hexicom ar74 eoc master user manual

Upload: thanhnam2624

Post on 11-Oct-2015

80 views

Category:

Documents


0 download

TRANSCRIPT

  • http://www.hexicomtech.com

    HEXICOM AR74 EOC Master

    User Manual

  • 2

    Index

    1 Login Web ........................................................................................................................... 5

    1.1 Preparations ........................................................................................................ 5

    1.1.1 Computer requirements ........................................................................ 5

    1.1.2 Establish a network connection .................................................... 5

    1.1.3 Cancel the proxy server .................................................................... 8

    2 Web Configuration Page ............................................................................................ 10

    2.1 Introduction about Web Configuration Page ...................................... 10

    2.2 Commonly used buttons introduction ...................................................... 11

    2.3 Timeout processing ......................................................................................... 11

    2.4 Exit ....................................................................................................................... 12

    3 System Settings ............................................................................................................ 12

    3.1 Management IP Settings ................................................................................ 13

    3.2 Configurations .................................................................................................. 14

    3.2.1 Management VLAN ................................................................................... 14

    3.2.2 TELNET,HTTPS,SSH ................................................................................. 15

    3.3 Set System time ............................................................................................... 16

    3.4 SNMP ....................................................................................................................... 16

    3.4.1 SNMP Introduction ............................................................................... 16

    3.4.2 SNMP ........................................................................................................... 17

    3.4.3 SNMP Trap ................................................................................................ 19

    3.5 Administrator(User Account) ..................................................................... 19

    3.6 Configurations .................................................................................................. 20

    3.6.1 Factory default ................................................................................... 20

  • 3

    3.6.2 Export configuration file ............................................................. 21

    3.6.3 Import configurations file ........................................................... 21

    3.7 Reboot ................................................................................................................... 22

    3.8 Upgrade ................................................................................................................. 22

    3.9 System Log .......................................................................................................... 23

    3.9.1 Remote log server ............................................................................... 23

    3.9.2 View System Log ................................................................................... 24

    4 Management ....................................................................................................................... 25

    4.1 Port Management ............................................................................................... 25

    4.1.1 Ports Receive/Send message ........................................................... 26

    4.1.2 Set Ports Limited Speed .................................................................. 26

    4.3.1 VLAN Production ................................................................................... 28

    4.3.2 Select VLAN Mode ................................................................................. 31

    4.3.3 802.1Q VLAN ............................................................................................ 32

    4.3.4 VLAN Transparent Transmission Mode ......................................... 37

    5 Users .................................................................................................................................. 38

    5.1 Master Management ........................................................................................... 38

    5.1.1 Network Refresh Mode ........................................................................ 38

    5.1.2 Anonumous Access ................................................................................. 39

    5.1.3 Loop Detection ..................................................................................... 39

    5.1.4 CLT Lists ................................................................................................ 40

    5.1.5 SNID ........................................................................................................... 40

    5.2 Network Topology ............................................................................................. 41

    5.2.1 Device Lists .......................................................................................... 41

  • 4

    5.2.2 Terminals Information and Create Configurations ............. 42

    5.2.3 Add to BlackList ................................................................................. 43

    5.2.4 Reset ......................................................................................................... 43

    5.2.5 Configure Terminal ............................................................................ 44

    5.2.6 cable Link Information .................................................................... 44

    5.3 Template Management ....................................................................................... 45

    5.3.1 Template .................................................................................................. 46

    5.3.2 Find Template ....................................................................................... 49

    6 Users .................................................................................................................................. 49

    6.1 UserLists............................................................................................................. 49

    6.1.1 New Users ................................................................................................ 49

    6.1.2 Delete Users .......................................................................................... 50

    6.1.3 Allow/Forbid Users Access to Network ..................................... 50

    6.1.4 Edit Users .............................................................................................. 51

    6.2 Online ................................................................................................................... 51

    6.3 WhiteLists .......................................................................................................... 51

    6.4 BlackLists .......................................................................................................... 52

    7 Save Updates .................................................................................................................. 52

  • 5

    1 Login Web

    1.1 Preparations

    Please be sure that your computersettings as follows.

    Windows XP(SP2) or above, Internet Explorer 6.0 or Above.

    1.1.1 Computer requirements

    Please make sure your computer has been installed Ethernet card.

