GS1900 Series
Quick Start Guide
User’s Guide
Note: It is recommended you use the Web Configurator to configure the Switch
Contents Overview
Table of Contents
Part I: User’s Guide
Chapter
Getting Start
Monitor: Port
9.1 Overview
9.2 MAC Table
10.1 Overview
10.2 Link Aggregation
11.1 Overview
Monitor: Security
Monitor: Management
Configuration: System
18.5.1 The Bandwidth Control Screen
18.5.2 The Port Rate Edit Screen
18.6.1 The Port Screen
18.6.2 The Port Edit Screen
19.1 Overview
Configuration: Multicast
Configuration: Spanning Tree
26.1 Overview
26.2 LLDP
27.1 Overview
27.2 General
27.3 Trust Mode
Configuration: AAA
Configuration: Management
30.3.5 The Group Add/Modify Screen
30.3.6 The User Screen
30.3.7 The User Add/Modify Screen
30.3.8 The Trap Screen
30.3.9 The Trap Destination Screen
Appendix
Page
Page
Getting to Know Your Switch
1.1 Introduction
Figure
Backbone
Sales
Internet
Page
1.2 Ways to Manage the Switch
1.3Good Habits for Managing the Switch
Hardware Installation and Connection
2.1 Freestanding Installation
2.2 Hardware Installation
Page
Page
Hardware Overview
3.1 Front Panel Connections
3.2Rear Panel
POWER ON/OFF
Note: Use the included power cord for the AC power connection
3.3 LEDs
The Web Configurator
4.1 Overview
4.2 Access
4.3Navigating the Web Configurator
Table 5 Title Bar: Web Configurator Icons (continued)
Logout
Figure 17 Web Configurator: Logout Screen
Figure 18 Navigation Panel
For details on Getting Start features, see Chapter 5 on page
The monitor menu screens display status and statistics information
Table 6 Monitor Menu Screens Summary
FOLDER OR LINK
TAB
Table 6 Monitor Menu Screens Summary (continued)
Use the configuration menu screens to configure the Switch’s features
Table 7 Configuration Menu Screens Summary
Table 7 Configuration Menu Screens Summary (continued)
Page
Table 8 Maintenance Menu Screens Summary
Getting Start
5.1 Overview
5.2 Getting Start
Chapter 5 Getting Start
Table 9 Getting Start (continued)
Model Name
This field displays the model name of this Switch
Serial Number
Each field is described in the following table
Table 10 Getting Start > Start up > 1 Step 1 Set up IP/DNS
Host Name
This field displays a host name
IP Address
Figure 22 Getting Start > Start up > 3 Step 3 Finish
Table 12 Getting Start > Start up > 3 Step 3 Finish
Finish
Review the information and click Finish to create the task
In VLAN, you can create VLAN, tag VLAN setting, and view finished results
Page
Table 14 Getting Start > VLAN > 2 Step 2 Tag VLAN Setting
Figure 25 Getting Start > VLAN> 3 Step 3 Finish
Table 15 Getting Start > VLAN > 3 Step 3 Finish
In QoS, you can create QoS settings, and view finished results
Getting Start > QoS > 1 Step 1 QoS (QualityOfService)
Getting Start > Link aggregation > 1 Step 1 Link aggregation
Figure 28 Getting Start > Link aggregation > 1 Step 1 Link aggregation
Table 18 Getting Start > Link aggregation > 1 Step 1 Link aggregation
Figure 29 Getting Start > Link aggregation > 2 Step 2 Finish
Table 19 Getting Start > Link aggregation > 2 Step 2 Finish
Page
Page
Monitor: System
6.1 Overview
6.2 IP
Chapter 6 Monitor: System
Table 20 Monitor > System > IP > IPv4
DHCP State
(DHCP)
This field displays IP address of the Switch in the IP domain
6.3 Information
Monitor: Port
7.1 Overview
7.2 Port
Chapter 7 Monitor: Port
Table 23 Monitor > Port > Port > Status (continued)
State
This is port admin setting state
Link Status
Table 24 Monitor > Port > Port > Port Counters (continued)
Monitor > Port > Port > Bandwidth Utilization
Figure 35 Monitor > Port > Port > Bandwidth Utilization
Table 25 Monitor > Port > Port > Bandwidth Utilization
7.3 PoE
7.4 Bandwidth Management
7.5 Storm Control
Monitor: VLAN
8.1 Overview
8.2 VLAN
Chapter 8 Monitor: VLAN
Figure 40 Monitor > VLAN > VLAN > VLAN
Table 29 Monitor > VLAN > VLAN > VLAN
VLAN ID
This is the VLAN identification number
Table 30 Monitor > VLAN > VLAN > Port (continued)
Accept Frame
This field displays the type that is accepted by the frame
Only
