BEC V8E2G User manual

-1-
BEC V8E2G
8-Port VDSL2 + 2 Gigabit Combo
VDSL2 30a CO Switch
User Manual

-2-
The information in this guide may be changed without notice. The
manufacturer assumes no responsibility for any errors which may appear in
this guide.
Ethernet is a trademark of XEROX Corporation. Microsoft, Windows and
Windows logo are trademarks of Microsoft Corporation.
Copyright 2010.All rights were reserved. No Part of the contents of this guide
maybe transmitted or reproduced in any form or by any means without the
written permission of BEC Technologies, Inc..
The revision date for this guide is Jan. 2010,
Version 1.0I
FCC Statement
This product has been tested and found to comply with the limits for a Class A
digital device pursuant to Part 15 of FCC Rules. These limits are designed to
provide reasonable protection against such interference when operating in a
commercial environment. This equipment generates uses and can radiate
radio frequency energy, and if not installed and used according to the
instructions, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause interference,
in which the case user, at his or her own expense will be required to take
whatever measures to correct the interference.
CE Mark Warning
This is a Class A product. In a domestic environment, this product may cause
radio interference in which case the user may be required to take adequate
measures.

-3-
Contents
1. Introduction................................................................................................4
1.1. Package Contents............................................................................4
1.2. How to Use this Guide .....................................................................4
2. Installation..................................................................................................5
2.1. Product Description Overview..........................................................5
2.2. Switch Front and Rear Panel ...........................................................5
2.3. LED Function ...................................................................................6
2.4. Installing the Switch .........................................................................6
2.4.1. Pre-Installation Considerations............................................7
2.4.2. Desktop or Shelf Mounting ..................................................7
2.5. Rack- Mount Placement...................................................................7
3. Configuration .............................................................................................9
3.1. Login ................................................................................................9
3.1.1. Power-On Self-Testing ........................................................9
3.1.2. Console Login .....................................................................9
3.1.3. Login with a Web Browser...................................................9
3.2. Web User Interface ........................................................................10
3.2.1. Home.................................................................................10
3.2.2. Administration....................................................................10
3.2.3. L2 Features .......................................................................23
3.2.4. Access Control List............................................................41
3.2.5. Security .............................................................................46
3.2.6. QoS ...................................................................................49
3.2.7. Monitoring..........................................................................50
3.2.8. Profile configuration...........................................................51
3.2.9. Reset System ....................................................................53
3.2.10. Reboot...............................................................................53
4. Specifications ..........................................................................................54
4.1. Cable specifications .......................................................................54
4.2. Technical Specifications ................................................................56
4.2.1. Software Specification.......................................................56
4.2.2. Hardware specification ......................................................57
4.3. Environments Specification............................................................58
4.4. Standard Conformance..................................................................58
5. Warranty statement .................................................................................59
6. Product Support & Contact.....................................................................59

-4-
1. Introduction
Thank you for choosingVDSL2 Product
.
These products are cost-effective
switching solution idea for small business and the network edge. It provides
the Quality of Service (QoS) features, like 802.1p, DSCP and Rate Control etc,
to ensure the traffic is prioritized properly to deliver real-time applications like
voice and video and also have a good control in network bandwidth usage.
The 802.1Q feature enables you separate the network traffic easily and quickly.
The Network Security features, like ACL, Port Security, Storm Control, 802.1X
and Management IP List etc, enables you to prevent unauthorized access to
company network and block intentional or inadvertent network traffic. The
Spanning Tree Protocol (STP) provides you a loop-free network. The IGMP
snooping enables you to have efficient network usage in IP multicast
environment. The one-to-one or many-to-one Port Mirroring feature of the
switch enables you to monitor the traffic on the network. With these features,
you can build or expand your network quickly and easily.
1.1.Package Contents
The package contains the following:
> One VDSL2 Switch
> One RS-232 cable
> One power cord/adapter
> One set of brackets.
> One CD for user manual and utilities.
If any of the listed items is missing or damaged, please contact the place of
purchase.
1.2. How to Use this Guide
This user guide is structured as follows:
Chapter 2, Installation explains the functions of the switch and how to
physically install it.
Chapter 3, Configuration explains how to set up and modify the configuration
of the switch.
Chapter 4, Specifications contains information about the cables, and the
technical specifications of the switch.
Appendices include the Warranty Statement. Read them as necessary.

