SwOS CSS106
SwOS CSS106
SwOS/CSS106
< SwOS
Contents
Summary
CSS106 series features
Connecting to the Switch
Interface Overview
System
Health (CSS106-1G-4P-1S)
Password and Backup
Link
PoE (CSS106-1G-4P-1S)
SFP
Forwarding
RSTP
Statistics, Errors
VLAN
VLAN Configuration Examples
VLANs
Hosts
Static Hosts
IGMP Groups
SNMP
ACL
Conditions part parameters
Action part parameters
Reset
Summary
SwOS is an operating system designed specifically for administration of MikroTik Switch products.
SwOS is configurable from your web browser. It gives you all the basic functionality for a managed switch, plus more: allows to manage port-to-port
forwarding, broadcast storm control, apply MAC filter, configure VLANs, mirror traffic, apply bandwidth limitation and even adjust some MAC and IP
header fields.
Warning: Each RouterBOARD switch series have their own firmware which cannot be installed on other series models! New RB260GS
(CSS106-5G-1S), new RB260GSP(CSS106-1G-4P-1S) supports SwOS v2.0 and newer.
When upgrading the device, it will first load primary
firmware and then make an upgrade. In case a wrong firmware file is chosen, the device will continue to operate with primary firmware and
you will be able to choose the correct file.
https://wiki.mikrotik.com/wiki/SwOS/CSS106 1/14
25/10/21 11:14 SwOS/CSS106 - MikroTik Wiki
Multicast Forwarding
IGMP Snooping support
Mirroring
Port based mirroring
VLAN
Fully compatible with IEEE802.1Q
Port based VLAN
VLAN filtering
SwOS Login
SwOS default IP address: 192.168.88.1, user name: admin and there is no password.
Note: MikroTik neighbor discovery protocol tools can be used to discover IP address of Mikrotik Switch. Manual:IP/Neighbor_discovery.
Currently LLDP is not supported.
Interface Overview
SwOS interface menu consists of several tabs: Link, SFP, Forwarding, RST, Statistics, Errors, VLAN, VLANs, Hosts, IGMP Groups, SNMP, ACL, System
and Upgrade.
System
System Tab performs the following functions:
Note: SwOS uses a simple algorithm to ensure TCP/IP communication - it just replies to the same IP and MAC address packet came from.
This way there is no need for Default Gateway on the device itself.
General settings
Property Description
Address Acquisition Specify which address acquisition method to use:
DHCP with fallback - for first 10 seconds switch uses DHCP client. If request is unsuccessful, then
address is set as a Static IP Address value
static - address is set as a Static IP Address value
DHCP only - switch uses DHCP client to acquire address
Static IP Address IP address of the switch in case of Address Acquisition is set as DHCP with fallback or static
Identity Name of the Switch (for Mikrotik neighbor discovery protocol)
Allow From IP address from which the service is accessible. Default value is '0.0.0.0/0' - any address
Allow From Ports List of switch ports from which the service is accessible
Allow From VLAN VLAN ID with which the service is accessible (VLAN Mode on ingress port must be other than disabled in
order to connect)
Watchdog Enable or disable system watchdog. It will reset CPU of the switch in case of fault condition
Independent VLAN Lookup Enable or disable independent VLAN lookup in the Host table for packet forwarding
IGMP Snooping Enable or disable IGMP Snooping
Mikrotik Discovery Protocol Enable or disable Mikrotik neighbor discovery protocol
https://wiki.mikrotik.com/wiki/SwOS/CSS106 3/14
25/10/21 11:14 SwOS/CSS106 - MikroTik Wiki
Port1 PoE In Long Cable If enabled, it will turn off short detection on all PoE out ports to allow use of longer ethernet cables. This is
potentially dangerous setting and should be used with caution. (CSS106-1G-4P-1S model)
MAC Address MAC address of the Switch (Read-only)
Serial Number Serial number of the switch (Read-only)
Board Name MikroTik model name of the switch (CSS106 model, Read-only)
Health (CSS106-1G-4P-1S)
Property Description
Voltage Shows the input voltage measured in volts
Temperature Shows PCB temperature in celsius temperature scale
Link
Link Tab allows you to:
Link settings
Property Description
Enabled Enable or disable port
https://wiki.mikrotik.com/wiki/SwOS/CSS106 4/14
25/10/21 11:14 SwOS/CSS106 - MikroTik Wiki
Note: Using SFP+ 1m/3m DAC cable or S-RJ01 module, the device always shows that link is established even if nothing is connected on
other end.