    1.1.2 Establish a network connection

    1.Set a static IP address of the computer

    You should set the computer's IP address and the Master's IP address in

    the same subnet(Master's default IP:192.168.0.100,Subnet Mask:

    255.255.255.0operations as followsIn Windows XP, for example:

    (1) ClickMy Network Places, right click and select properties, enter

    the network connection, double-click local connection icon, pop-up

    "local area connection status" page, as shown in Figure 1.1 .

  • 6

    (2)

    Figure 1.1

    (2) Click ,select "Internet Protocol(TCP/IP)",enter "Internet

    Protocol(TCP/IP) Properties". Select "Use the following IP address",input IP

    address(Select any value other than 192.168.0.100 in

    192.168.0.1~192.168.0.254)and Sbunet Mask(255.255.255.0),click "OK", shown in

    figure 1.2.

  • 7

    Figure 1.2

    (3) Click ,select "Internet Protocol(TCP/IP)",enter

    "Internet Protocol(TCP/IP) Properties". Select "Use the following IP

    address",input IP address(Select any value other than 192.168.0.100 in

    192.168.0.1~192.168.0.254)and Subnet Mask(255.255.255.0),click "OK",

    shown in figure 1.3.

  • 8

    Figure 1.3

    2. Confirm the connection between the computer and Master

    Use Ping command to comfirm the connection between the computer and the

    Master.

    1.1.3 Cancel the proxy server

    If your computer uses proxy server to access the Internet, you must disable

    it, as follows:

    (1) Open the browser, select [Tools/Internet Options] ->[Internet Options] .

    Select the "Connections" tab, and click the

    button, enter the following figure 1.4.

  • 9

    Figure 1.4

    (2) Make sure not select the "Use a proxy server for your LAN" option. If

    selected, cancel it and click .

  • 10

    1.2 Login Web

    Open a browser, and input "http://192.168.0.100" in the browser address bar,

    Enter, input the user name and password (first login, the default user name:

    admin, password: admin), click to login the Web Settings page, as shown

    in figure 1.5.

    Figure 1.5

    Note

    You can modify the password after login.Related operation please refer to

    System Settings>>Administrator.

    If you want to login through the HTTPS secure remote, please refer to

    "manage security settings".

    2 Web Configuration Page

    2.1 Introduction about Web Configuration Page

  • 11

    Figure 2.1

    2.2 Commonly used buttons introduction

    System Settings: IP,management VLAN,SNMP and so on.

    Configurations:Ports management,broadcast storm,VLAN and so on.

    ManagementMaster Mangement,Network Topology,Templates Management and so

    on

    Users: Users List,Black and White List and so on.

    Save UpdatesSave the configurations of pages.

    Exit:Exit current WEB.

    2.3 Timeout processing

    When you dont operate the Web page more than 10 minutes, the system will cancel

    this logon (but this time configuration changes remains), for the continued

    operation, you must log in again.The 10 minutes value can be modified in System

    Settings>>Administrator.

  • 12

    NoteBy defaultly,the timeout is 10 minutes.

    2.4 Exit

    Click on the Exiton the left ,you can exit the web page.

    3 System Settings

    System Status:view the Masters system information.

    Operating steps:Login WEB page or click on System Settings.

    This page provides you with the following information view function.

    view the Masters IP status information,for example,the mode of IP

    Address,management VLAN.

    view the Masters run information,for example,software/hardware

    versions,runtime.

  • 13

    Figure 3.1

    Note:Please be sure to save the configurations,if not,the unsaved

    configurations will lose because of reboot or power down.

    3.1 Management IP Settings

    DescriptionsAfter you modified IP address,please use new IP to login,

    Operation steps:System SettingsIP Address

    You can set IP address manually or dynamic by the DHCP. The hostname does not

    support Chinese,input Chinese may affect DHCP.

    The default gateway and DNS server for the domain name to NTP services, if not

    set, time synchronization will be affected.

    3.1.1 Static

    Figure 3.2

    Operations as follows:

    (1) Select IP Mode Static.

  • 14

    (2) Set the IP address,Subnet,default gateway.

    (3) Click on

    3.1.2 DHCP

    Description

    DHCP uses the "client / server" communication mode,through the client

    proposes the configuration application to the server (DHCP Client) (DHCP

    Server), the server returns to assigned IP address configuration

    information, in order to realize the dynamic configuration of cyber source.