-5-
2. Installation
This chapter describes the function of the VDSL2 switch components and
shows how to install it on the desktop or shelf. Basic knowledge of networking
is assumed. Read this chapter completely before continuing.
2.1.Product Description Overview
The product support VDSL2,
supports 802.1Q VLAN, QoS, 802.1d / 1w/ 1s
Spanning Tree Protocol, 802.1x, Port Security, Port Mirroring, IGMP Snooping,
SNTP, Storm Control, Rate Control, SNMP and RMON, Link Aggregation
(IEEE 802.3ad)
etc. features.
2.2. Switch Front and Rear Panel
The front panel of 8-Port VDSL2 + 2 Gigabit Combo VDSL2 30a CO Switch
has 8 VDSL2 ports at the left, 2 Gigabit SFP slots and two 2 Gigabit copper
ports at the right. The product name is at the top on the left. Figure 2.2.2a
shows a front panel of this switch.
The rear panel has a power connector, and figure 2.2.2b shows a rear panel of
the switch.
Table 2.2.2c shows the port function of the switch.
Figure 2.2.2a Front Panel
Figure 2.2.2b Rear Panel
Table 2.2.2c Port Function
Port Function
VDSL2 Connect to VDSL2 interface.
RJ45 These 2 RJ-45 ports connect to network devices such as PCs,
print servers and other network peripherals at 1000 Mbps.
SFP These 2 mini GBIC ports allows you to insert a SFP module for
1000Mbps fiber connection
Console
This is where you will connect RS232 console cable.
Power This is where you will connect the AC power adapter.

-6-
2.3. LED Function
This section explains the definition of the Switch’s LEDs on the front panel.
Group LED Color Function
System
System
Green
On : When the power supplied to the system
Off : Power off
Blinking: While system Booting /System
Self-Test / Firmware upgrade/Error.
VDSL port
Link/Act
Green
Lights: When the link through the port is
successfully established.
Off : No-link detected for the port
Blinks: When the port is activating
transmitting data.
Link/Act
Green
Lights: When the link through the port is
successfully established.
Off: for no-link detected for the port
Blinks: When the port is activating
transmitting data.
GE-LED
G1/G2
Speed
Amber
Lights: Link at 1000Mbps
Off: Link at 100/10Mbps or No Link
2.4. Installing the Switch
This section describes how to install and make connection to your VDSL2
Switch. The following diagrams shows the typical network configuration,
Read and perform the following procedures to install the switch,

