User’s Manual
User’s Manual Trademarks Copyright © PLANET Technology Corp. 2016. Contents are subject to revision without prior notice. PLANET is a registered trademark of PLANET Technology Corp. All other trademarks belong to their respective owners.
User’s Manual TABLE OF CONTENTS 1. INTRODUCTION .................................................................................................................. 10 1.1 Packet Contents ......................................................................................................................................... 10 1.2 Product Description ................................................................................................................................... 11 1.
User’s Manual 4.1 Main Web page ........................................................................................................................................... 72 4.2 System ......................................................................................................................................................... 74 4.2.1 System Information..............................................................................................................................................
User’s Manual 4.3.5.5 SNMPv3 Access ...................................................................................................................................... 116 4.4 Port Management ..................................................................................................................................... 118 4.4.1 Port Configuration .............................................................................................................................................. 118 4.4.
User’s Manual 4.8 Multicast .................................................................................................................................................... 180 4.8.1 IGMP Snooping ................................................................................................................................................. 180 4.8.2 Profile Table .............................................................................................................................................
User’s Manual 4.10 Access Control List ................................................................................................................................ 233 4.10.1 Access Control List Status ............................................................................................................................... 233 4.10.2 Access Control List Configuration .................................................................................................................... 235 4.10.
User’s Manual 4.14.1 Link Layer Discovery Protocol ......................................................................................................................... 318 4.14.2 LLDP Configuration ......................................................................................................................................... 318 4.14.3 LLDP MED Configuration ................................................................................................................................ 321 4.
User’s Manual 4.20.2 Detailed MEP Configuration ............................................................................................................................ 375 4.20.3 Ethernet Ring Protocol Switch ......................................................................................................................... 378 4.20.4 Ethernet Ring Protocol Switch Configuration ................................................................................................... 380 4.20.
User’s Manual 1. INTRODUCTION The descriptions of PLANET L2+ Industrial Managed Switch series, such as IGS-10020, IGS-10080MFT, IGS-12040MT, IGS-20040MT and IGS-20160HPT, are as follows: IGS-10020MT Industrial 8-Port 10/100/1000T + 2-Port 100/1000X SFP Managed Switch IGS-10020PT Industrial 8-Port 10/100/1000T 802.3af PoE + 2-Port 100/1000X SFP Managed Switch IGS-10020HPT Industrial 8-Port 10/100/1000T 802.
User’s Manual 1.2 Product Description PLANET Industrial Managed Switch is specially designed to build a full Gigabit backbone to transmit reliable and high-speed data in heavy industrial demanding environments and forward data to remote network through fiber optic cabling. It comes with an IP30 rugged case and redundant power system.
User’s Manual Intelligent Powered Device Alive Check (IGS-10020PT, IGS-10020HPT, IGS-20160HPT) The Industrial Managed PoE Switch can be configured to monitor connected PD (powered device) status in real-time via ping action. Once the PD stops working and responding, the Industrial Managed PoE Switch will recycle the PoE port power and bring the PD back to work. It will greatly enhance the network reliability through the PoE port resetting the PD’s power source and reduce administrator management burden.
User’s Manual PoE Schedule for Energy Saving (IGS-10020PT, IGS-10020HPT, IGS-20160HPT) Under the trend of energy saving worldwide and contributing to environment protection on the Earth, the Industrial Managed PoE Switch can effectively control the power supply along with its capability of giving high watts power over Ethernet.
User’s Manual Intelligent SFP Diagnosis Mechanism The Industrial Managed Switch supports SFP-DDM (Digital Diagnostic Monitor) function that can easily monitor real-time parameters of the SFP for network administrator, such as optical output power, optical input power, temperature, laser bias current, and transceiver supply voltage.
User’s Manual 1.3 How to Use This Manual This User’s Manual is structured as follows: Section 2, INSTALLATION The section explains the functions of the Industrial Managed Switch and how to physically install the Industrial Managed Switch. Section 3, SWITCH MANAGEMENT The section contains the information about the software function of the Industrial Managed Switch. Section 4, WEB CONFIGURATION The section explains how to manage the Industrial Managed Switch by Web interface.
User’s Manual 1.4 Product Features Physical Port 10/100/1000BASE-T RJ45 copper 100/1000BASE-X mini-GBIC/SFP slots, SFP type auto detection Console interface for basic management and setup (IGS-10020(H)PT, IGS-10080MFT, IGS-12040MT, IGS-20040MT, IGS-20160HPT) Power over Ethernet (IGS-10020(H)PT, IGS-20160HPT) Complies with IEEE 802.3at Power over Ethernet Plus/end-span PSE Up to 8/16 IEEE 802.3af/802.3at devices powered Supports PoE power up to 15.
User’s Manual the network bandwidth Storm Control support − Broadcast/Multicast/Unknown Unicast Supports VLAN − IEEE 802.1Q tagged VLAN − Up to 255 VLANs groups, out of 4095 VLAN IDs − Provider Bridging (VLAN Q-in-Q) support (IEEE 802.1ad) − Private VLAN Edge (PVE) − Protocol-based VLAN − MAC-based VLAN − Voice VLAN Supports Spanning Tree Protocol − IEEE 802.1D Spanning Tree Protocol (STP) − IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) − IEEE 802.
User’s Manual Security Authentication − IEEE 802.
User’s Manual 1.
User’s Manual Alarm One relay output for power failure. Alarm Relay current carry ability: 1A @ 24V AC 2 Digital Input (DI): 2 Digital Input (DI): Level 0: -24V~2.1V (±0.1V) Level 0: -24V~2.1V (±0.1V) Level 1: 2.1V~24V (±0.1V) Level 1: 2.1V~24V (±0.1V) - DI and DO Input Load to 24V DC, Input Load to 24V DC, 10mA max. 10mA max. 2 Digital Output (DO): 2 Digital Output (DO): Open collector to 24V DC, Open collector to 24V DC, 100mA (max.) 100mA (max.) Dimensions (W x D x H) 56 x 87.
User’s Manual Link Aggregation IEEE 802.3ad LACP/static trunk Support 5 groups of 10-Port trunk support Traffic classification based, strict priority and WRR 8-level priority for switching QoS - Port Number - 802.1p priority - 802.
User’s Manual RFC 792 ICMP RFC 2068 HTTP RFC 1112 IGMP version 1 RFC 2236 IGMP version 2 RFC 3376 IGMP version 3 RFC 2710 MLD version 1 FRC 3810 MLD version 2 RFC-1213 MIB-II IF-MIB RFC 1493 Bridge MIB RFC 1643 Ethernet MIB RFC 2863 Interface MIB RFC 2665 Ether-Like MIB SNMP MIBs RFC 2819 RMON MIB (Group 1, 2, 3 and 9) RFC 2737 Entity MIB RFC 2618 RADIUS Client MIB RFC 2933 IGMP-STD-MIB RFC 3411 SNMP-Frameworks-MIB IEEE 802.
User’s Manual IGS-10020PT/IGS-10020HPT/IGS-20160HPT Model Name IGS-10020PT IGS-10020HPT IGS-20160HPT Hardware Specifications 18 10/100/1000BASE-T Copper Ports 8 10/100/1000BASE-T RJ45 Auto-MDI/MDI-X ports RJ45 Auto-MDI/MDI-X ports 2 1000BASE-SX/LX/BX SFP/mini-GBIC Slots 2 1000BASE-SX/LX/BX SFP interfaces (Port-9 to SFP interfaces (Port-19 to Port-10) Port-20) Compatible with 100BASE-FX SFP Compatible with 100BASE-FX SFP PoE Injector Ports 8 ports with 802.
User’s Manual Power Consumption 161.9 watts/522.08BTU 306 watts/1043.46BTU 349 watts/1190.83BTU (Full loading with PoE (Full loading with PoE (Full loading with PoE function) function) function) System: Per 10/100/1000T RJ45 Port: LED Indicator Power 1 (Green) LNK/ACT (Green) Power 2 (Green) PoE-in-Use (Orange) Fault Alarm (Green) Per SFP Interface: Ring (Green) LNK/ACT (Green) R.O. (Green) 1000 (Orange) Power Over Ethernet PoE Standard PoE Power Supply Type IEEE 802.
User’s Manual Supports 5 trunk groups with 2 ports for each trunk Traffic classification based, strict priority and WRR 8-level priority for switching QoS - Port number - 802.1p priority - 802.
User’s Manual RFC 791 IP RFC 792 ICMP RFC 2068 HTTP RFC 1112 IGMP version 1 RFC 2236 IGMP version 2 RFC 3376 IGMP version 3 RFC 2710 MLD version 1 FRC 3810 MLD version 2 RFC-1213 MIB-II IF-MIB RFC 1493 Bridge MIB RFC 1643 Ethernet MIB RFC 2863 Interface MIB RFC 2665 Ether-Like MIB RFC 2819 RMON MIB (Group 1, 2, 3 and 9) SNMP MIBs RFC 2737 Entity MIB RFC 2618 RADIUS Client MIB RFC 2933 IGMP-STD-MIB RFC 3411 SNMP-Frameworks-MIB IEEE 802.
User’s Manual IGS-10080MFT Model Name IGS-10080MFT Hardware Specifications Copper Ports SFP/mini-GBIC Slots 2 10/ 100/1000BASE-T RJ45 Auto-MDI/MDI-X ports 8 1000BASE-SX/LX/BX SFP interfaces (Port-1 to Port-8) Compatible with 100BASE-FX SFP Console 1 x RJ45 serial port (115200, 8, N, 1) Switch Architecture Store-and-Forward Switch Fabric 20Gbps/non-blocking Throughput (packet per second) 14.
User’s Manual negotiation status, and trunk status. Port Mirroring TX/RX/Both Many to 1 monitor 802.1Q tagged-based VLAN, up to 255 VLAN groups Q-in-Q tunneling Private VLAN Edge (PVE) VLAN MAC-based VLAN Protocol-based VLAN Voice VLAN MVR (Multicast VLAN Registration) Up to 255 VLAN groups, out of 4095 VLAN IDs Link Aggregation IEEE 802.
User’s Manual IEEE 802.1s Multiple Spanning Tree Protocol IEEE 802.1p Class of Service IEEE 802.1Q VLAN Tagging IEEE 802.1x Port Authentication Network Control IEEE 802.
User’s Manual 2. INSTALLATION 2.1 Hardware Description The Industrial Managed Switch provides three different running speeds – 10Mbps, 100Mbps and 1000Mbps and automatically distinguishes the speed of incoming connection. This section describes the hardware features of Industrial Managed Switch. For easier management and control of the Industrial Managed Switch, familiarize yourself with its display indicators and ports. Front panel illustrations in this chapter display the unit LED indicators.
User’s Manual IGS-10020PT IGS-10020PT Dimensions (W x D x H) : 72 x 107 x 152mm 31
User’s Manual IGS-10020HPT IGS-10020HPT Dimensions (W x D x H) : 72 x 107 x 152mm 32
User’s Manual IGS-10080MFT IGS-10080MFT Dimensions (W x D x H) : 72 x 107x 152mm 33
User’s Manual IGS-12040MT IGS-12040MT Dimensions (W x D x H) : 72 x 107 x 152mm 34
User’s Manual IGS-20040MT IGS-20040MT Dimensions (W x D x H) : 72 x 107 x 152mm 35
User’s Manual IGS-20160HPT IGS-20160HPT Dimensions (W x D x H) : 84 x 107 x 152mm 36
User’s Manual 2.1.
User’s Manual IGS-100080MFT IGS-12040MT IGS-20040MT Figure 2-4: Figure 2-5: Figure 2-6: IGS-10080MFT Switch Front Panel IGS-12040MT Switch Front Panel 38 IGS-20040MT Switch Front Panel
User’s Manual IGS-20160HPT Figure 2-7: IGS-20160HPT Switch Front Panel ■ Gigabit TP Interface 10/100/1000BASE-T Copper, RJ45 Twisted-pair: Up to 100 meters. ■ SFP Slot 100/1000BASE-X mini-GBIC slot, SFP (Small-form Factor Pluggable) transceiver module: From 550 meters to 2km (multi-mode fiber) and to 10/20/30/40/50/70/120 kilometers (single-mode fiber). ■ Console Port The console port is an RJ45 port connector. It is an interface for connecting a terminal directly.
User’s Manual Console interface is not available for the IGS-10020MT. ■ Reset button On the upper left side of the front panel, the reset button is designed for rebooting the Industrial Managed Switch without turning off and on the power.
User’s Manual Reset Button Pressed and Released Function < 5 sec: System Reboot Reboot the Industrial Managed Switch. Reset the Industrial Managed Switch to Factory Default configuration. The Industrial Managed Switch will then reboot and load the default settings as shown below: > 5 sec: Factory Default 。 Default Username: admin 。 Default Password: admin 。 Default IP address: 192.168.0.100 。 Subnet mask: 255.255.255.0 。 Default Gateway: 192.168.0.254 2.1.
User’s Manual Per SFP Interface LED LNK/ACT 1000 Color Function Lights Indicates the link through that port is successfully established. Blinks Indicates that the Switch is actively sending or receiving data over that port. Lights Indicates that the port is successfully connecting to the network at 1000Mbps. Off Indicates that the port is successfully connecting to the network at 100Mbps.
User’s Manual IGS-10080MFT System LED Color Function P1 Green Indicates power 1 has power. P2 Green Indicates power 2 has power. Fault Green Indicates either power 1 or power 2 has no power. On Indicates the ERPS Ring has been created successfully. Off Indicates the ERPS Ring hasn’t been created. Ring Green Indicates the Ring Owner has been enabled. R.O. Off Indicates the Ring Owner hasn’t been enabled.
User’s Manual IGS-12040MT/IGS-20040MT LED Definition: System LED Color Function P1 Green Indicates power 1 has power. P2 Green Indicates power 2 has power. Fault Green Indicates either power 1 or power 2 has no power. Ring Green Lights to indicate that the ERPS Ring has been created successfully. R.O. Green Lights to indicate that the Ring Owner has been enabled.
User’s Manual 2.1.4 Switch Upper Panel The Upper Panel of the Industrial Managed Switch comes with a DC inlet power socket and one terminal block connector with 6 contacts. 1. Insert positive/negative DC power wires into contacts 1 and 2 for DC Power 1, or 5 and 6 for DC Power 2.
User’s Manual Figure 2-16: IGS-10080MFT Upper Panel Figure 2-17: IGS-12040MT Upper Panel 46
User’s Manual Figure 2-18: IGS-20040MT Upper Panel Figure 2-19: IGS-20160HPT Upper Panel 47
User’s Manual 2. Tighten the wire-clamp screws for preventing the wires from loosening.
User’s Manual 2.1.5 Wiring the Fault Alarm Contact The fault alarm contacts are in the middle (3 & 4) of the terminal block connector as the picture shows below. Inserting the wires, the Industrial Managed Switch will detect the fault status of the power failure, or port link failure (available for managed model). The following illustration shows an application example for wiring the fault alarm contacts Insert the wires into the fault alarm contacts 1.
User’s Manual 2. Tighten the wire-clamp screws for preventing the wires from loosening. 1 DI0 2 3 4 5 6 DI1 DO0 DO1 GND GND Figure 2-22 6-pin Terminal Block for DI and DO Wiring Input 3. There are two Digital Input groups for you to monitor two different devices. The following topology shows how to wire DI0 and DI1.
User’s Manual 4. There are two Digital Output groups for you to sense IGS-10020PT/10020HPT/12040MT/20040MT/20160HPT port failure or power failure and issue a high or low signal to external device. The following topology shows how to wire DO0 and DO1. Figure 2-24 Wires DO0 and DO1 to Open Detector 2.2 Installing the Industrial Managed Switch This section describes how to install your Industrial Managed Switch and make connections to the Industrial Managed Switch.
User’s Manual 6. Insert one side of RJ45 cable (category 5) into the Industrial Managed Switch Ethernet port (RJ45 port) while the other side to the network device’s Ethernet port (RJ45 port), e.g., Switch PC or Server. The UTP port (RJ45) LED on the Industrial Managed Switch will light up when the cable is connected with the network device. Please refer to the LED Indicators section for LED light indication. Make sure that the connected network devices support MDI/MDI-X.
User’s Manual 2.2.2 DIN-rail Mounting This section describes how to install the Industrial Managed Switch. There are two methods to install the Industrial Managed Switch -- DIN-rail mounting and wall-mount plate mounting. Please read the following topics and perform the procedures in the order being presented. Follow all the DIN-rail installation steps as shown in the example. Step 1: Screw the DIN-rail on the Industrial Managed Switch. Step 2: Lightly slide the DIN-rail into the track.
User’s Manual Step 3: Check whether the DIN-rail is tightly on the track. Please refer to the following procedures to remove the Industrial Managed Switch from the track. Step 4: Lightly remove the DIN-rail from the track.
User’s Manual 2.2.3 Wall Mount Plate Mounting To install the Industrial Managed Switch on the wall, please follow the instructions below. Follow all the DIN-rail installation steps as shown in the example. Step 1: Remove the DIN-rail from the Industrial Managed Switch. Use the screwdriver to loosen the screws to remove the DIN-rail. Step 2: Place the wall-mount plate on the rear panel of the Industrial Managed Switch.
User’s Manual 2.3 Cabling 10/100/1000BASE-T All 10/100/1000BASE-T ports come with auto-negotiation capability. They automatically support 1000BASE-T, 100BASE-TX and 10BASE-T networks. Users only need to plug a working network device into one of the 10/100/1000BASE-T ports, and then turn on the Industrial Managed Switch. The port will automatically run in 10Mbps, 20Mbps, 100Mbps or 200Mbps and 1000Mbps or 2000Mbps after negotiating with the connected device.
User’s Manual 2.3.1 Installing the SFP Transceiver The sections describe how to insert an SFP transceiver into an SFP slot. The SFP transceivers are hot-pluggable and hot-swappable. You can plug in and out the transceiver to/from any SFP port without having to power down the Industrial Managed Switch as Figure 2-25 appears.
User’s Manual Fast Ethernet Transceiver (100BASE-BX, Single Fiber Bi-directional SFP) Distance Wavelength (TX) Wavelength (RX) Operating Temp.
