Cisco NTP-E157 User`s manual

User’s Manual of ISW-1022M
User’s Manual
ISW-1022M
ISW-1022MT
8-Port 10/100Mbps + 2 Gigabit TP/SFP
Managed Industrial Switch
ISW-1022MPT
8-Port 10/100Mbps + 2 Gigabit TP/SFP
PoE Managed Industrial Switch
ISW-1033MT
7-Port 10/100Mbps + 3 Gigabit TP/SFP
Managed Industrial Switch
User’s Manual of ISW-1022M Series and ISW-1033MT
Trademarks
Copyright © PLANET Technology Corp. 2009.
Contents subject to which revision without prior notice.
PLANET is a registered trademark of PLANET Technology Corp.
All other trademarks belong to their respective owners.
Disclaimer
PLANET Technology does not warrant that the hardware will work properly in all environments and applications, and
makes no warranty and representation, either implied or expressed, with respect to the quality, performance,
merchantability, or fitness for a particular purpose.
PLANET has made every effort to ensure that this User's Manual is accurate; PLANET disclaims liability for any
inaccuracies or omissions that may have occurred.
Information in this User's Manual is subject to change without notice and does not represent a commitment on the part of
PLANET. PLANET assumes no responsibility for any inaccuracies that may be contained in this User's Manual. PLANET
makes no commitment to update or keep current the information in this User's Manual, and reserves the right to make
improvements to this User's Manual and/or to the products described in this User's Manual, at any time without notice.
If you find information in this manual that is incorrect, misleading, or incomplete, we would appreciate your comments and
suggestions.
FCC Warning
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the
FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment
is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if
not installed and used in accordance with the Instruction manual, may cause harmful interference to radio
communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the
user will be required to correct the interference at whose own expense.
CE Mark Warning
This is a Class A product. In a domestic environment, this product may cause radio interference, in which case the user
may be required to take adequate measures.
WEEE Warning
To avoid the potential effects on the environment and human health as a result of the presence of
hazardous substances in electrical and electronic equipment, end users of electrical and electronic
equipment should understand the meaning of the crossed-out wheeled bin symbol. Do not dispose of
WEEE as unsorted municipal waste and have to collect such WEEE separately.
Revision
8-Port 10/100Mbps + 2 Gigabit TP/SFP Managed Industrial Switch User’s Manual
FOR MODELS: ISW-1022M / ISW-1022MT / ISW-1022MPT / ISW-1033MT
REVISION: 1.2 (NOVEMBER.2009)
Part No.: EM-ISW1022M_v1.2 (2081-AH0010-002)
2
User’s Manual of ISW-1022M Series and ISW-1033MT
TABLE OF CONTENTS
1. INTRODUCTION ............................................................................. 6
1.1 PACKAGE CONTENTS .............................................................................................................................. 6
1.2 PRODUCT DESCRIPTION ........................................................................................................................... 6
1.3 PRODUCT FEATURES ............................................................................................................................... 7
1.4 PRODUCT SPECIFICATION ...................................................................................................................... 10
1.4.1 ISW-1022M / ISW-1022MT Product Specification .................................................................... 10
1.4.2 ISW-1022MPT Product Specification ........................................................................................ 12
1.4.3 ISW-1033MT Product Specification .......................................................................................... 15
2. INSTALLATION............................................................................. 18
2.1 HARDWARE DESCRIPTION ...................................................................................................................... 18
2.1.1 Physical Dimension ................................................................................................................... 18
2.1.2 Front / Rear Panel ..................................................................................................................... 21
2.1.3 Top View.................................................................................................................................... 24
2.1.4 LED Indicators ........................................................................................................................... 25
2.2 INSTALL THE SWITCH ............................................................................................................................. 30
2.2.1 Installation Steps ....................................................................................................................... 30
2.2.2 DIN-Rail Mounting ..................................................................................................................... 31
2.2.3 Wall Mount Plate Mounting........................................................................................................ 32
2.2.4 Wiring the Power Inputs ............................................................................................................ 33
2.2.5 Wiring the Fault Alarm Contact.................................................................................................. 34
2.2.6 Wiring the Digital Inputs / Outputs (ISW-1033MT) .................................................................... 35
2.2.7 Installing the SFP transceiver.................................................................................................... 36
3. NETWORK APPLICATION.............................................................. 39
3.1 RAPID RING APPLICATION...................................................................................................................... 40
3.2 COUPLING RING APPLICATION ............................................................................................................... 40
3.3 DUAL HOMING APPLICATION .................................................................................................................. 41
4. CONSOLE MANAGEMENT .............................................................. 42
4.1 CONNECTING TO THE CONSOLE PORT .................................................................................................... 42
4.2 PIN ASSIGNMENT ................................................................................................................................... 42
4.3 LOGIN IN THE CONSOLE INTERFACE ....................................................................................................... 43
4.4 CLI MANAGEMENT ................................................................................................................................ 45
4.5 COMMANDS LEVEL ................................................................................................................................ 46
5. WEB-BASED MANAGEMENT .......................................................... 47
5.1 ABOUT WEB-BASED MANAGEMENT ........................................................................................................ 47
5.2 REQUIREMENTS ..................................................................................................................................... 48
5.3 LOGGING ON THE SWITCH ...................................................................................................................... 48
5.4 SYSTEM ................................................................................................................................................ 50
3
User’s Manual of ISW-1022M Series and ISW-1033MT
5.4.1 System Information.................................................................................................................... 51
5.4.2 IP Configuration......................................................................................................................... 52
5.4.3 DHCP Server ............................................................................................................................. 53
5.4.4 TFTP.......................................................................................................................................... 56
5.4.5 System Event Log ..................................................................................................................... 58
5.4.6 Fault Relay Alarm ...................................................................................................................... 62
5.4.7 SNTP Configuration................................................................................................................... 63
5.4.8 IP Security ................................................................................................................................. 66
5.4.9 User Authentication ................................................................................................................... 67
5.5 PORT MANAGEMENT.............................................................................................................................. 68
5.5.1 Port Statistics............................................................................................................................. 68
5.5.2 Port Control................................................................................................................................ 69
5.5.3 Port Trunk .................................................................................................................................. 70
5.5.4 Port Mirroring ............................................................................................................................. 77
5.5.5 Rate Limiting.............................................................................................................................. 78
5.6 PROTOCOL ............................................................................................................................................ 79
5.6.1 VLAN configuration.................................................................................................................... 79
5.6.2 Rapid Spanning Tree................................................................................................................. 90
5.6.3 SNMP Configuration................................................................................................................ 100
5.6.4 QoS Configuration ................................................................................................................... 105
5.6.5 IGMP Snooping ....................................................................................................................... 110
5.6.6 X-Ring...................................................................................................................................... 115
5.7 SECURITY ........................................................................................................................................... 119
5.7.1 Security—802.1X/Radius Configuration.................................................................................. 119
5.7.2 MAC Address Table ................................................................................................................ 125
5.8 DIGITAL INPUT/OUTPUT (ISW-1033MT)............................................................................................... 129
5.8.1 Digital Input.............................................................................................................................. 129
5.8.2 Digital Output ........................................................................................................................... 130
5.9 POWER OVER ETHERNET ..................................................................................................................... 131
5.9.1 Power over Ethernet Powered Device .................................................................................... 131
5.9.2 Power Management: ............................................................................................................... 131
5.10 FACTORY DEFAULT ........................................................................................................................... 135
5.11 SAVE CONFIGURATION ...................................................................................................................... 135
5.12 SYSTEM REBOOT .............................................................................................................................. 136
6. COMMAND SETS ......................................................................... 137
6.1 SYSTEM COMMANDS SET..................................................................................................................... 137
6.2 PORT COMMANDS SET ........................................................................................................................ 139
6.3 TRUNK COMMANDS SET ...................................................................................................................... 141
6.4 VLAN COMMANDS SET ....................................................................................................................... 142
6.5 SPANNING TREE COMMANDS SET ........................................................................................................ 143
6.6 QOS COMMANDS SET ......................................................................................................................... 145
4
User’s Manual of ISW-1022M Series and ISW-1033MT
6.7 IGMP COMMANDS SET ........................................................................................................................ 145
6.8 MAC / FILTER TABLE COMMANDS SET................................................................................................. 146
6.9 SNMP COMMANDS SET....................................................................................................................... 146
6.10 PORT MIRRORING COMMANDS SET .................................................................................................... 148
6.11 802.1X COMMANDS SET .................................................................................................................... 149
6.12 TFTP COMMANDS SET ...................................................................................................................... 150
6.13 SYSTEMLOG, SMTP AND EVENT COMMANDS SET .............................................................................. 151
6.14 SNTP COMMANDS SET ..................................................................................................................... 152
6.15 X-RING COMMANDS SET .................................................................................................................... 153
6.16 POE COMMAND SET .......................................................................................................................... 153
7. SWITCH OPERATION .................................................................. 155
7.1 ADDRESS TABLE ................................................................................................................................. 155
7.2 LEARNING ........................................................................................................................................... 155
7.3 FORWARDING & FILTERING .................................................................................................................. 155
7.4 STORE-AND-FORWARD ........................................................................................................................ 155
7.5 AUTO-NEGOTIATION ............................................................................................................................ 156
8. POWER OVER ETHERNET OVERVIEW .......................................... 157
WHAT IS POE? ......................................................................................................................................... 157
THE POE PROVISION PROCESS ................................................................................................................. 159
Stages of powering up a PoE link..................................................................................................... 159
Line Detection................................................................................................................................... 159
Classification..................................................................................................................................... 159
Start-up ............................................................................................................................................. 160
Operation .......................................................................................................................................... 160
Power Disconnection Scenarios....................................................................................................... 160
APPENDIX A—RJ-45 PIN ASSIGNMENT .......................................... 161
A.1 SWITCH'S RJ-45 PIN ASSIGNMENTS .................................................................................................... 161
A.2 10/100MBPS, 10/100BASE-TX........................................................................................................... 161
APPENDIX B TROUBLES SHOOTING ............................................... 163
5
User’s Manual of ISW-1022M Series and ISW-1033MT
1. Introduction
The PLANET Layer 2 Managed Industrial Switch series - ISW-1022M series and ISW-1033MT are multiple 10/100Mbps
ports Ethernet Switched with Gigabit TP/SFP fiber optical combo connective ability and robust layer 2 features; the
description of these models as below:
ISW-1022M
8-Port 10/100Base-TX + 2-Port Gigabit TP/SFP Combo Managed Industrial Ethernet Switch
:
(-10 ~ 60 Degree C)
ISW-1022MT
8-Port 10/100Base-TX + 2-Port Gigabit TP/SFP Combo Managed Industrial Ethernet Switch
:
(-40 ~ 75 Degree C)
:
ISW-1022MPT
8-Port 10/100Base-TX + 2-Port Gigabit TP/SFP Combo Managed Industrial PoE Switch
(-40 ~ 75 Degree C)
ISW-1033MT
:
7-Port 10/100Base-TX + 3-Port Gigabit TP/SFP Combo Managed Industrial Ethernet Switch
(-40 ~ 75 Degree C)
Terms of “Managed Industrial Switch” means the Switches mentioned titled in the cover page of this User’s manual,
i.e.ISW-1022M, ISW-1022MT, ISW-1022MPT, and ISW-1033MT.
1.1 Package Contents
Please refer to the package content list below to verify them against the checklist.
„ The Managed Industrial Switch x 1
„ User Manual x 1
„ Pluggable Terminal Block x 1
„ Mounting Plate x 2
„ RJ-45 to DB9-Female Cable x 1
If any of these are missing or damaged, please contact your dealer immediately, if possible, retain the carton including the
original packing material, and use them against to repack the product in case there is a need to return it to us for repair.
1.2 Product Description
Increases Reliability in Industrial Networks
The PLANET ISW-1022M series and ISW-1033MT Managed Industrial Ethernet Switches is industrially hardened.
Ethernet switch specifically designed to operate reliably in electrically harsh and climatically demanding environments. It
incorporates Redundant Data Ring technology and redundant power supply system into customers’ industrial automation
network to enhance system reliability and uptime in the factory harsh environments. It protects customer’s industrial
network connectivity with switching recovery capability. The ISW-1022M series and ISW-1033MT provides IP-30
aluminum case and 8 10/100Mbps Fast Ethernet ports and 2 Gigabit TP/SFP combo interfaces. The Gigabit fiber optical
6
User’s Manual of ISW-1022M Series and ISW-1033MT
uplink capability can guarantee the throughput to all nodes hooked into the network and distance can be extended up to
above 120 kilometers with SFP module.
Its advanced features, such as IGMP snooping, broadcast storm control, MAC address filtering, Virtual LAN, enhanced
security and bandwidth utilization fit a variety of applications. Additionally, its standard-compliant implementation ensures
interoperability with equipment from other vendors.
With ISW-1022M series and ISW-1033MT built in Simple Network Management Protocol (SNMP) and Web-based
management, the ISW-1022M series and ISW-1033MT offers an easy-to-use, platform-independent management and
configuration facility. For text-based management, the ISW-1022M series and ISW-1033MT can also be accessed via
Telnet and the console port.
1.3 Product Features
¾
Physical Port
ISW-1022M / ISW-1022MT
„
8-Port 10/100Base-TX RJ-45 copper interface
„
2-Port gigabit TP/SFP combo interface, SFP(Mini-GBIC) supports 100/1000 Dual Mode
„
1 RJ-45 Console interface for Switch basic management and setup
ISW-1022MPT
„
8-Port 10/100Base-TX RJ-45 copper with 8 IEEE 802.3af PoE injector
„
2-Port gigabit TP/SFP combo interface, SFP(Mini-GBIC) supports 100/1000 Dual Mode
„
1 RJ-45 Console interface for Switch basic management and setup
ISW-1033MT
¾
„
7-Port 10/100Base-TX RJ-45 copper interface
„
3-Port gigabit TP/SFP combo interface, SFP(Mini-GBIC) supports 100/1000 Dual Mode
„
1 RJ-45 Console interface for Switch basic management and setup
Layer 2 Features
„
Complies with the IEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3z Gigabit Ethernet standard
„
High performance Store and Forward architecture, broadcast storm control, runt/CRC filtering eliminates
erroneous packets to optimize the network bandwidth
„
Support VLANs:
• IEEE 802.1Q Tag-Based VLAN
• Up to 256 VLANs groups, out of 4096 VLAN IDs
• Port-Based VLAN
• GVRP (GARP VLAN Registration Protocol), up to 256 groups
„
Support up to 4 Trunk groups, each trunk for up to maximum 4 port with 800Mbps bandwidth(Duplex Mode)
„
Support Spanning Tree Protocol:
7
User’s Manual of ISW-1022M Series and ISW-1033MT
• IEEE 802.1d classic Spanning Tree Algorithm
• IEEE 802.1w Rapid Spanning Tree Protocol
¾
Rapid Data Redundant Ring
„
Support Rapid Ring topology mode:
• Dual Homing Ring
• Couple Ring
„
¾
¾
¾
¾
Provide redundant backup feature and the recovery time below 20ms
Quality of Service
„
Support IEEE 802.1p Class of Service
„
4 priority queues on all switch ports
„
QoS Mode: Port Base, Tag Base and Type of Service Priority
„
Support for strict priority and weighted round robin (WRR) CoS policies
„
Ingress/Egress Bandwidth control on each port
Multicast
„
IGMP Snooping v1 and v2
„
IGMP Query mode for Multicast Media application
„
256 multicast groups
Security
„
IEEE 802.1x Port-Based Authentication
„
MAC address Filtering and MAC address Binding
„
IP address security management to prevent unauthorized intruder
„
Port Mirroring to monitor the incoming or outgoing traffic on a particular port
Power over Ethernet (ISW-1022MPT)
„
Complies with IEEE 802.3af Power over Ether Internet End-Span PSE
„
Provides 8 IEEE 802.3af devices powered
„
Support PoE power up to 15.4 watts for each PoE ports
„
Auto detected powered device (PD)
„
Circuit protection prevent power interference between ports
„
Remote power feeding uo to 100m
„
PoE management
z Total power budget control
z Per port PoE function enable.disable
z PoE port power feeding priority
z Per PoE port power limit
z PD classification detection
8
User’s Manual of ISW-1022M Series and ISW-1033MT
¾
¾
Management
„
WEB-based, Telnet, Console Command Line management
„
Access through SNMP v1, v2c and v3 set and get requests
„
SNMP Trap / SMTP email for alarm notification of events
„
System Log Server/Client
Industrial Case / Installation
„
IP-30 Aluminum case protection
„
DIN Rail and Wall Mount Design
„
Redundant Power Design
9
User’s Manual of ISW-1022M Series and ISW-1033MT
1.4 Product Specification
1.4.1 ISW-1022M / ISW-1022MT Product Specification
Product
ISW-1022M
ISW-1022MT
Hardware Specification
8 10/ 100Base-TX RJ-45 Auto-MDI/MDI-X ports
Copper Ports
2 10/100/1000Base-T RJ-45 port
SFP/mini-GBIC Slots
2 SFP interfaces, shared with Port-9 and Port-10
Switch Architecture
Store-and-Forward
Switch Fabric
5.6Gbps / non-blocking
Switch Throughput
8.3Mpps@64Bytes
Address Table
8K entries
Share Data Buffer
1Mbit
Flash
4Mbytess
DRAM
32Mbytes
Maximum Frame Size
1522 Bytes packet
Flow Control
Back pressure for half duplex, IEEE 802.3x Pause Frame for full duplex
System:
Power (Green)
Power 1 (Green)
Power 2 (Green)
Fault (Red)
LED
8 port 10/100:
Link/Activity (Green)
Full duplex/Collision (Yellow)
SFP port:
LNK/ACT(Green)
1000T: LNK/ACT(Green), 1000M(Green)
Console Interface
One RJ-45-to –RS-232 male connector for switch management
External Power Supply: DC 12~48V, Redundant power DC 12~48V and
Power Supply
connective removable terminal block for master and slave power
Power Consumption
8.16 Watts (Full load)
Operating Temperature
-10 Degree C~60 Degree C
Operating Humidity
5% to 95% (Non-condensing)
Storage Temperature
-40 Degree C ~ 85 Degree C
Case Dimension
IP-30, 2.83” x 4.13” x 5.98” / 72mm x 105mm x 152mm
10
-40 Degree C~75 Degree C
User’s Manual of ISW-1022M Series and ISW-1033MT
Management Functions
Management Interface
Console, Telnet, Web Browser, SNMP v1, v2c and v3
Port disable/enable.
Port Configuration
Auto-negotiation 10/100Mbps full and half duplex mode selection.
Flow Control disable / enable. Bandwidth control on each port.
Display each port’s speed duplex mode, link status, Flow control status. Auto
Port Status
negotiation status
Port-Based VLAN, up to 9 VLAN groups
VLAN
IEEE 802.1q Tagged Based VLAN , 4K VLAN ID, up to 256 VLAN groups
IEEE 802.1d Spanning Tree
Spanning Tree
Link Aggregation
IEEE 802.1w Rapid Spanning Tree
Supports 4 groups of 4-Port trunk support
Traffic classification based on :
Port Number,
QoS
802.1Q Tag,
802.1p priority,
IP DSCP/TOS field in IP Packet
v1 and v2
IGMP Snooping
256 multicast groups and IGMP query
Per port bandwidth control
Bandwidth Control
Ingress: 500Kb~80Mbps
Egress: 64Kb~80Mbps
Port Mirror
RX/TX/Both
Support 100 entries of MAC address for static MAC and another 100 for MAC filter
Security
Support 10 IP addresses that have permission to access the switch management
and to prevent unauthorized intruder
Provides one relay output for port breakdown, power fail
Relay Alarm
DHCP Protocol
Alarm Relay current carry ability: 1A @ DC24V
Provides DHCP Client/ DHCP Server/ Port and IP Binding
RFC-1157 SNMP MIB
RFC-1213 MIB-II
RFC-1215 Trap
SNMP MIBs
RFC-2863 Interface MIB
RFC-1493 Bridge MIB
RFC-2674 Extended Bridge MIB (Q-Bridge)
RFC-1643, RFC-1157 RSTP MIB
Private MIB
Standards Conformance
Regulation Compliance
FCC Class A,
CE EN61000-4-2,
11
User’s Manual of ISW-1022M Series and ISW-1033MT
CE EN61000-4-3,
CE EN-61000-4-4,
CE EN61000-4-5,
CE EN61000-4-6,
CE EN61000-4-8,
CE EN61000-4-11,
CE EN61000-4-12,
CE EN61000-6-2,
CE EN61000-6-4
IEEE 802.3 10Base-T
IEEE 802.3u 100Base-TX/100Base-FX
IEEE 802.3z Gigabit SX/LX
IEEE 802.3ab Gigabit 1000T
Standards Compliance
IEEE 802.3x Flow Control and Back pressure
IEEE 802.1d Spanning tree protocol
IEEE 802.1w Rapid spanning tree protocol
IEEE 802.1p Class of service
IEEE 802.1Q VLAN Tagging
IEEE 802.1x Port Authentication Network Control
• 50 / 125µm or 62.5 / 125µm multi-mode fiber cable, up to 220 / 550m
Cable-Fiber-optic cable
• 9 / 125µm single-mode cable, provides long distance for 10 / 15 / 20 / 30 / 40 / 50
/ 60 / 70 / 120km (very on fiber transceiver or SFP module)
IEC60068-2-32 (Free fall)
Stability Testing
IEC60068-2-27 (Shock)
IEC60068-2-6 (Vibration)
1.4.2 ISW-1022MPT Product Specification
Product
ISW-1022MPT
Hardware Specification
8 10/ 100Base-TX RJ-45 Auto-MDI/MDI-X ports
Copper Ports
2 10/100/1000Base-T RJ-45 port
SFP/mini-GBIC Slots
2 SFP interfaces, shared with Port-9 and Port-10
Switch Architecture
Store-and-Forward
Switch Fabric
5.6Gbps / non-blocking
Switch Throughput
8.3Mpps@64Bytes
Address Table
8K entries
Share Data Buffer
1Mbit
Flash
4Mbytess
DRAM
32Mbytes
Maximum Frame Size
1522 Bytes packet
12
User’s Manual of ISW-1022M Series and ISW-1033MT
Flow Control
Back pressure for half duplex, IEEE 802.3x Pause Frame for full duplex
System:
Power (Green)
Power 1 (Green)
Power 2 (Green)
Fault (Red)
8 port 10/100:
Link/Activity (Green)
LED
Full duplex/Collision (Yellow)
SFP port:
LNK/ACT(Green)
1000T: LNK/ACT(Green), 1000M(Green)
8 PoE power output:
PoE In-Use (Green)
Console Interface
One RJ-45-to –RS-232 male connector for switch management
External Power Supply: DC 48V
Power Supply
Redundant power DC 48V
Removable terminal block for master and slave power
Power Consumption
128 Watts (Full load)
Operating Temperature
-40 Degree C~75 Degree C
Operating Humidity
5% to 95% (Non-condensing)
Storage Temperature
-40 Degree C ~ 85 Degree C
Case Dimension
IP-30, 2.83” x 4.13” x 5.98” / 72mm x 105mm x 152mm
Power over Ethernet
PoE Standard
IEEE 802.3af PSE (Power Sourcing Equipment)
Units can be Powered
8
PoE Power Output
48V DC, Max. 15.4 watts, 350mA
Power Pin Assignment
1/2(+), 3/6(-)
Management Functions
Management Interface
Console, Telnet, Web Browser, SNMP v1, v2c and v3
Port disable/enable.
Port Configuration
Auto-negotiation 10/100Mbps full and half duplex mode selection.
Flow Control disable / enable. Bandwidth control on each port.
