SwOS/CSS106: Difference between revisions
mNo edit summary |
No edit summary |
||
Line 358: | Line 358: | ||
</table> | </table> | ||
==Statistics Tab== | ==Statistics, Errors Tab== | ||
<p>Provides detailed information about received and transmitted packets.</p> | <p>Provides detailed information about received and transmitted packets.</p> | ||
[[File: | [[File:Swos_stats_css106.png|center|alt=Alt text|Port statistics|740px|thumb]] | ||
<br> | |||
[[File:Swos_error_css106.png|center|alt=Alt text|Port errors|740px|thumb]] | |||
<div style="clear:both;"></div> | <div style="clear:both;"></div> | ||
==VLAN Tab== | ==VLAN Tab== | ||
Line 375: | Line 376: | ||
[[File:swos-vlan2.png|center|alt=Alt text|VLAN settings|740px|thumb]] | [[File:swos-vlan2.png|center|alt=Alt text|VLAN settings|740px|thumb]] | ||
<br> | |||
<table class="styled_table" > | <table class="styled_table" > | ||
Line 391: | Line 393: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><b>VLAN Receive</b></td><td>Defines the type of allowed packets on ingress port: <code>any / only tagged / only untagged</code> | <td><b>VLAN Receive</b></td><td>Defines the type of allowed packets on ingress port: | ||
* <code><b>any</b></code> - allows tagged and untagged packets on a certain port | |||
* <code><b>only tagged</b></code> - allows only packets with a VLAN tag | |||
* <code><b>only untagged</b></code> - allows only packets without a VLAN tag</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
Line 417: | Line 422: | ||
==VLANs Tab== | ==VLANs Tab== | ||
<p>VLAN tables specifies certain forwarding rules for packets that have specific 802. | <p>VLAN tables specifies certain forwarding rules for packets that have specific IEEE 802.1Q tag. Basically the table contains entries that map specific VLAN tag IDs to a group of one or more ports. Packets with VLAN tags leave switch through one or more ports that are set in corresponding table entry. VLAN table works together with destination MAC lookup to determine egress ports. VLAN table supports up to 4096 entries.</p> | ||
[[File:Swos_vlan_css106.png|center|alt=Alt text|CSS106 VLANs settings|center|frame]] | |||
<br> | |||
[[File: | |||
<table class="styled_table" > | <table class="styled_table" > | ||
Line 432: | Line 436: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><b> | <td><b>IVL</b></td><td>Enables or disables independent VLAN learning (IVL)</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><b>IGMP Snooping</b></td><td>Enables or disables IGMP Snooping on the defined VLAN. When enabled, the switch will listen to IGMP Join and Leave requests from the defined VLAN and only forward traffic to ports, which have sent IGMP membership requests from the defined VLAN. When disabled, the switch will flood all VLAN member ports with Multicast traffic.</td> | |||
<td><b> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
Line 455: | Line 448: | ||
==Hosts Tab== | ==Hosts Tab== | ||
<p>This table represents dynamically learnt MAC address to port mapping entries. | <p>This table represents dynamically learnt MAC address to port mapping entries. It can contain two kinds of entries: dynamic and static. Dynamic entries get added automatically, this is also called a learning process: when switch receives a packet from certain port, it adds the packet's source MAC address X and port it received the packet from to host table, so when a packet comes in with destination MAC address X it knows to which port it should forward the packet. If the destination MAC address is not present in host table then it forwards the packet to all ports in the group. Dynamic entries take about 5 minutes to time out.</p> | ||
<div style="clear:both;"></div> | <div style="clear:both;"></div> | ||
{{ Note | | {{ Note | CSS106 series switches support 2048 host table entries. }} | ||
[[File: | [[File:Swos_hosts_css106.png|center|alt=Alt text|Host table|center|frame]] | ||
<br> | |||
<table class="styled_table" > | <table class="styled_table" > | ||
Line 469: | Line 463: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><b> | <td><b>Port</b></td><td>Ports the packet should be forwarded to (Read-only)</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
