Hirschmann RS20 Reference Manual

Hirschmann RS20 Reference Manual

Industrial ethernet switch web-based interface
Hide thumbs Also See for RS20:

Advertisement

Reference Manual
Web-based Interface
Industrial ETHERNET Switch
RS20
RM Web L2B
Technical Support
Release 4.2 07/08
HAC-Support@hirschmann.de

Advertisement

Table of Contents
loading

Summary of Contents for Hirschmann RS20

  • Page 1 Reference Manual Web-based Interface Industrial ETHERNET Switch RS20 RM Web L2B Technical Support Release 4.2 07/08 HAC-Support@hirschmann.de...
  • Page 2 This publication has been created by Hirschmann Automation and Control GmbH according to the best of our knowledge. Hirschmann reserves the right to change the con- tents of this manual without prior notice. Hirschmann can give no guarantee in respect of the correctness or accuracy of the details in this publication.
  • Page 3: Table Of Contents

    Content Content Content About this Manual Opening the Web-based Interface Basic Settings System Network Software 2.3.1 Update via file selection 2.3.2 tftp update Port Configuration Load/Save 2.5.1 Loading the configuration 2.5.2 Saving the configuration 2.5.3 URL 2.5.4 Deleting a configuration 2.5.5 Using the AutoConfiguration Adapter (ACA) Restart Security...
  • Page 4 Content Switching Switching Global Filters for MAC addresses Multicasts 5.3.1 Global settings 5.3.2 Unknown Multicasts 5.3.3 Known Multicasts 5.3.4 Settings per port (table) QoS/Priority Global Port configuration 6.2.1 Entering the port priority 802.1D/p Mapping IP DSCP mapping Redundancy HIPER-Ring 7.1.1 Configuring HIPER-Ring Version 1 7.1.2 Configuring HIPER-Ring Version 2 (MRP Draft) Diagnostics Event log...
  • Page 5 Content 8.6.4 Configuring traps Alarms (Traps) Report Self-test Advanced DHCP Relay Agent Technical Data Reader´s comments Index Further support RM Web L2B Release 4.2 07/08...
  • Page 6 Content RM Web L2B Release 4.2 07/08...
  • Page 7: About This Manual

    About this Manual About this Manual The "Web-based Interface" reference manual contains detailed information on using the Web interface to operate the individual functions of the device. The "Command Line Interface" reference manual contains detailed informa- tion on using the Command Line Interface to operate the individual functions of the device.
  • Page 8 About this Manual RM Web L2B Release 4.2 07/08...
  • Page 9: Key

    The designations used in this manual have the following meanings: List Work step Subheading Link Indicates a cross-reference with a stored link Note: A note emphasizes an important fact or draws your attention to a dependency. ASCII representation in user interface Courier Symbols used: Router with firewall...
  • Page 10 A random computer Configuration Computer Server PLC - Programmable logic controller I/O - Robot RM Web L2B Release 4.2 07/08...
  • Page 11: Opening The Web-Based Interface

    Opening the Web-based Interface 1 Opening the Web-based Inter- face To open the Web-based interface, you will need a Web browser (a program that can read hypertext), for example Mozilla Firefox version 1 or later, or Microsoft Internet Explorer version 6 or later. Note: The Web-based interface uses the “Java™...
  • Page 12 Opening the Web-based Interface Establish the connection by entering the IP address of the device which you want to administer via the Web-based management in the address field of the Web browser. Enter the address in the following form: http://xxx.xxx.xxx.xxx The login window appears on the screen.
  • Page 13 Opening the Web-based Interface Note: The changes you make in the dialogs are copied to the device when you click on “Write”. Click on “Load” to update the display. Note: You can block your access to the device by entering an incorrect con- figuration.
  • Page 14 Opening the Web-based Interface The menu section displays the menu items. By placing the mouse pointer in the menu section and clicking the right mouse button you can use “Back” to return to a menu item you have already selected, or “Forward” to jump to a menu item you have already selected.
  • Page 15: Basic Settings

    Basic Settings 2 Basic Settings The basic settings menu contains the dialogs, displays and tables for basic settings configuration: System Network Software Port configuration Load/Save Restart RM Web L2B Release 4.2 07/08...
  • Page 16: System

