Planet IGS-10020 Series User Manual

L2+ multi-port full gigabit managed ethernet switch
Hide thumbs Also See for IGS-10020 Series:
Table of Contents

Advertisement

Quick Links

User's Manual

Advertisement

Table of Contents
loading

Summary of Contents for Planet IGS-10020 Series

  • Page 1 User’s Manual...
  • Page 2 PLANET is a registered trademark of PLANET Technology Corp. All other trademarks belong to their respective owners. Disclaimer PLANET Technology does not warrant that the hardware will work properly in all environments and applications, and makes no warranty and representation, either implied or expressed, with respect to the quality, performance, merchantability, or fitness for a particular purpose.
  • Page 3: Table Of Contents

    3. SWITCH MANAGEMENT ....................61 3.1 Requirements .............................. 61 3.2 Management Access Overview ......................... 62 3.3 CLI Mode Management ..........................63 3.4 Web Management ............................65 3.5 SNMP-based Network Management ......................66 3.6 PLANET Smart Discovery Utility ......................67 4. WEB CONFIGURATION ...................... 69...
  • Page 4 User’s Manual 4.1 Main Web page ............................72 4.2 System ................................. 74 4.2.1 System Information .............................. 75 4.2.2 IP Configuration ..............................76 4.2.3 IP Status ................................78 4.2.4 Users Configuration ............................. 79 4.2.5 Privilege Levels ..............................82 4.2.6 NTP Configuration ............................... 84 4.2.7 Time Configuration ..............................
  • Page 5 User’s Manual 4.3.5.5 SNMPv3 Access ............................116 4.4 Port Management ............................. 118 4.4.1 Port Configuration .............................. 118 4.4.2 Port Statistics Overview ............................. 120 4.4.3 Port Statistics Detail ............................121 4.4.4 SFP Module Information ............................ 123 4.4.5 Port Mirror ................................124 4.5 Link Aggregation ............................
  • Page 6 User’s Manual 4.8 Multicast ..............................180 4.8.1 IGMP Snooping ..............................180 4.8.2 Profile Table ............................... 184 4.8.3 Address Entry ..............................185 4.8.4 IGMP Snooping Configuration ........................... 186 4.8.5 IGMP Snooping VLAN Configuration ......................... 188 4.8.6 IGMP Snooping Port Group Filtering ......................... 190 4.8.7 IGMP Snooping Status ............................
  • Page 7 User’s Manual 4.10 Access Control List ..........................233 4.10.1 Access Control List Status ..........................233 4.10.2 Access Control List Configuration ........................235 4.10.3 ACE Configuration ............................237 4.10.4 ACL Ports Configuration ..........................247 4.10.5 ACL Rate Limiter Configuration ........................249 4.11 Authentication ............................
  • Page 8 User’s Manual 4.14.1 Link Layer Discovery Protocol ......................... 318 4.14.2 LLDP Configuration ............................318 4.14.3 LLDP MED Configuration ..........................321 4.14.4 LLDP-MED Neighbor ............................328 4.14.5 Neighbor ................................332 4.14.6 Port Statistics ..............................333 4.15 Network Diagnostics ..........................335 4.15.1 Ping ................................. 336 4.15.2 IPv6 Ping .................................
  • Page 9 User’s Manual 4.20.2 Detailed MEP Configuration ..........................375 4.20.3 Ethernet Ring Protocol Switch ......................... 378 4.20.4 Ethernet Ring Protocol Switch Configuration ....................380 4.20.5 Ring Wizard ..............................383 4.20.6 Ring Wizard Example: ............................. 384 5. SWITCH OPERATION ....................... 387 5.1 Address Table ............................387 5.2 Learning ..............................
  • Page 10: Introduction

    User’s Manual 1. INTRODUCTION The descriptions of PLANET L2+ Industrial Managed Switch series, such as IGS-10020, IGS-10080MFT, IGS-12040MT, IGS-20040MT and IGS-20160HPT, are as follows: Industrial 8-Port 10/100/1000T + 2-Port 100/1000X SFP Managed Switch IGS-10020MT Industrial 8-Port 10/100/1000T 802.3af PoE + 2-Port 100/1000X SFP Managed Switch IGS-10020PT Industrial 8-Port 10/100/1000T 802.3af/at PoE + 2-Port 100/1000X SFP Managed Switch...
  • Page 11: Product Description

    1.2 Product Description PLANET Industrial Managed Switch is specially designed to build a full Gigabit backbone to transmit reliable and high-speed data in heavy industrial demanding environments and forward data to remote network through fiber optic cabling. It comes with an IP30 rugged case and redundant power system.
  • Page 12 User’s Manual Intelligent Powered Device Alive Check (IGS-10020PT, IGS-10020HPT, IGS-20160HPT) The Industrial Managed PoE Switch can be configured to monitor connected PD (powered device) status in real-time via ping action. Once the PD stops working and responding, the Industrial Managed PoE Switch will recycle the PoE port power and bring the PD back to work.
  • Page 13 User’s Manual PoE Schedule for Energy Saving (IGS-10020PT, IGS-10020HPT, IGS-20160HPT) Under the trend of energy saving worldwide and contributing to environment protection on the Earth, the Industrial Managed PoE Switch can effectively control the power supply along with its capability of giving high watts power over Ethernet. The “PoE schedule”...
  • Page 14 User’s Manual Intelligent SFP Diagnosis Mechanism The Industrial Managed Switch supports SFP-DDM (Digital Diagnostic Monitor) function that can easily monitor real-time parameters of the SFP for network administrator, such as optical output power, optical input power, temperature, laser bias current, and transceiver supply voltage. Flexible and Extendable Solution It features 100BASE-FX and 1000BASE-SX/LX SFP (Small Form-factor Pluggable) fiber-optic modules, meaning the administrator now can flexibly choose the suitable SFP transceiver according to the transmission distance or the transmission...
  • Page 15: How To Use This Manual

    User’s Manual 1.3 How to Use This Manual This User’s Manual is structured as follows: Section 2, INSTALLATION The section explains the functions of the Industrial Managed Switch and how to physically install the Industrial Managed Switch. Section 3, SWITCH MANAGEMENT The section contains the information about the software function of the Industrial Managed Switch.
  • Page 16: Product Features

    User’s Manual 1.4 Product Features  Physical Port 10/100/1000BASE-T RJ45 copper  100/1000BASE-X mini-GBIC/SFP slots, SFP type auto detection  Console interface for basic management and setup (IGS-10020(H)PT, IGS-10080MFT, IGS-12040MT,  IGS-20040MT, IGS-20160HPT) Power over Ethernet (IGS-10020(H)PT, IGS-20160HPT)  Complies with IEEE 802.3at Power over Ethernet Plus/end-span PSE ...
  • Page 17 User’s Manual the network bandwidth Storm Control support  − Broadcast/Multicast/Unknown Unicast Supports VLAN  − IEEE 802.1Q tagged VLAN − Up to 255 VLANs groups, out of 4095 VLAN IDs − Provider Bridging (VLAN Q-in-Q) support (IEEE 802.1ad) − Private VLAN Edge (PVE) −...
  • Page 18 − Cable Diagnostic technology provides the mechanism to detect and report potential cabling issues SMTP/Syslog remote alarm  Four RMON groups (history, statistics, alarms and events)  SNMP trap for interfacing Link Up and Link Down notification  System Log  PLANET Smart Discovery Utility for deployment management ...
  • Page 19: Product Specifications

    User’s Manual 1.5 Product Specifications IGS-10020MT/IGS-12040MT/IGS-20040MT Model Name IGS-10020MT IGS-12040MT IGS-20040MT Hardware Specifications 8 10/ 100/1000BASE-T 8 10/ 100/1000BASE-T 16 10/ 100/1000BASE-T RJ45 Auto-MDI/MDI-X RJ45 Auto-MDI/MDI-X RJ45 Auto-MDI/MDI-X Copper Ports ports ports ports 2 1000BASE-X SFP 4 1000BASE-X SFP 4 1000BASE-X SFP interfaces (Port-9 to interfaces (Port-9 to interfaces (Port-17 to...
  • Page 20 User’s Manual One relay output for power failure. Alarm Relay current carry ability: 1A @ 24V AC Alarm 2 Digital Input (DI): 2 Digital Input (DI): Level 0: -24V~2.1V (±0.1V) Level 0: -24V~2.1V (±0.1V) Level 1: 2.1V~24V (±0.1V) Level 1: 2.1V~24V (±0.1V) Input Load to 24V DC, Input Load to 24V DC, 10mA max.
  • Page 21 User’s Manual IEEE 802.3ad LACP/static trunk Link Aggregation Support 5 groups of 10-Port trunk support Traffic classification based, strict priority and WRR 8-level priority for switching - Port Number - 802.1p priority - 802.1Q VLAN tag - DSCP/TOS field in IP Packet IGMP (v1/v2/v3) snooping, up to 255 multicast Groups IGMP Snooping IGMP Querier mode support...
  • Page 22 User’s Manual RFC 792 ICMP RFC 2068 HTTP RFC 1112 IGMP version 1 RFC 2236 IGMP version 2 RFC 3376 IGMP version 3 RFC 2710 MLD version 1 FRC 3810 MLD version 2 RFC-1213 MIB-II IF-MIB RFC 1493 Bridge MIB RFC 1643 Ethernet MIB RFC 2863 Interface MIB RFC 2665 Ether-Like MIB...
  • Page 23 User’s Manual IGS-10020PT/IGS-10020HPT/IGS-20160HPT Model Name IGS-10020PT IGS-10020HPT IGS-20160HPT Hardware Specifications 18 10/100/1000BASE-T 8 10/100/1000BASE-T RJ45 Auto-MDI/MDI-X ports RJ45 Auto-MDI/MDI-X Copper Ports ports 2 1000BASE-SX/LX/BX 2 1000BASE-SX/LX/BX SFP interfaces (Port-9 to SFP interfaces (Port-19 to Port-10) Port-20) SFP/mini-GBIC Slots Compatible with 100BASE-FX SFP Compatible with 100BASE-FX SFP 16 ports with 802.3at/af...
  • Page 24 User’s Manual 161.9 watts/522.08BTU 306 watts/1043.46BTU 349 watts/1190.83BTU (Full loading with PoE (Full loading with PoE (Full loading with PoE Power Consumption function) function) function) System: Per 10/100/1000T RJ45 Port: Power 1 (Green) LNK/ACT (Green) Power 2 (Green) PoE-in-Use (Orange) LED Indicator Fault Alarm (Green)
  • Page 25 User’s Manual Supports 5 trunk groups with 2 ports for each trunk Traffic classification based, strict priority and WRR 8-level priority for switching - Port number - 802.1p priority - 802.1Q VLAN tag - DSCP/TOS field in IP packet IGMP (v1/v2/v3) snooping, up to 255 multicast Groups IGMP Snooping IGMP querier mode support MLD (v1/v2) snooping, up to 255 multicast Groups...
  • Page 26 User’s Manual RFC 791 IP RFC 792 ICMP RFC 2068 HTTP RFC 1112 IGMP version 1 RFC 2236 IGMP version 2 RFC 3376 IGMP version 3 RFC 2710 MLD version 1 FRC 3810 MLD version 2 RFC-1213 MIB-II IF-MIB RFC 1493 Bridge MIB RFC 1643 Ethernet MIB RFC 2863 Interface MIB RFC 2665 Ether-Like MIB...
  • Page 27 User’s Manual IGS-10080MFT Model Name IGS-10080MFT Hardware Specifications 2 10/ 100/1000BASE-T RJ45 Auto-MDI/MDI-X ports Copper Ports 8 1000BASE-SX/LX/BX SFP interfaces (Port-1 to Port-8) SFP/mini-GBIC Slots Compatible with 100BASE-FX SFP 1 x RJ45 serial port (115200, 8, N, 1) Console Store-and-Forward Switch Architecture 20Gbps/non-blocking Switch Fabric...
  • Page 28 User’s Manual negotiation status, and trunk status. TX/RX/Both Port Mirroring Many to 1 monitor 802.1Q tagged-based VLAN, up to 255 VLAN groups Q-in-Q tunneling Private VLAN Edge (PVE) MAC-based VLAN VLAN Protocol-based VLAN Voice VLAN MVR (Multicast VLAN Registration) Up to 255 VLAN groups, out of 4095 VLAN IDs IEEE 802.3ad LACP/static trunk Link Aggregation Supports 5 trunk groups with 8 ports for each trunk...
  • Page 29 User’s Manual IEEE 802.1s Multiple Spanning Tree Protocol IEEE 802.1p Class of Service IEEE 802.1Q VLAN Tagging IEEE 802.1x Port Authentication Network Control IEEE 802.1ab LLDP RFC 768 UDP RFC 793 TFTP RFC 791 IP RFC 792 ICMP RFC 2068 HTTP RFC 1112 IGMP version 1 RFC 2236 IGMP version 2 RFC 3376 IGMP version 3...
  • Page 30: Installation

    User’s Manual 2. INSTALLATION 2.1 Hardware Description The Industrial Managed Switch provides three different running speeds – 10Mbps, 100Mbps and 1000Mbps and automatically distinguishes the speed of incoming connection. This section describes the hardware features of Industrial Managed Switch. For easier management and control of the Industrial Managed Switch, familiarize yourself with its display indicators and ports.
  • Page 31 User’s Manual IGS-10020PT  IGS-10020PT Dimensions (W x D x H) : 72 x 107 x 152mm ...
  • Page 32 User’s Manual IGS-10020HPT  IGS-10020HPT Dimensions (W x D x H) : 72 x 107 x 152mm ...
  • Page 33 User’s Manual IGS-10080MFT  IGS-10080MFT Dimensions (W x D x H) : 72 x 107x 152mm ...
  • Page 34 User’s Manual IGS-12040MT  IGS-12040MT Dimensions (W x D x H) : 72 x 107 x 152mm ...
  • Page 35 User’s Manual IGS-20040MT  IGS-20040MT Dimensions (W x D x H) : 72 x 107 x 152mm ...
  • Page 36 User’s Manual IGS-20160HPT  IGS-20160HPT Dimensions (W x D x H) : 84 x 107 x 152mm ...
  • Page 37: Front Panel

    User’s Manual 2.1.2 Front Panel IGS-10020MT IGS-10020PT IGS-10020HPT Figure 2-1: Figure 2-2: Figure 2-3: IGS-10020MT Switch Front Panel IGS-10020PT Switch Front Panel IGS-10020HPT Switch Front Panel...
  • Page 38 User’s Manual IGS-100080MFT IGS-12040MT IGS-20040MT Figure 2-4: Figure 2-5: Figure 2-6: IGS-10080MFT Switch Front Panel IGS-12040MT Switch Front Panel IGS-20040MT Switch Front Panel...
  • Page 39 User’s Manual IGS-20160HPT Figure 2-7: IGS-20160HPT Switch Front Panel ■ Gigabit TP Interface 10/100/1000BASE-T Copper, RJ45 Twisted-pair: Up to 100 meters. ■ SFP Slot 100/1000BASE-X mini-GBIC slot, SFP (Small-form Factor Pluggable) transceiver module: From 550 meters to 2km (multi-mode fiber) and to 10/20/30/40/50/70/120 kilometers (single-mode fiber). ■...
  • Page 40 User’s Manual Console interface is not available for the IGS-10020MT. ■ Reset button On the upper left side of the front panel, the reset button is designed for rebooting the Industrial Managed Switch without turning off and on the power. The following is the summary table of reset button functions: IGS-10020MT IGS-10020PT/IGS-10020HPT...
  • Page 41: Led Indications

    User’s Manual Reset Button Pressed and Released Function < 5 sec: System Reboot Reboot the Industrial Managed Switch. Reset the Industrial Managed Switch to Factory Default configuration. The Industrial Managed Switch will then reboot and load the default settings as shown below: Default Username: admin 。...
  • Page 42 User’s Manual  Per SFP Interface Color Function Lights Indicates the link through that port is successfully established. LNK/ACT Green Indicates that the Switch is actively sending or receiving data over that Blinks port. Indicates that the port is successfully connecting to the network at Lights 1000Mbps.
  • Page 43 User’s Manual IGS-10080MFT  System Color Function Indicates power 1 has power. Green Indicates power 2 has power. Green Indicates either power 1 or power 2 has no power. Fault Green Indicates the ERPS Ring has been created successfully. Ring Indicates the ERPS Ring hasn’t been created.
  • Page 44 User’s Manual IGS-12040MT/IGS-20040MT LED Definition:  System Color Function Indicates power 1 has power. Green Indicates power 2 has power. Green Indicates either power 1 or power 2 has no power. Fault Green Lights to indicate that the ERPS Ring has been created successfully. Ring Green Lights to indicate that the Ring Owner has been enabled.
  • Page 45: Switch Upper Panel