Line 475: | Line 469: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td><b>VLAN ID</b></td><td>Learned VLAN ID (Read-only) | <td><b>VLAN ID</b></td><td>Learned VLAN ID (Read-only)</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
==Static Hosts | ===Static Hosts=== | ||
<p> | <p>Static entries will take over dynamic if dynamic entry with same mac-address already exists. Also by adding a static entry you get access to some more functionality.</p> | ||
[[File:swos-static2.png|center|alt=Alt text|Static host table|740px|thumb]] | [[File:swos-static2.png|center|alt=Alt text|Static host table|740px|thumb]] | ||
<br> | |||
<table class="styled_table" > | <table class="styled_table" > | ||
Line 506: | Line 501: | ||
</tr> | </tr> | ||
</table> | </table> | ||
==IGMP Groups== | |||
<p>IGMP Snooping which controls multicast streams and prevents multicast flooding is implemented in SwOS starting from version 2.5. The feature allows a switch to listen in the IGMP conversation between hosts and routers.</p> | |||
<p>First, enable option under System tab.</p> | |||
[[File:Swos_igmp2_css106.png|center|alt=Alt text|IGMP Snooping under System tab|center|frame]] | |||
Available IGMP snooping data: | |||
* <code><b>Group Adress</b></code> | |||
* <code><b>VLAN</b></code> | |||
* <code><b>Member Ports</b></code> | |||
[[File:Swos_igmp_css106.png|center|alt=Alt text|CSS106 series IGMP Snooping|center|frame]] | |||
<br> | |||
Possibility to enable IGMP Snooping for specific VLAN ID. | |||
[[File:Swos_igmp3_css106.png|center|alt=Alt text|CSS106 series IGMP Snooping|center|frame]] | |||
==ACL Tab== | ==ACL Tab== |
Revision as of 15:46, 18 May 2018
Summary
SwOS is an operating system designed specifically for administration of MikroTik Switch products.
SwOS is configurable from your web browser. It gives you all the basic functionality for a managed switch, plus more: allows to manage port-to-port forwarding, broadcast storm control, apply MAC filter, configure VLANs, mirror traffic, apply bandwidth limitation and even adjust some MAC and IP header fields.
Warning: Each RouterBoard switch series have their own firmware which cannot be installed on other series models! New RB260GS (CSS106-5G-1S), new RB260GSP(CSS106-1G-4P-1S) supports SwOS v2.0 and newer.
CSS106 series features
Features | Description |
---|---|
Forwarding |
|
Spanning Tree Protocol |
|
Multicast Forwarding |
|
Mirroring |
|
VLAN |
|
Quality of Service (QoS) |
|
Access Control List |
|
Connecting to the Switch
Open your web browser and enter IP address of your Switch (192.168.88.1 by default) and login screen will appear.
SwOS default IP address: 192.168.88.1, user name: admin and there is no password.
Note: MikroTik neighbor discovery protocol tools can be used to discover IP address of Mikrotik Switch. Manual:IP/Neighbor_discovery. Currently LLDP is not supported.
Interface Overview
SwOS interface menu consists of several tabs: Link, SFP, Forwarding, RST, Statistics, Errors, VLAN, VLANs, Hosts, IGMP Groups, SNMP, ACL, System and Upgrade.
Description of buttons in SwOS configuration tool:
- Append - add new item to the end of the list
- Apply All - applies current configuration changes
- Cut - removes item from the list
- Clear - resets properties of the item
- Discard Changes - removes unsaved configuration
- Insert - add new item to the list (places it before current item)
- Sort - sort VLAN table by VLAN-IDs; sort host table by MAC addresses
- Change Password - changes password of the switch
- Logout - logout from current Switch
- Reboot - reboot the switch
- Reset Configuration - reset configuration back to factory defaults
- Choose File - browse for upgrade or backup file
- Upgrade - upgrade firmware of the Switch
- Restore Backup - restore Switch using selected backup file
- Save Backup - generate and download backup file from the Switch
System Tab
System Tab performs the following functions:
- General information about Switch
- Switch management
- Configuration reset
- Backup and restore configuration
Note: SwOS uses a simple algorithm to ensure TCP/IP communication - it just replies to the same IP and MAC address packet came from. This way there is no need for Default Gateway on the device itself.
