Contents ISM INTRODUCTION ........................5 ..........................5 ......................... 5 RODUCT EATURES 2 ACCESS INSWITCH ..........................6 ..................... 7 XPLORER ONFIGURATION ....................10 ERIAL ONFIGURATION ......................13 ELNET ONFIGURATION SSH C ......................15 ONFIGURATION 3 WEB CONFIGURATION ........................17 ........................17 DMINISTRATION 3.1.1 System ..........................
Page 3
3.4.2 G.8032v2 ERPS ........................48 3.4.3 iRing Ethernet Ring Network Protection ................51 ..........................53 ECURITY 3.5.1 Display Port Security ......................53 3.5.2 Port Security ........................54 S ............................54 3.6.1 Priority to Queue Mapping ....................55 3.6.2 DSCP to Queue Mapping ....................55 3.6.3 Port QoS ..........................
Page 4
........................70 ONFIGURE ..........................71 ORT MODE VLAN M ......................... 72 ................73 NSTANCE ONFIGURATION APPENDIX 2 RING NETWORK CONFIGURATION EXAMPLE ............. 75 1: C ......................75 ONFIGURE 2: C ....................76 ONFIGURE ING INSTANCE 3: C ..................... 77 ONNECT ETWORK ........................
1 ISM Introduction 1.1 OverView Welcome to use InHand Industrial Ethernet Switch (For Short InSwitch) series product. ISM series switches provide a robust, easy to use and secure switching infrastructure for harsh environments. InSwitch series of industrial design, in line with industry norms;...
measure of security. InSwitch support port-based VLAN, IEEE 802.1q and GVRP protocol to exchange information in order to ensure consistency of network VLAN. Simple Network Management Protocol(SNMP), allowed integrated management SNMP provides a standard way for network management, it can query different vendors’...
serial port configuration by using serial port line to connect InSwitch and PC’s COM port. In addition, telnet and web explorer are based on LAN or Internet. This chapter mainly includes the flowing parts: Web Explore Configuration Serial Port Configuration ...
Page 8
Choose “Internet Protocol (TCP/IP)”, click “properties” button, set your PC in the subnet: 192.168.2.0/24, for example, set IP: 192.168.2.10, Net Mask: 255.255.255.0, Default Gateway: 192.168.2.2 Click “OK”. After configure TCP/IP protocols, you can use ping command to check whether the link between PC and Router is built correctly.
Page 9
If the screen shows: Then the link between the PC and Router is correct connected. Else if it shows: Then the connection seems not build, and you need to check thoroughly following the former instructions. After finishing the configuration above, you could set your InSwitch: Open IE browser, input the default IP address of the Switch: http://192.168.2.2, you can see the login web below:...
Input “username”(default: adm) and the “password” (default: 123456), and then click “login” to enter the operation screen. 2.2 Serial Port Configuration Before using Serial Port to login InSwitch, please connect InSwitch’s RS-232 console port to PC’s COM port through serial port line. Please refer to the following steps and set Windows XP hyper terminal to login serial port console.
Page 11
3) Choose COM port which is used in connecting Switch, then click “OK”. (The COM port number is up to your computer’s system setting.) 4) Set connection value, then click “OK”.
Page 12
Bits per second: 115200 baud rate as default Data bit: 8 bits as default Parity check: none as default Stop bit: 1 bit as default Data flow control: none as default 5) Input username and password in the hyper terminal window. The default username and password of InSwitch are adm/123456.
2.3 Telnet Configuration Please follow steps as below: 1) Click “Start” -> “Run”, then input InSwitch IP address that you want to connect. You could also input telnet command in MS-DOS.
Page 14
2) After enter command prompt, input username and password (adm/123456 as default) to login InSwitch telnet console interface.
