Trendnet User'S Guide Cover Page
Trendnet User'S Guide Cover Page
Hardware Design
Fanless rack mountable 1U metal housing features 24 gigabit ports and 4 shared gigabit
ports (RJ-45/SFP).
IPv6 Ready
This switch supports IPv6 configuration and IPv6 neighbor discovery.
TEG-284WS
Traffic Management
A broad range of network configurations are supported by: 802.3ad link aggregation,
Asymmetric VLAN, 802.1Q VLAN, Voice VLAN, RSTP, MSTP, Loopback Detection, GVRP,
Package Contents
802.1p Class of Service (CoS), port bandwidth management, and QoS queue scheduling
In addition to your switch, the package includes:
Quick Installation Guide
CD-ROM (Utility & User’s Guide) Troubleshooting
Power cord (1.8 m / 6 ft.) Traffic statistics and a convenient cable diagnostic test aid in network troubleshooting
Rack mount kit
If any package contents are missing or damaged, please contact the retail store, online Access Control
retailer, or reseller/distributor from which the product was purchased. Features such as ACL, SSL, MAC/port filtering, 802.1X, TACACS+, and RADIUS are
compatible with layered access controls
Monitoring
RMON, SNMP, SNMP Trap, and Port Mirroring support administrator monitoring
solutions
Front View
Rear View
Diagnostic LEDs
Power LED
On : When the Power LED is on, the device is receiving power.
Off : When the Power turns off, the power cord is not
connected or the device is not receiving power.
The switch can be mounted in an EIA standard-size, 19-inch rack, which can be placed in
Desktop Hardware Installation a wiring closet with other equipment. Attach the mounting brackets at the switch’s
front panel (one on each side), and secure them with the provided screws.
The site where you install the hub stack may greatly affect its performance. When Note: The switch model may be different than the one shown in the example
installing, consider the following pointers: illustrations.
Note: The switch model may be different than the one shown in the example
illustrations.
Install the Switch in a fairly cool and dry place.
Install the Switch in a site free from strong electromagnetic field generators (such
as motors), vibration, dust, and direct exposure to sunlight.
Leave at least 10cm of space at the front and rear of the hub for ventilation.
Install the Switch on a sturdy, level surface that can support its weight, or in an
EIA standard-size equipment rack. For information on rack installation, see the
next section, Rack Mounting.
When installing the Switch on a level surface, attach the rubber feet to the
bottom of each device. The rubber feet cushion the hub and protect the hub
case from scratching. Then, use screws provided with the equipment rack to mount each switch in the rack.
7. Configure the switch IP address settings to be within your network subnet, then click
Apply.
Note: You may need to modify the static IP address settings of your computer’s network
adapter to IP address settings within your subnet in order to regain access to the switch.
4. Open your web browser, and type the IP address of the switch in the address bar, and
then press Enter. The default IP address is 192.168.10.200.
5. Enter the User Name and Password, and then click Login. By default:
User Name: admin
Password: admin
Note: User name and password are case sensitive. 5. In the left hand panel, click Tools, click on Configuration, and click Save.
1. Log into your switch management page (see “Access your switch management page”
1. Open your web browser and go to the IP address http://192.168.10.200. Your switch on page 7).
will prompt you for a user name and password.
System Information
System Up For – The duration your switch has been running continuously without
2. Enter the user name and password. By default:
a restart/power cycle (hard or soft reboot) or reset.
User Name: admin Runtime Image: The current software or firmware version your switch is running.
Password: admin Boot Loader – The current boot loader version your switch is running.
Note: User Name and Password are case sensitive.
Hardware Information
DRAM Size: Displays your switch RAM memory size.
Flash Size: Displays your switch Flash memory size.
System
Set your system information
System > System Management
This section explains how to assign a name, location, and contact information for the
switch. This information helps in identifying each specific switch among other switches
in the same local area network. Entering this information is optional.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
4. Click Apply.
2. Click on System, and click on System Management.
3. Review the settings. When you have completed making changes, click Apply to save
the settings.
5. In the left hand panel, click Tools, click on Configuration, and click Save.
System Description - Specifies the Switch model. You cannot change this
parameter.
System Object ID - Indicates the unique SNMP MIB object identifier that
identifies the switch model. You cannot change this parameter. 6. Click Save Settings to Flash, then click OK.
System Name - Specifies a name for the switch, the name is optional and may Note: This step saves all configuration changes to the NV-RAM to ensure that if the
contain up to 15 characters. switch is rebooted or power cycled, the configuration changes will still be applied.
System Location - Specifies the location of the switch. The location is optional
and may contain up to 30 characters.
System Contact - Specifies the name of the network administrator responsible
for managing the switch. This contact name is optional and may contain up to
30 characters.
1. Log into your switch management page (see “Access your switch management page” 6. Click Save Settings to Flash, then click OK.
on page 7). Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
2. Click on System, and click on IPv4 Setup.
3. Review the settings. When you have completed making changes, click Apply to save
the settings.
System MAC Address: Displays the switch MAC address information.
System IP Address: Enter the new switch IP address. (e.g. 192.168.200.200)
System Subnet Mask: Enter the new switch subnet mask. (e.g. 255.255.255.0)
System Default Gateway: Enter the default gateway IP address. (e.g.
192.168.200.1 or typically your router/gateway to the Internet).
System IP Mode: Click the drop-down list and select Static to manually specify
your IP address settings or DHCP to allow your switch to obtain IP address
settings automatically from a DHCP server on your network.
Use the IPv6 System Settings page to configure the IPv6 network interface, which is the
logical interface used for in-band connectivity with the switch via all of the switch's
front-panel ports. The configuration parameters associated with the switch's network
interface do not affect the configuration of the front-panel ports through which traffic is NS Retransmit Time Settings: A constant that defines a nonzero number of
switched or routed. seconds between periodic reauthentication of the client. The field is 1~3600
seconds. The default setting is 1 second.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
3. Review the settings. When you have completed making changes, click Apply to save Link Local Address Settings: A link-local address is an IPv6 unicast address that
the settings. can be automatically configured on any interface using the link-local prefix
IPv6 Status: The IPv6 address for the IPv6 network interface is set in auto FE80::/10 (1111 1110 10) and the interface identifier in the modified EUI-64
configuration mode if this option is enabled. The default value is Disable. Auto format. Link-local addresses are used in the neighbor discovery protocol and
configuration can be enabled only when DHCPv6 is not enabled on any of the the stateless autoconfiguration process. Nodes on a local link can use link-local
management interfaces. addresses to communicate; the nodes do not need globally unique addresses
to communicate. IPv6 devices must not forward packets that have link-local
DHCPv6 Client: This option only displays when DHCPv6 is enabled.
source or destination addresses to other links.
IPv6 Unicast Address / Prefix Length: The IPv6 Unicast Address is an identifier
Automatic Link Local Address: A link local address has a prefix of FE80, is not
for a single interface, on a single node. A packet that is sent to a unicast
routable, and can be used for communication only on the local network. Only
address is delivered to the interface identified by that address. Add the IPv6
one link local address is supported. If a link local address exists on the interface,
prefix and prefix length to the IPv6 System Settings interface.
this entry replaces the address in the configuration.
IPv6 Static Gateway: Specifies the corresponding Gateway of the IP address
Link Local Address/Prefix length: Enter the Link Local Address/Prefix Length.
entered into the field.
IPv6 Dynamic Gateway: To configure the switch to automatically obtain its IP
configuration from a DHCP server on your network.
Link Layer MAC Address: Specifies the link layer MAC address.
Click Add to save the entry to the list.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
You can type in the specific address and click Find to find the entry to modify or
click Delete or delete the address. If the entries span multiple pages, you can
5. Click Save Settings to Flash, then click OK. navigate page number in the Page field and click Go or you can click First,
Note: This step saves all configuration changes to the NV-RAM to ensure that if the Previous, Next, and Last Page to navigate the pages.
switch is rebooted or power cycled, the configuration changes will still be applied.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
5. Click Save Settings to Flash, then click OK.
2. Click on System, and click on IPv6 Neighbor. Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
3. Review the settings. When you have completed making changes, click Apply to save
the settings.
Neighbor IPv6 Address: Specifies the neighbor IPv6 address.
Set your DNS server settings 2. Click on System, and click on IP Access List.
System > DNS
This setting allows you to configure your IPv4/IPv6 DNS server settings for the purpose 3. Review the settings.
or resolving hostnames. For example, when specifying your SNTP server time settings First, enter the IPv4 or IPv6 address to allow access and click Add for each entry.
via domain name, the switch will not be able to resolve the SNTP domain name specified
until you configure the switch DNS server setting.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
2. Click on System, and click on DNS.
3. Enter your DNS IPv4 Server address and/or DNS IPv6 Server address in the provided
fields. For each entry, the access list will populate. You can click Delete next to the entry to
delete the entry or Delete All to delete all entries in the table.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
When you have completed entering the IPv4 and IPv6 address entries, click the IP
Restriction Status drop-down list at the top and select Enabled, then click Apply.
5. In the left hand panel, click Tools, click on Configuration, and click Save.
Change administrator password and add accounts To create additional administrative user accounts:
System > Administration User Name: Enter the user name of the new account.
This section explains how to change the administrator password create additional Password: Enter the password for the new acocunt and enter the password
administrative user accounts for access to the switch management page. again the Confirm Password field to verify. Then, click Add to add to the table.
For additional user accounts, you will be provided the option to Modify or
1. Log into your switch management page (see “Access your switch management page” Delete to remove the account.
on page 7). Note: The password consists of up to 23 alphanumeric characters.
To change the administrator password, in the “admin” entry in the table, click on
Modify. Note: This default administrator account cannot be deleted.
.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
In the Password field, enter the new password and enter the new password again the
Confirm Password field to verify. Then, click Apply. 5. Click Save Settings to Flash, then click OK.
Note: The password consists of up to 23 alphanumeric characters. Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
Change web idle login timeout settings Set the switch date and time
System > Timeout System > System Time
This section explains how to modify the switch management page idle timeout settings.
1. Log into your switch management page (see “Access your switch management page”
1. Log into your switch management page (see “Access your switch management page” on page 7).
on page 7).
2. Click on System, and click on System Time.
2. Click on System, and click on Timeout.
3. Review the settings. Click Apply to save changes.
3. Review the settings. Click Apply to save changes. Clock Mode - Displays if system time and date is set manually Local Time or
obtained automatically from a network time server SNTP.
Web Idle Timeout - Enter the idle period in minutes, when the switch will Current Time – Displays the current system time and date.
automatically log out a user from the switch management page. Time Zone – Displays the current system time zone.
Clock Mode: Select Local Time to manually configure your date and time
4. In the left hand panel, click Tools, click on Configuration, and click Save. settings or select SNTP to configure your switch to automatically obtain
settings from a network time server.
o SNTP – Allows you to configure your switch to pull time and date
settings automatically from a network time server. If selecting this
option, under Simple Network Time Protocol (SNTP) Settings, enter
your time server settings.
Note: Please note that in order for the switch to communicate to
Internet SNTP time servers, the switch must have valid IPv4/IPv6
address settings including a default gateway address for Internet
access. Additionally, if using a domain name, the switch must be
configured with valid DNS server settings in order to resolve 4. In the left hand panel, click Tools, click on Configuration, and click Save.
host/domain names.
SNTP Primary Server – Enter the primary network time server
IPv4 address, IPv6 address, or Domain Name.
SNTP Secondary Server – Enter the secondary network time 5. Click Save Settings to Flash, then click OK.
server IPv4 address, IPv6 address, or Domain Name. Note: This step saves all configuration changes to the NV-RAM to ensure that if the
SNTP Poll Interval – Enter the interval time when your switch switch is rebooted or power cycled, the configuration changes will still be applied.
will update the time and date settings with the time server.
Time Zone – Click the drop-down list to select your time zone.
Additionally, you can set your Daylight Savings Time.
