Руководство по эксплуатации evidence

Перейти к контенту

Русские электронные инструкции по эксплуатации

Русские электронные инструкции по эксплуатации

Постоянно обновляемый большой каталог документации по эксплуатации и использованию современных устройств и оборудования на русском языке. Бесплатное скачивание файлов.

Поиск:

    Главная

    ♥ В закладки

    Просмотр инструкции в pdf

    Поделиться в ВКонтакте

    Поделиться в одноклассниках

    Поделиться в MAIL.RU

    Инструкция по эксплуатации автоматической кофемашины Krups Quattro Force Evidence EA891810.

    Скачать инструкцию к автоматической кофемашине Krups Quattro Force Evidence EA891810 (5,55 МБ)



    Автоматические кофемашины

    « Инструкция к автоматической кофемашине Krups Roma Black EA810870

    » Инструкция к беспроводным наушникам QUB STN-250

    Вам также может быть интересно

    Инструкция к кофеварке Krups Nescafe Dolce Gusto Mini Me KP123B10

    Инструкция к автоматической кофемашине Krups Espressaria EA8010PE

    Инструкция к автоматической кофемашине Krups Lattespress EA829810

    Инструкция к автоматической кофемашине Krups Roma White EA810570

    Инструкция к кофеварке Krups Virtuoso XP442C11

    Инструкция к кофемашине Krups EA891110 Evidence

    Инструкция к кофеварке Krups KP110810 Dolce Gusto Oblo Black

    Инструкция к кофемашине Krups Espresseria EA82FD10

    Добавить комментарий

    Имя *

    Email *

    Сайт

    Комментарий

    ;-) :| :x :twisted: :smile: :shock: :sad: :roll: :razz: :oops: :o :mrgreen: :lol: :idea: :grin: :evil: :cry: :cool: :arrow: :???: :?: :!:

    Сохранить моё имя, email и адрес сайта в этом браузере для последующих моих комментариев.

    • Добавить инструкцию
    • Заказать инструкцию
    • Политика конфиденциальности
    • Contents

    • Table of Contents

    • Bookmarks

    Quick Links

    loading

    Related Manuals for Evidence Cross-8/HPoE-10G

    • Switch Evidence Cross 4 PoE Lite User Manual

    Summary of Contents for Evidence Cross-8/HPoE-10G

    • Page 2
      Cross-8/HPoE-10G GUI User Guide 10-Ports L2+ Managed GbE PoE+ Switch Release A2  2018, Manufacture Corporation. All rights reserved. All brand and product names are trademarks or registered trademarks of their respective companies…
    • Page 3: About This Manual

      Manufacture Technology. Purpose This GUI user guide gives specific information on how to operate and use the management functions of the Cross-8/HPoE-10G via HTTP/HTTPs web browser Audience The Manual is intended for use by network administrators who are responsible for operating and maintaining network equipment;…

    • Page 5: Table Of Contents

      Table of Contents …………………………….II ABOUT THIS MANUAL……………………..II Revision History……………………….ix INTRODUCTION……………………….1 CHAPTER 1 OPERATION OF WEB-BASED MANAGEMENT……………3 CHAPTER 2 SYSTEM……………………..5 2-1 S ……………………….5 YSTEM NFORMATION 2-2 IP A …………………………8 DDRESS 2-2.1 Settings…………………………8 2-2.2 Advanced Settings……………………..10 2-2.3 Status…………………………14 2-3 S ………………………..18 YSTEM…

    • Page 6
      5-3 VLAN P ……………………..90 TATUS 5-4 MAC- VLAN………………………92 BASED 5-4.1 Configuration……………………….92 5-4.2 Status…………………………94 5-5 P VLAN………………………95 ROTOCOL BASED 5-5.1 Protocol to Group……………………..95 5-5.2 Group to VLAN……………………..98 5-6 IP S VLAN…………………….100 UBNET BASED 5-7 GVRP…………………………102 5-8 P VLAN……………………….104 RIVATE 5-9 P ……………………….106 SOLATION 5-10 V…
    • Page 7
      9-3 MVR…………………………182 9-3.1 Basic Configuration……………………182 9-3.2 Statistics……………………….185 9-3.3 Groups Information……………………187 9-3.4 SFM Information……………………..189 9-4 M ……………………191 ULTICAST ILTERING ROFILE 9-4.1 Filtering Profile Table……………………191 9-4.2 Filtering Address Entry……………………194 CHAPTER 10 DHCP……………………..196 10-1 S ……………………….196 NOOPING 10-1.1 Configuration……………………..196 10-1.2 Snooping Table……………………..198 10-1.3 Detailed Statistics…………………….200 10-2 R …………………………202…
    • Page 8
      13-2 SNMP 3…………………………279 13-2.1 Communities……………………..279 13-2.2 Users…………………………281 13-2.3 Groups……………………….283 13-2.4 Views…………………………285 13-2.5 Access………………………..287 13-3 S ………………………..289 TATISTICS 13-3.1 Configuration……………………..289 13-3.2 Status………………………..291 13-4 H …………………………294 ISTORY 13-4.1 Configuration……………………..294 13-4.2 Status………………………..296 13-5 A …………………………298 LARM 13-5.1 Configuration……………………..298 13-5.2 Status………………………..301 13-6 E …………………………303 VENT 13-6.1 Configuration……………………..303 13-6.2 Status………………………..305…
    • Page 9
      19-4.2 Firmware Selection……………………350…
    • Page 10: Revision History

      Revision History…

    • Page 11: Introduction

      Cross-8/HPoE-10G L2+ Managed GbE PoE+ Switch provide 10 ports in a single device; the specification is highlighted as follows.

    • Page 12
      Overview of this User Guide Chapter 1 “Operation of Web-based Management”  Chapter 2 “System”  Chapter 3 “Port Management”  Chapter 4 “PoE Management”  Chapter 5 “VLAN Management”  Chapter 6 “Quality of Service”  Chapter 7 “Spanning tree” …
    • Page 13: Chapter 1 Operation Of Web-Based Management

      MIBs status, each port activity, Spanning tree status, port aggregation status, multicast traffic, VLAN and priority status, even illegal access record and so on. he default values of the Cross-8/HPoE-10G are listed in the table below: IP Address 192.168.1.1 Subnet Mask 255.255.255.0…

    • Page 14
      AS Cross-8/HPoE-10G the function enable dhcp, so If you do not have DHCP server to provide ip addresses to the switch, the Switch default ip 192.168.1.1 Figure 1: The login page…
    • Page 15: Chapter 2 System

      Chapter 2 System This chapter describes the entire basic configuration tasks which includes the System Information and any manage of the Switch (e.g. Time, Account, IP, Syslog and NTP.) System Information You can identify the system by configuring system name, location and the contact of the switch.

    • Page 16
      Contact :  The system contact configured in Configuration | System | Information | System Contact. System name :  Displays the user-defined system name that configured in System | System Information | Configuration | System Name. System Date : …
    • Page 17
      Click to refresh the page immediately. Figure 2-1: The System Information buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.
    • Page 18: Ip Address

      2-2 IP Address 2-2.1 Settings The IPv4 address for the switch could be obtained via DHCP Server for VLAN 1. To manually configure an address, you need to change the switch’s default settings to values that are compatible with your network. You may also need to establish a default gateway between the switch and management stations that exist on another network segment.

    • Page 19: 2-2.2 Advanced Settings

      Gateway :  The IP address of the IP gateway. Valid format is dotted decimal notationor a valid IPv6 notation. Gateway and Network must be of the same type.  Server : This setting controls the DNS name resolution done by the switch. There are four servers available for configuration, and the index of the server presents the preference (less index has higher priority) in doing DNS name resolution.

    • Page 20
      Web Interface To configure an Advanced Settings in the web interface: Click System, IP Address and Advanced Settings. Click Add Interface then you can create new Interface on the switch. Click Add Route then you can create new Route on the switch. Click Apply.
    • Page 21
      DNS service. From any DHCPv4 interfaces  The first DNS server offered from a DHCPv4 lease to a DHCPv4-enabled interface will be used. From this DHCPv4 interface  Specify from which DHCPv4-enabled interface a provided DNS server should be preferred. From any DHCPv6 interfaces …
    • Page 22
      Enable the DHCPv6 client by checking this box. If this option is enabled, the system will configure the IPv6 address of the interface using the DHCPv6 protocol. DHCPv6 Rapid Commit  Enable the DHCPv6 Rapid-Commit option by checking this box. If this option is enabled, the DHCPv6 client terminates the waiting process as soon as a Reply message with a Rapid Commit option is received.
    • Page 23: 2-2.3 Status

      Add Route :  Click to add a new IP route. A maximum of 128 routes is supported. Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values. 2-2.3 Status 2-2.3.1 IP Status This page displays the status of the IP protocol layer.

    • Page 24
      IP Routes Network :  Show the destination IP network or host address of this route. Gateway :  Show the gateway address of this route. Status :  Show the status flags of the route. Neighbour cache IP Address : …
    • Page 25
      2-2.3.2 Routing Info Base Each page shows up to 999 table entries, selected through the «entries per page» input field. When first visited, the web page will show the beginning entries of this table. Web Interface To display the log configuration in the web interface: Click System, IP Addres, Status and Routing Info Base.
    • Page 26
      The time till the route is created. The unit is second. State  Indicate if the destination network is reachable or not. Buttons Figure 2-2.3.1: The IP Status buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every seconds.
    • Page 27: System Time

      2-3 System Time The switch provides manual and automatic ways to set the system time via NTP. Manual setting is simple and you just input “Year”, “Month”, “Day”, “Hour” and “Minute” within the valid value range indicated in each item. Web Interface To configure Time in the web interface: 1.

    • Page 28
      Lists various Time Zones worldwide. Select appropriate Time Zone from the drop down and click Apply to set. Acronym :  User can set the acronym of the time zone. This is a User configurable acronym to identify the time zone. (Range: Up to 16 characters) Daylight Saving Time Configuration Daylight Saving Time : …
    • Page 29
      Figure 2-3: The SNTP configuration NTP is Network Time Protocol and is used to sync the network time based Greenwich Mean Time (GMT). If use the NTP mode and select a built-in NTP time server or manually specify an user-defined NTP server as well as Time Zone, the switch will sync the time in a short after pressing <Apply>…
    • Page 30: Lldp

      2-4 LLDP The switch supports the LLDP. For current information on your switch model, The Link Layer Discovery Protocol (LLDP) provides a standards-based method for enabling switches to advertise themselves to adjacent devices and to learn about adjacent LLDP devices. The Link Layer Discovery Protocol (LLDP) is a vendor-neutral Link Layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on a IEEE 802 local area network, principally wired Ethernet.

    • Page 31
      discovery information up-to-date. The interval between each LLDP frame is determined by the Tx Interval value. Valid values are restricted to 5 — 32768 seconds. Tx Hold :  Each LLDP frame contains information about how long the information in the LLDP frame shall be considered valid.
    • Page 32: 2-4.2 Lldp-Med Configuration

      capabilities that are not part of the LLDP. These capabilities are shown as «others» in the LLDP neighbors’ table. If all ports have CDP awareness disabled the switch forwards CDP frames received from neighbor devices. If at least one port has CDP awareness enabled all CDP frames are terminated by the switch.

