User Guide
Page 2
...If you use an older web browser, you should pay special attention to add http:// in front of the web address. Copyright © 2007 Cisco Systems, Inc. WARNING: This exclamation point indicates that there is a caution or warning and it . Resource Website Linksys www.linksys.com Linksys ...Guide i All rights reserved. About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that...
...If you use an older web browser, you should pay special attention to add http:// in front of the web address. Copyright © 2007 Cisco Systems, Inc. WARNING: This exclamation point indicates that there is a caution or warning and it . Resource Website Linksys www.linksys.com Linksys ...Guide i All rights reserved. About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that...
User Guide
Page 6
... 58 Gigabit Ethernet 58 Fiber Optic Cabling 58 Appendix B: Introduction 59 Startup Menu Procedures 59 Appendix C: Glossary 61 Appendix D: Specifications 65 Appendix E: Warranty Information 73 Exclusions and Limitations 73 Obtaining Warranty Service 73 Technical Support 74 Appendix F: Regulatory Information 75 ... 75 Safety Notices 75 Industry Canada Statement 75 Avis d' Industrie Canada 75 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 76 Appendix G: Contact Information 80 8-Port 10/100 Ethernet...
... 58 Gigabit Ethernet 58 Fiber Optic Cabling 58 Appendix B: Introduction 59 Startup Menu Procedures 59 Appendix C: Glossary 61 Appendix D: Specifications 65 Appendix E: Warranty Information 73 Exclusions and Limitations 73 Obtaining Warranty Service 73 Technical Support 74 Appendix F: Regulatory Information 75 ... 75 Safety Notices 75 Industry Canada Statement 75 Avis d' Industrie Canada 75 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 76 Appendix G: Contact Information 80 8-Port 10/100 Ethernet...
User Guide
Page 7
...Power over Ethernet on 4 ports simultaneously or 8 ports at half power. 1 For the purpose of traffic on 8 ports simultaneously. If a specific model number is mentioned, then the feature is secured using 802.1x security using various Class of reliability in your network. Extensive QoS features makes...1000 RJ-45 ports and 2 shared MiniGBIC slots. Configuration of Ethernet limited for realtime applications like Voice and Video. User control is specific to operate if one of these devices in that the system continues to that allow you to expand and grow your network securely....
...Power over Ethernet on 4 ports simultaneously or 8 ports at half power. 1 For the purpose of traffic on 8 ports simultaneously. If a specific model number is mentioned, then the feature is secured using 802.1x security using various Class of reliability in your network. Extensive QoS features makes...1000 RJ-45 ports and 2 shared MiniGBIC slots. Configuration of Ethernet limited for realtime applications like Voice and Video. User control is specific to operate if one of these devices in that the system continues to that allow you to expand and grow your network securely....
User Guide
Page 11
... you connect your network devices, make sure you are three ways to Switch Notebook 1U high rack for desktop placement, mount the switch in "Appendix D: Specifications" as you don't exceed the maximum cabling distance of two inches (50mm). •• Do not stack free-standing Switches more than four units high...
... you connect your network devices, make sure you are three ways to Switch Notebook 1U high rack for desktop placement, mount the switch in "Appendix D: Specifications" as you don't exceed the maximum cabling distance of two inches (50mm). •• Do not stack free-standing Switches more than four units high...
User Guide
Page 24
...Switch with a screen resolution of the main tabs to view additional tabs. Setup > Summary Device Information System Name Displays the name for specific switches are noted. Subnet Mask The Subnet Mask of the Switch. Additional features for the Switch, if one of 1024 x 768. ... The web-based utility is displayed here (configurable from Setup > Network Settings tab). The first time you have modified this chapter, unless specifically identified, are included in the web-based utility are displayed. You can set a password later from Setup > Network Settings tab). Click one...
...Switch with a screen resolution of the main tabs to view additional tabs. Setup > Summary Device Information System Name Displays the name for specific switches are noted. Subnet Mask The Subnet Mask of the Switch. Additional features for the Switch, if one of 1024 x 768. ... The web-based utility is displayed here (configurable from Setup > Network Settings tab). The first time you have modified this chapter, unless specifically identified, are included in the web-based utility are displayed. You can set a password later from Setup > Network Settings tab). Click one...
User Guide
Page 27
... be configured only when auto-negotiation is the current setting of the port's Auto Negotiation feature. If using an SFP module, Auto Negotiation for the specific port should be entered by clicking on that has been suspended, click the checkbox. Flow Control This is a Private VLAN Edge (PVE) port, it bypasses...
... be configured only when auto-negotiation is the current setting of the port's Auto Negotiation feature. If using an SFP module, Auto Negotiation for the specific port should be entered by clicking on that has been suspended, click the checkbox. Flow Control This is a Private VLAN Edge (PVE) port, it bypasses...