Enable HTTPS/SSL (Secure Socket Layer) management access
System > SSL
By default, your switch management page can be accessed using standard web HTTP
protocol which is unsecure. Enabling HTTPS/SSL management access allows access to
the switch management page using secure encrypted communication which prevents
unauthorized users from intercepting user name and password credentials. Typically,
the switch is accessed within the local network only by system administrators which
does not necessarily require additional security. It is recommended to only enable this
feature, if allowing switch management access from other networks or over the
Internet.
Additional Time Parameters – Allows you to configure additional Daylight
Saving Time parameters. Note: Once HTTPS/SSL management access is enabled, HTTP management access will be
Daylight Savings Time Status: Click the drop-down list to disabled forcing all access to the switch management page using secure encryption
enable or disable Daylight Savings. communication only.
From: Set the daylight savings start date and time.
To: Set the daylight savings end date and time. 1. Log into your switch management page (see “Access your switch management page”
DST Offset: Click the drop-down list to set the time offset on page 7).
based on respective time zone.
2. Click on System, and click on SSL.
If enabling SSL management access, you will need to access the switch management
page using HTTPS instead of HTTP. (e.g. https://192.168.10.200) 3. Click the Auto Configuration State drop-down list and select Enabled. Click Apply to
save changes.
Click Continue, Proceed to this website, and accept the certificate if prompted.
4. In the left hand panel, click Tools, click on Configuration, and click Save. 4. In the left hand panel, click Tools, click on Configuration, and click Save.
5. Click Save Settings to Flash, then click OK. 5. Click Save Settings to Flash, then click OK.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied. switch is rebooted or power cycled, the configuration changes will still be applied.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
Time Stamp 4. In the left hand panel, click Tools, click on Configuration, and click Save.
o Enable - Each event message recorded in the log will have a time
stamp.
o Disable - No time stamp will be included with the event messages.
Message Buffered Size - Enter the message buffer size. (Range: 1-200) 5. Click Save Settings to Flash, then click OK.
Syslog Status - Allows you to send device logging to an external log (Syslog)
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
server for troubleshooting or monitoring.
switch is rebooted or power cycled, the configuration changes will still be applied.
o Enable – Enable syslog and in the Syslog Server IP section, enter the
IPv4 or IPv6 address of the external syslog server to send logging.
o Disable – Disable syslog functionality.
Facility - Click the drop-down list and which facility to store the logging.
(Options: local0 – local7)
Note: You can define the facility to store logging on your external syslog server.
This helps to ensure you have separate logging sections for different devices.
Logging Level – Click the drop-down list to select what level of event messages
that will be logged.
1 Alert - Action must be taken immediately.
2 Critical - Critical conditions are displayed.
3 Warning - Warning conditions are displayed.
4 Info - Informational messages are displayed.
Enable or Disable SNMP The SNMP Engine ID screen allows network managers to define the SNMP Engine ID or
System > SNMP > Settings to assign the default Engine ID to SNMP.
You can manage a switch by viewing and configuring the management information base
(MIB) objects on the device with the Simple Network Management Program (SNMP). 1. Log into your switch management page (see “Access your switch management page”
This chapter describes how to configure SNMP. A Group Name, IP address of the switch on page 7).
and at least one community string is the minimum required to manage the switch using
SNMP.
2. Click on System, click on SNMP, and click on Settings.
Note: If you disable the SNMP on the switch, the switch will not be manageable via
3. Review the settings. Click Apply to save the settings.
SNMP using MIBs.
Engine ID (10-64 Hex Characters) – Enter the local device Engine ID. The field
1. Log into your switch management page (see “Access your switch management page”
value is a hexadecimal string. Each byte in hexadecimal character strings is two
on page 7).
hexadecimal digits. The Engine ID must be defined before SNMP is enabled.
Reset to Default – Use the device-generated Engine ID (Reset to Default will
2. Click on System, click on SNMP, and click on Settings. override any entry in the Engine ID field).
SNMP Agent Status: Click the drop-down list to one of the following options.
o Enabled - When you enable this parameter, the SNMP agent is active.
You can manage the switch with SNMP network management 4. In the left hand panel, click Tools, click on Configuration, and click Save.
software and the switch’s private MIB.
o Disabled - When you enable this parameter, the SNMP agent is
inactive.
5. Click Save Settings to Flash, then click OK.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
Configure the SNMP View Table Modifying SNMP View Table Entries
System > SNMP > View If you need to modify an entry in the View Table page, you must first delete the entry
The SNMP View table specifies the MIB object access criteria for each View Name. If the and then re-enter it.
View Name is not specified on this page, then it has access to all MIB objects. You can
specify specific areas of the MIB that can be accessed or denied based on the entries in Deleting SNMP View Table Entries
this table. You can create and delete entries in the View table.
In the Action column of the table, click Delete for the View table entry that you want to
1. Log into your switch management page (see “Access your switch management page” remove.
on page 7).
Creating SNMP View Table Entries 4. In the left hand panel, click Tools, click on Configuration, and click Save.
This procedure explains how to create entries in the SNMP View Table.
Enter the View Name. This entry must be pre-defined on the SNMP
User/Group page.
5. Click Save Settings to Flash, then click OK.
Enter the Subtree OID.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
Enter “1” for the OID Mask. switch is rebooted or power cycled, the configuration changes will still be applied.
Enter the View Type. Choose from the following options, and then click Add.
o Included: This selection allows the specified MIB object to be included
in the view.
o Excluded: This selection blocks the view of the specified MIB object.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
Configure the SNMP User/Group Table Click Add. The new User Name and Group Name are displayed on the SNMP
System > SNMP > User User/Group page.
An SNMP User Name and Group Name definition is the basis for all the other SNMP
tables. You can create and delete View Names by following the procedures in the
following sections:
1. Log into your switch management page (see “Access your switch management page”
on page 7).
1. Log into your switch management page (see “Access your switch management page”
on page 7).
Enter the Host IP Address for the management device that is to receive the Delete a Trap Host Table Entry
SNMP traps. To delete an entry in the host table, click Delete next to the entry in the table that you
want to remove. The Host table entry is removed from the table. No confirmation
Enter the SNMP Version, either v1 or v2c, that is configured for the host
message is displayed.
management device.
Enter a Community Name that you have defined previously in the SNMP
Community table. The Community Name must correlate with one of the
communities displayed on the SNMP Community Table page. If you enter a
Community Name that has not been pre-defined, the Trap Host entry is
displayed, but agent/manager communication fails.
5. In the left hand panel, click Tools, click on Configuration, and click Save.
Click Add. The new host is added to the table. 6. Click Save Settings to Flash, then click OK.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
Enable or Disable RMON 3. Click the RMON Status drop-down list and select Enabled to enable RMON. Click
System > RMON > Settings Apply to save settings.
The RMON (Remote MONitoring) MIB is used with SNMP applications to monitor the
operations of network devices. The Switch supports the four RMON MIB groups listed
here:
Statistic group— This group is used to view port statistics remotely with SNMP
programs.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
History group— This group is used to collect histories of port statistics to
identify traffic trends or patterns.
Event group— This group is used with alarms to define the actions of the
switch when packet statistic thresholds are crossed. 5. Click Save Settings to Flash, then click OK.
Alarm group—This group is used to create alarms that trigger event log Note: This step saves all configuration changes to the NV-RAM to ensure that if the
messages or SNMP traps when statistics thresholds are exceeded. switch is rebooted or power cycled, the configuration changes will still be applied.
You can use your SNMP Network Management System (NMS) software and the RMON
section of the MIB tree to view the RMON statistics, history and alarms associated with
specific ports. Since RMON uses the SNMP agent for communicating with your NMS
software, the SNMP Agent must be enabled and the SNMP feature must be configured
on your switch. Since RMON works in conjunction with the SNMP agent, the SNMP
agent must be enabled for the RMON feature to be active.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
Configure parameters for RMON Ethernet statistics In the list, you can click Modify to modify an entry or click Delete or delete the entry. If
System > RMON > Statistics the entries span multiple pages, you can navigate page number in the Page field and
click Go or you can click First, Previous, Next, and Last Page to navigate the pages.
You can remotely view individual port statistics with RMON by using your SNMP NMS
software and the RMON portion of the MIB tree.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
3. Review the settings. 4. In the left hand panel, click Tools, click on Configuration, and click Save.
Index: This parameter specifies the ID number of the new group. The range is 1
to 65535.
Port: This parameter specifies the port where you want to monitor the
statistical information of the Ethernet traffic. 5. Click Save Settings to Flash, then click OK.
Owner: This parameter is used to identify the person who created an entry. It is Note: This step saves all configuration changes to the NV-RAM to ensure that if the
primarily intended for switches that are managed by more than one person, switch is rebooted or power cycled, the configuration changes will still be applied.
and is an optional field.
Configure parameters for RMON history control settings Click Add to add the entry to the table.
System > RMON > History
RMON histories are snapshots of port statistics. They are taken by the switch at
predefined intervals and can be used to identify trends or patterns in the numbers or
types of ingress packets on the ports on the switch. The snapshots can be viewed with
your SNMP NMS software with the history group of the RMON portion of the MIB tree.
A history group is divided into buckets. Each bucket stores one snapshot of statistics of a
port. A group can have from 1 to 50 buckets. The more buckets in a group, the more
snapshots it can store.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
2. Click on System, click on RMON, and click on History. In the list, you can click Modify to modify an entry or click Delete or delete the entry.
You can also click Delete All to delete all of the entries in the table. If the entries span
multiple pages, you can navigate page number in the Page field and click Go or you can
3. Review the settings. click First, Previous, Next, and Last Page to navigate the pages.
Index: This parameter specifies the ID number of the new group. The range is 1
to 65535.
Port: This parameter specifies the port where you want to monitor the
statistical information of the Ethernet traffic.
Buckets Requested: This parameter defines the number of snapshots of the
statistics for the port. Each bucket can store one snapshot of RMON statistics.
Different ports can have different numbers of buckets. The range is 1 to 50
buckets.
Interval: This parameter specifies how frequently the switch takes snapshots of 4. In the left hand panel, click Tools, click on Configuration, and click Save.
the port’s statistics. The range is 1 to 3600 seconds (1 hour). For example, if
you want the switch to take one snapshot every minute on a port, you specify
an interval of sixty seconds.
Owner: This parameter is used to identify the person who created an entry. It is 5. Click Save Settings to Flash, then click OK.
primarily intended for switches that are managed by more than one person, Note: This step saves all configuration changes to the NV-RAM to ensure that if the
and is an optional field. switch is rebooted or power cycled, the configuration changes will still be applied.
Configure parameters for RMON alarms 1. Log into your switch management page (see “Access your switch management page”
System > RMON > Alarms on page 7).
RMON alarms are used to generate alert messages when packet activity on designated
ports rises above or falls below specified threshold values. The alert messages can take 2. Click on System, click on RMON, and click on Alarm.
the form of messages that are entered in the event log on the switch or traps that are
sent to your SNMP NMS software or both.
3. Review the settings.
RMON alarms consist of two thresholds. There is a rising threshold and a falling
Index: This parameter specifies the ID number of the new group. The range is 1
threshold. The alarm is triggered if the value of the monitored RMON statistic of the
to 65535.
designated port exceeds the rising threshold. The response of the switch is to enter a
message in the event log, send an SNMP trap, or both. The alarm is reset if the value of Interval: This parameter specifies the time (in seconds) over which the data is
the monitored statistic drops below the falling threshold. sampled. Its range is 1 to 2147483647 seconds.