2.4 SSH Configuration Please follow steps as below: 1) Login the Switch through Web Explorer, for example IE browser. Then enable SSH server function (refer to configure SSH server). 2) Using SSH Client to login Switch. Take PuTTY as example (PuTTY is a remote tools for free, it supports Telnet, SSH, rlogin protocols, in this case we will take Release 0.61 version).
Page 16
After setting, click “Open”, you will see the dialog box as below, input username and password (adm/123456 as default). Then, you will enter Switch console interface.
3 Web Configuration 3.1 Administration This chapter introduce system management, Administration settings include the 10 settings: system, networks, system time, admin access, config management, SNMP, alarm, log, upgrade, reboot。 3.1.1 System In the “System Status” web, you can check system’s basic information and running status information.
version Switch time Switch system time none Host time Visit host system time through web none interface Start time Running time from start to current none CPU load (1/5/15 CPU average load none minutes) Memory gross/remaining Switch gross memory and remaining none memory 3.1.1.2...
Page 19
3.1.2.1 Configure Networks Click “management->networks” in the navigation bar, then enter “networks interface”. Page information description is as shown in the following table. Name Description Default IP address Switch IP address 192.168.2.2 Subnet Mask Switch subnet mask 255.255.255.0 Gateway Default gateway None DNS server’s IP address, you can none...
Page information description is as shown in the following table. Name Description Default SSH status Enable or disable SSH server Disable Code mode Set PKI encryption mode(only support RSA) Length o f key Set length of key, it could be 512 or None 1024 overtime...
Page information description is as shown in the following table. Name Description Default Switch time Switch system time none Visit switch’s host system time Host time none through web interface Year/Month/Day Year, Month, Day part of time Current year, month, day Hour:Minute:Second Hour, Minute, second part of time Current hour, minute,...
Attention Before setting SNTP Server, please ensure SNTP server could be accessed. Especially, when SNTP server’s IP is domain name, please ensure that you have already configured correct DNS server. Instruction When setting multiple SNTP server, system will poll all the SNTP server, until find available SNTP server.
Page 23
User summary List of current users none 3.1.4.2 Modify a User Click “management->admin access” in the navigation bar, enter “modify a user” interface. Page information description is as shown in the following table. Name Description Default New user’s username Username none New password New user;s login password...
Page information description is as shown in the following table. Name Description Default User summary List current system users none Instruction Attention: super user’s username “adm” could not be modified or removed. 3.1.5 Configuration management Click “management->config management” in the navigation bar, enter “config management”.
Backup startup-config Backup startup-config to PC none Auto save after modify the Decide whether or not to save enable configuration configuration automatically after modifying configuration. Restore default Restore Startup-config to default none configuration configuration Attention When import the configuration, the system will filter incorrect configuration files, and save the correct configuration files, when system restarts, it will orderly execute theses configuration files.
NMS (Network Management Station) is a station which runs client procedure. Agent is service software which is running in device The purpose of NMS and Agent is as followed: NMS can send getRequest, getNextRequest, setRequest packets to Agent, when the Agent receive these packets, it will execute read or write operations according to the type of packet and create Response packet back to NMS.
Page 27
Access authority Choose access authority MIB view Choose MIB view Default view After choosing SNMPv3, you need to configure users and user group: Page information description is as shown in the following table. Name Description Default Group name Input group name, length:1-32 none...
Authentication password Input password none Encryption Whether encryption mode Encryption password Input password when the mode of none encryption is not “no encryption”. Length: 8-32 character Group name Add user to their group. none 3.1.6.2 Configure SNMP Trap Click “management->SNMP” in the navigation bar, then enter “SNMP Trap” interface.
choose the appropriate notice way to inform what happened. All alarms will be recorded in the alert log for users. According to the type of alarm, it can be divided system alarm and port alarm. System Alarm: It produces because of system or environment happened to some exception, divided into temperature, hot start, cold start, power failure, power recovery, insufficient memory.
