User Guide, v1Managed Switch LGS5XX
CHAPTER 2 System StatusLinksys6Interface StatisticsThe Interface Statistics page displays traffic statistics per port. The refresh rate of the informa
Visit linksys.com/support for award-winning technical support© 2014 Belkin International, Inc. and/or its affiliates. All rights reserved. BELKIN, LIN
7Chapter 3 Quick StartLinksys7Chapter 3 Quick StartQuick StartThis section describes how to view device statistics.To simplify device configuration th
8Chapter 4 System ManagementLinksysChapter 4 System ManagementSystem ManagementThis chapter describes the following topics: • System Information • Tim
9Chapter 4 System ManagementLinksysTime Configuration MethodsThe following methods are available for setting the system time on the device: • Manual—Y
10Chapter 4 System ManagementLinksys • SNTP Client Unicast—Select to enable client Unicast mode. • SNTP IPv4 Multicast Rx—Select to receive SNTP IPv4
11Chapter 4 System ManagementLinksysSNTP Unicast ServerUp to 16 Unicast SNTP servers can be configured.NOTE:To specify a Unicast SNTP server by name,
12Chapter 4 System ManagementLinksysSNTP Multicast/Anycast InterfaceThe device can be in active and/or passive mode (see SNTP Modes for more informati
13Chapter 4 System ManagementLinksysYou can configure the messages that are written to each log by severity, and a message can go to more.Log Manageme
14Chapter 4 System ManagementLinksysRemote Log ServersThe Remote Log Servers page enables defining remote SYSLOG servers where log messages are sent (
15Chapter 4 System ManagementLinksysTCAM ResourcesThe TCAM Resources page is only displayed in Layer 3 mode.TCAM holds the rules produced by applicati
iTable of ContentsLinksysiChapter 1: Getting Started . . . . . . . . . . . . . . . . . . . . . 1Starting the Web-based Configuration Utility . . . . .
16Chapter 5 Port ManagementLinksys16Chapter 5 Port ManagementPort ManagementThis section describes port configuration, link aggregation, and the Green
17Chapter 5 Port ManagementLinksys- Port protection is not subject to VLAN membership. Devices connected to protected ports are not allowed to commun
18Chapter 5 Port ManagementLinksysLoad BalancingTraffic forwarded to a LAG is load-balanced across the active member ports, thus achieving an effectiv
19Chapter 5 Port ManagementLinksysSTEP 4 Enter the values for the following fields: • Operational Status—Displays the following:- Status—Whether the
20Chapter 5 Port ManagementLinksysEnergy Efficient Ethernet FeatureEEE is designed to save power when there is no traffic on the link. In Energy Detec
21Chapter 5 Port ManagementLinksys802.3 EEE Configuration WorkflowThis section describes how to configure the 802.3 EEE feature and view its counters.
22Chapter 5 Port ManagementLinksys • Energy Detect Reason— If Energy Detect Mode is not operational, this field identifies why not.STEP 5 Select a Po
23Chapter 5 Port ManagementLinksysPoE Operation • PoE implementation stages are as follows: • Detection—Sends special pulses on the copper cable. When
24Chapter 5 Port ManagementLinksysCAUTIONConsider the following when connecting switches capable of supplying PoE:The PoE model of the device is PSE (
25Chapter 5 Port ManagementLinksysPort Limit Power ModeTo configure port limit power mode do the following:STEP 1 Click Configuration > Port Manag
iiTable of ContentsLinksysChapter 7: Spanning Tree Management . . . . . . . . . . . . .32Overview. . . . . . . . . . . . . . . . . . . . . . . . . . .
26Chapter 6 VLAN ManagementLinksys26Chapter 6 VLAN ManagementVLAN ManagementThis section covers the following topics:• Overview• VLANs• Interfaces•
27Chapter 6 VLAN ManagementLinksysSome VLANs can have additional roles: • Voice VLAN—For more information refer to Voice VLAN. • Guest VLAN—For more i
28Chapter 6 VLAN ManagementLinksysTo create a VLAN, do the following:STEP 1 Click Configuration > VLAN Management > VLANs.This page displays th
29Chapter 6 VLAN ManagementLinksysVLAN MembershipsThe VLAN Memberships page displays the VLAN memberships of the ports in various presentations. You c
30Chapter 6 VLAN ManagementLinksysVoice VLANThis section covers the following topics: • Overview • Feature Configuration • Telephony OUI InterfacesOve
31Chapter 6 VLAN ManagementLinksysVoice VLAN WorkflowWorkflow1: To configure the Telephony OUI MethodSTEP 1 Configure Telephony OUI in the Feature Co
32Chapter 7 Spanning Tree ManagementLinksys32Chapter 7 Spanning Tree ManagementSpanning Tree ManagementThis section describes the Spanning Tree Protoc
33Chapter 7 Spanning Tree ManagementLinksys• HelloTime—Settheinterval(inseconds)thatarootbridgewaitsbetweenconfiguration messages. • Maxi
34Chapter 7 Spanning Tree ManagementLinksys- Forwarding—The port is in Forwarding Mode. The port can forward traffic and learn new MAC addresses. • D
35Chapter 7 Spanning Tree ManagementLinksys • STP Mode — Select either STP or RSTP. • Point to Point Status—Displays the point-to-point operational st
iiiTable of ContentsLinksysPort Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71Storm Control. . . . . . . . . . . . . . .