Display each port’s speed duplex mode, link status, Flow control status. Auto
Port Status
negotiation status
Port-Based VLAN, up to 9 VLAN groups
VLAN
IEEE 802.1q Tagged Based VLAN , 4K VLAN ID, up to 256 VLAN groups
13
User’s Manual of ISW-1022M Series and ISW-1033MT
IEEE 802.1d Spanning Tree
Spanning Tree
Link Aggregation
IEEE 802.1w Rapid Spanning Tree
Supports 4 groups of 4-Port trunk support
Traffic classification based on :
Port Number,
QoS
802.1Q Tag,
802.1p priority,
IP DSCP/TOS field in IP Packet
v1 and v2
IGMP Snooping
256 multicast groups and IGMP query
Per port bandwidth control
Bandwidth Control
Ingress: 500Kb~80Mbps
Egress: 64Kb~80Mbps
Port Mirror
RX/TX/Both
Support 100 entries of MAC address for static MAC and another 100 for MAC filter
Security
Support 10 IP addresses that have permission to access the switch management
and to prevent unauthorized intruder
Provides one relay output for port breakdown, power fail
Relay Alarm
DHCP Protocol
Alarm Relay current carry ability: 1A @ DC24V
Provides DHCP Client/ DHCP Server/ Port and IP Binding
RFC-1157 SNMP MIB
RFC-1213 MIB-II
RFC-1215 Trap
RFC-2863 Interface MIB
SNMP MIBs
RFC-1493 Bridge MIB
RFC-2674 Extended Bridge MIB (Q-Bridge)
RFC-1643, RFC-1157 RSTP MIB
Power over Ethernet MIB
Private MIB
Standards Conformance
FCC Class A,
CE EN61000-4-2,
CE EN61000-4-3,
CE EN-61000-4-4,
CE EN61000-4-5,
Regulation Compliance
CE EN61000-4-6,
CE EN61000-4-8,
CE EN61000-4-11,
CE EN61000-4-12,
CE EN61000-6-2,
CE EN61000-6-4
14
User’s Manual of ISW-1022M Series and ISW-1033MT
IEEE 802.3 10Base-T
IEEE 802.3u 100Base-TX/100Base-FX
IEEE 802.3z Gigabit SX/LX
IEEE 802.3ab Gigabit 1000T
IEEE 802.3af Power over Ethernet
Standards Compliance
IEEE 802.3x Flow Control and Back pressure
IEEE 802.1d Spanning tree protocol
IEEE 802.1w Rapid spanning tree protocol
IEEE 802.1p Class of service
IEEE 802.1Q VLAN Tagging
IEEE 802.1x Port Authentication Network Control
• 50 / 125µm or 62.5 / 125µm multi-mode fiber cable, up to 220 / 550m
Cable-Fiber-optic cable
• 9 / 125µm single-mode cable, provides long distance for 10 / 15 / 20 / 30 / 40 / 50
/ 60 / 70 / 120km (very on fiber transceiver or SFP module)
IEC60068-2-32 (Free fall)
Stability Testing
IEC60068-2-27 (Shock)
IEC60068-2-6 (Vibration)
1.4.3 ISW-1033MT Product Specification
ISW-1033MT
Product
7-Port 10/100Mbps + 3-Port Gigabit TP/SFP Managed Industrial Switch
Hardware Specification
7 10/ 100Base-TX RJ-45 Auto-MDI/MDI-X ports
Copper Ports
3 10/100/1000Base-T RJ-45 port
SFP/mini-GBIC Slots
3 SFP interfaces, shared with Port-8, Port-9 and Port-10
Switch Architecture
Store-and-Forward
Switch Fabric
7.4Gbps / non-blocking
Switch Throughput
5.5Mpps@64bytes
Address Table
8K entries
Share Data Buffer
1Mbit
Maximum Frame Size
1522 Bytes packet
Flow Control
Back pressure for half duplex, IEEE 802.3x Pause Frame for full duplex
LED
Per unit: Power (Green), Power 1 (Green), Power 2 (Green), Fault (Red)
8 port 10/100: Link/Activity (Green), Full duplex/Collision (Yellow)
SFP port: LNK/ACT(Green), 1000T: LNK/ACT(Green), 1000M(Green)
Console Interface
One RJ-45-to –RS-232 male connector for switch management
15
User’s Manual of ISW-1022M Series and ISW-1033MT
2 Digital Input (DI):Level 0: -30~2V
Level 1: 10~30V
DI/DO
Max. input current: 8mA
2 Digital Output(DO):Open collector to 40VDC, 200mA
External Power Supply: DC 12~48V, Redundant power DC 12~48V and
Power Supply
connective removable terminal block for master and slave power
Power Consumption
10.2 Watts
Operating Temperature
Wide: -40 Degree C~75 Degree C
Operating Humidity
5% to 95% (Non-condensing)
Storage Temperature
-40 Degree C ~ 85 Degree C
Case Dimension
IP-30, 72mm (W) x 105mm (D) x 152mm (H)
Layer 2 function
Management Interface
Console, Telnet, Web Browser, SNMP v1, v2c and v3
Port disable/enable.
Port Configuration
Auto-negotiation 10/100Mbps full and half duplex mode selection.
Flow Control disable / enable. Bandwidth control on each port.
Display each port’s speed duplex mode, link status, Flow control status. Auto
Port Status
negotiation status
Port-Based VLAN, up to 9 VLAN groups
VLAN
IEEE 802.1q Tagged Based VLAN , 4K VLAN ID, up to 256 VLAN groups
IEEE 802.1d Spanning Tree
Spanning Tree
Link Aggregation
IEEE 802.1w Rapid Spanning Tree
Supports 4 groups of 4-Port trunk support
Traffic classification based on :
• Port Number,
QoS
• 802.1Q Tag,
• 802.1p priority,
• IP DSCP/TOS field in IP Packet
v1 and v2
IGMP Snooping
256 multicast groups and IGMP query
Per port bandwidth control
Bandwidth Control
Ingress: 500Kb~80Mbps
Egress: 64Kb~80Mbps
Port Mirror
RX/TX/Both
16
User’s Manual of ISW-1022M Series and ISW-1033MT
Support 100 entries of MAC address for static MAC and another 100 for MAC filter
Security
Support 10 IP addresses that have permission to access the switch management
and to prevent unauthorized intruder
RFC-1213 MIB-II
RFC-2863 Interface MIB
SNMP MIBs
RFC-1493 Bridge MIB
RFC-2674 Extended Bridge MIB (Q-Bridge)
Private MIB
Standards Conformance
Regulation Compliance
FCC Part 15 Class A, CE
IEEE 802.3 10BASE-T
IEEE 802.3u 100BASE-TX/100BASE-FX
IEEE 802.3z Gigabit SX/LX
IEEE 802.3ab Gigabit 1000T
Standards Compliance
IEEE 802.3x Flow Control and Back pressure
IEEE 802.1d Spanning tree protocol
IEEE 802.1w Rapid spanning tree protocol
IEEE 802.1p Class of service
IEEE 802.1Q VLAN Tagging
IEEE 802.1x Port Authentication Network Control
17
User’s Manual of ISW-1022M Series and ISW-1033MT
2. Installation
In this paragraph, it will describe the Industrial Switch’s hardware spec, port, cabling information, and wiring installation.
2.1 Hardware Description
2.1.1 Physical Dimension
„ ISW-1022M / ISW-1022MT Managed Industrial Switch dimension (W x D x H) : 72mm x 105mm x 152mm
Figure 2-1 ISW-1022M panel layout
18
User’s Manual of ISW-1022M Series and ISW-1033MT
„ ISW-1022MPT Managed Industrial Switch dimension (W x D x H) : 72mm x 105mm x 152mm
Figure 2-2 ISW-1022MPT panel layout
19
User’s Manual of ISW-1022M Series and ISW-1033MT
„ ISW-1033MT Managed Industrial Switch dimension (W x D x H) : 72mm x 105mm x 152mm
Figure 2-3 ISW-1033MT panel layout
20
User’s Manual of ISW-1022M Series and ISW-1033MT
2.1.2 Front / Rear Panel
The Front Panel and Rear Panel of the ISW-1022M / ISW-1022MT Managed Industrial Switch are shown as below:
Figure 2-4 Front and Rear Panel of ISW-1022M
1. Model Name
9. 10/100/1000Base-T port
2. System Power: LED
10. 1000Base-SX/LX SFP slot
3. Ring Master: LED indicator
11. LED indicators for 1000Base-SX/LX ort
4. LED for power 1 input
12. 6-Pin Terminal Block
5. LED for power 2 input
13. Ground Screw
6. FAULT: LED indicator
14. Screw holes for Wall Mounting kit
7. RJ-45 type RS-232 Console
15. DIN-Rail Kit
8. 8 x 10/100Base-TX port
21
User’s Manual of ISW-1022M Series and ISW-1033MT
The Front Panel and Rear Panel of the ISW-1022MPT Managed Industrial Switch are shown as below:
Figure 2-5 Front and Rear Panel of ISW-1022MPT
1. Model Name
9. 10/100/1000Base-T port
2. System Power: LED
10. 1000Base-SX/LX SFP slot
3. Ring Master: LED indicator
11. LED indicators for 1000Base-SX/LX ort
4. LED for power 1 input
12. LED indicators for PoE power output
5. LED for power 2 input
13. 6-Pin Terminal Block
6. FAULT: LED indicator
14. Ground Screw
7. RJ-45 type RS-232 Console
15. Screw holes for Wall Mounting kit
8. 8 x 10/100Base-TX PoE port
16. DIN-Rail Kit
22
User’s Manual of ISW-1022M Series and ISW-1033MT
The Front Panel and Rear Panel of the ISW1033MT Managed Industrial Switch are shown as below:
Figure 2-6 Front and Rear Panel of ISW-1033MT
1. Model Name
9. 1000Base-SX/LX SFP slot (Port-7)
2. System Power: LED
10. 1000Base-SX/LX SFP slots (Port-9 / Port-10)
3. Ring Master: LED indicator
11. 10/100/1000Base-T ports (Port-9 / Port-10)
4. LED for power 1 input
12. 6-Pin Terminal Block
5. LED for power 2 input
13. Ground Screw
6. FAULT: LED indicator
14. Screw holes for Wall Mounting kit
7. RJ-45 type RS-232 Console
15. DIN-Rail Kit
8. 8 x 10/100Base-TX port
23
User’s Manual of ISW-1022M Series and ISW-1033MT
2.1.3 Top View
The top panel of the ISW-1022M series Managed Industrial Switch has one terminal block connector of two DC power
inputs and one fault alarm.
Figure 2-7 Top Panel of ISW-1022M / ISW-1022MT
Figure 2-7 Top Panel of ISW-1022MPT
24
User’s Manual of ISW-1022M Series and ISW-1033MT
The top panel of the ISW-1033MT Managed Industrial Switch has one terminal block connector of two DC power inputs
and one fault alarm. The other one terminal block is used for DIDO.
Figure 2-7 Top Panel of ISW-1033MT
2.1.4 LED Indicators
The diagnostic LEDs that provide real-time information of system and optional status are located on the front panel of the
ISW-1022M series. The following table provides the description of the LED status and their meanings for the Managed
Industrial Switch.
ISW-1022M / ISW-1022MT LED Indicators
„ System
LED
Color
PWR
Green
R.M.
PWR1
PWR2
FAULT
Status
Meaning
On
The switch unit is power on.
Off
No power.
On
The industrial switch is the master of X-Ring group.
Off
The industrial switch is not a ring master in X-Ring group.
On
Power 1 is active.
Off
Power 1 is inactive.
On
Power 2 is active.
Off
Power 2 is inactive.
On
Power or port failure.
Off
No failure.
Green
Green
Green
Red
25
User’s Manual of ISW-1022M Series and ISW-1033MT
„ 10/100Base-TX Ports – Port-1 to Port-8
LED
Color
Status
On
Green
Blinking
Meaning
A network device is detected.
The port is transmitting or receiving packets from the TX
device.
Port-1 ~
Off
No device attached.
Port-8
On
The port is operating in full-duplex mode.
Amber
Blinking
Off
Collision of Packets occurs.
The port is in half-duplex mode or no device is attached.
„ 10/100/1000Base-T / SFP combo interface - Port-9, Port-10
LED
Color
Status
On
Green
(Upper LED)
Blinking
Port 9, Port 10
(RJ-45)
Green
(Lower LED)
Link/Active
(P9, P10 SFP)
Green
Meaning
A network device is detected.
The port is transmitting or receiving packets from the TX
device.
Off
No device attached
On
1000M
Off
10/100M
On
The SFP port is linking
Blinking
Off
The port is transmitting or receiving packets from the TX
device.
No device attached
ISW-1033MT LED Indicators
„ System
LED
Color
PWR
Green
R.M.
Status
Meaning
On
The switch unit is power on.
Off
No power.
On
The industrial switch is the master of X-Ring group.
Off
The industrial switch is not a ring master in X-Ring group.
Green
26
User’s Manual of ISW-1022M Series and ISW-1033MT
PWR1
PWR2
FAULT
On
Power 1 is active.
Off
Power 1 is inactive.
On
Power 2 is active.
Off
Power 2 is inactive.
On
Power or port failure.
Off
No failure.
Green
Green
Red
„ 10/100Base-TX Ports – Port-1 to Port-6 and Port-8
LED
Color
Status
On
Green
Blinking
Meaning
A network device is detected.
The port is transmitting or receiving packets from the TX
device.
Port-1 ~ 6 &
Off
No device attached.
Port-8
On
The port is operating in full-duplex mode.
Amber
Blinking
Off
Collision of Packets occurs.
The port is in half-duplex mode or no device is attached.
„ 10/100/1000Base-T / SFP combo interface - Port-7, Port-9 and Port-10
LED
Color
Status
On
Green
Port 7, Port 9,
(Upper LED)
Port 10
Blinking
Meaning
A network device is detected.
The port is transmitting or receiving packets from the TX
device.
Off
No device attached
On
1000M
Off
10/100M
On
The SFP port is linking
(RJ-45)
Green
(Lower LED)
Link/Active
(P7, P9, P10
Green
Blinking
SFP)
Off
The port is transmitting or receiving packets from the TX
device.
No device attached
27
User’s Manual of ISW-1022M Series and ISW-1033MT
ISW-1022MPT LED Indicators
„ System
LED
Color
PWR
Green
R.M.
PWR1
PWR2
FAULT
Status
Meaning
On
The switch unit is power on.
Off
No power.
On
The industrial switch is the master of X-Ring group.
Off
The industrial switch is not a ring master in X-Ring group.
On
Power 1 is active.
Off
Power 1 is inactive.
On
Power 2 is active.
Off
Power 2 is inactive.
On
Power or port failure.
Off
No failure.
Green
Green
Green
Red
„ 10/100Base-TX Ports – Port-1 to Port-8
LED
Color
Status
On
Green
Blinking
Meaning
A network device is detected.
The port is transmitting or receiving packets from the TX
device.
Port-1 ~
Off
No device attached.
Port-8
On
The port is operating in full-duplex mode.
Amber
Blinking
Off
Collision of Packets occurs.
The port is in half-duplex mode or no device is attached.
„ PoE port link – Port-1 to Port-8
LED
FWD
(P1 to P8)
Color
Green
Status
Meaning
On
An IEEE 802.3af PoE power device is detected.
Off
No IEEE 802.3af PoE power device attached
28
User’s Manual of ISW-1022M Series and ISW-1033MT
„ 10/100/1000Base-T / SFP combo interface - Port-9, Port-10
LED
Color
Status
On
Green
(Upper LED)
Blinking
Port 9, Port 10
(RJ-45)
Green
(Lower LED)
Link/Active
(P9, P10 SFP)
Green
Meaning
A network device is detected.
The port is transmitting or receiving packets from the TX
device.
Off
No device attached
On
1000M
Off
10/100M
On
The SFP port is linking
Blinking
Off
The port is transmitting or receiving packets from the TX
device.
No device attached
29
User’s Manual of ISW-1022M Series and ISW-1033MT
2.2 Install the Switch
This section describes how to install your Managed Industrial Switch and make connections to the Managed Industrial
Switch. Please read the following topics and perform the procedures in the order being presented. To install your switch on
a desktop or shelf, simply complete the following steps.
In this paragraph, we will describe how to install the 8 10/100TX w/ Ring Managed Industrial Switch and the installation
points attended to it.
2.2.1 Installation Steps
1.
Unpack the Industrial switch
2.
Check if the DIN-Rail is screwed on the Industrial switch or not. If the DIN-Rail is not screwed on the Industrial
switch, please refer to DIN-Rail Mounting section for DIN-Rail installation. If users want to wall mount the Industrial
switch, please refer to Wall Mount Plate Mounting section for wall mount plate installation.
3.
To hang the Industrial switch on the DIN-Rail track or wall.
4.
Power on the Industrial switch. Please refer to the Wiring the Power Inputs section for knowing the information about
how to wire the power. The power LED on the Industrial switch will light up. Please refer to the LED Indicators section
for indication of LED lights.
5.
Prepare the twisted-pair, straight through Category 5 cable for Ethernet connection.
6.
Insert one side of RJ-45 cable (category 5) into the Industrial switch Ethernet port (RJ-45 port) and another side of
RJ-45 cable (category 5) to the network device’s Ethernet port (RJ-45 port), ex: Switch PC or Server. The UTP port
(RJ-45) LED on the Industrial switch will light up when the cable is connected with the network device. Please refer to
the LED Indicators section for LED light indication.
Make sure that the connected network devices support MDI/MDI-X. If it does not support,
use the crossover category-5 cable.
7.
When all connections are set and LED lights all show in normal, the installation is complete.
30
User’s Manual of ISW-1022M Series and ISW-1033MT
2.2.2 DIN-Rail Mounting
The DIN-Rail is screwed on the Industrial Switch when out of factory. If the DIN-Rail is not screwed on the Industrial
Switch, please see the following pictures to screw the DIN-Rail on the Switch. Follow the steps below to hang the
Industrial Switch.
Figure 2-8 Rear Panel – DIN-Rail Kit
1.
First, insert the top of DIN-Rail into the track.
Figure 2-9 DIN-Rail Mounting
31
User’s Manual of ISW-1022M Series and ISW-1033MT
2.
Then, lightly push the DIN-Rail into the track.
Figure 2-10 DIN-Rail mounting
3.
Check if the DIN-Rail is tightened on the track or not.
4.
To remove the industrial switch from the track, reverse above steps.
2.2.3 Wall Mount Plate Mounting
Follow the steps below to mount the Industrial Switch with wall mount plate.
1.
Remove the DIN-Rail from the Industrial Switch; loose the screws to remove the DIN-Rail.
2.
Place the wall mount plate on the rear panel of the Industrial Switch.
3.
Use the screws to screw the wall mount plate on the Industrial Switch.
4.
Use the hook holes at the corners of the wall mount plate to hang the Industrial Switch on the wall.
5.
To remove the wall mount plate, reverse the above steps.
Figure 2-11 Wall mounting
32
User’s Manual of ISW-1022M Series and ISW-1033MT
2.2.4 Wiring the Power Inputs
The 6-contact terminal block connector on the top panel of ISW-1022M series is used for two DC redundant power input.
Please follow the steps below to insert the power wire.
1. Insert positive / negative DC power wires into the contacts 1 and 2 for POWER 2, or 5 and 6 for POWER 1.
Figure 2-12 Wiring the redundant power inputs
2.
Tighten the wire-clamp screws for preventing the wires from loosing.
1
2
Power 2
+
3
4
5
6
Power 1
+
Figure 2-13 6-Pin Terminal Block power wiring input
The wire gauge for the terminal block should be in the range between 12 ~ 24 AWG.
33
User’s Manual of ISW-1022M Series and ISW-1033MT
2.2.5 Wiring the Fault Alarm Contact
The fault alarm contacts are in the middle of the terminal block connector as the picture shows below. Inserting the wires,
the Industrial Switch will detect the fault status of the power failure, or port link failure (available for managed model) and
then forms an open circuit. The following illustration shows an application example for wiring the fault alarm contacts.
Insert the wires into the fault alarm contacts
The wire gauge for the terminal block should be in the range between 12 ~ 24 AWG.
Figure 2-14 Power Fault Alarm trigger description
34
User’s Manual of ISW-1022M Series and ISW-1033MT
2.2.6 Wiring the Digital Inputs / Outputs (ISW-1033MT)
There is another terminal block comprising two sets of digital input/output contacts on the top side of ISW-1033MT. Please
refer to chapter 5.8 for how to configure Digital Input/Output. The following illustration shows the pin assignment of the
DIDO connector. Please note do not connect DO0/DO1 to the external device using power higher than 40V/200mA.
35
User’s Manual of ISW-1022M Series and ISW-1033MT
2.2.7 Installing the SFP transceiver
The sections describe how to insert an SFP transceiver into an SFP slot.
The SFP transceivers are hot-pluggable and hot-swappable. You can plug-in and out the transceiver to/from any SFP port
without having to power down the Industrial Switch. As the Figure 2-15 appears.
Figure 2-15 Plug-in the SFP transceiver
„
Approved PLANET SFP Transceivers
PLANET Industrial Switch supports both Single mode and Multi-mode SFP transceiver. The following list of approved
PLANET SFP transceivers is correct at the time of publication:
■ MGB-SX SFP (1000BASE-SX SFP transceiver / Multi-mode / 850nm / 220m~550m)
■ MGB-LX SFP (1000BASE-LX SFP transceiver / Single mode / 1310nm / 10km)
■ MGB-L30 SFP (1000BASE-LX SFP transceiver / Single mode / 1310nm / 30km)
■ MGB-L50 SFP (1000BASE-LX SFP transceiver / Single mode / 1310nm / 50km)
■ MGB-LA10 SFP (1000BASE-LX SFP transceiver / WDM Single mode / TX: 1310nm, RX: 1550nm/ 10km)
■ MGB-LB10 SFP (1000BASE-LX SFP transceiver / WDM Single mode / TX: 1550nm, RX: 1310nm / 10km)
It recommends using PLANET SFPs on the Managed Industrial Switch. If you insert a SFP
transceiver that is not supported, the Managed Industrial Switch will not recognize it.
Before connect the other switches, workstation or Media Converter.
1.
Make sure both side of the SFP transceiver are with the same media type, for example: 1000Base-SX to
1000Base-SX, 1000Bas-LX to 1000Base-LX.
2.
Check the fiber-optic cable type match the SFP transceiver model.
¾
To connect to 1000Base-SX SFP transceiver, use the Multi-mode fiber cable- with one side must be male
duplex LC connector type.
¾
To connect to 1000Base-LX SFP transceiver, use the Single-mode fiber cable-with one side must be male
duplex LC connector type.
36
User’s Manual of ISW-1022M Series and ISW-1033MT
„
Connect the fiber cable
1.
Attach the duplex LC connector on the network cable into the SFP transceiver.
2.
Connect the other end of the cable to a device – switches with SFP installed, fiber NIC on a workstation or a Media
Converter.
3.
Check the LNK/ACT LED of the SFP slot on the front of the Managed Industrial Switch. Ensure that the SFP
transceiver is operating correctly.
4.
Check the Link mode of the SFP port if the link failed. Co works with some fiber-NICs or Media Converters, set the
Link mode to “1000 Force” is needed.
Figure 2-16 LC fiber optical cable connects to the transceiver
„
Remove the transceiver module
1.
Make sure there is no network activity by consult or check with the network administrator. Or through the
management interface of the switch/converter (if available) to disable the port in advance.
2.
Remove the Fiber Optic Cable gently.
Figure 2-17 Pull out the SFP transceiver
37
User’s Manual of ISW-1022M Series and ISW-1033MT
3.
Turn the handle of the MGB module to horizontal.
4.
Pull out the module gently through the handle.
Figure 2-18 Pull out from the transceiver
Never pull out the module without pull the handle or the push bolts on the module. Direct pull
out the module with violent could damage the module and SFP module slot of the Managed
Industrial Switch.
38
User’s Manual of ISW-1022M Series and ISW-1033MT
3. Network Application
This chapter provides some sample applications to help user to have more actual idea of Industrial Switch function
application. A sample application of the industrial switch is as below:
„
Factory Redundant Ring Application
„
Transportation Networking and Public Wireless Service
39
User’s Manual of ISW-1022M Series and ISW-1033MT
3.1 Rapid Ring Application
The industrial Switch supports the Rapid Ring (X-Ring) protocol that can help the network system to recovery from
network connection failure within 20ms or less, and make the network system more reliable. The X-Ring algorithm is
similar to spanning tree protocol (STP) algorithm but its recovery time is faster than STP. The following figure is a sample
X-Ring application.
3.2 Coupling Ring Application
In the network, it may have more than one X-Ring group. By using the coupling ring function, it can connect each X-Ring
for the redundant backup. It can ensure the transmissions between two ring groups not to fail. The following figure is a
sample of coupling ring application.
40
User’s Manual of ISW-1022M Series and ISW-1033MT
3.3 Dual Homing Application
Dual Homing function is to prevent the connection lose from between X-Ring group and upper level/core switch. Assign
two ports to be the Dual Homing port that is backup port in the X-Ring group. The Dual Homing function only works when
the X-Ring function is active. Each X-Ring group only has one Dual Homing port.
In Dual Homing application architecture, the upper level switches need to enable the Rapid
Spanning Tree protocol.
41
User’s Manual of ISW-1022M Series and ISW-1033MT
4. Console Management
4.1 Connecting to the Console Port
The supplied cable which one end is RS-232 connector and the other end is RJ-45 connector. Attach the end of RS-232
connector to PC or terminal and the other end of RJ-45 connector to the console port of the switch. The connected
terminal or PC must support the terminal emulation program.
4.2 Pin Assignment
„
DB9 Pin Define for RJ-45 Connector
DB9-PIN
RJ-45 Connector
1
1
Orange/White
2
2
Orange
3
3
Green/White
4
4
Blue
5
5
Blue/White
6
6
Green
7
7
Brown/White
8
8
Brown
9
42
User’s Manual of ISW-1022M Series and ISW-1033MT
4.3 Login in the Console Interface
To configure the system, connect a serial cable to a COM port on a PC or notebook computer and to RJ-45 type serial
(console) port of the Managed Industrial Switch. The console port of the Managed Industrial Switch is DCE already, so
that you can connect the console port directly through PC without the need of Null Modem.
A terminal program is required to make the software connection to the ISW Managed Industrial Switch. Windows' Hyper
Terminal program may be a good choice. The Hyper Terminal can be accessed from the Start menu.
1.
Click START, then Programs, Accessories and then Hyper Terminal.
2.
When the following screen appears, make sure that the COM port should be configured as:
Baud Rate: 9600 bps
Data Bits: 8
Parity: none
Stop Bit: 1
Flow control: None
The settings of communication parameters
43
User’s Manual of ISW-1022M Series and ISW-1033MT
Once the terminal has connected to the device, power on the ISW Managed Industrial Switch, the terminal will display that
it is running testing procedures.
Then, the following message asks the login password. The factory default password as following and the login screen in
below figure appears.
User name: admin
Password: admin
Console login interface
1.
For security reason, please change and memorize the new password after this first setup.
2.
Only accept command in lowercase letter under console interface.
44
User’s Manual of ISW-1022M Series and ISW-1033MT
4.4 CLI Management
The system supports the console management—CLI command. After you log in on to the system, you will see a command
prompt. To enter CLI management interface, type in “enable” command.
CLI command interface
The following table lists the CLI commands and description.
45
User’s Manual of ISW-1022M Series and ISW-1033MT
4.5 Commands Level
Modes
Access Method
Prompt
Exit Method
About This Mode1
The user commands available
at the user level are a subset of
User EXEC
Begin a session
with your switch.