PoE (CSS106-1G-4P-1S)
PoE settings configure Power over Ethernet output on CSS106-1G-4P-1S port2-port5 and show PoE status and measurements.
Property Description
PoE Out
Sets PoE out mode of the port:
SFP
SFP tab allows you to monitor status of SFP modules.
https://wiki.mikrotik.com/wiki/SwOS/CSS106 5/14
25/10/21 11:14 SwOS/CSS106 - MikroTik Wiki
SFP Tab
Forwarding
Forwarding Tab provides advanced forwarding options among switch ports, port isolation, port locking, port mirroring and egress bandwidth limit
features.
Ingress rate per port as well as rate for broadcast traffic can be configured with Access Control List by setting Rate. ACL must have one port per entry to
provide bandwidth limiting properly.
Forwarding settings
Property Description
Forwarding Forwarding table - allows or restricts traffic flow between specific ports
Port Lock
Port Lock - Enables or disables MAC address learning on this port. When option is enabled, it will restrict
MAC address learning and static MAC addresses should be configured
Lock On First - enable or disable MAC address learning on this port (MAC address from the first
recieved packet will still be learnt)
Port Mirroring
https://wiki.mikrotik.com/wiki/SwOS/CSS106 6/14
25/10/21 11:14 SwOS/CSS106 - MikroTik Wiki
Mirror Ingress - whether traffic entering this port must be copied and forwarded to mirroring target port
Mirror Egress - whether traffic leaving this port must be copied and forwarded to mirroring target port
Mirror To - mirroring target port
Bandwidth Limit
Egress Rate - limit traffic leaving this port (bps)
RSTP
Per port and global RSTP configuration and monitoring is available in the RSTP menu.
Property Description
RSTP Enable or disable STP/RSTP functionality on this port
Mode Shows STP/RSTP functionality mode on specific port (Read-only):
RSTP
STP
Root Bridge The priority and MAC address of the selected Root Bridge in the network (Read-only)
https://wiki.mikrotik.com/wiki/SwOS/CSS106 7/14
25/10/21 11:14 SwOS/CSS106 - MikroTik Wiki
Statistics, Errors
Provides detailed information about received and transmitted packets.
Port statistics
https://wiki.mikrotik.com/wiki/SwOS/CSS106 8/14
25/10/21 11:14 SwOS/CSS106 - MikroTik Wiki
Port errors
VLAN
VLAN configuration for Switch ports.
VLAN settings
Property Description
VLAN Mode
VLAN mode for ingress port:
disabled - VLAN table is not used. Switch ignores VLAN tag part of tagged packets
optional - Handle packets with VLAN tag ID that is not present in VLAN table just like packets without
VLAN tag
enabled - Drop packets with VLAN tag ID that is not present in VLAN table. Packets without VLAN tag are
treat as tagged packets with Default VLAN ID
strict - Same as enable, but also checks VLAN support for inbound interface (drop packets with VLAN
tag ID and ingress port that are not present in VLAN table)
VLAN Receive Defines the type of allowed packets on ingress port:
any - allows tagged and untagged packets on a certain port
https://wiki.mikrotik.com/wiki/SwOS/CSS106 9/14
25/10/21 11:14 SwOS/CSS106 - MikroTik Wiki
only tagged - allows only packets with a VLAN tag
only untagged - allows only packets without a VLAN tag
Default VLAN ID Switch will treat both untagged and "Default VLAN ID" tagged ingress packets as they are tagged with this
VLAN ID. It is also used to untag egress traffic if packet's VLAN ID matches "Default VLAN ID". The VLAN tag
itself will only be added if there is VLAN Header = add if missing specified on egress port
Force VLAN ID Whether to apply Default VLAN ID to incoming packets with VLAN tag
VLAN Header
leave as is - if VLAN header is present it remains unchanged
always strip - if VLAN header is present it is removed from the packet
add if missing - if VLAN header is not present it is added to the packet (VLAN ID will be Default VLAN
ID of ingress port)
Note: VLAN modes enabled and strict require VLAN ID 1 in VLANs table to allow access of untagged traffic to switch itself.
