LevelOne GEP-5070 driver and firmware
Related LevelOne GEP-5070 Manual Pages
Download the free PDF manual for LevelOne GEP-5070 and other LevelOne manuals at ManualOwl.com
Manual - Page 5
...Internet Protocol (IP), and Simple Network Management Protocol (SNMP).
CONVENTIONS The following conventions are used throughout this guide to show information: NOTE: Emphasizes important information or calls your attention to related features or instructions...related characteristics, and how to install the switch: The Installation Guide Also, as part of the switch's software, there is an online ...
Manual - Page 7
...
Navigating the Web Browser Interface
35
Home Page
35
Configuration Options
36
Panel Display
36
Main Menu
36
4 CONFIGURING THE SWITCH
45
Configuring System Information
45
Setting an IP Address
46
Setting an IPv4 Address
46
Setting an IPv6 Address
48
Configuring NTP Service
50
Configuring the Time Zone and Daylight Savings Time
51
Configuring Remote Log Messages
53
- 7 -
Manual - Page 12
CONTENTS
SECTION III
Running Cable Diagnostics 7 PERFORMING SYSTEM MAINTENANCE
Restarting the Switch Restoring Factory Defaults Upgrading Firmware Activating the Alternate Image Managing Configuration Files
Saving Configuration Settings Restoring Configuration Settings
APPENDICES
A SOFTWARE SPECIFICATIONS Software Features Management Features Standards Management Information Bases
B ...
Manual - Page 17
... Figure 144: Power over Ethernet Status Figure 145: MAC Address Table Figure 146: Showing VLAN Members Figure 147: Showing VLAN Port Status Figure 148: Showing MAC-based VLAN Membership Status Figure 149: Showing sFlow Statistics Figure 150: ICMP Ping Figure 151: VeriPHY Cable Diagnostics Figure 152: Restart Device Figure 153: Factory Defaults Figure 154: Software Upload Figure 155: Software Image...
Manual - Page 24
... the console interface through Telnet), and later download this file to restore the switch configuration settings.
AUTHENTICATION
This switch authenticates management access via a web browser. User names and passwords can be configured locally or can be verified via a remote authentication server (i.e., RADIUS or TACACS+). Port-based authentication is also supported via the IEEE 802.1X protocol...
Manual - Page 25
... ports, network ports or guest ports. They can also be used to strictly control network traffic by only allowing incoming frames that match the source MAC and source IP on specific port.
PORT CONFIGURATION
You can manually configure the speed and duplex mode, and flow control used on specific ports, or use auto-negotiation to detect the connection settings used by the attached device...
Manual - Page 26
... information. The address table supports up to 16K addresses.
STORE-AND-FORWARD SWITCHING
The switch copies each frame into its memory before forwarding them to another port. This ensures that all frames are a standard Ethernet size and have been verified for accuracy with the cyclic redundancy check (CRC). This prevents bad frames from entering the network and wasting...
Manual - Page 44
... Menu (Continued)
Menu Maintenance
Restart Device Factory Defaults Software
Upload
Image Select
Configuration Save
Upload
Description
Restarts the switch Restores factory default settings
Page 287 287 288
Updates software on the switch with a file specified on the 288 management station
Displays information about the active and alternate (backup) 289 firmware images in the switch, and allows...
Manual - Page 60
... Management, Port
(contains Dot1x port, MAC based and the MAC Address Limit), ACL, HTTPS, SSH, ARP Inspection, and IP source guard. ■ IP: Everything except for ping. ■ Port: Everything except for VeriPHY. ■ Diagnostics: ping and VeriPHY. ■ Maintenance: CLI - System Reboot, System Restore Default, System Password, Configuration Save, Configuration Load and Firmware Load. Web...
Manual - Page 87
... Windows 7, Windows Vista, Windows XP, and in Windows 2000 with Service Pack 4. To support these encryption methods in Windows 95 and 98, you can use the AEGIS dot1x client or other comparable client software.)
MAC-based authentication allows for authentication of more than one user on the same port, and does not require the user to have special 802.1X software installed...
Manual - Page 94
... - equipment whose MAC address is a valid RADIUS user can be used by anyone. Also, only the MD5-Challenge method is supported. The maximum number of clients that can be attached to a port can be limited using the Port Security Limit Control functionality. Further Guidelines for Port Admin State ■ Port Admin state can only be set to Force-Authorized...
Manual - Page 220
... About the System
◆ Software Date - Release date of the switch software. ◆ Code Revision - Version control identifier of the switch software.
WEB INTERFACE To view System Information, click Monitor, System, Information.
Figure 97: System Information
DISPLAYING CPU UTILIZATION
Use the CPU Load page to display information on CPU utilization. The load is averaged over the last...
Manual - Page 287
...
This chapter describes how to perform basic maintenance tasks including upgrading software, restoring or saving configuration settings, and resetting the switch.
RESTARTING THE SWITCH
Use the Restart Device page to restart the switch. PATH Maintenance, Restart Device WEB INTERFACE To restart the switch 1. Click Maintenance, Restart Device. 2. Click Yes. The reset will be complete when the...
Manual - Page 288
... IP settings), connect a cable from port 1 to port 2, and then reset power to the switch.
PATH Maintenance, Restart Device WEB INTERFACE To restore factory defaults: 1. Click Maintenance, Factory Defaults. 2. Click Yes. The factory defaults are immediately restored, which means that no reboot is necessary.
Figure 153: Factory Defaults
UPGRADING FIRMWARE
Use the Software Upload page to upgrade the...
Manual - Page 289
... defunct. The front LED flashes Green/Off at a frequency of 10 Hz while the firmware update is in progress. Do not reset or power off the device at this time or the switch may fail to function afterwards.
Figure 154: Software Upload
ACTIVATING THE ALTERNATE IMAGE
Use the Software Image Selection page to display information about the active...
Manual - Page 303
... a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,
c) Accompany... contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed...
Manual - Page 310
...-in User Service. RADIUS is a logon authentication protocol that uses software running on a central server to control access to RADIUS-compliant devices on the network.
RMON Remote Monitoring. RMON provides comprehensive network monitoring capabilities. It eliminates the polling required in standard SNMP, and can set alarms on a variety of traffic conditions, including specific error types.
RSTP...
Manual - Page 311
... authentication protocol that uses software running on a central server to control access to TACACS-compliant devices on the network.
TCP/IP Transmission Control Protocol/Internet Protocol. Protocol suite that includes TCP as the primary transport protocol, and IP as the network layer protocol.
TELNET Defines a remote communication facility for interfacing to a terminal device over TCP/IP.
TFTP...
Manual - Page 313
... Name Service See DNS downloading software 288 using HTTP 288 using TFTP 288
drop precedence, QoS 188
DSCP classification, QoS 199
rewriting, port 195
translation, port 195 translation, QoS 198
dynamic addresses, displaying
171, 276
E
edge port, STA 137 EEE, LLDP neighbor information 272 egress port scheduler, QoS 189 event logging 221
F
firmware displaying version 219 upgrading 288 upgrading...
Manual - Page 316
...
software displaying version 219 downloading 288
Spanning Tree Protocol See STA specifications, software 295 SSH 64
configuring 64 server, configuring 64 STA 127 BPDU shutdown 137 edge port 137
global settings, displaying 129, 132
interface settings 135 link type 138
path cost 136, 139 port priority 136, 139
transmission hold count 131 transmission limit 131 standards, IEEE 297 static addresses...