Page 51 / 110 Scroll up to view Page 46 - 50
42
Chapter 5: Using the Web-based Utility for Configuration
Statistics Tab - RMON Events
24-Port 10/100/1000 Gigabit Switch with Webview and PoE
Both
. Indicates that both the Log and Trap mechanism are used to report alarms.
Owner.
Displays the device or user that defined the alarm.
The
Add
button adds the entry to the RMON Alarms Table.
Statistics Tab - RMON Events
The RMON Events screen contains fields for defining RMON events. An RMON Event determines the action to take
when an alarm is triggered. The response to an alarm can include logging the alarm or sending an SNMP trap
message.
Event Setting
Event Description.
Displays the user-defined event description.
Type.
Describes the event type. Possible values are:
None.
Indicates that no event occurred.
Log.
Indicates that the event is a log entry.
Trap.
Indicates that the event is a trap.
Log and Trap
. Indicates that the event is both a log entry and a trap.
Community.
Displays the community to which the event belongs.
Owner.
Displays the device or user that defined the event. (Maximum 127 characters).
The
Add
button adds the configured RMON event to the Event Table at the bottom of the screen.
The Event Table area contains Index, Description, Type, Community, Last Time Sent, Owner.
To display each time an event was triggered by an alarm, first highlight an entry in the Event Control Table and
then click on the
View Log Table
button. The Log Table shows the log index number, the time of an event, and the
description of the event that activated the entry.
Figure 5-21: Statistics - RMON Events
Figure 5-22: Statistics - RMON Events - Log Table
Downloaded from
www.Manualslib.com
manuals search engine
Page 52 / 110
43
Chapter 5: Using the Web-based Utility for Configuration
Statistics Tab - Port Utilization
24-Port 10/100/1000 Gigabit Switch with Webview and PoE
Statistics Tab - Port Utilization
The Port Utilization screen displays the amount of resources each interface is currently consuming. Ports in green
are functioning normally, while ports in red are currently transmitting an excessive amount of network traffic.
Click the
View All Ports
button to view all 24 ports on the screen.
Global Overloaded Setting
.
Refresh Rate.
Indicates the amount of time that passes before the port utilization statistics are refreshed. The
possible field values are:
No Refresh.
Indicates that the statistics are not refreshed.
15 Sec.
Indicates that the statistics are refreshed every 15 seconds.
30 Sec.
Indicates that the statistics are refreshed every 30 seconds.
60 Sec.
Indicates that the statistics are refreshed every 60 seconds.
Statistics Tab - 802.1x Statistics
The 802.1X Statistic screen contains information about EAP packets received on a specific port. To view the
statistics for a port, select the required interface from the drop-down menu and click
Query
.
Refresh Rate.
Indicates the amount of time that passes before the EAP statistics are refreshed. The possible field
values are:
No Refresh.
Indicates that the EAP statistics are not refreshed.
15 Sec.
Indicates that the EAP statistics are refreshed every 15 seconds.
30 Sec.
Indicates that the EAP statistics are refreshed every 30 seconds.
60 Sec.
Indicates that the EAP statistics are refreshed every 60 seconds.
Interface.
Indicates the port, which is polled for statistics.
Name.
Displays the measured 802.1x statistic.
Description.
Describes the measured 802.1x statistic.
Figure 5-23: Statistics - Port Utilization
Figure 5-24: Statistics - 802.1x Statistics
Downloaded from
www.Manualslib.com
manuals search engine
Page 53 / 110
44
Chapter 5: Using the Web-based Utility for Configuration
ACL Tab - IP Based ACL
24-Port 10/100/1000 Gigabit Switch with Webview and PoE
Packet.
Displays the amount of packets measured for the particular 802.1x statistic.
ACL Tab - IP Based ACL
The IP Based ACL (Access Control List) screen contains information for defining IP Based ACLs. Access Control
Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4 protocol port number or TCP
control code) or any frames (based on MAC address or Ethernet type). To filter incoming packets, first create an
access list, add the required rules, specify a mask to modify the precedence in which the rules are checked, and
then bind the list to a specific port.
Target
. Select the New ACL Name radio button and enter an ACL name in the text field provided (with up to 16
characters). Or to add rules to an existing ACL, select ACL Name and select an ACL from the dropdown menu.
ACL Name.
Displays the user-defined IP based ACLs.
New ACL Name.
Define a new user-defined IP based ACL, the name cannot include spaces.
Action.
Indicates the action assigned to the packet matching the ACL. Packets are forwarded or dropped. In
addition, the port can be shut down, a trap can be sent to the network administrator, or a packet assigned rate
limiting restrictions for forwarding. The options are as follows:
Permit.
Forwards packets which meet the ACL criteria.
Deny.
Drops packets which meet the ACL criteria.
Shutdown.
Drops packet that meets the ACL criteria, and disables the port to which the packet was
addressed. Ports are reactivated from the Port Management screen.
Protocol.
Creates an ACE (Access Control Event) based on a specific protocol.
