User Manual Configuration Lite Managed Switch GECKO 4TX UM Configuration GECKO Technical support Release 1.0 03/2015 https://hirschmann-support.belden.eu.com...
Page 2
In addition, we refer to the conditions of use specified in the license contract. You can get the latest version of this manual on the Internet at the Hirschmann product site (www.hirschmann.com). Hirschmann Automation and Control GmbH Stuttgarter Str.
Contents Contents Safety instructions About this Manual Introduction Defining IP parameters Defining IP Parameters via DHCP (state on delivery) Defining IP Parameters via HiDiscovery Defining IP parameters via the graphical user interface Defining IP Parameters via BOOTP Starting the graphic user interface Loading/Storing the Configuration Resetting the configuration to the delivery state Importing a configuration...
Page 4
Contents Helping prevent unauthorized access Changing passwords Enabling/disabling HiDiscovery access Adjusting the SNMP access 6.3.1 Modifying the community for read/write access 6.3.2 Deactivating the access via SNMPv1 or SNMPv2 in the device 6.3.3 Activating access via SNMPv3 in the device Network load control Direct packet distribution 7.1.1 Learning MAC addresses...
Page 5
Contents 10.3 Switching 10.3.1 Switching > Filter for MAC Addresses 10.3.2 QoS/Priority 10.3.3 Switching > QoS/Priority > Port Configuration 10.3.4 Switching > QoS/Priority > 802.1D/p Mapping 10.3.5 QoS/Priority > IP DSCP Mapping 10.3.6 Switching > L2 Redundancy > Spanning Tree > Global 10.3.7 Switching >...
Page 6
Contents A.11 Basics of the Management Information Base MIB A.12 Copyright of integrated software A.13 Abbreviations Readers’ Comments Further Support UM Configuration GECKO Release 1.0 03/2015...
Safety instructions Safety instructions WARNING UNCONTROLLED MACHINE ACTIONS To avoid uncontrolled machine actions caused by data loss, configure all the data transmission devices individually. Before you start any machine which is controlled via data transmission, be sure to complete the configuration of all data transmission devices. Failure to follow these instructions can result in death, serious injury, or equipment damage.
“References” chapter of the configuration user manual. You can find the documentation that is not provided as a printout with your device as a PDF file under “Downloads” at www.hirschmann.com/en/QR/INET-GECKO4TX_en-HB. The Industrial HiVision network management software provides you with additional options for smooth configuration and monitoring: ...
Designations used: List Work step Subheading Link Cross-reference with link Note: A note emphasizes an important fact or draws your attention to a dependency. ASCII representation in user interface Courier UM Configuration GECKO Release 1.0 03/2015...
Page 10
UM Configuration GECKO Release 1.0 03/2015...
Introduction Introduction The device has been developed for use in a harsh industrial environment. Accordingly, the installation process has been kept simple. Thanks to the selected default settings, you only have to enter a few settings before starting to operate the device. Note: The device saves changed settings in the temporary memory when you click "Set".
Page 12
Introduction UM Configuration GECKO Release 1.0 03/2015...
Defining IP parameters 1 Defining IP parameters Note: You will find background information on this topic here: “IP Parameter Basics” on page 105. To access the device via the network during the first installation, you require the IP parameters of the device. The device gives you the following options for defining IP parameters: ...
Defining IP parameters 1.1 Defining IP Parameters via DHCP (state on delivery) 1.1 Defining IP Parameters via DHCP (state on delivery) Note: You will find background information on this topic here: “Basics of the Dynamic Host Configuration Protocol (DHCP)” on page 111.
The HiDiscovery protocol enables you to assign IP parameters to the device via the Ethernet. Install the HiDiscovery software on your PC. You can download the software from the Hirschmann product pages. Start the HiDiscovery program. Figure 1: HiDiscovery When HiDiscovery is started, HiDiscovery automatically searches the network for those devices which support the HiDiscovery protocol.
Page 16
Defining IP parameters 1.2 Defining IP Parameters via HiDis- covery HiDiscovery uses the first network interface found for the PC. If your computer has several network cards, you can select the one you desire in the HiDiscovery toolbar. HiDiscovery displays a line for every device that reacts to the HiDiscovery protocol.
Defining IP parameters 1.3 Defining IP parameters via the graphical user interface 1.3 Defining IP parameters via the graphical user interface Prerequisite: Your device already has an IP address and can be accessed via the network. Procedure: Open the Basic Settings > Network dialog. ...
Defining IP parameters 1.4 Defining IP Parameters via BOOTP 1.4 Defining IP Parameters via BOOTP Prerequisite: You need a BOOTP server for this method. The BOOTP server assigns the configuration data to the device using its MAC address. Procedure: ...
Starting the graphic user interface 2 Starting the graphic user interface Prerequisite: The IP parameters of the device are defined and the device can be accessed via the network. See “Defining IP parameters” on page 13. Procedure: Start your Web browser. ...
Page 20
Starting the graphic user interface UM Configuration GECKO Release 1.0 03/2015...
Loading/Storing the Configuration 3 Loading/Storing the Configuration The device gives you the following options for loading or saving the device configuration: Resetting the configuration to the delivery state Importing a configuration Saving the configuration in the device ...
Loading/Storing the Configuration 3.1 Resetting the configuration to the delivery state 3.1 Resetting the configuration to the delivery state When it is restarted, the device loads its configuration data from the local non-volatile memory. If you reset the settings in the device to the delivery state, the device deletes the configuration in the volatile memory and in the non-volatile memory.
Loading/Storing the Configuration 3.2 Importing a configuration 3.2 Importing a configuration The device allows you to load settings from a configuration file from your PC or from a TFTP server. Prerequisite: You are accessing the device as an “admin” user with read and write access.
Page 24
Loading/Storing the Configuration 3.2 Importing a configuration Note: The device saves changed settings in the temporary memory when you click "Set". You use the Basic Settings > Load/Save dialog to save changed settings in the local memory of the device. UM Configuration GECKO Release 1.0 03/2015...
Loading/Storing the Configuration 3.3 Saving the configuration in the device 3.3 Saving the configuration in the device The device allows you to save the current configuration data in the local non- volatile memory of the device. Prerequisite: You are accessing the device as an “admin” user with read and write access.
Loading/Storing the Configuration 3.4 Exporting a configuration 3.4 Exporting a configuration The device allows you to save settings in a configuration file on your PC or on a TFTP server. Prerequisite: You are accessing the device as an “admin” user with read and write access.
