Trendnet User's Guide Cover Page

Total Page:16

File Type:pdf, Size:1020Kb

Trendnet User's Guide Cover Page TRENDnet User’s Guide Cover Page TRENDnet User’s Guide Table of Contents Contents System Information ...................................................................... 29 Products Overview .......................................................................... 1 Basic Settings ................................................................................ 30 TI-PG541i ....................................................................................................................... 1 General Settings .......................................................................................................... 30 TI-PG102i ....................................................................................................................... 1 System ............................................................................................................... 30 TI-G642i ......................................................................................................................... 2 Jumbo Frame ..................................................................................................... 31 SNTP ................................................................................................................... 32 TI-G102i ......................................................................................................................... 2 Management Host ............................................................................................. 34 TI-G160WS ..................................................................................................................... 3 MAC Management ...................................................................................................... 36 TI-G160i ......................................................................................................................... 3 Static MAC Settings............................................................................................ 36 Products Hardwares and Features ................................................... 4 Age Time Settings .............................................................................................. 38 MAC Table ......................................................................................................... 38 PoE ................................................................................................................................. 4 Port Mirror ................................................................................................................... 39 TI-PG541i ....................................................................................................................... 4 Port Settings ................................................................................................................ 41 TI-PG102i ....................................................................................................................... 7 General Settings ................................................................................................ 42 Non-PoE ....................................................................................................................... 10 Information ........................................................................................................ 44 TI-G642i ....................................................................................................................... 10 Advanced Settings ........................................................................ 45 TI-G102i ....................................................................................................................... 13 Bandwidth Control ...................................................................................................... 45 TI-G160WS ................................................................................................................... 16 QoS .................................................................................................................... 45 TI-G160i ....................................................................................................................... 19 Rate Limitation .................................................................................................. 51 Switch Installation ........................................................................ 22 IGMP Snooping ............................................................................................................ 54 DIN-Rail Installation ..................................................................................................... 22 IGMP Snooping .................................................................................................. 54 Multicast Address .............................................................................................. 57 Install power supply connections ................................................................................ 23 VLAN ............................................................................................................................ 60 SFP Transceiver/Optical Cable Installation .................................................................. 23 Port Isolation ..................................................................................................... 60 Basic IP Configuration .................................................................................................. 24 802.1Q VLAN ...................................................................................................... 61 Connect additional devices to your switch .................................................................. 25 MAC VLAN ......................................................................................................... 65 Accessing switch management interfaces ...................................... 26 DHCP Options .............................................................................................................. 66 Access your switch command line interface................................................................ 26 DHCP Relay .................................................................................................................. 69 CLI Command Modes ......................................................................................... 26 EEE (Energy Efficient Ethernet) .................................................................................... 72 Access your switch web management page ................................................................ 28 ERPS (Ethernet Ring Protection Switching) ................................................................. 73 © Copyright 2020 TRENDnet. All Rights Reserved. i TRENDnet User’s Guide Table of Contents Link Aggregation .......................................................................................................... 77 SNMP Trap ....................................................................................................... 130 Loop Detection ............................................................................................................ 82 Auto Provision ........................................................................................................... 131 Modbus ........................................................................................................................ 84 Mail Alarm ................................................................................................................. 135 Power over Ethernet.................................................................................................... 88 Maintenance.............................................................................................................. 137 STP ............................................................................................................................... 93 System Log ................................................................................................................. 140 Security ....................................................................................... 102 User Account ............................................................................................................. 140 IP Source Guard ......................................................................................................... 102 Device Management.................................................................................................. 142 Binding Table ................................................................................................... 107 Toplogy Map .............................................................................................................. 146 ARP Inspection ................................................................................................. 109 Technical Specifications .............................................................. 147 Filter Table ....................................................................................................... 111 TI-PG541i ................................................................................................................... 147 Access Control List (ACL) ............................................................................................ 112 TI-PG102i ................................................................................................................... 149 802.1x .......................................................................................................................