    User’s Manual 2.1.4 Switch Upper Panel The Upper Panel of the Industrial Managed Switch comes with a DC inlet power socket and one terminal block connector with 6 contacts. Insert positive/negative DC power wires into contacts 1 and 2 for DC Power 1, or 5 and 6 for DC Power 2. Figure 2-14: IGS-10020MT Upper Panel Figure 2-15: IGS-10020PT/HPT Upper Panel...
  • Page 46 User’s Manual Figure 2-16: IGS-10080MFT Upper Panel Figure 2-17: IGS-12040MT Upper Panel...
  • Page 47 User’s Manual Figure 2-18: IGS-20040MT Upper Panel Figure 2-19: IGS-20160HPT Upper Panel...
  • Page 48 User’s Manual Tighten the wire-clamp screws for preventing the wires from loosening. DC 1 DC 2 Figure 2-20 6-Pin Terminal Block Power Wiring Input Model Name Positive (+) Pin Negative (-) Pin Input Voltage IGS-10020MT Pin 2/6 Pin 1/5 DC 12~48V, AC 24V IGS-10020PT/HPT Pin 1/6 Pin 2/5...
  • Page 49: Wiring The Fault Alarm Contact

    User’s Manual 2.1.5 Wiring the Fault Alarm Contact The fault alarm contacts are in the middle (3 & 4) of the terminal block connector as the picture shows below. Inserting the wires, the Industrial Managed Switch will detect the fault status of the power failure, or port link failure (available for managed model). The following illustration shows an application example for wiring the fault alarm contacts Insert the wires into the fault alarm contacts 1.
  • Page 50 User’s Manual Tighten the wire-clamp screws for preventing the wires from loosening. DI1 DO0 DO1 GND GND Figure 2-22 6-pin Terminal Block for DI and DO Wiring Input There are two Digital Input groups for you to monitor two different devices. The following topology shows how to wire DI0 and DI1.
  • Page 51: Installing The Industrial Managed Switch

    User’s Manual There are two Digital Output groups for you to sense IGS-10020PT/10020HPT/12040MT/20040MT/20160HPT port failure or power failure and issue a high or low signal to external device. The following topology shows how to wire DO0 and DO1. Figure 2-24 Wires DO0 and DO1 to Open Detector 2.2 Installing the Industrial Managed Switch This section describes how to install your Industrial Managed Switch and make connections to the Industrial Managed Switch.
  • Page 52 User’s Manual (RJ45 port) while the Insert one side of RJ45 cable (category 5) into the Industrial Managed Switch Ethernet port other side to the network device’s Ethernet port (RJ45 port), e.g., Switch PC or Server. The UTP port (RJ45) LED on the Industrial Managed Switch will light up when the cable is connected with the network device.
  • Page 53: Din-Rail Mounting

    User’s Manual 2.2.2 DIN-rail Mounting This section describes how to install the Industrial Managed Switch. There are two methods to install the Industrial Managed Switch -- DIN-rail mounting and wall-mount plate mounting. Please read the following topics and perform the procedures in the order being presented.
  • Page 54 User’s Manual Step 3: Check whether the DIN-rail is tightly on the track. Please refer to the following procedures to remove the Industrial Managed Switch from the track. Step 4: Lightly remove the DIN-rail from the track.
  • Page 55: Wall Mount Plate Mounting

    User’s Manual 2.2.3 Wall Mount Plate Mounting To install the Industrial Managed Switch on the wall, please follow the instructions below. Follow all the DIN-rail installation steps as shown in the example. Step 1: Remove the DIN-rail from the Industrial Managed Switch. Use the screwdriver to loosen the screws to remove the DIN-rail.
  • Page 56: Cabling

    User’s Manual 2.3 Cabling  10/100/1000BASE-T All 10/100/1000BASE-T ports come with auto-negotiation capability. They automatically support 1000BASE-T, 100BASE-TX and 10BASE-T networks. Users only need to plug a working network device into one of the 10/100/1000BASE-T ports, and then turn on the Industrial Managed Switch. The port will automatically run in 10Mbps, 20Mbps, 100Mbps or 200Mbps and 1000Mbps or 2000Mbps after negotiating with the connected device.
  • Page 57: Installing The Sfp Transceiver

    Approved PLANET SFP Transceivers PLANET Industrial Managed Switch supports 100/1000 dual mode with both single mode and multi-mode SFP transceivers. The following list of approved PLANET SFP transceivers is correct at the time of publication: Fast Ethernet Transceiver (100BASE-X SFP)
  • Page 58 User’s Manual Fast Ethernet Transceiver (100BASE-BX, Single Fiber Bi-directional SFP) Connector Wavelength Wavelength Speed (Mbps) Fiber Mode Distance Operating Temp. Model Interface (TX) (RX) MFB-FA20 WDM(LC) Single Mode 20km 1310nm 1550nm 0 ~ 60 degrees C MFB-FB20 WDM(LC) Single Mode 20km 1550nm 1310nm...
  • Page 59 User’s Manual It is recommended to use PLANET SFPs on the Industrial Managed Switch. If you insert an SFP transceiver that is not supported, the Industrial Managed Switch might not recognize it. Please choose the SFP transceiver which can be operated in the temperature range of -40~75 degrees C.
  • Page 60: Removing The Sfp Transceiver

    User’s Manual 2.3.2 Removing the SFP Transceiver Make sure there is no network activity by consulting or checking with the network administrator. Or through the management interface of the switch/converter (if available) to disable the port in advance. Remove the fiber optic cable gently. Turn the lever of the MGB/MFB module to a horizontal position.
  • Page 61: Switch Management

    User’s Manual 3. SWITCH MANAGEMENT This chapter explains the methods that you can use to configure management access to the Industrial Managed Switch. It describes the types of management applications and the communication and management protocols that deliver data between your management device (workstation or personal computer) and the system.
  • Page 62: Management Access Overview

    User’s Manual 3.2 Management Access Overview The Industrial Managed Switch gives you the flexibility to access and manage it using any or all of the following methods: Remote Telnet Interface  Web browser Interface  An external SNMP-based network management application ...
  • Page 63: Cli Mode Management

    User’s Manual 3.3 CLI Mode Management There are two ways for CLI mode management, one is remote telnet and the other operated from console port. Remote telnet is an IP-based protocol and console port is for user to operate the Industrial Managed Switch locally only; however, their operations are the same.
  • Page 64 User’s Manual You can change these settings, if desired, after you log on. This management method is often preferred because you can remain connected and monitor the system during system reboots. Also, certain error messages are sent to the serial port, regardless of the interface through which the associated action was initiated.
  • Page 65: Web Management

    User’s Manual 3.4 Web Management The Industrial Managed Switch offers management features that allow users to manage the Industrial Managed Switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer. After you set up your IP address for the Industrial Managed Switch, you can access the Industrial Managed Switch’s Web interface applications directly in your Web browser by entering the IP address of the Industrial Managed Switch.
  • Page 66: Snmp-Based Network Management

    User’s Manual 3.5 SNMP-based Network Management You can use an external SNMP-based application to configure and manage the Industrial Managed Switch, such as SNMP Network Manager, HP Openview Network Node Management (NNM) or What’s Up Gold. This management method requires the SNMP agent on the Industrial Managed Switch and the SNMP Network Management Station to use the same community string.
  • Page 67: Planet Smart Discovery Utility

    To easily list the Industrial Managed Switch in your Ethernet environment, the Planet Smart Discovery Utility from user’s manual CD-ROM is an ideal solution. The following install instructions guide you to running the Planet Smart Discovery Utility. Open the Planet Smart Discovery Utility in administrator PC.
  • Page 68 To click the “Control Packet Force Broadcast” function, it allows new setting value to be assigned to the Web Smart Switch under a different IP subnet address. Press the “Connect to Device” button and then the Web login screen appears in Figure 3-7. Press the “Exit” button to shut down Planet Smart Discovery Utility.
  • Page 69: Web Configuration

    User’s Manual 4. WEB CONFIGURATION This section introduces the configuration and functions of the Web-based management. About Web-based Management The Industrial Managed Switch offers management features that allow users to manage the Industrial Managed Switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer. The Web-based Management supports Internet Explorer 8.0.
  • Page 70 User’s Manual When the following login screen appears, please enter the default username "admin" with password “admin” (or the username/password you have changed via console) to login the main screen of Industrial Managed Switch. The login screen in Figure 4-1-2 appears.
  • Page 71 User’s Manual It is recommended to use Internet Explore 8.0 or above to access Industrial Managed Switch. The changed IP address takes effect immediately after clicking on the Save button. From now on, you need to use the new IP address to access the Internet. For security reason, please change and memorize the new password after this first setup.
  • Page 72: Main Web Page

    User’s Manual 4.1 Main Web page The Industrial Managed Switch provides a Web-based browser interface for configuring and managing it. This interface allows you to access the Industrial Managed Switch using the Web browser of your choice. This chapter describes how to use the Industrial Managed Switch’s Web browser interface to configure and manage it.
  • Page 73 User’s Manual Main Menu Using the onboard web agent, you can define system parameters, manage and control the Industrial Managed Switch, and all its ports, or monitor network conditions. Via the Web-Management, the administrator can set up the Industrial Managed Switch by selecting the functions those listed in the Main Function.
  • Page 74: System

    User’s Manual 4.2 System Use the System menu items to display and configure basic administrative details of the Industrial Managed Switch. Under System the following topics are provided to configure and view the system information. The Managed Switch system information is provided here. ■...
  • Page 75: System Information

    User’s Manual 4.2.1 System Information The System Info page provides information for the current device information. System Info page helps a switch administrator to identify the hardware MAC address, software version and system uptime. The screen in Figure 4-2-1 appears. Figure 4-2-1: System Information page Screenshot The page includes the following fields: Object...
  • Page 76: Ip Configuration

    User’s Manual 4.2.2 IP Configuration The IP Configuration includes the IP Configuration, IP Interface and IP Routes. The configured column is used to view or change the IP configuration. The maximum number of interfaces supported is 128 and the maximum number of routes is 32. The screen in Figure 4-2-2 appears.
  • Page 77 User’s Manual  From this DHCP interface Specify from which DHCP-enabled interface a provided DNS server should be preferred. When DNS proxy is enabled, system will relay DNS requests to the DNS Proxy currently configured DNS server, and reply as a DNS resolver to the client devices on the network.
  • Page 78: Ip Status

    User’s Manual 4.2.3 IP Status IP Status displays the status of the IP protocol layer. The status is defined by the IP interfaces, the IP routes and the neighbor cache (ARP cache) status. The screen in Figure 4-2-3 appears. Figure 4-2-3: IP Status page Screenshot The page includes the following fields: Object Description...
  • Page 79: Users Configuration

    User’s Manual 4.2.4 Users Configuration This page provides an overview of the current users. Currently the only way to login as another user on the web server is to close and reopen the browser. After setup is completed, press the “Apply” button to take effect. Please login web interface with new user name and password, the screen in Figure 4-2-4 appears.
  • Page 80 User’s Manual Figure 4-2-5: Add/Edit User Configuration page Screenshot The page includes the following fields: Object Description • Username A string identifying the user name that this entry should belong to. The allowed string length is 1 to 31. The valid user name is a combination of letters, numbers and underscores.
  • Page 81 User’s Manual Generally, the privilege level 15 can be used for an administrator account, privilege level 10 for a standard user account and privilege level 5 for a guest account. Once the new user is added, the new user entry is shown on the Users Configuration page. Figure 4-2-6: User Configuration page Screenshot If you forget the new password after changing the default password, please press the “Reset”...
  • Page 82: Privilege Levels

    User’s Manual 4.2.5 Privilege Levels This page provides an overview of the privilege levels. After setup is completed, please press the “Apply” button to take effect. Please login web interface with new user name and password and the screen in Figure 4-2-7 appears.
  • Page 83 User’s Manual The page includes the following fields: Object Description • Group Name The name identifying the privilege group. In most cases, a privilege level group consists of a single module (e.g. LACP, RSTP or QoS), but a few of them contain more than one.
  • Page 84: Ntp Configuration

    User’s Manual 4.2.6 NTP Configuration Configure NTP on this page. NTP is an acronym for Network Time Protocol, a network protocol for synchronizing the clocks of computer systems. NTP uses UDP (data grams) as transport layer. You can specify NTP Servers. The NTP Configuration screen in Figure 4-2-8 appears.
  • Page 85: Time Configuration

    User’s Manual 4.2.7 Time Configuration Configure Time Zone on this page. A Time Zone is a region that has a uniform standard time for legal, commercial, and social purposes. It is convenient for areas in close commercial or other communication to keep the same time, so time zones tend to follow the boundaries of countries and their subdivisions.
  • Page 86: Upnp

    User’s Manual Daylight Saving Time duration to repeat the configuration every year. Select 'Non-Recurring' and configure the Daylight Saving Time duration for single time configuration. (Default: Disabled). • • Week - Select the starting week number. Start Time Settings • Day - Select the starting day. •...
  • Page 87: Dhcp Relay

    User’s Manual The page includes the following fields: Object Description • Mode Indicates the UPnP operation mode. Possible modes are:  Enabled: Enable UPnP mode operation.  Disabled: Disable UPnP mode operation. When the mode is enabled, two ACEs are added automatically to trap UPnP related packets to CPU.
  • Page 88 User’s Manual The definition of Circuit ID in the switch is 4 bytes in length and the format is "vlan_id" "module_id" "port_no". The parameter of "vlan_id" is the first two bytes representing the VLAN ID. The parameter of "module_id" is the third byte for the module ID (in standalone switch it always equals 0;...
  • Page 89: Dhcp Relay Statistics

    User’s Manual  Replace: Replace the original relay information when receiving a DHCP message that already contains it.  Keep: Keep the original relay information when receiving a DHCP message that already contains it.  Drop: Drop the package when receiving a DHCP message that already contains relay information.
  • Page 90 User’s Manual • Receive Missing The packets number whose missing remote ID is received. Remote ID • Receive Bad Circuit ID The packets number whose Circuit ID does not match known circuit ID. The packets number whose Remote ID does not match known remote ID. Receive Bad Remote ID Client Statistics Object...
  • Page 91: Cpu Load

    User’s Manual 4.2.11 CPU Load This page displays the CPU load, using an SVG graph. The load is measured as average over the last 100ms, 1sec and 10 seconds intervals. The last 120 samples are graphed, and the last numbers are displayed as text as well. In order to display the SVG graph, your browser must support the SVG format.
  • Page 92: System Log

    User’s Manual 4.2.12 System Log The Industrial Managed Switch system log information is provided here. The System Log screen in Figure 4-2-14 appears. Figure 4-2-14: System Log page Screenshot The page includes the following fields: Object Description The ID (>= 1) of the system log entry. •...
  • Page 93: Detailed Log

    User’s Manual : Updates the system log entries, starting from the first available entry ID. : Updates the system log entries, ending at the last entry currently displayed. : Updates the system log entries, starting from the last entry currently displayed. : Updates the system log entries, ending at the last available entry ID.
  • Page 94: Remote Syslog

    User’s Manual 4.2.14 Remote Syslog Configure remote syslog on this page. The Remote Syslog screen in Figure 4-2-16 appears. Figure 4-2-16: Remote Syslog page Screenshot The page includes the following fields: Object Description • Mode Indicates the server mode operation. When the mode operation is enabled, the syslog message will send out to syslog server.
  • Page 95: Smtp Configuration

    User’s Manual 4.2.15 SMTP Configuration This page facilitates an SMTP Configuration on the switch. The SMTP Configure screen in Figure 4-2-17 appears. Figure 4-2-17: SMTP Configuration page Screenshot The page includes the following fields: Object Description Controls whether SMTP is enabled on this switch. •...
  • Page 96: Digital Input/Output

