Advertisement

Quick Links

InSwitch Industrial Ethernet Switch
ISM Series User's Manual
V4.4
InHand Networks

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the InSwitch ISM Series and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for InHand InSwitch ISM Series

  • Page 1 InSwitch Industrial Ethernet Switch ISM Series User’s Manual V4.4 InHand Networks...
  • Page 2: Table Of Contents

    Contents ISM INTRODUCTION ........................5 ..........................5 ......................... 5 RODUCT EATURES 2 ACCESS INSWITCH ..........................6 ..................... 7 XPLORER ONFIGURATION ....................10 ERIAL ONFIGURATION ......................13 ELNET ONFIGURATION SSH C ......................15 ONFIGURATION 3 WEB CONFIGURATION ........................17 ........................17 DMINISTRATION 3.1.1 System ..........................
  • Page 3 3.4.2 G.8032v2 ERPS ........................48 3.4.3 iRing Ethernet Ring Network Protection ................51 ..........................53 ECURITY 3.5.1 Display Port Security ......................53 3.5.2 Port Security ........................54 S ............................54 3.6.1 Priority to Queue Mapping ....................55 3.6.2 DSCP to Queue Mapping ....................55 3.6.3 Port QoS ..........................
  • Page 4 ........................70 ONFIGURE ..........................71 ORT MODE VLAN M ......................... 72 ................73 NSTANCE ONFIGURATION APPENDIX 2 RING NETWORK CONFIGURATION EXAMPLE ............. 75 1: C ......................75 ONFIGURE 2: C ....................76 ONFIGURE ING INSTANCE 3: C ..................... 77 ONNECT ETWORK ........................
  • Page 5: Ism Introduction

    1 ISM Introduction 1.1 OverView Welcome to use InHand Industrial Ethernet Switch (For Short InSwitch) series product. ISM series switches provide a robust, easy to use and secure switching infrastructure for harsh environments. InSwitch series of industrial design, in line with industry norms;...
  • Page 6: Access Inswitch

    measure of security. InSwitch support port-based VLAN, IEEE 802.1q and GVRP protocol to exchange information in order to ensure consistency of network VLAN.  Simple Network Management Protocol(SNMP), allowed integrated management SNMP provides a standard way for network management, it can query different vendors’...
  • Page 7: Web Explorer Configuration

    serial port configuration by using serial port line to connect InSwitch and PC’s COM port. In addition, telnet and web explorer are based on LAN or Internet. This chapter mainly includes the flowing parts:  Web Explore Configuration  Serial Port Configuration ...
  • Page 8 Choose “Internet Protocol (TCP/IP)”, click “properties” button, set your PC in the subnet: 192.168.2.0/24, for example, set IP: 192.168.2.10, Net Mask: 255.255.255.0, Default Gateway: 192.168.2.2 Click “OK”. After configure TCP/IP protocols, you can use ping command to check whether the link between PC and Router is built correctly.
  • Page 9 If the screen shows: Then the link between the PC and Router is correct connected. Else if it shows: Then the connection seems not build, and you need to check thoroughly following the former instructions. After finishing the configuration above, you could set your InSwitch: Open IE browser, input the default IP address of the Switch: http://192.168.2.2, you can see the login web below:...
  • Page 10: Serial Port Configuration

    Input “username”(default: adm) and the “password” (default: 123456), and then click “login” to enter the operation screen. 2.2 Serial Port Configuration Before using Serial Port to login InSwitch, please connect InSwitch’s RS-232 console port to PC’s COM port through serial port line. Please refer to the following steps and set Windows XP hyper terminal to login serial port console.
  • Page 11 3) Choose COM port which is used in connecting Switch, then click “OK”. (The COM port number is up to your computer’s system setting.) 4) Set connection value, then click “OK”.
  • Page 12 Bits per second: 115200 baud rate as default Data bit: 8 bits as default Parity check: none as default Stop bit: 1 bit as default Data flow control: none as default 5) Input username and password in the hyper terminal window. The default username and password of InSwitch are adm/123456.
  • Page 13: Telnet Configuration

    2.3 Telnet Configuration Please follow steps as below: 1) Click “Start” -> “Run”, then input InSwitch IP address that you want to connect. You could also input telnet command in MS-DOS.
  • Page 14 2) After enter command prompt, input username and password (adm/123456 as default) to login InSwitch telnet console interface.
  • Page 15: Ssh Configuration

