User’s Manual of IGS Series 1
User’s Manual of IGS Series Trademarks Copyright © PLANET Technology Corp. 2019. Contents are subject to revision without prior notice. PLANET is a registered trademark of PLANET Technology Corp. All other trademarks belong to their respective owners.
User’s Manual of IGS series TABLE OF CONTENTS 1. INTRODUCTION.................................................................................................................. 10 1.1 Packet Contents ................................................................................................................................................ 10 1.2 Product Description .........................................................................................................................................
User’s Manual of IGS series 4.2.1.4 Users Configuration ................................................................................................................................... 71 4.2.1.5 Privilege Levels ......................................................................................................................................... 74 4.2.1.6 NTP Configuration .................................................................................................................................
User’s Manual of IGS series 4.2.4.7 DHCP Detail Statistics ............................................................................................................................. 122 4.2.5 Industrial Protocol .............................................................................................................................................. 124 4.2.5.1 Protocol Configuration .......................................................................................................................
User’s Manual of IGS series 4.3.4.8 Port Status ............................................................................................................................................... 188 4.3.4.9 Port Statistics .......................................................................................................................................... 189 4.3.5 Multicast .....................................................................................................................................
User’s Manual of IGS series 4.3.12.2 GVRP Port Configuration ...................................................................................................................... 246 4.3.13 PTP.................................................................................................................................................................. 248 4.3.13.1 PTP Configuration ............................................................................................................................
User’s Manual of IGS series 4.5.3.2 Network Access Overview ....................................................................................................................... 308 4.5.3.3 Network Access Statistics........................................................................................................................ 310 4.5.4 Port Security ......................................................................................................................................................
User’s Manual of IGS series 4.8.1.3 Configuration Download .......................................................................................................................... 370 4.8.1.4 Configuration Upload ............................................................................................................................... 371 4.8.1.5 Configuration Activate.............................................................................................................................. 372 4.8.
User’s Manual of IGS series 1. INTRODUCTION Thank you for purchasing PLANET Industrial L2+ Multi-Port Gigabit Managed Ethernet Switches, such as IGS-10020MT, IGS-10080MFT, IGS-12040MT and IGS-20040MT.
User’s Manual of IGS series 1.2 Product Description PLANET Industrial L2+ Managed Switch is specially designed to build a full Gigabit backbone to transmit reliable and high-speed data in heavy industrial demanding environments and forward data to remote network through fiber optic cabling. It comes with an IP30 rugged case and redundant power system.
User’s Manual of IGS series Digital Input and Digital Output for External Alarm The Industrial L2+ Managed Switch supports Digital Input and Digital Output on its upper panel. The external alarm enables users to use Digital Input to detect external device’s status (such as door intrusion detector), and send event alarm to the administrators. The Digital Output could be used to alarm the administrators if the Industrial L2+ Managed Switch port is link-down, link-up or power-dead.
User’s Manual of IGS series IPv6/IPv4 Full-function Secure Switch for Building Automation Networking The Industrial L2+ Managed Switch is the ideal solution to fulfilling the demand of IPv6 management Gigabit Ethernet Switch, especially in the Industrial hardened environment.
User’s Manual of IGS series 1588 Precision Time Protocol for Industrial Computing Networks The Industrial L2+ Managed Switch is intended for telecom and carrier Ethernet applications, supporting MEF service delivery and timing over packet solutions for the IEEE 1588 Precision Time Protocol and synchronous Ethernet.
User’s Manual of IGS series 1.3 How to Use This Manual This User’s Manual is structured as follows: Section 2, INSTALLATION The section explains the functions of the Industrial L2+ Managed Switch and how to physically install the Industrial L2+ Managed Switch. Section 3, SWITCH MANAGEMENT The section contains the information about the software function of the Industrial L2+ Managed Switch. Section 4, WEB CONFIGURATION The section explains how to manage the Industrial L2+ Managed Switch by Web interface.
User’s Manual of IGS series 1.
User’s Manual of IGS series − 802.
User’s Manual of IGS series − IP-based Access Control List (ACL) − MAC-based Access Control List Source MAC/IP address binding DHCP snooping to filter distrusted DHCP messages Dynamic ARP Inspection discards ARP packets with invalid MAC address to IP address binding IP Source Guard prevents IP spoofing attacks IP address access management to prevent unauthorized intruder Management IPv4 and IPv6 dual stack management Switch Management Interfaces - Console/Telnet Command Line Interface
User’s Manual of IGS series 1.
User’s Manual of IGS series Open collector to 24V DC, 100mA max. Dimensions (W x D x H) 56 x 87.8 x 135 mm 72 x 107x 152mm 72 x 107x 152mm 720g 1036g 1010g Weight Power Requirements Dual 12~48V DC 24V AC DC 12 to 48V, AC 24V Power Adapter 72 x 107x 152mm 1043g 12V to 72V DC 12V to 48V DC 24V AC 24V AC 6.5 watts / 22.18BTU 8 watts / 27BTU Power Consumption 13.92 Watts / 10 watts / 34BTU (full 47.76BTU (Full loading) loading) (System on) 12 watts / 40.
User’s Manual of IGS series Layer 3 Functions IP Interfaces Max. 8 VLAN interfaces Routing Table Max.
User’s Manual of IGS series Operating Storage Temperature: -40 ~ 75 degrees C Relative Humidity: 5 ~ 95% (non-condensing) Temperature: -40 ~ 85 degrees C Relative Humidity: 5 ~ 95% (non-condensing) 22
User’s Manual of IGS series 2. INSTALLATION 2.1 Hardware Description The Industrial L2+ Managed Switch provides three different running speeds – 10Mbps, 100Mbps and 1000Mbps and automatically distinguishes the speed of incoming connection. This section describes the hardware features of Industrial L2+ Managed Switch. For easier management and control of the Industrial L2+ Managed Switch, familiarize yourself with its display indicators and ports.
User’s Manual of IGS series IGS-10080MFT IGS-10080MFT Dimensions (W x D x H) : 72 x 107 x 152mm 24
User’s Manual of IGS series IGS-12040MT IGS-12040MT Dimensions (W x D x H) : 72 x 107 x 152 mm 25
User’s Manual of IGS series IGS-20040MT IGS-20040MT Dimensions (W x D x H) : 72 x 107 x 152 mm 26
User’s Manual of IGS series 2.1.
User’s Manual of IGS series IGS-12040MT IGS-20040MT Figure 2-3: IGS-12040MT Switch Front Panel Figure 2-4: IGS-20040MT Switch Front Panel ■ Gigabit TP Interface 10/100/1000BASE-T Copper, RJ45 Twisted-pair: Up to 100 meters. ■ SFP Slot 100/1000BASE-X mini-GBIC slot, SFP (Small-form Factor Pluggable) transceiver module: From 550 meters to 2km (multi-mode fiber) and to 10/20/30/40/50/70/120 kilometers (single-mode fiber).
User’s Manual of IGS series ■ Console Port The console port is an RJ45 port connector. It is an interface for connecting a terminal directly. Through the console port, it provides rich diagnostic information including IP address setting, factory reset, port management, link status and system setting. Users can use the attached DB9 to RJ45 console cable in the package and connect to the console port on the device.
User’s Manual of IGS series IGS-12040MT IGS-20040MT Figure 2-7: IGS-12040MT Reset Button Figure 2-8: IGS-20040MT Reset Button Reset Button Pressed and Released Function < 5 sec: System Reboot Reboot the Industrial L2+ Managed Switch. Reset the Industrial L2+ Managed Switch to Factory Default configuration.
User’s Manual of IGS series 2.1.3 LED Indications IGS-10020MT System LED Color Function P1 Green Lights to indicate that the Switch has power. P2 Green Lights to indicate that the Switch has power. Fault Green Lights to indicate power failure. Ring Green Lights to indicate that the ERPS Ring has been created successfully. R.O. Green Lights to indicate that Switch has been enabled to Ring Owner.
User’s Manual of IGS series Per SFP Interface LED Color LNK / ACT Green 1000 Function Light Indicates the link through that port is successfully established. Blink Indicates that the Switch is actively sending or receiving data over that port. Light Indicates that the port is successfully connecting to the network at 1000Mbps. Off Indicates that the port is successfully connecting to the network at 100Mbps.
User’s Manual of IGS series Per 10/100/1000BASE-T Port LED LNK / ACT 1000 Color Function Light Indicate the link through that port is successfully established. Blink Indicate that the Switch is actively sending or receiving data over that port. Light Indicate that the port is successfully connecting to the network at 1000Mbps. Off Indicate that the port is successfully connecting to the network at 10 / 100Mbps.
User’s Manual of IGS series IGS-12040MT System LED Color Function P1 Green Lights to indicate power 1 has power. P2 Green Lights to indicate power 2 has power. Fault Green Lights to indicate either power 1 or power 2 has no power. Ring Green Lights to indicate that the ERPS Ring has been created successfully. R.O.* Green Lights to indicate that Switch has enabled Ring Owner.
User’s Manual of IGS series Per SFP Interface LED 1000 LNK / ACT Color Function Lights Green Indicating the port is running in 1000Mbps speed and successfully established. Blinks Indicating that the switch is actively sending or receiving data over that port. Lights Indicating the port is running in 100Mbps speed and successfully established. 100 LNK/ACT Orange Blinks Indicating that the switch is actively sending or receiving data over that port. IGS-20040MT System LED P1 P2 Fault Ring R.O.
User’s Manual of IGS series Per 10/100/1000BASE-T Port LED Color Function Lights Indicates the port is running in 1000Mbps speed and successfully established. 1000 LNK / ACT Green Blinks Indicates that the switch is actively sending or receiving data over that port. Lights 10/100 LNK/ACT Indicates the port is running in 10/100Mbps speed and successfully established. Orange Blinks Indicates that the switch is actively sending or receiving data over that port.
User’s Manual of IGS series 2.1.4 Switch Upper Panel The Upper Panel of the Industrial L2+ Managed Switch indicates a DC inlet power socket and consists of one terminal block connector within 6 contacts. Please follow the steps below to insert the power wire. 1. Insert positive/negative DC power wires into Contacts 1 and 2 for Power 1, or Contacts 5 and 6 for Power 2.
User’s Manual of IGS series IGS-12040MT: 12~72V DC, 24V AC Figure 2-11: IGS-12040MT Upper Panel IGS-20040MT: 9~48V DC, 24V AC Figure 2-12: IGS-20040MT Upper Panel 38
User’s Manual of IGS series Tighten the wire-clamp screws for preventing the wires from loosening. 1 2 V1+ V1- 3 4 Power 1 5 6 V2+ V2- Power 2 Positive (+) Pin Negative (-) Pin IGS-10020MT Pin 2 / 6 Pin 1 / 5 IGS-10080MFT Pin 1 / 5 Pin 2 / 6 IGS-12040MT Pin 1 / 5 Pin 2 / 6 IGS-20040MT Pin 1 / 5 Pin 2 / 6 The wire gauge for the terminal block should be in the range from 12 to 24 AWG.
User’s Manual of IGS series 2.1.5 Wiring the Fault Alarm Contact The fault alarm contacts are in the middle (3 & 4) of the terminal block connector as the picture shows below. Inserting the wires, the Industrial L2+ Managed Switch will detect the fault status of the power failure, or port link failure (available for managed model). The following illustration shows an application example for wiring the fault alarm contacts Insert the wires into the fault alarm contacts 1.
User’s Manual of IGS series Tighten the wire-clamp screws for preventing the wires from loosening. 1 DI0 2 3 4 5 6 DI1 DO0 DO1 GND GND Figure 2-14: 6-pin Terminal Block for DI and DO Wiring Input 2. There are two Digital Input groups for you to monitor two different devices. The following topology shows how to wire DI0 and DI1. Figure 2-15: Wiring DI0 and DI1 to Open Detector 3.
User’s Manual of IGS series Figure 2-16: Wiring DO0 and DO1 to Open Detector 42
User’s Manual of IGS series 2.2 Installing the Industrial L2+ Managed Switch This section describes how to install your Industrial L2+ Managed Switch and make connections to the Industrial L2+ Managed Switch. Please read the following topics and perform the procedures in the order being presented. To install your Industrial L2+ Managed Switch on a desktop or shelf, simply complete the following steps.
User’s Manual of IGS Series 2.2.2 DIN-rail Mounting This section describes how to install the Industrial L2+ Managed Switch. There are two methods to install the Industrial L2+ Managed Switch -- DIN-rail mounting and wall-mount plate mounting. Please read the following topics and perform the procedures in the order being presented. Follow all the DIN-rail installation steps as shown in the example. Step 1: Screw the DIN-rail on the Industrial L2+ Managed Switch.
User’s Manual of IGS series Step 3: Check whether the DIN-rail is tightly on the track. Please refer to the following procedures to remove the Industrial L2+ Managed Switch from the track. Step 4: Lightly remove the DIN-rail from the track.
User’s Manual of IGS series 2.2.3 Wall Mount Plate Mounting To install the Industrial L2+ Managed Switch on the wall, please follow the instructions below. Follow all the DIN-rail installation steps as shown in the example. Step 1: Remove the DIN-rail from the Industrial L2+ Managed Switch. Use the screwdriver to loosen the screws to remove the DIN-rail. Step 2: Place the wall-mount plate on the rear panel of the Industrial L2+ Managed Switch.
User’s Manual of IGS Series 2.3 Cabling 10/100/1000BASE-T All 10/100/1000BASE-T ports come with auto-negotiation capability. They automatically support 1000BASE-T, 100BASE-TX and 10BASE-T networks. Users only need to plug a working network device into one of the 10/100/1000BASE-T ports, and then turn on the Industrial L2+ Managed Switch. The port will automatically run at 10Mbps, 20Mbps, 100Mbps or 200Mbps and 1000Mbps or 2000Mbps after negotiating with the connected device.
User’s Manual of IGS Series 2.3.1 Installing the SFP Transceiver The sections describe how to insert an SFP/SFP+ transceiver into an SFP/SFP+ slot. The SFP/SFP+ transceivers are hot-pluggable and hot-swappable. You can plug in and out the transceiver to/from any SFP/SFP+ port without having to power down the Industrial L2+ Managed Switch as Figure 2-17 appears.
User’s Manual of IGS series Fast Ethernet Transceiver (100BASE-BX, Single Fiber Bi-directional SFP) Model DDM Speed (Mbps) Connector Interface Fiber Mode MFB-FA20 -- 100 WDM(LC) Single Mode 20km 1310nm 1550nm 0 ~ 60 ℃ MFB-FB20 -- 100 WDM(LC) Single Mode 20km 1550nm 1310nm 0 ~ 60 ℃ MFB-TSA YES 100 WDM(LC) Multi Mode 2km 1310nm 1550nm -40 ~ 75 ℃ MFB-TSB YES 100 WDM(LC) Multi Mode 2km 1550nm 1310nm -40 ~ 75 ℃ MFB-TFA20 -- 100 WDM(LC) Single Mode 20km 1310nm 1550n
User’s Manual of IGS series MGB-TLA10(V2) MGB-TLB10(V2) MGB-TLA20 MGB-TLB20 MGB-TLA40 MGB-TLB40 MGB-TLA80 MGB-TLB80 YES YES YES YES 1.
User’s Manual of IGS series 2.3.2 Removing the SFP/SFP+ Transceiver 1. Make sure there is no network activity by consulting or checking with the network administrator. Or through the management interface of the switch/converter (if available) to disable the port in advance. 2. Remove the fiber optic cable gently. 3. Turn the lever of the SFP transceiver to a horizontal position. 4. Pull out the module gently through the lever.
User’s Manual of IGS Series 3. SWITCH MANAGEMENT This chapter explains the methods that you can use to configure management access to the Industrial L2+ Managed Switch. It describes the types of management applications and the communication and management protocols that deliver data between your management device (workstation or personal computer) and the system. It also contains information about port connection options.
User’s Manual of IGS series 3.2 Management Access Overview The Industrial L2+ Managed Switch gives you the flexibility to access and manage it using any or all of the following methods: Remote Telnet Interface Web browser Interface An external SNMP-based network management application The remote Telnet and Web browser interfaces are embedded in the Industrial L2+ Managed Switch software and are available for immediate use. Each of these management methods has their own advantages.
User’s Manual of IGS Series 3.3 CLI Mode Management There are two ways for CLI mode management, one is remote telnet and the other operated from console port. Remote telnet is an IP-based protocol and console port is for user to operate the Industrial L2+ Managed Switch locally only; however, their operations are the same. The command line user interface is for performing system administration, such as displaying statistics or changing option settings.
User’s Manual of IGS series You can change these settings, if desired, after you log on. This management method is often preferred because you can remain connected and monitor the system during system reboots. Also, certain error messages are sent to the serial port, regardless of the interface through which the associated action was initiated. A Macintosh or PC attachment can use any terminal-emulation program for connecting to the terminal serial port.
User’s Manual of IGS series 3.4 Web Management The Industrial L2+ Managed Switch offers management features that allow users to manage the Industrial L2+ Managed Switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer. After you set up your IP address for the Industrial L2+ Managed Switch, you can access the Industrial L2+ Managed Switch’s Web interface applications directly in your Web browser by entering the IP address of the Industrial L2+ Managed Switch.
User’s Manual of IGS series 3.5 SNMP-based Network Management You can use an external SNMP-based application to configure and manage the Industrial L2+ Managed Switch, such as SNMP Network Manager, HP Openview Network Node Management (NNM) or What’s Up Gold. This management method requires the SNMP agent on the Industrial L2+ Managed Switch and the SNMP Network Management Station to use the same community string.
User’s Manual of IGS series 3.6 PLANET Smart Discovery Utility To easily list the Industrial L2+ Managed Switch in your Ethernet environment, the Planet Smart Discovery Utility from user’s manual CD-ROM is an ideal solution. The following install instructions guide you to running the Planet Smart Discovery Utility. 1. Open the Planet Smart Discovery Utility in administrator PC. 2. Run this utility and the following screen appears.
