RS2-4R Management Manual Industrial ETHERNET Rail Switch 2
RS2-4R Management Manual Industrial ETHERNET Rail Switch 2
The naming of copyrighted trademarks in this manual, even when not specially indicated, should not be taken to mean that these names may be considered as free in the sense of the trademark and tradename protection law and hence that they may be freely used by anyone. © 2004 Hirschmann Electronics GmbH & Co. KG Manuals and software are protected by copyright. All rights reserved.
Hirschmann worldwide: Hirschmann worldwide: U Germany Hirschmann Electronics GmbH & Co. KG Automation and Network Solutions Stuttgarter Straße 45-51 D-72654 Neckartenzlingen Tel. ++49-7127-14-1480 Fax ++49-7127-14-1502 email: ans-hi-line@hirschmann.de Internet: www.hirschmann.de U Switzerland Hirschmann Electronics GmbH & Co. KG, Neckartenzlingen Niederlassung Uster Seestr. 16 CH-8610 Uster Tel. ++41-1905-8282 Fax ++41-1905-8289 email: ans_ch@hirschmann.ch U France Hirschmann Electronics S.A.S.
Hirschmann worldwide: U Great Britain Hirschmann Electronics Ltd. 4303 Waterside Centre Solihull Parkway Birmingham Business Park Birmingham West Midlands B37 7YN Tel. ++44-121 329 5000 Fax ++44-121 329 5001 email: enquiry@hirschmann.co.uk U Netherlands Hirschmann Electronics B.V. Pampuslaan 170 NL-1382 JS Weesp Tel. ++31-294-462591 Fax ++31-294-462554 email: ans@hirschmann.nl U Spain Hirschmann Electronics S.A. Calle Traspaderne, 29 Barrio del Aeropuerto Edificio Barajas I, 2a Planta E-28042 Madrid Tel.
Hirschmann worldwide: U USA Hirschmann Electronics Inc. 20440 Century Boulevard, Suite 150 Germantown, MD 20874 Tel. ++1-240-686 2300 Fax ++1-240-686 3589 email: ans@hirschmann-usa.com U Singapore Hirschmann Electronics Pte. Ltd. 2 International Business Park #11-02/03 Tower One The Strategy Singapore 609930 Tel: ++65 6316 7797 Fax:++65 6316 7977 email: hirschmann.svi@pacific.net.sg U China Hirschmann Electronics Pte Ltd Shanghai Office Room 828, Summit Centre, 1088 West Yan An Road Shanghai 200052 P.R.
Hirschmann worldwide: 8 RS2-4R Release 1.
Hirschmann Competence Hirschmann Competence In the longterm, product excellence alone is not an absolute guarantee of a successful project implementation. Comprehensive service makes a difference worldwide.
Hirschmann Competence 10 RS2-4R Release 1.
Contents Contents 1 Introduction 19 1.1 Industrial networking solutions with a future 21 1.2 The Industrial ETHERNET Rail Switches 23 2 Hardware RS2-4R Release 1.
Contents 3 Installation and startup procedure 29 3.1 Safety instructions 31 3.2 Device installation 37 3.2.1 3.2.2 3.2.3 3.2.4 3.2.5 37 38 40 41 43 Controls 6-pin terminal block Assembly Interfaces Disassembly 3.3 Startup operation 45 3.4 Basic settings 47 3.4.1 3.4.2 3.4.3 3.4.4 3.4.5 IP address (version 4) System configuration via V.
Contents 4 Functions 85 4.1 Displays 87 4.1.1 Device status 4.1.2 Port status 87 88 Hardware functions 89 4.2.1 4.2.2 4.2.3 4.2.4 4.2.5 4.2.6 89 89 90 90 90 91 4.2 4.3 Frame switching 4.3.1 4.3.2 4.3.3 4.3.4 4.3.5 4.3.6 4.3.7 4.3.8 4.4 4.
Contents 4.6 Security 115 4.6.1 SNMP 4.6.2 SNMP traps 4.6.3 SNMP traps when booting 115 116 117 5 Web-based management 119 5.1 Opening the Web-based interface 121 5.2 Menu tree 125 5.3 System 127 5.3.1 Updating the software 5.3.2 Defining the start configuration 5.3.3 Signal Contact 5.3.4 SNTP 5.3.5 Configure the network 5.3.6 Password 5.3.7 WEB access 5.3.8 Access for IP addresses 5.3.9 Configuring traps 5.3.10Restarting the switch 132 135 139 141 144 146 148 149 151 153 Ports 155 5.4.
Contents 5.5 5.6 Switching 159 5.5.1 Basic Switch Data 5.5.2 Filtering Database 5.5.3 Rapid Spanning Tree 159 160 161 Extras 165 5.6.1 5.6.2 5.6.3 5.6.4 5.6.5 5.6.6 166 167 168 170 171 172 RS2-4R Release 1.
Contents 6 Management Information Base (MIB) 173 6.1 MIB II 177 6.1.1 6.1.2 6.1.3 6.1.4 6.1.5 6.1.6 6.1.7 6.1.8 System Group (1.3.6.1.2.1.1) Interface group (1.3.6.1.2.1.2) Address Translation Group (1.3.6.1.2.1.3) Internet Protocol Group (1.3.6.1.2.1.4) ICMP Group (1.3.6.1.2.1.5) Transfer Control Protocol Group (1.3.6.1.2.1.6) User Datagram Protocol Group (1.3.6.1.2.1.7) Simple Network Management Protocol Group (1.3.6.1.2.1.11) 6.1.9 RMON Group (1.3.6.1.2.1.16) 6.1.10dot1dBridge (1.3.6.1.2.1.17) 6.
Contents 7 User Interface 209 7.1 Opening the user interface 211 7.2 Operating the user interface 213 7.2.1 System parameters 7.2.2 Switching General 7.2.3 Switch security 7.2.4 Port configuration / statistics 7.2.5 Port Mirroring / Disable learning 7.2.6 Configuration 7.2.7 Update 7.2.8 Password 7.2.9 Ping 7.2.10System reset 213 216 217 218 219 220 223 224 226 227 RS2-4R Release 1.
Contents A Appendix FAQ 231 Setting up DHCP Server Option 82 233 Based specifications and standards 239 Certifications 241 Technical Data 243 Literature references 247 Copyright of integrated software 249 GNU LESSER GENERAL PUBLIC LICENSE The Legion Of The Bouncy Castle 18 229 249 261 Reader's comments 263 Index 265 RS2-4R Release 1.
Introduction 1 Introduction In 1984, Hirschmann implemented the world's first ever fiber optic based ETHERNET at the University of Stuttgart, Germany. Then in 1990, Hirschmann introduced the "ETHERNET Ring". These innovations were followed in 1993 by the first media converters for fieldbus systems and rapid redundancy in the switched ETHERNET in 1998.
Introduction 20 RS2-4R Release 1.
Introduction 1.1 Industrial networking solutions with a future 1.1 Industrial networking solutions with a future Ethernet is the most widely used communication technology for IT systems. In the office environment, Ethernet has evolved into the standard technology. However, it is also gaining ground in the area of industrial automation.
Introduction 1.1 Industrial networking solutions with a future General features of the Industrial ETHERNET Rail products include: D Durable construction for industrial use (IP 20, particularly EMC and vibration tests, 24 V supply voltage, without fan). D Quick assembly (the sturdy devices are simply mounted on a standard DIN rail) D Fast startup with Plug & Play technology (autonegotiation, autopolarity, autocrossing) and extensive diagnostic displays.
Introduction 1.2 The Industrial ETHERNET Rail Switches 1.2 The Industrial ETHERNET Rail Switches Created from the start as mission-critical switches, Hirschmann's Industrial ETHERNET switches are distinguished by their high network reliability. The Hirschmann ring structure ensures that a single physical or logical error can not lead to system failure. The redundancy concepts incorporated into the switch enable the creation of a reliable, error-resistant communication network based on Ethernet.
Introduction 1.2 The Industrial ETHERNET Rail Switches Rail Switches RS2-4R also contain an SNMP management agent and integrated Web-based management. This enables easy-to-handle configuration functions for a fast starting operation, and extensive network and device information also contributes to ultimate system reliability. The 24 V operating voltage is supplied via a plug-in terminal block and can also be configured for redundancy.
Hardware 2 Hardware The Industrial ETHERNET Rail Switch RS2-4R family consists of 7 devices. These devices can be managed and have the same functionality, 2 twisted pair interfaces as well as two other model-dependent interfaces. D D D D D D D RS2-4R RS2-4R 1MM SC RS2-4R 1SM SC RS2-4R 1LH SC RS2-4R 2MM SC RS2-4R 2SM SC RS2-4R 2LH SC For the sake of simplicity, these 7 devices have been designated as RS2-4R in this manual. The RS2-4R operates in store-and-forward mode.
Hardware DA 1 1 LS LS LS DA DA DA 2 2 FAULT 4 4 LS LS LS MAC-Adressfeld IP-Adressfeld LED Anzeigeelemente Port 4 RS2-4R 1MM SC 1SM SC 1LH SC 2MM SC 2SM SC 2LH SC Port 3 RS2-4R 1MM SC 1SM SC 1LH SC 2MM SC 2SM SC 2LH SC LH DA 4 x x x x x x x LH 4 2 HIPER-Ring-Ports (Port 3 und 4) SM DA 3 LS SM LS DA MM 3 Port 1 und 2 nach 10/100BASE-T(X) Autonegotiaton + Autopolarity + Autocrossing (RJ45-Anschlüsse) MM DA 2 LS V.
Hardware The LED's indicate data reception, connection status and processor status.
Hardware 28 RS2-4R Release 1.
Installation and startup procedure 3 Installation and startup procedure The Industrial ETHERNET Rail Switch RS2-4R family has been developed for practical applications in a harsh industrial environment. Accordingly, the installation process has been kept simple. The few configuration settings required for operation are described in this chapter. RS2-4R Release 1.
Installation and startup procedure 30 RS2-4R Release 1.
