hexicom ar74 eoc master user manual
TRANSCRIPT
-
http://www.hexicomtech.com
HEXICOM AR74 EOC Master
User Manual
-
2
Index
1 Login Web ........................................................................................................................... 5
1.1 Preparations ........................................................................................................ 5
1.1.1 Computer requirements ........................................................................ 5
1.1.2 Establish a network connection .................................................... 5
1.1.3 Cancel the proxy server .................................................................... 8
2 Web Configuration Page ............................................................................................ 10
2.1 Introduction about Web Configuration Page ...................................... 10
2.2 Commonly used buttons introduction ...................................................... 11
2.3 Timeout processing ......................................................................................... 11
2.4 Exit ....................................................................................................................... 12
3 System Settings ............................................................................................................ 12
3.1 Management IP Settings ................................................................................ 13
3.2 Configurations .................................................................................................. 14
3.2.1 Management VLAN ................................................................................... 14
3.2.2 TELNET,HTTPS,SSH ................................................................................. 15
3.3 Set System time ............................................................................................... 16
3.4 SNMP ....................................................................................................................... 16
3.4.1 SNMP Introduction ............................................................................... 16
3.4.2 SNMP ........................................................................................................... 17
3.4.3 SNMP Trap ................................................................................................ 19
3.5 Administrator(User Account) ..................................................................... 19
3.6 Configurations .................................................................................................. 20
3.6.1 Factory default ................................................................................... 20
-
3
3.6.2 Export configuration file ............................................................. 21
3.6.3 Import configurations file ........................................................... 21
3.7 Reboot ................................................................................................................... 22
3.8 Upgrade ................................................................................................................. 22
3.9 System Log .......................................................................................................... 23
3.9.1 Remote log server ............................................................................... 23
3.9.2 View System Log ................................................................................... 24
4 Management ....................................................................................................................... 25
4.1 Port Management ............................................................................................... 25
4.1.1 Ports Receive/Send message ........................................................... 26
4.1.2 Set Ports Limited Speed .................................................................. 26
4.3.1 VLAN Production ................................................................................... 28
4.3.2 Select VLAN Mode ................................................................................. 31
4.3.3 802.1Q VLAN ............................................................................................ 32
4.3.4 VLAN Transparent Transmission Mode ......................................... 37
5 Users .................................................................................................................................. 38
5.1 Master Management ........................................................................................... 38
5.1.1 Network Refresh Mode ........................................................................ 38
5.1.2 Anonumous Access ................................................................................. 39
5.1.3 Loop Detection ..................................................................................... 39
5.1.4 CLT Lists ................................................................................................ 40
5.1.5 SNID ........................................................................................................... 40
5.2 Network Topology ............................................................................................. 41
5.2.1 Device Lists .......................................................................................... 41
-
4
5.2.2 Terminals Information and Create Configurations ............. 42
5.2.3 Add to BlackList ................................................................................. 43
5.2.4 Reset ......................................................................................................... 43
5.2.5 Configure Terminal ............................................................................ 44
5.2.6 cable Link Information .................................................................... 44
5.3 Template Management ....................................................................................... 45
5.3.1 Template .................................................................................................. 46
5.3.2 Find Template ....................................................................................... 49
6 Users .................................................................................................................................. 49
6.1 UserLists............................................................................................................. 49
6.1.1 New Users ................................................................................................ 49
6.1.2 Delete Users .......................................................................................... 50
6.1.3 Allow/Forbid Users Access to Network ..................................... 50
6.1.4 Edit Users .............................................................................................. 51
6.2 Online ................................................................................................................... 51
6.3 WhiteLists .......................................................................................................... 51
6.4 BlackLists .......................................................................................................... 52
7 Save Updates .................................................................................................................. 52
-
5
1 Login Web
1.1 Preparations
Please be sure that your computersettings as follows.
Windows XP(SP2) or above, Internet Explorer 6.0 or Above.
1.1.1 Computer requirements
Please make sure your computer has been installed Ethernet card.
