EasyManua.ls Logo

Linksys LGS308 User Manual

Linksys LGS308
209 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
1
User Guide
SMART SWITCH
LGS3XX

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Linksys LGS308 and is the answer not in the manual?

Linksys LGS308 Specifications

General IconGeneral
Switch typeManaged
Switch layer-
Quality of Service (QoS) supportYes
Installed SFP modules quantity0
Basic switching RJ-45 Ethernet ports typeGigabit Ethernet (10/100/1000)
Basic switching RJ-45 Ethernet ports quantity8
10G supportNo
Number of VLANs128
Networking standardsIEEE 802.1D, IEEE 802.1p, IEEE 802.1Q, IEEE 802.1s, IEEE 802.1w, IEEE 802.1x, IEEE 802.3, IEEE 802.3ab, IEEE 802.3ad, IEEE 802.3az, IEEE 802.3u, IEEE 802.3x, IEEE 802.3z
Virtual LAN featuresTagged VLAN
Copper ethernet cabling technology1000BASE-T, 100BASE-T, 10BASE-T
DHCP featuresDHCP client
Throughput11.9 Mpps
Jumbo frames9000
MAC address table8000 entries
Product colorBlack, Blue
LED indicatorsActivity, Link, System
Memory typeDRAM
Internal memory128 MB
Input current0.5 A
AC input voltage100 - 240 V
AC input frequency50 - 60 Hz
Power consumption (typical)7.94 W
Storage temperature (T-T)-40 - 70 °C
Operating temperature (T-T)0 - 50 °C
Operating relative humidity (H-H)10 - 90 %
Weight and Dimensions IconWeight and Dimensions
Depth104 mm
Width210 mm
Height25 mm
Weight528 g

Summary

Chapter 1 – Getting Started

Chapter 2 – System Status

System Summary

Displays device status, hardware, firmware, and other system information.

RMON

Explains Remote Network Monitoring statistics for packet analysis and error detection.

Interface Statistics

Displays traffic statistics per port for analyzing network traffic volume and dispersion.

Chapter 3 – Quick Start

Chapter 4 – System Management

System Information

Allows configuration of device description, location, contact, and hostname for system identification.

Management Session Timeout

Configures idle time intervals before management sessions automatically log out to enhance security.

Time

Manages system time synchronization using SNTP for accurate event correlation and logging.

SNMP

Describes the Simple Network Management Protocol for managing network devices and reporting system events.

Logs

Manages system event logs, including console, RAM, and Flash memory logs for troubleshooting.

Chapter 5 – Port Management

Ports

Configures individual port settings, status, administrative mode, and protected port features for network connectivity.

Link Aggregation

Bundles multiple physical ports into a single logical channel (LAG) to increase bandwidth and redundancy.

Green Ethernet

Features designed to reduce power consumption, including Short-Reach Mode and Energy Efficient Ethernet (EEE).

PoE

Configures Power over Ethernet capabilities, including power modes, priority, and feature settings for connected devices.

Discovery - LLDP

Manages Link Layer Discovery Protocol (LLDP) for advertising device capabilities and network topology discovery.

Chapter 6 – VLAN Management

VLANs

Defines and configures VLANs, including VLAN IDs, types, and membership for network segmentation.

Interfaces

Configures VLAN-related parameters for ports and LAGs, including interface modes like Access, Trunk, and General.

VLAN Memberships

Assigns ports and LAGs to specific VLANs, defining their membership and role within the VLAN structure.

VLAN Groups

Configures MAC-based VLAN groups to classify packets and assign them to VLANs based on source MAC addresses.

Voice VLAN

Configures Voice VLANs to prioritize voice traffic and supports Auto Voice VLAN based on Telephony OUI.

Chapter 7 - Spanning Tree Management

Spanning Tree

Configures global STP settings, including enabling the protocol, selecting modes (STP, RSTP, MSTP), and BPDU handling.

STP Interfaces

Configures STP parameters on a per-port basis, including port state, path cost, and priority.

RSTP Interfaces

Configures Rapid Spanning Tree Protocol (RSTP) settings per port for faster STP convergence and loop prevention.

Chapter 8 - MAC Address Management

Dynamic MAC Addresses

Configures the aging time for dynamic MAC addresses, which are learned from incoming traffic and stored in the device.

Static MAC Addresses

Assigns static MAC addresses to specific interfaces and VLANs, providing persistent address entries.

Reserved MAC Addresses

Reserves specific MAC addresses for special handling, such as discarding or bridging frames based on criteria.

Chapter 9 – Multicast

IGMP Snooping

Enables IGMP snooping to monitor multicast traffic and identify hosts requesting streams, optimizing bandwidth usage.

MLD Snooping

Enables MLD snooping for IPv6 multicast traffic, monitoring hosts and optimizing stream delivery for IPv6 networks.

Multicast Router Ports

Configures or identifies multicast router ports to facilitate the propagation of multicast streams across subnets.

Forward All

Configures ports to receive all multicast streams from a specific VLAN, useful for devices that do not support IGMP.

Unregistered Multicast

Handles multicast frames belonging to unknown groups, typically forwarding them to all VLAN ports or filtering them.