-7-
2.4.1.Pre-Installation Considerations
Gigabit Considerations:
If you will use the switch for Gigabit applications, keep in mind that the
maximum UTP cabling length of Category 5e cable is 328 feet (100 meters).
Positioning the switch:
When choosing a location for the switch, observe the following guidelines:
Keep enough ventilation space between the switch and the surrounding
objects.
Keep cabling away from sources of electrical noise, power lines, and
fluorescent lighting fixtures.
Do not stack free-standing switch more than four units high.
2.4.2.Desktop or Shelf Mounting
To install the switch on a desktop or shelf, simply complete the following steps:
Step 1 Place the switch on a desktop or shelf near an AC power source.
Step 2 Keep enough ventilation space between the switch and the surrounding
objects.
Note: When choosing a location, keep in mind the environmental restrictions
discussed in Chapter 4, Specifications.
Step 3 Connect the switch to network devices.
A. Connect one end of a standard network cable to the RJ11/RJ-45
ports on the front of the switch.
B. Connect the other end of the cable to the network devices such as
printer servers, VoIP, Video, workstations or routers.
Step 4 Supply power to the switch.
A. Connect one end of the power cable to the switch.
B. Connect the power cube end of the power cable to a standard wall
outlet.
2.5. Rack- Mount Placement
Before mounting the Switch, please read the following instructions carefully,
A) Elevated Operating Ambient - If installed in a closed or multi-unit rack
assembly, the operating ambient temperature of the rack environment may be
greater than room ambient. Therefore, consideration should be given to
installing the equipment in an environment compatible with the maximum
ambient temperature (Tma) specified by the manufacturer.
B) Reduced Air Flow - Installation of the equipment in a rack should be such
that the amount of air flow required for safe operation of the equipment is not
compromised.
C) Mechanical Loading - Mounting of the equipment in the rack should be
such that a hazardous condition is not achieved due to uneven mechanical
loading.
D) Circuit Overloading - Consideration should be given to the connection of
the equipment to the supply circuit and the effect that overloading of the
circuits might have on over current protection and supply wiring. Appropriate
consideration of equipment nameplate ratings should be used when
addressing this concern.

-8-
E) Reliable Earthing - Reliable earthing of rack-mounted equipment should
be maintained. Particular attention should be given to supply connections
other than direct connections to the branch circuit (e.g. use of power strips)."
To mount the Switch in any standard-sized, 19-inch wide, 1U high rack, please
follow these instructions:
Place the Switch on a hard flat surface with the front panel facing you.
Attach a rack–mount bracket to one side of the Switch with the supplied
screws. Then attach the other bracket to the other side. (Figure 2.5.1)
Figure 2.5.1
Make sure the brackets are properly attached to the Switch.
Use the appropriate screws (not included) to securely attach the brackets to
your rack. (Figure 2.5.2)
Figure 2.5.2

-9-
3. Configuration
3.1.Login
3.1.1.Power-On Self-Testing
The power-on self-testing is running immediately after the switch system is
powered up. The self-testing program diagnoses the hardware components of
a switch system. After hardware tests are all passed, the system will detect
and display the module slot status and start the initializations. The system will
be in ready state while the prompt is showing up.
3.1.2.Console Login
When you connect to the switch with a terminal emulation program, refer to the
information of: Baurate (bits/sec) 115200; Data Bits 8
,
Parity Check none ;Stop
Bits 1. Type “cli” if you want to log in the configuration of the switch .Enter a
user name and password to login to access the switch. The default user name
is “admin” and the password is empty.
3.1.3.Login with a Web Browser
When you connect to the switch through a web browser, a login screen is
displayed. Enter a user name and password to login to access the switch.

-10-
Items Option Default Value
User name Max:10, Min:0 characters, case sensitive admin
Password Max:10, Min:0 characters, case sensitive NULL
3.2. Web User Interface
3.2.1.Home
After user login verification, the homepage of the switch will be shown as
below.
3.2.2.Administration
There are many management functions can be set or performed if you expand
the submenus of Administrator in MENU area. These functions are:
IP Address
Switch Setting
Console Port Info
Port Configuration
SNMP Configuration

-11-
Syslog Setting
Firmware Update
Configuration Backup
3.2.2.1. IP Address Setting
User can see and modify the IP address, subnet mask and default gateway in
this page, then clicks “Apply” button to confirm (save) the settings, then the
switch reboot must be done to activate the updates. The IP address can be
statically set or dynamically be assigned by the DHCP Server.
NOTE: If any of the value is changed in this field, reboot is necessary.
3.2.2.2. Switch Setting
Basic
All information in Basic is read only, user can’t modify the contents.
Model Name: Display the switch’s model name.
Description: Display the name of device type.
MAC Address: The unique hardware address assigned by manufacturer
(default)
Firmware Version: Display the switch’s firmware version.

