswhichcanreceivetrafficfromallportsintheprivateVLAN
2. Isolated(Protected)ports
a. Portsfromwhichtrafficcanonlybeforwardedtopromiscuousportsintheprivate
VLAN
b. PortswhichcanreceivetrafficfromonlypromiscuousportsintheprivateVLAN
TheconfigurationofpromiscuousandisolatedportsappliestoallprivateVLANs.Whentrafficcomes
inonapromiscuousportinaprivateVLAN,theVLANmaskfromtheVLANtableisapplied.When
trafficcomesinonanisolatedport,theprivateVLANmaskisappliedinadditiontotheVLANmask
fromtheVLANtable.Thisreducestheportstowhichforwardingcanbedonetojustthepromiscuous
portswithintheprivateVLAN.

31
Thescreenalsoshowsthecurrentstatusofprotectedv.unprotectedports.Intheexampleabove,ports1
and2areprotected(asinisolated),RJ45ports38aswellasSFPports91nd10areunprotected.

32
4.3.8 EEE–EnergyEfficientEthernet
EnergyEfficientEthernet(EEE)isasetofenhancementstothetwistedpair
andbackplaneEthernetfamilyofcomputernetworkingstandardsthatallow
forlesspowerconsumptionduringperiodsoflowdataactivity.The
intentionwastoreducepowerconsumptionby50%ormore,while
retainingfullcompatibilitywithexistingequipment.TheInstituteof
ElectricalandElectronicsEngineers(IEEE),throughtheIEEE802.3aztaskforcedevelopedthestandard.EEE
isapowersavingoptionthatreducesthepowerusagewhenthereislowornotrafficutilization.EEE
worksbypoweringdowncircuitswhenthereisnotraffic.
Whenaportispowereddownforsavingpower,theoutgoingtrafficisstoredinabufferuntiltheport
ispoweredupagain.Usingthistechnique,morepowercanbesavedifthetrafficcanbebufferedup
untilalargeburstoftrafficcanbetransmitted.Keepinmind,thatbufferingtrafficwillgivesome
latencyinthetraffic.

33
4.4 LinkAggregation
Incomputernetworking,thetermlinkaggregationappliestovariousmethodsofcombining
(aggregating)multiplenetworkconnectionsinparallelinordertoincreasethroughputbeyondwhata
singleconnectioncouldsustain,andtoprovideredundancyincaseoneofthelinksshouldfail.
PortAggregationoptimizesportusagebylinkingagroupofportstogethertoformasingleLink
AggregatedGroup(LAG).PortAggregationmultipliesthebandwidthbetweenthetwoEthernet
switchesandprovideslinkredundancy.EachLAGiscomposedofportsofthesamespeed,settofull
duplexoperations.
AggregatedLinkscanbeassignedmanually(PortTrunk)orautomaticallybyenablingLinkAggregation
ControlProtocol(LACP)ontherelevantlinks.AggregatedLinksaretreatedbythesystemasasingle
logicalport.
TheIntellinet8PortGigabitPoE+switchsupportsthefollowingAggregationlinks:
1. StaticLAGs(PortTrunk)Selectedportsareforcedtobeinatrunkgroup.
2. LinkAggregationControlProtocol(LACP)LAGs‐LACPLAGnegotiateaggregatedportlinkswith
otherLACPportslocatedonadifferentdevice.IftheotherdeviceportsarealsoLACPports,
thedevicesestablishaLAGbetweenthem.
Whenusingaportlinkaggregation,notethat:
Theportsusedinalinkaggregationmustallbeofthesamemediatype(RJ45,100Mbpsfiber).
Theportsthatcanbeassignedtothesamelinkaggregationhavecertainotherrestrictions(see
below).
Portscanonlybeassignedtoonelinkaggregation.
Theportsatbothendsofaconnectionmustbeconfiguredaslinkaggregationports.
Noneoftheportsinalinkaggregationcanbeconfiguredasamirrorsourceportoramirrortarget
port.
Alloftheportsinalinkaggregationhavetobetreatedasawholewhenmovedfrom/to,addedor
deletedfromaVLAN.
TheSpanningTreeProtocolwilltreatalltheportsinalinkaggregationasawhole.
Enablethelinkaggregationpriortoconnectinganycablebetweentheswitchestoavoidcreating
adataloop.
Disconnectalllinkaggregationportcablesordisablethelinkaggregationportsbeforeremovinga
portlinkaggregationtoavoidcreatingadataloop.
Itallowsamaximumof8portstobeaggregatedatthesametime.TheIntellintswitchsupportGigabit
Ethernetports(upto8groups).IfthegroupisdefinedasaLACPstaticlinkaggregationgroup,then
anyextraportselectedisplacedinastandbymodeforredundancyifoneoftheotherportsfails.Ifthe
groupisdefinedasalocalstaticlinkaggregationgroup,thenthenumberofportsmustbethesameas
thegroupmemberports.

34
4.4.1 LAGSetting
Thispageallowsconfiguringloadbalancealgorithmconfigurationsettings.

35
4.4.2 LAGManagement
ThispageisusedtoconfigurethebasicsettingsoftheLinkAggregationGroup.

36
4.4.3 LAGPortSettings
OnthisscreenyoudefinethepropertiesoftheportsbelongingtoaLinkAggregationGroup.

37
4.4.4 LACPSettings
Inatrunkgroup,eachswitchhastohaveapriority.Thatisthesystempriority.Thesmallerthe
number,thehigherthepriority.Theswitchwiththesmallestnumber(andthusthehighestpriority)is
theactiveLACPpeerofthetrunkgroup.
4.4.5 LACPPortSettings
ThispageisusedtoconfiguretheLACPportprioritysettings.

38
4.4.6 LAGStatus
39
40
4.5 VLAN
4.5.1 WhatisVLAN?
4.5.1.1 Overview
AVirtualLocalAreaNetwork(VLAN)isanetworktopologyconfiguredaccordingtoalogicalscheme
ratherthanthephysicallayout.VLANcanbeusedtocombineanycollectionofLANsegmentsintoan
autonomoususergroupthatappearsasasingleLAN.VLANalsologicallysegmentthenetworkinto
differentbroadcastdomainssothatpacketsareforwardedonlybetweenportswithintheVLAN.
Typically,aVLANcorrespondstoaparticularsubnet,althoughnotnecessarily.
VLANcanenhanceperformancebyconservingbandwidth,andimprovesecuritybylimitingtrafficto
specificdomains.AVLANisacollectionofendnodesgroupedbylogicinsteadofphysicallocation.End
nodesthatfrequentlycommunicatewitheachotherareassignedtothesameVLAN,regardlessof
wheretheyarephysicallyonthenetwork.Logically,aVLANcanbeequatedtoabroadcastdomain,
becausebroadcastpacketsareforwardedtoonlymembersoftheVLANonwhichthebroadcastwas
initiated.
Thingstonote:
NomatterwhatbasisisusedtouniquelyidentifyendnodesandassignthesenodesVLAN
membership,packetscannotcrossVLANswithoutanetworkdeviceperformingaroutingfunction
betweentheVLANs.
TheSwitchsupportsIEEE802.1QVLANs.Theportuntaggingfunctioncanbeusedtoremovethe
802.1Qtagfrompacketheaderstomaintaincompatibilitywithdevicesthataretagunaware.
TheSwitchsdefaultistoassignallportstoasingle802.1QVLANnamed“default.”
The“defaultVLANhasaVID=1.
ThememberportsofPortbasedVLANsmayoverlap,ifdesired.
4.5.1.2 PortbasedVLANs
PortbasedVLANlimittrafficthatflowsintoandoutofswitchports.Thus,alldevicesconnectedtoa
portaremembersoftheVLAN(s)theportbelongsto,whetherthereisasinglecomputerdirectly
connectedtoaswitch,oranentiredepartment.OnportbasedVLAN.NICdonotneedtobeableto
identify802.1Qtagsinpacketheaders.NICsendandreceivenormalEthernetpackets.Ifthepacket's
destinationliesonthesamesegment,communicationstakeplaceusingnormalEthernetprotocols.
Eventhoughthisisalwaysthecase,whenthedestinationforapacketliesonanotherswitchport,
VLANconsiderationscomeintoplaytodecideifthepacketisdroppedbytheSwitchordelivered.
4.5.1.3 IEEE802.1QVLANs
IEEE802.1Q(tagged)VLANareimplementedontheSwitch.802.1QVLANrequiretagging,which
enablesthemtospantheentirenetwork(assumingallswitchesonthenetworkareIEEE802.1Q
compliant).VLANallowanetworktobesegmentedinordertoreducethesizeofbroadcastdomains.
AllpacketsenteringaVLANwillonlybeforwardedtothestations(overIEEE802.1Qenabledswitches)
thataremembersofthatVLAN,andthisincludesbroadcast,multicastandunicastpacketsfrom
unknownsources.VLANcanalsoprovidealevelofsecuritytoyournetwork.IEEE802.1QVLANwill
onlydeliverpacketsbetweenstationsthataremembersoftheVLAN.Anyportcanbeconfiguredas
41
eithertaggingoruntagging.TheuntaggingfeatureofIEEE802.1QVLANallowsVLANtoworkwith
legacyswitchesthatdon'trecognizeVLANtagsin30packetheaders.ThetaggingfeatureallowsVLAN
tospanmultiple802.1QcompliantswitchesthroughasinglephysicalconnectionandallowsSpanning
Treetobeenabledonallportsandworknormally.Anyportcanbeconfiguredaseithertaggingor
untagging.TheuntaggingfeatureofIEEE802.1QVLANallowVLANtoworkwithlegacyswitchesthat
don’trecognizeVLANtagsinpacketheaders.ThetaggingfeatureallowsVLANtospanmultiple
802.1QcompliantswitchesthroughasinglephysicalconnectionandallowsSpanningTreetobe
enabledonallportsandworknormally.
Somerelevantterms:
Tagging‐Theactofputting802.1QVLANinformationintotheheaderofapacket.
Untagging‐Theactofstripping802.1QVLANinformationoutofthepacketheader.
4.5.1.4 802.1QVLANTags
Thefiguretotheright
showsthe802.1Q
VLANtag.Thereare
fouradditionaloctets
insertedafterthe
sourceMACaddress.
Theirpresenceis
indicatedbyavalueof
0x8100intheEther
Typefield.Whena
packet'sEtherTypefieldisequalto1120x8100,thepacketcarriestheIEEE802.1Q/802.1ptag.The
tagiscontainedinthefollowingtwooctetsandconsistsof3bitsofuserpriority,1bitofCanonical
FormatIdentifier(CFI‐usedforencapsulatingTokenRingpacketssotheycanbecarriedacross
Ethernetbackbones),and12bitsofVLANID(VID).The3bitsofuserpriorityareusedby802.1p.The
VIDistheVLANidentifierandisusedbythe802.1Qstandard.BecausetheVIDis12bitslong,4094
uniqueVLANcanbeidentified.Thetagisinsertedintothepacketheadermakingtheentirepacket
longerby4octets.Alloftheinformationoriginallycontainedinthepacketisretained.
TheEtherTypeandVLANIDareinsertedaftertheMACsourceaddress,butbeforetheoriginalEther
Type/LengthorLogicalLinkControl.Becausethepacketisnowabitlongerthanitwasoriginally,the
CyclicRedundancyCheck(CRC)mustberecalculated.
42
4.5.1.5 PortVLANID
Packetsthataretagged(arecarryingthe802.1QVIDinformation)canbetransmittedfromone802.1Q
compliantnetworkdevicetoanotherwiththeVLANinformationintact.Thisallows802.1QVLANto
spannetworkdevices(andindeed,theentirenetworkifallnetworkdevicesare802.1Qcompliant).
OriginalEthernetNewTaggedPacketEveryphysicalportonaswitchhasaPVID.802.1Qportsarealso
assignedaPVID,forusewithintheswitch.IfnoVLANaredefinedontheswitch,allportsarethen
assignedtoadefaultVLANwithaPVIDequalto1.UntaggedpacketsareassignedthePVIDoftheport
onwhichtheywerereceived.ForwardingdecisionsarebaseduponthisPVID,insofarasVLANare
concerned.Tag gedpacketsareforwardedaccordingtotheVIDcontainedwithinthetag.Tag ged
packetsarealsoassignedaPVID,butthePVIDisnotusedtomakepacketforwardingdecisions,the
VIDis.
TagawareswitchesmustkeepatabletorelatePVIDwithintheswitchtoVIDonthenetwork.The
switchwillcomparetheVIDofapackettobetransmittedtotheVIDoftheportthatistotransmitthe
packet.IfthetwoVIDaredifferenttheswitchwilldropthepacket.Becauseoftheexistenceofthe
PVIDforuntaggedpacketsandtheVIDfortaggedpackets,tagawareandtagunawarenetwork
devicescancoexistonthesamenetwork.AswitchportcanhaveonlyonePVID,butcanhaveasmany
VIDastheswitchhasmemoryinitsVLANtabletostorethem.Becausesomedevicesonanetwork
maybetagunaware,adecisionmustbemadeateachportonatagawaredevicebeforepacketsare
transmittedshouldthepackettobetransmittedhaveatagornot?Ifthetransmittingportis
connectedtoatagunawaredevice,thepacketshouldbeuntagged.Ifthetransmittingportis
connectedtoatagawaredevice,thepacketshouldbetagged.
4.5.1.6 DefaultVLANs
TheSwitchinitiallyconfiguresoneVLAN,VID=1,called"default."Thefactorydefaultsettingassigns
allportsontheSwitchtothe"default".AsnewVLANareconfiguredinPortbasedmode,their
respectivememberportsareremovedfromthe"default."
4.5.1.7 AssigningPortstoVLANs
BeforeenablingVLANsfortheswitch,youmustfirstassigneachporttotheVLANgroup(s)inwhichit
willparticipate.BydefaultallportsareassignedtoVLAN1asuntaggedports.Addaportasatagged
portifyouwantittocarrytrafficforoneormoreVLANs,andanyintermediatenetworkdevicesorthe
hostattheotherendoftheconnectionsupportsVLANs.ThenassignportsontheotherVLANaware
networkdevicesalongthepaththatwillcarrythistraffictothesameVLAN(s),eithermanuallyor
dynamicallyusingGVRP.However,ifyouwantaportonthisswitchtoparticipateinoneormore
VLANs,butnoneoftheintermediatenetworkdevicesnorthehostattheotherendoftheconnection
supportsVLANs,thenyoushouldaddthisporttotheVLANasanuntaggedport.
Note:
VLANtaggedframescanpassthroughVLANawareorVLANunawarenetworkinterconnection
devices,buttheVLANtagsshouldbestrippedoffbeforepassingitontoanyendnodehostthatdoes
notsupportVLANtagging.

