PLANET Web Switch Family

Web / SNMP Intelligent Products

WGSW-800

8-Port Gigabit Ethernet Switch


Web-Based Management

3.1 Configuration

The management function of this interface runs as an unsigned Java applet. As a result, your browser's security setting should be set as following:


3.2 Features

There are features and characteristics of the web interface whose functionality and meanings are consistent throughout and worth mentioning.

Buttons featured are:


3.3 Web Pages

Before connecting to the switch via a web browser (i.e. Netscape Navigator), a login screen will appear prompting for an administrator password (only if the password is enabled). The User Name will always be “root”. Enter the password to access the switch’s management mode. Once the password is entered correctly, the front page will appear.

Password Authentication

Figure 3-1: Web Interface front page

Note: If password protection is enabled (using the console) without setting your own password, the default password is "switch".

Upon connecting to the switch via a web browser (i.e. Netscape Navigator), a login screen will appear prompting for an administrator password. (Figure 3-2) The User Name will always be root. Enter the password to access the switchs management mode. Once the password is entered correctly, the front page will appear (Figure 3-1). If the LEDs on the web page do not show up as green, the Java settings for the web browser is not set up correctly. Section 3.1 covers how to correctly setup Java for the web interface.

Figure 3-2 : Menu Screen

After the password is entered you will see the main menu screen. (Figure 3-2)

There are five system icons that are available:


3.4. Introduction

The Introduction will explain the proper procedure for setting up the web interface. Make sure that the Java settings for your web browser have been setup correctly. If the Java is not set up correctly the web page will not work correctly.


3.5. System Manager

General Info General system information and administration
IP Settings IP parameters
Password Settings Disable/Enable the password protection or change the password
NVRAM Settings Save the setting or Reset the switch to factory defalt
Firmware Upgrade Setup for TFTP download the latest firmware
Reset Reset the switch

W_SYSM.GIF (24057 bytes)

3.5.1 General Info

Under the General folder, there are several sub-folders:

  • System Information

The System Information screen (see Figure 3-3) gives you helpful information about your system. The Media Access Control (MAC) address and the System Description are not configurable.

There are three fields that are site specific and can be modified by the system administrator:

  • The local system name
  • System administrators name and contact information
  • Physical location of the system

Notice that there are two buttons, Submit and Refresh, in the lower part of the window. The Refresh button is used for reloading values while the Submit button is for saving values to the Switch.

Figure 3-3: General: System Information

  • Software Download

In the Software Download screen (see Figure 3-4), the system can be configured to download and boot from a new image off the network. (Please refer to Chapter 5 when updating software)

  • Click the arrow in the box at Boot fromand click the Net option.
  • Supply the IP address of the TFTP server and the full path and the filename of the image to be loaded from that server.
  • Click the Submit button.
  • Reset the switch by clicking on the System Administrator tab and clicking on Reset Switch. The image will load-up automatically after the switch reset.

Figure 3-4: General: Software Download

  • Password Administration

The password entered is encrypted on the screen and will display as a sequence of asterisks (*).

  • Type the new administrator password in the New password field
  • Type the same password in the Verify field
  • Click Submit to activate the new password

Note: Password protection is optional and can only be enabled through the console interface. If the password protection is enabled without setting your own password, the default password is switch.

Figure 3-5: General: Password Administration

  • System Administration

Figure 3-6: General: System Administration

After making any changes to the screens within the Web Interface, users must save the changed settings to NVRAM. This is done in the system administration screen (see Figure 3-6) in order for the new settings to remain after a system reboot.

Save Configuration to NVRAM

    • Click on Save Configuration to NVRAM at this screen and a second screen will ask for verification of this action, to accept choose OK, otherwise click cancel.

Restore Defaults

    • Click on Restore Defaults to reset switch parameters to their original default settings. In order for changes to occur, you must Reset the switch. Note: network IP settings (i.e. IP address, Gateway Address, Network Mask) will not be affected by this command.

Reset Switch

    • Click on the Reset Switch button and a second screen will ask for verification of this action, to accept choose OK, otherwise click cancel.
    1. IP

There are three tunable parameters to be set by the system administrator (see Figure 3-7).