Enter logout or
switch>
quit.
those available at the
privileged level.
Use this mode to:
• Perform basic tests.
• Display system information.
The privileged command is the
advanced mode.
Enter the enable
Privileged
EXEC
command while in
switch#
User EXEC mode.
Enter disable to
Use this mode to
exit.
• Display advanced function
status
• Save configuration
Enter the configure
Global
Configuration
command while in
privileged EXEC
switch (config)#
mode.
Enter the vlan
while in privileged
Use this mode to configure
privileged EXEC
those parameters that are
mode, enter exit
going to be applied to your
or end
switch.
To exit to user
database command
VLAN database
To exit to
switch (vlan)#
EXEC mode,
enter exit.
EXEC mode.
Use this mode to configure
VLAN-specific parameters.
To exit to global
Enter the interface
configuration
of fast Ethernet
Interface
command (with a
switch
configuration
specific interface)
(config-if)#
while in global
mode, enter exit.
Use this mode to configure
To exit to
parameters for the switch and
privileged EXEC
Ethernet ports.
mode, enter exit
configuration mode.
or end.
46
User’s Manual of ISW-1022M Series and ISW-1033MT
5. Web-Based Management
This section introduces the configuration and functions of the Web-Based management.
5.1 About Web-based Management
The Managed Industrial Switch offers management features that allow users to manage the Managed Industrial Switch
from anywhere on the network through a standard browser such as Microsoft Internet Explorer.
The Web-Based Management supports Internet Explorer 6.0. It is based on Java Applets with an aim to reduce network
bandwidth consumption, enhance access speed and present an easy viewing screen.
By default, IE6.0 or later version does not allow Java Applets to open sockets. The user has to
explicitly modify the browser setting to enable Java Applets to use network ports.
The following screen based on ISW-1022M. For ISW-1022M series and ISW-1033MT, the WEB
UI display will be the same as ISW-1022M. The PoE function and Digital Inputs / Outputs function
will be described additional.
The Managed Industrial Switch can be configured through an Ethernet connection, make sure the manager PC must be
set on same the IP subnet address with the Managed Industrial Switch.
For example, the default IP address of the Managed Industrial Switch is 192.168.0.100, then the manager PC should be
set at 192.168.0.x (where x is a number between 1 and 254, except 100), and the default subnet mask is 255.255.255.0.
If you have changed the default IP address of the Managed Industrial Switch to 192.168.1.1 with subnet mask
255.255.255.0 via console, then the manager PC should be set at 192.168.1.x (where x is a number between 2 and 254)
to do the relative configuration on manager PC.
47
User’s Manual of ISW-1022M Series and ISW-1033MT
5.2 Requirements
•
Workstations of subscribers running Windows 98/ME, NT4.0, 2000/2003/XP, MAC OS9 or later, Linux, UNIX or other
platform compatible with TCP/IP protocols.
•
Workstation installed with Ethernet NIC (Network Card)
•
Ethernet Port connect
¾ Network cables - Use standard network (UTP) cables with RJ45 connectors.
¾ Above PC installed with WEB Browser and JAVA runtime environment Plug-in
It is recommended to use Internet Explore 6.0 or above to access ISW-1022M series and
ISW-1033MT Managed Industrial Switch.
5.3 Logging on the switch
1.
Use Internet Explorer 6.0 or above Web browser. Enter the factory-default IP address to access the Web interface.
The factory-default IP Address as following:
http://192.168.0.100
2.
When the following login screen appears, please enter the default username "admin" with password “admin” (or
the username/password you have changed via console) to login the main screen of Managed Industrial Switch. The
login screen in Figure 5-1 appears.
Figure 5-1 Login screen
48
User’s Manual of ISW-1022M Series and ISW-1033MT
Default User name: admin
Default Password: admin
3.
After entering the username and password, the main screen appears as Figure 5-2.
Figure 5-2 Default main page
4.
The Switch Menu on the left of the Web page let you access all the commands and statistics the Switch provides.
Now, you can use the Web management interface to continue the switch management or manage the Managed Industrial
Switch by Web interface. The Switch Menu on the left of the web page let you access all the commands and statistics the
Managed Industrial Switch provides.
1.
It is recommended to use Internet Explore 6.0 or above to access Managed Industrial
Switch.
2.
The changed IP address take effect immediately after click on the Save button, you need to
use the new IP address to access the Web interface.
3.
For security reason, please change and memorize the new password after this first setup.
4.
Only accept command in lowercase letter under web interface.
49
User’s Manual of ISW-1022M Series and ISW-1033MT
5.4 System
Use the System menu items to display and configure basic administrative details of the Managed Industrial Switch. Under
System the following topics are provided to configure and view the system information: This section has the following
items:
■ System Information
Provides basic system description, including contact information
■ IP Configuration
Sets the IP address for management access
■ DHCP Server
Configure the Switch as a DHCP server for assigning dynamic IP addresses
to devices on a network.
■ TFTP
Upgrade the firmware via TFTP server
Save/view the switch configuration to remote host
Upload the switch configuration from remote host
■ Fault Relay Alarm
Provides relay output for port breakdown, power fail
■ SNTP Configuration
Simple Network Time Protocol. Configures SNTP client settings, including
broadcast mode or a specified list of servers
■ IP Security
Supports 10 IP addresses that have permission to access the switch
management and to prevent unauthorized intruder.
■ User Authentication
Allows configuring the system user name and password required to access
the web pages or log in from CLI.
■ Factory Default
Reset the configuration of the Managed Industrial Switch
■ System Reboot
Restarts the switch
50
User’s Manual of ISW-1022M Series and ISW-1033MT
5.4.1 System Information
User can assign the system name, description, location and contact personnel to identify the switch. The version table
below is a read-only field to show the basic information of the switch.
Figure 5-3 Switch settings interface
The page includes the following fields:
Object
Description
System Name:
Assign the system name of the switch (The maximum length is 64 bytes)
System Description:
Describes the switch
System Location:
Assign the switch physical location (The maximum length is 64 bytes).
System Contact:
Enter the name of contact person or organization.
Firmware Version:
Displays the switch’s firmware version
Kernel Version:
Displays the kernel software version
MAC Address:
Displays the unique hardware address assigned by manufacturer (default)
51
User’s Manual of ISW-1022M Series and ISW-1033MT
5.4.2 IP Configuration
The switch is a network device which needs to be assigned an IP address for being identified on the network. Users have
to decide a means of assigning IP address to the switch.
Figure 5-4 IP configuration interface
The page includes the following fields:
Object
Description
Enable or disable the DHCP client function. When DHCP client function is
enabled, the switch will be assigned an IP address from the network DHCP
server. The default IP address will be replaced by the assigned IP address on
DHCP Client:
DHCP server. After the user clicks Apply, a popup dialog shows up to inform the
user that when the DHCP client is enabled, the current IP will lose and user
should find the new IP on the DHCP server.
Assign the IP address that the network is using. If DHCP client function is
enabled, this switch is configured as a DHCP client. The network DHCP server
IP Address:
will assign the IP address to the switch and display it in this column.
The default IP is 192.168.0.100 or the user has to assign an IP address
manually when DHCP Client is disabled.
Assign the subnet mask to the IP address. If DHCP client function is disabled,
Subnet Mask:
the user has to assign the subnet mask in this column field.
Assign the network gateway for the switch. If DHCP client function is disabled,
Gateway:
the user has to assign the gateway in this column field.
The default gateway is 192.168.0.1.
52
User’s Manual of ISW-1022M Series and ISW-1033MT
DNS1:
Assign the primary DNS IP address.
DNS2:
Assign the secondary DNS IP address.
5.4.3 DHCP Server
DHCP is the abbreviation of Dynamic Host Configuration Protocol that is a protocol for assigning dynamic IP
addresses to devices on a network. With dynamic addressing, a device can have a different IP address every time it
connects to the network. In some systems, the device's IP address can even change while it is still connected. DHCP also
supports a mix of static and dynamic IP addresses. Dynamic addressing simplifies network administration because the
software keeps track of IP addresses rather than requiring an administrator to manage the task. This means that a new
computer can be added to a network without the hassle of manually assigning it a unique IP address.
The system provides the DHCP server function. Having enabled the DHCP server function, the switch system will be
configured as a DHCP server.
5.4.3.1 System configuration
The Dynamic Host Configuration Protocol (DHCP) Server gives out IP addresses when a device is booting up and request
an IP to logged on to the network. It must be set as a DHCP client to obtain the IP address automatically.
Figure 5-5 DHCP Server Configuration interface
The page includes the following fields:
Object
Description
Enable or Disable the DHCP Server function. Enable—the switch will be the
DHCP Server:
DHCP server on your local network.
53
User’s Manual of ISW-1022M Series and ISW-1033MT
Type in an IP address. Low IP address is the beginning of the dynamic IP range.
Low IP Address:
For example, dynamic IP is in the range between 192.168.0.101 ~
192.168.0.200. In contrast, 192.168.0.101 is the Low IP address.
Type in an IP address. High IP address is the end of the dynamic IP range. For
High IP Address:
example, dynamic IP is in the range between 192.168.0.101 ~ 192.168.0.200. In
contrast, 192.168.0.200 is the High IP address.
Subnet Mask:
Type in the subnet mask of the IP configuration.
Gateway:
Type in the IP address of the gateway in your network.
DNS:
Type in the Domain Name Server IP Address in your network.
It is the time period that system will reset the dynamic IP assignment to ensure
Lease Time (sec):
the dynamic IP will not been occupied for a long time or the server doesn’t know
that the dynamic IP is idle.
5.4.3.2 Client Entries
When the DHCP server function is enabled, the system will collect the DHCP client information including the assigned IP
address, the MAC address of the client device, the IP assigning type, status and lease time.
Figure 5-6 DHCP Client Entries interface
The page includes the following fields:
Object
Description
• IP Addr
Specifies the Client's IP Address.
• Client ID
Specifies the Client's Hardware Address.
• Type
Specifies the Type of Binding: Dynamic / Manual.
• Lease
Specifies the Lease time left in seconds.
54
User’s Manual of ISW-1022M Series and ISW-1033MT
5.4.3.3 Port and IP Bindings
Assign the dynamic IP address bound with the port to the connected client. The user is allowed to fill each port column
with one particular IP address. When the device is connecting to the port and asks for IP assigning, the system will assign
the IP address bound with the port.
Figure 5-7 Port and IP Bindings interface
55
User’s Manual of ISW-1022M Series and ISW-1033MT
5.4.4 TFTP
It provides the functions allowing the user to update the switch firmware via the Trivial File Transfer Protocol (TFTP)
server. Before updating, make sure the TFTP server is ready and the firmware image is located on the TFTP server.
5.4.4.1 Update Firmware
Use this menu to download a file from specified TFTP server to the Managed Industrial Switch.
Figure 5-8 Update Firmware interface
The page includes the following fields:
Object
Description
TFTP Server IP Address:
Type in your TFTP server IP.
Firmware File Name:
Type in the name of the firmware image file to be updated.
5.4.4.2 Restore Configuration
You can restore a previous backup configuration from the TFTP server to recover the settings. Before doing that, you must
locate the image file on the TFTP server first and the Managed Industrial Switch will download back the flash image.
Figure 5-9 Restore Configuration interface
56
User’s Manual of ISW-1022M Series and ISW-1033MT
The page includes the following fields:
Object
Description
TFTP Server IP Address:
Type in the TFTP server IP.
Restore File Name:
Type in the correct file name for restoring.
5.4.4.3 Backup Configuration
You can back up the current configuration from flash ROM to the TFTP server for the purpose of recovering the
configuration later. It helps you to avoid wasting time on configuring the settings by backing up the configuration.
Figure 5-10 Backup Configuration interface
The page includes the following fields:
Object
Description
TFTP Server IP Address:
Type in the TFTP server IP.
Backup File Name:
Type in the file name.
57
User’s Manual of ISW-1022M Series and ISW-1033MT
5.4.5 System Event Log
This page allows the user to decide whether to send the system event log, and select the mode which the system event
log will be sent to client only, server only, or both client and server. What kind of event log will be issued to the
client/server depends on the selection on the Event Configuration tab. There are five types of event available to be
issued as the event log.
„
Device Cold Start
„
Device Warm Start
„
Authentication Failure
„
X-Ring Topology Change
„
Port Event
5.4.5.1 Syslog Configuration
The System Logs enable viewing device events in real time, and recording the events for later usage. System Logs record
and manage events and report errors or informational messages
Figure 5-11 Syslog Configuration interface
58
User’s Manual of ISW-1022M Series and ISW-1033MT
The page includes the following fields:
Object
Description
Select the system log mode—Client Only, Server Only, or Both.
„
Client Only: the system event log will only be sent to this interface of the
switch
Syslog Client Mode:
„
Server Only: the system log will only be sent to the remote system log
server with its IP assigned.
„
Both: the system event log will be sent to the remote server and this
interface.
System Log Server IP
When the ‘Syslog Mode’ item is set as Server Only/Both, the user has to assign
Address:
the system log server IP address to which the log will be sent.
5.4.5.2 System Event Log—SMTP Configuration
Simple Mail Transfer Protocol (SMTP) is the standard for email transmissions across the network. You can configure
the SMTP server IP, mail subject, sender, mail account, password, and the recipient email addresses which the e-mail
alert will send to. There are also five types of event—Device Cold Start, Device Warm Start, Authentication Failure,
X-Ring Topology Change, and Port Event—available to be issued as the e-mail alert. Besides, this function provides
the authentication mechanism including an authentication step through which the client effectively logs in to the SMTP
server during the process of sending e-mail alert.
Figure 5-12 SMTP Configuration interface
59
User’s Manual of ISW-1022M Series and ISW-1033MT
The page includes the following fields:
Object
Email Alert:
SMTP Server IP:
Sender:
Description
With this function being enabled, the user is allowed to configure the detail
settings for sending the e-mail alert to the SMTP server when the events occur.
Assign the mail server IP address (when Email Alert is enabled, this function will
then be available).
Type in an alias of the switch in complete email address format, e.g., to identify
where the e-mail alert comes from.
Having ticked this checkbox, the mail account, password and confirm password
Authentication:
column fields will then show up. Configure the email account and password for
authentication when this switch logs in to the SMTP server.
Mail Account:
Set up the email account, e.g. jack, to receive the email alert. It must be an
existing email account on the mail server.
Password:
Type in the password for the email account.
Confirm Password:
Reconfirm the password.
Rcpt e-mail Address 1 ~
You can also fill each of the column fields with up to 6 e-mail accounts to receive
6:
the email alert.
60
User’s Manual of ISW-1022M Series and ISW-1033MT
5.4.5.3 System Event Log—Event Configuration
Having ticked the Syslog/SMTP checkboxes, the event log/email alert will be sent to the system log server and the SMTP
server respectively. Also, Port event log/alert (link up, link down, and both) can be sent to the system log server/SMTP
server respectively by setting the trigger condition.
Figure 5-13 Event Configuration interface
The page includes the following fields:
Object
Description
There are 4 event types—Device Cold Start, Device Warm Start, Authentication
Failure, and X-ring Topology Change. The checkboxes are not available for
ticking unless the Syslog Client Mode on the Syslog Configuration tab and the
System event selection:
E-mail Alert on the SMTP Configuration tab are enabled first.
„ Device cold start: When the device executes cold start action, the system
will issue the event log/email alert to the system log/SMTP server
respectively.
61
User’s Manual of ISW-1022M Series and ISW-1033MT
„ Device warm start: When the device executes warm start, the system will
issue the event log/email alert to the system log/SMTP server respectively.
„ Authentication Failure: When the SNMP authentication fails, the system will
issue the event log/email alert to the system log/SMTP server respectively.
„ X-ring topology change: When the X-ring topology has changed, the
system will issue the event log/email alert to the system log/SMTP server
respectively.
Also, before the drop-down menu items are available, the Syslog Client Mode
selection item on the Syslog Configuration tab and the E-mail Alert selection
item on the SMTP Configuration tab must be enabled first. Those drop-down
menu items have 3 selections—Link UP, Link Down, and Link UP & Link
Down. Disable means no event will be sent to the system log/SMTP server.
Port event selection:
„ Link UP: The system will only issue a log message when the link-up event of
the port occurs.
„ Link Down: The system will only issue a log message when the link-down
event of port occurs.
„ Link UP & Link Down: The system will issue a log message at the time
when port connection is link-up and link-down.
5.4.6 Fault Relay Alarm
The Fault Relay Alarm function provides the Power Failure and Port Link Down/Broken detection. With both power input 1
and power input 2 installed and the check boxes of power 1/power 2 ticked, the FAULT LED indicator will then be possible
to light up when any one of the power failures occurs. As for the Port Link Down/Broken detection, the FAULT LED
indicator will light up when the port failure occurs; certainly the check box beside the port must be ticked first. Please refer
to the segment of ‘Wiring the Fault Alarm Contact’ for the failure detection.
Figure 5-14 Fault Relay Alarm interface
62
User’s Manual of ISW-1022M Series and ISW-1033MT
The page includes the following fields:
Object
Description
Tick the check box to enable the function of lighting up the FAULT LED on the
Power Failure:
panel when power fails.
Tick the check box to enable the function of lighting up FAULT LED on the panel
Port Link Down/Broken:
when Ports’ states are link down or broken.
5.4.7 SNTP Configuration
SNTP (Simple Network Time Protocol) is a simplified version of NTP which is an Internet protocol used to synchronize
the clocks of computers to some time reference. Because time usually just advances, the time on different node stations
will be different. With the communicating programs running on those devices, it would cause time to jump forward and
back, a non-desirable effect. Therefore, the switch provides comprehensive mechanisms to access national time and
frequency dissemination services, organize the time-synchronization subnet and the local clock in each participating
subnet peer.
Daylight saving time (DST) is the convention of advancing clocks so that afternoons have more daylight and mornings
have less. Typically clocks are adjusted forward one hour near the start of spring and are adjusted backward in autumn.
Figure 5-15 SNTP Configuration interface
The page includes the following fields:
Object
SNTP Client:
Description
Enable/disable SNTP function to get the time from the SNTP server.
63
User’s Manual of ISW-1022M Series and ISW-1033MT
This is used as a control switch to enable/disable daylight saving period and
daylight saving offset. Users can configure Daylight Saving Period and Daylight
Daylight Saving Time:
Saving Offset in a certain period time and offset time while there is no need to
enable daylight saving function. Afterwards, users can just set this item as enable
without assign Daylight Saving Period and Daylight Saving Offset again.
Universal Time, Coordinated. Set the switch location time zone. The following
UTC Timezone:
table lists the different location time zone for your reference.
Set the SNTP server IP address. You can assign a local network time server IP
SNTP Sever URL:
address or an internet time server IP address.
When the switch has successfully connected to the SNTP server whose IP
address was assigned in the column field of SNTP Server URL, the current
Switch Timer:
coordinated time is displayed here.
Set up the Daylight Saving beginning date/time and Daylight Saving ending
date/time. Please key in the value in the format of ‘YYYYMMDD’ and ‘HH:MM’
(leave a space between ‘YYYYMMDD’ and ‘HH:MM’).
Daylight Saving Period:
YYYYMMDD: an eight-digit year/month/day specification.
HH:MM: a five-digit (including a colon mark) hour/minute specification.
For example, key in ‘20070701 02:00’ and ‘20071104 02:04’ in the two column
fields respectively to represent that DST begins at 2:00 a.m. on March 11, 2007
and ends at 2:00 a.m. on November 4, 2007.
Daylight
Saving
Offset
(mins):
For non-US and European countries, specify the amount of time for day light
savings. Please key in the valid figure in the range of minute between 0 and 720,
which means you can set the offset up to 12 hours.
Local Time Zone
Conversion from UTC
Time at 12:00 UTC
November Time Zone
- 1 hour
11am
Oscar Time Zone
-2 hours
10 am
ADT - Atlantic Daylight
-3 hours
9 am
-4 hours
8 am
-5 hours
7 am
-6 hours
6 am
-7 hours
5 am
-8 hours
4 am
AST - Atlantic Standard
EDT - Eastern Daylight
EST - Eastern Standard
CDT - Central Daylight
CST - Central Standard
MDT - Mountain Daylight
MST - Mountain Standard
PDT - Pacific Daylight
PST - Pacific Standard
ADT - Alaskan Daylight
64
User’s Manual of ISW-1022M Series and ISW-1033MT
ALA - Alaskan Standard
-9 hours
3 am
HAW - Hawaiian Standard
-10 hours
2 am
Nome, Alaska
-11 hours
1 am
+1 hour
1 pm
EET - Eastern European, USSR Zone 1
+2 hours
2 pm
BT - Baghdad, USSR Zone 2
+3 hours
3 pm
ZP4 - USSR Zone 3
+4 hours
4 pm
ZP5 - USSR Zone 4
+5 hours
5 pm
ZP6 - USSR Zone 5
+6 hours
6 pm
WAST - West Australian Standard
+7 hours
7 pm
CCT - China Coast, USSR Zone 7
+8 hours
8 pm
JST - Japan Standard, USSR Zone 8
+9 hours
9 pm
+10 hours
10 pm
+12 hours
Midnight
CET - Central European
FWT - French Winter
MET - Middle European
MEWT - Middle European Winter
SWT - Swedish Winter
EAST - East Australian Standard GST
Guam Standard, USSR Zone 9
IDLE - International Date Line
NZST - New Zealand Standard
NZT - New Zealand
65
User’s Manual of ISW-1022M Series and ISW-1033MT
5.4.8 IP Security
IP security function allows the user to assign 10 specific IP addresses that have permission to manage the switch through
the http and telnet services for the securing switch management. The purpose of giving the limited IP addresses
permission is to allow only the authorized personnel/device can do the management task on the switch.
Figure 5-16 IP Security interface
The page includes the following fields:
Object
Description
Having set this selection item in the Enable mode, the Enable HTTP Server,
IP Security Mode:
Enable Telnet Server checkboxes and the ten security IP column fields will then
be available. If not, those items will appear in grey.
Having ticked this checkbox, the devices whose IP addresses match any one of
Enable HTTP Server:
the ten IP addresses in the Security IP1 ~ IP10 table will be given the permission
to access this switch via HTTP service.
Having ticked this checkbox, the devices whose IP addresses match any one of
Enable Telnet Server:
the ten IP addresses in the Security IP1 ~ IP10 table will be given the permission
to access this switch via telnet service.
The system allows the user to assign up to 10 specific IP addresses for access
Security IP 1 ~ 10:
security. Only these 10 IP addresses can access and manage the switch through
the HTTP/Telnet service once IP Security Mode is enabled.
66
User’s Manual of ISW-1022M Series and ISW-1033MT
Remember to execute the “Save Configuration” action, otherwise the new configuration
will lose when the switch powers off.
5.4.9 User Authentication
Change web management login user name and password for the management security issue.
Figure 5-17 User Authentication interface
The page includes the following fields:
Object
Description
Type in the new user name
User name:
The default user name is ‘admin’
Type in the new password
Password:
Confirm password:
The default is ‘admin’
Re-type the new password
67
User’s Manual of ISW-1022M Series and ISW-1033MT
5.5 Port Management
5.5.1 Port Statistics
The following chart provides the current statistic information which displays the real-time packet transfer status for each
port. The user might use the information to plan and implement the network, or check and find the problem when the
collision or heavy traffic occurs.
Figure 5-18 Port Statistics interface
The page includes the following fields:
Object
Description
Port:
The port number.
Type:
Displays the current speed of connection to the port.
Link:
The status of linking—‘Up’ or ‘Down’.
It’s set by Port Control. When the state is disabled, the port will not transmit or
State:
Tx Good Packet:
receive any packet.
The counts of transmitting good packets via this port.
The counts of transmitting bad packets (including undersize [less than 64 octets],
Tx Bad Packet:
Rx Good Packet:
oversize, CRC Align errors, fragments and jabbers packets) via this port.
The counts of receiving good packets via this port.
The counts of receiving good packets (including undersize [less than 64 octets],
Rx Bad Packet:
oversize, CRC error, fragments and jabbers) via this port.
Tx Abort Packet:
The aborted packet while transmitting.
Packet Collision:
The counts of collision packet.
Packet Dropped:
The counts of dropped packet.
68
User’s Manual of ISW-1022M Series and ISW-1033MT
Rx Bcast Packet:
The counts of broadcast packet.
Rx Mcast Packet:
The counts of multicast packet.
5.5.2 Port Control
In Port control you can configure the settings of each port to control the connection parameters, and the status of each
port is listed beneath.
Figure 5-19 Port Control interface
The page includes the following fields:
Object
Port:
State:
Description
Use the scroll bar and click on the port number to choose the port to be
configured.
Current port state. The port can be set to disable or enable mode. If the port state
is set as ‘Disable’, it will not receive or transmit any packet.
Auto and Force. Being set as Auto, the speed and duplex mode are negotiated
Negotiation:
automatically. When you set it as Force, you have to set the speed and duplex
mode manually.
69
User’s Manual of ISW-1022M Series and ISW-1033MT
Speed:
Duplex:
It is available for selecting when the Negotiation column is set as Force. When
the Negotiation column is set as Auto, this column is read-only.
It is available for selecting when the Negotiation column is set as Force. When
the Negotiation column is set as Auto, this column is read-only.
Whether or not the receiving node sends feedback to the sending node is
determined by this item. When enabled, once the device exceeds the input data
Flow Control:
rate of another device, the receiving device will send a PAUSE frame which halts
the transmission of the sender for a specified period of time. When disabled, the
receiving device will drop the packet if too much to process.
When the Security selection is set as ‘On’, any access from the device which
Security:
connects to this port will be blocked unless the MAC address of the device is
included in the static MAC address table. See the segment of MAC Address
Table—Static MAC Addresses.