User’s Manual of IGS series 1. This utility shows all the necessary information from the devices, such as MAC Address, Device Name, firmware version and Device IP Subnet address. A new password, IP Subnet address and description can be assigned to the devices. 2. After setup is completed, press the “Update Device”, “Update Multi” or “Update All” button to take effect. The meanings of the 3 buttons above are shown below: Update Device: Use the current setting on one single device.
User’s Manual of IGS series 4. WEB CONFIGURATION This section introduces the configuration and functions of the Web-based management. About Web-based Management The Industrial L2+ Managed Switch offers management features that allow users to manage the Industrial L2+ Managed Switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer. The Web-based Management supports Internet Explorer 8.0.
User’s Manual of IGS series http://192.168.0.100 2. When the following login screen appears, please enter the default username "admin" with password “admin” (or the username/password you have changed via console) to login the main screen of Industrial L2+ Managed Switch. The login screen in Figure 4-1-2 appears. Figure 4-1-2: Login Screen Default User name: admin Default Password: admin After entering the username and password, the main screen appears as Figure 4-1-3.
User’s Manual of IGS series Now, you can use the Web management interface to continue the switch management or manage the Industrial L2+ Managed Switch by Web interface. The Switch Menu on the left of the web page lets you access all the commands and statistics the Industrial L2+ Managed Switch provides. 1. It is recommended to use Internet Explore 8.0 or above to access Industrial L2+ Managed Switch. 2. The changed IP address takes effect immediately after clicking on the Save button.
User’s Manual of IGS series 4.1 Main Web page The Industrial L2+ Managed Switch provides a Web-based browser interface for configuring and managing it. This interface allows you to access the Industrial L2+ Managed Switch using the Web browser of your choice. This chapter describes how to use the Industrial L2+ Managed Switch’s Web browser interface to configure and manage it. Figure 4-1-4: Main page Panel Display The web agent displays an image of the Industrial L2+ Managed Switch’s ports.
User’s Manual of IGS series Main Menu Using the onboard web agent, you can define system parameters, manage and control the Industrial L2+ Managed Switch, and all its ports, or monitor network conditions. Via the Web-Management, the administrator can set up the Industrial L2+ Managed Switch by selecting the functions those listed in the Main Function. The screen in Figure 4-1-5 appears.
User’s Manual of IGS series 4.2 System Use the System menu items to display and configure basic administrative details of the Industrial L2+ Managed Switch. Under the System, the following topics are provided to configure and view the system information. This section has the following items: ■ System Information The Industrial L2+ Managed Switch system information is provided here. ■ IP Configuration Configure the IPv4/IPv6 interface and IP routes of the Industrial L2+ Managed Switch on this page.
User’s Manual of IGS series 4.2.1 Management 4.2.1.1 System Information The System Infomation page provides information for the current device information. System Information page helps a switch administrator to identify the hardware MAC address, software version and system uptime. The screen in Figure 4-2-1 appears.
User’s Manual of IGS series 4.2.1.2 IP Configuration The IP Configuration includes the IP Configuration, IP Interface and IP Routes. The configured column is used to view or change the IP configuration. The maximum number of interfaces supported is 128 and the maximum number of routes is 32. The screen in Figure 4-2-2 appears. Figure 4-2-2: IP Configuration Page Screenshot The current column is used to show the active IP configuration.
User’s Manual of IGS series Explicitly provide the valid IPv6 unicast (except linklocal) address of the DNS Server. Make sure the configured DNS server could be reachable (e.g. via PING6) for activating DNS service. From any DHCPv4 interfaces The first DNS server offered from a DHCPv4 lease to a DHCPv4-enabled interface will be used. From this DHCPv4 interface Specify from which DHCPv4-enabled interface a provided DNS server should be preferred.
User’s Manual of IGS series are between 0 and 30 bits for a IPv4 address. If DHCP is enabled, this field configures the fallback address network mask. The field may be left blank if IPv4 operation on the interface is not desired - or no DHCP fallback address is desired. DHCPv6 Enable Enable the DHCPv6 client by checking this box. If this option is enabled, the system will configure the IPv6 address of the interface using the DHCPv6 protocol.
User’s Manual of IGS series Next Hop VLAN The VLAN ID (VID) of the specific IPv6 interface associated with the gateway. The given VID ranges from 1 to 4095 and will be effective only when the corresponding IPv6 interface is valid. If the IPv6 gateway address is link-local, it must specify the next hop. Buttons : Click to add a new IP interface. A maximum of 128 interfaces are supported. : Click to add a new IP route. A maximum of 32 routes are supported. : Click to apply changes.
User’s Manual of IGS series The page includes the following fields: Object Description • IP Interfaces • IP Routes • Neighbor Cache Interface The name of the interface. Type The address type of the entry. This may be LINK or IPv4. Address The current address of the interface (of the given type). Status The status flags of the interface (and/or address). Network The destination IP network or host address of this route. Gateway The gateway address of this route.
User’s Manual of IGS series By default setting, most groups privilege level 5 has the read-only access and privilege level 10 has the read-write access. And the system maintenance (software upload, factory defaults and etc.) needs user privilege level 15. Generally, the privilege level 15 can be used for an administrator account, privilege level 10 for a standard user account and privilege level 5 for a guest account. Buttons : Click to add a new user.
User’s Manual of IGS series By default setting, most groups privilege level 5 has the read-only access and privilege level 10 has the read-write access. And the system maintenance (software upload, factory defaults and etc.) needs user privilege level 15. Generally, the privilege level 15 can be used for an administrator account, privilege level 10 for a standard user account and privilege level 5 for a guest account. Buttons : Click to apply changes.
User’s Manual of IGS series 4.2.1.5 Privilege Levels This page provides an overview of the privilege levels. After setup is completed, please press the “Apply” button to take effect. Please login web interface with new user name and password and the screen in Figure 4-2-7 appears. Figure 4-2-7: Privilege Levels Configuration Page Screenshot The page includes the following fields: Object Description • Group Name The name identifying the privilege group.
User’s Manual of IGS series System: Contact, Name, Location, Timezone, Log. Security: Authentication, System Access Management, Port (contains Dot1x port, MAC based and the MAC Address Limit), ACL, HTTPS, SSH, ARP Inspection and IP source guard. IP: Everything except 'ping'. Port: Everything except 'VeriPHY'. Diagnostics: 'ping' and 'VeriPHY'. Maintenance: CLI- System Reboot, System Restore Default, System Password, Configuration Save, Configuration Load and Firmware Load.
User’s Manual of IGS series 4.2.1.6 NTP Configuration Configure NTP on this page. NTP is an acronym for Network Time Protocol, a network protocol for synchronizing the clocks of computer systems. NTP uses UDP (data grams) as transport layer. You can specify NTP Servers. The NTP Configuration screen in Figure 4-2-8 appears. Figure 4-2-8: NTP Configuration Page Screenshot The page includes the following fields: Object Description • Mode Indicates the NTP mode operation.
User’s Manual of IGS series 4.2.1.6.1 System Time Correction Manually Configure NTP on this page. NTP is an acronym for Network Time Protocol, a network protocol for synchronizing the clocks of computer systems. NTP uses UDP (data grams) as transport layer. You can specify NTP Servers. The NTP Configuration screen in Figure 4-2-9 appears.
User’s Manual of IGS series 4.2.1.7 Time Configuration Configure Time Zone on this page. A Time Zone is a region that has a uniform standard time for legal, commercial, and social purposes. It is convenient for areas in close commercial or other communication to keep the same time, so time zones tend to follow the boundaries of countries and their subdivisions.
User’s Manual of IGS series • Offset Settings Enter the number of minutes to add during Daylight Saving Time. ( Range: 1 to 1440 ) Buttons : Click to apply changes. : Click to undo any changes made locally and revert to previously saved values. 4.2.1.8 UPnP Configure UPnP on this page. UPnP is an acronym for Universal Plug and Play.
User’s Manual of IGS series the standard it is recommended that such refreshing of advertisements to be done at less than one-half of the advertising duration. In the implementation, the switch sends SSDP messages periodically at the interval one-half of the advertising duration minus 30 seconds. Valid values are in the range 100 to 86400. • IP Addressing Mode IP addressing mode provides two ways to determine IP address assignment: Dynamic: Default selection for UPnP.
User’s Manual of IGS series 4.2.1.9 DHCP Relay Configure DHCP Relay on this page. DHCP Relay is used to forward and transfer DHCP messages between the clients and the server when they are not on the same subnet domain. The DHCP option 82 enables a DHCP relay agent to insert specific information into a DHCP request packets when forwarding client DHCP packets to a DHCP server and remove the specific information from a DHCP reply packets when forwarding server DHCP packets to a DHCP client.
User’s Manual of IGS series • Relay Information Mode Indicates the DHCP relay information mode option operation. Possible modes are: Enabled: Enable DHCP relay information mode operation. When enabling DHCP relay information mode operation, the agent inserts specific information (option82) into a DHCP message when forwarding to DHCP server and removing it from a DHCP message when transferring to DHCP client. It only works under DHCP relay operation mode enabled.
User’s Manual of IGS series 4.2.1.10 DHCP Relay Statistics This page provides statistics for DHCP relay. The DHCP Relay Statistics screen in Figure 4-2-13 appears. Figure 4-2-13: DHCP Relay Statistics Page Screenshot The page includes the following fields: Server Statistics Object Description • Transmit to Server The packets number that relayed from client to server. • Transmit Error The packets number that erroneously sent packets to clients.
User’s Manual of IGS series Client Statistics Object Description • Transmit to Client The packets number that relayed packets from server to client. • Transmit Error The packets number that erroneously sent packets to servers. • Receive from Client The packets number that received packets from server. • Receive Agent Option The packets number that received packets with relay agent information option.
User’s Manual of IGS series 4.2.1.11 CPU Load This page displays the CPU load, using an SVG graph. The load is measured as average over the last 100ms, 1 sec and 10 seconds intervals. The last 120 samples are graphed, and the last numbers are displayed as text as well. In order to display the SVG graph, your browser must support the SVG format. Consult the SVG Wiki for more information on browser support.
User’s Manual of IGS series 4.2.1.12 System Log The Industrial L2+ Managed Switch system log information is provided here. The System Log screen in Figure 4-2-15 appears. Figure 4-2-15: System Log Page Screenshot The page includes the following fields: Object Description • ID The ID (>= 1) of the system log entry. • Level The level of the system log entry. The following level types are supported: Info: Information level of the system log. Warning: Warning level of the system log.
User’s Manual of IGS series : Updates the system log entries, starting from the first available entry ID. : Updates the system log entries, ending at the last entry currently displayed. : Updates the system log entries, starting from the last entry currently displayed. : Updates the system log entries, ending at the last available entry ID. 4.2.1.13 Detailed Log The Industrial L2+ Managed Switch system detailed log information is provided here. The Detailed Log screen in Figure 4-2-16 appears.
User’s Manual of IGS series 4.2.1.14 Remote Syslog Configure remote syslog on this page. The Remote Syslog screen in Figure 4-2-17 appears. Figure 4-2-17: Remote Syslog Page Screenshot The page includes the following fields: Object Description • Mode Indicates the server mode operation. When the mode operation is enabled, the syslog message will send out to syslog server.
User’s Manual of IGS series 4.2.1.15 SMTP Configuration This page facilitates an SMTP Configuration on the switch. The SMTP Configure screen in Figure 4-2-18 appears. Figure 4-2-18: SMTP Configuration Page Screenshot The page includes the following fields: Object Description • SMTP Mode Controls whether SMTP is enabled on this switch. • SMTP Server Type the SMTP server name or the IP address of the SMTP server. • SMTP Port Set port number of SMTP service.
User’s Manual of IGS series Buttons : Send a test mail to mail server to check whether this account is available or not. : Click to save changes. : Click to undo any changes made locally and revert to previously saved values. 4.2.1.16 Fault Alarm This page facilitates an update of the firmware controlling the switch. The Web Firmware Upgrade screen in Figure 4-2-19 appears.
User’s Manual of IGS series 4.2.1.17 Digital Input/Output Digital Input allows user to log external device (such as industrial cooler) dead or alive or something else. System will log a user customized message into system log and syslog, and issue SNMP trap or issue an alarm E-mail. Digital Output allows user to monitor the switch port and power, and let system issue a high or low signal to an external device (such as alarm) when the monitor port or power has failed.
User’s Manual of IGS series Allows user to record alarm message to System log, syslog or issues out via SNMP Trap or SMTP. As default SNMP Trap and SMTP are disabled, please enable them first if you want to issue alarm message via them. As Digital Output: Allows user to monitor an alarm from port failure, power failure, Digital Input 0 (DI 0) and Digital Input 1(DI 1) which means if Digital Output has detected these events, then Digital Output would be triggered according to the setting of Condition.
User’s Manual of IGS series 4.2.2 Simple Network Management Protocol 4.2.2.1 SNMP Overview The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management information between network devices. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth.
User’s Manual of IGS series default communities are: 。 Write = private 。 Read = public Use the SNMP Menu to display or configure the Industrial L2+ Managed Switch 's SNMP function. This section has the following items: System Configuration Configure SNMP on this page. Trap Configuration Configure SNMP trap on this page. System Information The system information is provided here. SNMPv3 Communities Configure SNMPv3 communities table on this page.
User’s Manual of IGS series • Read Community Indicates the community read access string to permit access to SNMP agent. The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 33 to 126. The field is applicable only when SNMP version is SNMPv1 or SNMPv2c. If SNMP version is SNMPv3, the community string will be associated with SNMPv3 communities table. It provides more flexibility to configure security name than a SNMPv1 or SNMPv2c community string.
User’s Manual of IGS series 4.2.2.3 SNMP Trap Configuration Configure SNMP trap on this page. The SNMP Trap Configuration screen in Figure 4-2-2-3 appears. Figure 4-2-2-3: SNMP Trap Configuration Page Screenshot The page includes the following fields: Object Description • Trap Config Indicates which trap Configuration's name for configuring. The allowed string length is 0 to 255, and the allowed content is ASCII characters from 33 to 126. • Trap Mode Indicates the SNMP trap mode operation.
User’s Manual of IGS series • Trap Inform Mode Indicates the SNMP trap inform mode operation. Possible modes are: Enabled: Enable SNMP trap authentication failure. Disabled: Disable SNMP trap authentication failure. • Trap Inform Timeout (seconds) • Trap Inform Retry Times • Trap Probe Security Engine ID Indicates the SNMP trap inform timeout. The allowed range is 0 to 2147. Indicates the SNMP trap inform retry times. The allowed range is 0 to 255.
User’s Manual of IGS series 4.2.2.4 SNMP System Information The switch system information is provided here. The SNMP System Information screen in Figure 4-2-2-4 appears. Figure 4-2-2-4: System Information Configuration Page Screenshot The page includes the following fields: Object Description • System Contact The textual identification of the contact person for this managed node, together with information on how to contact this person.
User’s Manual of IGS series The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • Community Indicates the community access string to permit access to SNMPv3 agent. The allowed string length is 1 to 32, and the allowed content is ASCII characters from 33 to 126. The community string will be treated as security name and map a SNMPv1 or SNMPv2c community string. • Source IP Indicates the SNMP access source address.
User’s Manual of IGS series 4.2.2.6 SNMPv3 Users Configure SNMPv3 users table on this page. The entry index keys are Engine ID and User Name. The SNMPv3 Users screen in Figure 4-2-2-6 appears. Figure 4-2-2-6: SNMPv3 Users Configuration Page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • Engine ID An octet string identifying the engine ID that this entry should belong to.
User’s Manual of IGS series MD5: An optional flag to indicate that this user using MD5 authentication protocol. SHA: An optional flag to indicate that this user using SHA authentication protocol. The value of security level cannot be modified if entry already exist. That means must first ensure that the value is set correctly. • Authentication Password A string identifying the authentication pass phrase. For MD5 authentication protocol, the allowed string length is 8 to 32.
User’s Manual of IGS series Figure 4-2-2-7: SNMPv3 Groups Configuration Page Screenshot 102
User’s Manual of IGS series The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • Security Model Indicates the security model that this entry should belong to. Possible security models are: v1: Reserved for SNMPv1. v2c: Reserved for SNMPv2c. usm: User-based Security Model (USM). • Security Name A string identifying the security name that this entry should belong to.
User’s Manual of IGS series The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • View Name A string identifying the view name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is the ASCII characters from 33 to 126. • View Type Indicates the view type that this entry should belong to.
User’s Manual of IGS series The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • Group Name A string identifying the group name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is the ASCII characters from 33 to 126. • Security Model Indicates the security model that this entry should belong to.
User’s Manual of IGS series 4.2.3 RMON RMON is the most important expansion of the standard SNMP. RMON is a set of MIB definitions, used to define standard network monitor functions and interfaces, enabling the communication between SNMP management terminals and remote monitors. RMON provides a highly efficient method to monitor actions inside the subnets. MID of RMON consists of 10 groups.
User’s Manual of IGS series protocol. InNUcastPkts: The number of broadcast and multi-cast packets delivered to a higher-layer protocol. InDiscards: The number of inbound packets that are discarded even the packets are normal. InErrors: The number of inbound packets that contains errors preventing them from being deliverable to a higher-layer protocol. InUnknownProtos: the number of the inbound packets that is discarded because of the unknown or un-support protocol.
User’s Manual of IGS series : Click to undo any changes made locally and revert to previously saved values. 4.2.3.2 RMON Alarm Status This page provides an overview of RMON Alarm entries. Each page shows up to 99 entries from the Alarm table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Alarm table.