    • Enter site-specific IP address, Gateway address and Net mask
    • Click Submit to accept
    • Save Configuration to NVRAM and reset the system to implement the changes (refer to General folders System Administration)

Figure 3-7: IP screen

    1. SNMP
  • SNMP Trap Configuration

The SNMP Trap Configuration (Figure 3-8) allows for the setup of authentication traps.

Authentication traps

  • EnableThe system will generate a SNMP trap upon a host authorization failure
  • DisableThe authentication traps will not be generated

All hosts in community strings with TRAP privileges will be notified when a trap condition occurs.

Figure 3-8: SNMP: SNMP Trap Configuration

  • SNMP Host Table

The SNMP Host Table screen (Figure 3-9) allows you to add and remove hosts from access rights that have been granted to community groups. The permissions GET, SET and TRAP are assigned to a community string (see next section SNMP Community Tables) and then these permissions are assigned to individual machines by adding those machines and their IP address to the appropriate community string. Host Authorization can be Enabled or Disabled.

Host Authorization

  • Enable
  • Disable

Figure 3-9: SNMP: SNMP Host Table

Note: When the scroll bars start to appear due to a large number of entries, it may become necessary to click on an entry when viewing to ensure proper alignment of sub windows.

  • SNMP Community Table

Figure 3-10: SNMP: SNMP Community Table

In the Community Table (see Figure 3-10) the administrator can create different community strings with customized access, by choosing combinations of GET, SET and TRAP rights. These community strings need to be set prior to setting host access, as the host table depends on the existence of the community strings.

Note: When the scroll bars start to appear due to a large number of entries, it may become necessary to click on an entry when viewing to ensure proper alignment of sub windows.

    1. Bridge
  • Spanning Tree Configuration

Spanning Tree can be enabled or disabled in this folder.

Enable: As shown in Figure 3-11, there are four other tunable parameters to be addressed.

  • Hello Time Interval between configuration messages sent by the spanning tree algorithm
  • Max Age Amount of time before a configuration message is discarded by the system
  • Forward DelayAmount of time system spends in learningand listeningstates
  • Bridge PriorityPriority setting among other switches in the spanning tree

Disable: Disable spanning tree algorithm on the system.

Figure 3-11: Bridge: Spanning Tree Configuration

  • After entering the appropriate values you need and press Submit to set them on the system
  • A notification screen will show up, click on OK to enable the new changes
  • Static Bridge Table

Any system, whose MAC address and the port number are listed in this screen, (see Figure 3-12) will not be purged from the systems forwarding table by the aging process.

Add a new entry

  • Enter the MAC address and port in the appropriate boxes
  • Click Add

Remove an exist entry

  • Highlight that entry in the table, by clicking on the MAC address
  • Choose Remove

Figure 3-12: Bridge: Static Bridge Table

Note: When the scroll bars start to appear due to a large number of entries, it may become necessary to click on an entry when viewing to ensure proper alignment of sub windows.

  • Bridge Aging

Aging Time is a variable that must be configured. Its purpose is to determine the amount of time an entry is held in the forwarding tables (Figure 3-13). The default value is set to 300 seconds, (or 5 minutes).

    • The administrator may change this value to any value between 10 and 824 seconds.
    • After changing the value, click Submit

Figure 3-13: Bridge: Bridge Aging

    1. 802.1Q VLAN

The VLAN option within the System Manager allows users to define VLAN groups. The VLAN Administration button will allow you to create a new VLAN. The VLAN tagging option is a standard set by the IEEE to facilitate the spanning of VLANs across multiple switches (Reference: Appendix A and IEEE Std 802.1Q-1998 Virtual Bridged Local Area Networks).

Add VLAN Group

  • Enter the VLAN Id and name in the appropriate boxes
  • Click Add

Remove VLAN Group

  • Highlight the group you want to remove
  • Click on the Remove button

Figure 3-14: VLAN

Note: When the scroll bars start to appear due to a large number of entries, it may become necessary to click on an entry when viewing to ensure proper alignment of sub windows.

Choose the VLAN Membership Option, and a window displaying all VLANs and ports will be called (see Figure 3-15).

Add VLAN Membership

    • Click the box below the port number on the line of the VLAN so that a T(tagged) or U(untagged) appears.

Remove VLAN Membership

    • Click the box again until a blank box appears. This will remove VLAN membership from the port.