be dropped
8.3 Guest VLAN
8.4 Voice VLAN
Table 33 Monitor > VLAN > Voice VLAN (continued)
Monitor: MAC Table
9.1 Overview
9.2 MAC Table
Monitor: Link Aggregation
10.1 Overview
10.2 Link Aggregation
Chapter 10 Monitor: Link Aggregation
Table 35 Monitor > Link Aggregation > LAG
Monitor: Loop Guard
11.1 Overview
11.2 Loop Guard
Figure 52 Monitor > Loop Guard
Table 36 Monitor > Loop Guard
Monitor: Multicast
12.1 Overview
12.2 IGMP
Chapter 12 Monitor: Multicast
Table 37 Monitor > Multicast > IGMP > Vlan
Monitor > Multicast > IGMP > Statistics
Figure 54 Monitor > Multicast > IGMP > Statistics
Table 38 Monitor > Multicast > IGMP > Statistics
Reset
In the Reset column, the Reset option allows you to delete a pre-existingrule
Figure 55 Monitor > Multicast > IGMP > Statistics > Reset
Monitor > Multicast > IGMP > Group
Figure 56 Monitor > Multicast > IGMP > Group
Table 39 Monitor > Multicast > IGMP > Group
Monitor > Multicast > IGMP > Router
Figure 57 Monitor > Multicast > IGMP > Router
Table 40 Monitor > Multicast > IGMP > Router
Monitor: Spanning Tree
13.1 Overview
13.2 Spanning Tree
Chapter 13 Monitor: Spanning Tree
Table 41 Monitor > Spanning Tree > CIST
Bridge
Indentifier
address
Table 42 Monitor > Spanning Tree > CIST Port
This field displays the identifier (in priority / port number)
(Priority / Port Id)
Operation
media, the higher the cost
Table 43 Monitor > Spanning Tree > MST
MST ID
This is the unique identifier for this MST
Select a number from the drop-downmenu to display results
spanning tree network
Chapter 13 Monitor: Spanning Tree
Table 44 Monitor > Spanning Tree > MST Port (continued)
Indentifier (Priority
/ Port Id)
Internal Path
Table 45 Monitor > Spanning Tree > STP Statistics
Monitor: LLDP
14.1 Overview
14.2 LLDP
Chapter 14 Monitor: LLDP
Table 46 Monitor > LLDP > Statistics
Monitor > LLDP > Remote Information
Figure 64 Monitor > LLDP > Remote Information
Table 47 Monitor > LLDP > Remote Information
Table 47 Monitor > LLDP > Remote Information (continued)
Detail
Monitor > LLDP > Overloading
Figure 65 Monitor > LLDP > Overloading
Table 48 Monitor > LLDP > Overloading
Monitor: Security
15.1 Overview
15.2 Port Security
Chapter 15 Monitor: Security
Table 49 Monitor > Security > Port Security
This field displays the status of global control information
This field displays the status of port based control information
Max MAC Entry
Monitor > Security > 802.1X > Authenticated Hosts
Figure 68 Monitor > Security > 802.1x > Authenticated Hosts
Table 51 Monitor > Security > 802.1x > Authenticated Hosts
Monitor: Management
16.1 Overview
16.2 Syslog
16.3 Error Disable
Figure 70 Monitor > Management > Error Disable
Table 53 Monitor > Management > Error Disable
Recovery
Error Disabled
Reason
Configuration: System
17.1 Overview
17.2 IP
Chapter 17 Configuration: System
Table 54 Configuration > System > IP > IPv4
IPv4 Address
the properties
Enter the IP address of the Switch in the IP domain
17.3 Time
17.4 Information
System Information
Figure 75 Configuration > System > System Information
Table 58 Configuration > System > System Information
Configuration: Port
18.1 Overview
18.2 Port
Chapter 18 Configuration: Port
Table 59 Configuration > Port > Port > Port
properties of the port
Displays the port index number
32 alpha-numericalcharacters
18.3 EEE
18.4 PoE
Figure 80 Configuration > Port > PoE > PoE
Table 63 Configuration > Port > PoE > PoE
PoE Setting
must be enabled for data transmission to occur
Displays which ports can receive power from the Switch. You can set this in the
Table 63 Configuration > Port > PoE > PoE (continued)
PD Priority
priority first
Power (mW)
Max Power
Table 64 Configuration > Port > PoE > PoE> Edit (continued)
This field is not available for the SFP or SFP+ ports
priority
Select Critical to give the PD connected to this port the highest priority
priority ports are served
18.5 Bandwidth Management
Chapter 18 Configuration: Port
Ingress Rate
Limit (Kbps)
Egress Rate
Table 66 Configuration > Port > Bandwidth Management > Bandwidth Control > Edit