Page information description is as shown in the following table. Name Description Default Generated by system none Status Current alarm status none Type Current alarm type none Level Current alarm level none date The time of generated alarm none System Time The time from startup to alarm none Content...
Page information description is as shown in the following table. Name Description Default Temperature On/Off Temperature exceeding alarm Off、 Upper Limit Temperature upper limit none Lower Limit Temperature lower limit none Warm Start On/Off warm start alarm Cold Start On/Off cold start alarm Power Down On/Off power down alarm Power Up...
Page 32
Page information description is as shown in the following table. Name Description Default Enable Relay Alarm Enable/disable relay alarm disable Enable Email Alarm Enable/disable Email alarm disable Mail Server IP/Name Set mail server IP address none Mail Server Port Set mail server port Account Name Set email address which system sent none...
3.1.8 System Log Through “System log” interface, you can see important log since the start of switch. It easy to understand system status and will help solve problem in time. Through “System log” interface, you can set up remote log server, switch will take all system log files to upload remote server, which requires remote log software (such Kiwi Syslog Daemon).
Page 34
3.1.8.2 System Log Click “Administration->system log” in the navigation bar, then enter “system log” interface. Page information description is as shown in the following table. Name Description Default Log to remote system On/Off remote log function disabled IP Address/Port(UDP) Set remote server IP/port none 3.1.8.3 Kiwi Syslog Daemon...
host). After download and install Kiwi Syslog Daemon, configure necessary parameters on the configuration page of File->Setup->Input->UDP. 3.1.9 System Upgrade Click “Administration->system upgrade” in the navigation bar, then enter “system upgrade” interface. Click on “browser” button and select upgrade file, then click “upgrade” start to upgrade. The process will be lasted around 1 minute, after finishing, reboot switch.
3.2.1.1 Port Status Click “Ports->Ports” in the navigation bar, then enter “Port Status” interface. This page displays port status, includes port number, link status, current speed, current duplex. 3.2.1.2 Configure Port Basic Parameters Click “Ports->Ports” in the navigation bar, then enter “Port Basic Parameters”. Page information description is as shown in the following table.
Page 37
3.2.1.3 Port Advanced Parameters Click “Ports->Ports” in the navigation bar, then enter “Port Advanced Parameters” interface. Page information description is as shown in the following table. Name Description Default Enable monitor Enable or Disable Disable Destination port Mapping destination port none Source port parameter Appointed...
Page 38
Broadcast rate(kbps) Desigate broadcast flow rate limit, range is 64-1000000 none Infow rate(kbps) Infow rate limit, range<64-1000000> none Excessive treament When inflow rate over the limit, the treatment can be: drop Drop, Flow-control, Outflow rate (kbps) Outflow limit,range<64-1000000> none Block unknown packets Blocking unknown packets.
Page information description is as shown in the following table. Name Description Default Enable monitor Enable or Disable Disable Destination port Mapping destination port none Source port parameter Appointed mapping port none mapping direction, mapping direction could choose: none, ingress, egress, both 3.2.2 Ethernet Statistics 3.2.2.1...
3.2.2.3 RMON Statistics Click “Ports->Ethernet Statistics” in the navigation bar, then enter “RMON Statistics” interface. Page information description is as shown in the following table. Name Description Default Index Input index number, range from none 1-65534 Port Input port number FE1/1 Input owner’s name Owner...
Page information description is as shown in the following table. Name Description Default Index Input index number, range from None 1-65535 Port Choose port FE1/1 Requested Buckets Management station expected None sampling gross Granted Buckets Device saved sampling gross None Interval Sampling time(second) None...
Page information description is as shown in the following table. Name Description Default Index Input index number, range from None 1-65535 Alarm Object Choose the monitored RMON-MIB DropEvents object Statistics Index Choose statistics index None Rising Thr Input sampling statistics rising thr None Falling Thr Input sampling statistics falling thr...