    In a typical application of DHCP, generally consists of a server and

    multiple clients (such as PC and portable machine)

    You should use the command show networkingto view the Masters IP

    through the Console.

    Figure 3.3

    Operation as follows

    (1) Select IP mode DHCP.

    (2) Click .

    3.2 Configurations

    In this page,you can set the management VLAN,enable or disable

    HTTPS,SSH,TELNET.

    3.2.1 Management VLAN

    Operations:ConfigurationsSecurity Settings

  • 15

    If you want to manage the Master by Web,Telnet,you must set the IP

    first.There is only one VLAN interface to configure IP,this VLAN is

    management VLAN.

    Note:

    Before you set the management VLAN,it must be created,related

    operations please refer to802.1Q vlan.

    After you modified the management VLAN,if the computer connects to the

    ETH1,you can still manage the Master(For the system will add the ETH1

    to the management VLAN);else,you need to login the Master through the

    Console,modify the PVID of the ETH2 to be management VLAN.

    Figure 3.4

    3.2.2 TELNET,HTTPS,SSH

    Operations:ConfigurationsSecurity Settings

    In this page,you can manage TELNET,HTTPS,SSH.

    Figure 3.5

    By defaultly ,HTTPS and SSH are disable,TELNET enable.

  • 16

    3.3 Set System time

    The Master supports only set the time manually.

    Figure3.6

    ClickDate&Time,.

    TipsIf you want to get current time of PC,please refresh the page.

    3.4 SNMP

    3.4.1 SNMP Introduction

    SNMP is to ensure that the management information transmitted between any two

    points, which is convenient for network administrators in the network information

    retrieval, find fault, fault diagnosis, capacity planning and report generation.

    SNMP uses polling mechanism, provide the most basic functions, especially

    suitable for use in small, fast and low price environment. The implementation

    of SNMP transport layer protocol UDP based on the connectionless, so can

    achieve and many products of barrier-free connection.

    3.4.1.1 SNMPs working mechanism

    SNMP is divided into NMS and Agent parts:

  • 17

    NMS is the server workstation;

    Agent is the client software.

    NMS can send request message to the Agent, the Agent receives the request

    message NMS, according to the message types, do Read or Write operate, generate

    a response message, and the response message is returned to NMS. Agent found

    the reboot and other anomalies ,will take the initiative to send TRAP message

    to NMS, report the events.

    3.4.1.2 SNMPs versions

    Currently,the SNMP Agent of the Master supports SNMP v1 and SNMP v2.

    SNMP v1SNMP v2c Use Community Name Auth,the SNMP massage that not the

    Master auth will be discard.SNMP Community Name is used to define the

    relations between SNMP NMS and SNMP Agent. The Community Name is similar

    to the password,can restrict illicit SNMP NMS.

    3.4.1.3 MIB

    Using management variables to describe the Masters managed objects in the

    SNMP message. SNMP with hierarchical structure, naming scheme to identify

    the object of management. The whole structure is like a tree, the tree nodes

    represent the management object, each node, can be identified by a path from

    the root to the only. The hierarchical structure of MIB function is used to

    describe the tree, it is a standard set of variables defined by the monitoring

    network equipment.

    3.4.2 SNMP

    Operations:ConfigurationsSNMP

    In this page,you can Enable/Disable SNMP Agent,set Community Name,Access

    Control,shown as in figure 5.4.2.

  • 18

    Figure 3.7

    The key parameters descriptions:

    SNMP:Enabled/Disabled SNMP Agent fuction,default is Disabled

    SNMP V1/V2:Enable/Disable SNMP V1/V2,defaultly,Disable(V3 Disable).

    Trust Host:after enable SNMP,you can set the SNMP Agent trust NMS

    IP,only allow specified NMS access to SNMP Agent.

    By defaultly,SNMP is disable,meaning that allow all hosts to access .

    Descriptions

  • 19

    If the Mask is 32 bits,means is one host;if not,means network address.

    Eg:You enable SNMP in 192.168.1.1192.168.1.254,then the trust Host

    is:192.168.1.0/24

    3.4.3 SNMP Trap

    Trap is a managed device without request, active information sent to NMS,

    used to report some urgent important events (such as: managed devices

    restart.).