4 Checking the status of the software/updating the software Hirschmann never stops working on improving the performance of its products. So it is possible that you may find a more up to date release of the software on the Hirschmann Internet site (www.hirschmann.com) than the release saved on your device.
Checking the status of the soft- 4.1 Checking the status of the soft- ware/updating the software ware 4.1 Checking the status of the software The device allows you to display the status of the software saved on the device. Procedure: ...
Checking the status of the soft- 4.2 Updating the software ware/updating the software 4.2 Updating the software Prerequisite: The file with the more recent software version is saved on a TFTP server, on your PC or on a network drive. Procedure: ...
Page 30
Checking the status of the soft- 4.2 Updating the software ware/updating the software UM Configuration GECKO Release 1.0 03/2015...
Configuring the Ports 5 Configuring the Ports This device gives you the following options for defining basic settings for the ports: Enabling/disabling ports For a higher level of access security, disable the ports at which you are not connecting any other network components. ...
Configuring the Ports 5.1 Enabling/disabling ports 5.1 Enabling/disabling ports Every port is enabled in the state on delivery. For a higher level of access security, disable the ports at which you are not connecting any network components. Procedure: Select the dialog Basic Settings > Port > Configuration. ...
Configuring the Ports 5.2 Selecting the operating mode 5.2 Selecting the operating mode In the state on delivery, the ports are in the "autonegotiation" operating mode. With autonegotiation, the device autonomously determines the maximum possible data transfer rate and the duplex mode between the connected ports.
Configuring the Ports 5.3 Switching link monitoring (alarm messages) on/off 5.3 Switching link monitoring (alarm messages) on/off The device allows you to transfer alarm messages to a network management station. In the Basic Settings > Port > Configuration dialog, you specify whether the device sends an SNMP trap when it detects a change in the monitored functions.
Helping prevent unauthorized access 6 Helping prevent unauthorized access The device provides you with the following options to help you protect it against unauthorized access. Changing passwords For a higher level of access security, change the preset passwords for the access to the device.
Helping prevent unauthorized access 6.1 Changing passwords 6.1 Changing passwords Note: The passwords for accessing the device via the graphical user interface are the same as the passwords for accessing the device via SNMPv3. A network management station communicates with the device via the Simple Network Management Protocol (SNMP).
Page 37
Helping prevent unauthorized access 6.1 Changing passwords Please note the following information on passwords: Define a new password with which you can access from your computer with write access. Treat this community with discretion since everyone who knows the password can access the MIB of the device with the IP address of your computer.
Helping prevent unauthorized access 6.2 Enabling/disabling HiDiscovery access 6.2 Enabling/disabling HiDiscovery access The HiDiscovery protocol enables you to assign IP parameters to the device via the Ethernet. You will find more information on this topic here: “Defining IP Parameters via HiDiscovery”...
Helping prevent unauthorized access 6.3 Adjusting the SNMP access 6.3 Adjusting the SNMP access The SNMP protocol allows you to monitor and configure the device via the network with a network management system (NMS). When the NMS accesses the device via SNMPv1 or SNMPv2, the NMS authenticates itself with the community.
Helping prevent unauthorized access 6.3 Adjusting the SNMP access 6.3.1 Modifying the community for read/write access In the state on delivery, you access the device via the communities public (read access) and private (read/write access). The community is contained in every SNMP packet. When it receives a packet, the device compares this community with the communities specified in the device.
Helping prevent unauthorized access 6.3 Adjusting the SNMP access 6.3.2 Deactivating the access via SNMPv1 or SNMPv2 in the device Prerequisite: You are accessing the device as an “admin” user with read and write access. Procedure: Open the Device Security > SNMP dialog. ...
Page 42
Helping prevent unauthorized access 6.3 Adjusting the SNMP access Note: The device saves changed settings in the temporary memory when you click "Set". You use the Basic Settings > Load/Save dialog to save changed settings in the local memory of the device. UM Configuration GECKO Release 1.0 03/2015...
Network load control 7 Network load control The device gives you the following options for reducing the network load: Direct packet distribution Prioritizing the data traffic (Quality of Service) UM Configuration GECKO Release 1.0 03/2015...
Network load control 7.1 Direct packet distribution 7.1 Direct packet distribution The device reduces the network load with direct packet distribution. The device learns the MAC address of the senders of received data packets at every port. The device saves the combination “port and MAC address” in a MAC address table (forwarding database).
Network load control 7.1 Direct packet distribution 7.1.2 Aging of learned MAC addresses Addresses that have not been detected by the device for the period of time of 30 seconds (aging time) are deleted from the MAC address table (FDB) by the device.
Network load control 7.1 Direct packet distribution Note: The device saves changed settings in the temporary memory when you click "Set". You use the Basic Settings > Load/Save dialog to save changed settings in the local memory of the device. 7.1.4 Deleting learned address entries Prerequisite:...
Network load control 7.2 Prioritizing the data traffic (Quality of Service) 7.2 Prioritizing the data traffic (Quality of Service) Note: You will find background information on this topic here: “Basics of prioritizing the data traffic” on page 134. QoS (Quality of Service) is a procedure defined in IEEE 802.1D. It is used to distribute resources in the network.
Page 48
Network load control 7.2 Prioritizing the data traffic (Quality of Service) Assigning VLAN priority to a traffic class Open the Switching > QoS/Priority > 802.1D/p-Mapping dialog. To assign a traffic class to a VLAN priority, insert the associated value in the "Traffic Class"...
Diagnostics 8 Diagnostics The device provides you with the following diagnostic tools: Setting alarms (traps) Displaying the topology discovery System log UM Configuration GECKO Release 1.0 03/2015...
Diagnostics 8.1 Setting alarms (traps) 8.1 Setting alarms (traps) The device immediately reports unusual events which occur during normal operation to the management station. This is done by messages called traps that bypass the polling procedure (“polling” means querying the data stations at regular intervals).
Page 51
Diagnostics 8.1 Setting alarms (traps) List of SNMP traps The following table shows a list of possible traps sent by the device. Name of the trap Meaning authenticationFailure is sent if a station attempts to access an agent without permission. coldStart is sent during the boot phase when a cold start is performed (after the successful initialization of the network management).
Diagnostics 8.2 Displaying the topology discovery 8.2 Displaying the topology discovery Note: You will find background information on this topic here: “Basics of the Topology Discovery” on page 132. Procedure: Open the Diagnostics > LLDP dialog. The “Topology Discovery” frame displays the collected LLDP information for the neighboring devices.
