Manuel d'utilisation / d'entretien du produit ES-5240G+ du fabricant Edimax Technology
Aller à la page of 111
ES-5240G+ 24-Port GbE W eb Smart Switch User's Manual V ersion 1.0 / June 2007.
ii COPYRIGHT Copyright© 2007 Edimax. All right s reserved. No pa rt of this publication may be reproduced, transmitted, transcribed, stored in a retri eval system, or translated into any language or .
iii T able of Content s Caution ........................................................................................................................ .......... v Electronic Emi ssion Notices ........................................................
iv 4-3-5. IGMP S t at us .......................................................................................................... 90 4-3-6. Ping S tatus.................................................................................................
v Caution Circuit devices are sensitive to static ele c tric ity , which can damage their deli c ate electronics. Dry weather conditions or walking across a car peted floor may cause you to acquire a st atic electrical charge.
.
1 1. Introduction 1-1. Overview of 24-Port GbE W eb Smart Sw itch 24-port Gigabit W eb Smart Switch is a standalo ne switch that meets IEEE 802.3/u/x/z standa rds. The switch is equ ipped with included 20 x 10/100/1000Mbps TP port and 4 x Gigabit TP/SFP Fiber auto-se nse port We b Smart management Ethernet Switch.
2 1-2. Checklist Before you start inst alling the switch, veri fy that the package contai ns the following: 24-Port GbE Web Smart Switch SFP Modules (optional) Mounting Accesso.
3 • Support s to send the trap event while monitored events happ ened • Support s default configuration which can be restored to overwrite the current configuration which is working on via W eb UI.
4 1-4. V iew of 24-Port GbE Web Smart Switch 1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs) There are 24 TP Gigabit Ethernet port s and 4 SFP fiber ports f or optional removable modules on the front p anel of the switch. LED display area.
5 • LED Indicators LED Color Function System LED POWER Green Lit when +3.3V power is coming up 10/100/1000Ethernet TP Port 1 to 24 LED LINK/ACT Green Lit when connection with remote device is good B.
6 1-5. V iew of the Optional Modules Port 21~24 on this switch support tw o types of medi a --- TP and SFP Fiber (LC, BiDi-SC…); this port support s 10/100/1000Mbps TP or 1000Mbps SFP Fiber with auto-detected function.
7 2. Installation 2-1. St arting 24-Port GbE Web Smart Switch Up This section will give user s a quick st art for: - Hardware and Cable Inst allation - Management S tation Installation - Software booting and configuration 2-1-1.
8 • TP Port an d Cable Inst allation ⇒ In the switch, TP port support s MDI/MDI-X auto-crossover , so both types of cable, straight-throu gh (Cable pin-out s for RJ -45 jack 1, 2, 3, 6 to 1, 2, 3,.
9 2-1-2-1. Cabling Requirement s for TP Port s ⇒ For Fast Ethernet TP network connection ⎯ The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. ⇒ Gigabit Ethernet TP netwo rk connection ⎯ The grade of the cable must be Cat.
10 2-1-2-3. Switch Cascading in T opology • T akes the Delay T ime into Account Theoretically , the switch partitions the collision domain for each port in switch cascading that you may up-link the switches unlimitedly . In practice, the network extension (cascading levels & overall diam eter) must follow the constraint of the IEEE 802.
11 Case1: All switch ports are in the same local area networ k. Every port can access each other (See Fig. 2-2). If the VLAN is enabled and configured, each node in the network that can communicate each other di rectly is bounded to the same VLAN area.
12 Case 2b: Port-based VLAN (See Fig.2-4). 1. VLAN1 members can not access VLAN2, VLAN3 and VLAN4 members. 2. VLAN2 members can not access VL AN1 and VLAN3 members, but they can access VLA N4 members. 3. VLAN3 members can not access VLAN1, VLAN2 and VLAN4.