    • Page 33
      This page allows you to configure the LLDP-MED. This function applies to VoIP devices which support LLDP-MED. Web Interface To configure LLDP-MED: Click System, LLDP and LLDP-MED Configuration. Modify Fast start repeat count parameter, default is 4. Modify Transmit TLVs parameters. Modify Coordinates Location parameters.
    • Page 34
      Figure 2-4.2: The LLDP-MED Configuration Parameter description : Fast start repeat count Rapid startup and Emergency Call Service Location Identification Discovery of endpoints is a critically important aspect of VoIP systems in general. In addition, it is best to advertise only those pieces of information which are specifically relevant to particular endpoint types (for example only advertise the voice network policy to permitted voice-capable devices), both in order to conserve the limited LLDPU space and to reduce security and system integrity issues…
    • Page 35
      The interface name to which the configuration applies. Capabilities :  When checked the switch’s capabilities is included in LLDP-MEDinformation transmitted. Policies :  When checked the configured policies for the interface is included in LLDP- information transmitted. Location : …
    • Page 36
      It is possible to select between two altitude types (floors or meters). Meters: Representing meters of Altitude defined by the vertical datum specified. Floors: Representing altitude in a form more relevant in buildings which have different floor-to-floor dimensions. An altitude = 0.0 is meaningful even outside a building, and represents ground level at the given latitude and longitude.
    • Page 37
      House number suffix — Example: A, 1/2. Landmark :  Landmark or vanity address — Example: Columbia University. Additional location info :  Additional location info — Example: South Wing. Name :  Name (residence and office occupant) — Example: Flemming Jahn. Zip code : …
    • Page 38
      1. Layer 2 VLAN ID (IEEE 802.1Q-2003) 2. Layer 2 priority value (IEEE 802.1D-2004) 3. Layer 3 Diffserv code point (DSCP) value (IETF RFC 2474) This network policy is potentially advertised and associated with multiple sets of application types supported on a given port. The application types specifically addressed are: 1.
    • Page 39: 2-4.3 Lldp Neighbour

      6. Video Conferencing — for use by dedicated Video Conferencing equipment and other similar appliances supporting real-time interactive video/audio services. 7. Streaming Video — for use by broadcast or multicast based video content distribution and other similar applications supporting streaming video services that require specific network policy treatment.

    • Page 40
      To show LLDP neighbours: 1. Click System, LLDP and LLDP Neighbour. 2. Click Refresh for manual update web screen. 3. Click Auto-refresh for auto-update web screen. Figure 2-4.3: The LLDP Neighbour information If there is no device that supports LLDP in your network then the table will show “No LLDP neighbour information found”.
    • Page 41: 2-4.4 Lldp-Med Neighbour

      Displays the system description. Management Address :  Management Address is the neighbour unit’s address that is used for higher layer entities to assist discovery by the network management. This could for instance hold the neighbour’s IP address. Buttons Figure 2-4.3: The LLDP Neighbor buttons Auto-refresh : …

    • Page 42
      Devices and Endpoint Devices. LLDP-MED Network Connectivity Device Definition  LLDP-MED Network Connectivity Devices, as defined in TIA-1057, provide access to the IEEE 802 based LAN infrastructure for LLDP-MED Endpoint Devices. An LLDP-MED Network Connectivity Device is a LAN access device based on any of the following technologies: 1.
    • Page 43
      Discovery services defined in this class include provision of location identifier (including ECS / E911 information), embedded L2 switch support, inventory management. LLDP-MED Capabilities :  LLDP-MED Capabilities describes the neighborhood unit’s LLDP-MED capabilities. The possible capabilities are: 1. LLDP-MED capabilities 2.
    • Page 44: 2-4.5 Lldp Neighbour Poe

      Untagged: The device is using an untagged frame format and as such does not include a tag header as defined by IEEE 802.1Q-2003. Tagged: The device is using the IEEE 802.1Q tagged frame format. VLAN ID :  VLAN ID is the VLAN identifier (VID) for the port as defined in IEEE 802.1Q-2003. A value of 1 through 4094 is used to define a valid VLAN ID.

    • Page 45
      Click Refresh for manual update web screen. Click Auto-refresh for auto-update web screen. Figure 2-4.5: The LLDP Neighbour PoE information Parameter description Local Port :  The interface for this switch on which the LLDP frame was received. Power Type : …
    • Page 46: 2-4.6 Lldp Neighbour Eee

      Click to refresh the page immediately. 2-4.6 LLDP Neighbour EEE By using power savings can be achieved at the expense of traffic latency. This latency occurs due to that the circuits turn off to save power, need time to boot up before sending traffic over the link.

    • Page 47: 2-4.7 Lldp Statistics

      remote link partners respective values. When a local link partner receives its echoed values from the remote link partner it can determine whether or not the remote link partner has received, registered and processed its most recent values. For example, if the local link partner receives echoed parameters that do not match the values in its local MIB, then the local link partner infers that the remote link partners request was based on stale information.

    • Page 48
      Figure 2-4.7: The LLDP Statistics information Parameter description: Global Counters Neighbour entries were last changed at :  It also shows the time when the last entry was last deleted or added. It also shows the time elapsed since the last change was detected. Total Neighbours Entries Added : …
    • Page 49
      table when a given port’s link is down, an LLDP shutdown frame is received, or when the entry ages out. TLVs Discarded :  Each LLDP frame can contain multiple pieces of information, known as TLVs (TLV is short for «Type Length Value»).
    • Page 50: Upnp

      2-5 UPnP UPnP is an acronym for Universal Plug and Play. The goals of UPnP are to allow devices to connect seamlessly and to simplify the implementation of networks in the home (data sharing, communications, and entertainment) and in corporate environments for simplified installation of computer components Web Interface To configure the UPnP Configuration in the web interface:…

    • Page 51: Chapter 3 Port Management

      no longer exists. Due to the unreliable nature of UDP, in the standard it is recommended that such refreshing of advertisements to be done at less than one-half of the advertising duration. In the implementation, the switch sends SSDP messages periodically at the interval one-half of the advertising duration minus 30 seconds.

    • Page 52
      Figure 3-1: The Port Configuration Parameter description: Port :  This is the logical port number for this row. Description :  Enter up to 63 characters to be descriptive name for identifies this port. Link :  The current link state is displayed graphically. Green indicates the link is up and red that it is down.
    • Page 53
      You can click them for refresh the Port link Status by manual Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
    • Page 54: Port Statistics

      3-2 Port Statistics The section describes to the Port statistics information and provides overview of general traffic statistics for all switch ports. Web Interface To Display the Port Statistics Overview in the web interface: 1. Click Port Management and Port Statistics. 2.

    • Page 55
      Figure 3-2: The Port Statistics Overview buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page. Clear :  Clears the counters for all ports. If you want to see the detail of port statistic then you need to click that port .
    • Page 56
      Figure 3-2: The Detailed Port Statistics Parameter description: Upper left scroll bar:  To scroll which port to display the Port statistics with “Port-1”, “Port-2”, … Receive Total and Transmit Total Rx and Tx Packets :  The number of received and transmitted (good and bad) packets. Rx and Tx Octets : …
    • Page 57
      The number of long 2 frames received with valid CRC. Rx Fragments :  The number of short 1 frames received with invalid CRC. Rx Jabber :  The number of long 2 frames received with invalid CRC. . Transmit Error Counters Tx Drops : …
    • Page 58: Sfp Port Info

      3-3 SFP Port Info The section describes that switch could display the SFP module detail information which you connect it to the switch. The information includes: Connector type, Fiber type, wavelength, bit rate and Vendor OUI etc. Web Interface To Display the SFP information in the web interface: 1.

    • Page 59
      Vendor P/N:  Display the product name of the naming by module manufacturer. Vendor Rev (Revision):  Display the module revision. Vendor SN (Serial Number):  Show the serial number assigned by the manufacturer. Date Code:  Show the date this SFP module was made. Temperature: …
    • Page 60: Energy Efficient Ethernet

      3-4 Energy Efficient Ethernet is an abbreviation for Energy Efficient Ethernet defined in IEEE 802.3az. This page allows the user to inspect and configure the current port settings. is a power saving option that reduces the power usage when there is very low traffic utilization (or no traffic).

    • Page 61: Link Aggregation

      3-5 Link Aggregation 3-5.1 Static Configuration This page is used to configure the Aggregation hash mode and the aggregation group. Web Interface To configure the Aggregation hash mode and the aggregation group in the web interface: Click Port Management, Link Aggregation and Static Configuration. Evoke to enable or disable the aggregation mode function.

    • Page 62: 3-5.2 Lacp Configuration

       TCP/UDP Port Number : The TCP/UDP port number can be used to calculate the destination port for the frame. Check to enable the use of the TCP/UDP Port Number, or uncheck to disable. By default, TCP/UDP Port Number is enabled. Aggregation Group Configuration Group ID : …

    • Page 63: 3-5.3 System Status

      Parameter description: Port :  The switch port number. LACP Enabled :  Controls whether LACP is enabled on this switch port. LACP will form an aggregation when 2 or more ports are connected to the same partner. Key : …

    • Page 64: 3-5.4 Internal Status

      Figure 3-5.3: The LACP System Status Parameter description: Aggr ID :  The Aggregation ID associated with this aggregation instance. For LLAG the id is shown as ‘isid: aggr-id’ and for GLAGs as ‘aggr-id’ Partner System ID :  The system ID (MAC address) of the aggregation partner. Partner Key : …

    • Page 65
      Figure 3-5.4: The LACP Internal Status Parameter description: Port :  The switch port number. State :  The current port state: Down: The port is not active. Active: The port is in active state. Standby: The port is in standby state. Key : …
    • Page 66: 3-5.5 Neighbor Status

      Figure 3-5.4: The LACP Internal Status buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page. 3-5.5 Neighbor Status This page provides a status overview for the LACPneighbor status for all ports. Only ports that are part of an LACP group are shown.

    • Page 67: 3-5.6 Port Status

      The timeout mode configured for the port (Fast or Slow). Aggregation :  Show whether the system considers this link to be «aggregateable»; i.e., a potential candidate for aggregation. Synchronization :  Show whether the system considers this link to be «IN_SYNC»; i.e., it has been allocated to the correct LAG, the group has been associated with a compatible Aggregator, and the identity of the LAG is consistent with the System ID and operational Key information transmitted.

    • Page 68: Loop Protection

      Figure 3-5.6: The LACP Status Parameter description: Port :  The switch port number. LACP :  ‘Yes’ means that LACP is enabled and the port link is up. ‘No’ means that LACP is not enabled or that the port link is down. ‘Backup’ means that the port could not join the aggregation group but will join if other port leaves.

    • Page 69
      Web Interface To configure the Loop Protection parameters in the web interface: 1. Click Port Management, Loop Protection and Configuration. 2. Evoke to select enable or disable the port loop Protection. 3. Click the apply to save the setting. 4. If you want to cancel the setting then you need to click the Reset button. It will revert to previously saved values.
    • Page 70
      Controls whether the port is actively generating loop protection PDU’s, or whether it is just passively looking for looped PDU’s. Buttons Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
    • Page 71: 3-6.2 Status

      3-6.2 Status This section displays the loop protection port status the ports of the currently selected switch. Web Interface To display the Loop Protection status in the web interface: 1. Click Port Management, Loop Protection and Status. 2. If you want to auto-refresh the information then you need to evoke the “Auto refresh”. 3.

    • Page 72: Udld

      Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page immediately. 3-7 UDLD 3-7.1 UDLD Configuration This page allows the user to inspect the current UDLD configurations, and possibly change them as well.

    • Page 73
      seconds(Default value is 7 seconds)(Currently default time interval is supported, due to lack of detailed information in RFC 5171). Buttons Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
    • Page 74: 3-7.2 Udld Status

      3-7.2 UDLD Status This page displays the UDLD status of the ports Web Interface To display the Loop Protection status in the web interface: Click Port Management, UDLD and UDLD Status. Select port that you want to display the UDLD Status. If you want to auto-refresh the information then you need to evoke the “Auto refresh”.

    • Page 75
      The current link status of neighbour port. Device Name :  Name of the Neighbour Device. Buttons Figure 3-7.2: UDLD Status buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh : …
    • Page 76: Chapter 4 Poe Management

      Chapter 4 PoE Management PoE is an acronym for Power over Ethernet. Power over Ethernet is used to transmit electrical power, to remote devices over standard Ethernet cable. It could for example be used for powering IP telephones, wireless LAN access points and other equipment, where it would be difficult or expensive to connect the equipment to main power supply.

    • Page 77
      Parameter description: Power Over Ethernet Configuration Reserved Power determined by :  There are three modes for configuring how the ports/PDs may reserve power. 1. Allocated mode: In this mode the user allocates the amount of power that each port may reserve.
    • Page 78
      starting from the port with the highest port number. Maximum Power [W] :  The Maximum Power value contains a numerical value that indicates the maximum power in watts that can be delivered to a remote device. The maximum allowed value is 30 W. Delay Mode : …
    • Page 79: Poe Status

      4-2 PoE Status This page allows the user to inspect the current status for all PoE ports. Web Interface To Display PoE Status in the web interface: Click PoE Management and PoE Status Scroll “Auto-refresh” to on/off. Click “Refresh” to refresh the port detailed statistics. Figure 4-2: The PoE Status Parameter description: Local Port :…

    • Page 80
      Current Used :  The Power Used shows how much current the PD currently is using. Priority :  The Priority shows the port’s priority configured by the user. Port Status :  The Port Status shows the port’s status. The status can be one of the following values: PoE not available — No PoE chip found — PoE not supported for the port.
    • Page 81: Poe Power Delay

      4-3 PoE Power Delay This page allows the user to setting the delay time of power providing after device rebooted. Web Interface To Display Power over Ethernet Status in the web interface: Click PoE Management and PoE Power delay. Enable the port to the power device. Specify the power providing delay time when reboot.