Diagnostics 8.3 System log 8.3 System log The system log file is an HTML file in which the device writes every specific device-internal event. In service situations, this report provides the necessary information to the technician. The table in the dialog lists the logged events.
Page 54
Diagnostics 8.3 System log UM Configuration GECKO Release 1.0 03/2015...
Configuring the Rapid Spanning Tree Protocol redundancy procedure 9 Configuring the Rapid Spanning Tree Protocol redundancy procedure Note: You will find background information on this topic here: “Basics of the Spanning Tree Protocol” on page 113. The device supports the Rapid Spanning Tree Protocol (RSTP) defined in standard IEEE 802.1D-2004.
Page 56
Configuring the Rapid Spanning Tree Protocol redundancy procedure Procedure: Set up the network to meet your requirements, initially without redundant lines. Switch Spanning Tree on every device in the network. In the state on delivery, Spanning Tree is switched on the device. ...
References 10 References This chapter contains descriptions of the individual parameters that you configure via the graphical user interface. Note: The content of the online help corresponds to the information in the “References” chapter of this configuration user manual. Use the “Help” button to call up the online help in the graphical user interface. UM Configuration GECKO Release 1.0 03/2015...
References 10.1 Basic Settings 10.1 Basic Settings With this menu you can configure the basic settings of the device. 10.1.1 Basic Settings > System This dialog displays the device properties. System data Parameter Meaning Name Specifies the device name. Possible values: ...
References 10.1 Basic Settings Time Parameter Meaning System Time (UTC) Displays the current date and time with reference to Universal Time Coordinated (UTC). System Time Displays the current date and time with reference to the local time: "System Time" = "System Time (UTC)" + "Local Offset [min]" Local Offset [min] Defines the difference between the local time and “System Time (UTC)”...
References 10.1 Basic Settings Management interface Parameter Meaning IP address Specifies the source from which the device receives its IP parameters assignment after starting: Possible values: BOOTP The device receives its IP parameters from a BOOTP or DHCP server. The server evaluates the MAC address of the device, then assigns the IP parameters.
Page 61
10.1 Basic Settings HiDiscovery protocol On a PC the HiDiscovery software shows you the Hirschmann devices that can be accessed in the network on which the HiDiscovery function is activated. You can access these devices even if they have invalid IP parameters or none at all.
References 10.1 Basic Settings 10.1.3 Basic Settings > Software This dialog allows you to update the device software and display information about the device software. Version Parameter Meaning Bootcode Displays the version number and creation date of the boot code. Running Version Displays the version number and creation date of the device software that the device loaded during the last restart and is currently running.
References 10.1 Basic Settings Buttons Ends the session and terminates the connection to the device. Restarts the device. Displays the time in seconds after which the device automatically ends the session when the user is inactive. Load Reloads the display of the page in your Web browser. Restart Restarts the device.
Page 64
References 10.1 Basic Settings Configuration Transfer Parameter Meaning Transfer Direction Defines the transfer direction in which the configuration profile is transferred. Possible values: Device to server Select this value if you are transferring the configuration profile from the device. ...
References 10.1 Basic Settings 10.1.5 Basic Settings > Port > Configuration This dialog allows you to specify settings for the individual device ports. The dialog also displays the operating mode and connection status for every device port. Configuration Parameter Meaning Port Displays the number of the device port.
Page 66
References 10.1 Basic Settings Parameter Meaning Manual Specifies the operating mode of the device port. configuration Possible values: Autoneg (default setting) The device port negotiates the operating mode independently using autonegotiation and detects the devices connected to the TP port automatically (Auto Cable Crossing).
References 10.1 Basic Settings 10.1.6 Basic Settings > Port > Statistics This frame displays the following overview per device port: Number of data packets/bytes sent from the device "Transmitted Packets" "Sent Unicast Packets" "Sent Non Unicast Packets" ...
Page 68
References 10.1 Basic Settings Reset the Resets the port statistic entries in the table to 0. port counter Help Opens the online help. UM Configuration GECKO Release 1.0 03/2015...
References 10.2 Device Security 10.2 Device Security This menu allows you to specify the settings for the access to the device. 10.2.1 Device Security > Password The device allows users to access its management functions when they log in with valid login data. Selecting a password (HTTPS/SNMPv3) ...
References 10.2 Device Security Displays the time in seconds after which the device automatically ends the session when the user is inactive. Load Reloads the display of the page in your Web browser. Write Transfers the changes to the volatile memory of the device. To save the changes in the non-volatile local memory, proceed as follows: ...
Page 71
References 10.2 Device Security Certificate Parameter Meaning Status Displays whether the digital certificate is present on the device. Possible values: Certificate present The certificate is present. No certificate present The certificate has been removed. Certificate will be created ... The certificate is being created on the device.
Page 72
References 10.2 Device Security Buttons Ends the session and terminates the connection to the device. Restarts the device. Displays the time in seconds after which the device automatically ends the session when the user is inactive. Load Reloads the display of the page in your Web browser. Write Transfers the changes to the volatile memory of the device.
References 10.2 Device Security 10.2.3 Device Security > SNMP This dialog allows you to specify settings for the SNMP agent of the device and to enable/disable access to the device with different SNMP versions. The SNMP agent activates access to the management functions of the device with SNMP-based applications, for example with the graphical user interface.
Page 74
References 10.2 Device Security Parameter Meaning SNMPv3 enabled Activates/deactivates the access to the device with SNMP version 3. Possible values: marked (default setting) Access activated unmarked Access deactivated This function uses, for example, the Industrial HiVision software to make changes to the settings.
Page 75
References 10.2 Device Security Buttons Ends the session and terminates the connection to the device. Restarts the device. Displays the time in seconds after which the device automatically ends the session when the user is inactive. Load Reloads the display of the page in your Web browser. Write Transfers the changes to the volatile memory of the device.
References 10.3 Switching 10.3 Switching With this menu you can configure the settings for the switching. 10.3.1 Switching > Filter for MAC Addresses This dialog allows you to display and edit address filters for the address table (forwarding database). Address filters specify the way the data packets are forwarded in the device based on the destination MAC address.
Page 77
References 10.3 Switching To remove the learned MAC addresses from the address table (forwarding database), click the "Reset MAC Address Table" button. Buttons Ends the session and terminates the connection to the device. Restarts the device. Displays the time in seconds after which the device automatically ends the session when the user is inactive.
