PLANET Web Switch Family

Web / SNMP MANAGEABLE

SGSW-2403

24-Port 10/100/1000Mbps stackable switch


Web-Based Management

6.1 Web-Based Configuration and Monitoring

As well as the menu-driven system configuration program, the agent module provides an embedded HTTP Web agent. This agent can be accessed by any computer on the network using a standard Web browser (Internet Explorer 4.0 or above, or Netscape Navigator 4.0 or above).

Using the Web browser management interface you can configure a switch and view statistics to monitor network activity. The Web interface also provides access to a range of SNMP management functions with access to the switch's MIB and RMON database.

Prior to accessing the switch from a Web browser, be sure you have first performed the following tasks:

  1. Configure it with a valid IP address, subnet mask, and default gateway using an out-of-band serial connection or BOOTP protocol.
  2. Set the Administrator user name and password using an out-of-band serial connection. Access to the Web agent is controlled by the same Administrator user name and password as the on-board configuration program.



 

6.2 Navigating the Web Browser Interface

To access the Web-browser interface you must first enter a user name and password. The default user name is "admin" with no password. The administrator has Read/Write access to all configuration parameters and statistics.

6.2.1 Home Page

When your Web browser connects with the switch´s Web agent, the home page is displayed as shown below. The home page displays the Main Menu on the left-hand side of the screen and System Information on the right-hand side. The Main Menu links are used to navigate to other menus and display configuration parameters and

 If this is your first time to access the management agent, you should define a new Administrator password, record it and put it in a safe place. From the Main Menu, select Security and enter a new password for the Administrator. Note that passwords can consist of up to 11 alphanumeric characters and are not case sensitive.
 

NOTES:

Based on the default configuration, a user is allowed three attempts to enter the correct password; on the third failed attempt the current connection is terminated. See "Console Login Configuration".

 

6.2.2 Configuration Options

Configurable parameters have a dialog box or a drop-down list. Once a configuration change has been made on a page, be sure to click on the "Apply" button at the bottom of the page to confirm the new setting. The following table summarizes the Web page configuration buttons.
 

 


 

6.3 Panel Display

The Web agent displays an image of the switch´s ports, showing port links and activity. Clicking on the image of a port displays statistics and configuration information for the port. Clicking on the image of the serial port (labeled "Mgmt" displays the Console Configuration screen. Clicking on any other part of the front panel displays "Switch Information".

 

6.3.1 Port State Display

Click on any port to display a summary or port status as shown below, as well as

Etherlike statistics and RMON statistics.
 

 

6.3.2 Console Configuration

If you are having difficulties making an out-of-band console connection to the serial port on the agent module, you can display or modify the current settings for the serial port through the Web agent. Click on the serial port icon in the switch image to display or configure these settings, as shown below.

 


 

6.4 Main Menu

Using the on-board Web agent, you can define system parameters, manage and control the switch, the connected stack and all its ports, or monitor network conditions. The following table briefly describes the selections available from this program.

 


 

6.5 System Information

Use the System Information screen to display descriptive information about the switch, or for quick system identification as shown in the following figure and table.

 


 

6.6 Switch Information

Use the Switch Information screen to display hardware/firmware version numbers for the main board, as well as the power status and modules plugged into the system.

6.6.1 Main Board

 

6.6.2 Agent Module

6.6.3 Expansion Slot

   

 


6.7 IP Configuration

Use the IP Configuration screen to set the bootup option, configure the IP address for the on-board management agent, or set the number or concurrent Telnet sessions allowed. The screen shown below is described in the following table.

 

 


6.8  SNMP Configuration

Use the SNMP Configuration screen to display and modify parameters for the Simple Network Management Protocol (SNMP). The stack should include an SNMP agent module which monitors the status of its hardware, as well as the traffic passing through its ports. A computer attached to the network, called a Network Management Station (NMS), can be used to access this information. Access rights to the agent module are controlled by community strings. To communicate with the switch, the NMS must first submit a valid community string for authentication. The options for configuring community strings and related trap functions are described in the following figures and table.

