User Guide
Page 2
.... Footer About This Guide ii WEB: This globe icon indicates a noteworthy website address or e-mail address. Copyright © 2008 Cisco Systems, Inc. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www....Resources Website addresses in this document are trademarks or registered trademarks of their respective holders. Other brands and product names are listed without http:// in front of the address because most current web browsers do not require it is something that you may...
.... Footer About This Guide ii WEB: This globe icon indicates a noteworthy website address or e-mail address. Copyright © 2008 Cisco Systems, Inc. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www....Resources Website addresses in this document are trademarks or registered trademarks of their respective holders. Other brands and product names are listed without http:// in front of the address because most current web browsers do not require it is something that you may...
User Guide
Page 15
...menu choices: System Configuration Menu, Port Status, Port Configuration, Help, and Log Out. Each menu has several options, which are listed vertically. IP Configuration 6. Chapter 4 Configuration Using the Console Interface System Configuration Menu Press the Esc button and you highlight it;...with Webview System Information 9 To navigate through the Console Interface The console screens consist of a series of the screen lists the actions available. System Information From the System Information screen you can check current firmware versions and other general switch ...
...menu choices: System Configuration Menu, Port Status, Port Configuration, Help, and Log Out. Each menu has several options, which are listed vertically. IP Configuration 6. Chapter 4 Configuration Using the Console Interface System Configuration Menu Press the Esc button and you highlight it;...with Webview System Information 9 To navigate through the Console Interface The console screens consist of a series of the screen lists the actions available. System Information From the System Information screen you can check current firmware versions and other general switch ...
User Guide
Page 27
... port offline. Flow Control The Flow Control feature of the LAG. PVE When a port is the flow control status of the selected port can be listed here for this LAG. Description A general description can be enabled or disabled. Administrative Status Enables or disables traffic forwarding through the selected LAG. 21 Current...
... port offline. Flow Control The Flow Control feature of the LAG. PVE When a port is the flow control status of the selected port can be listed here for this LAG. Description A general description can be enabled or disabled. Administrative Status Enables or disables traffic forwarding through the selected LAG. 21 Current...
User Guide
Page 29
VLAN Management > Create VLAN The Create VLAN screen provides information and global parameters for configuring and working with Webview VLAN Table The VLAN Table displays a list of the power used to add VLANs one at a time. This field is used by the ports PVID. It is also not possible to enable/...
VLAN Management > Create VLAN The Create VLAN screen provides information and global parameters for configuring and working with Webview VLAN Table The VLAN Table displays a list of the power used to add VLANs one at a time. This field is used by the ports PVID. It is also not possible to enable/...
User Guide
Page 32
... and Align errors that have occurred on the interface, including bad packets, Multicast and broadcast packets, since the device was last refreshed. The Add to List button adds the configured RMON sampling to detect jabbers is 0-20 characters. Oversize Packets Displays the number of packets received on the interface since the...
... and Align errors that have occurred on the interface, including bad packets, Multicast and broadcast packets, since the device was last refreshed. The Add to List button adds the configured RMON sampling to detect jabbers is 0-20 characters. Oversize Packets Displays the number of packets received on the interface since the...
User Guide
Page 34
... : •• LOG Indicates there is not a saving mechanism for the selected variable and comparing the value against the thresholds. Community Displays the community to List button adds the RMON Alarms Table entry. Owner Displays the device or user that triggers the rising threshold alarm. The possible field values are used...
... : •• LOG Indicates there is not a saving mechanism for the selected variable and comparing the value against the thresholds. Community Displays the community to List button adds the RMON Alarms Table entry. Owner Displays the device or user that triggers the rising threshold alarm. The possible field values are used...
User Guide
Page 35
... the amount of the screen. Name Displays the measured 802.1x statistic. Description Describes the measured 802.1x statistic. Chapter 5 Advanced Configuration The Add to List button adds the configured RMON event to the Event Table at the bottom of time that passes before the port utilization statistics are refreshed. Statistics...
... the amount of the screen. Name Displays the measured 802.1x statistic. Description Describes the measured 802.1x statistic. Chapter 5 Advanced Configuration The Add to List button adds the configured RMON event to the Event Table at the bottom of time that passes before the port utilization statistics are refreshed. Statistics...
User Guide
Page 36
...: Invalid Protocol ID Displays the device GVRP Invalid Protocol ID statistics. ACL > IP based ACL ACL > IP based ACL The IP Based ACL (Access Control List) screen contains information for which meet the ACL criteria. 30 Packets are as follows: •• Permit Forwards packets which the statistics are displayed. •...
...: Invalid Protocol ID Displays the device GVRP Invalid Protocol ID statistics. ACL > IP based ACL ACL > IP based ACL The IP Based ACL (Access Control List) screen contains information for which meet the ACL criteria. 30 Packets are as follows: •• Permit Forwards packets which the statistics are displayed. •...