Page information description is as shown in the following table. Name Description Default Index Input index number, range from None 1-65535 Type Choose the type of triggered events: None log, trap, log-trap, none Trap’s group name(only for type Community None log-trap and trap) Last Time Sent Record...
Page information description is as shown in the following table. Name Description Default Policy Load balancing strategy, you could sada choose: sada or hash. Trunk port Appointed trunk member None 3.3 Virtual LANs VLAN can be flexible on the physical network into logical. It cannot communicate directly between different VLAN, which to some extent, to ensure data and information security.
3.3.1 VLAN Summary Click “Virtual LANs->Static Virtual LANs” in the navigation bar, then enter “VLAN Summary” interface. 3.3.2 Configure VLAN Parameters Click “Virtual LANs->Static Virtual LANs” in the navigation bar, then enter “Configure VLAN Parameters” interface. For example, VLAN ID is 2, name is test, FE1/1 and FE1/2 is untagged member, FE1/3 is tagged member.
applications. IEEE 802.1D Rapid Spanning Tree Protocol and ITU-T G8032 ring protection technology are the latest technology. 3.4.1 RSTP The main role of the RSTP includes two aspects: first, by blocking the link to eliminate redundant network paths that may exist in loop; second, the current active path fails, the link activate redundant backup and restore network connectivity, enabling backup links.
Page 47
3.4.1.3 Configure RSTP Parameters Click “Redundancy RSTP” in the navigation bar, then enter “Configure RSTP Parameters”. Page information description is as shown in the following table. Name Description Default Enable RSTP Enable or disable RSTP enable Bridge Priority Set RSTP bridge priority, range from 32768 0-61440 Hello Time...
Name Description Default Enable RSTP Enable or disable RSTP Disable Port Priority Set RSTP port priority, range from 0-240 Spanning-tree Cost Set RSTP port route, range from Auto 1-200000000 or auto Edge Port Set value of edge port, yes means force configured edge port, no means auto Point-to-Point...
Page 49
was found out, backup link will be enabled and achieve rapid recovery. In the protection of technology, rapid spanning tree technology has been widely used. RSTP will occupy the port resources, however, the recovery time of RSTP is in the second level and cannot meet the demanding real-time in the industrial applications.
Page 50
“Ring Instance” page is as shown in the following Page information description is as shown in the following table. Name Description Default Instance ID Set ring instance, range from 1-10 None Ring Type Set ring type, including major ring, None sub-ring without V-chan, sub-ring with V-chan.
Disable 3.4.3 iRing Ethernet Ring Network Protection iRing Ethernet ring protection protocol is private ring protocol developed by inhand. IRing Ethernet ring protection protocol define node role on the loop, and use VLAN control transmission protocol message to protect loop, make the loop quickly switch when fauls happen, switch time less than 50ms.
Page 52
3.4.3.1 Configure iRing Click “Redundancy->iRing” in the navigation bar, then enter “iRing configuration” interface. Name Description Default Enable iRing whether to enable iRing protocol Primary Port designate the main prot FE1/7 Secondary Port designate the secondary prot FE1/8 Priority Switch differentiate the primary or secondary port according to the...
priority.The port which have minimum MAC address or lowest priority will become the primary port Attention The default primary and secondary port are different for different switch model. The default primary and secondary port are shown as following table. InSwitch Model Primary Port Secondary Port InSwitch 2008D...
3.5.2 Port Security Click “Security->Port Security” in the navigation bar, then enter “Port Security” interface. You can click each port line to configure port security characteristic. Page information description is as shown in the following table. Name Description Default Enable Port Security Enable or disable Disable Max Secure MAC...
support four service levels, according t data frame reception port, Tag priority and IP priority level to determine service level. 3.6.1 Priority to Queue Mapping Click “QoS->QoS” in the navigation bar, then enter “Priority to Queue Mapping” interface. Name Description Default Priority IEEE Tag Priority...