43
4.5.1.8 VLANClassification
Whentheswitchreceivesaframe,itclassifiestheframeinoneoftwoways.Iftheframeisuntagged,
theswitchassignstheframetoanassociatedVLAN(basedonthedefaultVLANIDofthereceiving
port).Butiftheframeistagged,theswitchusesthetaggedVLANIDtoidentifytheportbroadcast
domainoftheframe.
4.5.1.9 PortOverlapping
Portoverlappingcanbeusedtoallowaccesstocommonlysharednetworkresourcesamongdifferent
VLANgroups,suchasfileserversorprinters.NotethatifyouimplementVLANswhichdonotoverlap,
butstillneedtocommunicate,youcanconnectthembyenabledroutingonthisswitch.
4.5.1.10 UntaggedVLANs
Untagged(orstatic)VLANsaretypicallyusedtoreducebroadcasttrafficandtoincreasesecurity.A
groupofnetworkusersassignedtoaVLANformabroadcastdomainthatisseparatefromother
VLANsconfiguredontheswitch.Packetsareforwardedonlybetweenportsthataredesignatedforthe
sameVLAN.UntaggedVLANscanbeusedtomanuallyisolateusergroupsorsubnets.

44
4.5.2 ManagementVLAN
Whenitcomestoswitchmanagement,itscommontouseadedicatedVLANformanagement
purposes.ThatVLANyouwillhavecreatedalready(seesection4.5.3),andperhapsnamed
‘Management.OnthisscreenyousimplyselecttheVLANasthemanagementVLAN.
4.5.3 CreateVLAN
Thispageallowsyoutosetup,editanddeleteVLANs.
45
4.5.4 InterfaceSettings
ThisPageisusedforconfiguringtheManagedSwitchportVLAN.TheVLANperPortConfiguration
PagecontainsfieldsformanagingportsthatarepartofaVLAN.TheportdefaultVLANID(PVID)is
configuredontheVLANPortConfigurationPage.Alluntaggedpacketsarrivingtothedevicearetagged
bytheportsPVID.UnderstandnomenclatureoftheSwitch
IEEE802.1QTaggedandUntagged
Everyportonan802.1Qcompliantswitchcanbeconfiguredastaggedoruntagged.
Tagged:
PortswithtaggingenabledwillputtheVIDnumber,priorityandotherVLANinformationintothe
headerofallpacketsthatflowintothoseports.Ifapackethaspreviouslybeentagged,theportwill
notalterthepacket,thuskeepingtheVLANinformationintact.TheVLANinformationinthe
tagcanthenbeusedbyother802.1Qcompliantdevicesonthenetworktomakepacketforwarding
decisions.
Untagged:
Portswithuntaggingenabledwillstripthe802.1Qtagfromallpacketsthatflowintothoseports.Ifthe
packetdoesn'thavean802.1QVLANtag,theportwillnotalterthepacket.Thus,allpacketsreceived
byandforwardedbyanuntaggingportwillhaveno802.1QVLANinformation.(Rememberthatthe
PVIDisonlyusedinternallywithintheSwitch).Untaggingisusedtosendpacketsfroman802.1Q
compliantnetworkdevicetoanoncompliantnetworkdevice.
IEEE802.1QTunneling(QinQ)
IEEE802.1QTunneling(QinQ)isdesignedforserviceproviderscarryingtrafficformultiplecustomers
acrosstheirnetworks.QinQtunnelingisusedtomaintaincustomerspecificVLANandLayer2protocol
configurationsevenwhendifferentcustomersusethesameinternalVLANIDs.Thisisaccomplishedby
insertingServiceProviderVLAN(SPVLAN)tagsintothecustomer’sframeswhentheyentertheservice
providersnetwork,andthenstrippingthetagswhentheframesleavethenetwork.
AserviceproviderscustomersmayhavespecificrequirementsfortheirinternalVLANIDsandnumber
ofVLANssupported.VLANrangesrequiredbydifferentcustomersinthesameserviceprovider
networkmighteasilyoverlap,andtrafficpassingthroughtheinfrastructuremightbemixed.Assigning
auniquerangeofVLANIDstoeachcustomerwouldrestrictcustomerconfigurations,requireintensive
processingofVLANmappingtables,andcouldeasilyexceedthemaximumVLANlimitof4096.
46
TheManagedSwitchsupportsmultipleVLANtagsandcanthereforebeusedinMANapplicationsasa
providerbridge,aggregatingtrafficfromnumerousindependentcustomerLANsintotheMAN(Metro
AccessNetwork)space.OneofthepurposesoftheproviderbridgeistorecognizeanduseVLANtags
sothattheVLANsintheMANspacecanbeusedindependentofthecustomers’VLANs.Thisis
accomplishedbyaddingaVLANtagwithaMANrelatedVIDforframesenteringtheMAN.When
leavingtheMAN,thetagisstrippedandtheoriginalVLANtagwiththecustomerrelatedVIDisagain
available.
ThisprovidesatunnelingmechanismtoconnectremotecostumerVLANsthroughacommonMAN
spacewithoutinterferingwiththeVLANtags.AlltagsuseEtherType0x8100or0x88A8,where0x8100
isusedforcustomertagsand0x88A8areusedforserviceprovidertags.Incaseswhereagivenservice
VLANonlyhastwomemberportsontheswitch,thelearningcanbedisabledfortheparticularVLAN
andcanthereforerelyonfloodingastheforwardingmechanismbetweenthetwoports.Thisway,the
MACtablerequirementsisreduced.

47

48

49
4.5.5 PorttoVLAN
WiththisfunctionyoucanassignportstoordeletethemfromexistingVLANs.GE1designatedGigabit
Ethernetport1,whileLAG1standsfirLinkAggregationGroup1.
50
4.5.6 PortVLANMembership
ThisscreenshowsanoverviewofallportsandLAGs,alongwiththeircorrespondingVLANstatus.
WhenyoueditaportorLAG,youcanremovetheportfrom
existingVLANsbyselectingtheVLANintherightboxandclicking
[Del].InordertoaddaporttoaVLAN,selecttheLANontheleft
side,andthenclick[Add].
Additionally,youcandefinethetaggingforthisport.Seethe
previoussectionfordetails.

51
4.5.7 ProtocolVLANGroupSettings
Thenetworkdevicesrequiredtosupportmultipleprotocolscannotbeeasilygroupedintoacommon
VLAN.ThismayrequirenonstandarddevicestopasstrafficbetweendifferentVLANsinorderto
encompassallthedevicesparticipatinginaspecificprotocol.Thiskindofconfigurationdeprivesusers
ofthebasicbenefitsofVLANs,includingsecurityandeasyaccessibility.Toavoidtheseproblems,you
canconfigurethisManagedSwitchwithprotocolbasedVLANsthatdividethephysicalnetworkinto
logicalVLANgroupsforeachrequiredprotocol.Whenaframeisreceivedataport,itsVLAN
membershipcanthenbedeterminedbasedontheprotocoltypebeingusedbytheinboundpackets.
ToconfigureprotocolbasedVLANs,followthesesteps:
1.FirstconfigureVLANgroupsfortheprotocolsyouwanttouse.Althoughnotmandatory,wesuggest
configuringaseparateVLANforeachmajorprotocolrunningonyournetwork.Donotaddport
membersatthistime.
2.CreateaprotocolgroupforeachoftheprotocolsyouwanttoassigntoaVLANusingtheProtocol
VLANConfigurationpage.
3.ThenmaptheprotocolforeachinterfacetotheappropriateVLANusingtheProtocolVLANPort
Configurationpage.
ThisPageallowsforconfiguresprotocolbasedVLANGroupSetting

52
4.5.8 ProtocolVLANPortSettings
Oncethegrouphasbeenconfigured,youcanmapittoaVLAN/port.
4.5.9 GVRPSetting
GARPVLANRegistrationProtocol(GVRP)definesawayforswitchestoexchangeVLANinformationin
ordertoregisterVLANmembersonportsacrossthenetwork.VLANsaredynamicallyconfiguredbased
onjoinmessagesissuedbyhostdevicesandpropagatedthroughoutthenetwork.GVRPmustbe
enabledtopermitautomaticVLANregistration,andtosupportVLANswhichextendbeyondthelocal
switch.
Onthisconfigurationpageyoucanactivateordeactivatethisfeature.

53
4.5.10 GVRPPortSetting
ThisconfigurationscreenallowsyoutoactivateordeactivateGVRPforeachport.Additionally,youcan
definetheregistrationmodeandallowordisallowthedynamiccreationofVLANs.
4.5.11 GVRPVLAN
ThisscreenprovidesanoverviewofthecurrentGVRPVLANsetup.

54
4.5.12 GVRPStatistics
GVRP Port and Error Statistics are shown on this page.
55
4.6 SpanningTreeProtocol(STP)
4.6.1 WhatisSTP?
TheSpanningTreeProtocolcanbeusedtodetectanddisablenetworkloops,andtoprovidebackup
linksbetweenswitches,bridgesorrouters.Thisallowstheswitchtointeractwithotherbridging
devicesinyournetworktoensurethatonlyonerouteexistsbetweenanytwostationsonthenetwork,
andprovidebackuplinkswhichautomaticallytakeoverwhenaprimarylinkgoesdown.Thespanning
treealgorithmssupportedbythisswitchincludetheseversions:
STPSpanningTreeProtocol(IEEE802.1D)
RSTPRapidSpanningTreeProtocol(IEEE802.1w)
MSTPMultipleSpanningTreeProtocol(IEEE802.1s)
TheIEEE802.1DSpanningTreeProtocolandIEEE802.1wRapidSpanningTreeProtocolallowforthe
blockingoflinksbetweenswitchesthatformloopswithinthenetwork.Whenmultiplelinksbetween
switchesaredetected,aprimarylinkisestablished.Duplicatedlinksareblockedfromuseandbecome
standbylinks.Theprotocolallowsfortheduplicatelinkstobeusedintheeventofafailureofthe
primarylink.OncetheSpanningTreeProtocolisconfiguredandenabled,primarylinksareestablished
andduplicatedlinksareblockedautomatically.Thereactivationoftheblockedlinks(atthetimeofa
primarylinkfailure)isalsoaccomplishedautomaticallywithoutoperatorintervention.Thisautomatic
networkreconfigurationprovidesmaximumuptimetonetworkusers.However,theconceptsofthe
SpanningTreeAlgorithmandprotocolareacomplicatedandcomplexsubjectandmustbefully
researchedandunderstood.Itispossibletocauseseriousdegradationoftheperformanceofthe
networkiftheSpanningTreeisincorrectlyconfigured.Pleasereadthefollowingbeforemakingany
changesfromthedefaultvalues.
TheSwitchSTPperformsthefollowingfunctions:
Createsasinglespanningtreefromanycombinationofswitchingorbridgingelements.
Createsmultiplespanningtreesfromanycombinationofportscontainedwithinasingle
switch,inuserspecifiedgroups.
Automaticallyreconfiguresthespanningtreetocompensateforthefailure,addition,or
removalofanyelementinthetree.
Reconfiguresthespanningtreewithoutoperatorintervention.
BridgeProtocolDataUnits
ForSTPtoarriveatastablenetworktopology,thefollowinginformationisused:
Theuniqueswitchidentifier
Thepathcosttotherootassociatedwitheachswitchport
Theportidentifier

56
STPcommunicatesbetweenswitchesonthenetworkusingBridgeProtocolDataUnits(BPDUs).Each
BPDUcontainsthefollowinginformation:
Theuniqueidentifieroftheswitchthatthetransmittingswitchcurrentlybelievesistheroot
switch
Thepathcosttotherootfromthetransmittingport
Theportidentifierofthetransmittingport
TheswitchsendsBPDUstocommunicateandconstructthespanningtreetopology.Allswitches
connectedtotheLANonwhichthepacketistransmittedwillreceivetheBPDU.BPDUsarenotdirectly
forwardedbytheswitch,butthereceivingswitchusestheinformationintheframetocalculatea
BPDU,and,ifthetopologychanges,initiatesaBPDUtransmission.
ThecommunicationbetweenswitchesviaBPDUsresultsinthefollowing:
Oneswitchiselectedastherootswitch
Theshortestdistancetotherootswitchiscalculatedforeachswitch
Adesignatedswitchisselected.Thisistheswitchclosesttotherootswitchthroughwhich
packetswillbeforwardedtotheroot.
Aportforeachswitchisselected.Thisistheportprovidingthebestpathfromtheswitchto
therootswitch.
PortsincludedintheSTPareselected.
CreatingaStableSTPTopology
Itistomaketherootportafastestlink.IfallswitcheshaveSTPenabledwithdefaultsettings,the
switchwiththelowestMACaddressinthenetworkwillbecometherootswitch.Byincreasingthe
priority(loweringtheprioritynumber)ofthebestswitch,STPcanbeforcedtoselectthebestswitch
astherootswitch.WhenSTPisenabledusingthedefaultparameters,thepathbetweensourceand
destinationstationsinaswitchednetworkmightnotbeideal.Forinstance,connectinghigherspeed
linkstoaportthathasahighernumberthanthecurrentrootportcancausearootportchange.
STPPortStates
TheBPDUstakesometimetopassthroughanetwork.Thispropagationdelaycanresultintopology
changeswhereaportthattransitioneddirectlyfromaBlockingstatetoaForwardingstatecould
createtemporarydataloops.Portsmustwaitfornewnetworktopologyinformationtopropagate
throughoutthenetworkbeforestartingtoforwardpackets.Theymustalsowaitforthepacketlifetime
toexpireforBPDUpacketsthatwereforwardedbasedontheoldtopology.Theforwarddelaytimeris
usedtoallowthenetworktopologytostabilizeafteratopologychange.Inaddition,STPspecifiesa
seriesofstatesaportmusttransitionthroughtofurtherensurethatastablenetworktopologyis
createdafteratopologychange.

