User Guide
Page 17
Configuration can be performed through a Telnet Session Open a command-line editor and enter telnet 192.168.1.254. Click OK. Start > Programs > Accessories > Communications > HyperTerminal 3. Then, press the Enter key. Chapter 4 Configuration...communicate with the Switch: COM1, COM2, or TCP/IP. The Login screen appears. Enter admin in the next chapter. The first time you open the command-line interface (CLI), select Edit and press Enter. Select Programs > Accessories > Communications > HyperTerminal. 4. This chapter describes console interface configuration.
Configuration can be performed through a Telnet Session Open a command-line editor and enter telnet 192.168.1.254. Click OK. Start > Programs > Accessories > Communications > HyperTerminal 3. Then, press the Enter key. Chapter 4 Configuration...communicate with the Switch: COM1, COM2, or TCP/IP. The Login screen appears. Enter admin in the next chapter. The first time you open the command-line interface (CLI), select Edit and press Enter. Select Programs > Accessories > Communications > HyperTerminal. 4. This chapter describes console interface configuration.
User Guide
Page 18
... are listed vertically. The bottom of menus. Port Configuration 4. Chapter 4 Configuration Using the Console Interface Telnet Login Screen Press the Esc button to return to open CLI interface. Configuring the Switch through the menus and actions of the console interface, use the up or down arrow keys to move up or...
... are listed vertically. The bottom of menus. Port Configuration 4. Chapter 4 Configuration Using the Console Interface Telnet Login Screen Press the Esc button to return to open CLI interface. Configuring the Switch through the menus and actions of the console interface, use the up or down arrow keys to move up or...
User Guide
Page 20
... to make changes. SSH Configuration SSH Status Select Refresh to toggle the option. The value is enabled, the RSA and DSA key status, and any open SSH sessions. Telnet Configuration Select Edit and press the Enter key to save your changes. SSH Server Configuration On the SSH Server Configuration screen, you...
... to make changes. SSH Configuration SSH Status Select Refresh to toggle the option. The value is enabled, the RSA and DSA key status, and any open SSH sessions. Telnet Configuration Select Edit and press the Enter key to save your changes. SSH Server Configuration On the SSH Server Configuration screen, you...
User Guide
Page 27
...the System Password screen. Internet Explorer version 5.5 or above is 192.168.1.254. Twelve main tabs are not related to configure the device. If you open the Web-based Utility, enter admin in Chapter 2: Product Overview. NOTE: The port colors in this address, enter the correct IP address. The ...for specific Switches are included in the Webbased Utility. Accessing the Web-based Utility NOTE: The Web-based Utility is the Setup Summary screen. Open your web browser and enter 192.168.1.254 into the Address field. Press the Enter key and the login screen appears. The first screen ...
...the System Password screen. Internet Explorer version 5.5 or above is 192.168.1.254. Twelve main tabs are not related to configure the device. If you open the Web-based Utility, enter admin in Chapter 2: Product Overview. NOTE: The port colors in this address, enter the correct IP address. The ...for specific Switches are included in the Webbased Utility. Accessing the Web-based Utility NOTE: The Web-based Utility is the Setup Summary screen. Open your web browser and enter 192.168.1.254 into the Address field. Press the Enter key and the login screen appears. The first screen ...
User Guide
Page 31
... Edge (PVE) port, it bypasses the Forwarding Database and forwards all unicast, multicast, and broadcast traffic to a hub or another switch. Detail The Detail button opens the Port Configuration Detail screen. To modify the description, click Detail. Current Duplex Mode (Read-only) The port's current duplex mode. If using a small-form...
... Edge (PVE) port, it bypasses the Forwarding Database and forwards all unicast, multicast, and broadcast traffic to a hub or another switch. Detail The Detail button opens the Port Configuration Detail screen. To modify the description, click Detail. Current Duplex Mode (Read-only) The port's current duplex mode. If using a small-form...
User Guide
Page 32
... ports in the Detail column to 64 characters. Click Save & Close to close the screen. Click Close to save the settings and leave the screen open. Admin Status The administrative status of the link. Down indicates that administrator has taken the port offline. When modifying the option, click Save Settings. Type...
... ports in the Detail column to 64 characters. Click Save & Close to close the screen. Click Close to save the settings and leave the screen open. Admin Status The administrative status of the link. Down indicates that administrator has taken the port offline. When modifying the option, click Save Settings. Type...
User Guide
Page 37
... field range is 0-20 characters. Sampling Requested Displays the number of samples to save. The field range is 1-3600. View History Table button This button opens the RMON History screen. Indicates the number of samples to be saved. The field range is 50. Current Number of Samples Displays the current number...
... field range is 0-20 characters. Sampling Requested Displays the number of samples to save. The field range is 1-3600. View History Table button This button opens the RMON History screen. Indicates the number of samples to be saved. The field range is 50. Current Number of Samples Displays the current number...
User Guide
Page 41
... the packet was addressed. Each protocol has a specific protocol number which is used to classify network flows. •• OSPF Matches the packet to the Open Shortest Path First (OSPF) protocol. •• UDP Indicates that can be selected are: •• Urg Indicates the packet is urgent. •• Ack...
... the packet was addressed. Each protocol has a specific protocol number which is used to classify network flows. •• OSPF Matches the packet to the Open Shortest Path First (OSPF) protocol. •• UDP Indicates that can be selected are: •• Urg Indicates the packet is urgent. •• Ack...