Property | Description |
---|---|
Address Acquisition | Specify which address acquisition method to use:
|
Static IP Address | IP address of the switch in case of Address Acquisition is set as DHCP with fallback or static |
Identity | Name of the Switch (for Mikrotik neighbor discovery protocol) |
Allow From | IP address from which the service is accessible. Default value is '0.0.0.0/0' - any address |
Allow From Ports | List of switch ports from which the service is accessible |
Allow From VLAN | VLAN ID with which the service is accessible (VLAN Mode on ingress port must be other than disabled in order to connect)
|
Watchdog | Enable or disable system watchdog. It will reset CPU of the switch in case of fault condition |
Independent VLAN Lookup | Enable or disable independent VLAN lookup in the Host table for packet forwarding |
IGMP Snooping | Enable or disable IGMP Snooping |
Mikrotik Discovery Protocol | Enable or disable Mikrotik neighbor discovery protocol |
Port1 PoE In Long Cable | If enabled, it will turn off short detection on all PoE out ports to allow use of longer ethernet cables. This is potentially dangerous setting and should be used with caution. (CSS106-1G-4P-1S model) |
MAC Address | MAC address of the Switch (Read-only) |
Serial Number | Serial number of the switch (Read-only) |
Board Name | MikroTik model name of the switch (CSS106 model, Read-only) |
Health (CSS106-1G-4P-1S)
Property | Description |
---|---|
Voltage | Shows the input voltage measured in volts |
Temperature | Shows PCB temperature in celsius temperature scale |
Password and Backup
Link Tab
Link Tab allows you to:
- Configure Ethernet and SFP ports
- Monitor status of Ethernet and SFP ports
Property | Description |
---|---|
Enabled | Enable or disable port |
Name | Editable port name |
Link Status | Current link status (Read-only) |
Auto Negotiation | Enable or disable auto negotiation (some SFP modules may required it disabled in order to work) |
Speed | Specify speed setting of the port (requires auto negotiation to be disabled) |
Full Duplex | Specify duplex mode of the port (requires auto negotiation to be disabled) |
Flow control | Enable or disable 802.3x Flow control |
PoE (CSS106-1G-4P-1S)
PoE settings configure Power over Ethernet output on CSS106-1G-4P-1S port2-port5 and show PoE status and measurements.
Property | Description |
---|---|
PoE Out |
Sets PoE out mode of the port:
|
PoE Priority | Port priority for PoE out supply. If installation is going over power budged, port with the lowest priority is going to be turned off first. 1 - the highest priority port; 4 - the lowest priority port |
PoE Status |
Current PoE out status of the port:
|
PoE Current | Shows current usage on the port measured in miliamperes |
PoE Power | Shows PoE out power on the port measured in watts |
SFP Tab
SFP Tab allow you to monitor status of SFP modules.
Forwarding Tab
Forwarding Tab provides advanced forwarding options among switch ports, port isolation, port locking, port mirroring and egress bandwidth limit features.
Ingress rate per port as well as rate for broadcast traffic can be configured with Access Control List by setting Rate
. ACL must have one port per entry to provide bandwidth limiting properly.
Property | Description |
---|---|
Forwarding | Forwarding table - allows or restricts traffic flow between specific ports |
Port Lock |
|
Port Mirroring |
|
Bandwidth Limit |
|
RSTP Tab
Per port RSTP configuration and monitoring is available in the RSTP menu.
Property | Description |
---|---|
RSTP | Enable or disable STP/RSTP functionality on this port |
Mode | Shows STP/RSTP functionality mode on specific port (Read-only):
|
Role | Shows specific port role (Read-only):
|
Root Path Cost | Shows root path cost for ports that are facing root bridge (Read-only) |
Type |
|
State | Shows each port state (Read-only):
|
Statistics, Errors Tab
Provides detailed information about received and transmitted packets.