57
EachportonaswitchusingSTPexistsisinoneofthefollowingfivestates:
Blockingtheportisblockedfromforwardingorreceivingpackets
ListeningtheportiswaitingtoreceiveBPDUpacketsthatmaytelltheporttogobacktothe
blockingstate
Learningtheportisaddingaddressestoitsforwardingdatabase,butnotyetforwarding
packets
Forwardingtheportisforwardingpackets
Disabledtheportonlyrespondstonetworkmanagementmessagesandmustreturntothe
blockingstatefirst
Aporttransitionsfromonestatetoanotherasfollows:
Frominitialization(switchboot)toblocking
Fromblockingtolisteningortodisabled
Fromlisteningtolearningortodisabled
Fromlearningtoforwardingortodisabled
Fromforwardingtodisabled
Fromdisabledtoblocking
Youcanmodifyeachportstatebyusingmanagementsoftware.WhenyouenableSTP,everyporton
everyswitchinthenetworkgoesthroughtheblockingstateandthentransitionsthroughthestatesof
listeningandlearningatpowerup.Ifproperlyconfigured,eachportstabilizestotheforwardingor
blockingstate.Nopackets(exceptBPDUs)areforwardedfrom,orreceivedby,STPenabledportsuntil
theforwardingstateisenabledforthatport.
58
TheSwitchallowsfortwolevelsofoperation:theswitchlevelandtheportlevel.Theswitchlevel
formsaspanningtreeconsistingoflinksbetweenoneormoreswitches.Theportlevelconstructsa
spanningtreeconsistingofgroupsofoneormoreports.TheSTPoperatesinmuchthesamewayfor
bothlevels.
Note:
Ontheswitchlevel,STPcalculatestheBridgeIdentifierforeachswitchandthensetstheRoot
BridgeandtheDesignatedBridges.Ontheportlevel,STPsetstheRootPortandtheDesignatedPorts.
ThefollowingaretheuserconfigurableSTPparametersfortheswitchlevel:
ParameterDescriptionDefaultValue
BridgeIdentifier AcombinationoftheUserset
priorityandtheswitch’sMAC
address.TheBridgeIdentifier
consistsoftwoparts:
a16bitpriorityanda48bit
EthernetMACaddress32768+
MAC.
32768+MAC
PriorityArelativepriorityforeach
switch.Lowernumbersgivea
higherpriorityandagreater
chanceofagivenswitchbeing
electedastherootbridge.
32768
HelloTimeThelengthoftimebetween
broadcastsofthehello
messagebytheswitch.
2seconds
MaximumAgeTimerMeasurestheageofareceived
BPDUforaportandensures
thattheBPDUisdiscarded
whenitsageexceedsthevalue
ofthemaximumagetimer.
20seconds
ForwardDelayTimerTheamounttimespentbya
portinthelearningand
listeningstateswaitingfora
BPDUthatmayreturntheport
totheblockingstate.
15seconds

59
ThefollowingaretheuserconfigurableSTPparametersfortheportorportgrouplevel:
DefaultSpanningTreeConfiguration
UserChangeableSTAParameters
TheSwitchsfactorydefaultsettingshouldcoverthemajorityofinstallations.However,itisadvisable
tokeepthedefaultsettingsassetatthefactory;unless,itisabsolutelynecessary.Theuserchangeable
parametersintheSwitchareasfollows:
PriorityAPriorityfortheswitchcanbesetfrom0to65535.0isequaltothehighestPriority.
HelloTimeTheHelloTimecanbefrom1to10seconds.Thisistheintervalbetweentwo
transmissionsofBPDUpacketssentbytheRootBridgetotellallotherSwitchesthatitisindeedthe
RootBridge.IfyousetaHelloTimeforyourSwitch,anditisnottheRootBridge,thesetHelloTime
willbeusedifandwhenyourSwitchbecomestheRootBridge.
Note:
TheHelloTimecannotbelongerthantheMax.Age.Otherwise,aconfigurationerrorwilloccur.

60
Max.AgeTheMaxAgecanbefrom6to40seconds.AttheendoftheMaxAge,ifaBPDUhasstill
notbeenreceivedfromtheRootBridge,yourSwitchwillstartsendingitsownBPDUtoallother
SwitchesforpermissiontobecometheRootBridge.IfitturnsoutthatyourSwitchhasthelowest
BridgeIdentifier,itwillbecometheRootBridge.
ForwardDelayTimerTheForwardDelaycanbefrom4to30seconds.Thisisthetimeanyporton
theSwitchspendsinthelisteningstatewhilemovingfromtheblockingstatetotheforwardingstate.
Note:
Observethefollowingformulaswhensettingtheaboveparameters:
Max.Age_2x(ForwardDelay‐1second)
Max.Age_2x(HelloTime+1second)
PortPriorityAPortPrioritycanbefrom0to240.Thelowerthenumber,thegreatertheprobability
theportwillbechosenastheRootPort.
PortCostAPortCostcanbesetfrom0to200000000.Thelowerthenumber,thegreaterthe
probabilitytheportwillbechosentoforwardpackets.
IllustrationofSTP
Asimpleillustrationofthreeswitchesconnectedinaloopisdepictedinthebelowdiagram.Inthis
example,youcananticipatesomemajornetworkproblemsiftheSTPassistanceisnotapplied.
IfswitchAbroadcastsapackettoswitchB,switchBwillbroadcastittoswitchC,andswitchCwill
broadcastittobacktoswitchAandsoon.Thebroadcastpacketwillbepassedindefinitelyinaloop,
potentiallycausinganetworkfailure.
Inthisexample,STPbreakstheloopbyblockingtheconnectionbetweenswitchBandC.Thedecision
toblockaparticularconnectionisbasedontheSTPcalculationofthemostcurrentBridgeandPort
settings.Now,ifswitchAbroadcastsapackettoswitchC,thenswitchCwilldropthepacketatport2
andthebroadcastwillendthere.SettingupSTPusingvaluesotherthanthedefaults,canbecomplex.
Therefore,youareadvisedtokeepthedefaultfactorysettingsandSTPwillautomaticallyassignroot
bridges/portsandblockloopconnections.InfluencingSTPtochooseaparticularswitchastheroot
bridgeusingthePrioritysetting,orinfluencingSTPtochooseaparticularporttoblockusingthePort
PriorityandPortCostsettingsis,however,relativelystraightforward.

61
BeforeApplyingtheSTARules
Inthisexample,onlythedefaultSTPvaluesareused.
AfterApplyingtheSTARules
TheswitchwiththelowestBridgeID(switchC)waselectedtherootbridge,andtheportswere
selectedtogiveahighportcostbetweenswitchesBandC.Thetwo(optional)Gigabitports(default
portcost=20,000)onswitchAareconnectedtoone(optional)GigabitportonbothswitchBandC.
TheredundantlinkbetweenswitchBandCisdeliberatelychosenasa100MbpsFastEthernetlink
(defaultportcost=200,000).Gigabitportscouldbeused,buttheportcostshouldbeincreasedfrom
thedefaulttoensurethatthelinkbetweenswitchBandswitchCistheblockedlink.
62
4.6.2 STPGlobalSettings
ThispageallowsyoutoconfiguretheSTPsystemsettings.ThesettingsareusedbyallSTPBridge
instancesintheIntellinet8PortGigabitPoE+switch.Themanagedswitchsupportsthefollowing
SpanningTreeprotocols:
Compatible‐‐SpanningTreeProtocol(STP):Providesasinglepathbetweenendstations,
avoidingandeliminatingloops.
Normal‐‐RapidSpanningTreeProtocol(RSTP):Detectsandusesofnetworktopologiesthat
providefasterspanningtreeconvergence,withoutcreatingforwardingloops.
ExtensionMultipleSpanningTreeProtocol(MSTP):DefinesanextensiontoRSTPtofurther
developtheusefulnessofvirtualLANs(VLANs).This"PerVLAN"MultipleSpanningTree
ProtocolconfiguresaseparateSpanningTreeforeachVLANgroupandblocksallbutoneof
thepossiblealternatepathswithineachSpanningTree.

63
4.6.3 STPPortSettings
Allportrelatedsettingsareconfiguredonthisscreen.

64
Bydefault,thesystemautomaticallydetectsthespeedandduplexmodeusedoneachport,and
configuresthepathcostaccordingtothevaluesshownbelow.Pathcost“0”isusedtoindicateauto
configurationmode.Whentheshortpathcostmethodisselectedandthedefaultpathcost
recommendedbytheIEEE8021wstandardexceeds65,535,thedefaultissetto65,535.
RecommendedSTPPathCostRange
Recommended STP Path Costs
DefaultSTPPathCosts

65
4.6.4 CISTInstanceSetting
ThisPageallowsyoutoconfigureCISTinstancesettings.

66
4.6.5 CISTPortSettings
ONthispageyoucanconfiguretheCISTpriorityandinternalpathcostoftheIntellinet8PortGigabit
PoESwitch.
CISTPortStatusPageScreenshot
67
68
4.6.6 MSTInstanceConfiguration
ThispageallowstheusertoconfigureMSTInstanceConfiguration.

69

70
4.6.7 MSTPortSettings
ThispageallowstheusertoinspectthecurrentSTPMSTIportconfigurations,andpossiblychange
themaswell.AMSTIportisavirtualport,whichisinstantiatedseparatelyforeachactiveCIST
(physical)portforeachMSTIinstanceconfiguredandapplicablefortheport.TheMSTIinstancemust
beselectedbeforedisplayingactualMSTIportconfigurationoptions.ThispagecontainsMSTIport
settingsforphysicalandaggregatedports.Theaggregationsettingsareglobal.

71
4.6.8 STPStatistics

72
4.7 Multicast
4.7.1 Properties
Thispageprovidesmulticastpropertiesrelatedconfiguration.
ParameterDescription
L2UnknownMulticastActionUnknownLayer2multicasttrafficcanbeeitherdropped,or
sendouttoallports(flood).
IPUnknownMulticastActionUnknownIPv4multicasttrafficmethod:
Drop,floodorsendtorouterport.
IPv6UnknownMulticastActionUnknownIPv6multicasttrafficmethod:
Drop,floodorsendtorouterport.
IPv4ForwardMethodForwardingbasedonMACorIPaddress.
IPv6ForwardMethodForwardingbasedonMACorIPaddress.
4.7.2 IGMPSnooping
TheInternetGroupManagementProtocol(IGMP)letshostandroutersshareinformationabout
multicastgroupsmemberships.IGMPsnoopingisaswitchfeaturethatmonitorstheexchangeofIGMP
messagesandcopiesthemtotheCPUforfeatureprocessing.TheoverallpurposeofIGMPSnoopingis
tolimittheforwardingofmulticastframestoonlyportsthatareamemberofthemulticastgroup.
AbouttheInternetGroupManagementProtocol(IGMP)Snooping
Computersandnetworkdevicesthatwanttoreceivemulticasttransmissionsneedtoinformnearby
routersthattheywillbecomemembersofamulticastgroup.TheInternetGroupManagement
Protocol(IGMP)isusedtocommunicatethisinformation.IGMPisalsousedtoperiodicallycheckthe
multicastgroupformembersthatarenolongeractive.Inthecasewherethereismorethanone
multicastrouteronasubnetwork,onerouteriselectedasthe‘queried.Thisrouterthenkeepstrack
ofthemembershipofthemulticastgroupsthathaveactivemembers.Theinformationreceivedfrom
IGMPisthenusedtodetermineifmulticastpacketsshouldbeforwardedtoagivensubnetworkor
not.Theroutercancheck,usingIGMP,toseeifthereisatleastonememberofamulticastgroupon
agivensubnetwork.Iftherearenomembersonasubnetwork,packetswillnotbeforwardedtothat
subnetwork.
73
MulticastService
MulticastFlooding

74
IGMPSnoopingMulticastStreamControl
IGMPVersions1and2
Multicastgroupsallowmemberstojoinorleaveatanytime.IGMPprovidesthemethodformembers
andmulticastrouterstocommunicatewhenjoiningorleavingamulticastgroup.IGMPversion1is
definedinRFC1112.Ithasafixedpacketsizeandnooptionaldata.
TheformatofanIGMPpacketisshownbelow:
Type
TypeofIGMPmessage.Therearethreetypes:MembershipQuery,MembershipReportand
LeaveGroup.
MaximumResponseTime
ThisfieldisusedonlyinMembershipQuerymessages.Thisfieldisthemaximumtimeahostis
allowedtoproduceandsendaMembershipReportmessageafterreceivingaMembership
Querymessage.

75
Checksum
Thisistheone'scomplimentoftheone'scomplementsumoftheentireIGMPmessage,which
basicallyworksouttobetheentirepayloadoftheIPdatagramtheIGMPdatagramis
encapsulatedwithin.
GroupAddress
Behaviorofthisfieldvariesbythetypeofmessagesent:
MembershipQuery:(setto)
GeneralQuery:Allzeroes
GroupSpecificQuery:multicastgroupaddress
MembershipReport:multicastgroupaddress
LeaveGroup:multicastgroupaddress

IGMPpacketsenablemulticastrouterstokeeptrackofthemembershipofmulticastgroups,ontheir
respectivesubnetworks.Thefollowingoutlineswhatiscommunicatedbetweenamulticastrouterand
amulticastgroupmemberusingIGMP.
AhostsendsanIGMP“reporttojoinagroup
Ahostwillneversendareportwhenitwantstoleaveagroup(forversion1).
Ahostwillsenda“leavereportwhenitwantstoleaveagroup(forversion2).
MulticastrouterssendIGMPqueries(totheallhostsgroupaddress:224.0.0.1)periodicallytosee
whetheranygroupmembersexistontheirsubnetworks.Ifthereisnoresponsefromaparticular
group,therouterassumesthattherearenogroupmembersonthenetwork.
TheTimetoLive(TTL)fieldofquerymessagesissetto1sothatthequerieswillnotbeforwardedto
othersubnetworks.
IGMPversion2introducessomeenhancementssuchasamethodtoelectamulticastqueriedforeach
LAN,anexplicitleavemessage,andquerymessagesthatarespecifictoagivengroup.Thestatesa
computerwillgothroughtojoinortoleaveamulticastgroupareshownbelow:

76
IGMPStateTransitions
IGMPQuerier
Arouter,ormulticastenabledswitch,canperiodicallyasktheirhostsiftheywanttoreceivemulticast
traffic.Ifthereismorethanonerouter/switchontheLANperformingIPmulticasting,oneofthese
devicesiselected“querierandassumestheroleofqueryingtheLANforgroupmembers.Itthen
propagatestheservicerequestsontoanyupstreammulticastswitch/routertoensurethatitwill
continuetoreceivethemulticastservice.
Note:
Multicastroutersusethisinformation,alongwithamulticastroutingprotocolsuchas
DVMRPorPIM,tosupportIPmulticastingacrosstheInternet.
4.7.2.1 IGMPSettings
ThispageprovidesIGMPSnoopingrelatedconfiguration.Mostofthesettingsareglobal,whereasthe
RouterPortconfigurationisrelatedtothecurrentunit,asreflectedbythepageheader.
77
78
4.7.2.2 IGMPSnoopingQuerierSettings
4.7.2.3 IGMPStaticGroup
MulticastfilteringcanbedynamicallyconfiguredusingIGMPSnoopingandIGMPQuerymessagesas
describedinabovesections.Forcertainapplicationsthatrequiretightercontrol,youmayneedto
staticallyconfigureamulticastserviceontheManagedSwitch.Firstaddalltheportsattachedto
participatinghoststoacommonVLAN,andthenassignthemulticastservicetothatVLANgroup.
‐Staticmulticastaddressesareneveragedout.‐Whenamulticastaddressisassignedtoaninterface
inaspecificVLAN,thecorrespondingtrafficcanonlybeforwardedtoportswithinthatVLAN.
79
4.7.2.4 IGMPGroupTable
ThispageprovidesanoverviewoverthecurrentIGMPgrouptable(multicastdatabase).
4.7.2.5 IGMPRouterPortSettings
Dependingonyournetworkconnections,IGMPsnoopingmaynotalwaysbeabletolocatetheIGMP
querier.Therefore,iftheIGMPquerierisaknownmulticastrouter/switchconnectedoverthe
networktoaninterface(portortrunk)onyourManagedSwitch,youcanmanuallyconfigurethe
interface(andaspecifiedVLAN)tojoinallthecurrentmulticastgroupssupportedbytheattached
router.Thiscanensurethatmulticasttrafficispassedtoalltheappropriateinterfaceswithinthe
ManagedSwitch.
80
4.7.2.6 IGMPRouterTable
ThissectionprovidesstatisticalinformationaboutthecurrentIGMProutingtables.Thereareno
configurationoptionshere.
4.7.2.7 IGMPForwardAll
This page provides IGMP Forward All.
81

82
4.7.3 IGMPSnoopingStatics
ThispageprovidesIGMPSnoopingStatics.

