Table of Contents indent 30px
|Spanning Tree Protocol|
|Quality of Service (QoS)|
|Access Control List|
Connecting to the switch
Open your web browser and enter the IP address of your switch (192.168.88.1 by default) and a login screen will appear. The switch can also run a DHCP client, see if a different IP address has been assigned by the DHCP server.
SwOS uses a simple algorithm to ensure TCP/IP communication - it just replies to the same IP and MAC address packet came from. This way there is no need for Default Gateway on the device itself.
|Address Acquisition||Specify which address acquisition method to use:|
|Static IP Address||IP address of the switch in case of Address Acquisition is set as |
|Identity||Name of the switch (for Mikrotik neighbor discovery protocol)|
|Allow From||IP address or network from which the switch is accessible. Default value is '0.0.0.0/0' - any address.|
|Allow From Ports||List of switch ports from which the service is accessible|
|Allow From VLAN||VLAN ID from which the service is accessible. Make sure to first configure VLANs and VLAN pages|
|Watchdog||Enable or disable system watchdog. It will reset CPU of the switch in case of fault condition|
|Independent VLAN Lookup||Enable or disable independent VLAN lookup in the Host table for packet forwarding|
|IGMP Snooping||Enable or disable IGMP Snooping|
|IGMP Fast Leave||Enables or disables IGMP fast leave feature on the switch port. This property only has an effect when IGMP Snooping is enabled|
|Mikrotik Discovery Protocol||Enable or disable Mikrotik neighbor discovery protocol|
|Port1 PoE In Long Cable||If enabled, it will turn off short detection on all PoE out ports to allow the use of longer ethernet cables. This is potentially dangerous setting and should be used with caution. (CSS106-1G-4P-1S model)|
|MAC Address||MAC address of the switch (read-only)|
|Serial Number||Serial number of the switch (read-only)|
|Board Name||MikroTik model name (read-only)|
|Voltage||Shows the input voltage measured in volts (read-only, CSS106-1G-4P-1S model)|
|Temperature||Shows PCB temperature in celsius temperature scale (read-only, CSS106-1G-4P-1S model)|
Password and Backup
Link Tab allows you to:
- Configure Ethernet and SFP ports
- Monitor status of Ethernet and SFP ports
|Enabled||Enable or disable port|
|Name||Editable port name|
|Link Status||Current link status (read-only)|
|Auto Negotiation||Enable or disable auto-negotiation (some SFP modules may require it disabled in order to work)|
|Speed||Specify speed setting of the port (requires auto-negotiation to be disabled)|
|Full Duplex||Specify the duplex mode of the port (requires auto-negotiation to be disabled)|
|Flow control||Enable or disable 802.3x Flow control|
Using SFP+ 1m/3m DAC cable or S-RJ01 module, the device always shows that the link is established even if nothing is connected on other another end.
The switch supports Jumbo frames up to 9198 bytes. Manually decreasing the MTU settings is not supported for SwOS devices.
PoE settings change Power over Ethernet output on CSS106-1G-4P-1S port2-port5 and show PoE status and measurements.
Sets PoE out mode of the port:
|PoE Priority||Port priority for PoE out supply. If the installation is going over available power budged, the port with the lowest priority is going to be turned off first. |
Current PoE out status of the port:
|PoE Current||Shows current usage on the port measured in milliamperes|
|PoE Power||Shows PoE out power on the port measured in watts|
The SFP tab allows you to monitor the status of SFP modules.
Forwarding Tab provides advanced forwarding options among switch ports, port isolation, port locking, port mirroring and egress bandwidth limit features. Ingress rate per port and rate for broadcast traffic can be configured with Access Control List by setting
Rate. ACL must have one port per entry to provide bandwidth limiting properly.
|Forwarding||Forwarding table - allows or restricts traffic flow between specific ports|
Per-port and global RSTP configuration and monitoring are available in the RSTP menu.
|RSTP||Enable or disable STP/RSTP functionality on this port|
|Mode||Shows STP/RSTP functionality mode on a specific port (read-only):|
|Role||Shows specific port role (read-only):|
|Root Path Cost||Shows root path cost for ports that are facing root bridge (read-only)|
|State||Shows each port state (read-only):|
|Bridge Priority (hex)||RSTP bridge priority for Root Bridge selection|
|Port Cost Mode||There are two methods for automatically detecting RSTP port cost depending on link speed.|
|Root Bridge||The priority and MAC address of the selected Root Bridge in the network (read-only)|
Provides detailed information about received and transmitted packets.
VLAN configuration for switch ports.
