WELCOME
The GWN7830 series are Layer 3 aggregation managed switches that allow enterprises to build scalable, secure, high performance and smart business networks that are fully manageable. It supports advanced VLAN for flexible and sophisticated traffic segmentation, advanced QoS for prioritization of network traffic, IGMP/MLD Snooping for network performance optimization, comprehensive security capabilities against potential attacks. GWN7830 series can be managed in a number of ways, including the local Web user interface of the switch and CLI, the command-line interface. And also supported by GWN.Cloud and GWN Manager, Grandstream’s cloud and on-premise network management platform. With complete end-to-end quality of service and flexible security settings, the GWN7830 series are the best value enterprise-grade aggregation managed switches.
PRODUCT OVERVIEW
Technical Specifications
GWN7830 | GWN7831 | GWN7832 | |
Network Protocol | IPv4, IPv6, IEEE 802.3, IEEE 802.3i, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3z, IEEE 802.3ae, IEEE 802.3az, IEEE 802.3ad, IEEE 802.3x, IEEE 802.1p, IEEE 802.1Q, IEEE 802.3AB, IEEE 802.1D, IEEE 802.1s, IEEE 802.1w, IEEE 802.1x | ||
Gigabit Ethernet Ports | 2 | 4x Combo | / |
Gigabit SFP Ports | 6 | 4x Combo, 20x SFP | / |
10 Gigabit SFP+ Ports | 4 | 12 | |
Console | 1 | ||
Integrated Power Supply | 30W | 60W | |
External Redundant Power Supply(RPS) | / | 12V/60W | |
Auxiliary Ports | 1x Reset Pinhole | ||
Forwarding Mode | Store-and-forward | ||
Total non-blocking throughput | 48Gbps | 64Gbps | 120Gbps |
Switching Capability | 96Gbps | 128Gbps | 240Gbps |
Forwarding Rate | 71.424Mpps | 95.232Mpps | 80.352Mpps |
Packet Buffer | 12MB | 16MB | |
Switching |
|
| |
| |||
Routing |
| ||
Multicast |
| ||
QoS/ACL |
| ||
2K ACL for Ethernet, IPv4 and IPv6 | 4K ACL for Ethernet, IPv4 and IPv6 | ||
DHCP | DHCP server, DHCP relay, Option 82, 60, 160 and 43 | ||
Maintenance | CPU and memory monitoring, fault detection and alarm for power supply and fan, SNMP, RMON, LLDP&LLDP-MED, backup and restore, syslog, diagnostics including Ping, Traceroute, port mirroring, UDLD(TBD) and copper test |
Technical Specifications
INSTALLATION
Before deploying and configuring a GWN783x switch, the device needs to be properly powered up and connected to the network. This section describes detailed information on the installation, connection, and warranty policy of the GWN783x switch.
Package Content
GWN7830
GWN7831
GWN7832
GWN783X Ports
GWN7830
No. | Port & LED | Description |
1 | Ports 1-2 | 2x 10/100/1000Mbps Ethernet ports |
2 | 1-2 | Ethernet ports’ LED indicators |
3 | Ports 3-8 | 6x 1Gbps SFP ports |
4 | 3-8 | SFP ports’ LED indicators |
5 | Ports 9-12 | 4x 10Gbps SFP+ ports |
6 | 9-12 | SFP+ ports’ LED indicators |
7 | Console | 1x Console port, used to connect a PC directly to the switch and manage it. |
8 | RST | Factory Reset pinhole, press for 5 seconds to reset factory default settings |
9 | SYS | System LED indicator |
10 | Power cord anti-trip hole | |
11 | 100-240VAC | Power socket |
12 | Grounding terminal |
GWN7830 Ports
GWN7831
No. | Port & LED | Description |
1 | Ports 1-4 | 4x 10/100/1000Mbps Ethernet ports |
2 | 1-4 | Ethernet ports’ LED indicators |
3 | Ports 1-24 | 24x 1Gbps SFP ports Note: SFP 1-4 and Port 1-4 combine 4 Combo ports. |
4 | 1-24 | SFP ports’ LED indicators |
5 | Ports 25-28 | 4x 10Gbps SFP+ ports |
6 | 25-28 | SFP+ ports’ LED indicators |
7 | Console | 1x Console port, used to connect a PC directly to the switch and manage it. |
8 | RST | Factory Reset pinhole, press for 5 seconds to reset factory default settings |
9 | PWR | Internal power supply LED indicator |
10 | RPS | Secondary external power supply LED indicator |
11 | SYS | System LED indicator |
12 | External power supply rubber plug | |
13 | Power cord anti-trip hole | |
14 | External RPS power outlet | |
15 | Power cord anti-trip hole | |
16 | 100-240VAC | Power socket |
17 | Grounding terminal | |
18 | Fan | 2x Fans |
GWN7831 Ports
GWN7832
No. | Port & LED | Description |
1 | Ports 1-12 | 12x 10Gbps SFP+ ports |
2 | 1-12 | SFP+ ports’ LED indicators |
3 | Console | 1x Console port, used to connect a PC directly to the switch and manage it. |
4 | RST | Factory Reset pinhole, press for 5 seconds to reset factory default settings |
5 | PWR | Internal power supply LED indicator |
6 | RPS | Secondary external power supply LED indicator |
7 | SYS | System LED indicator |
8 | Grounding terminal | |
9 | 100-240VAC | Power socket |
10 | Power cord anti-trip hole | |
11 | External RPS power outlet | |
12 | External RPS power cord anti-trip hole | |
13 | External power supply rubber plug | |
14 | Fan | 2x Fans |
GWN7832 Ports
Install on the Desktop
- Place the bottom of switch on a sufficiently large and stable table.
- Peel off the rubber protective paper of the four footpads one by one, and stick them in the corresponding circular grooves at the four corners of the bottom of the case.
- Flip the switch over and place it smoothly on the table.
Install on 19″ Standard Rack
- Check the grounding and stability of the rack.
- Install the two L-shaped rack-mounting in the accessories on both sides of switch, and fix them with the screws provided (KM 3*6).
3. Place the switch in a proper position in the rack and support it by the bracket.
4. Fix the L-shaped rack-mounting to the guide grooves at both ends of the rack with screws (prepared by yourself) to ensure that the switch is stably and horizontally installed on the rack.
Powering and Connecting GWN783X
- Grounding the Switch
- Remove the ground screw from the back of switch, and connect one end of the ground cable to the wiring terminal of switch.
- Put the ground screw back into the screw hole, and tighten it with a screwdriver.
- Connect the other end of the ground cable to other device that has been grounded or directly to the terminal of the ground bar in the equipment room.
- Powering on the Switch
Connect the power cable and the switch first, then connect the power cable to the power supply system of the equipment room.
- Connecting Power Cord Anti-trip (Optional)
In order to protect the power supply from accidental disconnection, it’s recommended to purchase a power cord anti-trip for installation.
- Place the smooth side of the fixing strap towards the power outlet and insert it into the hole on the side of it.
2. After plugging the power cord into the power outlet, slide the protector over the remaining strap until it slides over the end of the power cord.
3. Wrap the strap of the protective cord around the power cord and lock it tightly. Fasten the straps until the power cord is securely fastened.
- Connect to RJ45 Port
- Connect one end of the network cable to the switch, and the other end to the peer device.
- After powered on, check the status of the port indicator. If on, it means that the link is connected normally; if off, it means the link is disconnected, please check the cable and the peer device whether is enabled.
- Connect to SFP/SFP+ Port
The installation process of the fiber module is as follows:
- Grasp the fiber module from the side and insert it smoothly along the switch SFP/SFP+ port slot until the module is in close contact with the switch.
- When connecting, pay attention to confirm the Rx and Tx ports of SFP/SFP+ fiber module. Insert one end of the fiber into the Rx and Tx ports correspondingly, and connect the other end to another device.
- After powered on, check the status of the port indicator. If on, it means that the link is connected normally; if off, it means the link is disconnected, please check the cable and the peer device whether is enabled.
- Connect to Console Port
- Connect the console cable (prepared by yourself) to the DB9 male connector or USB port to the PC.
- Connect the other end of the RJ45 end of the console cable to the console port of switch.
Notes:
- To connect, the steps order (1 -> 2) must be respected.
- To disconnect, the steps order is reversed (2 -> 1).
GETTING STARTED
LED Indicators
The front panel of the GWN783x has LED indicators for power and interface activities, the table below describes the LED indicators’ status.
LED Indicator | Status | Description |
System Indicator | Off | Power off |
Solid green | Booting | |
Flashing green | Upgrade | |
Solid blue | Normal use | |
Flashing blue | Provisioning | |
Solid red | Upgrade failed | |
Flashing red | Factory reset | |
Port Indicator | Off | Port off |
Solid green | Port with 10Gbps connected and there is no activity | |
Flashing green | Port with 10Gbps connected and data is transferring | |
Solid yellow | Port with 1Gbps connected and there is no activity | |
Flashing yellow | Port with 1Gbps connected and data is transferring | |
PWR/RPS Indicator | Off | Unused or failure |
Solid Green | In use | |
Solid Red | Overvoltage or undervoltage |
LED Indicators
Access & Configure
Login Using the Console Port
- Use the console cable to connect the console port of switch and the serial port of PC.