User Guide
Page 37
...the IP Precedence value is important. ACL > MAC based ACL ACL > MAC based ACL 31 Ports are selected in the Select from a protocols list on a specific protocol. Psh Indicates the packet is dropped. Rst Indicates the connection is pushed. This field is matched. Wildcard masks specify which ... IP Precedence value is used and which the ACE is active only if 800/6-TCP or 800/17-UDP are reactivated from List drop-down menu. Select from List Selects from List drop-down menu. Ack Indicates the packet is 0 - 65535. Fin Indicates request to close a session. 8-Port 10...
...the IP Precedence value is important. ACL > MAC based ACL ACL > MAC based ACL 31 Ports are selected in the Select from a protocols list on a specific protocol. Psh Indicates the packet is dropped. Rst Indicates the connection is pushed. This field is matched. Wildcard masks specify which ... IP Precedence value is used and which the ACE is active only if 800/6-TCP or 800/17-UDP are reactivated from List drop-down menu. Select from List Selects from List drop-down menu. Ack Indicates the packet is 0 - 65535. Fin Indicates request to close a session. 8-Port 10...
User Guide
Page 38
... values are matched to the ACE. A wild card mask of the screen. Wildcard Mask Defines the destination IP address wildcard mask. The Add to List button adds the configured MAC Based ACLs to the interface. Interface Indicates the interface to which is bound to the MAC Based ACL Table at...Delete ACL Deletes the selected ACL. Source MAC Address Matches the source MAC address to an interface, all the bits are important. The Add to List button adds the ACL Binding configuration to the ACL Binding Table at the bottom of the IP address are ignored, while the last eight bits...
... values are matched to the ACE. A wild card mask of the screen. Wildcard Mask Defines the destination IP address wildcard mask. The Add to List button adds the configured MAC Based ACLs to the interface. Interface Indicates the interface to which is bound to the MAC Based ACL Table at...Delete ACL Deletes the selected ACL. Source MAC Address Matches the source MAC address to an interface, all the bits are important. The Add to List button adds the ACL Binding configuration to the ACL Binding Table at the bottom of the IP address are ignored, while the last eight bits...
User Guide
Page 39
... seconds. This key must match the encryption key used for authenticating user name and passwords, and 802.1X port authentication. The Add to List button adds the RADIUS configuration to the TACACS+ table at the bottom of time that the RADIUS server is used for networks. Priority Displays...the amount of the screen. Single Connection Maintains a single open connection between the device and the TACACS+ server when selected The Add to List button adds the TACACS+ configuration to the RADIUS Table at the bottom of users accessing the device. The RADIUS Server priority is used on...
... seconds. This key must match the encryption key used for authenticating user name and passwords, and 802.1X port authentication. The Add to List button adds the RADIUS configuration to the TACACS+ table at the bottom of time that the RADIUS server is used for networks. Priority Displays...the amount of the screen. Single Connection Maintains a single open connection between the device and the TACACS+ server when selected The Add to List button adds the TACACS+ configuration to the RADIUS Table at the bottom of users accessing the device. The RADIUS Server priority is used on...
User Guide
Page 41
... Status field.The possible field values are activated from a host whose MAC address is not the supplicant MAC address. The MAC address list can provide various options. The port learns up to change the Learning Mode, the Lock Interface must be reinstated. Security > Multiple ...with the port. The ports remains shut down until reactivated, or until the device is reset. Locked port security also enables storing a list of addresses that have already been learned. •• Limited Dynamic Lock Locks the port by which advanced portbased authentication is enabled. Once...
... Status field.The possible field values are activated from a host whose MAC address is not the supplicant MAC address. The MAC address list can provide various options. The port learns up to change the Learning Mode, the Lock Interface must be reinstated. Security > Multiple ...with the port. The ports remains shut down until reactivated, or until the device is reset. Locked port security also enables storing a list of addresses that have already been learned. •• Limited Dynamic Lock Locks the port by which advanced portbased authentication is enabled. Once...
User Guide
Page 44
... and IP ACLs can be grouped together in the Bandwidth screen. Only a single policy can be attached to DSCP on the Access Control Lists (see Access Control Tab). Chapter 5 Advanced Configuration Modifying queue scheduling affects the queue settings globally. Queue shaping can be based per queue ...in the sequence they appear within the policy. Rate Limit (62-1000000 Kbps) Defines the amount of Profile DSCP screen. 38 The Add to List button adds the Bandwidth configuration to an interface. However, a policy and ACL cannot be configured on services. The possible field values are: ...
... and IP ACLs can be grouped together in the Bandwidth screen. Only a single policy can be attached to DSCP on the Access Control Lists (see Access Control Tab). Chapter 5 Advanced Configuration Modifying queue scheduling affects the queue settings globally. Queue shaping can be based per queue ...in the sequence they appear within the policy. Rate Limit (62-1000000 Kbps) Defines the amount of Profile DSCP screen. 38 The Add to List button adds the Bandwidth configuration to an interface. However, a policy and ACL cannot be configured on services. The possible field values are: ...