6.8.1 SNMP Community

The following figure and table describe how to configure the community strings authorized for management access. Up to 5 community names may be entered.

 

 

6.8.2  Trap Managers

The following figure and table describe how to specify management stations that will receive authentication failure messages or other trap messages from the switch. Up to 5 trap managers may be entered.

 

 


 

6.9 Security Configuration

Use the Security Configuration screen to restrict management access based on a specified password. The Administrator has write access for parameters governing the SNMP agent. You should therefore assign a password to the Administrator as soon as possible, and store it in a safe place. (If for some reason your password is lost, or you cannot gain access to the system´s configuration program, contact your PLANET distributor for assistance.)

6.9.1 Change Password

 

 
This password is for the system Administrator, with access privilege of Read/Write for all screens. Passwords can consist of up to 11 alphanumeric characters and are not case sensitive. (The defaults are: User name: admin; password: null)


6.A Firmware Upgrade Options

You can upgrade system firmware via a Web browser, a TFTP server, or a direct connection to the console port.

6.A.1  Web Upload Management

Use the Web Upload Management menu to load software updates into the switch. The upload file should be a binary file from PLANET; otherwise the agent will not accept it. The success of the upload operation depends on the quality of the network connection. After uploading the new software, the agent will automatically restart itself. Parameters shown on this screen are indicated in the following figure and table.

   

 

6.A.2  TFTP Download Management

Use the TFTP Download Management menu to load software updates into the switch. The download file should be a binary file from PLANET; otherwise the agent will not accept it. The success of the download operation depends on the accessibility of the TFTP server and the quality of the network connection. After downloading the new software, the agent will automatically restart itself. Parameters shown on this screen are indicated in the following figure and table.  

  

 


6.B  Address Table Configuration

The Address Table contains the unicast MAC addresses and VLAN identifier associated with each port (that is, the source port), sorted by MAC address or VLAN. You can also clear the entire address table, or information associated with a specific address; or set the aging time for deleting inactive entries. The information displayed in the Address Table is indicated in the following figure and table.

 

 


 

6.C  Spanning Tree Algorithm (STA)

The Spanning Tree Algorithm can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices (that is, STA compliant switch, bridge or router) in your network to ensure that only one route exists between any two stations on the network. For a more detailed description of how to use this algorithm, refer to "Spanning Tree Algorithm" .

6.C.1 Spanning Tree Information

The Spanning Tree Information screen displays a summary of the STA information for the overall bridge or for a specific port. To make any changes to the parameters for the Spanning Tree, use the Spanning Tree Configuration menu.

6.C.1.1 Spanning Tree

The parameters shown in the following figure and table describe the current bridge STA Information.

 

Parameter

Description

 Spanning Tree State

Shows if the switch is enabled to participate in an STA compliant network.

 Bridge ID

A unique identifier for this bridge, consisting of bridge priority plus MAC address (where the address is normally taken from the agent).

 Max Age

The maximum time (in seconds) a device can wait without receiving a configuration message before attempting to reconfigure.

 Hello Time

The time interval (in seconds) at which the root device transmits a configuration message.

 Forward Delay

The maximum time (in seconds) the root device will wait before changing states (i.e., listening to learning to forwarding).

 Designated Root

The priority and MAC address of the device in the spanning tree that this switch has accepted as the root device.

 Root Port

The number of the port on this switch that is closest to the root. This switch communicates with the root device through this port. If there is no root port, then this switch has been accepted as the root device of the spanning tree network.

 Root Path Cost

The path cost from the root port on this switch to the root device.

 Configuration Changes

The number of times the spanning tree has been reconfigured.

 Last Topology Change

The time since the spanning tree was last reconfigured.

 

6.C.1.2  Ports

The parameters shown in the following figure and table are for port STA Information.
 

 

6.C.2 Spanning Tree Configuration

The following figures and tables describe Bridge STA configuration.

6.C.2.1 Switch 

 

 

6.C.2.2  When the Switch Becomes Root

 

6.C.3  STA Port Configuration

The following figure and table describe STA configuration for ports or modules.