- Open the terminal emulation program of PC (e.g. SecureCRT), enter the default username and password to login. (The default administrator username is “admin” and the default random password can be found at the sticker on the GWN783x switch).
Login Remotely Using SSH
- Enter “cmd” in PC/Start.
- Enter ssh <gwn783x_IP> in the cmd window.
- Enter the default username and password to login. (The default administrator username is “admin” and the default random password can be found at the sticker on the GWN783x switch).
Configure Using GWN Cloud
Type https://www.gwn.cloud in the browser, and enter the account and password to login the cloud platform. If you don’t have an account, please register first or ask the administrator to assign one for you.
Login Using the Web UI
The GWN783x embedded Web server responds to HTTPS GET/POST requests. Embedded HTML pages allow users to configure the device through a Web browser such as Microsoft Edge, Mozilla Firefox, or Google Chrome.
- A PC uses a network cable to correctly connect any RJ45 port of the switch (or SFP/SFP+ using SFP+ to RJ45 transceiver module).
- Set the Ethernet (or local connection) IP address of the PC to 192.168.0.x (“x” is any value between 1-253), and the subnet mask to 255.255.255.0, so that it is in the same network segment with switch IP address. If DHCP is used, this step could be skipped.
- Type the switch’s default management IP address http://<gwn783x_IP> in the browser, and enter username and password to login. (The default administrator username is “admin” and the default random password can be found at the sticker on the GWN783x switch).
Web GUI Languages
The GWN783x web GUI supports many languages including English, Simplified Chinese, Spanish, French etc.
To change the default language, select the displayed language at the bottom of the web GUI either before or after logging in.
Search
The web GUI of the GWN783x switches provide a search tool to find the parameters quickly. To search for a specific parameter, please click on the magnifier icon on the top right corner of the web page.
OVERVIEW
Overview is the first section that displays System information in the first page “System Info” and Port status on the second page “Port Info”. This section provides the user with a general and global view about the GWN783x system and ports status for easy monitoring.
System Info
System Info is the first page after a successful login to the GWN783x Web Interface. It provides an overall view of the GWN783x Switch information presented in a Dashboard style for easy monitoring including basic info, Resources Status, FAN Status and System Events.
To name the device please click on , then enter the desired name.
Basic Info | Displays Device and System general information that includes (Device name, MAC Address, Default Gateway, System Time, System Version etc.) |
Resource Status | Displays in real time the usage of CPU and Memory. |
Fan | Displays the fans operation status and speed. |
System Events | Diplays the total number of events for each category (Emergency, Alert, Warning etc). Note: Clicking on any events category will redirect you to the Diagnostics page for further details. |
Power Supply | Shows the status of Built-in and RPS power supply either in use or unconnected. |
System Info page
Port Info
This page displays the status for each port (Ethernet RJ45 or SFP+) on the GWN783x switches indicated by color code, in terms of speed (10Gbps, 1000 Mbps, 100 Mbps/10Mbps), state (Linkdown, ErrDisable, Shutdown).
The following table explained the color mode and the symbols used:
Port Info
There are 3 main sections for each port:
- Basic Port: Displays info about the port name, speed, status etc.
Note: Click onto modify the port settings like Description, Speed, Duplex Mode and Flow Control or to enable or disable the port.
- Fiber Info: Displays fiber info like loss of signal, temperature, etc.
Note: Clickto be redirect to Maintenance → Diagnostics → Fiber Module.
- Statistics: Displays Statistics about Octets, and different types of Packets (Broadcast and Multicast, etc.)
Note: Clickon to clear the statistics
SWITCHING
Switching section is used to configure ports settings, link Aggregation, VLAN, Spanning Tree etc.
Port Basic Settings
On this page, you can configure the basic parameters for GWN783x Switch ports, like disabling or enabling the port, adding Description, specifying the speed by default is Auto, Duplex Mode, and Flow Control. There is also a filter on in case you wan to edit only the Copper ports which are the Gigabit Ethernet ports or Fiber ports which are the SFP+ ports.
To configure a port, please navigate to Web UI → Switching → Port Basic Settings.
To configure a port, click on “Edit” button or icon under operation column as shown above.
Port | The selected Port to be configured, it can be either Gigabit Ethernet port or SFP port. |
Port Type | Displays the Port Type (Copper or SFP+). |
Description | It is used to configure the information description of this interface , which can be a description of usage, etc., with a maximum of 128 characters, and the characters limited to input are numbers 0-9 , letters az / AZ and special characters. |
Port Enable | Set whether to enable the interface. it is enabled by default. |
Speed | Set the rate of the interface:
Note: When set to Auto, the rate of the interface is automatically negotiated between the interface and the peer port . |
Auto Detect | toggle ON or OFF Auto Detect, if it's ON the speed and DAC cable will be selected automatically, and if it's OFF the user can select speed and DAC Cable manually. Note: Only availabe for SFP+ Ports. |
DAC Cable | Select from the drop-down list the DAC Cable, the options are (Disable, 0.5m, 1m, 3m, 5m) Note: Only availabe for SFP+ Ports and when Auto Detect is disabled. |
Duplex Mode | Set the duplex mode of the interface. The GE ports options are { auto-negotiation, full-duplex, half-duplex}. The default is auto-negotiation. Note: Optical ports only support full-duplex mode.
|
Jumbo Frame | Specify the Jumbo Frame, the valid range is 1518-10000. Default is 9216 |
Flow Control | Set the flow control on the interface, the options are {Disabled, Enabled, Auto}. The default is Disabled. After enabling it, if the local device is congested, it will send a message to the peer device to notify the peer device to temporarily stop sending packets, after receiving the message, the peer device will temporarily stop sending packets to the local and vice versa. Thus, the occurrence of packet loss is avoided. Note: The optical port does not support auto-negotiation mode. |
Port Basic Settings – Edit port
Flow Statistics
For monitoring or even sometimes troubleshooting, the Flow Statistics displays in real time the flow of data with different units like Octects, Packets, Transmission Rate and OurErrPackets. The option to clear all the statistics or a specific port is supported as well.
Port Auto Recovery
Port Auto Recovery helps recover a port after a specific delay that can be specified by the user. When the following functions of the port trigger the port down, the port automatically returns to the up state after the delay time:
Examples:
- ARP packet detection: If the ARP rate in DAI exceeds the set value, the current port will be shut down.
- STP BPDU Guard: In spanning tree, the port enables BPDU Guard. When this function is triggered, the port will be shut down.
- Port Loop: When the port is self-looping and spanning tree is enabled, the port will be shut down.
- ACL: When the ACL rule is matched and the action is shutdown, the port will be shut down.
- Port Security: When the number of port MAC addresses exceeds the set number, the port will be shut down.
Link Aggregation
LAG means Link Aggregation Group which groups some physical ports together to make a single high-bandwidth data path. Thus it can implement traffic load sharing among the member ports in a group to enhance the connection reliability.
Link Aggregation Group
There are two load balance modes on the GWN783x Switches, either based on the MAC Address or based on the IP – MAC Address. And in terms of the type of LAG, there are either the static option or to use the LACP or Link Aggregation Control Protocol both of them are supported.
Load Balancing Mode | Select your Load balance mode. MAC address - Aggregated group will balance the traffic based on different MAC addresses. Therefore, the packets from different MAC addresses will be sent to different links. IP/Mac Address - Aggregated group will balance the traffic based on MAC addresses and IP addresses. Therefore, the packets from same MAC addresses but different IP addresses will be sent to different links. |
Edit Group | Name: Enter the name of the LA Group. Type: Use the drop down menu to specify the type for LAG.
GE: Click on port to check / uncheck which ones will be part of this LAG. |
Link Aggregation Group
LAG Port Settings
In this page, the user can Enable the Link Aggregation Group and add Description as well as specifying the speed and the flow control for LAG.
Click on “Edit” icon under operation column to edit a LAG.
Port | The selected LAG to be configured. |
Description | It is used to configure the information description for this LAG , which can be a description of usage, etc., with a maximum of 128 characters, and the characters limited to input are numbers 0-9 , letters az / AZ and special characters. |
Port Enable | Set whether to enable the interface. it is enabled by default. |
Speed | Set the rate of the interface, the options are {Auto, 10Mbps, 100Mbps, 1000Mbps}. The default is auto-negotiation. Note: When set to Auto, the rate of the interface is automatically negotiated between the interface and the peer port . |
Jumbo Frame | Specify the jumpo frame, valid range is 1518-10000. Default value is 9216 |
Flow Control | Set the flow control on the interface, the options are { Disabled, Enabled, Auto}. The default is Disabled After enabling it, if the local device is congested, it will send a message to the peer device to notify the peer device to temporarily stop sending packets, after receiving the message, the peer device will temporarily stop sending packets to the local and vice versa. Thus, the occurrence of packet loss is avoided. |
Edit a LAG
LACP
LACP or Link Aggregation Control Protocol is based on the priority, and the user can enable a system priority or even specify the the priority for each port individually.
