User`s manual
Table of Contents
Chapter 1 Introduction ...............................................................................................1-1
Overview .............................................................................................................................. 1-2
Package Checklist................................................................................................................. 1-2
Features ................................................................................................................................ 1-2
Chapter 2 Getting Started ..........................................................................................2-1
RS-232 Console Configuration (115200, None, 8, 1, VT100) ............................................. 2-2
Configuration using a Telnet Console .................................................................................. 2-5
Configuration using a Web Browser..................................................................................... 2-6
Disabling Telnet and Browser Access .................................................................................. 2-8
Chapter 3 Featured Functions...................................................................................3-1
Configuring Basic Settings................................................................................................... 3-2
Using Port Trunking ........................................................................................................... 3-19
The Port Trunking Concept..................................................................................... 3-19
Configuring SNMP............................................................................................................. 3-22
SNMP Read/Write Settings..................................................................................... 3-23
Using Communication Redundancy................................................................................... 3-26
Gigabit Ethernet Redundant Ring Capability (< 50 ms) ......................................... 3-26
The Turbo Ring Concept......................................................................................... 3-27
Configuring “Turbo Ring” and “Turbo Ring V2”................................................... 3-33
The Turbo Chain Concept................................................................................................... 3-39
The STP/RSTP Concept.......................................................................................... 3-43
Using Traffic Prioritization................................................................................................. 3-50
The Traffic Prioritization Concept .......................................................................... 3-51
Configuring Traffic Prioritization ........................................................................... 3-53
Using Virtual LAN ............................................................................................................. 3-56
The Virtual LAN (VLAN) Concept ........................................................................ 3-56
Configuring Virtual LAN........................................................................................ 3-58
Using Multicast Filtering.................................................................................................... 3-61
The Concept of Multicast Filtering ......................................................................... 3-61
Configuring IGMP Snooping.................................................................................. 3-64
Using Bandwidth Management .......................................................................................... 3-68
Using Port Access Control.................................................................................................. 3-68
Using Auto Warning........................................................................................................... 3-74
Configuring Email Warning.................................................................................... 3-74
Configuring Relay Warning.................................................................................... 3-77
Using Line-Swap-Fast-Recovery........................................................................................ 3-80
Using Set Device IP............................................................................................................ 3-80
Using Diagnosis.................................................................................................................. 3-85
Using Monitor .................................................................................................................... 3-88
Using the MAC Address Table........................................................................................... 3-89
Using Event Log................................................................................................................. 3-90
Using Syslog....................................................................................................................... 3-91
Using HTTPS/SSL ............................................................................................................. 3-92
Chapter 4 EDS Configurator GUI...............................................................................4-1
Starting EDS Configurator ................................................................................................... 4-2
Broadcast Search .................................................................................................................. 4-3