    2.4 SSH Configuration Please follow steps as below: 1) Login the Switch through Web Explorer, for example IE browser. Then enable SSH server function (refer to configure SSH server). 2) Using SSH Client to login Switch. Take PuTTY as example (PuTTY is a remote tools for free, it supports Telnet, SSH, rlogin protocols, in this case we will take Release 0.61 version).
  • Page 16 After setting, click “Open”, you will see the dialog box as below, input username and password (adm/123456 as default). Then, you will enter Switch console interface.
  • Page 17: Web Configuration

    3 Web Configuration 3.1 Administration This chapter introduce system management, Administration settings include the 10 settings: system, networks, system time, admin access, config management, SNMP, alarm, log, upgrade, reboot。 3.1.1 System In the “System Status” web, you can check system’s basic information and running status information.
  • Page 18: Networks

    version Switch time Switch system time none Host time Visit host system time through web none interface Start time Running time from start to current none CPU load (1/5/15 CPU average load none minutes) Memory gross/remaining Switch gross memory and remaining none memory 3.1.1.2...
  • Page 19 3.1.2.1 Configure Networks Click “management->networks” in the navigation bar, then enter “networks interface”. Page information description is as shown in the following table. Name Description Default IP address Switch IP address 192.168.2.2 Subnet Mask Switch subnet mask 255.255.255.0 Gateway Default gateway None DNS server’s IP address, you can none...
  • Page 20: System Time

    Page information description is as shown in the following table. Name Description Default SSH status Enable or disable SSH server Disable Code mode Set PKI encryption mode(only support RSA) Length o f key Set length of key, it could be 512 or None 1024 overtime...
  • Page 21: Sntp Client

    Page information description is as shown in the following table. Name Description Default Switch time Switch system time none Visit switch’s host system time Host time none through web interface Year/Month/Day Year, Month, Day part of time Current year, month, day Hour:Minute:Second Hour, Minute, second part of time Current hour, minute,...
  • Page 22: Admin Access

    Attention Before setting SNTP Server, please ensure SNTP server could be accessed. Especially, when SNTP server’s IP is domain name, please ensure that you have already configured correct DNS server. Instruction When setting multiple SNTP server, system will poll all the SNTP server, until find available SNTP server.
  • Page 23 User summary List of current users none 3.1.4.2 Modify a User Click “management->admin access” in the navigation bar, enter “modify a user” interface. Page information description is as shown in the following table. Name Description Default New user’s username Username none New password New user;s login password...
  • Page 24: Configuration Management

    Page information description is as shown in the following table. Name Description Default User summary List current system users none Instruction Attention: super user’s username “adm” could not be modified or removed. 3.1.5 Configuration management Click “management->config management” in the navigation bar, enter “config management”.
  • Page 25: Snmp

    Backup startup-config Backup startup-config to PC none Auto save after modify the Decide whether or not to save enable configuration configuration automatically after modifying configuration. Restore default Restore Startup-config to default none configuration configuration Attention When import the configuration, the system will filter incorrect configuration files, and save the correct configuration files, when system restarts, it will orderly execute theses configuration files.
  • Page 26: Configure Snmp

     NMS (Network Management Station) is a station which runs client procedure.  Agent is service software which is running in device  The purpose of NMS and Agent is as followed:  NMS can send getRequest, getNextRequest, setRequest packets to Agent, when the Agent receive these packets, it will execute read or write operations according to the type of packet and create Response packet back to NMS.
  • Page 27 Access authority Choose access authority MIB view Choose MIB view Default view After choosing SNMPv3, you need to configure users and user group: Page information description is as shown in the following table. Name Description Default Group name Input group name, length:1-32 none...
  • Page 28: Alarm

    Authentication password Input password none Encryption Whether encryption mode Encryption password Input password when the mode of none encryption is not “no encryption”. Length: 8-32 character Group name Add user to their group. none 3.1.6.2 Configure SNMP Trap Click “management->SNMP” in the navigation bar, then enter “SNMP Trap” interface.
  • Page 29: Alarm Status

    choose the appropriate notice way to inform what happened. All alarms will be recorded in the alert log for users. According to the type of alarm, it can be divided system alarm and port alarm.  System Alarm: It produces because of system or environment happened to some exception, divided into temperature, hot start, cold start, power failure, power recovery, insufficient memory.
  • Page 30: Alarm Input