 

 

 


 

6.D  Configuring Bridge MIB Extensions

The Bridge MIB includes extensions for managed devices that support Traffic Classes and Virtual LANs. To display and configure these extensions, use the Bridge Extension screen as shown below:

6.D.1 Bridge Capability

  

 

6.D.2  Bridge Settings

 


 

6.E  Priority

IEEE 802.1p defines up to 8 separate traffic classes. This switch supports Quality of Service (QoS) by using two priority queues, with Weighted Fair Queuing for each port. You can use the Priority Menu to configure the default priority for each port, or to display the mapping for the traffic classes.

6.E.1 Port Priority Configuration

Inbound frames that do not have any VLAN tags are tagged with the input port´s default VLAN ID (PVID) and the default ingress user priority as shown in the following screen, and then sorted into the appropriate priority queue at the output port. (Note that if the output port is an untagged member of the associated VLAN, these frames are stripped of all VLAN tags prior to transmission.)

The default priority for all ingress ports is zero. Therefore, any inbound frames that do not have priority tags will be placed in the low priority queue of the output port. You can use the Port Priority Configuration screen to adjust default priority for any port as shown below.

 

 

 

6.E.2  Port Traffic Class Information

This switch provides two priority levels with Weighted Fair Queuing for port egress. This means that any frames with a default or user priority from 0~3 are sent to the low priority queue "0" while those from 4~7 are sent to the high priority queue "1" as shown in the following screen.

 


 

6.F Configuring Virtual LANs

You can use the VLAN configuration menu to assign any port on the switch to any of up to 255 LAN groups. In conventional networks with routers, broadcast traffic is split up into separate domains. Switches do not inherently support broadcast domains. This can lead to broadcast storms in large networks that handle a lot of NetBeui or IPX traffic. By using IEEE 802.1Q compliant VLANs, you can organize any group of network nodes into separate broadcast domains, confining broadcast traffic to the originating group. This also provides a more secure and cleaner network environment. For more information on how to use VLANs, refer to "Virtual LANs". The VLAN configuration screens are described in the following sections.

 

6.F.1 VLAN Basic Information

The VLAN Basic Information screen displays basic information on the VLAN type supported by this switch.  

 

6.F.2 VLAN Current Table

This screen shows the current port members of each VLAN and whether or not the port supports VLAN tagging. Ports assigned to a large VLAN group that crosses several switches should use VLAN tagging. However, if you just want to create a small port-based VLAN for one or two switches, you can assign ports to the same untagged VLAN. The current configuration is shown in the following screen.

 

 

6.F.3 VLAN Static List

Use this screen to create or remove VLAN groups.

 

 

6.F.4  VLAN Static Table

Use this screen to modify the settings for an existing VLAN. You can add/delete port members for a VLAN from any unit in the stack. (Note that VLAN1 is fixed as an untagged VLAN containing all ports in the stack, and cannot be modified via this screen.)    

 

Use the following menu to add or remove a port to the displayed VLAN group. As you can see from this example, all ports are included in VLAN 1 by default.

 

 

 

Use the menu shown below to prevent a port from being dynamically added to the displayed VLAN group through GVRP

 

 

 

Use the menu shown below to assign ports to the specified VLAN group as an IEEE 802.1Q tagged or untagged port. Assign ports as tagged if they are connected to 802.1Q VLAN compliant devices, or untagged if they are connected to VLAN-unaware devices.

 

 

 

6.F.5 VLAN Static Membership by Port

Use the screen shown below to assign VLAN groups to the selected port. To perform detailed port configuration for a specific VLAN, use the VLAN Static Table.

 

 

6.F.6 VLAN Port Configuration

Use this screen to configure port-specific settings for IEEE 802.1Q VLAN features.