User’s Manual of IGS series : Updates the table, starting with the entry after the last entry currently displayed. 4.2.3.3 RMON Event Configuration Configure RMON Event table on this page. The entry index key is ID; screen in Figure 4-2-3-3 appears. Figure 4-2-3-3 RMON Event Configuration Page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • ID Indicates the index of the entry.
User’s Manual of IGS series 4.2.3.4 RMON Event Status This page provides an overview of RMON Event table entries. Each page shows up to 99 entries from the Event table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Event table. The first displayed will be the one with the lowest Event Index and Log Index found in the Event table; screen in Figure 4-2-3-4 appears.
User’s Manual of IGS series 4.2.3.5 RMON History Configuration Configure RMON History table on this page. The entry index key is ID; screen in Figure 4-2-3-5 appears. Figure 4-2-3-5: RMON History Configuration Page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • ID Indicates the index of the entry. The range is from 1 to 65535. • Data Source Indicates the port ID which wants to be monitored.
User’s Manual of IGS series 4.2.3.6 RMON History Status This page provides an detail of RMON history entries; screen in Figure 4-2-3-6 appears. Figure 4-2-3-6: RMON History Overview Page Screenshot The page includes the following fields: Object Description • History Index Indicates the index of History control entry. • Sample Index Indicates the index of the data entry associated with the control entry.
User’s Manual of IGS series • Utilization The best estimate of the mean physical layer network utilization on this interface during this sampling interval, in hundredths of a percent. Buttons : Click to refresh the page immediately. Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Updates the table, starting from the first entry in the History table, i.e.
User’s Manual of IGS series 4.2.3.8 RMON Statistics Status This page provides an overview of RMON Statistics entries. Each page shows up to 99 entries from the Statistics table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Statistics table. The first displayed will be the one with the lowest ID found in the Statistics table; screen in Figure 4-2-3-8 appears.
User’s Manual of IGS series • Coll. The best estimate of the total number of collisions in this Ethernet segment. • 64 Bytes The total number of packets (including bad packets) received that were 64 octets in length. • 65~127 The total number of packets (including bad packets) received that were between 65 to 127 octets in length. • 128~255 The total number of packets (including bad packets) received that were between 128 to 255 octets in length.
User’s Manual of IGS series 4.2.4 DHCP server 4.2.4.1 DHCP Server Mode Configuration Configure DHCP server mode on this page. The entry index key is ID.; screen in Figure 4-2-4-1 appears. Figure 4-2-4-1: DHCP server mode Page Screenshot The page includes the following fields: Object Description • Mode Configure the operation mode per system. Possible modes are: Enabled: Enable DHCP server per system. Disabled: Disable DHCP server pre system.
User’s Manual of IGS series • Mode Indicate the operation mode per VLAN. Possible modes are: Enabled: Enable DHCP server per VLAN. Disabled: Disable DHCP server pre VLAN. Buttons : Click to add a new VLAN range. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.2.4.2 DHCP Server excluded IP Configuration Configure excluded IP addresses. DHCP server will not allocate these excluded IP addresses to DHCP client.; screen in Figure 4-2-4-2 appears.
User’s Manual of IGS series : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.2.4.3 DHCP Server pool Configuration This page manages DHCP pools. According to the DHCP pool, DHCP server will allocate IP address and deliver configuration parameters to DHCP client. screen in Figure 4-2-4-3 appears.
User’s Manual of IGS series Buttons : Click to add a new excluded IP range. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.2.4.4 DHCP Server pool Configuration This page displays the database counters and the number of DHCP messages sent and received by DHCP server.. screen in Figure 4-2-4-4 appears.
User’s Manual of IGS series Binding Counters Object Description • Automatic Binding Number of bindings with network-type pools • Manual Binding Number of bindings that administrator assigns an IP address to a client. That is, the pool is of host type. • Expired Binding Number of bindings that their lease time expired or they are cleared from Automatic/Manual type bindings. DHCP message Received Counters Object Description • Discover Number of DHCP DISCOVER messages received.
User’s Manual of IGS series Figure 4-2-4-5: DHCP server Binding IP page Screenshot The page includes the following fields: Object Description • IP Display IP address allocated to DHCP client. • Type Display type of binding. Possible types are Automatic, Manual, Expired. • State Display state of binding. Possible states are Committed, Allocated, Expired • Pool Name Display the pool that generates the binding. • Server ID Display server IP address to service the binding.
User’s Manual of IGS series Figure 4-2-4-6: DHCP server Declined IP Page Screenshot The page includes the following fields: Object Description • Delined IP Display List of IP addresses declined. Buttons : Check this box to refresh the page automatically Click to refresh the page immediately. 4.2.4.7 DHCP Detail Statistics This page provides statistics for DHCP snooping.
User’s Manual of IGS series The page includes the following fields: Object Description • Rx and Tx Discover Display the number of discover (option 53 with value 1) packets received and transmitted. • Rx and Tx Offer Display the number of offer (option 53 with value 2) packets received and transmitted.
User’s Manual of IGS series 4.2.5 Industrial Protocol With the supported Modbus TCP/IP protocol, the IGS-5225 series can easily integrate with SCADA systems, HMI systems and other data acquisition systems in factory floors. It enable administrators to remotely monitor the industrial Ethernet switch’s operating information, port information and communication status, thus easily achieving enhanced monitoring and maintenance of the entire factory. 4.2.5.
User’s Manual of IGS series 4.3 Switching 4.3.1 Port Management Use the Port Menu to display or configure the Industrial L2+ Managed Switch's ports. This section has the following items: Port Configuration Configures port connection settings Port Statistics Overview Lists Ethernet and RMON port statistics Port Statistics Detail Lists Ethernet and RMON port statistics SFP Module Information Display SFP information Port Mirror Sets the source and target ports for mirroring 4.3.1.
User’s Manual of IGS series • Configured Link Speed Select any available link speed for the given switch port. Draw the menu bar to select the mode. Auto – Set up Auto negotiation for copper interface. 10Mbps HDX - Force sets 10Mbps/Half-Duplex mode. 10Mbps FDX - Force sets 10Mbps/Full-Duplex mode. 100Mbps HDX - Force sets 100Mbps/Half-Duplex mode. 100Mbps FDX - Force sets 100Mbps/Full-Duplex mode. 1Gbps FDX - Force sets 10000Mbps/Full-Duplex mode.
User’s Manual of IGS series 4.3.1.2 Port Statistics Overview This page provides an overview of general traffic statistics for all switch ports. The Port Statistics Overview screen in Figure 4-3-1-2 appears. Figure 4-3-1-2: Port Statistics Overview Page Screenshot The displayed counters are: Object Description • Port The logical port for the settings contained in the same row. • Packets The number of received and transmitted packets per port.
User’s Manual of IGS series error counters for receive and transmit. The Detailed Port Statistics screen in Figure 4-3-1-3 appears. Figure 4-3-1-3: Detailed Port Statistics Port 1 Page Screenshot The page includes the following fields: Receive Total and Transmit Total Object Description • Rx and Tx Packets The number of received and transmitted (good and bad) packets • Rx and Tx Octets The number of received and transmitted (good and bad) bytes, including FCS, but excluding framing bits.
User’s Manual of IGS series Receive and Transmit Queue Counters The number of received and transmitted packets per input and output queue. Receive Error Counters Object Description • Rx Drops The number of frames dropped due to lack of receive buffers or egress congestion. • Rx CRC/Alignment The number of frames received with CRC or alignment errors. • Rx Undersize The number of short frames received with valid CRC. • Rx Oversize The number of long frames received with valid CRC.
User’s Manual of IGS series power, temperature, laser bias current and transceiver supply voltage in real time. You can also use the hyperlink of port no. to check the statistics on a specific interface. The SFP Module Information screen in Figure 4-3-1-4 appears.
User’s Manual of IGS series • RX power (dBm) Display the RX power of current SFP DDM module; the RX power value is got – SFP DDM Module Only from the SFP DDM module. Buttons SFP Monitor Event Alert: send trap Warning Temperature: degrees C Check SFP Monitor Event Alert box; it will be in accordance with your warning temperature setting and allows users to record message out via SNMP Trap. Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals.
User’s Manual of IGS series The traffic to be copied to the mirror port is selected as follows: • All frames received on a given port (also known as ingress or source mirroring). • All frames transmitted on a given port (also known as egress or destination mirroring). Mirror Port Configuration The Port Mirror screen in Figure 4-3-1-6 appears.
User’s Manual of IGS series The page includes the following fields: Object Description • Session Select session id to configure. • Mode To Enabled/Disabled the mirror or Remote Mirroring function • Type Mirror The switch is running on mirror mode. The source port(s) and destination port are located on this switch. Source The switch is a source node for monitor flow. The source port(s), reflector port are located on this switch. RMirror destination The switch is an end node for monitor flow.
User’s Manual of IGS series The destination port is a switched port that you receive a copy of traffic from the source port. For a given port, a frame is only transmitted once. It is therefore not possible to mirror Tx frames on the mirror port. Because of this, mode for the selected mirror port is limited to Disabled or Rx only. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
User’s Manual of IGS series 4.3.2 Link Aggregation Port Aggregation optimizes port usage by linking a group of ports together to form a single Link Aggregated Groups (LAGs). Port Aggregation multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy. Each LAG is composed of ports of the same speed, set to full-duplex operations. Ports in a LAG, can be of different media types (UTP/Fiber, or different fiber types), provided they operate at the same speed.
User’s Manual of IGS series The Link Aggregation Control Protocol (LACP) provides a standardized means for exchanging information between Partner Systems that require high speed redundant links. Link aggregation lets you group up to eight consecutive ports into a single dedicated connection. This feature can expand bandwidth to a device on the network. LACP operation requires full-duplex mode, more detail information refer to the IEEE 802.3ad standard.
User’s Manual of IGS series 4.3.2.1 Static Aggregation This page is used to configure the Aggregation hash mode and the aggregation group. The aggregation hash mode settings are global. Hash Code Contributors The Static Aggregation screen in Figure 4-3-2-2 appears. Figure 4-3-2-2 : Aggregation Mode Configuration Page Screenshot The page includes the following fields: Object Description • Source MAC Address The Source MAC address can be used to calculate the destination port for the frame.
User’s Manual of IGS series Figure 4-3-2-3: Aggregation Group Configuration Page Screenshot The page includes the following fields: .Object Description • Group ID Indicates the group ID for the settings contained in the same row. Group ID "Normal" indicates there is no aggregation. Only one group ID is valid per port. • Port Members Each switch port is listed for each group ID.
User’s Manual of IGS series The page includes the following fields: Object Description • Aggr ID Display the Aggregation ID associated with this aggregation instance. • Name Display the Name of the Aggregation group ID. • Type Display the type of the Aggregation group(Static or LACP). • Speed Display the Speed of the Aggregation group. • Configured Ports Display the Configured member ports of the Aggregation group.
User’s Manual of IGS series Figure 4-3-2-5 : LACP Port Configuration Page Screenshot The page includes the following fields: Object Description • Port The switch port number. • LACP Enabled Controls whether LACP is enabled on this switch port. LACP will form an aggregation when 2 or more ports are connected to the same partner. • Key The Key value incurred by the port, range 1-65535 . The Auto setting will set the key as appropriate by the physical link speed, 10Mb = 1, 100Mb = 2, 1Gb = 3.
User’s Manual of IGS series LACP packet. • Priority The Priority controls the priority of the port. If the LACP partner wants to form a larger group than is supported by this device then this parameter will control which ports will be active and which ports will be in a backup role. Lower number means greater priority. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.3.2.
User’s Manual of IGS series 4.3.2.5 LACP Port Status This page provides a status overview of LACP status for all ports. The LACP Port Status screen in Figure 4-5-2-7 appears. Figure 4-3-2-7: LACP Status Page Screenshot The page includes the following fields: Object Description • Port The switch port number. • LACP 'Yes' means that LACP is enabled and the port link is up. 'No' means that LACP is not enabled or that the port link is down.
User’s Manual of IGS series 4.3.2.6 LACP Port Statistics This page provides an overview for LACP statistics for all ports. The LACP Port Status screen in Figure 4-5-2-8 appears. Figure 4-3-2-8: LACP Port Statistics Page Screenshot The page includes the following fields: Object Description • Port The switch port number. • LACP Received Shows how many LACP frames have been received at each port. • LACP Transmitted Shows how many LACP frames have been sent from each port.
User’s Manual of IGS series 4.3.3 VLAN 4.3.3.1 VLAN Overview A Virtual Local Area Network (VLAN) is a network topology configured according to a logical scheme rather than the physical layout. VLAN can be used to combine any collection of LAN segments into an autonomous user group that appears as a single LAN. VLAN also logically segment the network into different broadcast domains so that packets are forwarded only between ports within the VLAN.
User’s Manual of IGS series 4.3.3.2 IEEE 802.1Q VLAN In large networks, routers are used to isolate broadcast traffic for each subnet into separate domains. This Industrial L2+ Managed Switch provides a similar service at Layer 2 by using VLANs to organize any group of network nodes into separate broadcast domains. VLANs confine broadcast traffic to the originating group, and can eliminate broadcast storms in large networks. This also provides a more secure and cleaner network environment. An IEEE 802.
User’s Manual of IGS series ■ 802.1Q VLAN Tags The figure below shows the 802.1Q VLAN tag. There are four additional octets inserted after the source MAC address. Their presence is indicated by a value of 0x8100 in the Ether Type field. When a packet's Ether Type field is equal to 0x8100, the packet carries the IEEE 802.1Q/802.1p tag.
User’s Manual of IGS series Every physical port on a switch has a PVID. 802.1Q ports are also assigned a PVID, for use within the switch. If no VLAN are defined on the switch, all ports are then assigned to a default VLAN with a PVID equal to 1. Untagged packets are assigned the PVID of the port on which they were received. Forwarding decisions are based upon this PVID, in so far as VLAN are concerned. Tagged packets are forwarded according to the VID contained within the tag.
User’s Manual of IGS series ■ Port Overlapping Port overlapping can be used to allow access to commonly shared network resources among different VLAN groups, such as file servers or printers. Note that if you implement VLANs which do not overlap, but still need to communicate, you can connect them by enabled routing on this switch. ■ Untagged VLANs Untagged (or static) VLANs are typically used to reduce broadcast traffic and to increase security.
User’s Manual of IGS series ■ IEEE 802.1Q Tunneling (Q-in-Q) IEEE 802.1Q Tunneling (Q-in-Q) is designed for service providers carrying traffic for multiple customers across their networks. Q-in-Q tunneling is used to maintain customer-specific VLAN and Layer 2 protocol configurations even when different customers use the same internal VLAN IDs.
User’s Manual of IGS series Global VLAN Configuration The Global VLAN Configuration screen in Figure 4-3-3-1 appears. Figure 4-3-3-1 : Global VLAN Configuration Screenshot The page includes the following fields: Object Description • Allowed Access This field shows the allowed Access VLANs, it only affects ports configured as VLANs Access ports. Ports in other modes are members of all VLANs specified in the Allowed VLANs field. By default, only VLAN 1 is enabled.
User’s Manual of IGS series The page includes the following fields: Object Description • Port This is the logical port number for this row. • Mode Access Access ports are normally used to connect to end stations. Dynamic features like Voice VLAN may add the port to more VLANs behind the scenes.
User’s Manual of IGS series Tagging configuration is set to untag Port VLAN. The Port VLAN is called an "Access VLAN" for ports in Access mode and Native VLAN for ports in Trunk or Hybrid mode. • Port Type Ports in hybrid mode allow for changing the port type, that is, whether a frame's VLAN tag is used to classify the frame on ingress to a particular VLAN, and if so, which TPID it reacts on. Likewise, on egress, the Port Type determines the TPID of the tag, if a tag is required.
User’s Manual of IGS series discarded. ■ Untagged Only Only untagged frames are accepted on ingress. Tagged frames are discarded. Egress Tagging This option is only available for ports in Hybrid mode. Ports in Trunk and Hybrid mode may control the tagging of frames on egress. ■ Untag Port VLAN Frames classified to the Port VLAN are transmitted untagged. Other frames are transmitted with the relevant tag. ■ Tag All All frames, whether classified to the Port VLAN or not, are transmitted with a tag.
User’s Manual of IGS series 4.3.3.4 VLAN Membership Status This page provides an overview of membership status for VLAN users. The VLAN Membership Status screen in Figure 4-3-3-3 appears. Figure 4-3-3-3: VLAN Membership Status for Static User Page Screenshot The page includes the following fields: Object Description • VLAN User A VLAN User is a module that uses services of the VLAN management functionality to configure VLAN memberships and VLAN port configuration such as PVID, UVID.
User’s Manual of IGS series a Combo Box). When ALL VLAN Users are selected, it shall show this information for all the VLAN Users, and this is by default. VLAN membership allows the frames classified to the VLAN ID to be forwarded on the respective VLAN member ports. Buttons : Select VLAN Users from this drop down list. Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the page immediately.
User’s Manual of IGS series on the port. VLAN tagged frames are classified to the VLAN ID in the tag. If VLAN awareness is disabled, all frames are classified to the Port VLAN ID and tags are not removed. • Ingress Filtering Show the ingress filtering for a port. This parameter affects VLAN ingress processing. If ingress filtering is enabled and the ingress port is not a member of the classified VLAN of the frame, the frame is discarded.
User’s Manual of IGS series Figure 4-3-3-5: Private VLAN Membership Configuration page screenshot The page includes the following fields: Object Description • Delete To delete a private VLAN entry, check this box. The entry will be deleted during the next save. • Private VLAN ID Indicates the ID of this particular private VLAN. • Port Members A row of check boxes for each port is displayed for each private VLAN ID. To include a port in a Private VLAN, check the box.
User’s Manual of IGS series 4.3.3.7 Port Isolation Overview When a VLAN is configured to be a private VLAN, communication between ports within that VLAN can be prevented. Two application examples are provided in this section: • Customers connected to an ISP can be members of the same VLAN, but they are not allowed to communicate with each other within that VLAN.