Name Description Default DSCP IP priority, range from<0-63> None Queue Service level, range from<0-3>. Default mapping: Priority 0-15 Queue 0 Priority 16-31 Queue 1 Priority 32-47 Queue 2 Priority 48-63 Queue 3 3.6.3 Port QoS Click “QoS->QoS” in the navigation bar, then enter “Port QoS” interface. Name Description Default...
choose: Queue 3:2:1:0 should Wrr(Weighted rotation strategy) match weight 8:4:2:1 Sp(Strict priority policy) Priority Override Change data frame tag priority Disable according to information below: Destination MAC, source MAC, VLAN ID Priority Remap Data frame original tag priority was No change mapped new tag priority.
3.7.2 Multicast Group Summary Click “Multicast Filtering-> Multicast Filtering” in the navigation bar, then enter “IP Multicast Group” interface. In the table, you will see multicast group summary of dynamic configuration, including VLAN ID, MAC address, static port. 3.7.3 IGMP Parameters Click “Multicast Filtering->...
Name Description Default MAC address Input MAC address that match with None IGMP multicast group VLAN ID Choose multicast group VLAN None Choose IGMP multicast group’s static Port None member port 3.7.4 Configure Static Multicast Groups Click “Multicast Filtering-> Multicast Filtering” in the navigation bar, then enter “IP Multicast Group”...
Name Description Default MAC address Input MAC address that match with None IGMP multicast group VLAN ID Choose multicast group VLAN None Priority Choose priority of static multicast group address lis Choose IGMP multicast group’s static Port None member port 3.8 MAC Address Tables MAC Address list features: ...
address Priority Input priority matched with MAC address 3.8.2 Configure Dynamic MAC Click “MAC Address Tables-> MAC Address Tables ” in the navigation bar, then enter “Configure Dynamic MAC” interface. Name Description Default Remove dynamic MAC Choose removed dynamic MAC None address address...
Global Remote Statistics” interface. This page displays the LLDP global remote statistics network discovery, including overtime frame, insert frame, discard frame,and delete frames. 3.9.2 LLDP Neighbor Information Click “Network Discovery-> LLDP” in the navigation bar, then enter “LLDP Neighbor Information” interface. This page displays the network discovery LLDP neighbor information, including port, classis ID, port ID, port description, system name, system description, type of equipment, management address.
This page displays the LLDP statistical, including the various ports of the discarded frames, receive error frame, received frame, send frame, frame, receive timeout receive frame and receive TLV frame discard 3.9.4 LLDP Click “Network Discovery-> LLDP” in the navigation bar, then enter “LLDP ” interface.
3.10 DHCP Batch Configuration Automatically batch configuring switches via DHCP and TFTP can save time and lower labor cost, making management and maintenance much easier. It also avoids manual configuration errors caused by improper operation, avoid repetitive work and ensure configuration consistency. DHCP refers to an IP address range controlled by server.
3.10.1 DHCP Batch Configuration Preparation 1) Enable TFTP Server. Prepare switch configuration files and save effective configuration files under TFTP directory. 2) Enable DHCP Server. Configure DHCP parameters related to TFTP Server, sharing the IP address of TFTP Server where configuration files are saved and the name of configuration files (.cnf);...
Page 66
When DHCP client have been enabled, if you also enable “Enable Config via DHCP Server”, the DHCP client will reboot. When DHCP client haven’t been enabled, if you enable “Enable Config via DHCP Server”, DHCP client will be enabled automatically. ...
3.11 USB Configuration auto- Backup and Restore by USB Disc When the switch needs to be replaced due to failure, you can back up the configuration file from the faulty switch with a USB disk. USB disk can be used to backup and automatically synchronize the configuration file of the switch.
Appendix 1 Introduction to CLI Command 1 Help After entering CLI, input “help”, you can know more about help information user guide. ****************************************************************************** 11:06:35 InSwitch > help Input interrogation mark “?”, you can check help information at any point of command. If it does not match successfully, then the help list is empty.