    Basic Settings 2.1 System 2.1 System The "System submenu in the basic settings menu is structured as follows: Device status System data Device view Reloading data Figure 4: "System" submenu Device status This section of the website provides information on the device status and the alarm state of the device.
  • Page 17 Basic Settings 2.1 System Time of the oldest existing alarm Cause of the oldest existing alarm Symbol indicates the Device Status Figure 5: Device status and alarm display System data This area of the website displays the system parameters of the device. Here you can change, –...
  • Page 18 Basic Settings 2.1 System Module present Empty slot Module was removed. Click this check mark to define this slot as an empty slot. Figure 6: Availability of the media modules Device view The device view shows the device with the current configuration. The symbols underneath the device view represent the status of the individual ports.
  • Page 19 Basic Settings 2.1 System Meaning of the symbols: The port (10, 100 Mbit/s, 1, 10 Gbit/s) is enabled and the connection is OK. The port is disabled by the management and it has a connection. The port is disabled by the management and it has no connection.
  • Page 20: Network

    Basic Settings 2.2 Network 2.2 Network With the Basics:Network dialog you define the source from which the device gets its IP parameters after starting, and you assign the IP parameters and VLAN ID and configure the HiDiscovery access. Figure 9: Network parameters dialog Under "Mode", enter where the device is to obtain its IP parameters: In the BOOTP mode, the configuration is via a BOOTP or DHCP serv- er on the basis of the MAC address of the device...
  • Page 21 Basic Settings 2.2 Network You enter the name applicable to the DHCP protocol in the "Name" line in the system dialog of the Web-based interface. The HiDiscovery protocol allows you to assign an IP address to the device on the basis of its MAC address. Activate the HiDiscovery protocol if you want to assign an IP address to the device from your PC with the enclosed HiDiscovery software (setting on delivery: active).
  • Page 22: Software

    Basic Settings 2.3 Software 2.3 Software The software dialog enables you to carry out a software update of the device via tftp or file selection. Figure 10: Software dialog 2.3.1 Update via file selection For an update via a file selection window, the device software must be on a drive that you can access via your PC.
  • Page 23: Tftp Update

    Basic Settings 2.3 Software Click on "Update" to transfer the software to the device. The end of the update is indicated by one of the following messages: Update completed successfully. Update failed. Reason: incorrect file. Update failed. Reason: error when saving. After loading successfully, activate the new software: Select the dialog Basic Settings: Restart and perform a cold start.
  • Page 24: Port Configuration

    Basic Settings 2.4 Port Configuration 2.4 Port Configuration This configuration table allows you to configure every port of the device. In the “Port Name” column, you can enter a name for every port. In the “Ports on” column, you can switch on the port by marking it here. In the “Propagate connection error ”...
  • Page 25 Basic Settings 2.4 Port Configuration Note: . The following settings are required for the ring ports in a HIPER-Ring: Bit rate 100 Mbit/s 1000 Mbit/s Autonegotiation (automatic configuration) Port Duplex Full – Table 2: Port settings for ring ports Figure 11: Port configuration table dialog RM Web L2B Release 4.2 07/08...
  • Page 26: Load/Save

    Basic Settings 2.5 Load/Save 2.5 Load/Save With this dialog you can: load a configuration, save a configuration, enter a URL, restore the delivery configuration, use the ACA for configuring, Figure 12: Load/store dialog RM Web L2B Release 4.2 07/08...
  • Page 27: Loading The Configuration

    Basic Settings 2.5 Load/Save 2.5.1 Loading the configuration In the "Load" frame, you have the option to load a configuration saved on the device, load a configuration stored under the specified URL, load a configuration stored on the specified URL and save it on the device, load a configuration saved on a PC in binary format.
  • Page 28: Url

    Basic Settings 2.5 Load/Save If you change the current configuration (for example, by switching a port off), the load/save symbol in the menu area changes from a disk symbol into a yellow triangle. After saving the configuration, the load/save symbol changes back into the disk symbol.
  • Page 29: Using The Autoconfiguration Adapter (Aca)

    Basic Settings 2.5 Load/Save 2.5.5 Using the AutoConfiguration Adapter (ACA) The ACAs are devices for saving the configuration data of a device. In the case of a device failure, an ACA enables the configuration data to be trans- ferred easily by means of a substitute device of the same type. Note: If you replace a device with DIP switches, please ensure that the DIP switch settings are identical.
  • Page 30 Basic Settings 2.5 Load/Save Status Meaning notPresent No ACA present. The configuration data from the ACA and the device are consistent. removed The ACA has been removed after booting. notInSync The configuration data from the ACA and the device are not consistent. outOfMemory The local configuration data is too extensive to be stored on the ACA.
  • Page 31: Restart