References 10.3 Switching 10.3.2 QoS/Priority Communication networks transmit a number of applications at the same time that have different requirements as regards availability, bandwidth and latency periods. QoS (Quality of Service) is a procedure defined in IEEE 802.1D. It is used to distribute resources in the network.
References 10.3 Switching 10.3.3 Switching > QoS/Priority > Port Configuration In this dialog, you specify the QoS/priority settings for each device port for received data packets. Table Parameter Meaning Port Displays the number of the device port. Port Priority Specifies the VLAN priority of the data packets that the port receives.
Page 80
References 10.3 Switching Parameter Meaning Trust mode Specifies how the device handles received data packets that contain a QoS/priority information. Possible values: untrusted The device transmits the data packet with the VLAN priority specified in the "Port Priority" field. The device ignores the QoS/priority information contained in the data packet.
References 10.3 Switching Write Transfers the changes to the volatile memory of the device. To save the changes in the non-volatile local memory, proceed as follows: Open the dialog. Basic Settings > Load/Save Click "Save" in the "Load/Save" frame beside "Save current configuration". Help Opens the online help.
Page 82
References 10.3 Switching Default assignment of the VLAN priority to traffic classes VLAN priority Traffic Class Content description according to IEEE 802.1D Standard Normal Data Background Non-time critical data and background services Background Non-time critical data and background services Standard Normal Data Best Effort...
References 10.3 Switching 10.3.5 QoS/Priority > IP DSCP Mapping The device transmits IP data packets according to the DSCP value contained in the data packet with a higher or lower priority. In this dialog, you assign a traffic class to every DSCP value. You assign the traffic classes to the priority queues of the ports.
Page 84
References 10.3 Switching Default assignment of the DSCP values to traffic classes DSCP Value Traffic Class 8-23 24-31 32-47 48-63 UM Configuration GECKO Release 1.0 03/2015...
References 10.3 Switching 10.3.6 Switching > L2 Redundancy > Spanning Tree > Global This dialog allows you to configure and monitor the settings for redundancy procedure. The device supports the Rapid Spanning Tree Protocol (RSTP) defined in standard IEEE 802.1D-2004. This protocol is a further development of the Spanning Tree Protocol (STP) and is compatible with it.
Page 86
References 10.3 Switching Protocol Configuration / Information "Bridge" Parameter Meaning Bridge ID Displays the bridge ID of the device. The device with the numerically lowest bridge ID takes over the role of the root bridge in the network. Possible values: ...
Page 87
References 10.3 Switching Parameter Meaning The parameters "Forward Delay" and "Max Age" have the following relationship: Forward Delay ≥ (Max Age/2) + 1 If you enter values in the fields that contradict this relationship, the device replaces these values with the last valid values or with the default value. Max Age Specifies the maximum permissible branch length, for example the number of devices to the root bridge.
Page 88
References 10.3 Switching Parameter Meaning Forward Delay [s] Displays the delay time in seconds set up by the root bridge for status changes. Possible values: 4..30 The device uses this specified value, see the "Bridge" column. In the RSTP protocol, the bridges negotiate a status change without a specified delay.
References 10.3 Switching Buttons Ends the session and terminates the connection to the device. Restarts the device. Displays the time in seconds after which the device automatically ends the session when the user is inactive. Load Reloads the display of the page in your Web browser. Write Transfers the changes to the volatile memory of the device.
Page 90
References 10.3 Switching Parameter Meaning Port priority Specifies the priority of the device port. Possible values: 16..240 in steps of 16 (default setting: 128) This value represents the first 4 bits of the port ID. Port Path Cost Specifies the RSTP port path cost to favour redundant paths (corresponds to a contribution of this port to the global root path cost).
Page 91
References 10.3 Switching Parameter Meaning Admin Edge Port Specifies whether an end device is connected to the device port. Possible values: unmarked (default setting) An STP bridge is connected to the device port. After the connection is set up, the device port changes to the learning status before changing to the forwarding status, if applicable.
References 10.4 Diagnostics 10.4 Diagnostics The dialogs in this menu show information on statuses and events that the device has logged. In service cases, this information helps our support to diagnose the situation. 10.4.1 Diagnosis >Alarms (Traps) Alarms (Traps) Parameter Meaning Function...
Page 93
References 10.4 Diagnostics Destination Addresses Parameter Meaning IP Address Specifies the IP address of the SNMP manager. Possible values: Valid IPv4 address Trap Community Specifies the name of the trap community that the device uses to identify itself as the source of the trap. Possible values: ...
References 10.4 Diagnostics 10.4.2 Diagnosis > LLDP The device allows you to gather information about neighboring devices. For this, the device uses the Link Layer Discovery Protocol (LLDP). This information enables the network management station to map the structure of your network.
References 10.4 Diagnostics Topology discovery This dialog displays the collected LLDP information for the neighboring devices. This information enables the network management station to map the structure of your network. When devices both with and without an active topology discovery function are connected to a device port, the topology table hides the devices without active topology discovery.
References 10.4 Diagnostics Write Transfers the changes to the volatile memory of the device. To save the changes in the non-volatile local memory, proceed as follows: Open the dialog. Basic Settings > Load/Save Click "Save" in the "Load/Save" frame beside "Save current configuration". Help Opens the online help.
Page 97
References 10.4 Diagnostics Displays the time in seconds after which the device automatically ends the session when the user is inactive. Load Reloads the display of the page in your Web browser. Save Opens the "Save" dialog. The dialog allows you to save the log file in HTML format on your PC.
Appendix Technical Data A.1 Technical Data Switching Size of MAC address table 1,024 (incl. static filters) Max. number of statically configured MAC address filters MTU (max. length of over-long packets) 1,522 bytes Latency, depends on the port data rate 100 Mbit/s min.7 µs max.
Appendix IP Parameter Basics A.5 IP Parameter Basics A.5.1 IP Address (Version 4) The IP addresses consist of 4 bytes. Write these 4 bytes in decimal notation, separated by a decimal point. RFC 1340, written in 1992, defines 5 IP address classes. Class Network Host address...
Appendix IP Parameter Basics Net ID - 7 bits Host ID - 24 bits Class A Net ID - 14 bits Host ID - 16 bits Class B Net ID - 21 bits Host ID - 8 bit s Class C Multicast Group ID - 28 bits Class D reserved for future use - 28 b its...
Page 107
Appendix IP Parameter Basics Example of a subnet mask: Decimal notation 255.255.192.0 Binary notation 11111111.11111111.11000000.00000000 Subnetwork mask bits Class B Example of IP addresses with subnetwork assignment when applying the subnet mask: Decimal notation 129.218.65.17 128 < 129 191 › Class B Binary notation 10000001.11011010.01000001.00010001 Subnetwork 1...