The frequency with which the switch samples the thresholds of an alarm against the Variable: This parameter specifies the RMON MIB object that the event is
actual RMON statistic is controlled by a time interval parameter. You can adjust this monitoring.
interval for each alarm. Sample type: This parameter defines the type of change that has to occur to
trigger the alarm on the monitored statistic. There are two choices from the
Here are the three components that comprise RMON alarms: pull-down menu - Delta value and Absolute value. Delta value- setting
compares a threshold against the difference between the current and previous
RMON statistics group: A port must have an RMON statistics group configured values of the statistic. Absolute value- setting compares a threshold against the
if it is to have an alarm. When you create an alarm, you specify the port to current value of the statistic.
which it is to be assigned not by the port number, but rather by the ID number
of the port’s statistics group. Rising Threshold: This parameter specifies a specific value or threshold level of
the monitored statistic. When the value of the monitored statistic becomes
RMON event: An event specifies the action of the Switch when the ingress greater than this threshold level, an alarm event is triggered. The parameter’s
packet activity on a port crosses a statistical threshold defined in an alarm. The range is 1 to 2147483647.
choices are to log a message in the event log of the Switch, send an SNMP trap
to an SNMP workstation, or both. Since there are only three possible actions Falling Threshold: This parameter specifies a specific value or threshold level of
and since events can be used with more than one alarm, you probably will not the monitored statistic. When the value of the monitored statistic becomes less
create more than three events. than this threshold level, an alarm event is triggered. The parameter’s range is
1 to 2147483647.
Alarm: The last component is the alarm itself. It defines the port statistic to be
monitored and the rising and falling thresholds that trigger the switch to Rising Event Index: This parameter specifies the event index for the rising
perform an event. The thresholds of an alarm can have the same event or threshold. Its range is 1 to 65535. This field is mandatory and must match an
different events. The switch supports up to eight alarms. Event Index that you previously entered in “Events”.
Falling Event Index: This parameter specifies the event index for the falling
threshold. Its range is 1 to 65535. This field is mandatory and must match an
Event Index that you previously entered in “Events”.
Owner: This parameter is used to identify the person who created an entry. It is
primarily intended for switches that are managed by more than one person,
and is an optional field.
Click Add to add the entry to the table. Configure parameters for RMON events
System > RMON > Event
An event specifies the action of the switch when the ingress packet activity on a port
crosses a statistical threshold defined in an alarm. The choices are to log a message in
the event log of the switch, send an SNMP trap to an SNMP workstation, or both. Since
there are only three possible actions and since events can be used with more than one
alarm, you probably will not create more than three events - one for each of the three
actions.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
Index: This parameter specifies the ID number of the new group. The range is 1
In the list, you can click Modify to modify an entry or click Delete or delete the entry.
to 65535.
You can also click Delete All to delete all of the entries in the table. If the entries span
multiple pages, you can navigate page number in the Page field and click Go or you can Description: This parameter specifies a text description of the event that you
click First, Previous, Next, and Last Page to navigate the pages. are configuring.
Type: This parameter specifies where to log the event when it occurs. The
choices are to log a message in the event log of the Switch, send an SNMP trap
to the SNMP NMS software, or both.
Community: This parameter specifies the community where you want to send
the SNMP trap.
Owner: This parameter is used to identify the person who created an entry. It is
primarily intended for switches that are managed by more than one person,
and is an optional field.
5. In the left hand panel, click Tools, click on Configuration, and click Save.
6. Click Save Settings to Flash, then click OK.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
In the list, you can click Modify to modify an entry or click Delete or delete the entry. 2. Click on System, click on Statistics, and click on Traffic.
You can also click Delete All to delete all of the entries in the table. If the entries span
multiple pages, you can navigate page number in the Page field and click Go or you can 3. View the Traffic Information Statistics.
click First, Previous, Next, and Last Page to navigate the pages. InOctets: Inbound Octets (Bytes/s), number of inbound octet bits in bytes per
second.
InUcastPkts: Inbound Unicast Packets (Pkts), number of inbound unicast packets
in packets per second.
InNUcastPkts: Inbound Non-unicast Packets (Pkts), number of inbound non-
unicast packets (such as broadcast and multicast packets) in packets per second.
InDiscards: Inbound Discards (Pkts), number of inbound discarded packets in
packets per second.
OutOctets: Outbound Octets (Bytes/s), rate of outbound octet bits in bytes per
second.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
OutUcastPkts: Outbound Unicast Packets (Pkts), number of outbound unicast
packets in packets per second.
OutNUcastPkts: Outbound Non-unicast Packets (Pkts), number of outbound
non-unicast (such as broadcast and multicast packets) packets.
5. Click Save Settings to Flash, then click OK.
OutDiscards: Outbound Discards (Pkts), number of outbound discarded packets.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied. Clear: Click the Apply button to clear port specific Traffic information.
Refresh: Click the Refresh button to update table with newest traffic
information.
1. Log into your switch management page (see “Access your switch management page” 1. Log into your switch management page (see “Access your switch management page”
on page 7). on page 7).
2. Click on Tools and click on IEEE 802.3az EEE. 2. Click on Network and click on Physical Interface.
3. Click the IEEE 802.3az EEE Status drop-down list and select Enabled to enable the 3. Review the settings. Click Apply to save changes.
power saving feature and click Apply to save the settings.
Port - Specifies the port number. The All value indicates ports 1 through 28 on
the Switch. You cannot change this parameter. You can use the All row value in
the Port column to apply Admin Status, Mode, Jumbo, Flow Contrl, EAP, BPDU
settings to all ports at the same time.
Trunk - This parameter indicates the trunk group number. A number in this
column indicates that the port has been added to a trunk using static or
4. In the left hand panel, click Tools, click on Configuration, and click Save.
dynamic 802.3ad LACP link aggregation.
Type - This parameter indicates the port type. On the Switch, the port type is
1000TX for 10/100/1000Base-T twisted-pair ports (1-28) and 100FX or 1000TX
5. Click Save Settings to Flash, then click OK.
for the SFP ports (25F-28F) for copper or fiber SFP type.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
Link Status - This parameter indicates the status of the link between the port
and the end node connected to the port. The possible values are:
o Up -This parameter indicates a valid link exists between the port and
the end node.
o Down -This parameter indicates the port and the end node have not
established a valid link.
Admin. Status: This parameter indicates the operating status of the port. You
can use this parameter to enable or disable a port. You may want to disable a Note: When selecting a Mode setting, the following points apply:
port and prevent packets from being forwarded if a problem occurs with the
o When a twisted-pair port is set to Auto-Negotiation, the end node should
node or cable connected to the port. You can enable the port to resume
also be set to Auto-Negotiation to prevent a duplex mode mismatch.
normal operation after the problem has been fixed. You can also disable an
unused port to secure it from unauthorized connections. The possible values o A switch port using Auto-Negotiation defaults to half-duplex if it detects
are: that the end node is not using Auto-Negotiation. This can result in a
mismatch if the end node is operating at a fixed duplex mode of full-duplex.
o Ignore -This parameter applies to the All row only and indicates that
To avoid this problem when connecting an end node with a fixed duplex
the Admin. Status field must be set individually for each port.
mode of full-duplex to a switch port, disable Auto-Negotiation on the port
o Enabled - This parameter indicates the port is able to send and receive and set the port’s speed and duplex mode manually.
Ethernet frames.
o The only valid setting for the SFP ports is Auto-Negotiation.
o Disabled - This parameter indicates the port is not able to send and
receive Ethernet frames.
Jumbo: This parameter indicates whether or not jumbo frames can be accepted
Mode: This parameter indicates the speed and duplex mode settings for the
by the switch. You may want to activate jumbo frames when your switch will
port. You can use this parameter to set the speed and duplex mode of a port.
transmit video and audio files. The possible values are:
The possible settings are:
o Ignore -This parameter indicates that the All setting does not apply to
o Ignore -This parameter indicates that the All setting does not apply to
the Jumbo field. In other words, each port is set individually.
the Mode field. In other words, each port is set individually.
o Enabled -This parameter indicates the port is permitted to accept
o Auto -This parameter indicates the port is using Auto-Negotiation to
jumbo frames.
set the operating speed and duplex mode. The actual operating speed
and duplex mode of the port are displayed in parentheses (for o Disabled -This parameter indicates the port is not permitted to accept
example, “1000/F” for 1000 Mbps full duplex mode) after a port jumbo frames.
establishes a link with an end node. Note: When QoS is enabled on a port, the Jumbo frame parameter cannot be
o Auto (1000F) -This parameter indicates the port is configured for enabled.
1000Mbps operation in Auto-Negotiation mode.
o 1000/Full -This parameter indicates the port is configured for Flow Ctrl: Flow Control, This parameter reflects the current flow control setting
1000Mbps operation in full-duplex mode. on the port. The switch uses a special pause packet to notify the end node to
o 100/Full -This parameter indicates the port is configured for 100Mbps stop transmitting for a specified period of time. The possible values are:
operation in full-duplex mode. o Ignore - This parameter indicates that the All setting does not apply to
o 10/Full -This parameter indicates the port is configured for 10Mbps the Flow Control field. In other words, each port is set individually.
operation in full-duplex mode. o Enabled - This parameter indicates that the port is permitted to use
o 100/Half -This parameter indicates the port is configured for 100Mbps flow control.
operation in half-duplex mode. o Disabled - This parameter indicates that the port is not permitted to
o 10/Half -This parameter indicates the port is configured for 10Mbps use flow control.
operation in half-duplex mode.
EAP: This parameter reflects the current Extensible Authentication Protocol Configure Spanning Tree (STP, RSTP, MSTP)
(EAP) setting on the port. The possible values are: Network > Spanning Tree > Protocol
o Ignore - This parameter indicates that the All setting does not apply to Spanning Tree Protocol (STP) provides network topology for any arrangement of
the EAP field. In other words, each port is set individually. bridges/switches. STP also provides a single path between end stations on a network,
o Enabled - This parameter indicates that the port is able to send and eliminating loops. Loops occur when alternate routes exist between hosts. Loops in an
receive EAP packets. extended network can cause bridges to forward traffic indefinitely, resulting in
o Disabled - This parameter indicates that the port is disabled and is not increased traffic and reducing network efficiency.
able to send or receive EAP packets.
1. Log into your switch management page (see “Access your switch management page”
BPDU: This parameter reflects the current BPDU setting on the port. The on page 7).
possible values are:
o Ignore - This parameter indicates that the All setting does not apply to 2. Click on Network, click on Spanning Tree, and click on Protocol.
the BPDU field. In other words, each port is set individually.
o Enabled - This parameter indicates that the switch will pass BPDU 3. Review the settings. Click Apply to save changes.
frames through the switch and broadcast them through all other
Global STP Status: Select the STP state on the device. The possible field values
ports.
are:
o Disabled - This parameter indicates that the switch will not pass BPDU
o Disable – Disables STP on the device. This is the default value.
frames through the switch, With RSTP or STP enabled, the switch will
receive BPDU frames and process them according to the spanning tree o Enable – Enables STP on the device.
protocol. Protocol Version: Specifies the Spanning Tree Protocol (STP) mode to enable
on the switch. The possible field values are:
o STP – Enables STP 802.1d on the device.
o RSTP – Enables Rapid STP 802.1w on the device. This is the default
value.
o MSTP – Enables Multiple STP 802.1s on the device.
Bridge Priority: The Bridge Priority has a range 0 to 61440 in increments of
4096. To make this easier for you, the Web Management Utility divides the
range into increments. You specify the increment that represents the desired
5. In the left hand panel, click Tools, click on Configuration, and click Save. bridge priority value.
6. Click Save Settings to Flash, then click OK.
Maximum Age: The Maximum Age defines the amount of time a port will wait
Note: This step saves all configuration changes to the NV-RAM to ensure that if the for STP/RSTP information. MSTP uses this parameter when interacting with
switch is rebooted or power cycled, the configuration changes will still be applied. STP/RSTP domains on the boundary ports. Its range is 6 - 40 seconds
Hello Time: The Hello Time is frequency with which the root bridge sends out a
BPDU.
Forward Delay: The Forward Delay defines the time that the bridge spends in Configure Spanning Tree Protocol port settings
the listening and learning states. Its range is 4 - 30 seconds. Network > Spanning Tree > Port
Transmit Hold Count: The Transmit Hold Count specifies the maximum number 1. Log into your switch management page (see “Access your switch management page”
of BPDUs that the bridge can send per second. Its range is 1 - 10. on page 7).