    Basic Settings 2.6 Restart 2.6 Restart With this dialog you can: Cold start the device. In a cold start, the device reloads the software from the non-volatile memory, restarts, and performs a self-test. Warm start the device. In this case the device checks the software in the volatile memory and restarts.
  • Page 32 Basic Settings 2.6 Restart Figure 13: Restart dialog RM Web L2B Release 4.2 07/08...
  • Page 33: Security

    Security 3 Security The security menu contains the dialogs, displays and tables for configuring the security settings: Password SNMPv1/v2 access Web access RM Web L2B Release 4.2 07/08...
  • Page 34: Password / Snmp

    Security 3.1 Password / SNMP 3.1 Password / SNMP This dialog gives you the option of changing the read and read/write pass- words for access to the device via the Web-based interface/CLI/SNMP. Please note that passwords are case-sensitive. For security reasons, the read password and the read/write password must not be identical.
  • Page 35 Security 3.1 Password / SNMP Note: After changing the password for write access, restart the Web interface in order to access the device. Note: For security reasons, the passwords are not displayed. Make a note of every change! You cannot access the device without a valid password! Note: For security reasons, SNMP version 3 encrypts the password.
  • Page 36: Snmpv1/V2 Access Setting

    Security 3.2 SNMPv1/v2 Access Setting 3.2 SNMPv1/v2 Access Setting With this dialog you can select access via SNMPv1 or SNMPv2. In the state on delivery, both protocols are activated. You can thus manage the device with HiVision and communicate with earlier versions of SNMP. Note: For displaying the entries of the dialog you need read-write access.
  • Page 37 Security 3.2 SNMPv1/v2 Access Setting Binary notation of the mask 255.255.255.240: 1111 1111 1111 1111 1111 1111 1111 0000 mask bits Binary notation of the IP address 172.168.23.20: 1010 1100 1010 1000 0001 0111 0001 0100 The binary representation of the mask with the IP address yields an address range of: 1010 1100 1010 1000 0001 0111 0001 0000 bis...
  • Page 38 Security 3.2 SNMPv1/v2 Access Setting Figure 15: SNMPv1/v2 access dialog RM Web L2B Release 4.2 07/08...
  • Page 39: Web Access

    Security 3.3 Web Access 3.3 Web Access This dialog allows you to switch off the Web server on the device. Figure 16: Web access dialog 3.3.1 Description of Web access The Web server of the device allows you to configure the device by using the Web-based interface.
  • Page 40 Security 3.3 Web Access After the Web server has been switched off, it is no longer possible to login via a Web browser. The login in the open browser window remains active. Note: The Command Line Interface and this dialog allow you to reactivate the Telnet server.
  • Page 41: Time

    Time 4 Time With this dialog you can enter time-related settings independently of the time synchronization protocol selected. The "IEEE 1588 time" displays the time determined using PTP. The "SNTP time" displays the time with reference to Universal Time Co- ordinated (UTC).
  • Page 42 Time Note: There may be a maximum of one device with an enabled PTP function and enabled SNTP function in an SNTP cascade. Figure 17: Time dialog RM Web L2B Release 4.2 07/08...
  • Page 43: Sntp Configuration

    Time 4.1 SNTP configuration 4.1 SNTP configuration The Simple Network Time Protocol (SNTP) enables you to synchronize the system time in your network. The device supports the SNTP Server and SNTP Client functions. The SNTP server makes the UTC (Universal Time Coordinated) available. UTC is the time relating to the coordinated world time measurement.
  • Page 44 Time 4.1 SNTP configuration IP destination Send SNTP packets address periodically to 0.0.0.0 Nobody Unicast Unicast 224.0.1.1 Multicast 255.255.255.255 Broadcast Table 4: Periodic sending of SNTP packets In "Anycast send interval" you specify the interval at which the device sends SNTP packets (valid entries: 1 second to 3600 seconds, on deliv- ery: 120 seconds).
  • Page 45 Time 4.1 SNTP configuration With "Disable client after successful synchronization" you disable fur- ther time synchronizations once the device has synchronized its time with the server. Note: For the most accurate system time distribution possible, avoid having network components (routers,switches, hubs) which do not support SNTP in the signal path between the SNTP server and the SNTP client.
  • Page 46: Ptp Configuration

