User`s manual

Table of Contents
Chapter 1 Introduction ...............................................................................................1-1
Overview .............................................................................................................................. 1-2
Package Checklist................................................................................................................. 1-2
Features ................................................................................................................................ 1-2
Industrial Networking Capability.............................................................................. 1-2
Designed for Industrial Applications......................................................................... 1-2
Useful Utility and Remote Configuration ................................................................. 1-3
Recommended Software and Accessories................................................................. 1-3
Chapter 2 Getting Started ..........................................................................................2-1
RS-232 Console Configuration (115200, None, 8, 1, VT100) ............................................. 2-2
Configuration using a Telnet Console .................................................................................. 2-5
Configuration using a Web Browser..................................................................................... 2-6
Disabling Telnet and Browser Access .................................................................................. 2-8
Chapter 3 Featured Functions...................................................................................3-1
Configuring Basic Settings................................................................................................... 3-2
System Identification................................................................................................. 3-2
Password ................................................................................................................... 3-3
Accessible IP............................................................................................................. 3-4
Port............................................................................................................................ 3-5
Network..................................................................................................................... 3-6
Time .......................................................................................................................... 3-8
System File Update—By Remote TFTP ................................................................. 3-10
System File Update—By Local Import/Export....................................................... 3-11
System File Update—By Backup Media ................................................................ 3-11
Restart ..................................................................................................................... 3-12
Factory Default........................................................................................................ 3-12
Using Port Trunking ........................................................................................................... 3-12
The Port Trunking Concept..................................................................................... 3-13
Configuring Port Trunking...................................................................................... 3-14
Configuring SNMP............................................................................................................. 3-15
SNMP Read/Write Settings..................................................................................... 3-16
Trap Settings ........................................................................................................... 3-17
Private MIB information......................................................................................... 3-17
Using Communication Redundancy................................................................................... 3-18
The Turbo Ring Concept......................................................................................... 3-18
Configuring “Turbo Ring” and “Turbo Ring V2”................................................... 3-23
The STP/RSTP Concept.......................................................................................... 3-27
Configuring STP/RSTP........................................................................................... 3-32
Using Traffic Prioritization................................................................................................. 3-34
The Traffic Prioritization Concept .......................................................................... 3-35
Configuring Traffic Prioritization ........................................................................... 3-37
Using Virtual LAN ............................................................................................................. 3-39
The Virtual LAN (VLAN) Concept ........................................................................ 3-39
Sample Applications of VLANs using the EDS-516A............................................ 3-42
Configuring Virtual LAN........................................................................................ 3-43
Using Multicast Filtering.................................................................................................... 3-46
The Concept of Multicast Filtering ......................................................................... 3-46