User’s Manual It is recommended to use PLANET SFPs on the Industrial Managed Switch. If you insert an SFP transceiver that is not supported, the Industrial Managed Switch might not recognize it. Please choose the SFP transceiver which can be operated in the temperature range of -40~75 degrees C. 1000BASE-SX/LX: Before connecting the other switches, workstation or media converter, 1.
User’s Manual 2.3.2 Removing the SFP Transceiver 1. Make sure there is no network activity by consulting or checking with the network administrator. Or through the management interface of the switch/converter (if available) to disable the port in advance. 2. Remove the fiber optic cable gently. 3. Turn the lever of the MGB/MFB module to a horizontal position. 4. Pull out the module gently through the lever.
User’s Manual 3. SWITCH MANAGEMENT This chapter explains the methods that you can use to configure management access to the Industrial Managed Switch. It describes the types of management applications and the communication and management protocols that deliver data between your management device (workstation or personal computer) and the system. It also contains information about port connection options.
User’s Manual 3.2 Management Access Overview The Industrial Managed Switch gives you the flexibility to access and manage it using any or all of the following methods: Remote Telnet Interface Web browser Interface An external SNMP-based network management application The remote Telnet and Web browser interfaces are embedded in the Industrial Managed Switch software and are available for immediate use. Each of these management methods has their own advantages.
User’s Manual 3.3 CLI Mode Management There are two ways for CLI mode management, one is remote telnet and the other operated from console port. Remote telnet is an IP-based protocol and console port is for user to operate the Industrial Managed Switch locally only; however, their operations are the same. The command line user interface is for performing system administration, such as displaying statistics or changing option settings.
User’s Manual You can change these settings, if desired, after you log on. This management method is often preferred because you can remain connected and monitor the system during system reboots. Also, certain error messages are sent to the serial port, regardless of the interface through which the associated action was initiated. A Macintosh or PC attachment can use any terminal-emulation program for connecting to the terminal serial port.
User’s Manual 3.4 Web Management The Industrial Managed Switch offers management features that allow users to manage the Industrial Managed Switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer. After you set up your IP address for the Industrial Managed Switch, you can access the Industrial Managed Switch’s Web interface applications directly in your Web browser by entering the IP address of the Industrial Managed Switch.
User’s Manual 3.5 SNMP-based Network Management You can use an external SNMP-based application to configure and manage the Industrial Managed Switch, such as SNMP Network Manager, HP Openview Network Node Management (NNM) or What’s Up Gold. This management method requires the SNMP agent on the Industrial Managed Switch and the SNMP Network Management Station to use the same community string. This management method, in fact, uses two community strings: the get community string and the set community string.
User’s Manual 3.6 PLANET Smart Discovery Utility To easily list the Industrial Managed Switch in your Ethernet environment, the Planet Smart Discovery Utility from user’s manual CD-ROM is an ideal solution. The following install instructions guide you to running the Planet Smart Discovery Utility. 1. Open the Planet Smart Discovery Utility in administrator PC. 2. Run this utility and the following screen appears.
User’s Manual 1. This utility shows all the necessary information from the devices, such as MAC Address, Device Name, firmware version and Device IP Subnet address. A new password, IP Subnet address and description can be assigned to the devices. 2. After setup is completed, press the “Update Device”, “Update Multi” or “Update All” button to take effect. The meanings of the 3 buttons above are shown below: Update Device: Use the current setting on one single device.
User’s Manual 4. WEB CONFIGURATION This section introduces the configuration and functions of the Web-based management. About Web-based Management The Industrial Managed Switch offers management features that allow users to manage the Industrial Managed Switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer. The Web-based Management supports Internet Explorer 8.0.
User’s Manual 2. When the following login screen appears, please enter the default username "admin" with password “admin” (or the username/password you have changed via console) to login the main screen of Industrial Managed Switch. The login screen in Figure 4-1-2 appears. Figure 4-1-2: Login Screen Default User name: admin Default Password: admin After entering the username and password, the main screen appears as Figure 4-1-3.
User’s Manual 1. It is recommended to use Internet Explore 8.0 or above to access Industrial Managed Switch. 2. The changed IP address takes effect immediately after clicking on the Save button. From now on, you need to use the new IP address to access the Internet. 3. For security reason, please change and memorize the new password after this first setup. 4. Only accept command in lowercase letter.
User’s Manual 4.1 Main Web page The Industrial Managed Switch provides a Web-based browser interface for configuring and managing it. This interface allows you to access the Industrial Managed Switch using the Web browser of your choice. This chapter describes how to use the Industrial Managed Switch’s Web browser interface to configure and manage it.
User’s Manual Main Menu Using the onboard web agent, you can define system parameters, manage and control the Industrial Managed Switch, and all its ports, or monitor network conditions. Via the Web-Management, the administrator can set up the Industrial Managed Switch by selecting the functions those listed in the Main Function. The screen in Figure 4-1-5 appears.
User’s Manual 4.2 System Use the System menu items to display and configure basic administrative details of the Industrial Managed Switch. Under System the following topics are provided to configure and view the system information. ■ System Information The Managed Switch system information is provided here. ■ IP Configuration Configures the Managed Switch with IPv4/IPv6 interface and IP routes on this page. ■ IP Status This page displays the status of the IP protocol layer.
User’s Manual 4.2.1 System Information The System Info page provides information for the current device information. System Info page helps a switch administrator to identify the hardware MAC address, software version and system uptime. The screen in Figure 4-2-1 appears. Figure 4-2-1: System Information page Screenshot The page includes the following fields: Object Description • Contact The system contact configured in Configuration | System | Information | System Contact.
User’s Manual 4.2.2 IP Configuration The IP Configuration includes the IP Configuration, IP Interface and IP Routes. The configured column is used to view or change the IP configuration. The maximum number of interfaces supported is 128 and the maximum number of routes is 32. The screen in Figure 4-2-2 appears. Figure 4-2-2: IP Configuration page Screenshot The current column is used to show the active IP configuration.
User’s Manual From this DHCP interface Specify from which DHCP-enabled interface a provided DNS server should be preferred. DNS Proxy When DNS proxy is enabled, system will relay DNS requests to the currently configured DNS server, and reply as a DNS resolver to the client devices on the network. • IP Address Delete Select this option to delete an existing IP interface. VLAN The VLAN associated with the IP interface. Only ports in this VLAN will be able to access the IP interface.
User’s Manual 4.2.3 IP Status IP Status displays the status of the IP protocol layer. The status is defined by the IP interfaces, the IP routes and the neighbor cache (ARP cache) status. The screen in Figure 4-2-3 appears. Figure 4-2-3: IP Status page Screenshot The page includes the following fields: Object Description • IP Interfaces • IP Routes • Neighbor Cache Interface The name of the interface. Type The address type of the entry. This may be LINK or IPv4.
User’s Manual 4.2.4 Users Configuration This page provides an overview of the current users. Currently the only way to login as another user on the web server is to close and reopen the browser. After setup is completed, press the “Apply” button to take effect. Please login web interface with new user name and password, the screen in Figure 4-2-4 appears.
User’s Manual Figure 4-2-5: Add/Edit User Configuration page Screenshot The page includes the following fields: Object Description • Username A string identifying the user name that this entry should belong to. The allowed string length is 1 to 31. The valid user name is a combination of letters, numbers and underscores. • Password The password of the user. The allowed string length is 1 to 31. • Password (again) Please enter the user’s new password here again to confirm.
User’s Manual Generally, the privilege level 15 can be used for an administrator account, privilege level 10 for a standard user account and privilege level 5 for a guest account. Once the new user is added, the new user entry is shown on the Users Configuration page.
User’s Manual 4.2.5 Privilege Levels This page provides an overview of the privilege levels. After setup is completed, please press the “Apply” button to take effect. Please login web interface with new user name and password and the screen in Figure 4-2-7 appears.
User’s Manual The page includes the following fields: Object Description • Group Name The name identifying the privilege group. In most cases, a privilege level group consists of a single module (e.g. LACP, RSTP or QoS), but a few of them contain more than one. The following description defines these privilege level groups in details: System: Contact, Name, Location, Time Zone, Log.
User’s Manual 4.2.6 NTP Configuration Configure NTP on this page. NTP is an acronym for Network Time Protocol, a network protocol for synchronizing the clocks of computer systems. NTP uses UDP (data grams) as transport layer. You can specify NTP Servers. The NTP Configuration screen in Figure 4-2-8 appears. Figure 4-2-8: NTP Configuration page Screenshot The page includes the following fields: Object Description • Mode Indicates the NTP mode operation.
User’s Manual 4.2.7 Time Configuration Configure Time Zone on this page. A Time Zone is a region that has a uniform standard time for legal, commercial, and social purposes. It is convenient for areas in close commercial or other communication to keep the same time, so time zones tend to follow the boundaries of countries and their subdivisions.
User’s Manual Daylight Saving Time duration to repeat the configuration every year. Select 'Non-Recurring' and configure the Daylight Saving Time duration for single time configuration. (Default: Disabled). • Week - Select the starting week number. • Start Time Settings • Day - Select the starting day. • Month - Select the starting month. • Hours - Select the starting hour. • Minutes - Select the starting minute. • Week - Select the ending week number. • End Time Settings • Day - Select the ending day.
User’s Manual The page includes the following fields: Object Description • Mode Indicates the UPnP operation mode. Possible modes are: Enabled: Enable UPnP mode operation. Disabled: Disable UPnP mode operation. When the mode is enabled, two ACEs are added automatically to trap UPnP related packets to CPU. The ACEs are automatically removed when the mode is disabled. • TTL The TTL value is used by UPnP to send SSDP advertisement messages. Valid values are in the range of 1 to 255.
User’s Manual The definition of Circuit ID in the switch is 4 bytes in length and the format is "vlan_id" "module_id" "port_no". The parameter of "vlan_id" is the first two bytes representing the VLAN ID. The parameter of "module_id" is the third byte for the module ID (in standalone switch it always equals 0; in stackable switch it means switch ID). The parameter of "port_no" is the fourth byte and it means the port number.
User’s Manual Replace: Replace the original relay information when receiving a DHCP message that already contains it. Keep: Keep the original relay information when receiving a DHCP message that already contains it. Drop: Drop the package when receiving a DHCP message that already contains relay information. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.2.10 DHCP Relay Statistics This page provides statistics for DHCP relay.
User’s Manual • Receive Missing The packets number whose missing remote ID is received. Remote ID • Receive Bad Circuit ID The packets number whose Circuit ID does not match known circuit ID. Receive Bad Remote ID The packets number whose Remote ID does not match known remote ID. Client Statistics Object Description • Transmit to Client The packets number that is relayed from server to client. • Transmit Error The packets number that is erroneously sent to servers.
User’s Manual 4.2.11 CPU Load This page displays the CPU load, using an SVG graph. The load is measured as average over the last 100ms, 1sec and 10 seconds intervals. The last 120 samples are graphed, and the last numbers are displayed as text as well. In order to display the SVG graph, your browser must support the SVG format. Consult the SVG Wiki for more information on browser support. Specifically, at the time of writing, Microsoft Internet Explorer will need to have a plugin installed to support SVG.
User’s Manual 4.2.12 System Log The Industrial Managed Switch system log information is provided here. The System Log screen in Figure 4-2-14 appears. Figure 4-2-14: System Log page Screenshot The page includes the following fields: Object Description • ID The ID (>= 1) of the system log entry. • Level The level of the system log entry. The following level types are supported: Info: Information level of the system log. Warning: Warning level of the system log.
User’s Manual : Updates the system log entries, starting from the first available entry ID. : Updates the system log entries, ending at the last entry currently displayed. : Updates the system log entries, starting from the last entry currently displayed. : Updates the system log entries, ending at the last available entry ID. 4.2.13 Detailed Log The Industrial Managed Switch system detailed log information is provided here. The Detailed Log screen in Figure 4-2-15 appears.
User’s Manual 4.2.14 Remote Syslog Configure remote syslog on this page. The Remote Syslog screen in Figure 4-2-16 appears. Figure 4-2-16: Remote Syslog page Screenshot The page includes the following fields: Object Description • Mode Indicates the server mode operation. When the mode operation is enabled, the syslog message will send out to syslog server.
User’s Manual 4.2.15 SMTP Configuration This page facilitates an SMTP Configuration on the switch. The SMTP Configure screen in Figure 4-2-17 appears. Figure 4-2-17: SMTP Configuration page Screenshot The page includes the following fields: Object Description • SMTP Mode Controls whether SMTP is enabled on this switch. • SMTP Server Type the SMTP server name or the IP address of the SMTP server. • SMTP Port Set port number of SMTP service.
User’s Manual 4.2.16 Digital Input/Output Digital Input allows user to log external device (such as industrial cooler) dead or alive or something else. System will log a user customized message into system log and syslog, and issue SNMP trap or issue an alarm E-mail. Digital Output allows user to monitor the switch port and power, and let system issue a high or low signal to an external device (such as alarm) when the monitor port or power has failed. The Configuration screen in Figure 4-2-18 appears.
User’s Manual • Event Description Allows user to set a customized message for Digital Input function alarming. • Event As Digital Input: Allows user to record alarm message to System log, syslog or issues out via SNMP Trap or SMTP. As default SNMP Trap and SMTP are disabled, please enable them first if you want to issue alarm message via them.
User’s Manual 4.2.17 Fault Alarm This page facilitates an update of the firmware controlling the switch. The Web Firmware Upgrade screen in Figure 4-2-19 appears. Figure 4-2-19: Fault Alarm Control Configuration page Screenshot The page includes the following fields: Object Description • Enable Controls whether Fault Alarm is enabled on this switch. • Record Controls whether Record is sending System log or SNMP Trap or both.
User’s Manual 4.2.18 Web Firmware Upgrade This page facilitates an update of the firmware controlling the switch. The Web Firmware Upgrade screen in Figure 4-2-20 appears. Figure 4-2-20: Web Firmware Upgrade page Screenshot To open Firmware Upgrade screen, perform the following: 1. Click System -> Web Firmware Upgrade. 2. The Firmware Upgrade screen is displayed as in Figure 4-2-21. 3. Click the “ 4. Select on the firmware then click “ 5.
User’s Manual 4.2.19 TFTP Firmware Upgrade The Firmware Upgrade page provides the functions to allow a user to update the Industrial Managed Switch firmware from the TFTP server in the network. Before updating, make sure you have your TFTP server ready and the firmware image is on the TFTP server. The TFTP Firmware Upgrade screen in Figure 4-2-22 appears.
User’s Manual 4.2.20 Save Startup Config This function allows to save the current configuration, thereby ensuring that the current active configuration can be used at the next reboot screen in Figure 4-2-23 as shown below. After saving the configuration, the screen in Figure 4-2-24 appears. Figure 4-2-23: Configuration Save page Screenshot Figure 4-2-24: Finish Saving page Screenshot 4.2.21 Configuration Download The switch stores its configuration in a number of text files in CLI format.
User’s Manual 4.2.22 Configuration Upload Configuration Upload page allows the uploads of the running-config and startup-config on the switch. Please refer to Figure 4-2-26 shown below. Figure 4-2-26: Configuration Upload page Screenshot If the destination is running-config, the file will be applied to the switch configuration. This can be done in two ways: • Replace mode: The current configuration is fully replaced with the configuration in the uploaded file.
User’s Manual It is possible to activate any of the configuration files present on the switch, except for running-config which represents the currently active configuration. Select the file to activate and click . This will initiate the process of completely replacing the existing configuration with that of the selected file. 4.2.24 Configuration Delete Configuration Delete page allows to delete the startup-config and default-config files which are stored in FLASH.
User’s Manual Figure 4-2-29: Software Image Selection page Screenshot The page includes the following fields: Object Description • Image The flash index name of the firmware image. The name of primary (preferred) image is image, the alternate image is named image.bk. • Version The version of the firmware image. • Date The date where the firmware was produced. Buttons : Click to use the alternate image. This button may be disabled depending on system state. 4.2.
User’s Manual Buttons : Click to reset the configuration to Factory Defaults. : Click to return to the Port State page without resetting the configuration. To reset the Industrial Managed Switch to the Factory default setting, you can also press the hardware reset button at the front panel about 10 seconds. After the device be rebooted. You can login the management WEB interface within the same subnet of 192.168.0.xx. 4.2.
User’s Manual 4.3 Simple Network Management Protocol 4.3.1 SNMP Overview The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management information between network devices. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth.
User’s Manual SNMP community An SNMP community is the group that devices and management stations running SNMP belong to. It helps define where information is sent. The community name is used to identify the group. A SNMP device or agent may belong to more than one SNMP community. It will not respond to requests from management stations that do not belong to one of its communities.
User’s Manual The page includes the following fields: Object Description • Mode Indicates the SNMP mode operation. Possible modes are: Enabled: Enable SNMP mode operation. Disabled: Disable SNMP mode operation. • Version Indicates the SNMP supported version. Possible versions are: SNMP v1: Set SNMP supported version 1. SNMP v2c: Set SNMP supported version 2c. SNMP v3: Set SNMP supported version 3. • Read Community Indicates the community read access string to permit access to SNMP agent.
User’s Manual 4.3.3 SNMP Trap Configuration Configure SNMP trap on this page. The SNMP Trap Configuration screen in Figure 4-3-2 appears. Figure 4-3-2: SNMP Trap Configuration page Screenshot The page includes the following fields: Object Description • Trap Config Indicates which trap Configuration's name for configuring. The allowed string length is 0 to 255, and the allowed content is ASCII characters from 33 to 126. • Trap Mode Indicates the SNMP trap mode operation.
User’s Manual • Trap Community Indicates the community access string when send SNMP trap packet. The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 33 to 126. • Trap Destination Indicates the SNMP trap destination address. Address • Trap Destination Port Indicates the SNMP trap destination port. SNMP Agent will send SNMP message via this port, the port range is 1~65535. • Trap Inform Mode Indicates the SNMP trap inform mode operation.
User’s Manual Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.3.4 SNMP System Information The switch system information is provided here. The SNMP System Information screen in Figure 4-3-3 appears.