System Priority | Set the system priority of LACP, the value range is an integer from 1-65535, the default is 32768. |
Edit LACP | Port: Select the switch LAG interface to be configured Port Priority:Set the LACP protocol priority of the port , the value range is an integer from 1 to 65535 , the default is 1. Note: The smaller the priority value of the port , the higher the LACP priority of the port. Timeout: Set the timeout time for receiving LACP packets, the options are { Short, Long} , the default is Short.
|
Link Aggregation – LACP
MAC Address Table
The MAC address table records the correspondence between the MAC addresses of other devices learned by the switch and the interfaces, as well as information such as the VLANs to which the interfaces belong. When forwarding a packet, the device queries the MAC address table according to the destination MAC address of the packet. If the MAC address table contains an entry corresponding to the destination MAC address of the packet, it directly forwards the packet through the outbound interface in the entry. If the MAC address table does not contain an entry corresponding to the destination MAC address of the packet , the device will use broadcast mode to forward the packet on all interfaces in the VLAN to which it belongs except the receiving interface.
The entries in the MAC address table are divided into Dynamic Address, Static MAC Address, Black hole Address and Port Security Address.
Dynamic Address
the MAC address table is established based on the automatic learning of the source MAC address in the data frame received by the device. If the MAC address entry does not exist in the MAC address table, the device adds the new MAC address and the interface and VLAN corresponding to the MAC address as a new entry into the MAC address table. GWN783x Switch will update the entry by resetting the aging time.
Aging Time:
Dynamic MAC address entries are not always valid . Each entry has a lifetime. The entries that cannot be updated after reaching the lifetime will be deleted. This lifetime is called the Aging Time. If the record is updated before reaching the lifetime, the aging time of the entry will be recalculated.
Click on “Refresh” button to update the table, or click on “Add Static MAC Address” button to add the entry to the static MAC address.
Static MAC Address
This section allows user to manually assign MAC address into MAC table. The configuration
result will be displayed on the table listed on the lower side of this web page.
MAC Address | Enter the MAC address that will be forwarded |
VLAN | This is the VLAN group to which the MAC address belongs. |
Port | Select the port where received frame of matched destination |
Static MAC Address
Black Hole Address
If a MAC address is not trusted or insecure, The user can block the traffic of certain MAC Address and discard them by adding them to the Black Hole Address Table.
Click on “Add” button then enter the MAC Address and the VLAN.
Port Security Address
After enabling port security in Security → Port Security, the addresses will be displayed in the MAC Address Table → Port Security Address synchronously.
The list shows interface name, VLAN, MAC address.
VLAN
A virtual local area network, virtual LAN or VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical local area network (LAN), but it allows for end stations to be grouped together even if they are not located on the same network switch. VLAN membership can be configured through software instead of physically relocating devices or connections.
A user can click on “Add” button to add a new VLAN, also it’s possible to create many VLANs at the same time by specifying a range, for example (7-9) will create VLAN 7,8 and 9, or create different separated VLANs, for example (11,89) will create VLAN 11 and 89.
If the VLAN is already created there is also the option to modify it by clicking on modify button for more options and settings like Description, Tagged and Untagged ports and LAGs.
VLAN | The specified VLAN ID |
Description | Enter a brief comment for the VLAN ID. |
Member Type | Select from the drop-down list:
|
GE | Select individually which ports are tagged, untagged or unselected. Note:
|
LAG | Select individually which LAGs are tagged, untagged or unselected. |
Edit VLAN
Please refer to this Table below for more details about Tagged and Untagged Ports.
Port Type | Receiving Packets | Forwarding Packets | |
Untagged Packets | Tagged Packets | Tagged Packets | |
Untagged | When untagged packets are received, the port will add the default VLAN tag, i.e. the PVID of the ingress port, to the packets. | If the VID of packet is allowed by the port, the packet will be received. If the VID of packet is forbidden by the port, the packet will be dropped. | The packet will be forwarded after removing its VLAN tag |
Tagged | The packet will be forwarded with its current VLAN tag |
Tagged and Untagged Ports
VLAN Port Settings
Port Settings page allows for configuring VLAN on each port and LAG by specifying the Link Type (Trunk, Access and Hybrid) as well as the default VLAN or PVID, the user can also enable Ingress Filtering for the selected port, also the accepted Frame Type (All, Tag Only and Untag only).
Port | Shows the selected Port. |
Link Type | Select the Link Type:
|
PVID | Enter the default VLAN ID. |
Accept Frame Type | Select the Frame type (Tag Only, Untag Only or All). |
Ingress Filtering | Set whether to enable the inbound filtering function of the interface. Ingress Filtering is only available for Hybrid port, and it's enabled by default. Note: Ingress filtering is a method used by enterprises and internet service providers (ISPs) to prevent suspicious traffic from entering a network. |
VLAN Port Settings
VLAN Port Members
On this page, the user can define both Tagged and Untagged VLANs (members) for each port individually.
Voice VLAN
Voice VLANs are configured specially for voice data stream. By configuring Voice VLANs and adding the ports with voice devices attached to voice VLANs, you can perform QoS-related configuration for voice data, ensuring the transmission priority of voice data stream and voice quality.
To configure Voice VLAN, please navigate to Web UI → Switching → VLAN page → Voice VLAN tab.
- If Auto Voice VLAN is selected: Enable LLDP/LLDP-MED and Auto Voice Network Policy or configure a network policy.
- OUI: click on “Edit” icon under operation column to configure the port.

Voice VLAN | Select from the drop-down list the Voice VLAN method:
By default is disabled. |
Voice VLAN ID | Select a VLAN as the voice VLAN from the VLAN list. Note: The default VLAN 1 cannot be used as a voice VLAN. |
CoS/802.1p Priority | Specify the CoS/802.1p Priority, Valid range is 0-7. |
If Auto Voice VLAN is selected | |
DSCP | Specify the DSCP priority, an integer ranging from 0 to 63. |
If Tagged or Untagged OUI is selected | |
CoS | Set whether to enable CoS Remarking. |
Aging Time | Set the aging time of the voice VLAN. The value range is an integer from 30 to 65536 , and the default is 1440 minutes . |
Edit Port Settings | Port: Displays the selected port. Status: Set whether to enable the voice VLAN function of the port. it is disabled by default. Mode: Set the working mode of the voice VLAN on the port. The default is manual. Note: When set to " Manual ", the port must be added to the voice VLAN manually, and the LLDP function needs to be used. |
Voice VLAN
OUI
An OUI address is a unique identifier assigned by IEEE (Institute of Electrical and Electronics Engineers) to a device vendor. It comprises the first 24 bits of a MAC address. You can recognize which vendor a device belongs to according to the OUI address. The following table shows the OUI addresses of several manufacturers. There is also the option to add a custom one based on user needs.
SPANNING TREE
STP (Spanning Tree Protocol), Devices running STP discover loops in the network and block ports by exchanging information, in that way, a ring network can be disbranched to form a tree-topological ring-free network to prevent packets from being duplicated and forwarded endlessly in the network.
BPDU (Bridge Protocol Data Unit) is the protocol data that STP, RSTP and MSTP use. Enough information is carried in BPDU to ensure the spanning tree generation. STP is to determine the topology of the network via transferring BPDUs between devices.
This page allows a user to configure and display Spanning Tree Protocol (STP) property configuration including the STP Mode (STP, RSTP or MSTP), Path Cost, Bridge Priority, Max Hops, Hello and Max Aging time and Forward Delay Time.
Spanning Tree | Set whether to enable Spanning Tree. |
Mode | Set the operating mode of Spanning Tree (STP).
|
Path Cost | Specify the path cost method (Short, Long). Default is Short. |
Bridge Priority | Select the Bridge Priority, In an STP network, the device with the smallest bridge ID is elected as the root bridge. Default is 32768. Note: The valid range is 0~61440, which must be a multiple of 4096 |
Max Hops | Select the Max Hops (the range is 1 - 40). Default is 20 |
Hello Time (s) | Specify the Hello Time in seconds (the range is 1 -10). Default is 2. Note: The time interval at which the device running the STP protocol sends the configuration message BPDU , which is used by the device to detect whether the link is faulty. |
Max Aging Time (s) | Select The aging time of BPDU packets of the port (the range is 6 - 40). Default is 20. |
Forward Delay Time (s) | Specify the Forward Delay Time in seconds (the range is 4 -30). Default is 15. |
STP Global Settings
STP Port Settings
To configure STP on each port and LAG then navigate to WEB UI → Spanning Tree → Port Settings, then click on “Edit” button.
For each port or LAG, the user can enable STP and specify the priority, Path Cost, Edge port, BPDU Guard and Filter and Point-To-Point.
Port | Displays the selected GE/LAG Port. |
Enable STP | Set whether to enable STP on this port. |
Priority | Priority is an important basis for determining whether the port will be selected as the root port. The port with higher priority under the same conditions will be selected as the root port . The smaller the value , the higher the priority . An integer in the range of 0-240, with a step size of 16, and a default of 128 . Note: The valid range is 0~240, which must be a multiple of 16 |
Path Cost | Set the path cost of the port on the specified spanning tree. The default value is 0, which means that path cost calculation is performed automatically. Note: The valid range is 0~200000000. 0 is equal to auto |
Edge Port | Set whether to enable Edge Port or disable it, by default it's on auto. Notes:
|
BPDU Guard | Set whether to enable BPDU Guard. Note: BPDU Guard further protects your switch by turning this port into error state and shutdown if any BPDU received from this port. |
BPDU Filter | Set whether to enable BPDU Filter. Note: Drop all BPDU packets and no BPDU will be sent. |
Point-to-Point | Select Point-to-Point option (Auto, Enabled or Disabled). Default is Auto. Note: determines the STP of link type for this port automatically if set to Auto. |
STP Port Settings
Multiple Spanning Tree Instance
MST or Multiple Spanning Tree Instance allows traffic of different VLAN to be mapped into different MST Instances. GWN783x Switch supports up to 16 independent MST instances (0~15) where each instance can be associated with many VLANs.