Recommended publications
  • Networking Packet Broadcast Storms
    Lesson Learned Networking Packet Broadcast Storms Primary Interest Groups Balancing Authorities (BAs) Generator Operators (GOPs) Reliability Coordinators (RCs) Transmission Operators (TOPs) Transmission Owners (TOs) that own and operate an Energy Management System (EMS) Problem Statement When a second network cable was connected from a voice over internet protocol (VOIP) phone to a network switch lacking proper settings, a packet broadcast storm prevented network communications from functioning, and supervisory control and data acquisition (SCADA) was lost for several hours. Broadcast storm events have also arisen from substation local area network (LAN) issues. Details A conference room was set up for a training class that needed to accommodate multiple PCs. The bridge protocol data unit (BPDU) packet propagation prevention setting was disabled on a port in the conference room in order to place a network switch off of that port. Upon completion of the training, the network switch was removed; however, the BPDU packet propagation setting was inadvertently not restored. As part of a telephone upgrade project, the traditional phone in this conference room was recently replaced by a VOIP phone. Later, an additional network cable was connected to the output port of this VOIP phone into a secondary network jack within the conference room. When the second network cable was connected from a VOIP phone to a network switch lacking proper settings, a switching loop resulted. Spanning tree protocol is normally used to prevent switching loops from propagating broadcast packets continuously until the network capacity is overwhelmed. A broadcast packet storm from the switching loop prevented network communications from functioning and SCADA was lost for several hours.
    [Show full text]
  • Computer Communication Networks (Tcit / Se / Ee)
    Practical Workbook CS-351/CS-418 COMPUTER COMMUNICATION NETWORKS (TCIT / SE / EE) Name : Year : Batch : Roll No : Department: Department of Computer & Information Systems Engineering NED University of Engineering & Technology INTRODUCTION The days of mainframe computing using dumb terminals are long gone. The present time is the era of very powerful personal computers, interconnecting with each other and even better equipped servers, sometimes connecting across continental boundaries. Computer Communication Networks is a senior level undergraduate course in Computer and Information Systems Engineering, which covers various aspects of computer networks. It covers various classifications of computer networks and gives the students a good grasp on the various topics in computer networks. This laboratory manual aims to augment the classroom teaching of the course and to provide the students essential practical knowledge in the subject. The first and second labs deal with learning IPv4 Addressing, Sub-netting & Variable Length Subnet Masking (VLSM). The third lab deals with making crossover and straight-through UTP cables. This skill will come in very handy in various trades when the students go into practical life. It introduces some related standards and equipment used in this regard. The fourth lab jumps into Cisco routers. It is a hands-on exercise using some commonly used Cisco IOS commands. In this lab, the students will learn how to connect to and interact with Cisco routers. The fifth lab is about connecting different IP networks by defining static routes all around. Sixth lab introduces dynamic routing using a simple routing protocol, namely RIP (Routing Information Protocol) and its later version called RIP version 2.
    [Show full text]
  • Edgeswitch User Guide Table of Contents
    Configuration Interface Release Version: 1.8 EdgeSwitch User Guide Table of Contents Table of Contents Chapter 1: Overview . 1 Introduction . 1 Configuration . 1 Configuration Interface System Requirements . 1 Chapter 2: Navigation . 3 Accessing the Configuration Interface . 3 Common Interface Options . 4 Interface Screens . 5 Chapter 3: Dashboard . 7 Device Status . 8 Port Status . 8 Port Summary . 8 Chapter 4: VLANs . 13 VLANs . .. 13 Chapter 5: System Settings . 15 Device Name . 15 Management IP . 15 Spanning Tree Protocol . 17 Services . 17 System Actions . 18 Chapter 6: Tools . 21 MAC Table . 21 Ping . .. 21 Appendix A: Contact Information . 23 Ubiquiti Networks Support . 23 Ubiquiti Networks, Inc. i Table of Contents EdgeSwitch User Guide ii Ubiquiti Networks, Inc. EdgeSwitch User Guide Chapter 1: Overview Chapter 1: Overview Introduction This User Guide is designed to provide details about how to set up and use the EdgeSwitch® Configuration Interface, version 1.8 or above. This interface manages the EdgeSwitch and EdgeSwitch X models, which this User Guide will collectively refer to as EdgeSwitch. The EdgeSwitch XP models use a different user interface. This is described in the EdgeSwitch XP User Guide, which is available at: downloads.ubnt.com/edgemax Configuration This intuitive interface allows you to conveniently manage your EdgeSwitch using your web browser. There are two versions available; however, this User Guide describes the default, which is the new UI with a more graphical interface. The legacy UI is still available as an option and is described in the EdgeSwitch Administration Guide, which is available at: downloads.ubnt.com/edgemax You can also manage your device using the Ubiquiti® Network Management System, UNMS™, which lets you configure, monitor, upgrade, and back up your devices using a single software application.