User’s Manual of IGS series The configuration of promiscuous and isolated ports applies to all private VLANs. When traffic comes in on a promiscuous port in a private VLAN, the VLAN mask from the VLAN table is applied. When traffic comes in on an isolated port, the private VLAN mask is applied in addition to the VLAN mask from the VLAN table. This reduces the ports to which forwarding can be done to just the promiscuous ports within the private VLAN.
User’s Manual of IGS series 4.3.3.8 VLAN setting example: Separate VLAN 802.1Q VLAN Trunk Port Isolate 4.3.3.8.1 Two Separate 802.1Q VLANs The diagram shows how the Industrial L2+ Managed Switch handle Tagged and Untagged traffic flow for two VLANs. VLAN Group 2 and VLAN Group 3 are separated VLAN. Each VLAN isolate network traffic so only members of the VLAN receive traffic from the same VLAN members.
User’s Manual of IGS series 1. While [PC-1] transmit an untagged packet enters Port-1, the Industrial L2+ Managed Switch will tag it with a VLAN Tag=2. [PC-2] and [PC-3] will received the packet through Port-2 and Port-3. 2. [PC-4],[PC-5] and [PC-6] received no packet. 3. While the packet leaves Port-2, it will be stripped away it tag becoming an untagged packet. 4. While the packet leaves Port-3, it will keep as a tagged packet with VLAN Tag=2. 5.
User’s Manual of IGS series Figure 4-3-3-9: Change Port VLAN of Port 1~3 to be VLAN2 and Port VLAN of Port 4~6 to be VLAN3 3. Enable VLAN Tag for specific ports Link Type: Port-3 (VLAN-2) and Port-6 (VLAN-3) Change Port 3 Mode as Trunk, Selects Egress Tagging as Tag All and Types 2 in the Allowed VLANs column. Change Port 6 Mode as Trunk and Selects Egress Tagging as Tag All and Types 3 in the Allowed VLANs column. The Per Port VLAN configuration in Figure 4-3-3-10 appears.
User’s Manual of IGS series Figure 4-3-3-11: VLAN Trunking Diagram Setup steps 1. Add VLAN Group Add two VLANs – VLAN 2 and VLAN 3 Type 1-3 in Allowed Access VLANs column, the 1-3 is including VLAN1 and 2 and 3. Figure 4-3-3-12: Add VLAN 2 and VLAN 3 2.
User’s Manual of IGS series Figure 4-3-3-13: Changes Port VLAN of Port 1~3 to be VLAN2 and Port VLAN of Port 4~6 to be VLAN3 For the VLAN ports connecting to the hosts, please refer to 4.6.10.1 examples. The following steps will focus on the VLAN Trunk port configuration. 1. Specify Port-7 to be the 802.1Q VLAN Trunk port. 2. Assign Port-7 to both VLAN 2 and VLAN 3 at the VLAN Member configuration page. 3.
User’s Manual of IGS series That is, although the VLAN 2 members: Port-1 to Port-3 and VLAN 3 members: Port-4 to Port-6 also belongs to VLAN 1. But with different PVID settings, packets form VLAN 2 or VLAN 3 is not able to access to the other VLAN. 6. Repeat Steps 1 to 6, set up the VLAN Trunk port at the partner switch and add more VLANs to join the VLAN trunk, repeat Steps 1 to 3 to assign the Trunk port to the VLANs. 4.3.3.8.
User’s Manual of IGS series 4.3.3.9 MAC-based VLAN The MAC-based VLAN entries can be configured here. This page allows for adding and deleting MAC-based VLAN entries and assigning the entries to different ports. This page shows only static entries. The MAC-based VLAN screen in Figure 4-3-3-16 appears.
User’s Manual of IGS series : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the page immediately. : Updates the table starting from the first entry in the MAC-based VLAN Table. : Updates the table, starting with the entry after the last entry currently displayed. 4.3.3.
User’s Manual of IGS series default, no ports are members and all boxes are unchecked. • Adding a New IP subnet-based VLAN Click to add a new IP subnet to VLAN ID mapping entry. An empty row is added to the table, and the mapping can be configured as needed. Any IP address/mask can be configured for the mapping. Legal values for the VLAN ID are 1 to 4095. The IP subnet to VLAN ID mapping entry is enabled when you click on "Apply". The delete button can be used to undo the addition of new mappings.
User’s Manual of IGS series 1. Ethernet 2. LLC 3. SNAP Note: On changing the Frame type field, valid value of the following text field will vary depending on the new frame type you selected. • Value Valid value that can be entered in this text field depends on the option selected from the preceding Frame Type selection menu. Below is the criteria for three different Frame Types: 1. For Ethernet: Values in the text field when Ethernet is selected as a Frame Type is called etype.
User’s Manual of IGS series Buttons : Click to add a new entry in mapping table. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the page immediately. 4.3.3.12 Protocol-based VLAN Membership This page allows you to map a already configured Group Name to a VLAN for the switch.
User’s Manual of IGS series VLAN mapping entry added to the table, the Group Name, VLAN ID and port members can be configured as needed. Legal values for a VLAN ID are 1 through 4095. The “Delete” button can be used to undo the addition of new entry. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.
User’s Manual of IGS series 4.3.4 Spanning Tree Protocol 4.3.4.1 Theory The Spanning Tree protocol can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
User’s Manual of IGS series The path cost to the root from the transmitting port The port identifier of the transmitting port The switch sends BPDUs to communicate and construct the spanning-tree topology. All switches connected to the LAN on which the packet is transmitted will receive the BPDU. BPDUs are not directly forwarded by the switch, but the receiving switch uses the information in the frame to calculate a BPDU, and, if the topology changes, initiates a BPDU transmission.
User’s Manual of IGS series From learning to forwarding or to disabled From forwarding to disabled From disabled to blocking Figure 4-3-4-1: STP Port State Transitions You can modify each port state by using management software. When you enable STP, every port on every switch in the network goes through the blocking state and then transitions through the states of listening and learning at power up. If properly configured, each port stabilizes to the forwarding or blocking state.
User’s Manual of IGS series The following are the user-configurable STP parameters for the switch level: Parameter Description Default Value Bridge Identifier(Not user A combination of the User-set priority and 32768 + MAC configurable the switch’s MAC address.
User’s Manual of IGS series User-Changeable STA Parameters The Switch’s factory default setting should cover the majority of installations. However, it is advisable to keep the default settings as set at the factory; unless, it is absolutely necessary. The user changeable parameters in the Switch are as follows: Priority – A Priority for the switch can be set from 0 to 65535. 0 is equal to the highest Priority. Hello Time – The Hello Time can be from 1 to 10 seconds.
User’s Manual of IGS series Figure 4-3-4-2: Before Applying the STA Rules In this example, only the default STP values are used.
User’s Manual of IGS series The switch with the lowest Bridge ID (switch C) was elected the root bridge, and the ports were selected to give a high port cost between switches B and C. The two (optional) Gigabit ports (default port cost = 20,000) on switch A are connected to one (optional) Gigabit port on both switch B and C. The redundant link between switch B and C is deliberately chosen as a 100 Mbps Fast Ethernet link (default port cost = 200,000).
User’s Manual of IGS series The page includes the following fields: Basic Settings Object Description • Protocol Version The STP protocol version setting. Valid values are: STP (IEEE 802.1D Spanning Tree Protocol) RSTP (IEEE 802.2w Rapid Spanning Tree Protocol) MSTP (IEEE 802.1s Multiple Spanning Tree Protocol) • Bridge Priority Controls the bridge priority. Lower numeric values have better priority.
User’s Manual of IGS series • Edge Port BPDU Guard Control whether a port explicitly configured as Edge will disable itself upon reception of a BPDU. The port will enter the error-disabled state, and will be removed from the active topology. • Port Error Recovery Control whether a port in the error-disabled state automatically will be enabled after a certain time. If recovery is not enabled, ports have to be disabled and re-enabled for normal STP operation.
User’s Manual of IGS series • Root ID The Bridge ID of the currently elected root bridge. • Root Port The switch port currently assigned the root port role. • Root Cost Root Path Cost. For the Root Bridge this is zero. For all other Bridges, it is the sum of the Port Path Costs on the least cost path to the Root Bridge. • Topology Flag The current state of the Topology Change Flag for this Bridge instance. • Topology Change Last The time since last Topology Change occurred.
User’s Manual of IGS series The page includes the following fields: Object Description • Port The switch port number of the logical STP port. • STP Enabled Controls whether RSTP is enabled on this switch port. • Path Cost Controls the path cost incurred by the port. The Auto setting will set the path cost as appropriate by the physical link speed, using the 802.1D recommended values. Using the Specific setting, a user-defined value can be entered.
User’s Manual of IGS series • Point-to-point Controls whether the port connects to a point-to-point LAN rather than a shared medium. This can be automatically determined, or forced either true or false. Transitions to the forwarding state is faster for point-to-point LANs than for shared media. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
User’s Manual of IGS series 4.3.4.5 MSTI Priorities This page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. The MSTI Priority screen in Figure 4-3-4-7 appears. Figure 4-3-4-7: MSTI Priority Page Screenshot The page includes the following fields: Object Description • MSTI The bridge instance. The CIST is the default instance, which is always active. • Priority Controls the bridge priority.
User’s Manual of IGS series 4.3.4.6 MSTI Configuration This page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. The MSTI Configuration screen in Figure 4-3-4-8 appears. Figure 4-3-4-8: MSTI Configuration Page Screenshot The page includes the following fields: Configuration Identification Object Description • Configuration Name The name identifying the VLAN to MSTI mapping.
User’s Manual of IGS series MSTI Mapping Object Description • MSTI The bridge instance. The CIST is not available for explicit mapping, as it will receive the VLANs not explicitly mapped. • VLANs Mapped The list of VLAN's mapped to the MSTI. The VLANs must be separated with comma and/or space. A VLAN can only be mapped to one MSTI. A unused MSTI should just be left empty. (I.e. not having any VLANs mapped to it.
User’s Manual of IGS series Figure 4-3-4-10 : MST1 MSTI Port Configuration Page Screenshot The page includes the following fields: MSTx MSTI Port Configuration Object Description • Port The switch port number of the corresponding STP CIST (and MSTI) port. • Path Cost Controls the path cost incurred by the port. The Auto setting will set the path cost as appropriate by the physical link speed, using the 802.1D recommended values. Using the Specific setting, a user-defined value can be entered.
User’s Manual of IGS series 4.3.4.8 Port Status This page displays the STP CIST port status for port physical ports in the currently selected switch. The STP Port Status screen in Figure 4-3-4-11 appears. Figure 4-3-4-11: STP Port Status Page Screenshot The page includes the following fields: Object Description • Port The switch port number of the logical STP port. • CIST Role The current STP port role of the ICST port.
User’s Manual of IGS series 4.3.4.9 Port Statistics This page displays the STP port statistics counters for port physical ports in the currently selected switch. The STP Port Statistics screen in Figure 4-3-4-12 appears. Figure 4-3-4-12: STP Statistics Page Screenshot The page includes the following fields: Object Description • Port The switch port number of the logical RSTP port. • MSTP The number of MSTP Configuration BPDU's received/transmitted on the port.
User’s Manual of IGS series 4.3.5 Multicast 4.3.5.1 IGMP Snooping The Internet Group Management Protocol (IGMP) lets host and routers share information about multicast groups memberships. IGMP snooping is a switch feature that monitors the exchange of IGMP messages and copies them to the CPU for feature processing. The overall purpose of IGMP Snooping is to limit the forwarding of multicast frames to only ports that are a member of the multicast group.
User’s Manual of IGS series Figure 4-3-5-2: Multicast Flooding Figure 4-3-5-3: IGMP Snooping Multicast Stream Control 191
User’s Manual of IGS series IGMP Versions 1 and 2 Multicast groups allow members to join or leave at any time. IGMP provides the method for members and multicast routers to communicate when joining or leaving a multicast group. IGMP version 1 is defined in RFC 1112. It has a fixed packet size and no optional data.
User’s Manual of IGS series The states a computer will go through to join or to leave a multicast group are shown below: Figure 4-3-5-4: IGMP State Transitions IGMP Querier – A router, or multicast-enabled switch, can periodically ask their hosts if they want to receive multicast traffic. If there is more than one router/switch on the LAN performing IP multicasting, one of these devices is elected “querier” and assumes the role of querying the LAN for group members.
User’s Manual of IGS series Figure 4-3-5-5: IPMC Profile Configuration Page The page includes the following fields: Object Description • Global Profile Mode Enable/Disable the Global IPMC Profile. System starts to do filtering based on profile settings only when the global profile mode is enabled. • Delete Check to delete the entry. The designated entry will be deleted during the next save. • Profile Name The name used for indexing the profile table.
User’s Manual of IGS series 4.3.5.3 Address Entry This page provides address range settings used in IPMC profile. The address entry is used to specify the address range that will be associated with IPMC Profile. It is allowed to create at maximum 128 address entries in the system. The Profile Table screen in Figure 4-3-5-6 appears. Figure 4-3-5-6: IPMC Profile Address Configuration Page The page includes the following fields: Object Description • Delete Check to delete the entry.
User’s Manual of IGS series 4.3.5.4 IGMP Snooping Configuration This page provides IGMP Snooping related configuration. The IGMP Snooping Configuration screen in Figure 4-3-5-7 appears. Figure 4-3-5-7: IGMP Snooping Configuration Page Screenshot The page includes the following fields: Object Description • Snooping Enabled Enable the Global IGMP Snooping. • Unregistered IPMCv4 Enable unregistered IPMCv4 traffic flooding.
User’s Manual of IGS series Ethernet switch that leads towards the Layer 3 multicast device or IGMP querier. The Switch forwards IGMP join or leave packets to an IGMP router port. Auto: Select “Auto” to have the Industrial L2+ Managed Switch automatically uses the port as IGMP Router port if the port receives IGMP query packets. Fix: The Industrial L2+ Managed Switch always uses the specified port as an IGMP Router port.
User’s Manual of IGS series Figure 4-3-5-8: IGMP Snooping VLAN Configuration Page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry. The designated entry will be deleted during the next save. • VLAN ID The VLAN ID of the entry. • IGMP Snooping Enable Enable the per-VLAN IGMP Snooping. Only up to 32 VLANs can be selected. • Querier Election Enable the IGMP Querier election in the VLAN. Disable to act as an IGMP Non-Querier.
User’s Manual of IGS series packet loss on a network. The allowed range is 1 to 255, default robustness variable value is 2. • QI Query Interval. The Query Interval is the interval between General Queries sent by the Querier. The allowed range is 1 to 31744 seconds, default query interval is 125 seconds. • QRI Query Response Interval. The Max Response Time used to calculate the Max Resp Code inserted into the periodic General Queries.
User’s Manual of IGS series IGMP filtering enables you to assign a profile to a switch port that specifies multicast groups that are permitted or denied on the port. An IGMP filter profile can contain one or more, or a range of multicast addresses; but only one profile can be assigned to a port. When enabled, IGMP join reports received on the port are checked against the filter profile. If a requested multicast group is permitted, the IGMP join report is forwarded as normal.
User’s Manual of IGS series 4.3.5.7 IGMP Snooping Status This page provides IGMP Snooping status. The IGMP Snooping Status screen in Figure 4-3-5-10 appears. Figure 4-3-5-10: IGMP Snooping Status Page Screenshot The page includes the following fields: Object Description • VLAN ID The VLAN ID of the entry. • Querier Version Working Querier Version currently. • Host Version Working Host Version currently. • Querier Status Show the Querier status is "ACTIVE" or "IDLE".
User’s Manual of IGS series Buttons : Click to refresh the page immediately. : Clears all Statistics counters. Auto-refresh : Automatic refresh occurs every 3 seconds. 4.3.5.8 IGMP Group Information Entries in the IGMP Group Table are shown on this Page. The IGMP Group Table is sorted first by VLAN ID, and then by group. Each page shows up to 99 entries from the IGMP Group table, default being 20, selected through the "entries per page" input field.
User’s Manual of IGS series 4.3.6 MLD Snooping 4.3.6.1 MLD Snooping Configuration This page provides MLD Snooping related configuration. The MLD Snooping Configuration screen in Figure 4-3-6-1 appears. Figure 4-3-6-1: MLD Snooping Configuration Page Screenshot The page includes the following fields: Object Description • Snooping Enabled Enable the Global MLD Snooping. • Unregistered IPMCv6 Enable unregistered IPMCv6 traffic flooding.
User’s Manual of IGS series unnecessary leave messages to the router side. • Proxy Enable Enable MLD Proxy. This feature can be used to avoid forwarding unnecessary join and leave messages to the router side. • Router Port Specify which ports act as router ports. A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or MLD querier. If an aggregation member port is selected as a router port, the whole aggregation will act as a router port.
User’s Manual of IGS series save. • VLAN ID The VLAN ID of the entry. • MLD Snooping Enable Enable the per-VLAN MLD Snooping. Up to 32 VLANs can be selected for MLD Snooping. • Querier Election Enable to join MLD Querier election in the VLAN. Disable to act as a MLD Non-Querier. • Compatibility Compatibility is maintained by hosts and routers taking appropriate actions depending on the versions of MLD operating on hosts and routers within a network.
User’s Manual of IGS series Click "Save". The specific MLD VLAN starts working after the corresponding static VLAN is also created. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.3.6.3 MLD Snooping Port Group Filtering In certain switch applications, the administrator may want to control the multicast services that are available to end users. For example, an IP/TV service based on a specific subscription plan.
User’s Manual of IGS series • Filtering Group Select the IPMC Profile as the filtering condition for the specific port. Summary about the designated profile will be shown by clicking the view button. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.3.6.4 MLD Snooping Status This page provides MLD Snooping status. The IGMP Snooping Status screen in Figure 4-3-6-4 appears.