    • Page 82: Poe Auto Checking

      4-4 PoE Auto Checking This page allows the user to specify the auto detection parameters to check the linking status between PoE ports and PDs. When it detected the fail connect, will reboot remote PD automatically. Web Interface To configue Power over Ethernet Auto Checking in the web interface: 1.

    • Page 83
      it will trigger failure action. Default: 3, range: 1-5. Failure Log :  Failure loggings counter. Failure Action :  The action when the third fail detection. Nothing : Keep Ping the remote PD but does nothing further. Reboot : Cut off the power of the PoE port, make PD rebooted. Reboot time(sec) : …
    • Page 84: Poe Scheduleing Profile

      4-5 PoE Scheduleing Profile This page allows user to define the profile for scheduling. Web Interface To configure PoE Schedule Profile in the web interface: 1. Click PoE Management and PoE Scheduling Profile. 2. Select profile number and specify the profile name. 3.

    • Page 85
      Reset :  Click to undo any changes made locally and revert to previously saved values.
    • Page 86: Chapter 5 Vlan Management

      Chapter 5 VLAN Management 5-1 VLAN Configuration To assign a specific VLAN for management purpose. The management VLAN is used to establish an IP connection to the switch from a workstation connected to a port in the VLAN. This connection supports a VSM, SNMP, and Telnet session. By default, the active management VLAN is VLAN 1, but you can designate any VLAN as the management VLAN using the Management VLAN window.

    • Page 87
      Allowed Access VLANs :  This field shows the VLANs that are created on the switch. By default, only VLAN 1 exists. More VLANs may be created by using a list syntax where the individual elements are separated by commas. Ranges are specified with a dash separating the lower and upper bound.
    • Page 88
      Port VLAN :  Determines the port’s VLAN ID (a.k.a. PVID). Allowed VLANs are in the range 1 through 4095, default being On ingress, frames get classified to the Port VLAN if the port is configured as VLAN unaware, the frame is untagged, or VLAN awareness is enabled on the port, but the frame priority tagged (VLAN…
    • Page 89
      Untagged Only Only untagged frames are accepted on ingress. Tagged frames are discarded. Egress Tagging :  Ports in Trunk and Hybrid mode may control the tagging of frames on egress. Untag Port VLAN Frames classified to the Port VLAN are transmitted untagged. Other frames are transmitted with relevant tag.
    • Page 90: Vlan Membership

      5-2 VLAN Membership This page provides an overview of membership status of VLAN users. The ports belong to the currently selected stack unit, as reflected by the page header. Web Interface To configure VLAN membership configuration in the web interface: 1.

    • Page 91
      VCL : Shows MAC-based VLAN entries configured by various MAC-based VLAN users. VLAN ID :  VLAN ID for which the Port members are displayed. Port Members :  check boxes each port displayed each VLAN If a port is included in a VLAN, an image will be displayed.
    • Page 92: Vlan Port Status

      5-3 VLAN Port Status The function Port Status gathers the information of all VLAN status and reports it by the order of Combined, Admin, NAS, GVRP, MVR, Voice VLAN, MSTP, DMS, VCL. Web Interface To Display VLAN Port Status in the web interface: 1.

    • Page 93
      Shows the Port Type. Port type can be any of Unaware, C-port, S-port, Custom S-port. If Port Type is Unaware, all frames are classified to the Port VLAN ID and tags are not removed. C-port is Customer Port. S-port is Service port. Custom S-port is S-port with Custom TPID.
    • Page 94: Mac-Based Vlan

      5-4 MAC-based VLAN 5-4.1 Configuration The MAC address to VLAN ID mappings can be configured here. This page allows adding and deleting MAC-based VLAN Classification List entries and assigning the entries to different ports. Web Interface To configure MAC address-based VLAN configuration in the web interface: 1.

    • Page 95
      Click to add a new MAC-based VLAN entry. An empty row is added to the table, and the MAC-based VLAN entry can be configured as needed. Any unicast MAC address can be configured for the MAC-based VLAN entry. No broadcast or multicast MAC addresses are allowed.
    • Page 96: 5-4.2 Status

      5-4.2 Status Show the MAC-based VLAN status. Web Interface To Display MAC-based address VLAN configuration in the web interface: Click VLAN Management, MAC-based VLAN and Status. If you want to auto-refresh the information then you need to evoke the “Auto-refresh”. Click “Refresh”…

    • Page 97: Protocol-Based Vlan

      5-5 Protocol-based VLAN This section describe Protocol -based VLAN, The Switch support Protocol include Ethernet LLC SNAP Protocol, The Logical Link Control (LLC) data communication protocol layer is the upper sub-layer of Data Link Layer (which is itself layer 2, just above the Physical Layer) in the seven-layer OSI reference model.

    • Page 98
      Figure 5-5.1: The Protocol to Group Mapping Table Parameter description: Frame Type :  Frame Type can have one of the following values: Ethernet SNAP On changing the Frame type field, valid value of the following text field will vary depending on the new frame type you selected. Value : …
    • Page 99: 5-5.2 Group To Vlan

      to the protocol running on top of SNAP. Group Name :  A valid Group Name is a unique 16-character long string. Buttons Delete :  To delete a Protocol to Group Name map entry, check this box. The entry will be deleted on the switch during the next Save.

    • Page 100
      Figure 5-5.2: The Group Name of VLAN Mapping Table Parameter description: Group Name :  A valid Group Name is a string of almost 16 characters. VLAN ID :  Indicates the ID to which Group Name will be mapped. A valid VLAN ID ranges from 1- 4095.
    • Page 101: Ip Subnet-Based Vlan

      5-6 IP Subnet-based VLAN The IP subnet-based VLAN entries can be configured here. This page allows for adding, updating and deleting IP subnet-based VLAN entries. Web Interface To configure IP subnet-based VLAN Membership to configured in the web interface: 1. Click VLAN Management and IP Subnet-based VLAN. 2.

    • Page 102
      Add New Entry :  Click “Add New Entry” to add a new IP subnet-based VLAN entry. An empty row is added to the table, and the IP subnet-based VLAN entry can be configured as needed. Any IP address/mask can be configured for the IP subnet-based VLAN entry. Legal values for a VLAN ID are 1 through 4095.
    • Page 103: Gvrp

      5-7 GVRP The Generic Attribute Registration Protocol (GARP) provides a generic framework whereby devices in a bridged LAN, e.g. end stations and switches, can register and de-register attribute values, such as VLAN Identifiers, with each other. In doing so, the attributes are propagated to devices in the bridged LAN, and these devices form a ¡°reachability¡±…

    • Page 104
      The GVRP feature is enabled by setting the check mark in the checkbox named Enable GVRP. GVRP protocol timers :  Join-time is a value in the range 1-20 in the units of centi seconds, i.e. in units of one hundredth of a second.
    • Page 105: Private Vlan

      5-8 Private VLAN Private VLAN membership configurations for the switch can be monitored and modified here. Private VLANs can be added or deleted here. Port members of each Private VLAN can be added or removed here. Private VLANs are based on the source port mask, and there are no connections to VLANs. This means that VLAN IDs and Private VLAN IDs can be identical.

    • Page 106
      The Private VLAN is enabled when you click «Apply». The button can be used to undo the addition of new Private VLANs. Buttons Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
    • Page 107: Port Isolation

      5-9 Port Isolation Port Isolation provides for an apparatus and method to isolate ports on layer 2 switches on the same VLAN to restrict traffic flow. The apparatus comprises a switch having said plurality of ports, each port configured as a protected port or a non-protected port. An address table memory stores an address table having a destination address and port number pair.

    • Page 108: Voice Vlan

      5-10 Voice VLAN Voice VLAN is VLAN configured specially for voice traffic. By adding the ports with voice devices attached to voice VLAN, we can perform QoS-related configuration for voice data, ensuring the transmission priority of voice traffic and voice quality. 5-10.1 Configuration The Voice VLAN feature enables voice traffic forwarding on the Voice VLAN, then the switch can classify and schedule network traffic.

    • Page 109
      VLAN ID :  Indicates the Voice VLAN ID. It should be a unique VLAN ID in the system and cannot equal each port PVID. It is a conflict in configuration if the value equals management VID, MVR VID, PVID etc. The allowed range is 1 to 4095. Aging Time : …
    • Page 110: 5-10.2 Oui

      5-10.2 OUI The section describes to Configure VOICE VLAN OUI table. The maximum entry number is 16. Modifying the OUI table will restart auto detection of OUI process. Web Interface To configure Voice VLAN OUI Table in the web interface: 1.

    • Page 111
      Click to undo any changes made locally and revert to previously saved values.
    • Page 112: Chapter 6 Quality Of Service

      Chapter 6 Quality of Service The switch support four QoS queues per port with strict or weighted fair queuing scheduling. It supports QoS Control Lists (QCL) for advance programmable QoS classification, based on IEEE 802.1p, Ethertype, VID, IPv4/IPv6 DSCP and UDP/TCP ports and ranges. High flexibility in the classification of incoming frames to a QoS class.

    • Page 113
      Parameter description: Port :  The port number for which the configuration below applies. Queue Priority :  Controls the default value. All frames are classified to a CoS. There is a one to one mapping between CoS, queue and priority.
    • Page 114
      Enabled: Use mapped versions of for tagged frames. Click on the mode in order to configure the mode and/or mapping. Note: This setting has no effect if the port is VLAN unaware. Tagged frames received on VLAN unaware ports are always classified to the default CoS and DPL.
    • Page 115: Port Policers

      6-2 Port Policers This section provides an overview of QoS Ingress Port Policers for all switch ports The Port Policing is useful in constraining traffic flows and marking frames above specific rates. Policing is primarily useful for data flows and voice or video flows because voice and video usually maintains a steady rate of traffic Web Interface To configure the QoS Port Policers in the web interface:…

    • Page 116
      Click to undo any changes made locally and revert to previously saved values.
    • Page 117: Port Shapers

      6-3 Port Shapers This section provides an overview of QoS Egress Port Shapers for all switch ports. Others the user could get all detail information of the ports belong to the currently selected stack unit, as reflected by the page header. Web Interface To configure the QoS Port Shapers in the web interface: 1.

    • Page 118
      Queue Shaper Enable :  Controls whether the queue shaper is enabled for this queue on this switch port. Queue Shaper Rate :  Controls the rate for the queue shaper. This value is restricted to 100-13107100 when «Unit» is kbps, and 1-13107 when «Unit» is Mbps.The rate is internally rounded up to the nearest value supported by the queue shaper.
    • Page 119: Storm Control

      6-4 Storm Control The section allows user to configure the Storm control for the switch. There is a destination lookup failure storm rate control, multicast storm rate control, and a broadcast storm rate control. These only affect flooded frames, i.e. frames with a (VLAN ID, DMAC) pair not present on the MAC Address table.

    • Page 120
      Rate :  Controls the rate for the global storm policer. This value is restricted to 10-13128147 when «Unit» is fps or kbps, and 1-13128 when «Unit» is kfps or Mbps. The rate is internally rounded up to the nearest value supported by the global storm policer. Supported rates are divisible by 10 fps or 25 kbps.
    • Page 121: Port Scheduler

      6-5 Port Scheduler This section provides an overview of QoS Egress Port Scheduler for all switch ports. and the ports belong to the currently selected stack unit, as reflected by the page header. Web Interface To configure the QoS Port Schedulers in the web interface: 1.