Max Hop Count: The Max Hop Count is a parameter set in a BPDU packet when
it originates. It is decremented by 1each time it is retransmitted by the next 2. Click on Network, click on Spanning Tree, and click on Port.
bridge. When the Hop Count value reaches zero, the bridge drops the BPDU
packet. Its range is 6 - 40 hops.
3. Review the settings. For each entry, click Apply to save changes.
STP Status: Indicates if spanning tree protocol is active or not on the port.
Select one of the following choices from the pull-down menu:
o Enable - The spanning tree protocol is enabled on the port.
o Disabled - The spanning tree protocol is disabled on the port.
Note: BPDU passthrough must be disabled for all ports under Physical
interface for STP can be enabled.
Priority: Indicates the port priority. If two paths have the same port cost, the
bridges must select a preferred path. In some instances this can involve the use
of the port priority parameter which is used as a tie breaker when two paths
have the same cost.
The range for port priority is 0 to 240. As with bridge priority, this range is
broken into increments, in this case multiples of 16. To select a port priority for
a port, you enter the desired value. Table 1 lists the values that are valid.
In addition, this section also displays the spanning tree root information. Valid Port Priority Values
Step 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Port
0 16 32 48 64 80 96 112 128 144 160 176 192 208 224 240
Priority
Admin Cost (0 = Auto): The administratively assigned value for the contribution
of this port to the path cost of paths towards the spanning tree root. Writing a
value of '0' assigns the automatically calculated default Path Cost value to the
port. If the default Path Cost is being used, this object returns '0' when read.
External Cost: This defines a metric that indicates the relative cost of P2P: Choosing the Forcetrue parameter indicates a point-to-point (P2P) shared
forwarding packets to the specified port list. Port cost can be set automatically link. P2P ports are similar to edge ports however they are restricted in that a
or as a metric value. Define a value between 1 and 200000000 to determine P2P port must operate in full-duplex.
the external cost. The lower the number, the greater the probability the port Like edge ports, P2P ports transition to a forwarding state rapidly thus
will be chosen to forward packets. The default port cost: 100Mbps port = benefiting from RSTP. A P2P value of Forcefalse indicates that the port cannot
200000. Gigabit port = 20000. have P2P status. Auto allows the port to have P2P status whenever possible
Status – Displays the current port spanning tree status. and operate as if the P2P status were true. If the port cannot maintain this
o Blocking - A blocking state does not allow network traffic to be sent or status, (for example if the port is forced to half-duplex operation) the P2P
received on a the port except for BPDU data. A port with a higher path status changes to operate as if the P2P value were Forcefalse.
cost to the root bridge than another on the switch causes a switching The default setting for this parameter is Auto.
loop and is placed in the blocking state by the Spanning Tree Restricted Role: Toggle between True and False to set the restricted role state
algorithm. The port’s state may change to the forwarding state if the of the packet. If set to True, the port will never be selected to be the Root port.
other links in use fail and the Spanning Tree algorithm determines the The default value is False.
port may transition to the forwarding state.
Restricted TCN: Toggle between True and False to set the restricted TCN of the
o Listening - This state occurs on a port during the convergence process. packet. Topology Change Notification (TCN) is a BPDU that a bridge sends out
The port in the listening state processes BPDUs and awaits new to its root port to signal a topology change. If set to True, it stops the port from
information that would cause the port to return to the blocking state. propagating received TCN and to other ports. The default value is False.
o Learning - While the port does not yet forward frames (packets), in Migrate: Indicates if the port is configured to accept RSTP and STP BPDUs.
this state the port does learn source addresses from frames received
and adds them to the filtering (switching) database.
o Forwarding - A port that both receives and sends data. This indicates
normal operation. STP continues to monitor the port for incoming
BPDUs that indicate the port should return to the blocking state to
prevent a loop.
o Disabled - This state is not strictly part of STP. However, a network
administrator can manually disable a port.
Edge: Indicates if a port is connected to an edge device in the network topology
or not. Selecting the Forcetrue parameter designates the port as an edge port.
Edge ports cannot create loops, however an edge port can lose edge port
status if a topology change creates a potential for a loop. An edge port 4. In the left hand panel, click Tools, click on Configuration, and click Save.
normally should not receive BPDU packets. If a BPDU packet is received, it
automatically loses edge port status. Selecting the Forcefalse parameter
indicates that the port does not have edge port status. Selecting the Auto 5. Click Save Settings to Flash, then click OK.
parameter indicates that the port have edge port status or not have edge port Note: This step saves all configuration changes to the NV-RAM to ensure that if the
status automatically. The default setting for this parameter is Auto. switch is rebooted or power cycled, the configuration changes will still be applied.
3. Review the settings. For each section, click Apply to save changes.
MST Table: Make changes to the table entry, and click Apply modify or click
Delete to remove the ID entry.
MST Configuration Identification Settings
Configuration Name: A configured name set on the switch to uniquely identify
the MSTI (Multiple Spanning Tree Instance). If a configuration name is not set,
this field shows the MAC address of the device running MSTP.
Revision Level (0-65535): This value, together with the configuration name,
and identical vlans mapped for STP instance IDs identifies the MST region
configured on the switch.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
MSTI ID (1 - 31): Displays the MSTI ID associated with the VID List. The possible
field range is 1-31.
VID List (1 - 4094): Displays the VID List. Click Add to add into MST Table below.
Priority: Enter the new priority in the Priority field. The user may set a priority
value between 0-61440.
View your Spanning Tree Protocol Instance Information (MSTP) Configure Spanning Tree Protocol MST Port Settings (MSTP)
Network > Spanning Tree > Instance Network > Spanning Tree > MST Port
1. Log into your switch management page (see “Access your switch management page” 1. Log into your switch management page (see “Access your switch management page”
on page 7). on page 7).
2. Click on System, click on Spanning Tree, and click on Instance. 2. Click on Network, click on Spanning Tree, and click on MST Port.
3. View your MSTP instance information. 3. Review the settings. For each entry, click Apply to save changes.
Select MST Port – Click the drop-down to select which MST port to configure.
MSTI ID – Specifies the instance to which the VLAN is assigned.
Internal Root Cost – Indicates cost of forwarding packets to specified ports
when an interface is selected within a STP instance.
Root Port – Indicates the selected instance’s root port.
Regional Root Bridge – Displays the ID of the Regional Internal Root Bridge. MST Port Info - The MST Port Information page provides user to configure the
Designated Bridge – Displays the ID of the bridge that connects the link or MSTP Interface settings.
shared LAN to the root. o Admin Path Cost (0 = Auto) - This is the port cost used by MSTP when
Instance Priority – Specifies the selected spanning tree instance device priority. calculating path cost to the root bridge.
The field range is 0-61440. The field default is 32768. o Priority - This is the port priority used by MSTP in calculating path
costs when two ports on the switch have the same port cost.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
Configure port trunk settings (Trunk/Link Aggregation) Click the drop-down list and select one of the following options.
Network > Trunk > Settings Active - The specific aggregator will broadcast and respond to LACPDU (LACP
The trunking function enables the cascading of two or more ports for a combined larger Data Unit) packets. This setting enables the dynamic LACP feature for the trunk.
total bandwidth. Up to 4 trunk groups may be created, each supporting up to 8 ports. Add Passive - The specific aggregator will not broadcast LACPDU packets, but it will
a trunking Name and select the ports to be trunked together, and click Apply to activate respond to them. This setting disables the LACP feature for the trunk
the selected trunking groups. Manual - Enables static port trunking and disables the LACP feature for the
Important Note: Do not connect the cables of a port trunk to the ports on the switch trunk. (Static link aggregation).
until you have configured the ports on both the switch and the end nodes. Connecting Disable - Disables the static port trunk and disables the LACP feature.
the cables prior to configuring the ports can create loops in your network topology.
Loops can result in broadcast storms which can severely limited the effective bandwidth
of your network.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
4. In the left hand panel, click Tools, click on Configuration, and click Save.
3. Review the settings. For each trunk group, click Apply to save changes.
For each Trunk ID/Group, check the port numbers to add for each trunk group.
5. Click Save Settings to Flash, then click OK.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
View your trunk group status information Configure your port priority
Network > Trunk > Status Network > Trunk > Port Priority
1. Log into your switch management page (see “Access your switch management page”
1. Log into your switch management page (see “Access your switch management page” on page 7).
on page 7).
2. Click on Network, click on Trunk, and click on Port Priority.
2. Click on Network, click on Trunk, and click on Status.
3. View your trunk group status information. 3. Review the settings. Click Apply to save changes.
To assign a port higher priority within a trunk group, find the port number and in the
System Priority - Preassigned setting that cannot be modified. This value priority column, enter a priority value 0-65535 (65535 being the highest priority).
applies to the switch.
System ID - MAC address value assigned to the individual switch. This value
cannot be modified.
Group: # The ID number of the trunk (link aggregation group).
4. In the left hand panel, click Tools, click on Configuration, and click Save.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
Enable loopback detection In the Loopback Detection table, select one of the Loopback Detection Status choices
Network > Loopback Detection from the pull down menu:
Ignore: This parameter indicates that the setting in the All row do not apply to the
The loopback detection feature allows the switch to detect and prevent disruption from
Loopback Detection Status field. In other words, each port is set individually.
loops that occur on uplink or downlink switches directly connected to your switch.
Enabled: This selection enables the Loopback Detection feature for each port.
1. Log into your switch management page (see “Access your switch management page” This state must be enabled along with the Status field at the top of the page
on page 7). before this feature can be active on the selected port.
Disabled: This selection disables the Loopback Detection feature on the
2. Click on Network and click on Loopback Detection. selected port.
Note: In the All row when you select Enable or Disable instead of Ignore, the
selection applies to all of the Switch ports.
3. Review the settings.
Next to each entry modified, under the Action column, click Apply to save the changes.
State – Select Enabled to enable the loopback detection feature. Select
Disabled to disabled the loopback detection feature.
Interval – Defines the interval your switch will check for loops.
Recover Time – Defines the time period when connectivity will be restored to a
port where a loop was previously detected and blocked.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
Add static unicast entries to the switch multiple pages, you can navigate page number in the Page field and click Go or you can
Network > Static Unicast click First, Previous, Next, and Last Page to navigate the pages.
In this section, you can add static unicast entries to the switch configuration.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
In the list, you can click Modify to modify an entry or click Delete or delete the entry.
You can also click Delete All to delete all the entries in the list. If the entries span
Add static multicast entries to the switch In the list, you can click Modify to modify an entry or click Delete or delete the entry. If
Network > Static Multicast the entries span multiple pages, you can navigate page number in the Page field and
click Go or you can click First, Previous, Next, and Last Page to navigate the pages.
In this section, you can add static multicast entries to the switch configuration.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
3. Review the settings. 4. In the left hand panel, click Tools, click on Configuration, and click Save.
802.1Q VLAN – Enter the VLAN ID where the multicast group MAC address will
reside.
Note: By default, all switch ports are part of the default VLAN, VLAN ID 1. 5. Click Save Settings to Flash, then click OK.
MAC Address – Enter the multicast group MAC address. Note: This step saves all configuration changes to the NV-RAM to ensure that if the
Group Member – Check the port(s) where the MAC address will reside. switch is rebooted or power cycled, the configuration changes will still be applied.
Note: You can click All to select all ports.
Click Apply to add the Static Multicast Group entry to the list.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
1. Log into your switch management page (see “Access your switch management page”
on page 7).
Check the static router ports to add and click Apply to save the settings.
Note: You can click on All to add all ports. Clicking Restore will restore the static router
port settings to default.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
5. Click Save Settings to Flash, then click OK.
5. Click Save Settings to Flash, then click OK.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
Note: This step saves all configuration changes to the NV-RAM to ensure that if the switch is rebooted or power cycled, the configuration changes will still be applied.
switch is rebooted or power cycled, the configuration changes will still be applied.