5.5.3 Port Trunk
Port trunking is the combination of several ports or network cables to expand the connection speed beyond the limits of
any one single port or network cable. Link Aggregation Control Protocol (LACP), which is a protocol running on layer 2,
provides a standardized means in accordance with IEEE 802.3ad to bundle several physical ports together to form a
single logical channel. All the ports within the logical channel or so-called logical aggregator work at the same connection
speed and LACP operation requires full-duplex mode.
70
User’s Manual of ISW-1022M Series and ISW-1033MT
5.5.3.1 Aggregator setting
This section provides Port Trunk-Aggregator Setting of each port from the Switch, the screen in Figure 5-20 appears.
Figure 5-20 Port Trunk—Aggregator Setting interface (two ports are added to the left field with LACP
enabled)
The page includes the following fields:
Object
Description
A value which is used to identify the active LACP. The Managed Industrial
System Priority:
Switch with the lowest value has the highest priority and is selected as the active
LACP peer of the trunk group.
Group ID:
There are 13 trunk groups to be selected. Assign the "Group ID" to the trunk
group.
When enabled, the trunk group is using LACP. A port which joins an LACP trunk
group has to make an agreement with its member ports first. Please notice that a
trunk group, including member ports split between two switches, has to enable
LACP:
the LACP function of the two switches. When disabled, the trunk group is a static
trunk group. The advantage of having the LACP disabled is that a port joins the
trunk group without any handshaking with its member ports; but member ports
won’t know that they should be aggregated together to form a logic trunk group.
71
User’s Manual of ISW-1022M Series and ISW-1033MT
This column field allows the user to type in the total number of active port up to
four. With LACP static trunk group, e.g. you assign four ports to be the
members of a trunk group whose work ports column field is set as two; the
Work ports:
exceed ports are standby/redundant ports and can be aggregated if working
ports fail. If it is a static trunk group (non-LACP), the number of work ports must
equal the total number of group member ports.
5.5.3.2 Aggregator Information
When you had setup the LACP aggregator, you will see relation information in here.
„ LACP disabled
Having set up the aggregator setting with LACP disabled, you will see the local static trunk group information on the tab of
Aggregator Information.
Figure 5-21 Assigning 2 ports to a trunk group with LACP disabled
72
User’s Manual of ISW-1022M Series and ISW-1033MT
Figure 5-22 Static Trunking Group information
The page includes the following fields:
Object
Group Key:
Description
This is a read-only column field that displays the trunk group ID.
This is a read-only column field that displays the members of this static trunk
Port Member:
group.
„ LACP enabled
Having set up the aggregator setting with LACP enabled, you will see the trunking group information between two
switches on the tab of Aggregator Information.
„
Switch 1 configuration
1.
Set System Priority of the trunk group. The default is 1.
2.
Select a trunk group ID by pull down the drop-down menu bar.
3.
Enable LACP.
4.
Include the member ports by clicking the Add button after selecting the port number and the column field of
Work Ports changes automatically.
73
User’s Manual of ISW-1022M Series and ISW-1033MT
Figure 5-23 Aggregation Information of Switch 1
5.
Click on the tab of Aggregator Information to check the trunked group information as the illustration shown
above after the two switches configured.
„
Switch 2 configuration
6.
Set System Priority of the trunk group. For example: 32768.
7.
Select a trunk group ID by pull down the drop-down menu bar.
8.
Enable LACP.
9.
Include the member ports by clicking the Add button after selecting the port number and the column field of
Work Ports changes automatically.
74
User’s Manual of ISW-1022M Series and ISW-1033MT
Figure 5-24 Switch 2 configuration interface
10. Click on the tab of Aggregator Information to check the trunked group information as the illustration shown
above after the two switches configured.
Figure 5-25 Switch 1 Aggregator Information
75
User’s Manual of ISW-1022M Series and ISW-1033MT
5.5.3.3 State Activity
Having set up the LACP aggregator on the tab of Aggregator Setting, you can configure the state activity for the members
of the LACP trunk group. You can tick or cancel the checkbox beside the state label. When you remove the tick mark of
the port and click
Apply , the port state activity will change to Passive.
Figure 5-26 State Activity of Switch 1
The page includes the following fields:
Object
Description
Active:
The port automatically sends LACP protocol packets.
Passive:
The port does not automatically send LACP protocol packets, and responds only
if it receives LACP protocol packets from the opposite device.
Figure 5-27 State Activity of Switch 2
A link having two passive LACP nodes will not perform dynamic LACP trunk because both
ports are waiting for an LACP protocol packet from the opposite device.
76
User’s Manual of ISW-1022M Series and ISW-1033MT
5.5.4 Port Mirroring
The Port mirroring is a method for monitor traffic in switched networks. Traffic through ports can be monitored by one
specific port, which means traffic goes in or out monitored (source) ports will be duplicated into mirror (destination)
port.
Figure 5-28 Port Trunk – Port Mirroring interface
The page includes the following fields:
Object
Description
There is only one port can be selected to be destination (mirror) port for
Destination Port:
monitoring both RX and TX traffic which come from source port. Or, use one of
two ports for monitoring RX traffic only and the other one for TX traffic only. User
can connect mirror port to LAN analyzer or Netxray.
The ports that user wants to monitor. All monitored port traffic will be copied to
Source Port:
mirror (destination) port. User can select multiple source ports by checking the
RX or TX check boxes to be monitored.
77
User’s Manual of ISW-1022M Series and ISW-1033MT
5.5.5 Rate Limiting
You can set up every port’s bandwidth rate and frame limitation type.
„
Ingress Limit Frame type: select the frame type that wants to filter. There are four frame types for selecting:
¾
¾
¾
¾
All
Broadcast/Multicast/Flooded Unicast
Broadcast/Multicast
Broadcast only
Broadcast/Multicast/Flooded Unicast, Broadcast/Multicast and Bbroadcast only types are only for ingress
frames. The egress rate only supports All type.
Figure 5-29 Rate Limiting interface
„
All the ports support port ingress and egress rate control. For example, assume port 1 is 10Mbps, users can
set it’s effective egress rate is 1Mbps, ingress rate is 500Kbps. The switch performs the ingress rate by packet
counter to meet the specified rate
¾
¾
„
Ingress: Enter the port effective ingress rate (The default value is “0”).
Egress: Enter the port effective egress rate (The default value is “0”).
And then, click
Apply
to apply the settings
78
User’s Manual of ISW-1022M Series and ISW-1033MT
5.6 Protocol
This section has the following items:
5.6.1
VLAN
5.6.2
Rapid Spanning Tree Protocol
5.6.3
SNMP
5.6.4
QoS
5.6.5
IGMP Snooping
5.6.1 VLAN configuration
5.6.1.1 VLAN Overview
A Virtual LAN (VLAN) is a logical network grouping that limits the broadcast domain. It allows you to isolate network traffic
so only members of the VLAN receive traffic from the same VLAN members. Basically, creating a VLAN from a switch is
logically equivalent of reconnecting a group of network devices to another Layer 2 switch. However, all the network
devices are still plug into the same switch physically.
The Managed Industrial Switch supports IEEE 802.1Q (tagged-based) and Port-Base VLAN setting in web management
page. In the default configuration, VLAN support is “Disable”.
„ Port-based VLAN
Port-based VLAN limit traffic that flows into and out of switch ports. Thus, all devices connected to a port are members of
the VLAN(s) the port belongs to, whether there is a single computer directly connected to a switch, or an entire
department.
On port-based VLAN.NIC do not need to be able to identify 802.1Q tags in packet headers. NIC send and receive normal
Ethernet packets. If the packet's destination lies on the same segment, communications take place using normal Ethernet
protocols. Even though this is always the case, when the destination for a packet lies on another switch port, VLAN
considerations come into play to decide if the packet is dropped by the Switch or delivered.
„ IEEE 802.1Q VLANs
IEEE 802.1Q (tagged) VLAN are implemented on the Switch. 802.1Q VLAN require tagging, which enables them to span
the entire network (assuming all switches on the network are IEEE 802.1Q-compliant).
VLAN allow a network to be segmented in order to reduce the size of broadcast domains. All packets entering a VLAN will
only be forwarded to the stations (over IEEE 802.1Q enabled switches) that are members of that VLAN, and this includes
broadcast, multicast and unicast packets from unknown sources.
VLAN can also provide a level of security to your network. IEEE 802.1Q VLAN will only deliver packets between stations
that are members of the VLAN. Any port can be configured as either tagging or untagging:
„
The untagging feature of IEEE 802.1Q VLAN allows VLAN to work with legacy switches that don't recognize
VLAN tags in packet headers.
79
User’s Manual of ISW-1022M Series and ISW-1033MT
„
The tagging feature allows VLAN to span multiple 802.1Q-compliant switches through a single physical
connection and allows Spanning Tree to be enabled on all ports and work normally.
Some relevant terms:
Tagging - The act of putting 802.1Q VLAN information into the header of a packet.
Untagging - The act of stripping 802.1Q VLAN information out of the packet header.
„ 802.1Q VLAN Tags
The figure below shows the 802.1Q VLAN tag. There are four additional octets inserted after the source MAC address.
Their presence is indicated by a value of 0x8100 in the Ether Type field. When a packet's Ether Type field is equal to
0x8100, the packet carries the IEEE 802.1Q/802.1p tag. The tag is contained in the following two octets and consists of 3
bits of user priority, 1 bit of Canonical Format Identifier (CFI - used for encapsulating Token Ring packets so they can be
carried across Ethernet backbones), and 12 bits of VLAN ID (VID). The 3 bits of user priority are used by 802.1p. The VID
is the VLAN identifier and is used by the 802.1Q standard. Because the VID is 12 bits long, 4094 unique VLAN can be
identified.
The tag is inserted into the packet header making the entire packet longer by 4 octets. All of the information originally
contained in the packet is retained.
802.1Q Tag
User Priority
3 bits
TPID (Tag Protocol Identifier)
1 bits
Destination
Source
Address
Address
6 bytes
6 bytes
VLAN ID (VID)
12 bits
TCI (Tag Control Information)
2 bytes
Preamble
CFI
2 bytes
VLAN TAG
4 bytes
Ethernet
Type
2 bytes
Data
46-1517 bytes
FCS
4 bytes
The Ether Type and VLAN ID are inserted after the MAC source address, but before the original Ether Type/Length or
Logical Link Control. Because the packet is now a bit longer than it was originally, the Cyclic Redundancy Check (CRC)
must be recalculated.
80
User’s Manual of ISW-1022M Series and ISW-1033MT
Adding an IEEE802.1Q Tag
Original Ethernet
Dest. Addr.
Src. Addr.
Length/E. type
Dest. Addr.
Src. Addr.
E. type
Data
Tag
Old CRC
Length/E. type
Data
New CRC
New Tagged Packet
Priority
CFI
VLAN ID
„ Port VLAN ID
Packets that are tagged (are carrying the 802.1Q VID information) can be transmitted from one 802.1Q compliant network
device to another with the VLAN information intact. This allows 802.1Q VLAN to span network devices (and indeed, the
entire network – if all network devices are 802.1Q compliant).
Every physical port on a switch has a PVID. 802.1Q ports are also assigned a PVID, for use within the switch. If no VLAN
are defined on the switch, all ports are then assigned to a default VLAN with a PVID equal to 1. Untagged packets are
assigned the PVID of the port on which they were received. Forwarding decisions are based upon this PVID, in so far as
VLAN are concerned. Tagged packets are forwarded according to the VID contained within the tag. Tagged packets are
also assigned a PVID, but the PVID is not used to make packet forwarding decisions, the VID is.
Tag-aware switches must keep a table to relate PVID within the switch to VID on the network. The switch will compare the
VID of a packet to be transmitted to the VID of the port that is to transmit the packet. If the two VID are different the switch
will drop the packet. Because of the existence of the PVID for untagged packets and the VID for tagged packets,
tag-aware and tag-unaware network devices can coexist on the same network.
A switch port can have only one PVID, but can have as many VID as the switch has memory in its VLAN table to store
them.
Because some devices on a network may be tag-unaware, a decision must be made at each port on a tag-aware device
before packets are transmitted – should the packet to be transmitted have a tag or not? If the transmitting port is
connected to a tag-unaware device, the packet should be untagged. If the transmitting port is connected to a tag-aware
device, the packet should be tagged.
„ Default VLANs
The Switch initially configures one VLAN, VID = 1, called "default." The factory default setting assigns all ports on the
Switch to the "default". As new VLAN are configured in Port-based mode, their respective member ports are removed
from the "default."
81
User’s Manual of ISW-1022M Series and ISW-1033MT
1
No matter what basis is used to uniquely identify end nodes and assign these nodes
VLAN membership, packets cannot cross VLAN without a network device performing a
routing function between the VLAN.
2
The Switch supports Port-based VLAN and IEEE 802.1Q VLAN. The port untagging
function can be used to remove the 802.1 tag from packet headers to maintain
compatibility with devices that are tag-unaware.
5.6.1.2 VLAN Configuration
A Virtual LAN (VLAN) is a logical network grouping that limits the broadcast domain. It allows you to isolate network traffic
so only members of the VLAN receive traffic from the same VLAN members. Basically, creating a VLAN from a switch is
logically equivalent of reconnecting a group of network devices to another Layer 2 switch. However, all the network
devices are still plug into the same switch physically.
The Industrial Switch supports Port-based, 802.1Q (Tagged-based) and GVRP VLAN in web management page. In the
default configuration, VLAN support is “Disable”.
Figure 5-30 VLAN Configuration interface
5.6.1.3 Port-based VLAN
A port-based VLAN basically consists of its members—ports, which means the VLAN is created by grouping the selected
ports. This method provides the convenience for users to configure a simple VLAN easily without complicated steps.
Packets can go among only members of the same VLAN group. Note all unselected ports are treated as belonging to
another single VLAN. If the port-based VLAN enabled, the VLAN-tagging is ignored. The port-based VLAN function allows
the user to create separate VLANs to limit the unnecessary packet flooding; however, for the purpose of sharing resource,
a single port called a common port can belongs to different VLANs, which all the member devices (ports) in different
VLANs have the permission to access the common port while they still cannot communicate with each other in different
VLANs.
82
User’s Manual of ISW-1022M Series and ISW-1033MT
Figure 5-31 VLAN – Port Based interface
„
Pull down the selection item and focus on Port Based then press
Apply
to set the VLAN Operation
Mode in Port Based mode.
Add
Click
to add a new VLAN group (The maximum VLAN groups are up to 64).
Figure 5-32 VLAN—Port Based Add interface
„
Enter the group name and VLAN ID. Add the selected port number into the right field to group these members
to be a VLAN group, or remove any of them listed in the right field from the VLAN.
„
And then, click
„
You will see the VLAN list displays.
Apply
to have the configuration take effect.
83
User’s Manual of ISW-1022M Series and ISW-1033MT
Figure 5-33 VLAN—Port Based Edit/Delete interface
„
Use
Delete
„
Use
Edit
to delete the VLAN.
to modify group name, VLAN ID, or add/remove the members of the existing VLAN group.
Remember to execute the “Save Configuration” action, otherwise the new configuration will
lose when switch power off.
5.6.1.4 802.1Q VLAN
Virtual Local Area Network (VLAN) can be implemented on the Industrial Switch to logically create different broadcast
domain.
When the 802.1Q VLAN function is enabled, all ports on the switch belong to default VLAN of VID 1, which means they
logically are regarded as members of the same broadcast domain. The valid VLAN ID is in the range of number between 1
and 4094. The amount of VLAN groups is up to 256 including default VLAN that cannot be deleted.
Each member port of 802.1Q is on either an Access Link (no VLAN-tagged) or a Trunk Link (VLAN-tagged). All frames
on an Access Link carry no VLAN identification. Conversely, all frames on a Trunk Link are VLAN-tagged. Besides, there
is the third mode—Hybrid. A Hybrid Link can carry both VLAN-tagged frames and untagged frames. A single port is
supposed to belong to one VLAN group, except it is on a Trunk/Hybrid Link.
The technique of 802.1Q tagging inserts a 4-byte tag, including VLAN ID of the destination port—PVID, in the frame. With
the combination of Access/Trunk/Hybrid Links, the communication across switches also can make the packet sent through
tagged and untagged ports.
84
User’s Manual of ISW-1022M Series and ISW-1033MT
„ 802.1Q VLAN Port Configuration
This page is used for configuring the Industrial Switch port VLAN. The VLAN per Port Configuration page contains fields
for managing ports that are part of a VLAN. The port default VLAN ID (PVID) is configured on the VLAN Port Configuration
page. All untagged packets arriving to the device are tagged by the ports PVID.
Understand nomenclature of the Switch
■ IEEE 802.1Q Tagged and Untagged
Every port on an 802.1Q compliant switch can be configured as tagged or untagged.
• Tagged
Ports with tagging enabled will put the VID number, priority and other VLAN information into the
header of all packets that flow into those ports. If a packet has previously been tagged, the port
(Trunk Link)
will not alter the packet, thus keeping the VLAN information intact. The VLAN information in the
tag can then be used by other 802.1Q compliant devices on the network to make
packet-forwarding decisions.
• Untgged
Ports with untagging enabled will strip the 802.1Q tag from all packets that flow into those
(Access Link) ports. If the packet doesn't have an 802.1Q VLAN tag, the port will not alter the packet. Thus,
all packets received by and forwarded by an untagging port will have no 802.1Q VLAN
information. (Remember that the PVID is only used internally within the Switch). Untagging is
used to send packets from an 802.1Q-compliant network device to a non-compliant network
device.
Frame Income
Income Frame is tagged
Income Frame is untagged
Leave port is tagged
Frame remains tagged
Tag is inserted
Leave port is untagged
Tag is removed
Frame remain untagged
Frame Leave
Here pay attention to the explaining of “Access”, “Trunk” and “Hybrid”.
。
Access: Ports will strip the 802.1Q tag from all packets that out of those ports. If the packet doesn’t have an 802.1Q
VLAN tag, the port will not alter the packet. Thus, all packets received by and forwarded by an untagging port will
have no 802.1Q VLAN information. Untagging is used to send packets from an 802.1Q-compliant network device to
a non-compliant network device.
Ports with “Access” mode belong to a single untagged VLAN.
。
Trunk: Ports with tagging enabled will put the VID number, priority and other VLAN information into the header of all
packets that out of those ports. If a packet has previously been tagged, the port will not alter the packet, thus
keeping the VLAN information intact. The VLAN information in the tag can then be used by other 802.1Q compliant
devices on the network to make packet forwarding decisions.
85
User’s Manual of ISW-1022M Series and ISW-1033MT
。
Hybrid: The port belongs to VLANs, and each VLAN is user-defined as tagged or untagged (full 802.1Q mode).
Ports will strip the 802.1Q tag from all packets that out of those ports.
Port Mode
Access Link
VLAN Membership
Frame Leave
Untagged
Belongs to a single untagged VLAN
( Tag=PVID be removed)
Tagged
Allowed to belongs to multiple Tagged
Trunk Link
VLANs at the same time
(Tag=PVID or Original VID be remained)
Allowed to belongs to multiple untagged
Hybrid Link
VLANs at the same time
Untagged by specify VID
The 802.1Q VLAN Port Configuration screenshot as below:
Figure 5-34 802.1Q VLAN mode
The page includes the following fields:
Object
Description
GVRP (GARP VLAN Registration Protocol) is a protocol that facilitates control
Enable GVRP Protocol:
of virtual local area networks (VLANs) within a larger network. GVRP conforms to
the IEEE 802.1Q specification, which defines a method of tagging frames with
86
User’s Manual of ISW-1022M Series and ISW-1033MT
VLAN configuration data. This allows network devices to dynamically exchange
VLAN configuration information with other devices.
For example, having enabled GVRP on two switches, they are able to
automatically exchange the information of their VLAN database. Therefore, the
user doesn’t need to manually configure whether the link is trunk or hybrid, the
packets belonging to the same VLAN can communicate across switches. Tick
this checkbox to enable GVRP protocol. This checkbox is available while the
VLAN Operation Mode is in 802.1Q mode.
Only when the VLAN members, whose Untagged VID (PVID) equals to the value
Management VLAN ID:
in this column, will have the permission to access the switch. The default value is
‘0’ that means this limit is not enabled (all members in different VLANs can
access this switch).
There are 3 types of link type.
Access Link:
A segment which provides the link path for one or more stations to the
VLAN-aware device. An Access Port (untagged port), connected to the access
link, has an untagged VID (also called PVID). After an untagged frame gets
into the access port, the switch will insert a four-byte tag in the frame. The
contents of the last 12-bit of the tag is untagged VID. When this frame is sent
out through any of the access port of the same PVID, the switch will remove
the tag from the frame to recover it to what it was. Those ports of the same
untagged VID are regarded as the same VLAN group members.
Trunk Link:
Link Type:
A segment which provides the link path for one or more VLAN-aware devices
(switches). A Trunk Port, connected to the trunk link, has an understanding of
tagged frame, which is used for the communication among VLANs across
switches. Which frames of the specified VIDs will be forwarded depends on the
values filled in the Tagged VID column field. Please insert a comma between
two VIDs.
Hybrid Link:
A segment which consists of Access and Trunk links. The hybrid port has both
the features of access and trunk ports. A hybrid port has a PVID belonging to a
particular VLAN, and it also forwards the specified tagged-frames for the
purpose of VLAN communication across switches.
Untagged VID:
Tagged VID:
This column field is available when Link Type is set as Access Link and Hybrid
Link. Assign a number in the range between 1 an 4094.
This column field is available when Link Type is set as Trunk Link and Hybrid
Link. Assign a number in the range between 1 an 4094.
87
User’s Manual of ISW-1022M Series and ISW-1033MT
Access Link
Because the access port doesn’t have an understanding of tagged frame, the column field of
Tagged VID is not available.
Trunk Link
1.
A trunk port doesn’t insert tag into an untagged frame, and therefore the untagged VID
column field is not available.
2.
It’s not necessary to type ‘1’ in the tagged VID. The trunk port will forward the frames of
VLAN 1.
3.
The trunk port has to be connected to a trunk/hybrid port of the other switch. Both the
tagged VID of the two ports have to be the same.
Hybrid Link
1.
It’s not necessary to type ‘1’ in the tagged VID. The hybrid port will forward the frames of
VLAN 1.
2.
The trunk port has to be connected to a trunk/hybrid port of the other switch. Both the
tagged VID of the two ports have to be the same.
„
Pull down the selection item and focus on 802.1Q then press
Apply
to set the VLAN Operation Mode in
802.1Q mode
„
You can see the link type, untagged VID, and tagged VID information of each port in the table below on the
screen.
Figure 5-35 802.1Q VLAN interface
88
User’s Manual of ISW-1022M Series and ISW-1033MT
„ Group Configuration
Edit the existing VLAN Group.
„
Select the VLAN group in the table list.
„
Click
Edit
.
Figure 5-36 Group Configuration interface
„
You can modify the VLAN group name and VLAN ID.
Figure 5-37 Group Configuration interface
„
Click Apply
.
89
User’s Manual of ISW-1022M Series and ISW-1033MT
5.6.2 Rapid Spanning Tree
The Rapid Spanning Tree Protocol (RSTP) is an evolution of the Spanning Tree Protocol and provides for faster
spanning tree convergence after a topology change. The system also supports STP and the system will auto-detect the
connected device that is running STP or RSTP protocol.
5.6.2.1 Theory
The Spanning Tree protocol can be used to detect and disable network loops, and to provide backup links between
switches, bridges or routers. This allows the switch to interact with other bridging devices in your network to ensure that
only one route exists between any two stations on the network, and provide backup links which automatically take over
when a primary link goes down. The spanning tree algorithms supported by this switch include these versions:
„
STP – Spanning Tree Protocol (IEEE 802.1D)
„
RSTP – Rapid Spanning Tree Protocol (IEEE 802.1w)
The IEEE 802.1D Spanning Tree Protocol and IEEE 802.1W Rapid Spanning Tree Protocol allow for the blocking of
links between switches that form loops within the network. When multiple links between switches are detected, a primary
link is established. Duplicated links are blocked from use and become standby links. The protocol allows for the duplicate
links to be used in the event of a failure of the primary link. Once the Spanning Tree Protocol is configured and enabled,
primary links are established and duplicated links are blocked automatically. The reactivation of the blocked links (at the
time of a primary link failure) is also accomplished automatically without operator intervention.
This automatic network reconfiguration provides maximum uptime to network users. However, the concepts of the
Spanning Tree Algorithm and protocol are a complicated and complex subject and must be fully researched and
understood. It is possible to cause serious degradation of the performance of the network if the Spanning Tree is
incorrectly configured. Please read the following before making any changes from the default values.
The Switch STP performs the following functions:
„
Creates a single spanning tree from any combination of switching or bridging elements.
„
Creates multiple spanning trees – from any combination of ports contained within a single switch, in user
specified groups.
„
Automatically reconfigures the spanning tree to compensate for the failure, addition, or removal of any
element in the tree.
„
Reconfigures the spanning tree without operator intervention.
Bridge Protocol Data Units
For STP to arrive at a stable network topology, the following information is used:
„
The unique switch identifier
„
The path cost to the root associated with each switch port
„
The por tidentifier
STP communicates between switches on the network using Bridge Protocol Data Units (BPDUs). Each BPDU contains
the following information:
„
The unique identifier of the switch that the transmitting switch currently believes is the root switch
90
User’s Manual of ISW-1022M Series and ISW-1033MT
„
The path cost to the root from the transmitting port
„
The port identifier of the transmitting port
The switch sends BPDUs to communicate and construct the spanning-tree topology. All switches connected to the LAN on
which the packet is transmitted will receive the BPDU. BPDUs are not directly forwarded by the switch, but the receiving
switch uses the information in the frame to calculate a BPDU, and, if the topology changes, initiates a BPDU transmission.