Select from List.
Selects from a protocols list on which ACE can be based. The possible field values are:
Any.
Matches the protocol to any protocol.
EIGRP.
Indicates that the Enhanced Interior Gateway Routing Protocol (EIGRP) is used to classify network
flows.
ICMP.
Indicates that the Internet Control Message Protocol (ICMP) is used to classify network flows.
IGMP.
Indicates that the Internet Group Management Protocol (IGMP) is used to classify network flows.
TCP.
Indicates that the Transmission Control Protocol is used to classify network flows.
Figure 5-25: ACL - IP Based ACL
Downloaded from
www.Manualslib.com
manuals search engine
Page 54 / 110
45
Chapter 5: Using the Web-based Utility for Configuration
ACL Tab - IP Based ACL
24-Port 10/100/1000 Gigabit Switch with Webview and PoE
OSPF.
Matches the packet to the Open Shortest Path First (OSPF) protocol.
UDP.
Indicates that the User Datagram Protocol is used to classify network flows.
Protocol ID To Match.
Adds user-defined protocols to which packets are matched to the ACE. Each protocol
has a specific protocol number which is unique. The possible field range is 0-255.
TCP Flags.
Filters packets by TCP flag. Filtered packets are either forwarded or dropped. Filtering packets by TCP
flags increases packet control, which increases network security. The values that can be assigned are:
Set.
Enables filtering packets by selected flags.
Unset.
Disables filtering packets by selected flags.
Don’t care.
Indicates that selected packets do not influence the packet filtering process.
The TCP Flags that can be selected are:
Urg.
Indicates the packet is urgent.
Ack.
Indicates the packet is acknowledged.
Psh.
Indicates the packet is pushed.
Rst.
Indicates the connection is dropped.
Syn.
Indicates request to start a session.
Fin.
Indicates request to close a session.
Source Port.
Defines the TCP/UDP source port to which the ACE is matched. This field is active only if 800/6-TCP
or 800/17-UDP are selected in the Select from List drop-down menu. The possible field range is 0 - 65535.
Destination Port.
Defines the TCP/UDP destination port. This field is active only if 800/6-TCP or 800/17-UDP are
selected in the Select from List drop-down menu. The possible field range is 0 - 65535.
Source IP Address.
Matches the source port IP address to which packets are addressed to the ACE.
Wildcard Mask.
Defines the source IP address wildcard mask. Wildcard masks specify which bits are used and
which bits are ignored. A wild card mask of 255.255.255.255 indicates that no bit is important. A wildcard of
0.0.0.0 indicates that all the bits are important. For example, if the source IP address 149.36.184.198 and the
wildcard mask is 255.36.184.00, the first eight bits of the IP address are ignored, while the last eight bits are
used.
Downloaded from
www.Manualslib.com
manuals search engine
Page 55 / 110
46
Chapter 5: Using the Web-based Utility for Configuration
ACL Tab - MAC Based ACL
24-Port 10/100/1000 Gigabit Switch with Webview and PoE
Dest. IP Address.
Matches the destination port IP address to which packets are addressed to the ACE.
Wildcard Mask.
Defines the destination IP address wildcard mask.
Match DSCP.
Matches the packet DSCP value to the ACE. Either the DSCP value or the IP Precedence value is
used to match packets to ACLs. The possible field range is 0-63.
Match IP Precedence.
Matches the packet IP Precedence value to the ACE. Either the DSCP value or the IP
Precedence value is used to match packets to ACLs. The possible field range is 0-7.
The
Add to List
button adds the configured IP Based ACLs to the IP Based ACL Table at the bottom of the screen.
ACL Tab - MAC Based ACL
The MAC Based ACL screen allows a MAC based ACL to be defined. ACEs can be added only if the ACL is not
bound to an interface.
Target
. Select the New ACL Name radio button and enter an ACL name in the text field provided (with up to 16
characters). Or to add rules to an existing ACL select the ACL Name radio button and select an ACL from the
dropdown menu.
ACL Name.
Displays the user-defined MAC based ACLs.
New ACL Name.
Specifies a new user-defined MAC based ACL name, the name cannot include spaces.
Action.
Indicates the ACL forwarding action. Possible field values are:
Permit.
Forwards packets which meet the ACL criteria.
Deny.
Drops packets which meet the ACL criteria.
Shutdown.
Drops packet that meet the ACL criteria, and disables the port to which the packet was
addressed.
Source MAC Address.
Matches the source MAC address to which packets are addressed to the ACE.
Wildcard Mask.
Defines the source IP address wildcard mask. Wildcard masks specify which bits are used and
which bits are ignored. A wild card mask of 255.255.255.255 indicates that no bit is important. A wildcard of
0.0.0.0 indicates that all the bits are important. For example, if the source IP address 149.36.184.198 and the
wildcard mask is 255.36.184.00, the first eight bits of the IP address are ignored, while the last eight bits are
used.
Figure 5-26: ACL - Mac Based ACL
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top