18.6 Storm Control
Figure 85 Configuration > Port > Storm Control > Port > Edit
Table 68 Configuration > Port > Storm Control > Port > Edit
Displays the port list index number(s)
Select Enable to activate traffic storm control on the port(s)
Click the Enable checkbox to active the feature
Configuration: VLAN
19.1 Overview
19.2 VLAN
Table 70 Configuration > VLAN > VLAN > VLAN > Add
VLAN List
and up to one (secondary) Isolated private VLAN
VLAN Association List
Primary
Table 71 Configuration > VLAN > VLAN > Port
that the frames are forwarded to the VLAN group that the tag defines
Ingress Check
do not include this port in its member set
VLAN Trunk
Table 72 Configuration > VLAN > VLAN > Port > Edit (continued)
Accepted Type
This is the default setting
dropped
Ingress Filtering
Figure 90 Configuration > VLAN > VLAN > VLAN Port
Table 73 Configuration > VLAN > VLAN > VLAN Port
Excluded
Tagged
Untagged
19.3 Guest VLAN
Table 74 Configuration > VLAN > Guest VLAN > Global (continued)
Guest VLAN ID
Enter the global guest VLAN ID
Figure 93 Configuration > VLAN > Guest VLAN > Port
Table 75 Configuration > VLAN > Guest VLAN > Port
19.4 Voice VLAN
Figure 95 Configuration > VLAN > Voice VLAN > Global
Table 77 Configuration > VLAN > Voice VLAN > Global
Select Enable to activate the global voice VLAN feature
MVR VID, PVID etc. The allowed range is 1 to
Displays the 802.1p packet priority field
Figure 96 Configuration > VLAN > Voice VLAN > OUI
Table 78 Configuration > VLAN > Voice VLAN > OUI
Click Add to create a new OUI entry
OUI Address
hexadecimal digit)
Table 79 Configuration > VLAN > Voice VLAN > OUI > Add/Edit
Figure 98 Configuration > VLAN > Voice VLAN > Port
Table 80 Configuration > VLAN > Voice VLAN > Port
Table 80 Configuration > VLAN > Voice VLAN > Port (continued)
modes are:
Figure 99 Configuration > VLAN > Voice VLAN > Port > Add/Edit
Table 81 Configuration > VLAN > Voice VLAN > Port > Add/Edit
Displays the port(s) index value
Configuration: MAC Table
20.1 Overview
20.2 MAC Table
Static MAC > Add
Filtering MAC
Table 84 Configuration > MAC Table > Filtering MAC
Filtering MAC
Configuration > MAC Table > Filtering MAC
Figure 103 Configuration > MAC Table > Filtering MAC > Add
Table 85 Configuration > MAC Table > Filtering MAC > Add
Figure 104 Configuration > MAC Table > Dynamic Age
Table 86 Configuration > Dynamic Age
Dynamic MAC Age
Configuration: Link Aggregation
21.1 Overview
21.2 Link Aggregation
Chapter 21 Configuration: Link Aggregation
Figure 105 Configuration > Link Aggregation > Global
Table 87 Configuration > Link Aggregation > Global
LACP State
Select Enable to activate the link aggregation control protocol
Table 88 Configuration > Link Aggregation > LAG Management
Click Add to create a new LAG Management entry
Displays the name of the link aggregation group
This field displays how these ports were added to the trunk group. It displays:
Static - if the ports are configured as static members of a trunk group
Table 89 Configuration > Link Aggregation > LAG Management > Add
Select the link aggregation group (LAG)
Enter the name of this entry
Select Static or LACP
Select the member ports to be part of the LAG
Page
Figure 110 Configuration > Link Aggregation > LACP Port
Table 92 Configuration > Link Aggregation > LACP Port
Displays the priority value
Timer (sec)
Displays the Timer value in seconds
Table 93 Configuration > Link Aggregation > LACP Port > Edit
Configuration: Loop Guard
22.1 Overview
22.2 Loop Guard
Chapter 22 Configuration: Loop Guard
Table 94 Configuration > Loop Guard (continued)
Recovery Time
detected (and the port action shuts down the port)
Figure 113 Configuration > Loop Guard > Port
Chapter 22 Configuration: Loop Guard
Figure 114 Configuration > Loop Guard > Port > Edit
Table 96 Configuration > Loop Guard > Port > Edit
Configuration: Mirror
23.1 Overview
23.2 Mirror
Chapter 23 Configuration: Mirror
Table 97 Configuration > Mirror
Mirroring
Monitor Port
monitor port
Configuration: Multicast