User’s Manual 4.3.5 SNMPv3 Configuration 4.3.5.1 SNMPv3 Communities Configure SNMPv3 communities table on this page. The entry index key is Community. The SNMPv3 Communities screen in Figure 4-3-4 appears. Figure 4-3-4: SNMPv3 Communities Configuration page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • Community Indicates the community access string to permit access to SNMPv3 agent.
User’s Manual 4.3.5.2 SNMPv3 Users Configure SNMPv3 users table on this page. The entry index keys are Engine ID and User Name. The SNMPv3 Users screen in Figure 4-3-5 appears. Figure 4-3-5: SNMPv3 Users Configuration page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • Engine ID An octet string identifying the engine ID that this entry should belong to.
User’s Manual MD5: An optional flag to indicate that this user using MD5 authentication protocol. SHA: An optional flag to indicate that this user using SHA authentication protocol. The value of security level cannot be modified if entry already exist. That means must first ensure that the value is set correctly. A string identifying the authentication pass phrase. For MD5 authentication • Authentication protocol, the allowed string length is 8 to 32.
User’s Manual The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • Security Model Indicates the security model that this entry should belong to. Possible security models are: v1: Reserved for SNMPv1. v2c: Reserved for SNMPv2c. usm: User-based Security Model (USM). A string identifying the security name that this entry should belong to.
User’s Manual The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • View Name A string identifying the view name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is the ASCII characters from 33 to 126. Indicates the view type that this entry should belong to.
User’s Manual The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • Group Name A string identifying the group name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is the ASCII characters from 33 to 126. • Security Model Indicates the security model that this entry should belong to. Possible security models are: any: Accepted any security model (v1|v2c|usm).
User’s Manual 4.4 Port Management Use the Port Menu to display or configure the Industrial Managed Switch's ports. This section has the following items: Port Configuration Configures port connection settings Port Statistics Overview Lists Ethernet and RMON port statistics Port Statistics Detail Lists Ethernet and RMON port statistics SFP Module Information Display SFP information Port Mirror Sets the source and target ports for mirroring 4.4.
User’s Manual • Configured Link Speed Select any available link speed for the given switch port. Draw the menu bar to select the mode. • Flow Control Auto - Setup Auto negotiation for copper interface. 10Mbps HDX - Force sets 10Mbps/Half-Duplex mode. 10Mbps FDX - Force sets 10Mbps/Full-Duplex mode. 100Mbps HDX - Force sets 100Mbps/Half-Duplex mode. 100Mbps FDX - Force sets 100Mbps/Full-Duplex mode. 1Gbps FDX - Force sets 10000Mbps/Full-Duplex mode.
User’s Manual 4.4.2 Port Statistics Overview This page provides an overview of general traffic statistics for all switch ports. The Port Statistics Overview screen in Figure 4-4-2 appears. Figure 4-4-2: Port Statistics Overview page Screenshot The displayed counters are: Object Description • Port The logical port for the settings contained in the same row. • Packets The number of received and transmitted packets per port. • Bytes The number of received and transmitted bytes per port.
User’s Manual 4.4.3 Port Statistics Detail This page provides detailed traffic statistics for a specific switch port. Use the port select box to select which switch port details to display. The selected port belong to the currently selected stack unit, as reflected by the page header. The displayed counters are the totals for receive and transmit, the size counters for receive and transmit, and the error counters for receive and transmit. The Port Statistics Detail screen in Figure 4-4-3 appears.
User’s Manual Receive and Transmit Size Counters The number of received and transmitted (good and bad) packets split into categories based on their respective frame sizes. Receive and Transmit Queue Counters The number of received and transmitted packets per input and output queue. Receive Error Counters Object Description • Rx Drops The number of frames dropped due to lack of receive buffers or egress congestion. • Rx CRC/Alignment The number of frames received with CRC or alignment errors.
User’s Manual 4.4.4 SFP Module Information The IGS Series supports the SFP module with digital diagnostics monitoring (DDM) function. This feature is also known as digital optical monitoring (DOM). You can check the physical or operational status of an SFP module via the SFP Module Information page. This page shows the operational status, such as the transceiver type, speed, wavelength, optical output power, optical input power, temperature, laser bias current and transceiver supply voltage in real time.
User’s Manual • TX power (dBm) Display the TX power of current SFP DDM module; the TX power value is gotten – SFP DDM Module Only from the SFP DDM module. • RX power (dBm) Display the RX power of current SFP DDM module; the RX power value is gotten – SFP DDM Module Only from the SFP DDM module.
User’s Manual The traffic to be copied to the mirror port is selected as follows: • All frames received on a given port (also known as ingress or source mirroring). • All frames transmitted on a given port (also known as egress or destination mirroring). Mirror Port Configuration The Port Mirror screen in Figure 4-4-6 appears.
User’s Manual The page includes the following fields: Object Description • Port to mirror on Frames from ports that have either source (rx) or destination (tx) mirroring enabled are mirrored to this port. Disabled disables mirroring. • Port The logical port for the settings contained in the same row. • Mode Select mirror mode. ■ Rx only: Frames received at this port are mirrored to the mirroring port. Frames transmitted are not mirrored.
User’s Manual 4.5 Link Aggregation Port Aggregation optimizes port usage by linking a group of ports together to form a single Link Aggregated Groups (LAGs). Port Aggregation multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy. Each LAG is composed of ports of the same speed, set to full-duplex operations. Ports in a LAG, can be of different media types (UTP/Fiber, or different fiber types), provided they operate at the same speed.
User’s Manual The Link Aggregation Control Protocol (LACP) provides a standardized means for exchanging information between Partner Systems that require high speed redundant links. Link aggregation lets you group up to eight consecutive ports into a single dedicated connection. This feature can expand bandwidth to a device on the network. LACP operation requires full-duplex mode, more detail information refer to the IEEE 802.3ad standard.
User’s Manual 4.5.1 Static Aggregation This page is used to configure the Aggregation hash mode and the aggregation group. The aggregation hash mode settings are global, whereas the aggregation group relate to the currently selected stack unit, as reflected by the page header. Hash Code Contributors The Static Aggregation screen in Figure 4-5-2 appears.
User’s Manual Static Aggregation Group Configuration The Aggregation Group Configuration screen in Figure 4-5-3 appears. Figure 4-5-3: Aggregation Group Configuration page Screenshot The page includes the following fields: .Object Description • Group ID Indicates the group ID for the settings contained in the same row. Group ID "Normal" indicates there is no aggregation. Only one group ID is valid per port. • Port Members Each switch port is listed for each group ID.
User’s Manual This page allows the user to inspect the current LACP port configurations, and possibly change them as well. The LACP port settings relate to the currently selected stack unit, as reflected by the page header. The LACP Configuration screen in Figure 4-5-4 appears. Figure 4-5-4 : LACP Port Configuration page Screenshot The page includes the following fields: Object Description • Port The switch port number. • LACP Enabled Controls whether LACP is enabled on this switch port.
User’s Manual Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.5.3 LACP System Status This page provides a status overview for all LACP instances. The LACP Status page displays the current LACP aggregation Groups and LACP Port status. The LACP System Status screen in Figure 4-5-5 appears.
User’s Manual 4.5.4 LACP Port Status This page provides a status overview for LACP status for all ports. The LACP Port Status screen in Figure 4-5-6 appears. Figure 4-5-6: LACP Status page Screenshot The page includes the following fields: Object Description • Port The switch port number. • LACP 'Yes' means that LACP is enabled and the port link is up. 'No' means that LACP is not enabled or that the port link is down.
User’s Manual 4.5.5 LACP Port Statistics This page provides an overview for LACP statistics for all ports. The LACP Port Statistics screen in Figure 4-5-7 appears. Figure 4-5-7: LACP Statistics page Screenshot The page includes the following fields: Object Description • Port The switch port number. • LACP Received Shows how many LACP frames have been sent from each port. • LACP Transmitted Shows how many LACP frames have been received at each port.
User’s Manual 4.6 VLAN 4.6.1 VLAN Overview A Virtual Local Area Network (VLAN) is a network topology configured according to a logical scheme rather than the physical layout. VLAN can be used to combine any collection of LAN segments into an autonomous user group that appears as a single LAN. VLAN also logically segment the network into different broadcast domains so that packets are forwarded only between ports within the VLAN.
User’s Manual 4.6.2 IEEE 802.1Q VLAN In large networks, routers are used to isolate broadcast traffic for each subnet into separate domains. This Industrial Managed Switch provides a similar service at Layer 2 by using VLANs to organize any group of network nodes into separate broadcast domains. VLANs confine broadcast traffic to the originating group, and can eliminate broadcast storms in large networks. This also provides a more secure and cleaner network environment. An IEEE 802.
User’s Manual ■ 802.1Q VLAN Tags The figure below shows the 802.1Q VLAN tag. There are four additional octets inserted after the source MAC address. Their presence is indicated by a value of 0x8100 in the Ether Type field. When a packet's Ether Type field is equal to 0x8100, the packet carries the IEEE 802.1Q/802.1p tag.
User’s Manual Every physical port on a switch has a PVID. 802.1Q ports are also assigned a PVID, for use within the switch. If no VLAN are defined on the switch, all ports are then assigned to a default VLAN with a PVID equal to 1. Untagged packets are assigned the PVID of the port on which they were received. Forwarding decisions are based upon this PVID, in so far as VLAN are concerned. Tagged packets are forwarded according to the VID contained within the tag.
User’s Manual ■ Port Overlapping Port overlapping can be used to allow access to commonly shared network resources among different VLAN groups, such as file servers or printers. Note that if you implement VLANs which do not overlap, but still need to communicate, you can connect them by enabled routing on this switch. ■ Untagged VLANs Untagged (or static) VLANs are typically used to reduce broadcast traffic and to increase security.
User’s Manual ■ IEEE 802.1Q Tunneling (Q-in-Q) IEEE 802.1Q Tunneling (Q-in-Q) is designed for service providers carrying traffic for multiple customers across their networks. Q-in-Q tunneling is used to maintain customer-specific VLAN and Layer 2 protocol configurations even when different customers use the same internal VLAN IDs.
User’s Manual Global VLAN Configuration The Global VLAN Configuration screen in Figure 4-6-1 appears. Figure 4-6-1 : Global VLAN Configuration Screenshot The page includes the following fields: Object Description • Allowed Access This field shows the allowed Access VLANs, it only affects ports configured as VLANs Access ports. Ports in other modes are members of all VLANs specified in the Allowed VLANs field. By default, only VLAN 1 is enabled.
User’s Manual The page includes the following fields: Object Description • Port This is the logical port number for this row. • Mode Access Access ports are normally used to connect to end stations. Dynamic features like Voice VLAN may add the port to more VLANs behind the scenes.
User’s Manual The Port VLAN is called an "Access VLAN" for ports in Access mode and Native VLAN for ports in Trunk or Hybrid mode. • Port Type Ports in hybrid mode allow for changing the port type, that is, whether a frame's VLAN tag is used to classify the frame on ingress to a particular VLAN, and if so, which TPID it reacts on. Likewise, on egress, the Port Type determines the TPID of the tag, if a tag is required.
User’s Manual Only untagged frames are accepted on ingress. Tagged frames are discarded. Egress Tagging This option is only available for ports in Hybrid mode. Ports in Trunk and Hybrid mode may control the tagging of frames on egress. ■ Untag Port VLAN Frames classified to the Port VLAN are transmitted untagged. Other frames are transmitted with the relevant tag. ■ Tag All All frames, whether classified to the Port VLAN or not, are transmitted with a tag.
User’s Manual 4.6.4 VLAN Membership Status This page provides an overview of membership status for VLAN users. The VLAN Membership Status screen in Figure 4-6-4 appears. Figure 4-6-4: VLAN Membership Status for Static User page Screenshot The page includes the following fields: Object Description • VLAN User A VLAN User is a module that uses services of the VLAN management functionality to configure VLAN memberships and VLAN port configuration such as PVID, UVID.
User’s Manual Buttons : Select VLAN Users from this drop down list. Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the page immediately. : Updates the table starting from the first entry in the VLAN Table, i.e. the entry with the lowest VLAN ID. : Updates the table, starting with the entry after the last entry currently displayed. 4.6.5 VLAN Port Status This page provides VLAN Port Status.
User’s Manual the classified VLAN of the frame, the frame is discarded. • Frame Type Shows whether the port accepts all frames or only tagged frames. This parameter affects VLAN ingress processing. If the port only accepts tagged frames, untagged frames received on that port are discarded. • Port VLAN ID Shows the PVID setting for the port. • Tx Tag Shows egress filtering frame status whether tagged or untagged. • Untagged VLAN ID Shows UVID (untagged VLAN ID).
User’s Manual Figure 4-6-6 Private VLAN Membership Configuration page screenshot The page includes the following fields: Object Description • Delete To delete a private VLAN entry, check this box. The entry will be deleted during the next save. • Private VLAN ID Indicates the ID of this particular private VLAN. • Port Members A row of check boxes for each port is displayed for each private VLAN ID. To include a port in a Private VLAN, check the box.
User’s Manual : Click to refresh the page immediately. 4.6.7 Port Isolation Overview When a VLAN is configured to be a private VLAN, communication between ports within that VLAN can be prevented. Two application examples are provided in this section: • Customers connected to an ISP can be members of the same VLAN, but they are not allowed to communicate with each other within that VLAN.
User’s Manual Isolated ports — Ports from which traffic can only be forwarded to promiscuous ports in the private VLAN — Ports which can receive traffic from only promiscuous ports in the private VLAN The configuration of promiscuous and isolated ports applies to all private VLANs. When traffic comes in on a promiscuous port in a private VLAN, the VLAN mask from the VLAN table is applied.
User’s Manual 4.6.8 VLAN setting example: Separate VLAN 802.1Q VLAN Trunk Port Isolate 4.6.8.1 Two Separate 802.1Q VLANs The diagram shows how the Industrial Managed Switch handle Tagged and Untagged traffic flow for two VLANs. VLAN Group 2 and VLAN Group 3 are separated VLAN. Each VLAN isolate network traffic so only members of the VLAN receive traffic from the same VLAN members.
User’s Manual The scenario is described as follows: Untagged packet entering VLAN 2 1. While [PC-1] transmit an untagged packet enters Port-1, the Industrial Managed Switch will tag it with a VLAN Tag=2. [PC-2] and [PC-3] will received the packet through Port-2 and Port-3. 2. [PC-4],[PC-5] and [PC-6] received no packet. 3. While the packet leaves Port-2, it will be stripped away it tag becoming an untagged packet. 4.
User’s Manual 2. Assign VLAN Member and PVID to each port: VLAN 2 : Port-1,Port-2 and Port-3 VLAN 3 : Port-4, Port-5 and Port-6 VLAN 1 : All other ports – Port-7~Port-28 Figure 4-6-10: Change Port VLAN of Port 1~3 to be VLAN2 and Port VLAN of Port 4~6 to be VLAN3 3. Enable VLAN Tag for specific ports Link Type: Port-3 (VLAN-2) and Port-6 (VLAN-3) Change Port 3 Mode as Trunk and select Egress Tagging as Tag All and Type 2 in the Allowed VLANs column.
User’s Manual 4.6.8.2 VLAN Trunking between two 802.1Q aware switches In most cases, they are used for “Uplink” to other switches. VLANs are separated at different switches, but they need to access to other switches within the same VLAN group. The screen in Figure 4-6-12 appears. Figure 4-6-12: VLAN Trunking Diagram Setup steps 1. Add VLAN Group Add two VLANs – VLAN 2 and VLAN 3 For Type 1-3 in Allowed Access VLANs column, the 1-3 includes VLAN1 and 2 and 3. Figure 4-6-13: Add VLAN 2 and VLAN 3 2.
User’s Manual Figure 4-6-14: Changes Port VLAN of Port 1~3 to be VLAN2 and Port VLAN of Port 4~6 to be VLAN3 For the VLAN ports connecting to the hosts, please refer to 4.6.10.1. The following steps focus on the VLAN Trunk port configuration. 1. Specify Port-7 to be the 802.1Q VLAN Trunk port. 2. Assign Port-7 to both VLAN 2 and VLAN 3 on the VLAN Member configuration page. 3. Define a VLAN 1 as a “Public Area” that overlaps both VLAN 2 and VLAN 3 members. 4.
User’s Manual 6. Repeat Steps 1 to 6 to set up the VLAN Trunk port at the partner switch. To add more VLANs to join the VLAN trunk, repeat Steps 1 to 3 to assign the Trunk port to the VLANs. 4.6.8.3 Port Isolate The diagram shows how the Industrial Managed Switch handles isolated and promiscuous ports, and the each PC is not able to access the isolated port of each other’s PCs. But they all need to access with the same server/AP/Printer.
User’s Manual 2. Assign VLAN Member : VLAN 1 : Port-5 and Port-6 VLAN 2 : Port-1, Port-2, Port-5 and Port-6 VLAN 3: Port-3~Port-6. The screen in Figure 4-6-18 appears. Figure 4-6-17: Private VLAN Port Setting 4.6.9 MAC-based VLAN The MAC-based VLAN entries can be configured here. This page allows for adding and deleting MAC-based VLAN entries and assigning the entries to different ports. This page shows only static entries. The MAC-based VLAN screen in Figure 4-6-18 appears.
User’s Manual The page includes the following fields: Object Description • Delete To delete a MAC-based VLAN entry, check this box and press save. The entry will be deleted in the stack. • MAC Address Indicates the MAC address. • VLAN ID Indicates the VLAN ID. • Port Members A row of check boxes for each port is displayed for each MAC-based VLAN entry. To include a port in a MAC-based VLAN, check the box. To remove or exclude the port from the MAC-based VLAN, make sure the box is unchecked.
User’s Manual 4.6.10 Protocol-based VLAN This page allows you to add new protocols to Group Name (unique for each Group) mapping entries as well as allow you to see and delete already mapped entries for the switch. The Protocol-based VLAN screen in Figure 4-6-19 appears. Figure 4-6-19: Protocol to Group Mapping Table page Screenshot The page includes the following fields: Object Description • Delete To delete a Protocol to Group Name map entry, check this box.