Installation and startup procedure 3.1 Safety instructions 3.1 Safety instructions U Supply voltage The devices are designed for operation with a safety extra-low voltage. They may only be connected to the supply voltage connections and to the signal contact with PELV circuits or alternatively SELV circuits with the voltage restrictions in accordance with IEC/EN 60950. The supply voltage is electrically isolated from the housing.
Installation and startup procedure 3.1 Safety instructions U Housing Only technicians authorized by Hirschmann are permitted to open the housing. The device is grounded via the separated ground screw. It is located on the bottom of the front panel. V Make sure that the electrical installation meets local or nationally applicable safety regulations. V The ventilation slits must not be covered to ensure free air circulation.
Installation and startup procedure 3.1 Safety instructions U Qualification requirements for personnel Qualified personnel as understood in this manual and the warning signs, are persons who are familiar with the setup, assembly, startup, and operation of this product and are appropriately qualified for their job.
Installation and startup procedure 3.1 Safety instructions U National and international safety regulations V Make sure that the electrical installation meets local or nationally applicable safety regulations. U Note on the CE marking The devices comply with the regulations contained in the following European directives: 89/336/EEC Directive of the council for standardizing the regulations of member states on electromagnetic compatibility (changed by RL 91/263/EEC, 92/ 31/EEC and 93/68/EEC).
Installation and startup procedure 3.1 Safety instructions U FCC note: Appropriate testing has established that this device fulfills the requirements of a class A digital device in line with part 15 of the FCC regulations. These requirements are designed to provide sufficient protection against interference where the device is being used in a business environment.
Installation and startup procedure 36 3.1 Safety instructions RS2-4R Release 1.
Installation and startup procedure 3.2 Device installation 3.2 Device installation 3.2.1 Controls U DIP switch With the -pin DIP switch on the front panel of the RS2-4R D the RM functionality (Redundancy Manager) can be switched on or off with the RM switch if the HIPER-Ring function is switched on. State on delivery: switch position 0 (Off), i.e. RM function not active (see “Redundant ring structure – HIPER-Ring” on page 114). D the HIPER-Ring fuctionality can be switched on or off with the RING switch.
Installation and startup procedure 3.2 Device installation 3.2.2 6-pin terminal block The supply voltage and the signal contact are connected via a 6-pin terminal block with Rast locking. Warning! The RS2-4R devices are designed for operation with safety extra-low voltage. Thus, they may only be connected to the supply voltage connections and to the signal contact with PELV circuits or alternatively SELV circuits with the voltage restrictions in accordance with IEC/EN 60950.
Installation and startup procedure 3.2 Device installation Note: With non-redundant supply of the mains voltage, the RS2-4R reports a power failure. You can prevent this message by applying the supply voltage over the two inputs or by switching off the monitoring (see “Proper functioning” on page 139). +24 V (P1) 0V 0V +24 V (P2) Fault Fig. 3: Pin assignment of the 6-pin terminal block V Pull the terminal block off the RS2-4R and connect the power supply and signal lines. RS2-4R Release 1.
Installation and startup procedure 3.2 Device installation 3.2.3 Assembly On delivery, the device is ready for operation. V Slide the upper snap-in guide of the RS2-4R into the top-hat rail and press it down against the rail until it snaps into place. Fig. 4: Assembly Note: The front panel of the housing of the RS2-4R is grounded via a ground connection. Note: The housing must not be opened.
Installation and startup procedure 3.2 Device installation 3.2.4 Interfaces U 10/100 Mbit/s connection 10/100 Mbit/s ports (8-pin R45 socket) enable the connection of terminal devices or independent network segments in compliance with the IEEE 802.3 100BASE-TX / 10BASE-T standards.
Installation and startup procedure 3.2 Device installation U V.24 interface (external management) A serial interface is provided on the RJ11 socket (V.24 interface) for the local connection of D an external management station (VT100 terminal or PC with appropriate terminal emulation). This makes it possible to establish a connection to the user interface UI (see “User Interface” on page 209). D an ACA 11 AutoConfiguration Adapter.
Installation and startup procedure 3.2 Device installation 3.2.5 Disassembly V In order to remove the RS2-4R from the top-hat rail, move the screwdriver horizontally under the chassis in the locking gate, pull this down — without tilting the screwdriver — and fold the RS2-4R up. Fig. 7: Disassembly RS2-4R Release 1.
Installation and startup procedure 44 3.2 Device installation RS2-4R Release 1.
Installation and startup procedure 3.3 Startup operation 3.3 Startup operation When the supply voltage is connected via the 6-pin terminal, start up the RS2-4R. RS2-4R Release 1.
Installation and startup procedure 46 3.3 Startup operation RS2-4R Release 1.
Installation and startup procedure 3.4 Basic settings 3.4 Basic settings The RS2-4R is designed for ease of use and complies as far as possible with the "plug and play" principle. IP address(es) must be entered when the RS24R is installed for the first time. The RS2-4R provides 6 options for configuring the IP addresses: D D D D D D Entry via the V.
Installation and startup procedure 3.4 Basic settings The network address represents the fixed part of the IP address. The worldwide leading regulatory board for assigning Internet addresses is the IANA (Internet Assigned Numbers Authority). If you need an IP address block, contact your Internet-Service-Provider.
Installation and startup procedure 3.4 Basic settings U Network mask Routers and gateways subdivide large networks into subnetworks. The network mask assigns the IP addresses of the individual devices to a particular subnetwork. The division into subnetworks with the aid of the network mask is performed in much the same way as the division of the network addresses into classes A to C (net id). In the part of the host address (host id) representing the mask, the bits are set to one.
Installation and startup procedure 3.4 Basic settings Example of IP addresses with subnetworks assignment when the above subnet mask is applied: Decimal notation 129.218.65.17 128 < 129 ≤ 191 ➝ Class B binary notation 10000001.11011010.01000001.00010001 Subnetwork 1 Network address Decimal notation 129.218.129.17 128 < 129 ≤ 191 ➝ Class B binary notation 10000001.11011010.10000001.00010001 Subnetwork 2 Network address 50 RS2-4R Release 1.
Installation and startup procedure 3.4 Basic settings U Example of how the network mask is used In a large network it is possible that gateways and routers separate the management agent from its management station. How does addressing work in such a case? Romeo Juliet Lorenzo LAN 1 LAN 2 Fig. 9: Management agent that is separated from its management station by a router The management station "Romeo" wants to send data to the management agent "Juliet".
Installation and startup procedure 3.4 Basic settings Lorenzo receives the letter and removes the outer envelope. From the inner envelope he recognizes that the letter is meant for Juliet. He places the inner envelope in a new outer envelope and searches his address list (the ARP table) for Juliet's MAC address. He writes her MAC address on the outer envelope as the destination address and his own MAC address as the source address. He then places the entire data packet in the mail box.
Installation and startup procedure 3.4 Basic settings 3.4.2 System configuration via V.24 interface If you do not configure the system via BOOTP, DHCP, Hidiscovery protocol or the ACA AutoConfiguration Adapter, then perform the configuration via the V.24 interface: Entering IP addresses Connect the VT100 terminal to the RJ11 socket The user interface starts after key press Enter password (State of delivery: private) Enter IP addresses under System parameter End of enter IP addresses Fig.
Installation and startup procedure 3.4 Basic settings The RS2-4R should be labeled to prevent confusion during subsequent installation. V Connect a VT 100 terminal or a PC with terminal emulation to the RJ11 socket (V.24). Data transfer parameters: Speed: 9,600 baud Data: 8 bit Parity: none Stopbit: 1 bit Handshake: off Note: The transmission rate can be changed in the system monitor (see “3 Change Baudrate” on page 78). V Once the RS2-4R has been installed, start it by connecting the power supply.
Installation and startup procedure 3.4 Basic settings U Network mask (netmask) If your network has been divided up into subnetworks, and if these are identified with a network mask, then the network mask is to be entered here. The default setting of the network mask is 0.0.0.0. The addresses are stored in a non-volatile memory. After entering the IP address, you can easily configure the via the “Webbased management” on page 119. 3.4.
Installation and startup procedure 3.4 Basic settings V Start the HiDiscovery program. Fig. 11: HiDiscovery When HiDiscovery is started, it automatically searches the network for those devices which support the HiDiscovery protocol. HiDiscovery uses the first PC network card found. If your computer has several network cards, you can select these in HiDiscovery on the toolbar. HiDiscovery displays a line for every device which reacts to the HiDiscovery protocol.
Installation and startup procedure 3.4 Basic settings By double-clicking a line, you open a window in which you can enter the device name and the IP parameter. Fig. 12: HiDiscovery - assigning IP parameters Note: For security reasons, switch off the HiDiscovery function for the device in the Web-based interface, after you have assigned the IP parameters to the device. 3.4.
Installation and startup procedure 3.4 Basic settings # tc -- template .global:\ :gw=0.0.0.0:\ :sm=255.255.240.0: rs2_01:ht=ethernet:ha=008063086501:ip=149.218.17.83:tc= .global: rs2_02:ht=ethernet:ha=008063086502:ip=149.218.17.84:tc= .global: . . Lines that start with a '#' character are comment lines. The lines under ".global:" make the configuration of several devices easier. With the template (tc) you allocate the global configuration data (tc=.global:).
Installation and startup procedure 3.4 Basic settings Start-up Load boot configuration local default Load settings from flash memory Switch in initalization Switch runs with settings from local flash DHCP or BOOTP? No Yes No* Send DHCP/ BOOTP Requests Reply from DHCP/BOOTP server? Save IP parameter and config file URL locally Yes initialize IP stack with IP parameters Switch is manageable 2 Fig. 13: Flow chart for the BOOTP/DHCP process, part 1 * see note on page 135 RS2-4R Release 1.
Installation and startup procedure 3.4 Basic settings 2 Start tftp process with config file URL of DHCP Load remote configuration from Yes URL of DHCP? No tftp successful? Load remoteconfiguration? No* Yes Start tftp process with config file URL of Yes local configuration No tftp successful? Load transferred config file No* Yes Save transferred config file local and set boot configuration to local Load transferred config file Loading of configurations data is complete Fig.