    • Page 122
      Controls the unit of measure for the queue shaper rate as kbps or Mbps. Queue Shaper Rate-type  rate type queue shaper. allowed values are: Line: Specify that this shaper operates line rate. Data: Specify that this shaper operates on data rate. Queue Scheduler Weight …
    • Page 123: Port Pcp Remarking

      6-6 Port PCP Remarking The Section provides user to get an overview of QoS Egress Port PCP Remarking for all switch ports. Others the ports belong to the currently selected stack unit, as reflected by the page header. . Web Interface To configure the QoS Port PCP Remarking in the web interface: Click Quality of Service and Port PCP Remarking.

    • Page 124
      Figure 6-6: The Port PCP Remarking Parameter description: Port :  logical port settings contained same row. Click on the port number in order to configure PCP remarking. Mode :  Shows remarking mode this port. Keep: classified PCP/DEI values. Specific: default PCP/DEI…
    • Page 125: Dscp

      6-7 DSCP 6-7.1 Port DSCP The section will teach user to set the QoS Port DSCP configuration that was allowed you to configure the basic QoS Port DSCP Configuration settings for all switch ports. Others the settings relate to the currently selected stack unit, as reflected by the page header. Web Interface To configure the QoS Port DSCP parameters in the web interface: Click Quality of Service, DSCP and Port DSCP.

    • Page 126: 6-7.2 Dscp Translation

      Port Egress Rewriting can be one of below parameters Disable: No Egress rewrite. Enable: Rewrite enable without remapped. Remap: DSCP from analyzer is remapped and frame is remarked with remapped DSCP value. Buttons Apply :  Click to save changes. Reset : …

    • Page 127: 6-7.3 Dscp Classification

      Ingress :  Ingress side DSCP can be first translated to new DSCP before using the DSCP for QoS class and DPL map. There are two configuration parameters for DSCP Translation – Translate: DSCP at Ingress side can be translated to any of (0-63) DSCP values. Classify: Click to enable Classification at Ingress side.

    • Page 128: 6-7.4 Dscp-Based Qos

      Parameter description: Queue Priority :  Actual Class of Service. DSCP DP0 :  Select the classified DSCP value (0-63) for Drop Precedence Level 0. DSCP DP1 :  Select the classified DSCP value (0-63) for Drop Precedence Level 1. DSCP DP2 : …

    • Page 129
      Figure 6-7.4: The DSCP-Based QoS Ingress Classification Configuration Parameter description: DSCP :  Maximum number of support ed DSCP values are 64. Trust :  Click to check if the DSCP value is trusted. Queue Priority :  Queue Priority value can be any between 0 and 7. 7 is the highest. DPL : …
    • Page 130: Qos Control List

      6-8 QoS Control List 6-8.1 Configuration The section shows the QoS Control List (QCL), which is made up of the QCEs. Each row describes a QCE that is defined. The maximum number of QCEs is 256 on each switch. Click on the lowest plus sign to add a new QCE to the list.

    • Page 131
      Figure 6-8.1: The QoS Control List Configuration Parameter description: QCE :  Indicates the index of QCE. Port :  Indicates the list of ports configured with the QCE. DMAC :  Indicates the destination MAC address. Possible values are: Any: Match any DMAC.
    • Page 132
      Drop Eligible Indicator: Valid value of DEI are 0, 1 or ‘Any’. Frame Type :  Indicates the type of frame to look for incoming frames. Possible frame types are: Any: The QCE will match all frame type. Ethernet: Only Ethernet frames (with Ether Type 0x600-0xFFFF) are allowed. LLC: Only (LLC) frames are allowed.
    • Page 133
      enter either specific value range VIDs. Inner PCP Valid value of Inner PCP are specific (0, 1, 2, 3, 4, 5, 6, 7) or range (0-1, 2-3, 4-5, 6-7, 0-3, 4-7) ‘Any’. Inner DEI Valid value Inner ‘0’, ‘Any’. Frame Type Frame Type can have any of the following values: EtherType SNAP IPv4…
    • Page 134: 6-8.2 Status

      Action Parameters :  Class Service: (0-7) ‘Default’. Drop Precedence Level: (0-3) ‘Default’. DSCP DSCP: (0-63, CS1-CS7, AF11-AF43) ‘Default’. PCP PCP: (0-7) or ‘Default’. Note: PCP and DEI cannot be set individually. DEI DEI: (0-1) ‘Default’. Policy ACL Policy number: (0-127) or ‘Default’ (empty field). ‘Default’ means that the default classified value is not modified by this QCE.

    • Page 135: Qos Statistics

      Indicates the index of QCE. Port :  Indicates the list of ports configured with the QCE. Frame Type :  Indicates type frame. Possible values are: Any: Match frame type. Ethernet: Match EtherType frames. LLC: Match (LLC) frames. SNAP: Match (SNAP) frames.

    • Page 136: Wred

      Web Interface To Display the Queuing Counters in the web interface: Click Quality of Service and QoS Statistics If you want to auto-refresh the information then you need to evoke the “Auto-refresh”. Click “Refresh” to refresh the Queuing Counters or clear all information when you click “Clear”.

    • Page 137
      To configure and display the Random Early Detection in the web interface: Click Quality of Service and WRED. Scroll all parameters and evoke the Weighted Random Early Detection Configuration. Click the apply to save the setting. If you want to cancel the setting then you need to click the Reset button. It will revert to previously saved values.
    • Page 138
      Min is the fill level where the queue randomly start dropping frames marked with Drop Precedence Level > (yellow frames). If Max Unit is ‘Drop Probability’ (the green line), Max controls the drop probability when the fill level just below 100%.
    • Page 139: Chapter 7 Spanning Tree

      Chapter 7 Spanning tree The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices (that is, an STP-compliant switch, bridge or router) in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.

    • Page 140
      5. If you want to cancel the setting then you need to click the Reset button. It will revert to previously saved values. Figure 7-1: The STP Configuration Parameter description: Basic Settings Protocol Version :  The MSTP / RSTP / STP protocol version setting. Valid values are STP, RSTP and MSTP. Bridge Priority : …
    • Page 141
      Max Age :  The maximum age of the information transmitted by the Bridge when it is the Root Bridge. Valid values are in the range 6 to 40 seconds, and MaxAge must be <= (FwdDelay-1)*2. Maximum Hop Count : …
    • Page 142: Msti Configuration

      7-2 MSTI Configuration When you implement a Spanning Tree protocol on the switch that the bridge instance. The CIST is not available for explicit mapping, as it will receive the VLANs not explicitly mapped. Due to the reason that you need to set the list of VLANs mapped to the MSTI. The VLANs must be separated with comma and/or space.

    • Page 143
      The name identifying the VLAN to MSTI mapping. Bridges must share the name and revision (see below), as well as the VLAN-to-MSTI mapping configuration in order to share spanning trees for MSTI’s (Intra-region). The name is at most 32 characters. Configuration Revision : …
    • Page 144
      Figure 7-2: The STP CIST Port Configuration Parameter description: Port :  The switch port number of the logical STP port. STP Enabled :  Controls whether STP is enabled on this switch port. This field will be read only if Voice VLAN feature is enabled.
    • Page 145
      If enabled, causes the port to disable itself upon receiving valid BPDU’s. Contrary to the similar bridge setting, the port Edge status does not affect this setting. A port entering error-disabled state due to this setting is subject to the bridge Port Error Recovery setting as well.
    • Page 146: Stp Status

      7-3 STP Status This page provides a status overview of all bridge instances. The displayed table contains a row for each STP bridge instance, where the column displays the following information: Web Interface To display the STP Bridges status in the web interface: Click Spanning Tree and STP Status.

    • Page 147
      The Bridge ID of the currently elected root bridge. Root Port :  The switch port currently assigned the root port role. Root Cost :  Root Path Cost. For the Root Bridge it is zero. For all other Bridges, it is the sum of the Port Path Costs on the least cost path to the Root Bridge.
    • Page 148
      cost path to the Internal Root Bridge. (For the CIST instance only). Topology Flag :  The current state of the Topology Change Flag of this Bridge instance. Topology Change Count :  The number of times where the topology change flag has been set (during a one-second interval).
    • Page 149: Port Statistics

      7-4 Port Statistics This page displays the STP port statistics counters of bridge ports in the switch. Web Interface To display the STP Port Statistic in the web interface: Click Spanning Tree and Port Statistics. If you want to auto-refresh the information then you need to evoke the “Auto-refresh”. esh”…

    • Page 150
      Click to refresh the page immediately.
    • Page 151: Mac Address Tables

      Chapter 8 MAC Address Tables 8-1 Configuration Switching of frames is based upon the DMAC address contained in the frame. The switch builds up a table that maps MAC addresses to switch ports for knowing which ports the frames should go to (based upon the DMAC address in the frame).

    • Page 152
      removal is also called aging. Configure aging time by entering a value here in seconds; for example, Age time seconds. The allowed range is 10 to 1000000 seconds. Disable the automatic aging of dynamic entries by checking Disable automatic aging. MAC Table Learning : If the learning mode for a given port is greyed out, another module is in control of the mode, so that it cannot be changed by the user.
    • Page 153
      port members for the new entry. Click «Apply». Delete :  Check to delete the entry. It will be deleted during the next save. Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
    • Page 154: Information

      8-2 Information Entries in the MAC Table are shown on this page. The MAC Table contains up to 8192 entries, and is sorted first by VLAN ID, then by MAC address. Web Interface To Display MAC Address Table in the web interface: 1.

    • Page 155
      Click to refresh the page. Clear :  Click to clear the page. First Page :  Updates the system log entries, turn to the first page. Next Page :  Updates the system log entries, turn to the next page. 00-40-C7-73-01-29 : your switch MAC address (for IPv4) 33-33-00-00-00-01 : Destination MAC (for IPv6 Router Advertisement) (reference IPv6 RA.JPG)
    • Page 156: Chapter 9 Multicast

      Chapter 9 Multicast 9-1 IGMP Snooping The function, is used to establish the multicast groups to forward the multicast packet to the member ports, and, in nature, avoids wasting the bandwidth while IP multicast packets are running over the network. This is because a switch that does not support IGMP or IGMP Snooping cannot tell the multicast packet from the broadcast packet, so it can only treat them all as the broadcast packet.

    • Page 157
      Figure 9-1.1: The IGMP Snooping Configuration Parameter description: Global Configuration Snooping Enabled :  Enable the Global IGMP Snooping. Unregistered IPMCv4 Flooding enabled :  Enable unregistered IPMCv4 traffic flooding. Unregistered IPMCv4 traffic is so-called unknown multicast. After selected, the unregistered multicast stream will be forwarded like normal packets. Once you un-selected it, such stream will be discarded IGMP SSM Range : …
    • Page 158: 9-1.2 Vlan Configuration

      Profile :  Select the profile for this port. Click to preview the page which list the rules associated with the selected profile. Buttons Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values. 9-1.2 VLAN Configuration The section describes the VLAN configuration setting process integrated with IGMP Snooping function.

    • Page 159: 9-1.3 Status

      Delete :  Check to delete the entry. The designated entry will be deleted during the next save. VLAN ID :  It displays the VLAN ID of the entry. Snooping Enabled :  Enable the per-VLAN IGMP Snooping. Only up to 32 VLANs can be selected. . IGMP Querier : …

    • Page 160
      Web Interface To display the IGMP Snooping status in the web interface: 1. Click Multicast, IGMP Snooping and Status. 2. If you want to auto-refresh the information then you need to evoke the “Auto-refresh”. 3. Click “Refresh” to refresh the IGMP Snooping Status. Figure 9-1.3: The IGMP Snooping Status Parameter description: Statistic…
    • Page 161: 9-1.4 Group Information

      Router Port Display which ports act as router ports. A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or IGMP querier. Static denotes the specific port is configured to be a router port. Dynamic denotes the specific port is learnt to be a router port.

    • Page 162: 9-1.5 Igmp Sfm Information

      Figure 9-1.4: The IGMP Snooping Groups Information Parameter description: Navigating the IGMP Group Table Each page shows up to 99 entries from the IGMP Group table, default being 20, selected through the «entries per page» input field. When first visited, the web page will show the first 20 entries from the beginning of the IGMP Group Table.