1.1.2 Establish a network connection
1.Set a static IP address of the computer
You should set the computer's IP address and the Master's IP address in
the same subnet(Master's default IP:192.168.0.100,Subnet Mask:
255.255.255.0operations as followsIn Windows XP, for example:
(1) ClickMy Network Places, right click and select properties, enter
the network connection, double-click local connection icon, pop-up
"local area connection status" page, as shown in Figure 1.1 .
-
6
(2)
Figure 1.1
(2) Click ,select "Internet Protocol(TCP/IP)",enter "Internet
Protocol(TCP/IP) Properties". Select "Use the following IP address",input IP
address(Select any value other than 192.168.0.100 in
192.168.0.1~192.168.0.254)and Sbunet Mask(255.255.255.0),click "OK", shown in
figure 1.2.
-
7
Figure 1.2
(3) Click ,select "Internet Protocol(TCP/IP)",enter
"Internet Protocol(TCP/IP) Properties". Select "Use the following IP
address",input IP address(Select any value other than 192.168.0.100 in
192.168.0.1~192.168.0.254)and Subnet Mask(255.255.255.0),click "OK",
shown in figure 1.3.
-
8
Figure 1.3
2. Confirm the connection between the computer and Master
Use Ping command to comfirm the connection between the computer and the
Master.
1.1.3 Cancel the proxy server
If your computer uses proxy server to access the Internet, you must disable
it, as follows:
(1) Open the browser, select [Tools/Internet Options] ->[Internet Options] .
Select the "Connections" tab, and click the
button, enter the following figure 1.4.
-
9
Figure 1.4
(2) Make sure not select the "Use a proxy server for your LAN" option. If
selected, cancel it and click .
-
10
1.2 Login Web
Open a browser, and input "http://192.168.0.100" in the browser address bar,
Enter, input the user name and password (first login, the default user name:
admin, password: admin), click to login the Web Settings page, as shown
in figure 1.5.
Figure 1.5
Note
You can modify the password after login.Related operation please refer to
System Settings>>Administrator.
If you want to login through the HTTPS secure remote, please refer to
"manage security settings".
2 Web Configuration Page
2.1 Introduction about Web Configuration Page
-
11
Figure 2.1
2.2 Commonly used buttons introduction
System Settings: IP,management VLAN,SNMP and so on.
Configurations:Ports management,broadcast storm,VLAN and so on.
ManagementMaster Mangement,Network Topology,Templates Management and so
on
Users: Users List,Black and White List and so on.
Save UpdatesSave the configurations of pages.
Exit:Exit current WEB.
2.3 Timeout processing
When you dont operate the Web page more than 10 minutes, the system will cancel
this logon (but this time configuration changes remains), for the continued
operation, you must log in again.The 10 minutes value can be modified in System
Settings>>Administrator.
-
12
NoteBy defaultly,the timeout is 10 minutes.
2.4 Exit
Click on the Exiton the left ,you can exit the web page.
3 System Settings
System Status:view the Masters system information.
Operating steps:Login WEB page or click on System Settings.
This page provides you with the following information view function.
view the Masters IP status information,for example,the mode of IP
Address,management VLAN.
view the Masters run information,for example,software/hardware
versions,runtime.
-
13
Figure 3.1
Note:Please be sure to save the configurations,if not,the unsaved
configurations will lose because of reboot or power down.
3.1 Management IP Settings
DescriptionsAfter you modified IP address,please use new IP to login,
Operation steps:System SettingsIP Address
You can set IP address manually or dynamic by the DHCP. The hostname does not
support Chinese,input Chinese may affect DHCP.
The default gateway and DNS server for the domain name to NTP services, if not
set, time synchronization will be affected.
3.1.1 Static
Figure 3.2
Operations as follows:
(1) Select IP Mode Static.
-
14
(2) Set the IP address,Subnet,default gateway.
(3) Click on
3.1.2 DHCP
Description
DHCP uses the "client / server" communication mode,through the client
proposes the configuration application to the server (DHCP Client) (DHCP
Server), the server returns to assigned IP address configuration
information, in order to realize the dynamic configuration of cyber source.