13 2-1-3. Configuring the Management Agent of 24-Port GbE Web Smart Switch Just like browsing on the Internet, this switch is de signed to allow users to access and manage it s functions through its web-based interface. Users can monitor the status of the switch, as well as to configure the switch through this web- based interface.
14 2-1-3-1. Management through Ethern et Port There are two ways to configure and monitor the switch through its Ethe rnet port – using a web browser and an SNMP manager program.
15 Fig. 2 -7 the Log in Screen for Web 2-1-4. IP Address Assignment For IP addre ss configuration, four p arameters are required. They are IP address, Subnet Mask, Default Gateway and DNS. IP addre ss: The IP addre ss of the network device in a network is used for internet working communication.
16 According to IPv4, the IP addre ssed are divided three classes, class A, class B and class C. The rest of IP addresses are for multicast and broadcast. The bit length of the network prefix is the same as that of the subnet mask and is denoted as IP addre ss/X, for example, 192.
17 Class D and E: Class D is a cla ss with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RF C 1 1 12. Class E is a class with first 4 MSB set to 1-1-1-1 and is used for IP broadcast.
18 In this diagram, you can see the subnet mask with 2 5-bit long, 255.255.255.128, cont ains 126 members in the sub-netted network. Anothe r is that the length of network prefi x equals the number of the bit with 1s in that subnet mask. With this, you can easily count the number of IP addresses matched.
19 For different network applications, the subnet mask may look like 255.255.255.240. This means it is a small network accommodating a maximum of 15 nodes in the network.
20 2-2. T ypical Applications The 24-Port GbE W eb Smart Switch implement s 24 Gigabit Ethernet TP ports with au to MDIX and four slots for removable modules Comprehen sive fiber types of connection inclu ding LC and BiDi-LC SFP modules are supported.
21 Fig. 2-12 Office Network Connection Fig. 2-1 1 Peer-to-peer N etwork Connection.
22 3. Basic Concept and Management In this chapter we are goin g to introduce you the basic concept s and features of Ethernet, and how to work with the managem ent feature s provided by this switch.
23 The above diagram shows the Ethernet ar chitecture in OSI model. LLC sub- layer and MAC sub-layer will re spond to the Data Li nk layer , and the transceivers will respond to the Physical layer . Logical Link Control (LLC) Dat a link layer is composed of both the su b-layers of MAC and MAC-client.
24 The table 3-1 is the format of LLC PDU. It comprises four fields, DSAP , SSAP , Contro l and Information. The DSAP address field i dentifies the one or more service access point s, in which the I/G bit indicates it is individual or gr oup address. If all bits of DSAP are 1s, it’s a global address.
25 3-2. Media Acces s Control (MAC) MAC Addressing Because LAN is co mposed of many nodes, for the data exchanged among these nodes, each nod e must have its own unique address to identify who should send the data or should receive the data.
26 Bit 47 bit 0 1st byte 2nd byte 3rd byte 4t h byte 5th byte 6th byte OUI code Serial number Table 3-3 Ethernet MAC address The first bit of the first byte in t he Destination address (DA) deter mines the address to be a Unicast (0) or Multicast frame (1), known as I/G bit indicating individual (0) or group (1 ).
27 - Destination address (DA) — The DA field is used to identify which network device(s) should receive t he packet. It is a unique address. Please see the section of MAC addre ssing. - Source addresses (SA) — The SA field indicates the source node.
28 How does a MAC work? The MAC sub-layer has two primary jobs to do: 1. Receiving and transm itting data . When receiving data, it pars es frame to detect error; when transmi tting dat a, it performs frame assembly. 2. Performing Media access co ntrol.
29 Ethernet MAC transmits frame s in half-duplex and full-du plex ways. In half- duplex operation mode, the MAC ca n either transmit or receive frame at a moment, but cannot do both jobs at the same time. As the transmission of a MAC frame with half-dupl ex operation exists only in the same collision domain.