    Descriptions:You should finish the configurations of SNMP Agent before

    setting SNMP Trap

    Operations:ConfigurationsSNMP

    Figure 3.8

    3.5 Administrator(User Account)

    Operations:ConfigurationsAdministrator

    In this page,you can manage the user account of Web,timeout of Web.

  • 20

    Figure 3.9

    3.6 Configurations

    3.6.1 Factory default

    Operations:System SettingCongfigurations

    Note

    Curent configurations will lose after factory default.

    Please do not operate the Master during factory default.

    The Master will reboot automatically after factory default,the network

    will be suspended.

    Figure 3.10

  • 21

    After factory default,the Masters IP is 192.168.0.100.

    3.6.2 Export configuration file

    Operations:System SettingConfigurations

    You can backup information by exporting configuration file.

    Figure 3.11

    Click on,download,select the path,,you can save current

    configurations of Master to PC,conveniency for recovering settings.

    Note

    Please do not modify the configurations file.

    3.6.3 Import configurations file

    Operations:System SettingConfigurations

    Note

    Current configurations will lose after importing configurations.

    Please do not power down during importing configurations file.

    Please do not do other operations during importing configurations file.

    The Master will reboot automatically after importing configurations

    file.

    If you backuped configurations file,you can recover the configurations

    when there exits errors.

  • 22

    Figure 3.12

    Click on ,select backuped file(*.bin),click.

    3.7 Reboot

    Note

    Please save your updates before rebooting.

    The network will suspend during rebooting.

    Operations:System SettingsReboot

    Figure 3.13

    Click on.

    3.8 Upgrade

    Operations:System SettingsUpgrade

    Note

    Please do not power down during upgrading.

    The network will suspend during upgrading.

  • 23

    Figure 3.14

    You can load the latest version to the Master through upgrading

    software.

    Operations as follows:

    Click on,Select needed upgrade file.

    Click on,upgrading.

    3.9 System Log

    3.9.1 Remote log server

    Operations:System SettingsSystem Log

  • 24

    In this page,you can enable/disable the log function and log server.

    Figure 3.15

    By defaultly,System log server is disabled.If needed,you can enable it

    and set the IP addr.

    3.9.2 View System Log

    Operations:System SettingsSystem Log

    Figure 3.16

  • 25

    You can realize corresponding function by clicking on

    Export,Clear,Refresh .

    4 Management

    4.1 Port Management

    Operations:ManagementPort Management.

    Figure 4.1

    Key parameters descriptions:

    port:show all current ports.

    Status:show all Portss connections.

    Speed:show current ports speed,by defaultly,ETH1 and ETH2 are auto.

    Duplex:show current ports duplex mode, by defaultly,ETH1 and ETH2 are

    auto.

    Management:click ,you can set current

    speed/duplex,priority,flow control,bandwidth.

    Statistical Information:show current port status of receiving and

    sending massage.

  • 26

    DescriptionsBy default,the cable port speed/duplex is 1000

    Mbps/full-duplex,can not be modified.

    4.1.1 Ports Receive/Send message

    Operations:ManagementPort ManagementStatistical Information

    On this page, you can view the port transmission packets and bytes, as

    shown in figure 6.1.1. Click , all ports on

    statistical data are clear; click, statistical data on all ports

    to update.

    Figure 4.2

    4.1.2 Set Ports Limited Speed

    Operations:ManagementPort ManagementConfigurations

    In this page,you can set the limited speed of ports,shown as in figure

    4.3

  • 27

    Figure 4.3

    Key parameters descriptions:

    (1)Entrance bandwidth limitations: speed limit on the selected port into

    the direction, disabled by default.

    Exit bandwidth limitations: the direction the speed limit on the

    selected port, disabled by default.

    4.2 Broadcast Suppression

    Operations:ManagementBroadcast

    This page is set to enable/disable the broadcast storm suppression

    function. When enable, the Master can suppress the broadcast traffic

    effectively, avoid network congestion.

  • 28

    Figure 4.4

    DescriptionsHere you can set Unknown unicast packets, unknown multicast

    message, broadcast message, group broadcast to be disable.Disabled by

    default.