User’s Manual a. OUI: OUI (Organizationally Unique Identifier) is value in format of xx-xx-xx where each pair (xx) in string is a hexadecimal value ranges from 0x00-0xff. b. PID: If the OUI is hexadecimal 000000, the protocol ID is the Ethernet type (EtherType) field value for the protocol running on top of SNAP; if the OUI is an OUI for a particular organization, the protocol ID is a value assigned by that organization to the protocol running on top of SNAP.
User’s Manual 4.6.11 Protocol-based VLAN Membership This page allows you to map a already configured Group Name to a VLAN for the switch. The Group Name to VLAN Mapping Table screen in Figure 4-6-20 appears. Figure 4-6-20 Group Name to VLAN Mapping Table page Screenshot The page includes the following fields: Object Description • Delete To delete a Group Name to VLAN map entry, check this box.
User’s Manual 4.7 Spanning Tree Protocol 4.7.1 Theory The Spanning Tree protocol can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
User’s Manual The path cost to the root from the transmitting port The port identifier of the transmitting port The switch sends BPDUs to communicate and construct the spanning-tree topology. All switches connected to the LAN on which the packet is transmitted will receive the BPDU. BPDUs are not directly forwarded by the switch, but the receiving switch uses the information in the frame to calculate a BPDU, and, if the topology changes, initiates a BPDU transmission.
User’s Manual From forwarding to disabled From disabled to blocking Figure 4-7-1: STP Port State Transitions You can modify each port state by using management software. When you enable STP, every port on every switch in the network goes through the blocking state and then transitions through the states of listening and learning at power up. If properly configured, each port stabilizes to the forwarding or blocking state.
User’s Manual The following are the user-configurable STP parameters for the switch level: Parameter Description Default Value Bridge Identifier(Not user A combination of the User-set priority and the 32768 + MAC configurable switch’s MAC address.
User’s Manual User-Changeable STA Parameters The Switch’s factory default setting should cover the majority of installations. However, it is advisable to keep the default settings as set at the factory; unless, it is absolutely necessary. The user changeable parameters in the Switch are as follows: Priority – A Priority for the switch can be set from 0 to 65535. 0 is equal to the highest Priority. Hello Time – The Hello Time can be from 1 to 10 seconds.
User’s Manual Figure 4-7-2: Before Applying the STA Rules In this example, only the default STP values are used.
User’s Manual The switch with the lowest Bridge ID (switch C) was elected the root bridge, and the ports were selected to give a high port cost between switches B and C. The two (optional) Gigabit ports (default port cost = 20,000) on switch A are connected to one (optional) Gigabit port on both switch B and C. The redundant link between switch B and C is deliberately chosen as a 100 Mbps Fast Ethernet link (default port cost = 200,000).
User’s Manual The page includes the following fields: Basic Settings Object Description • Protocol Version The STP protocol version setting. Valid values are: STP (IEEE 802.1D Spanning Tree Protocol) RSTP (IEEE 802.2w Rapid Spanning Tree Protocol) MSTP (IEEE 802.1s Multiple Spanning Tree Protocol) • Bridge Priority Controls the bridge priority. Lower numeric values have better priority.
User’s Manual • Port Error Recovery Control whether a port in the error-disabled state automatically will be enabled after a certain time. If recovery is not enabled, ports have to be disabled and re-enabled for normal STP operation. The condition is also cleared by a system reboot. • Port Error Recovery The time that has to pass before a port in the error-disabled state can be enabled. Valid values are between 30 and 86400 seconds (24 hours).
User’s Manual • Topology Flag The current state of the Topology Change Flag for this Bridge instance. • Topology Change Last The time since last Topology Change occurred. Buttons Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the page immediately. 4.7.4 CIST Port Configuration This page allows the user to inspect the current STP CIST port configurations, and possibly change them as well.
User’s Manual values. Using the Specific setting, a user-defined value can be entered. The path cost is used when establishing the active topology of the network. Lower path cost ports are chosen as forwarding ports in favor of higher path cost ports. Valid values are in the range 1 to 200000000. • Priority Controls the port priority. This can be used to control priority of ports having identical port cost. (See above).
User’s Manual Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. By default, the system automatically detects the speed and duplex mode used on each port, and configures the path cost according to the values shown below. Path cost “0” is used to indicate auto-configuration mode. When the short path cost method is selected and the default path cost recommended by the IEEE 8021w standard exceeds 65,535, the default is set to 65,535.
User’s Manual 4.7.5 MSTI Priorities This page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. The MSTI Priority screen in Figure 4-7-7 appears. Figure 4-7-7: MSTI Priority page Screenshot The page includes the following fields: Object Description • MSTI The bridge instance. The CIST is the default instance, which is always active. • Priority Controls the bridge priority. Lower numerical values have better priority.
User’s Manual 4.7.6 MSTI Configuration This page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. The MSTI Configuration screen in Figure 4-7-8 appears. Figure 4-7-8: MSTI Configuration page Screenshot The page includes the following fields: Configuration Identification Object Description • Configuration Name The name identifying the VLAN to MSTI mapping.
User’s Manual MSTI Mapping Object Description • MSTI The bridge instance. The CIST is not available for explicit mapping, as it will receive the VLANs not explicitly mapped. The list of VLAN's mapped to the MSTI. The VLANs must be separated with • VLANs Mapped comma and/or space. A VLAN can only be mapped to one MSTI. A unused MSTI should just be left empty. (I.e. not having any VLANs mapped to it.
User’s Manual Figure 4-7-10 : MST1 MSTI Port Configuration page Screenshot The page includes the following fields: MSTx MSTI Port Configuration Object Description • Port The switch port number of the corresponding STP CIST (and MSTI) port. • Path Cost Controls the path cost incurred by the port. The Auto setting will set the path cost as appropriate by the physical link speed, using the 802.1D recommended values. Using the Specific setting, a user-defined value can be entered.
User’s Manual 4.7.8 Port Status This page displays the STP CIST port status for port physical ports in the currently selected switch. The STP Port Status screen in Figure 4-7-11 appears. Figure 4-7-11: STP Port Status page Screenshot The page includes the following fields: Object Description • Port The switch port number of the logical STP port. • CIST Role The current STP port role of the ICST port.
User’s Manual 4.7.9 Port Statistics This page displays the STP port statistics counters for port physical ports in the currently selected switch. The STP Port Statistics screen in Figure 4-7-12 appears. Figure 4-7-12: STP Statistics page Screenshot The page includes the following fields: Object Description • Port The switch port number of the logical RSTP port. • MSTP The number of MSTP Configuration BPDU's received/transmitted on the port.
User’s Manual 4.8 Multicast 4.8.1 IGMP Snooping The Internet Group Management Protocol (IGMP) lets host and routers share information about multicast groups memberships. IGMP snooping is a switch feature that monitors the exchange of IGMP messages and copies them to the CPU for feature processing. The overall purpose of IGMP Snooping is to limit the forwarding of multicast frames to only ports that are a member of the multicast group.
User’s Manual Figure 4-8-2: Multicast Flooding Figure 4-8-3: IGMP Snooping Multicast Stream Control 181
User’s Manual IGMP Versions 1 and 2 Multicast groups allow members to join or leave at any time. IGMP provides the method for members and multicast routers to communicate when joining or leaving a multicast group. IGMP version 1 is defined in RFC 1112. It has a fixed packet size and no optional data.
User’s Manual The states a computer will go through to join or to leave a multicast group are shown below: Figure 4-8-4: IGMP State Transitions IGMP Querier – A router, or multicast-enabled switch, can periodically ask their hosts if they want to receive multicast traffic. If there is more than one router/switch on the LAN performing IP multicasting, one of these devices is elected “querier” and assumes the role of querying the LAN for group members.
User’s Manual 4.8.2 Profile Table This page provides IPMC Profile related configurations. The IPMC profile is used to deploy the access control on IP multicast streams. It is allowed to create a maximum of 64 Profiles with a maximum of 128 corresponding rules for each. The Profile Table screen in Figure 4-8-5 appears. Figure 4-8-5: IPMC Profile Configuration page The page includes the following fields: Object Description • Global Profile Mode Enable/Disable the Global IPMC Profile.
User’s Manual Buttons : Click to add new IPMC profile. Specify the name and configure the new entry. Click "Save”. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.8.3 Address Entry This page provides address range settings used in IPMC profile. The address entry is used to specify the address range that will be associated with IPMC Profile. It is allowed to create a maximum of 128 address entries in the system.
User’s Manual : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. : Refreshes the displayed table starting from the input fields. : Updates the table starting from the first entry in the IPMC Profile Address Configuration. : Updates the table, starting with the entry after the last entry currently displayed. 4.8.4 IGMP Snooping Configuration This page provides IGMP Snooping related configuration.
User’s Manual When IGMP Snooping is disabled, unregistered IPMCv4 traffic flooding is always active in spite of this setting. • IGMP SSM Range SSM (Source-Specific Multicast) Range allows the SSM-aware hosts and routers run the SSM service model for the groups in the address range. • Leave Proxy Enable Enable IGMP Leave Proxy. This feature can be used to avoid forwarding unnecessary leave messages to the router side. • Proxy Enable Enable IGMP Proxy.
User’s Manual 4.8.5 IGMP Snooping VLAN Configuration Each page shows up to 99 entries from the VLAN table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the VLAN Table. The first displayed will be the one with the lowest VLAN ID found in the VLAN Table. The "VLAN" input fields allow the user to select the starting point in the VLAN Table.
User’s Manual (PRI) Priority of Interface. It indicates the IGMP control frame priority level • PRI generated by the system. These values can be used to prioritize different classes of traffic. The allowed range is 0 (best effort) to 7 (highest), default interface priority value is 0 Robustness Variable. The Robustness Variable allows tuning for the expected • RV packet loss on a network. The allowed range is 1 to 255, default robustness variable value is 2. Query Interval.
User’s Manual 4.8.6 IGMP Snooping Port Group Filtering In certain switch applications, the administrator may want to control the multicast services that are available to end users. For example, an IP/TV service is based on a specific subscription plan. The IGMP filtering feature fulfills this requirement by restricting access to specified multicast services on a switch port, and IGMP throttling limits the number of simultaneous multicast groups a port can join.
User’s Manual 4.8.7 IGMP Snooping Status This page provides IGMP Snooping status. The IGMP Snooping Status screen in Figure 4-8-10 appears. Figure 4-8-10: IGMP Snooping Status page Screenshot The page includes the following fields: Object Description • VLAN ID The VLAN ID of the entry. • Querier Version Working Querier Version currently. • Host Version Working Host Version currently. • Querier Status Show the Querier status is "ACTIVE" or "IDLE".
User’s Manual Buttons : Click to refresh the page immediately. : Clears all Statistics counters. Auto-refresh : Automatic refresh occurs every 3 seconds. 4.8.8 IGMP Group Information Entries in the IGMP Group Table are shown on this page. The IGMP Group Table is sorted first by VLAN ID, and then by group. Each page shows up to 99 entries from the IGMP Group table, default being 20, selected through the "entries per page" input field.
User’s Manual 4.8.9 IGMPv3 Information Entries in the IGMP SSM Information Table are shown on this page. The IGMP SSM Information Table is sorted first by VLAN ID, then by group, and then by Port No. Different source addresses belong to the same group are treated as single entry. Each page shows up to 99 entries from the IGMP SSM (Source Specific Multicast) Information table, default being 20, selected through the "entries per page" input field.
User’s Manual 4.8.10 MLD Snooping Configuration This page provides MLD Snooping related configuration. The MLD Snooping Configuration screen in Figure 4-8-13 appears. Figure 4-8-13: MLD Snooping Configuration page Screenshot The page includes the following fields: Object Description • Snooping Enabled Enable the Global MLD Snooping. • Unregistered IPMCv6 Enable unregistered IPMCv6 traffic flooding. Flooding enabled The flooding control takes effect only when MLD Snooping is enabled.
User’s Manual If an aggregation member port is selected as a router port, the whole aggregation will act as a router port. The allowed selection is Auto, Fix, Fone, default compatibility value is Auto. • Fast Leave Enable the fast leave on the port. • Throtting Enable to limit the number of multicast groups to which a switch port can belong. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.8.
User’s Manual Compatibility is maintained by hosts and routers taking appropriate actions • Compatibility depending on the versions of MLD operating on hosts and routers within a network. The allowed selection is MLD-Auto, Forced MLDv1, Forced MLDv2, default compatibility value is MLD-Auto. (PRI) Priority of Interface. It indicates the MLD control frame priority level • PRI generated by the system. These values can be used to prioritize different classes of traffic.
User’s Manual 4.8.12 MLD Snooping Port Group Filtering In certain switch applications, the administrator may want to control the multicast services that are available to end users. For example, an IP/TV service is based on a specific subscription plan. The MLD filtering feature fulfills this requirement by restricting access to specified multicast services on a switch port, and MLD throttling limits the number of simultaneous multicast groups a port can join.
User’s Manual 4.8.13 MLD Snooping Status This page provides MLD Snooping status. The IGMP Snooping Status screen in Figure 4-8-16 appears. Figure 4-8-16: MLD Snooping Status page Screenshot The page includes the following fields: Object Description • VLAN ID The VLAN ID of the entry. • Querier Version Working Querier Version currently. • Host Version Working Host Version currently. • Querier Status Shows the Querier status is "ACTIVE" or "IDLE".
User’s Manual • Port Switch port number. • Status Indicates whether specific port is a router port or not. Buttons : Click to refresh the page immediately. : Clears all Statistics counters. Auto-refresh : Automatic refresh occurs every 3 seconds. 4.8.14 MLD Group Information Entries in the MLD Group Table are shown on this page. The MLD Group Table is sorted first by VLAN ID, and then by group.
User’s Manual 4.8.15 MLDv2 Information Entries in the MLD SFM Information Table are shown on this page. The MLD SFM (Source-Filtered Multicast) Information Table also contains the SSM (Source-Specific Multicast) information. This table is sorted first by VLAN ID, then by group, and then by Port. Different source addresses belong to the same group are treated as single entry.
User’s Manual 4.8.16 MVR (Multicast VLAN Registration) The MVR feature enables multicast traffic forwarding on the Multicast VLANs. ■ In a multicast television application, a PC or a network television or a set-top box can receive the multicast stream. ■ Multiple set-top boxes or PCs can be connected to one subscriber port, which is a switch port configured as an MVR receiver port.
User’s Manual This page provides MVR related configuration. The MVR screen in Figure 4-8-19 appears. Figure 4-8-19: MVR Configuration page Screenshot The page includes the following fields: Object Description • MVR Mode Enable/Disable the Global MVR. The Unregistered Flooding control depends on the current configuration in IGMP/MLD Snooping. It is suggested to enable Unregistered Flooding control when the MVR group table is full. • Delete Check to delete the entry.
User’s Manual given, it should contain at least one alphabet. MVR VLAN name can be edited for the existing MVR VLAN entries or it can be added to the new entries. • IGMP Address Define the IPv4 address as source address used in IP header for IGMP control frames. The default IGMP address is not set (0.0.0.0). When the IGMP address is not set, system uses IPv4 management address of the IP interface associated with this VLAN.
User’s Manual The default Role is Inactive. Enable the fast leave on the port. • Immediate Leave Buttons : Click to add new MVR VLAN. Specify the VID and configure the new entry. Click "Save" : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.8.17 MVR Status This page provides MVR status. The MVR Status screen in Figure 4-8-20 appears.
User’s Manual Auto-refresh : Automatic refresh occurs every 3 seconds. 4.8.18 MVR Groups Information Entries in the MVR Group Table are shown on this page. The MVR Group Table is sorted first by VLAN ID, and then by group. Each page shows up to 99 entries from the MVR Group table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the MVR Group Table.
User’s Manual 4.8.19 MVR SFM Information Entries in the MVR SFM Information Table are shown on this page. The MVR SFM (Source-Filtered Multicast) Information Table also contains the SSM (Source-Specific Multicast) information. This table is sorted first by VLAN ID, then by group, and then by Port. Different source addresses belong to the same group are treated as single entry.
User’s Manual 4.9 Quality of Service 4.9.1 Understanding QoS Quality of Service (QoS) is an advanced traffic prioritization feature that allows you to establish control over network traffic. QoS enables you to assign various grades of network service to different types of traffic, such as multi-media, video, protocol-specific, time critical, and file-backup traffic. QoS reduces bandwidth limitations, delay, loss, and jitter.
User’s Manual 4.9.2 Port Policing This page allows you to configure the Policer settings for all switch ports. The Port Policing screen in Figure 4-9-1 appears. Figure 4-9-1: QoS Ingress Port Policers page Screenshot The page includes the following fields: Object Description • Port The port number for which the configuration below applies. • Enable Controls whether the policer is enabled on this switch port. • Rate Controls the rate for the policer.
User’s Manual 4.9.3 Port Classification This page allows you to configure the basic QoS Ingress Classification settings for all switch ports. The Port Classification screen in Figure 4-9-2 appears. Figure 4-9-2 : QoS Ingress Port Classification page Screenshot The page includes the following fields: Object Description • Port The port number for which the configuration below applies. • CoS Controls the default class of service. All frames are classified to a CoS.
User’s Manual a DPL that is equal to the DEI value in the tag. Otherwise the frame is classified to the default DPL. The classified DPL can be overruled by a QCL entry. All means all ports will have one specific setting. • PCP Controls the default PCP value. All frames are classified to a PCP value. If the port is VLAN aware and the frame is tagged, then the frame is classified to the PCP value in the tag. Otherwise the frame is classified to the default PCP value.
User’s Manual 4.9.4 Port Scheduler This page provides an overview of QoS Egress Port Schedulers for all switch ports. The Port Scheduler screen in Figure 4-9-3 appears. Figure 4-9-3: QoS Egress Port Schedule page Screenshot The page includes the following fields: Object Description • Port The logical port for the settings contained in the same row. Click on the port number in order to configure the schedulers. For more detail, please refer to chapter 4.9.5.1.
User’s Manual 4.9.5 Port Shaping This page provides an overview of QoS Egress Port Shapers for all switch ports. The Port Shaping screen in Figure 4-9-4 appears. Figure 4-9-4: QoS Egress Port Shapers page Screenshot The page includes the following fields: Object Description • Port The logical port for the settings contained in the same row. Click on the port number in order to configure the shapers. For more detail, please refer to chapter 4.9.5.1.