    User’s Manual 4.2.16 Digital Input/Output Digital Input allows user to log external device (such as industrial cooler) dead or alive or something else. System will log a user customized message into system log and syslog, and issue SNMP trap or issue an alarm E-mail. Digital Output allows user to monitor the switch port and power, and let system issue a high or low signal to an external device (such as alarm) when the monitor port or power has failed.
  • Page 97 User’s Manual • Allows user to set a customized message for Digital Input function alarming. Event Description • Event As Digital Input: Allows user to record alarm message to System log, syslog or issues out via SNMP Trap or SMTP. As default SNMP Trap and SMTP are disabled, please enable them first if you want to issue alarm message via them.
  • Page 98: Fault Alarm

    User’s Manual 4.2.17 Fault Alarm This page facilitates an update of the firmware controlling the switch. The Web Firmware Upgrade screen in Figure 4-2-19 appears. Figure 4-2-19: Fault Alarm Control Configuration page Screenshot The page includes the following fields: Object Description •...
  • Page 99: Web Firmware Upgrade

    User’s Manual 4.2.18 Web Firmware Upgrade This page facilitates an update of the firmware controlling the switch. The Web Firmware Upgrade screen in Figure 4-2-20 appears. Figure 4-2-20: Web Firmware Upgrade page Screenshot To open Firmware Upgrade screen, perform the following: Click System ->...
  • Page 100: Tftp Firmware Upgrade

    User’s Manual 4.2.19 TFTP Firmware Upgrade The Firmware Upgrade page provides the functions to allow a user to update the Industrial Managed Switch firmware from the TFTP server in the network. Before updating, make sure you have your TFTP server ready and the firmware image is on the TFTP server.
  • Page 101: Save Startup Config

    User’s Manual 4.2.20 Save Startup Config This function allows to save the current configuration, thereby ensuring that the current active configuration can be used at the next reboot screen in Figure 4-2-23 as shown below. After saving the configuration, the screen in Figure 4-2-24 appears.
  • Page 102: Configuration Upload

    User’s Manual 4.2.22 Configuration Upload Configuration Upload page allows the uploads of the running-config and startup-config on the switch. Please refer to Figure 4-2-26 shown below. Figure 4-2-26: Configuration Upload page Screenshot If the destination is running-config, the file will be applied to the switch configuration. This can be done in two ways: •...
  • Page 103: Configuration Delete

    User’s Manual It is possible to activate any of the configuration files present on the switch, except for running-config which represents the currently active configuration. Select the file to activate and click . This will initiate the process of completely replacing the existing configuration with that of the selected file.
  • Page 104: Factory Default

    User’s Manual Figure 4-2-29: Software Image Selection page Screenshot The page includes the following fields: Object Description • Image The flash index name of the firmware image. The name of primary (preferred) image is image, the alternate image is named image.bk. •...
  • Page 105: System Reboot

    User’s Manual Buttons : Click to reset the configuration to Factory Defaults. : Click to return to the Port State page without resetting the configuration. To reset the Industrial Managed Switch to the Factory default setting, you can also press the hardware reset button at the front panel about 10 seconds.
  • Page 106: Simple Network Management Protocol

    User’s Manual 4.3 Simple Network Management Protocol 4.3.1 SNMP Overview The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management information between network devices. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth.
  • Page 107: Snmp System Configuration

    User’s Manual SNMP community An SNMP community is the group that devices and management stations running SNMP belong to. It helps define where information is sent. The community name is used to identify the group. A SNMP device or agent may belong to more than one SNMP community.
  • Page 108 User’s Manual The page includes the following fields: Object Description • Indicates the SNMP mode operation. Possible modes are: Mode  Enabled: Enable SNMP mode operation.  Disabled: Disable SNMP mode operation. Indicates the SNMP supported version. Possible versions are: •...
  • Page 109: Snmp Trap Configuration

    User’s Manual 4.3.3 SNMP Trap Configuration Configure SNMP trap on this page. The SNMP Trap Configuration screen in Figure 4-3-2 appears. Figure 4-3-2: SNMP Trap Configuration page Screenshot The page includes the following fields: Object Description Indicates which trap Configuration's name for configuring. The allowed string •...
  • Page 110 User’s Manual • Indicates the community access string when send SNMP trap packet. The Trap Community allowed string length is 0 to 255, and the allowed content is the ASCII characters from 33 to 126. Indicates the SNMP trap destination address. •...
  • Page 111: Snmp System Information

    User’s Manual Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.3.4 SNMP System Information The switch system information is provided here. The SNMP System Information screen in Figure 4-3-3 appears.
  • Page 112: Snmpv3 Configuration

    User’s Manual 4.3.5 SNMPv3 Configuration 4.3.5.1 SNMPv3 Communities Configure SNMPv3 communities table on this page. The entry index key is Community. The SNMPv3 Communities screen in Figure 4-3-4 appears. Figure 4-3-4: SNMPv3 Communities Configuration page Screenshot The page includes the following fields: Object Description Check to delete the entry.
  • Page 113: Snmpv3 Users

    User’s Manual 4.3.5.2 SNMPv3 Users Configure SNMPv3 users table on this page. The entry index keys are Engine ID and User Name. The SNMPv3 Users screen in Figure 4-3-5 appears. Figure 4-3-5: SNMPv3 Users Configuration page Screenshot The page includes the following fields: Object Description •...
  • Page 114: Snmpv3 Groups

    User’s Manual  MD5: An optional flag to indicate that this user using MD5 authentication protocol.  SHA: An optional flag to indicate that this user using SHA authentication protocol. The value of security level cannot be modified if entry already exist. That means must first ensure that the value is set correctly.
  • Page 115: Snmpv3 Views

    User’s Manual The page includes the following fields: Object Description • Check to delete the entry. It will be deleted during the next save. Delete • Indicates the security model that this entry should belong to. Possible security Security Model models are: ...
  • Page 116: Snmpv3 Access

    User’s Manual The page includes the following fields: Object Description • Check to delete the entry. It will be deleted during the next save. Delete • A string identifying the view name that this entry should belong to. The allowed View Name string length is 1 to 32, and the allowed content is the ASCII characters from 33 to 126.
  • Page 117 User’s Manual The page includes the following fields: Object Description • Check to delete the entry. It will be deleted during the next save. Delete • A string identifying the group name that this entry should belong to. The allowed Group Name string length is 1 to 32, and the allowed content is the ASCII characters from 33 to 126.
  • Page 118: Port Management

    User’s Manual 4.4 Port Management Use the Port Menu to display or configure the Industrial Managed Switch's ports. This section has the following items: Configures port connection settings  Port Configuration Lists Ethernet and RMON port statistics  Port Statistics Overview Lists Ethernet and RMON port statistics ...
  • Page 119 User’s Manual • Select any available link speed for the given switch port. Draw the menu bar to Configured Link Speed select the mode. Auto - Setup Auto negotiation for copper interface.  10Mbps HDX - Force sets 10Mbps/Half-Duplex mode. ...
  • Page 120: Port Statistics Overview

    User’s Manual 4.4.2 Port Statistics Overview This page provides an overview of general traffic statistics for all switch ports. The Port Statistics Overview screen in Figure 4-4-2 appears. Figure 4-4-2: Port Statistics Overview page Screenshot The displayed counters are: Object Description The logical port for the settings contained in the same row.
  • Page 121: Port Statistics Detail

    User’s Manual 4.4.3 Port Statistics Detail This page provides detailed traffic statistics for a specific switch port. Use the port select box to select which switch port details to display. The selected port belong to the currently selected stack unit, as reflected by the page header. The displayed counters are the totals for receive and transmit, the size counters for receive and transmit, and the error counters for receive and transmit.
  • Page 122 User’s Manual Receive and Transmit Size Counters The number of received and transmitted (good and bad) packets split into categories based on their respective frame sizes. Receive and Transmit Queue Counters The number of received and transmitted packets per input and output queue. Receive Error Counters Object Description...
  • Page 123: Sfp Module Information

    User’s Manual 4.4.4 SFP Module Information The IGS Series supports the SFP module with digital diagnostics monitoring (DDM) function. This feature is also known as digital optical monitoring (DOM). You can check the physical or operational status of an SFP module via the SFP Module Information page.
  • Page 124: Port Mirror

    User’s Manual • TX power (dBm) Display the TX power of current SFP DDM module; the TX power value is gotten from the SFP DDM module. – SFP DDM Module Only • RX power (dBm) Display the RX power of current SFP DDM module; the RX power value is gotten from the SFP DDM module.
  • Page 125 User’s Manual The traffic to be copied to the mirror port is selected as follows: All frames received on a given port (also known as ingress or source mirroring). • All frames transmitted on a given port (also known as egress or destination mirroring). •...
  • Page 126 User’s Manual The page includes the following fields: Object Description • Port to mirror on Frames from ports that have either source (rx) or destination (tx) mirroring enabled are mirrored to this port. Disabled disables mirroring. The logical port for the settings contained in the same row. •...
  • Page 127: Link Aggregation

    User’s Manual 4.5 Link Aggregation Port Aggregation optimizes port usage by linking a group of ports together to form a single Link Aggregated Groups (LAGs). Port Aggregation multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy. Each LAG is composed of ports of the same speed, set to full-duplex operations.
  • Page 128 User’s Manual The Link Aggregation Control Protocol (LACP) provides a standardized means for exchanging information between Partner Systems that require high speed redundant links. Link aggregation lets you group up to eight consecutive ports into a single dedicated connection. This feature can expand bandwidth to a device on the network. LACP operation requires full-duplex mode, more detail information refer to the IEEE 802.3ad standard.
  • Page 129: Static Aggregation

    User’s Manual 4.5.1 Static Aggregation This page is used to configure the Aggregation hash mode and the aggregation group. The aggregation hash mode settings are global, whereas the aggregation group relate to the currently selected stack unit, as reflected by the page header. Hash Code Contributors The Static Aggregation screen in Figure 4-5-2...
  • Page 130: Lacp Configuration

    User’s Manual Static Aggregation Group Configuration The Aggregation Group Configuration screen in Figure 4-5-3 appears. Figure 4-5-3: Aggregation Group Configuration page Screenshot The page includes the following fields: .Object Description • Indicates the group ID for the settings contained in the same row. Group ID Group ID "Normal"...
  • Page 131 User’s Manual This page allows the user to inspect the current LACP port configurations, and possibly change them as well. The LACP port settings relate to the currently selected stack unit, as reflected by the page header. The LACP Configuration screen in Figure 4-5-4 appears.
  • Page 132: Lacp System Status

    User’s Manual Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.5.3 LACP System Status This page provides a status overview for all LACP instances. The LACP Status page displays the current LACP aggregation Groups and LACP Port status.
  • Page 133: Lacp Port Status

    User’s Manual 4.5.4 LACP Port Status This page provides a status overview for LACP status for all ports. The LACP Port Status screen in Figure 4-5-6 appears. Figure 4-5-6: LACP Status page Screenshot The page includes the following fields: Object Description •...
  • Page 134: Lacp Port Statistics

    User’s Manual 4.5.5 LACP Port Statistics This page provides an overview for LACP statistics for all ports. The LACP Port Statistics screen in Figure 4-5-7 appears. Figure 4-5-7: LACP Statistics page Screenshot The page includes the following fields: Object Description The switch port number.
  • Page 135: Vlan

    User’s Manual 4.6 VLAN 4.6.1 VLAN Overview A Virtual Local Area Network (VLAN) is a network topology configured according to a logical scheme rather than the physical layout. VLAN can be used to combine any collection of LAN segments into an autonomous user group that appears as a single LAN.
  • Page 136: Ieee 802.1Q Vlan

    User’s Manual 4.6.2 IEEE 802.1Q VLAN In large networks, routers are used to isolate broadcast traffic for each subnet into separate domains. This Industrial Managed Switch provides a similar service at Layer 2 by using VLANs to organize any group of network nodes into separate broadcast domains.
  • Page 137 User’s Manual ■ 802.1Q VLAN Tags The figure below shows the 802.1Q VLAN tag. There are four additional octets inserted after the source MAC address. Their presence is indicated by a value of 0x8100 in the Ether Type field. When a packet's Ether Type field is equal to 0x8100, the packet carries the IEEE 802.1Q/802.1p tag.
  • Page 138 User’s Manual Every physical port on a switch has a PVID. 802.1Q ports are also assigned a PVID, for use within the switch. If no VLAN are defined on the switch, all ports are then assigned to a default VLAN with a PVID equal to 1. Untagged packets are assigned the PVID of the port on which they were received.
  • Page 139: Vlan Port Configuration

    User’s Manual ■ Port Overlapping Port overlapping can be used to allow access to commonly shared network resources among different VLAN groups, such as file servers or printers. Note that if you implement VLANs which do not overlap, but still need to communicate, you can connect them by enabled routing on this switch.
  • Page 140 User’s Manual ■ IEEE 802.1Q Tunneling (Q-in-Q) IEEE 802.1Q Tunneling (Q-in-Q) is designed for service providers carrying traffic for multiple customers across their networks. Q-in-Q tunneling is used to maintain customer-specific VLAN and Layer 2 protocol configurations even when different customers use the same internal VLAN IDs.
  • Page 141 User’s Manual Global VLAN Configuration The Global VLAN Configuration screen in Figure 4-6-1 appears. Figure 4-6-1 : Global VLAN Configuration Screenshot The page includes the following fields: Object Description • This field shows the allowed Access VLANs, it only affects ports configured as Allowed Access Access ports.
  • Page 142 User’s Manual The page includes the following fields: Object Description • This is the logical port number for this row. Port • Mode Access ports are normally used to connect to end stations. Dynamic features like Access Voice VLAN may add the port to more VLANs behind the scenes. Access ports have the following characteristics: •...
  • Page 143 User’s Manual The Port VLAN is called an "Access VLAN" for ports in Access mode and Native VLAN for ports in Trunk or Hybrid mode. • Ports in hybrid mode allow for changing the port type, that is, whether a frame's Port Type VLAN tag is used to classify the frame on ingress to a particular VLAN, and if so, which TPID it reacts on.
  • Page 144 User’s Manual Only untagged frames are accepted on ingress. Tagged frames are discarded. This option is only available for ports in Hybrid mode. Ports in Trunk and Hybrid Egress Tagging mode may control the tagging of frames on egress. ■ Untag Port VLAN Frames classified to the Port VLAN are transmitted untagged.
  • Page 145: Vlan Membership Status

    User’s Manual 4.6.4 VLAN Membership Status This page provides an overview of membership status for VLAN users. The VLAN Membership Status screen in Figure 4-6-4 appears. Figure 4-6-4: VLAN Membership Status for Static User page Screenshot The page includes the following fields: Object Description A VLAN User is a module that uses services of the VLAN management...
  • Page 146: Vlan Port Status

    User’s Manual Buttons : Select VLAN Users from this drop down list. Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the page immediately. : Updates the table starting from the first entry in the VLAN Table, i.e. the entry with the lowest VLAN ID. : Updates the table, starting with the entry after the last entry currently displayed.
  • Page 147: Private Vlan

    User’s Manual the classified VLAN of the frame, the frame is discarded. Shows whether the port accepts all frames or only tagged frames. This • Frame Type parameter affects VLAN ingress processing. If the port only accepts tagged frames, untagged frames received on that port are discarded. •...
  • Page 148 User’s Manual Figure 4-6-6 Private VLAN Membership Configuration page screenshot The page includes the following fields: Object Description • Delete To delete a private VLAN entry, check this box. The entry will be deleted during the next save. Indicates the ID of this particular private VLAN. •...
  • Page 149: Port Isolation

    User’s Manual : Click to refresh the page immediately. 4.6.7 Port Isolation Overview When a VLAN is configured to be a private VLAN, communication between ports within that VLAN can be prevented. Two application examples are provided in this section: •...
  • Page 150 User’s Manual  Isolated ports — Ports from which traffic can only be forwarded to promiscuous ports in the private VLAN — Ports which can receive traffic from only promiscuous ports in the private VLAN The configuration of promiscuous and isolated ports applies to all private VLANs. When traffic comes in on a promiscuous port in a private VLAN, the VLAN mask from the VLAN table is applied.
  • Page 151: Vlan Setting Example