3 Privileged Mode With user mode, input “enable ”, you will enter privileged mode, input “?”, it will show the executable command. ******************************************************************************* 11:20:07 InSwitch>enable Please input password: 11:20:09 InSwitch# Executable command: command Description Configure Enter configure mode Copy Copy files Default Recover appointed parameter as default Disable...
4 Configure Mode With privileged mode, input “configure terminal”, enter configure mode, then input “?”, it will show executable command. *************************************************************************** 11:21:10 InSwitch# configure terminal 11:21:11 InSwitch config# command Description Alarm Set warn Clear Clear information or configuration Clock Set system time Copy Copy files Crypto...
monitor Port moniter Cancel setting of appointed parameter password Set password ping Ping detection port-channel TRUNK setting reboot Reboot system rmon Remote moniter relay Set relay parameter show Show running status snmp-server Modify SNMP parameter sntp-client Set network time server spanning-tree Spanning-tree protocol telnet...
11:25:05 InSwitch config# vlan 100 11:25:06 InSwitch-vlan-100# VLAN configuration command: command Description default Recover appointed parameter as default exit Quit view/control help Get help command Iec61850 IEC 61850 member Setting VLAN member name Add VLAN name Cancel setting appointed parameter priority Setting VLAN priority show...
Page 74
node-type Set node type port Set ring network port ring-type Set ring type show Show running status service-vlan Set ring netword data vlan 11:29:07 InSwitch-InRing-10# *************************************************************** Attention: After one ring instance worked, the instance is running, it cannot enter configuration mode.
Appendix 2 Ring Network Configuration Example First, there are two data path in the ring network, including the data path of transmitted ring control message and data path of transmitted business data. As a result, before configuring ring, you need to establish data path, that is configured VLAN.
Step 2: Configure Ring instance The 4 industrial Ethernet switch should be configured as node’s role. You need configure one switch with owner node, one switch with neighbor node and two switches with normal node. Take owner node as example, other nodes’ configuration are same like owner node.
5. Configure data VLAN, input VLAN that configured in step 1. Set data VLAN 1, 3, 4, 5, the number was separated by comma. 6. Configure left port. Choose one trillion optical port FE1/7 as left port. 7. Configure right port. Choose one trillion optical port FE1/8 as right port. 8.
Appendix 3 Troubleshooting Methods Power indicator doesn’t light (1) Please check the power line if connected correctly. (2) Please check the power line plug is plugged in tight, no loose Port indicator doesn’t light (1) Please check if the cable and switch port connect tightly, there are no loose (2) Two cables are respectively inserted into the two port of the switch, if the two indicators that two Ethernet prots corresponding to light, that...
Appendix 4 Glossary Abbreviations Full Name Meaning 100Mbit/s baseband Ethernet standard, using the type 5 twisted 100Base-TX 100Base-TX pair to connect, can provide the maximumtransmission rate of 100Mbit/s 100Mbit/s baseband Ethernet standard, using the type 3/4/5 10Base-T 10Base-T twisted pair to connect, can provide the maximumtransmission rate of 10Mbit/s The Ping command is a diagnostic tool used to test the machineand other computers on the...
Page 80
Wide area network (Wide Area Network) is a data Wide Area communication network covering the geographic range is Network relatively wide, such as the Internet LAN (Local Area Network) generally refers to the internal Local Area network, such as the family network, small and medium-sized Network enterprise internal network etc.
Support In case you have problems with the installation and use, please address them to us by e-mail: support@inhandnetworks.com. InHand Networks 3900 Jermantown Rd., Suite 150 Fairfax, VA 22030 T: +1-703-348-2988 F:+1-703-348-2988 info@inhandnetworks.com www.inhandnetworks.com...
Need help?
Do you have a question about the InSwitch ISM Series and is the answer not in the manual?
Questions and answers