36Chapter 8 MAC Address ManagementLinksys36Chapter 8 MAC Address ManagementMAC Address ManagementThis section describes how to add MAC addresses to th
37Chapter 9 MulticastLinksysChapter 9 MulticastMulticastThis section describes the Multicast Forwarding feature and covers the following topics: • Ove
38Chapter 9 MulticastLinksysThe system maintains lists of Multicast groups for each VLAN, and this manages the Multicast information that each port sh
39Chapter 9 MulticastLinksys • Bridge Multicast Filtering—Select to enable filtering of Multicast addresses.VLAN Settings • VLAN ID—Select the VLAN ID
40Chapter 9 MulticastLinksysMulticast Router PortsA Multicast router (Mrouter) port is a port that connects to a Multicast router. The device includes
41Chapter 9 MulticastLinksysUnregistered MulticastMulticast frames are generally forwarded to all ports in the VLAN. If IGMP Snooping is enabled, the
42Chapter 9 MulticastLinksysMAC Group Address FDBThe device supports forwarding incoming Multicast traffic based on the Multicast group information. T
43Chapter 9 MulticastLinksysIP Group Address FDBThe IP Group Address FDB page enables querying and adding IP Multicast groups contained in the IP Mult
44Chapter 10 IP InterfaceLinksys44Chapter 10 IP InterfaceIP InterfaceThis section describes IP interfaces and covers the following topics: • IPv4 • IP
45Chapter 10 IP InterfaceLinksysThe IP address assignment rules for the device are as follows: • When in Layer 2 system mode, unless the device is con
1CHAPTER 1 Getting StartedLinksys1CHAPTER 1 Getting StartedGetting StartedThis section provides an introduction to the Web-based configuration utility
46Chapter 10 IP InterfaceLinksys • Default Gateway—Displays the current default gateway status.NOTE:If the device is not configured with a default gat
47Chapter 10 IP InterfaceLinksys • Route Type—Select the route type.- Reject—Rejects the route and stops routing to the destination network via all g
48Chapter 10 IP InterfaceLinksysIPv6This section describes IPv6 configuration. It covers the following topics: • Overview • IPv6 Interfaces • IPv6 Int
49Chapter 10 IP InterfaceLinksysIPv6 Interface AddressesTo assign an IPv6 address to an IPv6 Interface, do the following:STEP 1 Click Configuration &
50Chapter 11 IP Network OperationsLinksys50Chapter 11 IP Network OperationsIP Network OperationsThis section covers the following topics:• DomainNam
51Chapter 11 IP Network OperationsLinksysDHCPThis section describes DHCP configuration. It covers the following topics: • Overview • DHCP Snooping/Rel
52Chapter 11 IP Network OperationsLinksysInteractions Between DHCPv4 Snooping, DHCPv4 Relay and Option 82The following tables describe how the device
53Chapter 11 IP Network OperationsLinksysThe following describes how DHCP request packets are handled when DHCP snooping is disabled.DHCP RelayVLAN wi
54Chapter 11 IP Network OperationsLinksysDHCP Trusted Packet HandlingThe actions are as follows:STEP 1 Device sends DHCPDISCOVER to request an IP add
55Chapter 11 IP Network OperationsLinksysDHCP Snooping Along With DHCP RelayIf both DHCP Snooping and DHCP Relay are globally enabled, then if DHCP Sn
2CHAPTER 1 Getting StartedLinksysStarting the Web-based Configuration UtilityThis section describes how to navigate the Web-based switch configuration
56Chapter 11 IP Network OperationsLinksys • DHCP Snooping—Select to enable DHCP snooping. • DHCP Relay— Select to enable DHCP Relay.STEP 2 To enable
57Chapter 11 IP Network OperationsLinksysSTEP 6 View entries to the Binding database in the IP Network Operations > DHCP > DHCP Snooping Bindin
58Chapter 11 IP Network OperationsLinksysBindings Settings • Interface—Type of interface on which a packet is expected. • Type—The possible field valu
59Chapter 11 IP Network OperationsLinksysHow ARP Prevents Cache PoisoningThe ARP inspection feature relates to interfaces as either trusted or untrust
60Chapter 11 IP Network OperationsLinksysDefining ARP Inspection PropertiesTo configure ARP Inspection:STEP 1 Click IP Network Operation > ARP Ins
61Chapter 11 IP Network OperationsLinksysInterface SettingsTo configure trusted interfaces, do the following:STEP 1 Click Configuration > IP Netwo
62Chapter 12 SecurityLinksys62Chapter 12 SecuritySecurityThis section describes device security and access control. The system handles various types o
63Chapter 12 SecurityLinksysRADIUSRemote Authorization Dial-In User Service (RADIUS) servers provide a centralized 802.1X or MAC-based network access
64Chapter 12 SecurityLinksys- Interface—Select the link local interface (if IPv6 Address Type Link Local is selected) from the list. • Server IP Addr
65Chapter 12 SecurityLinksys • Multiple Sessions—Supports client-based authentication. Each client must be authenticated individually before receiving
3CHAPTER 1 Getting StartedLinksysWindow NavigationThis section describes the features of the Web-based switch configuration utility.Application Header