83
4.7.4 MLDSnooping
4.7.4.1 MLDSetting
InIPv4,Layer2switchescanuseIGMPsnoopingtolimitthefloodingofmulticasttrafficbydynamically
configuringLayer2interfacessothatmulticasttrafficisforwardedtoonlythoseinterfacesassociated
withIPmulticastaddress.InIPv6,MLDsnoopingperformsasimilarfunction.WithMLDsnooping,IPv6
multicastdataisselectivelyforwardedtoalistofportsthatwanttoreceivethedata,insteadofbeing
floodedtoallportsinaVLAN.ThislistisconstructedbysnoopingIPv6multicastcontrolpackets.
MLDisaprotocolusedbyIPv6multicastrouterstodiscoverthepresenceofmulticastlisteners(nodes
configuredtoreceiveIPv6multicastpackets)onitsdirectlyattachedlinksandtodiscoverwhich
multicastpacketsareofinteresttoneighboringnodes.MLDisderivedfromIGMP;MLDversion1
(MLDv1)isequivalenttoIGMPv2,andMLDversion2(MLDv2)isequivalenttoIGMPv3.MLDisa
subprotocolofInternetControlMessageProtocolversion6(ICMPv6),andMLDmessagesareasubset
ofICMPv6messages,identifiedinIPv6packetsbyaprecedingNextHeadervalueof58.Thispage
providesMLD(MulticastListenerDiscovery)Snoopingrelatedconfiguration.Mostofthesettingsare
global,whereastheRouterPortconfigurationisrelatedtothecurrentunit,asreflectedbythepage
header.
84
4.7.4.2 MLDStaticGroup
4.7.4.3 MLDGroupTable
85
4.7.4.4 MLDRouterSettings
Dependingonyournetworkconnections,MLDsnoopingmaynotalwaysbeabletolocatetheMLD
querier.Therefore,iftheMLDquerierisaknownmulticastrouter/switchconnectedoverthenetwork
toaninterface(portortrunk)onyourManagedSwitch,youcanmanuallyconfiguretheinterface(and
aspecifiedVLAN)tojoinallthecurrentmulticastgroupssupportedbytheattachedrouter.Thiscan
ensurethatmulticasttrafficispassedtoalltheappropriateinterfaceswithintheManagedSwitch.
4.7.4.5 MLDRouterTable
ThispagecontainstheMLDroutertablesoftheIntellinet8PortGigabitPoE+Switch.

86
4.7.4.6 MLDForwardAll
DefinetheMLDForwardAllsettingsonthispage.

87
4.7.5 MLDSnoopingStatics

88
4.7.6 MulticastThrottlingSetting
Multicastthrottlingsetsamaximumnumberofmulticastgroupsthataportcanjoinatthesametime.
Whenthemaximumnumberofgroupsisreachedonaport,theswitchcantakeoneoftwoactions;
either“denyor“replace”.Iftheactionissettodeny,anynewmulticastjoinreportswillbedropped.
Iftheactionissettoreplace,theswitchrandomlyremovesanexistinggroupandreplacesitwiththe
newmulticastgroup.Onceyouhaveconfiguredmulticastprofiles,youcanassignthemtointerfaces
ontheManagedSwitch.Alsoyoucansetthemulticastthrottlingnumbertolimitthenumberof
multicastgroupsaninterfacecanjoinatthesametime.
4.7.7 MulticastFilter
Incertainswitchapplications,theadministratormaywanttocontrolthemulticastservicesthatare
availabletoendusers.Forexample,anIP/TVserviceisbasedonaspecificsubscriptionplan.The
multicastfilteringfeaturefulfillsthisrequirementbyrestrictingaccesstospecifiedmulticastservices
onaswitchport.Multicastfilteringenablesyoutoassignaprofiletoaswitchportthatspecifies
multicastgroupsthatarepermittedordeniedontheport.Amulticastfilterprofilecancontainoneor
more,orarangeofmulticastaddresses;butonlyoneprofilecanbeassignedtoaport.

89
Whenenabled,multicastjoinreportsreceivedontheportarecheckedagainstthefilterprofile.Ifa
requestedmulticastgroupispermitted,themulticastjoinreportisforwardedasnormal.Ifa
requestedmulticastgroupisdenied,themulticastjoinreportisdropped.
WhenyouhavecreatedaMulticastprofilenumber,youcanthenconfigurethemulticastgroupsto
filterandsettheaccessmode.
CommandUsage
Eachprofilehasonlyoneaccessmode;eitherpermitordeny.
Whentheaccessmodeissettopermit,multicastjoinreportsareprocessedwhenamulticast
groupfallswithinthecontrolledrange.
Whentheaccessmodeissettodeny,multicastjoinreportsareonlyprocessedwhenthe
multicastgroupisnotinthecontrolledrange.
4.7.7.1 MulticastProfileSetting

90
4.7.7.2 IGMPFilterSetting
4.7.7.3 MLDFilterSetting

91
4.8 QoS‐QualityofService
4.8.1 General/WhatisQoS?
QualityofService(QoS)isanadvancedtrafficprioritizationfeaturethatallowsyoutoestablishcontrol
overnetworktraffic.QoSenablesyoutoassignvariousgradesofnetworkservicetodifferenttypesof
traffic,suchasmultimedia,video,protocolspecific,timecritical,andfilebackuptraffic.
QoSreducesbandwidthlimitations,delay,loss,andjitter.Italsoprovidesincreasedreliabilityfor
deliveryofyourdataandallowsyoutoprioritizecertainapplicationsacrossyournetwork.Youcan
defineexactlyhowyouwanttheswitchtotreatselectedapplicationsandtypesoftraffic.
YoucanuseQoSonyoursystemtocontrolawidevarietyofnetworktrafficby:
Classifyingtrafficbasedonpacketattributes.
Assigningprioritiestotraffic(forexample,tosethigherprioritiestotimecriticalorbusiness
criticalapplications).
Applyingsecuritypolicythroughtrafficfiltering.
Providepredictablethroughputformultimediaapplicationssuchasvideoconferencingorvoice
overIPbyminimizingdelayandjitter.Improveperformanceforspecifictypesoftrafficand
preserveperformanceastheamountoftrafficgrows.
Reducetheneedtoconstantlyaddbandwidthtothenetwork.
Managenetworkcongestion.
ToimplementQoSonyournetwork,youneedtocarryoutthefollowingactions:
1. Defineaserviceleveltodeterminetheprioritythatwillbeappliedtotraffic.
2. Applyaclassifiertodeterminehowtheincomingtrafficwillbeclassifiedandthustreatedbythe
Switch.
3. CreateaQoSprofilewhichassociatesaservicelevelandaclassifier.
4. ApplyaQoSprofiletoaport(s).
TheQoSpageoftheManagedSwitchcontainsthreetypesofQoSmode‐the802.1pmode,DSCP
modeorPortbasemodecanbeselected.Boththethreemoderelyonpredefinedfieldswithinthe
packettodeterminetheoutputqueue.
802.1pTagPriorityMode–TheoutputqueueassignmentisdeterminedbytheIEEE802.1pVLAN
prioritytag.
IPDSCPMode‐TheoutputqueueassignmentisdeterminedbytheTOSorDSCPfieldintheIP
packets.
PortBasePriorityModeAnypacketreceivedfromthespecifyhighpriorityportwilltreatedasa
highprioritypacket.
TheManagedSwitchsupportseightprioritylevelqueue,thequeueservicerateisbasedontheWRR
(WeightRoundRobin)andWFQ(WeightedFairQueuing)algorithm.TheWRRratioofhighpriorityand
lowprioritycanbesetto“4:1and8:1.4.8.2General

92
4.8.1.1 QoSProperties
OnthisscreenyoucanactivateordeactivateQoS.
ParameterDescription
QoSModeDisable:QoSisdeactivated.
Basic:QoSisenabledinbasicmode.
Basic:QoSisenabledinadvancedmode.
Note:
InQoSadvancedmode,theIntellinet8PortGigabitPoE+switchusespoliciestosupportperflowQoS.
Thepolicyanditscomponentshavethefollowingcharacteristics:
Apolicymaycontainsoneormoreclassmaps.
Apolicycontainsoneormoreflows,eachwithauserdefinedQoS.
AsinglepolicerappliestheQoStoasingleclassmap,andthustoasingleflow,basedonthe
policerQoSspecification.
AnaggregatepolicerappliestheQoStooneormoreclassmaps,andthusoneormoreflows.
PerflowQoSareappliedtoflowsbybindingthepoliciestothedesiredports.
4.8.1.2 QoSPortSettings
TheQoSPortSettingsandStatusscreen.


93
4.8.1.3 QueueSettings
Definetheschedulingmethodofthe8QoSqueuesonthisconfigurationscreen.
4.8.1.4 CoSMapping
ThisscreencontrolstomappingofClassofService(CoS)tothequeues.

94
4.8.1.5 DSCPMapping
TheDSCPtoQueueandQueuetoDSCPMappingscreen
4.8.1.6 IPPrecedenceMapping
TheIPPrecedencetoQueueandQueuetoIPPrecedenceMappingscreen.

95
4.8.2 QoSBasicMode
4.8.2.1 GlobalSettings
OnthisinterfacescreenyoucandefinetheQoStrustmode.
ParameterDescription
TrustModeCoS/802.1pThisisaLayer2QoSwheretrafficismappedtoqueuesbasedonthe
VLANPriorityTag(VPT)fieldintheVLANtag.IfthereisnoVLANtagonthe
incomingpacket,thetrafficismappedtoqueuesbasedontheperportdefault
CoS/802.1pvalue.
DSCPThisisaLayer3QoS.WhereallIPtrafficismappedtoqueuesbasedonthe
DSCPfieldintheIPheader.IfthetrafficisnotIPtraffic,itismappedtothebest
effortqueue.
CoS/802.1pDSCPAllnonIPtrafficismappedthroughtheuseofCoS/802.1p.All
IPtrafficismappedthroughDSCP.
IPPrecedenceTheIPheaderhasafieldcalledtheTypeofService(TOS)that
sitsbetweentheHeaderLengthfieldandtheTo talLengthfield.IPPrecedence
usesthefirstthreebitsoftheTOSfieldtogive8possibleprecedencevalues.
000(0)‐Routine
001(1)‐Priority
010(2)‐Immediate
011(3)‐Flash
100(4)‐FlashOverride
101(5)‐Critical
110(6)‐InternetworkControl
111(7)‐NetworkControl
96
4.8.2.2 QoSPortSetting
Oncethetrustmodehasbeenproperlyconfigured,thenextstepistochoosetheinterfaces(switch
port)towhichQoSisapplied.

97
4.8.3 QoSAdvancedMode
4.8.3.1 GlobalSettings
OnthisinterfacescreenyoucandefinetheQoStrustmode.
ParameterDescription
TrustModeCoS/802.1pThisisaLayer2QoSwheretrafficismappedtoqueuesbasedonthe
VLANPriorityTag(VPT)fieldintheVLANtag.IfthereisnoVLANtagonthe
incomingpacket,thetrafficismappedtoqueuesbasedontheperportdefault
CoS/802.1pvalue.
DSCPThisisaLayer3QoS.WhereallIPtrafficismappedtoqueuesbasedonthe
DSCPfieldintheIPheader.IfthetrafficisnotIPtraffic,itismappedtothebest
effortqueue.
CoS/802.1pDSCPAllnonIPtrafficismappedthroughtheuseofCoS/802.1p.All
IPtrafficismappedthroughDSCP.
IPPrecedenceTheIPheaderhasafieldcalledtheTypeofService(TOS)thatsits
betweentheHeaderLengthfieldandtheTotalLengthfield.IPPrecedenceuses
thefirstthreebitsoftheTOSfieldtogive8possibleprecedencevalues.
000(0)‐Routine
001(1)‐Priority
010(2)‐Immediate
011(3)‐Flash
100(4)‐FlashOverride
101(5)‐Critical
110(6)‐InternetworkControl
111(7)‐NetworkControl
Default
ModeStatus
Clicktheradiobuttonthatcorrespondstothedesiredmodestatus.Thisprovidesa
waytotrustCoS/DSCPwithouttheneedtocreateapolicy.
TrustedTrustCoS/DSCP.
NotTrustedDonottrustCoS/DSCP.ThedefaultCoSvaluesconfiguredonthe
interfaceareusedtoprioritizethetrafficthatarrivesontheinterface.
98
4.8.3.2 ClassConfiguration
QoSclassmappingisconfiguredonthispage.
4.8.3.3 AggregatePolice
99
4.8.3.4 PolicyConfiguration
Provideanameforapolicyonthispage.
4.8.3.5 PolicyClassMaps
100
4.8.3.6 PolicyBinding
Onthispageyoucanlinkthepoliciestoaninterface(Networkport,orLAG).

101
4.8.4 RateLimit
Policing,orratelimiting,allowsyoutomonitorthedataratesforaparticularclassoftraffic.Whenthe
datarateexceedsuserconfiguredvalues,theIntellinetswitchdropspacketsimmediately.Because
policingdoesnotbufferthetraffic;transmissiondelaysarenotaffected.Whentrafficexceedsthedata
rateonaspecificclass,theswitchdropsthepackets.
Ratelimitingisconfiguredfortwotypesoftransmissions,whichareingressandegress.Ingresstraffic
isreceivedonanygivenport(incoming,orinbound),whereasegresstrafficistrafficsentout
(outgoing,outbound)toanothernetworkclient.
4.8.4.1 IngressBandwidthControl
Controlinboundbandwidthusagewiththisconfigurationscreen.
ParameterDescription
BurstSizeThemaximumsizepermittedforburstsofdata.Burstsizesaremeasuredin
bytes.Werecommendthisformulaforcalculatingthecorrectburstsize:
Burstsize=bandwidthxallowabletimeforbursttraffic/8.
PortPorts1to10.
StateDisableorenabletheingressbandwidthcontrol.
Rate(kbps)Theaveragenumberofkilobitspersecondpermittedforpacketsreceivedat
theinterface.Youcanspecifythebandwidthlimitasanabsolutenumberof
kilobitspersecond.