    4.3 VLAN

    4.3.1 VLAN Production

    1. VLAN Summarize

    The traditional Ethernet is broadcast network,all the hosts are connected

    by HUB or switch,while there are some limitations in the forwarding

    function:

    HUB is a physical layer device, no exchange function, the received

    messages will be forwarded to all ports except the receive port of;

    The switch is the data link layer device, with the forwarding ability

    according to the message destination MAC address, but in the received

    broadcast message or unknown unicast message (message destination MAC

    address is not in the MAC address table), also to all ports except the

    receive port.

  • 29

    This can lead to the following network problems:

    There may be a large number of broadcast and unknown unicast messages,

    a waste of cyber source.

    The hosts in the network received a lot of other message, causing serious

    security risks.

    The fundamental way to solve the above problem is to isolate broadcast

    domain network. The traditional method is to use routers, because routers

    are based on the destination IP address forwarding packets, not forward

    link layer broadcast message. But routers cost is higher, and the port

    is less,can not divided the network, so it has big limitation.

    VLAN is a technology that realize the virtual group by dividing LAN Masters

    logically into different network.You do not have to change the physical layout

    and connection, it can divide a physical network into different broadcast

    domains(VLAN) so that make the network construction and maintenance more

    convenient.Shown as in figure 4.5.

    Figure 4.5

    2). VLAN

  • 30

    Compared with the traditional Ethernet, VLAN has the following

    advantages:

    Control the broadcast range: broadcast message LAN is restricted within

    VLAN, save bandwidth, improve network capacity.

    Enhances the security of LAN: the message is VLAN partition in the data

    link layer broadcast domain isolation, so each VLAN within the host cannot

    communicate directly, through the router or three layer switches and other

    network layer device of the packet layer three forwarding.

    To construct a virtual working group: VLAN can be classified into

    different users to different working groups, the same group of users also

    need not be confined to a fixed physical scope, network construction and

    maintenance more convenient and flexible.

    3). VLAN Tag

    In order to make the switch packets can distinguish different VLAN, need

    to add a field that identifies the VLAN in the message in the. Because

    the switch work in the data link layer of the OSI model, identified only

    data link message encapsulation. Therefore, identification field needs

    to be added to the data link layer package.

    IEEE promulgated in 1999 to standardized VLAN draft IEEE 802.1Q standard

    solution, the packet structure with VLAN Tag were uniform.

    The type field of Ethernet data frames in traditional encapsulate the

    protocol after the destination MAC address and the source MAC address.

    Shown as in figure 4.6.

    Figure 4.6

    DA is the destination MAC address, SA source MAC address, Type represents

    a type field message upper layer protocol, Data is the specific content

    of message.

  • 31

    Provisions of the IEEE 802.1Q protocol, package 4 bytes of VLAN Tag after

    the destination MAC address and the source MAC address, in order to

    identify related information VLAN.

    Figure 4.7 VLAN Tag

    Shown as in figure 4.7,VLAN Tag includes four field:TPID,Priority,CFI and

    VLAN ID.

    TPID: to identify the data frame with VLAN Tag. The field length is 16

    bits, the default is 0x8100.

    Priority: to indicate the priority of 802.1p.The field length 3 bits.

    CFIto identify MAC addresses are encapsulated in a standard format.

    The field length is 1bit, 0 means MAC address are encapsulated in a

    standard format, 1 to encapsulate non-standard format, the default 0.

    VLAN ID: to identify the message belongs to the number of VLAN. The field

    length is 12bit, ranging from 0 to 4095. Since 0 and 4095 are usually

    not used, so the range of VLAN ID for the general 1~4094.

    4). VLAN Mode

    The Master supports following two mode VLAN:

    802.1Q VLAN Mode: IEEE 802.1Q Protocol VLANdeal with message by

    identifying the Tag

    VLAN transparent transmission mode: The VLAN based on ports processes messages

    by recognizing port types.

    4.3.2 Select VLAN Mode

    Operations:ManagementVLAN Mode

  • 32

    In this Page,you can select the VLAN Mode.

    Figure 4.8

    4.3.3 802.1Q VLAN

    The link type of Ethernet port and Cable ports of the Master include Access,

    Trunk and Hybrid.

    Access port: It can only belong to one VLAN and usually used to connect user

    devices.

    Trunk port: It can belong to multiple VLANs and can receive and send multiple

    VLAN packets. It is usually used for the connection between network devices.

    Hybrid port: It can belong to multiple VLANs and can receive and send multiple

    VLAN packets. It can be used for connection of network devices and of user

    devices.