    Time 4.2 PTP configuration 4.2 PTP configuration Precise time management is required for running time-critical applications via a LAN. The IEEE 1588 standard with the Precision Time Protocol (PTP) describes a procedure that assumes one clock is the most accurate and thus enables precise synchronization of all clocks in an LAN.
  • Page 47 Time 4.2 PTP configuration SyncUpperBound: Top PTP synchronization threshold value, specified in nanoseconds. If the sum of (reference time - local time) is greater than the value of the top PTP synchronization threshold, then the local clock is deemed as not being synchronous with the reference clock. Subdomain Name: Name of the PTP subdomain to which the local clock belongs.
  • Page 48 Time 4.2 PTP configuration Figure 19: PTP-Global (with MS 20/30 and PowerMICE) RM Web L2B Release 4.2 07/08...
  • Page 49: Switching

    Switching 5 Switching The switching menu contains the dialogs, displays and tables for configuring the security settings: Switching Global Filters for MAC addresses Rate Limiter Multicasts RM Web L2B Release 4.2 07/08...
  • Page 50: Switching Global

    Switching 5.1 Switching Global 5.1 Switching Global This dialog is used to display the MAC address of the device enter the aging time for all dynamic entries in the range from 15 to 3825 s (unit: 1 s; default setting: 30 s). Figure 20: Switching Global RM Web L2B Release 4.2 07/08...
  • Page 51: Filters For Mac Addresses

    Switching 5.2 Filters for MAC addresses 5.2 Filters for MAC addresses The filter table for MAC addresses is used to display filters. Each row repre- sents one filter. Filters specify the way in which data packets are sent. They are created automatically by the device (learned status). Data packets whose destination address is entered in the table are sent from the receiving port to the ports marked in the table.
  • Page 52 Switching 5.2 Filters for MAC addresses Figure 21: Filter table dialog RM Web L2B Release 4.2 07/08...
  • Page 53: Multicasts

    Switching 5.3 Multicasts 5.3 Multicasts The Internet Group Management Protocol (IGMP) describes the distribution of Multicast information between routers and terminal devices on Layer 3. Routers with an active IGMP function periodically send queries () to find out which IP Multicast group members are connected to the LAN. Multicast group members reply with a Report message.
  • Page 54: Global Settings

    Switching 5.3 Multicasts Figure 22: IGMP/Unknown Multicasts dialog 5.3.1 Global settings "IGMP Snooping" allows you to enable IGMP Snooping globally for the entire device. If IGMP Snooping is disabled, then the device does not evaluate Query and Report packets received, and it sends (floods) received data packets with a Multicast address as the destination address to all ports.
  • Page 55: Unknown Multicasts

    Switching 5.3 Multicasts 5.3.2 Unknown Multicasts In this frame you can determine how the device in IGMP mode sends packets with an unknown MAC/IP Multicast address that was not learned through IGMP Snooping. "Send to Query Ports". The device sends the packets with an unknown MAC/IP Multicast address to all query ports.
  • Page 56: Settings Per Port (Table)

    Switching 5.3 Multicasts "Send to registered ports". The device sends the packets with a known MAC/IP Multicast address to registered ports. The advantage of this setting, which deviates from the standard, is that it uses the available bandwidth optimally through direct distribution. It re- quires additional port settings.
  • Page 57 Switching 5.3 Multicasts enabling "IGMP Forward All" per port on the ring ports. RM Web L2B Release 4.2 07/08...
  • Page 58 Switching 5.3 Multicasts RM Web L2B Release 4.2 07/08...
  • Page 59: Qos/Priority

    QoS/Priority 6 QoS/Priority The device enables you to set how it evaluates the QoS/prioritizing information of incoming data packets: VLAN priority based on IEEE 802.1Q/ 802.1D (Layer 2) Type of Service (ToS) or DiffServ (DSCP) for IP packets (Layer 3) which QoS/prioritizing information it writes to outgoing data packets (e.g.
  • Page 60: Global

    QoS/Priority 6.1 Global 6.1 Global With this dialog you can: enter the IP-DSCP value for management packets in the range 0 to 63 (default setting: 0 (be/cs0)). In order for you to have full access to the management of the device, even when there is a high network load, the device enables you to prioritize management packets.
  • Page 61 QoS/Priority 6.1 Global In VLAN priority remarking, the device modifies the VLAN priority of the IP packets if the packets are to be sent with a VLAN tag. Based on the traffic class to which the IP packet was assigned (see above), the device assigns the new VLAN priority to the IP packet in accordance with table...
  • Page 62: Port Configuration