    Page information description is as shown in the following table. Name Description Default Generated by system none Status Current alarm status none Type Current alarm type none Level Current alarm level none date The time of generated alarm none System Time The time from startup to alarm none Content...
  • Page 31: Alarm Output

    Page information description is as shown in the following table. Name Description Default Temperature On/Off Temperature exceeding alarm Off、 Upper Limit Temperature upper limit none Lower Limit Temperature lower limit none Warm Start On/Off warm start alarm Cold Start On/Off cold start alarm Power Down On/Off power down alarm Power Up...
  • Page 32 Page information description is as shown in the following table. Name Description Default Enable Relay Alarm Enable/disable relay alarm disable Enable Email Alarm Enable/disable Email alarm disable Mail Server IP/Name Set mail server IP address none Mail Server Port Set mail server port Account Name Set email address which system sent none...
  • Page 33: System Log

    3.1.8 System Log Through “System log” interface, you can see important log since the start of switch. It easy to understand system status and will help solve problem in time. Through “System log” interface, you can set up remote log server, switch will take all system log files to upload remote server, which requires remote log software (such Kiwi Syslog Daemon).
  • Page 34 3.1.8.2 System Log Click “Administration->system log” in the navigation bar, then enter “system log” interface. Page information description is as shown in the following table. Name Description Default Log to remote system On/Off remote log function disabled IP Address/Port(UDP) Set remote server IP/port none 3.1.8.3 Kiwi Syslog Daemon...
  • Page 35: System Upgrade

    host). After download and install Kiwi Syslog Daemon, configure necessary parameters on the configuration page of File->Setup->Input->UDP. 3.1.9 System Upgrade Click “Administration->system upgrade” in the navigation bar, then enter “system upgrade” interface. Click on “browser” button and select upgrade file, then click “upgrade” start to upgrade. The process will be lasted around 1 minute, after finishing, reboot switch.
  • Page 36: Port Status

    3.2.1.1 Port Status Click “Ports->Ports” in the navigation bar, then enter “Port Status” interface. This page displays port status, includes port number, link status, current speed, current duplex. 3.2.1.2 Configure Port Basic Parameters Click “Ports->Ports” in the navigation bar, then enter “Port Basic Parameters”. Page information description is as shown in the following table.
  • Page 37 3.2.1.3 Port Advanced Parameters Click “Ports->Ports” in the navigation bar, then enter “Port Advanced Parameters” interface. Page information description is as shown in the following table. Name Description Default Enable monitor Enable or Disable Disable Destination port Mapping destination port none Source port parameter Appointed...
  • Page 38 Broadcast rate(kbps) Desigate broadcast flow rate limit, range is 64-1000000 none Infow rate(kbps) Infow rate limit, range<64-1000000> none Excessive treament When inflow rate over the limit, the treatment can be: drop Drop, Flow-control, Outflow rate (kbps) Outflow limit,range<64-1000000> none Block unknown packets Blocking unknown packets.
  • Page 39: Ethernet Statistics

    Page information description is as shown in the following table. Name Description Default Enable monitor Enable or Disable Disable Destination port Mapping destination port none Source port parameter Appointed mapping port none mapping direction, mapping direction could choose: none, ingress, egress, both 3.2.2 Ethernet Statistics 3.2.2.1...
  • Page 40: Rmon Statistics

    3.2.2.3 RMON Statistics Click “Ports->Ethernet Statistics” in the navigation bar, then enter “RMON Statistics” interface. Page information description is as shown in the following table. Name Description Default Index Input index number, range from none 1-65534 Port Input port number FE1/1 Input owner’s name Owner...
  • Page 41: Rmon Alarms

    Page information description is as shown in the following table. Name Description Default Index Input index number, range from None 1-65535 Port Choose port FE1/1 Requested Buckets Management station expected None sampling gross Granted Buckets Device saved sampling gross None Interval Sampling time(second) None...
  • Page 42: Rmon Events

    Page information description is as shown in the following table. Name Description Default Index Input index number, range from None 1-65535 Alarm Object Choose the monitored RMON-MIB DropEvents object Statistics Index Choose statistics index None Rising Thr Input sampling statistics rising thr None Falling Thr Input sampling statistics falling thr...
  • Page 43: Link Aggregation

    Page information description is as shown in the following table. Name Description Default Index Input index number, range from None 1-65535 Type Choose the type of triggered events: None log, trap, log-trap, none Trap’s group name(only for type Community None log-trap and trap) Last Time Sent Record...
  • Page 44: Virtual Lans