30 Parameter value/LAN 10Base 100Base 1000Base Max. collision domain DTE to DTE 100 meters 100 meters for UTP 412 meters for fiber 100 meters for UTP 316 meters for fiber Max. collision domain with repeater 2500 meters 205 meters 200 meters Slot time 512 bit times 512 bit times 512 bit times Interframe Gap 9.
31 3-3. Flow Control Flow control is a mechanism to tell the source device stop sending frames for a specified period of time designated by target device until the PAUSE time expires. This is accomplished by sen ding a PAU SE frame from target device to source device.
32 Frame Reception In essence, the frame reception is t he same in both operations of half duplex and full duplex, except that full-duplex operat ion u ses two buffers to transmit and receive the frame independently. The receiv ing no de always “listens” if there is traffic running over the medium when it is not receiving a frame.
33 What if a VLAN tagging is applied? VLAN tagging is a 4-byte long data im mediately following the MAC so urce address. When tagged VLAN is applied, t he Ethernet frame structure will have a little change shown as follows. Only two fields, VLAN ID and Tag c ontrol information are different in comparison with the basic Ethernet frame.
34 The maximum length of the extension is equal to the quantity (slotTime - minFrameSize). The MAC continues to monitor the medium for collisions while it is transmitting extension bits, and it will treat any collision that occurs after the threshold (slotTime) as a late collision.
35 Extended Distance Limit ations: The diameter of a half-duplex LAN se gment is determined by its maximum propagation delay time. For example, in 10M LAN, the most distance of a LAN segment using cable i s 2500 meters an d 185 meters when using coaxial cable.
36 How does a switch operate? A Layer 2 switch uses some features of the Data Link layer in OSI model to forward the p acket to destination port(s ). Here we introduce some important features of a switch and how they work.
37 Mac address aging There is a field in MAC address ta ble us ed to put the entry’s Age time which determines how long a MAC entry can reside in a switch. The age time is refreshed when a packet with that SA arrives. Usually , the age time is programmable.
38 3-5. V irtual LAN What is a VLAN? It is a subset of a LAN. Before we discuss VLAN, we must un derstand what LAN is. In general, a LAN is composed of different physical n etwork segment s bridged by switches or bridges which attach to end stations in the same broadca s t domain.
39 Now we apply VLAN technology to configure the system shown as the figure above. We ca n partition the users into the dif ferent logical networks which have their own broadcast domain. The traf fic will not disturb among these logical networks. The users 1x (x denotes a ~ d) are members of VLAN 1.
40 There are many types of VLAN appli ed. The most popular ones are port- based VLAN, tag-ba sed VLAN and protocol-based VLAN. Port-based VLAN Some physical port s are configured as members of a VLAN. All stations attached on t hese ports can communica te with each other .
41 VLAN-tagged frame: An Ethernet frame, carrying VLAN tag field, contains VLAN identification without the value of 0 and 4095, and priority information. Priority-tagged frame: An Ethernet frame, carrying VLAN tag fiel d, contains VLAN identification with the value of 0 and priority information.
42 Ingress Rule: Each packet received by a VLAN-aware bridge will be classified t o a VLAN. The classification rule is described as follows . 1. If the VID of the packet is null (VID=0 ) or this packe t is an untagged packet: a. If there are still some other ways(e.
43 How does a T agged VLAN work? If the ingress filtering is enabled and when a packet is receive d, the VLAN bridge will first check if the VID of the packet present s. 1). If the packet has a non-zero VID, t he VLAN bridge will apply this VID as the VLAN ID of the packet in the network.
44 3-6. Link Aggregation Basically , Link Aggregation is to aggregate the ban dwidth of more than one port to an assigned logical link. This hig hly increases total bandwid th to the targeted device. There is more than one Link Aggreg ation technology in many vendors’ switch products al ready , wh ich may cause the problem of interoperability .
45 T erminology Link Aggregation: It is a method to have multiple physical links with the same media and speed bundled to be a logical link forming a Link Aggregation Group wit h a group ID. With the viewpoint of MAC client, each Link Aggregation Group is an ind ependent link.