3. Review the settings for each port. Click Apply to save the settings. 1. Log into your switch management page (see “Access your switch management page”
Bandwidth – Enter the egress rate limit value. on page 7).
Status – Click the drop-down list and select Enabled to enable egress rate
limiting or select Disabled to disable egress rate limiting. 2. Click on Network, click on VLAN, and click on Tagged VLAN.
Note: Modifying settings in the row marked All, will apply the settings to all
ports.
3. Review the settings.
VLAN ID – Enter the VLAN ID for the new VLAN.
VLAN Name – Enter the VLAN name.
Management VLAN – Click the drop-down list and select Enabled to allow
access to the switch management page through the new VLAN. If you want to
restrict management access through this VLAN, select Disabled.
Note: By default, the default VLAN VID 1 is set as the Management VLAN.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
Tagged/Untagged/Not Member VLAN Ports Select the not member ports to restrict from the new VLAN.
On a port, the tag information within a frame is examined when it is received to
determine if the frame is qualified as a member of a specific tagged VLAN. If it is, it is
eligible to be switched to other member ports of the same VLAN. If it is determined that
the frame’s tag does not conform to the tagged VLAN, the frame is discarded.
Since these VLAN ports are VLAN aware and able to read VLAN VID tagged information
on a frame and forward to the appropriate VLAN, typically tagged VLAN ports are used
for uplink and downlink to other switches to carry and forward traffic for multiple VLANs
across multiple switches. Tagged VLAN ports can be included as members for multiple
VLANs. Computers and other edge devices are not typically connected to tagged VLAN Click Apply to save the new VLAN to the table.
ports unless the network interface on these device can be enabled to be VLAN aware.
Select the tagged VLAN ports to add to the new VLAN. In the list, you can click Modify to modify an entry or click Delete or delete the entry. If
the entries span multiple pages, you can navigate page number in the Page field and
click Go or you can click First, Previous, Next, and Last Page to navigate the pages.
Note: The default VLAN VID1 cannot be removed.
Untagged VLAN ports are used to connect edge devices (VLAN unaware) such as
computers, laptops, and printers to a specified VLAN. It is required to modify the Port
VID settings accordingly for untagged VLAN ports under Bridge > VLAN > Port Settings.
(e.g. If the VID for the VLAN is 2, the PVID should also be set to 2)
4. In the left hand panel, click Tools, click on Configuration, and click Save.
Select the untagged VLAN ports to add to the new VLAN.
3. Click the learning mode drop-down list to select the forwarding table mode and click
Apply to save settings.
Note: The default mode is IVL.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
5. Click Save Settings to Flash, then click OK.
5. Click Save Settings to Flash, then click OK.
View the switch VLAN dynamic forwarding table Create a private VLAN
Network > VLAN > Dynamic Network > VLAN > Private
This section allows you to view the VLAN forwarding table with dynamically generated The private VLAN feature allows you to create a more secure VLAN that is completely
forwarding table entries as devices more devices are connected to your switch. isolated to its members and cannot communicate with other VLANs. A private VLAN
partitions the Layer 2 broadcast domain of a VLAN into subdomains, allowing you to
1. Log into your switch management page (see “Access your switch management page” isolate the ports on the switch from each other. A subdomain consists of a primary
on page 7). VLAN and one or more secondary VLANs. All VLANs in a private VLAN domain share the
same primary VLAN. The secondary VLAN ID differentiates one subdomain from
another. The secondary VLANs may either be isolated VLANs or community VLANs. A
2. Click on Network, click on VLAN, and click on Dynamic. host on an isolated VLAN can only communicate with the associated promiscuous port
in its primary VLAN. Hosts on community VLANs can communicate among themselves
3. By default, forwarding entries for all ports are listed. You can click the Port drop- and with their associated promiscuous port but not with ports in other community
down list to select a specific port to view only the forwarding entries for the selected VLANs.
port. The following guidelines apply when configuring private VLANs: The default VLAN 1
cannot be a private VLAN. The management VLAN 4095 cannot be a private VLAN. The
If the entries span multiple pages, you can navigate page number in the Page field and management port cannot be a member of a private VLAN.IGMP Snooping must be
click Go or you can click First, Previous, Next, and Last Page to navigate the pages. disabled on isolated VLANs. Each secondary port's (isolated port and community ports)
PVID must match its corresponding secondary VLAN ID. Ports within a secondary VLAN
cannot be members of other VLANs. All VLANs that make up the private VLAN must
belong to the same Spanning Tree Group.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
Click on the Forwarding Ports ratio button that applies to your configuration. View the current VLAN database
Click Apply. Network > VLAN > Current
1. Log into your switch management page (see “Access your switch management page”
on page 7).
If the entries span multiple pages, you can navigate page number in the Page field and
click Go or you can click First, Previous, Next, and Last Page to navigate the pages.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
5. Click Save Settings to Flash, then click OK.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
Enable GVRP (GARP VLAN Registration Protocol) Set GVRP port settings
Bridge > GVRP > GVRP Global Settings Network > GVRP > Port Settings
The GARP VLAN Registration Protocol (GVRP) allows network devices to share VLAN This section will allow you to select which ports will have GVRP enabled or will be
information and to use the information to modify existing VLANs or create new VLANs, restricted from using GVRP.
automatically. This makes it easier to manage VLANs that span more than one switch.
Without GVRP, you have to manually configure your switches to ensure that the various
1. Log into your switch management page (see “Access your switch management page”
parts of the VLANs can communicate with each other across the different switches.
on page 7).
With GVRP, which is an application of the Generic Attribute Registration Protocol
(GARP), this is done for you automatically.
2. Click on Network, click on GVRP and click on Port Settings.
1. Log into your switch management page (see “Access your switch management page”
on page 7). 3. Review the settings for each port. Click Apply to save the settings.
Port - This parameter displays the ports on the switch.
2. Click on Network, click on GVRP, and click on GVRP Global Settings. Dynamic Vlan Status - This parameter defines the GVRP status of the port.
From the Dynamic Vlan Status field, select one of the following choices from
the pull-down menu:
3. Click the GVRP Status drop-down list and select Enabled to activate GVRP or disabled
to deactivate GVRP. Click Apply to save the settings. o Ignore - This parameter indicates that the setting in the All row does
not apply to the Dynamic Vlan Status field. In other words, each port
is set individually.
o Enable - The Dynamic Vlan is activated for the port row selected.
o Disable - The Dynamic Vlan is de-active for the port row selected.
Restricted VLAN Registration - This parameter controls if the VLAN registration
on the port is restricted or not.
4. In the left hand panel, click Tools, click on Configuration, and click Save. o Ignore - This parameter indicates that the setting in the All row does
not apply to the Restricted VLAN Registration field. In other words,
each port is set individually.
o Enable - The Restricted VLAN Registration is active for the port row
5. Click Save Settings to Flash, then click OK. selected.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the o Disable - The Restricted VLAN Registration is de-active for the port row
switch is rebooted or power cycled, the configuration changes will still be applied. selected.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
4. In the left hand panel, click Tools, click on Configuration, and click Save.
2. Click on Network, click on GVRP and click on Time Settings.
3. Review the settings for each port. Click Apply to save the settings.
5. Click Save Settings to Flash, then click OK.
Port - This parameter displays the ports on the switch.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
JoinTime - This parameter is the GARP Join Timer. Its range is 10 - 1073741810
switch is rebooted or power cycled, the configuration changes will still be applied.
milli-seconds.
LeaveTime - This parameter is the GARP Leave Timer. Its range is 30 -
2147483630 milli-seconds. This timer must be set in relation to the GVRP Join
Timer according to the following equation:
GARPLeaveTimer >= (GARPJoinTimer X 2) + 10
LeaveAllTime - This parameter is the GARP Leave All Timer. Its range is 40 -
2147483630 milli-seconds. This timer must be set in relation to the GVRP Leave
Timer according to the following equation:
GARPLeaveAllTimer > (GARPLeaveTimer + 10)
4. In the left hand panel, click Tools, click on Configuration, and click Save.
Configuring Voice VLANs However, it is possible that you can find more than one OUI from the same
Network > Voice VLAN manufacturer among the IP phones you are installing. It is also possible that your IP
phones are from two or more different manufacturers in which case you will find
This chapter contains a description of the Switch’s Voice VLAN feature and the
different OUIs for each manufacturer. If you identify more than one OUI among the IP
procedures to create, modify, and delete a voice VLAN configuration.
phones being installed, then one MAC address representing each individual OUI must be
The Voice VLAN feature is specifically designed to maintain high quality, uninterrupted configured in the voice VLAN. You can enter a total of 10 OUIs.
voice traffic through the switch. When talking on a voice over IP phone, a user expects
to have no interruptions in the conversation and excellent voice quality. The Voice VLAN
feature can be configured to meet these requirements. Dynamic Auto-Detection vs Static Ports
Prior to configuring the voice VLAN, you must configure a tagged VLAN which is the
basis for the voice VLAN configuration. The VLAN must be configured with one or more
CoS with Voice VLAN
tagged or untagged ports that will serve as the voice VLAN uplink/downlink. By default,
The Voice VLAN CoS parameter maintains the voice quality between the ingress and a tagged or untagged port is a static member of a tagged VLAN. The ports that you
egress ports of the switch. CoS must be enabled for the Voice VLAN CoS priority to take choose to configure as dynamic Auto-Detection ports
effect. The CoS priority level that you config is applied to voice traffic on all ports of the
must be connected directly to an IP phone. When you initially define the ports of a
voice VLAN. Normally, most (non-Voice) Ethernet traffic transverses the switch through
tagged VLAN for your voice VLAN configuration, they must be configured as a “Not
lower order egress queues. To avoid delays and interruptions in the voice data flow, the
Member” ports. The “Not Member” ports are eligible to dynamically join the voice VLAN
CoS priority level assigned to the voice VLAN should be mapped to a higher order queue
when voice data is detected with a predefined OUI in the source MAC address. The port
and the scheduling algorithm should be set to Strict Priority. These settings ensure that
will leave the voice VLAN after a specified timeout period. This port behavior is
the voice data packets are processed before other types of data so that the voice quality
configured with the voice VLAN Auto-Detection feature.
is maintained as the voice data passes through the switch.
For the Auto-Detection feature to function, your IP phone(s) must be capable of
generating 802.1Q packets with imbedded VLAN ID tags. You must manually configure
Organization Unique Identifier (OUI) your IP phone(s) for the same VLAN ID as the switch’s voice VLAN ID. When voice data is
Each IP phone manufacturer can be identified by one or more Organization Unique detected on one of the “Not Member” ports, the packets from the IP phone will contain
Identifiers (OUIs). An OUI is three bytes long and is usually expressed in hexadecimal the voice VLAN ID so they are switched within the switch’s voice VLAN.
format. It is imbedded into the first part of each MAC address of an Ethernet network One or more ports in your voice VLAN must be configured as Static tagged or untagged
device. You can find the OUI of an IP phone in the first three complete bytes of its MAC members. Static VLAN members are permanent member ports of the voice VLAN and
address. there is no dependency on the configuration of the devices connected to the ports.
Typically, you will find that all of the IP phones you are installing have the same OUI in These ports might be connected to other voice VLAN network nodes such as other
common. The switch identifies a voice data packet by comparing the OUI information in Ethernet switches, a telephone switch, or a DHCP server. The voice VLAN Auto-
the packet’s source MAC address with an OUI table that you configure when you initially Detection feature cannot be enabled on Static tagged or tagged ports.
set up the voice VLAN. This is important when the Auto-Detection feature for a port and Note: Any Static tagged members of the voice VLAN are required to have the port VLAN
is a dynamic voice VLAN port. ID (PVID) configured to be the same as the voice VLAN ID. This insures that all untagged
When you are configuring the voice VLAN parameters, you must enter the complete packets entering the port are switched within the voice VLAN as the voice data passes
MAC address of at least one of your IP phones. An “OUI Mask” is automatically through the switch.
generated and applied by the Web Management Utility software to yield the If the IP phone(s) that you are installing cannot be configured with a VLAN ID, then the
manufacturer’s OUI. If the OUI of the remaining phones from that manufacturer is the switch ports should be configured as Static tagged ports within the voice VLAN.
same, then no other IP phone MAC addresses need to be entered into the configuration.