    QoS/Priority 6.2 Port configuration 6.2 Port configuration This dialog allows you to configure the ports. You can: assign a port priority to a port, Parameter Meaning Module Module of the device on which the port is located. Port Port to which this entry applies. Port priority Enter the port priority.
  • Page 63: Entering The Port Priority

    QoS/Priority 6.2 Port configuration 6.2.1 Entering the port priority Double-click on a cell in the "Port priority" column and enter the priority (0-7). According to the priority entered, the device assigns the data packets that it receives at this port to a traffic class (see table Requirement: setting in the Global:Trust Mode dialog: untrusted...
  • Page 64: D/P Mapping

    QoS/Priority 6.3 802.1D/p Mapping 6.3 802.1D/p Mapping The 802.1D/p mapping table allows you to assign a traffic class to every VLAN priority. Figure 25: 802.1D/p mapping table Enter the desired value from 0 to 3 in the Traffic Class field for every VLAN priority.
  • Page 65 QoS/Priority 6.3 802.1D/p Mapping VLAN Traffic class IEEE 802.1D traffic type priority (default setting) Best effort (default) Background Standard Excellent effort (business critical) Controlled load (streaming multimedia) Video, less than 100 milliseconds of latency and jitter Voice, less than 10 milliseconds of latency and jitter Network control reserved traffic Table 8: Assigning the VLAN priority to the four traffic classes Note: Network protocols and redundancy mechanisms use the highest traffic...
  • Page 66: Ip Dscp Mapping

    QoS/Priority 6.4 IP DSCP mapping 6.4 IP DSCP mapping The IP DSCP mapping table allows you to assign a traffic class to every DSCP value. Enter the desired value from 0 to 3 in the Traffic Class field for every DSCP value (0-63).
  • Page 67 QoS/Priority 6.4 IP DSCP mapping Assured Forwarding (AF): Provides a differentiated schema for handling different data traffic (RFC 2597). Default Forwarding/Best Effort: No particular prioritizing. DSCP Value DSCP Name Traffic Class (default setting) Best Effort /CS0 9,11,13,15 10,12,14 AF11,AF12,AF13 17,19,21,23 18,20,22 AF21,AF22,AF23 25,27,29,31...
  • Page 68 QoS/Priority 6.4 IP DSCP mapping RM Web L2B Release 4.2 07/08...
  • Page 69: Redundancy

    Redundancy 7 Redundancy The device contains a redundancy function: HIPER-Ring RM Web L2B Release 4.2 07/08...
  • Page 70: Hiper-Ring

    HIPER-Ring. Within a HIPER-Ring Version 1, any combination of RS1, RS2-../.., RS2- 16M, RS2-4R, RS20, RS30, RS40, MICE, PowerMICE, MS 20, MS 30, RSR20, RSR30, MACH 1000, MACH 3000 and MACH 4000 is possible.
  • Page 71: Configuring Hiper-Ring Version

    Redundancy 7.1 HIPER-Ring 7.1.1 Configuring HIPER-Ring Version 1 Set up the network to meet your requirements. Note: Before you connect the redundant line, you must complete the configuration of HIPER-Ring Version 1. You thus avoid loops during the configuration phase. Note: Configure each HIPER-Ring device.
  • Page 72 Redundancy 7.1 HIPER-Ring Display in “Operation” field: Active: this port is switched on and has a link. Inactive: this port is switched off or has no link. At exactly one device, you switch the redundancy manager on at the ends of the line.
  • Page 73 Redundancy 7.1 HIPER-Ring Figure 28: Display: Information RM Web L2B Release 4.2 07/08...
  • Page 74: Configuring Hiper-Ring Version 2 (Mrp Draft)

    Redundancy 7.1 HIPER-Ring 7.1.2 Configuring HIPER-Ring Version 2 (MRP Draft) Set up the network to meet your requirements. Note: Before you connect the redundant line, you must complete the configuration of HIPER-Ring Version 2. You thus avoid loops during the configuration phase. Note: Configure each HIPER-Ring device.
  • Page 75 “Configuration Redundancy Manager” frame. All Hirschmann devices that support the HIPER-Ring Version 2 (MRP Draft) also support the advanced mode. Activate the function in the “Operation” frame.
  • Page 76 Redundancy 7.1 HIPER-Ring Now you connect the line to the ring. To do this, you connect the two devices to the ends of the line using their ring ports. The displays in the “Information” frame mean: – „“Redundancy guaranteed”: One of the lines affected by the function can fail, whereby the redundant line will then take over the function of the failed line.
  • Page 77: Diagnostics