Simple trunk and access port configuration, as well as trunk and hybrid port configuration examples can be found in this article - SwOS/CSS106-VLAN-
Example.
VLANs
VLAN tables specifies certain forwarding rules for packets that have specific IEEE 802.1Q tag. Basically the table contains entries that map specific
VLAN tag IDs to a group of one or more ports. Packets with VLAN tags leave switch through one or more ports that are set in corresponding table entry.
VLAN table works together with destination MAC lookup to determine egress ports. VLAN table supports up to 250 entries.
Property Description
VLAN ID VLAN ID of the packet
IVL Enables or disables independent VLAN learning (IVL)
IGMP Snooping Enables or disables IGMP Snooping on the defined VLAN. When enabled, the switch will listen to IGMP Join
and Leave requests from the defined VLAN and only forward traffic to ports, which have sent IGMP
membership requests from the defined VLAN. When disabled, the switch will flood all VLAN member ports with
Multicast traffic.
Ports Each port has individual VLAN header options for each VLAN ID. Depending on VLAN mode if lookup is done
in this table, egress action of packets is processed by this option. Egress option from VLAN tab is ignored.
Hosts
This table represents dynamically learnt MAC address to port mapping entries. It can contain two kinds of entries: dynamic and static. Dynamic entries
get added automatically, this is also called a learning process: when switch receives a packet from certain port, it adds the packet's source MAC address
X and port it received the packet from to host table, so when a packet comes in with destination MAC address X it knows to which port it should forward
the packet. If the destination MAC address is not present in host table then it forwards the packet to all ports in the group. Dynamic entries take about 5
minutes to time out.
https://wiki.mikrotik.com/wiki/SwOS/CSS106 10/14
25/10/21 11:14 SwOS/CSS106 - MikroTik Wiki
Host table
Property Description
Port Ports the packet should be forwarded to (Read-only)
MAC Learned MAC address (Read-only)
VLAN ID Learned VLAN ID (Read-only)
Static Hosts
Static entries will take over dynamic if dynamic entry with same mac-address already exists. Also by adding a static entry you get access to some more
functionality.
Property Description
Ports Ports the packet should be forwarded to
MAC MAC address
VLAN ID VLAN ID (only supported on RB260GS/RB260GSP)
Drop Packet with certain MAC address coming from certain ports can be dropped
Mirror Packet can be cloned and sent to mirror-target port
IGMP Groups
IGMP Snooping which controls multicast streams and prevents multicast flooding is implemented in SwOS starting from version 2.5. The feature allows
a switch to listen in the IGMP conversation between hosts and routers.
https://wiki.mikrotik.com/wiki/SwOS/CSS106 11/14
25/10/21 11:14 SwOS/CSS106 - MikroTik Wiki
Available IGMP snooping data can be found under IGMP Group tab:
SNMP
SwOS supports SNMP v1 and uses IF-MIB, SNMPv2-MIB, BRIDGE-MIB and MIKROTIK-MIB (only for health, PoE-out and SFP diagnostics) for SNMP
reporting.
System information
System uptime
Port status
Interface statistics
Host table information
https://wiki.mikrotik.com/wiki/SwOS/CSS106 12/14
25/10/21 11:14 SwOS/CSS106 - MikroTik Wiki
SNMP settings
Property Description
Enabled Enable or disable SNMP service
Community SNMP community name
Contact Info Contact information for the NMS
Location Location information for the NMS
ACL
An access control list (ACL) rule table is very powerful tool allowing wire speed packet filtering, forwarding and VLAN tagging based on L2,L3 protocol
header field conditions. SwOS allow you to implement limited number of access control list rules (32 simple rules (only L2 conditions are used); 16 rules
where both L2 and L3 conditions are used; or 8 advanced rules where all L2,L3 and L4 conditions are used). Each rule contains a conditions part and an
action part.
any
present
not present
Reset
The CSS106-5G-1S and CSS106-1G-4P-1S has built-in backup SwOS firmware which can be loaded in case standard firmware breaks or upgrade fails:
Holding Reset button for few seconds while device is booting resets configuration and loads backup firmware SwOS 2.0p.
After loading backup firmware SwOS 2.0p it is possible to connect to 192.168.88.1 using web browser and install new SwOS firmware.
https://wiki.mikrotik.com/wiki/SwOS/CSS106 14/14