User’s Manual of IGS series • Querier Transmitted The number of Transmitted Querier. • Querier Received The number of Received Querier. • V1 Reports Received The number of Received V1 Reports. • V2 Reports Received The number of Received V2 Reports. • V1 Leave Received The number of Received V1 Leaves. • Router Port Display which ports act as router ports. A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or MLD querier.
User’s Manual of IGS series The page includes the following fields: Object Description • VLAN ID VLAN ID of the group. • Groups Group address of the group displayed. • Port Members Ports under this group. Buttons Auto-refresh : Automatic refresh occurs every 3 seconds. : Click to refresh the page immediately. : Updates the table, starting with the first entry in the IGMP Group Table. : Updates the table, starting with the entry after the last entry currently displayed. 4.3.6.
User’s Manual of IGS series • Mode Indicates the filtering mode maintained per (VLAN ID, port number, Group Address) basis. It can be either Include or Exclude. • Source Address IP Address of the source. Currently, system limits the total number of IP source addresses for filtering to be 128. • Type Indicates the Type. It can be either Allow or Deny.
User’s Manual of IGS series 4.3.7 MVR (Multicast VLAN Registration) The MVR feature enables multicast traffic forwarding on the Multicast VLANs. ■ In a multicast television application, a PC or a network television or a set-top box can receive the multicast stream. ■ Multiple set-top boxes or PCs can be connected to one subscriber port, which is a switch port configured as an MVR receiver port.
User’s Manual of IGS series Figure 4-3-7-1: MVR Configuration Page Screenshot The page includes the following fields: Object Description • MVR Mode Enable/Disable the Global MVR. The Unregistered Flooding control depends on the current configuration in IGMP/MLD Snooping. It is suggested to enable Unregistered Flooding control when the MVR group table is full. • Delete Check to delete the entry. The designated entry will be deleted during the next save. • MVR VID Specify the Multicast VLAN ID.
User’s Manual of IGS series given, it should contain at least one alphabet. MVR VLAN name can be edited for the existing MVR VLAN entries or it can be added to the new entries. • IGMP Address Define the IPv4 address as source address used in IP header for IGMP control frames. The default IGMP address is not set (0.0.0.0). When the IGMP address is not set, system uses IPv4 management address of the IP interface associated with this VLAN.
User’s Manual of IGS series The default Role is Inactive. • Immediate Leave Enable the fast leave on the port. Buttons : Click to add new MVR VLAN. Specify the VID and configure the new entry. Click "Save" : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.3.7.2 MVR Status This page provides MVR status. The MVR Status screen in Figure 4-3-7-2 appears.
User’s Manual of IGS series 4.3.7.3 MVR Groups Information Entries in the MVR Group Table are shown on this page. The MVR Group Table is sorted first by VLAN ID, and then by group. Each page shows up to 99 entries from the MVR Group table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the MVR Group Table.
User’s Manual of IGS series Each page shows up to 99 entries from the MVR SFM Information Table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the MVR SFM Information Table. The "Start from VLAN", and "Group Address" input fields allow the user to select the starting point in the MVR SFM Information Table. The MVR SFM Information screen in Figure 4-3-7-4 appears.
User’s Manual of IGS series 4.3.8 LLDP 4.3.8.1 Link Layer Discovery Protocol Link Layer Discovery Protocol (LLDP) is used to discover basic information about neighboring devices on the local broadcast domain. LLDP is a Layer 2 protocol that uses periodic broadcasts to advertise information about the sending device. Advertised information is represented in Type Length Value (TLV) format according to the IEEE 802.
User’s Manual of IGS series The page includes the following fields: LLDP Parameters Object Description • Tx Interval The switch is periodically transmitting LLDP frames to its neighbors for having the network discovery information up-to-date. The interval between each LLDP frame is determined by the Tx Interval value. Valid values are restricted to 5 32768 seconds.
User’s Manual of IGS series information from neighbor units is analyzed. Tx only The switch will drop LLDP information received from neighbors, but will send out LLDP information. Disabled The switch will not send out LLDP information, and will drop LLDP information received from neighbors. Enabled The switch will send out LLDP information, and will analyze LLDP information received from neighbors. • CDP Aware Select CDP awareness.
User’s Manual of IGS series information transmitted. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.3.8.3 LLDP Neighbor This page provides a status overview for all LLDP neighbors. The displayed table contains a row for each port on which an LLDP neighbor is detected. The LLDP Neighbor Information screen in Figure 4-3-8-2 appears.
User’s Manual of IGS series 8. Station only 9. Reserved When a capability is enabled, the capability is followed by (+). If the capability is disabled, the capability is followed by (-). • Management Address Management Address is the neighbor unit's address that is used for higher layer entities to assist the discovery by the network management. This could for instance hold the neighbor's IP address. : Click to refresh the page immediately.
User’s Manual of IGS series The page includes the following fields: Fast start repeat count Object Description • Fast start repeat count Rapid startup and Emergency Call Service Location Identification Discovery of endpoints is a critically important aspect of VoIP systems in general.
User’s Manual of IGS series • Transmit TLVs Policies • Transmit TLVs Location • Device Type When checked the configured policies for the interface is included in LLDP-MED information transmitted. When checked the configured location information for the switch is included in LLDP-MEDinformation transmitted. Any LLDP-MED Device is operating as a specific type of LLDP-MED Device, which may be either a Network Connectivity Device or a specific Class of Endpoint Device, as defined below.
User’s Manual of IGS series of the prime meridian. • Altitude Altitude SHOULD be normalized to within -32767 to 32767 with a maximum of 4 digits. It is possible to select between two altitude types (floors or meters). Meters: Representing meters of Altitude defined by the vertical datum specified. Floors: Representing altitude in a form more relevant in buildings which have different floor-to-floor dimensions. An altitude = 0.
User’s Manual of IGS series • House no. House number - Example: 21 • House no.
User’s Manual of IGS series This network policy is potentially advertised and associated with multiple sets of application types supported on a given port. The application types specifically addressed are: 1. Voice 2. Guest Voice 3. Softphone Voice 4. Video Conferencing 5. Streaming Video 6.
User’s Manual of IGS series Voice application policy. Softphone Voice - for use by softphone applications on typical data centric devices, such as PCs or laptops. This class of endpoints frequently does not support multiple VLANs, if at all, and are typically configured to use an 'untagged’ VLAN or a single 'tagged’ data specific VLAN. When a network policy is defined for use with an 'untagged’ VLAN (see Tagged flag below), then the L2 priority field is ignored and only the DSCP value has relevance.
User’s Manual of IGS series application type as defined in IETF RFC 2474. DSCP may contain one of 64 code point values (0 through 63). A value of 0 represents use of the default DSCP value as defined in RFC 2475. • Adding a new policy Click to add a new policy. Specify the Application type, Tag, VLAN ID, L2 Priority and DSCP for the new policy. Click "Save".
User’s Manual of IGS series Object Description • Port The port on which the LLDP frame was received. • Device Type LLDP-MED Devices are comprised of two primary Device Types: Network Connectivity Devices and Endpoint Devices. LLDP-MED Network Connectivity Device Definition LLDP-MED Network Connectivity Devices, as defined in TIA-1057, provide access to the IEEE 802 based LAN infrastructure for LLDP-MED Endpoint Devices.
User’s Manual of IGS series aspects related to media streaming. Example product categories expected to adhere to this class include (but are not limited to) Voice / Media Gateways, Conference Bridges, Media Servers, and similar. Discovery services defined in this class include media-type-specific network layer policy discovery.
User’s Manual of IGS series policy for the guest voice signaling than for the guest voice media. Softphone Voice - for use by softphone applications on typical data centric devices, such as PCs or laptops. Video Conferencing - for use by dedicated Video Conferencing equipment and other similar appliances supporting real-time interactive video/audio services.
User’s Manual of IGS series • Auto-negotiation Auto-negotiation Capabilities shows the link partners MAC/PHY capabilities. Capabilities Buttons : Click to refresh the page immediately. Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. 4.3.8.6 Port Statistics This page provides an overview of all LLDP traffic. Two types of counters are shown.
User’s Manual of IGS series The page includes the following fields: Global Counters Object Description • Clear global counters If checked the global counters are cleared when • Neighbor entries were It also shows the time when the last entry was last deleted or added. It also last changed shows the time elapsed since the last change was detected. • Total Neighbors Shows the number of new entries added since switch reboot. is pressed.
User’s Manual of IGS series age out time, the LLDP information is removed, and the Age-Out counter is incremented. Buttons : Click to refresh the page immediately. : Clears the local counters. All counters (including global counters) are cleared upon reboot. Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.
User’s Manual of IGS series 4.3.9 MAC Address Table Switching of frames is based upon the DMAC address contained in the frame. The Industrial L2+ Managed Switch builds up a table that maps MAC addresses to switch ports for knowing which ports the frames should go to (based upon the DMAC address in the frame ). This table contains both static and dynamic entries.
User’s Manual of IGS series The page includes the following fields: Aging Configuration By default, dynamic entries are removed from the MAC table after 300 seconds. This removal is also called aging. Object Description • Disable Automatic Enables/disables the automatic aging of dynamic entries Aging • Aging Time The time after which a learned entry is discarded. By default, dynamic entries are removed from the MAC after 300 seconds. This removal is also called aging.
User’s Manual of IGS series Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.3.9.2 MAC Address Table Status Dynamic MAC Table Entries in the MAC Table are shown on this page. The MAC Table contains up to 8192 entries, and is sorted first by VLAN ID, then by MAC address. The MAC Address Table screen in Figure 4-3-9-2 appears.
User’s Manual of IGS series In addition, the two input fields will - upon a “Refresh” button click - assume the value of the first displayed entry, allowing for continuous refresh with the same start address. The “>>” will use the last entry of the currently displayed VLAN/MAC address pairs as a basis for the next lookup. When the end is reached the text "no more entries" is shown in the displayed table. Use the “|<<” button to start over.
User’s Manual of IGS series 4.3.10 Loop Protection This chapter describes enabling loop protection function that provides loop protection to prevent broadcast loops in Industrial L2+ Managed Switch. 4.3.10.1 Configuration This page allows the user to inspect the current Loop Protection configurations, and possibly change them as well as screen in Figure 4-3-10-1 appears.
User’s Manual of IGS series Port Configuration Object Description • Port The switch port number of the port. • Enable Controls whether loop protection is enabled on this switch port. • Action Configures the action performed when a loop is detected on a port. Valid values are Shutdown Port, Shutdown Port and Log or Log Only. • Tx Mode Controls whether the port is actively generating loop protection PDU's, or whether it is just passively looking for looped PDU's.
User’s Manual of IGS series The page includes the following fields: Object Description • Port The Industrial L2+ Managed Switch port number of the logical port. • Action The currently configured port action. • Transmit The currently configured port transmit mode. • Loops The number of loops detected on this port. • Status The current loop protection status of the port. • Loop Whether a loop is currently detected on the port. • Time of Last Loop The time of the last loop event detected.
User’s Manual of IGS series 4.3.11 UDLD Unidirectional Link Detection (UDLD) is a data link layer protocol from Cisco Systems to monitor the physical configuration of the cables and detect unidirectional links. UDLD complements the Spanning Tree Protocol which is used to eliminate switching loops.. 4.3.11.1 UDLD Port Configuration This page allows the user to inspect the current UDLDconfigurations, and possibly change them as well. as screen in Figure 4-3-11-1 appears.
User’s Manual of IGS series Aggressive: In aggressive mode, unidirectional detected ports will get shutdown. To bring back the ports up, need to disable UDLDon that port • Message Interval Configures the period of time between UDLD probe messages on ports that are in the advertisement phase and are determined to be bidirectional. The range is from 7 to 90 seconds(Default value is 7 seconds)(Currently default time interval is supported, due to lack of detailed information in RFC 5171).
User’s Manual of IGS series The page includes the following fields: UDLD port status Object Description • UDLD Admin State The current port state of the logical port, Enabled if any of state(Normal,Aggressive) is Enabled. • Device ID(local) The ID of Device • Device Name(local) Name of the Device. • Bidirectional State The current state of the port. Neighbour Status Object Description • Port The current port of neighbour device • Device ID The current ID of neighbour device.
User’s Manual of IGS series 4.3.12 GVRP GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) is a protocol that facilitates control of virtual local area networks (VLANs) within a larger network 4.3.12.1 GVRP Configuration This page allows you to configure the global GVRP configuration settings that are commonly applied to all GVRP enabled ports. as well. as screen in Figure 4-3-12-1 appears.
User’s Manual of IGS series specified. By default this number is 20. This number can only be changed when GVRP is turned off. Buttons : Click to refresh the page. Note that unsaved changes will be lost. : Click to undo any changes made locally and revert to previously saved values. 4.3.12.2 GVRP Port Configuration This configuration can be performed either before or after GVRP is configured globally - the protocol operation will be the same. as well. as screen in Figure 4-3-12-2 appears.
User’s Manual of IGS series The page includes the following fields: General Settings Object Description • Port The logical port that is to be configured. • Mode Mode can be either 'Disabled' or 'GVRP enabled'. These values turn the GVRP feature off or on respectively for the port in question. Buttons : Click to refresh the page. Note that unsaved changes will be lost. : Click to undo any changes made locally and revert to previously saved values.
User’s Manual of IGS series 4.3.13 PTP The Precision Time Protocol (PTP) is a protocol used to synchronize clocks throughout a computer network. On a local area network, it achieves clock accuracy in the sub-microsecond range, making it suitable for measurement and control systems. PTP was originally defined in the IEEE 1588-2002 standard, officially entitled "Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems" and published in 2002.
User’s Manual of IGS series Master Only - clock's Device Type is Master Only. Slave Only - clock's Device Type is Slave Only • Port List Set check mark for each port configured for this Clock Instance. • 2 Step Flag Static member: defined by the system, true if two-step Sync events and Pdelay_Resp events are used. • Clock Identity It shows unique clock identifier. • One Way If true, one-way measurements are used. This parameter applies only to a slave.
User’s Manual of IGS series Local Clock Current Time Object Description • PTP Time Shows the actual PTP time with nanosecond resolution. • Clock Adjustment Shows the actual clock adjustment method. The method depends on the Method • Synchronize to System available hardware. Activate this button to synchronize the System Clock to PTP Time. Clock • Ports Configuration Click to edit the port data set for the ports assigned to this clock instance.
User’s Manual of IGS series • One-Way If true, one way measurements are used. This parameter applies only to a slave. In one-way mode no delay measurements are performed, i.e. this is applicable only if frequency synchronization is needed. The master always responds to delay requests. • VLAN Tag Enable Enables the VLAN tagging for the PTP frames. • VID VLAN Identifier used for tagging the VLAN packets. • PCP Priority Code Point value used for PTP frames.
User’s Manual of IGS series Servo Parameters Object Description • Display If true then Offset From Master, MeanPathDelay and clockAdjustment are logged on the debug terminal • P-enable If true the P part of the algorithm is included • I-enable If true the I part of the algorithm is included • D-enable If true the D part of the algorithm is included ‘P’ constant [1..1000] see above • ‘I’ constant [1..1000] see above ‘D’ constant [1..
User’s Manual of IGS series 4.4 Quality of Service 4.4.1 General Quality of Service (QoS) is an advanced traffic prioritization feature that allows you to establish control over network traffic. QoS enables you to assign various grades of network service to different types of traffic, such as multi-media, video, protocol-specific, time critical, and file-backup traffic. QoS reduces bandwidth limitations, delay, loss, and jitter.
User’s Manual of IGS series 4.4.1.1 QoS Port Classification This page allows you to configure the basic QoS Classification settings for all switch ports. The Port classification screen in Figure 4-4-1-1 appears. Figure 4-4-1-1: QoS Ingress Port Policers Page Screenshot The page includes the following fields: Object Description • Port The port number for which the configuration below applies. • CoS Controls the default CoS value. All frames are classified to a CoS.
User’s Manual of IGS series frame is classified to the PCP value in the tag. Otherwise the frame is classified to the default PCP value. • DEI Controls the default DEI value. All frames are classified to a DEI value. If the port is VLAN aware and the frame is tagged, then the frame is classified to the DEI value in the tag. Otherwise the frame is classified to the default DEI value. • CoS ID Controls the default CoS ID value.
User’s Manual of IGS series Figure 4-4-1-2 : QoS Ingress Port Classification Page Screenshot The page includes the following fields: Object Description • Port The port number for which the configuration below applies. • Enable (E) Enable or disable the queue policer for this switch port. • Rate Controls the rate for the queue policer. This value is restricted to 25-13128147 when "Unit" is kbps, and 1-13128 when "Unit" is Mbps.
User’s Manual of IGS series Figure 4-4-1-3: Port Tag Remarking Page Screenshot The page includes the following fields: Object Description • Port The logical port for the settings contained in the same row. Click on the port number in order to configure tag remarking • Mode Shows the tag remarking mode for this port. Classified: Use classified PCP/DEI values. Default: Use default PCP/DEI values. Mapped: Use mapped versions of CoS and DPL. 4.4.1.
User’s Manual of IGS series Figure 4-4-1-4: QoS Egress Port Shapers Page Screenshot The page includes the following fields: Object Description • Group The WRED group number for which the configuration below applies. • Queue The queue number (CoS) for which the configuration below applies. • DPL The Drop Precedence Level for which the configuration below applies. • Enable Controls whether RED is enabled for this entry. • Min Controls the lower RED fill level threshold.
User’s Manual of IGS series 4.4.1.5 Statistics This page provides statistics for the different queues for all switch ports. The statistics screen in Figure 4-4-1-5 appears. Figure 4-4-1-5: QoS Statistics Page Screenshot The page includes the following fields: Object Description • Port The logical port for the settings contained in the same row. • Qn There are 8 QoS queues per port. Q0 is the lowest priority queue. • Rx/Tx The number of received and transmitted packets per queue.