Note: Link Layer Discovery Protocol for Media Endpoint Devices (LLDP- MED) is not port will be removed from the voice VLAN. The range is 1 to 120
supported on the switch. Each IP phone that is VLAN aware should be manually hours.
configured for the VLAN ID that matches your voice VLAN ID. Each of the voice VLAN o CoS - This parameter is CoS priority level assigned to the voice data
ports connected to an IP phone should be configured as “Not Member” ports of the packets received on each voice VLAN port. For the COS priority to be
tagged VLAN. effective, QoS must be Enabled.
Click Apply to save the settings.
Create a Voice VLAN
Network > Voice VLAN > Settings
Note: Prior to configuring your voice VLAN, you must first configure a tagged VLAN. This
VLAN will be used as a basis for your voice VLAN.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
Enter the MAC address in the User Defined OUI - Telephony OUI field of one of
the IP phones with the manufacturer's OUI.
Click Add. The new OUI entry is displayed in the table at the bottom of the
page.
Note: If you find more than one OUI among the IP phones you are installing,
enter one MAC address that represents each individual OUI. You can enter a
total of 10 OUIs.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
Enable and configure LLDP LLDP TX Delay: Sets the value of the transmission delay timer, which is the minimum
Link Layer Discovery Protocol (LLDP) allows Ethernet network devices, such as switches time interval between transmissions of LLDP advertisements due to a change in LLDP
and routers, to receive and transmit device-related information to directly connected local information. The range is from 1 to 8192 seconds.
devices on the network and to store data that is learned about other devices.
Click Apply to save the settings.
Network > LLDP > Settings
1. Log into your switch management page (see “Access your switch management page”
on page 7).
4. In the left hand panel, click Tools, click on Configuration, and click Save.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
3. For each port whose priority you want to change, select a priority (0-7, Ignore) in the
User Priority column. Click Apply to save the settings.
5. In the left hand panel, click Tools, click on Configuration, and click Save.
6. Click Save Settings to Flash, then click OK. 4. In the left hand panel, click Tools, click on Configuration, and click Save.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
Set DSCP (Differentiated Services Code Point) Class Mapping settings Set the Scheduling Algorithm
QoS > DSCP QoS > Scheduling Algorithm
If you choose to use the DSCP tags in your Access Control policy configuration, each
DSCP value (0-63) that is relevant to your configuration needs to be mapped to one of 1. Log into your switch management page (see “Access your switch management page”
the four egress queues(Low, Medium, High, or Highest). The default queue for all DSCP on page 7).
values is 0.To assign the queue mappings to the DSCP values, perform the following
procedure.
2. Click on QoS and click on Scheduling Algorithm.
1. Log into your switch management page (see “Access your switch management page”
on page 7). 3. Review the settings. Click Apply to save the settings.
Strict Priority - The port transmits all packets out of higher priority queues
before transmitting any from the lower priority queues.
2. Click on QoS and click on DSCP.
WRR (Weighted RoundRobin) - The port transmits a set number of packets
from each queue, in a round robin fashion, so that each has a chance to
3. For each DSCP In value that is relevant to your configuration, select a queue (Low, transmit traffic.
Medium, High, or Highest) in the Queue column. Select Enabled in the DSCP Mapping
drop-down list. Click Apply to save the settings.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
Configure the IPv6 Traffic Class Settings In the list, you can click Modify to modify an entry or click Delete or delete the entry.
QoS > IPv6 Traffic Class You can also click Delete All to delete all of the entries in the table. If the entries span
multiple pages, you can navigate page number in the Page field and click Go or you can
click First, Previous, Next, and Last Page to navigate the pages.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
IPv6 Traffic Class Global Settings: Select Enable or Disable. Click Apply to save 4. In the left hand panel, click Tools, click on Configuration, and click Save.
the settings.
IPv6 Traffic Class (0-255): Specify the value of IPv6 class.
Queue ID (0-7): Defines the priority assigned to the port.
Click Add to add the traffic class setting entry to the table. 5. Click Save Settings to Flash, then click OK.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
This chapter contains information about the Port-based security features and the Configure the following parameters as required:
procedures for setting this feature. NAS ID - This parameter assigns an 802.1x identifier to the switch that applies
to all ports. The NAS ID can be up to sixteen characters. Valid characters are 0
to 9, a to z, and A to Z. Spaces are allowed. Specifying an NAS ID is optional.
Configure Port Access Control
Port Access Control - This parameter enables or disables Port Access Control.
Security > Port Access Control
Select one of the following choices from the pulldown menu:
This section contains information and configuration procedures for the
o Enable: The Port Access Control feature is activated.
Port-based Access Control. Port-based Network Access Control (IEEE 802.1x) is used to
o Disable: The Port Access Control feature is de-activated.
control who can send traffic through and receive traffic from a switch port. With this
feature, the switch does not allow an end node to send or receive traffic through a port Authentication Method - This parameter indicates the authentication method
until the user of the node logs on by entering a user name and password. used by the switch. Select one of the following choices:
This feature can prevent an unauthorized individual from connecting a computer to a o RADIUS: This parameter configures port security for remote
port or using an unattended workstation to access your network resources. Only those authentication. After completing steps, you must configure the
users to whom you have assigned a user name and password are able to use the switch “RADIUS Client” section.
to access the network. o TACACS+: This parameter configures port security for terminal
This feature can be used with one of two authentication methods: authentication. After completing steps, you must configure the
“TACACS+ Settings” section.
The RADIUS authentication protocol requires that a remote RADIUS server is
present on your network. The RADIUS server performs the authentication of o Local: This parameter configures port security for local authentication.
the user name and password combinations. After completing steps, you must configure the parameters for “Dial-in
User— Local Authentication” section.
The Dial-in User (local) authentication method allows you to set up the
authentication parameters internally in the switch without an external server.
In this case, the user name and password combinations are entered in the
associated with an optional VLAN when they are defined. Based on these
entries, the authentication process is done locally by the Web Management
Utility using a standard EAPOL transaction.
Note: RADIUS with Extensible Authentication Protocol (EAP) extensions is the only
supported authentication server for this feature.
1. Log into your switch management page (see “Access your switch management page” 4. Click Save Settings to Flash (menu).
on page 7).
5. Click Save Settings to Flash (button), then click OK.
2. Click on Security and click on Port Access Control. Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
Create Dial-In Users (Local Authentication Method) In the list, you can click Modify to modify an entry or click Delete or delete the entry.
Security > Dial-in User You can also click Delete All to delete all of the entries in the table. If the entries span
multiple pages, you can navigate page number in the Page field and click Go or you can
Dial-in User feature provides the local authentication server for port security when a
click First, Previous, Next, and Last Page to navigate the pages.
remote (RADIUS) server is not available.
The Dial-in User (local) authentication method allows you to set up 802.1x
authentication parameters internally in the Switch. In this case, the user name and
password combinations are entered with an optional VLAN when they are defined.
Based on these entries, the authentication process of a supplicant is done locally by the
Switch Management Utility using a standard EAPOL (EAP over LAN) transaction.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
4. In the left hand panel, click Tools, click on Configuration, and click Save.
3. Review the settings. 5. Click Save Settings to Flash, then click OK.
To create a dial-in user for local authentication, use the following procedure: Note: This step saves all configuration changes to the NV-RAM to ensure that if the
In the User Name field, type a name for the user. switch is rebooted or power cycled, the configuration changes will still be applied.
In the Password field, type a password for the user.
In the Dynamic VLAN field, enter the VID of the VLAN which you will allow the
user to access. If you enter 0, this field will be ignored.
Add RADIUS Servers (RADIUS Authentication Method) In the list, you can click Modify to modify an entry or click Delete or delete the entry.
Security > RADIUS
1. Log into your switch management page (see “Access your switch management page”
on page 7).
3. Review the settings. 4. In the left hand panel, click Tools, click on Configuration, and click Save.
Server Priority – Enter the RADIUS Server priority (Highest: 1, Lowest: 5).
Server IP Address –Select IPv4 or IPv6 and set the RADIUS server IP address
and enter the IP address of the RADIUS server you would like to add.
5. Click Save Settings to Flash, then click OK.
Server Port (1 - 65535) –Set the RADIUS authentic server(s) UDP port. The
default port is 1812. Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
Accounting Port (1 - 65535) –Set the RADIUS account server(s) UDP port. The
default port is 1813.
Shared Secret – Enter the default authentication and encryption key for RADIUS
communication between the device and the RADIUS server.
1. Log into your switch management page (see “Access your switch management page”
on page 7). In the list, you can click Modify to modify an entry or click Delete or delete the entry.
Destination MAC Filter 4. The MAC address will be added to the table.
Security > Destination MAC Filter
This section contains an explanation of the Destination MAC Filter feature as well a In the list, you can click Modify to modify an entry or click Delete or delete the entry.
procedure for configuring it. This section includes the following information: You can also click Delete All to delete all of the entries in the table. If the entries span
The Destination MAC Filter feature prevents the switch from forwarding packets to a multiple pages, you can navigate page number in the Page field and click Go or you can
specified device. On the Destination MAC Filter Page of the Web Management Utility click First, Previous, Next, and Last Page to navigate the pages.
software, enter the MAC address of the device that you want to filter.
After the switch receives a packet, it examines the destination MAC address of the
packet. If the destination MAC address matches a MAC address set in the filter, the
software prevents the switch from forwarding it and drops the packet.
You may want to block access to a device within your organization. For instance, you
may not want users on the Sales group switch to have access to a server on the
Accounting group switch. You can enter the MAC address of the Accounting server as a
destination MAC address filter on the Sales group switch. When a packet destined for
the Accounting server is received by the Sales group switch, the switch drops the packet. 4. In the left hand panel, click Tools, click on Configuration, and click Save.
The Destination MAC Filter is a subset of the static MAC address.
3. Enter the MAC Address to add to the destination filter table. Click Add.
Denial of Service (DoS) 3. Next to the DoS item/rule you would like to activate, click the drop-down menu on
Security > Denial of Service the right hand side and select Deny.
The switch has built-in DoS prevention features to restrict specific type of traffic
associated denial of service attacks on your network. By default, all of the DoS settings
are set to Allow, which allow any type of traffic to pass through the switch. Setting one
of the items to Deny will set the switch to check for traffic matching the selected item
and deny any traffic matching the rule. On the other hand, setting one of rules to Deny
may deny a specific type of traffic that may prevent traffic essential to running your
4. Click Apply to save the settings.
network such as devices in load balancing configuration using virtual IP addresses (Ex. If
ARP MAC SA Mismatch is set to Deny, it may cause devices in load balance configuration Note: You can click “Reset to Default” to restore all DoS settings to Allow.
using shared virtual IP addresses communication issues essential for network server
load balancing.) For additional security, you can set these rules to Deny as necessary.
1. Log into your switch management page (see “Access your switch management page” 4. In the left hand panel, click Tools, click on Configuration, and click Save.
on page 7).
Enable DHCP Snooping o Disable - The MAC address of each ingress ARP packet is not validated
DHCP Snooping > Settings against the Binding Table. All ARP packets are forwarded through the
switch without regard to the IP and MAC Address information in the
Here is a summary of the rules to observe when you configure DHCP Snooping:
packet header.