    [Show full text]
  • LAN Redundancy
    LAN Redundancy Routing and Switching: Scaling Networks – Chapter 2 Copyleft 2014 Hacklab Cosenza (http://hlcs.it) Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials are Copyright Cisco Systems Inc. 1 MAC Address Table ● A switch moves traffic based on MAC addresses. ● Each switch maintains a MAC address table in high-speed memory, called content addressable memory (CAM). ● The switch recreates this table every time it is activated, using both the source MAC addresses of incoming frames and the port number through which the frame entered the switch. Mechanics of Switching ● As a unicast frame enters a port, the switch finds the source MAC address in the frame. ● It then searches the MAC table, looking for an entry that matches the address ● If the source MAC address is not in the table, the switch adds a MAC address ● Next, the switch checks the table for the destination MAC address. ● If an entry exists, the switch forwards the frame out the appropriate port number. ● If the entry does not exist, the switch floods the frame out every active port except the port upon which it was received Aging Time ● The switch deletes entries from the MAC address table if they are not used within a certain period of time. ● The name given to this period of time is the aging timer ● Removal of an entry is called aging out. ● When the switch adds a MAC address and port number entry and sets the aging timer. ● If the source MAC address already exists, the switch resets the aging timer Network Segmentation ● The size of broadcast and collision domains affect the flow of traffic.
    [Show full text]
  • Developing a New HSR Switching Node (Switchbox) for Improving Traffic Performance in HSR Networks
    energies Article Developing a New HSR Switching Node (SwitchBox) for Improving Traffic Performance in HSR Networks Nguyen Xuan Tien and Jong Myung Rhee * Received: 8 December 2015; Accepted: 5 January 2016; Published: 8 January 2016 Academic Editor: Neville Watson Department of Information and Communications Engineering, Myongji University, 116 Myongji-ro, Yongin-si, Gyeonggi-do 449-728, Korea; [email protected] * Correspondence: [email protected]; Tel.: +82-10-5227-0419; Fax: +82-31-330-6824 Abstract: High availability is crucial for industrial Ethernet networks as well as Ethernet-based control systems such as automation networks and substation automation systems (SAS). Since standard Ethernet does not support fault tolerance capability, the high availability of Ethernet networks can be increased by using redundancy protocols. Various redundancy protocols for Ethernet networks have been developed and standardized, such as rapid spanning tree protocol (RSTP), media redundancy protocol (MRP), parallel redundancy protocol (PRP), high-availability seamless redundancy (HSR) and others. RSTP and MRP have switchover delay drawbacks. PRP provides zero recovery time, but requires a duplicate network infrastructure. HSR operation is similar to PRP, but HSR uses a single network. However, the standard HSR protocol is mainly applied to ring-based topologies and generates excessively unnecessary redundant traffic in the network. In this paper, we develop a new switching node for the HSR protocol, called SwitchBox, which is used in HSR networks in order to support any network topology and significantly reduce redundant network traffic, including unicast, multicast and broadcast traffic, compared with standard HSR. By using the SwitchBox, HSR not only provides seamless communications with zero switchover time in case of failure, but it is also easily applied to any network topology and significantly reduces unnecessary redundant traffic in HSR networks.