User’s Manual 4.9.5.1 QoS Egress Port Schedule and Shapers The Port Scheduler and Shapers for a specific port are configured on this page. The QoS Egress Port Schedule and Shaper screen in Figure 4-9-5 appears. Figure 4-9-5: QoS Egress Port Schedule and Shapers page Screenshot The page includes the following fields: Object Description • Schedule Mode Controls whether the scheduler mode is "Strict Priority" or "Weighted" on this switch port.
User’s Manual The default value is "kbps". • Queue Shaper Excess Controls whether the queue is allowed to use excess bandwidth. • Queue Scheduler Controls the weight for this queue. Weight This value is restricted to 1-100. This parameter is only shown if "Scheduler Mode" is set to "Weighted". The default value is "17". • Queue Scheduler Percent Shows the weight in percent for this queue. This parameter is only shown if "Scheduler Mode" is set to "Weighted".
User’s Manual 4.9.6 Port Tag Remarking This page provides an overview of QoS Egress Port Tag Remarking for all switch ports. The Port Tag Remarking screen in Figure 4-9-6 appears. Figure 4-9-6: QoS Egress Port Tag Remarking page Screenshot The page includes the following fields: Object Description • Port The logical port for the settings contained in the same row. Click on the port number in order to configure tag remarking. For more detail, please refer to chapter 4.9.6.1.
User’s Manual 4.9.6.1 QoS Egress Port Tag Remarking The QoS Egress Port Tag Remarking for a specific port are configured on this page. The QoS Egress Port Tag Remarking screen in Figure 4-9-7 appears. Figure 4-9-7: QoS Egress Port Tag Remarking page Screenshot The page includes the following fields: Object Description • Mode Controls the tag remarking mode for this port. • PCP/DEI Configuration • (QoS class, DP level) to (PCP, DEI) Mapping ■ Classified: Use classified PCP/DEI values.
User’s Manual 4.9.7 Port DSCP This page allows you to configure the basic QoS Port DSCP Configuration settings for all switch ports. The Port DSCP screen in Figure 4-9-8 appears. Figure 4-9-8: QoS Port DSCP Configuration page Screenshot The page includes the following fields: Object Description • Port The Port column shows the list of ports for which you can configure dscp ingress and egress settings.
User’s Manual • Egress All: Classify all DSCP. The Configuration All with available options will assign to whole ports. Port Egress Rewriting can be one of –. All means all ports will have one specific setting. Disable: No Egress rewrite. Enable: Rewrite enabled without remapping. Remap DP Unaware: DSCP from analyzer is remapped and frame is remarked with remapped DSCP value. The remapped DSCP value is always taken from the 'DSCP Translation->Egress Remap DP0' table.
User’s Manual 4.9.8 DSCP-based QoS This page allows you to configure the basic QoS DSCP-based QoS Ingress Classification settings for all switches. The DSCP-based QoS screen in Figure 4-9-9 appears. Figure 4-9-9: DSCP-based QoS Ingress Classification page Screenshot The page includes the following fields: Object Description • DSCP Maximum number of supported DSCP values are 64. • Trust Controls whether a specific DSCP value is trusted.
User’s Manual 4.9.9 DSCP Translation This page allows you to configure the basic QoS DSCP Translation settings for all switches. DSCP translation can be done in Ingress or Egress. The DSCP Translation screen in Figure 4-9-10 appears. Figure 4-9-10: DSCP Translation page Screenshot The page includes the following fields: Object Description • DSCP Maximum number of supported DSCP values are 64 and valid DSCP value ranges from 0 to 63.
User’s Manual • Classify Click to enable Classification at Ingress side. • Egress There are the following configurable parameters for Egress side – Remap DP0 Controls the remapping for frames with DP level 0. Remap DP1 Controls the remapping for frames with DP level 1. Select the DSCP value from select menu to which you want to remap. DSCP • Remap DP0 value ranges form 0 to 63. Select the DSCP value from select menu to which you want to remap. DSCP • Remap DP1 value ranges form 0 to 63.
User’s Manual The page includes the following fields: Object Description • QoS Class Available QoS Class value ranges from 0 to 7. QoS Class (0-7) can be mapped to followed parameters. • DPL Actual Drop Precedence Level. • DSCP Select DSCP value (0-63) from DSCP menu to map DSCP to corresponding QoS Class and DPL value Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.9.
User’s Manual The default value is 'Any'. • SMAC Displays the OUI field of Source MAC address, i.e. first three octet (byte) of MAC address. • Tag Type Indicates tag type. Possible values are: ■ Any: Match tagged and untagged frames. ■ Untagged: Match untagged frames. ■ Tagged: Match tagged frames. The default value is 'Any' • VID Indicates (VLAN ID), either a specific VID or range of VIDs.
User’s Manual 4.9.11.1 QoS Control Entry Configuration The QCE Configuration screen in Figure 4-9-13 appears. Figure 4-9-13: QCE Configuration page Screenshot The page includes the following fields: Object Description • Port Members Check the checkbox button in case you what to make any port member of the QCL entry.
User’s Manual 4. SNAP 5. IPv4 6. IPv6 Note: all frame types are explained below. • Any Allow all types of frames. • EtherType Ethernet Type Valid ethernet type can have value within 0x600-0xFFFF or 'Any' but excluding 0x800(IPv4) and 0x86DD(IPv6), default value is 'Any'.
User’s Manual EF or AF11-AF43 ■ Sport Source TCP/UDP port:(0-65535) or 'Any', specific or port range applicable for IP protocol UDP/TCP ■ Dport Destination TCP/UDP port:(0-65535) or 'Any', specific or port range applicable for IP protocol UDP/TCP • Action Parameters ■ Class QoS class: (0-7) or 'Default'. ■ DPL Valid Drop Precedence Level can be (0-3) or 'Default'. ■ DSCP Valid DSCP value can be (0-63, BE, CS1-CS7, EF or AF11-AF43) or 'Default'.
User’s Manual The page includes the following fields: Object Description • User Indicates the QCL user. • QCE# Indicates the index of QCE. • Port Indicates the list of ports configured with the QCE. • Frame Type Indicates the type of frame to look for incoming frames. Possible frame types are: ■ Any: The QCE will match all frame types. ■ Ethernet: Only Ethernet frames (with Ether Type 0x600-0xFFFF) are allowed. ■ LLC: Only (LLC) frames are allowed. ■ SNAP: Only (SNAP) frames are allowed.
User’s Manual 4.9.13 Storm Control Configuration Storm control for the switch is configured on this page. There is a unicast storm rate control, multicast storm rate control, and a broadcast storm rate control. These only affect flooded frames, i.e. frames with a (VLAN ID, DMAC) pair not present on the MAC Address table. The configuration indicates the permitted packet rate for unicast, multicast or broadcast traffic across the switch. The Storm Control Configuration screen in Figure 4-9-15 appears.
User’s Manual Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.9.14 QoS Statistics This page provides statistics for the different queues for all switch ports. The QoS Statistics screen in Figure 4-9-17 appears. Figure 4-9-16: Queuing Counters page Screenshot The page includes the following fields: Object Description • Port The logical port for the settings contained in the same row. • Q0 ~ Q7 There are 8 QoS queues per port.
User’s Manual 4.9.15 Voice VLAN Configuration The Voice VLAN feature enables voice traffic forwarding on the Voice VLAN, then the switch can classify and schedule network traffic. It is recommended that there be two VLANs on a port - one for voice, one for data. Before connecting the IP device to the switch, the IP phone should configure the voice VLAN ID correctly. It should be configured through its own GUI. The Voice VLAN Configuration screen in Figure 4-9-18 appears.
User’s Manual The allowed range is 1 to 4095. • Aging Time Indicates the Voice VLAN secure learning age time. The allowed range is 10 to 10000000 seconds. It used when security mode or auto detect mode is enabled. In other cases, it will based hardware age time. The actual age time will be situated in the [age_time; 2 * age_time] interval. • Traffic Class Indicates the Voice VLAN traffic class. All traffic on Voice VLAN will apply this class. • Mode Indicates the Voice VLAN port mode.
User’s Manual 4.9.16 Voice VLAN OUI Table Configure VOICE VLAN OUI table on this page. The maximum entry number is 16. Modifying the OUI table will restart auto detection of OUI process. The Voice VLAN OUI Table screen in Figure 4-9-18 appears. Figure 4-9-18: Voice VLAN OUI Table page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save.
User’s Manual 4.10 Access Control List ACL is an acronym for Access Control List. It is the list table of ACEs, containing access control entries that specify individual users or groups permitted or denied to specific traffic objects, such as a process or a program. Each accessible traffic object contains an identifier to its ACL. The privileges determine whether there are specific traffic object access rights.
User’s Manual frames. ■ ARP: The ACE will match ARP/RARP frames. ■ IPv4: The ACE will match all IPv4 frames. ■ IPv4/ICMP: The ACE will match IPv4 frames with ICMP protocol. ■ IPv4/UDP: The ACE will match IPv4 frames with UDP protocol. ■ IPv4/TCP: The ACE will match IPv4 frames with TCP protocol. ■ IPv4/Other: The ACE will match IPv4 frames, which are not ICMP/UDP/TCP. ■ IPv6: The ACE will match all IPv6 standard frames. Indicates the forwarding action of the ACE.
User’s Manual 4.10.2 Access Control List Configuration This page shows the Access Control List (ACL), which is made up of the ACEs defined on this switch. Each row describes the ACE that is defined. The maximum number of ACEs is 512 on each switch. Click on the lowest plus sign to add a new ACE to the list. The reserved ACEs used for internal protocol, cannot be edited or deleted, the order sequence cannot be changed and the priority is highest.
User’s Manual • Port Redirect Indicates the port redirect operation of the ACE. Frames matching the ACE are redirected to the port number. The allowed values are Disabled or a specific port number. When Disabled is displayed, the port redirect operation is disabled. Specify the mirror operation of this port. Frames matching the ACE are mirrored • Mirror to the destination mirror port. The allowed values are: Enabled: Frames received on the port are mirrored.
User’s Manual 4.10.3 ACE Configuration Configure an ACE (Access Control Entry) on this page. An ACE consists of several parameters. These parameters vary according to the frame type that you select. First select the ingress port for the ACE, and then select the frame type. Different parameter options are displayed depending on the frame type selected. A frame that hits this ACE matches the configuration that is defined here. The ACE Configuration screen in Figure 4-10-3 appears.
User’s Manual ■ Ethernet Type: Only Ethernet Type frames can match this ACE. The IEEE 802.3 describes the value of Length/Type Field specifications to be greater than or equal to 1536 decimal (equal to 0600 hexadecimal). ■ ARP: Only ARP frames can match this ACE. Notice the ARP frames won't match the ACE with Ethernet type. ■ IPv4: Only IPv4 frames can match this ACE. Notice the IPv4 frames won't match the ACE with Ethernet type. ■ IPv6: Only IPv6 frames can match this ACE.
User’s Manual MAC Parameters Object Description • SMAC Filter (Only displayed when the frame type is Ethernet Type or ARP.) Specify the source MAC filter for this ACE. ■ Any: No SMAC filter is specified. (SMAC filter status is "don't-care".) ■ Specific: If you want to filter a specific source MAC address with this ACE, choose this value. A field for entering an SMAC value appears. • SMAC Value When "Specific" is selected for the SMAC filter, you can enter a specific source MAC address.
User’s Manual • Tag Priority Specify the tag priority for this ACE. A frame that hits this ACE matches this tag priority. The allowed number range is 0 to 7. The value Any means that no tag priority is specified (tag priority is "don't-care".) ARP Parameters The ARP parameters can be configured when Frame Type "ARP" is selected. Object Description • ARP/RARP Specify the available ARP/RARP opcode (OP) flag for this ACE. • Request/Reply • Sender IP Filter ■ Any: No ARP/RARP OP flag is specified.
User’s Manual • ARP Sender MAC Match • RARP Target MAC Match • IP/Ethernet Length Specify whether frames can hit the action according to their sender hardware address field (SHA) settings. ■ 0: ARP frames where SHA is not equal to the SMAC address. ■ 1: ARP frames where SHA is equal to the SMAC address. ■ Any: Any value is allowed ("don't-care"). Specify whether frames can hit the action according to their target hardware address field (THA) settings.
User’s Manual defining UDP parameters will appear. These fields are explained later in this help file. ■ TCP: Select TCP to filter IPv4 TCP protocol frames. Extra fields for defining TCP parameters will appear. These fields are explained later in this help file. • IP Protocol Value When "Specific" is selected for the IP protocol value, you can enter a specific value. The allowed range is 0 to 255. A frame that hits this ACE matches this IP protocol value.
User’s Manual ■ Any: No destination IP filter is specified. (Destination IP filter is "don't-care".) ■ Host: Destination IP filter is set to Host. Specify the destination IP address in the DIP Address field that appears. ■ Network: Destination IP filter is set to Network. Specify the destination IP address and destination IP mask in the DIP Address and DIP Mask fields that appear.
User’s Manual usage of bitmask, if the binary bit value is "0", it means this bit is "don't-care". The real matched pattern is [sipv6_address & sipv6_bitmask] (last 32 bits). For example, if the SIPv6 address is 2001::3 and the SIPv6 bitmask is 0xFFFFFFFE(bit 0 is "don't-care" bit), then SIPv6 address 2001::2 and 2001::3 are applied to this rule. • Hop Limit Specify the hop limit settings for this ACE. ■ zero: IPv6 frames with a hop limit field greater than zero must not be able to match this entry.
User’s Manual ■ Any: No TCP/UDP source filter is specified (TCP/UDP source filter status is "don't-care"). ■ Specific: If you want to filter a specific TCP/UDP source filter with this ACE, you can enter a specific TCP/UDP source value. A field for entering a TCP/UDP source value appears. ■ Range: If you want to filter a specific TCP/UDP source range filter with this ACE, you can enter a specific TCP/UDP source range value. A field for entering a TCP/UDP source value appears. • TCP/UDP Source No.
User’s Manual • TCP RST Specify the TCP "Reset the connection" (RST) value for this ACE. ■ 0: TCP frames where the RST field is set must not be able to match this entry. • TCP PSH ■ 1: TCP frames where the RST field is set must be able to match this entry. ■ Any: Any value is allowed ("don't-care"). Specify the TCP "Push Function" (PSH) value for this ACE. ■ 0: TCP frames where the PSH field is set must not be able to match this entry.
User’s Manual 4.10.4 ACL Ports Configuration Configure the ACL parameters (ACE) of each switch port. These parameters will affect frames received on a port unless the frame matches a specific ACE. The ACL Ports Configuration screen in Figure 4-10-4 appears. Figure 4-10-4: ACL Ports Configuration page Screenshot The page includes the following fields: Object Description • Port The logical port for the settings contained in the same row. • Policy ID Select the policy to apply to this port.
User’s Manual • Logging Specify the logging operation of this port. The allowed values are: ■ Enabled: Frames received on the port are stored in the System Log. ■ Disabled: Frames received on the port are not logged. The default value is "Disabled". Note: The logging feature only works when the packet length is less than 1518 (without VLAN tags) and the System Log memory size and logging rate is limited. • Shutdown Specify the port shut down operation of this port.
User’s Manual 4.10.5 ACL Rate Limiter Configuration Configure the rate limiter for the ACL of the switch. The ACL Rate Limiter Configuration screen in Figure 4-10-5 appears. Figure 4-10-5: ACL Rate Limiter Configuration page Screenshot The page includes the following fields: Object Description • Rate Limiter ID The rate limiter ID for the settings contained in the same row. • Rate (pps) The allowed values are: 0-3276700 in pps or 0, 100, 200, 300, ..., 1000000 in kbps.
User’s Manual 4.11 Authentication This section is to control the access of the Industrial Managed Switch, including the user access and management control. The Authentication section contains links to the following main topics: IEEE 802.1X Port-based Network Access Control MAC-based Authentication User Authentication Overview of 802.1X (Port-Based) Authentication In the 802.
User’s Manual The advantage of MAC-based authentication over 802.1X is that several clients can be connected to the same port (e.g. through a 3rd party switch or a hub) and still require individual authentication, and that the clients don't need special supplicant software to authenticate. The disadvantage is that MAC addresses can be spoofed by malicious users, equipment whose MAC address is a valid RADIUS user can be used by anyone, and only the MD5-Challenge method is supported. The 802.
User’s Manual Device Roles With 802.1X port-based authentication, the devices in the network have specific roles as shown below. Figure 4-11-1 Client—the device (workstation) that requests access to the LAN and switch services and responds to requests from the switch. The workstation must be running 802.1X-compliant client software such as that offered in the Microsoft Windows XP operating system. (The client is the supplicant in the IEEE 802.1X specification.
User’s Manual Switch (802.1X device)—controls the physical access to the network based on the authentication status of the client. The switch acts as an intermediary (proxy) between the client and the authentication server, requesting identity information from the client, verifying that information with the authentication server, and relaying a response to the client.
User’s Manual The specific exchange of EAP frames depends on the authentication method being used. “Figure 4-11-2” shows a message exchange initiated by the client using the One-Time-Password (OTP) authentication method with a RADIUS server. Figure 4-11-2: EAP Message Exchange Ports in Authorized and Unauthorized States The switch port state determines whether or not the client is granted access to the network. The port starts in the unauthorized state.
User’s Manual 4.11.2 Authentication Configuration This page allows you to configure how a user is authenticated when he logs into the switch via one of the management client interfaces. The Authentication Method Configuration screen in Figure 4-11-3 appears.
User’s Manual The page includes the following fields: Object Description • Client The management client for which the configuration below applies. • Authentication Method Authentication Method can be set to one of the following values: ■ None: authentication is disabled and login is not possible. ■ Local: use the local user database on the switch stack for authentication. ■ RADIUS: use a remote RADIUS server for authentication. ■ TACACS+: use a remote TACACS+ server for authentication.