    User’s Manual 4.6.8 VLAN setting example:  Separate VLAN  802.1Q VLAN Trunk  Port Isolate 4.6.8.1 Two Separate 802.1Q VLANs The diagram shows how the Industrial Managed Switch handle Tagged and Untagged traffic flow for two VLANs. VLAN Group 2 and VLAN Group 3 are separated VLAN.
  • Page 152 User’s Manual The scenario is described as follows:  Untagged packet entering VLAN 2 While [PC-1] transmit an untagged packet enters Port-1, the Industrial Managed Switch will tag it with a VLAN Tag=2. [PC-2] and [PC-3] will received the packet through Port-2 and Port-3. [PC-4],[PC-5] and [PC-6] received no packet.
  • Page 153 User’s Manual Assign VLAN Member and PVID to each port: VLAN 2 : Port-1,Port-2 and Port-3 VLAN 3 : Port-4, Port-5 and Port-6 VLAN 1 : All other ports – Port-7~Port-28 Figure 4-6-10: Change Port VLAN of Port 1~3 to be VLAN2 and Port VLAN of Port 4~6 to be VLAN3 Enable VLAN Tag for specific ports Link Type: Port-3 (VLAN-2) and Port-6 (VLAN-3) Change Port 3 Mode as Trunk and select Egress Tagging as Tag All and Type 2 in the Allowed VLANs column.
  • Page 154: Vlan Trunking Between Two 802.1Q Aware Switches

    User’s Manual 4.6.8.2 VLAN Trunking between two 802.1Q aware switches In most cases, they are used for “Uplink” to other switches. VLANs are separated at different switches, but they need to access to other switches within the same VLAN group. The screen in Figure 4-6-12 appears.
  • Page 155 User’s Manual Figure 4-6-14: Changes Port VLAN of Port 1~3 to be VLAN2 and Port VLAN of Port 4~6 to be VLAN3 For the VLAN ports connecting to the hosts, please refer to 4.6.10.1. The following steps focus on the VLAN Trunk port configuration.
  • Page 156: Port Isolate

    User’s Manual Repeat Steps 1 to 6 to set up the VLAN Trunk port at the partner switch. To add more VLANs to join the VLAN trunk, repeat Steps 1 to 3 to assign the Trunk port to the VLANs. 4.6.8.3 Port Isolate The diagram shows how the Industrial Managed Switch handles isolated and promiscuous ports, and the each PC is not able to access the isolated port of each other’s PCs.
  • Page 157: Mac-Based Vlan

    User’s Manual Assign VLAN Member : VLAN 1 : Port-5 and Port-6 VLAN 2 : Port-1, Port-2, Port-5 and Port-6 VLAN 3: Port-3~Port-6. The screen in Figure 4-6-18 appears. Figure 4-6-17: Private VLAN Port Setting 4.6.9 MAC-based VLAN The MAC-based VLAN entries can be configured here. This page allows for adding and deleting MAC-based VLAN entries and assigning the entries to different ports.
  • Page 158 User’s Manual The page includes the following fields: Object Description • Delete To delete a MAC-based VLAN entry, check this box and press save. The entry will be deleted in the stack. Indicates the MAC address. • MAC Address • VLAN ID Indicates the VLAN ID.
  • Page 159: Protocol-Based Vlan

    User’s Manual 4.6.10 Protocol-based VLAN This page allows you to add new protocols to Group Name (unique for each Group) mapping entries as well as allow you to see and delete already mapped entries for the switch. The Protocol-based VLAN screen in Figure 4-6-19 appears.
  • Page 160 User’s Manual a. OUI: OUI (Organizationally Unique Identifier) is value in format of xx-xx-xx where each pair (xx) in string is a hexadecimal value ranges from 0x00-0xff. b. PID: If the OUI is hexadecimal 000000, the protocol ID is the Ethernet type (EtherType) field value for the protocol running on top of SNAP;...
  • Page 161: Protocol-Based Vlan Membership

    User’s Manual 4.6.11 Protocol-based VLAN Membership This page allows you to map a already configured Group Name to a VLAN for the switch. The Group Name to VLAN Mapping Table screen in Figure 4-6-20 appears. Figure 4-6-20 Group Name to VLAN Mapping Table page Screenshot The page includes the following fields: Object Description...
  • Page 162: Spanning Tree Protocol

    User’s Manual 4.7 Spanning Tree Protocol 4.7.1 Theory The Spanning Tree protocol can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
  • Page 163 User’s Manual The path cost to the root from the transmitting port  The port identifier of the transmitting port  The switch sends BPDUs to communicate and construct the spanning-tree topology. All switches connected to the LAN on which the packet is transmitted will receive the BPDU. BPDUs are not directly forwarded by the switch, but the receiving switch uses the information in the frame to calculate a BPDU, and, if the topology changes, initiates a BPDU transmission.
  • Page 164 User’s Manual From forwarding to disabled  From disabled to blocking  Figure 4-7-1: STP Port State Transitions You can modify each port state by using management software. When you enable STP, every port on every switch in the network goes through the blocking state and then transitions through the states of listening and learning at power up. If properly configured, each port stabilizes to the forwarding or blocking state.
  • Page 165 User’s Manual The following are the user-configurable STP parameters for the switch level: Parameter Description Default Value A combination of the User-set priority and the 32768 + MAC Bridge Identifier(Not user switch’s MAC address. configurable The Bridge Identifier consists of two parts: except by setting priority a 16-bit priority and a 48-bit Ethernet MAC address below)
  • Page 166 User’s Manual User-Changeable STA Parameters The Switch’s factory default setting should cover the majority of installations. However, it is advisable to keep the default settings as set at the factory; unless, it is absolutely necessary. The user changeable parameters in the Switch are as follows: Priority –...
  • Page 167 User’s Manual Figure 4-7-2: Before Applying the STA Rules In this example, only the default STP values are used. Figure 4-7-3: After Applying the STA Rules...
  • Page 168: Stp System Configuration

    User’s Manual The switch with the lowest Bridge ID (switch C) was elected the root bridge, and the ports were selected to give a high port cost between switches B and C. The two (optional) Gigabit ports (default port cost = 20,000) on switch A are connected to one (optional) Gigabit port on both switch B and C.
  • Page 169 User’s Manual The page includes the following fields: Basic Settings Object Description The STP protocol version setting. Valid values are: • Protocol Version  STP (IEEE 802.1D Spanning Tree Protocol) RSTP (IEEE 802.2w Rapid Spanning Tree Protocol)  MSTP (IEEE 802.1s Multiple Spanning Tree Protocol) ...
  • Page 170: Bridge Status

    User’s Manual • Port Error Recovery Control whether a port in the error-disabled state automatically will be enabled after a certain time. If recovery is not enabled, ports have to be disabled and re-enabled for normal STP operation. The condition is also cleared by a system reboot.
  • Page 171: Cist Port Configuration

    User’s Manual • Topology Flag The current state of the Topology Change Flag for this Bridge instance. The time since last Topology Change occurred. • Topology Change Last Buttons Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the page immediately.
  • Page 172 User’s Manual values. Using the Specific setting, a user-defined value can be entered. The path cost is used when establishing the active topology of the network. Lower path cost ports are chosen as forwarding ports in favor of higher path cost ports. Valid values are in the range 1 to 200000000.
  • Page 173 User’s Manual Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. By default, the system automatically detects the speed and duplex mode used on each port, and configures the path cost according to the values shown below.
  • Page 174: Msti Priorities

    User’s Manual 4.7.5 MSTI Priorities This page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. The MSTI Priority screen in Figure 4-7-7 appears. Figure 4-7-7: MSTI Priority page Screenshot The page includes the following fields: Object Description...
  • Page 175: Msti Configuration

    User’s Manual 4.7.6 MSTI Configuration This page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. The MSTI Configuration screen in Figure 4-7-8 appears. Figure 4-7-8: MSTI Configuration page Screenshot The page includes the following fields: Configuration Identification Object...
  • Page 176: Msti Ports Configuration

    User’s Manual MSTI Mapping Object Description • MSTI The bridge instance. The CIST is not available for explicit mapping, as it will receive the VLANs not explicitly mapped. The list of VLAN's mapped to the MSTI. The VLANs must be separated with •...
  • Page 177 User’s Manual Figure 4-7-10 : MST1 MSTI Port Configuration page Screenshot The page includes the following fields: MSTx MSTI Port Configuration Object Description • Port The switch port number of the corresponding STP CIST (and MSTI) port. Controls the path cost incurred by the port. The Auto setting will set the path cost •...
  • Page 178: Port Status

    User’s Manual 4.7.8 Port Status This page displays the STP CIST port status for port physical ports in the currently selected switch. The STP Port Status screen in Figure 4-7-11 appears. Figure 4-7-11: STP Port Status page Screenshot The page includes the following fields: Object Description •...
  • Page 179: Port Statistics

    User’s Manual 4.7.9 Port Statistics This page displays the STP port statistics counters for port physical ports in the currently selected switch. The STP Port Statistics screen in Figure 4-7-12 appears. Figure 4-7-12: STP Statistics page Screenshot The page includes the following fields: Object Description •...
  • Page 180: Multicast

    User’s Manual 4.8 Multicast 4.8.1 IGMP Snooping The Internet Group Management Protocol (IGMP) lets host and routers share information about multicast groups memberships. IGMP snooping is a switch feature that monitors the exchange of IGMP messages and copies them to the CPU for feature processing.
  • Page 181 User’s Manual Figure 4-8-2: Multicast Flooding Figure 4-8-3: IGMP Snooping Multicast Stream Control...
  • Page 182 User’s Manual IGMP Versions 1 and 2 Multicast groups allow members to join or leave at any time. IGMP provides the method for members and multicast routers to communicate when joining or leaving a multicast group. IGMP version 1 is defined in RFC 1112. It has a fixed packet size and no optional data.
  • Page 183 User’s Manual The states a computer will go through to join or to leave a multicast group are shown below: Figure 4-8-4: IGMP State Transitions  IGMP Querier – A router, or multicast-enabled switch, can periodically ask their hosts if they want to receive multicast traffic. If there is more than one router/switch on the LAN performing IP multicasting, one of these devices is elected “querier”...
  • Page 184: Profile Table

    User’s Manual 4.8.2 Profile Table This page provides IPMC Profile related configurations. The IPMC profile is used to deploy the access control on IP multicast streams. It is allowed to create a maximum of 64 Profiles with a maximum of 128 corresponding rules for each. The Profile Table screen in Figure 4-8-5 appears.
  • Page 185: Address Entry

    User’s Manual Buttons : Click to add new IPMC profile. Specify the name and configure the new entry. Click "Save”. : Click to apply changes Click to undo any changes made locally and revert to previously saved values. 4.8.3 Address Entry This page provides address range settings used in .
  • Page 186: Igmp Snooping Configuration

    User’s Manual : Click to apply changes Click to undo any changes made locally and revert to previously saved values. Refreshes the displayed table starting from the input fields. Updates the table starting from the first entry in the IPMC Profile Address Configuration. Updates the table, starting with the entry after the last entry currently displayed.
  • Page 187 User’s Manual When IGMP Snooping is disabled, unregistered IPMCv4 traffic flooding is always active in spite of this setting. • IGMP SSM Range SSM (Source-Specific Multicast) Range allows the SSM-aware hosts and routers run the SSM service model for the groups in the address range. Enable IGMP Leave Proxy.
  • Page 188: Igmp Snooping Vlan Configuration

    User’s Manual 4.8.5 IGMP Snooping VLAN Configuration Each page shows up to 99 entries from the VLAN table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the VLAN Table. The first displayed will be the one with the lowest VLAN ID found in the VLAN Table.
  • Page 189 User’s Manual • PRI (PRI) Priority of Interface. It indicates the IGMP control frame priority level generated by the system. These values can be used to prioritize different classes of traffic. The allowed range is 0 (best effort) to 7 (highest), default interface priority value is 0 Robustness Variable.
  • Page 190: Igmp Snooping Port Group Filtering

    User’s Manual 4.8.6 IGMP Snooping Port Group Filtering In certain switch applications, the administrator may want to control the multicast services that are available to end users. For example, an IP/TV service is based on a specific subscription plan. The IGMP filtering feature fulfills this requirement by restricting access to specified multicast services on a switch port, and IGMP throttling limits the number of simultaneous multicast groups a port can join.
  • Page 191: Igmp Snooping Status

    User’s Manual 4.8.7 IGMP Snooping Status This page provides IGMP Snooping status. The IGMP Snooping Status screen in Figure 4-8-10 appears. Figure 4-8-10: IGMP Snooping Status page Screenshot The page includes the following fields: Object Description • The VLAN ID of the entry. VLAN ID •...
  • Page 192: Igmp Group Information

    User’s Manual Buttons : Click to refresh the page immediately. : Clears all Statistics counters. Auto-refresh : Automatic refresh occurs every 3 seconds. 4.8.8 IGMP Group Information Entries in the IGMP Group Table are shown on this page. The IGMP Group Table is sorted first by VLAN ID, and then by group. Each page shows up to 99 entries from the IGMP Group table, default being 20, selected through the "entries per page"...
  • Page 193: Igmpv3 Information

    User’s Manual 4.8.9 IGMPv3 Information Entries in the IGMP SSM Information Table are shown on this page. The IGMP SSM Information Table is sorted first by VLAN ID, then by group, and then by Port No. Different source addresses belong to the same group are treated as single entry. Each page shows up to 99 entries from the IGMP SSM (Source Specific Multicast) Information table, default being 20, selected through the "entries per page"...
  • Page 194: Mld Snooping Configuration

    User’s Manual 4.8.10 MLD Snooping Configuration This page provides MLD Snooping related configuration. The MLD Snooping Configuration screen in Figure 4-8-13 appears. Figure 4-8-13: MLD Snooping Configuration page Screenshot The page includes the following fields: Object Description • Enable the Global MLD Snooping. Snooping Enabled Enable unregistered IPMCv6 traffic flooding.
  • Page 195: Mld Snooping Vlan Configuration

    User’s Manual If an aggregation member port is selected as a router port, the whole aggregation will act as a router port. The allowed selection is Auto, Fix, Fone, default compatibility value is Auto. Enable the fast leave on the port. •...
  • Page 196 User’s Manual • Compatibility Compatibility is maintained by hosts and routers taking appropriate actions depending on the versions of MLD operating on hosts and routers within a network. The allowed selection is MLD-Auto, Forced MLDv1, Forced MLDv2, default compatibility value is MLD-Auto. (PRI) Priority of Interface.
  • Page 197: Mld Snooping Port Group Filtering

    User’s Manual 4.8.12 MLD Snooping Port Group Filtering In certain switch applications, the administrator may want to control the multicast services that are available to end users. For example, an IP/TV service is based on a specific subscription plan. The MLD filtering feature fulfills this requirement by restricting access to specified multicast services on a switch port, and MLD throttling limits the number of simultaneous multicast groups a port can join.
  • Page 198: Mld Snooping Status

    User’s Manual 4.8.13 MLD Snooping Status This page provides MLD Snooping status. The IGMP Snooping Status screen in Figure 4-8-16 appears. Figure 4-8-16: MLD Snooping Status page Screenshot The page includes the following fields: Object Description • The VLAN ID of the entry. VLAN ID •...
  • Page 199: Mld Group Information

    User’s Manual • Port Switch port number. • Status Indicates whether specific port is a router port or not. Buttons : Click to refresh the page immediately. : Clears all Statistics counters. Auto-refresh : Automatic refresh occurs every 3 seconds. 4.8.14 MLD Group Information Entries in the MLD Group Table are shown on this page.
  • Page 200: Mldv2 Information

    User’s Manual 4.8.15 MLDv2 Information Entries in the MLD SFM Information Table are shown on this page. The MLD SFM (Source-Filtered Multicast) Information Table also contains the SSM (Source-Specific Multicast) information. This table is sorted first by VLAN ID, then by group, and then by Port.
  • Page 201: Mvr (Multicast Vlan Registration)