    • Page 163
      Web Interface To display the IGMP SFM Information in the web interface: 1. Click Multicast, IGMP Snooping and IGMP SFM Information 2. If you want to auto-refresh the information then you need to evoke the “Auto-refresh”. 3. Click “Refresh” to refresh an entry of the IGMP Snooping Groups Information. 4.
    • Page 164
      Type :  Indicates the Type. It can be either Allow or Deny. Hardware Filter/Switch :  Indicates whether data plane destined to the specific group address from the source IPv4 address could be handled by chip or not. Buttons Figure 9-1.5: The IGMP Snooping Groups Information buttons Auto-refresh : …
    • Page 165: Mld Snooping

      9-2 MLD Snooping Curiously enough, a network node that acts as a source of IPv6 multicast traffic is only an indirect participant in MLD snooping—it just provides multicast traffic, and MLD doesn’t interact with it. (Note, however, that in an application like desktop conferencing a network node may act as both a source and an MLD host;…

    • Page 166
      7. If you want to cancel the setting then you need to click the Reset button. It will revert to previously saved values. Figure 9-2.1: The MLD Snooping Basic Configuration Parameter description : Global Configuration Snooping Enabled :  Enable the Global MLD Snooping. Unregistered IPMCv6 Flooding enabled : …
    • Page 167: 9-2.2 Vlan Configuration

      Enable to limit the number of multicast groups to which a switch port can belong. Filtering Profile :  You can select profile when you edit in Multicast Filtering Profile. Buttons Apply :  Click to save changes. Reset : …

    • Page 168: 9-2.3 Status

      Compatibility :  Compatibility is maintained by hosts and routers taking appropriate actions depending on the versions of IGMP operating on hosts and routers within a network. The allowed selection is IGMP-Auto, Forced IGMPv1, Forced IGMPv2 , default compatibility value is IGMP-Auto.

    • Page 169
      Figure 9-2.3: The MLD Snooping Status Parameter description: VLAN ID :  The VLAN ID of the entry. Querier Version :  Working Querier Version currently. Host Version :  Working Host Version currently. Querier Status :  Show the Querier status is «ACTIVE» or «IDLE». «DISABLE»…
    • Page 170: 9-2.4 Groups Information

      Buttons Figure 9-2.3: The MLD Snooping Status buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page immediately. Clear :  Clears the counters for the selected port. 9-2.4 Groups Information Entries in the MLD Group Table are shown on this page.

    • Page 171: 9-2.5 Mld Sfm Information

      The Next Page will use the last entry of the currently displayed table as a basis for the next lookup. When the end is reached the text «No more entries» is shown in the displayed table. Use the First Page button to start over. VLAN ID : …

    • Page 172
      Figure 9-2.5: The MLD SFM Information Parameter description: Navigating the MLD SFM Information Table Each page shows up to 99 entries from the MLD SFM Information table, default being 20, selected through the «entries per page» input field. When first visited, the web page will show the first 20 entries from the beginning of the MLD SFM Information Table.
    • Page 173
      Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page immediately. First Page :  Updates the system log entries, turn to the first page. Next Page : …
    • Page 174: Mvr

      9-3 MVR The MVR feature enables multicast traffic forwarding on the Multicast VLAN. In a multicast television application, a PC or a television with a set-top box can receive the multicast stream. Multiple set-top boxes or PCs can be connected to one subscriber port, which is a switch port configured as an MVR receiver port.

    • Page 175
      Be Caution: MVR source ports are not recommended to be overlapped with management VLAN ports. MVR Name :  MVR Name is an optional attribute to indicate the name of the specific MVR VLAN. Maximum length of the MVR VLAN Name string is 32. MVR VLAN Name can only contain alphabets or numbers.
    • Page 176: 9-3.2 Statistics

      indicates Inactive; S indicates Source; R indicates Receiver. The default Role is Inactive. Immediate Leave :  Enable the fast leave on the port. Buttons Add New MVR VLAN :  Click to add new mvr vlan. Specify MVR VID, MVR Name, IGMP Address, Mode, Tagging, Priority, LLQI, Interface Channel Profile.

    • Page 177: 9-3.3 Groups Information

      IGMPv2/MLDv1 Report’s Received :  The number of Received IGMPv2 Join’s and MLDv1 Report’s, respectively. IGMPv3/MLDv2 Report’s Received :  The number of Received IGMPv3 Join’s and MLDv2 Report’s, respectively. IGMPv2/MLDv1 Leave’s Received :  The number of Received IGMPv2 Leave’s and MLDv1 Done’s, respectively. Buttons Figure 9-3.2: The MVR Statistics Information buttons Auto-refresh :…

    • Page 178: 9-3.4 Sfm Information

      The «Start from VLAN», and «Group Address» input fields allow the user to select the starting point in the MVR Channels (Groups) Information Table. Clicking the Refresh button will update the displayed table starting from that or the closest next MVR Channels (Groups) Information Table match.

    • Page 179
      Figure 9-3.4: The MVR SFM Information Parameter description: Navigating the MVR SFM Information Table Each page shows up to 99 entries from the MVR SFM Information Table, default being 20, selected through the «entries per page» input field. When first visited, the web page will show the first 20 entries from the beginning of the MVR SFM Information Table.
    • Page 180
      Figure 9-3.4: The MVR SFM Information buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page immediately. First Page :  Updates the system log entries, turn to the first page. Next Page : …
    • Page 181: Multicast Filtering Profile

      9-4 Multicast Filtering Profile This page provides Multicast Filtering Profile related configurations. 9-4.1 Filtering Profile Table IPMC profile is used to deploy the access control on multicast streams. It is allowed to create at maximum 64 Profiles with at maximum 128 corresponding rules for each. Web Interface To configure the IPMC Profile Configuration in the web interface: Click Multicast, Multicast Filtering Profile and Filtering Profile Table.

    • Page 182
      Figure 9-4.1: The IPMC Profile Configuration Parameter description: Multicast Filtering Profile Mode :  Enable/Disable the Multicast Filtering Profile. System starts to do filtering based on profile settings only when the global profile mode is enabled. Profile Name :  The name used for indexing the profile table.
    • Page 183: 9-4.2 Filtering Address Entry

      Permit: Group address matches the range specified in the rule will be learned. Deny: Group address matches the range specified in the rule will be dropped. Log :  Indicates the logging preference upon receiving the Join/Report frame that has the group address matches the address range of the rule.

    • Page 184
      If you want to cancel the setting then you need to click the Reset button. It will revert to previously saved values. Click “Refresh” to refresh an entry of the MLD Snooping Group Information. Click First Entry/Next Entry to change Entry. Figure 9-4.2: The IPMC Profile Address Configuration Parameter description: Entry Name :…
    • Page 185
      Updates the table starting from the first entry in the IPMC Profile Address Configuration. Next Entry :  Updates the table, starting with the entry after the last entry currently displayed.
    • Page 186: Chapter 10 Dhcp

      Chapter 10 DHCP The section describes to configure and display the DHCP Snooping parameters of the switch. The DHCP Snooping can prevent attackers from adding their own DHCP servers to the network. 10-1 Snooping 10-1.1 Configuration DHCP Snooping is used to block intruder on the untrusted ports of the switch device when it tries to intervene by injecting a bogus DHCP reply packet to a legitimate conversation between the DHCP client and server.

    • Page 187: 10-1.2 Snooping Table

      Port Mode Configuration  Indicates the DHCP snooping port mode. Possible port modes are: Trusted: Configures the port as trusted source of the DHCP messages. Trusted port can forward DHCP packets normally. Untrusted: Configures the port as untrusted source of the DHCP messages. Untrusted port will discard the packets when it receive DHCP packets.

    • Page 188: 10-1.3 Detailed Statistics

      IP Address :  User IP address of the entry. IP Subnet Mask :  User IP subnet mask of the entry. DHCP Server :  DHCP Server address of the entry. Buttons Figure 10-1.2: The DHCP snooping table buttons Auto-refresh : …

    • Page 189
      Figure 10-1.3: The DHCP Detailed Statistics Parameter description: Server Statistics Rx and Tx Discover :  The number of discover (option 53 with value 1) packets received and transmitted. Rx and Tx Offer :  The number of offer (option 53 with value 2) packets received and transmitted. Rx and Tx Request : …
    • Page 190
      Rx Discarded from Untrusted :  The number of discarded packet that are coming from untrusted port. Buttons Figure 10-1.3: The DHCP Detailed Statistics buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh : …
    • Page 191: Relay

      10-2 Relay 10-2.1 Configuration A DHCP relay agent is used to forward and to transfer DHCP messages between the clients and the server when they are not in the same subnet domain. It stores the incoming interface IP address in the GIADDR field of the DHCP packet.

    • Page 192: 10-2.2 Statistics

      example, «00030108» means the DHCP message receive form VLAN ID 3, switch ID 1, port No 8. And the option 82 remote ID value is equal the switch MAC address. Possible modes are: Enabled: Enable DHCP relay information mode operation. When DHCP relay information mode operation is enabled, the agent inserts specific information (option 82) into a DHCP message when forwarding to DHCP server and removes it from a DHCP message when transferring to DHCP client.

    • Page 193
      Figure 10-2.2: The DHCP relay statistics Parameter description: Server Statistics Transmit to Server :  The number of packets that are relayed from client to server. Transmit Error :  The number of packets that resulted in errors while being sent to clients. Receive from Server : …
    • Page 194
      Buttons Figure 10-2.2: The DHCP relay statistics buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page immediately. Clear :  Clear all statistics.
    • Page 195: Server

      10-3 Server 10-3.1 Configuration This page configures mode to enable/disable DHCP server per system and per VLAN. And configures Start IP and End IP addresses. DHCP server will allocate these IP addresses to DHCP client. And deliver configuration parameters to DHCP client. Web Interface To configure DHCP server Configuration in the web interface: Click DHCP, Server and Configurtion.

    • Page 196: 10-3.2 Status

      Add Interface :  Click to add a new DHCP server. Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values. 10-3.2 Status This page displays DHCP server status. Web Interface To display DHCP server status in the web interface: Click DHCP, Server and Status.

    • Page 197
      Figure 10-3.2: The DHCP server status buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page immediately.
    • Page 198: Chapter 11 Security

      Chapter 11 Security This section shows you to configure the Port Security settings of the Switch. You can use the Port Security feature to restrict input to an interface by limiting and identifying MAC addresses. 11-1 Management 11-1.1 Account This page provides an overview of the current users. Currently the only way to login as another user on the web server is to close and reopen the browser Web Interface To configure User in the web interface:…

    • Page 199: 11-1.2 Privilege Levels

      To type the password. The field can be input 31 characters, and the allowed content is the ASCII characters from 32 to 126. Password (again) :  To type the password again. You must type the same password again in the field. Privilege Level : …

    • Page 200: 11-1.3 Auth Method

      Group Name :  The name identifying the privilege group. In most cases, a privilege level group consists of a single module (e.g. LACP, STP or QoS), but a few of them contains more than one. The following description defines these privilege level groups in details: System: Contact, Name, Location, Timezone, Daylight Saving Time, Log.

    • Page 201
      Figure 11-1.3: The Authentication Method Configuration Parameter description: Authentication Method Configuration Client :  The management client for which the configuration below applies. Method :  Authentication Method can be set to one of the following values: none : authentication is disabled and login is not possible. …
    • Page 202: 11-1.4 Access Method

      none : authorization is disabled and login is not possible.  tacacs : use a remote TACACS+ server for authorization.  Cmd Lvl :  Runs authorization for all commands at the specified privilege level. Specific command level that should be authorized. Valid entries are 0 through 15. Cfg Cmd : …

    • Page 203
      Click “Add new entry”. Specify the VLAN ID, Start IP Address, End IP Address. Checked Access Management method (HTTP/HTTPS, SNMP, and TELNET/SSH) in the entry. Click Apply. Figure 11-1.4: The Access Method Configuration Parameter description: Mode :  Indicates the access management mode operation. Possible modes are: On : Enable access management mode operation.
    • Page 204: 11-1.5 Https

      Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values. 11-1.5 HTTPS This page allows you to configure the HTTPS settings and maintain the current certificate on the switch. Web Interface To configure an Access Management Configuration in the web interface: Click Configuration, Security, Management and HTTPS.