The communication between switches via BPDUs results in the following:
„
One switch is elected as the root switch
„
The shortest distance to the root switch is calculated for each switch
„
A designated switch is selected. This is the switch closest to the root switch through which packets will be
forwarded to the root.
„
A port for each switch is selected. This is the port providing the best path from the switch to the root switch.
„
Ports included in the STP are selected.
Creating a Stable STP Topology
It is to make the root port a fastest link. If all switches have STP enabled with default settings, the switch with the lowest
MAC address in the network will become the root switch. By increasing the priority (lowering the priority number) of the
best switch, STP can be forced to select the best switch as the root switch.
When STP is enabled using the default parameters, the path between source and destination stations in a switched
network might not be ideal. For instance, connecting higher-speed links to a port that has a higher number than the
current root port can cause a root-port change.
STP Port States
The BPDUs take some time to pass through a network. This propagation delay can result in topology changes where a
port that transitioned directly from a Blocking state to a Forwarding state could create temporary data loops. Ports must
wait for new network topology information to propagate throughout the network before starting to forward packets. They
must also wait for the packet lifetime to expire for BPDU packets that were forwarded based on the old topology. The
forward delay timer is used to allow the network topology to stabilize after a topology change. In addition, STP specifies a
series of states a port must transition through to further ensure that a stable network topology is created after a topology
change.
Each port on a switch using STP exists is in one of the following five states:
„
Blocking – the port is blocked from forwarding or receiving packets
„
Listening – the port is waiting to receive BPDU packets that may tell the port to go back to the blocking state
„
Learning – the port is adding addresses to its forwarding database, but not yet forwarding packets
„
Forwarding – the port is forwarding packets
„
Disabled – the port only responds to network management messages and must return to the blocking state
first
91
User’s Manual of ISW-1022M Series and ISW-1033MT
A port transitions from one state to another as follows:
„
From initialization (switch boot) to blocking
„
From blocking to listening or to disabled
„
From listening to learning or to disabled
„
From learning to forwarding or to disabled
„
From forwarding to disabled
„
From disabled to blocking
Switch
Blocking
Listening
Disable
Learning
Forwarding
Figure 5-38 STP Port State Transitions
You can modify each port state by using management software. When you enable STP, every port on every switch in the
network goes through the blocking state and then transitions through the states of listening and learning at power up. If
properly configured, each port stabilizes to the forwarding or blocking state. No packets (except BPDUs) are forwarded
from, or received by, STP enabled ports until the forwarding state is enabled for that port.
5.6.2.2 RSTP Parameters
RSTP Operation Levels
The Switch allows for two levels of operation: the switch level and the port level. The switch level forms a spanning tree
consisting of links between one or more switches. The port level constructs a spanning tree consisting of groups of one or
more ports. The RSTP operates in much the same way for both levels.
On the switch level, RSTP calculates the Bridge Identifier for each switch and then sets the Root
Bridge and the Designated Bridges.
On the port level, RSTP sets the Root Port and the Designated Ports.
92
User’s Manual of ISW-1022M Series and ISW-1033MT
The following are the user-configurable RSTP parameters for the switch level:
Parameter
Description
Default Value
Bridge Identifier(Not user
A combination of the User-set priority and
32768 + MAC
configurable
the switch’s MAC address.
except by setting priority
The Bridge Identifier consists of two parts:
below)
a 16-bit priority and a 48-bit Ethernet MAC
address 32768 + MAC
A relative priority for each switch – lower
Priority
32768
numbers give a higher priority and a greater
chance of a given switch being elected as
the root bridge
The length of time between broadcasts of
Hello Time
2 seconds
the hello message by the switch
Measures the age of a received BPDU for a
Maximum Age Timer
20 seconds
port and ensures that the BPDU is discarded
when its age exceeds the value of the
maximum age timer.
The amount time spent by a port in the
Forward Delay Timer
15 seconds
learning and listening states waiting for a
BPDU that may return the port to the
blocking state.
The following are the user-configurable RSTP parameters for the port or port group level:
Variable
Description
Default Value
Port Priority
A relative priority for each
128
port –lower numbers give a higher priority
and a greater chance of a given port being
elected as the root port
Port Cost
A value used by RSTP to evaluate paths –
200,000-100Mbps Fast Ethernet ports
STP calculates path costs and selects the
20,000-1000Mbps Gigabit Ethernet
path with the minimum cost as the active
ports
path
0 - Auto
Default Spanning-Tree Configuration
Feature
Default Value
Enable state
RSTP disabled for all ports
Port priority
128
Port cost
0
Bridge Priority
32,768
93
User’s Manual of ISW-1022M Series and ISW-1033MT
User-Changeable STA Parameters
The Switch’s factory default setting should cover the majority of installations. However, it is advisable to keep the default
settings as set at the factory; unless, it is absolutely necessary. The user changeable parameters in the Switch are as
follows:
Priority – A Priority for the switch can be set from 0 to 65535. 0 is equal to the highest Priority.
Hello Time – The Hello Time can be from 1 to 10 seconds. This is the interval between two transmissions of BPDU
packets sent by the Root Bridge to tell all other Switches that it is indeed the Root Bridge. If you set a Hello Time for your
Switch, and it is not the Root Bridge, the set Hello Time will be used if and when your Switch becomes the Root Bridge.
The Hello Time cannot be longer than the Max. Age. Otherwise, a configuration error will
occur.
Max. Age – The Max Age can be from 6 to 40 seconds. At the end of the Max Age, if a BPDU has still not been received
from the Root Bridge, your Switch will start sending its own BPDU to all other Switches for permission to become the Root
Bridge. If it turns out that your Switch has the lowest Bridge Identifier, it will become the Root Bridge.
Forward Delay Timer – The Forward Delay can be from 4 to 30 seconds. This is the time any port on the
Switch spends in the listening state while moving from the blocking state to the forwarding state.
Observe the following formulas when setting the above parameters:
Max. Age _ 2 x (Forward Delay - 1 second)
Max. Age _ 2 x (Hello Time + 1 second)
Port Priority – A Port Priority can be from 0 to 240. The lower the number, the greater the probability the port will be
chosen as the Root Port.
Port Cost – A Port Cost can be set from 0 to 200000000. The lower the number, the greater the probability the port will be
chosen to forward packets.
5.6 2.3 Illustration of STP
A simple illustration of three switches connected in a loop is depicted in the below diagram. In this example, you can
anticipate some major network problems if the STP assistance is not applied.
If switch A broadcasts a packet to switch B, switch B will broadcast it to switch C, and switch C will broadcast it to back to
switch A and so on. The broadcast packet will be passed indefinitely in a loop, potentially causing a network failure. In this
example, STP breaks the loop by blocking the connection between switch B and C. The decision to block a particular
connection is based on the STP calculation of the most current Bridge and Port settings.
Now, if switch A broadcasts a packet to switch C, then switch C will drop the packet at port 2 and the broadcast will end
there. Setting-up STP using values other than the defaults, can be complex. Therefore, you are advised to keep the
default factory settings and STP will automatically assign root bridges/ports and block loop connections. Influencing STP
to choose a particular switch as the root bridge using the Priority setting, or influencing STP to choose a particular port to
94
User’s Manual of ISW-1022M Series and ISW-1033MT
block using the Port Priority and Port Cost settings is, however, relatively straight forward.
LAN 1
Portcast = 19
A
Port 3
Bridge ID = 15
Port 1
Port 2
Portcast = 4
Portcast = 4
Portcast = 4
B
Portcast = 4
C
Port 1
Port 1
Bridge ID = 30
Port 2
Bridge ID = 20
Port 3
Portcast = 19
Port 2
Portcast = 19
Port 3
Portcast = 19
LAN 2
LAN 3
Figure 5-39 Before Applying the STA Rules
In this example, only the default STP values are used.
LAN 1
A
Port 3
Root Bridge
Port 1
Port 2
Designated Port
Designated Port
Root Port
B
Root Port
C
Port 1
Port 1
Designated Bridge
Port 2
Port 3
Blocked
Port 2
LAN 2
Port 3
LAN 3
Figure 5-40 After Applying the STA Rules
The switch with the lowest Bridge ID (switch C) was elected the root bridge, and the ports were selected to give a high port
cost between switches B and C. The two (optional) Gigabit ports (default port cost = 4) on switch A are connected to one
(optional) Gigabit port on both switch B and C. The redundant link between switch B and C is deliberately chosen as a 100
95
User’s Manual of ISW-1022M Series and ISW-1033MT
Mbps Fast Ethernet link (default port cost = 19). Gigabit ports could be used, but the port cost should be increased from
the default to ensure that the link between switch B and switch C is the blocked link.
5.6.2.4 RSTP System Configuration
This section provides RSTP-System Configuration from the Switch, the screen in Figure 5-41 appears.
„
The user can view spanning tree information of Root Bridge.
„
The user can modify RSTP state. After modification, click
Apply .
Figure 5-41 RSTP System Configuration interface
The page includes the following fields:
Object
RSTP mode:
Description
The user must enable the RSTP function first before configuring the related
parameters.
96
User’s Manual of ISW-1022M Series and ISW-1033MT
The switch with the lowest value has the highest priority and is selected as the
Priority (0-61440):
root. If the value is changed, the user must reboot the switch.
The value must be a multiple of 4096 according to the protocol standard rule.
The number of seconds a switch waits without receiving Spanning-tree Protocol
Max Age (6-40):
configuration messages before attempting a reconfiguration.
Enter a value between 6 through 40.
The time that controls the switch to send out the BPDU packet to check RSTP
Hello Time (1-10):
current status.
Enter a value between 1 through 10.
The number of seconds a port waits before changing from its Rapid
Forward Delay Time
Spanning-Tree Protocol learning and listening states to the forwarding state.
(4-30):
Enter a value between 4 through 30.
Follow the rule as below to configure the MAX Age, Hello Time, and Forward Delay Time.
2 x (Forward Delay Time value –1) > = Max Age value >= 2 x (Hello Time value +1)
97
User’s Manual of ISW-1022M Series and ISW-1033MT
5.6.2.5 Port Configuration
This web page provides the port configuration interface for RSTP. You can assign higher or lower priority to each port.
Rapid spanning tree will have the port with the higher priority in forwarding state and block other ports to make certain that
there is no loop in the LAN.
Figure 5-42 RSTP Port Configuration interface
The page includes the following fields:
Object
Path Cost:
Priority:
Description
The cost of the path to the other bridge from this transmitting bridge at the
specified port. Enter a number 1 through 200,000,000.
Decide which port should be blocked by setting its priority as the lowest. Enter a
number between 0 and 240. The value of priority must be the multiple of 16.
98
User’s Manual of ISW-1022M Series and ISW-1033MT
The rapid state transitions possible within RSTP are dependent upon whether the
port concerned can only be connected to exactly another bridge (i.e. it is served
by a point-to-point LAN segment), or can be connected to two or more bridges
(i.e. it is served by a shared medium LAN segment). This function allows the P2P
Admin P2P:
status of the link to be manipulated administratively. True means the port is
regarded as a point-to-point link. False means the port is regarded as a shared
link. Auto means the link type is determined by the auto-negotiation between the
two peers.
The port directly connected to end stations won’t create bridging loop in the
Admin Edge:
network. To configure the port as an edge port, set the port to “True” status.
The port includes the STP mathematic calculation. True is not including STP
Admin Non STP:
mathematic calculation. False is including the STP mathematic calculation.
Path cost “0” is used to indicate auto-configuration mode. When the short path cost method is selected
and the default path cost recommended by the IEEE 8021w standard exceeds 65,535, the default is set
to 65,535.
By default, the system automatically detects the speed and duplex mode used on each port, and configures the path cost
according to the values shown below.
Port Type
IEEE 802.1D-1998
IEEE 802.1w-2001
Ethernet
50-600
200,000-20,000,000
Fast Ethernet
10-60
20,000-2,000,000
Gigabit Ethernet
3-10
2,000-200,000
Table 5-6-1 Recommended STP Path Cost Range
Port Type
Link Type
IEEE 802.1D-1998
IEEE 802.1w-2001
Ethernet
Half Duplex
100
2,000,000
Full Duplex
95
1,999,999
Trunk
90
1,000,000
Half Duplex
19
200,000
Full Duplex
18
100,000
Trunk
15
50,000
Full Duplex
4
10,000
Trunk
3
5,000
Fast Ethernet
Gigabit Ethernet
Table 5-6-2 Recommended STP Path Costs
99
User’s Manual of ISW-1022M Series and ISW-1033MT
5.6.3 SNMP Configuration
Simple Network Management Protocol (SNMP) is the protocol developed to manage nodes (servers, workstations,
routers, switches and hubs etc.) on an IP network. SNMP enables network administrators to manage network
performance, find and solve network problems, and plan for network growth. Network management systems learn of
problems by receiving traps or change notices from network devices implementing SNMP.
5.6.3.1 System Configuration
Figure 5-43 SNMP System Configuration interface
The page includes the following fields:
Object
Description
Community Strings:
Here you can define the new community string set and remove the unwanted
community string.
„ String: Fill the name string.
„ RO: Read only. Enables requests accompanied by this community string to
display MIB-object information.
„ RW: Read/write. Enables requests accompanied by this community string to
display MIB-object information and to set MIB objects.
„ Click
Add .
To remove the community string, select the community string that you defined
100
User’s Manual of ISW-1022M Series and ISW-1033MT
before and click
Remove .
The strings of Public_RO and Private_RW are default strings. You can remove
them but after resetting the switch to default, the two strings show up again.
Agent Mode:
Select the SNMP version that you want to use it. And then click
Change to
switch to the selected SNMP version mode.
5.6.3.2 Trap Configuration
A trap manager is a management station that receives the trap messages generated by the switch. If no trap manager is
defined, no traps will be issued. To define a management station as a trap manager, assign an IP address, enter the
SNMP community strings, and select the SNMP trap version.
Figure 5-44 Trap Managers interface
The page includes the following fields:
Object
Description
IP Address:
Enter the IP address of the trap manager.
Community:
Enter the community string for the trap station.
Trap Version:
Select the SNMP trap version type—v1 or v2c.
101
User’s Manual of ISW-1022M
5.6.3.3 SNMPV3 Configuration
Configure the SNMP V3 function.
Figure 5-45 SNMP V3 configuration interface – User Table
„ Context Table
Configure SNMP v3 context table. Assign the context name of context table. Click
Remove
to remove unwanted context name.
„ User Table
Configure SNMP v3 user table..
The page includes the following fields:
Object
User ID:
Authentication
Password:
Privacy Password:
Description
Set up the user name.
Set up the authentication password.
Set up the private password.
Add
to add context name. Click
User’s Manual of ISW-1022M Series and ISW-1033MT
„ Group Table
Configure SNMP v3 group table.
Figure 5-46 SNMP V3 configuration interface – Group Table
The page includes the following fields:
Object
Description
Security Name (User ID):
Assign the user name that you have set up in user table.
Group Name:
Set up the group name.
„ Access Table
Configure SNMP v3 access table.
Figure 5-47 SNMP V3 configuration interface – Access Table
103
User’s Manual of ISW-1022M Series and ISW-1033MT
The page includes the following fields:
Object
Description
Context Prefix:
Set up the context name.
Group Name:
Set up the group.
Security Level:
Select the access level.
Context Match Rule:
Select the context match rule.
Read View Name:
Set up the read view.
Write View Name:
Set up the write view.
Notify View Name:
Set up the notify view.
„ MIBview Table
Configure MIB view table.
Figure 5-48 SNMP V3 configuration interface – MIBView Table
The page includes the following fields:
Object
Description
ViewName:
Set up the name.
Sub-Oid Tree:
Fill the Sub OID.
Type:
Select the type – exclude or included.
104
User’s Manual of ISW-1022M Series and ISW-1033MT
5.6.4 QoS Configuration
Quality of Service (QoS) is an advanced traffic prioritization feature that allows you to establish control over network
traffic. QoS enables you to assign various grades of network service to different types of traffic, such as multi-media, video,
protocol-specific, time critical, and file-backup traffic.
QoS reduces bandwidth limitations, delay, loss, and jitter. It also provides increased reliability for delivery of your data and
allows you to prioritize certain applications across your network. You can define exactly how you want the switch to treat
selected applications and types of traffic.
You can use QoS on your system to:
„ Control a wide variety of network traffic by:
„ Classifying traffic based on packet attributes.
„ Assigning priorities to traffic (for example, to set higher priorities to time-critical or business-critical applications).
„ Applying security policy through traffic filtering.
„ Provide predictable throughput for multimedia applications such as video conferencing or voice over IP by
minimizing delay and jitter.
„ Improve performance for specific types of traffic and preserve performance as the amount of traffic grows.
„ Reduce the need to constantly add bandwidth to the network.
„ Manage network congestion.
The QoS page of the Switch contains three types of QoS mode - the CoS mode, TOS mode or Port-based mode can be
selected. Both the three mode rely on predefined fields within the packet to determine the output queue.
„
CoS / 802.1p Tag Priority Mode –The output queue assignment is determined by the IEEE 802.1p VLAN
priority tag.
„
TOS / DSCP Mode - The output queue assignment is determined by the TOS or DSCP field in the IP packets.
„
Port-Based Priority Mode – Any packet received from the specify high priority port will treated as a high
priority packet.
105
User’s Manual of ISW-1022M Series and ISW-1033MT
5.6.4.1 QoS Policy and Priority Type
Here you can choose to use an 8-4-2-1 queuing scheme or a strict priority scheme, or select the priority type to configure
QoS policy.
Figure 5-49 QoS Configuration interface
The page includes the following fields:
Object
Description
Select the QoS policy rule.
„ Using the 8,4,2,1 weight fair queue scheme: The switch will follow 8:4:2:1
rate to process priority queue from High to lowest queue.
For example, while the system processing, 1 frame of the lowest queue, 2
Qos Policy:
frames of the low queue, 4 frames of the middle queue, and 8 frames of the
high queue will be processed at the same time in accordance with the
8,4,2,1 policy rule.
„ Use a strict priority scheme: Always the higher queue will be processed first,
except the higher queue is empty.
There are 5 priority type selections available—
„ Port-based
„ TOS only
Priority Type:
„ COS only
„ TOS first
„ COS first
Disable means no priority type is selected.
106
User’s Manual of ISW-1022M
5.6.4.2 Port-based Priority
Configure the priority level for each port. With the drop-down selection item of Priority Type above being selected as
Port-based, this control item will then be available to set the queuing policy for each port.
Figure 5-50 QoS Configuration – Port-Based Priority
The table includes the following fields:
Object
Description
Each port has 4 priority levels—High, Middle, Low, and Lowest—to be chosen.
Port x:
5.6.4.3 COS Configuration
QoS settings allow customization of packet priority in order to facilitate delivery of data traffic that might be affected by
latency problems. When CoS / 802.1p Tag Priority is applied, the Switch recognizes 802.1Q VLAN tag packets and
extracts the VLAN tagged packets with User Priority value.
802.1Q Tag and 802.1p priority
CFI
User Priority
3 bits
12 bits
TCI (Tag Control
Identifier)
Information)
Destination
Source
Address
Address
6 bytes
1 bits
TPID (Tag Protocol
2 bytes
Preamble
VLAN ID (VID)
6 bytes
2 bytes
VLAN TAG
4 bytes
Ethernet
Data
Type
2 bytes
46-1517 bytes
FCS
4 bytes
Figure 5-51 802.1p Tag Priority
Set up the COS priority level. With the drop-down selection item of Priority Type above being selected as COS only/COS
first, this control item will then be available to set the queuing policy for each port.
User’s Manual of ISW-1022M Series and ISW-1033MT
Figure 5-52 QoS Configuration – COS Priority
The table includes the following fields:
Object
Description
Set up the COS priority level 0~7—High, Middle, Low, Lowest.
COS priority:
802.1p Priority: Priority classifiers of the Switch forward packet. COS range is from 0 to 7.
Seven is the high class. Zero is the less class. The user may configure the mapping
between COS and Traffic classifiers.
5.6.4.4 TOS Configuration
DiffServ Code Point (DSCP) - is the traffic prioritization bits within an IP header that are encoded by certain
applications and/or devices to indicate the level of service required by the packet across a network.
The Quality of Service page provides fields for defining output queue to specific DSCP fields. When TCP/IP’s
TOS/DSCP mode is applied, the Switch recognizes TCP/IP Differentiated Service Codepoint (DSCP) priority information
from the DS-field defined in RFC2474. Select the QoS mode to TOS, the TOS to priority mapping page appears, as the
Figure 5-53 shows.
Set up the TOS priority. With the drop-down selection item of Priority Type above being selected as TOS only/TOS first,
this control item will then be available to set the queuing policy for each port.
108
User’s Manual of ISW-1022M Series and ISW-1033MT
Figure 5-53 QoS Configuration – TOS Priority
The table includes the following fields:
Object
Description
The system provides 0~63 TOS priority level. Each level has 4 types of
priority—High, Middle, Low, and Lowest. The default value is ‘Lowest’ priority
for each level. When the IP packet is received, the system will check the TOS
TOS priority:
level value in the IP packet that has received. For example, the user sets the
TOS level 25 as high, the system will check the TOS value of the received IP
packet. If the TOS value of received IP packet is 25 (priority = high), and then the
packet priority will have highest priority.
109
User’s Manual of ISW-1022M Series and ISW-1033MT
5.6.5 IGMP Snooping
5.6.5.1 Theory
The Internet Group Management Protocol (IGMP) lets host and routers share information about multicast groups
memberships. IGMP snooping is a switch feature that monitors the exchange of IGMP messages and copies them to the
CPU for feature processing. The overall purpose of IGMP Snooping is to limit the forwarding of multicast frames to only
ports that are a member of the multicast group.
About the Internet Group Management Protocol (IGMP) Snooping
Computers and network devices that want to receive multicast transmissions need to inform nearby routers that they will
become members of a multicast group. The Internet Group Management Protocol (IGMP) is used to communicate this
information. IGMP is also used to periodically check the multicast group for members that are no longer active. In the case
where there is more than one multicast router on a sub network, one router is elected as the ‘queried’. This router then
keeps track of the membership of the multicast groups that have active members. The information received from IGMP is
then used to determine if multicast packets should be forwarded to a given sub network or not. The router can check,
using IGMP, to see if there is at least one member of a multicast group on a given subnet work. If there are no members
on a sub network, packets will not be forwarded to that sub network.
Figure 5-54 Multicast Service
110
User’s Manual of ISW-1022M Series and ISW-1033MT
Figure 5-55 Multicast flooding
Figure 5-56 IGMP Snooping multicast stream control
111
User’s Manual of ISW-1022M Series and ISW-1033MT
IGMP Versions 1 and 2
Multicast groups allow members to join or leave at any time. IGMP provides the method for members and multicast
routers to communicate when joining or leaving a multicast group.
IGMP version 1 is defined in RFC 1112. It has a fixed packet size and no optional data.
The format of an IGMP packet is shown below:
IGMP Message Format
Octets
0
8
Type
16
31
Checksum
Response Time
Group Address (all zeros if this is a query)
The IGMP Type codes are shown below:
Type
0x11
Meaning
Membership Query (if Group Address is 0.0.0.0)
Specific Group Membership Query (if Group Address is
0x11
Present)
0x16
Membership Report (version 2)
0x17
Leave a Group (version 2)
0x12
Membership Report (version 1)
IGMP packets enable multicast routers to keep track of the membership of multicast groups, on their respective sub
networks. The following outlines what is communicated between a multicast router and a multicast group member using
IGMP.
A host sends an IGMP “report” to join a group
A host will never send a report when it wants to leave a group (for version 1).
A host will send a “leave” report when it wants to leave a group (for version 2).
Multicast routers send IGMP queries (to the all-hosts group address: 224.0.0.1) periodically to see whether any group
members exist on their sub networks. If there is no response from a particular group, the router assumes that there are no
group members on the network.
The Time-to-Live (TTL) field of query messages is set to 1 so that the queries will not be forwarded to other sub networks.
IGMP version 2 introduces some enhancements such as a method to elect a multicast queried for each LAN, an explicit
leave message, and query messages that are specific to a given group.
112
User’s Manual of ISW-1022M Series and ISW-1033MT
The states a computer will go through to join or to leave a multicast group are shown below:
Non-Member
Leave Group
(Stop Timer)
Delaying Member
Leave Group
Join Group
(Send Report,
Start Timer)
Query Received
(Start Timer)
Report Received
(Stop Timer)
Idle Member
Timer Expried
(Send report)
Figure 5-57 IGMP State Transitions
„
IGMP Querier –
A router, or multicast-enabled switch, can periodically ask their hosts if they want to receive multicast traffic. If there is
more than one router/switch on the LAN performing IP multicasting, one of these devices is elected “querier” and
assumes the role of querying the LAN for group members. It then propagates the service requests on to any
upstream multicast switch/router to ensure that it will continue to receive the multicast service.
Multicast routers use this information, along with a multicast routing protocol such as
DVMRP or PIM, to support IP multicasting across the Internet.
113
User’s Manual of ISW-1022M Series and ISW-1033MT
5.6.5.2 IGMP Configuration
The Industrial Switch support IP multicast, you can enable IGMP protocol on web management’s switch setting advanced
page, then the IGMP snooping information displays. IP multicast addresses range are from 224.0.0.0 through
239.255.255.255.
Figure 5-58 IGMP Configuration interface
The page includes the following fields:
Object
IGMP Protocol:
Description
Enable or disable the IGMP protocol.
Enable or disable the IGMP query function. The IGMP query information will be
IGMP Query:
displayed in IGMP status section.