    [Show full text]
  • Campus Networking Workshop
    Campus Networking Workshop Layer-2 Network Design Buildings and Layer 2 • There is usually a correspondence between building separation and subnet separation – Switching inside a building – Routing between buildings • This will depend on the size of the network – Very small networks can get by with doing switching between buildings – Very large networks might need to do routing inside buildings Layer 2 Concepts • Layer 2 protocols basically control access to a shared medium (copper, fiber, electro- magnetic waves) • Ethernet is the de-facto standard today – Reasons: • Simple • Cheap • Manufacturers keep making it faster Ethernet Functions • Source and Destination identification – MAC addresses • Detect and avoid frame collisions – Listen and wait for channel to be available – If collision occurs, wait a random period before retrying • This is called CASMA-CD: Carrier Sense Multiple Access with Collision Detection Ethernet Frame • SFD = Start of Frame Delimiter • DA = Destination Address • SA = Source Address • CRC = Cyclick Redundancy Check Evolution of Ethernet Topologies • Bus – Everybody on the same coaxial cable • Star – One central device connects every other node • First with hubs (repeated traffic) • Later with switches (bridged traffic) – Structured cabling for star topologies standardized Switched Star Topology Benefits • It’s modular: – Independent wires for each end node – Independent traffic in each wire – A second layer of switches can be added to build a hierarchical network that extends the same two benefits above – ALWAYS DESIGN WITH MODULARITY IN MIND Hub • Receives a frame on one port and sends it out every other port, always. • Collision domain spans the whole hub or chain of hubs • Traffic ends up in places where it’s not needed Hub Hub A frame sent by one node is always sent to every other node.
    [Show full text]
  • Implementing and Testing Vlans in Meshed Tree Protocol
    Rochester Institute of Technology RIT Scholar Works Theses 7-31-2020 Implementing and Testing VLANs in Meshed Tree Protocol Ankush Kaul [email protected] Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Kaul, Ankush, "Implementing and Testing VLANs in Meshed Tree Protocol" (2020). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Implementing and Testing VLANs in Meshed Tree Protocol by Ankush Kaul Committee Members Prof. Nirmala Shenoy Prof. Bruce Hartpence Prof. Bill Stackpole Prof. Daryl Johnson Thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Networking and Systems Administration Department of Information Sciences and Technologies B. Thomas Golisano College of Computing and Information Sciences Rochester Institute of Technology July 31, 2020 i Abstract Meshed Tree Protocol (MTP)[1][2] is being developed to overcome the performance challenges faced with older loop avoidance layer 2 protocols like Spanning Tree Protocol (STP)[3] and Rapid STP (RSTP)[5] which have high convergence time, causing a significant delay during initial convergence and subsequent re-convergence in the event of topology change or link failure. This slow convergence is not suitable for the modern high speed and dynamic networks and is being addressed with better performing protocols like MTP which uses Meshed Tree Algorithm (MTA) to form multiple overlapping trees[1]. In this thesis we will implement Virtual Local Area Network(VLAN)[4] for MTP networks using the Global Environment for Network Innovation (GENI)[19] testbed.