    • Page 205
      score(_). The maximum length is 63 and hyphen must not be first character. The file name content that only contains ‘.’ is not allowed. Certificate Status :  Display current status certificate switch. Possible statuses are: Switch secure HTTP certificate presented.
    • Page 206: 11-2.1 Configuration

      11-2 802.1X 11-2.1 Configuration The section describes to configure the 802.1X parameters of the switch. The 802.1X can be employed to connect users to a variety of resources including Internet access, conference calls, printing documents on shared printers, or by simply logging on to the Internet. Web Interface To configure the IEEE 802.1X in the web interface: Click Security, 802.1X and Configuration.

    • Page 207
      Figure 11-2.1: The IEEE 802.1X Configuration Parameter description: System Configuration Mode :  on or off. Indicates if IEEE 802.1X is globally enabled or disabled on the switch. If globally disabled, all ports are allowed forwarding of frames. Reauthentication Enabled : …
    • Page 208
      because the RADIUS server request times out (according to the timeout specified on the «Configuration→Security→AAA» page) — the client is put on hold in the Unauthorized state. hold timer does count during on-going authentication. In MAC-based Auth. mode, the switch will ignore new frames coming from the client during hold time.
    • Page 209
      The value can only be changed if the Guest VLAN option is globally enabled. Port Configuration Port :  The port number for which the configuration below applies. Admin State :  If 802.1X is globally enabled, this selection controls the port’s authentication mode.
    • Page 210
      a port, the whole port is opened for network traffic. This allows other clients connected to the port (for instance through a hub) to piggy-back on the successfully authenticated client and get network access even though they really aren’t authenticated. To overcome this security breach, use the Single 802.1X variant.
    • Page 211
      clients can be connected to the same port (e.g. through a 3rd party switch or a hub) and still require individual authentication, and that the clients don’t need special supplicant software to authenticate. The advantage of MAC-based authentication over 802.1X- based authentication is that the clients don’t need special supplicant software to authenticate.
    • Page 212
      • The switch looks for the first set of these attributes that have the same Tag value and fulfil the following requirements (if Tag == 0 is used, the Tunnel-Private-Group-ID does need include a Tag): Value of Tunnel-Medium-Type must «IEEE-802» (ordinal Value of Tunnel-Type must…
    • Page 213: 11-2.2 Status

      globally enabled and the port’s Admin State is in an EAPOL-based or MAC-based mode. Clicking these buttons will not cause settings changed on the page to take effect. Re-authenticate: Schedules a re-authentication whenever the quiet-period of the port runs out (EAPOL-based authentication). For MAC-based authentication, re-authentication will be attempted immediately.

    • Page 214
      The current state of the port. Refer to 802.1X Port State for a description of the individual states. Last Source :  The source MAC address carried in the most recently received EAPOL frame for EAPOL- based authentication, and the most recently received frame from a new client for MAC- based authentication.
    • Page 215
      Port State :  The current state of the port. Refer to 802.1X Port State for a description of the individual states. Buttons Figure 11-2.2: The IEEE 802.1X Statistics Port buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh : …
    • Page 216: Ip Source Guard

      11-3 IP Source Guard The section describes to configure the IP Source Guard detail parameters of the switch. You could use the IP Source Guard configure to enable or disable with the Port of the switch. 11-3.1 Configuration This section describes how to configure IP Source Guard setting including: Mode (Enabled and Disabled) Maximum Dynamic Clients (0, 1, 2, Unlimited) Web Interface…

    • Page 217: 11-3.2 Static Table

      Click to undo any changes made locally and revert to previously saved values. Translate dynamic to static :  Click to translate all dynamic entries to static entries. 11-3.2 Static Table The section describes to configure the Static IP Source Guard Table parameters of the switch. You could use the Static IP Source Guard Table configure to manage the entries.

    • Page 218: 11-3.3 Dynamic Table

      Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values. 11-3.3 Dynamic Table Entries in the Dynamic IP Source Guard Table are shown on this page. The Dynamic IP Source Guard Table is sorted first by port, then by IP address, and then by MAC address.

    • Page 219
      MAC Address :  Source MAC address. Show entries :  You can choose how many items you want to show. Buttons Figure 11-3.3: The Dynamic IP Source Guard Table buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every seconds.
    • Page 220: Arp Inspection

      11-4 ARP Inspection The section describes to configure the ARP Inspection parameters of the switch. You could use the ARP Inspection configure to manage the ARP table. 11-4.1 Configuration This section describes how to configure ARP Inspection setting including: Mode (on and off) Port (Enabled and Disabled) Web Interface To configure an ARP Inspection Configuration in the web interface:…

    • Page 221: 11-4.2 Vlan Configuration

      There are four log types and possible types are: None: Log nothing. Deny: Log denied entries. Permit: Log permitted entries. ALL: Log all entries. Check VLAN :  If you want to inspect the VLAN configuration, you have to enable the setting of «Check VLAN».

    • Page 222
      Figure 11-4.2: The VLAN Mode Configuration Parameter description: Navigating the VLAN Configuration  Each page shows up to 9999 entries from the VLAN table, default being 20, selected through the «entries per page» input field. When first visited, the web page will show the first 20 entries from the beginning of the VLAN Table.
    • Page 223: 11-4.3 Static Table

      Check to delete the entry. It will be deleted during the next save. Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values. First Entry :  Updates the table starting from the first entry in the IPMC Profile Address Configuration.

    • Page 224: 11-4.4 Dynamic Table

      MAC Address :  Allowed Source MAC address in request packets.  Address : Allowed Source IP address in ARP request packets. Buttons Add New Entry :  Click to add a new entry to the Static ARP Inspection table. Delete : …

    • Page 225
      Figure 11-4.4: The Dynamic ARP Inspection Table Parameter description: ARP Inspection Table Columns Port :  Switch Port Number for which the entries are displayed. VLAN ID :  VLAN ID in which the ARP traffic is permitted. MAC Address : …
    • Page 226: Port Security

      11-5 Port Security 11-5.1 Configuration This section shows you to configure the Port Security settings of the Switch. You can use the Port Security feature to restrict input to an interface by limiting and identifying MAC addresses. Web Interface To configure a Port Security Configuration in the web interface: Click Security, Port Security and Configuration.

    • Page 227
      frames from the end-host, and if such frames are not seen within the next Aging Period, the end-host is assumed to be disconnected, and the corresponding resources are freed on the switch. Hold Time :  The hold time — measured in seconds — is used to determine how long a MAC address is held in the MAC table if it has been found to violate the limit.
    • Page 228: 11-5.2 Status

      Ready: The limit is not yet reached. This can be shown for all actions. Limit Reached: Indicates that the limit is reached on this port. This state can only be shown Action is set to none or Trap. Shutdown: Indicates that the port is shut down by the Limit Control module. This state can only be shown if Action is set to Shutdown or Trap &…

    • Page 229
      Disabled: Port Security administratively enabled this port. Protect: Port Security administratively enabled Protect mode. Restrict: Port Security administratively enabled Restrict mode. Shutdown: Port Security is administratively enabled in Shutdown mode. State :  Shows the current state of the port. It can take one of four values: Disabled: No user modules are currently using the Port Security service.
    • Page 230
      single row stating «No MAC addresses attached» is displayed. State :  Indicates whether the corresponding MAC address is blocked or forwarding. In the blocked state, it will not be allowed to transmit or receive traffic. Time of Addition : …
    • Page 231: Radius

      11-6 RADIUS 11-6.1 Configuration Web Interface To configure a RADIUS in the web interface: Click Security, RADIUS and Configuration. Set Timeout, Retransmit, Deadtime, Key, NAS-IP-Address, NAS IPv6-Address, NAS- Identifier. Click “Add New Entry”. Set Hostname, Auth Port, Acct Port, Timeout, Retransmit, Key. Click the Apply to save the setting.

    • Page 232
      Timeout is the number of seconds, in the range 1 to 1000, to wait for a reply from a RADIUS server before retransmitting the request. Retransmit :  Retransmit is the number of times, in the range 1 to 1000, a RADIUS request is retransmitted to a server that is not responding.
    • Page 233: 11-6.2 Status

      To delete a RADIUS server entry, check this box. The entry will be deleted during the next Save. Add New Entry :  Click to add a new RADIUS server. An empty row is added to the table, and the RADIUS server configured needed.

    • Page 234
      The current status of the server. This field takes one of the following values: Disabled: The server is disabled. Not Ready: The server is enabled, but IP communication is not yet up and running. Ready: The server is enabled, IP communication is up and running, and the RADIUS module is ready to accept access attempts.
    • Page 235
      Figure 11-6.2: The RADIUS Statistics for Server Parameter description: server :  You can select which server that you want to display RADIUS. RADIUS Authentication Statistics for Server #1 The statistics map closely to those specified in RFC4668 — RADIUS Authentication Client MIB.
    • Page 236
      The number of RADIUS Access-Request packets destined for the server that have not yet timed out or received a response. This variable is incremented when an Access-Request is sent and decremented due to receipt of an Access-Accept, Access-Reject, Access- Challenge, timeout, or retransmission. Timeouts : …
    • Page 237
      Packets Dropped :  The number of RADIUS packets that were received from the server on the accounting port and dropped for some other reason. Requests :  The number of RADIUS packets sent to the server. This does not include retransmissions Retransmissions : …
    • Page 238
      Check this box to refresh the page automatically. Automatic refresh occurs every seconds. Refresh :  Click to refresh the page immediately. Clear :  Clears the counters for the selected server. The «Pending Requests» counter will not be cleared by this operation.
    • Page 239: Tacacs

      11-7 TACACS+ This page allows you to configure up to 5 TACACS+servers. Web Interface To configure the TACACS+ servers in the web interface: 1. Click Security and TACACS+. Click “Add New Entry”. Specify the Timeout, Deadtime, Key. Specify the Hostname, Port, Timeout and Key in the server. Click Apply.

    • Page 240
      Timeout is the number of seconds, in the range 1 to 1000, to wait for a reply from a TACACS+ server before it is considered to be dead. Deadtime :  Deadtime, which can be set to a number between 0 to 1440 minutes, is the period during which the switch will not send new requests to a server that has failed to respond to a previous request.
    • Page 241: Chapter 12 Access Control

      Chapter 12 Access Control 12-1 Ports Configuration Configure the ACL parameters (ACE) of each switch port. These parameters will affect frames received on a port unless the frame matches a specific ACE. Web Interface To configure the ACL Ports Configuration in the web interface: Click Access Control and Port Configuration.

    • Page 242
      Select whether forwarding is permitted («Permit») or denied («Deny»). The default value is «Permit». Rate Limiter ID :  Select which rate limiter to apply on this port. The allowed values are Disabled or the values 1 through 16. The default value is «Disabled». Port Redirect : …
    • Page 243: Rate Limiters

      12-2 Rate Limiters The section describes how to configure the switch’s ACL Rate Limiter parameters. The Rate Limiter Level from 1 to 16 that allow user to set rate limiter value and units with pps. Web Interface To configure ACL Rate Limiter in the web interface: Click Access Control and Rate Limiters.

    • Page 244: Access Control List

      12-3 Access Control List This page shows the Access Control List (ACL), which is made up of the ACEs defined on this switch. Each row describes the ACE that is defined. The maximum number of ACEs is 512 on each switch. Click on the lowest plus sign to add a new ACE to the list.