    User’s Manual 4.8.16 MVR (Multicast VLAN Registration) The MVR feature enables multicast traffic forwarding on the Multicast VLANs. In a multicast television application, a PC or a network television or a set-top box can receive the multicast stream. ■ Multiple set-top boxes or PCs can be connected to one subscriber port, which is a switch port configured as an MVR ■...
  • Page 202 User’s Manual This page provides MVR related configuration. The MVR screen in Figure 4-8-19 appears. Figure 4-8-19: MVR Configuration page Screenshot The page includes the following fields: Object Description • MVR Mode Enable/Disable the Global MVR. The Unregistered Flooding control depends on the current configuration in IGMP/MLD Snooping.
  • Page 203 User’s Manual given, it should contain at least one alphabet. MVR VLAN name can be edited for the existing MVR VLAN entries or it can be added to the new entries. • IGMP Address Define the IPv4 address as source address used in IP header for IGMP control frames.
  • Page 204: Mvr Status

    User’s Manual The default Role is Inactive. Enable the fast leave on the port. • Immediate Leave Buttons : Click to add new MVR VLAN. Specify the VID and configure the new entry. Click "Save" : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
  • Page 205: Mvr Groups Information

    User’s Manual Auto-refresh : Automatic refresh occurs every 3 seconds. 4.8.18 MVR Groups Information Entries in the MVR Group Table are shown on this page. The MVR Group Table is sorted first by VLAN ID, and then by group. Each page shows up to 99 entries from the MVR Group table, default being 20, selected through the "entries per page" input field.
  • Page 206: Mvr Sfm Information

    User’s Manual 4.8.19 MVR SFM Information Entries in the MVR SFM Information Table are shown on this page. The MVR SFM (Source-Filtered Multicast) Information Table also contains the SSM (Source-Specific Multicast) information. This table is sorted first by VLAN ID, then by group, and then by Port.
  • Page 207: Quality Of Service

    User’s Manual 4.9 Quality of Service 4.9.1 Understanding QoS Quality of Service (QoS) is an advanced traffic prioritization feature that allows you to establish control over network traffic. QoS enables you to assign various grades of network service to different types of traffic, such as multi-media, video, protocol-specific, time critical, and file-backup traffic.
  • Page 208: Port Policing

    User’s Manual 4.9.2 Port Policing This page allows you to configure the Policer settings for all switch ports. The Port Policing screen in Figure 4-9-1 appears. Figure 4-9-1: QoS Ingress Port Policers page Screenshot The page includes the following fields: Object Description •...
  • Page 209: Port Classification

    User’s Manual 4.9.3 Port Classification This page allows you to configure the basic QoS Ingress Classification settings for all switch ports. The Port Classification screen in Figure 4-9-2 appears. Figure 4-9-2 : QoS Ingress Port Classification page Screenshot The page includes the following fields: Object Description •...
  • Page 210 User’s Manual a DPL that is equal to the DEI value in the tag. Otherwise the frame is classified to the default DPL. The classified DPL can be overruled by a QCL entry. All means all ports will have one specific setting. Controls the default value.
  • Page 211: Port Scheduler

    User’s Manual 4.9.4 Port Scheduler This page provides an overview of QoS Egress Port Schedulers for all switch ports. The Port Scheduler screen in Figure 4-9-3 appears. Figure 4-9-3: QoS Egress Port Schedule page Screenshot The page includes the following fields: Object Description The logical port for the settings contained in the same row.
  • Page 212: Port Shaping

    User’s Manual 4.9.5 Port Shaping This page provides an overview of QoS Egress Port Shapers for all switch ports. The Port Shaping screen in Figure 4-9-4 appears. Figure 4-9-4: QoS Egress Port Shapers page Screenshot The page includes the following fields: Object Description The logical port for the settings contained in the same row.
  • Page 213: Qos Egress Port Schedule And Shapers

    User’s Manual 4.9.5.1 QoS Egress Port Schedule and Shapers The Port Scheduler and Shapers for a specific port are configured on this page. The QoS Egress Port Schedule and Shaper screen in Figure 4-9-5 appears. Figure 4-9-5: QoS Egress Port Schedule and Shapers page Screenshot The page includes the following fields: Object Description...
  • Page 214 User’s Manual The default value is "kbps". • Queue Shaper Excess Controls whether the queue is allowed to use excess bandwidth. Controls the weight for this queue. • Queue Scheduler Weight This value is restricted to 1-100. This parameter is only shown if "Scheduler Mode"...
  • Page 215: Port Tag Remarking

    User’s Manual 4.9.6 Port Tag Remarking This page provides an overview of QoS Egress Port Tag Remarking for all switch ports. The Port Tag Remarking screen in Figure 4-9-6 appears. Figure 4-9-6: QoS Egress Port Tag Remarking page Screenshot The page includes the following fields: Object Description The logical port for the settings contained in the same row.
  • Page 216: Qos Egress Port Tag Remarking

    User’s Manual 4.9.6.1 QoS Egress Port Tag Remarking The QoS Egress Port Tag Remarking for a specific port are configured on this page. The QoS Egress Port Tag Remarking screen in Figure 4-9-7 appears. Figure 4-9-7: QoS Egress Port Tag Remarking page Screenshot The page includes the following fields: Object Description...
  • Page 217: Port Dscp

    User’s Manual 4.9.7 Port DSCP This page allows you to configure the basic QoS Port DSCP Configuration settings for all switch ports. The Port DSCP screen in Figure 4-9-8 appears. Figure 4-9-8: QoS Port DSCP Configuration page Screenshot The page includes the following fields: Object Description •...
  • Page 218 User’s Manual All: Classify all DSCP.  The Configuration All with available options will assign to whole ports. • Egress Port Egress Rewriting can be one of –. All means all ports will have one specific setting. Disable: No Egress rewrite. ...
  • Page 219: Dscp-Based Qos

    User’s Manual 4.9.8 DSCP-based QoS This page allows you to configure the basic QoS DSCP-based QoS Ingress Classification settings for all switches. The DSCP-based QoS screen in Figure 4-9-9 appears. Figure 4-9-9: DSCP-based QoS Ingress Classification page Screenshot The page includes the following fields: Object Description Maximum number of supported DSCP values are 64.
  • Page 220: Dscp Translation

    User’s Manual 4.9.9 DSCP Translation This page allows you to configure the basic QoS DSCP Translation settings for all switches. DSCP translation can be done in Ingress or Egress. The DSCP Translation screen in Figure 4-9-10 appears. Figure 4-9-10: DSCP Translation page Screenshot The page includes the following fields: Object Description...
  • Page 221: Dscp Classification

    User’s Manual • Classify Click to enable Classification at Ingress side. There are the following configurable parameters for Egress side – • Egress Remap DP0 Controls the remapping for frames with DP level 0. Remap DP1 Controls the remapping for frames with DP level 1. •...
  • Page 222: Qos Control List

    User’s Manual The page includes the following fields: Object Description • QoS Class Available QoS Class value ranges from 0 to 7. QoS Class (0-7) can be mapped to followed parameters. Actual Drop Precedence Level. • DPL • Select DSCP value (0-63) from DSCP menu to map DSCP to corresponding QoS DSCP Class and DPL value Buttons...
  • Page 223 User’s Manual The default value is 'Any'. Displays the OUI field of Source MAC address, i.e. first three octet (byte) of MAC • SMAC address. • Tag Type Indicates tag type. Possible values are: Any: Match tagged and untagged frames. ■...
  • Page 224: Qos Control Entry Configuration

    User’s Manual 4.9.11.1 QoS Control Entry Configuration The QCE Configuration screen in Figure 4-9-13 appears. Figure 4-9-13: QCE Configuration page Screenshot The page includes the following fields: Object Description • Check the checkbox button in case you what to make any port member of the Port Members QCL entry.
  • Page 225 User’s Manual SNAP IPv4 IPv6 Note: all frame types are explained below. Allow all types of frames. • Any • EtherType Ethernet Type Valid ethernet type can have value within 0x600-0xFFFF or 'Any' but excluding 0x800(IPv4) and 0x86DD(IPv6), default value is 'Any'. •...
  • Page 226: Qcl Status

    User’s Manual EF or AF11-AF43 Sport Source TCP/UDP port:(0-65535) or 'Any', specific or port range ■ applicable for IP protocol UDP/TCP Dport Destination TCP/UDP port:(0-65535) or 'Any', specific or port range ■ applicable for IP protocol UDP/TCP Class QoS class: (0-7) or 'Default'. •...
  • Page 227 User’s Manual The page includes the following fields: Object Description • User Indicates the QCL user. • Indicates the index of QCE. QCE# Indicates the list of ports configured with the QCE. • Port • Indicates the type of frame to look for incoming frames. Possible frame types are: Frame Type Any: The QCE will match all frame types.
  • Page 228: Storm Control Configuration

    User’s Manual 4.9.13 Storm Control Configuration Storm control for the switch is configured on this page. There is a unicast storm rate control, multicast storm rate control, and a broadcast storm rate control. These only affect flooded frames, i.e. frames with a (VLAN ID, DMAC) pair not present on the MAC Address table.
  • Page 229: Qos Statistics

    User’s Manual Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.9.14 QoS Statistics This page provides statistics for the different queues for all switch ports. The QoS Statistics screen in Figure 4-9-17 appears.
  • Page 230: Voice Vlan Configuration

    User’s Manual 4.9.15 Voice VLAN Configuration The Voice VLAN feature enables voice traffic forwarding on the Voice VLAN, then the switch can classify and schedule network traffic. It is recommended that there be two VLANs on a port - one for voice, one for data. Before connecting the IP device to the switch, the IP phone should configure the voice VLAN ID correctly.
  • Page 231 User’s Manual The allowed range is 1 to 4095. • Aging Time Indicates the Voice VLAN secure learning age time. The allowed range is 10 to 10000000 seconds. It used when security mode or auto detect mode is enabled. In other cases, it will based hardware age time. The actual age time will be situated in the [age_time;...
  • Page 232: Voice Vlan Oui Table

    User’s Manual 4.9.16 Voice VLAN OUI Table Configure VOICE VLAN OUI table on this page. The maximum entry number is 16. Modifying the OUI table will restart auto detection of OUI process. The Voice VLAN OUI Table screen in Figure 4-9-18 appears.
  • Page 233: Access Control List

    User’s Manual 4.10 Access Control List ACL is an acronym for Access Control List. It is the list table of ACEs, containing access control entries that specify individual users or groups permitted or denied to specific traffic objects, such as a process or a program. Each accessible traffic object contains an identifier to its ACL.
  • Page 234 User’s Manual frames. ARP: The ACE will match ARP/RARP frames. ■ IPv4: The ACE will match all IPv4 frames. ■ IPv4/ICMP: The ACE will match IPv4 frames with ICMP protocol. ■ IPv4/UDP: The ACE will match IPv4 frames with UDP protocol. ■...
  • Page 235: Access Control List Configuration

    User’s Manual 4.10.2 Access Control List Configuration This page shows the Access Control List (ACL), which is made up of the ACEs defined on this switch. Each row describes the ACE that is defined. The maximum number of ACEs is 512 on each switch. Click on the lowest plus sign to add a new ACE to the list.
  • Page 236 User’s Manual • Port Redirect Indicates the port redirect operation of the ACE. Frames matching the ACE are redirected to the port number. The allowed values are Disabled or a specific port number. When Disabled is displayed, the port redirect operation is disabled. Specify the mirror operation of this port.
  • Page 237: Ace Configuration

    User’s Manual 4.10.3 ACE Configuration Configure an ACE (Access Control Entry) on this page. An ACE consists of several parameters. These parameters vary according to the frame type that you select. First select the ingress port for the ACE, and then select the frame type. Different parameter options are displayed depending on the frame type selected.
  • Page 238 User’s Manual Ethernet Type: Only Ethernet Type frames can match this ACE. The IEEE ■ 802.3 describes the value of Length/Type Field specifications to be greater than or equal to 1536 decimal (equal to 0600 hexadecimal). ARP: Only ARP frames can match this ACE. Notice the ARP frames won't ■...
  • Page 239 User’s Manual  MAC Parameters Object Description • (Only displayed when the frame type is Ethernet Type or ARP.) SMAC Filter Specify the source MAC filter for this ACE. Any: No SMAC filter is specified. (SMAC filter status is "don't-care".) ■...
  • Page 240 User’s Manual • Specify the tag priority for this ACE. A frame that hits this ACE matches this tag priority. Tag Priority The allowed number range is 0 to 7. The value Any means that no tag priority is specified (tag priority is "don't-care".) ...
  • Page 241 User’s Manual • ARP Sender MAC Specify whether frames can hit the action according to their sender hardware address field (SHA) settings. Match 0: ARP frames where SHA is not equal to the SMAC address. ■ 1: ARP frames where SHA is equal to the SMAC address. ■...
  • Page 242 User’s Manual defining UDP parameters will appear. These fields are explained later in this help file. TCP: Select TCP to filter IPv4 TCP protocol frames. Extra fields for defining ■ TCP parameters will appear. These fields are explained later in this help file.
  • Page 243 User’s Manual Any: No destination IP filter is specified. (Destination IP filter is ■ "don't-care".) Host: Destination IP filter is set to Host. Specify the destination IP address ■ in the DIP Address field that appears. Network: Destination IP filter is set to Network. Specify the destination IP ■...
  • Page 244 User’s Manual usage of bitmask, if the binary bit value is "0", it means this bit is "don't-care". The real matched pattern is [sipv6_address & sipv6_bitmask] (last 32 bits). For example, if the SIPv6 address is 2001::3 and the SIPv6 bitmask is 0xFFFFFFFE(bit 0 is "don't-care"...
  • Page 245 User’s Manual Any: No TCP/UDP source filter is specified (TCP/UDP source filter status ■ is "don't-care"). Specific: If you want to filter a specific TCP/UDP source filter with this ■ ACE, you can enter a specific TCP/UDP source value. A field for entering a TCP/UDP source value appears.
  • Page 246 User’s Manual • TCP RST Specify the TCP "Reset the connection" (RST) value for this ACE. 0: TCP frames where the RST field is set must not be able to match this ■ entry. 1: TCP frames where the RST field is set must be able to match this entry. ■...
  • Page 247: Acl Ports Configuration

    User’s Manual 4.10.4 ACL Ports Configuration Configure the ACL parameters (ACE) of each switch port. These parameters will affect frames received on a port unless the frame matches a specific ACE. The ACL Ports Configuration screen in Figure 4-10-4 appears. Figure 4-10-4: ACL Ports Configuration page Screenshot The page includes the following fields: Object...
  • Page 248 User’s Manual • Logging Specify the logging operation of this port. The allowed values are: Enabled: Frames received on the port are stored in the System Log. ■ Disabled: Frames received on the port are not logged. ■ The default value is "Disabled". Note: The logging feature only works when the packet length is less than 1518 (without VLAN tags) and the System Log memory size and logging rate is limited.
  • Page 249: Acl Rate Limiter Configuration

    User’s Manual 4.10.5 ACL Rate Limiter Configuration Configure the rate limiter for the ACL of the switch. The ACL Rate Limiter Configuration screen in Figure 4-10-5 appears. Figure 4-10-5: ACL Rate Limiter Configuration page Screenshot The page includes the following fields: Object Description The rate limiter ID for the settings contained in the same row.
  • Page 250: Authentication

    User’s Manual 4.11 Authentication This section is to control the access of the Industrial Managed Switch, including the user access and management control. The Authentication section contains links to the following main topics:  IEEE 802.1X Port-based Network Access Control ...
  • Page 251: Understanding Ieee 802.1X Port-Based Authentication

    User’s Manual The advantage of MAC-based authentication over 802.1X is that several clients can be connected to the same port (e.g. through a 3rd party switch or a hub) and still require individual authentication, and that the clients don't need special supplicant software to authenticate.
  • Page 252 User’s Manual  Device Roles With 802.1X port-based authentication, the devices in the network have specific roles as shown below. Figure 4-11-1 Client—the device (workstation) that requests access to the LAN and switch services and responds to requests from  the switch.
  • Page 253 User’s Manual Switch (802.1X device)—controls the physical access to the network based on the authentication status of the client.  The switch acts as an intermediary (proxy) between the client and the authentication server, requesting identity information from the client, verifying that information with the authentication server, and relaying a response to the client. The switch includes the RADIUS client, which is responsible for encapsulating and decapsulating the Extensible Authentication Protocol (EAP) frames and interacting with the authentication server.
  • Page 254 User’s Manual The specific exchange of EAP frames depends on the authentication method being used. “Figure 4-11-2” shows a message exchange initiated by the client using the One-Time-Password (OTP) authentication method with a RADIUS server. Figure 4-11-2: EAP Message Exchange ...
  • Page 255: Authentication Configuration