In a typical application of DHCP, generally consists of a server and
multiple clients (such as PC and portable machine)
You should use the command show networkingto view the Masters IP
through the Console.
Figure 3.3
Operation as follows
(1) Select IP mode DHCP.
(2) Click .
3.2 Configurations
In this page,you can set the management VLAN,enable or disable
HTTPS,SSH,TELNET.
3.2.1 Management VLAN
Operations:ConfigurationsSecurity Settings
-
15
If you want to manage the Master by Web,Telnet,you must set the IP
first.There is only one VLAN interface to configure IP,this VLAN is
management VLAN.
Note:
Before you set the management VLAN,it must be created,related
operations please refer to802.1Q vlan.
After you modified the management VLAN,if the computer connects to the
ETH1,you can still manage the Master(For the system will add the ETH1
to the management VLAN);else,you need to login the Master through the
Console,modify the PVID of the ETH2 to be management VLAN.
Figure 3.4
3.2.2 TELNET,HTTPS,SSH
Operations:ConfigurationsSecurity Settings
In this page,you can manage TELNET,HTTPS,SSH.
Figure 3.5
By defaultly ,HTTPS and SSH are disable,TELNET enable.
-
16
3.3 Set System time
The Master supports only set the time manually.
Figure3.6
ClickDate&Time,.
TipsIf you want to get current time of PC,please refresh the page.
3.4 SNMP
3.4.1 SNMP Introduction
SNMP is to ensure that the management information transmitted between any two
points, which is convenient for network administrators in the network information
retrieval, find fault, fault diagnosis, capacity planning and report generation.
SNMP uses polling mechanism, provide the most basic functions, especially
suitable for use in small, fast and low price environment. The implementation
of SNMP transport layer protocol UDP based on the connectionless, so can
achieve and many products of barrier-free connection.
3.4.1.1 SNMPs working mechanism
SNMP is divided into NMS and Agent parts:
-
17
NMS is the server workstation;
Agent is the client software.
NMS can send request message to the Agent, the Agent receives the request
message NMS, according to the message types, do Read or Write operate, generate
a response message, and the response message is returned to NMS. Agent found
the reboot and other anomalies ,will take the initiative to send TRAP message
to NMS, report the events.
3.4.1.2 SNMPs versions
Currently,the SNMP Agent of the Master supports SNMP v1 and SNMP v2.
SNMP v1SNMP v2c Use Community Name Auth,the SNMP massage that not the
Master auth will be discard.SNMP Community Name is used to define the
relations between SNMP NMS and SNMP Agent. The Community Name is similar
to the password,can restrict illicit SNMP NMS.
3.4.1.3 MIB
Using management variables to describe the Masters managed objects in the
SNMP message. SNMP with hierarchical structure, naming scheme to identify
the object of management. The whole structure is like a tree, the tree nodes
represent the management object, each node, can be identified by a path from
the root to the only. The hierarchical structure of MIB function is used to
describe the tree, it is a standard set of variables defined by the monitoring
network equipment.
3.4.2 SNMP
Operations:ConfigurationsSNMP
In this page,you can Enable/Disable SNMP Agent,set Community Name,Access
Control,shown as in figure 5.4.2.
-
18
Figure 3.7
The key parameters descriptions:
SNMP:Enabled/Disabled SNMP Agent fuction,default is Disabled
SNMP V1/V2:Enable/Disable SNMP V1/V2,defaultly,Disable(V3 Disable).
Trust Host:after enable SNMP,you can set the SNMP Agent trust NMS
IP,only allow specified NMS access to SNMP Agent.
By defaultly,SNMP is disable,meaning that allow all hosts to access .
Descriptions
-
19
If the Mask is 32 bits,means is one host;if not,means network address.
Eg:You enable SNMP in 192.168.1.1192.168.1.254,then the trust Host
is:192.168.1.0/24
3.4.3 SNMP Trap
Trap is a managed device without request, active information sent to NMS,
used to report some urgent important events (such as: managed devices
restart.).