66Chapter 12 SecurityLinksysMultiple Authentication MethodsIf more than one authentication method is enabled on the switch, the following hierarchy of
67Chapter 12 SecurityLinksysUnauthenticated VLANs and the Guest VLANUnauthenticated VLANs and the guest VLAN provide access to services that do not re
68Chapter 12 SecurityLinksysAuthenticati on MethodSingle-host Multi-host Multi-sessionsDevice in L3 Device in L2802.1x † † N/S †MAC † † N/S †Legend:†—
69Chapter 12 SecurityLinksys- None—Do not authenticate the user. Permit the session. • Guest VLAN—Enable the use of a guest VLAN for unauthorized por
70Chapter 12 SecurityLinksysAuthenticated HostsTo display details about authenticated users, do the following:STEP 1 Click Configuration > Securi
71Chapter 12 SecurityLinksysPort SecurityNetwork security can be increased by limiting access on a port to users with specific MAC addresses. The MAC
72Chapter 12 SecurityLinksysSTEP 3 Enter the parameters. • Interface—Select the port for which storm control is enabled. • Storm Control—Select to e
73Chapter 13 Access Control ListLinksys73Chapter 13 Access Control ListAccess Control ListThe Access Control List (ACL) feature is part of the securit
74Chapter 13 Access Control ListLinksysCreating ACLs WorkflowTo create ACLs and associate them with an interface, perform the following:1. Create one
75Chapter 13 Access Control ListLinksys • Destination MAC Address—Select Any if all destination addresses are acceptable or User Defined to enter a de
CHAPTER 2 System StatusLinksys4CHAPTER 2 System StatusSystem StatusThis section describes how to view device statistics. It covers the following topic
76Chapter 13 Access Control ListLinksysSTEP 4 Click Apply. The IPv4-based ACL is saved to the Running Configuration file.IPv4-Based ACEAdding Rules (
77Chapter 13 Access Control ListLinksys- IP Precedence to match—IP precedence is a model of TOS (type of service) that the network uses to help provi
78Chapter 14 Quality of ServiceLinksys78Chapter 14 Quality of ServiceQuality of ServiceThe Quality of Service feature is applied throughout the networ
79Chapter 14 Quality of ServiceLinksysWhen the mode is changed, the following occurs: • When changing from QoS Advanced Mode to any other mode, policy
80Chapter 14 Quality of ServiceLinksysa Configure Basic Mode, as described in Workflow to Configure Basic QoS Modeb Configure Advanced Mode, as desc
81Chapter 14 Quality of ServiceLinksys • Scheduling Method- Strict Priority—Traffic scheduling for the selected queue and all higher queues is based
82Chapter 14 Quality of ServiceLinksysEnable or disable the global selected trusted mode at the ports by using the Basic QoS page. If a port is disabl
83Chapter 14 Quality of ServiceLinksysAdvanced QoS settings consist of three parts: • Definitions of the rules to match. All frames matching a single
84Chapter 14 Quality of ServiceLinksysDefining Class MappingA Class Map defines a traffic flow with ACLs (Access Control Lists). A MAC ACL and an IP A
85Chapter 14 Quality of ServiceLinksys • An action to be applied to frames that are over the limits (called out-of- profile traffic), where such frame
CHAPTER 2 System StatusLinksys5RMONThe Statistics page displays detailed information regarding packet sizes and information regarding physical layer e
86Chapter 14 Quality of ServiceLinksys • Policy Name—Displays the policy to which the class map is being added. • Class Map Name—Select an existing cl
87Chapter 14 Quality of ServiceLinksysPolicy BindingThe Policy Binding page shows which policy profile is bound and to which port. When a policy profi
88Chapter 15 MaintenanceLinksys88Chapter 15 MaintenanceMaintenanceThis section describes how to view system information and configure various options
89Chapter 15 MaintenanceLinksysFile ManagementThis section describes how system files are managed. The following topics are covered:• Overview• Firm
90Chapter 15 MaintenanceLinksys • Copy one configuration file type to another configuration file type as described in the Configuration File Copy sect
91Chapter 15 MaintenanceLinksysActive Firmware ImageThere are two firmware images stored on the device. One of the images is identified as the active
92Chapter 15 MaintenanceLinksys • TFTP Server IP Address—Enter the IP address of the TFTP server. • TFTP Server Name—Enter the domain name of the TFTP
93Chapter 15 MaintenanceLinksysDiagnosticsThis section covers the following topics: • Optical Module Status • Ping • Port MirroringOptical Module Stat
94Chapter 15 MaintenanceLinksysThe following fields are displayed: • Destination Port—Port to which traffic is to be copied; the analyzer port. • Sour
95SupportLinksys95SupportClick “Get Support” to go to the Linksys Small Business support website. Resources include setup help, frequently asked quest
Komentarze do niniejszej Instrukcji