User’s Manual of IGS series 4.4.2 Bandwidth Control 4.4.2.1 Port Policing This page allows you to configure the Policer settings for all switch ports. The Port Policing screen in Figure 4-4-2-1 appears. Figure 4-4-2-1: QoS Ingress Port Policers Page Screenshot The page includes the following fields: Object Description • Port The port number for which the configuration below applies. • Enable Controls whether the policer is enabled on this switch port. • Rate Controls the rate for the policer.
User’s Manual of IGS series 4.4.2.2 Port Schedule The Port Scheduler and Shapers for a specific port are configured on this page. The QoS Egress Port Schedule and Shaper screen in Figure 4-4-2-2 appears.
User’s Manual of IGS series • Schedule Mode Controls whether the scheduler mode is "Strict Priority" or "Weighted" on this switch port. • Queue Shaper Enable Controls whether the queue shaper is enabled for this queue on this switch port. • Queue Shaper Rate Controls the rate for the queue shaper. This value is restricted to 100-1000000 when the "Unit" is "kbps", and it is restricted to 1-13200 when the "Unit" is "Mbps". The default value is 500.
User’s Manual of IGS series Figure 4-4-2-3: QoS Egress Port Schedule and Shapers Page Screenshot The page includes the following fields: Object Description • Schedule Mode Controls whether the scheduler mode is "Strict Priority" or "Weighted" on this switch port. • Queue Shaper Enable Controls whether the queue shaper is enabled for this queue on this switch port. • Queue Shaper Rate Controls the rate for the queue shaper.
User’s Manual of IGS series This value is restricted to 100-1000000 when the "Unit" is "kbps", and it is restricted to 1-13200 when the "Unit" is "Mbps". The default value is 500. • Queue Shaper Unit Controls the unit of measure for the queue shaper rate as "kbps" or "Mbps". The default value is "kbps". • Queue Shaper Excess Controls whether the queue is allowed to use excess bandwidth. • Queue Scheduler Controls the weight for this queue. Weight This value is restricted to 1-100.
User’s Manual of IGS series 4.4.3 Storm Control 4.4.3.1 Storm Policing Configuration Storm control for the switch is configured on this page. There is a unicast storm rate control, multicast storm rate control, and a broadcast storm rate control. These only affect flooded frames, i.e. frames with a (VLAN ID, DMAC) pair not present on the MAC Address table. The configuration indicates the permitted packet rate for unicast, multicast or broadcast traffic across the switch.
User’s Manual of IGS series 4.4.4 Differentiated Service 4.4.4.1 Port DSCP This page allows you to configure the basic QoS Port DSCP Configuration settings for all switch ports. The Port DSCP screen in Figure 4-9-8 appears. Figure 4-4-4-1: QoS Port DSCP Configuration Page Screenshot The page includes the following fields: Object Description • Port The Port column shows the list of ports for which you can configure dscp ingress and egress settings.
User’s Manual of IGS series Enable: Rewrite enable without remapped. Remap DP Unaware: DSCP from analyzer is remapped and frame is remarked with remapped DSCP value. The remapped DSCP value is always taken from the 'DSCP Translation->Egress Remap DP0' table. Remap DP Aware: DSCP from analyzer is remapped and frame is remarked with remapped DSCP value.
User’s Manual of IGS series The page includes the following fields: Object Description • DSCP Maximum number of supported DSCP values are 64. • Trust Controls whether a specific DSCP value is trusted. Only frames with trusted DSCP values are mapped to a specific QoS class and Drop Precedence Level. Frames with untrusted DSCP values are treated as a non-IP frame. • QoS Class QoS Class value can be any of (0-7) • DPL Drop Precedence Level (0-1) 4.4.4.
User’s Manual of IGS series The page includes the following fields: Object Description • DSCP Maximum number of supported DSCP values are 64 and valid DSCP value ranges from 0 to 63. • Ingress Ingress side DSCP can be first translated to new DSCP before using the DSCP for QoS class and DPL map. There are two configuration parameters for DSCP Translation – ■ Translate ■ Classify • Translate DSCP at Ingress side can be translated to any of (0-63) DSCP values.
User’s Manual of IGS series Figure 4-4-4-4: DSCP Classification Page Screenshot The page includes the following fields: Object Description • QoS Class Available QoS Class value ranges from 0 to 7. QoS Class (0-7) can be mapped to followed parameters. • DPL Actual Drop Precedence Level. • DSCP Select DSCP value (0-63) from DSCP menu to map DSCP to corresponding QoS Class and DPL value Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
User’s Manual of IGS series 4.4.5 QCL 4.4.5.1 QoS Control List This page shows the QoS Control List(QCL), which is made up of the QCEs. Each row describes a QCE that is defined. The maximum number of QCEs is 256 on each switch. Click on the lowest plus sign to add a new QCE to the list. The QoS Control List screen in Figure 4-4-5-1 appears. Figure 4-4-5-1: QoS Control List Configuration Page Screenshot The page includes the following fields: Object Description • QCE# Indicates the index of QCE.
User’s Manual of IGS series range(0-1, 2-3, 4-5, 6-7, 0-3, 4-7) or 'Any'. • DEI Drop Eligible Indicator: Valid value of DEI can be any of values between 0, 1 or 'Any'. • Frame Type Indicates the type of frame to look for incoming frames. Possible frame types are: ■ Any: The QCE will match all frame type. ■ Ethernet: Only Ethernet frames (with Ether Type 0x600-0xFFFF) are allowed. • Action ■ LLC: Only (LLC) frames are allowed. ■ SNAP: Only (SNAP) frames are allowed.
User’s Manual of IGS series Figure 4-4-5-2: QCE Configuration Page Screenshot The page includes the following fields: Object Description • Port Members Check the checkbox button in case you what to make any port member of the QCL entry.
User’s Manual of IGS series 3. LLC 4. SNAP 5. IPv4 6. IPv6 Note: all frame types are explained below. • Any Allow all types of frames. • EtherType Ethernet Type Valid Ethernet type can have value within 0x600-0xFFFF or 'Any' but excluding 0x800(IPv4) and 0x86DD(IPv6), default value is 'Any'.
User’s Manual of IGS series • Action Parameters Class QoS class: (0-7) or 'Default'. DPL Valid Drop Precedence Level can be (0-3) or 'Default'. DSCP Valid DSCP value can be (0-63, BE, CS1-CS7, EF or AF11-AF43) or 'Default'. 'Default' means that the default classified value is not modified by this QCE. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values : Return to the previous page without saving the configuration change 4.4.5.
User’s Manual of IGS series ■ Ethernet: Only Ethernet frames (with Ether Type 0x600-0xFFFF) are allowed. • Action ■ LLC: Only (LLC) frames are allowed. ■ SNAP: Only (SNAP) frames are allowed. ■ IPv4: The QCE will match only IPV4 frames. ■ IPv6: The QCE will match only IPV6 frames. Indicates the classification action taken on ingress frame if parameters configured are matched with the frame's content. There are three action fields: Class, DPL and DSCP.
User’s Manual of IGS series Figure 4-4-5-4: Voice VLAN Configuration Page Screenshot The page includes the following fields: Object Description • Mode Indicates the Voice VLAN mode operation. We must disable MSTP feature before we enable Voice VLAN. It can avoid the conflict of ingress filter. Possible modes are: • VLAN ID ■ Enabled: Enable Voice VLAN mode operation. ■ Disabled: Disable Voice VLAN mode operation. Indicates the Voice VLAN ID.
User’s Manual of IGS series The actual age time will be situated in the [age_time; 2 * age_time] interval. • Traffic Class Indicates the Voice VLAN traffic class. All traffic on Voice VLAN will apply this class. • Mode Indicates the Voice VLAN port mode. Possible port modes are: ■ Disabled: Disjoin from Voice VLAN. ■ Auto: Enable auto detect mode. It detects whether there is VoIP phone attached to the specific port and configures the Voice VLAN members automatically.
User’s Manual of IGS series 4.4.5.5 Voice VLAN OUI Table Configure VOICE VLAN OUI table on this page. The maximum entry number is 16. Modifying the OUI table will restart auto detection of OUI process. The Voice VLAN OUI Table screen in Figure 4-4-5-5 appears. Figure 4-4-5-5: Voice VLAN OUI Table Page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save.
User’s Manual of IGS series 4.5 Security 4.5.1 Access Security 4.5.1.1 Access Management Configure access management table on this page. The maximum entry number is 16. If the application's type match any one of the access management entries, it will allow access to the switch. The Access Management Configuration screen in Figure 4-5-1-1 appears.
User’s Manual of IGS series Buttons : Click to add a new access management entry. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.5.1.2 Access Management Statistics This page provides statistics for access management. The Access Management Statistics screen in Figure 4-5-1-2 appears.
User’s Manual of IGS series 4.5.1.3 SSH Configure SSH on this page. This page shows the Port Security status. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning.
User’s Manual of IGS series 4.5.1.4 HTTPs Configure HTTPS on this page. The HTTPS Configuration screen in Figure 4-5-1-4 appears. Figure 4-5-1-4: HTTPS Configuration Screen Page Screenshot The page includes the following fields: Object Description • Mode Indicates the HTTPS mode operation. When the current connection is HTTPS, to apply HTTPS disabled mode operation will automatically redirect web browser to an HTTP connection.
User’s Manual of IGS series • Certificate Upload Upload a certificate PEM file into the switch. The file should contain the certificate and private key together. If you have two separated files for saving certificate and private key. Use the Linux cat command to combine them into a single PEM file. For example, cat my.cert my.key > my.pem Notice that the RSA certificate is recommended since most of the new version of browsers has removed support for DSA in certificate, e.g. Firefox v37 and Chrome v39.
User’s Manual of IGS series 4.5.2 AAA This section is to control the access to the Industrial L2+ Managed Switch, including the user access and management control. The Authentication section contains links to the following main topics: User Authentication IEEE 802.1X Port-based Network Access Control MAC-based Authentication Overview of 802.1X (Port-Based) Authentication In the 802.
User’s Manual of IGS series through a 3rd party switch or a hub) and still require individual authentication, and that the clients don't need special supplicant software to authenticate. The disadvantage is that MAC addresses can be spoofed by malicious users, equipment whose MAC address is a valid RADIUS user can be used by anyone, and only the MD5-Challenge method is supported. The 802.1X and MAC-Based Authentication configuration consists of two sections, a system- and a port-wide.
User’s Manual of IGS series Figure 4-5-2-1 Client—the device (workstation) that requests access to the LAN and switch services and responds to requests from the switch. The workstation must be running 802.1X-compliant client software such as that offered in the Microsoft Windows XP operating system. (The client is the supplicant in the IEEE 802.1X specification.) Authentication server—performs the actual authentication of the client.
User’s Manual of IGS series Authentication Initiation and Message Exchange The switch or the client can initiate authentication. If you enable authentication on a port by using the dot1x port-control auto interface configuration command, the switch must initiate authentication when it determines that the port link state transitions from down to up.
User’s Manual of IGS series Ports in Authorized and Unauthorized States The switch port state determines whether or not the client is granted access to the network. The port starts in the unauthorized state. While in this state, the port disallows all ingress and egress traffic except for 802.1X protocol packets. When a client is successfully authenticated, the port transitions to the authorized state, allowing all traffic for the client to flow normally. If a client that does not support 802.
User’s Manual of IGS series Figure 4-5-2-3: Authentication Method Configuration Page Screenshot The page includes the following fields: Authentication Method Configuration The authentication section allows you to configure how a user is authenticated when he logs into theswitch via one of the management client interfaces. The table has one row for each client type and a number of columns, which are: Object Description • Client The management client for which the configuration below applies.
User’s Manual of IGS series • radius: Use remote RADIUS server(s) for authentication. • tacacs: Use remote TACACS+ server(s) for authentication.. Command Authorization Method Configuration The command authorization section allows you to limit the CLI commands available to a user. The table has one row for each client type and a number of columns, which are: Object Description • Client The management client for which the configuration below applies.
User’s Manual of IGS series this level. Valid values are in the range 0 to 15. Leave the field empty to disable command accounting. • Exec Enable exec (login) accounting. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.5.2.2 RADIUS This page allows you to configure the RADIUS Servers. The RADIUS Configuration screen in Figure 4-5-2-4 appears.
User’s Manual of IGS series The page includes the following fields: Global Configuration These setting are common for all of the RADIUS Servers. Object Description • Timeout Timeout is the number of seconds, in the range 1 to 1000, to wait for a reply from a RADIUS server before retransmitting the request. • Retransmit Retransmit is the number of times, in the range from 1 to 1000; a RADIUS request is retransmitted to a server that is not responding.
User’s Manual of IGS series • Acct Port The UDP port to use on the RADIUS server for accounting. • Timeout This optional setting overrides the global timeout value. Leaving it blank will use the global timeout value. • Retransmit This optional setting overrides the global retransmit value. Leaving it blank will use the global retransmit value. • Key This optional setting overrides the global key. Leaving it blank will use the global key. Buttons : Click to add a new RADIUS server.
User’s Manual of IGS series The page includes the following fields: Global Configuration These setting are common for all of the TACACS+ Servers. Object Description • Timeout Timeout is the number of seconds, in the range 1 to 1000, to wait for a reply from a TACACS+ server before it is considered to be dead.
User’s Manual of IGS series 4.5.2.4 RADIUS Overview This page provides an overview of the status of the RADIUS servers configurable on the authentication configuration page. The RADIUS Authentication/Accounting Server Overview screen in Figure 4-5-2-6 appears. Figure 4-5-2-6: RADIUS Authentication/Accounting Server Overview Page Screenshot The page includes the following fields: RADIUS Authentication Server Status Overview Object Description • # The RADIUS server number.
User’s Manual of IGS series Not Ready: The server is enabled, but IP communication is not yet up and running. Ready: The server is enabled, IP communication is up and running, and the RADIUS module is ready to accept access attempts. Dead (X seconds left): Access attempts were made to this server, but it did not reply within the configured timeout. The server has temporarily been disabled, but will get re-enabled when the dead-time expires.
User’s Manual of IGS series Figure 4-5-2-7: RADIUS Authentication/Accounting for Server Overview Screenshot The page includes the following fields: RADIUS Authentication Statistics The statistics map closely to those specified in RFC4668 - RADIUS Authentication Client MIB. Use the server select box to switch between the backend servers to show details for. Object Description • Packet Counters RADIUS authentication server packet counter. There are seven receive and four transmit counters.
User’s Manual of IGS series Rx Access Rejects radiusAuthClientExtA The number of RADIUS ccessRejects Access-Reject packets (valid or invalid) received from the server. Rx Access radiusAuthClientExtA The number of RADIUS Challenges ccessChallenges Access-Challenge packets (valid or invalid) received from the server. Rx Malformed radiusAuthClientExt The number of malformed Access MalformedAccessRe RADIUS Access-Response Responses sponses packets received from the server.
User’s Manual of IGS series Tx Access radiusAuthClientExtA The number of RADIUS Requests ccessRequests Access-Request packets sent to the server. This does not include retransmissions. Tx Access radiusAuthClientExtA The number of RADIUS Retransmissio ccessRetransmission Access-Request packets ns s retransmitted to the RADIUS authentication server.
User’s Manual of IGS series State - Shows the state of the server. It takes one of the following values: Disabled: The selected server is disabled. Not Ready: The server is enabled, but IP communication is not yet up and running. Ready: The server is enabled, IP communication is up and running, and the RADIUS module is ready to accept access attempts. Dead (X seconds left): Access attempts were made to this server, but it did not reply within the configured timeout.
User’s Manual of IGS series Responses es from the server. Malformed packets include packets with an invalid length. Bad authenticators or unknown types are not included as malformed access responses. Rx Bad radiusAcctClientExt The number of RADIUS Authenticators BadAuthenticators packets containing invalid authenticators received from the server.
User’s Manual of IGS series Tx Timeouts radiusAccClientExt The number of accounting Timeouts timeouts to the server. After a timeout, the client may retry to the same server, send to a different server, or give up. A retry to the same server is counted as a retransmit as well as a timeout. A send to a different server is counted as a Request as well as a timeout. • Other Info This section contains information about the state of the server and the latest round-trip time.
User’s Manual of IGS series 100 ms. A value of 0 ms indicates that there hasn't been round-trip communication with the server yet. Buttons Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the page immediately. : Clears the counters for the selected server. The "Pending Requests" counter will not be cleared by this operation.
User’s Manual of IGS series 4.5.3 Port Authentication 4.5.3.1 Network Access Server Configuration This page allows you to configure the IEEE 802.1X and MAC-based authentication system and port settings. The IEEE 802.1X standard defines a port-based access control procedure that prevents unauthorized access to a network by requiring users to first submit credentials for authentication. One or more central servers, the backend servers, determine whether the user is allowed access to the network.
User’s Manual of IGS series The page includes the following fields: System Configuration Object Description • Mode Indicates if NAS is globally enabled or disabled on the switch. If globally disabled, all ports are allowed forwarding of frames. • Reauthentication Enabled If checked, successfully authenticated supplicants/clients are reauthenticated after the interval specified by the Reauthentication Period. Reauthentication for 802.
User’s Manual of IGS series communication between the switch and the client, so this will not detect whether the client is still attached or not, and the only way to free any resources is to age the entry. • Hold Time This setting applies to the following modes, i.e. modes using the Port Security functionality to secure MAC addresses: ■ Single 802.1X ■ Multi 802.1X ■ MAC-Based Auth.
User’s Manual of IGS series • Guest VLAN Enabled A Guest VLAN is a special VLAN - typically with limited network access - on which 802.1X-unaware clients are placed after a network administrator-defined timeout. The switch follows a set of rules for entering and leaving the Guest VLAN as listed below. The "Guest VLAN Enabled" checkbox provides a quick way to globally enable/disable Guest VLAN functionality.