MST Port Settings is used to configure the GE port / LAG group settings for each MST instance.
The table displays the MST parameters for each port.
Click on “Edit” button to edit the MST Port Settings for each Port/LAG individually and also the user can even specify the Path Cost and Priority per Port/LAG as well.
IP
VLAN IP Interface
Hosts in different VLANs cannot communicate directly and need to be forwarded through routers or layer 3 switching protocols.
A VLAN interface is a virtual interface in Layer 3 mode and is mainly used to implement Layer 3 communication between VLANs, it does not exist on the device as a physical entity. Each VLAN corresponds to an interface by configuring an IP address for it, it can be used as the gateway address of each port in the VLAN so that packets between different VLANs can be forwarded to each other on Layer 3 routing through the VLAN interfaces. GWN switches support IPv4 interfaces as well as IPv6.
To configure a VLAN IP Interface, please navigate to Web UI → IP → VLAN IP Interface page.
MGMT VLAN (Management VLAN): as the name suggests it’s the VLAN used to manage the switch, for example when using remote location with protocols like telnet, SSH, syslog etc. the default MGMT VLAN is VLAN 1 and the user have to choice to change it by selecting another VLAN from the drop-down list.
To add an IP Interface, please click on “Add” button, refer to the figure above:
IPv4 Address Type:
- If DHCP is selected: hosts will obtain IP addresses automatically from whatever DHCP pool configured from example like a router.

Gateway Priority: valid range from 2 [very important] to 255 [least important].
MTU (Maximum Transmission Unit): valid range is 1280-9216.
- If Static IP is selected: for hosts to obtain IP addresses, the user must configure DHCP Server with the same VLAN.

DHCP Server
When creating VLAN IP Interface with a static IP, the user can link it with a DHCP Server for hosts to obtain IP addresses.
Please navigate to Web UI → IP → DHCP Server page.
Step 1: Enable DHCP Server.

Step 2: on Pool Settings tab, click on “Add” button to add a new DHCP Server.
Add a pool range for the DHCP Server, then select the interface (VLAN).
The address table will displays the hosts (devices) MAC Addresses and the IP addresses when using the DHCP Server. Also it’s possible make a entry a static one by clicking on “Add as Static Binding IP” button.
DHCP Relay
DHCP relay on GWN783x switch helps a network device pass DHCP messages between clients and servers that are on a completely different networks. When you have a DHCP server that needs to serve clients on different subnets (or VLANs). A DHCP relay agent is a network device that can route between the client’s subnet and the server’s subnet. The relay agent gets the broadcast request from the client and sends it to the server, putting its own interface address as the gateway address (giaddr) field in the packet. This way, the server can tell which subnet the client is on and assign a suitable IP address. The server then sends the reply back to the relay agent, which passes it to the client.
DHCP Relay | Set whether to enable the global DHCP relay function the default is off. |
Polling | Set whether to enable the polling function of the DHCP relay disabled by default. |
TTL | Set the TTL value of the DHCP request message after being forwarded by the DHCP relay layer 3. the value is an integer from 1 to 16 , and the default is 4 . |
DHCP Server | |
Interface | Select from the existing VLAN interfaces. |
DHCP Server | Set the address of the DHCP server. Note: The DHCP server address cannot be the interface IP address of the DHCP relay gateway , otherwise the DHCP client cannot obtain an IP address. |
DHCP Relay
ARP Table
Address Resolution Protocol ARP is a protocol used to resolve IP addresses to MAC addresses. In a local area network, when a host or three-layer network device has data to send to another host or three-layer network device, it needs to know the other party’s network layer address (IP address) because IP addresses must be encapsulated into frames to be sent over the physical network, the sender also needs to know the receiver’s actual physical address (MAC address), which requires a mapping from IP to MAC address. ARP implements the resolution of IP addresses into MAC addresses. A host or Layer 3 network device maintains an ARP table to store the relationship between IP addresses and MAC addresses. ARP entries include dynamic ARP entries and static ARP entries.
Dynamic ARP entry: It is automatically generated and maintained by the ARP protocol through ARP packets , can be aged out, can be updated by new ARP packets, and can be overwritten by static ARP entries . When the aging time is reached and the interface is down, the device immediately deletes the dynamic ARP entry in response .
Static ARP entry: A fixed mapping relationship between IP addresses and MAC addresses manually established by the network administrator, which will not be aged out and will not be overwritten by dynamic ARP entries, which can ensure the security of network communication. Static ARP entries can restrict the local device to use only the specified MAC address when communicating with the peer device with the specified IP address, in this case, the attack packet cannot modify the mapping relationship between the IP address and the MAC address in the ARP table of the local device thus the normal communication between the local device and the peer device is protected.
To configure ARP Table, please navigate to Web UI → IP → ARP Table.
Aging time (seconds): Set the aging time of dynamic ARP entries. After the aging time expires, dynamic ARP entries are automatically deleted. The value range is an integer from 15 to 21600, and the default is 1200 seconds.
- Click on “Link” icon to make the dynamic entry as a static entry.
- Click on “Delete” icon to delete the static entry.
- Click on “Modify” icon to modify the static entry
It’s also possible to add a static ARP entry manually by clicking on “Add” button, then specify the VLAN, IP Address and MAC Address combination.

Neighbor Discovery
Neighbor Discovery Protocol (NDP) is an important basic protocol in the IPv6 protocol system it replaces the ARP and ICMP router discovery of IPv4. It defines the use of ICMPv6 packets to achieve address resolution, neighbor unreachability detection, duplicate address detection, router discovery, redirection, ND proxy, and other functions.
IPv6 address autoconfiguration and router discovery rely on two kinds of ICMPv6 messages: RS (Router Solicitation) and RA (Router Advertisement). Hosts send RS messages to ask routers on the same link to send RA messages right away. Routers send RA messages to let hosts know they are there and give them information like IPv6 prefixes, hop limit, MTU, and configuration flags.
To configure ND please navigate to Web UI → IP → Neighbor Discovery.

Aging time (seconds): Set the aging time of dynamic neighbor entries. After the aging time expires, the dynamic neighbor entry is automatically deleted. The value range is an integer from 15 to 21600, and the default is 1200 seconds.
Click on “Refresh” button to refresh the list for dynamic entries or click on “Add” button to add a static entry, refer to the figure below:

Select the VLAN from the drop-down list then enter the unicast IPv6 address and MAC address then click on “OK” button.
DNS
Domain Name System DNS provides translation services between domain names and IP addresses. GWN783x Switches act as a DNS client. When users perform certain applications on the device (such as Telnet to a device or host), they can directly use a memorable and meaningful domain name, and resolve the domain name to the correct address through the domain name system.
DNS domain name resolution is divided into static domain name resolution and dynamic domain name resolution which can be used together when parsing domain names. If the static domain name resolution is unsuccessful, then dynamic domain name resolution will be used, since dynamic domain name resolution may take a certain amount of time and requires the cooperation of the domain name server, some commonly used domain names can be put into the static domain name resolution table, which can greatly improve the effect of domain name resolution.
Global Settings
On this page, the user can designate the switch as a DNS client to resolve DNS names to IP addresses through one or more configured DNS servers. It’s enabled by default.
To configure DNS on GWN783x switches, navigate to Web UI → IP → DNS, then click on the Global Settings tab.
Up to 8 Domain Suffixes and 8 DNS Servers can be added. To add a Domain Suffex or DNS Server click on “+” icon and to delete click on “–” icon.
Domain Mapping Table
To add a static DNS or to view the Dynamic ones, click on the Domain Mapping Table tab.
Click on “Add” button to add a new static DNS entry.

The user can also select the dynamic domains and then click on “Add as a static domain” button or icon to make them as static ones.
MULTICAST
IP multicast is a technique for one-to-many communication over an IP infrastructure in a network. To avoid the incoming data broadcasting to all GE/LAG ports, multicast is useful to transfer the data/message to specified GE/LAG ports for IGMP snooping or MLD Snooping. When the Switch receives a message “subscribed” by the client, it must decide to transfer the data to specified GE/LAG ports according to the location of the client (subscribed member).
IGMP Snooping
As an IPv4 Layer 2 multicast protocol, IGMP snooping is the process of listening to Internet Group Management Protocol (IGMP) network traffic. The feature allows a network switch to listen in on the IGMP conversation between hosts and routers. By listening to these conversations the switch maintains a map of which links need which IP multicast streams. Multicasts may be filtered from the links which do not need them and thus controls which ports receive specific multicast traffic.
IGMP Snooping Global Settings
This page allows the user to enable/disable IGMP Snooping function, select snooping version, and enable/disable snooping report suppression also select the Multicast Forward Mode and what to do with Unknown Multicast Packet.