VLAN Tab
VLAN configuration for Switch ports.
Property | Description |
---|---|
VLAN Mode |
VLAN mode for ingress port:
|
VLAN Receive | Defines the type of allowed packets on ingress port:
|
Default VLAN ID | Switch will treat both untagged and "Default VLAN ID" tagged ingress packets as they are tagged with this VLAN ID. VLAN tag itself will be added only if there is VLAN Header = add if missing specified on egress port |
Force VLAN ID | Whether to apply Default VLAN ID to incoming packets with VLAN tag |
VLAN Header |
|
Note: VLAN modes enabled
and strict
require VLAN ID 1 in VLANs table to allow access of untagged traffic to switch itself.
Example
VLANs Tab
VLAN tables specifies certain forwarding rules for packets that have specific IEEE 802.1Q tag. Basically the table contains entries that map specific VLAN tag IDs to a group of one or more ports. Packets with VLAN tags leave switch through one or more ports that are set in corresponding table entry. VLAN table works together with destination MAC lookup to determine egress ports. VLAN table supports up to 4096 entries.
Property | Description |
---|---|
VLAN ID | VLAN ID of the packet |
IVL | Enables or disables independent VLAN learning (IVL) |
IGMP Snooping | Enables or disables IGMP Snooping on the defined VLAN. When enabled, the switch will listen to IGMP Join and Leave requests from the defined VLAN and only forward traffic to ports, which have sent IGMP membership requests from the defined VLAN. When disabled, the switch will flood all VLAN member ports with Multicast traffic. |
Ports | Each port has individual VLAN header options for each VLAN ID. Depending on VLAN mode if lookup is done in this table, egress action of packets is processed by this option. Egress option from VLAN tab is ignored. |
Hosts Tab
This table represents dynamically learnt MAC address to port mapping entries. It can contain two kinds of entries: dynamic and static. Dynamic entries get added automatically, this is also called a learning process: when switch receives a packet from certain port, it adds the packet's source MAC address X and port it received the packet from to host table, so when a packet comes in with destination MAC address X it knows to which port it should forward the packet. If the destination MAC address is not present in host table then it forwards the packet to all ports in the group. Dynamic entries take about 5 minutes to time out.
Note: CSS106 series switches support 2048 host table entries.
Property | Description |
---|---|
Port | Ports the packet should be forwarded to (Read-only) |
MAC | Learned MAC address (Read-only) |
VLAN ID | Learned VLAN ID (Read-only) |
Static Hosts
Static entries will take over dynamic if dynamic entry with same mac-address already exists. Also by adding a static entry you get access to some more functionality.
Property | Description |
---|---|
Ports | Ports the packet should be forwarded to |
MAC | MAC address |
VLAN ID | VLAN ID (only supported on RB260GS/RB260GSP) |
Drop | Packet with certain MAC address coming from certain ports can be dropped |
Mirror | Packet can be cloned and sent to mirror-target port |
IGMP Groups
IGMP Snooping which controls multicast streams and prevents multicast flooding is implemented in SwOS starting from version 2.5. The feature allows a switch to listen in the IGMP conversation between hosts and routers.
First, enable option under System tab.
Available IGMP snooping data:
Group Adress
VLAN
Member Ports
Possibility to enable IGMP Snooping for specific VLAN ID.
ACL Tab
An access control list (ACL) rule table is very powerful tool allowing wire speed packet filtering, forwarding and VLAN tagging based on L2,L3 protocol header field conditions. SwOS allow you to implement limited number of access control list rules (32 simple rules (only L2 conditions are used); 16 rules where both L2 and L3 conditions are used; or 8 advanced rules where all L2,L3 and L4 conditions are used).
Each rule contains a conditions part and an action part.
Conditions part parameters
Property | Description |
---|---|
From | Port that packet came in from |
MAC Src | Source MAC address and mask |
MAC Dst | Destination MAC address and mask |
Ethertype | Protocol encapsulated in the payload of an Ethernet Frame |
VLAN |
VLAN header presence:
|
VLAN ID | VLAN tag ID |
Priority | Priority in VLAN tag |
IP Src (IP/netmask:port) | Source IPv4 address, netmask and L4 port number |
IP Dst (IP/netmask:port) | Destination IPv4 address, netmask and L4 port number |
Protocol | IP protocol |
DSCP | IP DSCP field |
Action part parameters
Property | Description |
---|---|
Redirect To | Whether to force new destination ports (If Redirect To is enabled and no ports specified in Redirect To Ports , packet will be dropped ) |
Redirect To Ports | Destination ports for |
Mirror | Clones packet and sends it to mirror-target port |
Rate | Limits bandwidth (bps) (only supported on RB260GS/RB260GSP) |
Set VLAN ID | Changes the VLAN tag ID, if VLAN tag is present |
Priority | Changes the VLAN tag priority bits, if VLAN tag is present |
SNMP Tab
SNMP Tab consists of settings to monitor the Switch remotely.
Available SNMP data:
System information
System uptime
Port status
Interface statistics
Property | Description |
---|---|
Enabled | Enable or disable SNMP service |
Community | SNMP community name |
Contact Info | Contact information for the NMS |
Location | Location information for the NMS |
Reset
SwOS v1.x - RB260GS and RB260GSP
There are two ways to reset the device to defaults:
Reset button
The only button on the SwOS device. It has two functions:
- Hold this button during boot time until LED light starts flashing, release the button to reset SwOS configuration (same result as with reset hole)
- Hold this button during boot time longer, until LED starts to blink twice as fast, and then release it to make the device wait for TFTP firmware upgrade
Jumper reset hole
Located on the bottom of case, behind one of the rubber feet of device – resets SwOS software to defaults. Must short circuit the metallic sides of the hole (with a screwdriver, for example) and boot the device. Hold screwdriver in place until SwOS configuration is cleared.
SwOS v2.x - RB260GS(CSS106-5G-1S) and RB260GSP(CSS106-1G-4P-1S)
The new RB260GS(CSS106-5G-1S) and RB260GSP(CSS106-1G-4P-1S) has built-in backup SwOS firmware which can be loaded in case standard firmware breaks or upgrade fails:
- Holding Reset button for few seconds while device is booting resets configuration and loads backup firmware SwOS 2.0p.
- After loading backup firmware SwOS 2.0p it is possible to connect to 192.168.88.1 using web browser and install new SwOS firmware.
Reinstall SwOS firmware
It is possible to upload and install SwOS firmware using BOOTP. This example shows how to reinstall SwOS using RouterOS.
Warning: Each RouterBoard switch series have their own firmware which cannot be installed on other series models! In case wrong installation is accidentally done, correct firmware has to be reinstalled following these instructions.
- RB250GS supports SwOS v1.0 till v1.17.
- RB260GS supports SwOS v1.7 till v1.17.
- RB260GSP supports SwOS v1.11 till v1.17.
- Configure IP address and DHCP server with BOOTP enabled on the installation router.
/ip address add address=10.0.0.1/24 interface=ether1
/ip pool add name=dhcp_pool1 ranges=10.0.0.2-10.0.0.254 /ip dhcp-server add interface=ether1 address-pool=dhcp_pool1 bootp-support=dynamic disabled=no /ip dhcp-server network add address=10.0.0.0/24 gateway=10.0.0.1
- Upload new SwOS firmware file to the router filesystem.
[admin@MikroTik] /file> print # NAME TYPE SIZE CREATION-TIME 0 swos-rb260-1.14.lzb .lzb file 38142 sep/02/2014 08:40:17
- Configure TFTP server.
/ip tftp add ip-addresses=10.0.0.0/24 real-filename=swos-rb260-1.14.lzb read-only=yes allow=yes
- Hold the RESET button of the switch when starting it.
- After few seconds ACT LED will start blinking. Wait till ACT LED blinks twice as fast and release RESET button.
- Make ethernet connection between the switch Port1 and ethernet port you configured DHCP server on. After few seconds new firmware should be successfully uploaded and installed.