Page 108
Appendix IP Parameter Basics Example of how the network mask is used In a large network it is possible that gateways and routers separate the management agent from its management station. How does addressing work in such a case? Romeo Julia Lorenzo...
Appendix IP Parameter Basics Lorenzo receives the letter and removes the outer envelope. From the inner envelope he recognizes that the letter is meant for Juliet. He places the inner envelope in a new outer envelope and searches his address list (the ARP table) for Juliet's MAC address.
Page 110
Appendix IP Parameter Basics Since 1993, RFC 1519 has been using Classless Inter-Domain Routing (CIDR) to provide a solution for this situation. CIDR overcomes these class boundaries and supports classless IP address ranges. With CIDR, you enter the number of bits that designate the IP address range. You represent the IP address range in binary form and count the mask bits that designate the netmask.
Appendix Basics of the Dynamic Host Configuration Protocol (DHCP) A.6 Basics of the Dynamic Host Configuration Protocol (DHCP) The DHCP (Dynamic Host Configuration Protocol) is a further development of BOOTP, which it has replaced. DHCP additionally allows the configuration of a DHCP client via a name instead of via the MAC address. For DHCP, this name is known as the “client identifier”...
Page 112
Appendix Basics of the Dynamic Host Configuration Protocol (DHCP) Option Meaning Client Identifier TFTP Server Name Bootfile Name Table 3: DHCP options which the device requests The advantage of using DHCP instead of BOOTP is that the DHCP server can restrict the validity of the configuration parameters (“Lease”) to a specific time period (known as dynamic address allocation).
Appendix Basics of the Spanning Tree Protocol A.7 Basics of the Spanning Tree Protocol Note: The Spanning Tree Protocol is a protocol for MAC bridges. For this reason, the following description uses the term bridge for GECKO. Local networks are getting bigger and bigger. This applies to both the geographical expansion and the number of network subscribers.
Appendix Basics of the Spanning Tree Protocol Note: RSTP reduces a layer 2 network topology with redundant paths into a tree structure (Spanning Tree) that does not contain any more redundant paths. One of these takes over the role of the root bridge here. You can specify the maximum number of devices permitted in an active branch from the root bridge to the tip of the branch using the variable Max Age for the current root bridge.
Page 115
Appendix Basics of the Spanning Tree Protocol reactivates the path previously deactivated. This enables redundant connections to increase the communication availability. In forming the tree structure, the STP determines a bridge that represents the basis of the STP tree structure. This bridge is known as the root bridge.
Page 116
Appendix Basics of the Spanning Tree Protocol Priority MAC Address Figure 5: Bridge identifier, example (values in hexadecimal notation) Root Path Costs To every path that connects 2 bridges, the bridges assign costs for the transmission (path costs). The bridge determines this value based on the data rate (see table 4).
Page 117
Appendix Basics of the Spanning Tree Protocol Data rate Recommended value Recommended range Possible range 1 Gbit/s 20,000 2,000-200,000 1-200,000,000 10 Gbit/s 2,000 200-20,000 1-200,000,000 100 Gbit/s 20-2,000 1-200,000,000 1 TBit/s 2-200 1-200,000,000 10 TBit/s 1-20 1-200,000,000 Table 4: Recommended path costs for RSTP based on the data rate. a.
Page 118
Appendix Basics of the Spanning Tree Protocol Diameter The “Max Age” and “Diameter” values largely determine the maximum expansion of a Spanning Tree network. The number of connections between the devices in the network that are furthest removed from each other is known as the network diameter. Diameter = 7 Root-Bridge Figure 8: Definition of diameter...
Appendix Basics of the Spanning Tree Protocol MaxAge The “Max Age” and “Diameter” values largely determine the maximum expansion of a Spanning Tree network. Every STP-BPDU contains a “MessageAge” counter. When a bridge is passed through, the counter increases by 1. Before forwarding an STP-BPDU, the bridge compares the “MessageAge”...
Page 120
Appendix Basics of the Spanning Tree Protocol The contents of a BPDU include bridge identifier, root path costs and port identifier. (see IEEE 802.1D). Setting up the tree structure The bridge with the smallest number for the bridge identifier is also known as the root bridge.
Page 121
Appendix Basics of the Spanning Tree Protocol Determine root path Equal Path with lowest path costs? path costs = root path Path with highest Equal priority in priority (numerically bridge identification? lower value) in bridge identification = root path Use the bridge with lowest MAC address = designated bridge Path with highest...
Appendix Basics of the Spanning Tree Protocol A.7.3 Examples Example of determining the root path You can use the network plan (see figure 11) to follow the flow chart (see figure 10) for determining the root path. The administrator has specified a priority in the bridge identifier for each bridge.
Page 123
Appendix Basics of the Spanning Tree Protocol Root Bridge P-BID = 16 384 P-BID = 32 768 P-BID = 32 768 P-BID = 32 768 P-BID = 32 768 P-BID = 32 768 MAC 00:01:02:03:04:06 Port 3 MAC 00:01:02:03:04:05 Port 1 Priority of the bridge identifikation (BID) P-BID = BID without MAC Address...
Page 124
Appendix Basics of the Spanning Tree Protocol Example of manipulating the root path You can use the network plan (see figure 12) to follow the flow chart (see figure 10) for determining the root path. The Administrator has performed the following: –...
Page 125
Appendix Basics of the Spanning Tree Protocol Root Bridge P-BID = 16 384 P-BID = 32 768 P-BID = 32 768 P-BID = 32 768 P-BID = 32 768 P-BID = 28 672 Priority of the bridge identifikation (BID) P-BID = BID without MAC Address P-BID = 32 768 Root path...
Page 126
Appendix Basics of the Spanning Tree Protocol Example of manipulating the tree structure The Management Administrator of the network soon discovers that this configuration with bridge 1 as the root bridge (see on page 122 “Example of determining the root path”) is unfavorable.
Appendix Basics of the Spanning Tree Protocol A.7.4 The Rapid Spanning Tree Protocol The RSTP takes over the calculation of the tree structure by the STP unchanged. RSTP merely changes parameters, and adds new parameters and mechanisms that speed up the reconfiguration if a connection or a bridge is inoperable.