Installation and startup procedure 3.4 Basic settings 3.4.5 System configuration via DHCP (dynamic host configuration protocol) The DHCP responds similarly to the BOOTP and offers in addition the configuration of a DHCP client with a name instead of the MAC address. For the DHCP, this name is known as the "client identifier" in accordance with rfc 2131. The RS2-4R uses the name entered under sysName in the system group of the MIB II as the client identifier (see page 179).
Installation and startup procedure 3.4 Basic settings The special feature of DHCP in contrast to BOOTP is that the server can only provide the configuration parameters for a certain period of time ("lease"). When this time period ("lease duration") expires, the DHCP client must attempt to renew the lease or negotiate a new one. A response similar to BOOTP can be set on the server (i.e.
Installation and startup procedure 3.4 Basic settings fixed-address 149.218.112.83; server-name "149.218.112.11"; filename "/agent/config.dat"; } Lines that start with a '#' character are comment lines. The lines preceding the individually listed devices refer to settings that apply to all the following devices. The fixed-address line assigns a permanent IP address to the device. For further information, please refer to the DHCP server manual. RS2-4R Release 1.
Installation and startup procedure 3.4 Basic settings 3.4.6 System Configuration via DHCP Option 82 As with the classic DHCP, on startup an agent receives its configuration data according to the "BOOTP/DHCP process" flow chart (see Fig. 13). While the system configuration is based on the classic DHCP protocol on the device being configured (see “System configuration via DHCP (dynamic host configuration protocol)” on page 61), Option 82 is based on the network topology.
Installation and startup procedure 3.4 Basic settings 3.4.7 ACA AutoConfiguration Adapter The ACA is a device for storing the configuration data of a MICE, RS2-4R, RS2-16M, RS2-../.., or MACH 3000 switch. In the case of a switch failure, the ACA enables a very simple configuration data transfer by means of a substitute switch of the same type. You can transfer the current switch configuration onto the ACA and the flash memory with "Save local configuration".
Installation and startup procedure 66 3.4 Basic settings RS2-4R Release 1.
Installation and startup procedure 3.5 tftp server for software updates 3.5 tftp server for software updates On delivery, the switch software is held in the flash memory. The RS2-4R boots the software from the flash memory. Software updates can be realized via a tftp server. This presupposes that a tftp server has been installed in the connected network and that it is active. Note: An alternative to the tftp update is the http update. The http update saves you having to configure the tftp server.
Installation and startup procedure 3.5 tftp server for software updates 3.5.1 Setting up the tftp process General prerequisites: D The local address of the RS2-4R and the IP address of the tftp servers or the gateway are known to the RS2-4R. D The TCP/IP stack with tftp is installed on tftp server. The following sections contain information on setting up the tftp process, arranged according to operating system and application.
Installation and startup procedure 3.5 tftp server for software updates You can obtain additional information about the tftpd daemon tftpd with the UNIX command "man tftpd". Note: The command "ps" does not always show the tftp daemon, although it is actually running. Special steps for HP workstations: V During installation on an HP workstation, enter the user tftp in the /etc/passwd file.
Installation and startup procedure 3.5 tftp server for software updates Checking the tftp process Edit the file /etc/inetd.conf No Is tftp* commented out? Yes Delete the comment character »#« from this line Re-initialize inetd.conf by entering kill-1 PID No Problems with the tftp server? Yes Test the tftp process e.g cd /tftpboot/rs2 tftp get rs2/rs2.bin Response if the process is running: Received … rm rs2.
Installation and startup procedure 3.5 tftp server for software updates 3.5.2 Software access rights The agent needs read permission to the tftp directory with the RS2-4R software. U Example of a UNIX tftp server Once RS2-4R software has been installed, the tftp server should have the following directory structure with the stated access rights: Filename rs2.
Installation and startup procedure 72 3.5 tftp server for software updates RS2-4R Release 1.
Installation and startup procedure 3.6 System monitors 3.6 System monitors The system monitors facilitate the implementation of an D update of the operating system The software update can be implemented via V.24 or tftp. The V.24 connection of the RS2-4R supports the baud rates 9,600 and 19,200. 3.6.1 Update of the operating system (system monitor 1) System monitor 1 facilitates an update of the operating system of the RS24R via the V.24 connection.
Installation and startup procedure 8 2 MByte SDRAM detected. MByte FlashROM detected. Press <1> to enter Monitor Fig. 17: 3.6 System monitors 1 Screen display during the boot phase Press the <1> key within one second to start system monitor 1. 74 RS2-4R Release 1.
Installation and startup procedure System-Monitor 1 1 2 3 4 V1.00 3.6 System monitors 27.02.2002 Update Operating System Start Operating System Change Baudrate End > Fig. 18: System monitor 1 screen display RS2-4R Release 1.
Installation and startup procedure 3.6 System monitors U 1 Update Operating System This menu allows you to update the operating system. The following window appears on the screen: Update Operating System with XMODEM Maximal buffer size : 2031616 Bytes start the XMODEM end Fig. 19: Update operating system screen display To leave this screen and return to the main menu of system monitor 1, press the key. Press , to start the update with XMODEM.
Installation and startup procedure Now The The The The The 3.6 System monitors send file from terminal which supports XMODEM/CRC XMODEM starts in 5 seconds XMODEM starts in 4 seconds XMODEM starts in 3 seconds XMODEM starts in 2 seconds XMODEM starts in 1 second Fig. 20: Screen display when you start an update of the OS Afterwards enter the name of the path in which the operating system to be loaded is located. Enter the path name via the terminal program, e.g. under Transmission: binary file.
Installation and startup procedure 3.6 System monitors U 3 Change Baudrate With this menu you can modify the baud rate. The following window appears on the screen: Change Baudrate 1 2 9600 baud 19200 baud > Fig. 21: Screen display for changing baudrate For an update of your operating system (see menu 1) you should choose the maximum speed for the baud rate. Afterwards adapt the speed of your terminal program to this baud rate. 78 RS2-4R Release 1.
Installation and startup procedure 3.6 System monitors U 4 End This menu shuts down system monitor 1. The following window appears on the screen: Systemreset ! Fig. 22: Screen display for shutting down system monitor 1 Afterwards execute hardware reset. RS2-4R Release 1.
Installation and startup procedure 3.6 System monitors 3.6.2 Software update (system monitor 2) System monitor 2 facilitates an update of the RS2-4R operating system via V.24 as well as tftp.
Installation and startup procedure 3.6 System monitors Press the <2> key within three seconds. System monitor 2 is started. System-Monitor 2 1 2 3 4 5 6 7 V1.00 27.02.2002 Software Update V24 Software Update TFTP Cancel automatic update Change Baudrate Set Factory Settings Reset End/Quit > Fig. 24: System monitor 2 screen display RS2-4R Release 1.
Installation and startup procedure 3.6 System monitors U 1 Software Update V24 This menu executes an update of the operation system in the flash memory of the RS2-4R. The update runs via V.24. Note: Preferably use tftp transfer to update the operation system (see “Update” on page 223). It is more than three times faster than the fastest V.24 transfer.
Installation and startup procedure Now The The The The The 3.6 System monitors send file from terminal which supports XMODEM/CRC XMODEM starts in 5 seconds XMODEM starts in 4 seconds XMODEM starts in 3 seconds XMODEM starts in 2 seconds XMODEM starts in 1 second Fig. 26: Screen display when you start an update of the OS Afterwards enter the name of the path in which the operating system to be loaded is located. Enter the path name via the terminal program, e.g. under Transmission: binary file.
Installation and startup procedure 3.6 System monitors U 5 Set Factory Setting With this menu item you can restore the original settings. U 6 Reset The device performs a reset. U 7 End/Quit With this menu item you can terminate the system monitor 2. The management software is started. 84 RS2-4R Release 1.
Functions 4 Functions The devices of the Industrial ETHERNET Rail Switch RS2-4R series contain a wide variety of functions: D D D D D D D Displays Hardware functions Frame switching Spanning Tree Algorithm Redundancy Management SNMP traps There are three tools for operating these functions: D User Interface (supplied with RS2-4R) for setting basic functions (see “User Interface” on page 209).
Functions 86 RS2-4R Release 1.
Functions 4.1 Displays 4.1 Displays 4.1.1 Device status These LED's provide information about conditions which affect the operation of the whole RS2-4R.
Functions 4.1 Displays U FAULT - Error (red LED) Display lit not lit Meaning the signal contact is open, i.e. it reports an error. the signal contact is closed, i.e. it does not report an error. If the "Manual setting" on page 139 is active for the signal contact, the error display is then independent of the position of the signal contact. 4.1.2 Port status These LED's display port-related information.
Functions 4.2 Hardware functions 4.2 Hardware functions 4.2.1 Diagnostics When restarting, the RS2-4R performs a hardware self-diagnosis. During operation, an integrated watchdog (monitoring unit) monitors the function of the software. 4.2.2 Autonegotiation Autonegotiation is a procedure in which the switch automatically selects the operating mode of its 10/100 RJ-45 ports.
Functions 4.2 Hardware functions 4.2.3 Autopolarity exchange If the receive-line pair of a twisted pair cable is incorrectly connected (RD+ and RD- are reversed), polarity is reversed automatically. 4.2.4 Autocrossing If the autonegotiation function is active, the RS2-4R detects the transmit and receive pairs (MDI, MDI-X). The RS2-4R automatically configures its port for the correct transmit and receive pins.
Functions 4.2 Hardware functions U F/O A RS2-4R monitors the connected fiber optic lines for breaks in accordance with the IEEE 802.3 100BASE-FX standard. If a line interruption occurs the switch sends a trap to the management station. The sending of such a trap can be stopped by the management. 4.2.
Functions 92 4.2 Hardware functions RS2-4R Release 1.