46 4. Operation of Web-based Management This chapter instruct s you how to configure and manage the 24-Port GbE Web Smart Switch through its web user interface and how to access and manage 20 10/100/1000Mbp s TP Port and 4 Gigabit TP/SFP Fiber dua l media port.
47 Fig. 4-1 4-1. Web M anag ement Home Overview After you login, the switch sho ws you t he system stat us information as Fig. 4- 2. This is the default page and it displays you with the basic informa.
48 • The Information of Page Layout ⎯ On the top, it shows the front panel of the swit ch. In the front panel, green LEDs on to show linked ports in function; for unlinked ports the LEDs will be OFF . For the optional modules, the slot will show only a cover plate if no module exist s.
49 4-2. Configuration Fifteen functions, including System Co nfi guration, Ports Configuration, VLAN Mode Configuration, VLAN Group Configuratio n, Aggre gation , LACP , RST P , 802.1X, IGMP Snooping, Mirror , QoS, F ilter , Rate Limit, S torm Control and SNMP are contained in this function folder for system and n etwork management.
50 4-2-1. System Configuration System configuration is one of the mo st import ant configurations in the switch. Without proper setti ngs, network administrator w ill not be able to manage or view the status of this device.The switch sup ports manual IP addre ss setting .
51 Active Subnet Mask: Show the active subnet mask of this switch. Active Gateway: Show the active gateway of this switch. DHCP Serv er: Show the IP address of the DHCP server . Default: 0.0.0.0 Lease T i me Left: Show the lease time left of DHCP client.
52 Subnet mask is used to set the subnet mask value, which should be the same value as that of the other dev ices resided in the same network it attaches. For more information, please also see the Section 2-1-4 “IP Address Assignment” in this manual.
53 4-2-2. Port Configuration Function name: Ports Configu r ation Function description: Ports Configuration is ap plied to ch ange the settings of each port. In this configuration function, you can set/reset the following parameters, Mode and Flow Control.
54 Fig. 4-4 Port Configuration 4-2-3. VLAN Mode Configuration The switch support s Port-based VLAN and T ag-based VLAN (802.1q) . Support 24 active VLANs and VLAN ID 1~ 4094. VLAN configuration is used to partition your LAN into small ones as your demand.
55 T ag-based: T ag-based VLAN identifies it s member by VID. This is quite different fro m port-based VLAN. If there are any more rules in ingress filtering list or egress filtering list, the packet will be screened with more filtering criteria to dete rmine if it can be forwarded.
56 4-2-4. VLAN Group Configuration Function name: VLAN Group Configuration Function description: It shows the existing information of VL AN Group s List and the maintenance that can be done to them, i.e. modify and delete. User also can add a new VLAN group by inputting a new VLAN name and VLA N ID.
57 Add Group: Create a new port-based VLAN or t ag-based VLAN, which depends on the VLAN mode you choose in VLAN mode function. Fig. 4-8 Add or Remove VLAN Member Delete Group: Just tick the c heck box ( ; ) beside the ID, then press the <Delete> button to delete the group.
58 4-2-5. Aggregation The Aggregation (Port T runking) Confi guration is used to configure the settings of Link Aggregation. Y ou can bundle more than one port with the same speed, full duplex and the.
59 4-2-6. LACP The switch support s the link aggr egation IEEE802.3ad sta ndard. This standard describ es the Link Aggregate Contro l Protocol (LACP), which i s a protocol that dynamically creates and manages trunk group s.
60 4-2-7. RSTP RSTP detect s and breaks network loop s and provides backup links betwe en switches, bridge s or routers. It allows a switch to interact with other RS TP – compliant switches in your netwo rk to ensure that only one path exists between any two stations o n the network.
61 RSTP Port Configuration Function description: Enable or disable RSTP proto c ol on t he port which being sele cted and set path cost. Parameter description: Protocol Enabled: Just tick t he check box ( ; ) beside the port x to enable RSTP protocol, then press the <Apply > b utton to apply .