    [Show full text]
  • CCNA: Cisco Certified Network Associate Fast Pass, Third Edition
    85711.book Page 389 Friday, September 14, 2007 8:48 AM Glossary 85711.book Page 390 Friday, September 14, 2007 8:48 AM 390 Glossary 10BaseT Part of the original IEEE 802.3 standard, 10BaseT is the Ethernet specification of 10Mbps baseband that uses two pairs of twisted-pair, Category 3, 4, or 5 cabling—using one pair to send data and the other to receive. 10BaseT has a distance limit of about 100 meters per segment. See also: Ethernet and IEEE 802.3. 100BaseT Based on the IEEE 802.3u standard, 100BaseT is the Fast Ethernet specification of 100Mbps baseband that uses UTP wiring. 100BaseT sends link pulses (containing more informa- tion than those used in 10BaseT) over the network when no traffic is present. See also: 10BaseT, Fast Ethernet, and IEEE 802.3. 100BaseTX Based on the IEEE 802.3u standard, 100BaseTX is the 100Mbps baseband Fast Ethernet specification that uses two pairs of UTP or STP wiring. The first pair of wires receives data; the second pair sends data. To ensure correct signal timing, a 100BaseTX segment cannot be longer than 100 meters. A&B bit signaling Used in T1 transmission facilities and sometimes called “24th channel signaling.” Each of the 24 T1 subchannels in this procedure uses one bit of every sixth frame to send supervisory signaling information. AAA Authentication, Authorization, and Accounting: A system developed by Cisco to provide network security. See also: authentication, authorization, and accounting. AAL ATM Adaptation Layer: A service-dependent sublayer of the Data Link layer, which accepts data from other applications and brings it to the ATM layer in 48-byte ATM payload segments.
    [Show full text]
  • Switching in an Enterprise Network
    04_1587132117_ch03.qxd 3/31/08 10:52 PM Page 65 CHAPTER 3 Switching in an Enterprise Network Objectives Upon completion of this chapter, you should be able to answer the following questions: ■ What types of switches are found in an enter- ■ What is inter-VLAN routing and how is it con- prise network? figured? ■ How does Spanning Tree Protocol prevent ■ What is VLAN Trunking Protocol and how does switching loops? it help maintain VLANs in an enterprise net- work? ■ What is a VLAN and what purpose does it serve? ■ How is a VLAN configured on a Cisco switch? Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary. wire speed page 67 availability page 72 content addressable memory (CAM) page 67 load balancing page 72 aging time page 67 switching loops page 72 microsegmentation page 67 broadcast storm page 72 virtual circuit page 68 Spanning Tree Protocol (STP) page 75 symmetric switching page 68 bridge protocol data units (BPDU) page 76 asymmetric switching page 68 blocking state page 77 uplink ports page 68 listening state page 77 multilayer switching page 69 learning state page 77 application-specific integrated circuit (ASIC) forwarding state page 77 page 69 disabled page 77 store-and-forward switching page 70 Access ports page 77 cut-through switching page 70 Trunking ports page 77 fast-forward switching page 70 root bridge page 78 fragment-free switching page 70 bridge page 78 runts page 70 ID (BID) page 78 adaptive cut-through switching page 70 Root ports page 79 Redundancy page 72 least-cost
    [Show full text]
  • Layer 2 Network Design Layer-2 Network Design
    Layer 2 Network Design Layer-2 Network Design . A good network design is modular and hierarchical, with a clear separation of functions: . Core: Resilient, few changes, few features, high bandwidth, CPU power . Distribution: Aggregation, redundancy . Access: Port density, affordability, security features, many adds, moves and changes Layer-2 Network Design - Simple ISP 1 Network Border Core Distribution Access Layer-2 Network Design - Redundant ISP ISP 1 2 Network Border Core Distribution Access In-Building and Layer 2 . There is usually a correspondence between building separation and subnet separation . Switching inside a building . Routing between buildings . This will depend on the size of the network . Very small networks can get by with doing switching between buildings . Very large networks might need to do routing inside buildings Layer 2 Concepts . Layer 2 protocols basically control access to a shared medium (copper, fiber, electro- magnetic waves) . Ethernet is the de-facto wired-standard today . Reasons: . Simple . Cheap . Manufacturers keep making it faster . Wireless (802.11a,b,g,n) is also Layer-2 technology. Ethernet Functions . Source and Destination identification . MAC addresses . Detect and avoid frame collisions . Listen and wait for channel to be available . If collision occurs, wait a random period before retrying . This is called CASMA-CD: Carrier Sense Multiple Access with Collision Detection Ethernet Frame . SFD = Start of Frame Delimiter . DA = Destination Address . SA = Source Address . CRC = Cyclick Redundancy Check Evolution of Ethernet Topologies . Bus . Everybody on the same coaxial cable . Star . One central device connects every other node . First with hubs (repeated traffic) . Later with switches (bridged traffic) . Structured cabling for star topologies standardized Switched Star Topology Benefits .