Descriptions:You should finish the configurations of SNMP Agent before
setting SNMP Trap
Operations:ConfigurationsSNMP
Figure 3.8
3.5 Administrator(User Account)
Operations:ConfigurationsAdministrator
In this page,you can manage the user account of Web,timeout of Web.
-
20
Figure 3.9
3.6 Configurations
3.6.1 Factory default
Operations:System SettingCongfigurations
Note
Curent configurations will lose after factory default.
Please do not operate the Master during factory default.
The Master will reboot automatically after factory default,the network
will be suspended.
Figure 3.10
-
21
After factory default,the Masters IP is 192.168.0.100.
3.6.2 Export configuration file
Operations:System SettingConfigurations
You can backup information by exporting configuration file.
Figure 3.11
Click on,download,select the path,,you can save current
configurations of Master to PC,conveniency for recovering settings.
Note
Please do not modify the configurations file.
3.6.3 Import configurations file
Operations:System SettingConfigurations
Note
Current configurations will lose after importing configurations.
Please do not power down during importing configurations file.
Please do not do other operations during importing configurations file.
The Master will reboot automatically after importing configurations
file.
If you backuped configurations file,you can recover the configurations
when there exits errors.
-
22
Figure 3.12
Click on ,select backuped file(*.bin),click.
3.7 Reboot
Note
Please save your updates before rebooting.
The network will suspend during rebooting.
Operations:System SettingsReboot
Figure 3.13
Click on.
3.8 Upgrade
Operations:System SettingsUpgrade
Note
Please do not power down during upgrading.
The network will suspend during upgrading.
-
23
Figure 3.14
You can load the latest version to the Master through upgrading
software.
Operations as follows:
Click on,Select needed upgrade file.
Click on,upgrading.
3.9 System Log
3.9.1 Remote log server
Operations:System SettingsSystem Log
-
24
In this page,you can enable/disable the log function and log server.
Figure 3.15
By defaultly,System log server is disabled.If needed,you can enable it
and set the IP addr.
3.9.2 View System Log
Operations:System SettingsSystem Log
Figure 3.16
-
25
You can realize corresponding function by clicking on
Export,Clear,Refresh .
4 Management
4.1 Port Management
Operations:ManagementPort Management.
Figure 4.1
Key parameters descriptions:
port:show all current ports.
Status:show all Portss connections.
Speed:show current ports speed,by defaultly,ETH1 and ETH2 are auto.
Duplex:show current ports duplex mode, by defaultly,ETH1 and ETH2 are
auto.
Management:click ,you can set current
speed/duplex,priority,flow control,bandwidth.
Statistical Information:show current port status of receiving and
sending massage.
-
26
DescriptionsBy default,the cable port speed/duplex is 1000
Mbps/full-duplex,can not be modified.
4.1.1 Ports Receive/Send message
Operations:ManagementPort ManagementStatistical Information
On this page, you can view the port transmission packets and bytes, as
shown in figure 6.1.1. Click , all ports on
statistical data are clear; click, statistical data on all ports
to update.
Figure 4.2
4.1.2 Set Ports Limited Speed
Operations:ManagementPort ManagementConfigurations
In this page,you can set the limited speed of ports,shown as in figure
4.3
-
27
Figure 4.3
Key parameters descriptions:
(1)Entrance bandwidth limitations: speed limit on the selected port into
the direction, disabled by default.
Exit bandwidth limitations: the direction the speed limit on the
selected port, disabled by default.
4.2 Broadcast Suppression
Operations:ManagementBroadcast
This page is set to enable/disable the broadcast storm suppression
function. When enable, the Master can suppress the broadcast traffic
effectively, avoid network congestion.
-
28
Figure 4.4
DescriptionsHere you can set Unknown unicast packets, unknown multicast
message, broadcast message, group broadcast to be disable.Disabled by
default.