Appendix Basics of the Spanning Tree Protocol Alternate Port: This is a blocked port that takes over the task of the root port if the connection to the root bridge is inoperable. The alternate port helps maintain the connection of the bridge to the root bridge. ...
Appendix Basics of the Spanning Tree Protocol Port states Depending on the tree structure and the state of the selected connection paths, the RSTP assigns the ports their states. STP port state Administrative RSTP Active topology bridge port Operational Port state (port role) state...
Page 130
Appendix Basics of the Spanning Tree Protocol Based on this information, the bridges participating in RSTP are able to determine port roles themselves and define the port status of their local ports. Fast reconfiguration Why can RSTP react faster than STP to an interruption of the root path? ...
Appendix Basics of the Spanning Tree Protocol STP compatibility mode The STP compatibility mode allows you to operate RSTP devices in networks with old installations. If an RSTP device detects an older STP device, it switches on the STP compatibility mode at the relevant port. UM Configuration GECKO Release 1.0 03/2015...
Appendix Basics of the Topology Discovery A.8 Basics of the Topology Discovery IEEE 802.1AB describes the Link Layer Discovery Protocol (LLDP). LLDP enables the user to have automatic topology discovery for his LAN. Devices with active LLDP: send their connection and management information to the neighboring devices in the shared LAN.
Page 133
Appendix Basics of the Topology Discovery 802.1d devices normally block the special multicast LLDP IEEE MAC address used for information exchange. For this reason, non-LLDP devices discard LLDP packets. When a non-LLDP-capable device is positioned between 2 LLDP-capable devices, the non-LLDP-capable device prohibits information exchange between the 2 LLDP-capable devices.
Appendix Basics of prioritizing the data traffic A.9 Basics of prioritizing the data traffic A.9.1 Description of prioritization For data traffic prioritization, traffic classes are predefined in the device. The device prioritizes higher traffic classes over lower traffic classes. To provide for optimal data flow for delay-sensitive data, you assign higher traffic classes to this data.
Appendix Basics of prioritizing the data traffic When the data of a higher traffic class is no longer being sent, or the relevant data is still in the queue, the device sends data of the corresponding traffic class. If all traffic classes are prioritized according to the “strict”...
Appendix Basics of prioritizing the data traffic A.9.3 VLAN tagging For the VLAN and prioritizing functions, the IEEE 802.1Q standard provides for integrating a VLAN tag into the MAC data frame. The VLAN tag consists of 4 bytes and is located between the source address field (“Source Address Field”) and the type field (“Length / Type Field”).
Page 137
Appendix Basics of prioritizing the data traffic For data packets with VLAN tags, the device evaluates the priority information. 4 Octets Figure 16: Structure of the VLAN tagging Data packets with VLAN tags containing priority information but no VLAN information (VLAN ID = 0) are known as Priority Tagged Frames. Note: Network protocols and redundancy mechanisms use the highest traffic class 7.
Appendix Basics of prioritizing the data traffic A.9.4 Handling of traffic classes Description of Strict Priority With the Strict Priority setting, the device first transmits the data packets that have a higher traffic class (higher priority) before transmitting a data packet with the next highest traffic class.
Appendix A.10 Basics of flow control A.10 Basics of flow control If a large number of data packets are received in the sending queue of a port at the same time, this can cause the port memory to overflow. This happens, for example, when the device receives data on a Gigabit port and forwards it to a port with a lower bandwidth.
Appendix A.10 Basics of flow control Port 1 Port 4 Switch Port 2 Port 3 Workstation 1 Workstation 2 Workstation 3 Workstation 4 Figure 17: Example of flow control A.10.1 Half duplex or full duplex link Flow control with a half duplex link ...
Page 141
Appendix A.10 Basics of flow control Flow control with a full duplex link In the example, there is a full duplex link between Workstation 2 and the device. Before the send queue of port 2 overflows, the device sends a request to Workstation 2 to take a small break in the sending transmission.
Page 142
Appendix A.11 Basics of the Management Information Base MIB A.11 Basics of the Management Information Base MIB The Management Information Base (MIB) is designed as an abstract tree structure. The branching points are the object classes. The “leaves” of the MIB are known as generic object classes.
Page 143
Appendix A.11 Basics of the Management Information Base MIB Definition of the syntax terms used: TimeTicks Stopwatch Elapsed time (in seconds) = numerical value/100 Numerical value = integer in the range 0-2 Timeout Time value in hundredths of a second Time value = integer in the range 0-2 Type field 4-digit hexadecimal number in accordance with ISO/IEC 8802-3...
Page 145
Appendix A.12 Copyright of integrated software A.12 Copyright of integrated software Included open source software Flexigrid 1.1 The MIT License (MIT) Copyright (c) <year> <copyright holders> Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the...
Page 146
Appendix A.12 Copyright of integrated software To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.
Page 147
Appendix A.12 Copyright of integrated software b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
Page 148
Appendix A.12 Copyright of integrated software 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License.
Page 149
Appendix A.12 Copyright of integrated software of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10.
Page 150
Appendix A.12 Copyright of integrated software Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details.
Page 151
Appendix A.12 Copyright of integrated software PREAMBLE The goals of the Open Font License (OFL) are to stimulate worldwide development of collaborative font projects, to support the font creation efforts of academic and linguistic communities, and to provide a free and open framework in which fonts may be shared and improved in partnership with others.
Page 152
Appendix A.12 Copyright of integrated software HOLDER BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, INCLUDING ANY GENERAL, SPECIAL, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL DAMAGES, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF THE USE OR INABILITY TO USE THE FONT SOFTWARE OR FROM OTHER DEALINGS IN THE FONT SOFTWARE.
Page 153
Appendix A.12 Copyright of integrated software Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.
Page 154
Appendix A.12 Copyright of integrated software the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you;...
Page 155
Appendix A.12 Copyright of integrated software 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Page 156
Appendix A.12 Copyright of integrated software 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF...
Page 157
Appendix A.12 Copyright of integrated software coreutils 8.16 GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/> Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The GNU General Public License is a free, copyleft license for software and other kinds of works.
Page 158
Appendix A.12 Copyright of integrated software TERMS AND CONDITIONS 0. Definitions. "This License" refers to version 3 of the GNU General Public License. "Copyright" also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. "The Program" refers to any copyrightable work licensed under this License. Each licensee is addressed as "you".
Page 159
Appendix A.12 Copyright of integrated software the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work. The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source.
Page 160
Appendix A.12 Copyright of integrated software b) The work must carry prominent notices stating that it is released under this License and any conditions added under section This requirement modifies the requirement in section 4 to "keep intact all notices". c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy.