    [Show full text]
  • Ethernet Circuit Failure Detection Over Aggregated Trunks Sulabh
    Ethernet Circuit Failure Detection over Aggregated Trunks Sulabh Deshmukh Master of Science Thesis Network Architectures and Services PVM 2016-084 Faculty of Electrical Engineering, Mathematics and Computer Science Network Architectures and Services Group Ethernet Circuit Failure Detection over Aggregated Trunks Sulabh Deshmukh 4407466 Committee members: Supervisor: Dr. Ir. F.A. Kuipers Mentor: Ir. Ronald van der Pol Member: Dr. R. Venkatesha Prasad Member: Ir. N.L.M. van Adrichem June 6, 2016 M.Sc. Thesis No: PVM 2016-084 The work in this thesis was supported by SURFnet. Their cooperation is hereby gratefully acknowledged. Copyright c 2016 by Sulabh Deshmukh All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without the permission from the author and Delft University of Technology. Abstract With the increase in data-intensive research in recent years, the Ethernet circuit, which is a high speed point-to-point connection, can be used for transmitting large amounts of data between sites. Customers use the trunk port to connect to the operator network. It allows multiple Ethernet circuits to share the same trunk port by using the trunk and results in the efficient utilization of the bandwidth of the port. It distinguishes each (VLAN) service on the basis of VLAN identifiers. When redundancy needs to be offered in the network using two trunk ports, detecting an individual Ethernet-circuit failure over the trunk and load balancing per-flow traffic between active trunks is not possible because the existing technique, namely link aggregation, has limitations.
    [Show full text]
  • Ethernet 95 Link Aggregation 102 Power Over Ethernet 107 Gigabit Ethernet 116 10 Gigabit Ethernet 121 100 Gigabit Ethernet 127
    Computer Networking PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 10 Dec 2011 02:24:44 UTC Contents Articles Networking 1 Computer networking 1 Computer network 16 Local area network 31 Campus area network 34 Metropolitan area network 35 Wide area network 36 Wi-Fi Hotspot 38 OSI Model 42 OSI model 42 Physical Layer 50 Media Access Control 52 Logical Link Control 54 Data Link Layer 56 Network Layer 60 Transport Layer 62 Session Layer 65 Presentation Layer 67 Application Layer 69 IEEE 802.1 72 IEEE 802.1D 72 Link Layer Discovery Protocol 73 Spanning tree protocol 75 IEEE 802.1p 85 IEEE 802.1Q 86 IEEE 802.1X 89 IEEE 802.3 95 Ethernet 95 Link aggregation 102 Power over Ethernet 107 Gigabit Ethernet 116 10 Gigabit Ethernet 121 100 Gigabit Ethernet 127 Standards 135 IP address 135 Transmission Control Protocol 141 Internet Protocol 158 IPv4 161 IPv4 address exhaustion 172 IPv6 182 Dynamic Host Configuration Protocol 193 Network address translation 202 Simple Network Management Protocol 212 Internet Protocol Suite 219 Internet Control Message Protocol 225 Internet Group Management Protocol 229 Simple Mail Transfer Protocol 232 Internet Message Access Protocol 241 Lightweight Directory Access Protocol 245 Routing 255 Routing 255 Static routing 260 Link-state routing protocol 261 Open Shortest Path First 265 Routing Information Protocol 278 IEEE 802.11 282 IEEE 802.11 282 IEEE 802.11 (legacy mode) 292 IEEE 802.11a-1999 293 IEEE 802.11b-1999 295 IEEE 802.11g-2003 297
    [Show full text]