4.3 VLAN
4.3.1 VLAN Production
1. VLAN Summarize
The traditional Ethernet is broadcast network,all the hosts are connected
by HUB or switch,while there are some limitations in the forwarding
function:
HUB is a physical layer device, no exchange function, the received
messages will be forwarded to all ports except the receive port of;
The switch is the data link layer device, with the forwarding ability
according to the message destination MAC address, but in the received
broadcast message or unknown unicast message (message destination MAC
address is not in the MAC address table), also to all ports except the
receive port.
-
29
This can lead to the following network problems:
There may be a large number of broadcast and unknown unicast messages,
a waste of cyber source.
The hosts in the network received a lot of other message, causing serious
security risks.
The fundamental way to solve the above problem is to isolate broadcast
domain network. The traditional method is to use routers, because routers
are based on the destination IP address forwarding packets, not forward
link layer broadcast message. But routers cost is higher, and the port
is less,can not divided the network, so it has big limitation.
VLAN is a technology that realize the virtual group by dividing LAN Masters
logically into different network.You do not have to change the physical layout
and connection, it can divide a physical network into different broadcast
domains(VLAN) so that make the network construction and maintenance more
convenient.Shown as in figure 4.5.
Figure 4.5
2). VLAN
-
30
Compared with the traditional Ethernet, VLAN has the following
advantages:
Control the broadcast range: broadcast message LAN is restricted within
VLAN, save bandwidth, improve network capacity.
Enhances the security of LAN: the message is VLAN partition in the data
link layer broadcast domain isolation, so each VLAN within the host cannot
communicate directly, through the router or three layer switches and other
network layer device of the packet layer three forwarding.
To construct a virtual working group: VLAN can be classified into
different users to different working groups, the same group of users also
need not be confined to a fixed physical scope, network construction and
maintenance more convenient and flexible.
3). VLAN Tag
In order to make the switch packets can distinguish different VLAN, need
to add a field that identifies the VLAN in the message in the. Because
the switch work in the data link layer of the OSI model, identified only
data link message encapsulation. Therefore, identification field needs
to be added to the data link layer package.
IEEE promulgated in 1999 to standardized VLAN draft IEEE 802.1Q standard
solution, the packet structure with VLAN Tag were uniform.
The type field of Ethernet data frames in traditional encapsulate the
protocol after the destination MAC address and the source MAC address.
Shown as in figure 4.6.
Figure 4.6
DA is the destination MAC address, SA source MAC address, Type represents
a type field message upper layer protocol, Data is the specific content
of message.
-
31
Provisions of the IEEE 802.1Q protocol, package 4 bytes of VLAN Tag after
the destination MAC address and the source MAC address, in order to
identify related information VLAN.
Figure 4.7 VLAN Tag
Shown as in figure 4.7,VLAN Tag includes four field:TPID,Priority,CFI and
VLAN ID.
TPID: to identify the data frame with VLAN Tag. The field length is 16
bits, the default is 0x8100.
Priority: to indicate the priority of 802.1p.The field length 3 bits.
CFIto identify MAC addresses are encapsulated in a standard format.
The field length is 1bit, 0 means MAC address are encapsulated in a
standard format, 1 to encapsulate non-standard format, the default 0.
VLAN ID: to identify the message belongs to the number of VLAN. The field
length is 12bit, ranging from 0 to 4095. Since 0 and 4095 are usually
not used, so the range of VLAN ID for the general 1~4094.
4). VLAN Mode
The Master supports following two mode VLAN:
802.1Q VLAN Mode: IEEE 802.1Q Protocol VLANdeal with message by
identifying the Tag
VLAN transparent transmission mode: The VLAN based on ports processes messages
by recognizing port types.
4.3.2 Select VLAN Mode
Operations:ManagementVLAN Mode
-
32
In this Page,you can select the VLAN Mode.
Figure 4.8
4.3.3 802.1Q VLAN
The link type of Ethernet port and Cable ports of the Master include Access,
Trunk and Hybrid.
Access port: It can only belong to one VLAN and usually used to connect user
devices.
Trunk port: It can belong to multiple VLANs and can receive and send multiple
VLAN packets. It is usually used for the connection between network devices.