VLAN mode for ingress port:
|VLAN Receive||Defines the type of allowed packets on ingress port:|
|Default VLAN ID||the switch will treat both untagged and "Default VLAN ID" tagged ingress packets as they are tagged with this VLAN ID. It is also used to untag egress traffic if the packet's VLAN ID matches "Default VLAN ID". The VLAN tag itself will only be added if there is |
|Force VLAN ID||Whether to apply |
CSS106 devices running SwOS version 2.12 can filter RSTP BPDU packets when enabling VLAN filtering on ports (VLAN Mode enabled or strict). With SwOS version 2.13, it is recommended to set VLAN Receive to any on trunk ports.
VLAN table specifies forwarding rules for packets that have an IEEE 802.1Q tag. Basically, the table contains entries that map specific VLAN tag IDs to a group of one or more ports. Packets with VLAN tags leave switch through one or more ports that are set in the corresponding table entry. VLAN table works together with destination MAC lookup to determine egress ports. VLAN table supports up to 250 entries.
|VLAN ID||VLAN ID of the packet|
|IVL||Enables or disables independent VLAN learning (IVL)|
|IGMP Snooping||Enables or disables IGMP Snooping on the defined VLAN. When enabled, the switch will listen to IGMP Join and Leave requests from the defined VLAN and only forward traffic to ports, which have sent IGMP membership requests from the defined VLAN. When disabled, the switch will flood all VLAN member ports with Multicast traffic.|
|Ports||Each port has individual VLAN header options for each VLAN ID. Depending on VLAN mode if lookup is done in this table, the egress action of packets is processed by this option. The egress option from the VLAN tab is ignored.|
VLAN Configuration Examples
In this example, switch management access on VLAN 200 will be created. The configuration scheme is the same as "Trunk and Access Ports" and 1., 2., 3. configuration steps are identical. The additional 4th step requires specifying the management VLAN ID in the System menu. After applying the configuration, the switch will only respond to tagged VLAN 200 packets on Port2 and untagged packets on Port3. The DHCP client will also work in the specified VLAN ID.
CSS106 series switches support 2048 host table entries.
|Port||Ports the packet should be forwarded to (read-only)|
|MAC||Learned MAC address (read-only)|
|VLAN ID||Learned VLAN ID (read-only)|
Static entries will take over dynamic if dynamic entry with same mac-address already exists. Also by adding a static entry you get access to some more functionality.
|Ports||Ports the packet should be forwarded to|
|VLAN ID||VLAN ID|
|Drop||Packet with certain MAC address coming from certain ports can be dropped|
|Mirror||Packet can be cloned and sent to mirror-target port|
IGMP Snooping which controls multicast streams and prevents multicast flooding is implemented in SwOS starting from version 2.5. The feature allows a switch to listen in the IGMP conversation between hosts and routers.
- System information
- System uptime
- Port status
- Interface statistics
- Host table information
|Enabled||Enable or disable SNMP service|
|Community||SNMP community name|
|Contact Info||Contact information for the NMS|
|Location||Location information for the NMS|
An access control list (ACL) rule table is a very powerful tool allowing wire-speed packet filtering, forwarding, and VLAN tagging based on L2, L3, and L4 protocol header field conditions. SwOS allows you to implement a limited number of access control list rules (32 simple rules (only L2 conditions are used); 16 rules where both L2 and L3 conditions are used; or 8 advanced rules where all L2,L3, and L4 conditions are used). Each rule contains a conditions part and an action part.
|From||The port that packet came in from|
|MAC Src||Source MAC address and mask|
|MAC Dst||Destination MAC address and mask|
|Ethertype||Protocol encapsulated in the payload of an Ethernet Frame|
VLAN header presence:
|VLAN ID||VLAN tag ID|
|Priority||Priority in VLAN tag|
|IP Src (IP/netmask:port)||Source IPv4 address, netmask, and L4 port number|
|IP Dst (IP/netmask:port)||Destination IPv4 address, netmask, and L4 port number|
|DSCP||IP DSCP field|
|Redirect To||Whether to force new destination ports (If "Redirect To" is enabled and no ports are specified in "Redirect To Ports", a packet will be dropped )|
|Redirect To Ports||Redirect destination ports|
|Mirror||Clones packet and sends it to mirror-target port|
|Rate||Limits bandwidth (bps)|
|Set VLAN ID||Changes the VLAN tag ID, if VLAN tag is present|
|Priority||Changes the VLAN tag priority bits, if VLAN tag is present|
The CSS106-5G-1S and CSS106-1G-4P-1S have built-in backup SwOS firmware which can be loaded in case standard firmware breaks or upgrade fails: