® GigaX1024i+ Layer 2 Smart Plus Switch User Manual E2698/ July 2006
Copyright Information E2698 First Edition July 2006 Copyright © 2006 ASUSTeK COMPUTER INC. All Rights Reserved. No part of this manual, including the products and software described in it, may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means, except documentation kept by the purchaser for backup purposes, without the express written permission of ASUSTeK COMPUTER INC. (ASUS).
Contact Information ASUSTeK COMPUTER INC. Company address: 15 Li-Te Road, Beitou, Taipei 11259 General (tel): +886-2-2894-3447 Web site address: www.asus.com.tw General (fax): +886-2-2894-7798 General email: info@asus.com.tw Technical support General support (tel): +886-2-2894-3447 Online support: http://support.asus.com ASUS COMPUTER INTERNATIONAL (America) Company address: General (fax): Web site address: 44370 Nobel Drive, Fremont, CA 94538, USA +1-510-608-4555 usa.asus.
Table of Contents 1 Introduction.............................................................1 1.1 Conventions in this manual .......................................1 1.1.1 Notational conventions................................................ 1 1.1.2 Typographical conventions.......................................... 1 1.1.3 Symbols ..................................................................... 1 1.2 Package contents . ....................................................2 1.3 Features .............
4 Configuration Management.................................15 4.1 System ....................................................................15 4.1.1 Management ............................................................ 16 4.1.2 IP Setup ................................................................... 16 4.1.3 Administration . ......................................................... 16 4.1.4 Reboot . .................................................................... 17 4.1.5 Firmware Upgrade .......
4.5.3 RADIUS . .................................................................. 35 4.5.4 Port Security . ........................................................... 35 4.6 QoS..........................................................................39 4.6.1 Trust State ................................................................ 39 4.6.2 Mapping ................................................................... 39 4.6.3 Priority Override........................................................ 40 4.
List of Figures Figure 1 GigaX L2 Smart Plus Switch Package Contents ................................................ 2 Figure 2 Front Panel . ..................................................................... 4 Figure 3 Rear Panel ....................................................................... 5 Figure 4 Overview of Hardware Connections . ............................... 7 Figure 5 Login Screen.................................................................... 9 Figure 6 IP Setup................
Figure 27 Port-Based VLAN ......................................................... 29 Figure 28 Default Port VLAN & Cos.............................................. 29 Figure 29 Community Table........................................................... 30 Figure 30 Host Table..................................................................... 30 Figure 31 Trap Setting................................................................... 30 Figure 32 VACM Group................................................
List of Tables Table 1 Front Panel Label and LEDs . ............................................ 4 Table 2 Rear Panel Labels.............................................................. 5 Table 3 Technical Specifications . ................................................... 5 Table 4 LED Indicators.................................................................... 8 Table 5 Port Color Description . .................................................... 13 Table 6 Commonly Used Buttons and Icons.............
Chapter 1 - Introduction 1 Introduction Thank you for buying a GigaX L2 Smart Plus Switch! You can now manage your LAN through a friendly and powerful user interface. This user manual will show you how to set up the GigaX L2 Smart Plus Switch, and how to customize its configuration to get the most out of this product. 1.1 Conventions used in this manual 1.1.1 Notational conventions • Acronyms are defined the first time they appear in the text.
Chapter 1 - Introduction 1.2 Package contents Check the following items in your ASUS GigaX 1024i+ switch package. Contact your retailer if any item is damaged or missing. GigaX 1024i+ (28-port) L2 smart plus switch AC power cord Rack installation kit (two brackets with six #6-32 screws) User Manual Quick installation guide Figure 1.
Chapter 1 - Introduction 1.3 Features • 24 10/100 BASE-TX auto-sensing Fast Ethernet ports • Two 10/100/1000BASE-T auto-sensing Gigabit Ethernet switching port • Two small form factor (SFP) Gigabit interface converter (GBIC) slots • 802.1D/802.1w transparent bridge/spanning tree protocol/rapid spanning tree protocol • 8K MAC address cache with hardware-assisted aging • 802.3x flow control • 802.1Q-based tagged VLAN, up to 256 VLANs • Port based VLAN • Private VLAN • 802.
Chapter 1 - Introduction 1.4 Front panel features The front panel includes LED indicators which show the system, and port status. Figure 2.
Chapter 1 - Introduction 1.5 Rear panel features The switch rear panel contains the ports for data and power connections. Figure 3. Rear panel Table 2: Rear panel labels Label Power connector Description Connects to the supplied power cord 1.6 Technical specifications Table 3: Technical specifications Physical Dimensions Power 43.
Chapter 2 - Quick Start 2 Quick Start This section provides the basic instructions to set up the GigaX 1024i+ environment. Refer also to the GigaX 1024i Installation Guide. • Part 1 shows you how to install the GigaX 1024i+ on a flat surface or on a rack. • Part 2 provides instructions to set up the hardware. • Part 3 shows you how to configure the basic settings on the GigaX 1024i+.
Chapter 2 - Quick Start 2.1.2 Installing on a rack 1. With the front panel facing out, insert the switch between the rack posts and align the four mounting holes with that in the equipment rack. 2. Securely fasten the switch to the rack with two screws on each side. 2.2 Part 2: Connecting the hardware In Part 2, you connect the device to the power outlet, and to your computer and to your network. Refer to Figure 4 for the overview of the hardware connections.
Chapter 2 - Quick Start 2.2.1 Connect to the computers or a LAN You can use Ethernet cable to connect computers directly to the switch ports. You can also connect hubs/switches to the switch ports by Ethernet cables. You can use either the crossover or straight-through Ethernet cable to connect computers, hubs, or switches. Use a twisted-pair Category 5 Ethernet cable to connect the 1000BASE-T port. Otherwise, the link speed cannot reach 1Gbps. 2.2.2 Attach the power adapter 1.
Chapter 2 - Quick Start 2.3 Part 3: Basic switch settings After completing the hardware setup, configure the basic settings for your switch. You can manage the switch either through the: • Configuration Manager: The switch has a preinstalled web application to allow you to manage the switch using Java®-enabled IE5.0 or higher versions. Refer to Chapters 3 & 4 for more information. 2.3.
Chapter 2 - Quick Start 4 . To s e t u p a n e w I P address, click System --> IP Setup. Fill in the IP address, the network mask, and the default gateway, then click . 5. If your new address is different from the default, Figure 6. IP setup the browser can not update the switch status window or retrieve any page. This is normal. You have to retype the new IP address in the address/location box and press . The web link returns. 6.
Chapter 3 - Using the Configuration Manager 3 Using the Configuration Manager The switch provides a preinstalled web software application called the Configuration Manager. It enables you to configure the device settings to meet the needs of your network. You can access it through your web browser from any PC connected to the switch via the LAN ports. 3.1 Login to the Configuration Manager The Configuration Manager is preinstalled on the switch.
Chapter 3 - Using the Configuration Manager 3. Enter your username and password, and then click to enter the Configuration Manager. When logging in for the first time, use the following default settings: Username: admin Password: (no password) The home page appears at every log in to the system. Figure 8. Home page 3.1.2 Setting up a new IP address 1. To set up a new IP address, click System --> IP Setup. Fill in the IP address, the network mask and the default gateway, then click .
Chapter 3 - Using the Configuration Manager 3.2 Functional layout A typical web page consists of three frames: the top, left, and right frames. Top frame Left frame Right frame Figure 10. Functional layout The top frame (or the banner frame) contains the switch's logo and the front panel. It shows periodic updates of the LED status. See the following for LED information: • Table 4 for the LED definitions (on page 8). • Table 5 for the color status description.
Chapter 3 - Using the Configuration Manager The left frame contains the menu bar containing all the features available for switch configuration. These features are grouped into categories, e.g. System, Bridge, etc. You can click on any of these to display a specific configuration page. The right frame displays configuration pages or graphics for the statistics. See Chapter 4.8 for details. 3.2.
Chapter 4 - Configuration Management 4 Configuration Management This chapter describes the features you can use in the Configuration Manager, the switch's preinstalled software application. These features are: • System • Physical Interface • Bridge • SNMP • Security • Cable Diagnosis • Statistical Chart • Save Configuration To permanently save the changes or new settings made on any of the switch’s features (or configuration), you must go to the Save Configuration page, and click on . 4.
Chapter 4 - Configuration Management 4.1.1 Management The Management page contains the following information: • Model Name: The product's name. • MAC Address: The switch's MAC address. • System Name: The name to identify the system (editable). • System Contact: The system's contact (editable). Figure 12. Management • System Location: The location of the system (editable). To save any changes you have made, click . Use to refresh the settings. 4.1.
Chapter 4 - Configuration Management can set up to 8 users. The default settings for web access does not require any authentication. • Password Protection is: Enable or Disable the web authentication. • User Name: New user name. • Password: Password for the new user. • Confirm Password: Enter the password again for confirmation. Figure 13. Administration Click on to add the new user. Click on when you are done with the modifications.
Chapter 4 - Configuration Management 4.1.5 Firmware Upgrade From time to time, ASUS will provide you with an update to the firmware running on the GigaX L2 Managed Switch. All system software is contained in a single file called an image. The Configuration Manager provides an easy way to upload the new firmware image. Figure 15. Firmware upgrade To upgrade the firmware: 1. Click on System --> Firmware Upgrade to open the Firmware page.
Chapter 4 - Configuration Management 4.2 Physical Interface The Physical Interface displays the Ethernet port status in real time. You can configure the port in the following fields: • Port: select the port to configure • Admin: disable/enable the port • Mode: set the speed and duplex mode Figure 16. Physical Interface • Flow Control: enable/disable 802.
Chapter 4 - Configuration Management 4.3 Bridge The Bridge page group contains most layer 2 configurations such as the link aggregation, the STP, etc. 4.3.1 Spanning Tree The configuration page for the Spanning Tree Protocol (STP) can disable and enable the feature in runtime. This page consists of three parts: a) The root information; b) The STP setting; and c) The port setting. Figure 17. Spanning Tree The root information The first part shows the root information.
Chapter 4 - Configuration Management • Priority: The port priority in the switch. Low numeric value indicates a high priority. The port with lower priority is more likely to be blocked by STP if a network loop is detected. The valid value is from 0 to 240. • Path Cost: The valid value is from 1 to 200000000 or Auto. The path cost of the user configuration is displayed in the AdminCost, and the operation path cost is displayed in the OperCost.
Chapter 4 - Configuration Management All the ports in the link aggregation group MUST operate in full-duplex mode at the same speed. All the ports in the link aggregation group MUST be configured in autonegotiation mode or full duplex mode. This configuration will make the full duplex link possible. If you set the ports in full duplex force mode, then the link partner MUST have the same setting. Otherwise the link aggregation could operate abnormally.
Chapter 4 - Configuration Management The monitor port can not belong to any link aggregation group. The monitor port can not operate as a normal switch port. It does not switch packets or do address learning. Only supports 8 egress ports to be mirrored, and the monitored egress packets will be untag. Click to send the new settings to the switch via the HTTP server. Click to to refresh the settings. 4.3.4 Static Multicast This page can add multicast addresses into the multicast table.
Chapter 4 - Configuration Management 4.3.6 Bandwidth Control Bandwidth control limits the transmission rate of selected frames. The switch supports this on a per port basis by setting the configuration in the following fields: Ingress bandwidth control • Port: Select the port to configure. Figure 22. Bandwidth Control • Control: Disable/enable the ingress bandwidth control. • Mode: • Bcast: Limit the broadcast packets. • Bcast, Mcast: Limit the broadcast and multicast packets.
Chapter 4 - Configuration Management 4.3.7 Dynamic Addresses This page displays the result of the dynamic MAC address lookup by port, VLAN ID, or MAC address. The dynamic address, which is the MAC address specified in the lookup, will expire based on the configured "aging time". You can enter a valid number from 15 to 3825 (in seconds) to configure the expiry time (or aging Figure 23. Dynamic Address time). To save any changes made to this page, click .
Chapter 4 - Configuration Management To modify a MAC address Select the MAC address you want to modify, then click on . To remove a MAC address Select the MAC address you want to remove, then click . To query a MAC address Enter the MAC address and the VLAN ID, then click . Your query will be displayed in the address window. To save the changes you have made on this page, click . Click to refresh the settings.
Chapter 4 - Configuration Management Click to send the settings to the switch via the HTTP server. Click to refresh the settings. To save the configuration, go to the Save Configuration page, then click . 4.3.9.2 Tagged VLAN You can set up to 227 VLAN groups and show VLAN group in this page. There is a default VLAN created by the switch. This feature prevents the switch from malfunctions. You can remove any existing VLAN except the default VLAN.
Chapter 4 - Configuration Management port. It communicates with all interfaces within a PVLAN. Some restrictions in a promiscuous port are as follows: • Promiscuous port must be an untagged port. • Trunked port cannot be a promiscuous port. • Promiscuous port cannot be in Port-Based VLAN Mode. b) Isolated Port: The non-promiscuous port in a PVLAN. It has complete Layer 2 separation from the other ports within the same PVLAN, but not from the promiscuous port.
Chapter 4 - Configuration Management • Show Port-Based VLAN: Select Add a new VLAN to create a new group, or select an existing group to display on the following fields and port icons: • Name: the group name. • Group ID: this field requires you to enter the Group ID when a new PortBased VLAN is created. The valid Group ID is from 1 to 28. Figure 27. Port-Based VLAN • Remove Group: Remove an existing Port-Based VLAN Group. This field disappears in Port-Based VLAN Group creation page.
Chapter 4 - Configuration Management 4.4 SNMP Simple Network Management Protocol (SNMP) is used to manage the network. You may use the SNMP configuration page to enable or disable the SNMP support. To provide more secure management and access control, SNMPv3 is supported. SNMP has the following configuration parameters: 4.4.1 Community Table You can enter different community names and specify a write-access privilege to the community by checking the checkbox.
Chapter 4 - Configuration Management 4.4.4 VACM Group VACM (View-based Access Control Model) Group is used to configure the information of SNMPV3 VACM Group. The VACM Group page has the following configuration parameters: • Group Name: Enter the security group name. Figure 32. VACM Group • Read View Name: Enter the Read View Name that the Group belongs to. The related SNMP messages are Get, GetNext, GetBulk. • Write View Name: Enter the Write View Name that the Group belongs to.
Chapter 4 - Configuration Management matches the Oid in the SNMPv3 message. • View Subtree: Enter the View Subtree that the View belongs to. The Subtree is the Oid to match the Oid in the SNMPv3 message. The match is good when the subtree is shorter than the Oid in the SNMPv3 message. • View Mask: Enter the View Mask that the View belongs to. Each bit in the mask represents the digit between the dots of View Subtree from left side. Bit ‘0’ means ‘nothing’. Click to create a new VACM View entry.
Chapter 4 - Configuration Management 4.5 Security The switch has the 802.1x port-based security feature. Only authorized hosts are allowed to access the switch port. Traffic is blocked for unauthorized hosts. The authentication service is provided by a RADIUS server or the local database in the switch. The switch also supports dynamic VLAN assignment through the 802.1x authentication process.
Chapter 4 - Configuration Management Port settings The port settings page has the following configuration parameters: • Port: Specify which port to be configured. • AuthMode (Authentication Mode): If Port_based is selected, it requires only one host to be authenticated per port by a remote RADIUS server, a remote TACACS+ server, or a local user database. ‘Port_based’ supports Multi-host and GuestVID. Otherwise, if MAC_based is selected, each host must be authenticated before accessing to the nerwork.
Chapter 4 - Configuration Management password again for confirmation. • Dynamic VLAN: Specify the VLAN ID assigned to the 802.1x-authenticated clients. Click to create the new user. Click when want to make some modifications. Click when you want to remove the selected user. Click to save the settings. Click to refresh the settings. 4.5.
Chapter 4 - Configuration Management • Port: Select the port to make the configuration. • Admin: Disable/enable port security feature on the port. • Violation Mode: Set the violation mode. This action will be taken when a violation occurs. It is a security violation when one of these situations occurs: Figure 38.
Chapter 4 - Configuration Management is no data traffic from the secure source MAC address for the specified time period. Select the corresponding port number and configure the port setting, then click . The content of the display window will update automatically as you make the changes. Click to save the new settings. Click to refresh the settings. To save the configuration, go to the Save Configuration page, then click . 4.5.4.
Chapter 4 - Configuration Management • Administrative bridge port is disabled. • The port is a trunk port. • The port is a monitor port in port mirroring. • The port is running 802.1x and in the single-host mode. If the status of a port is ‘Shutdown’, users can select the corresponding port number and set Restart to ‘Yes’, then click on . The field you changed will update the content of the display window. Click to save the settings. Click to refresh the settings.
Chapter 4 - Configuration Management 4.6 QoS QoS pages include trust state, mapping, priority override, and CoS function. 4.6.1 Trust State The Ingress Policy block determines the priority of each frame for the Q u e u e C o n t r o l l e r. T h e s w i t c h supports this on a per port basis by setting the configuration in the following fields: • Port: Select the port to configure. • Trust State: Trust DSCP or CoS. Figure 41. Trust state a) Trust CoS: Use IEEE Tags. Use IEEE 802.
Chapter 4 - Configuration Management following fields: • DSCP: select the DSCP value. • CoS: select the CoS priority. Click to send the settings to the switch via the HTTP server. Click to refresh the settings. To permanently save the configuration, go to the Save Configuration page, then click . 4.6.3 Priority Override The Priority Override page allows you to enable or disable the QoS source MAC priority override and the destination MAC priority override.
Chapter 4 - Configuration Management 4.6.4 CoS The switch supports 4 egress queues for each port. You can specify the scheduling types as follows: • Strict priority scheduling: Each CoS value can map into one of the four queues. The queue 4 has Figure 44. CoS the highest priority to transmit the packets. The packets in the low priority queue do not transmit until all the high priority queues become empty. In Strict priority scheduling, weight setting is always zero.
Chapter 4 - Configuration Management 4.7 Cable Diagnosis The major function of Cable Diagnosis is to detect cable fault (open or short) and report the estimated fault location. Moreover, Cable Diagnosis can also detect PHY type (10M, 100M or 1000M) as well as estimated cable length of a normal cable. Cable length estimation only supports Giga speed mode. Figure 45. Cable Diagnosis Just select a port number and click . Test results shall be displayed accordingly.
Chapter 4 - Configuration Management 4.8.2 Error Group Select the Port and display Color, then click . The statistics window shows you all the error counts for the specified port. The data is updated periodically. Figure 47. Error Group 4.8.3 Historical Status In this chart, you can display information for different ports and statistics. This chart shows the history of the statistics information. Figure 48. Historical Status 4.9 Save Configuration Click to save the configuration.
Chapter 5 - IP Addresses, Network Masks, & Subnets 5 IP Addresses, Network Masks & Subnets 5.1 IP Addresses This section pertains only to IP addresses for IPv4 (version 4 of the Internet Protocol). IPv6 addresses are not covered. This section assumes basic knowledge of binary numbers, bits, and bytes. IP addresses, the Internet’s version of telephone numbers, are used to identify individual nodes (computers or devices) on the Internet.
Chapter 5 - IP Addresses, Network Masks, & Subnets Table 7: IP address structure Class A Class B Class C Field1 Network ID Network ID Network ID Field2 Host ID Field3 Host ID Field4 Host ID Here are some examples of valid IP addresses: Class A: 10.30.6.125 (network = 10, host = 30.6.125) Class B: 129.88.16.49 (network = 129.88, host = 16.49) Class C: 192.60.201.11 (network = 192.60.201, host = 11) 5.1.2 Network classes Classes A, B, and C are the three commonly used network classes.
Chapter 5 - IP Addresses, Network Masks, & Subnets 5.2 Subnet masks A mask looks like a regular IP address, but contains a pattern of bits that tells what parts of an IP address are the network ID and what parts are the host ID: bits set to 1 mean “this bit is part of the network ID” and bits set to 0 mean “this bit is part of the host ID.” Subnet masks are used to define subnets (what you get after dividing a network into smaller pieces).
Chapter 6 - Troubleshooting 6 Troubleshooting This section gives instructions for using several IP utilities to diagnose problems. A list of possible problems with suggestion actions is also provided. All the known bugs are listed in the release note. Read the release note before you set up the switch. Contact Customer Support if these suggestions do not resolve the problem. 6.1 Diagnosing problems using IP utilities 6.1.
Chapter 6 - Troubleshooting If the target computer cannot be located, you will receive the message “Request timed out.” Using the ping command, you can test whether the path to the switch is working (using the pre-configured default LAN IP address 192.168.1.1) or another address you assigned. You can also test whether access to the Internet is working by typing an external address, such as that for www.yahoo.com (216.115.108.243).
Chapter 6 - Troubleshooting 6.2 Simple fixes Table 8: Problems & suggested actions Problem LEDs SYSTEM LED does not light up after the switch is turned on. Suggested Action Gigabit Ethernet Link LED does not illuminate after an Ethernet cable is attached. 1. Verify if the Ethernet cable is securely connected to your LAN switch/hub/PC and to the switch. Make sure the PC and/or hub/switch is turned on.
Chapter 6 - Troubleshooting Table 8: Problems & suggested actions Problem Suggested Action Web configuration interface You forgot/lost your WEB 1. If you have not changed the password from the default, try Configuration Interface using “admin” as the user ID and bypassing password. user ID or password. Some pages do not 1. Verify that you are using Internet Explorer v5.5 or later. display completely Netscape is not supported. Support for Javascript® must be enabled in your browser.
Chapter 6 - Troubleshooting 6.3 Files upload and download procedure 6.3.1 Upload firmware by FTP Make sure your PC and the switch are in the same VLAN before you use ftp function as well as the other remote management tools. The switch VLAN is shown in the System-->IP setup page of the WEB GUI or use “net interface show” to display the VID by CLI. 1. Open the command prompt window. Figure 51. Upload Firware by FTP 2. Change to the directory where the firmware is located. 3.
Chapter 6 - Troubleshooting 1. Open the command prompt window. 2. Change to the directory where the auto-config file is located. 3. Use the command “ftp ” to connect to the FTP server, ex: “ftp 192.192.1.100”. 4. Type the system’s user name. 5. Type the system’s password. 6. Use the command “put ” to upload auto-config file. “#autoconfig” must be included at the header of the file, and the file name of the auto-config file must be “config.bat”, ex: “put config. bat”. 6.3.
Chapter 6 - Troubleshooting 6.3.4 Restore system configurations by FTP Make sure your PC and the switch are in the same VLAN before you use ftp function as well as the other remote management tools. The switch VLAN is shown in the System-->IP setup page of the WEB GUI or use “net interface show” to display the VID by CLI. 1. Open the command prompt window. Figure 54. Restore system configurations by FTP 2. Change to the directory where the system configuration file is located. 3.
Chapter 7 - Glossary 7 Glossary 10BASE-T A designation for the type of wiring used by Ethernet networks with a data rate of 10 Mbps. Also known as Category 3 (CAT 3) wiring. See also data rate, Ethernet. 100BASE-T A designation for the type of wiring used by Ethernet networks with a data rate of 100 Mbps. Also known as Category 5 (CAT 5) wiring. See also data rate, Ethernet. 1000BASE-T A designation for the type of wiring used by Ethernet networks with a data rate of 1000 Mbps.
Chapter 7 - Glossary Ethernet The most commonly installed computer network technology, usually using twisted pair wiring. Ethernet data rates are 10 Mbps and 100 Mbps. See also 10BASE-T, 100BASE-T, twisted pair. FTP File Transfer Protocol A program used to transfer files between computers connected to the Internet. Common uses include uploading new or updated files to a web server, and downloading files from a web server. host A device (usually a computer) connected to a network.
Chapter 7 - Glossary Monitor Also called “Roving Analysis”, allow you to attach a network analyzer to one port and use it to monitor the traffics of other ports on the switch. network mask A network mask is a sequence of bits applied to an IP address to select the network ID while ignoring the host ID. Bits set to 1 mean “select this bit” while bits set to 0 mean “ignore this bit.” For example, if the network mask 255.255.255.0 is applied to the IP address 100.10.50.1, the network ID is 100.10.
Chapter 7 - Glossary remote In a physically separate location. For example, an employee away on travel who logs in to the company’s intranet is a remote user. RJ-45 Registered Jack Standard-45 The 8-pin plug used in transmitting data over phone lines. Ethernet cabling usually uses this type of connector. RMON Remote Monitoring Extensions to SNMP, provide comprehensive network monitoring capabilities.
Chapter 7 - Glossary TCP/IP Transmission Control Protocol/Internet Protocol The basic protocols used on the Internet. TCP is responsible for dividing data up into packets for delivery and reassembling them at the destination, while IP is responsible for delivering the packets from source to destination. When TCP and IP are bundled with higherlevel applications such as HTTP, FTP, Telnet, etc., TCP/IP refers to this whole suite of protocols.
Chapter 7 - Glossary upstream The direction of data transmission from the user to the Internet. VLAN Virtual Local Area Network WAN Wide Area Network Any network spread over a large geographical area, such as a country or continent. With respect to the SL-1000, WAN refers to the Internet.