User Guide
Page 32
...VLAN Creation When the checkbox is checked, Dynamic VLAN creation is untagged. The possible field values are: •• Port Defines the specific port for which RMON statistics are displayed. Join VLAN Detail The Join VLAN Detail screen allows you to a VLAN. VLAN Management > ...is tagged or untagged. Join VLAN Detail VLAN Management > GVRP GARP VLAN Registration Protocol (GVRP) is specifically provided for which RMON statistics are displayed. •• LAG Defines the specific LAG for automatic distribution of a LAG. The GVRP screen is divided into two areas, GVRP and...
...VLAN Creation When the checkbox is checked, Dynamic VLAN creation is untagged. The possible field values are: •• Port Defines the specific port for which RMON statistics are displayed. Join VLAN Detail The Join VLAN Detail screen allows you to a VLAN. VLAN Management > ...is tagged or untagged. Join VLAN Detail VLAN Management > GVRP GARP VLAN Registration Protocol (GVRP) is specifically provided for which RMON statistics are displayed. •• LAG Defines the specific LAG for automatic distribution of a LAG. The GVRP screen is divided into two areas, GVRP and...
User Guide
Page 34
RMON History Statistics > History Table The RMON History screen contains interface specific statistical network samplings. Sample No Indicates the sample number from which RMON statistics are : 28 This number includes bad packets and FCS ...received on the interface since the device was last refreshed. Utilization Displays the percentage of samples taken. Statistics > RMON Alarms Alarm Entry Indicates a specific alarm. Drop Events Displays the number of octets received on the interface since the device was last refreshed, including bad packets, Multicast and Broadcast packets...
RMON History Statistics > History Table The RMON History screen contains interface specific statistical network samplings. Sample No Indicates the sample number from which RMON statistics are : 28 This number includes bad packets and FCS ...received on the interface since the device was last refreshed. Utilization Displays the percentage of samples taken. Statistics > RMON Alarms Alarm Entry Indicates a specific alarm. Drop Events Displays the number of octets received on the interface since the device was last refreshed, including bad packets, Multicast and Broadcast packets...
User Guide
Page 36
... Indicates that the statistics are refreshed every 60 seconds. Statistics > 802.1x Statistics The 802.1X Statistics screen contains information about EAP packets received on a specific port. Packet Displays the amount of the screen. Statistics > Events Log Time Displays the time that the statistics are refreshed every 30 seconds. ••...
... Indicates that the statistics are refreshed every 60 seconds. Statistics > 802.1x Statistics The 802.1X Statistics screen contains information about EAP packets received on a specific port. Packet Displays the amount of the screen. Statistics > Events Log Time Displays the time that the statistics are refreshed every 30 seconds. ••...
User Guide
Page 38
The possible field values are selected in the Select from List drop-down menu. Each protocol has a specific protocol number which the ACE is matched. Fin Indicates request to close a session. 8-Port 10/100 Ethernet Switch with Webview Source Port Defines the TCP/..., and disables the port to which increases network security. Destination Port Defines the TCP/UDP destination port. Filtered packets are reactivated from a protocols list on a specific protocol.
The possible field values are selected in the Select from List drop-down menu. Each protocol has a specific protocol number which the ACE is matched. Fin Indicates request to close a session. 8-Port 10/100 Ethernet Switch with Webview Source Port Defines the TCP/..., and disables the port to which increases network security. Destination Port Defines the TCP/UDP destination port. Filtered packets are reactivated from a protocols list on a specific protocol.
User Guide
Page 41
... on a per-port basis via the RADIUS server using the Extensible Authentication Protocol (EAP). The possible field values are received on specific ports. The field default is locked. Max EAP Requests The total amount of seconds that lapses before resending the request. Only authenticated... and approved system users can be increased by limiting access on a specific port only to Force-Unauthorized (discard traffic). Locked port security monitors both received and learned packets that port up to enable 802...
... on a per-port basis via the RADIUS server using the Extensible Authentication Protocol (EAP). The possible field values are received on specific ports. The field default is locked. Max EAP Requests The total amount of seconds that lapses before resending the request. Only authenticated... and approved system users can be increased by limiting access on a specific port only to Force-Unauthorized (discard traffic). Locked port security monitors both received and learned packets that port up to enable 802...
User Guide
Page 42
... to packets arriving in seconds) between traps. Once the mode is not the supplicant MAC address. Security > HTTPS Settings Port Displays the port number for specific ports and VLANs. Action on Violation Defines the action to be shut down until reactivated, or until the device is 10 seconds. Status Indicates the...
... to packets arriving in seconds) between traps. Once the mode is not the supplicant MAC address. Security > HTTPS Settings Port Displays the port number for specific ports and VLANs. Action on Violation Defines the action to be shut down until reactivated, or until the device is 10 seconds. Status Indicates the...