24.1 Overview
24.2 IGMP
Chapter 24 Configuration: Multicast
Table 98 Configuration > Multicast > IGMP (continued)
Snooping
Select v2 or v3 depending on the snooping version you require
Multicast Action
Table 99 Configuration > Multicast > IGMP > VLAN (continued)
Displays the switch current VLAN querier entry as Enable or Disable
Displays the switch current VLAN querier entry version
Configuration > Multicast > IGMP
>VLAN > Edit to open this screen
Table 100 Configuration > Multicast > IGMP > VLAN > Modify (continued)
Enter the number of queries
upstream port when an IGMP Done message is received
IGMP Querier
Select the IGMP querier status to Enable or Disable the function
Figure 120 Configuration > Multicast > IGMP > Router Port > Add/Modify
Table 102 Configuration > Multicast > IGMP > Router Port > Add/Modify
IGMP Profile
Table 104 Configuration > Multicast > IGMP > Profile > Add/Modify (continued)
Enter the profile start group IP address
Enter the profile end group IP address
Select the action of the profile as to be Permit or Deny
Throttling
Figure 124 Configuration > Multicast > IGMP > Throttling > Add/Edit
Table 106 Configuration > Multicast > IGMP > Throttling > Add/Edit
Replace
Configuration: Spanning Tree
25.1 Overview
25.2 Spanning Tree
Chapter 25 Configuration: Spanning Tree
Figure 125 Configuration > Spanning Tree
Table 107 Configuration > Spanning Tree
Select to Enable or Disable the Spanning-Treefunction
BPDU Forward
Figure 126 Configuration > Spanning Tree > STP Port
Table 108 Configuration > Spanning Tree > STP Port
Displays the index number of the STP port
Display the status of the STP port as enabled or disabled
External Cost
Figure 127 Configuration > Spanning Tree > STP Port > Edit
Table 109 Configuration > Spanning Tree > STP Port > Edit
Enter the index number of the STP port(s)
External Path
Enter the external path cost. Enter 0 for Auto
Figure 128 Configuration > Spanning Tree > CIST
Table 110 Configuration > Spanning Tree > CIST
CIST Instance
Configure priority of CIST bridge ID
Priority is part of bridge ID, used for CIST root bridge selection
CIST Port
Configuration > Spanning Tree > CIST Port
Figure 129 Configuration > Spanning Tree > CIST Port
Table 111 Configuration > Spanning Tree > CIST Port
Displays the priority for each port here
Figure 130 Configuration > Spanning Tree > CIST Port > Edit
Table 112 Configuration > Spanning Tree > CIST Port > Edit
STP CIST Port
Configure the priority for each port here
between 0 and 255 and the default value is
Table 113 Configuration > Spanning Tree > MST (continued)
Figure 132 Configuration > Spanning Tree > MST > Add/Modify
Table 114 Configuration > Spanning Tree > MST > Add/Modify
MST Port
Configuration > Spanning Tree > MST Port
Figure 133 Configuration > Spanning Tree > MST Port
Table 115 Configuration > Spanning Tree > MST Port
Select the MST port ID number from the dropdown list
the properties of the MST ID
Displays the index number of the MST port
Figure 134 Configuration > Spanning Tree > MST Port > Edit
Table 116 Configuration > Spanning Tree > MST Port > Edit
STP MST Port
Displays the MST ID number
Enter the index number of the MTP port(s)
Configuration: LLDP
26.1 Overview
26.2 LLDP
Table 117 Configuration > LLDP > Global (continued)
Transmission
Enter the transmission interval value
the Tx Interval value. Valid values are restricted to 5 - 32768 seconds
Hold Multiplier
Figure 136 Configuration > LLDP > Port
Table 118 Configuration > LLDP > Port
LLDP VLAN
Displays the index number of the LLDP port
Displays the mode of the LLDP port as Disable, Tx Only, Rx Only, or Tx & Rx
Local Information
Configuration > LLDP
Figure 138 Configuration > LLDP > Local Information
Table 120 Configuration > LLDP > Local Information
Chassis ID
System Name
Displays the System Description
Table 120 Configuration > LLDP > Local Information (continued)
Capabilities
Capabilities Supported describes the neighbor unit's capabilities. The possible
Supported
capabilities are:
Figure 139 Configuration > LLDP > Local Information > Edit
Table 121 Configuration > LLDP > Local Information > Edit
Table 121 Configuration > LLDP > Local Information > Edit (continued)
Location Coordinates
Latitude
Latitude SHOULD be normalized to within 0-90degrees with a maximum of 4 digits
North
Chapter 26 Configuration: LLDP
Location ECS
ELIN
MED Network Policy
Figure 140 Configuration > LLDP > MED Network Policy
Figure 141 Configuration > LLDP > MED Network Policy > Add/Edit
Table 123 Configuration > LLDP > MED Network Policy > Edit
Select the index of network policy
application types are shown below
Voice - for use by dedicated IP Telephony handsets and other similar appli
Table 123 Configuration > LLDP > MED Network Policy > Edit (continued)
VLAN. Select Tagged or Untagged
tag header as defined by IEEE 802.1Q-2003
Tagged: The device is using the IEEE 802.1Q tagged frame format
eight priority levels (0 through 7)
Table 124 Configuration > LLDP > MED Port (continued)
Location
Displays the Location value
Displays the PoE value
Inventory
Table 125 Configuration > LLDP > MED Port > Edit (continued)
Configuration: QoS
27.1 Overview
27.2 General
Chapter 27 Configuration: QoS
Table 126 Configuration > QoS > General
QoS Port
Displays the QoS port list
CoS Value
Queue
Cos Mapping
General > CoS Mapping
Figure 147 Configuration > QoS > General > CoS Mapping
Table 129 Configuration > QoS > General > CoS Mapping
DSCP Mapping
General
IP Precedence Mapping
General > IP Precedence Mapping
Figure 149 Configuration > QoS > General > IP Precedence Mapping
Table 131 Configuration > QoS > General > IP Precedence Mapping
27.3 Trust Mode
Figure 151 Configuration > QoS > Trust Mode > Port
Table 133 Configuration > QoS > Trust Mode > Port
Displays the Trust status as Trust or Untrust
Configuration > QoS > Trust Mode
>Port > Edit to open this screen
Figure 152 Configuration > QoS > Trust Mode > Port > Edit
Table 134 Configuration > QoS > Trust Mode > Port > Edit
Configuration: Security
28.1 Overview
28.2 Port Security
Port Security > Port > Edit
28.3 Protected Port
Figure 156 Configuration > Security > Protected Port
Table 138 Configuration > Security > Protected Port
Figure 157 Configuration > Security > Port Security > Port > Edit
Table 139 Configuration > Security > Port Security > Port > Edit
Displays the port list index value(s)
802.1X > Port
Figure 159 Configuration > Security > 802.1X > Port
Table 141 Configuration > Security > 802.1X > Port
the properties of the port
Displays the Trust status as enabled or disabled
Reauthentication
28.5 DoS
Figure 161 Configuration > Security > DoS > Global
Table 143 Configuration > Security > DoS > Global
Select the DoS security setting to be enabled or disabled
DoS > Port
Figure 162 Configuration > Security > DoS > Port
Use this screen to configure the Port settings
Click Configuration > Security > DoS > Port > Edit to open this screen
Figure 163 Configuration > Security > DoS > Port > Edit
Table 145 Configuration > Security > DoS > Port > Edit
Configuration: AAA
29.1 Overview
29.2 Auth Method
29.3 RADIUS
Figure 166 Configuration > AAA > RADIUS
Table 148 Configuration > AAA > RADIUS
Server
Click Add to create a new Server entry
Displays the server name(s) as an IP address or a domain name
29.4 TACACS+
Figure 168 Configuration > AAA > TACACS+
Table 150 Configuration > AAA > TACACS+
Displays the port number(s) as a value between 0 and
Timeout
Displays the priority as High or Low
Table 151 Configuration > AAA > TACACS+ > Add/Modify
Enter the port number(s) as a value between 0 and
Enter the authentication key string: 0 - 63 ASCII alphanumeric characters
Configuration: Management
30.1 Overview
30.2 Syslog
Chapter 30 Configuration: Management
Figure 171 Configuration > Management > Syslog > Local
Table 153 Configuration > Management > Syslog > Local
Click Add to create a new Local entry
Displays the severity level of messages to be written to logs
Table 154 Configuration > Management > Syslog > Local > Add/Modify (continued)