Unknown Multicast Packet | Select an action for switch to handle with unknown multicast
Note: This option is associated with the same one IGMP Snooping. |
MLD Snooping | Enable or disable GlobaI MLD Snooping |
Multicast Forward Mode | Set the Multicast Forward Mode.
|
MLD Version | Select the MLD Version. |
Report Suppression | Enable or disable the switch to handle MLD reports |
IGMP Snooping Global Settings
The user can also Enable/Disable IGMP Snooping and IGMP Snooping Querier per VLAN and much more.
VLAN | Displays the selected VLAN |
IGMP Snooping | Click on the toggle button to enable IGMP Snooping for the selected VLAN. |
Router Port Auto-Learning | Click on the toggle button to learn router port by IGMP query. |
Port Fast Leave | Select Enable/Disable Fast Leave feature for the desired port. Note: If Fast Leave is enabled for a port, the switch will immediately remove this port from the multicast group upon receiving IGMP leave messages. |
Query Robustness | Set a number which allows tuning for the expected packet loss on a subnet. The valid range is 1-7 |
Query Interval (s) | Set the interval of querier send general query. |
Query Max Response Interval (s) | It specifies the maximum allowed time before sending a responding report. Note: The valid range is 5-20 in seconds. |
Last Member Query Count | After quering for specified times and still not receiving any response from the subscribed member, GWN7800 series switches will stop transmitting data to the related GE port(s). Note: The valid range is 1-7 |
Last Member Query Interval (s) | The maximum time interval between counting each member query message with no responses from any subscribed member. Note: The valid range is 1-25 in seconds |
IGMP Snooping Edit VLAN
IGMP Snooping Router Port
This page shows the IGMP querier router known to this switch. Click on “Add” to add another one or Click on “Edit” icon to modify already created one.

IGMP Snooping Multicast Address
Dynamic multicast addresses will be listed here and the user can also add static multicast address entries based on VLAN by clicking on “Add” button or click “Edit”
icon to edit.
IGMP Snooping Multicast Policy
In this page, the user can add a Multicast Policy up to 128 Policy ID to Allow or Reject a range of Multicast Addresses.
IGMP Snooping Multicast Port
Once the Multicast Policy is created, the user is able to apply this policy on a port.
MLD Snooping
MLD Snooping Global Settings
As an IPv6 Layer 2 multicast protocol, MLD Snooping maintains the outgoing port information of multicast packets by listening to the multicast protocol packets sent between Layer 3 multicast devices and user hosts, so as to manage and control multicast data . Forwarding of packets at the data link layer. When an MLD protocol packet transmitted between a host and an upstream Layer 3 device passes through a Layer 2 device, MLD Snooping analyzes the information carried in the packet, establishes and maintains a Layer 2 multicast forwarding table based on the information, and guides multicast data in the data stream.
Global Settings page give the user the ability to enable MLD Snooping as well as selecting Multicast Forward Mode etc.
Unknown Multicast Packet | Select an action for switch to handle with unknown multicast
Note: This option is associated with the same one IGMP Snooping. |
MLD Snooping | Enable or disable GlobaI MLD Snooping |
Multicast Forward Mode | Set the Multicast Forward Mode.
|
MLD Version | Select the MLD Version. |
Report Suppression | Enable or disable the switch to handle MLD reports |
MLD Snooping Global Settings
Once Global MLD Snooping is enabled, then the user can enable more settings per VLAN.
VLAN | Displays the selected VLAN |
MLD Snooping | Click on the toggle button to enable MLD Snooping for the selected VLAN. |
MLD Snooping Querier | Click the toggle button to enable the MLD Snooping Querier. |
MLD Snooping Querier Version | Select from the drop-down list the MLD Snooping Querier Version. |
Router Port Auto-Learning | Click on the toggle button to learn router port by MLD query. |
Port Fast Leave | Select Enable/Disable Fast Leave feature for the desired port. Note: If Fast Leave is enabled for a port, the switch will immediately remove this port from the multicast group upon receiving MLD leave messages. |
Query Robustness | Set a number which allows tuning for the expected packet loss on a subnet. The valid range is 1-7 |
Query Interval (s) | Set the interval of querier send general query. |
Query Max Response Interval (s) | It specifies the maximum allowed time before sending a responding report. Note: The valid range is 5-20 in seconds. |
Last Member Query Count | After quering for specified times and still not receiving any response from the subscribed member, GWN7806(P) series switches will stop transmitting data to the related GE port(s). Note: The valid range is 1-7 |
Last Member Query Interval (s) | Set The maximum time interval between counting each member query message with no responses from any subscribed member. Note: The valid range is 1-25 in seconds |
MLD Snooping – Edit VLAN
MLD Snooping Router Port
If the router port is statically configured, the Layer 2 device will also forward the MLD report and leave message to the static router port. If a static member port is configured, the interface will be added as the outgoing interface in the forwarding table. After a Layer 2 multicast forwarding table entry is established on a Layer 2 device, when the Layer 2 device receives a multicast data packet, it searches for the forwarding table according to the VLAN to which the packet belongs and the destination address of the packet (that is, the IPv6 multicast group address). Whether the item has the corresponding “outbound interface information”. If it exists, the packet is sent to all multicast group member ports; if it does not exist, the packet is discarded or broadcast in the VLAN.
MLD Snooping Multicast Address
GWN783x Switches do also support adding static multicast addresses by specifying the VLAN and member port.
MLD Snooping Multicast Policy
Multicast Policy can be created in this page to allow or reject a range of IPv6 Multicast Addresses. Up to 128 Policy can be created.
MLD Snooping Multicast Port
The multicast policy can be applied to Gigabit Ethernet/LAG port, the user can also set the maximum number of multicast groups that the port is allowed to join and set the action when the port multicast exceeds the limit, the default is rejected .
Routing
Routing is a process in which the router selects the optimal path according to the destination address of the received data packet and forwards it to the next network node leading to the target network, and the last routing node under this path forwards the data to the target host. (Router refers to both a router in the traditional sense and an Ethernet switch running a routing protocol).
GWN783x support IPv4 and IPv6 static routing.
Routing Table
A routing table is like a map of the network that shows the best routes to each destination. It achieves this by storing information on how to reach different destinations on a network and with this table the router can decide where to forward packets that it receives from other devices.
To get to the Routing Table, please navigate to Web UI → Routing → Routing Table.
A routing table contains the following information for each entry: Destination IP address, Mask Length, Protocol Type, Priority, Next Hop, outgoing Interface and Flags.
A routing table get populated over time with dynamic routing protocol like OSPF and RIP or static entries (manually configured by an administrator) or directly connected networks.
Static Routes
Static route is a special route that requires manual configuration by an administrator. Static routes have different purposes in different network environments:
- When the network structure is relatively simple, the network can work normally only by configuring static routes.
- In complex network environments, configuring static routes can improve network performance and ensure bandwidth for important applications, however, when the network fails or the topology changes , the static routes are not automatically updated and must be reconfigured manually.
To add a static route, please navigate to Web UI → Routing → Static Routes page.
Click on “Add” button to add a new static route. then fill in the Destination IP Address with the mask length then select the next hop or the outgoing interface (VLAN) with specifying the priority.
Please refer to the figure below:

OSPF (Open Shortest Path First)
OSPF stands for Open Shortest Path First, it’s a routing protocol and uses a link state routing algorithm, in other words it collects information about the state of each link in the network to build an overall map about the whole network topology. OSPF is an interior gateway protocol (IGP) same as RIP (Routing Information Protocol), it’s a protocol based on distance vector algorithms. OSPF has many advantages over other routing protocols, such as RIP.
Some Advantages of OSPF protocol:
- OSPF can perform route summarization, which reduces the size of the routing table and improves scalability.
- OSPF supports IPv4 and IPv6.
- OSPF can split the network into areas, which are logical groups of routers that share the same link state information. This reduces the amount of routing information that needs to be exchanged and processed by each router.
- OSPF can use authentication to secure the exchange of routing information between routers.
- OSPF can deal with variable length subnet masks (VLSM), which allows for more efficient use of IP addresses and network design.
In this example we will be using three GWN switches directly connected (neighbors) and a router serving as a DHCP server. Please refer to the figure below:
To start using OSPF, please navigate to Web UI → Routing → OSPF:
Toggle ON OSPF and enter the Router ID (it can be any IPv4 address) then scroll down to the bottom of the page and click the “OK” button, please refer to the figure below:
On the Interface Settings tab, click on “Edit” icon to enable the VLAN IP Interface.
Toggle ON the OSPF on the selected interface then scroll down and click on “OK” button.
Please do the same steps on the second switch, then on the Neighbor Info tab, click on “refresh” button for the adjacent (directly connected) switches to appear.
Navigate to the Routing table Web UI → Routing → Routing table to confirm that the routing table contains routes to the previously created VLAN IP Interfaces on the other switch. Please refer to the figure below:
To check the LSDB (Link State DataBase), click on the Database Info tab, select the type (database) then click on “Query” Button to see the Database info which is a list of all LSA (Link State Advertisements) that the OSPF routers use to get information about other routers running OSPF protocol and that is what helps to populate the routing table for the best route to each destination.