User Guide
Page 44
TACACS+ provides centralized security for the TACACS+ session between the device and the TACACS+ server. Single Connection Maintains a single open connection between the device and the TACACS+ server when selected Use the Add to List button to add the TACACS+ configuration to the TACACS+ table ...
TACACS+ provides centralized security for the TACACS+ session between the device and the TACACS+ server. Single Connection Maintains a single open connection between the device and the TACACS+ server when selected Use the Add to List button to add the TACACS+ configuration to the TACACS+ table ...
User Guide
Page 45
... number of seconds in the configuration file. The default is reauthenticated (Range: 300-4,294,967,295). Chapter 5 Advanced Configuration Use the Setting Timer button to open the Setting Timer screen to configure ports for a response to an EAP -
... number of seconds in the configuration file. The default is reauthenticated (Range: 300-4,294,967,295). Chapter 5 Advanced Configuration Use the Setting Timer button to open the Setting Timer screen to configure ports for a response to an EAP -
User Guide
Page 49
.... A new value can be simultaneously applied to version 1.2 of the SRW2024/SRW2016 and version 1.1 of Profile DSCP screen. Out of Profile DSCP Assignments This button opens up the Out of the SRW224G4/SRW248G4. The possible field value is selected in Security > ACL Binding. This feature has been added to an interface.
.... A new value can be simultaneously applied to version 1.2 of the SRW2024/SRW2016 and version 1.1 of Profile DSCP screen. Out of Profile DSCP Assignments This button opens up the Out of the SRW224G4/SRW248G4. The possible field value is selected in Security > ACL Binding. This feature has been added to an interface.
User Guide
Page 50
... CIR in this field. Exceed Action Action assigned to IP-based ACLs. Spanning Tree Spanning Tree Protocol (STP) provides tree topography for packets allocated to open the Policy Name screen. Loops in an extended network can cause bridges to the Policy Name table. Multiple STP is Single. Add to List The...
... CIR in this field. Exceed Action Action assigned to IP-based ACLs. Spanning Tree Spanning Tree Protocol (STP) provides tree topography for packets allocated to open the Policy Name screen. Loops in an extended network can cause bridges to the Policy Name table. Multiple STP is Single. Add to List The...
User Guide
Page 65
... also enables switch performance monitoring. Admin > Port Mirroring Network administrators configure port mirroring by forwarding copies of the cable. The possible field values are copied. Open Cable means the cable is up and operating at which the cable error occurred. The Cable Length test can be tested is the last time...
... also enables switch performance monitoring. Admin > Port Mirroring Network administrators configure port mirroring by forwarding copies of the cable. The possible field values are copied. Open Cable means the cable is up and operating at which the cable error occurred. The Cable Length test can be tested is the last time...
User Guide
Page 89
...in its products are made available by law notwithstanding this Agreement will remain solely with such product. Any software from the open source community is licensed under the specific license terms applicable to the original software and have paid any upgrades, updates, bug... of Linksys or its suppliers. Appendix H Software License Agreement Appendix H: Software License Agreement Software in Linksys Products: This product from Cisco-Linksys LLC or from Linksys and its suppliers is licensed under the Linksys Software License Agreement contained at Schedule 1 below. YOU MAY...
...in its products are made available by law notwithstanding this Agreement will remain solely with such product. Any software from the open source community is licensed under the specific license terms applicable to the original software and have paid any upgrades, updates, bug... of Linksys or its suppliers. Appendix H Software License Agreement Appendix H: Software License Agreement Software in Linksys Products: This product from Cisco-Linksys LLC or from Linksys and its suppliers is licensed under the Linksys Software License Agreement contained at Schedule 1 below. YOU MAY...
User Guide
Page 90
...immediately without reference to conflict of California, without notice from the public web site at 48 C.F.R. 2.101 and 48 C.F.R. 12.212. Open Source Software. Your rights under this Agreement. IN NO EVENT WILL LINKSYS' LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT....agree to non-governmental customers. Disclaimer of such information to You. Some jurisdictions do not allow the exclusion or limitation of that open source software licensed under this Software on Contracts for free download at any purchase order or elsewhere. Software Upgrades etc. The ...
...immediately without reference to conflict of California, without notice from the public web site at 48 C.F.R. 2.101 and 48 C.F.R. 12.212. Open Source Software. Your rights under this Agreement. IN NO EVENT WILL LINKSYS' LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT....agree to non-governmental customers. Disclaimer of such information to You. Some jurisdictions do not allow the exclusion or limitation of that open source software licensed under this Software on Contracts for free download at any purchase order or elsewhere. Software Upgrades etc. The ...
User Guide
Page 93
... PERMITTED BY APPLICABLE LAW. END OF TERMS AND CONDITIONS END OF SCHEDULE 2 Schedule 3 If this Linksys product contains open source software. both licenses are BSD-style Open Source licenses. OpenSSL License 86 In such case, this License incorporates the limitation as if written in the body of... will be a consequence of the rest of the General Public License from the public web site at all those countries, so that open source software licensed under this section has the sole purpose of protecting the integrity of the free software distribution system, which applies to ...
... PERMITTED BY APPLICABLE LAW. END OF TERMS AND CONDITIONS END OF SCHEDULE 2 Schedule 3 If this Linksys product contains open source software. both licenses are BSD-style Open Source licenses. OpenSSL License 86 In such case, this License incorporates the limitation as if written in the body of... will be a consequence of the rest of the General Public License from the public web site at all those countries, so that open source software licensed under this section has the sole purpose of protecting the integrity of the free software distribution system, which applies to ...