 

 


 

6.G IGMP Multicast Filtering

Multicasting is used to support real-time applications such as video conferencing or streaming audio. A multicast server does not have to establish a separate connection with each client. It merely broadcasts its service to the network, and any hosts which want to receive the multicast register with their local multicast switch/ router. Although this approach reduces the network overhead required by a multicast server, the broadcast traffic must be carefully pruned at every multicast switch/router it passes through to ensure that traffic is only passed on the hosts which subscribed to this service. This switch uses IGMP (Internet Group Management Protocol) to query for any attached hosts who want to receive a specific multicast service. The switch looks up the IP Multicast Group used for this service and adds any port which received a similar request to that group. It then propagates the service request on to any neighboring multicast switch/router to ensure that it will continue to receive the multicast service. (For more information, see "IGMP Protocol".)

6.G.1 Configuring IGMP

This protocol allows a host to inform its local switch/router that it wants to receive transmissions addressed to a specific multicast address group. Use the IGMP Configuration screen to set key parameters for multicast filtering as shown below.

 

 

6.G.2  IP Multicast Registration Table

Use the IP Multicast Registration Table to display all the multicast groups active on this switch, including multicast IP addresses and the corresponding VLAN ID.

 

 


 

6.H Port Menus

6.H.1 Port Information

The Port Information screen displays the port status, link state, the communication speed and duplex mode, as well as the flow control in use. To change any of the port settings, use the Port Configuration menu. The parameters are shown in the following figure and table.

 

 

6.H.2  Port Configuration

Use the Port Configuration menu to configure any port on the switch.

 

 


 

6.I  Using a Port Mirror for Analysis

You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner. When mirroring port traffic, note that the target port must be included in the same VLAN as the source port. (See VLAN Static List)

You can use the port mirror configuration screen to designate a single port pair for mirroring as shown below.

 

 


 

6.J Port Trunk Configuration

Port trunks can be used to increase the bandwidth of a network connection or to ensure fault recovery. You can configure up to four trunk connections (combining 2~4 ports into a fat pipe) between any two switches. However, before making any physical connections between devices, use the Trunk Configuration menu to specify the trunk on the devices at both ends.

When using a port trunk, note that:

 

Use the Port Trunking Configuration screen to set up port trunks as shown below:

 

 

The RJ-45 ports used for one side of a trunk must all be on the same internal switch chip. The port groups permitted include:
 

Switch Model

Group 1

Group 2

Group 3

SGSW-2403

1,2,3,4,13,14,15,16

5,6,7,8,17,18,19,20

9,10,11,12,21,22,23,24

 

The 100BASE-FX fiber ports used for one side of a trunk must all be on the same module. However, the 1000BASE-SX ports used for one side of a trunk may be on any switch in the stack, or both on the same switch if used standalone.
 

Media Module

 

100BASE-FX

Any ports on a single module

1000BASE-SX

Up to four Gigabit ports from any switch in the stack, or both Gigabit ports on two modules installed in a standalone switch.

 

For example, when using Gigabit ports to form a trunk within a stack, the Gigabit ports will all be at Port 25. In this case, you could specify a trunk group consisting of: (Unit1-Port25, Unit2-Port25, Unit3-Port25, Unit4-Port25),
or two trunks consisting of: (Unit1-Port25, Unit2-Port25) and (Unit3-Port25, Unit4-Port25).


 

6.K Port Statistics

Use the Port Statistics menu to display Etherlike or RMON statistics for any port on the switch. The statistics displayed are indicated in the following figure and table.

6.K.1 Etherlike Statistics

Etherlike Statistics display key statistics from the Ethernet-like MIB for each port. Error statistics on the traffic passing through each port are displayed. This information can be used to identify potential problems with the switch (such as a faulty port or unusually heavy loading). Values displayed have been accumulated since the last system reboot.

 

 

 

 

6.K.2 RMON Statistics

RMON Statistics display key statistics for each port or media module from RMON group 1. (RMON groups 2, 3 and 9 can only be accessed using SNMP management software such as AccView.) The following screen displays overall statistics on traffic passing through each port. RMON statistics provide access to a broad range of statistics, including a total count of different frame types passing through each port. Values displayed have been accumulated since the last system reboot.

 

 

 

 

[Top of this Chapter]

Ch 5. Using the System Configuration Program

Table of content

CH 7. Advanced Topics


Copyright (c) 2001, Planet Technology Corp.