A trusted port is connected to one of the following: Backup Database - select one of the following choices from the pull-down
o Directly to the legitimate trusted DHCP Server. menu:
o A network device relaying DHCP messages to and from a trusted o Enable - The Web Management Utility Software saves a backup copy
server. of the Binding Table to flash at a specified interval (Database Update
Interval) of time.
o Another trusted source such as a switch with DHCP Snooping enabled.
o Disable - The Web Management Utility Software does not save a
o Untrusted ports are connected to DHCP clients and to traffic that backup copy of the Binding Table to flash.
originates outside of the local area network. Database Update Interval - Enter the database update interval. The range of
The VLANs to which the DHCP Snooping feature applies must be specified in this interval is 600 to 86400 seconds.
the DHCP Snooping VLAN Setting configuration. DHCP Option 82 Insertion - select one of the following choices from the pull-
Any static IP addresses on the network must be manually added to the Binding down menu:
Database. o Enable: The Web Management Utility software inserts the DHCP
Option 82 information into the DHCP packets.
o Disable: The Web Management Utility software does not insert the
1. Log into your switch management page (see “Access your switch management page” DHCP Option 82 information into the DHCP packets.
on page 7).
4. In the left hand panel, click Tools, click on Configuration, and click Save. Assign DHCP Snooping to VLAN interfaces
Security > DHCP Snooping > VLAN
In this section, you can define an existing VLAN to apply DHCP snooping.
3. In the field, enter the existing VLAN ID to apply DHCP Snooping. Then click Add to add
the VLAN entry to the table.
In the list, you can click Modify to modify an entry or click Delete or delete the entry.
You can also click Delete All to delete all of the entries in the table. If the entries span
multiple pages, you can navigate page number in the Page field and click Go or you can
click First, Previous, Next, and Last Page to navigate the pages.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
5. Click Save Settings to Flash, then click OK.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
Set Trusted DHCP Server Interfaces Configure DHCP Address Binding Database
Security > DHCP Snooping > Interfaces Security > DHCP Snooping > Binding
This section allows you to set trusted port interfaces where DHCP servers can be The Binding Database displays learned and statically assigned MAC
connected allows or denies DHCP server information to be received on those ports. Address and IP Address information for each host on the local area
network. Dynamically assigned IP addresses from the DHCP server will automatically
1. Log into your switch management page (see “Access your switch management page” populate the table on the Binding Database page as they are assigned by the server.
on page 7). Statically assigned IP addresses are entered manually by entering the host’s address
information and clicking on the Add button.
2. Click on Security, click on DHCP Snooping, and click on Interfaces.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
3. Next to each port, click the Trust drop-down list and select one of the following
options.
Disable: This parameter defines the port as untrusted for the DHCP Snooping 2. Click on Security, click on DHCP Snooping, and click on Binding.
feature.
Enable: This parameter defines the port as trusted for the DHCP Snooping 3. Review the settings. Click Add to add the database entry to the table.
feature. MAC Address - Enter the host’s MAC Address.
Note: You can select the row labeled ALL to apply settings to all ports. IP Address - Enter the static IP Address assigned to the host.
VLAN - Enter the host’s VLAN ID.
Port - Enter the port number where the host is connected.
Type - Because the IP Address being entered is static, you must select Static.
Lease Time - Enter the time that IP address assignment is valid. The range is 10
to 4294967295 seconds.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
Configure Access Control Lists (ACL) o MAC Address – Indicates ACL action will be taken on packets to the
Security > ACL specified MAC address.
Access Control configuration allows you to control different aspects of the Ethernet o IPv4 Address- Indicates ACL action will be taken on packets to the
traffic as it enters the switch ports and is process through the Switch. You can specify specified IPv4 source address.
what traffic is permitted or denied to flow through the switch by setting up specific filter o IPv6 Address- Indicates ACL action will be taken on packets to the
criteria at an ingress port. You can also manage the switching priority of Ethernet specified IPv6 address.
packets. All of this is done by specifying policies that define the filtering and priority Service Type- Defines the type of service.
behavior.
o Any- Indicates the ACL action will be taken on packets of all types of
service.
Configure Policy Settings
o EtherType- Specifies EtherType packet filtering.
Security > ACL > ACL Configuration Wizard
o ICMP All- Specifies ICMP packet filtering.
The ACL Configuration Wizard page allows for simple configuration of ACL profiles and
rules. o IGMP- Specifies IGMP packet filtering.
o TCP All- Specifies TCP packet filtering.
1. Log into your switch management page (see “Access your switch management page” o TCP Source Port- Matches packet to corresponding TCP Source Port.
on page 7). o TCP Destination Port- Matches packet to corresponding TCP
Destination Port.
2. Click on Security, click on ACL, and click on ACL Configuration Wizard. o UDP All- Specifies UDP packet filtering.
o UDP Source Port- Matches packet to the corresponding UDP Source
Port.
3. Review the settings. Click Apply to save the settings.
o UDP Destination Port- Matches packet to the corresponding UDP
Destination Port.
ACL Configuration Wizard
Action- Defines the ACL action linked to the rule criteria.
Create an ACL rule by selecting the appropriate fields.
o Permit- This selection allows ingress packets that conform to the
Source- Defines the access packet origin. specified ACL criteria.
o Any- Indicates ACL action will be taken on packets from any source. o Deny- This selection drops ingress packets that conform to the
o MAC Address – Indicates ACL action will be taken on packets from the specified ACL criteria.
specified MAC address. o Rate Limiting- Activates rate limiting if all ACL criteria are met.
o IPv4 Address- Indicates ACL action will be taken on packets from the o Replace DSCP- Enter a number in the Replaced-DSCP field within the
specified IPv4 source address. range of 0 to 63. This field indicates the DSCP level of interest. This
o IPv6 Address- Indicates ACL action will be taken on packets from the field is not mandatory and you may elect to leave it blank.
specified IPv6 address. Ports- Defines the ports to be configured.
Destination- Defines the access packet destination.
o Any- Indicates ACL action will be taken on packets to any destination.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
In the list, you can click Show Details to view the ACL Profile details, click Edit/New
Rules to edit or create rule details, or delete the entry. You can also click Delete All to
delete all of the entries in the table.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
4. In the left hand panel, click Tools, click on Configuration, and click Save.
Find your ACL rules 5. Modify existing ACL rules by editting established rule details.
Security > ACL > ACL Finder
Allows you to view current policies assigned to each port by Index or Sequence.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
4. Navigate to the folder on your computer where the unzipped firmware file (.hex) is
2. Unzip the file to a folder on your computer. located and select it.
Please note the following:
Do not interrupt the firmware upgrade process. Do not turn off the device or
5. Click Apply. If prompted, click Yes or OK.
press the Reset button during the upgrade.
If you are upgrade the firmware using a laptop computer, ensure that the laptop
is connected to a power source or ensure that the battery is fully charged. Firmware Upgrade via TFTP Settings
Disable sleep mode on your computer as this may interrupt the firmware upgrade Tools > Firmware Upgrade
process.
Do not upgrade the firmware using a wireless connection, only using a wired Note: Before using this method, you will require a TFTP server. There are third party
TFTP server applications available for this function. If you are not familiar with the TFTP
network connection.
protocol, it is recommended to use the HTTP method.
Any interruptions during the firmware upgrade process may permanently
damage your switch.
1. Log into your switch management page (see “Access your switch management page”
on page 7).
3. Make sure your TFTP server is running and note the IP address of your server and Backup and restore your switch configuration settings
firmware file name. The TFTP server should be in the same IP subnet as the switch.
Tools > Configuration > Backup/Restore
Note: It is recommended to that the firmware file (.hex) is placed in your TFTP server
root directory. You may have added many customized settings to your switch and in the case that you
need to reset your switch to default, all your customized settings would be lost and
would require you to manually reconfigure all of your switch settings instead of simply
5. Review the settings. Click Apply to start the firmware upgrade. restoring from a backed up switch configuration file. The configuration will be backed up
TFTP Server IP: Enter the IP address of your TFTP server. or restored only to the currently used image.
Image File Name: Enter the firmware filename with extension. (.hex)
Retry Count: Defined the number of time to attempt to pull the firmware file Backup/Restore via HTTP Settings
from the TFTP server. To backup your switch configuration:
1. Log into your switch management page (see “Access your switch management page”
6. Click Apply to start the firmware upgrade. on page 7).
2. Click on Tools, click on Configuration and click on Backup/Restore, under via HTTP.
3. Click Backup to save the configuration file (config.bin) to your local hard drive.
Note: If prompted, choose the location on your local hard drive. If you are not prompted,
the configuration file (config.bin) will be saved to your default downloads folder.
To backup your switch configuration: 2. Click on Tools, click on Configuration and click on Backup/Restore, under via TFTP.
1. Log into your switch management page (see “Access your switch management page” 3. Make sure your TFTP server is running and note the IP address of your server and
on page 7). configuration file name. The TFTP server should be in the same IP subnet as the switch.
Note: It is recommended to put the configuration file (config.bin) is placed in your TFTP
2. Click on Tools, click on Configuration and click on Backup/Restore, under via TFTP. server root directory.
3. Make sure your TFTP server is running and note the IP address of your server and 4. Review the settings. Click Restore to restore the switch configuration file (config.bin)
firmware file name. The TFTP server should be in the same IP subnet as the switch. from your local hard drive from your TFTP server root directory.
TFTP Server IP: Enter the IP address of your TFTP server.
4. Review the settings. Click Backup to save the configuration file (config.bin) to your Config File Name: Enter the configuration file name to restore. (Default:
local hard drive on your TFTP server root directory. config.bin)
TFTP Server IP: Enter the IP address of your TFTP server.
Config File Name: Enter the configuration file name for the backup. (Default:
config.bin)
Cable Diagnostics Test The results will be displayed in the Cable Diagnostic Table below.
Note:
1. If the cable length displays N/A, it means that the cable length is Not Available. The
may be due to the port being unable to determine the estimated cable length. If length is
displayed as “N/A” it means the cable length is “Not Available”. This is due to the port
being unable to obtain cable length/either because its link speed is 10M or 100M, or the
cables used are broken and/or of bad in quality. Test Results: Displays the diagnostic results for each pair in the cable. One of
the following cable status parameters is displayed:
2. The deviation of “Cable Fault Distance” is +/- 2 meters. No cable may be displayed in o OK: There is no problem detected with the cable.
the table when the cable is less than 2 meters in length. o Open in Cable: There is an open wire within the cable.
o Short in Cable: Two wires are shorted together within the cable.
3. The test also measures the cable fault and identifies the fault in length according to o Cross talk in Cable: There is crosstalk detected between one pair
the distance from the switch. o of wires and another pair within the cable.
Cable Fault Distance: This parameter specifies the distance from the switch
1. Log into your switch management page (see “Access your switch management page” port to the cable fault.
on page 7). Cable Length: This parameter specifies the length of the cable connected to the
switch port.
2. Click on Tools and click on Cable Diagnostic.
3. Click on the Port drop-down list to select which port to run the cable diagnostic and
click Test Now to run the test.
Tools > Reboot You may want to reset your switch to factory defaults if you are encountering difficulties
with your switch and have attempted all other troubleshooting. Before you reset your
This section provides the procedures for rebooting or resetting the switch to factory switch to defaults, if possible, you should backup your switch configuration first, see
default settings. “Backup and restore your switch configuration settings” on page 79.
To reboot your switch: There are two methods that can be used to reset your switch to factory defaults.
You may want to reboot your switch if you are encountering difficulties with your switch Hardware Method: Using a paper clip, on the front panel of the switch, push
and have attempted all other troubleshooting. and hold the Reset button more than 6 seconds and release. Located on the
Note: You may want to save the settings to flash before reboot the switch under Save front panel of your switch, see “Product Hardware Features” on page 2. Use
Settings to Flash (menu) > Save Settings to Flash (button). If you have not saved your this method if you are encountering difficulties with accessing your switch
current configuration settings to flash first, the configuration changes will be lost after a management page.
reboot.
3. Click the Reboot Type drop-down list and select Normal and click Apply to initiate a
reboot. Wait for the switch complete the rebooting process.
The switch factory default settings are below.