    Diagnostics 8 Diagnostics The diagnostics menu contains the following tables and dialogs: Event log Ports (statistics, utilization, SFP modules) Topology discovery Port mirroring Device status Signal contact Alarms (traps) Report (log file, system information) IP address conflict detection In service situations, they provide the technician with the necessary information.
  • Page 78: Event Log

    Diagnostics 8.1 Event log 8.1 Event log The table under Event Log lists all the events with a time stamp. The "Delete" button allows you to delete the contents of the Event Log window. Figure 31: Event log table RM Web L2B Release 4.2 07/08...
  • Page 79: Ports

    Diagnostics 8.2 Ports 8.2 Ports The port menu contains displays and tables for the individual ports: Statistics table Utilization SFP modules 8.2.1 Statistics table This table shows you the contents of various event counters. In the Restart menu item, you can reset all the event counters to zero using "Warm start", "Cold start"...
  • Page 80: Utilization

    Diagnostics 8.2 Ports Figure 32: Port statistics table 8.2.2 Utilization This table displays the network load of the individual ports. In the “Upper Threshold[%]” column you enter the top threshold value for net- work load. If this threshold value is exceeded, the device sets a check mark in the “Alarm”...
  • Page 81: Sfp Modules

    Diagnostics 8.2 Ports Figure 33: Network load dialog 8.2.3 SFP modules The SFP status display allows you to look at the current connections to the SFP modules and their properties. The properties include: module type support provided in media module temperature in degrees Celsius transmission power in milliwatts reception power in milliwatts...
  • Page 82 Diagnostics 8.2 Ports Figure 34: SFP Modules dialog RM Web L2B Release 4.2 07/08...
  • Page 83: Topology Discovery

    Diagnostics 8.3 Topology Discovery 8.3 Topology Discovery This dialog allows you to switch on/off the topology discovery function (LL- DP). The topology table shows you the collected information for neighboring devices. This information enables the network management station to map the structure of your network.
  • Page 84 Diagnostics 8.3 Topology Discovery devices without active topology discovery function are connected to a port, the topology table hides the devices without active topology discovery. only devices without active topology discovery are connected to a port, the table will contain one line for this port to represent all devices. This line contains the number of connected devices MAC addresses of devices that the topology table hides for the sake of clarity, are located in the address table (FDB),...
  • Page 85: Port Mirroring

    Diagnostics 8.4 Port Mirroring 8.4 Port Mirroring This dialog allows you to configure and activate the port mirroring function of the device. In port mirroring, the valid data packets of one port, the source port, are cop- ied to another, the destination port. The data traffic at the source port is not influenced by port mirroring.
  • Page 86 Diagnostics 8.4 Port Mirroring Figure 36: Port Mirroring dialog RM Web L2B Release 4.2 07/08...
  • Page 87: Device Status

    Diagnostics 8.5 Device Status 8.5 Device Status The device status provides an overview of the overall condition of the device. Many process visualization systems record the device status for a device in order to present its condition in graphic form. Figure 37: Device State dialog (for power MICE) In the "Monitoring"...
  • Page 88 Diagnostics 8.5 Device Status The events which can be selected are: Name Meaning Power supply ... Monitor/ignore supply voltage(s). Temperature Monitor/ignore the temperature threshold setting (see on page 16 „Sys- tem“) for temperatures that are too high/too low. Module removal Monitor/ignore the removal of a module (for modular devices).
  • Page 89: Signal Contact

    Diagnostics 8.6 Signal contact 8.6 Signal contact The signal contacts are used for controlling external devices by manually setting the signal contacts, monitoring the functions of the device, reporting the device state of the device. 8.6.1 Manual setting Select the tab page "Alarm 1" or "Alarm 2" (for devices with two signal contacts).
  • Page 90 Diagnostics 8.6 Signal contact In the “Mode Signal contact” field, you select the “Monitoring correct operation” mode. In this mode the signal contacts monitor the functions of the device, thus enabling remote diagnosis. A break in contact is reported via the potential-free signal contact (relay contact, closed circuit): Error during self-test (the contact remains open).
  • Page 91: Device Status