QoS
Popularity of the network and the diversification of services have led to a surge in Internet traffic, resulting in network congestion, increased forwarding delay, and even packet loss in severe cases, resulting in reduced service quality or even unavailability. Therefore , in order to carry out these real-time services on the network, it is necessary to solve the problem of network congestion . The best way is to increase the bandwidth of the network, but considering the cost of operation and maintenance, this is not realistic . The most effective solution is to apply a ” Guaranteed ” policies govern network traffic. QoS technology is developed under this background . QoS is quality of service , and its purpose is to provide end-to-end service quality assurance for various business needs . QoS is a tool for effectively utilizing network resources. It allows different traffic flows to compete for network resources unequally. Voice, video and important data applications can be prioritized in network equipment.
Port Priority
In this page, the user can enable/disable port priority for each interface (port/LAG), supported modes are (CoS, DSCP, CoS-DSCP or IP-Precedence).
Please navigate to Web UI → QoS → Port Priority page.
Then the user can click on “Edit” button for further configuration per Port/LAG.
Port | Displays the selected port GE/LAG. |
Trust Mode | Select the QoS operation mode:
|
CoS | Set the CoS value of the interface, the value range is an integer from 0 to 7 (7 is the highest priority ), the default is 0. |
Remarking CoS | Set whether to enable Remarking CoS function of outgoing packets, which is disabled by default. |
Remarking DSCP | Set whether to enable Remarking DSCP function of outgoing packets, and it is disabled by default. |
Re-marking IP Precedence | Set whether to enable Remarking IP Precedence function of outgoing packets, and it is disabled by default. Note : Only one of DSCP and IP Precedence re-marking can be enabled. |
QoS Port Priority
Priority Mapping
Priority mapping is used to realize the conversion between the QoS priority carried in the packet and the internal priority of the device ( also known as the local priority, which is the priority used by the device to differentiate the service level of the packet ) so that the device provides the Differentiated QoS service quality. Users can use different QoS priority fields in different networks according to network planning.
- CoS Mapping
Shows the mapping relationship between queues and CoS remarking priorities.
- DSCP Mapping
Shows the mapping relationship between DSCP values and queue priorities.
- IP Mapping
Shows the mapping relationship between IP priority and queue.
Queue Scheduling
When congestion occurs in the network, the device will determine the processing order of forwarding packets according to the specified scheduling policy, so that high-priority packets are preferentially scheduled.
Queue scheduling algorithm : queue scheduling according to the switch interface.
- Strict priority ( SP, Strict Priority) scheduling: The flow with the highest priority is served first, and the flow with the second highest priority is served until there is no flow at that priority. Each interface of the switch supports 8 queues ( queues 0-7 ), queue 7 is the highest priority queue, and queue 0 is the lowest priority queue. Disadvantage : When congestion occurs, if there are packets in the high-priority queue for a long time, the packets in the low-priority queue cannot be scheduled, and data cannot be transmitted.
- Weighted Round Robin ( WRR, Weighted Round Robin) scheduling: each priority queue is allocated a certain bandwidth, and provides services for each priority queue according to the priority from high to low. When the high-priority queue has used up all the allocated bandwidth, it is automatically switched to the next priority queue to serve it.
- Weighted Fair Queuing (WFQ): On the basis of ensuring fairness ( bandwidth , delay) as much as possible, priority considerations are added , so that high-priority packets have more opportunities for priority scheduling than low- priority packets . WFQ can automatically classify flows by their “session” information ( protocol type , source and destination IP addresses , source and destination TCP or UDP ports, priority bits in the ToS field, etc.) Place each flow evenly into different queues, thus balancing the latency of the individual flows as a whole. When dequeuing , WFQ allocates the bandwidth that each flow should occupy at the egress according to the flow priority (Precedence) . The smaller the priority value is, the less bandwidth is obtained ; otherwise, the more bandwidth is obtained.
- SP-WRR: the switch schedules packets in the SP scheduling group preferentially, and when the SP scheduling group is empty, schedules the packets in the WRR scheduling group. Queues in the SP scheduling group are scheduled with the SP queue scheduling algorithm. Queues in the WRR scheduling group are scheduled with WRR.
- SP-WFQ: the switch schedules packets of queues in the WFQ group based on their minimum guaranteed bandwidth settings, then uses SP queuing to schedule the queues in the SP scheduling group, then uses WFQ to schedule the queues in the WFQ scheduling group in a round robin fashion according to their weights.
Queue Shaping
When the packet sending rate is higher than the receiving rate, or the interface rate of the downstream device is lower than the interface rate of the upstream device, network congestion may occur. If the size of the service traffic sent by users is not limited , the continuous burst of service data from a large number of users will make the network more congested. In order to make the limited network resources serve users more effectively, it is necessary to restrict the service flow of users.
To configure Queue Shaping, please navigate to Web UI → QoS → Queue Shaping.
To configure a port, click on “Edit” icon under operation column.
Maximum Rate/CIR (Kbps): Configures the maximum rate of shaping. The value must be an integer between 16-1000000 Kbps, and must be multiples of 16. By default it’s the port rate.
Committed Burst/CBS (Bytes): Configures the committed burst traffic that can transmit instantly. The valid range is 678-53247 bytes. The default value is 53247 bytes.
Rate Limit
Interface rate limit can limit the total rate of all packets sent or received on an interface . The interface rate limit also uses the token bucket to control the flow. If an interface rate limit is configured on an interface of the device, all packets sent through this interface must first be processed through the token bucket of the interface rate limiter . If there are enough tokens in the token bucket , the packet can be sent; otherwise, the packet will be discarded or cached.
To configure Rate Limit, please navigate to Web UI → QoS → Rate Limit.
To configure a port, click on “Edit” icon under operation column, then set the CIR and CBS for both Ingress and Egress.
CIR (Committed Information Rate): the guaranteed average transmission rate or the minimum guaranteed traffic delivered in the network.
CBS (Committed Burst Size): the average volume of burst traffic that can pass through an interface.
SECURITY
GWN783x Switches series support many tools and features to enhance the security of the device against misconfiguration or attacks.
Storm Control
Traffic suppression can limit the rate of broadcast, unknown multicast , unknown unicast, known multicast, and known unicast packets by configuring thresholds , preventing broadcast, unknown multicast packets, and unknown unicast packets from generating broadcast storms. Large traffic impact of known multicast packets and known unicast packets.
Storm control can block the traffic of broadcast, unknown multicast and unknown unicast packets by blocking packets or shutting down ports . The device supports storm control for the above three types of packets on the interface according to the packet rate, byte rate, and percentage . During a detection interval, the device monitors the average rate of three types of packets received on the interface and compares it with the configured maximum threshold. When the packet rate is greater than the configured maximum threshold , the device performs storm control on the interface and executes the Configured storm control actions. Storm control actions include blocking packets and shutting down / shutdown interfaces.
- If packets are blocked, when the average rate of receiving packets on the interface is less than the specified minimum threshold, storm control will release the blocking of the packets on the interface.
- If the action is to shut down / shutdown the interface, you need to manually run the command to bring up the interface, or enable the interface state to automatically return to UP, it’s also possible to use the Auto Recovery function to bring up the interface automatically.
Unit | Select Unit:
|
IFG | Select IFG ( Inter Frame Gap ):
|
Storm Control → Edit | |
Port | Displays the selected port. |
Storm Control | Select whether to enable Storm Control on the selected port or not. |
Broadcast | Set whether to enable the storm threshold setting for broadcast packets. If Enabled Please enter a Treshhold (Kbps). Note: The valid range is 16~1000000, which must be a multiple of 16. Default is 10000. |
Unknown Multicast | Set whether to enable the storm threshold setting for the Unknown Multicast packets If Enabled Please enter a Treshhold (Kbps). Note: The valid range is 16~1000000, which must be a multiple of 16. Default is 10000. |
Unknown Unicast | Set whether to enable the storm threshold setting for the Unknown Unicast packets. If Enabled Please enter a Treshhold (Kbps). Note: The valid range is 16~1000000, which must be a multiple of 16. Default is 10000. |
Action | Select the state of setting
|
Storm Control
Port Security
By converting the MAC address learned by the interface into secure MAC addresses ( including secure dynamic MAC address, secure static MAC address and Sticky MAC) , port security prevents illegal users from communicating with the switch through this interface, thereby enhancing the security of the device.
Security MAC addresses are divided into: Secure Dynamic MAC, Secure Static MAC and Sticky MAC.