    • Page 245
      Parameter description: ACE :  Indicates the ACE ID. Ingress Port :  Indicates the ingress port of the ACE. Possible values are: Any: The ACE will match any ingress port. Policy: The ACE will match ingress ports with a specific policy. Port: The ACE will match a specific ingress port.
    • Page 246
      Counter :  The counter indicates the number of times the ACE was hit by a frame. Modification Buttons :  You can modify each ACE (Access Control Entry) in the table using the following buttons: Inserts before current row. Edits row.
    • Page 247
      Specify the action to take with a frame that hits this ACE. Permit: The frame that hits this ACE is granted permission for the ACE operation. Deny: The frame that hits this ACE is dropped. Filter: Frames matching the ACE are filtered. Rate Limiter : …
    • Page 248
      When «Specific» is selected for the SMAC filter, you can enter a specific source MAC address. The legal format is «xx-xx-xx-xx-xx-xx» or «xx.xx.xx.xx.xx.xx» or «xxxxxxxxxxxx» (x is a hexadecimal digit). A frame that hits this ACE matches this SMAC value. DMAC Filter : …
    • Page 249
      Other: Frame has unknown ARP/RARP Opcode flag. Request/Reply :  Specify the available Request/Reply opcode (OP) flag for this ACE. Any: No Request/Reply OP flag is specified. (OP is «don’t-care».) Request: Frame must have ARP Request or RARP Request OP flag set. Reply: Frame must have ARP Reply or RARP Reply OP flag.
    • Page 250
      Any: Any value is allowed («don’t-care»). IP/Ethernet Length :  Specify whether frames can hit the action according to their ARP/RARP hardware address length (HLN) and protocol address length (PLN) settings. 0: ARP/RARP frames where the HLN is not equal to Ethernet (0x06) or the (PLN) is not equal to IPv4 (0x04).
    • Page 251
      Any: Any value is allowed («don’t-care»). IP Fragment :  Specify the fragment offset settings for this ACE. This involves the settings for the More Fragments (MF) bit and the Fragment Offset (FRAG OFFSET) field for an IPv4 frame. No: IPv4 frames where the MF bit is set or the FRAG OFFSET field is greater than zero must not be able to match this entry.
    • Page 252
      Next Header Filter :  Specify the IPv6 next header filter for this ACE. Any: No IPv6 next header filter is specified («don’t-care»). Specific: If you want to filter a specific IPv6 next header filter with this ACE, choose this value.
    • Page 253
      allowed range is 0 to 255. A frame that hits this ACE matches this ICMP value. ICMP Code Filter :  Specify the ICMP code filter for this ACE. Any: No ICMP code filter is specified (ICMP code filter status is «don’t-care»). Specific: If you want to filter a specific ICMP code filter with this ACE, you can enter a specific ICMP code value.
    • Page 254
      TCP FIN :  Specify the TCP «No more data from sender» (FIN) value for this ACE. 0: TCP frames where the FIN field is set must not be able to match this entry. 1: TCP frames where the FIN field is set must be able to match this entry. Any: Any value is allowed («don’t-care»).
    • Page 255
      The allowed range is 0x600 to 0xFFFF but excluding 0x800(IPv4), 0x806(ARP) and 0x86DD(IPv6). A frame that hits this ACE matches this EtherType value. Buttons Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values. Auto-refresh : …
    • Page 256: Acl Status

      12-4 ACL Status The section describes how to shows the ACL status by different ACL users. Each row describes the ACE that is defined. It is a conflict if a specific ACE is not applied to the hardware due to hardware limitations.

    • Page 257
      Action :  Indicates the forwarding action of the ACE. Permit: Frames matching the ACE may be forwarded and learned. Deny: Frames matching the ACE are dropped. Filter: Frames matching the ACE are filtered. Rate Limiter :  Indicates the rate limiter number of the ACE. The allowed range is 1 to 16. When Disabled is displayed, the rate limiter operation is disabled.
    • Page 258: Chapter 13 Snmp

      Chapter 13 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped with SNMP agent, provided that the Management Information Base (MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity (OID) of the management Information Base (MIB), described in the form of SMI syntax.

    • Page 259
      Indicates the community read access string to permit access to SNMP agent. The allowed string length is 1 to 31, and the allowed content is the ASCII characters from 33 to 126. The field is applicable only when SNMP version is SNMPv1 or SNMPv2c. If SNMP version is SNMPv3, the community string will be associated with SNMPv3 communities table.
    • Page 260: Snmpv

      13-2 SNMPv3 13-2.1 Communities Configure SNMPv3 community table on this page. The entry index key is Community. Web Interface To configure the configure SNMP Communities in the web interface: Click SNMP, SNMPv3 and Communities. Click Add New Entry. Specify the SNMP community parameters. Click Apply.

    • Page 261: 13-2.2 Users

      Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values. 13-2.2 Users The function is used to configure SNMPv3 user. The Entry index key is UserName. To create a new UserName account, please check <Add new user> button, and enter the user information then check <Apply>.

    • Page 262: 13-2.3 Groups

      length is 1 to 31, and the allowed content is ASCII characters from 33 to 126. Security Level :  Indicates the security model that this entry should belong to. Possible security models are: NoAuth, NoPriv: No authentication and no privacy. Auth, NoPriv: Authentication and no privacy.

    • Page 263
      enter the group information then check <Apply>. Max Group Number:12. Web Interface To configure SNMP Groups in the web interface: 1. Click SNMP, SNMPv3 and Groups. 2. Click Add new entry. 3. Specify the SNMP group parameter. 4. Click Apply. Figure 13-2.3: The SNMP Groups Configuration Parameter description: Security Model :…
    • Page 264: 13-2.4 Views

      Buttons Add New Entry :  Click to add new entry. Specify the name and configure the new entry. Click «Apply». Delete :  Check to delete the entry. It will be deleted during the next save. Apply :  Click to save changes.

    • Page 265: 13-2.5 Access

      A string identifying the view name that this entry should belong to. The allowed string length is 1 to 31, and the allowed content is ASCII characters from 33 to 126. View Type :  Indicates the view type that this entry should belong to. Possible view types are: Included: An optional flag to indicate that this view subtree should be included.

    • Page 266
      Figure 13-2.5: The SNMP Accesses Configuration Parameter description: Group Name :  A string identifying the group name that this entry should belong to. The allowed string length is 1 to 31, and the allowed content is ASCII characters from 33 to 126. Security Model : …
    • Page 267
      Add New Entry :  Click to add new entry. Specify the name and configure the new entry. Click «Apply». Delete :  Check to delete the entry. It will be deleted during the next save. Apply :  Click to save changes. Reset : …
    • Page 268: Statistics

      13-3 Statistics 13-3.1 Configuration Configure RMON Statistics table on this page. The entry index key is ID. Web Interface To configure the RMON Statistics Configuration in the web interface: Click Security, RMON, Statistics and Configuration. Click Add New Entry. Specify the ID parameters. Click Apply.

    • Page 269: 13-3.2 Status

      13-3.2 Status This page provides an overview of RMON Statistics entries. Each page shows up to 99 entries from the Statistics table, default being 20, selected through the «entries per page» input field. When first visited, the web page will show the first 20 entries from the beginning of the Statistics table.

    • Page 270
      Broadcast :  he total number of good packets received that were directed to the broadcast address. Multicast :  The total number of good packets received that were directed to a multicast address. CRC Errors :  The total number of packets received that had a length (excluding framing bits, but including FCS octets) of between 64 and 1518 octets, inclusive, but had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error).
    • Page 271
      Figure 13-3.2: The RMON Statistics Status buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page immediately. Next :  Updates the system log entries, turn to the next page. Previous : …
    • Page 272: History

      13-4 History 13-4.1 Configuration Configure RMON History table on this page. The entry index key is ID. Web Interface To configure the RMON History Configuration in the web interface: Click SNMP, History and Configuration. Click Add New Entry. Specify the ID parameters. Click Apply.

    • Page 273: 13-4.2 Status

      Buttons Delete :  Check to delete the entry. It will be deleted during the next save. Add New Entry :  Click to add a new entry. Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values. 13-4.2 Status This page provides an overview of RMON History entries.

    • Page 274
      Indicates the index of History control entry. Sample Index :  Indicates the index of the data entry associated with the control entry. Sample Start :  The value of sysUpTime at the start of the interval over which this sample was measured. Drop : …
    • Page 275
      Figure 13-4.2: The RMON History Status buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page immediately. First Entry :  Updates the table starting from the first entry in the IPMC Profile Address Configuration. Next Entry : …
    • Page 276: Alarm

      13-5 Alarm 13-5.1 Configuration Configure RMON Alarm table on this page. The entry index key is ID. Web Interface To configure the RMON Alarm Configuration in the web interface: Click SNMP, Alarm and Configuration. Click Add New Entry. Specify the ID parameters. Click Apply.

    • Page 277
      InErrors: The number of inbound packets that contained errors preventing them from being deliverable to a higher-layer protocol. InUnknownProtos: the number of the inbound packets that were discarded because of the unknown or un- support protocol. OutOctets: The number of octets transmitted out of the interface , including framing characters. OutUcastPkts: The number of uni-cast packets that request to transmit.
    • Page 278: 13-5.2 Status

      Add New Entry :  Click to add a new entry. Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values. 13-5.2 Status This page provides an overview of RMON Alarm entries. Each page shows up to 99 entries from the Alarm table, default being 20, selected through the «entries per page»…

    • Page 279
      Indicates the particular variable to be sampled Sample Type :  The method of sampling the selected variable and calculating the value to be compared against the thresholds. Value :  The value of the statistic during the last sampling period. Startup Alarm : …
    • Page 280: Event

      13-6 Event 13-6.1 Configuration Configure RMON Event table on this page. The entry index key is ID. Web Interface To configure the RMON Event Configuration in the web interface: Click SNMP, Event and Configuration. Click Add New Entry. Specify the ID parameters. Click Apply.

    • Page 281: 13-6.2 Status

      Buttons Delete :  Check to delete the entry. It will be deleted during the next save. Add New Entry :  Click to add a new entry. Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values. 13-6.2 Status This page provides an overview of RMON Event table entries.

    • Page 282
      Event Index :  Indicates the index of the event entry. Log Index :  Indicates the index of the log entry. LogTIme :  Indicates Event log time LogDescription :  Indicates the Event description. Show entries :  You can choose how many items you want to show.
    • Page 283: Chapter 14 Mep

      Chapter 14 14-1 MEP Configuration The Maintenance Entity Point instances are configured here. Web Interface To configure the MEP parameters in the web interface: Click MEP. Specify the Maintenance Entity Point parameters. Click Apply to apply the change. Figure 14-1: The Maintenance Entity Point Parameter description: Delete : …

    • Page 284
      The MEG level of this MEP. Flow Instance :  The MEP is related to this flow — See ‘Domain’. This is not relevant and not shown in case of Port MEP. Tagged VID :  Port MEP: An outer C/S-tag (depending on VLAN Port Type) is added with this VID. Entering ‘0’ means no TAG added.
    • Page 285: Chapter 15 Erps

      Chapter 15 ERPS The ERPS instances are configured here. Web Interface To configure the Ethernet Ring Protection Switching parameters in the web interface: Click ERPS. Specify the Ethernet Ring Protection Switching parameters. Click Apply to apply the change. Figure 15: The Ethernet Ring Protection Switching Parameter description: Delete : …

    • Page 286
      The Port 1 APS PDU handling MEP. As only one APS MEP is associated with interconnected sub-ring without virtual channel, it is configured as «0» for such ring instances. «0» in this field indicates that no Port 1 APS MEP is associated with this instance. Ring Type : …
    • Page 287: Chapter 16 Ptp

      Chapter 16 16-1 Configuration This page allows the user to configure and inspect the current PTP clock settings. Web Interface To configure the PTP in the web interface: Click PTP and Configuraiton. Scroll to select the mode to enable or disable Specify the parameters in each blank field.

    • Page 288
      1. True : Enable the external clock output 2. False : Disable the external clock output Adjust Method :  This Selection box will allow you to configure the Frequency adjustment configuration. 1. LTC : Select Local Time Counter (LTC) frequency control 2.
    • Page 289: Status

      16-2 Status This page allows the user to inspect the current clock settings. Web Interface To display the PTP status in the web interface: Click PTP and Status. Specify the PTP parameters. Click Apply to apply the change. Figure 16-2: The PTP Status Parameter description: PTP External Clock Description One_PPS_Mode :…

    • Page 290
      Auto : AUTO Select clock control, based on PTP profile and available HW resources. Clock Frequency :  Shows the current clock frequency used by the External Clock. The possible range of values are 1 — 25000000 (1 — 25MHz) PTP Clock Description Inst : …
    • Page 291: Chapter 17 Event Notification

      Chapter 17 Event Notification 17-1 SNMP Trap Configure Trap on this page. Web Interface To configure SNMP Trap Configuration in the web interface: 1. Click Event Notification and SNMP Trap. 2. Click Add New Entry then you can create new SNMP Trap on the switch. 3.