102
4.8.4.2 VLANIngressRateLimit
TrafficlimitingonVLANscanbeachievedbyratelimitingperVLAN.Ingresstrafficisthetrafficwhich
comesintotheportsoftheswitch.WhenVLANingressratelimitingisconfigured,itconstrainsthe
trafficfromalltheportsontheswitch.
ParameterDescription
VLANVLANID.
PortPorts1to10,LAG1toLAG8.
StateDisableorenabletheingressbandwidthcontrol.
Rate(kbps)Theaveragenumberofkilobitspersecondpermittedforpacketsreceivedat
theinterface.Youcanspecifythebandwidthlimitasanabsolutenumberof
kilobitspersecond.
4.8.4.3 EgressBandwidthControl
Theconfigurationoftheegressbandwidthisthesameastheingressbandwidth.SeesectionIngress
BandwidthControlabovefordetails.

103
4.8.4.4 EgressQueueBandwidthControl
Egressshapingperqueuelimitsthetransmissionrateofselectedoutgoingframesonaperqueue,per
portbasis.Todothis,theswitchshapes,orlimitstheoutputload.Thisdoesnotincludemanagement
frames,sotheydonotcounttowardstheratelimit.Egressqueuebandwidthcontrolisusedtohelp
preventcongestionforyourISP(InternetServiceProvider).
ParameterDescription
BurstSizeThemaximumsizepermittedforburstsofdata.Burstsizesaremeasuredin
bytes.Werecommendthisformulaforcalculatingthecorrectburstsize:
Burstsize=bandwidthxallowabletimeforbursttraffic/8.
PortPorts1to10.
QueueSelectthequeuefrom1to8.
StateDisableorenabletheingressbandwidthcontrol.
CIR(kbps)Thecommittedinformationrateinkilobitspersecond.

104
4.8.5 VoiceVLAN
4.8.5.1 WhatisVoiceVLAN?
VoiceVLANisspeciallyconfiguredforuservoicedatatraffic.BysettingaVoiceVLANandaddingthe
portsoftheconnectedvoicedevicetoVoiceVLAN,theuserwillbeabletoconfigureQoS(Qualityof
service)serviceforvoicedata,andimprovevoicedatatraffictransmissionprioritytoensurethecalling
quality.TheIntellinetswitchcanjudgeifthedatatrafficisthevoicedatatrafficfromspecified
equipmentaccordingtothesourceMACaddressfieldofthedatapacketenteringtheport.Thepacket
withthesourceMACaddresscomplyingwiththesystemdefinedvoiceequipmentOUI
(OrganizationallyUniqueIdentifier)willbeconsideredthevoicedatatrafficandtransmittedtothe
VoiceVLAN.
TheconfigurationisbasedonMACaddress,acquiringamechanisminwhicheveryvoiceequipment
transmittinginformationthroughthenetworkhasgotitsuniqueMACaddress.VLANwilltracethe
addressbelongstospecifiedMAC.ByThismeans,VLANallowsthevoiceequipmentalwaysbelongto
VoiceVLANwhenrelocatedphysically.ThegreatestadvantageoftheVLANistheequipmentcanbe
automaticallyplacedintoVoiceVLANaccordingtoitsvoicetrafficwhichwillbetransmittedat
specifiedpriority.Meanwhile,whenvoiceequipmentisphysicallyrelocated,itstillbelongstothe
VoiceVLANwithoutanyfurtherconfigurationmodification,whichisbecauseitisbasedonvoice
equipmentotherthanswitchport.
Note:
TheVoiceVLANfeatureenablesthevoicetraffictoforwardontheVoiceVLAN,andthentheswitchcan
beclassifiedandscheduledtonetworktraffic.ItisrecommendedtherearetwoVLANsonaport‐‐one
forvoice,onefordata.BeforeconnectingtheIPdevicetotheswitch,theIPphoneshouldconfigurethe
voiceVLANIDcorrectly.ItshouldbeconfiguredthroughitsownGUI.
4.8.5.2 Properties
TheVoiceVLANfeatureenablesvoicetraffictoforwardontheVoiceVLAN,andthentheIntellinet
switchcanbeclassifiedandscheduledtonetworktraffic.ItisrecommendedthattherearetwoVLANs
onaport‐‐oneforvoiceandonefordata.BeforeconnectingtheIPdevicetotheswitch,theIPphone
shouldconfigurethevoiceVLANIDcorrectlythroughitsownGUI.

105
4.8.5.3 Telephony OUI MAC
ConfigureVOICEVLANOUItableonthispage.
EachIPphonemanufacturercanbeidentifiedbyoneormoreOrganizationUniqueIdentifiers(OUIs).
AnOUIisthreebyteslongandisusuallyexpressedinhexadecimalformat.Itisimbeddedintothefirst
partofeachMACaddressofanEthernetnetworkdevice.YoucanfindtheOUIofanIPphoneinthe
firstthreecompletebytesofitsMACaddress.Typically,youwillfindthatalloftheIPphonesyouare
installinghavethesameOUIincommon.
The8PortIntellinetswitchidentifiesavoicedatapacketbycomparingtheOUIinformationinthe
packetssourceMACaddresswithanOUItablethatyouconfigurewhenyouinitiallysetupthevoice
VLAN.ThisisimportantwhentheAutoDetectionfeatureforaportandisadynamicvoiceVLANport.
WhenyouareconfiguringthevoiceVLANparameters,youmustenterthecompleteMACaddressofat
leastoneofyourIPphones.An“OUIMask”isautomaticallygeneratedandappliedbytheATS107
managementsoftwaretoyieldthemanufacturersOUI.IftheOUIoftheremainingphonesfromthat
manufactureristhesame,thennootherIPphoneMACaddressesneedtobeenteredintothe
configuration.
However,itispossiblethatyoucanfindmorethanoneOUIfromthesamemanufactureramongtheIP
phonesyouareinstalling.ItisalsopossiblethatyourIPphonesarefromtwoormoredifferent
manufacturersinwhichcaseyouwillfinddifferentOUIsforeachmanufacturer.Ifyouidentifymore
thanoneOUIamongtheIPphonesbeinginstalled,thenoneMACaddressrepresentingeach
individualOUImustbeconfiguredinthevoiceVLAN.Youcanenteratotalof10OUIs.

106

107
4.8.5.4 Telephony OUI Port

108
4.9 Security
4.9.1 StormControl
4.9.1.1 GlobalSettings
4.9.1.2 PortSettings
109
4.9.2 802.1x
Inthe802.1Xworld,theuseriscalledthesupplicant,theswitchistheauthenticator,andtheRADIUS
serveristheauthenticationserver.Theswitchactsasthemaninthemiddle,forwardingrequestsand
responsesbetweenthesupplicantandtheauthenticationserver.Framessentbetweenthesupplicant
andtheswitcharespecial802.1Xframes,knownasEAPOL(EAPOverLANs)frames.EAPOLframes
encapsulateEAPPDUs(RFC3748).FramessentbetweentheswitchandtheRADIUSserverareRADIUS
packets.RADIUSpacketsalsoencapsulateEAPPDUstogetherwithotherattributesliketheswitch'sIP
address,name,andthesupplicant'sportnumberontheswitch.EAPisveryflexible,inthatitallows
fordifferentauthenticationmethods,likeMD5Challenge,PEAP,andTLS.Theimportantthingisthat
theauthenticator(theswitch)doesn'tneedtoknowwhichauthenticationmethodthesupplicantand
theauthenticationserverareusing,orhowmanyinformationexchangeframesareneededfora
particularmethod.TheswitchsimplyencapsulatestheEAPpartoftheframeintotherelevanttype
(EAPOLorRADIUS)andforwardsit.Whenauthenticationiscomplete,theRADIUSserversendsa
specialpacketcontainingasuccessorfailureindication.Besidesforwardingthisdecisiontothe
supplicant,theswitchusesittoopenuporblocktrafficontheswitchportconnectedtothe
supplicant.OverviewofUserAuthentication
ItisallowedtoconfiguretheManagedSwitchtoauthenticateusersloggingintothesystemfor
managementaccessusinglocalorremoteauthenticationmethods,suchastelnetandWebbrowser.
ThisManagedSwitchprovidessecurenetworkmanagementaccessusingthefollowingoptions:
RemoteAuthenticationDialinUserService(RADIUS)
Ter m inalAccessControllerAccessControlSystemPlus(TACACS+)
LocalusernameandPrivilegeLevelcontrol
TheIEEE802.1Xstandarddefinesaclientserverbasedaccesscontrolandauthenticationprotocolthat
restrictsunauthorizedclientsfromconnectingtoaLANthroughpubliclyaccessibleports.The
authenticationserverauthenticateseachclientconnectedtoaswitchportbeforemakingavailableany
servicesofferedbytheswitchortheLAN.
Untiltheclientisauthenticated,802.1XaccesscontrolallowsonlyExtensibleAuthenticationProtocol
overLAN(EAPOL)trafficthroughtheporttowhichtheclientisconnected.Afterauthenticationis
successful,normaltrafficcanpassthroughtheport.
Thissectionincludesthisconceptualinformation:
DeviceRoles
AuthenticationInitiationandMessageExchange
PortsinAuthorizedandUnauthorizedStates

110
DeviceRoles:
With802.1Xportbasedauthentication,thedevicesinthenetworkhavespecificrolesasshownbelow.
Client‐thedevice(workstation)thatrequestsaccesstotheLANandswitchservicesandrespondsto
requestsfromtheswitch.Theworkstationmustberunning802.1Xcompliantclientsoftwaresuchas
thatofferedintheMicrosoftWindowsXPoperatingsystem.(TheclientisthesupplicantintheIEEE
802.1Xspecification.)
Authenticationserver—performstheactualauthenticationoftheclient.Theauthenticationserver
validatestheidentityoftheclientandnotifiestheswitchwhetherornottheclientisauthorizedto
accesstheLANandswitchservices.Becausetheswitchactsastheproxy,theauthenticationserviceis
transparenttotheclient.Inthisrelease,theRemoteAuthenticationDialInUserService(RADIUS)
securitysystemwithExtensibleAuthenticationProtocol(EAP)extensionsistheonlysupported
authenticationserver;itisavailableinCiscoSecureAccessControlServerversion3.0.RADIUSoperates
inaclient/servermodelinwhichsecureauthenticationinformationisexchangedbetweentheRADIUS
serverandoneormoreRADIUSclients.
Switch(802.1Xdevice)—controlsthephysicalaccesstothenetworkbasedontheauthentication
statusoftheclient.Theswitchactsasanintermediary(proxy)betweentheclientandthe
authenticationserver,requestingidentityinformationfromtheclient,verifyingthatinformationwith
theauthenticationserver,andrelayingaresponsetotheclient.TheswitchincludestheRADIUSclient,
whichisresponsibleforencapsulatinganddecapsulatingtheExtensibleAuthenticationProtocol(EAP)
framesandinteractingwiththeauthenticationserver.WhentheswitchreceivesEAPOLframesand
relaysthemtotheauthenticationserver,theEthernetheaderisstrippedandtheremainingEAPframe
111
isreencapsulatedintheRADIUSformat.TheEAPframesarenotmodifiedorexaminedduring
encapsulation,andtheauthenticationservermustsupportEAPwithinthenativeframeformat.When
theswitchreceivesframesfromtheauthenticationserver,theserver'sframeheaderisremoved,
leavingtheEAPframe,whichisthenencapsulatedforEthernetandsenttotheclient.
AuthenticationInitiationandMessageExchange
Theswitchortheclientcaninitiateauthentication.Ifyouenableauthenticationonaportbyusingthe
dot1xportcontrolautointerfaceconfigurationcommand,theswitchmustinitiateauthentication
whenitdeterminesthattheportlinkstatetransitionsfromdowntoup.ItthensendsanEAP
request/identityframetotheclienttorequestitsidentity(typically,theswitchsendsaninitial
identity/requestframefollowedbyoneormorerequestsforauthenticationinformation).Upon
receiptoftheframe,theclientrespondswithanEAPresponse/identityframe.However,ifduring
bootup,theclientdoesnotreceiveanEAPrequest/identityframefromtheswitch,theclientcan
initiateauthenticationbysendinganEAPOLstartframe,whichpromptstheswitchtorequestthe
client'sidentity.
Note:
If802.1Xisnotenabledorsupportedonthenetworkaccessdevice,anyEAPOLframesfromtheclient
aredropped.IftheclientdoesnotreceiveanEAPrequest/identityframeafterthreeattemptstostart
authentication,theclienttransmitsframesasiftheportisintheauthorizedstate.Aportinthe
authorizedstateeffectivelymeansthattheclienthasbeensuccessfullyauthenticated.
Whentheclientsuppliesitsidentity,theswitchbeginsitsroleastheintermediary,passingEAPframes
betweentheclientandtheauthenticationserveruntilauthenticationsucceedsorfails.Ifthe
authenticationsucceeds,theswitchportbecomesauthorized.ThespecificexchangeofEAPframes
dependsontheauthenticationmethodbeingused.Thepicturebelowshowsamessageexchange
initiatedbytheclientusingtheOneTimePassword(OTP)authenticationmethodwithaRADIUS
server.

112
PortsinAuthorizedandUnauthorizedStates
Theswitchportstatedetermineswhetherornottheclientisgrantedaccesstothenetwork.Theport
startsintheunauthorizedstate.Whileinthisstate,theportdisallowsallingressandegresstraffic
exceptfor802.1Xprotocolpackets.Whenaclientissuccessfullyauthenticated,theporttransitionsto
theauthorizedstate,allowingalltrafficfortheclienttoflownormally.
Ifaclientthatdoesnotsupport802.1Xisconnectedtoanunauthorized802.1Xport,theswitch
requeststheclient'sidentity.Inthissituation,theclientdoesnotrespondtotherequest,theport
remainsintheunauthorizedstate,andtheclientisnotgrantedaccesstothenetwork.
Incontrast,whenan802.1Xenabledclientconnectstoaportthatisnotrunningthe802.1Xprotocol,
theclientinitiatestheauthenticationprocessbysendingtheEAPOLstartframe.Whennoresponseis
received,theclientsendstherequestforafixednumberoftimes.Becausenoresponseisreceived,
theclientbeginssendingframesasiftheportisintheauthorizedstate
Iftheclientissuccessfullyauthenticated(receivesanAcceptframefromtheauthenticationserver),
theportstatechangestoauthorized,andallframesfromtheauthenticatedclientareallowedthrough
theport.Iftheauthenticationfails,theportremainsintheunauthorizedstate,butauthenticationcan
beretried.Iftheauthenticationservercannotbereached,theswitchcanretransmittherequest.Ifno
responseisreceivedfromtheserverafterthespecifiednumberofattempts,authenticationfails,and
networkaccessisnotgranted.Whenaclientlogsoff,itsendsanEAPOLlogoffmessage,causingthe
switchporttotransitiontotheunauthorizedstate.
Ifthelinkstateofaporttransitionsfromuptodown,orifanEAPOLlogoffframeisreceived,theport
returnstotheunauthorizedstate.
4.9.2.1 802.1xSetting
ThispageallowsyoutoconfiguretheIEEE802.1Xauthenticationsystem.TheIEEE802.1Xstandard
definesaportbasedaccesscontrolprocedurethatpreventsunauthorizedaccesstoanetworkby
requiringuserstofirstsubmitcredentialsforauthentication.Oneormorecentralservers,thebackend
servers,determinewhethertheuserisallowedaccesstothenetwork.Thesebackend(RADIUS)
serversareconfiguredonthe"Security802.1XAccessControl802.1XSetting"page.The
IEEE802.1Xstandarddefinesportbasedoperation,butnonstandardvariantsovercomesecurity
limitationsasshallbeexploredbelow.
Enableordisable802.1xontheIntellinetswitch.