Secure Dynamic MAC Address | If enabled but the Sticky MAC function is not enabled. | If the device is restarted, the entries will be lost and need to be relearned. |
Secure Static MAC Address | Static MAC address manually configured when port security is enabled. | The entries will not be aged, and will not be lost after a reboot. |
Sticky MAC Address | The MAC address converted after the port security is enabled and the Sticky MAC function is enabled at the same time | The entries will not be aged , and the addresses will not be lost after restarting the device. |
Secure MAC Address Types
Port Security | Click Allow to set the port security function to be enabled globally , by default is disabled. |
Rate Limit (packet/s) | Set the rate at which the port MAC address is learned. The value is an integer from 1 to 600, the default is 100. |
Edit Port Security | |
Port | Displays the selected ports. |
Port Security Address | Click to enable Port Security Address, by default is disabled. |
Maximum MAC Number | Set the maximum number of MAC addresses to be learned by the interface , the value range is an integer from 1 to 256 , and the default is 1 . After the maximum number is reached , if the switch receives a packet whose source MAC address does not exist, regardless of whether the destination MAC address exists, the switch considers that there is an attack by an illegal user, and will protect the interface according to the port protection configuration (Protect, Restrict or Shutdown). |
Sticky MAC | When the port security is enabled, the Sticky MAC function can be enabled, by default it's disabled . When enabled, the interface will convert the learned secure dynamic MAC address into a Sticky MAC. If the maximum number of MAC addresses has been reached, the MAC address in the non-sticky MAC entry learned by the interface will be discarded , and a trap alarm will be reported according to the interface protection mode configuration. |
Port Protection | Set the protection action when the number of MAC addresses learned by the interface reaches the maximum number or static MAC address flapping occurs . There are three modes (Protect, Restrict or Shutdown), the default is Protect.
|
Port Security
Port Isolation
With the port isolation function, the isolation between ports in the same VLAN can be realized. As long as the user adds the port to the isolation group, the Layer 2 data isolation between the ports in the isolation group can be realized. The port isolation function provides users with a safer and more flexible networking solution.
ACL
Access control list (ACL) is a collection of one or more rules. A rule is a judgment statement that describes the matching conditions of a packet. These conditions can be the source address, destination address, port number, etc. of the packet. ACL is essentially a packet filter, and the rule is the filter element of the filter. The device matches packets based on these rules, filters out specific packets , and allows or organizes the packets to pass through according to the processing policy of the service module that applies the ACL.
IPv4 ACL
This page displays the list of IPv4 ACL and the number of rules.
IPv6 ACL
The same as the IPv4 ACL, there is also a list for IPv6 ACL, and the same applies here.
MAC ACL
A MAC access control list (ACL) lets you permit or deny WiFi access to individual devices based on their MAC addresses. For example, if you notice a guest device that is using too much bandwidth, you can deny WiFi access to it without affecting other guest devices.
ACL Binding
ACL Binding lets the user bind MAC ACL or IP ACL to a certain ports GE/LAG.
IP Source Guard
IP source guard attack is a source IP address filtering technology based on Layer 2 interface. It can prevent malicious hosts from forging IP addresses of legitimate hosts to impersonate legitimate hosts, and also ensure that unauthorized hosts cannot access by specifying their own IP addresses. network or attack the network. IPSG uses the binding table (source IP address, source MAC address, VLAN to which it belongs, and the binding of the inbound interface ) to match and check the IP packets received on the Layer 2 interface. Only the packets matching the binding table are allowed to pass through.
In this page the user can specify the IP and MAC addresses as well as the VLAN for a port LAN/LAG.
Anti Attack
In the network , there are a large number of malicious attack packets targeting the CPU and various types of packets that need to be normally sent to the CPU. Malicious attack packets targeting the CPU will cause the CPU to be busy processing attack packets for a long time, thereby causing interruption of other services or even system interruption ; a large number of normal packets will also lead to high CPU usage and performance degradation, thus affecting the normal business.
In order to protect the CPU and ensure that the CPU can process and respond to normal services , the switch provides a local attack defense function , which is aimed at the packets sent to the CPU. It operates normally to avoid the mutual influence of various services when the device is attacked.
Attack defense is an important network security feature. It analyzes the content and behavior of the packets sent to the CPU for processing, determines whether the packets have attack characteristics, and configures certain preventive measures against the packets with attack characteristics. Defense attacks are mainly divided into malformed packet attack defense, fragmented packet attack defense, and flood attack defense.
Dynamic ARP Inspection (DAI)
To defend against man-in-the-middle attacks and prevent data of legitimate users from being stolen by the man-in-the-middle, you can enable dynamic ARP inspection. The device compares the source IP, source MAC, interface, and VLAN information corresponding to the ARP packet with the information in the binding table. If the information matches, it means that the user who sent the ARP packet is a legitimate user, and the user is allowed. If the ARP packet passes, otherwise it is considered an attack and the ARP packet is discarded.
Dynamic ARP inspection can be enabled in the interface view , or VLAN view. When enabled in the interface view , the binding table matching check is performed on all ARP packets received by the interface ; when enabled in the VLAN view . Then, the binding table matching check is performed on the ARP packets belonging to the VLAN received by the interface that joins the VLAN.
When the device discards a large number of ARP packets that do not match the binding table, if you want the device to alert the network administrator in the form of an alarm , you can enable the dynamic ARP inspection discarded packet alarm function. When the number of discarded ARP packets exceeds the alarm threshold , the device generates an alarm.
The statistics about DAI activities will be listed here for each port GE/LAG with the options of refreshing the statistics or clearing specified port data.
RADIUS
RADIUS is a distributed, client /server information exchange protocol that can protect the network from unauthorized access. It is often used in various network environments that require high security and allow remote users to access. This protocol defines the UDP-based RADIUS packet format and its transmission mechanism, and specifies destination UDP ports 1812 and 1813 as the default authentication and accounting port numbers, respectively.
Radius provides access services through authentication and authorization, and collects and records the use of network resources by users through accounting . The main features of RADIUS protocol are: client/server mode, secure message exchange mechanism and good expansibility.
TACACS+
TACACS+ (Terminal Access Controller Control System Protocol) is a security protocol with enhanced functions based on the TACACS protocol. This protocol is similar in function to the RADIUS protocol, and uses the client/server mode to implement the communication between the NAS and the TACACS+ server.
TACACS+ is a centralized, client /server structure information exchange protocol, which uses TCP protocol for transmission, and the TCP port number is 49. The authentication , authorization and accounting servers provided by TACACS+ are independent of each other and can be implemented on different servers. It is mainly used for authentication, authorization and accounting of access users who access the Internet by means of point-to-point protocol PPP or virtual private dial-up network VPDN and management users who perform operations.
TACACS+ is similar to RADIUS protocol : ( 1 ) both adopt client /server mode in structure; (2) both use shared key to encrypt the transmitted user information ; ( 3 ) both have better flexibility and expansibility. TACACS+ has more reliable transmission and encryption characteristics, and is more suitable for security control.
AAA
Access control is used to control which users can access the network and which network resources can be accessed. AAA is short for Authentication , Authorization , and Accounting , and provides a management framework for configuring access control on NAS ( Network Access Server) devices .
As a management mechanism of network security , AAA provides services in a modular manner:
- Authentication , confirming the identity of users accessing the network , and judging whether the visitor is a legitimate network user;
- Authorization , giving different users Different permissions limit the services that the user can use;
- Billing , record all operations during the user’s use of network services, including the type of service used, start time, data flow, etc., to collect and record the user’s The usage of network resources, and can realize the charging requirements for events and traffic, and also monitor the network.
AAA adopts a client /server structure. The AAA client runs on the access device, usually referred to as a NAS device, and is responsible for verifying user identity and managing user access; AAA server is a collective name for authentication server, authorization server and accounting server. Responsible for centralized management of user information. AAA can be implemented through a variety of protocols. Currently, devices support AAA based on RADIUS or TACACS + protocol. In practical applications, RADIUS protocol is most commonly used.
802.1X
802.1X protocol is a port – based network control protocol . Port – based network access control refers to verifying user identities and controlling their access rights at the port level of LAN access devices. The 802.1X protocol is a Layer 2 protocol and does not need to reach Layer 3. It does not require high overall performance of the access device , which can effectively reduce network construction costs. Authentication packets and data packets are separated through logical interfaces to improve security.
802.1X Port
DHCP Snooping
DHCP snooping ensures that DHCP clients obtain IP addresses from legitimate DHCP servers, and records the correspondence between IP addresses and MAC addresses of DHCP clients to prevent DHCP attacks on the network.
In order to ensure the security of network communication services, the DHCP Snooping technology is introduced, and a firewall is established between the DHCP Client and the DHCP Server to defend against various attacks against DHCP in the network.
DHCP Option 82
Option 82 is called the relay agent information option and is inserted by the DHCP relay agent when forwarding client-originated DHCP packets to a DHCP server.
To identify the device accessed by the client, the user can enter his MAC address in the remote ID.
Circuit id is used to identify the VLAN, interface and other information where the client is located.
DHCP Port Settings
This page allows a user to configure detailed settings of DHCP Snooping for each port (GE/LAG).
Any device that is not in the service provider network will be regarded as an entrusted source (such as a customer switch).
DHCP Statistics
This page displays all statistics recorded by DHCP snooping function.
MAINTENANCE
Upgrade
GWN783x Switches support manual upload firmware upgrade via a BIN file that can downloaded from Grandstream Firmware page: https://www.grandstream.com/support/firmware
Upgrade Via Network is also supported by specifying the Firmware Server Path (For example: firmware.grandstream.com).
Diagnostics
GWN783x Switches support many diagnostics tools that can help the user troubleshoot the issue and resolve it. These tools include Logs, Ping, Traceroute, Mirroring and Fiber Module.
Logs
This page lists all the generated Logs with details and level and generated time, also an option to export the list is available.
Adding a Log Server Address to the logs to be sent to is also supported on the GWN783x Switches.
Ping
The user in this page can enter the IP Address or Hostname then click “Start”, the results of the ping command will be shown below.
Traceroute
Another tool is Traceroute that shows the number of hops, and GWN783x Switches enables the user to run Traceroute commands right from the Switches WEB UI.