    The difference between Hybrid and Trunk ports is as follows:

    Hybrid port allows sending multiple VLAN packets without Tag.

    Trunk port allows sending default VLAN packets only without Tag.

  • 33

    Descriptions

    By default, VLAN 1 has to be remained in order to ensure normal device access.

    One typical business and managing VLAN configuration.

    1). Show and Maintain VLAN

    Operations:Management802.1Q VLAN

    Figure 4.9

    2). Create VLAN

    Input VLAN ID,click on,you can create VLAN.

    Descriptions

  • 34

    Figure 4.10

    By default, the Ethernet port of Master belongs to Access port and only allows

    VLAN 1 packet. Cable port belongs to Trunk port and allows all VLAN packets

    created.

    3). Trunk Port

    Operations:ManagementTrunk VLAN

    In this page,you can see created Trunk Ports and attributes.

    Figure 4.11

    Key parameters descriptions:

    Trunk Port:Show current Trunk VLAN ports.

    PVIDShow the default PVID of Trunk Ports.

    Allow VLAN:Show allowed VLAN lists.

    Create Trunk Ports

  • 35

    Operations:Select ports,input PVIDand allowed VLAN,click on

    Figure 4.12

    Delete selected Trunk

    Operations:Select Trunk ports to be deleted,click .

    Figure 4.13

    4). Hybrid Port

    Operations:ManagementHybrid VLAN

    In this page,you can see created Hybrid ports and attributes.

  • 36

    Figure 4.14

    Key parameters descriptions:

    Hybrid Port:Show current Hybrid VLAN ports.

    PVID:show the default PVID of Hybrid ports.

    Tag VLAN Lists:Show Tag VLAN lists of Hybrid ports.

    Untag VLAN Lists:Show Untag VLAN lists of Hybrid Ports.

    Create Hybrid Ports:

    Operations:Select ports to be created Hybrid mode,input PVID,Tagged

    VLAN,Untagged VLAN,click on

  • 37

    Figure 4.15

    Delete Selected Hybrid

    Operations:Select Ports to be deleted,click on

    Figure 4.16

    4.3.4 VLAN Transparent Transmission Mode

    Descriptions

    Operations:ManagementVLAN Mode

    VLAN transparent transmission mode,the Ethernet ports of the Master include

    business port and management port:

    Port Mode Deal with received

    message

    Deal with sended

    message application

    business

    port Transmit Transmit

    Used to

    transparent

    transmission

    business data

  • 38

    management

    port

    Delete the tag and

    transmit

    Used to connect

    PC to manage

    the Master

    Descriptions

    You should login the Master through Console Port to manage it When all

    the ports are business ports.

    Figure 4.17

    5 Users

    5.1 Master Management

    5.1.1 Network Refresh Mode

    Operations:UsersMaster Management

    You can set network refresh mode and auto refresh interval.

  • 39

    Figure 5.1

    5.1.2 Anonumous Access

    Operations:UsersMaster MangementAnonumous Access.

    In this page,you can disable/enable anomumous users access to network.

    Figure 5.2

    5.1.3 Loop Detection

    Operations:UsersMaster ManagementLoop Detection

  • 40

    Figure 5.3

    Open loop detection function (by default,closed), if there exists loop , the

    terminal network topology page willdisplay the corresponding color makes it easy

    to troubleshoot and positioning system, at the same time, the system will cut

    off the terminal ,When the terminal loop solved, the network communication can

    recover soon.

    5.1.4 CLT Lists

    Operations:UsersMaster ManagementCLT Lists.

    You can view current MAC,model,status,SNID and terminals num of all

    Masters.

    Figure 5.4

    5.1.5 SNID

    Operations:UsersMaster ManagementCLT ListsMAC

  • 41

    Figure 5.5

    5.2 Network Topology

    5.2.1 Device Lists

    Operations:UsersNetwork Topology

    Figure 5.6

  • 42

    5.2.2 Terminals Information and Create Configurations

    Operations:UsersNetwork TopologyMAC

    Figure 5.7

    Key parameters descriptions:

    In this page,you can view software version,terminal status and so on.

    Create Configurations:use existed template ti current terminal.

  • 43

    Figure 5.8

    Operations:UsersNetwork TopologyMACCreate Configurations

    Use Template.