Functions 4.3 Frame switching 4.3 Frame switching 4.3.1 Store-and-forward All data received by a RS2-4R is stored, and its validity is checked. Invalid and defective data packets (> 1,522 Bytes or CRC errors) as well as fragments (< 64 Bytes) are discarded. Valid data packets are forwarded by a RS2-4R. 4.3.2 Multi-address capability A RS2-4R learns all the source addresses for a port.
Functions 4.3 Frame switching 4.3.3 Learning addresses A RS2-4R monitors the age of the learned addresses. Address entries which exceed a certain age (30 seconds, aging time) are deleted by the RS2-4R from its address table. The RS2-4R floods data packets with an unknown target address. The RS2-4R transmits data pakets with known target addresses to specific destinations. Note: A reboot deletes the learned address entries. 4.3.
Functions 4.3 Frame switching U Strict priority With Strict priority, the RS2-4R sends all data packets with a higher priority level before it sends a data packet with the next lower priority level. Thus RS2-4R does not send a data packet with the next lower priority until there are no other data packets waiting in the queue. 4.3.5 Tagging The VLAN tag is integrated into the MAC data frame for the VLAN and prioritization functions in accordance with the IEEE 802.1 Q standard.
Functions 4.3 Frame switching ld ie ield F r F d ite ess el i d F lim dr el s i e s d d F el D A re e d Fi e on p d d e m i A ld /Ty el bl Fra nat i e e h i F c F t m t ti a ur ag ng ea tar es at o r P S D S T Le D 7 1 6 6 4 2 k d ec iel h d C F el e Fi me nc d e a Pa Fr qu Se ld e ta Fi a D 42-1500 Octets 4 t min. 64, max. 1522 Octets Fig.
Functions 4.3 Frame switching 4.3.6 Flow control Flow control is a mechanism which acts as an overload protection. During periods of heavy traffic it holds off additional traffic. In the example (see Fig. 29) the functioning of flow control is displayed graphically. Workstations 1, 2 and 3 want to simultaneously transmit a large amount of data to Workstation 4. The combined bandwidth of Workstations 1, 2 and 3 is larger than the bandwidth of Workstation 4 to the switch.
Functions 4.3 Frame switching U Flow control with a full duplex link In the example (see Fig. 29) there is a full duplex link between Workstation 2 and the switch. Before the send queue of Port 4 overflows, the switch sends a request to Workstation 2 to include a small break in the sending transmission. U Flow control with a half duplex link In the example (see Fig. 29) there is a half duplex link between Workstation 2 and the switch.
Functions 4.3 Frame switching 4.3.7 Port mirroring In port mirroring, the data traffic related to a port, the source port, is copied to another port, the destination port. Data traffic at the source port is not influenced by port mirroring (see “Setting port mirroring” auf Seite 170). A management tool connected to the destination port, such as an RMON probe, can thus observe the data traffic at the source port. The destination port forwards data to be sent and blocks received data.
Functions 4.3 Frame switching 4.3.8 Broadcast limiter To guarantee reliable data exchange during high broadcast traffic, the switch can limit broadcast traffic. By entering a number for each port, you can set the number of broadcasts that can be sent out of this port within a second. If more than the maximum entered number of broadcasts are sent within a second, the switch rejects all subsequent broadcasts destined for this port.
Functions 4.4 Spanning Tree Algorithm 4.4 Spanning Tree Algorithm Local area networks are becoming ever larger. This is true both for their geographic size as well as for the number of stations they include.
Functions 4.4 Spanning Tree Algorithm D It must produce a reproducible topology that can be pre-defined by management. D It must be transparent to the terminal equipment. D By creating a tree structure it must result in a low network load compared to the available transmission capacity. 4.4.
Functions 4.4 Spanning Tree Algorithm U Root path costs Each path connecting two bridges has transmission costs assigned to it. The management administrator sets this value and specifies it for each path when configuring a bridge (see Table 7 on page 109). Because the management administrator essentially has a free hand in specifying this value, he has a tool for ensuring that in case of redundant paths one path will be favored over the others.
Functions 4.4 Spanning Tree Algorithm The port number and port priority number are stored in the Management Information Base (see “dot1dBridge (1.3.6.1.2.1.17)” on page 316): - dot1dStpPortPathCost (1.3.6.1.2.1.17.2.15.10,1.Index) - dot1dStpPortPriority (1.3.6.1.2.1.17.2.15.1.2.Index) MSB LSB Priority Port number Fig. 33: Port identification In order to compute their tree structures, the bridges need information about other bridges that are present in the network.
Functions 4.4 Spanning Tree Algorithm Determine root path Equal path costs? no Path with lowest path costs = root path no Path with highest priority in bridge identification = root path no Path with highest port priority = root path yes Equal priority in bridge identification? yes Equal port priority? yes Path with lowest port number = root path Root path determined Fig. 34: Flow chart for determining root path Using the network diagram (see Fig.
Functions 4.4 Spanning Tree Algorithm The path from bridge 6 to the root bridge is interesting: D The path via bridges 5 and 3 generates the same root path costs as the path via bridges 4 and 2. D The path via bridge 4 is selected because the bridge identifier 40 is numerically less than 50. D There are however two paths between bridge 6 and bridge 4. In this case, the larger port priority is decisive.
Functions 4.4 Spanning Tree Algorithm 4.4.3 Example: manipulation of a tree structure. The management administrator of the network (see Fig. 35) soon discovers that this configuration, with bridge 1 as its root bridge, is unfavorable. The control packets that bridge 1 sends to the other bridges are concentrated on the paths between bridge 1 and bridge 2 and between bridge 1 and bridge 3.
Functions 4.4 Spanning Tree Algorithm 4.4.4 Rapid Spanning Tree Protocol The exponential increase in the use of LANs also in time-critical applications places new demands on the availability of the networks. Switch-over times in the high seconds range for reconfiguring the network when a subcomponent fails can no longer be tolerated. Thus it was inevitable that the once legendary Spanning Tree Protocol had to be revised in order to keep pace with our ever-changing world.
Functions Link speed <=100 Kb/s 1 Mb/s 10 Mb/s 100 Mb/s 1 Gb/s 10 Gb/s 100 Gb/s 1 Tb/s 10 Tb/s Table 7: 4.
Functions 4.4 Spanning Tree Algorithm BID =10 Brücke 1 BID =20 Brücke 2 BID =30 Brücke 3 BID =70 Brücke 7 BID =40 BID =50 BID Brücke 4 Root path Brücke 5 Port 2 Port 1 Bridge identifier Interrupted path Root port Designated port Alternate port Backup port Edge port Fig. 37: Port role assignment D Alternate port The port that takes over the function of the root port if the connection to the root bridge fails.
Functions 4.4 Spanning Tree Algorithm U Port statuses According to the tree structure and the status of the selected connection routes, RSTP assigns their statuses to the ports.
Functions 4.4 Spanning Tree Algorithm U Fast reconfiguration Why can RSTP react faster to an interruption of the root path? D Introduction of edge ports When reconfiguring RSTP switches to forwarding mode at the end of "Hello Time" immediately (see Table 12 on page 162). RSTP waits for the end of "Hello Time" to be sure, that no BPDU sending bridge is connected. If the user is sure, that an DTE is connected to this port and still remains, he can switch off STP on this port.
Functions 4.5 Redundancy 4.5 Redundancy 4.5.1 Line-type configuration The RS2-4R enables you to set up backbones in line-type configurations. Cascading takes place via the HIPER-Ring ports. RS2-4R RS2-16M RS2-../.. RS2-16M RS1 MICE Line structure Fig. 38: Line-type configuration RS2-4R Release 1.
Functions 4.5 Redundancy 4.5.2 Redundant ring structure – HIPER-Ring The two ends of a backbone in a line-type configuration can be closed to form a redundant ring by using the RM function (Redundancy Manager) of the RS2-4R. RS2-../.. RS2-16M RS2-../.. RS1 RS1 MICE redundant ring ring closed by MICE with switch RM on position "ON" MICE RS2-4R MICE Fig. 39: RS2-16M MICE RS2-../..
Functions 4.6 Security 4.6 Security 4.6.1 SNMP The agent communicates with the network management station via the Simple Network Management Protocol. Therefore the network management station uses the F network management software or the Web-based interface. Every SNMP packet contains the IP address of the sending computer and the community under which the sender of the packet wants to access the switch MIB.
Functions 4.6 Security 4.6.2 SNMP traps If unusual events occur during normal operation of the RS2-4R, they are reported immediately to the management station. This is done by means of so-called traps- alarm messages - that bypass the polling procedure ("Polling" means querying the data stations at regular intervals). Traps make it possible to react quickly to critical situations.
Functions 4.6 Security hmPowerSupply is sent if the status of the voltage supply changes. hmSignallingRelay is sent if the status of the signal contact changes. newRoot is sent if the sending agent becomes the new root of the spanning tree. topologyChange is sent if the transmission mode of a port changes. risingAlarm is sent if an RMON alarm input exceeds the upper threshold. fallingAlarm is sent if an RMON alarm input falls below the lower threshold.
Functions 118 4.6 Security RS2-4R Release 1.
Web-based management 5 Web-based management The RS2-4R supports both SNMP management and Web-based management and can thus offer D extensive diagnostic and configuration functions for fast startup and D extensive network and device information. The RS2-4R supports the TCP/IP protocol family. The user-friendly Web-based interface gives you the option of managing the RS2-4R from any location in the network via a standard browser such as the Netscape Navigator/Communicator or the Microsoft Internet Explorer.
Web-based management 120 RS2-4R Release 1.
Web-based management 5.1 Opening the Web-based interface 5.1 Opening the Web-based interface To open the Web-based interface, you will need a Web browser (a program that can read hypertext), for example Netscape Navigator/Communicator version 6.0 or higher or Microsoft Internet Explorer version 5.5 or higher. Note: The Web-based interface uses the "Java™ Runtime Environment Version 1.3" plug-in.