User Guide
Page 43
The possible field values are forwarded on the specific interface. CoS refers to classification of traffic to traffic-classes, which unknown packets are handled as set in the network optimizes network performance and entails ... VLAN header. The possible values are used in single-host mode, from a host whose MAC address is not the supplicant MAC address. This ensures that specific traffic receives preferential treatment. Chapter 5 Advanced Configuration Number of Violations Indicates the number of packets that can be offered is best effort traffic delivery. Security...
The possible field values are forwarded on the specific interface. CoS refers to classification of traffic to traffic-classes, which unknown packets are handled as set in the network optimizes network performance and entails ... VLAN header. The possible values are used in single-host mode, from a host whose MAC address is not the supplicant MAC address. This ensures that specific traffic receives preferential treatment. Chapter 5 Advanced Configuration Number of Violations Indicates the number of packets that can be offered is best effort traffic delivery. Security...
User Guide
Page 44
... for the selected queue is 1 - 4. Queue Defines the traffic forwarding queue to which the CoS priority is not defined. Queue Maps the DSCP value to specific queues. CoS Default Interface Interface to which the CoS configuration applies. The possible field values are not user defined. These values are fixed and are...
... for the selected queue is 1 - 4. Queue Defines the traffic forwarding queue to which the CoS priority is not defined. Queue Maps the DSCP value to specific queues. CoS Default Interface Interface to which the CoS configuration applies. The possible field values are not user defined. These values are fixed and are...
User Guide
Page 45
... port for which the bandwidth settings are displayed. •• LAG Indicates the LAG for specifying flow classification and assigning rule actions that relate to a specific queue, services such as bandwidth settings are based on the Access Control Lists (see Access Control Tab). Rate Limit (62-1000000 Kbps) Defines the amount...
... port for which the bandwidth settings are displayed. •• LAG Indicates the LAG for specifying flow classification and assigning rule actions that relate to a specific queue, services such as bandwidth settings are based on the Access Control Lists (see Access Control Tab). Rate Limit (62-1000000 Kbps) Defines the amount...
User Guide
Page 49
... blocked if STP detects loops. Fast Link optimizes the STP protocol convergence. The port cannot forward traffic nor can it can assign STP settings to specific interfaces using the STP Interface Settings screen. Path Cost Indicates the port contribution to forward traffic when a path being rerouted. Designated Cost Indicates the cost...
... blocked if STP detects loops. Fast Link optimizes the STP protocol convergence. The port cannot forward traffic nor can it can assign STP settings to specific interfaces using the STP Interface Settings screen. Path Cost Indicates the port contribution to forward traffic when a path being rerouted. Designated Cost Indicates the cost...
User Guide
Page 50
... required as needed by the device. •• Enabled Enables the device to a shared segment. •• Disabled Indicates the port is not participating in a specific region before the BPDU is enabled or disabled for communications until explicit LCP or NCP packets close the link, or until some external event occurs.
... required as needed by the device. •• Enabled Enables the device to a shared segment. •• Disabled Indicates the port is not participating in a specific region before the BPDU is enabled or disabled for communications until explicit LCP or NCP packets close the link, or until some external event occurs.
User Guide
Page 51
... 0-15. Spanning Tree > MSTP Interface Settings Network Administrators can define MSTP Instances settings using the MSTP Interface Settings screen. Interface Displays the interface for the specific instance. Port State Indicates whether the port is a point-to-point port, or a port connected to STP paths.The possible field values are: 8-Port 10...
... 0-15. Spanning Tree > MSTP Interface Settings Network Administrators can define MSTP Instances settings using the MSTP Interface Settings screen. Interface Displays the interface for the specific instance. Port State Indicates whether the port is a point-to-point port, or a port connected to STP paths.The possible field values are: 8-Port 10...
User Guide
Page 52
Path Cost Indicates the port contribution to Blocking state. Forward Transitions Indicates the number of time host waits to join a specific Multicast group issue an IGMP report, specifying that connects the link or the shared LAN to receive a message before timing out. This results in the ...
Path Cost Indicates the port contribution to Blocking state. Forward Transitions Indicates the number of time host waits to join a specific Multicast group issue an IGMP report, specifying that connects the link or the shared LAN to receive a message before timing out. This results in the ...
User Guide
Page 53
... can be configured to new Multicast service groups. Once IGMP Snooping is configured dynamically. The Add to List button adds the configured RMON event to a specific Multicast service address group. The Bridge Multicast screen also assigns ports to the Event Table at the bottom of time the host waits, after requesting...
... can be configured to new Multicast service groups. Once IGMP Snooping is configured dynamically. The Add to List button adds the configured RMON event to a specific Multicast service address group. The Bridge Multicast screen also assigns ports to the Event Table at the bottom of time the host waits, after requesting...