    Page information description is as shown in the following table. Name Description Default Policy Load balancing strategy, you could sada choose: sada or hash. Trunk port Appointed trunk member None 3.3 Virtual LANs VLAN can be flexible on the physical network into logical. It cannot communicate directly between different VLAN, which to some extent, to ensure data and information security.
  • Page 45: Vlan Summary

    3.3.1 VLAN Summary Click “Virtual LANs->Static Virtual LANs” in the navigation bar, then enter “VLAN Summary” interface. 3.3.2 Configure VLAN Parameters Click “Virtual LANs->Static Virtual LANs” in the navigation bar, then enter “Configure VLAN Parameters” interface. For example, VLAN ID is 2, name is test, FE1/1 and FE1/2 is untagged member, FE1/3 is tagged member.
  • Page 46: Rstp

    applications. IEEE 802.1D Rapid Spanning Tree Protocol and ITU-T G8032 ring protection technology are the latest technology. 3.4.1 RSTP The main role of the RSTP includes two aspects: first, by blocking the link to eliminate redundant network paths that may exist in loop; second, the current active path fails, the link activate redundant backup and restore network connectivity, enabling backup links.
  • Page 47 3.4.1.3 Configure RSTP Parameters Click “Redundancy RSTP” in the navigation bar, then enter “Configure RSTP Parameters”. Page information description is as shown in the following table. Name Description Default Enable RSTP Enable or disable RSTP enable Bridge Priority Set RSTP bridge priority, range from 32768 0-61440 Hello Time...
  • Page 48: G.8032V2 Erps

    Name Description Default Enable RSTP Enable or disable RSTP Disable Port Priority Set RSTP port priority, range from 0-240 Spanning-tree Cost Set RSTP port route, range from Auto 1-200000000 or auto Edge Port Set value of edge port, yes means force configured edge port, no means auto Point-to-Point...
  • Page 49 was found out, backup link will be enabled and achieve rapid recovery. In the protection of technology, rapid spanning tree technology has been widely used. RSTP will occupy the port resources, however, the recovery time of RSTP is in the second level and cannot meet the demanding real-time in the industrial applications.
  • Page 50 “Ring Instance” page is as shown in the following Page information description is as shown in the following table. Name Description Default Instance ID Set ring instance, range from 1-10 None Ring Type Set ring type, including major ring, None sub-ring without V-chan, sub-ring with V-chan.
  • Page 51: Iring Ethernet Ring Network Protection

    Disable 3.4.3 iRing Ethernet Ring Network Protection iRing Ethernet ring protection protocol is private ring protocol developed by inhand. IRing Ethernet ring protection protocol define node role on the loop, and use VLAN control transmission protocol message to protect loop, make the loop quickly switch when fauls happen, switch time less than 50ms.
  • Page 52 3.4.3.1 Configure iRing Click “Redundancy->iRing” in the navigation bar, then enter “iRing configuration” interface. Name Description Default Enable iRing whether to enable iRing protocol Primary Port designate the main prot FE1/7 Secondary Port designate the secondary prot FE1/8 Priority Switch differentiate the primary or secondary port according to the...
  • Page 53: Security

    priority.The port which have minimum MAC address or lowest priority will become the primary port Attention The default primary and secondary port are different for different switch model. The default primary and secondary port are shown as following table. InSwitch Model Primary Port Secondary Port InSwitch 2008D...
  • Page 54: Port Security

    3.5.2 Port Security Click “Security->Port Security” in the navigation bar, then enter “Port Security” interface. You can click each port line to configure port security characteristic. Page information description is as shown in the following table. Name Description Default Enable Port Security Enable or disable Disable Max Secure MAC...
  • Page 55: Priority To Queue Mapping

    support four service levels, according t data frame reception port, Tag priority and IP priority level to determine service level. 3.6.1 Priority to Queue Mapping Click “QoS->QoS” in the navigation bar, then enter “Priority to Queue Mapping” interface. Name Description Default Priority IEEE Tag Priority...
  • Page 56: Port Qos