    5.2.3 Add to BlackList

    Operations:UsersNetwork Topologyadd to BlackLists

    Select single or multiple radio box on the left and click adding to white

    list, the function of batch adding can be realized.

    The operation method of Whitelist is the same as the above.

    Figure 5.9

    5.2.4 Reset

  • 44

    Operations:UsersNetwork TopologyMACReset

    You can reset remote terminal by this.

    Figure 5.10

    5.2.5 Configure Terminal

    Operations:UsersNetwork TopologyMACReConfigure Terminal.

    Figure 5.11

    5.2.6 cable Link Information

    Operations: UserNetwork TopologyAttenuation

  • 45

    Figure 5.12

    Figure 5.13

    5.3 Template Management

    Descriptions

  • 46

    All users need to define business template and create configurations when

    open businesses.

    5.3.1 Template

    Operations:UsersTemplate Management

    On this page, you can define different service template for different

    user groups, do not need to set the service attributes for each user

    individually. Only need to have accounts, users (i.e., legitimate users)

    under the reference service template can be well defined, thus greatly

    reducing the repeated work, more convenient, efficient management of

    different types of users.

    Figure 5.14

    Descriptions

    The list of templates which exists some templates by default, they are

    our various types of terminal.

    1) Create Template

    Click on,you can create new template.

  • 47

    Figure 5.15

    Key parameters descriptions:

    Device Model:Select terminal type.

    Template Name:New template identification.

    Template Description:Input description of new template.

    Up/Down rate limitation:Set the Up/Down cable port rate.

    The broadcast storm suppression: Enable/Disable the terminal equipment

    broadcast storm suppression. If enable, can effectively inhibit the radio

    terminal flow, to avoid network congestion, ensure the normal operation

    of the network business

  • 48

    MAC Num limitation: Set the other terminal single terminal equipment

    are allowed to access (e.g. PC) number.

    VLAN transparent transmission:Set VLAN mode.

    Port Setting:Set the work pattern,flow control,priority,limited rate

    and LAN.

    Save as New Template:save template to be new.

    Port receive/transmit message:

    Port Type

    Deal with Received message Deal with sended message

    UnTAG TAG TAG

    Tagged

    Cable Port: When

    any of the PVID

    port and Ethernet

    port of a PVID is

    same, receives the

    message, and for

    the corresponding

    port PVID on the

    VLAN Tag message,

    or discarded.

    Ethernet port: the

    port

    corresponding to

    the PVID message

    on VLAN Tag.

    Cable Port:

    Arbitrary when

    VLANID and

    Ethernet port

    message of a

    PVID is same,

    receives the

    message,

    otherwise

    discard

    Ethernet port:

    only when the

    message of

    VLAN ID and the

    port of PVID

    are the same,

    receives the

    message,

    otherwise

    discard.

    Direct forwarding without

    any change.

    Untagged Delete the message VLAN

    Tag before forwarding .

    2) Delete Template

  • 49

    Click on,you can finish delete.

    3) Modify Template

    Click on the name of templates,you can modify templates.

    5.3.2 Find Template

    Operations:UserTemplate Management

    Figure 5.16

    Input the template name at the blank,you can find needed template quickly.

    6 Users

    6.1 UserLists

    Operations:UsersUserLists.

    Figure 6.1

    6.1.1 New Users

    Click on,you can create new users and set related business.

  • 50

    Figure 6.2

    Tips

    You need to create new template before create new users.

    6.1.2 Delete Users

    Click onor,you can delete

    users,the same time,the users are anonymous.

    Figure 6.3

    6.1.3 Allow/Forbid Users Access to Network

    Click on to allow the users access to network.

  • 51

    Click on< Add to BlackLists>to forbid access to network.

    Figure 6.4

    6.1.4 Edit Users

    Click the user's MAC address, can enter the user to modify the page,

    related operation and establish the configuration similarity.

    6.2 Online

    Operations:UsersOnline

    Figure 6.5

    6.3 WhiteLists

    Operations:UsersWhitelists

  • 52

    You can view all the legal users and descriptions.

    Figure 6.6

    6.4 BlackLists

    Operations:UsersBlackLists

    You can view all the illegal users and descriptions.

    Figure 6.7

    7 Save Updates

    Notes

    After the configuration of all items, please be sure to save the

    configurations.

    Operations: click on--Save.

  • 53

    Figure 7.1

    ------The End------