62 4-2-8. 802.1X 802.1x port-based network access co ntrol provides a method to restrict users to access network resour ces via authenticat ing user ’s information. This re stricts users from gaining access to the network resource s through a 802.1x-enabled port without authentication.
63 While in the authentication process, th e message packet s encapsulated by Extensible Authentic ation Protocol over LA N (EAPOL), are exchanged between an authenticator P AE and a supplicant P AE. The Authenticato r exchanges the messag e to authentication server using EAP encapsulatio n.
64 1. On the initial stage, the su pp licant A is unauthenticated and a port on switch acting as an authenticato r is in unauthorized st ate. So the access is blocked in this st age. 2. Initiating a session. Eithe r authenticator or sup plicant can initiate the message exchange.
65 10. When the supplicant issue an EAP-Logof f message to Authentication server , the port you are using is set to be unauthorized.. The 802.1X “Enabled” is the type of aut hentication supported in the switch.
66 Mode: Enable or disable 802.1X function. RADIUS IP: RADIUS server IP address for authentication. Default: 0.0.0.0 RADIUS UDP Port: The port number to be used comm unicate with RADIUS se rver for the authentication service. The valid value ranges 1-65535.
67 Force Reinitialize: Force the subscriber to reinitialize connection to the port. Force Reinitialize All: Force Reinitialize for all port s at once. ---------------- continue ----------------- Fig. 4-16 802.1X Configuration S tatistics: Choose the port which you want to sh ow of 802.
68 Fig. 4-17 802.1X S tatistics Function name: 802.1x Parameters Function description: In here, user can enable or disabl e Re authentication function and specify how often a clien t has to re-enter his or her u sername and password to st ay connected to the port.
69 4-2-9 IGMP Snooping Function name: IGMP Snooping Config uration Function description: IGMP snoopi ng enable group multicast traffic to only be forwarded to port s that are members of that grou p; thus allowing you to significa ntly reduce multicast traffic p assing through the switch.
70 4-2-10. Mirror Configuration Function name: Mirror Configuration Function description: Mirror Configuration is to monitor the tra ffic of the network, this switch supports one port mirror multi ports. For example, we assume that Port A and Port B are Source Ports and Po rt C is Mirror Port respective ly.
71 4-2-1 1. QoS(Quality of Service) Configuration The switch offers powerful QoS function. This function supports VLAN-tagged priority that can make preced ence of 8 pr iorities, and DSCP(Differentiated Services Code Point) on Layer 3 of network framework.
72 Function name: QoS Configuration Function description: When you want to use QoS functio n, please select QoS Mode through th e drop-down menu in advance you can choose from 802.1p Priorit y or DSCP Priority to take effect. In this function, you can disabl e QoS Mode and choose any other Priority Control and enable i t, such as 802.
73 Function name: DSCP Setting Function description: In the late 1990s, the IETF redefined the meaning of the 8-bit SER VICE TYPE field to accommodate a set of diff erentiated services (DS).
74 4-2-12 Filter Function name: Filter Configuration Function description: This function can set manageme nt’s source IP Address to each port, simple and raise safety . After completing the function’s setting, press <Apply> button to have this fu nction in effect.
75 Fig. 4-24 Filter Configuration.
76 4-2-13 Rate Limit Function name: Ingress and Egress Ban dwidth Setting Function description: Ingress and Egress Ban dwidth Setting function is used to set up the limit of Ingress or Egress band width for each po rt. Parameter description: Ingress: Set up the limit of Ingress bandwidth for the port you choose.
77 4-2-14 Storm Control Function name: S torm Control Function description: S torm Control is used to block unnece ssary frames of the multicast and broadcast that would have reduce d the switch’ s performance.
78 Parameter description: ICMP Rate: T o enable the ICMP S torm cap ability . The user can use drop-do wn menu to select number of frames. Default is No Limit. The setting range is 1k~1024k per second. Learn Frames Rate: T o enable the Learn Frames S torm capability .