    Name Description Default DSCP IP priority, range from<0-63> None Queue Service level, range from<0-3>. Default mapping: Priority 0-15 Queue 0 Priority 16-31  Queue 1 Priority 32-47  Queue 2 Priority 48-63  Queue 3 3.6.3 Port QoS Click “QoS->QoS” in the navigation bar, then enter “Port QoS” interface. Name Description Default...
  • Page 57: Multicast Filtering

    choose: Queue 3:2:1:0 should Wrr(Weighted rotation strategy) match weight 8:4:2:1 Sp(Strict priority policy) Priority Override Change data frame tag priority Disable according to information below: Destination MAC, source MAC, VLAN ID Priority Remap Data frame original tag priority was No change mapped new tag priority.
  • Page 58: Multicast Group Summary

    3.7.2 Multicast Group Summary Click “Multicast Filtering-> Multicast Filtering” in the navigation bar, then enter “IP Multicast Group” interface. In the table, you will see multicast group summary of dynamic configuration, including VLAN ID, MAC address, static port. 3.7.3 IGMP Parameters Click “Multicast Filtering->...
  • Page 59: Configure Static Multicast Groups

    Name Description Default MAC address Input MAC address that match with None IGMP multicast group VLAN ID Choose multicast group VLAN None Choose IGMP multicast group’s static Port None member port 3.7.4 Configure Static Multicast Groups Click “Multicast Filtering-> Multicast Filtering” in the navigation bar, then enter “IP Multicast Group”...
  • Page 60: Configure Static Mac

    Name Description Default MAC address Input MAC address that match with None IGMP multicast group VLAN ID Choose multicast group VLAN None Priority Choose priority of static multicast group address lis Choose IGMP multicast group’s static Port None member port 3.8 MAC Address Tables MAC Address list features: ...
  • Page 61: Configure Dynamic Mac

    address Priority Input priority matched with MAC address 3.8.2 Configure Dynamic MAC Click “MAC Address Tables-> MAC Address Tables ” in the navigation bar, then enter “Configure Dynamic MAC” interface. Name Description Default Remove dynamic MAC Choose removed dynamic MAC None address address...
  • Page 62: Lldp Neighbor Information

    Global Remote Statistics” interface. This page displays the LLDP global remote statistics network discovery, including overtime frame, insert frame, discard frame,and delete frames. 3.9.2 LLDP Neighbor Information Click “Network Discovery-> LLDP” in the navigation bar, then enter “LLDP Neighbor Information” interface. This page displays the network discovery LLDP neighbor information, including port, classis ID, port ID, port description, system name, system description, type of equipment, management address.
  • Page 63: Lldp

    This page displays the LLDP statistical, including the various ports of the discarded frames, receive error frame, received frame, send frame, frame, receive timeout receive frame and receive TLV frame discard 3.9.4 LLDP Click “Network Discovery-> LLDP” in the navigation bar, then enter “LLDP ” interface.
  • Page 64: Dhcp Batch Configuration

    3.10 DHCP Batch Configuration Automatically batch configuring switches via DHCP and TFTP can save time and lower labor cost, making management and maintenance much easier. It also avoids manual configuration errors caused by improper operation, avoid repetitive work and ensure configuration consistency. DHCP refers to an IP address range controlled by server.
  • Page 65: Dhcp Batch Configuration Preparation

    3.10.1 DHCP Batch Configuration Preparation 1) Enable TFTP Server. Prepare switch configuration files and save effective configuration files under TFTP directory. 2) Enable DHCP Server. Configure DHCP parameters related to TFTP Server, sharing the IP address of TFTP Server where configuration files are saved and the name of configuration files (.cnf);...
  • Page 66  When DHCP client have been enabled, if you also enable “Enable Config via DHCP Server”, the DHCP client will reboot.  When DHCP client haven’t been enabled, if you enable “Enable Config via DHCP Server”, DHCP client will be enabled automatically. ...
  • Page 67: Usb Configuration Auto - Backup And Restore By Usb Disc

    3.11 USB Configuration auto- Backup and Restore by USB Disc When the switch needs to be replaced due to failure, you can back up the configuration file from the faulty switch with a USB disk. USB disk can be used to backup and automatically synchronize the configuration file of the switch.
  • Page 68: Appendix 1 Introduction To Cli Command

    Appendix 1 Introduction to CLI Command 1 Help After entering CLI, input “help”, you can know more about help information user guide. ****************************************************************************** 11:06:35 InSwitch > help Input interrogation mark “?”, you can check help information at any point of command. If it does not match successfully, then the help list is empty.
  • Page 69: Privileged Mode