Select the severity level of messages to be written to logs
Figure 173 Configuration > Management > Syslog > Remote
Table 155 Configuration > Management > Syslog > Remote
Click Add to create a new Remote entry
30.3 SNMP
Figure 175 Configuration > Management > SNMP
Table 157 Configuration > Management > SNMP
Select the global SNMP setting to be enabled or disabled
Figure 176 Configuration > Management > SNMP > Community
Table 158 Configuration > Management > SNMP > Community
Figure 177 Configuration > Management > SNMP > Community > Add/Modify
Table 159 Configuration > Management > SNMP > Community > Add/Modify
Figure 178 Configuration > Management > SNMP > Group
Table 160 Configuration > Management > SNMP > Group
SNMPv3 Group
Table 160 Configuration > Management > SNMP > Group (continued)
Group Name
Security Model
Security Level
Figure 179 Configuration > Management > SNMP > Group > Add/Modify
Table 161 Configuration > Management > SNMP > Group > Add/Modify (continued)
Figure 180 Configuration > Management > SNMP > User
Table 162 Configuration > Management > SNMP > User
SNMP User
Click Add to create a new SNMP user
Figure 181 Configuration > Management > SNMP > User > Add/Modify
Table 163 Configuration > Management > SNMP > User > Add/Modify
Auth Protocol
Auth Password
string length is 8 to 32. The allowed content is ASCII characters from 33 to
Figure 182 Configuration > Management > SNMP > Trap
Table 164 Configuration > Management > SNMP > Trap
SNMP Trap
SNMP Authfailure
Trap State
Table 165 Configuration > Management > SNMP > Trap Destination
SNMP Trap Host
>SNMP > Trap Destination > Add/Modify to open this screen
Figure 184 Configuration > Management > SNMP > Trap Destination > Add/Modify
Table 166 Configuration > Management > SNMP > Trap Destination > Add/Modify
30.4 Error Disable
30.5 HTTP/HTTPS
30.6 Users
Figure 188 Configuration > Management > Users
Table 170 Configuration > Management > Users
User
Clear Text
Encrypted
30.7 Remote Access Control
Table 172 Configuration > Management > Remote Access Control
Select the global remote access setting to be enabled or disabled
Click Add to create a new profile entry
Displays the priority level of the entry. The value can be between 1 and
Displays the action value. The values are Permit or Deny
Management Access List Add
Enter the priority level of the entry. The value can be between 1 and
Select the action value. The values are Permit or Deny
Source
Select the source IP value. The options are ALL or IPv4/Wildcard
Maintenance
31.1 Firmware Upgrade
31.2 Firmware Management
31.3Backup a Configuration File
Maintenance
Backup
Figure 194 Maintenance > Configuration > Backup
The following table describes the labels under Backup
Table 176 Maintenance > Configuration > Backup
31.4Restore a Configuration File
31.5Manage Configuration Files
31.6 Reset to Factory Defaults
31.7 Network Diagnostics
Figure 197 Maintenance > Diagnostics > Port Test
Follow the steps to perform the port test
1.In Port Test, select the port number from the Port drop-downlist
2.Click Test to start the port test
The test results are displayed in Test Results
Follow the steps to perform a ping test
1.In IP Address, enter the IPv4 address
2.In Count, enter the number of ping packets
3.In Interval, enter the time interval in seconds
4.In Size, enter the packet size in bytes
Trace
Figure 200 Maintenance > Diagnostics > Trace
The following table describes the labels in Trace Route
Table 181 Maintenance > Diagnostics > Trace
IP Addres
31.8 Reboot
Troubleshooting
32.1Power, Hardware Connections, and LEDs
32.2Switch Access and Login
•If you changed the IP address, use the new IP address
I forgot the IP address for the Switch
Section on page
Make sure your Internet browser does not block
Advanced Suggestions
32.3 Switch Configuration
Legal Information
Appendix A Legal Information
Note
Registration
domain name 49, 91, 92, 96, 97, 98, 99, 100, 103
as DHCP servers 49, 91, 92, 96, 97, 98, 99, 100, 103
system name 36, 49, 91, 119, 120, 121