114
User’s Manual of ISW-1022M Series and ISW-1033MT
5.6.6 X-Ring
X-Ring provides a faster redundant recovery than Spanning Tree topology. The action is similar to STP or RSTP, but the
algorithms between them are not the same. In the X-Ring topology, every switch should be enabled with X-Ring function
and two ports should be assigned as the member ports in the ring. Only one switch in the X-Ring group would be set as
the master switch that one of its two member ports would be blocked, called backup port, and another port is called
working port. Other switches in the X-Ring group are called working switches and their two member ports are called
working ports. When the failure of network connection occurs, the backup port of the master switch (Ring Master) will
automatically become a working port to recover from the failure.
5.6.6.1 X-Ring Application
The Industrial Switch supports the X-Ring protocol that can help the network system to recovery from network connection
failure within 20ms or less, and make the network system more reliable. The X-Ring algorithm is similar to spanning tree
protocol (STP) algorithm but its recovery time is faster than STP. The following figure is a sample X-Ring application.
Figure 5-59 X-Ring Application
115
User’s Manual of ISW-1022M Series and ISW-1033MT
5.6.6.2 Coupling Ring Application
In the network, it may have more than one X-Ring group. By using the coupling ring function, it can connect each X-Ring
for the redundant backup. It can ensure the transmissions between two ring groups not to fail. The following figure is a
sample of coupling ring application.
Figure 5-60 Coupling Ring Application
5.6.6.3 Dual Homing Application
Dual Homing function is to prevent the connection lose from between X-Ring group and upper level/core switch. Assign
two ports to be the Dual Homing port that is backup port in the X-Ring group. The Dual Homing function only works when
the X-Ring function is active. Each X-Ring group only has one Dual Homing port.
Figure 5-61 Dual Homing Ring Application
116
User’s Manual of ISW-1022M Series and ISW-1033MT
In Dual Homing application architecture, the upper level switches need to enable the Rapid
Spanning Tree protocol.
5.6.6.4 X-Ring Configuration
The Managed Industrial Switch supports the function and interface for setting the switch as the ring master or not. The ring
master can negotiate and place command to other switches in the X-Ring group. If there are 2 or more switches in master
mode, the software will select the switch with lowest MAC address number as the ring master. The X-Ring master ring
mode can be enabled by setting the X-Ring configuration interface. Also, the user can identify whether the switch is the
ring master by checking the R.M. LED indicator on the panel of the Switch.
The system also supports the Couple Ring that can connect 2 or more X-Ring group for the redundant backup function;
Dual Homing function that can prevent connection lose between X-Ring group and upper level/core switch.
Figure 5-62 X-Ring Interface
The page includes the following fields:
Object
Description
To enable the X-Ring function, tick the checkbox beside the Enable Ring string
Enable Ring:
label. If this checkbox is not ticked, all the ring functions are unavailable.
„
Enable Ring Master: Tick the checkbox to enable this switch to be the
ring master.
117
User’s Manual of ISW-1022M Series and ISW-1033MT
„
1st & 2nd Ring Ports: Pull down the selection menu to assign the ports as
st
nd
the member ports. 1 Ring Port is the working port and 2 Ring Port is
st
the backup port. When 1 Ring Port fails, the system will automatically
upgrade the 2nd Ring Port to be the working port.
To enable the couple ring function, tick the checkbox beside the Enable Couple
Ring string label.
„ Couple Port: Assign the member port which is connected to the other
Enable Couple Ring:
ring group.
„ Control Port: When the Enable Couple Ring checkbox is ticked, you
have to assign the control port to form a couple-ring group between the
two X-rings.
Set up one of the ports on the switch to be the Dual Homing port. For a switch,
Enable Dual Homing:
there is only one Dual Homing port. Dual Homing function works only when the
X-Ring function enabled.
When the X-Ring function enabled, the user must disable the RSTP. The X-Ring function and
RSTP function cannot exist on a switch at the same time.
Remember to execute the “Save Configuration” action, otherwise the new configuration will
lose when switch powers off.
118
User’s Manual of ISW-1022M Series and ISW-1033MT
5.7 Security
In Security page, it has three parts of setting
„
802.1x/Radius,
„
Static MAC address,
„
MAC filter
We will describe the configure detail in following.
5.7.1 Security—802.1X/Radius Configuration
802.1x is an IEEE authentication specification which prevents the client from accessing a wireless access point or wired
switch until it provides authority, like the user name and password that are verified by an authentication server (such as
RADIUS server).
5.7.1.1 Understanding IEEE 802.1X Port-Based Authentication
The IEEE 802.1X standard defines a client-server-based access control and authentication protocol that restricts
unauthorized clients from connecting to a LAN through publicly accessible ports. The authentication server authenticates
each client connected to a switch port before making available any services offered by the switch or the LAN.
Until the client is authenticated, 802.1X access control allows only Extensible Authentication Protocol over LAN
(EAPOL) traffic through the port to which the client is connected. After authentication is successful, normal traffic can pass
through the port.
This section includes this conceptual information:
• Device Roles
• Authentication Initiation and Message Exchange
• Ports in Authorized and Unauthorized States
„
Device Roles
With 802.1X port-based authentication, the devices in the network have specific roles as shown below.
Figure 5-63 802.1x device role
119
User’s Manual of ISW-1022M Series and ISW-1033MT
z
Client—the device (workstation) that requests access to the LAN and switch services and responds to requests
from the switch. The workstation must be running 802.1X-compliant client software such as that offered in the
Microsoft Windows XP operating system. (The client is the supplicant in the IEEE 802.1X specification.)
z
Authentication server—performs the actual authentication of the client. The authentication server validates the
identity of the client and notifies the switch whether or not the client is authorized to access the LAN and switch
services. Because the switch acts as the proxy, the authentication service is transparent to the client. In this
release, the Remote Authentication Dial-In User Service (RADIUS) security system with Extensible
Authentication Protocol (EAP) extensions is the only supported authentication server; it is available in Cisco
Secure Access Control Server version 3.0. RADIUS operates in a client/server model in which secure
authentication information is exchanged between the RADIUS server and one or more RADIUS clients.
z
Switch (802.1X device)—controls the physical access to the network based on the authentication status of the
client. The switch acts as an intermediary (proxy) between the client and the authentication server, requesting
identity information from the client, verifying that information with the authentication server, and relaying a
response to the client. The switch includes the RADIUS client, which is responsible for encapsulating and
decapsulating the Extensible Authentication Protocol (EAP) frames and interacting with the authentication server.
When the switch receives EAPOL frames and relays them to the authentication server, the Ethernet header is
stripped and the remaining EAP frame is re-encapsulated in the RADIUS format. The EAP frames are not
modified or examined during encapsulation, and the authentication server must support EAP within the native
frame format. When the switch receives frames from the authentication server, the server's frame header is
removed, leaving the EAP frame, which is then encapsulated for Ethernet and sent to the client.
„
Authentication Initiation and Message Exchange
The switch or the client can initiate authentication. If you enable authentication on a port by using the dot1x port-control
auto interface configuration command, the switch must initiate authentication when it determines that the port link state
transitions from down to up. It then sends an EAP-request/identity frame to the client to request its identity (typically, the
switch sends an initial identity/request frame followed by one or more requests for authentication information). Upon
receipt of the frame, the client responds with an EAP-response/identity frame.
However, if during bootup, the client does not receive an EAP-request/identity frame from the switch, the client can initiate
authentication by sending an EAPOL-start frame, which prompts the switch to request the client's identity
If 802.1X is not enabled or supported on the network access device, any EAPOL frames from the
client are dropped. If the client does not receive an EAP-request/identity frame after three attempts
to start authentication, the client transmits frames as if the port is in the authorized state. A port in
the authorized state effectively means that the client has been successfully authenticated.
When the client supplies its identity, the switch begins its role as the intermediary, passing EAP frames between the client
120
User’s Manual of ISW-1022M Series and ISW-1033MT
and the authentication server until authentication succeeds or fails. If the authentication succeeds, the switch port
becomes authorized.
The specific exchange of EAP frames depends on the authentication method being used. “Figure 5-64” shows a message
exchange initiated by the client using the One-Time-Password (OTP) authentication method with a RADIUS server.
Figure 5-64 EAP message exchange
„
Ports in Authorized and Unauthorized States
The switch port state determines whether or not the client is granted access to the network. The port starts in the
unauthorized state. While in this state, the port disallows all ingress and egress traffic except for 802.1X protocol packets.
When a client is successfully authenticated, the port transitions to the authorized state, allowing all traffic for the client to
flow normally.
If a client that does not support 802.1X is connected to an unauthorized 802.1X port, the switch requests the client's
identity. In this situation, the client does not respond to the request, the port remains in the unauthorized state, and the
client is not granted access to the network.
In contrast, when an 802.1X-enabled client connects to a port that is not running the 802.1X protocol, the client initiates
the authentication process by sending the EAPOL-start frame. When no response is received, the client sends the request
for a fixed number of times. Because no response is received, the client begins sending frames as if the port is in the
authorized state
If the client is successfully authenticated (receives an Accept frame from the authentication server), the port state changes
to authorized, and all frames from the authenticated client are allowed through the port. If the authentication fails, the port
remains in the unauthorized state, but authentication can be retried. If the authentication server cannot be reached, the
121
User’s Manual of ISW-1022M Series and ISW-1033MT
switch can retransmit the request. If no response is received from the server after the specified number of attempts,
authentication fails, and network access is not granted.
When a client logs off, it sends an EAPOL-logoff message, causing the switch port to transition to the unauthorized state.
If the link state of a port transitions from up to down, or if an EAPOL-logoff frame is received, the port returns to the
unauthorized state.
5.7.1.2 System Configuration
After enabling the IEEE 802.1X function, you can configure the parameters of this function.
Figure 5-65 802.1x System Configuration interface
The page includes the following fields:
Object
Description
IEEE 802.1x Protocol:
Enable or disable 802.1x protocol.
Radius Server IP:
Assign the RADIUS Server IP address.
Set the UDP destination port for authentication requests to the specified RADIUS
Server Port:
Server.
Set the UDP destination port for accounting requests to the specified RADIUS
Accounting Port:
Server.
Set an encryption key for using during authentication sessions with the specified
Shared Key:
RADIUS server. This key must match the encryption key used on the RADIUS
Server.
NAS, Identifier:
Set the identifier for the RADIUS client.
122
User’s Manual of ISW-1022M Series and ISW-1033MT
5.7.1.3 Port Configuration
You can configure the 802.1x authentication state for each port. The state provides Disable, Accept, Reject, and
Authorize.
Figure 5-66 802.1x Per Port Setting interface
The page includes the following fields:
Object
Description
Reject:
The specified port is required to be held in the unauthorized state.
Accept:
The specified port is required to be held in the authorized state.
The specified port is set to the Authorized or Unauthorized state in accordance
Authorize:
with the outcome of an authentication exchange between the Supplicant and the
authentication server.
Disable:
When disabled, the specified port works without complying with 802.1x protocol.
123
User’s Manual of ISW-1022M Series and ISW-1033MT
5.7.1.4 Misc Configuration
Figure 5-67 802.1x Misc Configuration interface
The page includes the following fields:
Object
Quiet Period:
Description
Set the period which the port doesn’t try to acquire a supplicant.
Set the period the port waits for retransmit next EAPOL PDU during an
TX Period:
authentication session.
Set the period of time the switch waits for a supplicant response to an EAP
Supplicant Timeout:
request.
Set the period of time the switch waits for a server response to an authentication
Server Timeout:
request.
Set the number of authentication that must time-out before authentication fails
Max Requests:
Reauth period:
and the authentication session ends.
Set the period of time which clients connected must be re-authenticated.
124
User’s Manual of ISW-1022M Series and ISW-1033MT
5.7.2 MAC Address Table
Use the MAC address table to ensure the port security.
5.7.2.1 Static MAC Address
You can add a static MAC address that remains in the switch's address table regardless of whether the device is
physically connected to the switch. This saves the switch from having to re-learn a device's MAC address when the
disconnected or powered-off device is active on the network again. Via this interface, you can add / modify / delete a static
MAC address.
„ Add the Static MAC Address
You can add static MAC address in the switch MAC table here.
Figure 5-68 Static MAC Addresses interface
The page includes the following fields:
Object
Description
Enter the MAC address of the port that should permanently forward traffic,
MAC Address:
Port No.:
regardless of the device network activity.
Pull down the selection menu to select the port number.
125
User’s Manual of ISW-1022M Series and ISW-1033MT
5.7.2.2 MAC Filtering
By filtering MAC address, the switch can easily filter the pre-configured MAC address and reduce the un-safety. You can
add and delete filtering MAC address.
Figure 5-69 MAC Filtering interface
The page includes the following fields:
Object
MAC Address:
Description
Enter the MAC address that you want to filter.
126
User’s Manual of ISW-1022M Series and ISW-1033MT
5.7.2.3 All MAC Addresses
You can view all of the MAC addresses learned by the selected port.
„
Select the port number.
„
The selected port of static & dynamic MAC address information will be displayed in here.
„
Click
Clear MAC Table
to clear the dynamic MAC addresses information of the current port shown on
the screen.
Figure 5-70 All MAC Address interface
127
User’s Manual of ISW-1022M Series and ISW-1033MT
5.7.2.4 Multicast Filtering
Multicasts are similar to broadcasts, they are sent to all end stations on a LAN or VLAN. Multicast filtering is the function,
which end stations can receive the multicast traffic if the connected ports had been included in the specific multicast
groups. With multicast filtering, network devices only forward multicast traffic to the ports that are connected to the
registered end stations.
Figure 5-71 Multicast Filtering interface
The page includes the following fields:
Object
IP Address:
Description
Assign a multicast group IP address in the range of 224.0.0.0 ~ 239.255.255.255.
Tick the check box beside the port number to include them as the member ports
Member Ports:
in the specific multicast group IP address.
128
User’s Manual of ISW-1022M Series and ISW-1033MT
5.8 Digital Input/Output (ISW-1033MT)
The 7 10/100TX + 3 10/100/1000T/100/1000 SFP Combo w/ X-Ring L2 Managed Industrial Switch contains two digital
inputs and two digital outputs. The digital inputs may be used to receive the voltage-changing signal of the remote
equipment to sense the state of the remote equipment like heater, pump, and other electrical equipment. Therefore the
switch can be configured to send system log, SMTP and SNMP traps to syslog server, SMTP server and SNMP trap
station respectively (please refer to System Event Log and SNMP configuration section). Outputs are open-collector
transistor switches used to connect to the external device like alarm buzzer or LED to inform the user of the port/power
status.
5.8.1 Digital Input
„
When First/Second Digital Input function is enabled, First Digital Input/Second Digital Input will then be available
respectively.
„
Digital Input: Choose the transition type to trigger DI0/DI1.
¾
LowÆHigh: Having focused this radio button, DI0/DI1 will only report the status when the external device’s
voltage changes from low to high.
¾
HighÆLow: Having focused this radio button, DI0/DI1 will only report the status when the external device’s
voltage changes from high to low.
„
Event description: Please fill in the description for the event.
„
Action: Tick the check boxes to decide whether or not to send the events via Syslog, SMTP, or SNMP Trap.
Figure 5-72 Digital Input interface
129
User’s Manual of ISW-1022M Series and ISW-1033MT
5.8.2 Digital Output
„
When First/Second Digital Output function is enabled, First Digital Output/Second Digital Output will then be
available respectively.
„
Condition: The system will send an electrical Low-to-High or High-to-Low signal to First Digital Output
(DO0)/Second Digital Output (DO1) when the condition of ticked checkbox is met.
¾
Port Fail: Having ticked this checkbox, DO0/DO1 will output an electrical Low-to-High or High-to-Low signal
when port failure occurs.
¾
Power Fail: Having ticked this checkbox, DO0/DO1 will output an electrical Low-to-High or High-to-Low signal
when power failure occurs.
„
Action: Choose the output type of electrical signal.
¾
LowÆHigh: Having focused this radio button, DO0/DO1 will output an electrical signal of Low-to-High when
the condition of the ticked checkbox is met (port/power failure occurs).
¾
HighÆLow: Having focused this radio button, DO0/DO1 will output an electrical signal of Low-to-High when
the condition of the ticked checkbox is met (port/power failure occurs).
Figure 5-73 Digital Output interface
Besides ticking the checkboxes in the Condition column field, the power/port failure
checkboxes of Fault Relay Alarm have to be ticked as the precondition.
Please refer to Fault Relay Alarm section. Also, please notice that the digital output can’t
connect to the external device using power higher than 40V/200mA.
130
User’s Manual of ISW-1022M Series and ISW-1033MT
5.9 Power over Ethernet
This segment shows the Power over Ethernet function (Only for ISW-1022MPT).
Providing up to 8 PoE, in-line power interface, the ISW-1022MPT Industrial PoE Switch can easily build a power
central-controlled IP phone system, IP Camera system, AP group for the enterprise. For instance, 8 camera / AP can be
easily installed around the corner in the company for surveillance demands or build a wireless roaming environment in the
office. Without the power-socket limitation, the PoE Switch makes the installation of cameras or WLAN AP more easily
and efficiently.
5.9.1 Power over Ethernet Powered Device
Voice over IP phones
Enterprise can install POE VoIP Phone, ATA and other
Ethernet/non-Ethernet end-devices to the central where UPS is installed
for un-interrupt power system and power control system.
3~5 watts
Wireless LAN Access Points
Museum, Sightseeing, Airport, Hotel, Campus, Factory, Warehouse
can install the Access Point any where with no hesitation
6~12 watts
IP Surveillance
Enterprise, Museum, Campus, Hospital, Bank, can install IP Camera
without limits of install location – no need electrician to install AC
sockets.
10~12 watts
PoE Splitter
PoE Splitter split the PoE 48V DC over the Ethernet cable into 5/12V DC
power output. It frees the device deployment from restrictions due to
power outlet locations, which eliminate the costs for additional AC wiring
3~12 watts
and reduces the installation time.
5.9.2 Power Management:
In a power over Ethernet system, operating power is applied from a power source (PSU-power supply unit) over the LAN
infrastructure to powered devices (PDs), which are connected to ports. Under some conditions, the total output power
required by PDs can exceed the maximum available power provided by the PSU. The system may a prior be planed with a
PSU capable of supplying less power than the total potential power consumption of all the PoE ports in the system. In
order to maintain the majority of ports active, power management is implemented.
The PSU input power consumption is monitored by measuring voltage and current .The input power consumption is equal
to the system’s aggregated power consumption .The power management concept allows all ports to be active and
131
User’s Manual of ISW-1022M Series and ISW-1033MT
activates additional ports, as long as the aggregated power of the system is lower than the power level at which additional
PDs cannot be connected .When this value is exceeded, ports will be deactivated, according to user-defined priorities.
The power budget is managed according to the following user-definable parameters: maximum available power, ports
priority, maximum allowable power per port.
This section provides PoE (Power over Ethernet) Configuration and PoE output status of PoE Switch, screen in Figure
5-74 appears.
Figure 5-74 PoE power configuration interface and status
The page includes the following fields:
Object
Description
Maximum Power Available
Displays the maximum power supply in Watt.
Actual Power Consumption
This column shows the real-time total power consumption.
System Power Limit
User can modify the value to this column field to limit the total output power for
the system.
Main Supply Voltage
This column shows the output voltage of the system for PoE ports.
Firmware Version
This column shows the PoE chip’s firmware version.
Port Knockoff Disabled
Power Management state where one or more PDs have been powered down
so that a higher priority PD may be powered up and yet not exceed the
maximum total power available for PDs.
132
User’s Manual of ISW-1022M Series and ISW-1033MT
Tick this checkbox to monitor the AC impedance on the port terminals and
AC Disconnect
removes power when the impedance rises above a certain value, for a certain
period (for details, see the IEEE 802.3af specification).
Capacitive Detection
If the port and capacitive detection are enabled, the capacitances state reads
in the voltage result from the constant current. This is then subtracted from the
pre-capacitance voltage to get a charge rate. If this charge rate is within the
window of the PD signatures, the device is considered to be discovered.
Start
Showing with a tick symbol, the system initializes and resets successfully.
Port
The index of PoE ports.
Enable State
Check it to enable the PoE function to the port.
Power Limit From
Check it to decide the power limit method.
Classification
When this check box is ticked, the system will limit the power supply to the
powered device in accordance with the related class.
Legacy
Check it to support the legacy power devices.
Priority
Pull down the selection menu item to choose the priority of power supplying.
„ Critical
„ High
„ Low
High priority is “Critical”.
Port Limit (<15400) mW
User can key in the power limit value which is under 15.4 Watts.
Mode
Displays the operating mode of the port.
Current (mA)
Displays the operating current of the port.
Voltage (V)
Displays the operating voltage of the port.
Power (mW)
Displays the power consumption of the port.
Determined Class
Displays the PD’s class.
Class 0 is the default for PDs. However, to improve power management at the
PSE, the PD may opt to provide a signature for Class 1 to 3.
The PD is classified based on power. The classification of the PD is the
maximum power that the PD will draw across all input voltages and
operational modes. A PD shall return Class 0 to 3 in accordance with the
maximum power draw as specified by Table 5-9-1.
And then, click
Apply
to carry into effect.
133
User’s Manual of ISW-1022M Series and ISW-1033MT
„
PD Classifications
A PD may be classified by the PSE based on the classification information provided by the PD. The intent of PD
classification is to provide information about the maximum power required by the PD during operation. Class 0 is the
default for PDs. However, to improve power management at the PSE, the PD may opt to provide a signature for Class 1 to
3.
The PD is classified based on power. The classification of the PD is the maximum power that the PD will draw across all
input voltages and operational modes.
A PD shall return Class 0 to 3 in accordance with the maximum power draw as specified by Table 5-9-1.
Class
Usage
Range of maximum power used by the PD
0
Default
0.44 to 12.95 Watts
1
Optional
0.44 to 3.84 Watts
2
Optional
3.84 to 6.49 Watts
3
Optional
6.49 to 12.95 Watts
4
Not Allowed
Reserved for Future Use
Table 5-9-1: Device class
Class 4 is defined but is reserved for future use. A Class 4 signature cannot be provided by a
compliant PD.
134
User’s Manual of ISW-1022M Series and ISW-1033MT
5.10 Factory Default
Reset switch to default configuration. Click
Default
to reset all configurations to the default value.
Figure 5-75 Factory Default interface
5.11 Save Configuration
Save all configurations that you have made in the system. To ensure the all configuration will be saved. Click
Save Flash
to save the all configuration to the flash memory.
Figure 5-76 Save Configuration interface
135
User’s Manual of ISW-1022M Series and ISW-1033MT
5.12 System Reboot
Reboot the switch in software reset. Click
Reboot
to reboot the system.
Figure 5-77 System Reboot interface
136
User’s Manual of ISW-1022M Series and ISW-1033MT
6. Command Sets
Commands Set List
User EXEC
E
Privileged EXEC
P
Global configuration
G
VLAN database
V
Interface configuration
I
6.1 System Commands Set
Commands
Level
Description
Example
show config
E
Show switch configuration
switch>show config
show terminal
P
Show console information
switch#show terminal
write memory
P
Save user configuration into
switch#write memory
permanent memory (flash
rom)
system name
G
Configure system name
switch(config)#system name xxx
G
Set switch system location
switch(config)#system location xxx
[System Name]
system location
string
[System Location]
system description
G
[System Description]
system contact
Set switch system description switch(config)#system description xxx
string
G
[System Contact]
Set switch system contact
switch(config)#system contact xxx
window string
show system-info
E
Show system information
switch>show system-info
ip address
G
Configure the IP address of
switch(config)#ip address 192.168.1.1
switch
255.255.255.0 192.168.1.254
Enable DHCP client function
switch(config)#ip dhcp
[Ip-address] [Subnet-mask]
[Gateway]
ip dhcp
G
of switch
show ip
P
Show IP information of switch switch#show ip
no ip dhcp
G
Disable DHCP client function
switch(config)#no ip dhcp
of switch
reload
G
Halt and perform a cold restart switch(config)#reload
default
G
Restore to default
switch(config)#default
admin username
G
Changes a login username.
switch(config)#admin username xxxxxx
(maximum 10 words)
[Username]
admin password
G
Specifies a password
137
switch(config)#admin password xxxxxx
User’s Manual of ISW-1022M Series and ISW-1033MT
(maximum 10 words)
[Password]
show admin
P
Show administrator
switch#show admin
information
dhcpserver enable
G
Enable DHCP Server
switch(config)#dhcpserver enable
Dhcpserver disable
G
Disable DHCP Server
switch(config)#no dhcpserver
dhcpserver lowip
G
Configure low IP address for IP switch(config)#dhcpserver lowip
pool
[Low IP]
dhcpserver highip
G
[High IP]
dhcpserver subnetmask
G
[Subnet mask]
dhcpserver gateway
G
[Gateway]
dhcpserver dnsip
G
Configure high IP address for switch(config)#dhcpserver highip
IP pool
192.168.1.200
Configure subnet mask for
switch(config)#dhcpserver subnetmask
DHCP clients
255.255.255.0
Configure gateway for DHCP switch(config)#dhcpserver gateway
clients
192.168.1.254
Configure DNS IP for DHCP
switch(config)#dhcpserver dnsip 192.168.1.1
clients
[DNS IP]
dhcpserver leasetime
192.168.1.100
G
Configure lease time (in hour) switch(config)#dhcpserver leasetime 1
I
Set static IP for DHCP clients switch(config)#interface fastEthernet 2
[Hours]
dhcpserver ipbinding
by port
[IP address]
switch(config)#dhcpserver ipbinding
192.168.1.1
show dhcpserver configuration
P
Show configuration of DHCP
switch#show dhcpserver configuration
server
show dhcpserver clients
P
Show client entries of DHCP
switch#show dhcpserver clients
server
show dhcpserver ip-binding
P
Show IP-Binding information
switch#show dhcpserver ip-binding
of DHCP server
no dhcpserver
G
Disable DHCP server function switch(config)#no dhcpserver
security enable
G
Enable IP security function
switch(config)#security enable
security http
G
Enable IP security of HTTP
switch(config)#security http
security telnet
G
security ip
[Index(1..10)] [IP Address]
show security
G
no security
G
no security http
no security telnet
server
Enable IP security of telnet
server
Set the IP security list
switch(config)#security telnet
Show the information of IP
security
Disable IP security function
switch#show security
G
Disable IP security of HTTP
server
switch(config)#no security http
G
Disable IP security of telnet
switch(config)#no security telnet
P
server
138
switch(config)#security ip 1 192.168.1.55
switch(config)#no security
User’s Manual of ISW-1022M Series and ISW-1033MT
6.2 Port Commands Set
Commands
interface fastEthernet
Level
G
Example
Choose the port for
switch(config)#interface fastEthernet 2
modification.