    3 Privileged Mode With user mode, input “enable ”, you will enter privileged mode, input “?”, it will show the executable command. ******************************************************************************* 11:20:07 InSwitch>enable Please input password: 11:20:09 InSwitch# Executable command: command Description Configure Enter configure mode Copy Copy files Default Recover appointed parameter as default Disable...
  • Page 70: Configure Mode

    4 Configure Mode With privileged mode, input “configure terminal”, enter configure mode, then input “?”, it will show executable command. *************************************************************************** 11:21:10 InSwitch# configure terminal 11:21:11 InSwitch config# command Description Alarm Set warn Clear Clear information or configuration Clock Set system time Copy Copy files Crypto...
  • Page 71: Port Mode

    monitor Port moniter Cancel setting of appointed parameter password Set password ping Ping detection port-channel TRUNK setting reboot Reboot system rmon Remote moniter relay Set relay parameter show Show running status snmp-server Modify SNMP parameter sntp-client Set network time server spanning-tree Spanning-tree protocol telnet...
  • Page 72: Vlan Mode

    Link connection detect channel-group Ethernet connection pond setting default Recover appointed parameter as default description Add interface description discard Import frame discard duplex Setting duplex-mode exit Quit view/control Flow-control Flow control help Get help command lacp LACP port configuration learn MAC address learning lldp Setting LLDP...
  • Page 73: Ring Instance Configuration Mode

    11:25:05 InSwitch config# vlan 100 11:25:06 InSwitch-vlan-100# VLAN configuration command: command Description default Recover appointed parameter as default exit Quit view/control help Get help command Iec61850 IEC 61850 member Setting VLAN member name Add VLAN name Cancel setting appointed parameter priority Setting VLAN priority show...
  • Page 74 node-type Set node type port Set ring network port ring-type Set ring type show Show running status service-vlan Set ring netword data vlan 11:29:07 InSwitch-InRing-10# *************************************************************** Attention: After one ring instance worked, the instance is running, it cannot enter configuration mode.
  • Page 75: Appendix 2 Ring Network Configuration Example

    Appendix 2 Ring Network Configuration Example First, there are two data path in the ring network, including the data path of transmitted ring control message and data path of transmitted business data. As a result, before configuring ring, you need to establish data path, that is configured VLAN.
  • Page 76: Step 2: Configure Ring Instance

    Step 2: Configure Ring instance The 4 industrial Ethernet switch should be configured as node’s role. You need configure one switch with owner node, one switch with neighbor node and two switches with normal node. Take owner node as example, other nodes’ configuration are same like owner node.
  • Page 77: Step 3: Connect Ring Network

    5. Configure data VLAN, input VLAN that configured in step 1. Set data VLAN 1, 3, 4, 5, the number was separated by comma. 6. Configure left port. Choose one trillion optical port FE1/7 as left port. 7. Configure right port. Choose one trillion optical port FE1/8 as right port. 8.
  • Page 78: Appendix 3 Troubleshooting

    Appendix 3 Troubleshooting Methods Power indicator doesn’t light (1) Please check the power line if connected correctly. (2) Please check the power line plug is plugged in tight, no loose Port indicator doesn’t light (1) Please check if the cable and switch port connect tightly, there are no loose (2) Two cables are respectively inserted into the two port of the switch, if the two indicators that two Ethernet prots corresponding to light, that...
  • Page 79: Appendix 4 Glossary

    Appendix 4 Glossary Abbreviations Full Name Meaning 100Mbit/s baseband Ethernet standard, using the type 5 twisted 100Base-TX 100Base-TX pair to connect, can provide the maximumtransmission rate of 100Mbit/s 100Mbit/s baseband Ethernet standard, using the type 3/4/5 10Base-T 10Base-T twisted pair to connect, can provide the maximumtransmission rate of 10Mbit/s The Ping command is a diagnostic tool used to test the machineand other computers on the...
  • Page 80 Wide area network (Wide Area Network) is a data Wide Area communication network covering the geographic range is Network relatively wide, such as the Internet LAN (Local Area Network) generally refers to the internal Local Area network, such as the family network, small and medium-sized Network enterprise internal network etc.
  • Page 81: Support

    Support In case you have problems with the installation and use, please address them to us by e-mail: support@inhandnetworks.com. InHand Networks 3900 Jermantown Rd., Suite 150 Fairfax, VA 22030 T: +1-703-348-2988 F:+1-703-348-2988 info@inhandnetworks.com www.inhandnetworks.com...

Table of Contents