Hybrid port: It can belong to multiple VLANs and can receive and send multiple
VLAN packets. It can be used for connection of network devices and of user
devices.
The difference between Hybrid and Trunk ports is as follows:
Hybrid port allows sending multiple VLAN packets without Tag.
Trunk port allows sending default VLAN packets only without Tag.
-
33
Descriptions
By default, VLAN 1 has to be remained in order to ensure normal device access.
One typical business and managing VLAN configuration.
1). Show and Maintain VLAN
Operations:Management802.1Q VLAN
Figure 4.9
2). Create VLAN
Input VLAN ID,click on,you can create VLAN.
Descriptions
-
34
Figure 4.10
By default, the Ethernet port of Master belongs to Access port and only allows
VLAN 1 packet. Cable port belongs to Trunk port and allows all VLAN packets
created.
3). Trunk Port
Operations:ManagementTrunk VLAN
In this page,you can see created Trunk Ports and attributes.
Figure 4.11
Key parameters descriptions:
Trunk Port:Show current Trunk VLAN ports.
PVIDShow the default PVID of Trunk Ports.
Allow VLAN:Show allowed VLAN lists.
Create Trunk Ports
-
35
Operations:Select ports,input PVIDand allowed VLAN,click on
Figure 4.12
Delete selected Trunk
Operations:Select Trunk ports to be deleted,click .
Figure 4.13
4). Hybrid Port
Operations:ManagementHybrid VLAN
In this page,you can see created Hybrid ports and attributes.
-
36
Figure 4.14
Key parameters descriptions:
Hybrid Port:Show current Hybrid VLAN ports.
PVID:show the default PVID of Hybrid ports.
Tag VLAN Lists:Show Tag VLAN lists of Hybrid ports.
Untag VLAN Lists:Show Untag VLAN lists of Hybrid Ports.
Create Hybrid Ports:
Operations:Select ports to be created Hybrid mode,input PVID,Tagged
VLAN,Untagged VLAN,click on
-
37
Figure 4.15
Delete Selected Hybrid
Operations:Select Ports to be deleted,click on
Figure 4.16
4.3.4 VLAN Transparent Transmission Mode
Descriptions
Operations:ManagementVLAN Mode
VLAN transparent transmission mode,the Ethernet ports of the Master include
business port and management port:
Port Mode Deal with received
message
Deal with sended
message application
business
port Transmit Transmit
Used to
transparent
transmission
business data
-
38
management
port
Delete the tag and
transmit
Used to connect
PC to manage
the Master
Descriptions
You should login the Master through Console Port to manage it When all
the ports are business ports.
Figure 4.17
5 Users
5.1 Master Management
5.1.1 Network Refresh Mode
Operations:UsersMaster Management
You can set network refresh mode and auto refresh interval.
-
39
Figure 5.1
5.1.2 Anonumous Access
Operations:UsersMaster MangementAnonumous Access.
In this page,you can disable/enable anomumous users access to network.
Figure 5.2
5.1.3 Loop Detection
Operations:UsersMaster ManagementLoop Detection
-
40
Figure 5.3
Open loop detection function (by default,closed), if there exists loop , the
terminal network topology page willdisplay the corresponding color makes it easy
to troubleshoot and positioning system, at the same time, the system will cut
off the terminal ,When the terminal loop solved, the network communication can
recover soon.
5.1.4 CLT Lists
Operations:UsersMaster ManagementCLT Lists.
You can view current MAC,model,status,SNID and terminals num of all
Masters.
Figure 5.4
5.1.5 SNID
Operations:UsersMaster ManagementCLT ListsMAC
-
41
Figure 5.5
5.2 Network Topology
5.2.1 Device Lists
Operations:UsersNetwork Topology
Figure 5.6
-
42
5.2.2 Terminals Information and Create Configurations
Operations:UsersNetwork TopologyMAC
Figure 5.7
Key parameters descriptions:
In this page,you can view software version,terminal status and so on.
Create Configurations:use existed template ti current terminal.
-
43
Figure 5.8
Operations:UsersNetwork TopologyMACCreate Configurations
Use Template.