Page 161
Appendix A.12 Copyright of integrated software A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need not be included in conveying the object code work. A "User Product" is either (1) a "consumer product", which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling.
Page 162
Appendix A.12 Copyright of integrated software b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version;...
Page 163
Appendix A.12 Copyright of integrated software permission to propagate or modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so. 10.
Page 164
Appendix A.12 Copyright of integrated software If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it.
Page 165
Appendix A.12 Copyright of integrated software Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version. 15. Disclaimer of Warranty. THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
Page 166
Appendix A.12 Copyright of integrated software <program> Copyright (C) <year> <name of author> This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details.
Page 167
Appendix A.12 Copyright of integrated software On Debian GNU systems, the complete text of the GNU General Public License can be found in `/usr/share/common-licenses/GPL-2'. The complete text of the GNU Library General Public License can be found in '/usr/share/common-licenses/LGPL-2'. The license used for lib/et and lib/ss libraries is: Copyright 1987 by the Student Information Processing Board of the Massachusetts Institute of Technology...
Page 168
Appendix A.12 Copyright of integrated software gcc-library 4.7.2 GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
Page 169
Appendix A.12 Copyright of integrated software When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library. The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom.
Page 170
Appendix A.12 Copyright of integrated software contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does. 1.
Page 171
Appendix A.12 Copyright of integrated software Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a library.
Page 172
Appendix A.12 Copyright of integrated software containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.) b) Use a suitable shared library mechanism for linking with the Library.
Page 173
Appendix A.12 Copyright of integrated software You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License. 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the...
Page 174
Appendix A.12 Copyright of integrated software PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY...
Page 175
Appendix A.12 Copyright of integrated software Copyright (C) 2009 Free Software Foundation, Inc. <http://fsf.org/> Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. This GCC Runtime Library Exception ("Exception") is an additional permission under section 7 of the GNU General Public License, version 3 ("GPLv3").
Page 176
Appendix A.12 Copyright of integrated software gzip 1.4 GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/> Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The GNU General Public License is a free, copyleft license for software and other kinds of works.
Page 177
Appendix A.12 Copyright of integrated software TERMS AND CONDITIONS 0. Definitions. "This License" refers to version 3 of the GNU General Public License. "Copyright" also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. "The Program" refers to any copyrightable work licensed under this License. Each licensee is addressed as "you".
Page 178
Appendix A.12 Copyright of integrated software the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work. The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source.
Page 179
Appendix A.12 Copyright of integrated software b) The work must carry prominent notices stating that it is released under this License and any conditions added under section This requirement modifies the requirement in section 4 to "keep intact all notices". c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy.
Page 180
Appendix A.12 Copyright of integrated software A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need not be included in conveying the object code work. A "User Product" is either (1) a "consumer product", which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling.
Page 181
Appendix A.12 Copyright of integrated software b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version;...
Page 182
Appendix A.12 Copyright of integrated software permission to propagate or modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so. 10.
Page 183
Appendix A.12 Copyright of integrated software If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it.
Page 184
Appendix A.12 Copyright of integrated software Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version. 15. Disclaimer of Warranty. THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
Page 185
Appendix A.12 Copyright of integrated software <program> Copyright (C) <year> <name of author> This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details.
Page 186
Appendix A.12 Copyright of integrated software libcurl 7.40.0 COPYRIGHT AND PERMISSION NOTICE Copyright (c) 1996 - 2015, Daniel Stenberg, <daniel@haxx.se>. All rights reserved. Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
Page 187
Appendix A.12 Copyright of integrated software with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights. We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library.
Page 188
Appendix A.12 Copyright of integrated software 0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called "this License").
Page 189
Appendix A.12 Copyright of integrated software the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you;...
Page 190
Appendix A.12 Copyright of integrated software 6. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications.
Page 191
Appendix A.12 Copyright of integrated software 8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License.
Page 192
Appendix A.12 Copyright of integrated software of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation. 14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission.
Page 193
Appendix A.12 Copyright of integrated software You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the library, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a library for tweaking knobs) written by James Random Hacker.
Page 194
Appendix A.12 Copyright of integrated software Copyright (c) 1996, David Mazieres <dm@uun.org> Copyright (c) 2008, Damien Miller <djm@openbsd.org> Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
Page 195
Appendix A.12 Copyright of integrated software Some devices are designed to deny users access to install or run modified versions of the software inside them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting users' freedom to change the software.
Page 196
Appendix A.12 Copyright of integrated software A "Standard Interface" means an interface that either is an official standard defined by a recognized standards body, or, in the case of interfaces specified for a particular programming language, one that is widely used among developers working in that language.
Page 197
Appendix A.12 Copyright of integrated software disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures. 4. Conveying Verbatim Copies. You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice;...
Page 198
Appendix A.12 Copyright of integrated software customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge. c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source.
Page 199
Appendix A.12 Copyright of integrated software Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is publicly documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying.
Page 200
Appendix A.12 Copyright of integrated software You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11).
Page 201
Appendix A.12 Copyright of integrated software be infringed only as a consequence of further modification of the contributor version. For purposes of this definition, "control" includes the right to grant patent sublicenses in a manner consistent with the requirements of this License. Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its...
Page 202
Appendix A.12 Copyright of integrated software Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a work licensed under version 3 of the GNU Affero General Public License into a single combined work, and to convey the resulting work.
Page 203
Appendix A.12 Copyright of integrated software If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program.
Page 204
Appendix A.12 Copyright of integrated software The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.
Page 205
Appendix A.12 Copyright of integrated software For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent case is that a free library does the same job as widely used non-free libraries.
Page 206
Appendix A.12 Copyright of integrated software 2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library.
Page 207
Appendix A.12 Copyright of integrated software If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code.
Page 208
Appendix A.12 Copyright of integrated software d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place. e) Verify that the user has already received a copy of these materials or that you have already sent this user a copy.
Page 209
Appendix A.12 Copyright of integrated software If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims;...
Page 210
Appendix A.12 Copyright of integrated software linux 3.8.13 NOTE! This copyright does *not* cover user programs that use kernel services by normal system calls - this is merely considered normal use of the kernel, and does *not* fall under the heading of "derived work". Also note that the GPL below is copyrighted by the Free Software Foundation, but the instance of code that it refers to (the Linux kernel) is copyrighted by me and others who actually wrote...
Page 211
Appendix A.12 Copyright of integrated software The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License.