Administrator User Name admin
Administrator Password admin
Switch IP Address 192.168.10.200
Switch Subnet Mask 255.255.255.0
1. Log into your switch management page (see “Access your switch management page”
on page 7).
3. Review the settings. Click Start to start the network connectivity ping test. After the
ping test is activate, you can click Show Ping Results to check the ping test result.
Destination IP Address - The IP address of the node you want to ping in the
IPv4 or IPv6 format.
Timeout Value - Specifies the length of time, in seconds, the switch waits for a
response before assuming that a ping has failed.
Number of Ping Requests - Specifies the number of ping requests you want the
switch to perform.
System Requirements
Installation
Device Setting Firmware Upgrade: When the device has a new function, there will be a new firmware
to update the device, use this function to update.
You can set the device by using the function key in the Device Setting Dialog box.
Configuration Setting: In this Configuration Setting, you can set the IP Address, Subnet
Mask, Gateway, Group Interval, System name, Location and IP Mode.
Select the device in the Discovery list or Monitor List and press this button, then the
Configuration Setting window will appear, after entering the data that you want to
change, you must enter the password and press the “Set” to process the data change
immediately. The default password of TRENDnet Web Smart Switches is “admin”.
Access Web: Double click the device in the Monitor List or select a device in the Monitor
List and press this “Web Access” button to access the device in Web browser.
DHCP Refresh: Press this “DHCP Refresh” button to refresh IP address of selected device
form DHCP server. (Only applies if Web Smart switch IP address settings are set to
DHCP).
Password Change: You can use this Password Change when you need to change the
password, fill in the password needed in the dialog box and press “Set” button to
proceed the password change immediately.
In the “File TAB”, there are Monitor Save, Monitor Save As, Monitor Load and Exit.
Monitor Save: To record the setting of the Monitor List to the default, when you
open the Web Management Utility next time, it will auto load the default
recorded setting.
Monitor Save As: To record the setting of the Monitor List in appointed filename
and file path.
Monitor Load: To manually load the setting file of the Monitor List.
Exit: To exit the Web Management Utility.
In the “View TAB”, there are view log and clear log function, this function will help you
to show trap setting.
View Log: To show the event of the Web Management Utility and the device.
Clear Log: to clear the log.
In the “Option TAB”, there are Refresh Time and Group Interval
Refresh Time: This function helps you to refresh the time of monitoring the
device. Choose 15 secs, 30 secs, 1 min, 2 min and 5 min to select the time of
monitoring.
Group Interval: 120~1225
In the “Help TAB”, there is About function, it will show out the version of the Web
Management Utility.
Note: If you are experiencing difficulties, please contact your computer or operating
Appendix system manufacturer for assistance.
How to find your IP address?
Note: Please note that although the following procedures provided to follow for your How to configure your network settings to use a static IP address?
operating system on configuring your network settings can be used as general
guidelines, however, it is strongly recommended that you consult your computer or Note: Please note that although the following procedures provided to follow for your
operating system manufacturer directly for assistance on the proper procedure for operating system on configuring your network settings can be used as general
configuring network settings. guidelines, however, it is strongly recommended that you consult your computer or
operating system manufacturer directly for assistance on the proper procedure for
configuring network settings.
Command Prompt Method
Windows 2000/XP/Vista/7/8.1/10 Windows 7/8.1/10
1. On your keyboard, press Windows Logo+R keys simultaneously to bring up the Run a. Go into the Control Panel, click Network and Sharing Center.
dialog box. b. Click Change Adapter Settings, right-click the Local Area Connection icon.
2. In the dialog box, type cmd to bring up the command prompt. c. Then click Properties and click Internet Protocol Version 4 (TCP/IPv4).
3. In the command prompt, type ipconfig /all to display your IP address settings. d. Then click Use the following IP address, and assign your network adapter a
MAC OS X static IP address. Click OK
1. Navigate to your Applications folder and open Utilities. Windows Vista
2. Double-click on Terminal to launch the command prompt. a. Go into the Control Panel, click Network and Internet.
3. In the command prompt, type ipconfig getifaddr <en0 or en1> to display the wired b. Click Manage Network Connections, right-click the Local Area Connection
or wireless IP address settings. icon and click Properties.
Note: en0 is typically the wired Ethernet and en1 is typically the wireless Airport c. Click Internet Protocol Version (TCP/IPv4) and then click Properties.
interface. d. Then click Use the following IP address, and assign your network adapter a
static IP address. Click OK
Graphical Method Windows XP/2000
a. Go into the Control Panel, double-click the Network Connections icon
MAC OS 10.6/10.5
b. Right-click the Local Area Connection icon and the click Properties.
1. From the Apple menu, select System Preferences. c. Click Internet Protocol (TCP/IP) and click Properties.
2. In System Preferences, from the View menu, select Network.
3. In the Network preference window, click a network port (e.g., Ethernet, AirPort, d. Then click Use the following IP address, and assign your network adapter a
modem). If you are connected, you'll see your IP address settings under "Status:" static IP address. Click OK
MAC OS 10.4/10.5/10.6
MAC OS 10.4 a. From the Apple, drop-down list, select System Preferences.
1. From the Apple menu, select Location, and then Network Preferences. b. Click the Network icon.
2. In the Network Preference window, next to "Show:", select Network Status. You'll see c. From the Location drop-down list, select Automatic.
your network status and your IP address settings displayed. d. Select and view your Ethernet connection.
Note: If you are experiencing difficulties, please contact your computer or operating
system manufacturer for assistance.
In MAC OS 10.4,
1. Apple Menu > System Preferences > Network
2. From the Show menu, select Built-in Ethernet.
3. On the Ethernet tab, the Ethernet ID is your MAC Address.
In MAC OS 10.5/10.6,
1. Apple Menu > System Preferences > Network
2. Select Ethernet from the list on the left.
3. Click the Advanced button.
3. On the Ethernet tab, the Ethernet ID is your MAC Address.
This equipment has been tested and found to comply with the limits for a Class A digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference when the equipment is operated in a commercial Europe – EU Declaration of Conformity
environment. This equipment generates, uses, and can radiate radio frequency energy, and if
it is not installed and used in accordance with the instruction manual, it may cause harmful
interference to radio communications. Operation of this equipment in a residential area is EN 60950-1:2006+A11:2009+A1:2010+A12:2011+A2:2013
likely to cause harmful interference, in which case the user will be required to correct the EN 55032:2012+AC: 2013 (CISPR32:2012) (Class A)
interference at his own expense. EN 61000-3-2:2014
EN 61000-3-3:2013
WARNING: Any changes or modifications to this product not expressly approved by the party EN 55024:2010
responsible for compliance could void the user’s authority to operate the equipment. AS/NZS CISPR 32:2013
Limited Warranty In the event that, after evaluation, TRENDnet cannot replace the defective product or
there is no comparable model available, we will refund the depreciated value of the
TRENDnet warrants only to the original purchaser of this product from a TRENDnet product.
authorized reseller or distributor that this product will be free from defects in material
and workmanship under normal use and service. This limited warranty is non-
If a product does not operate as warranted during the applicable warranty period,
transferable and does not apply to any purchaser who bought the product from a
TRENDnet shall reserve the right, at its expense, to repair or replace the defective
reseller or distributor not authorized by TRENDnet, including but not limited to
product or part and deliver an equivalent product or part to the customer. The
purchases from Internet auction sites.
repair/replacement unit's warranty continues from the original date of purchase. All
products that are replaced become the property of TRENDnet. Replacement products
Limited Warranty may be new or reconditioned. TRENDnet does not issue refunds or credit. Please
TRENDnet warrants its products against defects in material and workmanship, under contact the point-of-purchase for their return policies.
normal use and service. Specific warranty periods are listed on each of the respective
product pages on the TRENDnet website. TRENDnet shall not be responsible for any software, firmware, information, or memory
AC/DC Power Adapter, Cooling Fan, and Power Supply carry a one-year data of customer contained in, stored on, or integrated with any products returned to
warranty. TRENDnet pursuant to any warranty.
shipping from outside of the USA and Canada are responsible for any return shipping CONTRACT OR TORT (INCLUDING NEGLIGENCE), FOR INCIDENTAL, CONSEQUENTIAL,
and/or customs charges, including but not limited to, duty, tax, and other fees. INDIRECT, SPECIAL, OR PUNITIVE DAMAGES OF ANY KIND, OR FOR LOSS OF REVENUE OR
PROFITS, LOSS OF BUSINESS, LOSS OF INFORMATION OR DATE, OR OTHER FINANCIAL
LOSS ARISING OUT OF OR IN CONNECTION WITH THE SALE, INSTALLATION,
Refurbished product: Refurbished products carry a 90-day warranty after date of
MAINTENANCE, USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF THE POSSIBILITY
purchase. Please retain the dated sales receipt with purchase price clearly visible as
OF SUCH DAMAGES, AND LIMITS ITS LIABILITY TO REPAIR, REPLACEMENT, OR REFUND
evidence of the original purchaser's date of purchase. Replacement products may be
OF THE PURCHASE PRICE PAID, AT TRENDNET'S OPTION. THIS DISCLAIMER OF LIABILITY
refurbished or contain refurbished materials. If TRENDnet, by its sole determination, is
FOR DAMAGES WILL NOT BE AFFECTED IF ANY REMEDY PROVIDED HEREIN SHALL FAIL
unable to replace the defective product, we will offer a refund for the depreciated value
OF ITS ESSENTIAL PURPOSE.
of the product.
Governing Law: This Limited Warranty shall be governed by the laws of the state of
WARRANTIES EXCLUSIVE: IF THE TRENDNET PRODUCT DOES NOT OPERATE AS
California.
WARRANTED ABOVE, THE CUSTOMER'S SOLE REMEDY SHALL BE, AT TRENDNET'S
OPTION, REPAIR OR REPLACE. THE FOREGOING WARRANTIES AND REMEDIES ARE
EXCLUSIVE AND ARE IN LIEU OF ALL OTHER WARRANTIES, EXPRESSED OR IMPLIED, Some TRENDnet products include software code written by third party developers.
EITHER IN FACT OR BY OPERATION OF LAW, STATUTORY OR OTHERWISE, INCLUDING These codes are subject to the GNU General Public License ("GPL") or GNU Lesser
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. General Public License ("LGPL").
TRENDNET NEITHER ASSUMES NOR AUTHORIZES ANY OTHER PERSON TO ASSUME FOR
IT ANY OTHER LIABILITY IN CONNECTION WITH THE SALE, INSTALLATION,
Visit http://www.trendnet.com/gpl or the support section on
MAINTENANCE, OR USE OF TRENDNET'S PRODUCTS.
http://www.trendnet.com and search for the desired TRENDnet product to access to
the GPL Code or LGPL Code. These codes are distributed WITHOUT WARRANTY and are
TRENDNET SHALL NOT BE LIABLE UNDER THIS WARRANTY IF ITS TESTING AND subject to the copyrights of the developers. TRENDnet does not provide technical
EXAMINATION DISCLOSE THAT THE ALLEGED DEFECT IN THE PRODUCT DOES NOT EXIST support for these codes. Please visit http://www.gnu.org/licenses/gpl.txt or
OR WAS CAUSED BY CUSTOMER'S OR ANY THIRD PERSON'S MISUSE, NEGLECT, http://www.gnu.org/licenses/lgpl.txt for specific terms of each license.
IMPROPER INSTALLATION OR TESTING, UNAUTHORIZED ATTEMPTS TO REPAIR OR PWP07172015v3 2017/05/22
MODIFY, OR ANY OTHER CAUSE BEYOND THE RANGE OF THE INTENDED USE, OR BY
ACCIDENT, FIRE, LIGHTNING, OR OTHER HAZARD.
LIMITATION OF LIABILITY: TO THE FULL EXTENT ALLOWED BY LAW, TRENDNET ALSO
EXCLUDES FOR ITSELF AND ITS SUPPLIERS ANY LIABILITY, WHETHER BASED IN