[Portid]
duplex
Description
I
Use the duplex
configuration switch(config)#interface fastEthernet 2
command to specify the
[full | half]
switch(config-if)#duplex full
duplex mode of operation for
Fast Ethernet.
speed
I
Use the speed configuration switch(config)#interface fastEthernet 2
command to specify the speed switch(config-if)#speed 100
[10|100|1000|auto]
mode of operation for Fast
Ethernet., the speed can’t be
set to 1000 if the port isn’t a
giga port..
no flowcontrol
I
Disable flow control of
switch(config-if)#no flowcontrol
interface
security enable
I
Enable security of interface
switch(config)#interface fastEthernet 2
switch(config-if)#security enable
no security
I
Disable security of interface
switch(config)#interface fastEthernet 2
switch(config-if)#no security
bandwidth type all
I
Set interface ingress limit
switch(config)#interface fastEthernet 2
frame type to “accept all
switch(config-if)#bandwidth type all
frame”
Set interface ingress limit
switch(config)#interface fastEthernet 2
broadcast-multicast-flooded-uni
frame type to “accept
switch(config-if)#bandwidth type
cast
broadcast, multicast, and
broadcast-multicast-flooded-unicast
bandwidth type
I
flooded unicast frame”
bandwidth type
I
broadcast-multicast
Set interface ingress limit
switch(config)#interface fastEthernet 2
frame type to “accept
switch(config-if)#bandwidth type
broadcast and multicast
broadcast-multicast
frame”
bandwidth type broadcast-only
bandwidth in
[Value]
I
I
Set interface ingress limit
switch(config)#interface fastEthernet 2
frame type to “only accept
switch(config-if)#bandwidth type
broadcast frame”
broadcast-only
Set interface input bandwidth. switch(config)#interface fastEthernet 2
Rate Range is from 100 kbps switch(config-if)#bandwidth in 100
to 102400 kbps or to 256000
kbps for giga ports,
and zero means no limit.
139
User’s Manual of ISW-1022M Series and ISW-1033MT
bandwidth out
Set interface output
switch(config)#interface fastEthernet 2
[Value]
bandwidth. Rate Range is
switch(config-if)#bandwidth out 100
from 100 kbps to 102400 kbps
or to 256000 kbps for giga
ports,
and zero means no limit.
show bandwidth
state
I
I
[Enable | Disable]
Show interfaces bandwidth
switch(config)#interface fastEthernet 2
control
switch(config-if)#show bandwidth
Use the state interface
switch(config)#interface fastEthernet 2
configuration command to
switch(config-if)#state Disable
specify the state mode of
operation for Ethernet ports.
Use the disable form of this
command to disable the port.
show interface configuration
I
show interface configuration
switch(config)#interface fastEthernet 2
status
switch(config-if)#show interface
configuration
show interface status
I
show interface actual status
switch(config)#interface fastEthernet 2
switch(config-if)#show interface status
show interface accounting
no accounting
I
I
show interface statistic
switch(config)#interface fastEthernet 2
counter
switch(config-if)#show interface accounting
Clear interface accounting
switch(config)#interface fastEthernet 2
information
switch(config-if)#no accounting
140
User’s Manual of ISW-1022M Series and ISW-1033MT
6.3 Trunk Commands Set
Commands
Level
Description
Example
G
Set port group system priority switch(config)#aggregator priority 22
G
Set activity port
switch(config)#aggregator activityport 2
G
Assign a trunk group with
switch(config)#aggregator group 1 1-4 lacp
[GroupID] [Port-list]
LACP active.
workp 2
lacp
[GroupID] :1~3
or
workp
[Port-list]:Member port list,
switch(config)#aggregator group 2 1,4,3 lacp
[Workport]
This parameter could be a port workp 3
aggregator priority
[1~65535]
aggregator activityport
[Group ID]
[Port Numbers]
aggregator group
range(ex.1-4) or a port list
separate by a comma(ex.2, 3,
6)
[Workport]: The amount of
work ports, this value could
not be less than zero or be
large than the amount of
member ports.
Assign a static trunk group.
switch(config)#aggregator group 1 2-4
[GroupID] [Port-list]
[GroupID] :1~3
nolacp
nolacp
[Port-list]:Member port list,
or
aggregator group
G
This parameter could be a port switch(config)#aggregator group 1 3,1,2
range(ex.1-4) or a port list
nolacp
separate by a comma(ex.2, 3,
6)
show aggregator
P
Show the information of trunk switch#show aggregator 1
group
or
switch#show aggregator 2
or
switch#show aggregator 3
no aggregator lacp
G
switch(config)#no aggreator lacp 1
trunk group
[GroupID]
no aggregator group
Disable the LACP function of
G
Remove a trunk group
[GroupID]
141
switch(config)#no aggreator group 2
User’s Manual of ISW-1022M Series and ISW-1033MT
6.4 VLAN Commands Set
Commands
Level
Description
Example
vlan database
P
Enter VLAN configure mode
switch#vlan database
Vlanmode
V
To set switch VLAN mode.
switch(vlan)#vlanmode portbase
or
[portbase| 802.1q | gvrp]
switch(vlan)#vlanmode 802.1q
or
switch(vlan)#vlanmode gvrp
no vlan
V
No VLAN
Switch(vlan)#no vlan
V
Add new port based VALN
switch(vlan)#vlan port-based grpname test
Ported based VLAN configuration
vlan port-based grpname
[Group Name]
grpid 2 port 2-4
grpid
or
[GroupID]
switch(vlan)#vlan port-based grpname test
port
grpid 2 port 2,3,4
[PortNumbers]
show vlan [GroupID]
V
Show VLAN information
switch(vlan)#show vlan 23
V
Delete port base group ID
switch(vlan)#no vlan group 2
or
show vlan
no vlan group
[GroupID]
IEEE 802.1Q VLAN
vlan 8021q name
V
Change the name of VLAN
[GroupName]
group, if the group didn’t exist,
vid
this command can’t be
[VID]
applied.
vlan 8021q port
V
switch(vlan)#vlan 8021q name test vid 22
Assign a access link for VLAN switch(vlan)#vlan 8021q port 3 access-link
[PortNumber]
by port, if the port belong to a untag 33
access-link untag
trunk group, this command
[UntaggedVID]
can’t be applied.
vlan 8021q port
V
Assign a trunk link for VLAN
switch(vlan)#vlan 8021q port 3 trunk-link tag
[PortNumber]
by port, if the port belong to a 2,3,6,99
trunk-link tag
trunk group, this command
or
[TaggedVID List]
can’t be applied.
switch(vlan)#vlan 8021q port 3 trunk-link tag
3-20
vlan 8021q port
V
Assign a hybrid link for VLAN switch(vlan)#vlan 8021q port 3 hybrid-link
[PortNumber]
by port, if the port belong to a untag 4 tag 3,6,8
hybrid-link untag
trunk group, this command
or
[UntaggedVID]
can’t be applied.
switch(vlan)#vlan 8021q port 3 hybrid-link
142
User’s Manual of ISW-1022M Series and ISW-1033MT
tag
untag 5 tag 6-8
[TaggedVID List]
vlan 8021q trunk
V
[PortNumber]
Assign a access link for VLAN switch(vlan)#vlan 8021q trunk 3 access-link
by trunk group
untag 33
Assign a trunk link for VLAN
switch(vlan)#vlan 8021q trunk 3 trunk-link
by trunk group
tag 2,3,6,99
access-link untag
[UntaggedVID]
vlan 8021q trunk
V
[PortNumber]
trunk-link tag
or
[TaggedVID List]
switch(vlan)#vlan 8021q trunk 3 trunk-link
tag 3-20
vlan 8021q trunk
V
[PortNumber]
Assign a hybrid link for VLAN switch(vlan)#vlan 8021q trunk 3 hybrid-link
by trunk group
untag 4 tag 3,6,8
hybrid-link untag
or
[UntaggedVID]
switch(vlan)#vlan 8021q trunk 3 hybrid-link
tag
untag 5 tag 6-8
[TaggedVID List]
show vlan [GroupID]
V
Show VLAN information
switch(vlan)#show vlan 23
Delete port base group ID
switch(vlan)#no vlan group 2
or
show vlan
no vlan group
V
[GroupID]
6.5 Spanning Tree Commands Set
Commands
Level
Description
Example
spanning-tree enable
G
Enable spanning tree
switch(config)#spanning-tree enable
spanning-tree priority [0~61440]
G
Configure spanning tree
switch(config)#spanning-tree priority 32768
priority parameter
spanning-tree max-age
[seconds]
G
Use the spanning-tree
max-age global configuration
command to change the
interval between messages
the spanning tree receives
from the root switch. If a
switch does not receive a
bridge protocol data unit
(BPDU) message from the
143
switch(config)#spanning-tree max-age 15
User’s Manual of ISW-1022M Series and ISW-1033MT
root switch within this interval,
it recomputed the Spanning
Tree Protocol (STP) topology.
spanning-tree
hello-time
G
Use the spanning-tree
switch(config)#spanning-tree hello-time 3
hello-time global configuration
[seconds]
command to specify the
interval between hello bridge
protocol data units (BPDUs).
spanning-tree
forward-time
G
[seconds]
Use the spanning-tree
switch(config)#spanning-tree forward-time
forward-time global
20
configuration command to set
the forwarding-time for the
specified spanning-tree
instances. The forwarding time
determines how long each of
the listening and
learning states last before the
port begins forwarding.
stp-path-cost
I
[1~200000000]
Use the spanning-tree cost
switch(config)#interface fastEthernet 2
interface configuration
switch(config-if)#stp-path-cost 20
command to set the path cost
for Spanning Tree
Protocol (STP) calculations. In
the event of a loop, spanning
tree considers the path cost
when selecting
an interface to place into the
forwarding state.
stp-path-priority
I
[Port Priority]
Use the spanning-tree
switch(config)#interface fastEthernet 2
port-priority interface
switch(config-if)#stp-path-priority 128
configuration command to
configure a port priority that
is used when two switches tie
for position as the root switch.
stp-admin-p2p
I
this interface.
[Auto|True|False]
stp-admin-edge
I
switch(config-if)#stp-admin-p2p Auto
Admin Edge of STP priority on switch(config)#interface fastEthernet 2
this interface.
[True|False]
stp-admin-non-stp
Admin P2P of STP priority on switch(config)#interface fastEthernet 2
I
switch(config-if)#stp-admin-edge True
Admin NonSTP of STP priority switch(config)#interface fastEthernet 2
144
User’s Manual of ISW-1022M Series and ISW-1033MT
[True|False]
show spanning-tree
E
on this interface.
switch(config-if)#stp-admin-non-stp False
Displays a summary of the
switch>show spanning-tree
spanning-tree states.
no spanning-tree
G
Disable spanning-tree.
switch(config)#no spanning-tree
6.6 QOS Commands Set
Commands
qos policy
Level
Description
Example
G
Select QOS policy scheduling switch(config)#qos policy weighted-fair
G
Setting of QOS priority type
G
Configure Port-based Priority switch(config)#qos priority portbased 1 low
G
Configure COS Priority
switch(config)#qos priority cos 0 middle
G
Configure TOS Priority
switch(config)#qos priority tos 3 high
P
Displays the information of
Switch#show qos
[weighted-fair|strict]
qos prioritytype
switch(config)#qos prioritytype
[port-based|cos-only|tos-only|co
s-first|tos-first]
qos priority portbased
[Port] [lowest|low|middle|high]
qos priority cos
[Priority][lowest|low|middle|high]
qos priority tos
[Priority][lowest|low|middle|high
]
show qos
QoS configuration
no qos
G
Disable QoS function
switch(config)#no qos
6.7 IGMP Commands Set
Commands
igmp enable
Level
G
Description
Example
Enable IGMP snooping
switch(config)#igmp enable
function
Igmp-query auto
G
Set IGMP query to auto mode switch(config)#Igmp-query auto
Igmp-query force
G
Set IGMP query to force mode switch(config)#Igmp-query force
show igmp configuration
P
Displays the details of an
switch#show igmp configuration
IGMP configuration.
no igmp
G
Disable IGMP snooping
switch(config)#no igmp
function
no igmp-query
G
Disable IGMP query
145
switch#no igmp-query
User’s Manual of ISW-1022M Series and ISW-1033MT
6.8 MAC / Filter Table Commands Set
Commands
mac-address-table static hwaddr
Level
I
Description
Example
Configure MAC address table switch(config)#interface fastEthernet 2
of interface (static).
[MAC]
switch(config-if)#mac-address-table static
hwaddr 000012345678
mac-address-table filter hwaddr
G
[MAC]
Configure MAC address
switch(config)#mac-address-table filter
table(filter)
hwaddr 000012348678
show mac-address-table
P
Show all MAC address table
switch#show mac-address-table
show mac-address-table static
P
Show static MAC address
switch#show mac-address-table static
table
show mac-address-table filter
P
Show filter MAC address table. switch#show mac-address-table filter
no mac-address-table static
I
Remove an entry of MAC
switch(config)#interface fastEthernet 2
hwaddr
address table of interface
switch(config-if)#no mac-address-table static
[MAC]
(static)
hwaddr 000012345678
Remove an entry of MAC
switch(config)#no mac-address-table filter
address table (filter)
hwaddr 000012348678
Remove dynamic entry of
switch(config)#no mac-address-table
no mac-address-table filter
G
hwaddr
[MAC]
no mac-address-table
G
MAC address table
6.9 SNMP Commands Set
Commands
snmp system-name
Level
Description
Example
G
Set SNMP agent system name switch(config)#snmp system-name l2switch
G
Set SNMP agent system
[System Name]
snmp system-location
location
[System Location]
snmp system-contact
G
G
switch(config)#snmp system-contact where
Select the agent mode of
switch(config)#snmp agent-mode v1v2cv3
SNMP
[v1v2c|v3|v1v2cv3]
snmp community-strings
Set SNMP agent system
contact
[System Contact]
snmp agent-mode
switch(config)#snmp system-location lab
G
Add SNMP community string. switch(config)#snmp community-strings
[Community]
public right rw
right
[RO/RW]
Configure SNMP server host
switch(config)#snmp-server host
[IP address]
information and community
192.168.1.50 community public trap-version
community
string
v1
snmp-server host
G
[Community-string]
(remove)
146
User’s Manual of ISW-1022M Series and ISW-1033MT
trap-version
Switch(config)#
[v1|v2c]
no snmp-server host
192.168.1.50
G
Configure the context name
switch(config)#snmpv3 context-name Test
G
Configure the userprofile for
switch(config)#snmpv3 user test01 group G1
[User Name]
SNMPV3 agent. Privacy
password AuthPW PrivPW
group
password could be empty.
snmpv3 context-name
[Context Name ]
snmpv3 user
[Group Name]
password
[Authentication Password]
[Privacy Password]
snmpv3 access context-name
G
Configure the access table of switch(config)#snmpv3 access context-name
SNMPV3 agent
[Context Name ]
group
Test group G1 security-level AuthPriv
match-rule Exact views V1 V1 V1
[Group Name ]
security-level
[NoAuthNoPriv|AuthNoPriv|Auth
Priv]
match-rule
[Exact|Prifix]
views
[Read View Name] [Write View
Name] [Notify View Name]
snmpv3 mibview view
G
[View Name]
Configure the mibview table of switch(config)#snmpv3 mibview view V1
SNMPV3 agent
type Excluded sub-oid 1.3.6.1
type
[Excluded|Included]
sub-oid
[OID]
show snmp
P
Show SNMP configuration
switch#show snmp
no snmp community-strings
G
Remove the specified
switch(config)#no snmp community-strings
community.
public
Remove the SNMP server
switch(config)#no snmp-server host
host.
192.168.1.50
Remove specified user of
switch(config)#no snmpv3 user Test
[Community]
no snmp-server host
G
[Host-address]
no snmpv3 user
G
SNMPv3 agent.
[User Name]
no snmpv3 access context-name
[Context Name ]
G
Remove specified access
switch(config)#no snmpv3 access
table of SNMPv3 agent.
context-name Test group G1 security-level
group
AuthPr
147
User’s Manual of ISW-1022M Series and ISW-1033MT
[Group Name ]
iv match-rule Exact views V1 V1 V1
security-level
[NoAuthNoPriv|AuthNoPriv|Auth
Priv]
match-rule
[Exact|Prifix]
views
[Read View Name] [Write View
Name] [Notify View Name]
no snmpv3 mibview view
G
[View Name]
Remove specified mibview
switch(config)#no snmpv3 mibview view V1
table of SNMPV3 agent.
type Excluded sub-oid 1.3.6.1
type
[Excluded|Included]
sub-oid
[OID]
6.10 Port Mirroring Commands Set
Commands
monitor
Level
I
[RX|TX|Both]
monitor rx [Port ID]
G
Description
Example
Configure source port of
switch(config)#interface fastEthernet 2
monitor function
switch(config-if)#monitor RX
Set RX destination port of
switch(config)#monitor rx 2
monitor function
monitor tx [Port ID]
G
Set TX destination port of
switch(config)#monitor tx 3
monitor function
show monitor
P
Show port monitor information switch#show monitor
show monitor
I
Show port monitor information switch(config)#interface fastEthernet 2
switch(config-if)#show monitor
no monitor
I
Disable source port of monitor switch(config)#interface fastEthernet 2
function
switch(config-if)#no monitor
148
User’s Manual of ISW-1022M Series and ISW-1033MT
6.11 802.1x Commands Set
Commands
8021x enable
Level
G
Description
Example
Use the 802.1x global
switch(config)# 8021x enable
configuration command to
enable 802.1x protocols.
8021x system radiusip
G
Use the 802.1x system radius switch(config)# 8021x system radiusip
IP global configuration
[IP address]
192.168.1.1
command to change the radius
server IP.
8021x system serverport
G
Use the 802.1x system server switch(config)# 8021x system serverport
port global configuration
[port ID]
1812
command to change the radius
server port
8021x system accountport
G
[port ID]
Use the 802.1x system
switch(config)# 8021x system accountport
account port global
1813
configuration command to
change the accounting port
8021x system sharedkey
G
Use the 802.1x system share switch(config)# 8021x system sharedkey
key global configuration
[ID]
123456
command to change the
shared key value.
8021x system nasid
G
Use the 802.1x system nasid
switch(config)# 8021x system nasid test1
global configuration command
[words]
to change the NAS ID
8021x misc quietperiod
G
Use the 802.1x misc quiet
switch(config)# 8021x misc quietperiod 10
period global configuration
[sec.]
command to specify the quiet
period value of the switch.
8021x misc txperiod
G
Use the 802.1x misc TX period switch(config)# 8021x misc txperiod 5
global configuration command
[sec.]
to set the TX period.
8021x misc supptimeout [sec.]
G
Use the 802.1x misc supp
switch(config)# 8021x misc supptimeout 20
timeout global configuration
command to set the supplicant
timeout.
8021x misc servertimeout
[sec.]
G
Use the 802.1x misc server
timeout global configuration
command to set the server
timeout.
149
switch(config)#8021x misc servertimeout 20
User’s Manual of ISW-1022M Series and ISW-1033MT
8021x misc maxrequest
G
Use the 802.1x misc max
switch(config)# 8021x misc maxrequest 3
request global configuration
[number]
command to set the MAX
requests.
8021x misc reauthperiod [sec.]
G
Use the 802.1x misc reauth
switch(config)# 8021x misc reauthperiod
period global configuration
3000
command to set the reauth
period.
8021x portstate
I
[disable | reject | accept | authorize]
Use the 802.1x port state
switch(config)#interface fastethernet 3
interface configuration
switch(config-if)#8021x portstate accept
command to set the state of
the selected port.
show 8021x
E
Displays a summary of the
switch>show 8021x
802.1x properties and also the
port sates.
no 8021x
G
Disable 802.1x function
switch(config)#no 8021x
6.12 TFTP Commands Set
Commands
backup flash:backup_cfg
Level
G
Description
Defaults Example
Save configuration to TFTP and
switch(config)#backup flash:backup_cfg
need to specify the IP of TFTP
server and the file name of
image.
restore flash:restore_cfg
G
Get configuration from TFTP
switch(config)#restore flash:restore_cfg
server and need to specify the IP
of TFTP server and the file name
of image.
upgrade flash:upgrade_fw
G
Upgrade firmware by TFTP and
switch(config)#upgrade
need to specify the IP of TFTP
flash:upgrade_fw
server and the file name of
image.
150
User’s Manual of ISW-1022M Series and ISW-1033MT
6.13 SystemLog, SMTP and Event Commands Set
Commands
systemlog ip
Level
G
Description
Example
Set System log server IP
switch(config)# systemlog ip 192.168.1.100
address.
[IP address]
G
Specified the log mode
switch(config)# systemlog mode both
show systemlog
E
Displays system log.
Switch>show systemlog
show systemlog
P
Show system log client &
switch#show systemlog
systemlog mode
[client|server|both]
server information
no systemlog
G
Disable systemlog functon
switch(config)#no systemlog
smtp enable
G
Enable SMTP function
switch(config)#smtp enable
smtp serverip
G
Configure SMTP server IP
switch(config)#smtp serverip 192.168.1.5
smtp authentication
G
Enable SMTP authentication
switch(config)#smtp authentication
smtp account
G
Configure authentication
switch(config)#smtp account John
[IP address]
account
[account]
smtp password
G
switch(config)#smtp password 1234
password
[password]
smtp rcptemail
Configure authentication
G
Configure Rcpt e-mail Address switch(config)#smtp rcptemail 1
[Index] [Email address]
Alert@test.com
show smtp
P
Show the information of SMTP switch#show smtp
no smtp
G
Disable SMTP function
switch(config)#no smtp
event device-cold-start
G
Set cold start event type
switch(config)#event device-cold-start both
G
Set Authentication failure
switch(config)#event authentication-failure
event type
both
Set X-ring topology changed
switch(config)#event ring-topology-change
event type
both
Set port event for system log
switch(config)#interface fastethernet 3
[Systemlog|SMTP|Both]
event authentication-failure
[Systemlog|SMTP|Both]
event ring-topology-change
G
[Systemlog|SMTP|Both]
event systemlog
I
switch(config-if)#event systemlog both
[Link-UP|Link-Down|Both]
event smtp
I
Set port event for SMTP
switch(config)#interface fastethernet 3
switch(config-if)#event smtp both
[Link-UP|Link-Down|Both]
show event
P
Show event selection
switch#show event
no event device-cold-start
G
Disable cold start event type
switch(config)#no event device-cold-start
no event authentication-failure
G
Disable Authentication failure switch(config)#no event
no event ring-topology-change
no event systemlog
G
I
event typ
authentication-failure
Disable X-ring topology
switch(config)#no event
changed event type
ring-topology-change
Disable port event for system switch(config)#interface fastethernet 3
151
User’s Manual of ISW-1022M Series and ISW-1033MT
no event smpt
I
log
switch(config-if)#no event systemlog
Disable port event for SMTP
switch(config)#interface fastethernet 3
switch(config-if)#no event smtp
show systemlog
P
Show system log client &
switch#show systemlog
server information
6.14 SNTP Commands Set
Commands
Level
Description
Example
switch(config)#sntp enable
sntp enable
G
Enable SNTP function
sntp daylight
G
Enable daylight saving time, if switch(config)#sntp daylight
SNTP function is inactive, this
command can’t be applied.
sntp daylight-period
G
[Start time] [End time]
Set period of daylight saving
switch(config)# sntp daylight-period
time, if SNTP function is
20060101-01:01 20060202-01:01
inactive, this command can’t
be applied.
