Type the Document Description here!


<div id="fb-root"></div>
<script>(function(d, s, id) {
  var js, fjs = d.getElementsByTagName(s)[0];
  if (d.getElementById(id)) return;
  js = d.createElement(s); js.id = id;
  js.src = 'https://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v2.11';
  fjs.parentNode.insertBefore(js, fjs);
}(document, 'script', 'facebook-jssdk'));</script>



<span class="page-title-pdf">WSG18SFP Switch User Manual</span>



<div class="fb-like" data-href="https://confluence.wildix.com/x/XAHzAw" data-layout="button_count" data-action="recommend" data-size="large" data-show-faces="true" data-share="true"></div>


 <div class="lang-box-pdf">
	<div>
		<div class="google-lang">
			<div id="google_translate_element">
			</div>
			<script type="text/javascript">
					function googleTranslateElementInit() {
						new google.translate.TranslateElement({pageLanguage: 'en', includedLanguages: 'de,es,fr,it,nl', autoDisplay: false}, 'google_translate_element');
						}
			</script>
			<script type="text/javascript" src="//translate.google.com/translate_a/element.js?cb=googleTranslateElementInit"></script>
		</div>
		
		<div class="pdf-button">
			<a href="https://confluence.wildix.com/spaces/flyingpdf/pdfpageexport.action?pageId=66257244" alt="Convert to .pdf" title="Convert to .pdf"><img src="https://confluence.wildix.com/download/attachments/14549012/pdf-button-download-wildix-documentation.png"></a>
		</div>
	</div>
</div>


This manual explains how to log in and configure WSG18SFP Switch via the web interface.

Created: January 2011

Permalink: https://confluence.wildix.com/x/XAHzAw

Introduction

Product Overview

This switch is equipped with 16 10/100/1000BaseT(X) UTP/SFP combo ports + 2 Gigabit SFP Open Slots. It is designed for easy installation and high performance in an environment where traffic is on the network and the number of users increases continuously. The compact rigid 19” rack-mount size is specifically designed for small to medium workgroups. It can be installed where the space is limited; moreover, it provides smooth network migration, the network capacity can be upgraded easily. In addition, the switch has comprehensive features such as QoS (Quality of Service), Spanning Tree, VLAN, Port Trunking, Bandwidth Control, Port Security, SNMP, IGMP Snooping capability via the intelligent software. It is suitable for both metro-LAN and office application.

Web Management Features

Configuration

Monitoring

Maintenance

Specifications

Standard

Number of Port

Mechanical

LED Indicator:

Power Input:

Product Dimensions/ Weight:

Performance

Package Contents

Before you start to install this switch, please verify your package that contains the following items:


Hardware Description

Physical Dimensions/ Weight

44 × 220 × 440 mm (H × W × D) / 3KG

Front Panel

The front Panel consists of 16 x 10/100/1000BaseT(X) UTP/SFP combo ports + 2 Gigabit SFP open slots. The LED Indicators are also located on the front panel.

LED Indicators

The LED Indicators present real-time information of the operation status.

Table 1-1 LED Indicators


LED StatusDescription
PowerOnPower on
OffPower off
UTP (1-16)1000MOnPort is linked to 1000M
OffPort isn't linked to 1000M
Link/ ACTOnLink 
FlashingData activating
SFP (1-18)Link/  ACT (1-18)OnLink 
FlashingData activating
ACT (1-16)OnLink 
FlashingData activating


Rear Panel

The 3-pronged power plug is placed at the rear panel of the switch right side shown as below.

Hardware Installation

Set the switch on a large flat space with a power socket close by. The flat space should be clean, smooth, level and sturdy. Make sure there is enough of space to attach the cables, power cord and allow air circulation. Use twisted pair cable to connect this switch to your PC.

Software Description

Open the web browser, and type in the URL: 192.168.2.1. You see the login screen. The factory default did not set up a password, so you can just click the Apply button. The login process is completed and “Password successfully entered” appears on the screen.

Login


After the user login, the right side of website shows all functions (Fig. 1-2).

Configuration

Administrator

System Configuration

This page shows system configuration information.


Ports Configuration

Port configuration ensures access to a switch port based on MAC address, limits the total number of devices using a switch port and protects against MAC flooding attacks.

Port Configuration

In Port Configuration, you can set and view the operation mode for each port.

VLAN Setting

A Virtual LAN (VLAN) is a logical network grouping that limits the broadcast domain, which allows you to isolate network traffic, so that only the members of the same VLAN receive traffic from each other. Basically, creating a VLAN is logically equivalent to connecting a group of network devices to another Layer 2 switch. However, all the network devices are still plugged into the same switch physically.