79 4-2-15 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can m anage the Managed devices equipped with SNMP agent, provided that the Management In formation Base (MIB) is installed correctly on the managed devices.
80 Default SNMP function: Disable Default community name for Get: public Default community name for Set: private Default community name for Trap: public Fig.
81 4-3. Monitoring There are six functions under in the moni toring function. S tatistics Overview Detailed S tatistics Monitorin g LACP S tatus RSTP S tatus IGMP S tatus Pin g.
82 4-3-1. St atistics Overview The function of Statistics Overview coll ects any information and p r ovides the counting summary about the traf fic of the port, no matter the packet is good or bad. In the Fig. 4-25, the window can show all ports’ counter information at the same time.
83 4-3-2. Det ailed St atistics Function name: Detailed Statistics Function description: Display the detailed counting number of each port’ s traffic. In the Fig. 4-26, the window can show all cou nter information each port at one time. Parameter description: Rx Packets: The counting number of the p acket received.
84 Tx Broad- and Multicast: Show the counting number of the t r ansmitted broadcast with multicast packet. Tx Error Packet s: Show the counting number of the received error p ackets. Rx 64 Bytes: Number of 64-byte frames in good a nd bad packets received.
85 Rx 65-127 Bytes: Number of 65 ~ 126-byte frames in good and bad packets received. Rx 128-255 Bytes: Number of 127 ~ 255-byte frames in good and ba d packets received. Rx 256-51 1 Bytes: Number of 256 ~ 511-byte frames in good and ba d packets received.
86 Tx Collisions: Number of collisions transm itting frames experienced. Tx Drops: Number of frames dropped due to excessive collision, late collision, or frame aging.
87 4-3-3. LACP S tatus Function name: LACP S tatus Function description: Display the LACP status. In the Fig. 4-30, the window can show LACP information and statu s for each port at one time. Parameter description: LACP Aggreg ation Overview: Show the group/port st atus.
88 4-3-4. RSTP S tatus Function name: RSTP S tatus Function description: Display the RSTP st atus. In the Fig. 4-28, the window can show the VLAN bridge information and st atuses of 1~24 ports. Parameter description: RSTP VLAN Bridge Overview: VLAN Id: Show the VLAN Id.
89 Fig. 4-31 RSTP S tatus.
90 4-3-5. IGMP S tatus Function name: IGMP S tatus Function description: Display the IGMP status. In the Fig. 4-29, the window can show VLAN ID for each multicast group. Parameter description: VLAN Id: Show VLAN Id for each multicast group. Querier: Show the group membership queri es status.
91 Fig. 4-32 IGMP S tatus.
92 4-3-6. Ping St atus Function name: Ping S tatus Function description: T o setting up the target IP address for ping function of ICMP protocol and display the pinging st atus. In the Fig. 4-30, the window can show t he pinging information. Parameter description: Ping Parameters: T arget IP address: Set up a T arget IP address to ping.
93 Fig. 4-33 Ping.
94 4-4. Maintenance There are five functions under the maintenan ce section. Wa r m R e s t a r t Factor y Default Maintenance Software Up g rade Confi g uration File Transfer Lo g out.
95 4-4-1. W arm Restart We offer you many ways to reboot the switch, toggle the power, hardware reset and software reset. Y ou can press the RESET butt on in the front panel to reset the switch to its default setting. Afte r upgrading software, you must reb oot to have the new configuration ta ken effect.
96 4-4-2. Factory Default Function name: Factory Default Function description: Factory Default provides the function to retrieve default settings and repl ace current configuration. Except the IP address setting, all settings will be restored to the factory default values when “Factory Default” function is performed.
97 4-4-3. Sof tware Upgrad e Function name: Software Upg r ade Function description: Browse through your PC for a newer ve rsion of software pre-saved on your PC and upgrade the switch.