Parameter format:
[yyyymmdd-hh:mm]
sntp daylight-offset
G
Set offset of daylight saving
switch(config)#sntp daylight-offset 3
time, if SNTP function is
[Minute]
inactive, this command can’t
be applied.
sntp ip
G
Set SNTP server IP, if SNTP
switch(config)#sntp ip 192.169.1.1
function is inactive, this
[IP]
command can’t be applied.
sntp timezone
G
Set timezone index, use “show switch(config)#sntp timezone 22
sntp timzezone” command to
[Timezone]
get more information of index
number
show sntp
P
Show SNTP information
switch#show sntp
show sntp timezone
P
Show index number of time
switch#show sntp timezone
zone list
no sntp
G
Disable SNTP function
switch(config)#no sntp
no sntp daylight
G
Disable daylight saving time
switch(config)#no sntp daylight
152
User’s Manual of ISW-1022M Series and ISW-1033MT
6.15 X-ring Commands Set
Commands
Level
Description
Example
ring enable
G
Enable X-ring
switch(config)#ring enable
ring master
G
Enable ring master
switch(config)#ring master
ring couplering
G
Enable couple ring
switch(config)#ring couplering
ring dualhoming
G
Enable dual homing
switch(config)#ring dualhoming
ring ringport
G
Configure 1st/2nd Ring Port
switch(config)#ring ringport 7 8
G
Configure Coupling Port
switch(config)#ring couplingport 1
G
Configure Control Port
switch(config)#ring controlport 2
G
Configure Dual Homing Port
switch(config)#ring homingport 3
P
Show the information of X -
switch#show ring
[1st Ring Port] [2nd Ring Port]
ring couplingport
[Coupling Port]
ring controlport
[Control Port]
ring homingport
[Dual Homing Port]
show ring
Ring
no ring
G
Disable X-ring
switch(config)#no ring
no ring master
G
Disable ring master
switch(config)# no ring master
no ring couplering
G
Disable couple ring
switch(config)# no ring couplering
no ring dualhoming
G
Disable dual homing
switch(config)# no ring dualhoming
Description
Example
Configure PoE function
switch# poe
6.16 PoE Command Set
Commands
Level
poe
P
exit
PoE
Exit the PoE command mode switch(poe)# exit
Set PoE port State
port [PortNumber] state
switch(poe)# port 1 state enable
[Enable | Disable]
port [PortNumber] plfc
PoE
[Enable | Disable]
port [PortNumber] legacy
Set PoE port Power Limit from switch(poe)# port 1 plfc enable
Classification
PoE
Set PoE port Legacy
switch(poe)# port 1 legacy enable
PoE
Set PoE port Priority
switch(poe)# port 1 priority critical
PoE
Set PoE port Power Limit
switch(poe)# port 1 powerlimit 10
[Enable | Disable]
port [PortNumber] priority
[Low|High|Critical]
port [PortNumber] powerlimit
[Value]
Value
system
PoE
Configure PoE System
system knockoff-disabled
PoE
Set PoE system Port Knockoff switch(poe)# system knockoff-disabled enable
[Enable | Disable]
Disabled
153
switch(poe)# system
User’s Manual of ISW-1022M Series and ISW-1033MT
system ac-disconnect
PoE
[Enable | Disable]
system capacitive-detect
switch(poe)# system ac-disconnect enable
Disconnect
PoE
[Enable | Disable]
system power-limit [Value]
Set PoE system AC
Set PoE system Capacitive
switch(poe)# system capacitive-detect enable
Detection
PoE
Set PoE system System
Power Limit
154
switch(poe)# system power-limit 100
User’s Manual of ISW-1022M Series and ISW-1033MT
7. SWITCH OPERATION
7.1 Address Table
The Switch is implemented with an address table. This address table composed of many entries. Each entry is used to
store the address information of some node in network, including MAC address, port no, etc. This in-formation comes from
the learning process of Ethernet Switch.
7.2 Learning
When one packet comes in from any port, the Switch will record the source address, port no. And the other related
information in address table. This information will be used to decide either forwarding or filtering for future packets.
7.3 Forwarding & Filtering
When one packet comes from some port of the Ethernet Switching, it will also check the destination address besides the
source address learning. The Ethernet Switching will lookup the address-table for the destination address. If not found,
this packet will be forwarded to all the other ports except the port, which this packet comes in. And these ports will transmit
this packet to the network it connected. If found, and the destination address is located at different port from this packet
comes in, the Ethernet Switching will forward this packet to the port where this destination address is located according to
the information from address table. But, if the destination address is located at the same port with this packet comes in,
then this packet will be filtered. Thereby increasing the network throughput and availability
7.4 Store-and-Forward
Store-and-Forward is one type of packet-forwarding techniques.
A Store-and-Forward Ethernet Switching stores the
incoming frame in an internal buffer, do the complete error checking before transmission. Therefore, no error packets
occurrence, it is the best choice when a network needs efficiency and stability.
The Ethernet Switch scans the destination address from the packet-header, searches the routing table pro-vided for the
incoming port and forwards the packet, only if required. The fast forwarding makes the switch attractive for connecting
servers directly to the network, thereby increasing throughput and availability. How-ever, the switch is most commonly
used to segment existence hubs, which nearly always improves overall performance. An Ethernet Switching can be easily
configured in any Ethernet network environment to signifi-cantly boost bandwidth using conventional cabling and
adapters.
Due to the learning function of the Ethernet switching, the source address and corresponding port number of each
incoming and outgoing packet are stored in a routing table. This information is subsequently used to filter packets whose
destination address is on the same segment as the source address. This confines network traffic to its respective domain
and reduce the overall load on the network.
The Switch performs "Store and forward" therefore, no error packets occur.
rate. No packet loss will occur.
155
More reliably, it reduces the re-transmission
User’s Manual of ISW-1022M Series and ISW-1033MT
7.5 Auto-Negotiation
The STP ports on the Switch have built-in "Auto-negotiation". This technology automatically sets the best possible
bandwidth when a connection is established with another network device (usually at Power On or Reset). This is done by
detect the modes and speeds at the second of both device is connected and capable of, both 10Base-T and 100Base-TX
devices can connect with the port in either Half- or Full-Duplex mode.
If attached device is:
100Base-TX port will set to:
10Mbps, no auto-negotiation
10Mbps.
10Mbps, with auto-negotiation
10/20Mbps (10Base-T/Full-Duplex)
100Mbps, no auto-negotiation
100Mbps
100Mbps, with auto-negotiation
100/200Mbps (100Base-TX/Full-Duplex)
156
User’s Manual of ISW-1022M Series and ISW-1033MT
8. POWER OVER ETHERNET OVERVIEW
What is PoE?
Based on the global standard IEEE 802.3af, PoE is a technology for wired Ethernet, the most widely installed local area
network technology adopted today. PoE allows the electrical power necessary for the operation of each end-device to be
carried by data cables rather than by separate power cords. New network applications, such as IP Cameras, VoIP Phones,
and Wireless Networking, can help enterprises improve productivity. It minimizes wires that must be used to install the
network for offering lower cost, and less power failures.
IEEE802.3af also called Data Terminal equipment (DTE) power via Media dependent interface (MDI) is an international
standard to define the transmission for power over Ethernet. The 802.3af is delivering 48V power over RJ-45 wiring.
Besides 802.3af also define two types of source equipment: Mid-Span and End-Span.
„
Mid-Span
Mid-Span device is placed between legacy switch and the powered device. Mid-Span is tap the unused wire pairs 4/5
and 7/8 to carry power, the other four is for data transmit.
„
End-Span
End-Span device is direct connecting with power device. End-Span could also tap the wire 1/2 and 3/6.
PoE System Architecture
The specification of PoE typically requires two devices: the Powered Source Equipment (PSE) and the Powered
Device (PD). The PSE is either an End-Span or a Mid-Span, while the PD is a PoE-enabled terminal, such as IP Phones,
Wireless LAN, etc. Power can be delivered over data pairs or spare pairs of standard CAT-5 cabling.
How Power is Transferred Through the Cable
A standard CAT5 Ethernet cable has four twisted pairs, but only two of these are used for 10BASE-T and 100BASE-T. The
specification allows two options for using these cables for power, shown in Figure 2 and Figure 3:
The spare pairs are used. Figure 2 shows the pair on pins 4 and 5 connected together and forming the positive supply,
and the pair on pins 7 and 8 connected and forming the negative supply. (In fact, a late change to the spec allows either
polarity to be used).
POWER SOURCING
EQUIPMENT (PSE)
POWER DEVICE
(PD)
4
4
5
5
SPARE PAIR
1
+
TX
1
2
2
RX
DC/DC
SIGNAL PAIR
48V
Converter
RX
TX
SIGNAL PAIR
7
7
8
8
SPARE PAIR
Figure 1 - Power Supplied over the Spare Pins
157
User’s Manual of ISW-1022M Series and ISW-1033MT
The data pairs are used. Since Ethernet pairs are transformer coupled at each end, it is possible to apply DC power to the
center tap of the isolation transformer without upsetting the data transfer. In this mode of operation the pair on pins 3 and 6
and the pair on pins 1 and 2 can be of either polarity.
POWER SOURCING
EQUIPMENT (PSE)
POWER DEVICE
(PD)
4
4
5
5
SPARE PAIR
+/-
TX
1
1
2
2
RX
DC/DC
SIGNAL PAIR
48V
Converter
+/RX
TX
SIGNAL PAIR
7
7
8
8
SPARE PAIR
Figure 2 - Power Supplied over the Data Pins
When to install PoE?
Consider the following scenarios:
• • You're planning to install the latest VoIP Phone system to minimize cabling building costs when your company moves
into new offices next month.
• • The company staff has been clamoring for a wireless access point in the picnic area behind the building so they can
work on their laptops through lunch, but the cost of electrical power to the outside is not affordable.
• • Management asks for IP Surveillance Cameras and business access systems throughout the facility, but they would
rather avoid another electrician's payment.
References:
IEEE Std 802.3af-2003 (Amendment to IEEE Std 802.3-2002, including IEEE Std 802.3ae-2002), 2003 Page(s):0_1-121
White Paper on Power over Ethernet (IEEE802.3af)
http://www.poweroverethernet.com/articles.php?article_id=52
Microsemi /PowerDsine
http://www.microsemi.com/PowerDsine/
Linear Tech
http://www.linear.com/
158
User’s Manual of ISW-1022M Series and ISW-1033MT
The PoE Provision Process
While adding PoE support to networked devices is relatively painless, it should be realized that power cannot simply be
transferred over existing CAT-5 cables. Without proper preparation, doing so may result in damage to devices that are not
designed to support provision of power over their network interfaces.
The PSE is the manager of the PoE process. In the beginning, only small voltage level is induced on the port's output, till a
valid PD is detected during the Detection period. The PSE may choose to perform classification, to estimate the amount of
power to be consumed by this PD. After a time-controlled start-up, the PSE begins supplying the 48 VDC level to the PD,
till it is physically or electrically disconnected. Upon disconnection, voltage and power shut down.
Since the PSE is responsible for the PoE process timing, it is the one generating the probing signals prior to operating the
PD and monitoring the various scenarios that may occur during operation.
All probing is done using voltage induction and current measurement in return.
Stages of powering up a PoE link
Stage
Measure whether powered device has the correct signature
Detection
Volts specified
Volts managed
per 802.3af
by chipset
2.7-10.0
1.8–10.0
Action
resistance of 15–33 kΩ
Classification
Measure which power level class the resistor indicates
14.5-20.5
12.5–25.0
Startup
Where the powered device will startup
>42
>38
Normal operation
Supply power to device
36-57
25.0–60.0
Line Detection
Before power is applied, safety dictates that it must first be ensured that a valid PD is connected to the PSE's output. This
process is referred to as "line detection", and involves the PSE seeking a specific, 25 KΩ signature resistor. Detection of
this signature indicates that a valid PD is connected, and that provision of power to the device may commence.
The signature resistor lies in the PD's PoE front-end, isolated from the rest of the the PD's circuitries till detection is
certified.
Classification
Once a PD is detected, the PSE may optionally perform classification, to determine the maximal power a PD is to
consume. The PSE induces 15.5-20.5 VDC, limited to 100 mA, for a period of 10 to 75 ms responded by a certain current
consumption by the PD, indicating its power class.
The PD is assigned to one of 5 classes: 0 (default class) indicates that full 15.4 watts should be provided, 1-3 indicate
various required power levels and 4 is reserved for future use. PDs that do not support classification are assigned to class
0. Special care must be employed in the definition of class thresholds, as classification may be affected by cable losses.
Classifying a PD according to its power consumption may assist a PoE system in optimizing its power distribution. Such a
system typically suffers from lack of power resources, so that efficient power management based on classification results
may reduce total system costs.
159
User’s Manual of ISW-1022M Series and ISW-1033MT
Start-up
Once line detection and optional classification stages are completed, the PSE must switch from low voltage to its full
voltage capacity (44-57 Volts) over a minimal amount of time (above 15 microseconds).
A gradual startup is required, as a sudden rise in voltage (reaching high frequencies) would introduce noise on the data
lines.
Once provision of power is initiated, it is common for inrush current to be experienced at the PSE port, due to the PD’s
input capacitance. A PD must be designed to cease inrush current consumption (of over 350 mA) within 50 ms of power
provision startup.
Operation
During normal operation, the PSE provides 44-57 VDC, able to support a minimum of 15.4 watts power.
Power Overloads
The IEEE 802.3af standard defines handling of overload conditions. In the event of an overload (a PD drawing a higher
power level than the allowed 12.95 Watts), or an outright short circuit caused by a failure in cabling or in the PD, the PSE
must shut down power within 50 to 75 milliseconds, while limiting current drain during this period to protect the cabling
infrastructure. Immediate voltage drop is avoided to prevent shutdown due to random fluctuations.
Power Disconnection Scenarios
The IEEE 802.3af standard requires that devices powered over Ethernet be disconnected safely (i.e. power needs be shut
down within a short period of time following disconnection of a PD from an active port).
When a PD is disconnected, there is a danger that it will be replaced by a non-PoE-ready device while power is still on.
Imagine disconnecting a powered IP phone utilizing 48 VDC, then inadvertently plugging the powered Ethernet cable into
a non-PoE notebook computer. What’s sure to follow is not a pretty picture.
The standard defines two means of disconnection, DC Disconnect and AC Disconnect, both of which provide the same
functionality - the PSE shutdowns power to a disconnected port within 300 to 400ms. The upper boundary is a physical
human limit for disconnecting one PD and reconnecting another.
DC Disconnect
DC Disconnect detection involves measurement of current. Naturally, a disconnected PD stops consuming current, which
can be inspected by the PSE. The PSE must therefore disconnect power within 300 to 400 ms from the current flow stop.
The lower time boundary is important to prevent shutdown due to random fluctuations.
AC Disconnect
This method is based on the fact that when a valid PD is connected to a port, the AC impedance measured on its
terminals is significantly lower than in the case of an open port (disconnected PD).
AC Disconnect detection involves the induction of low AC signal in addition to the 48 VDC operating voltage. The returned
AC signal amplitude is monitored by the PSE at the port terminals. During normal operation, the PD's relatively low
impedance lowers the returned AC signal while a sudden disconnection of this PD will cause a surge to the full AC signal
level and will indicate PD disconnection.
160
User’s Manual of ISW-1022M Series and ISW-1033MT
Appendix A—RJ-45 Pin Assignment
A.1 Switch's RJ-45 Pin Assignments
1000Mbps, 1000Base T
Contact
MDI
MDI-X
1
BI_DA+
BI_DB+
2
BI_DA-
BI_DB-
3
BI_DB+
BI_DA+
4
BI_DC+
BI_DD+
5
BI_DC-
BI_DD-
6
BI_DB-
BI_DA-
7
BI_DD+
BI_DC+
8
BI_DD-
BI_DC-
Implicit implementation of the crossover function within a twisted-pair cable, or at a wiring panel, while not expressly
forbidden, is beyond the scope of this standard.
A.2 10/100Mbps, 10/100Base-TX
When connecting your 10/100Mbps Ethernet Switch to another switch, a bridge or a hub, a straight or crossover cable is
necessary. Each port of the Switch supports auto-MDI/MDI-X detection. That means you can directly connect the Switch
to any Ethernet devices without making a crossover cable. The following table and diagram show the standard RJ-45
receptacle/ connector and their pin assignments:
RJ-45 Connector pin assignment
Contact
MDI
MDI-X
Media Dependant Interface
Media Dependant Interface-Cross
1
Tx + (transmit)
Rx + (receive)
2
Tx - (transmit)
Rx - (receive)
3
Rx + (receive)
Tx + (transmit)
4, 5
Not used
6
Rx - (receive)
7, 8
Not used
Tx - (transmit)
161
User’s Manual of ISW-1022M Series and ISW-1033MT
The standard cable, RJ-45 pin assignment
The standard RJ-45 receptacle/connector
There are 8 wires on a standard UTP/STP cable and each wire is color-coded. The following shows the pin allocation and
color of straight cable and crossover cable connection:
Straight Cable
1
1
2
2
3
3
4
4
5
5
6
6
7
7
8
8
SIDE 1
SIDE2
1 = White / Orange
1 = White / Orange
2 = Orange
2 = Orange
3 = White / Green
3 = White / Green
4 = Blue
4 = Blue
5 = White / Blue
5 = White / Blue
6 = Green
6 = Green
7 = White / Brown
7 = White / Brown
SIDE 2
8 = Brown
8 = Brown
SIDE 1
SIDE2
SIDE 1
1 = White / Orange
1 = White / Green
2 = Orange
2 = Green
3 = White / Green
3 = White / Orange
4 = Blue
4 = Blue
5 = White / Blue
5 = White / Blue
6 = Green
6 = Orange
7 = White / Brown
7 = White / Brown
8 = Brown
8 = Brown
SIDE 1
Crossover Cable
1
1
2
2
3
3
4
4
5
5
6
6
7
7
8
8
SIDE 2
Figure A-1: Straight-Through and Crossover Cable
Please make sure your connected cables are with same pin assignment and color as above picture before deploying the
cables into your network.
162
User’s Manual of ISW-1022M Series and ISW-1033MT
Appendix B Troubles shooting
„
Verify that is using the right power cord/adapter (DC 24-48V), please don’t use the power adapter with DC
output higher than 48V, or it may damage this device.
„
Select the proper UTP/STP cable to construct the user network. Use unshielded twisted-pair (UTP) or shield
twisted-pair (STP) cable for RJ-45 connections that depend on the connector type the switch equipped: 100Ω
Category 3, 4 or 5 cable for 10Mbps connections, 100Ω Category 5 cable for 100Mbps connections, or 100
Ω Category 5e/above cable for 1000Mbps connections. Also be sure that the length of any twisted-pair
connection does not exceed 100 meters (328 feet).
„
Diagnosing LED Indicators: To assist in identifying problems, the switch can be easily monitored through
panel indicators, which describe common problems the user may encounter and where the user can find
possible solutions.
„
If the power indicator does not light on when the power cord is plugged in, you may have a problem with
power cord. Then check for loose power connections, power losses or surges at power outlet. If you still
cannot resolve the problem, contact the local dealer for assistance.
„
If the LED indicators are normal and the connected cables are correct but the packets still cannot be
transmitted. Please check the user system’s Ethernet devices’ configuration or status
163
EC Declaration of Conformity
For the following equipment:
*Type of Product:
*Model Number:
8-Port 10/100Mbps + 2G TP/SFP Managed Industrial Switch (-10~60
Degree C)
ISW-1022M
* Produced by:
Manufacturer‘s Name :
Manufacturer‘s Address:
Planet Technology Corp.
11F, No 96, Min Chuan Road,
Hsin Tien, Taipei, Taiwan, R.O.C.
is herewith confirmed to comply with the requirements set out in the Council Directive on the
Approximation of the Laws of the Member States relating to Electromagnetic Compatibility
Directive on (2004/108/EC).
For the evaluation regarding the EMC, the following standards were applied:
EN55011
EN 61000-6-4
EN 61000-3-2
EN 61000-3-3
EN 61000-6-2
IEC 61000-4-2
IEC 61000-4-3
IEC 61000-4-4
IEC 61000-4-5
IEC 61000-4-6
IEC 61000-4-8
IEC 61000-4-11
IEC 61000-4-12
(1998 + A1: 1999 + A2: 2002, CLASS A)
(2001)
(2000, Class A)
(1995 / A1: 2001)
(2001)
(2001)
(2002)
(2004)
(2001)
(2003 + A1: 2004)
(2001)
(2001)
(1995 + A1: 2000)
Responsible for marking this declaration if the:
⌧ Manufacturer
Authorized representative established within the EU
Authorized representative established within the EU (if applicable):
Company Name:
Planet Technology Corp.
Company Address:
11F, No.96, Min Chuan Road, Hsin Tien, Taipei, Taiwan, R.O.C.
Person responsible for making this declaration
Name, Surname
Kent Kang
Position / Title :
Product Manager
Taiwan
Place
3rd Nov., 2008
Date
Legal Signature
PLANET TECHNOLOGY CORPORATION
e-mail: sales@planet.com.tw
http://www.planet.com.tw
11F, No. 96, Min Chuan Road, Hsin Tien, Taipei, Taiwan, R.O.C. Tel:886-2-2219-9518 Fax:886-2-2219-9528
EC Declaration of Conformity
For the following equipment:
*Type of Product:
*Model Number:
8-Port 10/100Mbps + 2G TP/SFP Industrial Ethernet Switch with 8 PoE
(-40~75 Degree C)
ISW-1022MPT
* Produced by:
Manufacturer‘s Name :
Manufacturer‘s Address:
Planet Technology Corp.
11F, No 96, Min Chuan Road,
Hsin Tien, Taipei, Taiwan, R.O.C.
is herewith confirmed to comply with the requirements set out in the Council Directive on the
Approximation of the Laws of the Member States relating to Electromagnetic Compatibility
Directive on (2004/108/EC).
For the evaluation regarding the EMC, the following standards were applied:
EN55022
EN55024
EN 61000-6-4
EN 61000-6-2
IEC 61000-4-2
IEC 61000-4-3
IEC 61000-4-4
IEC 61000-4-5
IEC 61000-4-6
IEC 61000-4-8
(2006 + A1: 2007, CLASS A)
(1998 + A1: 2001 + A2: 2003)
(2007)
(2005)
(2001)
(2006)
(2004)
(2005)
(2006)
(2001)
Responsible for marking this declaration if the:
⌧ Manufacturer
Authorized representative established within the EU
Authorized representative established within the EU (if applicable):
Company Name:
Planet Technology Corp.
Company Address:
11F, No.96, Min Chuan Road, Hsin Tien, Taipei, Taiwan, R.O.C.
Person responsible for making this declaration
Name, Surname
Kent Kang
Position / Title :
Product Manager
Taiwan
Place
5th Nov., 2009
Date
Legal Signature
PLANET TECHNOLOGY CORPORATION
e-mail: sales@planet.com.tw
http://www.planet.com.tw
11F, No. 96, Min Chuan Road, Hsin Tien, Taipei, Taiwan, R.O.C. Tel:886-2-2219-9518 Fax:886-2-2219-9528
EC Declaration of Conformity
For the following equipment:
*Type of Product:
*Model Number:
8-Port 10/100Mbps + 2G TP/SFP Managed Industrial Switch (-10~60
Degree C)
ISW-1022MT
* Produced by:
Manufacturer‘s Name :
Manufacturer‘s Address:
Planet Technology Corp.
11F, No 96, Min Chuan Road,
Hsin Tien, Taipei, Taiwan, R.O.C.
is herewith confirmed to comply with the requirements set out in the Council Directive on the
Approximation of the Laws of the Member States relating to Electromagnetic Compatibility
Directive on (2004/108/EC).
For the evaluation regarding the EMC, the following standards were applied:
EN55022
EN55024
EN 61000-6-4
EN 61000-6-2
IEC 61000-4-2
IEC 61000-4-3
IEC 61000-4-4
IEC 61000-4-5
IEC 61000-4-6
IEC 61000-4-8
(2006 + A1: 2007, CLASS A)
(1998 + A1: 2001 + A2: 2003)
(2007)
(2005)
(2001)
(2006)
(2004)
(2005)
(2006)
(2001)
Responsible for marking this declaration if the:
⌧ Manufacturer
Authorized representative established within the EU
Authorized representative established within the EU (if applicable):
Company Name:
Planet Technology Corp.
Company Address:
11F, No.96, Min Chuan Road, Hsin Tien, Taipei, Taiwan, R.O.C.
Person responsible for making this declaration
Name, Surname
Kent Kang
Position / Title :
Product Manager
Taiwan
Place
5th Nov., 2009
Date
Legal Signature
PLANET TECHNOLOGY CORPORATION
e-mail: sales@planet.com.tw
http://www.planet.com.tw
11F, No. 96, Min Chuan Road, Hsin Tien, Taipei, Taiwan, R.O.C. Tel:886-2-2219-9518 Fax:886-2-2219-9528
EC Declaration of Conformity
For the following equipment:
*Type of Product:
*Model Number:
7-Port 10/100Mbps + 3G TP/SFP Managed Industrial Switch (-40~75
Degree C)
ISW-1033MT
* Produced by:
Manufacturer‘s Name :
Manufacturer‘s Address:
Planet Technology Corp.
11F, No 96, Min Chuan Road,
Hsin Tien, Taipei, Taiwan, R.O.C.
is herewith confirmed to comply with the requirements set out in the Council Directive on the
Approximation of the Laws of the Member States relating to Electromagnetic Compatibility
Directive on (2004/108/EC).
For the evaluation regarding the EMC, the following standards were applied:
EN55022
EN55024
EN 61000-6-4
EN 61000-6-2
IEC 61000-4-2
IEC 61000-4-3
IEC 61000-4-4
IEC 61000-4-5
IEC 61000-4-6
IEC 61000-4-8
(2006 + A1: 2007, CLASS A)
(1998 + A1: 2001 + A2: 2003)
(2007)
(2005)
(2001)
(2006)
(2004)
(2005)
(2006)
(2001)
Responsible for marking this declaration if the:
⌧ Manufacturer
Authorized representative established within the EU
Authorized representative established within the EU (if applicable):
Company Name:
Planet Technology Corp.
Company Address:
11F, No.96, Min Chuan Road, Hsin Tien, Taipei, Taiwan, R.O.C.
Person responsible for making this declaration
Name, Surname
Kent Kang
Position / Title :
Product Manager
Taiwan
Place
5th Nov., 2009
Date
Legal Signature
PLANET TECHNOLOGY CORPORATION
e-mail: sales@planet.com.tw
http://www.planet.com.tw
11F, No. 96, Min Chuan Road, Hsin Tien, Taipei, Taiwan, R.O.C. Tel:886-2-2219-9518 Fax:886-2-2219-9528