    • Page 292
      Indicates trap destination mode operation. Possible modes are: Enabled: Enable SNMP trap mode operation. Disabled: Disable SNMP trap mode operation. Version :  Indicates SNMP trap supported version. Possible versions are: SNMPv1: SNMP trap supported version SNMPv2c: SNMP trap supported version SNMPv3: Set SNMP trap supported version 3.
    • Page 293
      represented as eight fields of up to four hexadecimal digits with a colon separating each field (:). For example, ‘fe80::215:c5ff:fe03:4dc7’. The symbol ‘::’ is a special syntax that can be used as a shorthand way of representing multiple 16-bit groups of contiguous zeros; but it can appear only once.
    • Page 294: Email

      17-2 eMail Configure SMTP (Simple Mail Transfer Protocol) on this page. Simple Mail Transfer Protocol is the message-exchange standard for the Internet. The Switch is to be configured as a client of SMTP while the server is a remote device that will receive messages from the switch that alarm events occurred.

    • Page 295
      Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
    • Page 296: Log

      17-3 Log 17-3.1 Syslog The Syslog Configuration is a standard for logging program messages . It allows separation of the software that generates messages from the system that stores them and the software that reports and analyzes them. It can be used as well a generalized informational, analysis and debugging messages.

    • Page 297: 17-3.2 View Log

      Click to undo any changes made locally and revert to previously saved values. 17-3.2 View Log This section describes that display the system log information of the switch Web Interface To display the log Information in the web interface: Click Event Notification, Log and View Log. Display the log information.

    • Page 298
      Emerg : system is unusable. Time :  It will display the log record by device time. The time of the system log entry. Message :  It will display the log detail message. The message of the system log entry. Search : …
    • Page 299: Digital I/O

      17-4 Digital I/O Configure the normal modes of digital input/output (DI/DO). Web Interface To configure the digital input/output: Click Event Notification and Digital I/O. Scroll to select the DI/DO Mode. Click the Apply to save the setting. Figure 17-4: The Digital I/O Configuration Parameter description: Group Name : …

    • Page 300: Event Configuration

      17-5 Event Configuration This page displays current trap event severity configurations. Trap event severity can also be configured here. Web Interface To display the configure Trap Event Severity in the web interface: Click Event Notification and Event Configuration. Scroll to select the Group name and Severity Level. Click Enable to select different trap event.

    • Page 301
      Buttons Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
    • Page 302: Chapter 18 Diagnostics

      Chapter 18 Diagnostics This chapter provides a set of basic system diagnosis. These includes Ping, Traceroute, Cable Diagnostics and port mirror. 18-1 Ping This section allows you to issue ICMP Echo packets to troubleshoot Ipv4/6 connectivity issues. Web Interface To configure a PING in the web interface: Click Diagnostics and Ping.

    • Page 303: Traceroute

      To specify the target IP Address of the Ping. Ping Length :  The payload size of the ICMP packet. Values range from 2 bytes to 1452 bytes. Ping Count :  The count of the ICMP packet. Values range from 1 time to 60 times. Ping Interval : …

    • Page 304: Cable Diagnostics

      Figure 18-2: The Traceroute Parameter description: IP Address :  The destination IP Address. Wait Time :  Set the time (in seconds) to wait for a response to a probe (default 5.0 sec). Values range from 1 to 60. The payload size of the ICMP packet. Values range from 2 bytes to 1452 bytes. Max TTL : …

    • Page 305
      Figure 18-3: The Cable Diagnostics Parameter description: Port :  The port where you are requesting Cable Diagnostics. Copper Port :  Copper port number. Link Status :  The status of the cable. 10M: Cable is link up and correct. Speed is 10Mbps 100M: Cable is link up and correct.
    • Page 306: Mirroring

      18-4 Mirroring You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner. Mirror Configuration is to monitor the traffic of the network.

    • Page 307
      are not mirrored. Tx only : Frames transmitted on this port are mirrored on the mirror port. Frames received are not mirrored. Disabled : neither frames transmitted nor frames received are mirrored. Enabled : Frames received and frames transmitted are mirrored on the mirror port. Buttons Apply : …
    • Page 308: Sflow

      18-5 sFlow 18-5.1 Configuration The sFlow Collector configuration for the can be monitored and modified here. The switch configuration is divided into two parts: Configuration of the sFlow receiver (a.k.a. sFlow collector) and configuration of per-port flow and counter samplers. sFlow configuration is not persisted to non-volatile memory, which means that a reboot or master change will disable sFlow sampling.

    • Page 309
      will identify this agent over extended periods of time. Both IPv4 and IPv6 addresses are supported. Receiver Configuration Owner :  Basically, sFlow can be configured in two ways: Through local management using the Web or CLI interface or through SNMP. This read-only field shows the owner of the current sFlow configuration and assumes values as follows: •…
    • Page 310: 18-5.2 Statistics

      If the maximum datagram size does not take into account the maximum header size, samples may be dropped. Counter Poller Enabled :  Enables/disables counter polling on this port. Counter Poller Interval :  With counter polling enabled, this specifies the interval — in seconds — between counter poller samples.

    • Page 311
      Figure 18-5.2: The sFlow Statistics Parameter description: Receiver Statistics Owner :  This field shows the current owner of the sFlow configuration. It assumes one of three values as follows: • If sFlow is currently unconfigured/unclaimed, Owner contains <none>. • If sFlow is currently configured through Web or CLI, Owner contains <Configured through local management>.
    • Page 312
      Figure 15-5.2: The sFlow Statistics buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page immediately. Clear Receiver :  Clears the sFlow receiver counters. Clear Ports : …
    • Page 313: Chapter 19 Maintenance

      Chapter 19 Maintenance This chapter describes the entire Maintenance configuration tasks including Save/Backup/Restore/Activate/Delete Restart Device, Factory Defaults, Firmware upgrade. 19-1 Configuration The switch stores its configuration in a number of files in text format. The files are either virtual (RAM-based) or stored in flash on the switch. There are three system files: running-config: A virtual file that represents the currently active configuration on the …

    • Page 314: 19-1.2 Backup

      Parameter description: Button Save Configuration :  Click to save configuration, the running configuration will be written to flash memory for system boot up to load this startup configuration file. 19-1.2 Backup This section describes how to export the Switch Configuration for maintenance needs. Any current configuration files will be exported as text format.

    • Page 315: 19-1.3 Restore

      Button Download Configuration :  Click the button then the switch will start to transfer the configuration file to your workstation. 19-1.3 Restore It is possible to import a file from the web browser to all the files on the switch, except default-config, which is read-only.

    • Page 316: 19-1.4 Activate

      Merge mode: The uploaded file is merged into running-config. startup-config :  The startup configuration for the switch, read at boot time. Create new file :  To create new files. Parameter description: Buttons Browse :  Click the button to search the configuration text file and filename Upload Configuration : …

    • Page 317: 19-1.5 Delete

      19-1.5 Delete It is possible to delete any of the writable files stored in flash, including startup-config. If this is done and the switch is rebooted without a prior save operation, this effectively resets the switch to default configuration. Web Interface To delete configuration in the web interface: 1.

    • Page 318: Restart Device

      19-2 Restart Device This section describes how to restart the device for any maintenance needs. Any configuration files or scripts that you saved in the switch should still be available afterwards. Web Interface To Restart Device in the web interface: 1.

    • Page 319: Factory Defaults

      19-3 Factory Defaults This section describes how to restore the Switch configuration to Factory Defaults. Web Interface To restore a in the web interface: Factory Defaults 1. Click Maintenance and Factory Defaults. 2. You can choose if you want to keep ip configuration or not. 3.

    • Page 320: Firmware

      19-4 Firmware This section describes how to upgrade (or update) Firmware. 19-4.1 Firmware Upgrade This page facilitates an update of the firmware controlling the switch.. Web Interface To update firmware of the device in the web interface: 1. Click Maintenance, Firmware and Firmware Upgrade. 2.

    • Page 321
      Figure 19-4.2 The Firmware selection Image Information Image :  The file name of the firmware image, from when the image was last updated. Version :  The version of the firmware image. Date :  The date where the firmware was produced. Buttons Activate Alternate Image : …

    Перейти к контенту

    Много инструкций

    Krups Evidence EA891D

    Данная инструкция на русском языке предназначена для кофемашины
    Krups Evidence EA891D
    , описывает принцип работы и основные моменты эксплуатации устройства.

    Производитель настойчиво рекомендует перед включением кофемашины
    внимательно изучить настоящую инструкцию.

    Инструкция для кофемашины
    представлена в формате PDF. Все современные браузеры уже поддерживают данный формат и сложностей с открытием файла возникнуть не должно.

    Но если открыть инструкцию все же не удается, то необходимо установить на компьютер программу для чтения PDF файлов, например, Acrobat Reader. Если у вас возникли сложности с открытием инструкции на смартфоне под управлением Android, нужно установить, например, Adobe Acrobat Reader.

    Комментарии (0)

    Комментарии про другие Кофемашины

    Другие Кофемашины Krups

    Перейти к контенту

    Русские электронные инструкции по эксплуатации

    Русские электронные инструкции по эксплуатации

    Постоянно обновляемый большой каталог документации по эксплуатации и использованию современных устройств и оборудования на русском языке. Бесплатное скачивание файлов.

    Главная

    Просмотр инструкции в pdf

    Поделиться в ВКонтакте

    Поделиться в одноклассниках

    Поделиться в MAIL.RU

    Инструкция по эксплуатации автоматической кофемашины Krups Quattro Force Evidence EA891810.

    Скачать инструкцию к автоматической кофемашине Krups Quattro Force Evidence EA891810 (5,55 МБ)



    Автоматические кофемашины

    « Инструкция к автоматической кофемашине Krups Lattespress EA829810

    » Инструкция к беспроводным наушникам QUB STN-250

    Вам также может быть интересно

    Инструкция к кофеварке Krups Nescafe Dolce Gusto Mini Me KP120110

    Инструкция к автоматической кофемашине Krups Espresseria EA8250PE

    Инструкция к кофеварке Krups KP110810 Dolce Gusto Oblo Black

    Инструкция к кофеварке Krups Nespresso

    Инструкция к кофемашине Krups Espresseria EA82FD10

    Инструкция к кофемашине Krups Arabica Espresso EA811010

    Инструкция к автоматической кофемашине Krups Quattro Force Barista EA907D31

    Инструкция к кофеварке Krups Nescafe Dolce Gusto Piccolo XS KP1A0110

    • Добавить инструкцию
    • Заказать инструкцию

    www.krups.com

    FR HOTLINE : B: 070 23 31 59 — F: 09 74 50 10 61 — CH: 044 837 18 40

    EN HOTLINE: UK: 0345 330 6460 — ROI: 01 677 4003

    DE HOTLINE: DE: 0212 387 400 — AT: 01 890 3476 — CH: 044 837 18 40

    NL HOTLINE: NL: 0318 58 24 24

    DA KUNDESERVICE: 44 66 31 55

    NO KUNDESERVICE: 815 09 567

    SV KUNDSERVICE: 08 594 213 30

    FI ASIAKASPALVELU: 09 622 94 20

    ES HOTLINE : ES: 902 31 23 00

    IT SERVIZIO CONSUMATORI: IT: 1 99 207 701 — CH: 044 837 18 40

    PT Centro de Contacto do Consumidor : PT: 808 284 735

    EL ΓΡΑΜΜΗ ΕΞΥΠΗΡΕΤΗΣΗΣ: 2106371251

    CS HORKÁ LINKA: 731 010 111

    SK ZÁKAZNÍCKA LINKA: 232 199 930

    HU FORRÓDRÓT: 06 1 801 8434

    PL INFOLINIA: 801 300 420

    RU Горячая линия: 495 213 32 28

    UK ГАРЯЧА ЛIНIЯ: 044 300 13 04

    RO Centrul de Asistenţă Clienţi : 0 21 316 87 84

    8020005296 — 11.2019- Réalisation : Espace graphique

    www.krups.com

    FULLY AUTOMATIC

    SERIE EA89

    RO UK RU PL HU SK CS EL PT IT ES FI SV NO DA NL DE EN FR

    FULLY AUTOMATIC SERIE EA89

    A

    I

    B

    C

    E

    D

    H

    F

    1

    2

    1

    L

    K

    2

    J

    N

    M

    O

    O

    8020005296

    G

    G1

    G2

    Понравилась статья? Поделить с друзьями:
  • Инструкция по эксплуатации навигатора гармин етрекс 10
  • Оао 20 арз официальный сайт руководство
  • Стиль руководства манипулятор
  • Venalex польша инструкция по применению на русском
  • Type ekc 101 инструкция на русском