98 4-4-4. Configuration File T ransfer Function name: Configuration File Transfe r Function description: Backup the switch’s config uration file on to your computer to prevent acci dental data lost.
99 4-4-5. Logout Besides the auto logout function as we mentioned in the system configuration section, the swit ch also allows the user to logout manually by performing Logout function. Function name: Logout Function description: The switch allows you to logout the sy stem to preve nt unwanted accesses by other users without permi ssion.
100 5. Maintenance 5-1. Resolving No Link Condition The possible cause s for a no link LED st atus are as follows: z The attached device is not powered on z The cable may not be the correct type or is faulty z The installed building p remise cable is faulty z The port may be faulty 5-2.
101 Appendix A Technical Specifications Features • 20 (10/100/1000Mbp s) Gigabit Ethernet (TP) switching port s are compliant with IEEE802.3, 802.3u, 802.3z and 802.3ab. • 4 Gigabit TP/SFP fiber are dual media ports with auto detected function. • Non-blocking store-and-forward sh ared-memory Web-Smart switched.
102 Hardware Specifications St andard Compliance: IEEE802.3/802.3ab / 802.3z / 802.3u / 802.3x Network Interface: Configuration Mode Connector Port 10/100/1000Mbp s Gigabit TP NW ay TP (RJ-45).
103 Diagnostic LED: System LED : Power Per Port LED: 10/100/1000M TP Port 1 to 24 : LINK/ACT , 1 0/100/1000Mbp s 1000M SFP Fiber Port 21,22,23,24 : SFP(LINK/ACT) Power Requirement : AC Line V .
104 Management Software Specifications System Configuration Auto-negotiation support on 10/100Base-T X ports, Web brow s er can set transmission speed (10/100Mbps) and operat ion mode (Full/Half duplex) on each port, ena ble/disable any por t, set VLAN group, set T runk Connection.
105 Appendix B MIB Specifications MIB II Enterprise MIB brief description is listed as below . PRIV A TE-ES-5240G+-MIB DEFINITIONS ::= BEGIN IMPORTS mib-2, DisplayS tring,ifIndex FROM RF C1213-MIB ent.
Un point important après l'achat de l'appareil (ou même avant l'achat) est de lire le manuel d'utilisation. Nous devons le faire pour quelques raisons simples:
Si vous n'avez pas encore acheté Edimax Technology ES-5240G+ c'est un bon moment pour vous familiariser avec les données de base sur le produit. Consulter d'abord les pages initiales du manuel d'utilisation, que vous trouverez ci-dessus. Vous devriez y trouver les données techniques les plus importants du Edimax Technology ES-5240G+ - de cette manière, vous pouvez vérifier si l'équipement répond à vos besoins. Explorant les pages suivantes du manuel d'utilisation Edimax Technology ES-5240G+, vous apprendrez toutes les caractéristiques du produit et des informations sur son fonctionnement. Les informations sur le Edimax Technology ES-5240G+ va certainement vous aider à prendre une décision concernant l'achat.
Dans une situation où vous avez déjà le Edimax Technology ES-5240G+, mais vous avez pas encore lu le manuel d'utilisation, vous devez le faire pour les raisons décrites ci-dessus,. Vous saurez alors si vous avez correctement utilisé les fonctions disponibles, et si vous avez commis des erreurs qui peuvent réduire la durée de vie du Edimax Technology ES-5240G+.
Cependant, l'un des rôles les plus importants pour l'utilisateur joués par les manuels d'utilisateur est d'aider à résoudre les problèmes concernant le Edimax Technology ES-5240G+. Presque toujours, vous y trouverez Troubleshooting, soit les pannes et les défaillances les plus fréquentes de l'apparei Edimax Technology ES-5240G+ ainsi que les instructions sur la façon de les résoudre. Même si vous ne parvenez pas à résoudre le problème, le manuel d‘utilisation va vous montrer le chemin d'une nouvelle procédure – le contact avec le centre de service à la clientèle ou le service le plus proche.