    User’s Manual 4.11.2 Authentication Configuration This page allows you to configure how a user is authenticated when he logs into the switch via one of the management client interfaces. The Authentication Method Configuration screen in Figure 4-11-3 appears. Figure 4-11-3: Authentication Method Configuration page Screenshot...
  • Page 256: Network Access Server Configuration

    User’s Manual The page includes the following fields: Object Description • Client The management client for which the configuration below applies. • Authentication Method Authentication Method can be set to one of the following values: None: authentication is disabled and login is not possible. ■...
  • Page 257 User’s Manual Figure 4-11-4: Network Access Server Configuration page Screenshot The page includes the following fields: System Configuration Object Description • Mode Indicates if NAS is globally enabled or disabled on the switch. If globally disabled, all ports are allowed forwarding of frames. If checked, successfully authenticated supplicants/clients are reauthenticated •...
  • Page 258 User’s Manual • Reauthentication Determines the period, in seconds, after which a connected client must be reauthenticated. This is only active if the Reauthentication Enabled checkbox is Period checked. Valid values are in the range 1 to 3600 seconds. Determines the time for retransmission of Request Identity EAPOL frames. •...
  • Page 259 User’s Manual • RADIUS-Assigned QoS RADIUS-assigned QoS provides a means to centrally control the traffic class to which traffic coming from a successfully authenticated supplicant is assigned on Enabled the switch. The RADIUS server must be configured to transmit special RADIUS attributes to take advantage of this feature.
  • Page 260 User’s Manual • Allow Guest VLAN if The switch remembers if an EAPOL frame has been received on the port for the life-time of the port. Once the switch considers whether to enter the Guest VLAN, EAPOL Seen it will first check if this option is enabled or disabled. If disabled (unchecked; default), the switch will only enter the Guest VLAN if an EAPOL frame has not been received on the port for the life-time of the port.
  • Page 261 User’s Manual MD5-Challenge, PEAP, and TLS. The important thing is that the authenticator (the switch) doesn't need to know which authentication method the supplicant and the authentication server are using, or how many information exchange frames are needed for a particular method. The switch simply encapsulates the EAP part of the frame into the relevant type (EAPOL or RADIUS) and forwards it.
  • Page 262 User’s Manual successfully authenticated. Multi 802.1X Multi 802.1X is - like Single 802.1X - not an IEEE standard, but a variant that features many of the same characteristics. In Multi 802.1X, one or more supplicants can get authenticated on the same port at the same time. Each supplicant is authenticated individually and secured in the MAC table using the Port Security module.
  • Page 263 User’s Manual several clients can be connected to the same port (e.g. through a 3rd party switch or a hub) and still require individual authentication, and that the clients don't need special supplicant software to authenticate. The advantage of MAC-based authentication over 802.1X-based authentication is that the clients don't need special supplicant software to authenticate.
  • Page 264 User’s Manual arriving on the port will be classified and switched on the RADIUS-assigned VLAN ID. If (re-)authentication fails or the RADIUS Access-Accept packet no longer carries a VLAN ID or it's invalid, or the supplicant is otherwise no longer present on the port, the port's VLAN ID is immediately reverted to the original VLAN ID (which may be changed by the administrator in the meanwhile without affecting the RADIUS-assigned).
  • Page 265 User’s Manual Membership and VLAN Port" pages. These pages show which modules have (temporarily) overridden the current Port VLAN configuration. Guest VLAN Operation: When a Guest VLAN enabled port's link comes up, the switch starts transmitting EAPOL Request Identity frames. If the number of transmissions of such frames exceeds Max.
  • Page 266 User’s Manual Reauthenticate: Schedules a reauthentication to whenever the ■ quiet-period of the port runs out (EAPOL-based authentication). For MAC-based authentication, reauthentication will be attempted immediately. The button only has effect for successfully authenticated clients on the port and will not cause the clients to get temporarily unauthorized. Reinitialize: Forces a reinitialization of the clients on the port and thereby ■...
  • Page 267: Network Access Overview

    User’s Manual 4.11.4 Network Access Overview This page provides an overview of the current NAS port states for the selected switch. The Network Access Overview screen in Figure 4-11-5 appears. Figure 4-11-5: Network Access Server Switch Status page Screenshot The page includes the following fields: Object Description The switch port number.
  • Page 268: Network Access Statistics

    User’s Manual Buttons Click to refresh the page immediately. Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. 4.11.5 Network Access Statistics This page provides detailed NAS statistics for a specific switch port running EAPOL-based IEEE 802.1X authentication. For MAC-based ports, it shows selected backend server (RADIUS Authentication Server) statistics, only.
  • Page 269 User’s Manual Port Counters Object Description • EAPOL Counters These supplicant frame counters are available for the following administrative states: ■ Force Authorized ■ Force Unauthorized ■ Port-based 802.1X ■ Single 802.1X ■ Multi 802.1X Direction Name IEEE Name Description dot1xAuthEapolFrames The number of valid EAPOL Total...
  • Page 270 User’s Manual which the Packet Body Length field is invalid. dot1xAuthEapolFrames The number of EAPOL Total frames of any type that have been transmitted by the switch. dot1xAuthEapolReqIdFr The number of EAPOL Request ID amesTx Request Identity frames that have been transmitted by the switch.
  • Page 271 User’s Manual dot1xAuthBackendOther Other 802.1X-based: RequestsToSupplicant Counts the number of times Requests that the switch sends an EAP Request packet following the first to the supplicant. Indicates that the backend server chose an EAP-method. MAC-based: Not applicable. dot1xAuthBackendAuth Auth. 802.1X- and MAC-based: Successes Counts the number of times Successes...
  • Page 272 User’s Manual for a given port (left-most table) or client (right-most table). Possible retransmissions are not counted. Information about the last supplicant/client that attempted to authenticate. This • Last Supplicant/Client information is available for the following administrative states: Info ■ Port-based 802.1X ■...
  • Page 273 User’s Manual Attached MAC Address Object Description • Identity Shows the identity of the supplicant, as received in the Response Identity EAPOL frame. Clicking the link causes the supplicant's EAPOL and Backend Server counters to be shown in the Selected Counters table. If no supplicants are attached, it shows No supplicants attached.
  • Page 274 User’s Manual : This button is available in the following modes: • Multi 802.1X • MAC-based Auth.X Click to clear both the port counters and all of the attached client's counters. The "Last Client" will not be cleared, however. : This button is available in the following modes: •...
  • Page 275: Radius

    User’s Manual 4.11.6 RADIUS This page allows you to configure the RADIUS Servers. The RADIUS Configuration screen in Figure 4-11-7 appears. Figure 4-11-7: RADIUS Server Configuration page Screenshot The page includes the following fields: Global Configuration These setting are common for all of the RADIUS Servers. Object Description •...
  • Page 276 User’s Manual • Key The secret key - up to 63 characters long - shared between the RADIUS server and the switch. • NAS-IP-Address The IPv4 address to be used as attribute 4 in RADIUS Access-Request packets. If this field is left blank, the IP address of the outgoing interface is used. The IPv6 address to be used as attribute 95 in RADIUS Access-Request •...
  • Page 277: Tacacs

    User’s Manual 4.11.7 TACACS+ This page allows you to configure the TACACS+ Servers. The TACACS+ Configuration screen in Figure 4-11-8 appears. Figure 4-11-8: TACACS+ Server Configuration page Screenshot The page includes the following fields: Global Configuration These setting are common for all of the TACACS+ Servers. Object Description •...
  • Page 278: Radius Overview

    User’s Manual Server Configuration The table has one row for each TACACS+ server and a number of columns, which are: Object Description To delete a TACACS+ server entry, check this box. The entry will be deleted during • Delete the next Save. The IP address or hostname of the TACACS+ server.
  • Page 279 User’s Manual The page includes the following fields: RADIUS Authentication Server Status Overview Object Description The RADIUS server number. Click to navigate to detailed statistics for this server. • # The IP address and UDP port number (in <IP Address>:<UDP Port> notation) of this server. •...
  • Page 280: Radius Details

    User’s Manual 4.11.9 RADIUS Details This page provides detailed statistics for a particular RADIUS server. The RADIUS Authentication/Accounting for Server Overview screen in Figure 4-11-10 appears. Figure 4-11-10: RADIUS Authentication/Accounting for Server Overview page Screenshot The page includes the following fields: RADIUS Authentication Statistics The statistics map closely to those specified in RFC4668 - RADIUS Authentication Client MIB.
  • Page 281 User’s Manual radiusAuthClientExtA The number of RADIUS Access ccessAccepts Access-Accept packets (valid Accepts or invalid) received from the server. radiusAuthClientExtA The number of RADIUS Access Rejects ccessRejects Access-Reject packets (valid or invalid) received from the server. radiusAuthClientExtA The number of RADIUS Access ccessChallenges Access-Challenge packets...
  • Page 282 User’s Manual authentication port and dropped for some other reason. radiusAuthClientExtA The number of RADIUS Access ccessRequests Access-Request packets sent Requests to the server. This does not include retransmissions. radiusAuthClientExtA The number of RADIUS Access ccessRetransmission Access-Request packets Retransmissio retransmitted to the RADIUS authentication server.
  • Page 283 User’s Manual in question. Shows the state of the server. It takes one of the State following values:  Disabled: The selected server is disabled.  Not Ready: The server is enabled, but IP communication is not yet up and running. Ready: The server is enabled, IP communication ...
  • Page 284 User’s Manual radiusAccClientExt The number of malformed Malformed MalformedRespons RADIUS packets received Responses from the server. Malformed packets include packets with an invalid length. Bad authenticators or unknown types are not included as malformed access responses. radiusAcctClientExt The number of RADIUS BadAuthenticators packets containing invalid Authenticators...
  • Page 285 User’s Manual retransmission. radiusAccClientExt The number of accounting Timeouts Timeouts timeouts to the server. After a timeout, the client may retry to the same server, send to a different server, or give up. A retry to the same server is counted as a retransmit as well as a timeout.
  • Page 286: Windows Platform Radius Server Configuration

    User’s Manual The granularity of this measurement is 100 ms. A value of 0 ms indicates that there hasn't been round-trip communication with the server yet. Buttons Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Click to refresh the page immediately.
  • Page 287 User’s Manual Add New RADIUS Client on the Windows 2003 server Figure 4-11-12: Windows Server – Add New RADIUS Client Setting Assign the client IP address to the Industrial Managed Switch Figure 4-11-13: Windows Server RADIUS Server Setting...
  • Page 288 User’s Manual The shared secret key should be the same as the key configured on the Industrial Managed Switch. Figure 4-11-14: Windows Server RADIUS Server Setting Configure ports attribute of 802.1X the same as “802.1X Port Configuration”. Figure 4-11-15: 802.1x Port Configuration...
  • Page 289 User’s Manual Create user data. The establishment of the user data needs to be created on the Radius Server PC. For example, the Radius Server is founded on Win2003 Server, and then: Figure 4-11-16: Windows 2003 AD Server Setting Path...
  • Page 290 User’s Manual Enter ” Active Directory Users and Computers”, create legal user data; next, right-click a user what you created to enter properties, and what to be noticed: Figure 4-11-17: Add User Properties Screen Figure 4-11-18: Add User Properties Screen...
  • Page 291: Client Configuration

    User’s Manual Set the Port Authenticate Status to “Force Authorized” if the port is connected to the RADIUS server or the port is an uplink port that is connected to another switch. Or once the 802.1X starts to work, the switch might not be able to access the RADIUS server. 4.11.11 802.1X Client Configuration Windows XP is originally 802.1X support.
  • Page 292 User’s Manual Select “MD-5 Challenge” from the drop-down list box for EAP type. Figure 4-11-20 Click “OK”. When client has associated with the Industrial Managed Switch, a user authentication notice appears in system tray. Click on the notice to continue.
  • Page 293 User’s Manual Figure 4-11-21: Windows Client Popup Login Request Message Enter the user name, password and the logon domain that your account belongs. 10. Click “OK” to complete the validation process. Figure 4-11-22...
  • Page 294: Security

    User’s Manual 4.12 Security This section is to control the access of the Industrial Managed Switch, includes the user access and management control. The Security page contains links to the following main topics:  Port Limit Control  Access Management ...
  • Page 295 User’s Manual The page includes the following fields: System Configuration Object Description Indicates if Limit Control is globally enabled or disabled on the switch stack. If • Mode globally disabled, other modules may still use the underlying functionality, but limit checks and corresponding actions are disabled. •...
  • Page 296 User’s Manual • Limit The maximum number of MAC addresses that can be secured on this port. This number cannot exceed 1024. If the limit is exceeded, the corresponding action is taken. The switch is "born" with a total number of MAC addresses from which all ports draw whenever a new MAC address is seen on a Port Security-enabled port.
  • Page 297: Access Management

    User’s Manual • Re-open Button If a port is shutdown by this module, you may reopen it by clicking this button, which will only be enabled if this is the case. For other methods, refer to Shutdown in the Action section. Note, that clicking the reopen button causes the page to be refreshed, so non-committed changes will be lost.
  • Page 298: Access Management Statistics

    User’s Manual • Start IP address Indicates the start IP address for the access management entry. • End IP address Indicates the end IP address for the access management entry. Indicates the host can access the switch from HTTP/HTTPS interface that the •...
  • Page 299: Https

    User’s Manual Buttons Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the page immediately. : Clears all statistics. 4.12.4 HTTPs Configure HTTPS on this page. The HTTPS Configuration screen in Figure 4-12-4 appears.
  • Page 300: Ssh

    User’s Manual Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.12.5 SSH Configure SSH on this page. This page shows the Port Security status. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules.
  • Page 301: Port Security Status

    User’s Manual 4.12.6 Port Security Status This page shows the Port Security status. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning.
  • Page 302 User’s Manual Port Status The table has one row for each port on the selected switch in the switch and a number of columns, which are: Object Description The port number for which the status applies. Click the port number to see the •...
  • Page 303: Port Security Detail

    User’s Manual 4.12.7 Port Security Detail This page shows the MAC addresses secured by the Port Security module. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning.
  • Page 304: Dhcp Snooping

    User’s Manual 4.12.8 DHCP Snooping DHCP Snooping is used to block intruder on the untrusted ports of DUT when it tries to intervene by injecting a bogus DHCP reply packet to a legitimate conversation between the DHCP client and server. Configure DHCP Snooping on this page.
  • Page 305 User’s Manual Figure 4-12-8: DHCP Snooping Configuration Screen page Screenshot The page includes the following fields: Object Description • Snooping Mode Indicates the DHCP snooping mode operation. Possible modes are:  Enabled: Enable DHCP snooping mode operation. When enable DHCP snooping mode operation, the request DHCP messages will be forwarded to trusted ports and only allowed reply packets from trusted ports.
  • Page 306: Snooping Table

    User’s Manual 4.12.9 Snooping Table This page display the dynamic IP assigned information after DHCP Snooping mode is disabled. All DHCP clients obtained the dynamic IP address from the DHCP server will be listed in this table except for local VLAN interface IP addresses.
  • Page 307 User’s Manual Figure 4-12-10: IP Source Guard Configuration Screen page Screenshot The page includes the following fields: Object Description • Mode of IP Source Enable the Global IP Source Guard or disable the Global IP Source Guard. All configured ACEs will be lost when the mode is enabled. Guard Configuration •...
  • Page 308: Ip Source Guard Static Table

    User’s Manual 4.12.11 IP Source Guard Static Table This page provides Static IP Source Guard Table. The Static IP Source Guard Table screen in Figure 4-12-11 appears. Figure 4-12-11: Static IP Source Guard Table Screen page Screenshot The page includes the following fields: Object Description Check to delete the entry.
  • Page 309: Dynamic Ip Source Guard Table

    User’s Manual 4.12.12 Dynamic IP Source Guard Table Entries in the Dynamic IP Source Guard Table are shown on this page. The Dynamic IP Source Guard Table is sorted first by port, then by VLAN ID, then by IP address, and then by IP mask. The Dynamic IP Source Guard Table screen in Figure 4-12-12 appears.
  • Page 310: Arp Inspection