-12-
Module Info
All information in this field is read only; user can’t modify its contents. It is only
to display the module port information.
MISC CONFIG
This page is to provide miscellaneous settings:
MAC Address Age-out Time: Type the number of seconds that an
inactive MAC address remains in the switch's address table. The valid
range is 6~1572858 seconds. Default is 300 seconds. The value is a
multiple of 6.
Turn on port interval: Set the interval time between turning off and
turning on when flooding CPU on this port. That’s to say, when flooding
CPU’s rate is faster than 3M this port will be disable, After turn on port
interval time later it will be enable automatically.
Broadcast Storm Filter Mode: To configure broadcast storm control,
enable it and set the upper threshold for individual ports. The threshold is
the percentage of the port's ingress bandwidth used by broadcast traffic.
When broadcast traffic for a port rises above the threshold you set,
broadcast storm control becomes active. The valid threshold value are 1/2,
1/4, 1/8, 1/16, and off.
Broadcast Storm Filter Packets Select: To select broadcast storm Filter
Packets type. If no packets type by selected, mean cannot filter any
packets .The Broadcast Storm Filter Mode will show OFF.
Collisions Retry Forever: In half duplex, collision-retry maximum is 16,
32, or 48 times and packet will be dropped if collisions still happen. In
default (Disable), system will retry forever if collisions happen.
Hash Algorithm: Select Hash Algorithm.
IP/MAC Bing: Enable or disable SMAC and SIP binding.
802.1x Protocol: Enable or disable 802.1 x protocols.
NOTE: Before you enable 802.1x or IP/MAC Binding, you should enable them
in this page

-13-
3.2.2.3. Console Port Information
Console is a standard UART (RS-232) interface to communicate with serial
port. User can use windows HyperTerminal program to link the switch .Refer to
following information, user can’t modify the contents.

-14-
3.2.2.4. Port Configuration
Port Controls
This webpage is to provide the display and modification for the port settings.
Use the dropdown in Port field to select one or multiple ports. The port settings
for the selected port(s) will be displayed in web. Use the other control fields in
the upper area to modify the port settings for the selected port(s). Press Apply
to save and activate the port settings.
State: User can enable or disable this port .When you disable this port, it
will not forward any packet.
Negotiation: User can set auto negotiation mode is Auto, Nway (specify
the speed/duplex on this port and enable auto-negotiation, in this model
link partner can be linked in full duplex and the device will link the partner
with the max capability); Force of per port: in this model the device’s
speed and duplex must be the same as the partner’s, if there is no auto
negotiation.
Speed: User can set 100Mbps or 10Mbps speed on Port1~Port8. User
can set 1000Mbps, 100Mbps or 10Mbps speed on mod1~mod2 (depend
on module card mode).
Duplex: User can set full-duplex or half-duplex mode of per port.
Flows control:
Full: User can set flow control function is enable or disable in full mode.
Half: User can set backpressure is enable or disable in half mode.
Rate Control: port1 ~ port 8, supports by-port ingress and egress rate
control. For example, assume port 1 is 10Mbps, users can set its effective
egress rate at 1Mbps and ingress rate at 500Kbps. Device will perform
flow control or backpressure to confine the ingress rate to meet the
specified rate.
Ingress:Type the port effective ingress rate. The valid range is 0 ~ 800 in
port 1~port 8, the unit is 128Kbps.
0: disable rate control;
1 ~ 800: valid rate value.
The Giga port’s valid range is 0 ~ 8000.
Egress:Type the port effective ingress rate. The valid range is 0 ~ 800 in
port 1~port 8, the unit is 128Kbps.
0: disable rate control;
1 ~ 800: valid rate value.
The Giga port’s valid range is 0 ~ 8000.
Port Security: A port in security mode will be “locked” without permission
of address learning. Only the incoming packets with source MAC already
existing in the address table can be forwarded normally. User can disable
the port from learning any new MAC addresses, then use the static MAC
addresses screen to define a list of MAC addresses that can use the
secure port. Enter the settings, and then click Apply to change on this
page.
BSF: User can disable/Enable port broadcast storm filtering option by port.
The filter mode and filter packets type can be select in Switch Setting >
Misc Config page.
Jumbo Frame: User can disable/Enable port jumbo frame option by port.
When port jumbo frame is enable, the port forward jumbo frame packet