Web-based management 5.1 Opening the Web-based interface V Establish the connection by entering the IP address of the RS2-4R that you want to administer via the Web-based network management in the address field of the Web browser. Enter the address in the following form: http://xxx.xxx.xxx.xxx The login window will appear on the screen. Fig. 41: Login window V Select the desired language. V In the login fold-down menu, select – user, for read access or – admin, for read and write access to the switch.
Web-based management 5.1 Opening the Web-based interface V The password "public", with which you have read permission, appears in the password field. If you wish to access the RS2-4R with write permission, then highlight the contents of the password field and overwrite it with the password "private" (state on delivery). Changing the password protects the RS2-4R against unauthorized access. V Click on OK. The Website of the RS2-4R appears on the screen. Fig.
Web-based management 124 5.1 Opening the Web-based interface RS2-4R Release 1.
Web-based management 5.2 Menu tree 5.2 Menu tree The menu section displays the menu items. By placing the mouse pointer in the menu section and clicking the right mouse button you can use "Expand all" to open up the whole menu tree and "Collapse all" to close the menu tree up to the main menus. Fig. 43: Menu tree RS2-4R Release 1.
Web-based management 126 5.2 Menu tree RS2-4R Release 1.
Web-based management 5.3 System 5.3 System The system menu contains the dialog boxes and tables used for system configuration: D D D D D D D D D D Software update Set start configuration Set the network parameters Signal Contact SNTP Password WEB access Access for IP addresses Configuring traps Restart RS2-4R Release 1.
Web-based management 5.3 System The information section of the system menu is divided into: D D D D D D Recording Alarm System data View of device Updating Port status Fig. 44: 128 Information section in the system menu RS2-4R Release 1.
Web-based management 5.3 System U Recording This area of the Website shows the history of the RS2-4R. Since the history is maintained by the Web browser applet, the history is available only while the applet is running. The time window extends up to 2 hours. Records the alarm signal of the agent Records the accessibility of the agent Fig. 45: History display U Alarm This section of the Website provides information on the alarm state of the RS2-4R.
Web-based management 5.3 System U System data This area of the Website displays the system history of the agent. Here you can change, – the system name, – the location description and – the name of the contact person for this switch. – – – – – – System name of the switch Location of this switch Contact person for this switch Software and hardware version Status of the power supply units Temperature in switch, with alarm limits – Time that has elapsed since the switch was last restarted. Fig.
Web-based management 5.3 System Meaning of the symbols: The port is enabled and the connection is OK. The port is locked by management. The port is enabled and the connection is interrupted. The RS2-4R cannot be reached. U Updating This area of the Website at the bottom left displays the countdown time until the applet requests the current data of this dialog again. Clicking the "Update" button requests the current data of the RS2-4R immediately.
Web-based management 5.3 System 5.3.1 Updating the software With the software dialog you can carry out a software update of the RS2-4R via tftp or http. U tftp Update For a tftp update you need a tftp server on which the software to be loaded is stored. The URL identifies the path to the software stored on the tftp server. The URL is in the format tftp://IP address of the tftp server/ path name/file name (e.g. tftp://149.218.16.5/rs2/rs2.bin).
Web-based management 5.3 System The end of the update is indicated by one of the following messages: D D D D V Update completed successfully. Update failed. Reason: incorrect file. Update failed. Reason: file damaged. Update failed. Reason: flash error. Close this browser window with "File: close" to return to the dialog software. To start the new software after loading, restart the RS2-4R (see dialog “Restarting the switch” on page 153).
Web-based management 5.3 System V – Netscape Navigator/Communicator: Close browser and reopen it. – Microsoft Internet Explorer: In Extras: Internet options: Advanced, select the topic "Delete temporary internet files when closing the browser". Close browser and reopen it. 134 RS2-4R Release 1.
Web-based management 5.3 System 5.3.2 Defining the start configuration With this dialog you can: D D D D D set a restart configuration, load a configuration, save a configuration, enter an URL, view the ACA status. U Restart configuration In the "Load after reset" frame you can set the configuration with which the system is loaded when restarting.
Web-based management 5.3 System U URL The URL identifies the path to the tftp server on which the configuration file is to be stored. The URL is in the form tftp://IP address of the tftp server/path name/file name (e.g. tftp://149.218.112.5/rs2/config.dat). Example to save on a tftp server V Open a new file with any editor. V Save the empty file to the appropriate path of the tftp server, including the file name, e.g. RS2/RS2_01.cfg V In line "URL", enter the path of the tftp server, e.g. tftp://149.218.
Web-based management 5.3 System U Auto Configuration Adapter (ACA) The ACA is a device for storing the configuration data of a MICE, RS2-../.., RS2-16M, RS2-4R or MACH 3000 switch. In the case of a switch failure, the ACA enables a very simple configuration data transfer by means of a substitute switch of the same type. Storing the current configuration data in the ACA: You can transfer the current switch configuration onto the ACA and the flash memory with "Save local configuration".
Web-based management Status notPresent ok removed notInSync outOfMemory wrongMachine checksumErr 5.3 System Meaning No ACA present. The configuration data from the ACA and the switch are consistent. The ACA has been removed after rebooting. The configuration data from the ACA and the switch are not consistent. The local configuration data is too extensive to be stored on the ACA. The configuration data in the ACA comes from another device type. The configuration data is damaged.
Web-based management 5.3 System 5.3.3 Signal Contact The signal contact is for D manual setting the signal contact . D monitoring proper functioning of the RS2-4R. U Manual setting This dialog gives you the option of remote switching the signal contact. V Select "Opened" in the "Manual setting" field to open the contact. V Select "Closed" in the "Manual setting" field to close the contact. Application options: D Simulation of an error during SPS error monitoring.
Web-based management Fig. 53: 140 5.3 System Dialog Signal contact RS2-4R Release 1.
Web-based management 5.3 System 5.3.4 SNTP The Simple Network Time Protocol (SNTP) enables you to synchronize the system time in your network. The switch supports the SNTP Server and SNTP Client functions. The SNTP Server places the UTC (Universal Time Coordinated) at disposal. The SNTP Client obtains the UTC. U Configuration SNTP Client and Server V In this frame you switch the SNTP function on/off.
Web-based management 5.3 System U Configuration SNTP Server V In "Anycast destination address" you enter the IP address to which the SNTP server on the switch sends the SNTP packages. IP target address 0.0.0.0 Unicast 224.0.1.1 255.255.255.255 Send SNTP packages periodically to niemanden Unicast Multicast Broadcast Table 11: Periodic sending of SNTP packages V In "VLAN ID" you specify the VLAN to which the switch may periodically send SNTP packages.
Web-based management 5.3 System Note: For the most accurate system time distribution possible, avoid having network components (routers, switches, hubs) which do not support SNTP in the signal path between the SNTP server and the SNTP client. Fig. 54: Dialog SNTP RS2-4R Release 1.
Web-based management 5.3 System 5.3.5 Configure the network With this dialog you define the source from which the switch gets its network parameters after starting and assign network parameters. Fig. 55: Dialog Network parameters V Under "Modus" you enter where the RS2-4R is to obtain its IP parameters: D In the BOOTP mode, the configuration comes from a BOOTP or DHCP server on the basis of the MAC address of the switch (see page 57).
Web-based management 5.3 System V The HiDiscovery protocol (see “System configuration via HiDiscovery” on page 55) allows you to assign an IP address to the switch on the basis of its MAC address. Activate the HiDiscovery protocol if you want to assign an IP address to the switch from your PC with the HiDiscovery software delivered (setting on delivery: active). RS2-4R Release 1.
Web-based management 5.3 System 5.3.6 Password This dialog gives you the option of changing the read and read/write passwords for access to the switch. V The Web-based Interface and the User Interface communicate via SNMP version 3. Select "SNMPv1/2c on" to be able to communicate with earlier versions of SNMP. V Select "Transfer password SNMPv3 from SNMPv1/2c", if you want SNMP version 3 to take the unencrypted password from SNMP version 1/2c. For safety reasons, SNMP version 3 encrypts the password.
Web-based management 5.3 System Note: After changing the password for write access, restart the Web interface in order to access the switch. Note: For security reasons, the passwords are not displayed. Make a note of every change! You cannot access the switch without a valid password! Note: In SNMP version 3, use more than 8 characters for the password, because many applications do not accept shorter passwords. Access via a Web browser can be blocked with the dialog “WEB access” on page 148.
Web-based management 5.3 System 5.3.7 WEB access This dialog allows you to switch off the Web server on the switch. After the Web server has been switched off, the switch can no longer be accessed via a Web browser. Note: The Web server may be reactivated via the user interface. Fig. 57: 148 Dialog Security RS2-4R Release 1.
Web-based management 5.3 System 5.3.8 Access for IP addresses With this dialog you can specify via which IP addresses the switch may be accessed, and what kinds of passwords are to be used. D In the "Index" column, you enter the current number to which the access restriction applies. D In the "IP Address" column, you enter the IP address which may access the switch. No entry in this field, or the entry "0.0.0.0", enables access to the switch from computers with any IP address.
Web-based management Fig. 58: 150 5.3 System Dialog Access for IP addresses RS2-4R Release 1.
Web-based management 5.3 System 5.3.9 Configuring traps This dialog allows you to specify which events trigger an alarm (trap) and to whom these alarms should be sent. D In the "IP Address" column, enter the IP address of a network management station to which the traps should be sent. D In the "Name" column, you can enter a name for each recipient. D In the "State" column, you mark the entries which should be taken into account when traps are being sent.
Web-based management Fig. 59: 152 5.3 System Dialog Alarms RS2-4R Release 1.
Web-based management 5.3 System 5.3.10 Restarting the switch This dialog allows you to D D D D D D restart the switch. reset the MAC address table reset the port counters reset the IP counters reset the protocol counters delete the log file. Note: During the restart, the switch temporarily does not transfer any data, and it cannot be accessed via the Web-based interface or other management systems such as HiVision. Fig. 60: Dialog Restart RS2-4R Release 1.