User’s Manual Figure 4-11-4: Network Access Server Configuration page Screenshot The page includes the following fields: System Configuration Object Description • Mode Indicates if NAS is globally enabled or disabled on the switch. If globally disabled, all ports are allowed forwarding of frames. • Reauthentication Enabled If checked, successfully authenticated supplicants/clients are reauthenticated after the interval specified by the Reauthentication Period. Reauthentication for 802.
User’s Manual • Reauthentication Period Determines the period, in seconds, after which a connected client must be reauthenticated. This is only active if the Reauthentication Enabled checkbox is checked. Valid values are in the range 1 to 3600 seconds. • EAPOL Timeout Determines the time for retransmission of Request Identity EAPOL frames. Valid values are in the range 1 to 65535 seconds. This has no effect for MAC-based ports. • Aging Period This setting applies to the following modes, i.e.
User’s Manual • RADIUS-Assigned QoS Enabled RADIUS-assigned QoS provides a means to centrally control the traffic class to which traffic coming from a successfully authenticated supplicant is assigned on the switch. The RADIUS server must be configured to transmit special RADIUS attributes to take advantage of this feature. The "RADIUS-Assigned QoS Enabled" checkbox provides a quick way to globally enable/disable RADIUS-server assigned QoS Class functionality.
User’s Manual • Allow Guest VLAN if EAPOL Seen The switch remembers if an EAPOL frame has been received on the port for the life-time of the port. Once the switch considers whether to enter the Guest VLAN, it will first check if this option is enabled or disabled. If disabled (unchecked; default), the switch will only enter the Guest VLAN if an EAPOL frame has not been received on the port for the life-time of the port.
User’s Manual MD5-Challenge, PEAP, and TLS. The important thing is that the authenticator (the switch) doesn't need to know which authentication method the supplicant and the authentication server are using, or how many information exchange frames are needed for a particular method. The switch simply encapsulates the EAP part of the frame into the relevant type (EAPOL or RADIUS) and forwards it.
User’s Manual successfully authenticated. Multi 802.1X Multi 802.1X is - like Single 802.1X - not an IEEE standard, but a variant that features many of the same characteristics. In Multi 802.1X, one or more supplicants can get authenticated on the same port at the same time. Each supplicant is authenticated individually and secured in the MAC table using the Port Security module. In Multi 802.
User’s Manual several clients can be connected to the same port (e.g. through a 3rd party switch or a hub) and still require individual authentication, and that the clients don't need special supplicant software to authenticate. The advantage of MAC-based authentication over 802.1X-based authentication is that the clients don't need special supplicant software to authenticate.
User’s Manual arriving on the port will be classified and switched on the RADIUS-assigned VLAN ID. If (re-)authentication fails or the RADIUS Access-Accept packet no longer carries a VLAN ID or it's invalid, or the supplicant is otherwise no longer present on the port, the port's VLAN ID is immediately reverted to the original VLAN ID (which may be changed by the administrator in the meanwhile without affecting the RADIUS-assigned). This option is only available for single-client modes, i.e.
User’s Manual Membership and VLAN Port" pages. These pages show which modules have (temporarily) overridden the current Port VLAN configuration. Guest VLAN Operation: When a Guest VLAN enabled port's link comes up, the switch starts transmitting EAPOL Request Identity frames. If the number of transmissions of such frames exceeds Max. Reauth. Count and no EAPOL frames have been received in the meanwhile, the switch considers entering the Guest VLAN.
User’s Manual ■ Reauthenticate: Schedules a reauthentication to whenever the quiet-period of the port runs out (EAPOL-based authentication). For MAC-based authentication, reauthentication will be attempted immediately. The button only has effect for successfully authenticated clients on the port and will not cause the clients to get temporarily unauthorized. ■ Reinitialize: Forces a reinitialization of the clients on the port and thereby a reauthentication immediately.
User’s Manual 4.11.4 Network Access Overview This page provides an overview of the current NAS port states for the selected switch. The Network Access Overview screen in Figure 4-11-5 appears. Figure 4-11-5: Network Access Server Switch Status page Screenshot The page includes the following fields: Object Description • Port The switch port number. Click to navigate to detailed NAS statistics for this port. • Admin State The port's current administrative state.
User’s Manual Buttons : Click to refresh the page immediately. Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. 4.11.5 Network Access Statistics This page provides detailed NAS statistics for a specific switch port running EAPOL-based IEEE 802.1X authentication. For MAC-based ports, it shows selected backend server (RADIUS Authentication Server) statistics, only. Use the port select box to select which port details to be displayed.
User’s Manual Port Counters Object Description • EAPOL Counters These supplicant frame counters are available for the following administrative states: ■ Force Authorized ■ Force Unauthorized ■ Port-based 802.1X ■ Single 802.1X ■ Multi 802.1X Direction Name IEEE Name Description Rx Total dot1xAuthEapolFrames The number of valid EAPOL Rx frames of any type that have been received by the switch.
User’s Manual which the Packet Body Length field is invalid. Tx Total dot1xAuthEapolFrames The number of EAPOL Tx frames of any type that have been transmitted by the switch. Tx Request ID dot1xAuthEapolReqIdFr The number of EAPOL amesTx Request Identity frames that have been transmitted by the switch. Tx Requests dot1xAuthEapolReqFra The number of valid EAPOL mesTx Request frames (other than Request Identity frames) that have been transmitted by the switch.
User’s Manual Rx Other dot1xAuthBackendOther 802.1X-based: Requests RequestsToSupplicant Counts the number of times that the switch sends an EAP Request packet following the first to the supplicant. Indicates that the backend server chose an EAP-method. MAC-based: Not applicable. Rx Auth. dot1xAuthBackendAuth 802.1X- and MAC-based: Successes Successes Counts the number of times that the switch receives a success indication.
User’s Manual for a given port (left-most table) or client (right-most table). Possible retransmissions are not counted. • Last Supplicant/Client Info Information about the last supplicant/client that attempted to authenticate. This information is available for the following administrative states: ■ Port-based 802.1X ■ Single 802.1X ■ Multi 802.1X ■ MAC-based Auth. Name IEEE Name Description MAC dot1xAuthLastEapolF The MAC address of the last supplicant/client.
User’s Manual Attached MAC Address Object Description • Identity Shows the identity of the supplicant, as received in the Response Identity EAPOL frame. Clicking the link causes the supplicant's EAPOL and Backend Server counters to be shown in the Selected Counters table. If no supplicants are attached, it shows No supplicants attached. This column is not available for MAC-based Auth. • MAC Address For Multi 802.1X, this column holds the MAC address of the attached supplicant. For MAC-based Auth.
User’s Manual : This button is available in the following modes: • Multi 802.1X • MAC-based Auth.X Click to clear both the port counters and all of the attached client's counters. The "Last Client" will not be cleared, however. : This button is available in the following modes: • Multi 802.1X • MAC-based Auth.X Click to clear only the currently selected client's counters.
User’s Manual 4.11.6 RADIUS This page allows you to configure the RADIUS Servers. The RADIUS Configuration screen in Figure 4-11-7 appears. Figure 4-11-7: RADIUS Server Configuration page Screenshot The page includes the following fields: Global Configuration These setting are common for all of the RADIUS Servers. Object Description • Timeout Timeout is the number of seconds, in the range 1 to 1000, to wait for a reply from a RADIUS server before retransmitting the request.
User’s Manual The secret key - up to 63 characters long - shared between the RADIUS server • Key and the switch. The IPv4 address to be used as attribute 4 in RADIUS Access-Request packets. • NAS-IP-Address If this field is left blank, the IP address of the outgoing interface is used. • NAS-IPv6-Address The IPv6 address to be used as attribute 95 in RADIUS Access-Request packets. If this field is left blank, the IP address of the outgoing interface is used.
User’s Manual 4.11.7 TACACS+ This page allows you to configure the TACACS+ Servers. The TACACS+ Configuration screen in Figure 4-11-8 appears. Figure 4-11-8: TACACS+ Server Configuration page Screenshot The page includes the following fields: Global Configuration These setting are common for all of the TACACS+ Servers. Object Description • Timeout Timeout is the number of seconds, in the range 1 to 1000, to wait for a reply from a TACACS+ server before it is considered to be dead.
User’s Manual Server Configuration The table has one row for each TACACS+ server and a number of columns, which are: Object Description • Delete To delete a TACACS+ server entry, check this box. The entry will be deleted during the next Save. • Hostname The IP address or hostname of the TACACS+ server. • Port The TCP port to use on the TACACS+ server for authentication. • Timeout This optional setting overrides the global timeout value. Leaving it blank will use the global timeout value.
User’s Manual The page includes the following fields: RADIUS Authentication Server Status Overview Object Description • # The RADIUS server number. Click to navigate to detailed statistics for this server. • IP Address The IP address and UDP port number (in : notation) of this server. • Status The current state of the server. This field takes one of the following values: Disabled: The server is disabled.
User’s Manual 4.11.9 RADIUS Details This page provides detailed statistics for a particular RADIUS server. The RADIUS Authentication/Accounting for Server Overview screen in Figure 4-11-10 appears. Figure 4-11-10: RADIUS Authentication/Accounting for Server Overview page Screenshot The page includes the following fields: RADIUS Authentication Statistics The statistics map closely to those specified in RFC4668 - RADIUS Authentication Client MIB.
User’s Manual Rx Access radiusAuthClientExtA The number of RADIUS Accepts ccessAccepts Access-Accept packets (valid or invalid) received from the server. Rx Access Rejects radiusAuthClientExtA The number of RADIUS ccessRejects Access-Reject packets (valid or invalid) received from the server. Rx Access radiusAuthClientExtA The number of RADIUS Challenges ccessChallenges Access-Challenge packets (valid or invalid) received from the server.
User’s Manual authentication port and dropped for some other reason. Tx Access radiusAuthClientExtA The number of RADIUS Requests ccessRequests Access-Request packets sent to the server. This does not include retransmissions. Tx Access radiusAuthClientExtA The number of RADIUS Retransmissio ccessRetransmission Access-Request packets ns s retransmitted to the RADIUS authentication server.
User’s Manual in question. State - Shows the state of the server. It takes one of the following values: Disabled: The selected server is disabled. Not Ready: The server is enabled, but IP communication is not yet up and running. Ready: The server is enabled, IP communication is up and running, and the RADIUS module is ready to accept access attempts. Dead (X seconds left): Access attempts were made to this server, but it did not reply within the configured timeout.
User’s Manual Rx Malformed radiusAccClientExt The number of malformed Responses MalformedRespons RADIUS packets received es from the server. Malformed packets include packets with an invalid length. Bad authenticators or unknown types are not included as malformed access responses. Rx Bad radiusAcctClientExt The number of RADIUS Authenticators BadAuthenticators packets containing invalid authenticators received from the server.
User’s Manual retransmission. Tx Timeouts radiusAccClientExt The number of accounting Timeouts timeouts to the server. After a timeout, the client may retry to the same server, send to a different server, or give up. A retry to the same server is counted as a retransmit as well as a timeout. A send to a different server is counted as a Request as well as a timeout. • Other Info This section contains information about the state of the server and the latest round-trip time.
User’s Manual The granularity of this measurement is 100 ms. A value of 0 ms indicates that there hasn't been round-trip communication with the server yet. Buttons Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the page immediately. : Clears the counters for the selected server. The "Pending Requests" counter will not be cleared by this operation. 4.11.
User’s Manual 2. Add New RADIUS Client on the Windows 2003 server Figure 4-11-12: Windows Server – Add New RADIUS Client Setting 3.
User’s Manual 4. The shared secret key should be the same as the key configured on the Industrial Managed Switch. Figure 4-11-14: Windows Server RADIUS Server Setting 5. Configure ports attribute of 802.1X the same as “802.1X Port Configuration”. Figure 4-11-15: 802.
User’s Manual 6. Create user data. The establishment of the user data needs to be created on the Radius Server PC.
User’s Manual 7.
User’s Manual Set the Port Authenticate Status to “Force Authorized” if the port is connected to the RADIUS server or the port is an uplink port that is connected to another switch. Or once the 802.1X starts to work, the switch might not be able to access the RADIUS server. 4.11.11 802.1X Client Configuration Windows XP is originally 802.1X support. As to other operating systems (windows 98SE, ME, 2000), an 802.1X client utility is needed. The following procedures show how to configure 802.
User’s Manual 6. Select “MD-5 Challenge” from the drop-down list box for EAP type. Figure 4-11-20 7. Click “OK”. 8. When client has associated with the Industrial Managed Switch, a user authentication notice appears in system tray. Click on the notice to continue.
User’s Manual Figure 4-11-21: Windows Client Popup Login Request Message 9. Enter the user name, password and the logon domain that your account belongs. 10. Click “OK” to complete the validation process.
User’s Manual 4.12 Security This section is to control the access of the Industrial Managed Switch, includes the user access and management control. The Security page contains links to the following main topics: Port Limit Control Access Management HTTPs / SSH DHCP Snooping IP Source Guard ARP Inspection 4.12.1 Port Limit Control This page allows you to configure the Port Security Limit Control system and port settings.
User’s Manual The page includes the following fields: System Configuration Object Description • Mode Indicates if Limit Control is globally enabled or disabled on the switch stack. If globally disabled, other modules may still use the underlying functionality, but limit checks and corresponding actions are disabled. • Aging Enabled If checked, secured MAC addresses are subject to aging as discussed under Aging Period.
User’s Manual • Limit The maximum number of MAC addresses that can be secured on this port. This number cannot exceed 1024. If the limit is exceeded, the corresponding action is taken. The switch is "born" with a total number of MAC addresses from which all ports draw whenever a new MAC address is seen on a Port Security-enabled port. Since all ports draw from the same pool, it may happen that a configured maximum cannot be granted, if the remaining ports have already used all available MAC addresses.
User’s Manual • Re-open Button If a port is shutdown by this module, you may reopen it by clicking this button, which will only be enabled if this is the case. For other methods, refer to Shutdown in the Action section. Note, that clicking the reopen button causes the page to be refreshed, so non-committed changes will be lost. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. : Click to refresh the page.
User’s Manual • Start IP address Indicates the start IP address for the access management entry. • End IP address Indicates the end IP address for the access management entry. • HTTP/HTTPS Indicates the host can access the switch from HTTP/HTTPS interface that the host IP address matched the entry. Indicates the host can access the switch from SNMP interface that the host IP • SNMP address matched the entry.
User’s Manual Buttons Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the page immediately. : Clears all statistics. 4.12.4 HTTPs Configure HTTPS on this page. The HTTPS Configuration screen in Figure 4-12-4 appears. Figure 4-12-4: HTTPS Configuration Screen page Screenshot The page includes the following fields: Object Description • Mode Indicates the HTTPS mode operation.
User’s Manual Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.12.5 SSH Configure SSH on this page. This page shows the Port Security status. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning.
User’s Manual 4.12.6 Port Security Status This page shows the Port Security status. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning. In this mode, frames from unknown MAC addresses are passed on to the port security module, which in turn asks all user modules whether to allow this new MAC address to forward or block it.
User’s Manual Port Status The table has one row for each port on the selected switch in the switch and a number of columns, which are: Object Description • Port The port number for which the status applies. Click the port number to see the status for this particular port. Each of the user modules has a column that shows whether that module has • Users enabled Port Security or not.
User’s Manual 4.12.7 Port Security Detail This page shows the MAC addresses secured by the Port Security module. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning.
User’s Manual 4.12.8 DHCP Snooping DHCP Snooping is used to block intruder on the untrusted ports of DUT when it tries to intervene by injecting a bogus DHCP reply packet to a legitimate conversation between the DHCP client and server. Configure DHCP Snooping on this page. The DHCP Snooping Configuration screen in Figure 4-12-8 appears.
User’s Manual Figure 4-12-8: DHCP Snooping Configuration Screen page Screenshot The page includes the following fields: Object Description • Snooping Mode Indicates the DHCP snooping mode operation. Possible modes are: Enabled: Enable DHCP snooping mode operation. When enable DHCP snooping mode operation, the request DHCP messages will be forwarded to trusted ports and only allowed reply packets from trusted ports. Disabled: Disable DHCP snooping mode operation.
User’s Manual 4.12.9 Snooping Table This page display the dynamic IP assigned information after DHCP Snooping mode is disabled. All DHCP clients obtained the dynamic IP address from the DHCP server will be listed in this table except for local VLAN interface IP addresses. Entries in the Dynamic DHCP snooping Table are shown on this page. The Dynamic DHCP Snooping Table screen in Figure 4-12-9 appears.
User’s Manual Figure 4-12-10: IP Source Guard Configuration Screen page Screenshot The page includes the following fields: Object Description • Mode of IP Source Enable the Global IP Source Guard or disable the Global IP Source Guard. All Guard Configuration configured ACEs will be lost when the mode is enabled. Specify IP Source Guard is enabled on which ports.
User’s Manual 4.12.11 IP Source Guard Static Table This page provides Static IP Source Guard Table. The Static IP Source Guard Table screen in Figure 4-12-11 appears. Figure 4-12-11: Static IP Source Guard Table Screen page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • Port The logical port for the settings. • VLAN ID The VLAN ID for the settings. • IP Address Allowed Source IP address.
User’s Manual 4.12.12 Dynamic IP Source Guard Table Entries in the Dynamic IP Source Guard Table are shown on this page. The Dynamic IP Source Guard Table is sorted first by port, then by VLAN ID, then by IP address, and then by IP mask. The Dynamic IP Source Guard Table screen in Figure 4-12-12 appears.
User’s Manual 4.12.13 ARP Inspection ARP Inspection is a secure feature. Several types of attacks can be launched against a host or devices connected to Layer 2 networks by "poisoning" the ARP caches. This feature is used to block such attacks. Only valid ARP requests and responses can go through DUT. This page provides ARP Inspection related configuration. The ARP Inspection Configuration screen in Figure 4-12-13 appears.
User’s Manual to the port setting. And the setting of "Check VLAN" is enabled, the log type of ARP Inspection will refer to the VLAN setting. Possible setting of "Check VLAN" are: Enabled: Enable check VLAN operation. Disabled: Disable check VLAN operation. Only the Global Mode and Port Mode on a given port are enabled, and the setting of "Check VLAN" is disabled, the log type of ARP Inspection will refer to the port setting. There are four log types and possible types are: None: Log nothing.