113
4.9.2.2 802.1xPortSetting
OnthisinterfacescreenyoucandefinetheQoStrustmode.

114
4.9.2.3 GuestVLANSettings
WhenaGuestVLANenabledport'slinkcomesup,theswitchstartstransmittingEAPOLRequest
Identityframes.IfthenumberoftransmissionsofsuchframesexceedsMax.Reauth.Countandno
EAPOLframeshavebeenreceivedinthemeantime,theswitchconsidersenteringtheGuestVLAN.The
intervalbetweentransmissionofEAPOLRequestIdentityframesisconfiguredwithEAPOLTimeout.If
AllowGuestVLANifEAPOLSeenisenabled,theportwillnowbeplacedintheGuestVLAN.Ifdisabled,
theswitchwillfirstcheckitshistorytoseeifanEAPOLframehaspreviouslybeenreceivedontheport
(thishistoryisclearediftheportlinkgoesdownortheport'sAdminStateischanged),andifnot,the
portwillbeplacedintheGuestVLAN.OtherwiseitwillnotmovetotheGuestVLAN,butcontinue
transmittingEAPOLRequestIdentityframesattherategivenbyEAPOLTimeout.OnceintheGuest
VLAN,theportisconsideredauthenticated,andallattachedclientsontheportareallowedaccesson
thisVLAN.TheswitchwillnottransmitanEAPOLSuccessframewhenenteringtheGuestVLAN.While
intheGuestVLAN,theswitchmonitorsthelinkforEAPOLframes,andifonesuchframeisreceived,
theswitchimmediatelytakestheportoutoftheGuestVLANandstartsauthenticatingthesupplicant
accordingtotheportmode.IfanEAPOLframeisreceived,theportwillneverbeabletogobackinto
theGuestVLANifthe"AllowGuestVLANifEAPOLSeen"isdisabled.
115
4.9.2.4 AuthenticatedHosts
Seeallcurrentlyauthenticatedhostsonthisinformationscreen.

116
4.9.3 DHCPSnooping
TheaddressesassignedtoDHCPclientsonunsecureportscanbecarefullycontrolledusingthe
dynamicbindingsregisteredwithDHCPSnooping.DHCPsnoopingallowsaswitchtoprotectanetwork
fromrogueDHCPserversorotherdeviceswhichsendportrelatedinformationtoaDHCPserver.This
informationcanbeusefulintrackinganIPaddressbacktoaphysicalport.
CommandUsage
NetworktrafficmaybedisruptedwhenmaliciousDHCPmessagesarereceivedfromanoutside
source.DHCPsnoopingisusedtofilterDHCPmessagesreceivedonanonsecureinterfacefrom
outsidethenetworkorfirewall.WhenDHCPsnoopingisenabledgloballyandenabledonaVLAN
interface,DHCPmessagesreceivedonanuntrustedinterfacefromadevicenotlistedintheDHCP
snoopingtablewillbedropped.
Tableentriesareonlylearnedfortrustedinterfaces.Anentryisaddedorremoveddynamicallyto
theDHCPsnoopingtablewhenaclientreceivesorreleasesanIPaddressfromaDHCPserver.
EachentryincludesaMACaddress,IPaddress,leasetime,VLANidentifier,andportidentifier.
WhenDHCPsnoopingisenabled,DHCPmessagesenteringanuntrustedinterfacearefiltered
basedupondynamicentrieslearnedviaDHCPsnooping.

117
Filteringrulesareimplementedasfollows:
IftheglobalDHCPsnoopingisdisabled,allDHCPpacketsareforwarded.
IfDHCPsnoopingisenabledglobally,andalsoenabledontheVLANwheretheDHCPpacketis
received,allDHCPpacketsareforwardedforatrustedport.IfthereceivedpacketisaDHCP
ACKmessage,adynamicDHCPsnoopingentryisalsoaddedtothebindingtable.
IfDHCPsnoopingisenabledglobally,andalsoenabledontheVLANwheretheDHCPpacketis
received,buttheportisnottrusted,itisprocessedasfollows:
o IftheDHCPpacketisareplypacketfromaDHCPserver(includingOFFER,ACKorNAK
messages),thepacketisdropped.
o IftheDHCPpacketisfromaclient,suchasaDECLINEorRELEASEmessage,theswitch
forwardsthepacketonlyifthecorrespondingentryisfoundinthebindingtable.
o IftheDHCPpacketisfromaclient,suchasaDISCOVER,REQUEST,INFORM,DECLINE
orRELEASEmessage,thepacketisforwardedifMACaddressverificationisdisabled.
However,ifMACaddressverificationisenabled,thenthepacketwillonlybe
forwardediftheclientshardwareaddressstoredintheDHCPpacketisthesameas
thesourceMACaddressintheEthernetheader.
o IftheDHCPpacketisnotarecognizabletype,itisdropped.
IfaDHCPpacketfromaclientpassesthefilteringcriteriaabove,itwillonlybeforwardedto
trustedportsinthesameVLAN.
IfaDHCPpacketisfromserverisreceivedonatrustedport,itwillbeforwardedtobothtrusted
anduntrustedportsinthesameVLAN.
IftheDHCPsnoopingisgloballydisabled,alldynamicbindingsareremovedfromthebinding
table.
AdditionalconsiderationswhentheswitchitselfisaDHCPclientTheport(s)throughwhich
theswitchsubmitsaclientrequesttotheDHCPservermustbeconfiguredastrusted.Note
thattheswitchwillnotaddadynamicentryforitselftothebindingtablewhenitreceivesan
ACKmessagefromaDHCPserver.Also,whentheswitchsendsoutDHCPclientpacketsfor
itself,nofilteringtakesplace.However,whentheswitchreceives

118
4.9.3.1 DHCPSnoopingSettings
ActivateordeactivateDHCPsnoopingonthisconfigurationscreen.
4.9.3.2 LANSettings
CommandUsage
WhenDHCPsnoopingisenabledgloballyontheswitch,andenabledonthespecifiedVLAN,DHCP
packetfilteringwillbeperformedonanyuntrustedportswithintheVLAN.
WhentheDHCPsnoopingisgloballydisabled,DHCPsnoopingcanstillbeconfiguredforspecific
VLANs,butthechangeswillnottakeeffectuntilDHCPsnoopingisgloballyreenabled.
WhenDHCPsnoopingisgloballyenabled,andDHCPsnoopingisthendisabledonaVLAN,all
dynamicbindingslearnedforthisVLANareremovedfromthebindingtable.

119
4.9.3.3 DHCPSnoopingPortSettings
Configuresswitchportsastrustedoruntrusted.
CommandUsage
Atrustedinterfaceisaninterfacethatisconfiguredtoreceiveonlymessagesfromwithinthe
network.Anuntrustedinterfaceisaninterfacethatisconfiguredtoreceivemessagesfrom
outsidethenetworkorfirewall.
WhenDHCPsnoopingenabledbothgloballyandonaVLAN,DHCPpacketfilteringwillbe
performedonanyuntrustedportswithintheVLAN.
Whenanuntrustedportischangedtoatrustedport,allthedynamicDHCPsnoopingbindings
associatedwiththisportareremoved.
SetallportsconnectedtoDHCPserverswithinthelocalnetworkorfirewalltotrustedstate.Set
allotherportsoutsidethelocalnetworkorfirewalltountrustedstate.
4.9.3.4 DHCPSnoopingStatistics
120
4.9.3.5 RateLimit
AfterenablingDHCPsnooping,theswitchwillmonitoralltheDHCPmessagesandimplementsoftware
transmission.
4.9.3.6 Option82GlobalSettings
DHCPprovidesarelaymechanismforsendinginformationabouttheswitchanditsDHCPclientsto
DHCPservers.KnownasDHCPOption82,itallowscompatibleDHCPserverstousetheinformation
whenassigningIPaddresses,ortosetotherservicesorpoliciesforclients.Itisalsoaneffectivetoolin
preventingmaliciousnetworkattacksfromattachedclientsonDHCPservices,suchasIPSpoofing,
ClientIdentifierSpoofing,MACAddressSpoofing,andAddressExhaustion.
TheDHCPoption82enablesaDHCPrelayagenttoinsertspecificinformationintoaDHCPrequest
packetswhenforwardingclientDHCPpacketstoaDHCPserverandremovethespecificinformation
fromaDHCPreplypacketswhenforwardingserverDHCPpacketstoaDHCPclient.TheDHCPserver
canusethisinformationtoimplementIPaddressorotherassignmentpolicies.Specificallytheoption
worksbysettingtwosuboptions:
CircuitID(option1)
RemoteID(option2).
TheCircuitIDsuboptionissupposedtoincludeinformationspecifictowhichcircuittherequestcame
inon.TheRemoteIDsuboptionwasdesignedtocarryinformationrelatingtotheremotehostendof
thecircuit.ThedefinitionofCircuitIDintheswitchis4bytesinlengthandtheformatis"vlan_id"
"module_id""port_no".Theparameterof"vlan_id"isthefirsttwobytesrepresenttheVLANID.The
parameterof"module_id"isthethirdbyteforthemoduleID(instandaloneswitchitalwaysequal0,
inswitchitmeansswitchID).Theparameterof"port_no"isthefourthbyteanditmeanstheport
number.
121
4.9.3.7 Option82PortSettings
ThisfunctionisusedtosettheretransmittingpolicyofthesystemforthereceivedDHCPrequest
messagewhichcontainsoption82.Thedropmodemeansthatifthemessagehasoption82,thenthe
systemwilldropitwithoutprocessing;keepmodemeansthatthesystemwillkeeptheoriginal
option82segmentinthemessage,andforwardittotheservertoprocess;replacemodemeansthat
thesystemwillreplacetheoption82segmentintheexistingmessagewithitsownoption82,and
forwardthemessagetotheservertoprocess.
4.9.3.8 Option82Circuit‐IDSettings
Setcreationmethodforoption82,userscandefinetheparametersofcircuteidsuboptionby
themselves.

122
4.9.4 DynamicARPInspection
4.9.4.1 DynamicARPInspectionSetting
DynamicARPInspection(DAI)isasecurefeature.Severaltypesofattackscanbelaunchedagainsta
hostordevicesconnectedtoLayer2networksby"poisoning"theARPcaches.Thisfeatureisusedto
blocksuchattacks.OnlyvalidARPrequestsandresponsescangothroughDUT.ThispageprovidesARP
Inspectionrelatedconfiguration.
OnthisconfigurationscreenyouactivateanddeactivateDAI.
4.9.4.2 VLANSettings
EnableordisableDAIfordifferentVLANIDs.

123
4.9.5 PortSettings
DAI-related port settings.
4.9.6 DynamicARPInspectionStatistics
ProvidesstatisticalinformationabouttheDAIfunction.

124
4.9.6.1 RateLimit
YoucanspecifyoptionalratelimitsforeachoftheportsandLAGshere.
4.9.7 IPSourceGuard
IPSourceGuardisasecurefeatureusedtorestrictIPtrafficonDHCPsnoopinguntrustedportsby
filteringtrafficbasedontheDHCPSnoopingTableormanuallyconfiguredIPSourceBindings.Ithelps
preventIPspoofingattackswhenahosttriestospoofandusetheIPaddressofanotherhost.After
receivingapacket,theportlooksupthekeyattributes(includingIPaddress,MACaddressandVLAN
tag)ofthepacketinthebindingentriesoftheIPsourceguard.Ifthereisamatchingentry,theport
willforwardthepacket.Otherwise,theportwillabandonthepacket.
IPsourceguardfilterspacketsbasedonthefollowingtypesofbindingentries:
IPportbindingentry
MACportbindingentry
IPMACportbindingentry
125
4.9.7.1 PortSettings
IPSourceGuardisasecurefeatureusedtorestrictIPtrafficonDHCPsnoopinguntrustedportsby
filteringtrafficbasedontheDHCPSnoopingTableormanuallyconfiguredIPSourceBindings.Ithelps
preventIPspoofingattackswhenahosttriestospoofandusetheIPaddressofanotherhost.
4.9.7.2 IPSourceGuardBindingTable
126
4.9.7.3 PortSecurity
ThispageallowsyoutoconfigurethePortSecurityLimitControlsystemandportsettings.Limit
Controlallowsforlimitingthenumberofusersonagivenport.AuserisidentifiedbyaMACaddress
andVLANID.IfLimitControlisenabledonaport,thelimitspecifiesthemaximumnumberofuserson
theport.Ifthisnumberisexceeded,anactionistaken.Theactioncanbeoneoffourdifferentas
describedbelow.
TheLimitControlmoduleisoneofarangeofmodulesthatutilizesalowerlayermodule,thePort
Securitymodule,whichmanagesMACaddresseslearnedontheport.TheLimitControlconfiguration
consistsoftwosections,asystem‐andaportwide.
127
4.9.8 DOS
TheDoSisshortforDenialofService,whichisasimplebuteffectivedestructiveattackontheinternet.
TheserverunderDoSattackwilldropnormaluserdatapacketduetononstopprocessingthe
attackersdatapacket,leadingtothedenialoftheserviceandworsecanleadtoleakofsensitivedata
oftheserver.Securityfeaturereferstoapplicationssuchasprotocolcheckwhichisforprotectingthe
serverfromattackssuchasDoS.Theprotocolcheckallowstheusertodropmatchedpacketsbasedon
specifiedconditions.ThesecurityfeaturesprovideseveralsimpleandeffectiveprotectionsagainstDos
attackswhileactingnoinfluenceonthelinearforwardingperformanceoftheswitch.
4.9.8.1 GlobalDoSSetting