Figure 3-15: VLAN: VLAN Membership

    1. Mirroring
      1. Port mirroring is a feature to help in the debugging of a network. This web interface page, as seen in Figure 3-16, allows enabling or disabling of port mirroring and the setting of source and monitor ports (when enabled). The Monitor port will show a copy of every packet that arrives or leaves the source port.

        Figure 3-16: Mirroring

    2. RMON
  • Ethernet Statistics
  • Ethernet History
  • Alarm

The Alarm folder under RMON is where conditions are set for an alarm that will trigger a pre-determined event (see next section on setting an event).

  • Enter the interval (in seconds)
  • Choose the type of statistic to check and port to monitor
  • Choose a sample type and startup alarm
  • Enter the threshold and event if needed
  • Click Add

There are two sample types from which to choose: Delta and Absolute.

A Delta sample type

  • Denotes a change in the statistic. The numeric value given for either the rising or falling threshold represents the difference between successive samples that trigger the event.

The Absolute type

  • Defines the statistic actual value, so when a sample equals the rising or falling threshold, it will trigger an event.

In the example page below (Figure 3-18), the alarm can be explained as follows:

  • Sample the Inbound Unicast Packets on Port 1 every 2 seconds
  • If the value of the sample is greater than zero then trigger event ID 2

If the startup alarm type, Rising or Falling is chosen, then both thresholds and rising and falling event IDs need to be entered. Where if Rising or Falling are chosen independently then only the corresponding threshold and event id need to be entered. At anytime, an alarm may be removed, simply highlight that alarm by clicking any one of the fields. Then click Remove.

Figure 3-18: RMON: Alarm

Note: When the scroll bars start to appear due to a large number of entries, it may become necessary to click on an entry when viewing to ensure proper alignment of sub windows.

  • Event

The event tells the system what to do when the conditions of the alarm are met. As seen in Figure 3-19, the event screen is quite clear.

Add an Event

  • Enter a description of the event to be defined.
  • Choose the type of action to be performed.
  • A community string is also required, whether or not a Trap condition is set. If an invalid community string is entered, a message will appear at the bottom of the screen informing the user. (Refer to the SNMP Community Table section )
  • After entering all appropriate data, click Add.

Remove an Event

  • Click any field entry of that event and choose Remove.

There are four event actions that may be set; None, Log, SNMP Trap, and Log and Trap.

Figure 3-19: RMON: Event

Note: When the scroll bars start to appear due to a large number of entries, it may become necessary to click on an entry when viewing to ensure proper alignment of sub windows.

  • Log

If an event type defines logging as an action for an alarm, then the event will be entered in the table here (Figure 3-20). When an event is removed from the event table, all log entries corresponding to that event will be removed from this log table. This will only be evident with a Refresh of the logging output.

Figure 3-20: RMON: Log

Port Manager

Users can use the Port Manager folder to change the port related parameters and settings. In addition to the per port configuration, users can also program more then one port as a group to have the same configuration using the Group sub-folder.

  1. All Ports

    An overview of the port settings - The Administrator has the ability to change Admin Status, Auto Negotiation, Duplex, Source Security, and Flow Control through this menu. It also describes the port state and current Duplex.

    Figure 3-21: All Ports View

  1. Group Setup

The benefit of Group Setup is the ability to setup link configurations, spanning tree configurations, and VLAN memberships for a group of ports at the same time. As shown in Figure 3-22, there are buttons for All Ports and No Ports, simply click to add all ports to the group or to clear up the ports that are associated with the group.

Add individual ports to the group

  • Click the arrow of the port box and choose a port by highlighting it
  • Click Add to add that port to the group

Remove a port from group

  • Highlight the port from the group listing and choose Remove

These options exist in the Group sub-folder of the Port Manager.

Figure 3-22: Group: Group Setup

  1. Port Configuration

The Port Configuration screen is available in both the Group Setup and individual port pages. These pages allow for the manipulation of port link settings. There are four buttons that toggle between enabled and disabled states when chosen. These buttons are for:

  • Auto Negotiation: Sets the Auto Negotiation on or off
  • Admin status: Sets the port at Enable or Disable
  • Source security: Turns security to the port on or off
  • Flow Control: Used to stop the sender from sending data until the receiver can accept it

The link parameter settings

  • Duplex: Sets the duplex rate as Full or Half.