    User’s Manual 4.12.13 ARP Inspection ARP Inspection is a secure feature. Several types of attacks can be launched against a host or devices connected to Layer 2 networks by "poisoning" the ARP caches. This feature is used to block such attacks. Only valid ARP requests and responses can go through DUT.
  • Page 311: Arp Inspection Static Table

    User’s Manual to the port setting. And the setting of "Check VLAN" is enabled, the log type of ARP Inspection will refer to the VLAN setting. Possible setting of "Check VLAN" are:  Enabled: Enable check VLAN operation.  Disabled: Disable check VLAN operation. Only the Global Mode and Port Mode on a given port are enabled, and the setting of "Check VLAN"...
  • Page 312: Dynamic Arp Inspection Table

    User’s Manual The page includes the following fields: Object Description Check to delete the entry. It will be deleted during the next save. • Delete • Port The logical port for the settings. The VLAN ID for the settings. • VLAN ID Allowed Source MAC address in ARP request packets.
  • Page 313 User’s Manual The “>>” will use the last entry of the currently displayed as a basis for the next lookup. When the end is reached the text "No more entries" is shown in the displayed table. Use the “|<<” button to start over. The page includes the following fields: Object Description The port number for which the status applies.
  • Page 314: Mac Address Table

    User’s Manual 4.13 MAC Address Table Switching of frames is based upon the DMAC address contained in the frame. The Industrial Managed Switch builds up a table that maps MAC addresses to switch ports for knowing which ports the frames should go to (based upon the DMAC address in the frame ).
  • Page 315 User’s Manual The page includes the following fields: Aging Configuration By default, dynamic entries are removed from the MAC table after 300 seconds. This removal is also called aging. Object Description Enables/disables the automatic aging of dynamic entries • Disable Automatic Aging •...
  • Page 316: Mac Address Table Status

    User’s Manual Buttons : Click to apply changes Click to undo any changes made locally and revert to previously saved values. 4.13.2 MAC Address Table Status Dynamic MAC Table Entries in the MAC Table are shown on this page. The MAC Table contains up to 8192 entries, and is sorted first by VLAN ID, then by MAC address.
  • Page 317 User’s Manual The page includes the following fields: Object Description • Indicates whether the entry is a static or dynamic entry. Type The VLAN ID of the entry. • VLAN • The MAC address of the entry. MAC Address • The ports that are members of the entry.
  • Page 318: Lldp

    User’s Manual 4.14 LLDP 4.14.1 Link Layer Discovery Protocol Link Layer Discovery Protocol (LLDP) is used to discover basic information about neighboring devices on the local broadcast domain. LLDP is a Layer 2 protocol that uses periodic broadcasts to advertise information about the sending device. Advertised information is represented in Type Length Value (TLV) format according to the IEEE 802.1ab standard, and can include details such as device identification, capabilities and configuration settings.
  • Page 319 User’s Manual The page includes the following fields: LLDP Parameters Object Description The switch is periodically transmitting LLDP frames to its neighbors for having the • Tx Interval network discovery information up-to-date. The interval between each LLDP frame is determined by the Tx Interval value. Valid values are restricted to 5 - 32768 seconds.
  • Page 320 User’s Manual  Tx only The switch will drop LLDP information received from neighbors, but will send out LLDP information.  Disabled The switch will not send out LLDP information, and will drop LLDP information received from neighbors.  Enabled The switch will send out LLDP information, and will analyze LLDP information received from neighbors.
  • Page 321: Lldp Med Configuration

    User’s Manual Buttons : Click to apply changes Click to undo any changes made locally and revert to previously saved values. 4.14.3 LLDP MED Configuration This page allows you to configure the LLDP-MED. The LLDPMED Configuration screen in Figure 4-14-2 appears.
  • Page 322 User’s Manual With this in mind LLDP-MED defines an LLDP-MED Fast Start interaction between the protocol and the application layers on top of the protocol, in order to achieve these related properties. Initially, a Network Connectivity Device will only transmit LLDP TLVs in an LLDPDU. Only after an LLDP-MED Endpoint Device is detected, will an LLDP-MED capable Network Connectivity Device start to advertise LLDP-MED TLVs in outgoing LLDPDUs on the associated port.
  • Page 323 User’s Manual different floor-to-floor dimensions. An altitude = 0.0 is meaningful even outside a building, and represents ground level at the given latitude and longitude. Inside a building, 0.0 represents the floor level associated with ground level at the main entrance.
  • Page 324 User’s Manual • Landmark Landmark or vanity address - Example: Columbia University Additional location info - Example: South Wing • Additional location info • Name Name (residence and office occupant) - Example: Flemming Jahn Postal/zip code - Example: 2791 • Zip code •...
  • Page 325 User’s Manual The network policy attributes advertised are: 1. Layer 2 VLAN ID (IEEE 802.1Q-2003) 2. Layer 2 priority value (IEEE 802.1D-2004) 3. Layer 3 Diffserv code point (DSCP) value (IETF RFC 2474) This network policy is potentially advertised and associated with multiple sets of application types supported on a given port. The application types specifically addressed are: 1.
  • Page 326 User’s Manual  Guest Voice Signaling (conditional) - for use in network topologies that require a different policy for the guest voice signaling than for the guest voice media. This application type should not be advertised if all the same network policies apply as those advertised in the Guest Voice application policy.
  • Page 327 User’s Manual Priority may specify one of eight priority levels (0 through 7), as defined by IEEE 802.1D-2004. A value of 0 represents use of the default priority as defined in IEEE 802.1D-2004. DSCP value to be used to provide Diffserv node behavior for the specified •...
  • Page 328: Lldp-Med Neighbor

    User’s Manual 4.14.4 LLDP-MED Neighbor This page provides a status overview for all LLDP-MED neighbors. The displayed table contains a row for each port on which an LLDP neighbor is detected. The LLDP-MED Neighbor Information screen in Figure 4-14-3 appears. The columns hold the following information: Figure 4-14-3: LLDP-MED Neighbor Information page Screenshot The page includes the following fields:...
  • Page 329 User’s Manual LLDP-MED Endpoint Device claiming compliance as a Media Endpoint (Class II) also support all aspects of TIA-1057 applicable to Generic Endpoints (Class I), and any LLDP-MED Endpoint Device claiming compliance as a Communication Device (Class III) will also support all aspects of TIA-1057 applicable to both Media Endpoints (Class II) and Generic Endpoints (Class I).
  • Page 330 User’s Manual 3. Location Identification 4. Extended Power via MDI - PSE 5. Extended Power via MDI - PD 6. Inventory 7. Reserved Application Type indicating the primary function of the application(s) defined for • Application Type this network policy, advertised by an Endpoint or Network Connectivity Device. The possible application types are shown below.
  • Page 331 User’s Manual  Tagged: The device is using the IEEE 802.1Q tagged frame format VLAN ID is the VLAN identifier (VID) for the port as defined in IEEE • VLAN ID 802.1Q-2003. A value of 1 through 4094 is used to define a valid VLAN ID. A value of 0 (Priority Tagged) is used if the device is using priority tagged frames as defined by IEEE 802.1Q-2003, meaning that only the IEEE 802.1D priority level is significant and the default PVID of the ingress port is used instead.
  • Page 332: Neighbor

    User’s Manual 4.14.5 Neighbor This page provides a status overview for all LLDP neighbors. The displayed table contains a row for each port on which an LLDP neighbor is detected. The LLDP Neighbor Information screen in Figure 4-14-4 appears. Figure 4-14-4: LLDP Neighbor Information page Screenshot The page includes the following fields: Object Description...
  • Page 333: Port Statistics

    User’s Manual Buttons : Click to refresh the page immediately. Auto-refresh Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. 4.14.6 Port Statistics This page provides an overview of all LLDP traffic. Two types of counters are shown. Global counters are counters that refer to the whole stack, switch, while local counters refers to counters for the currently selected switch.
  • Page 334 User’s Manual • Shows the number of entries deleted due to Time-To-Live expiring. Total Neighbors Entries Aged Out LLDP Statistics Local Counters The displayed table contains a row for each port. The columns hold the following information: Object Description The port on which LLDP frames are received or transmitted. •...
  • Page 335: Network Diagnostics

    User’s Manual 4.15 Network Diagnostics This section provide the Physical layer and IP layer network diagnostics tools for troubleshoot. The diagnostic tools are designed for network manager to help them quickly diagnose problems between point to point and better service customers. Use the Diagnostics menu items to display and configure basic administrative details of the Industrial Managed Switch.
  • Page 336: Ping

    User’s Manual 4.15.1 Ping This page allows you to issue ICMP PING packets to troubleshoot IP connectivity issues. After you press “Start”, 5 ICMP packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply. The page refreshes automatically until responses to all packets are received, or until a timeout occurs. The ICMP Ping screen in Figure 4-15-1 appears.
  • Page 337: Ipv6 Ping

    User’s Manual 4.15.2 IPv6 Ping This page allows you to issue ICMPv6 ping packets to troubleshoot IPv6 connectivity issues. After you press “Start”, 5 ICMPv6 packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply. The page refreshes automatically until responses to all packets are received, or until a timeout occurs. The ICMPv6 Ping screen in Figure 4-15-2 appears.
  • Page 338: Remote Ip Ping Test

    User’s Manual 4.15.3 Remote IP Ping Test This page allows you to issue ICMP ping packets to troubleshoot IP connectivity issues on special port. After you press “Test”, 5 ICMP packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply.
  • Page 339: Cable Diagnostics

    User’s Manual 4.15.4 Cable Diagnostics This page is used for running the Cable Diagnostics. Press to run the diagnostics. This will take approximately 5 seconds. If all ports are selected, this can take approximately 15 seconds. When completed, the page refreshes automatically, and you can view the cable diagnostics results in the cable status table.
  • Page 340 User’s Manual Cross A - Abnormal cross-pair coupling with pair A Cross B - Abnormal cross-pair coupling with pair B Cross C - Abnormal cross-pair coupling with pair C Cross D - Abnormal cross-pair coupling with pair D Length: The length (in meters) of the cable pair. The resolution is 3 meters Buttons : Click to run the diagnostics.
  • Page 341: Power Over Ethernet (Igs-10020Pt/10020Hpt/20160Hpt)

    User’s Manual 4.16 Power over Ethernet (IGS-10020PT/10020HPT/20160HPT) Providing up to 8/16 PoE, in-line power interfaces, the IGS-10020PT/10020HPT/20160HPT PoE Switch can easily build a power central-controlled IP phone system, IP Camera system, AP group for the enterprise. For instance, 8/16 cameras/APs can be easily installed around the corners of the company for surveillance demands or a wireless roaming environment in the office can be built.
  • Page 342: System Configuration

    User’s Manual PoE Splitter PoE Splitter split the PoE 56V DC over the Ethernet cable into 5/12V DC power output. It frees the device deployment from restrictions due to power outlet locations, which eliminate the costs for additional AC wiring and 3~12 watts reduces the installation time.
  • Page 343: Power Over Ethernet Configuration

    User’s Manual Class Usage Range of maximum power used by the PD Class Description Default 0.44 to 12.95 watts Classification unimplement Optional 0.44 to 3.84 watts Very low power Optional 3.84 to 6.49 watts Low power Optional 6.49 to 12.95 watts (or to 15.4 watts) Mid power Optional 12.95 to 25.50 watts (or to 30.8 watts)
  • Page 344 User’s Manual The page includes the following fields: Object Description • System PoE Admin Allows user to enable or disable PoE function. It will causes all of PoE ports to supply or not supply power. Mode Allows user to enable or disable PoE Temperature Protection. •...
  • Page 345: Port Sequential

    User’s Manual The wire gauge for the terminal block should be in the range of 12 ~ 22 AWG@25 degrees C. PD Classifications A PD may be classified by the PSE based on the classification information provided by the PD. The intent of PD classification is to provide information about the maximum power required by the PD during operation.
  • Page 346: Port Configuration

    User’s Manual The page includes the following fields: Object Description • Sequential Power up Allows user to enable or disable Sequential Power up function. Option Allows user to configure the PoE Port Start Up interval time. • Sequential Power up Interval •...
  • Page 347 User’s Manual  Disable: disable PoE function.  Schedule: enable PoE function in schedule mode. Indicates the schedule profile mode. Possible profiles are: • Schedule  Profile1  Profile2  Profile3  Profile4 Allows user to select 802.3at or 802.3af compatibility mode. The default value is •...
  • Page 348: Poe Status

    User’s Manual 4.16.6 PoE Status This page allows the user to inspect the total power consumption, total power reserved and current status for all PoE ports. The screen in Figure 4-16-5 appears. Figure 4-16-5:PoE Status Screenshot The page includes the following fields: Object Description •...
  • Page 349 User’s Manual • Operation Mode Displays the current PoE operation mode. Displays the current maximum PoE budget. • Current Budget • Current Ports in Use Displays the current PoE ports in use. • Class 1 ~ 4 ports Displays the current PoE class 1 ~ 4 ports. •...
  • Page 350: Poe Schedule

    User’s Manual 4.16.7 PoE Schedule This page allows the user to define PoE schedule and schedule power recycle. PoE Schedule Besides being used as an IP Surveillance, the Managed PoE switch is certainly applicable to constructing any PoE network including VoIP and Wireless LAN. Under the trend of energy saving worldwide and contributing to the environmental protection on the Earth, the Managed PoE switch can effectively control the power supply besides its capability of giving high watts power.
  • Page 351 User’s Manual The screen in Figure 4-16-6 appears. Figure 4-16-6: PoE Schedule Screenshot Please press the Add New Rule button to start setting PoE Schedule function. You have to set PoE schedule to profile and then go back to PoE Port Configuration, and select “Schedule” mode from per port “PoE Mode” option. You can then indicate which schedule profile could be applied to the PoE port.
  • Page 352: Lldp Poe Neighbours

    User’s Manual • Reboot Enable Allows user to enable or disable whole PoE port reboot by PoE reboot schedule. Please be noticed that if you want to PoE schedule and PoE reboot schedule work at the same time, please use this function, and don’t use Reboot Only function. This function offers administrator to reboot PoE device at indicate time if administrator has this kind of requirement.
  • Page 353 User’s Manual Please note that administrator has to enable LLDP port from LLDP configuration, please refer to the following example (The screen in Figure 4-16-98 appears.) To enable LLDP function from port1 to port3, administrator has to plug a PD that supports PoE LLDP function, and then administrator is going to see the PoE information of the PD from LLDP.
  • Page 354: Loop Protection

    User’s Manual 4.17 Loop Protection This chapter describes enabling loop protection function that provides loop protection to prevent broadcast loops in Industrial Managed Switch. 4.17.1 Configuration This page allows the user to inspect the current Loop Protection configurations, and possibly change them as well; screen in Figure 4-17-1 appears.
  • Page 355: Loop Protection Status

    User’s Manual 604800 seconds (7 days). A value of zero will keep a port disabled (until next device restart). Port Configuration Object Description The switch port number of the port. • Port • Enable Controls whether loop protection is enabled on this switch port. •...
  • Page 356 User’s Manual Buttons : Click to refresh the page immediately. Auto-refresh Check this box to enable an automatic refresh of the page at regular intervals.
  • Page 357: Rmon

    User’s Manual 4.18 RMON RMON is the most important expansion of the standard SNMP. RMON is a set of MIB definitions, used to define standard network monitor functions and interfaces, enabling the communication between SNMP management terminals and remote monitors. RMON provides a highly efficient method to monitor actions inside the subnets. MID of RMON consists of 10 groups.
  • Page 358 User’s Manual protocol.  InNUcastPkts: The number of broad-cast and multi-cast packets delivered to a higher-layer protocol.  InDiscards: The number of inbound packets that are discarded even the packets are normal.  InErrors: The number of inbound packets that contains errors preventing them from being deliverable to a higher-layer protocol.
  • Page 359: Rmon Alarm Status

    User’s Manual 4.18.2 RMON Alarm Status This page provides an overview of RMON Alarm entries. Each page shows up to 99 entries from the Alarm table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Alarm table.
  • Page 360: Rmon Event Configuration