Port Segmentation (VLAN) Configuration

Trunking

Port trunk allows multiple links to be bundled together and act as a single physical link for increased throughput. It provides load balancing, and redundancy of links in a switched inter- network. Actually, the link does not have an inherent total bandwidth equal to the sum of its component physical links. Traffic in a trunk is distributed across an individual link within the trunk in a method called a hash algorithm. The hash algorithm automatically applies load balancing to the ports in the trunk. A port failure within the trunk group causes the network traffic to be directed to the remaining ports. Load balancing is maintained whenever a link in a trunk is lost or returned to service.

Aggregation / Trunking Configuration

To assign a port to a trunk, click on the required trunk number, then click Apply.

Link Aggregation (LACP)

IEEE 802.3ad Link Aggregation Control Protocol (LACP) increases bandwidth by automatically aggregating several physical links together as a logical trunk and providing load balancing and fault tolerance for uplink connections.

LACP Port Configuration

Raid Spanning Tree

IEEE 802.1w Rapid Spanning tree protocol (LACP) provides a loop-free network and redundant links to the core network with rapid convergence to ensure faster recovery from failed links, enhancing overall network stability and reliability.

RSTP System Configuration


RSTP Port Configuration


802.1X

802.1X provides port-based authentication, which involves communication between a supplicant, authenticator, and authentication server. Port refers to a single point of attachment to the LAN infrastructure. Supplicant is often software on a client device, such as a laptop; authenticator is a network device, such as an Ethernet switch or wireless access point; authentication server is typically a host running software supporting the RADIUS and EAP protocols.

Port-based Network access control (PNAC) ensures that all the users are authorized before being granted an access to the network. User authentication is carried out using any standard-based RADIUS server.

802.1X Configuration

IGMP Snooping

IGMP Snooping is the process of listening to IGMP network traffic. IGMP Snooping allows a layer 2 switch to “listen in” on the IGMP conversation between hosts and routers by processing the layer3 IGMP packets sent in a multicast network.

When IGMP Snooping is enabled, it analyzes all IGMP packets between hosts connected to the switch and multicast routers in the network. When a switch hears an IGMP report from a host for a given multicast group, the switch adds the host’s port number to the multicast list for that group. When the switch hears an IGMP Leave, it removes the host’s port from the table entry. It prevents flooding of IP multicast traffic, and limits bandwidth intensive video traffic to the subscribers only.

IGMP Configuration

Port Mirroring

Port Mirroring is used on a network to send a copy of network packets seen on one switch port (or an entire VLAN) to a network monitoring connection on another switch port. This is commonly used for network appliances that require monitoring of network traffic, such as an intrusion-detection system.

Mirroring Configuration

QoS Setting

In QoS Mode, select QoS Disabled, 802.1p, or DSCP to configure the related parameters.

QoS Configuration

QoS Mode: QoS Disabled

When the QoS Mode is set to QoS Disabled, the following table is displayed.

QoS Mode: 802.1p

Packets are prioritized using the 802.1p field in the VLAN tag. This field is three bits long, representing the values 0 - 7. When the QoS Mode is set to 802.1p, the 802.1p Configuration table appears, allowing you to map each of the eight 802.1p values to a local priority queue (low, normal, medium or high). The default settings are shown below.

When the QoS Mode is set to 802.1p, the 802.1p Configuration table is displayed as shown below.

QoS Mode: DSCP

DSCP: Packets are prioritized using the DSCP (Differentiated Services Code Point) value. The Differentiated Services Code Point (DSCP) is a six-bit field that is contained within an IP (TCP or UDP) header. The six bits allow the DSCP field to take any value in the range 0 - 63. When QoS Mode is set to DSCP, the DSCP Configuration table is displayed, allowing you to map each of the DSCP values to a hardware output queue (low, normal, medium or high). The default settings map all DSCP values to the high priority egress queue.

You can use the Prioritize Traffic drop-down list to quickly set the values in the DSCP Configuration table to a common priority queue. Use Custom if you want to set each value individually.

When the QoS Mode is set to DSCP, the DSCP Configuration table is displayed as shown below.

Filter Configuration

Administrators can easily assign IP addresses to the ports of the switch. Press Apply button after you make the changes.