User’s Manual of IGS series Figure 4-5-3-2: Network Access Server Switch Status Page Screenshot The page includes the following fields: Object • Port Description The switch port number. Click to navigate to detailed NAS statistics for this port. • Admin State The port's current administrative state. Refer to NAS Admin State for a description of possible values. • Port State The current state of the port. Refer to NAS Port State for a description of the individual states.
User’s Manual of IGS series Buttons : Click to refresh the page immediately. Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. 4.5.3.3 Network Access Statistics This page provides detailed NAS statistics for a specific switch port running EAPOL-based IEEE 802.1X authentication. For MAC-based ports, it shows selected backend server (RADIUS Authentication Server) statistics, only. Use the port select box to select which port details to be displayed.
User’s Manual of IGS series Port Counters Object Description • EAPOL Counters These supplicant frame counters are available for the following administrative states: ■ Force Authorized ■ Force Unauthorized ■ Port-based 802.1X ■ Single 802.1X ■ Multi 802.1X Direction Name IEEE Name Description Rx Total dot1xAuthEapolFrames The number of valid EAPOL Rx frames of any type that have been received by the switch.
User’s Manual of IGS series which the Packet Body Length field is invalid. Tx Total dot1xAuthEapolFrames The number of EAPOL Tx frames of any type that have been transmitted by the switch. Tx Request ID dot1xAuthEapolReqIdFr The number of EAPOL amesTx Request Identity frames that have been transmitted by the switch. Tx Requests dot1xAuthEapolReqFra The number of valid EAPOL mesTx Request frames (other than Request Identity frames) that have been transmitted by the switch.
User’s Manual of IGS series table). Rx Other dot1xAuthBackendOther 802.1X-based: Requests RequestsToSupplicant Counts the number of times that the switch sends an EAP Request packet following the first to the supplicant. Indicates that the backend server chose an EAP-method. MAC-based: Not applicable. Rx Auth. dot1xAuthBackendAuth 802.1X- and MAC-based: Successes Successes Counts the number of times that the switch receives a success indication.
User’s Manual of IGS series towards the backend server for a given port (left-most table) or client (right-most table). Possible retransmissions are not counted. • Last Supplicant/Client Info Information about the last supplicant/client that attempted to authenticate. This information is available for the following administrative states: ■ Port-based 802.1X ■ Single 802.1X ■ Multi 802.1X ■ MAC-based Auth.
User’s Manual of IGS series 4.5.4 Port Security 4.5.4.1 Port Limit Control This page allows you to configure the Port Security global and per-port settings. Port Security allows for limiting the number of users on a given port. A user is identified by a MAC address and VLAN ID. If Port Security is enabled on a port, the limit specifies the maximum number of users on the port. If this number is exceeded, an action is taken depending on violation mode.
User’s Manual of IGS series • Aging Period If Aging Enabled is checked, then the aging period is controlled with this input. If other modules are using the underlying port security for securing MAC addresses, they may have other requirements to the aging period. The underlying port security will use the shorter requested aging period of all modules that use the functionality. The Aging Period can be set to a number between 10 and 10,000,000 seconds.
User’s Manual of IGS series taken. The switch is "born" with a total number of MAC addresses from which all ports draw whenever a new MAC address is seen on a Port Security-enabled port. Since all ports draw from the same pool, it may happen that a configured maximum cannot be granted, if the remaining ports have already used all available MAC addresses.
User’s Manual of IGS series Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. : Click to refresh the page. Note that non-committed changes will be lost. 4.5.4.2 Port Security Status This page shows the Port Security status. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules.
User’s Manual of IGS series Figure 4-5-4-2: Port Security Status Screen Page Screenshot The page includes the following fields: User Module Legend The legend shows all user modules that may request Port Security services. Object Description • User Module Name The full name of a module that may request Port Security services. • Abbr A one-letter abbreviation of the user module. This is used in the Users column in the port status table.
User’s Manual of IGS series • Clear Click to remove all MAC addresses on all VLANs on this port. The button is only clickable if number of secured MAC addresses is non-zero. • Port The port number for which the status applies. Click the port number to see the status for this particular port. • Users Each of the user modules has a column that shows whether that module has enabled Port Security or not.
User’s Manual of IGS series 4.5.4.3 Port Security Detail This page shows the MAC addresses secured by the Port Security module. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning.
User’s Manual of IGS series 4.5.5 Access Control Lists ACL is an acronym for Access Control List. It is the list table of ACEs, containing access control entries that specify individual users or groups permitted or denied to specific traffic objects, such as a process or a program. Each accessible traffic object contains an identifier to its ACL. The privileges determine whether there are specific traffic object access rights.
User’s Manual of IGS series ■ IPv4: The ACE will match all IPv4 frames. ■ IPv4/ICMP: The ACE will match IPv4 frames with ICMP protocol. ■ IPv4/UDP: The ACE will match IPv4 frames with UDP protocol. ■ IPv4/TCP: The ACE will match IPv4 frames with TCP protocol. ■ IPv4/Other: The ACE will match IPv4 frames, which are not ICMP/UDP/TCP. ■ • Action IPv6: The ACE will match all IPv6 standard frames. Indicates the forwarding action of the ACE.
User’s Manual of IGS series The page includes the following fields: Object Description • ACE Indicates the ACE ID. • Ingress Port Indicates the ingress port of the ACE. Possible values are: ■ All: The ACE will match all ingress port. ■ Port: The ACE will match a specific ingress port. • Policy / Bitmask Indicates the policy number and bitmask of the ACE. • Frame Type Indicates the frame type of the ACE. Possible values are: ■ Any: The ACE will match any frame type.
User’s Manual of IGS series : Inserts a new ACE before the current row. : Edits the ACE row. : Moves the ACE up the list. : Moves the ACE down the list. : Deletes the ACE. : The lowest plus sign adds a new entry at the bottom of the ACE listings. Buttons Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the page; any changes made locally will be undone. : Click to clear the counters. : Click to remove all ACEs. 4.5.5.
User’s Manual of IGS series The page includes the following fields: Object Description • Ingress Port Select the ingress port for which this ACE applies. ■ Any: The ACE applies to any port. ■ Port n: The ACE applies to this port number, where n is the number of the switch port. • Policy Filter Specify the policy number filter for this ACE. ■ Any: No policy filter is specified. (policy filter status is "don't-care".
User’s Manual of IGS series Enabled: Frames received on the port are mirrored. Disabled: Frames received on the port are not mirrored. The default value is "Disabled" • Logging Specify the logging operation of the ACE. The allowed values are: ■ Enabled: Frames matching the ACE are stored in the System Log. ■ Disabled: Frames matching the ACE are not logged.
User’s Manual of IGS series DMAC value. VLAN Parameters Object Description • 802.1Q Tagged Specify whether frames can hit the action according to the 802.1Q tagged. The allowed values are: Any: Any value is allowed ("don't-care"). Enabled: Tagged frame only. Disabled: Untagged frame only. The default value is "Any". • VLAN ID Filter Specify the VLAN ID filter for this ACE. ■ Any: No VLAN ID filter is specified. (VLAN ID filter status is "don't-care".
User’s Manual of IGS series ■ Host: Sender IP filter is set to Host. Specify the sender IP address in the SIP Address field that appears. ■ Network: Sender IP filter is set to Network. Specify the sender IP address and sender IP mask in the SIP Address and SIP Mask fields that appear. • Sender IP Address When "Host" or "Network" is selected for the sender IP filter, you can enter a specific sender IP address in dotted decimal notation.
User’s Manual of IGS series • Ethernet ■ 1: ARP/RARP frames where the HLD is equal to Ethernet (1). ■ Any: Any value is allowed ("don't-care"). Specify whether frames can hit the action according to their ARP/RARP protocol address space (PRO) settings. ■ 0: ARP/RARP frames where the PRO is equal to IP (0x800). ■ 1: ARP/RARP frames where the PRO is equal to IP (0x800). ■ Any: Any value is allowed ("don't-care").
User’s Manual of IGS series ■ Yes: IPv4 frames where the MF bit is set or the FRAG OFFSET field is greater than zero must be able to match this entry. ■ • IP Option Any: Any value is allowed ("don't-care"). Specify the options flag setting for this ACE. ■ No: IPv4 frames where the options flag is set must not be able to match this entry. ■ Yes: IPv4 frames where the options flag is set must be able to match this entry. ■ • SIP Filter Any: Any value is allowed ("don't-care").
User’s Manual of IGS series appears. ■ ICMP: Select ICMP to filter IPv6 ICMP protocol frames. Extra fields for defining ICMP parameters will appear. These fields are explained later in this help file. ■ UDP: Select UDP to filter IPv6 UDP protocol frames. Extra fields for defining UDP parameters will appear. These fields are explained later in this help file. ■ TCP: Select TCP to filter IPv6 TCP protocol frames. Extra fields for defining TCP parameters will appear.
User’s Manual of IGS series enter a specific ICMP value. A field for entering an ICMP value appears. • ICMP Type Value When "Specific" is selected for the ICMP filter, you can enter a specific ICMP value. The allowed range is 0 to 255. A frame that hits this ACE matches this ICMP value. • ICMP Code Filter Specify the ICMP code filter for this ACE. ■ Any: No ICMP code filter is specified (ICMP code filter status is "don't-care").
User’s Manual of IGS series entering a TCP/UDP destination value appears. ■ Range: If you want to filter a specific range TCP/UDP destination filter with this ACE, you can enter a specific TCP/UDP destination range value. A field for entering a TCP/UDP destination value appears. • TCP/UDP Destination Number When "Specific" is selected for the TCP/UDP destination filter, you can enter a specific TCP/UDP destination value. The allowed range is 0 to 65535.
User’s Manual of IGS series ■ Any: Any value is allowed ("don't-care"). Ethernet Type Parameters The Ethernet Type parameters can be configured when Frame Type "Ethernet Type" is selected. Object Description • EtherType Filter Specify the Ethernet type filter for this ACE. ■ Any: No EtherType filter is specified (EtherType filter status is "don't-care"). ■ Specific: If you want to filter a specific EtherType filter with this ACE, you can enter a specific EtherType value.
User’s Manual of IGS series Figure 4-5-5-4: ACL Ports Configuration Page Screenshot The page includes the following fields: Object Description • Port The logical port for the settings contained in the same row. • Policy ID Select the policy to apply to this port. The allowed values are 0 through 255. The default value is 0. • Action Select whether forwarding is permitted ("Permit") or denied ("Deny"). The default value is "Permit".
User’s Manual of IGS series ■ Disabled: Port shut down is disabled. The default value is "Disabled". • State Specify the port state of this port. The allowed values are: ■ Enabled: To reopen ports by changing the volatile port configuration of the ACL user module. ■ Disabled: To close ports by changing the volatile port configuration of the ACL user module. The default value is "Enabled". • Counter Counts the number of frames that match this ACE.
User’s Manual of IGS series Figure 4-5-5-5: ACL Rate Limiter Configuration Page Screenshot The page includes the following fields: Object Description • Rate Limiter ID The rate limiter ID for the settings contained in the same row. • Rate (pps) The allowed values are: 0-3276700 in pps or 0, 100, 200, 300, ..., 1000000 in kbps. • Unit Specify the rate unit. The allowed values are: pps: packets per second. kbps: Kbits per second.
User’s Manual of IGS series 4.5.6 DHCP Snooping DHCP Snooping is used to block intruder on the untrusted ports of DUT when it tries to intervene by injecting a bogus DHCP reply packet to a legitimate conversation between the DHCP client and server. 4.5.6.1 DHCP Snooping Configuration Configure DHCP Snooping on this page. in Figure 4-5-6-1 appears.
User’s Manual of IGS series Figure 4-5-6-1: DHCP Snooping Configuration Screen Page Screenshot The page includes the following fields: Object Description • Snooping Mode Indicates the DHCP snooping mode operation. Possible modes are: Enabled: Enable DHCP snooping mode operation. When enable DHCP snooping mode operation, the request DHCP messages will be forwarded to trusted ports and only allowed reply packets from trusted ports. Disabled: Disable DHCP snooping mode operation.
User’s Manual of IGS series 4.5.6.2 Snooping Table This page display the dynamic IP assigned information after DHCP Snooping mode is disabled. All DHCP clients obtained the dynamic IP address from the DHCP server will be listed in this table except for local VLAN interface IP addresses. Entries in the Dynamic DHCP snooping Table are shown on this page. The Dynamic DHCP Snooping Table screen in Figure 4-5-6-2 appears.
User’s Manual of IGS series 4.5.7 IP Source Guard 4.5.7.1 IP Source Guard Configuration IP Source Guard is a secure feature used to restrict IP traffic on DHCP snooping untrusted ports by filtering traffic based on the DHCP Snooping Table or manually configured IP Source Bindings. It helps prevent IP spoofing attacks when a host tries to spoof and use the IP address of another host. This page provides IP Source Guard related configuration. The IP Source Guard Configuration screen in Figure 4-5-7-1 appears.
User’s Manual of IGS series of max dynamic client is equal 0, it means only allow the IP packets forwarding that are matched in static entries on the specific port. Buttons : Click to translate all dynamic entries to static entries. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.5.7.2 Static IP Source Guard Table This page provides Static IP Source Guard Table. The Static IP Source Guard Table screen in Figure 4-5-7-2 appears.
User’s Manual of IGS series 4.5.7.3 Dynamic IP Source Guard Table This page provides Static IP Source Guard Table. The Static IP Source Guard Table screen in Figure 4-5-7-3 appears. Figure 4-5-7-3: Static IP Source Guard Table Screen Page Screenshot The page includes the following fields: Object Description • Port Switch Port Number for which the entries are displayed. • VLAN ID VLAN-ID in which the IP traffic is permitted. • IP Address User IP address of the entry.
User’s Manual of IGS series 4.5.8 ARP Inspection 4.5.8.1 ARP Inspection ARP Inspection is a secure feature. Several types of attacks can be launched against a host or devices connected to Layer 2 networks by "poisoning" the ARP caches. This feature is used to block such attacks. Only valid ARP requests and responses can go through DUT. This page provides ARP Inspection related configuration. The ARP Inspection Configuration screen in Figure 4-5-8-1 appears.
User’s Manual of IGS series Disabled: Disable ARP Inspection operation. If you want to inspect the VLAN configuration, you have to enable the setting of "Check VLAN". The default setting of "Check VLAN" is disabled. When the setting of "Check VLAN" is disabled, the log type of ARP Inspection will refer to the port setting. And the setting of "Check VLAN" is enabled, the log type of ARP Inspection will refer to the VLAN setting. Possible setting of "Check VLAN" are: Enabled: Enable check VLAN operation.
User’s Manual of IGS series The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • Port The logical port for the settings. • VLAN ID The VLAN ID for the settings. • MAC Address Allowed Source MAC address in ARP request packets. • IP Address Allowed Source IP address in ARP request packets. Buttons : Click to add a new entry to the Static ARP Inspection table.
User’s Manual of IGS series The “>>” will use the last entry of the currently displayed as a basis for the next lookup. When the end is reached the text "No more entries" is shown in the displayed table. Use the “|<<” button to start over. The page includes the following fields: Object Description • Port The port number for which the status applies. Click the port number to see the status for this particular port. • VLAN ID The VLAN ID of the entry. • MAC Address The MAC address of the entry.
User’s Manual of IGS series 4.6 Ring 4.6.1 Ring ITU-T G.8032 Ethernet Ring protection switching (ERPS) is a link layer protocol applied on Ethernet loop protection to provide sub-50ms protection and recovery switching for Ethernet traffic in a ring topology. ERPS provides a faster redundant recovery than Spanning Tree topology. The action is similar to STP or RSTP, but the algorithms between them are not the same.
User’s Manual of IGS series 4.6.1.1 MEP Configuration The Maintenance Entity Point instances are configured here; screen in Figure 4-6-1-1 appears. Figure 4-6-1-1: MEP configuration page screenshot The page includes the following fields: Object Description • Delete This box is used to mark a MEP for deletion in next Save operation. • Instance The ID of the MEP. Click on the ID of a MEP to enter the configuration page. • Domain Port: This is a MEP in the Port Domain. 'Flow Instance' is a Port.
User’s Manual of IGS series • Direction Ingress: This is a Ingress (down) MEP - monitoring ingress traffic on 'Residence Port'. Egress: This is a Egress (up) MEP - monitoring egress traffic on 'Residence Port'. • Residence Port The port where MEP is monitoring - see 'Direction'. • Level The MEG level of this MEP. • Flow Instance The MEP is related to this flow - See 'Domain'. • Tagged VID Port MEP: An outer C/S-tag (depending on VLAN Port Type) is added with this VID.
User’s Manual of IGS series Figure 4-6-1-2: Detail MEP configuration page screenshot The page includes the following fields: Instant Data: Object Description • Instance The ID of the MEP.
User’s Manual of IGS series formats. ITU ICC: This is defined by ITU. 'ICC' can be max. 6 char. 'MEG id' can be max. 7 char. IEEE String: This is defined by IEEE. 'Domain Name' can be max. 8 char. 'MEG id' can be max. 8 char. • Domain Name This is either ITU ICC (MEG ID value[1-6]) or IEEE Maintenance Domain Name depending on 'Format'. See 'Format'. • MEG Id This is either ITU UMC (MEG ID value[7-13]) or IEEE Short MA Name depending on 'Format'. See 'Format'. In case of ITU ICC format this can be max.
User’s Manual of IGS series Buttons : Click to add a new peer MEP. Functional Configuration Continuity Check: Object Description • Enable Continuity Check based on transmitting/receiving CCM PDU can be enabled/disabled. The CCM PDU is always transmitted as Multi-cast Class 1. • Priority The priority to be inserted as PCP bits in TAG (if any). In case of enable of Continuity Check and Loss Measurement both implemented on SW based CCM, 'Priority' has to be the same.