    User’s Manual 4.18.3 RMON Event Configuration Configure RMON Event table on this page. The entry index key is ID; screen in Figure 4-18-3 appears. Figure 4-18-3: RMON Event Configuration page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry.
  • Page 361: Rmon Event Status

    User’s Manual 4.18.4 RMON Event Status This page provides an overview of RMON Event table entries. Each page shows up to 99 entries from the Event table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Event table.
  • Page 362: Rmon History Configuration

    User’s Manual 4.18.5 RMON History Configuration Configure RMON History table on this page. The entry index key is ID; screen in Figure 4-18-5 appears. Figure 4-18-5: RMON History Configuration page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry.
  • Page 363: Rmon History Status

    User’s Manual 4.18.6 RMON History Status This page provides a detail of RMON history entries; screen in Figure 4-18-6 appears. Figure 4-18-6: RMON History Overview page Screenshot The page includes the following fields: Object Description • History Index Indicates the index of History control entry. •...
  • Page 364: Rmon Statistics Configuration

    User’s Manual • Utilization The best estimate of the mean physical layer network utilization on this interface during this sampling interval is in the hundredths of a percent. Buttons : Click to refresh the page immediately. Auto-refresh Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Updates the table, starting from the first entry in the History table, i.e., the entry with the lowest History Index and Sample Index : Updates the table, starting with the entry after the last entry currently displayed.
  • Page 365: Rmon Statistics Status

    User’s Manual 4.18.8 RMON Statistics Status This page provides an overview of RMON Statistics entries. Each page shows up to 99 entries from the Statistics table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Statistics table.
  • Page 366 User’s Manual • Coll. The best estimate of the total number of collisions on this Ethernet segment. The total number of packets (including bad packets) received that were 64 octets • 64 Bytes in length. • 65~127 The total number of packets (including bad packets) received that were between 65 to 127 octets in length.
  • Page 367: Ptp (Igs-12040Mt/20040Mt/20160Hpt Only)

    User’s Manual 4.19 PTP (IGS-12040MT/20040MT/20160HPT Only) The Precision Time Protocol (PTP) is a protocol used to synchronize clocks throughout a computer network. On a local area network, it achieves clock accuracy in the sub-microsecond range, making it suitable for measurement and control systems. PTP was originally defined in the IEEE 1588-2002 standard, officially entitled "Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems"...
  • Page 368 User’s Manual  Slave Only - clock's Device Type is Slave Only Static member: defined by the system, true if two-step Sync events and • 2 Step Flag Pdelay_Resp events are used. • Clock Identity It shows unique clock identifier. If true, one-way measurements are used.
  • Page 369 User’s Manual Clock Click to edit the port data set for the ports assigned to this clock instance. • Ports Configuration Clock Default Data Set Object Description An internal instance id (0..3) • Clock ID • Device Type Indicates the Type of the Clock Instance. There are five Device Types. ...
  • Page 370 User’s Manual • PCP Priority Code Point value used for PTP frames. Clock current Data Set Object Description • stpRm Steps Removed : It is the number of PTP clocks traversed from the grandmaster to the local slave clock. • Offset from master Time difference between the master clock and the local slave clock, measured in The mean propagation time for the link between the master and the local slave •...
  • Page 371: Ptp Status

    User’s Manual [1..1000] see above ‘P’ constant [1..1000] see above • ‘I’ constant [1..1000] see above ‘D’ constant Unicast Slave Configuration Object Description • Duration The number of seconds a master is requested to send Announce/Sync messages. The request is repeated from the slave each Duration/4 seconds. IPv4 Address of the Master clock •...
  • Page 372 User’s Manual The Page includes the following fields: Object Description • Clock Instance Indicates the Instance of a particular Clock Instance [0..3]. Click on the Clock Instance number to monitor the Clock details. Indicates the Type of the Clock Instance. There are five Device Types. •...
  • Page 373: Ring

    User’s Manual 4.20 Ring ITU-T G.8032 Ethernet Ring protection switching (ERPS) is a link layer protocol applied on Ethernet loop protection to provide sub-50ms protection and recovery switching for Ethernet traffic in a ring topology. ERPS provides a faster redundant recovery than Spanning Tree topology. The action is similar to STP or RSTP, but the algorithms between them are not the same.
  • Page 374: Mep Configuration

    User’s Manual 4.20.1 MEP Configuration The Maintenance Entity Point instances are configured here; screen in Figure 4-20-1 appears. Figure 4-20-1: MEP configuration page screenshot The page includes the following fields: Object Description This box is used to mark a MEP for deletion in next Save operation. •...
  • Page 375: Detailed Mep Configuration

    User’s Manual Buttons : Click to add a new MEP entry : Click to refresh the page immediately. : Click to save changes. Click to undo any changes made locally and revert to previously saved values. 4.20.2 Detailed MEP Configuration This page allows the user to inspect and configure the current MEP Instance.;...
  • Page 376 User’s Manual • Tagged VID See help on MEP create WEB. See help on MEP create WEB. • This MAC Instance Configuration: Object Description See help on MEP create WEB. • Level • Format This is the configuration of the two possible Maintenance Association Identifier formats.
  • Page 377 User’s Manual peer MEP. Fault Cause indicating that a CCM is received with Remote Defect Indication - • cRDI from this peer MEP. • cPeriod Fault Cause indicating that a CCM is received with a period different what is configured for this MEP - from this peer MEP. •...
  • Page 378: Ethernet Ring Protocol Switch

    User’s Manual APS Protocol: Object Description • Enable Automatic Protection Switching protocol information transportation based on transmitting/receiving R-APS/L-APS PDU can be enabled/disabled. Must be enabled to support ERPS/ELPS implementing APS. This is only valid with one Peer MEP configured. • Priority The priority to be inserted as PCP bits in TAG (if any).
  • Page 379 User’s Manual The page includes the following fields: Object Description • Delete This box is used to mark an ERPS for deletion in next Save operation. • Port 0 This will create a Port 0 of the switch in the ring. This will create "Port 1"...
  • Page 380: Ethernet Ring Protocol Switch Configuration

    User’s Manual 4.20.4 Ethernet Ring Protocol Switch Configuration This page allows the user to inspect and configure the current ERPS Instance; screen in Figure 4-20-4 appears. Figure 4-20-4: Ethernet Ring Protocol Switch Configuration page screenshot The page includes the following fields: Instance Data: Object Description...
  • Page 381 User’s Manual Instance Configuration: Object Description • Configuration Red: This ERPS is only created and has not yet been configured - is not active. Green: This ERPS is configured - is active. Guard timeout value to be used to prevent ring nodes from receiving outdated •...
  • Page 382 User’s Manual Instance Command: Object Description • Command Administrative command. A port can be administratively configured to be in either manual switch or forced switch state. Port selection - Port0 or Port1 of the protection Group on which the command is •...
  • Page 383: Ring Wizard

    User’s Manual 4.20.5 Ring Wizard This page allows the user to configure the ERPS by wizard; screen in Figure 4-20-4 appears. Figure 4-20-5: Ring Wizard page screenshot The page includes the following fields: Object Description • All Switch Numbers Set all the switch numbers for the ring group. The default number is 3 and maximum number is 30.
  • Page 384: Ring Wizard Example

    User’s Manual 4.20.6 Ring Wizard Example: Figure 4-20-6: Ring Example Diagram The above topology often occurs on using ERPS protocol. The multi switch constitutes a single ERPS ring; all of the switches only are configured as an ERPS in VLAN 3001, thereby constituting a single MRPP ring. Switch ID Port MEP ID...
  • Page 385 User’s Manual Setup steps Set ERPS Configuration on Switch 1 Connect PC to switch 1 directly; don’t connect to port 1 & 2 Logging on the Switch 1 and click “Ring > Ring Wizard” Set “All Switch Number” = 3 and “Number ID” = 1; click “Next” button to set the ERPS configuration for Switch 1. Set “MEP1”...
  • Page 386 User’s Manual Set “MEP5” = Port2, “MEP6” = Port1 and VLAN ID = 3001; click “Set” button to save the ERPS configuration for Switch 3. To avoid loop, please don’t connect switch 1, 2 & 3 together in the ring topology before configuring the end of ERPS .
  • Page 387: Switch Operation

    User’s Manual 5. SWITCH OPERATION 5.1 Address Table The Industrial Managed Switch is implemented with an address table. This address table composed of many entries. Each entry is used to store the address information of some node in network, including MAC address, port no, etc. This in-formation comes from the learning process of Industrial Managed Switch.
  • Page 388: Auto-Negotiation

    User’s Manual 5.5 Auto-Negotiation The STP ports on the Switch have built-in "Auto-negotiation". This technology automatically sets the best possible bandwidth when a connection is established with another network device (usually at Power On or Reset). This is done by detect the modes and speeds at the second of both device is connected and capable of, both 10BASE-T and 100BASE-TX devices can connect with the port in either Half- or Full-Duplex mode.
  • Page 389: Troubleshooting

    User’s Manual of IGS-20040MT 6. TROUBLESHOOTING This chapter contains information to help you solve issues. If the Industrial Managed Switch is not functioning properly, make sure the Industrial Managed Switch was set up according to instructions in this manual. ■ The Link LED is not lit Solution: Check the cable connection and remove duplex mode of the Industrial Managed Switch ■...
  • Page 390: Appendix A: Networking Connection

    User’s Manual of IGS-20040MT APPENDIX A: Networking Connection A.1 Switch's Data RJ45 Pin Assignments - 1000Mbps, 1000BASE-T PIN NO MDI-X BI_DA+ BI_DB+ BI_DA- BI_DB- BI_DB+ BI_DA+ BI_DC+ BI_DD+ BI_DC- BI_DD- BI_DB- BI_DA- BI_DD+ BI_DC+ BI_DD- BI_DC- Implicit implementation of the crossover function within a twisted-pair cable, or at a wiring panel, while not expressly forbidden, is beyond the scope of this standard.
  • Page 391 User’s Manual of IGS-20040MT The standard cable, RJ45 pin assignment The standard RJ45 receptacle/connector There are 8 wires on a standard UTP/STP cable and each wire is color-coded. The following shows the pin allocation and color of straight cable and crossover cable connection: Straight Cable SIDE 1 SIDE 2...
  • Page 392: Appendix B : Glossary

    User’s Manual APPENDIX B : GLOSSARY ACE is an acronym for Access Control Entry. It describes access permission associated with a particular ACE ID. There are three ACE frame types (Ethernet Type, ARP, and IPv4) and two ACE actions (permit and deny). The ACE also contains many detailed, different parameter options that are available for individual application.
  • Page 393 User’s Manual ranging from 1-1024K packets per seconds. Under "Ports" and "Access Control List" web-pages you can assign a Rate Limiter ID to the ACE(s) or ingress port(s). AES is an acronym for Advanced Encryption Standard. The encryption key protocol is applied in 802.1i standard to improve WLAN security.
  • Page 394 User’s Manual CC is an acronym for Continuity Check. It is a MEP functionality that is able to detect loss of continuity in a network by transmitting CCM frames to a peer MEP. CCM is an acronym for Continuity Check Message. It is a OAM frame transmitted from a MEP to it's peer MEP and used to implement CC functionality.
  • Page 395 User’s Manual Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather than requiring an administrator to manage the task. This means that a new computer can be added to a network without the hassle of manually assigning it a unique IP address. DHCP Relay DHCP Relay is used to forward and to transfer DHCP messages between the clients and the server when they are not on the same subnet domain.
  • Page 396 User’s Manual DSCP DSCP is an acronym for Differentiated Services Code Point. It is a field in the header of IP packets for packet classification purposes. EEE is an abbreviation for Energy Efficient Ethernet defined in IEEE 802.3az. EPS is an abbreviation for Ethernet Protection Switching defined in ITU/T G.8031. Ethernet Type Ethernet Type, or EtherType, is a field in the Ethernet MAC header, defined by the Ethernet networking standard.
  • Page 397 User’s Manual connection to a particular port on a remote host (port 80 by default). An HTTP server listening on that port waits for the client to send a request message. HTTPS HTTPS is an acronym for Hypertext Transfer Protocol over Secure Socket Layer. It is used to indicate a secure HTTP connection.
  • Page 398 User’s Manual IMAP IMAP is an acronym for Internet Message Access Protocol. It is a protocol for email clients to retrieve email messages from a mail server. IMAP is the protocol that IMAP clients use to communicate with the servers, and SMTP is the protocol used to transport mail to an IMAP server.
  • Page 399 User’s Manual LACP LACP is an IEEE 802.3ad standard protocol. The Link Aggregation Control Protocol, allows bundling several physical ports together to form a single logical port. LLDP LLDP is an IEEE 802.1ab standard protocol. The Link Layer Discovery Protocol(LLDP) specified in this standard allows stations attached to an IEEE 802 LAN to advertise, to other stations attached to the same IEEE 802 LAN, the major capabilities provided by the system incorporating that station, the management address or addresses of the entity or entities that provide management of those capabilities, and the identification of the stations point of attachment to the IEEE 802 LAN required by those...
  • Page 400 User’s Manual MD5 is an acronym for Message-Digest algorithm 5. MD5 is a message digest algorithm, used cryptographic hash function with a 128-bit hash value. It was designed by Ron Rivest in 1991. MD5 is officially defined in RFC 1321 - The MD5 Message-Digest Algorithm.
  • Page 401 User’s Manual NFS is an acronym for Network File System. It allows hosts to mount partitions on a remote system and use them as though they are local file systems. NFS allows the system administrator to store resources in a central location on the network, providing authorized users continuous access to them, which means NFS supports sharing of files, printers, and other resources as persistent storage over a computer network.
  • Page 402 User’s Manual PD is an acronym for Powered Device. In a PoE> system the power is delivered from a PSE ( power sourcing equipment ) to a remote device. The remote device is called a PD. PHY is an abbreviation for Physical Interface Transceiver and is the device that implement the Ethernet physical layer (IEEE-802.3).
  • Page 403 User’s Manual Ethernet networks (Wikipedia). Private VLAN In a private VLAN, communication between ports in that private VLAN is not permitted. A VLAN can be configured as a private VLAN. PTP is an acronym for Precision Time Protocol, a network protocol for synchronizing the clocks of computer systems. QCE is an acronym for QoS Control Entry.
  • Page 404 User’s Manual class. There is a one to one mapping between QoS class, queue and priority. A QoS class of 0 (zero) has the lowest priority. RARP RARP is an acronym for Reverse Address Resolution Protocol. It is a protocol that is used to obtain an IP address for a given hardware address, such as an Ethernet address.
  • Page 405 User’s Manual SHA is an acronym for Secure Hash Algorithm. It designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. Hash algorithms compute a fixed-length digital representation (known as a message digest) of an input data sequence (the message) of any length. Shaper A shaper can limit the bandwidth of transmitted frames.
  • Page 406 User’s Manual strong authentication or guarantee confidentiality (Wikipedia). SSM In SyncE this is an abbreviation for Synchronization Status Message and is containing a QL indication. Spanning Tree Protocol is an OSI layer-2 protocol which ensures a loop free topology for any bridged LAN. The original STP protocol is now obsoleted by RSTP.
  • Page 407 User’s Manual TELNET enables the client to control the server and communicate with other servers on the network. To start a Telnet session, the client user must log in to a server by entering a valid username and password. Then, the client user can enter commands through the Telnet program just as if they were entering commands directly on the server console.
  • Page 408 User’s Manual UPnP UPnP is an acronym for Universal Plug and Play. The goals of UPnP are to allow devices to connect seamlessly and to simplify the implementation of networks in the home (data sharing, communications, and entertainment) and in corporate environments for simplified installation of computer components User Priority User Priority is a 3-bit field storing the priority level for the 802.1Q frame.
  • Page 409 User’s Manual Wi-Fi Wi-Fi is an acronym for Wireless Fidelity. It is meant to be used generically when referring of any type of 802.11 network, whether 802.11b, 802.11a, dual-band, etc. The term is promulgated by the Wi-Fi Alliance. WPA is an acronym for Wi-Fi Protected Access. It was created in response to several serious weaknesses researchers had found in the previous system , Wired Equivalent Privacy (WEP).

This manual is also suitable for:

Igs-10080mftIgs-12040mtIgs-20040mtIgs-20160hpt

Table of Contents