Web-based management 5.3 System 154 Release 1.
Web-based management 5.4 Ports 5.4 Ports The Ports menu includes: D The port configuration table D The port statistics table 5.4.1 Port configuration table This table allows you to configure every port of the switch. D In the "Name" column, you can enter a name for every port. D In the "Ports on" column, you can switch on the port by marking it here. D In the "Flow Control" column, you mark this port to specify that flow control is active.
Web-based management 5.4 Ports Note: The following settings are required for the ring ports (see “Redundant ring structure – HIPER-Ring” on page 114): – 100 MBit/s – Full duplex – Autonegotiation off – Port on. Fig. 61: 156 Dialog Port configuration table RS2-4R Release 1.
Web-based management 5.4 Ports 5.4.2 Port statistics table This table shows you the contents of various event counters. After a restart, all the event counters begin again at zero. The counters add up the events sent and the events received. Fig. 62: Dialog Port statistics table RS2-4R Release 1.
Web-based management 158 5.4 Ports RS2-4R Release 1.
Web-based management 5.5 Switching 5.5 Switching The Switching menu includes: D Basic Switch Data, D Filtering Database D GMRP / IGMP Configuration 5.5.1 Basic Switch Data This dialog is used to display the basic switch data and for entering general settings. These settings include: D The entry of the Aging Time for all dynamic entries in the range from 10 to 400 seconds (Unit: 1 second, default setting: 300).
Web-based management 5.5 Switching 5.5.2 Filtering Database This table is used for displaying filters. Each row represents one filter. Filters specify the way in which data packets are sent. They are set automatically by the switch (learned status). Data packets whose destination addresses are entered in the table are sent from the receiving port to the ports marked in the table. Data packets whose destination addresses are not in the table are sent from the receiving port to all other ports.
Web-based management 5.5 Switching 5.5.3 Rapid Spanning Tree The Rapid Spanning Tree algorithm (RSTP) reduces the entire topology of a network connected by bridges to a single tree structure. The root bridge forms the basis of a tree structure. Ring structures are separated according to specified rules. If a path is interrupted, the algorithm cancels the division in order to maintain the data transmission.
Web-based management 5.5 Switching The time entries in the Global dialog are in units of 10 ms. Example: Max Age = 2000 amounts to 20 seconds. Variable Priority Meaning The priority and the MAC address go together to make up the bridge identification. Hello Time The bridge sends configuration messages (Configuration Bridge Protocol Data Units, CBPDU) if it is the root bridge, or when it is attempting to become the root bridge.
Web-based management 5.5 Switching U Port settings These settings apply to every individual port. Variable STP State Meaning Switching STP/RSTP on/off at this port. Switch STP off when connecting a terminal device in order to avoid unnecessary waiting periods. Priority The port priority is the first byte of the port identification. Admin Enter the path costs to indicate preference for redundant paths.
Web-based management 164 5.5 Switching RS2-4R Release 1.
Web-based management 5.6 Extras 5.6 Extras The Ports menu includes: D D D D D Configuring the DHCP Relay agent, Configuring the broadcast limiter, Configuring the HIPER-Ring function, Settting port mirroring Disable Learning RS2-4R Release 1.
Web-based management 5.6 Extras 5.6.1 DHCP Relay Agent This dialog allows you to configure the DHCP relay agent. The DHCP relay agent is a function which is integrated into this switch (see “System Configuration via DHCP Option 82” on page 64). V Enter the DHCP server IP address. If one DHCP server is not available, then you can enter up to three additional DHCP server IP addresses, so that the switch can change to another DHCP server.
Web-based management 5.6 Extras 5.6.2 Broadcast limiter With the broadcast limiter you can define the maximum number of broadcasts allowed out of a port. In the check box "Broadcast Limiter Mode", you turn the broadcast limiter on/ off for all the ports. Setting options per port: D = 0, no limitation on the broadcasts allowed out of this port. D > 0, maximum number of broadcasts per second that can be sent out of this port.
Web-based management 5.6 Extras 5.6.3 Configuring the HIPER-Ring function This dialog shows you the function of this switch in the HIPER-Ring. The concept of the HIPER-Ring enables the construction of high-availability, ringshaped network structures. Within such a ring topology, network components supporting the HIPER-Ring are connected with each other via their ring ports. Exactly one redundancy manager assumes control of the ring.
Web-based management Fig. 64: 5.6 Extras Dialog HIPER-Ring RS2-4R Release 1.
Web-based management 5.6 Extras 5.6.4 Setting port mirroring This dialog allows you to configure and activate the port mirroring function of the switch. Port mirroring is when the data traffic of a source port is copied to a specified port. The data traffic at the source port is not influenced by port mirroring. A management tool connected at the specified port, e.g., an RMON probe, can thus monitor the data traffic of the source port.
Web-based management 5.6 Extras 5.6.5 Switching the learning function on and off This dialog allows you to monitor the data for all the ports. You mark the Disable Learning function to switch off the learning function of the RS2-4R. Then the RS2-4R will transfer all the data from each port to all the other ports. Note: The learning function is always activated after a restart. Fig. 66: Dialog Disable learning RS2-4R Release 1.
Web-based management 5.6 Extras 5.6.6 Diagnostics The following reports are available for diagnostic purposes. In service situations, they pass the necessary information onto the technician. D Watson D Logfile 172 RS2-4R Release 1.
Management Information Base (MIB) 6 Management Information Base (MIB) The Management Information Base (MIB) is designed in the form of an abstract tree structure. The branching points are the object classes. The "leaves" of the MIB are called generic object classes. Wherever necessary for unambiguous identification, the generic object classes are instantiated, i.e. the abstract structure is imaged on the reality, by specifying the port or the source address.
Management Information Base (MIB) sys UI Upr ven System User Interface Upper (e.g. threshold value) Vendor = manufacturer (Hirschmann) Definition of the syntax terms used: Integer An integer in the range 0 - 232 IP address xxx.xxx.xxx.xxx (xxx = integer in the range 0-255) MAC address 12-digit hexadecimal number in accordance with ISO / IEC 8802-3 Object Identifier x.x.x.x… (e.g. 1.3.6.1.1.4.1.
Management Information Base (MIB) 1 iso 3 org 6 dod 1 internet 1 system 2 interfaces 2 mgmt 4 private 6 snmp V2 1 mib-2 1 enterprises 3 modules 248 hirschmann 14 hmConfiguration 10 Framework 11 mpd 3 at 12 Target 4 ip 13 Notification 5 icmp 15 usm 6 tcp 16 vacm 7 udp 11 snmp 16 rmon 17 dot1dBridge 26 snmpDot3MauMGT Fig. 67: Tree structure of the Hirschmann MIB RS2-4R Release 1.
Management Information Base (MIB) 176 RS2-4R Release 1.
Management Information Base (MIB) 6.1 MIB II 6.1 MIB II 6.1.1 System Group (1.3.6.1.2.1.1) The System Group is a required group for all systems. It contains system-related objects. If an agent has no value for a variable, then the response returned includes a string of length 0.
Management Information Base (MIB) 6.1 MIB II sysDescr OID 1.3.6.1.2.1.1.1.0 Syntax Octet string (size: 0-255) Access Read Description A verbal description of the entry. This value should contain the full name and version number of - the type of system hardware - the operating system software, and - the network software. The description must consist only of printable ASCII characters. sysObjectID OID1.3.60,2.2.1.1.1.
Management Information Base (MIB) 6.1 MIB II sysUpTime OID 1.3.6.1.2.1.1.3.0 Syntax Time ticks Access Read Description The time in 1/100 seconds since the last reset of the network management unit. sysContact OID1.3.6.1.2.1.1.4.0 Syntax Octet string (size: 0-255) Access Read and write Description The clear-text identification of the contact person for this managed node along with the information about how that person is to be contacted. sysName OID1.3.6.1.2.1.1.5.
Management Information Base (MIB) 6.1 MIB II sysLocation OID 1.3.6.1.2.1.1.6.0 Syntax Octet string (size: 0-255) Access Read and write Description The physical location of this node (e.g. "staircase, 3rd floor") sysServices OID 1.3.6.1.2.1.1.7.0 Syntax Integer (0-127) Access Read Description This value designates the set of services offered by this device. It is the sum of several terms.
Management Information Base (MIB) 6.1 MIB II 6.1.2 Interface group (1.3.6.1.2.1.2) The interface group contains information about the device interfaces.
Management Information Base (MIB) 6.1 MIB II 6.1.3 Address Translation Group (1.3.6.1.2.1.3) The Address Translation Group is required for all systems. It contains information about the assignment of addresses. (3) at |-- (1) atTable | |-- (1) atEntry | | |-- (1) atIfIndex | | | | | |-- (2) atPhysAddress | | | | | |-- (3) atNetAddress 6.1.4 Internet Protocol Group (1.3.6.1.2.1.4) The Internet Protocol Group is required for all systems. It contains information affecting IP transmission.
Management Information Base (MIB) 6.
Management Information Base (MIB) 6.1 MIB II 6.1.5 ICMP Group (1.3.6.1.2.1.5) The Internet Control Message Protocol group is obligatory for all systems. It contains information on error handling and control for data exchange in the Internet.
Management Information Base (MIB) 6.1 MIB II 6.1.6 Transfer Control Protocol Group (1.3.6.1.2.1.6) The Transfer Control Protocol Group is required for all systems that have implemented TCP. Instances of objects that describe information about a particular TCP connection exist only as long as the connection exists.
Management Information Base (MIB) 6.1 MIB II 6.1.7 User Datagram Protocol Group (1.3.6.1.2.1.7) The User Datagram Protocol Group is required for all systems that have implemented UDP. (7) udp |-- (1) udpInDatagrams | |-- (2) udpNoPorts | |-- (3) udpInErrors | |-- (4) udpOutDatagrams | |-- (5) udpTable | |-- (1) udpEntry | | |-- (1) udpLocalAddress | | | | | |-- (2) udpLocalPort 186 RS2-4R Release 1.