User’s Manual of IGS series • Type R-APS: APS PDU is transmitted as R-APS - this is for ERPS. L-APS: APS PDU is transmitted as L-APS - this is for ELPS. • Last Octet This is the last octet of the transmitted and expected RAPS multi-cast MAC. In G.8031 (03/2010) a RAPS multi-cast MAC is defined as 01-19-A7-00-00-XX. In current standard the value for this last octet is '01' and the usage of other values is for further study. Buttons : Click to go to Fault Management page.
User’s Manual of IGS series interconnected sub-ring without virtual channel, it is configured as "0" for such ring instances. "0" in this field indicates that no Port 1 SF MEP is associated with this instance. • Port 0 APS MEP The Port 0 APS PDU handling MEP. • Port 1 APS MEP The Port 1 APS PDU handling MEP. As only one APS MEP is associated with interconnected sub-ring without virtual channel, it is configured as "0" for such ring instances.
User’s Manual of IGS series Figure 4-6-1-4: Ethernet Ring Protocol Switch Configuration page screenshot The page includes the following fields: Instant Data: Object Description • ERPS ID The ID of the Protection group.
User’s Manual of IGS series • Guard Time Guard timeout value to be used to prevent ring nodes from receiving outdated R-APS messages. The period of the guard timer can be configured in 10 ms steps between 10 ms and 2 seconds, with a default value of 500 ms • WTR Time The Wait To Restore timing value to be used in revertive switching. The period of the WTR time can be configured by the operator in 1 minute steps between 5 and 12 minutes with a default value of 5 minutes.
User’s Manual of IGS series Instant State: Object Description • Protection State ERPS state according to State Transition Tables in G.8032. • Port 0 OK: State of East port is ok SF: State of East port is Signal Fail • Port 1 OK: State of West port is ok SF: State of West port is Signal Fail • Transmit APS The transmitted APS according to State Transition Tables in G.8032. • Port 0 Receive APS The received APS on Port 0 according to State Transition Tables in G.8032.
User’s Manual of IGS series 4.6.1.5 Ethernet Ring Protocol Switch This page allows the user to configure the ERPS by wizard; screen in Figure 4-6-1-5 appears. Figure 4-6-1-5: Ring Wizard page screenshot The page includes the following fields: Object Description • All Switch Numbers Set all the switch numbers for the ring group. The default number is 3 and maximum number is 30. • Number ID The switch where you are requesting ERPS. • Port Configures the port number for the MEP.
User’s Manual of IGS series 4.6.1.6 Ring Wizard Example Figure 4-6-1-6: Ring Example Diagram The above topology often occurs on using ERPS protocol. The multi switch constitutes a single ERPS ring; all of the switches only are configured as an ERPS in VLAN 3001, thereby constituting a single MRPP ring.
User’s Manual of IGS series Setup steps Set ERPS Configuration on Switch 1 Connect PC to switch 1 directly; don’t connect to port 1 & 2 Logging on to the Switch 1 and click “Ring > Ring Wizard” Set “All Switch Number” = 3 and “Number ID” = 1; click “Next” button to set the ERPS configuration for Switch 1. Set “MEP1” = Port1, “MEP2” = Port2 and VLAN ID = 3001; click “Set” button to save the ERPS configuration for Switch 1.
User’s Manual of IGS series Set “MEP5” = Port2, “MEP6” = Port1 and VLAN ID = 3001; click “Set” button to save the ERPS configuration for Switch 3. To avoid loop, please don’t connect Switches 1, 2 & 3 together in the ring topology before configuring the end of ERPS .
User’s Manual of IGS series 4.7 ONVIF 4.7.1 ONVIF ONVIF (Open Network Video Interface Forum) is a global and open industry forum with the goal of facilitating the development and use of a global open standard for the interface of physical IP-based security products – or, in other words, to create a standard for how IP products within video surveillance and other physical security areas can communicate with each other.
User’s Manual of IGS series • Device Name Entry of the ONVIF Device’s Name • Manufacturer Entry of the ONVIF Device’s Manufacturer • Model Entry of the ONVIF Device’s Model Name • IP Address Entry of the ONVIF Device’s IP Address • MAC Address Entry of the ONVIF Device’s MAC address • VLAN Entry of the ONVIF Device’s VLAN ID • Select Device Select by ticking the ONVIF Devices to be added to the ONVIF Table List Buttons : Click to search the connecting ONVIF devices.
User’s Manual of IGS series The page includes the following fields: Object Description • Login(Optional) Allows for filling in one set of User name and Password. • Port This is the logical port number for this row. • Status Red: The ONVIF device is not active. Green: The ONVIF device is active.
User’s Manual of IGS series 4.7.1.3 Map Upload / Edit This page allows the clients for uploading e-Map; the file size cannot be over 151k; the screen in Figure 4-7-1-3 appears. Figure 4-7-1-3: Map Upload / Edit Page Screenshot The page includes the following fields: Object Description • MAP Select Allows to select Map1/2/3 for uploading Map. • Description Indicates the map’s description. • File size Shows Map’s size. • File Allows to choose and browse specific map file from laptop device.
User’s Manual of IGS series 4.7.1.4 Floor Map This page allows the clients for planning the ONVIF devices with the uploaded e-Map. It can select the ONVIF devices from Device List and it also can modify the e-Map’s Zoom and Scale as the screen in Figure 4-7-1-4 appears. Figure 4-7-1-4: Floor Map Page Screenshot The page includes the following fields: Object Description • Summary Information Shows the number of Online and Offline ONVIF cameras.
User’s Manual of IGS series 4.8 Maintenance 4.8.1 Switch Maintenance This chapter shows how to upgrade the firmware, how to save the switch running configure and how to download/upload the configure file, etc. 4.8.1.1 Web Firmware Upgrade This page facilitates an update on the firmware controlling the switch. The Web Firmware Upgrade screen in Figure 4-8-1-1 appears. Figure 4-8-1-1: Web Firmware Upgrade Page Screenshot To open Firmware Upgrade screen, perform the following: 1.
User’s Manual of IGS series DO NOT Power OFF the Industrial L2+ Managed Switch until the update progress is complete. Do not quit the Firmware Upgrade page without pressing the “OK” button after the image is loaded. Or the system won’t apply the new firmware. User has to repeat the firmware upgrade processes. 4.8.1.
User’s Manual of IGS series Figure 4-8-1-5: Configuration Download Page Screenshot 4.8.1.4 Configuration Upload Configuration Upload page allows the upload of the running-config and startup-config on the switch. Please refer to Figure 4-8-1-6 shown below. Figure 4-8-1-6: Configuration Upload Page Screenshot If the destination is running-config, the file will be applied to the switch configuration.
User’s Manual of IGS series 4.8.1.5 Configuration Activate Thje Configure Activate page allows to activate the startup-config and default-config files present on the switch. Please refer to Figure 4-8-1-7 shown below. Figure 4-8-1-7: Configuration Activate Page Screenshot It is possible to activate any of the configuration files present on the switch, except for running-config which represents the currently active configuration. Select the file to activate and click .
User’s Manual of IGS series 4.8.1.7 Image Select This page provides information about the active and alternate (backup) firmware images in the device, and allows you to revert to the alternate image. The web page displays two tables with information about the active and alternate firmware images. The Image Select screen in Figure 4-8-1-9 appears. In case the active firmware image is the alternate image, only the "Active Image" table is shown.
User’s Manual of IGS series 4.8.1.8 Factory Default You can reset the configuration of the Industrial L2+ Managed Switch on this page. Only the IP configuration is retained. The new configuration is available immediately, which means that no restart is necessary. The Factory Default screen in Figure 4-8-1-10 appears. Figure 4-8-1-10: Factory Default Page Screenshot Buttons : Click to reset the configuration to Factory Defaults. : Click to return to the Port State page without resetting the configuration.
User’s Manual of IGS series You can also check the SYS LED on the front panel to identify whether the System is loaded completely or not. If the SYS LED is blinking, then it is in the firmware load stage; if the SYS LED light is on, you can use the Web browser to login the Industrial L2+ Managed Switch. 4.8.2 Diagnostics This section provides the Physical layer and IP layer network diagnostics tools for troubleshooting.
User’s Manual of IGS series After you press “Start”, 5 ICMP packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply. The page refreshes automatically until responses to all packets are received, or until a timeout occurs. The ICMP Ping screen in Figure 4-8-2-1 appears. Figure 4-8-2-1: ICMP Ping Page Screenshot The page includes the following fields: Object Description • IP Address The destination IP Address.
User’s Manual of IGS series Figure 4-8-2-2: ICMPv6 Ping Page Screenshot The page includes the following fields: Object Description • IP Address The destination IP Address. • Ping Length The payload size of the ICMP packet. Values range from 2 bytes to 1452 bytes. Buttons : Click to transmit ICMP packets. : Click to re-start diagnostics with ping. 4.8.2.3 Remote IP Ping Test This page allows you to issue ICMP ping packets to troubleshoot IP connectivity issues on special port.
User’s Manual of IGS series Figure 4-8-2-3: Remote IP Ping Test Page Screenshot The page includes the following fields: Object Description • Port The logical port for the settings. • Remote IP Address The destination IP Address. • Ping Size The payload size of the ICMP packet. Values range from 8 bytes to 1400 bytes. • Result Display the ping result. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
User’s Manual of IGS series 10 and 100 Mbps ports will be linked down while running cable diagnostic. Therefore, running cable diagnostic on a 10 or 100 Mbps management port will cause the switch to stop responding until VeriPHY is complete. The VeriPHY Cable Diagnostics screen in Figure 4-8-2-4 appears. Figure 4-8-2-4 VeriPHY Cable Diagnostics Page Screenshot The page includes the following fields: Object Description • Port The port where you are requesting Cable Diagnostics.
User’s Manual of IGS series Cross B - Abnormal cross-pair coupling with pair B Cross C - Abnormal cross-pair coupling with pair C Cross D - Abnormal cross-pair coupling with pair D Length: The length (in meters) of the cable pair. The resolution is 3 meters Buttons : Click to run the diagnostics.
User’s Manual of IGS series 5. SWITCH OPERATION 5.1 Address Table The Industrial L2+ Managed Switch is implemented with an address table. This address table is composed of many entries. Each entry is used to store the address information of some nodes in the network, including MAC address, port no, etc. This information comes from the learning process of Industrial L2+ Managed Switch. 5.
User’s Manual of IGS series The Industrial L2+ Managed Switch performs "Store and Fforward"; therefore, no error packets occur. More reliably, it reduces the re-transmission rate. No packet loss will occur. 5.5 Auto-Negotiation The STP ports on the Switch have built-in "Auto-negotiation". This technology automatically sets the best possible bandwidth when a connection is established with another network device (usually at Power On or Reset).
User’s Manual of IGS Series 6. TROUBLESHOOTING This chapter contains information to help you solve issues. If the Industrial L2+ Managed Switch is not functioning properly, make sure the Industrial L2+ Managed Switch was set up according to instructions in this manual. ■ The Link LED is not lit. Solution: Check the cable connection and remove duplex mode of the Industrial L2+ Managed Switch. ■ Some stations cannot talk to other stations located on the other port.
User’s Manual of IGS Series APPENDIX A: Networking Connection A.1 Switch's Data RJ45 Pin Assignments - 1000Mbps, 1000BASE-T PIN NO MDI MDI-X 1 BI_DA+ BI_DB+ 2 BI_DA- BI_DB- 3 BI_DB+ BI_DA+ 4 BI_DC+ BI_DD+ 5 BI_DC- BI_DD- 6 BI_DB- BI_DA- 7 BI_DD+ BI_DC+ 8 BI_DD- BI_DC- Implicit implementation of the crossover function within a twisted-pair cable, or at a wiring panel, while not expressly forbidden, is beyond the scope of this standard. A.
User’s Manual of IGS Series The standard cable, RJ45 pin assignment 6 32 1 6 321 6 3 21 The standard RJ45 receptacle/connector There are 8 wires on a standard UTP/STP cable and each wire is color-coded.
User’s Manual of IGS Series APPENDIX B : GLOSSARY A ACE ACE is an acronym for Access Control Entry. It describes access permission associated with a particular ACE ID. There are three ACE frame types (Ethernet Type, ARP, and IPv4) and two ACE actions (permit and deny). The ACE also contains many detailed, different parameter options that are available for individual application. ACL ACL is an acronym for Access Control List.
User’s Manual of IGS series AES is an acronym for Advanced Encryption Standard. The encryption key protocol is applied in 802.1x standard to improve WLAN security. It is an encryption standard by the U.S. government, which will replace DES and 3DES. AES has a fixed block size of 128 bits and a key size of 128, 192, or 256 bits. AMS AMS is an acronym for Auto Media Select. AMS is used for dual media ports (ports supporting both copper (cu) and fiber (SFP) cables.
User’s Manual of IGS series CDP is an acronym for Cisco Discovery Protocol. D DEI DEI is an acronym for Drop Eligible Indicator. It is a 1-bit field in the VLAN tag. DES DES is an acronym for Data Encryption Standard. It provides a complete description of a mathematical algorithm for encrypting (enciphering) and decrypting (deciphering) binary coded information. Encrypting data converts it to an unintelligible form called cipher.
User’s Manual of IGS series DHCP Snooping is used to block intruder on the untrusted ports of the switch device when it tries to intervene by injecting a bogus DHCP reply packet to a legitimate conversation between the DHCP client and server. DNS DNS is an acronym for Domain Name System. It stores and associates many types of information with domain names. Most importantly, DNS translates human-friendly domain names and computer hostnames into computer-friendly IP addresses.
User’s Manual of IGS series multicast group specified in the original leave message. Fast-leave processing ensures optimal bandwidth management for all hosts on a switched network, even when multiple multicast groups are in use simultaneously. H HTTP HTTP is an acronym for Hypertext Transfer Protocol. It is a protocol that used to transfer or convey information on the World Wide Web (WWW).
User’s Manual of IGS series IGMP IGMP is an acronym for Internet Group Management Protocol. It is a communications protocol used to manage the membership of Internet Protocol multicast groups. IGMP is used by IP hosts and adjacent multicast routers to establish multicast group memberships. It is an integral part of the IP multicast specification, like ICMP for unicast connections. IGMP can be used for online video and gaming, and allows more efficient use of resources when supporting these uses.
User’s Manual of IGS series L LACP LACP is an IEEE 802.3ad standard protocol. The Link Aggregation Control Protocol allows bundling several physical ports together to form a single logical port. LLDP LLDP is an IEEE 802.1ab standard protocol.
User’s Manual of IGS series Mirroring For debugging network problems or monitoring network traffic, the switch system can be configured to mirror frames from multiple ports to a mirror port. (In this context, mirroring a frame is the same as copying the frame.) Both incoming (source) and outgoing (destination) frames can be mirrored to the mirror port. MLD MLD is an acronym for Multicast Listener Discovery for IPv6.
User’s Manual of IGS series OAM OAM is an acronym for Operation Administration and Maintenance. It is a protocol described in ITU-T Y.1731 used to implement carrier Ethernet functionality. MEP functionality like CC and RDI is based on this. Optional TLVs. An LLDP frame contains multiple TLVs. For some TLVs it is configurable if the switch includes the TLV in the LLDP frame. These TLVs are known as optional TLVs. If an optional TLV is disabled the corresponding information is not included in the LLDP frame.
User’s Manual of IGS series allow users or an administrator to specify that mail be saved for some period of time. POP can be thought of as a "store-and-forward" service. An alternative protocol is Internet Message Access Protocol (IMAP). IMAP provides the user with more capabilities for retaining e-mail on the server and for organizing it in folders on the server. IMAP can be thought of as a remote file server.
User’s Manual of IGS series delay-sensitive data such as real-time voice. Networks must provide secure, predictable, measurable, and sometimes guaranteed services. Achieving the required QoS becomes the secret to a successful end-to-end business solution. Therefore, QoS is the set of techniques to manage network resources.
User’s Manual of IGS series Samba can also register itself with the master browser on the network so that it would appear in the listing of hosts in Microsoft Windows "Neighborhood Network". SHA SHA is an acronym for Secure Hash Algorithm. It designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. Hash algorithms compute a fixed-length digital representation (known as a message digest) of an input data sequence (the message) of any length.
User’s Manual of IGS series between two networked devices. The encryption used by SSH provides confidentiality and integrity of data over an insecure network. The goal of SSH was to replace the earlier rlogin, TELNET and rsh protocols, which did not provide strong authentication or guarantee confidentiality (Wikipedia). SSM SSM In SyncE this is an abbreviation for Synchronization Status Message and is containing a QL indication.
User’s Manual of IGS series enter commands through the Telnet program just as if they were entering commands directly on the server console. TFTP TFTP is an acronym for Trivial File Transfer Protocol. It is transfer protocol that uses the User Datagram Protocol (UDP) and provides file writing and reading, but it does not provides directory service and security features. Toss Toss is an acronym for Type of Service. It is implemented as the IPv4 Toss priority control.
User’s Manual of IGS series V VLAN A method to restrict communication between switch ports. VLANs can be used for the following applications: VLAN unaware switching: This is the default configuration. All ports are VLAN unaware with Port VLAN ID 1 and members of VLAN 1. This means that MAC addresses are learned in VLAN 1, and the switch does not remove or insert VLAN tags. VLAN aware switching: This is based on the IEEE 802.1Q standard. All ports are VLAN aware.
User’s Manual of IGS series some older network cards (Wikipedia). WPA-PSK WPA-PSK is an acronym for Wi-Fi Protected Access - Pre Shared Key. WPA was designed to enhance the security of wireless networks. There are two flavors of WPA: enterprise and personal. Enterprise is meant for use with an IEEE 802.1X authentication server, which distributes different keys to each user. Personal WPA utilizes less scalable 'pre-shared key' (PSK) mode, where every allowed computer is given the same passphrase.