    Diagnostics 8.6 Signal contact 8.6.3 Device status Select the tab page “Alarm 1” or “Alarm 2” (for devices with two signal contacts). In the “Mode Signal Contact” field, you select the “Device status” mode. In this mode, the signal contact is used to monitor the status of the device (see on page 87 „Device Status“) and thereby makes remote diagnosis possible.
  • Page 92: Alarms (Traps)

    Diagnostics 8.7 Alarms (Traps) 8.7 Alarms (Traps) This dialog allows you to determine which events trigger an alarm (trap) and where these alarms should be sent. Select „Create entry“. In the „Address“ column, enter the IP address of the management station to which the traps should be sent.
  • Page 93 Diagnostics 8.7 Alarms (Traps) Figure 39: Alarms dialog RM Web L2B Release 4.2 07/08...
  • Page 94: Report

    Diagnostics 8.8 Report 8.8 Report The following reports are available for the diagnostics: Log file The log file is an HTML file in which the device writes all the important device-internal events System information. The system information is an HTML file containing all system-relevant data.
  • Page 95: Self-Test

    Diagnostics 8.9 Self-test 8.9 Self-test This dialog allows you to activate/deactivate the RAM test when cold-starting the device. Deactivating the RAM tests shortens the booting time for a cold start of the device. Figure 40: Self-test dialog RM Web L2B Release 4.2 07/08...
  • Page 96 Diagnostics 8.9 Self-test RM Web L2B Release 4.2 07/08...
  • Page 97: Advanced

    Advanced 9 Advanced The advanced menu contains the dialogs, displays and tables for: DHCP Relay Agent RM Web L2B Release 4.2 07/08...
  • Page 98: Dhcp Relay Agent

    This results in the entry for the "Hardware address" in the DHCP server: B306000001000101000600806300061E In the "Option 82 on/off" column, you can switch this function on/off for each port. In the "Hirschmann Device" column, you mark the ports to which a Hirschmann device is connected. RM Web L2B Release 4.2 07/08...
  • Page 99 Advanced 9.1 DHCP Relay Agent Figure 41: DHCP Relay Agent dialog RM Web L2B Release 4.2 07/08...
  • Page 100 Advanced 9.1 DHCP Relay Agent RM Web L2B Release 4.2 07/08...
  • Page 101: A Technical Data

    Technical Data A Technical Data Switching Size of MAC address table 8000 (incl. static filters) Max. number of statically configured MAC address filters Max. number of MAC address filters learnable via GMRP/IGMP Snooping Max. length of over-long packets 1632 (from 03.0.00) RM Web L2B Release 4.2 07/08...
  • Page 102 Technical Data RM Web L2B Release 4.2 07/08...
  • Page 103: B Reader´s Comments

    Reader´s comments B Reader´s comments What is your opinion of this manual? We are always striving to provide as comprehensive a description of our product as possible, as well as important information that will ensure trouble-free operation. Your comments and sug- gestions help us to further improve the quality of our documentation.
  • Page 104 Zip code / City: Date / Signature: Dear User, Please fill out and return this page by fax to the number +49 (0)7127/14-1798 or by mail to Hirschmann Automation and Control GmbH Department AMM Stuttgarter Str. 45-51 72654 NeckartenzlingenGermany Germany RM Web L2B...
  • Page 105: Index

    Index C Index LLDP Login Aging time alarm Media module Assured Forwarding Multicast 44, 53 Auto configuration adapter Network load Broadcast Network Management Software Cable-Crossing Class Selector Option 82 Clock cold start Password 12, 34, 35 Configuration failure 72, 76 Port configuration Port mirroring Destination port...
  • Page 106 Index SNTP server Source port Statistics table Supply voltage Symbol System time Technical questions Time management Topology Training courses trap Trust mode TrustDot1p TrustIpDscp Type of Service Universal Time Coordinated Untrusted VLAN ID VLAN mapping 59, 64 VLAN priority Web-based Interface Web-based management Website Write access...
  • Page 107: D Further Support

    Further support D Further support Technical questions and training courses In the event of technical queries, please talk to the Hirschmann contract partner responsible for looking after your account or directly to the Hirschmann office. You can find the addresses of our contract partners on the Internet: www.hirschmann-ac.com.

Table of Contents