Management Information Base (MIB) 6.1 MIB II 6.1.8 Simple Network Management Protocol Group (1.3.6.1.2.1.11) The Simple Network Management Protocol group is required for all systems. In SNMP installations that have been optimized to support either just one agent or one management station some of the listed objects will contain the value "0".
Management Information Base (MIB) 6.1 MIB II 6.1.9 RMON Group (1.3.6.1.2.1.16) This part of the MIB provides a continuous flow of current and historical network component data to the network management. The configuration of alarms and events controls the evaluation of network component counters. The agents inform the management station of the evaluation result by means of traps, depending on the configuration.
Management Information Base (MIB) 6.
Management Information Base (MIB) 6.
Management Information Base (MIB) 6.1 MIB II 6.1.10 dot1dBridge (1.3.6.1.2.1.17) This part of the MIB contains bridge-specific objects.
Management Information Base (MIB) 6.
Management Information Base (MIB) 6.
Management Information Base (MIB) 6.1 MIB II 6.1.11 MAU Management Group (1.3.6.1.2.1.26) The MAU Management Group is responsible for setting the autonegotiation parameters.
Management Information Base (MIB) 6.2 Private MIB 6.2 Private MIB The private MIB is for configuring the device-specific properties of the RS24R. The groups below are implemented in the RS2-4R from the private MIB hmConfiguration (OID = 1.3.6.1.4.1.248.14). D D D D hmChassis hmAgent hmUserGroup hmRingRedundancy (OID = 1.3.6.1.4.1.248.14.1) (OID = 1.3.6.1.4.1.248.14.2) (OID = 1.3.6.1.4.1.248.14.3) (OID = 1.3.6.1.4.1.248.14.5) 6.2.
Management Information Base (MIB) | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 196 6.
Management Information Base (MIB) 6.
Management Information Base (MIB) 6.2 Private MIB 6.2.2 Management Group The Management group contains parameters for configuring the management agent.
Management Information Base (MIB) | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 6.
Management Information Base (MIB) | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 200 6.
Management Information Base (MIB) 6.2 Private MIB 6.2.3 HIPER-Ring Redundancy Group The HIPER-Ring Redundancy Group contains parameters for configuring the HIPER-Ring redundancy.
Management Information Base (MIB) 202 6.2 Private MIB RS2-4R Release 1.
Management Information Base (MIB) 6.3 SNMP V2 Module MIB 6.3 SNMP V2 Module MIB The SNMP V2 Module MIB is based on the SNMP-Mib “Simple Network Management Protocol Group (1.3.6.1.2.1.11)” on page 187. 6.3.1 Framework Group (1.3.6.1.6.3.
Management Information Base (MIB) 6.3 SNMP V2 Module MIB 6.3.2 MPD Group (1.3.6.1.6.3.11) The MPD group (Message Processing and Dispatching) contains parameters for dispatching SNMP messages which are potentially in different SNMP versions.
Management Information Base (MIB) 6.3 SNMP V2 Module MIB 6.3.3 Target Group (1.3.6.1.6.3.12) The Target group contains parameters for specifying targets of SNMP management operations.
Management Information Base (MIB) 6.3 SNMP V2 Module MIB 6.3.4 Notification Group (1.3.6.1.6.3.13) The Notification group contains parameters for specifying targets for notification filtering.
Management Information Base (MIB) 6.3 SNMP V2 Module MIB 6.3.5 USM Group (1.3.6.1.6.3.
Management Information Base (MIB) 6.3 SNMP V2 Module MIB 6.3.6 VACM Group (1.3.6.1.6.3.15) The VACM group (View-based Access Control Model) defines the elements of procedure for controlling access to management information.
User Interface 7 User Interface The user interface offers users the option of choosing certain functions of the management RS2-4R in a menu-driven way. The following menu items can be selected: D System Parameter D Switching General D Switch Security D Port Configuration / Statistics D Port Mirroring / Disable Learning D Configuration D Update D Password D Ping D System Reset RS2-4R Release 1.
User Interface 210 RS2-4R Release 1.
User Interface 7.1 Opening the user interface 7.1 Opening the user interface V After connecting the with a VT100 terminal via V.24, press a key. A window will appear on the screen for entering the password. Only one user can access the user interface. Login Screen 149.218.112.101 Hirschmann ETHERNET Rail Switch 2 Copyright (c) 2004 Hirschmann Electronics GmbH & Co. KG All rights reserved. RS2 Release 1.00 (Build date Mar 21 2004 08:51:29) User: Password: Fig.
User Interface 7.1 Opening the user interface Main Menu 149.218.112.101 Hirschmann ETHERNET Rail Switch 2 System Parameter Switching General Switch Security Port Configuration / Statistics Port Mirroring / Disable Learning Configuration Update Password Ping System Reset LOGOUT Setup IP parameters Fig. 69: 212 Main menu RS2-4R Release 1.
User Interface 7.2 Operating the user interface 7.2 Operating the user interface D Use the arrow keys or the tab key to move the cursor. D To change the specified values in a selection field, press the space bar. D The new settings are accepted if the cursor is in the APPLY field, and the enter key is pressed. D The bottom line contains a help text for the selected item. D To exit the user interface, select LOGOUT in the main menu and press the enter key. The main menu consists of 7 submenus. 7.2.
User Interface 7.2 Operating the user interface System Parameter 149.218.112.101 Hirschmann ETHERNET Rail Switch 2 IP Address Subnet Mask Default Gateway : [149.218.112.101] : [255.255.255.0 ] : [0.0.0.0 ] IP Configuration : < LOCAL > HiDiscovery : < Enable MAC Address System Name > : 00:80:63:00:02:77 : [Hirschmann RS2 ] Note: Set IP-Configuration to use manual settings. APPLY changes the state of the objects immediately and saves the state to Non Volatile Memory.
User Interface 7.2 Operating the user interface U IP configuration V Select the desired IP configuration mode. When you press the space bar, the following options become available: – Local – BOOTP – DHCP After selecting APPLY, the mode is activated (see “Basic settings” on page 47). U HiDiscovery The HiDiscovery protocol (see “System configuration via HiDiscovery” on page 55) allows you to assign an IP address to the switch on the basis of its MAC address.
User Interface 7.2 Operating the user interface 7.2.2 Switching General The switch supports Rapid Spanning Tree. V To activate it, select the line. Press the space bar to change the setting from Disable to Enable. Enter APPLY to activate the function immediately. Switching General Rapid Spanning Tree : < Disable 149.218.112.101 Hirschmann ETHERNET Rail Switch 2 > Note: APPLY changes the state of the object immediately.
User Interface 7.2 Operating the user interface 7.2.3 Switch security The agent is accessible via: D V.24 D Telnet D the Web. V To enable access via Telnet or the Web, select the Telnet or Web line. Press the space bar to change the setting from Disable to Enable. After APPLY is selected the new setting is immediately activated. Switch Security 149.218.112.
User Interface 7.2 Operating the user interface 7.2.4 Port configuration / statistics This menu is for port configuration and for displaying the port statistics. V First enter the port number and press the return key. V You can enter the name of your choice for this port after Port Name.
User Interface 7.2 Operating the user interface 7.2.5 Port Mirroring / Disable learning This dialog gives you the option of viewing the data of all ports or of individual ports (monitoring). D By selecting Disable Learning, you can disable the learning function. Consequently, the transmits all data from all ports to all ports. D By selecting Port Mirroring, the mirrors all send/receive data of the "Source " to the "Destination Module.Port". The functions as a normal switch for the other ports.
User Interface 7.2 Operating the user interface 7.2.6 Configuration The RS2-4R has two configuration settings: D the default setting and D the user-defined setting. This submenu offers the option of storing a user-defined configuration. This configuration can – be loaded automatically when restarting or – be loaded with the default configuration again after restarting.
User Interface 7.2 Operating the user interface Example to save to a tftp server V Open a new file with any editor. V Save the empty file to the appropriate path of the tftp server, including the file name, e.g. /_01.cfg V In the "URL" line, enter the path of the tftp server, e.g. tftp:// 149.218.112.214//_01.cfg . Note: The configuration file includes all configuration data, including the password. Therefore pay attention to the access rights on the tftp server. Save/Load Configuration 149.218.112.
User Interface 7.2 Operating the user interface The transition of the LED's from a flashing to a static state indicates the end of the memory operation. V To go back to using the user interface, pull the ACA from the RS2-4R and connect the terminal block to the V.24 connection of the RS2-4R. Save configuration 149.218.112.101 Hirschmann ETHERNET Rail Switch 2 Please change terminalcable with adapter LED-Codes on LED RM and Standby: Alternate flash: Adapterstatus not ok.
User Interface 7.2 Operating the user interface 7.2.7 Update Before you can update the software, you need to know the correct location (pathname) of the update file. V Enter the correct pathname in the field URL of update file and then press the enter key. In the line Reset you can decide whether the RS2-4R should be restarted immediately after loading an update or at a later time. Choose Apply to load the update. It is active after a restart. Update software 149.218.112.
User Interface 7.2 Operating the user interface 7.2.8 Password To protect your from unauthorized access, change the SNMPv3 read/write password and the SNMPv1/2c password in this submenu. V The Web-based Interface and the User Interface communicate via SNMP version 3. Select "SNMPv1/2c YES" to be able to communicate with earlier versions of SNMP. V Enter your old password in the field Old SNMPv3 Password and press the enter key.
User Interface 7.2 Operating the user interface Change Password 149.218.112.101 Hirschmann ETHERNET Rail Switch 2 User/WEB-Interface/SNMPv3 Password same as for SNMPv1/v2c: < Yes > SNMPv3 User: admin Old SNMPv3 Password: [ New SNMPv3 Password: [ Re-type SNMPv3 Password: [ ] ] ] SNMPv1/v2c Password (Community): [ Re-type SNMPv1/v2c Password (Community): [ ] ] Note: To change the password/community type in the old and the new password/community and use APPLY to change.