When finished setting up the ports, choose Submit to activate the changes.

Note:

1) The one notable difference in the Group Port Configuration screen and the Group Port Configuration screen is the operational status.

2) On the ports 1-8 configuration screen it will state whether or not that port is Up or Down. The Up will be displayed in green while the Down is displayed in red. This informs the administrator whether or not the port is attached and active.

Figure 3-23a: Group: Port Configuration

Figure 3-23b: Port #: Port Configuration

  1. Spanning Tree Configuration

    The spanning tree priority is a numeric value assigned to a port or group that determines the level of importance that this particular port or group holds in the bridge group. The lower the number the higher the importance. Similarly, the spanning tree cost is a variable that helps the system to determine which port to use in a group (refer Figure 3-24a, Figure 3-24b).

    Note: The port or group with the lower cost will be chosen first by the system.

    Figure 3-24a: Group: Spanning Tree Configuration

    Figure 3-24b: Port #: Spanning Tree Configuration

  1. VLAN Membership

Any VLAN that has been created from the System Manager will be displayed on the screen, as seen in Figures 2-25. Up to 16 VLANs with unique ID numbers and names can be added. VLAN ID numbers must be in the range of 1-4094.

Add a port or group to the VLAN

  • Click on the box to configure VLAN membership. Settings can be changed from Untagged or Tagged.

Remove a port or group from the VLAN

  • Click the box until it is blank and the VLAN membership for that port will be removed. To reflect the current system settings, click the Refresh button in the lower left.

Figure 3-25a : Group VLAN Membership

Figure 3-25b: Port #: VLAN Membership

MIB Viewer

The Management Information Base (or MIB) Viewer section of the Web Interface, allows the administrator to chart system data in different manners.

  1. Comparison Chart

For the Comparison Chart section (see Figure 3-26a), there are three parameters to set: Statistic, Refresh Rate, and Color. All charts have a maximum ceiling of 231-1. You can see the value of each bar or line in the chart by clicking on the bar.

  • StatisticThe type of system data to be monitored
  • Refresh RateThe time interval between automatic refreshes
  • ColorThe color setting for the chart

When all of the variables are set, click Chart.

Figure 3-26a: Comparison Chart

The chart screen, seen below as Figure 2-26b, has a couple of options as well.

Reset

  • To locally reset the data and start collecting new data.

Three options of the scale:

  • Auto scaleAutomatically choose an appropriate scale for data
  • Manual scaleRequires user to enter the lower and upper values
  • Full scalePuts the maximum and minimum boundary value as the scale

Figure 3-26b: Comparison Chart: Chart

  1. Group Chart

View error statistics of a specific port (see Figure 3-27a):

  • Click the arrow in the Group box and select a port to chart
  • Select a Refresh Rate and a Color
  • Click Chart to move to the graphical screen

Figure 3-27a: Group Chart

There are twelve data transmit error types on this screen to choose from.

Scale setting

  • As in the Comparison Chart, the scale can be set to Manual, Full, or Auto.

Get the exact value of the statistic

  • Click the mouse button on any of the bars in the chart and a box with the exact value will appear.

Reset

  • Click Reset to clear the chart and start plotting from new data, which is computed relative to when the reset button was pressed. This does not reset the statisticsvalues on the switch, just the local values.

Figure 3-27b: Group Chart: Chart

  1. History Graph

The history graph allows up to twelve colors to be chosen in order to plot any statistic for up to 10 ports.

Set up the information to graph

  • Choose a statistic in the statistics box and highlighting an option
  • Decide on a refresh rate from the times provided
  • Select the ports to be viewed by choosing a port and color to represent
  • Click Add
  • Click the Graph button to proceed

Figure 3-28a: History Graph

The graph page, as shown in Figure 3-28b, has all of the same options as the other chart screens. The scale can be set to Auto, Manual, or Full. The refresh button will remove old data from the screen and start a new graph. Clicking on the black data points will show the exact value of that point.

Figure 3-28b: History Graph: Graph


[Top of this Chapter] Installation Table of Content Console Interface

 


Copyright (c) 2000, Planet Technology Corp.
logo-b.GIF (2535 bytes)