128
4.9.8.2 DoSPortSetting

129
4.9.9 Authentication,authorization,andaccounting(AAA)
Authentication,authorization,andaccounting(AAA)providesaframeworkforconfiguringaccess
controlontheManagedSwitch.Thethreesecurityfunctionscanbesummarizedasfollows:
AuthenticationIdentifiesusersthatrequestaccesstothenetwork.
AuthorizationDeterminesifuserscanaccessspecificservices.
AccountingProvidesreports,auditing,andbillingforservicesthatusershaveaccessedon
thenetwork.
TheAAAfunctionsrequiretheuseofconfiguredRADIUSorTACACS+serversinthenetwork.The
securityserverscanbedefinedassequentialgroupsthatarethenappliedasamethodforcontrolling
useraccesstospecifiedservices.Forexample,whentheswitchattemptstoauthenticateauser,a
requestissenttothefirstserverinthedefinedgroup,ifthereisnoresponsethesecondserverwillbe
tried,andsoon.Ifatanypointapassorfailisreturned,theprocessstops.
TheManagedSwitchsupportsthefollowingAAAfeatures:
AccountingforIEEE802.1XauthenticatedusersthataccessthenetworkthroughtheManaged
Switch.
AccountingforusersthataccessmanagementinterfacesontheManagedSwitchthroughthe
consoleandTelnet.
AccountingforcommandsthatusersenteratspecificCLIprivilegelevels.Authorizationof
usersthataccessmanagementinterfacesontheManagedSwitchthroughtheconsoleand
Tel net.
ToconfigureAAAontheManagedSwitch,youneedtofollowthisgeneralprocess:
ConfigureRADIUSandTACACS+serveraccessparameters.See“ConfiguringLocal/Remote
LogonAuthentication”.
DefineRADIUSandTACACS+servergroupstosupporttheaccountingandauthorizationof
services.
Defineamethodnameforeachservicetowhichyouwanttoapplyaccountingor
authorizationandspecifytheRADIUSorTACACS+servergroupstouse.Applythemethod
namestoportorlineinterfaces.
Note:ThisguideassumesthatRADIUSandTACACS+servershavealreadybeenconfiguredtosupport
AAA.TheconfigurationofRADIUSandTACACS+serversoftwareisbeyondthescopeofthisguide,
refertothedocumentationprovidedwiththeRADIUSorTACACS+serversoftware.
4.9.9.1.1 LoginList

130
4.9.9.2 EnableList
4.9.9.3 AccountingList
Thispageallowstheusertoadd,editordeleteaccountinglistsettings.The“defaultlistcannotbe
deleted.
ParameterDescription
ListNameTheaccountlistnamemustbedifferentfromotherlistnames,i.e.,itmust
notbecalleddefault.
RecordType none:Noaccounting.
startstop:Recordstartandstopwithoutwaiting.
stoponly:Recordstopwhenserviceterminates.
Method1Selectfirstpriority:
Tacacs+:UseremoteTACACS+servertoaccounting.
131
Radius:UseremoteRadiusservertoaccounting.
Method2Selectsecondpriority:
Tacacs+:UseremoteTACACS+servertoaccounting.
Radius:UseremoteRadiusservertoaccounting.
4.9.9.4 AccountingUpdate

132
4.9.10 TACACS+server
TACACS(TerminalAccessControllerAccessControlSystem)isanolderauthenticationprotocol
commontoUNIXnetworksthatallowsaremoteaccessservertoforwardauser'slogonpasswordto
anauthenticationservertodeterminewhetheraccesscanbeallowedtoagivensystem.
133
4.9.11 Radiusserver
RemoteAuthenticationDialInUserService(RADIUS)isanetworkingprotocolthatprovides
centralizedAuthentication,Authorization,andAccounting(AAA)managementforuserswhoconnect
anduseanetworkservice.
134

135
4.9.12 Access
TheIntellinetswitchallowsaccessviaHTTP(S),Telnetandconsoleport.Inthissectionyoudefinethe
authenticationandaccountingrelatedsettings.
4.9.12.1 ConsoleSettings
ParameterDescription
Login/Enable/ExecListSelecttheappropriatelistvalueforeachoftheseentries.
SessionTimeoutSpecifythelengthofinactivityinminutesafterwhichthesessionis
automaticallyterminated.
PasswordRetryCountEnterthenumberoffailedloginattemptsbeforethesilenttimeis
invoked.
SilentTimeUsethiscommandtosettheamountoftimethemanagementconsole
isinaccessibleafterthenumberofunsuccessfullogonattemptsexceeds
thethresholdsetbythepasswordretrycount.
4.9.12.2 TelnetSettings
Verymuchthesameastheconsolesettings,howeveryoucandisableorenabletheservice.Allother
parametersareidentical.
136
4.9.12.3 HTTPSettings
InadditiontoTelnet andconsolebasedaccess,themostcommonmethodofconnectingtothe
Intellinet8PortGigabitPoE+SwitchisviaHTTP(webbrowser).
ParameterDescription
HTTPServiceEnableordisableaccessviaHTTP..
LoginAuthenticationListSpecifytheappropriatevaluefromthedropdownlist.
SessionTimeoutSpecifythelengthofinactivityinminutesafterwhichthesessionis
automaticallyterminated.
4.9.12.4 HTTPSSettings
AsavariationofHTTP,thisaccessmethodismoresecurebyencryption.
TheparametersareidenticaltothoseofHTTP.

137
4.10 AccessControlList
4.10.1 WhatisACL?
ACLisanacronymforAccessControlList.ItisthelisttableofACEs,containingaccesscontrolentries
thatspecifyindividualusersorgroupspermittedordeniedtospecifictrafficobjects,suchasaprocess
oraprogram.EachaccessibletrafficobjectcontainsanidentifiertoitsACL.Theprivilegesdetermine
whethertherearespecifictrafficobjectaccessrights.
ACLimplementationscanbequitecomplex,forexample,whentheACEsareprioritizedforthevarious
situation.Innetworking,theACLreferstoalistofserviceportsornetworkservicesthatareavailable
onahostorserver,eachwithalistofhostsorserverspermittedordeniedtousetheservice.ACLcan
generallybeconfiguredtocontrolinboundtraffic,andinthiscontext,theyaresimilartofirewalls.
ACEisanacronymforAccessControlEntry.Itdescribesaccesspermissionassociatedwithaparticular
ACEID.TherearethreeACEframetypes(EthernetType,ARP,andIPv4)andtwoACEactions(permit
anddeny).TheACEalsocontainsmanydetailed,differentparameteroptionsthatareavailablefor
individualapplication.
4.10.2 MAC‐BasedACL
CreateaMACaddressbasedAccessControlListonthisscreen.TypeinthenamefortheACLandclick
“Add.”
4.10.3 MAC‐BasedACE
Onthispageyoucandefinetheaccesscontrolentries.
138
139
4.10.4 IPv4‐BasedACL
CreateaIPv4addressbasedAccessControlListonthisscreen.TypeinthenamefortheACLandclick
“Add.”
4.10.5 IPv4‐BasedACE
OnthispageyoucandefinetheaccesscontrolentriesforIPv4.
140

141
142
143
4.10.6 IPv6‐BasedACL
CreateanIPv6addressbasedACL.
4.10.7 IPv6‐BasedACE
VerysimilartoIPv4BasedACE(seeabove)withmuchofthesameparameters.

144
4.10.8 ACLBinding
Usethisconfigurationpageinordertolink(orbind)thephysicalportsorLAGstoanACL.
4.11 MACAddressTable
4.11.1 WhatisaMACAddressTable?
Amediaaccesscontroladdress(MACaddress)isauniqueidentifierassignedtonetworkinterfacesfor
communicationsonthephysicalnetworksegment.MACaddressesareusedasanetworkaddressfor
mostIEEE802networktechnologies,includingEthernetandWiFi.Layer2Ethernetswitches,suchas
theIntellinet8PortPoE+GigabitswitchusetheseMACaddressestoroutethepacketsfromsourceto
destination.Theswitchbuildsupatableovertime,inwhichitstorespairingsofMACaddressesand
physicalports.WheneverapackethastobedeliveredandthedestinationMACaddressisn’tinthe
MACaddresstable,theswitchisforcedtosendoutthedatapackettoallports,justlikeanold
Ethernethubwoulddo,andthatfloodsthenetworkwithunnecessarytraffic.However,oncethe
switchhaslearnttheportatwhichthedestinationclientisconnectedto,itwilladdthisinformationto
itsMACaddresstable,andfuturedeliveriesforthatMACaddresswillproceedmuchmoreefficiently.
MACaddressescanbestoredpermanently(static)ortemporarily(dynamic).

145
4.11.2 StaticMACSettings
YoucanaddastaticMACaddress;itremainsintheswitch'saddresstable,regardlessofwhetherthe
deviceisphysicallyconnectedtotheswitch.Thissavestheswitchfromhavingtorelearnadevice's
MACaddresswhenthedisconnectedorpoweredoffdeviceisactiveonthenetworkagain.Youcan
add/modify/deleteastaticMACaddress.Additionally,bindingaMACaddresstoaspecificportcan
helpprotectagainstspoofingattacks.
ParameterDescription
MACAddressPhysical address of a network client.
PortSpecifytheportatwhichthenetworkclientisconnectedto.
VLANIftheclientispartofaVLAN,defineithereaccordingly.
4.11.3 MACFiltering
Theswitchcanfilterout(reject)trafficfrompreconfiguredMACaddresstoincreasesecurity.
4.11.4 DynamicAddressSetting
OnthisscreenyoudefinehowlongMACaddressportpairingsarekeptintheMACaddresstable.
Thisiscalledagingtime.Thedefaultvalueis300seconds,butmayincreasethisvalueupto630
seconds.
146
4.11.5 DynamicallyLearned
ThisscreenshowsallMACaddressesthatarecurrentlystoredintheMACaddresstable.
Intheuppersectionoftheinterfaceyoucanfindtoolsthathelpyounarrowdownthetraffic.Youcan
filterbyport,VLANorpartofaMACaddress.
ThetablebelowshowsACaddressescurrentlyintheMACaddresstable.Bydefaultthescreenshows
allMACaddresses,butifyouhavespecifiedsomefiltersintheuppersection,theresultswillbe
narroweddownaccordingly.
ToaddaMACaddresstotheMACaddresstablepermanently,simplyclickthe“AddtoStaticMAC
Tablebutton.

147
4.12 LinkLayerDiscoveryProtocol(LLDP)
4.12.1 WhatisLLDP
LinkLayerDiscoveryProtocol(LLDP)isusedtodiscoverbasicinformationaboutneighboringdevices
onthelocalbroadcastdomain.LLDPisaLayer2protocolthatusesperiodicbroadcaststoadvertise
informationaboutthesendingdevice.AdvertisedinformationisrepresentedinTypeLengthValue
(TLV)formataccordingtotheIEEE802.1abstandard,andcanincludedetailssuchasdevice
identification,capabilitiesandconfigurationsettings.LLDPalsodefineshowtostoreandmaintain
informationgatheredabouttheneighboringnetworknodesitdiscovers.
LinkLayerDiscoveryProtocol‐MediaEndpointDiscovery(LLDPMED)isanextensionofLLDPintended
formanagingendpointdevicessuchasVoiceoverIPphonesandnetworkswitches.TheLLDPMED
TLVsadvertiseinformationsuchasnetworkpolicy,power,inventory,anddevicelocationdetails.LLDP
andLLDPMEDinformationcanbeusedbySNMPapplicationstosimplifytroubleshooting,enhance
networkmanagement,andmaintainanaccuratenetworktopology.
4.12.2 LLDPGlobalSetting
This Page allows the user to inspect and configure the current LLDP port settings.
148
4.12.3 LLDPPortSettings
UsetheLLDPPortSettingtospecifythemessageattributesforindividualinterfaces,includingwhether
messagesaretransmitted,received,orbothtransmittedandreceived.
149
150
4.12.4 LLDPLocalDevice
UsetheLLDPLocalDeviceInformationscreentodisplayinformationabouttheswitch,suchasitsMAC
address,chassisID,managementIPaddress,andportinformation.
ThescreenalsodisplayLLDPstatusinformationofeachport.Clickingthe“Detail”buttonopensupa
pagethatpresentstheinformationinmuchgreaterdetail.

151
4.12.5 LLDPRemoveDevice
ThispageprovidesastatusoverviewforallLLDPremotedevices.Thedisplayedtablecontainsarow
foreachportonwhichanLLDPneighborisdetected.
4.12.6 LLDPMEDNetworkPolicySettings
NetworkPolicyDiscoveryenablestheefficientdiscoveryanddiagnosisofmismatchissueswiththe
VLANconfiguration,alongwiththeassociatedLayer2andLayer3attributes,whichapplyforasetof
specificprotocolapplicationsonthatport.Impropernetworkpolicyconfigurationsareavery
significantissueinVoIPenvironmentsthatfrequentlyresultinvoicequalitydegradationorlossof
service.Policiesareonlyintendedforusewithapplicationsthathavespecific'realtime’network
policyrequirements,suchasinteractivevoiceand/orvideoservices.Thenetworkpolicyattributes
advertisedare:
1. Layer2VLANID(IEEE802.1Q2003)
2. Layer2priorityvalue(IEEE802.1D2004)
3. Layer3Diffservcodepoint(DSCP)value(IETFRFC2474)
Thisnetworkpolicyispotentiallyadvertisedandassociatedwithmultiplesetsofapplicationtypes
supportedonagivenport.
Theapplicationtypesspecificallyaddressedare:
1. Voice
2. GuestVoice
3. SoftphoneVoice
4. VideoConferencing
5. StreamingVideo
6. Control/Signaling(conditionallysupportaseparatenetworkpolicyforthemediatypesabove)
AlargenetworkmaysupportmultipleVoIPpoliciesacrosstheentireorganization,anddifferent
policiesperapplicationtype.LLDPMEDallowsmultiplepoliciestobeadvertisedperport,each
correspondingtoadifferentapplicationtype.DifferentportsonthesameNetworkConnectivity
Devicemayadvertisedifferentsetsofpolicies,basedontheauthenticateduseridentityorport
configuration.
ItshouldbenotedthatLLDPMEDisnotintendedtorunonlinksotherthanbetweenNetwork
ConnectivityDevicesandEndpoints,andthereforedoesnotneedtoadvertisethemultitudeof
networkpoliciesthatfrequentlyrunonanaggregatedlinkinteriortotheLAN.
152
153
154
4.12.7 MEDPortSettings
155
4.12.8 LLDPOverloading
LinkLayerDiscoveryProtocol(LLDP)isusedtoadvertiseinformationaboutadevicetoother
connecteddevices.OptionalinformationcanbesentthroughanLLDPpacketintheformofaType
LengthValue(TLV).Themoreinformationyouwanttoinclude,themoreTLVsyouadd.LLDP
informationissentinaprotocoldataunit(PDU).Eachinterfacethatinformationissentacrosshasa
maximumsizeofPDUthatitcanhandle.IftoomuchinformationisincludedinanLLDPpacket,itcan
exceedthemaximumPDUsize.ThisisknownasanLLDPoverload.

156
4.12.9 LLDPStatistics
UsetheLLDPDeviceStatisticsscreentogeneralstatisticsforLLDPcapabledevicesattachedtothe
switch,andforLLDPprotocolmessagestransmittedorreceivedonalllocalinterfaces.
157
4.13 Diagnostics
This section provide the Physical layer and IP layer network diagnostics tools for
troubleshooting purposes. The diagnostic tools are designed for network
administrators to help them quickly diagnose problems.
4.13.1 CableDiagnostics
TheCableDiagnosticsperformstestsoncoppercables.Thesefunctionshavetheabilitytoidentifythe
cablelengthandoperatingconditions,andtoisolateavarietyofcommonfaultsthatcanoccuronthe
Cat5twistedpaircabling.Theremightbetwostatusesasfollow:
Ifthelinkisestablishedonthetwistedpairinterfacein1000BaseTmode,theCable
Diagnosticscanrunwithoutdisruptionofthelinkorofanydatatransfer.
Ifthelinkisestablishedin100BaseTXor10BaseT,theCableDiagnosticscausethelinkto
dropwhilethediagnosticsarerunning.
Afterthediagnosticsarefinished,thelinkisreestablished.Andthefollowingfunctionsareavailable.
Couplingbetweencablepairs.
Cablepairtermination
CableLength
Note:
CableDiagnosticsisonlyaccurateforcablesoflengthfrom15to100meters.
Cablepairsarereferredtoaschannels,wherechannelArepresentspins3&4,channelBpins1&2,
channel7pins5&6andchannelDrepresentspins7&8.
Thepictureaboveshowsthetestresultsofport7,whichisconnectedtoaPCwitha3ftnetwork
cable.Duetotheshortcable,thelengthtestisn’tworking.