User Interface 7.2 Operating the user interface 7.2.9 Ping In the Ping menu you can test the accessibility of another network station. V In the IP Address of host field, enter the IP address of the desired station and press the enter key. Choose Apply to ping the desired station. Depending on the accessibility of the station, you will receive the response: Host alive or Host not alive. Ping 149.218.112.101 Hirschmann ETHERNET Rail Switch 2 IP Address of host : [0.0.0.
User Interface 7.2 Operating the user interface 7.2.10 System reset V To reset select the Confirm Reset line. By pressing the space bar the setting changes from No to Yes. Choose APPLY to reset the switch. Ping 149.218.112.101 Hirschmann ETHERNET Rail Switch 2 IP Address of host : [0.0.0.0 ] Note: Set valid IP Address and APPLY to ping. MAIN MENU APPLY Enter IP Address in decimal dot format (e.g., 149.218.19.69) Fig. 80: Menu System Reset RS2-4R Release 1.
User Interface 228 7.2 Operating the user interface RS2-4R Release 1.
Appendix A Appendix RS2-4R Release 1.
Appendix 230 RS2-4R Release 1.
Appendix FAQ FAQ Answers to frequently asked questions can be found at the Hirschmann Website: www.hirschmann.com Under Products/Support inside Automation and Network Solutions is located on the pages Products the area FAQ. For detailed information on all services offered by the Hirschmann Competence Center, please visit the Web site http://www.hicomcenter.com/. RS2-4R Release 1.
Appendix 232 FAQ RS2-4R Release 1.
Appendix Setting up DHCP Server Option 82 Setting up DHCP Server Option 82 On the CDROM supplied with the switch you will find the software for a DHCP server from the software development company IT-Consulting Dr. Herbert Hanewinkel. You can test the software for 30 calendar days from the date of the first installation, and then decide whether you want to purchase a license.
Appendix Setting up DHCP Server Option 82 V Select static. Fig. 82: Static address input V Open the window for the program settings in the menu bar: Options:Settings and select the DHCP tab page. Fig. 83: 234 DHCP setting RS2-4R Release 1.
Appendix Setting up DHCP Server Option 82 V Select the DHCP tab page. Enter the settings shown in the illustration and click on OK. Fig. 84: DHCP setting V To enter the static addresses, click on Add. Fig. 85: Adding static addresses RS2-4R Release 1.
Appendix Setting up DHCP Server Option 82 V Select Circuit Identifier and Remote Identifier. Fig. 86: Default setting for the fixed address assignment V In the Hardware address field, you enter the Circuit Identifier and the Remote Identifier, see “DHCP Relay Agent” on page 166. With Hardware address you identify the switch and the port to which that device is connected, to which you want the assign the IP address in the line below it.
Appendix Fig. 87: Setting up DHCP Server Option 82 Entering the addresses PLC Switch (Option 82) MACH 3002 IP = 149.218.112.100 RS2-4R MAC = 00:80:63:10:9a:d7 DHCP-Server IP = 149.218.112.1 IP = 149.218.112.100 Fig. 88: Application example of using Option 82 RS2-4R Release 1.
Appendix 238 Setting up DHCP Server Option 82 RS2-4R Release 1.
Appendix Based specifications and standards Based specifications and standards U List of norms and standards: D EN 61000-6-2:2001 Basic standard - interference resistance in industry D EN 55022:1998 + A1 2000 - Interference characteristics for IT systems D EN 60950:1997 - Security in IT systems D EN 61131-2:1994 + A12 2000 - Programmable Logic Controllers D FCC 47 CFR Part 15:2000 – Code of Federal Regulations D Germanischer Lloyd, Rules for Classification and Construction VI - 7 3 Part 1, Ed. 2001.
Appendix D D D D D D D D D D D D RFC 1945 (HTTP/1.0) RFC 2131 (DHCP) RFC 2132 (DHCP-Options) RFC 2236 (IGMPv2) RFC 2239 (MAU-MIB) RFC 3411 (SNMP Framework) RFC3412 (SNMP MPD) RFC 3413 (SNMP Applications) RFC 3414 (SNMP USM) RFC 3415 (SNMP VACM) RFC 2613 (SMON) RFC 2674 (Dot1p/Q) U IEEE standards IEEE 802.1 D IEEE 802.1 D-1998 IEEE 802.1 Q IEEE 802.1 Q-1998 IEEE 802.1 w.2001 IEEE 802.
Appendix Certifications Certifications The following table indicates the certification status of the RS2-4R product family. Standard EN 61131-2 CE FCC 47 CFR Part 15 cUL 508 / CSA C22.2 No.142 cUL 1604 / CSA C22.2 No.213 Germanischer Lloyd RS2-4R complies with complies with complies with pending pending pending Table 14: Certifications RS2-4R Release 1.
Appendix 242 Certifications RS2-4R Release 1.
Appendix Technical Data Technical Data RS2-4R Dimensions W x H x D Weight Top-hat rail fastener Power supply Operating voltage 47 x 131 x 111 mm 325 g, 0.7 lb in line with IEC 60715:1981 + A1:1995 24 V DC, -25% +33% Nec Class 2 power source, safety extra-low voltage (SELV/PELV) redundant inputs uncoupled Power consumption / Power release with 4 TX ports 4.8 W maximum at 24 V DC 16.4 Btu (IT)/h with 3 TX ports and 1 FX port 5.5 W maximum at 24 V DC 18.8 Btu (IT)/h with 2 TX ports and 2 FX ports 6.
Appendix EMC interference immunity EN 61000-4-2 EN 61000-4-3 EN 61000-4-4 EN 61000-4-5 EN 61000-4-6 EMC emitted immunity EN 55022 FCC 47 CFR Part 15 Germanischer Lloyd Stability Vibration Shock Technical Data electrostatic discharge contact discharge: test level 3 (6 kV) air discharge: test level 3 (8 kV) elektromagnetic field test level 3 (10 V/m; 80 - 2000 MHz) fast transients (burst) test level 3 (2 kV power line, 1 kV data line) surge voltage power line symmetrisch: test level 2 (1kV) unsymmetrisc
Appendix Technical Data Network size F/O ports 100BASE-FX System attenuation 50/125 µm fiber, multimode 0-8 dB (MM) 62.5/125 µm fiber, multimode 0-11 dB (MM) 9/125 µm fiber, singlemode 0-16 dB (SM) Wave length 1300 nm 9/125 µm fiber, singlemode 7-29 dB (LH) Wave length 1550 nm Example for F/O line length 50/125 µm fiber, multimode 62,5/125 fiber, multimode 9/125 µm fiber, singlemode 9/125 µm fiber, singlemode Software Switch Latency MAC address table RS2-4R Release 1.0 03/04 5 km/16,400 ft max.
Appendix Scope of delivery Rail Switch RS2-4R incl.
Appendix Literature references Literature references [1] “Optische Übertragungstechnik in der Praxis” Christoph Wrobel Hüthig Buch Verlag Heidelberg ISBN 3-8266-5040-9 [2] „TCP/IP Illustrated", Vol. 1 W.R.
Appendix 248 Literature references RS2-4R Release 1.
Appendix Copyright of integrated software Copyright of integrated software GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL.
Appendix Copyright of integrated software For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it.
Appendix Copyright of integrated software are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances. For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library.
Appendix Copyright of integrated software The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".
Appendix Copyright of integrated software c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License.
Appendix Copyright of integrated software D 3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.
Appendix Copyright of integrated software without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law. If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work.
Appendix Copyright of integrated software than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. c) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution.
Appendix Copyright of integrated software b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work. D 8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License.
Appendix Copyright of integrated software If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances.
Appendix Copyright of integrated software D 14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this.
Appendix Copyright of integrated software U How to Apply These Terms to Your New Libraries If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend making it free software that everyone can redistribute and change. You can do so by permitting redistribution under these terms (or, alternatively, under the terms of the ordinary General Public License). To apply these terms, attach the following notices to the library.
Appendix Copyright of integrated software The Legion Of The Bouncy Castle Copyright (c) 2000 The Legion Of The Bouncy Castle (http:// www.bouncycastle.
Appendix 262 Copyright of integrated software RS2-4R Release 1.
Appendix Reader's comments Reader's comments What is your opinion of this manual? We are always striving to provide as comprehensive a description of our product as possible, as well as important information that will ensure trouble-free operation. Your comments and suggestions help us to further improve the quality of our documentation.
Appendix Reader's comments Suggestions for improvement and additional information: ....................................................................................................................... ....................................................................................................................... ....................................................................................................................... ...................................................................
Index Index A ACA 42, 65, 116, 137, 151, 221 Access 151 Access protection 149 Access restriction 149 Access right 115 Access supervision 149 Address table 94 Address translation group 182 Agent 116 Aging Time 94, 159 Air humidity 32 Air temperature 32 Alarm 129, 151 Alarm messages 116 Alternate port 110 APNIC 48 ARIN 48 Authentication 151 AutoConfiguration Adapter 42, 116, 151, 221 Autonegotiation 41, 89, 114, 156, 168 B Backbone 113 Backup port 110 Bandwidth 97 BOOTP 47, 62, 144, 213, 215 BPDU 104 Brid
Index HiVision 62 I IANA 48 ICMP 184 IEC/EN 60950 38 IEEE 802.
Index RMON probe Root port RST BPDU RSTP 99, 170 108 109 108, 161 S Safety regulations 34 Segmentation 116 Self-diagnosis 91 SELV 31, 38 Service 172 Service provider 48 Shielding ground 31 Signal contact 38, 88, 139, 151 Signaling Relay 151 Snap-in guide 40 SNMP 89, 115, 116, 119 SNMP management 119 SNMP V3 147 SNMPv1/2c 146 SNMPv3 146 SNTP 141 Software 71 Source address 93 Source port 99, 170 Spanning Tree 216 Spanning Tree Algorithm 101 Spanning tree algorithm 21 Standards 239 Stand-by 151 State on de
Index 268 RS2-4R Release 1.