-15-
Port Sniffer
The Port Sniffer (mirroring) is a method for monitor traffic in switched networks.
Traffic through a port can be monitored by one specific port. That is, traffic
goes in or out a monitored port will be duplicated into sniffer port.
Sniffer Type: Select a sniffer mode: Disable / Rx / TX / Both.
RX: Packets goes in the Monitored port will be duplicated into analysis
port.
TX: Packets goes out the monitored port will be duplicated into analysis
port.
Both: Packets goes in or out the monitored port will be duplicated into
analysis port
Analysis (Monitoring) Port: It’ means Analysis port can be used to see
the traffic on another port you want to monitor.
Monitored Port: The port you want to monitor. The monitor port traffic will
be copied to Analysis port. You can select one monitor port in the switch.
User can choose which port that they want to monitor in only one sniffer
type.
Note: The Analysis port is dedicated for monitoring usage. That is to say, the
ordinary port function will be unavailable on Analysis port.

-16-
Protected Port
There are two protected port groups. Ports in different groups can't
communicate each other.
In the same group, protected ports can't communicate each other, but can
communicate with unprotected ports. Unprotected ports can communicate with
any ports, including protected ports. In default, all ports are in Group1 and not
protected.
3.2.2.5. SNMP Configuration
Any Network Management platform running the Simple Network Management
Protocol (SNMP) can manage the switch; The SNMP is a Protocol that
governs the transfer of information between management station and agent.
NMS manages an SNMP-enabled network. It uses SNMP to manage and
monitor the network devices in the network. NMS can be a server that
manages the network or an application performing management function on a
device. NMS can send a request to an agent to query or modify one or more
variables. At the same time, NMS can receive traps sent by the agent to obtain
the status of the managed device. Currently, SNMP includes three versions:
SNMPv1, SNMPv2c and SNMPv3.
SNMPv1
SNMPv1 is the first version of the SNMP protocol, providing a minimum
network management function. The Structure of Management Information
(SMI) and MIB of SNMPv1 are rather simple and have many security defects.
SNMPv1 uses community name for authentication. A community name plays a
similar role as a password and can be used to control access from NMS to

-17-
Agent. SNMP packets with community names that do not pass the
authentication on the device are simply discarded.
SNMPv2c
SNMPv2c also uses community name for authentication. Compatible with
SNMPv1, it extends the functions of SNMPv1. SNMPv2c provides more
operation modes such as GetBulk; it supports more data types such as
Counter32; and it provides various error codes, thus being able to distinguish
errors in more detail.
SNMPv3
By adopting User-based Security Model (USM) and View-based Access
Control (VACM) technologies, SNMPv3 enhances security. USM offers
authentication and privacy functions; while VACM controls users’ access to
specific MIBs.
System options
User can define a name, location, and contact person for the switch or
enable/disable the SNMP function in this page .Fill in the system options data,
and then click Apply to update the changes. Name/ Location/ Contact: when
the network management station connect the agent correctly the “name”,
“location” and “contact” will be displayed in the SNMP tool . This information is
the description of the SNMP agent. Of course, we can modify this information
on the network management station. SNMP Status: Enable/Disable SNMP
Function
Community strings
If network management station wants to connect the SNMP agent with SNMP
v1 or SNMP v2, the community string will be served as passwords to visit the
MIB-object Information and the privilege of this access will be set by selecting
“RO” and “RW”. RO meats you can only read the MIB; RW meats you can read
and set the MIB.