158
4.13.2 SystemStatus
Thispageprovidesinformationabouttheswitchitselfandsomeofitsvitalresources.
4.13.3 IPv4PingTest
Inordertotroubleshootconnectivityissues,theIntellinetswitchcanaideyouwithanintegratedping
tool.ThiscanbeveryusefulifyouareremotelyconnectingtotheIntellinetswitchandneedto
performaPINGinthelocalnetwork.
ProvidetheIPaddress,count(howmanypingstosend),thetimeintervalbetweeneachping,andthe
sizeofthepayload,clickApply(notshown)andwaitforthepingresultstobedisplayedonthescreen.
4.13.4 IPv6PingTest
VerymuchthesameastheIPv4test,exceptthisoneisdesignedfor,youguessedit,IPv6addresses.

159
4.13.5 TraceRoute
Tracerouteisacomputernetworkdiagnostictoolfordisplayingtheroute(path)andmeasuringtransit
delaysofpacketsacrossanInternetProtocol(IP)network.Thehistoryoftherouteisrecordedasthe
roundtriptimesofthepacketsreceivedfromeachsuccessivehost(remotenode)intheroute(path);
thesumofthemeantimesineachhopindicatesthetotaltimespenttoestablishtheconnection.
Tracerouteproceedsunlessall(three)sentpacketsarelostmorethantwice,thentheconnectionis
lostandtheroutecannotbeevaluated.Ping,ontheotherhand,onlycomputesthefinalroundtrip
timesfromthedestinationpoint.
Above:ExampleTrace
TypeintheIPaddressofthedestinationyouwithtotrace,andprovidethemaximumnumberofhops.
Note:YoucanonlytypeinanIPaddress.Hostnamesarenotallowed,despitetheinterfacescreen
claimingotherwise.

160
4.14 RMON
4.14.1 WhatisRMON?
RemoteMonitoring(RMON)isastandardmonitoringspecificationthatenablesvariousnetwork
monitorsandconsolesystemstoexchangenetworkmonitoringdata.RMONisthemostimportant
expansionofthestandardSNMP.RMONisasetofMIBdefinitions,usedtodefinestandardnetwork
monitorfunctionsandinterfaces,enablingthecommunicationbetweenSNMPmanagementterminals
andremotemonitors.RMONprovidesahighlyefficientmethodtomonitoractionsinsidethesubnets.
MIDofRMONconsistsof10groups.Theswitchsupportsthemostfrequentlyusedgroup1,2,3and9:
Statistics:MaintainbasicusageanderrorstatisticsforeachsubnetmonitoredbytheAgent.
History:RecordperiodicalstatisticsamplesavailablefromStatistics.
Alarm:Allowmanagementconsoleuserstosetanycountorintegerforsampleintervalsand
alertthresholdsforRMONAgentrecords.
Event:AlistofalleventsgeneratedbyRMONAgent.
AlarmdependsontheimplementationofEvent.StatisticsandHistorydisplaysomecurrentorhistory
subnetstatistics.AlarmandEventprovideamethodtomonitoranyintegerdatachangeinthe
network,andprovidesomealertsuponabnormalevents(sendingTraporrecordinlogs).
4.14.2 RMONStatistics
ThispageprovidesRMONstatisticsfortheselectedport.Usethedropdownlisttoselecttheportyou
wishtoseethestatisticsfor,andafewsecondslatertheinformationwillappearonthescreen.Click
“Clearinordertoresetthestatisticsfortheselectedport.
4.14.3 RMONEventandEventLog
YoucandefineaRMONeventonthispage.
161
TheRMONEventLogscreenallowsyoumonitorRMONevents.

162
4.14.4 RMONAlarm
AnRMONalarmmonitorsaspecificmanagementinformationbase(MIB)objectforaspecified
interval,triggersanalarmataspecifiedthresholdvalue(threshold),andresetsthealarmatanother
thresholdvalue.YoucanusealarmswithRMONeventstogeneratealogentryoranSNMPnotification
whentheRMONalarmtriggers.
163
164
165
4.14.5 RMONHistoryandHistoryLog
RMONHistory(alsoknownasRMONgroup2)collectsahistorygroupofstatisticsonEthernet,Fast
Ethernet,andGigabitEthernetinterfacesforaspecifiedpollinginterval.

166
4.15 Maintenance
4.15.1 FactoryDefault
TherearetwowaystoresettheIntellinetswitchbacktoitsfactorydefaultsettings.
4.15.1.1 ViaResetButton
Presstheresetbuttonforatleast10secondswhiletheswitchisoperationinordertotriggerthe
factorydefaultreset.
4.15.1.2 ViaWebAdministratorMenu
ClickonRestoreandconfirmyourdecision.

167
4.15.2 RebootSwitch
IfyouneedtoreboottheIntellinetswitchfromaremotelocation,thisisthewaytodoit.Whenthe
rebootistriggered,theswitchwon’tbeaccessibleandoperationalforabout60seconds.

4.15.3 BackupManager
ThisfunctionallowsbackupofthecurrentimageorconfigurationoftheIntellinet8PortGigabitPoE+
switchtothelocalmanagementstation,i.e.,adesktopcomputer.
4.15.3.1 ViaTFTP
IsyouchooseTFTP,thenaTFTPserverhastobeavailablefortheswitchtoconnectto.Youneedto
providetheIPaddressofavalidTFTPserver,andyouwillhavetospecifywhattypeofbackupyou
wishtomake.
4.15.3.2 ViaHTTP
SelectHTTPforaneasierandquickerwaytostoretheconfigurationandlogdata.
ClickthebuttontosavethefileonyourlocalHDD.
168
4.15.4 UpgradeManager
Ifanewfirmwareneedstobeinstalled,youcanusethisscreentodoit.Youcaninstallanewfirmware
imageusingTFTP,orHTTP.Youcanalsousethisfeaturetoreloadapreviouslysavedconfiguration.
4.15.4.1 ViaTFTP
ToinstalltheupgradeviaTFTP,aTFTPservermustbeconfiguredtoacceptconnectionsfromthe
Intellinetswitch.ProvidetheIPaddressoftheTFTPserveralongwiththecorrectfilenamethatyou
wishtoinstall.
Presstobegin.
4.15.4.2 ViaHTTP
Inordertoinstalltheupgrade,selecttheappropriateupgradetype,thenclickon,selectthe
filefromyourlocalHDD.Thenpresstobegin.

169
4.15.5 ConfigurationManager
TheIntellinet8PortPoE+GigabitSwitchhastwoconfigurations.Thestartupandthebackup
configuration.WiththebackupmanageryoucansavetheseconfigurationstoaTFTPserver,ortothe
HDDofacomputer.
Withtheconfigurationmanageryoucancreatethestartupandbackupconfiguration,bycopyingthe
currentconfigurationoftheswitch(runningconfiguration)toeitherthestartuporbackup
configuration.
Oncethecurrentconfigurationhasbeensavedthisway,itcanbebackedupwiththebackupmanager.
4.15.6 EnablePassword
Thispageallowsyoutomodifytheenablepassword.Inthecommandlineinterface,youcanuse
“enabletochangetheprivilegelevelto“Admin.”Aftertheenable”commandisissued,youneedto
entertheenablepasswordtochangetheprivilegelevel.

170
5 Warranty
DeutschGarantieinformationenfindenSiehierunterintellinetnetwork.com/warranty.
EnglishForwarrantyinformation,gotointellinetnetwork.com/warranty.
EspañolSideseaobtenerinformaciónsobrelagarantía,visiteintellinetnetwork.com/warranty.
FrançaisPourconsulterlesinformationssurlagarantie,rendezvousàl’adresse
intellinetnetwork.com/warranty.
ItalianoPerinformazionisullagaranzia,accedereaintellinetnetwork.com/warranty.
PolskiInformacjedotyczącegwarancjiznajdująsięnastronieintellinetnetwork.com/warranty.
MéxicoPólizadeGarantíaIntellinetDatosdelimportadoryresponsableanteelconsumidorIC
Intracomxico,S.A.P.I.deC.V.Av.InterceptorPoniente#73,Col.ParqueIndustrialLaJoya,
CuautitlanIzcalli,EstadodeMéxico,C.P.54730,México.Tel.(55)15004500
Lapresentegarantíacubrelossiguientesproductoscontracualquierdefectodefabricaciónensus
materialesymanodeobra.
A.GarantizamoscámarasIPyproductosconpartesmóvilespor3años.
B.Garantizamoslosdemásproductospor5años(productossinpartesmóviles),bajolassiguientes
condiciones:
1.Todo s losproductosaqueserefiereestagarantía,amparasucambiofísico,sinningúncargoparael
consumidor.
2.Elcomercializadornotienetalleresdeservicio,debidoaquelosproductosquesegarantizanno
cuentanconreparaciones,nirefacciones,yaquesugarantíaesdecambiofísico.
3.Lagarantíacubreexclusivamenteaquellaspartes,equipososubensamblesquehayansido
instaladasdefábricaynoincluyeenningúncasoelequipoadicionalocualesquieraquehayansido
adicionadosalmismoporelusuarioodistribuidor.
Parahacerefectivaestagarantíabastaráconpresentarelproductoaldistribuidoreneldomicilio
dondeueadquiridooeneldomiciliodeICIntracomxico,S.A.P.I.deC.V.,juntoconlosaccesorios
contenidosnsuempaque,acompañadodesulizadebidamentellenadayselladaporlacasa
vendedoraindispensableelselloyfechadecompra)dondeloadquirió,obien,lafacturaoticketde
compraoriginaldondesemencioneclaramenteelmodelo,numerodeserie(cuandoaplique)yfecha
deadquisición.Estagarantíanoeslidaenlossiguientescasos:Sielproductosehubiesetilizadoen
condicionesdistintasalasnormales;sielproductonohasidooperadoconformealosinstructivosde
uso;osielproductohasidoalteradootratadodeserreparadoporelconsumidoroterceraspersonas.

171
6 Copyright
Copyright©2015ICIntracom.Allrightsreserved.Nopartofthispublicationmaybereproduced,
transmitted,transcribed,storedinaretrievalsystem,ortranslatedintoanylanguageorcomputer
language,inanyformorbyanymeans,electronic,mechanical,magnetic,optical,chemical,manualor
otherwise,withoutthepriorwrittenpermissionofthiscompany
Thiscompanymakesnorepresentationsorwarranties,eitherexpressedorimplied,withrespecttothe
contentshereofandspecificallydisclaimsanywarranties,merchantabilityorfitnessforanyparticular
purpose.Anysoftwaredescribedinthismanualissoldorlicensed"asis".Shouldtheprogramsprove
defectivefollowingtheirpurchase,thebuyer(andnotthiscompany,itsdistributor,oritsdealer)
assumestheentirecostofallnecessaryservicing,repair,andanyincidentalorconsequentialdamages
resultingfromanydefectinthesoftware.Further,thiscompanyreservestherighttorevisethis
publicationandtomakechangesfromtimetotimeinthecontentsthereofwithoutobligationtonotify
anypersonofsuchrevisionorchanges.

172
7 FederalCommunicationCommissionInterferenceStatement
ThisequipmenthasbeentestedandfoundtocomplywiththelimitsforaClassBdigitaldevice,
pursuanttoPart15ofFCCRules.Theselimitsaredesignedtoprovidereasonableprotectionagainst
harmfulinterferenceinaresidentialinstallation.Thisequipmentgenerates,uses,andcanradiateradio
frequencyenergyand,ifnotinstalledandusedinaccordancewiththeinstructions,maycauseharmful
interferencetoradiocommunications.However,thereisnoguaranteethatinterferencewillnotoccur
inaparticularinstallation.Ifthisequipmentdoescauseharmfulinterferencetoradioortelevision
reception,whichcanbedeterminedbyturningtheequipmentoffandon,theuserisencouragedto
trytocorrecttheinterferencebyoneormoreofthefollowingmeasures:
1.Reorientorrelocatethereceivingantenna.
2.Increasetheseparationbetweentheequipmentandreceiver.
3.Connecttheequipmentintoanoutletonacircuitdifferentfromthattowhichthereceiveris
connected.
4.Consultthedealeroranexperiencedradiotechnicianforhelp.
FCCCaution
Thisdeviceanditsantennamustnotbecolocatedoroperatinginconjunctionwithanyotherantenna
ortransmitter.ThisdevicecomplieswithPart15oftheFCCRules.Operationissubjecttothefollowing
twoconditions:(1)thisdevicemaynotcauseharmfulinterference,and(2)thisdevicemustacceptany
interferencereceived,includinginterferencethatmaycauseundesiredoperation.Anychangesor
modificationsnotexpresslyapprovedbythepartyresponsibleforcompliancecouldvoidtheauthority
tooperateequipment.
FCCRadiationExposureStatement:
ThisequipmentcomplieswithFCCradiationexposurelimitssetforthforanuncontrolledenvironment.
Thisequipmentshouldbeinstalledandoperatedwithminimumdistance20cmbetweentheradiator
&yourbody.
Safety
Thisequipmentisdesignedwiththeutmostcareforthesafetyofthosewhoinstallanduseit.
However,specialattentionmustbepaidtothedangersofelectricshockandstaticelectricitywhen
workingwithelectricalequipment.Allguidelinesofthisandofthecomputermanufacturemust
thereforebeallowedatalltimestoensurethesafeuseoftheequipment.
EUCountriesIntendedforUse
TheETSIversionofthisdeviceisintendedforhomeandofficeuseinAustria,Belgium,Bulgaria,
Cyprus,Czech,Denmark,Estonia,Finland,France,Germany,Greece,Hungary,Ireland,Italy,Latvia,
Lithuania,Luxembourg,Malta,Netherlands,Poland,Portugal,Romania,Slovakia,Slovenia,Spain,
Sweden,Turkey,andUnitedKingdom.TheETSIversionofthisdeviceisalsoauthorizedforuseinEFTA
memberstates:Iceland,Liechtenstein,Norway,andSwitzerland.
EUCountriesNotIntendedforUse
None

173
intellinetnetworkcom
©ICIntracom.Allrightsreserved.
IntellinetisatrademarkofICIntracom,registeredintheU.S.andothercountries.