5.2.3 Add to BlackList
Operations:UsersNetwork Topologyadd to BlackLists
Select single or multiple radio box on the left and click adding to white
list, the function of batch adding can be realized.
The operation method of Whitelist is the same as the above.
Figure 5.9
5.2.4 Reset
-
44
Operations:UsersNetwork TopologyMACReset
You can reset remote terminal by this.
Figure 5.10
5.2.5 Configure Terminal
Operations:UsersNetwork TopologyMACReConfigure Terminal.
Figure 5.11
5.2.6 cable Link Information
Operations: UserNetwork TopologyAttenuation
-
45
Figure 5.12
Figure 5.13
5.3 Template Management
Descriptions
-
46
All users need to define business template and create configurations when
open businesses.
5.3.1 Template
Operations:UsersTemplate Management
On this page, you can define different service template for different
user groups, do not need to set the service attributes for each user
individually. Only need to have accounts, users (i.e., legitimate users)
under the reference service template can be well defined, thus greatly
reducing the repeated work, more convenient, efficient management of
different types of users.
Figure 5.14
Descriptions
The list of templates which exists some templates by default, they are
our various types of terminal.
1) Create Template
Click on,you can create new template.
-
47
Figure 5.15
Key parameters descriptions:
Device Model:Select terminal type.
Template Name:New template identification.
Template Description:Input description of new template.
Up/Down rate limitation:Set the Up/Down cable port rate.
The broadcast storm suppression: Enable/Disable the terminal equipment
broadcast storm suppression. If enable, can effectively inhibit the radio
terminal flow, to avoid network congestion, ensure the normal operation
of the network business
-
48
MAC Num limitation: Set the other terminal single terminal equipment
are allowed to access (e.g. PC) number.
VLAN transparent transmission:Set VLAN mode.
Port Setting:Set the work pattern,flow control,priority,limited rate
and LAN.
Save as New Template:save template to be new.
Port receive/transmit message:
Port Type
Deal with Received message Deal with sended message
UnTAG TAG TAG
Tagged
Cable Port: When
any of the PVID
port and Ethernet
port of a PVID is
same, receives the
message, and for
the corresponding
port PVID on the
VLAN Tag message,
or discarded.
Ethernet port: the
port
corresponding to
the PVID message
on VLAN Tag.
Cable Port:
Arbitrary when
VLANID and
Ethernet port
message of a
PVID is same,
receives the
message,
otherwise
discard
Ethernet port:
only when the
message of
VLAN ID and the
port of PVID
are the same,
receives the
message,
otherwise
discard.
Direct forwarding without
any change.
Untagged Delete the message VLAN
Tag before forwarding .
2) Delete Template
-
49
Click on,you can finish delete.
3) Modify Template
Click on the name of templates,you can modify templates.
5.3.2 Find Template
Operations:UserTemplate Management
Figure 5.16
Input the template name at the blank,you can find needed template quickly.
6 Users
6.1 UserLists
Operations:UsersUserLists.
Figure 6.1
6.1.1 New Users
Click on,you can create new users and set related business.
-
50
Figure 6.2
Tips
You need to create new template before create new users.
6.1.2 Delete Users
Click onor,you can delete
users,the same time,the users are anonymous.
Figure 6.3
6.1.3 Allow/Forbid Users Access to Network
Click on to allow the users access to network.
-
51
Click on< Add to BlackLists>to forbid access to network.
Figure 6.4
6.1.4 Edit Users
Click the user's MAC address, can enter the user to modify the page,
related operation and establish the configuration similarity.
6.2 Online
Operations:UsersOnline
Figure 6.5
6.3 WhiteLists
Operations:UsersWhitelists
-
52
You can view all the legal users and descriptions.
Figure 6.6
6.4 BlackLists
Operations:UsersBlackLists
You can view all the illegal users and descriptions.
Figure 6.7
7 Save Updates
Notes
After the configuration of all items, please be sure to save the
configurations.
Operations: click on--Save.
-
53
Figure 7.1
------The End------