User Guide
Page 45
... Advanced Mode > Out of : •• Class Map •• Action •• Policer New Policy Name Defines a new Policy name. Add to List The Add to List button will add the policy to an IP based ACL or a MAC based ACL. New Class Map The New Class Map button opens the...
... Advanced Mode > Out of : •• Class Map •• Action •• Policer New Policy Name Defines a new Policy name. Add to List The Add to List button will add the policy to an IP based ACL or a MAC based ACL. New Class Map The New Class Map button opens the...
User Guide
Page 50
... possible field values are displayed. Root Path Cost Indicates the selected instance's path cost. The MSTP Interface Settings screen contains the following fields: Instance ID Lists the MSTP instances configured on the other side of the bridge with Webview 44 Type Indicates if the port is a point-to-point port, or...
... possible field values are displayed. Root Path Cost Indicates the selected instance's path cost. The MSTP Interface Settings screen contains the following fields: Instance ID Lists the MSTP instances configured on the other side of the bridge with Webview 44 Type Indicates if the port is a point-to-point port, or...
User Guide
Page 52
...; None The port is not configured for attaching ports or LAGs to a device that can be added to a neighboring Multicast router/switch. The Add to List button adds the configured RMON event to the Event Table at the bottom of time the host waits, after requesting to new Multicast service groups...
...; None The port is not configured for attaching ports or LAGs to a device that can be added to a neighboring Multicast router/switch. The Add to List button adds the configured RMON event to the Event Table at the bottom of time the host waits, after requesting to new Multicast service groups...
User Guide
Page 53
... the bottom of Enterprise number and the default MAC address. The options are as follows: •• Select from List Select the Subtree from the list provided. •• Insert Enables a Subtree not included in a network from List field to indicate the MAC address that the Engine ID is enabled. The Add to... List button adds the Views configuration to device features or feature aspects. For standalone devices, select a default Engine ID that SNMP Group A has Read Only (R/O) access ...
... the bottom of Enterprise number and the default MAC address. The options are as follows: •• Select from List Select the Subtree from the list provided. •• Insert Enables a Subtree not included in a network from List field to indicate the MAC address that the Engine ID is enabled. The Add to... List button adds the Views configuration to device features or feature aspects. For standalone devices, select a default Engine ID that SNMP Group A has Read Only (R/O) access ...
User Guide
Page 54
.... The possible field values are: •• No Authentication Indicates that the user is 48 User name Provides a user-defined local user list. Changing or removing the local SNMP Engine ID deletes the SNMPv3 User Database. •• Local Indicates that the user is connected to ... nor the Privacy security levels are : •• None Indicates that port authentication is connected to SNMP groups. Group Name Contains a list of user-defined SNMP groups. Groups allow network managers to assign access rights to SNMPv3 only. The field range is defined, remote devices ...
.... The possible field values are: •• No Authentication Indicates that the user is 48 User name Provides a user-defined local user list. Changing or removing the local SNMP Engine ID deletes the SNMPv3 User Database. •• Local Indicates that the user is connected to ... nor the Privacy security levels are : •• None Indicates that port authentication is connected to SNMP groups. Group Name Contains a list of user-defined SNMP groups. Groups allow network managers to assign access rights to SNMPv3 only. The field range is defined, remote devices ...
User Guide
Page 55
... character strings is required, 20 bytes are defined. Each byte can be separated by a period or colon. The Add to List button adds the Communities configuration to the respective Table at the bottom of the screen. Community String Displays the password used to authenticate... the management station to the device. The Add to List button adds the Group Membership configuration to the community. •• Read Write Management access is defined. The possible field values are...
... character strings is required, 20 bytes are defined. Each byte can be separated by a period or colon. The Add to List button adds the Communities configuration to the respective Table at the bottom of the screen. Community String Displays the password used to authenticate... the management station to the device. The Add to List button adds the Group Membership configuration to the community. •• Read Write Management access is defined. The possible field values are...
User Guide
Page 56
... SNMP Version 1 traps are sent. •• SNMP V2 Indicates SNMP Version 2 traps are two configuration options: Select from List Select the OID from List option. Security Level Defines the means by which notifications are : •• No Authentication Indicates the packet is neither authenticated nor... Displays the management station IP address for configuration: Community String Identifies the community string of the trap manager. Filter Name Contains a list of the screen. there are sent. Either SNMPv1,2 or SNMPv3 can be enabled at any one time, but not both at ...
... SNMP Version 1 traps are sent. •• SNMP V2 Indicates SNMP Version 2 traps are two configuration options: Select from List Select the OID from List option. Security Level Defines the means by which notifications are : •• No Authentication Indicates the packet is neither authenticated nor... Displays the management station IP address for configuration: Community String Identifies the community string of the trap manager. Filter Name Contains a list of the screen. there are sent. Either SNMPv1,2 or SNMPv3 can be enabled at any one time, but not both at ...