Page 212
Appendix A.12 Copyright of integrated software In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3.
Page 213
Appendix A.12 Copyright of integrated software license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.
Page 214
Appendix A.12 Copyright of integrated software END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.
Page 215
Appendix A.12 Copyright of integrated software Lua is licensed under the terms of the MIT license reproduced below. This means that Lua is free software and can be used for both academic and commercial purposes at absolutely no cost. For details and rationale, see http://www.lua.org/license.html . =============================================================================== Copyright (C) 1994-2008 Lua.org, PUC-Rio.
Page 216
Appendix A.12 Copyright of integrated software Copyright (C) 1994-2008 Lua.org, PUC-Rio. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:...
Page 217
Appendix A.12 Copyright of integrated software THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Page 218
Appendix A.12 Copyright of integrated software CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL CMU OR THE REGENTS OF THE UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION...
Page 219
Appendix A.12 Copyright of integrated software * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Page 220
Appendix A.12 Copyright of integrated software ---- Part 7: Fabasoft R&D Software GmbH & Co KG copyright notice (BSD) ----- Copyright (c) Fabasoft R&D Software GmbH & Co KG, 2003 oss@fabasoft.com Author: Bernhard Penz <bernhard.penz@fabasoft.com> Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this...
Page 221
Appendix A.12 Copyright of integrated software written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Page 222
Appendix A.12 Copyright of integrated software Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.
Page 223
Appendix A.12 Copyright of integrated software which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Page 224
Appendix A.12 Copyright of integrated software 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein.
Page 225
Appendix A.12 Copyright of integrated software 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS"...
Page 226
Appendix A.12 Copyright of integrated software Yoyodyne, Inc., hereby disclaims all copyright interest in the program 'Gnomovision' (which makes passes at compilers) written by James Hacker. signature of Ty Coon, 1 April 1989 Ty Coon, President of Vice This General Public License does not permit incorporating your program into proprietary programs.
Page 227
Appendix A.12 Copyright of integrated software * apply to all code found in this distribution, be it the RC4, RSA, * lhash, DES, etc., code; not just the SSL code. The SSL documentation * included with this distribution is covered by the same copyright terms * except that the holder is Tim Hudson (tjh@cryptsoft.com).
Page 228
Appendix A.12 Copyright of integrated software stp-engine GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
Page 229
Appendix A.12 Copyright of integrated software Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program).
Page 230
Appendix A.12 Copyright of integrated software b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium...
Page 231
Appendix A.12 Copyright of integrated software system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.
Page 232
Appendix A.12 Copyright of integrated software To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found.
Page 233
Appendix A.12 Copyright of integrated software The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.
Page 234
Appendix A.12 Copyright of integrated software programs to change the free libraries that are incorporated in them. (We have not seen how to achieve this as regards changes in header files, but we have achieved it as regards changes in the actual functions of the Library.) The hope is that this will lead to faster development of free libraries.
Page 235
Appendix A.12 Copyright of integrated software d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply...
Page 236
Appendix A.12 Copyright of integrated software When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library.
Page 237
Appendix A.12 Copyright of integrated software 7. You may place library facilities that are a work based on the Library side- by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things: a) Accompany the combined library with a copy of the same work...
Page 238
Appendix A.12 Copyright of integrated software distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 13.
Page 239
Appendix A.12 Copyright of integrated software This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public License for more details.
Page 240
Appendix A.12 Copyright of integrated software When we speak of free software, we are referring to freedom, not price. General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs;...
Page 241
Appendix A.12 Copyright of integrated software 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating...
Page 242
Appendix A.12 Copyright of integrated software form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.
Page 243
Appendix A.12 Copyright of integrated software 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
Page 244
Appendix A.12 Copyright of integrated software suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case, based on the explanations below. When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish);...
Page 245
Appendix A.12 Copyright of integrated software In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software. example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.
Page 246
Appendix A.12 Copyright of integrated software c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other...
Page 247
Appendix A.12 Copyright of integrated software However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License.
Page 248
Appendix A.12 Copyright of integrated software include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
Page 249
Appendix A.12 Copyright of integrated software system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
Page 250
Appendix A.12 Copyright of integrated software <one line to give the library's name and a brief idea of what it does.> Copyright (C) <year> <name of author> This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation;...
Page 251
Appendix A.12 Copyright of integrated software For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.
Page 252
Appendix A.12 Copyright of integrated software c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide...
Page 253
Appendix A.12 Copyright of integrated software 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License.
Page 254
Appendix A.12 Copyright of integrated software decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
Page 255
Appendix A.12 Copyright of integrated software The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program.
Page 256
GPL and LGPL. You may obtain the complete corresponding source code from us for a period of three years after our last shipment of this product by sending a request to: Hirschmann Automation and Control GmbH 3rd Level Support Stuttgarter Str. 45-51...
Page 257
Appendix A.13 Abbreviations A.13 Abbreviations AutoConfiguration Adapter Access Control List BOOTP Bootstrap Protocol Command Line Interface DHCP Dynamic Host Configuration Protocol Forwarding Database Graphic user interface HTTP Hypertext Transfer Protocol HTTPS Hypertext Transfer Protocol Secure ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers Internet Protocol...
Page 258
Readers’ Comments B Readers’ Comments What is your opinion of this manual? We are always striving to provide as comprehensive a description of our product as possible, as well as important information that will ensure trouble-free operation. Your comments and suggestions help us to further improve the quality of our documentation.
Page 259
Please fill out and return this page as a fax to the number +49 (0)7127 14-1600 or by post to Hirschmann Automation and Control GmbH Department 01RD-NT Stuttgarter Str. 45-51 72654 Neckartenzlingen UM Configuration GECKO Release 1.0 03/2015...
Page 260
Readers’ Comments UM Configuration GECKO Release 1.0 03/2015...
Page 261
Further Support C Further Support Technical Questions For technical questions, please contact any Hirschmann dealer in your area or Hirschmann directly. You will find the addresses of our partners on the Internet at http://www.hirschmann.com Contact our support at https://hirschmann-support.belden.eu.com...
Page 262
Further Support With the Hirschmann Competence Center, you have decided against making any compromises. Our client-customized package leaves you free to choose the service components you want to use. Internet: http://www.hicomcenter.com UM Configuration GECKO Release 1.0 03/2015...
Page 263
Further Support UM Configuration GECKO Release 1.0 03/2015...
Need help?
Do you have a question about the gecko 4tx and is the answer not in the manual?
Questions and answers