Source IP Filter:

Mode: There are three modes, by default it’s “disabled”

For example:

1. IP Address: 192.168.3.2, IP Mask: 255.255.255.0; Network address 192.168.3.x (254 IP Addresses) can be forwarded on this port

2. IP Address: 192.168.3.2, IP Mask: 255.255.255.255; Only IP 192.168.3.2 can be forwarded on the port.

Rate Limit Configuration

Select the Port number.

Policer: Set up the ingress bandwidth limit. Incoming traffic is discarded if the rate exceeds the value entered. Pause frames are also generated if flow control is enabled. The format of the packet limits to unicast, broadcast and multicast. Valid value of Port 1-18 is 128-3968 kbps. Default: No Limit

Shaper: Set up the egress bandwidth limit. Outgoing traffic is discarded if the rate exceeds the value entered. Pause frames are generated if flow control is enabled. The format of the packet limits to unicast, broadcast and multicast. Valid value of Port 1-18 is 128-3968. Default: No limit

Storm Control

Broadcast storms may occur when a device on your network is malfunctioning, or if application programs are not well designed or properly configured. If there is too much broadcast traffic on your network, performance can be severely degraded or everything can come to complete halt.

You can protect your network from broadcast storms by setting a threshold for broadcast traffic for each port. Any broadcast packets exceeding the specified threshold are dropped then.

Storm Control Configuration


Storm control is used to block unnecessary multicast and broadcast frames that reduce switch’s performance. When the function is enabled and Storm Control rate settings are detected as exceeded, the unnecessary frames are dropped. There are five types of traffic which can be rate limited, including ICMP Rate, Learn Frames Rate, Broadcast Rate, Multicast Rate and Flooded unicast Rate. The setting range is 1k-32768k per second. Default of four Rates is No Limit. 

After completing the function's setting, press Apply button.

Monitoring

Statistic Overview

Statistic Overview for all ports

You can mirror traffic from any source port to a target port for real-time analysis.

Detailed Statics

Display the detailed counting number of each port’s traffic.

LACP Status

LACP Aggregation Overview


LACP Port Status

RSTP Status

RSTP VLAN Bridge Overview

RSTP Port Status


IGMP Status

IGMP Status

IGMP Status shows the IGMP Snooping statistics for the whole switch.

VeriPHY

VeriPHY Cable Diagnostics

User can perform cable diagnostics for all ports or selected ports to diagnose any cable faults (short, open etc..) and feedback a distance to the fault.

Ping

This command sends ICMP echo request packets to another node on the network.

Ping Parameters

Use the ping command to see if another site on the network can be reached. The following are some results of the ping command:

Press <Esc> to stop pinging.


Maintenance

There are many ways to reboot the switch, such as power up, hardware reset, software reset. Press RESET button situated on the front panel to reset the device and to retrieve default settings. After upgrading software, reboot the device to apply new configuration. The procedure of software reset is explained below.

Reboot Device (Warm Restart)

Press Yes button to restart the switch, the reset is complete when the power lights stop blinking.

Figure 4-1

Load Default Setting (Factory Default)

Factory Default retrieves default settings and replaces the current configuration. Except IP address setting, all settings are restored to the factory defaults. If you want to restore all configurations including the IP address, press RESET button situated on the front panel.

Firmware Updating (Software upload)

Select “Upgrade Firmware” from the Tools drop-down list then click on the “Browse” button to select the firmware file. Click the APPLY button to upgrade the selected switch firmware file. You can download firmware files from the Support section of your local supplier.


Backup/Recovery (Configuration File Transfer)

Configuration file transfer allows you to save the switch’s current configuration or restore a previously saved configuration back to the device. Configuration files can be saved to any location on the web management station. Select “Upload” the configuration file to save a configuration or 

"Download" to restore a configuration. Use the Browse button to choose a file location on the web management station, or to find a saved configuration file.


Logout

The administrator has write access for all parameters governing the onboard agent. User should therefore assign a new administrator password as soon as possible, and store it in a safe place.


<div class="fb-like" data-href="https://confluence.wildix.com/x/XAHzAw" data-layout="button_count" data-action="recommend" data-size="large" data-show-faces="true" data-share="true"></div>



<div class="ask-question">
		<div class="text-before-buttons">
			<span style="font-size: 24px; text-align: center;">Not finding the help you need?</span><br>
Join the Facebook group to ask a question!
		</div>
<div class="fb-buttons">
<span style="align: center;"><a href="https://www.facebook.com/groups/wildixtechwizards" target="_blank"><img src="https://manuals.wildix.com/wp-content/uploads/2017/03/facebook_tech-wizards.png" alt="facebook_tech-wizards" width="282" height="80" align="center"/></a></span></div>
	</div>