IGMP/MLD IP Group Addresses

Displays and queries IPv4 group addresses learned via IGMP messages for multicast stream management.

MAC Group Address FDB

Manages the Multicast Forwarding Database (MFDB) based on MAC group addresses for efficient multicast traffic forwarding.

IP Group Address FDB

Manages the IP Multicast Groups Forwarding Data Base (FDB) for querying and adding IP multicast groups.

Chapter 10 - IP Interface

IPv4

Configures IPv4 addressing, including static or dynamic IP assignment, subnet masks, and default gateways for network communication.

IPv6

Manages IPv6 addressing, including interface configuration, address assignment, and default router settings for next-generation networks.

Chapter 11 - IP Network Operations

Domain Name System

Configures DNS settings to resolve domain names to IP addresses, enabling host name resolution for network access.

DHCP

Manages DHCP settings, including snooping, trusted ports, and binding databases to ensure secure and efficient IP address assignment.

DHCP Snooping

Enables DHCP snooping to prevent rogue DHCP servers and ensure the integrity of IP address assignments.

DHCP Interfaces

Configures DHCP snooping on specific interfaces to monitor and control DHCP traffic on a per-interface basis.

DHCP Snooping Binding Database

Manages the DHCP Snooping Binding database, which records IP-MAC bindings for security and troubleshooting.

Interface Settings

Configures interface settings, including designating trusted interfaces for DHCP snooping to enhance network security.

Chapter 12 – Security

Management Security

Secures device management access by configuring usernames, passwords, and authentication methods for authorized access.

User Access & Accounts

Manages user accounts, allowing the creation of new users, modification of existing ones, and password management.

Access Profile

Defines access profiles to control management access from specific sources based on rules and priorities.

Access Profile Rules

Adds and manages rules within access profiles to define criteria for permitting or denying device access based on various parameters.

RADIUS

Integrates with RADIUS servers for centralized authentication, authorization, and accounting (AAA) for network access control.

Network Access Control

Implements 802.1x authentication and MAC-based authentication to control network access for clients and devices.

Port Security

Enhances network security by limiting port access based on MAC addresses, using classic or dynamic lock modes.

Storm Control

Protects the network from traffic storms by limiting broadcast, multicast, or unknown unicast frames based on defined thresholds.

Chapter 13 - Access Control List

MAC-Based ACL

Filters traffic based on Layer 2 MAC addresses, examining frames for matches to permit or deny network access.

MAC-Based ACE

Defines rules (ACEs) within MAC-based ACLs, specifying actions like permit or deny based on MAC address criteria.

IPv4-Based ACL

Filters IPv4 packets based on IP protocols, ports, IP addresses, and DSCP values for granular traffic control.

IPv4-Based ACE

Defines rules (ACEs) within IPv4-based ACLs, specifying actions like permit or deny based on IP packet criteria.

IPv6-Based ACL

Filters IPv6 packets based on IP protocols, ports, IP addresses, and DSCP values for granular traffic control.

IPv6-Based ACE

Defines rules (ACEs) within IPv6-based ACLs, specifying actions like permit or deny based on IPv6 packet criteria.

ACL Binding

Binds ACLs to interfaces (ports, LAGs, VLANs) to apply filtering rules to incoming traffic, controlling network access.

Chapter 14 - Quality of Service

Feature Configuration

Configures QoS modes (Basic, Disabled) and default CoS priority for interfaces to manage traffic prioritization.

Queue Scheduling

Manages traffic queuing mechanisms, supporting Strict Priority and Weighted Round Robin (WRR) for prioritizing egress traffic.

CoS/802.1p to Queue

Maps 802.1p priorities to egress queues, allowing prioritization of traffic based on VLAN tags for quality of service.

DSCP to Queue

Maps DSCP values to egress queues, enabling traffic prioritization based on IP packet's Differentiated Services Code Point.

Bandwidth Control

Controls network traffic by defining ingress rate limits and egress shaping rates per interface to manage bandwidth allocation.

Egress Shaping

Limits transmission rates of egressing frames on a per-queue basis by shaping the output load for better traffic management.

Basic QoS

Configures basic QoS by defining trusted domains and selecting trust modes (CoS/802.1p, DSCP) for packet classification.

QoS Statistics

Displays queue statistics, including forwarded and dropped packets, based on interface, queue, and drop precedence for performance monitoring.

Chapter 15 - Maintenance

Reboot

Manages device reboot operations, including saving configurations before rebooting and restoring factory defaults.

File Management

Manages system files such as configurations, firmware, and logs, supporting internal and external file transfers.

Firmware & Boot Code

Handles firmware and boot code upgrades and backups using HTTP/HTTPS or TFTP for device software management.

Active Firmware Image

Selects the active firmware image for the device, allowing management of firmware versions for boot-up.

Configuration & Log

Manages configuration and log files, enabling backup, restore, and transfer operations for system data preservation.

Configuration File Copy

Copies configuration files between different types (Running, Startup, Backup) to preserve settings and manage device configurations.

Diagnostics

Provides diagnostic tools like Copper Test, Ping, Traceroute, and Port Mirroring for troubleshooting network connectivity and device issues.

Chapter - 16 Support

Related product manuals