Port Mirroring
Mirroring refers to copying the packets from the specified source to the destination port. The specified source is called the mirroring source, the destination port is called the observing port , and the copied packet is called the mirroring packet.
Mirroring can make a copy of the original packet without affecting the normal processing of the original packet by the device, and send it to the monitoring device through the observation port to determine whether the service running on the network is normal.
Fiber Module
This pages provides the user with the information about the fiber module for each Port that supports it. Select the port from the drop-down list and click refresh icon.
Note: The information displayed on the optical module of each manufacturer is different.
Copper Test
Copper test can detect whether the cable connected to the switch is faulty and the location of the fault. Using this function can assist in the daily engineering installation diagnosis .
Please navigate to Web UI → Maintenance → Diagnostics page → Copper Test Tab.
To perform the test simply click on the port, please refer to the figure below:
After the detection , the cable detection result is displayed as follows:
Cable Status: OK (normal), Open (open circuit), Short (short circuit ) , Crosstalk (crosstalk) , Unknown (unknown).
Cable Length:
- When there is a fault: it is the length from the port to the fault location.
- When there is no fault: it is the actual length of the cable.
One-click Debugging
On GWN78xx switches, One-click debugging feature can help administrators or tech-support to quickly and easily get debugging information about the GWN switch in a matter of few minutes.
Please navigate to Web UI → Maintenance → Diagnostics page → One-click Debugging tab, then click on “Debug” button to start the debugging process.
It’s also possible to delete the generated file or download it locally to share it with tech-support for example. The folder contains many logs files and even a tech-support file that containing valuable information like the switch configuration etc.

Backup and Restore
Click on “Factory Reset” button to reset the GWN783x Switch back to default settings, or restore to previously saved backup by uploading a configuration file, these configuration files can be used as a way to back up the device running configuration or saved configuration.
SNMP
Network Management Protocol (SNMP) is an “Internet-standard protocol for managing devices on IP networks”. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks and more. SNMP is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. SNMP is a component of the Internet Protocol Suite as defined by the Internet Engineering Task Force (IETF). It consists of a set of standards for network management, including an application layer protocol, a database schema, and a set of data objects. An SNMP-managed network consists of three key components:
- Managed device
- Agent – software which runs on managed devices
- Network management station (NMS) – software which runs on the manager
A managed device is a network node that implements an SNMP interface that allows unidirectional (read-only) or bidirectional (read and write) access to node-specific information. Managed devices exchange node-specific information with the NMSs. Sometimes called network elements, the managed devices can be any type of device, including, but not limited to, routers, access servers, switches, bridges, hubs, IP telephones, IP video cameras, computer hosts, and printers. An agent is a network-management software module that resides on a managed device. An agent has local knowledge of management information and translates that information to or from an SNMP-specific form. A network management station (NMS) executes applications that monitor and control managed devices. NMSs provide the bulk of the processing and memory resources required for network management. One or more NMSs may exist on any managed network.
Global settings page allows the user to enable the SNMP function with the Local Engine ID or add a Remote Engine ID.
SNMP | Select whether to enable SNMP. |
Local Engine ID | Set the engine ID of the local SNMP entity or click "Reset" to restore to the initial value. Note: The default is 8000 A59Dxxxxxxxx, where xxxxxxxx is the device MAC address by default, which can be modified by the user . It is expressed in hexadecimal , and the length is limited between 2 and 56 characters. The number of characters must be an even number . |
Edit Remote Engine ID | |
Remote Engine ID | Set the engine ID of the SNMP management side , and the remote user is established under the remote engine. The input length is limited to 10-64 characters, expressed in hexadecimal , and the number of characters must be an even number. |
Server Address | Set the address of the network management station server, support input of Hostname and IP address (including IPv4 and IPv6), and need to meet the requirements of various types of address formats, otherwise an error message is required. |
SNMP Global Settings
View Management
This page allows the network administrator to create MIB views (Management information
base) and then include or exclude OID (Object Identifier) in a view.
Group Management
This page allows the network administrator to group SNMP users and assign different
authorization and access privileges.
Community Management
This page allows a user to add/remove multiple communities of SNMP.
SNMP User Management
This page allows a user to configure SNMPv3 user profile.
Notification Management
This page allows a user to configure a host to receive SNMPv1/v2/v3 notification.
Trap Event
This page allows a user to add or delete SNMP trap receiver IP address and community name.
RMON
RMON (Remote Monitoring) based on SNMP (Simple Network Management Protocol) architecture, functions to monitor the network. RMON is currently a commonly used network management standard defined by Internet Engineering Task Force (IETF), which is mainly used to monitor the data traffic across a network segment or even the entire network so as to enable the network administrator to take the protection measures in time to avoid any network malfunction. In addition, RMON MIB records network statistics information of network performance and malfunction periodically, based on which the management station can monitor network at any time effectively. RMON is helpful for network administrator to manage the large-scale network since it reduces the communication traffic between management station and managed agent.
RMON Statistics
Ethernet statistics function ( corresponding to the statistics group in the RMON MIB) : The system collects basic statistics of each network being monitored. The system will continuously count the traffic of a certain network segment and the distribution of various types of packets, or the number of error frames of various types , the number of collisions , etc. The number of data packets , the number of broadcast and multicast packets, the number of received bytes, the number of received packets, etc.
RMON History
The system will periodically collect statistics on various traffic information , including bandwidth utilization, number of error packets and total number of packets based on the History ID.
Click on “Add” button to create a History ID specifying the Port as well.
RMON Event
The event group controls the events and prompts from the device, and provides all events generated by the RMON Agent. When an event occurs, it can record logs or send Trap to the network management station.
RMON Alarm
The system monitors the specified alarm variable. After pre-defining a set of thresholds and sampling time for the specified alarm, the system will obtain the value of the specified alarm variable according to the defined time period. When the value of the alarm variable is greater than or equal to the upper threshold, an upper alarm event will be triggered. When the value of the alarm variable is less than or equal to the lower threshold, a lower alarm event is triggered.
LLDP/LLDP MED
LLDP/LLDP MED is a one-way protocol, there are no request/response sequences. Information is
advertised by stations implementing the transmit function, and is received and processed by
stations implementing the receive function.
LLDP MED is an enhancement to LLDP that provides additional functionality to support media devices. LLDP MED features include: enabling network policy advertisement and discovery for real-time applications (such as voice and/or video);
LLDP Global Settings
This page allows a user to set general settings for LLDP including enabling LLDP and other parameters .
More configuration can adjusted per port (GE1 to GE10).
LLDP MED Network Policy
This page allows the network administrator to set MED (Media Endpoint Discovery) network
policy. Click on “Add” button to add a Network Policy or toggle ON Auto Voice Network Policy (Voice VLAN has to be configured as well).
To add a Network Policy, click on “Add” button or click on “Edit” icon under Operation column to edit.
LLDP MED Port Settings
The user can configure LLDP MED Settings for each port in this page.
LLDP Device Info
This page displays information for LLDP Local Device connected to each port. Click on the port to view related LLDP information about that port.
Neighbor Info
This page lists the neighbors obtained on the switch ports. Click on “Refresh” button to update the list.
LLDP Statistics
View the LLDP statistics of the local device through this feature. Click on “Refresh” to update the list.
SYSTEM
Basic Settings
Basic settings page allows the user to configure the name of the switch, location and also configure time settings like the NTP Server and time zone, it’s also possible to configure a reboot time schedule.
Please navigate to Web UI → System → Basic Settings page.
Access Control
In this page we can enable/disable SSH, Telnet and SSH Remote Access, and also configure the inactive session timeout (the range is from 15 seconds to 1440) which is how much time before the GWN78xx switch will logout automatically. Also we can configure here the GWN Manager server address and port manually.
Please navigate to Web UI → System → Access Control page.
User Management
There are three levels of users, namely administrator, operator and monitor. The administrator authenticates and authorizes users who log in to the switch according to management need where each user has different permissions and passwords.
- Administrator
- Each device has one and only one administrator.
- The highest privileges, can execute any command.
- The username admin cannot be changed, only the password can be changed.
- Support adding, deleting operator and monitor.
- Operator
- Added by administrator, there can be multiple accounts as Operators.
- The second highest authority, can execute all commands except the administrator’s key operations and important mandatory commands
- Can’t change the username, only password.
- Support adding, deleting Monitor users.
- Monitor
- Multiple Monitors are possible with the permission of an Administrator or Operator.
- The lowest authority, can only view switch status and statistics without any execution and configuration authority.
- Can’t change the username, only password.
Click on “Add” button to add new user then specify the password the user level (Operator or Monitor).
Time Policy
Time policy page helps to create schedules, for example Office working hours, Upgrade schedule or Reboot schedule.
To create a schedule, Please navigate to Web UI → System → Time Policy page, then click on “Create Policy” button, there are weekly schedules or absolute Date/Time schedules, for weekly schedules please select from the table the hours and days and as for absolute Date/Time select the days from the drop-down calendars and times from the drop-down menu. Please refer to the figure below.
CHANGE LOG
This section documents significant changes from previous versions of the GWN783x switches user manuals. Only major new features or major document updates are listed here. Minor updates for corrections or editing are not documented here.
Version 1.0.3.1
- This is the initial release.