User’s Manual The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • Port The logical port for the settings. • VLAN ID The VLAN ID for the settings. • MAC Address Allowed Source MAC address in ARP request packets. • IP Address Allowed Source IP address in ARP request packets. Buttons : Click to add a new entry to the Static ARP Inspection table.
User’s Manual The “>>” will use the last entry of the currently displayed as a basis for the next lookup. When the end is reached the text "No more entries" is shown in the displayed table. Use the “|<<” button to start over. The page includes the following fields: Object Description • Port The port number for which the status applies. Click the port number to see the status for this particular port. • VLAN ID The VLAN ID of the entry. • MAC Address The MAC address of the entry.
User’s Manual 4.13 MAC Address Table Switching of frames is based upon the DMAC address contained in the frame. The Industrial Managed Switch builds up a table that maps MAC addresses to switch ports for knowing which ports the frames should go to (based upon the DMAC address in the frame ). This table contains both static and dynamic entries. The static entries are configured by the network administrator if the administrator wants to do a fixed mapping between the DMAC address and switch ports.
User’s Manual The page includes the following fields: Aging Configuration By default, dynamic entries are removed from the MAC table after 300 seconds. This removal is also called aging. Object Description • Disable Automatic Enables/disables the automatic aging of dynamic entries Aging • Aging Time The time after which a learned entry is discarded. By default, dynamic entries are removed from the MAC after 300 seconds. This removal is also called aging.
User’s Manual Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.13.2 MAC Address Table Status Dynamic MAC Table Entries in the MAC Table are shown on this page. The MAC Table contains up to 8192 entries, and is sorted first by VLAN ID, then by MAC address. The MAC Address Table screen in Figure 4-13-2 appears.
User’s Manual The page includes the following fields: Object Description • Type Indicates whether the entry is a static or dynamic entry. • VLAN The VLAN ID of the entry. • MAC Address The MAC address of the entry. • Port Members The ports that are members of the entry. Buttons Auto-refresh : Automatic refresh occurs every 3 seconds. : Refreshes the displayed table starting from the "Start from MAC address" and "VLAN" input fields. : Flushes all dynamic entries.
User’s Manual 4.14 LLDP 4.14.1 Link Layer Discovery Protocol Link Layer Discovery Protocol (LLDP) is used to discover basic information about neighboring devices on the local broadcast domain. LLDP is a Layer 2 protocol that uses periodic broadcasts to advertise information about the sending device. Advertised information is represented in Type Length Value (TLV) format according to the IEEE 802.1ab standard, and can include details such as device identification, capabilities and configuration settings.
User’s Manual The page includes the following fields: LLDP Parameters Object Description • Tx Interval The switch is periodically transmitting LLDP frames to its neighbors for having the network discovery information up-to-date. The interval between each LLDP frame is determined by the Tx Interval value. Valid values are restricted to 5 32768 seconds.
User’s Manual Tx only The switch will drop LLDP information received from neighbors, but will send out LLDP information. Disabled The switch will not send out LLDP information, and will drop LLDP information received from neighbors. Enabled The switch will send out LLDP information, and will analyze LLDP information received from neighbors. • CDP Aware Select CDP awareness. The CDP operation is restricted to decoding incoming CDP frames (The switch doesn't transmit CDP frames).
User’s Manual Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.14.3 LLDP MED Configuration This page allows you to configure the LLDP-MED. The LLDPMED Configuration screen in Figure 4-14-2 appears.
User’s Manual With this in mind LLDP-MED defines an LLDP-MED Fast Start interaction between the protocol and the application layers on top of the protocol, in order to achieve these related properties. Initially, a Network Connectivity Device will only transmit LLDP TLVs in an LLDPDU. Only after an LLDP-MED Endpoint Device is detected, will an LLDP-MED capable Network Connectivity Device start to advertise LLDP-MED TLVs in outgoing LLDPDUs on the associated port.
User’s Manual different floor-to-floor dimensions. An altitude = 0.0 is meaningful even outside a building, and represents ground level at the given latitude and longitude. Inside a building, 0.0 represents the floor level associated with ground level at the main entrance. • Map Datum The Map Datum used for the coordinates given in this Option WGS84: (Geographical 3D) - World Geodesic System 1984, CRS Code 4327, Prime Meridian Name: Greenwich.
User’s Manual • Landmark Landmark or vanity address - Example: Columbia University • Additional location Additional location info - Example: South Wing info • Name Name (residence and office occupant) - Example: Flemming Jahn • Zip code Postal/zip code - Example: 2791 • Building Building (structure) - Example: Low Library • Apartment Unit (Apartment, suite) - Example: Apt 42 • Floor Floor - Example: 4 • Room no.
User’s Manual The network policy attributes advertised are: 1. Layer 2 VLAN ID (IEEE 802.1Q-2003) 2. Layer 2 priority value (IEEE 802.1D-2004) 3. Layer 3 Diffserv code point (DSCP) value (IETF RFC 2474) This network policy is potentially advertised and associated with multiple sets of application types supported on a given port. The application types specifically addressed are: 1. Voice 2. Guest Voice 3. Softphone Voice 4. Video Conferencing 5. Streaming Video 6.
User’s Manual Guest Voice Signaling (conditional) - for use in network topologies that require a different policy for the guest voice signaling than for the guest voice media. This application type should not be advertised if all the same network policies apply as those advertised in the Guest Voice application policy. Softphone Voice - for use by softphone applications on typical data centric devices, such as PCs or laptops.
User’s Manual Priority may specify one of eight priority levels (0 through 7), as defined by IEEE 802.1D-2004. A value of 0 represents use of the default priority as defined in IEEE 802.1D-2004. • DSCP DSCP value to be used to provide Diffserv node behavior for the specified application type as defined in IETF RFC 2474. DSCP may contain one of 64 code point values (0 through 63). A value of 0 represents use of the default DSCP value as defined in RFC 2475. • Adding a new policy to add a new policy.
User’s Manual 4.14.4 LLDP-MED Neighbor This page provides a status overview for all LLDP-MED neighbors. The displayed table contains a row for each port on which an LLDP neighbor is detected. The LLDP-MED Neighbor Information screen in Figure 4-14-3 appears. The columns hold the following information: Figure 4-14-3: LLDP-MED Neighbor Information page Screenshot The page includes the following fields: Fast start repeat count Object Description • Port The port on which the LLDP frame was received.
User’s Manual LLDP-MED Endpoint Device claiming compliance as a Media Endpoint (Class II) also support all aspects of TIA-1057 applicable to Generic Endpoints (Class I), and any LLDP-MED Endpoint Device claiming compliance as a Communication Device (Class III) will also support all aspects of TIA-1057 applicable to both Media Endpoints (Class II) and Generic Endpoints (Class I).
User’s Manual 3. Location Identification 4. Extended Power via MDI - PSE 5. Extended Power via MDI - PD 6. Inventory 7. Reserved • Application Type Application Type indicating the primary function of the application(s) defined for this network policy, advertised by an Endpoint or Network Connectivity Device. The possible application types are shown below. Voice - for use by dedicated IP Telephony handsets and other similar appliances supporting interactive voice services.
User’s Manual Tagged: The device is using the IEEE 802.1Q tagged frame format VLAN ID is the VLAN identifier (VID) for the port as defined in IEEE • VLAN ID 802.1Q-2003. A value of 1 through 4094 is used to define a valid VLAN ID. A value of 0 (Priority Tagged) is used if the device is using priority tagged frames as defined by IEEE 802.1Q-2003, meaning that only the IEEE 802.1D priority level is significant and the default PVID of the ingress port is used instead.
User’s Manual 4.14.5 Neighbor This page provides a status overview for all LLDP neighbors. The displayed table contains a row for each port on which an LLDP neighbor is detected. The LLDP Neighbor Information screen in Figure 4-14-4 appears. Figure 4-14-4: LLDP Neighbor Information page Screenshot The page includes the following fields: Object Description • Local Port The port on which the LLDP frame was received. • Chassis ID The Chassis ID is the identification of the neighbor's LLDP frames.
User’s Manual Buttons : Click to refresh the page immediately. Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. 4.14.6 Port Statistics This page provides an overview of all LLDP traffic. Two types of counters are shown. Global counters are counters that refer to the whole stack, switch, while local counters refers to counters for the currently selected switch. The LLDP Statistics screen in Figure 4-14-5 appears.
User’s Manual • Total Neighbors Shows the number of entries deleted due to Time-To-Live expiring. Entries Aged Out LLDP Statistics Local Counters The displayed table contains a row for each port. The columns hold the following information: Object Description • Local Port The port on which LLDP frames are received or transmitted. • Tx Frames The number of LLDP frames transmitted on the port. • Rx Frames The number of LLDP frames received on the port.
User’s Manual 4.15 Network Diagnostics This section provide the Physical layer and IP layer network diagnostics tools for troubleshoot. The diagnostic tools are designed for network manager to help them quickly diagnose problems between point to point and better service customers. Use the Diagnostics menu items to display and configure basic administrative details of the Industrial Managed Switch.
User’s Manual 4.15.1 Ping This page allows you to issue ICMP PING packets to troubleshoot IP connectivity issues. After you press “Start”, 5 ICMP packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply. The page refreshes automatically until responses to all packets are received, or until a timeout occurs. The ICMP Ping screen in Figure 4-15-1 appears.
User’s Manual 4.15.2 IPv6 Ping This page allows you to issue ICMPv6 ping packets to troubleshoot IPv6 connectivity issues. After you press “Start”, 5 ICMPv6 packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply. The page refreshes automatically until responses to all packets are received, or until a timeout occurs. The ICMPv6 Ping screen in Figure 4-15-2 appears.
User’s Manual 4.15.3 Remote IP Ping Test This page allows you to issue ICMP ping packets to troubleshoot IP connectivity issues on special port. After you press “Test”, 5 ICMP packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply. The page refreshes automatically until responses to all packets are received, or until a timeout occurs. The ICMP Ping screen in Figure 4-15-3 appears.
User’s Manual 4.15.4 Cable Diagnostics This page is used for running the Cable Diagnostics. Press to run the diagnostics. This will take approximately 5 seconds. If all ports are selected, this can take approximately 15 seconds. When completed, the page refreshes automatically, and you can view the cable diagnostics results in the cable status table. Note that Cable Diagnostics is only accurate for cables of length 7 - 140 meters. 10 and 100 Mbps ports will be linked down while running cable diagnostic.
User’s Manual Cross A - Abnormal cross-pair coupling with pair A Cross B - Abnormal cross-pair coupling with pair B Cross C - Abnormal cross-pair coupling with pair C Cross D - Abnormal cross-pair coupling with pair D Length: The length (in meters) of the cable pair. The resolution is 3 meters Buttons : Click to run the diagnostics.
User’s Manual 4.16 Power over Ethernet (IGS-10020PT/10020HPT/20160HPT) Providing up to 8/16 PoE, in-line power interfaces, the IGS-10020PT/10020HPT/20160HPT PoE Switch can easily build a power central-controlled IP phone system, IP Camera system, AP group for the enterprise. For instance, 8/16 cameras/APs can be easily installed around the corners of the company for surveillance demands or a wireless roaming environment in the office can be built.
User’s Manual PoE Splitter PoE Splitter split the PoE 56V DC over the Ethernet cable into 5/12V DC power output. It frees the device deployment from restrictions due to power 3~12 watts outlet locations, which eliminate the costs for additional AC wiring and reduces the installation time. High Power PoE Splitter High PoE Splitter split the PoE 56V DC over the Ethernet cable into 24/12V DC power output.
User’s Manual Class Usage Range of maximum power used by the PD Class Description 0 Default 0.44 to 12.95 watts Classification unimplement 1 Optional 0.44 to 3.84 watts Very low power 2 Optional 3.84 to 6.49 watts Low power 3 Optional 6.49 to 12.95 watts (or to 15.4 watts) Mid power 4 Optional 12.95 to 25.50 watts (or to 30.8 watts) High power Allocation mode In this mode the user allocates the amount of power that each port may reserve.
User’s Manual The page includes the following fields: Object Description • System PoE Admin Allows user to enable or disable PoE function. It will causes all of PoE ports to supply or not supply power. Mode Allows user to enable or disable PoE Temperature Protection. • PoE Temperature Protection There are Six modes for configuring how the ports/PDs may reserve power and • PoE Management when to shut down ports.
User’s Manual The wire gauge for the terminal block should be in the range of 12 ~ 22 AWG@25 degrees C. PD Classifications A PD may be classified by the PSE based on the classification information provided by the PD. The intent of PD classification is to provide information about the maximum power required by the PD during operation. However, to improve power management at the PSE, the PD provides a signature about Class level. The PD is classified based on power.
User’s Manual The page includes the following fields: Object Description • Sequential Power up Allows user to enable or disable Sequential Power up function. Option • Sequential Power up Allows user to configure the PoE Port Start Up interval time. Interval • Sequential Power up There are two modes for Starting Up the PoE Port By Port: The PoE Port will start up by following Port number. Port Option By Priority: The PoE Port will start up by following the PoE Priority.
User’s Manual Disable: disable PoE function. Schedule: enable PoE function in schedule mode. • Schedule Indicates the schedule profile mode. Possible profiles are: Profile1 Profile2 Profile3 Profile4 • AF/AT Mode Allows user to select 802.3at or 802.3af compatibility mode. The default value is 802.3at mode. This function will affect PoE power reservation under the power limit classification only. As in 802.3af mode, the system will reserve a maximum of 15.4W for PD that supports Class3 level.
User’s Manual 4.16.6 PoE Status This page allows the user to inspect the total power consumption, total power reserved and current status for all PoE ports. The screen in Figure 4-16-5 appears. Figure 4-16-5:PoE Status Screenshot The page includes the following fields: Object Description • Sequential Power On Displays the current sequential power on mode. • System Power Budget Displays the maximum PoE power budget.
User’s Manual • Operation Mode Displays the current PoE operation mode. • Current Budget Displays the current maximum PoE budget. • Current Ports in Use Displays the current PoE ports in use. • Class 1 ~ 4 ports Displays the current PoE class 1 ~ 4 ports. • Power Consumption Displays the current power consumption (total watts and percentage) • Reserved Power Shows how much the total power is reserved for all PDs.
User’s Manual 4.16.7 PoE Schedule This page allows the user to define PoE schedule and schedule power recycle. PoE Schedule Besides being used as an IP Surveillance, the Managed PoE switch is certainly applicable to constructing any PoE network including VoIP and Wireless LAN. Under the trend of energy saving worldwide and contributing to the environmental protection on the Earth, the Managed PoE switch can effectively control the power supply besides its capability of giving high watts power.
User’s Manual The screen in Figure 4-16-6 appears. Figure 4-16-6: PoE Schedule Screenshot Please press the Add New Rule button to start setting PoE Schedule function. You have to set PoE schedule to profile and then go back to PoE Port Configuration, and select “Schedule” mode from per port “PoE Mode” option. You can then indicate which schedule profile could be applied to the PoE port. The page includes the following fields: Object Description • Profile Set the schedule profile mode.
User’s Manual • Reboot Enable Allows user to enable or disable whole PoE port reboot by PoE reboot schedule. Please be noticed that if you want to PoE schedule and PoE reboot schedule work at the same time, please use this function, and don’t use Reboot Only function. This function offers administrator to reboot PoE device at indicate time if administrator has this kind of requirement. • Reboot Only Allows user to reboot PoE function by PoE reboot schedule.
User’s Manual Please note that administrator has to enable LLDP port from LLDP configuration, please refer to the following example (The screen in Figure 4-16-98 appears.) To enable LLDP function from port1 to port3, administrator has to plug a PD that supports PoE LLDP function, and then administrator is going to see the PoE information of the PD from LLDP.
User’s Manual 4.17 Loop Protection This chapter describes enabling loop protection function that provides loop protection to prevent broadcast loops in Industrial Managed Switch. 4.17.1 Configuration This page allows the user to inspect the current Loop Protection configurations, and possibly change them as well; screen in Figure 4-17-1 appears.
User’s Manual 604800 seconds (7 days). A value of zero will keep a port disabled (until next device restart). Port Configuration Object Description • Port The switch port number of the port. • Enable Controls whether loop protection is enabled on this switch port. • Action Configures the action performed when a loop is detected on a port. Valid values are Shutdown Port, Shutdown Port and Log or Log Only.
User’s Manual Buttons : Click to refresh the page immediately. Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals.
User’s Manual 4.18 RMON RMON is the most important expansion of the standard SNMP. RMON is a set of MIB definitions, used to define standard network monitor functions and interfaces, enabling the communication between SNMP management terminals and remote monitors. RMON provides a highly efficient method to monitor actions inside the subnets. MID of RMON consists of 10 groups.
User’s Manual protocol. InNUcastPkts: The number of broad-cast and multi-cast packets delivered to a higher-layer protocol. InDiscards: The number of inbound packets that are discarded even the packets are normal. InErrors: The number of inbound packets that contains errors preventing them from being deliverable to a higher-layer protocol. InUnknownProtos: the number of the inbound packets that is discarded because of the unknown or un-support protocol.
User’s Manual 4.18.2 RMON Alarm Status This page provides an overview of RMON Alarm entries. Each page shows up to 99 entries from the Alarm table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Alarm table. The first displayed will be the one with the lowest ID found in the Alarm table; screen in Figure 4-18-2 appears.
User’s Manual 4.18.3 RMON Event Configuration Configure RMON Event table on this page. The entry index key is ID; screen in Figure 4-18-3 appears. Figure 4-18-3: RMON Event Configuration page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • ID Indicates the index of the entry. The range is from 1 to 65535. • Desc Indicates this event, the string length is from 0 to 127, default is a null string.
User’s Manual 4.18.4 RMON Event Status This page provides an overview of RMON Event table entries. Each page shows up to 99 entries from the Event table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Event table. The first displayed will be the one with the lowest Event Index and Log Index found in the Event table; screen in Figure 4-18-4 appears.