-18-
Trap Manager
Trap Manager is a management station that receives traps, the system alerts
generated by the switch. If no trap manager is defined, no traps are issued.
Create a trap manager by entering the IP address of the station and a
community string.
SNMPv3 Group
The group will be used in V3 access. In SNMP v3 group you can indicate
group name security model and group security
SNMPv3 View
V3 View only used on NNMP v3 .When the network management station visit
the SNMP agent, the V3 View is used to limit the privilege to visit the
Management Information Base. You can only view the MIB information (for
example: system name, interface) which included in the view you created.
Include/excluded indicate that the device feature OID include the Subtree ID or
not. View mask: A Subtree OID used with a View mask defines a view Subtree.
A View mask is in hexadecimal format. After it is converted to binary bits, each
bit corresponds to a node of the OID, where:
1 means full match, that is, the OID of the MIB object to be accessed must
be identical to the Subtree OID.
0 means wildcard match, that is, the OID of the MIB object to be accessed
can be different from the Subtree OID.
For example, provided the View mask 0xDB (11011011 in binary) and the
Subtree OID 1.3.6.1.6.1.2.1, their relationship is as shown as following. The
view determined by them includes all the nodes under the Subtree whose OID
is 1.3.*.1.6.*.2.1, where * represents any number.
Subtree OID 1 3 6 1 6 1 2 1
Subtree mask 1 1 0 1 1 0 1 1

-19-
SNMPv3 Access
SNMPv3 Access control users’ access to management information. Only a
user with access rights can manage the objects. When a user accesses the
management information, he can access only the objects defined by the
corresponding MIB view.
SNMPv3 USM-User
USM introduces the concepts of username and group. You can set the
authentication and privacy functions. The former is used to authenticate the
validity of the sending end of the authentication packets, preventing access of
illegal users; the latter is used to encrypt packets between the NMS and Agent,
preventing the packets from being intercepted. USM ensures a more secure
communication between SNMP NMS and SNMP Agent by authentication with
privacy, authentication without privacy, or no authentication no privacy

-20-
3.2.2.6. Syslog
This system supports syslog sent to a remote syslog server. Currently system
will do syslog for 3 events: cold start, warm start And link change. In this page,
user needs to setup the following parameters to activate the syslog: Syslog
server IP: The IP address of remote syslog server .Log level:
None: never send syslog message to syslog server, and Max Age
parameters of the root bridge, regardless of how it is configured.
Major: only send major syslog to syslog server, e.g.: link up/down, system
warm/cold start.
All: send all syslog messages to syslog server.
Then click Apply button to activate the syslog function. The following example
figure shows the syslog server application (e.g. Tftpd32.exe) got the messages
from switch which link status is changed on port13.
3.2.2.7. Firmware Update
This system supports firmware update through two different ways: TFTP and
HTTP.
TFTP Update
Use this page to assign a TFTP server IP address and an existing firmware
Table of contents
Other BEC Switch manuals
Popular Switch manuals by other brands

TRENDnet
TRENDnet TE100-S28plus Specifications

3Com
3Com TP1200 - OfficeConnect Hub user guide

TRENDnet
TRENDnet TEG-224WS - DATA SHEETS Specifications

Logitech
Logitech SMARTDOCK + EXTENDER BOX Setup guide

StarTech.com
StarTech.com IES101GP2SFW quick start guide

PASCOR ATLANTIC
PASCOR ATLANTIC TTR-8 Installation and adjustment manual

Essex Electronics
Essex Electronics Hand-E-Wave HEW-1B installation instructions

Crestron
Crestron 8x8 DigitalMedia DM-MD8X8 brochure

Axis
Axis 5801-694 user manual

Innovative
Innovative L500 Installation and operating manual

Exsys
Exsys EX-6682 user manual

Transition Networks
Transition Networks SISTG1040-242-LRT quick start guide