User’s Manual 4.18.5 RMON History Configuration Configure RMON History table on this page. The entry index key is ID; screen in Figure 4-18-5 appears. Figure 4-18-5: RMON History Configuration page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • ID Indicates the index of the entry. The range is from 1 to 65535. • Data Source Indicates the port ID which wants to be monitored.
User’s Manual 4.18.6 RMON History Status This page provides a detail of RMON history entries; screen in Figure 4-18-6 appears. Figure 4-18-6: RMON History Overview page Screenshot The page includes the following fields: Object Description • History Index Indicates the index of History control entry. • Sample Index Indicates the index of the data entry associated with the control entry. • Sample Start The value of sysUpTime at the start of the interval over which this sample was measured.
User’s Manual The best estimate of the mean physical layer network utilization on this interface • Utilization during this sampling interval is in the hundredths of a percent. Buttons : Click to refresh the page immediately. Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Updates the table, starting from the first entry in the History table, i.e.
User’s Manual 4.18.8 RMON Statistics Status This page provides an overview of RMON Statistics entries. Each page shows up to 99 entries from the Statistics table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Statistics table. The first displayed will be the one with the lowest ID found in the Statistics table; screen in Figure 4-18-8 appears.
User’s Manual • Coll. The best estimate of the total number of collisions on this Ethernet segment. • 64 Bytes The total number of packets (including bad packets) received that were 64 octets in length. The total number of packets (including bad packets) received that were between • 65~127 65 to 127 octets in length. The total number of packets (including bad packets) received that were between • 128~255 128 to 255 octets in length.
User’s Manual 4.19 PTP (IGS-12040MT/20040MT/20160HPT Only) The Precision Time Protocol (PTP) is a protocol used to synchronize clocks throughout a computer network. On a local area network, it achieves clock accuracy in the sub-microsecond range, making it suitable for measurement and control systems. PTP was originally defined in the IEEE 1588-2002 standard, officially entitled "Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems" and published in 2002.
User’s Manual Slave Only - clock's Device Type is Slave Only Static member: defined by the system, true if two-step Sync events and • 2 Step Flag Pdelay_Resp events are used. • Clock Identity It shows unique clock identifier. • One Way If true, one-way measurements are used. This parameter applies only to a slave. In one-way mode no delay measurements are performed, i.e. this is applicable only if frequency synchronization is needed. The master always responds to delay requests.
User’s Manual Clock • Ports Configuration Click to edit the port data set for the ports assigned to this clock instance. Clock Default Data Set Object Description • Clock ID An internal instance id (0..3) • Device Type Indicates the Type of the Clock Instance. There are five Device Types. Ord-Bound - clock's Device Type is Ordinary-Boundary Clock. P2p Transp - clock's Device Type is Peer to Peer Transparent Clock. E2e Transp - clock's Device Type is End to End Transparent Clock.
User’s Manual • PCP Priority Code Point value used for PTP frames. Clock current Data Set Object Description • stpRm Steps Removed : It is the number of PTP clocks traversed from the grandmaster to the local slave clock. • Offset from master Time difference between the master clock and the local slave clock, measured in ns.
User’s Manual ‘P’ constant [1..1000] see above • ‘I’ constant [1..1000] see above ‘D’ constant [1..1000] see above Unicast Slave Configuration Object Description • Duration The number of seconds a master is requested to send Announce/Sync messages. The request is repeated from the slave each Duration/4 seconds.
User’s Manual The Page includes the following fields: Object Description • Clock Instance Indicates the Instance of a particular Clock Instance [0..3]. Click on the Clock Instance number to monitor the Clock details. • Device Type Indicates the Type of the Clock Instance. There are five Device Types. Ord-Bound - clock's Device Type is Ordinary-Boundary Clock. P2p Transp - clock's Device Type is Peer to Peer Transparent Clock. E2e Transp - clock's Device Type is End to End Transparent Clock.
User’s Manual 4.20 Ring ITU-T G.8032 Ethernet Ring protection switching (ERPS) is a link layer protocol applied on Ethernet loop protection to provide sub-50ms protection and recovery switching for Ethernet traffic in a ring topology. ERPS provides a faster redundant recovery than Spanning Tree topology. The action is similar to STP or RSTP, but the algorithms between them are not the same.
User’s Manual 4.20.1 MEP Configuration The Maintenance Entity Point instances are configured here; screen in Figure 4-20-1 appears. Figure 4-20-1: MEP configuration page screenshot The page includes the following fields: Object Description • Delete This box is used to mark a MEP for deletion in next Save operation. • Instance The ID of the MEP. Click on the ID of a MEP to enter the configuration page. • Domain Port: This is a MEP in the Port Domain. 'Flow Instance' is a Port.
User’s Manual Buttons : Click to add a new MEP entry : Click to refresh the page immediately. : Click to save changes. : Click to undo any changes made locally and revert to previously saved values. 4.20.2 Detailed MEP Configuration This page allows the user to inspect and configure the current MEP Instance.; screen in Figure 4-20-2 appears. Figure 4-20-2: Detail MEP configuration page screenshot The page includes the following fields: Instance Data: Object Description • Instance The ID of the MEP.
User’s Manual • Tagged VID See help on MEP create WEB. • This MAC See help on MEP create WEB. Instance Configuration: Object Description • Level See help on MEP create WEB. • Format This is the configuration of the two possible Maintenance Association Identifier formats. ITU ICC: This is defined by ITU. 'ICC' can be max. 6 char. 'MEG id' can be max. 7 char. IEEE String: This is defined by IEEE. 'Domain Name' can be max. 8 char. 'MEG id' can be max. 8 char.
User’s Manual peer MEP. Fault Cause indicating that a CCM is received with Remote Defect Indication - • cRDI from this peer MEP. Fault Cause indicating that a CCM is received with a period different what is • cPeriod configured for this MEP - from this peer MEP. Fault Cause indicating that a CCM is received with a priority different what is • cPriority configured for this MEP - from this peer MEP. Buttons : Click to add a new peer MEP.
User’s Manual APS Protocol: Object Description • Enable Automatic Protection Switching protocol information transportation based on transmitting/receiving R-APS/L-APS PDU can be enabled/disabled. Must be enabled to support ERPS/ELPS implementing APS. This is only valid with one Peer MEP configured. • Priority The priority to be inserted as PCP bits in TAG (if any). • Cast Selection of APS PDU transmitted unicast or multi-cast. The unicast MAC will be taken from the 'Unicast Peer MAC' configuration.
User’s Manual The page includes the following fields: Object Description • Delete This box is used to mark an ERPS for deletion in next Save operation. • Port 0 This will create a Port 0 of the switch in the ring. • Port 1 This will create "Port 1" of the switch in the Ring. As interconnected sub-ring will have only one ring port, "Port 1" is configured as "0" for interconnected sub-ring.
User’s Manual 4.20.4 Ethernet Ring Protocol Switch Configuration This page allows the user to inspect and configure the current ERPS Instance; screen in Figure 4-20-4 appears. Figure 4-20-4: Ethernet Ring Protocol Switch Configuration page screenshot The page includes the following fields: Instance Data: Object Description • ERPS ID The ID of the Protection group. • Port 0 See help on ERPS create WEB. • Port 1 See help on ERPS create WEB. • Port 0 SF MEP See help on ERPS create WEB.
User’s Manual Instance Configuration: Object Description • Configuration Red: This ERPS is only created and has not yet been configured - is not active. Green: This ERPS is configured - is active. • Guard Time Guard timeout value to be used to prevent ring nodes from receiving outdated R-APS messages. The period of the guard timer can be configured in 10 ms steps between 10 ms and 2 seconds, with a default value of 500 ms • WTR Time The Wait To Restore timing value to be used in revertive switching.
User’s Manual Instance Command: Object Description • Command Administrative command. A port can be administratively configured to be in either manual switch or forced switch state. Port selection - Port0 or Port1 of the protection Group on which the command is • Port applied. Instance State: Object Description • Protection State ERPS state according to State Transition Tables in G.8032.
User’s Manual 4.20.5 Ring Wizard This page allows the user to configure the ERPS by wizard; screen in Figure 4-20-4 appears. Figure 4-20-5: Ring Wizard page screenshot The page includes the following fields: Object Description • All Switch Numbers Set all the switch numbers for the ring group. The default number is 3 and maximum number is 30. • Number ID The switch where you are requesting ERPS. • Port Configures the port number for the MEP. • VLAN Set the ERPS VLAN.
User’s Manual 4.20.6 Ring Wizard Example: Figure 4-20-6: Ring Example Diagram The above topology often occurs on using ERPS protocol. The multi switch constitutes a single ERPS ring; all of the switches only are configured as an ERPS in VLAN 3001, thereby constituting a single MRPP ring.
User’s Manual Setup steps Set ERPS Configuration on Switch 1 Connect PC to switch 1 directly; don’t connect to port 1 & 2 Logging on the Switch 1 and click “Ring > Ring Wizard” Set “All Switch Number” = 3 and “Number ID” = 1; click “Next” button to set the ERPS configuration for Switch 1. Set “MEP1” = Port1, “MEP2” = Port2 and VLAN ID = 3001; click “Set” button to save the ERPS configuration for Switch 1.
User’s Manual Set “MEP5” = Port2, “MEP6” = Port1 and VLAN ID = 3001; click “Set” button to save the ERPS configuration for Switch 3. To avoid loop, please don’t connect switch 1, 2 & 3 together in the ring topology before configuring the end of ERPS .
User’s Manual 5. SWITCH OPERATION 5.1 Address Table The Industrial Managed Switch is implemented with an address table. This address table composed of many entries. Each entry is used to store the address information of some node in network, including MAC address, port no, etc. This in-formation comes from the learning process of Industrial Managed Switch. 5.2 Learning When one packet comes in from any port, the Industrial Managed Switch will record the source address, port no.
User’s Manual 5.5 Auto-Negotiation The STP ports on the Switch have built-in "Auto-negotiation". This technology automatically sets the best possible bandwidth when a connection is established with another network device (usually at Power On or Reset). This is done by detect the modes and speeds at the second of both device is connected and capable of, both 10BASE-T and 100BASE-TX devices can connect with the port in either Half- or Full-Duplex mode. 1000BASE-T can be only connected in Full-duplex mode.
User’s Manual of IGS-20040MT 6. TROUBLESHOOTING This chapter contains information to help you solve issues. If the Industrial Managed Switch is not functioning properly, make sure the Industrial Managed Switch was set up according to instructions in this manual.
User’s Manual of IGS-20040MT APPENDIX A: Networking Connection A.1 Switch's Data RJ45 Pin Assignments - 1000Mbps, 1000BASE-T PIN NO MDI MDI-X 1 BI_DA+ BI_DB+ 2 BI_DA- BI_DB- 3 BI_DB+ BI_DA+ 4 BI_DC+ BI_DD+ 5 BI_DC- BI_DD- 6 BI_DB- BI_DA- 7 BI_DD+ BI_DC+ 8 BI_DD- BI_DC- Implicit implementation of the crossover function within a twisted-pair cable, or at a wiring panel, while not expressly forbidden, is beyond the scope of this standard. A.
User’s Manual of IGS-20040MT The standard cable, RJ45 pin assignment 6 32 1 6 321 6 3 21 The standard RJ45 receptacle/connector There are 8 wires on a standard UTP/STP cable and each wire is color-coded.
User’s Manual APPENDIX B : GLOSSARY A ACE ACE is an acronym for Access Control Entry. It describes access permission associated with a particular ACE ID. There are three ACE frame types (Ethernet Type, ARP, and IPv4) and two ACE actions (permit and deny). The ACE also contains many detailed, different parameter options that are available for individual application. ACL ACL is an acronym for Access Control List.
User’s Manual ranging from 1-1024K packets per seconds. Under "Ports" and "Access Control List" web-pages you can assign a Rate Limiter ID to the ACE(s) or ingress port(s). AES AES is an acronym for Advanced Encryption Standard. The encryption key protocol is applied in 802.1i standard to improve WLAN security. It is an encryption standard by the U.S. government, which will replace DES and 3DES. AES has a fixed block size of 128 bits and a key size of 128, 192, or 256 bits.
User’s Manual C CC CC is an acronym for Continuity Check. It is a MEP functionality that is able to detect loss of continuity in a network by transmitting CCM frames to a peer MEP. CCM CCM is an acronym for Continuity Check Message. It is a OAM frame transmitted from a MEP to it's peer MEP and used to implement CC functionality. CDP CDP is an acronym for Cisco Discovery Protocol. D DEI DEI is an acronym for Drop Eligible Indicator. It is a 1-bit field in the VLAN tag.
User’s Manual Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather than requiring an administrator to manage the task. This means that a new computer can be added to a network without the hassle of manually assigning it a unique IP address. DHCP Relay DHCP Relay is used to forward and to transfer DHCP messages between the clients and the server when they are not on the same subnet domain.
User’s Manual DSCP DSCP is an acronym for Differentiated Services Code Point. It is a field in the header of IP packets for packet classification purposes. E EEE EEE is an abbreviation for Energy Efficient Ethernet defined in IEEE 802.3az. EPS EPS is an abbreviation for Ethernet Protection Switching defined in ITU/T G.8031. Ethernet Type Ethernet Type, or EtherType, is a field in the Ethernet MAC header, defined by the Ethernet networking standard.
User’s Manual connection to a particular port on a remote host (port 80 by default). An HTTP server listening on that port waits for the client to send a request message. HTTPS HTTPS is an acronym for Hypertext Transfer Protocol over Secure Socket Layer. It is used to indicate a secure HTTP connection. HTTPS provide authentication and encrypted communication and is widely used on the World Wide Web for security-sensitive communication such as payment transactions and corporate logons.
User’s Manual IMAP IMAP is an acronym for Internet Message Access Protocol. It is a protocol for email clients to retrieve email messages from a mail server. IMAP is the protocol that IMAP clients use to communicate with the servers, and SMTP is the protocol used to transport mail to an IMAP server. The current version of the Internet Message Access Protocol is IMAP4. It is similar to Post Office Protocol version 3 (POP3), but offers additional and more complex features.
User’s Manual L LACP LACP is an IEEE 802.3ad standard protocol. The Link Aggregation Control Protocol, allows bundling several physical ports together to form a single logical port. LLDP LLDP is an IEEE 802.1ab standard protocol.
User’s Manual MD5 MD5 is an acronym for Message-Digest algorithm 5. MD5 is a message digest algorithm, used cryptographic hash function with a 128-bit hash value. It was designed by Ron Rivest in 1991. MD5 is officially defined in RFC 1321 - The MD5 Message-Digest Algorithm. Mirroring For debugging network problems or monitoring network traffic, the switch system can be configured to mirror frames from multiple ports to a mirror port. (In this context, mirroring a frame is the same as copying the frame.
User’s Manual NFS NFS is an acronym for Network File System. It allows hosts to mount partitions on a remote system and use them as though they are local file systems. NFS allows the system administrator to store resources in a central location on the network, providing authorized users continuous access to them, which means NFS supports sharing of files, printers, and other resources as persistent storage over a computer network.
User’s Manual PD PD is an acronym for Powered Device. In a PoE> system the power is delivered from a PSE ( power sourcing equipment ) to a remote device. The remote device is called a PD. PHY PHY is an abbreviation for Physical Interface Transceiver and is the device that implement the Ethernet physical layer (IEEE-802.3). PING ping is a program that sends a series of packets over a network or the Internet to a specific computer in order to generate a response from that computer.
User’s Manual Ethernet networks (Wikipedia). Private VLAN In a private VLAN, communication between ports in that private VLAN is not permitted. A VLAN can be configured as a private VLAN. PTP PTP is an acronym for Precision Time Protocol, a network protocol for synchronizing the clocks of computer systems. Q QCE QCE is an acronym for QoS Control Entry. It describes QoS class associated with a particular QCE ID. There are six QCE frame types: Ethernet Type, VLAN, UDP/TCP Port, DSCP, TOS, and Tag Priority.
User’s Manual class. There is a one to one mapping between QoS class, queue and priority. A QoS class of 0 (zero) has the lowest priority. R RARP RARP is an acronym for Reverse Address Resolution Protocol. It is a protocol that is used to obtain an IP address for a given hardware address, such as an Ethernet address. RARP is the complement of ARP. RADIUS RADIUS is an acronym for Remote Authentication Dial In User Service.
User’s Manual SHA SHA is an acronym for Secure Hash Algorithm. It designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. Hash algorithms compute a fixed-length digital representation (known as a message digest) of an input data sequence (the message) of any length. Shaper A shaper can limit the bandwidth of transmitted frames. It is located after the ingress queues. SMTP SMTP is an acronym for Simple Mail Transfer Protocol.
User’s Manual strong authentication or guarantee confidentiality (Wikipedia). SSM SSM In SyncE this is an abbreviation for Synchronization Status Message and is containing a QL indication. STP Spanning Tree Protocol is an OSI layer-2 protocol which ensures a loop free topology for any bridged LAN. The original STP protocol is now obsoleted by RSTP. SyncE SyncE Is an abbreviation for Synchronous Ethernet. This functionality is used to make a network 'clock frequency' synchronized.
User’s Manual TELNET enables the client to control the server and communicate with other servers on the network. To start a Telnet session, the client user must log in to a server by entering a valid username and password. Then, the client user can enter commands through the Telnet program just as if they were entering commands directly on the server console. TFTP TFTP is an acronym for Trivial File Transfer Protocol.
User’s Manual UPnP UPnP is an acronym for Universal Plug and Play. The goals of UPnP are to allow devices to connect seamlessly and to simplify the implementation of networks in the home (data sharing, communications, and entertainment) and in corporate environments for simplified installation of computer components User Priority User Priority is a 3-bit field storing the priority level for the 802.1Q frame. V VLAN Virtual LAN. A method to restrict communication between switch ports.
User’s Manual Wi-Fi Wi-Fi is an acronym for Wireless Fidelity. It is meant to be used generically when referring of any type of 802.11 network, whether 802.11b, 802.11a, dual-band, etc. The term is promulgated by the Wi-Fi Alliance. WPA WPA is an acronym for Wi-Fi Protected Access. It was created in response to several serious weaknesses researchers had found in the previous system , Wired Equivalent Privacy (WEP). WPA implements the majority of the IEEE 802.