IGS-5416P User Manual 01-2019 / v1.
FCC Warning This Equipment has been tested and found to comply with the limits for a Class-A digital device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy. It may cause harmful interference to radio communications if the equipment is not installed and used in accordance with the instructions.
Table of Contents Intended Readers .................................................................................................................... 1 Icons for Note, Caution, and Warning .................................................................................... 1 I. Product Overview .................................................................................... 2 I-1 . Product Brief Description ................................................................... 3 I-2.
Appendix A: IP Configuration for Your PC ........................................................................ 110 Appendix B: CLI Command Reference .............................................................................. 113 Revision History .................................................................................................................. 130 Federal Communication Commission Interference Statement ...........................................................
Intended Readers This manual provides information regarding to all the aspects and functions needed to install, configure, use, and maintain the product you’ve purchased. This manual is intended for technicians who are familiar with in-depth concepts of networking management and terminologies.
I. Product Overview This section will give you an overview of this product, including its feature functions and hardware/software specifications.
I-1 . Product Brief Description Introduction This switch is a DIN Rail type industrial Gigabit managed Power over Ethernet Switch is designed with eight 10/100/1000M PoE+ ports, eight 10/100/1000M RJ45 ports and four Gigabit SFP slots for highly critical PoE applications such as real time IP video surveillance, WiMAX systems and Wireless APs. All 8 PoE ports of the switch are compliant with both IEEE 802.3af PoE and IEEE 802.3at high power PoE standards and can deliver up to 15.
I-2. Product Specification Interface 10/100/1000 Base RJ45 PoE Ports 10/100/1000 Base RJ45 Ports 1000Base-X SFP Slot Console Port for CLI Management 8 8 4 1 1x USB 2.0 storage for firmware update, configuration backup, restore, boot up and system log USB Port DI/DO System Performance Packet Buffer MAC Address Table Size Switching Capacity Forwarding Rate PoE Features IEEE 802.3 af/at Number of PSE Ports System Power Consumption Max.
Mechanical Input Power Power Connection Digital Input Dimension (H*W*D) Weight LED Button Operating Temperature Storage Temperature Operating Humidity Installation MTBF Industrial Standard Alarm Contact Reverse Polarity Protection Overload Current Protection Casing EMI EMS Shock Free Fall Vibration Green Certification Standard IEEE 802.3 – 10BaseT IEEE 802.3u – 100BaseTX IEEE 802.3ab – 1000BaseT IEEE 802.3z 1000BaseSX/LX IEEE 802.3af Power over Ethernet (PoE) IEEE 802.
I-3. Hardware Description This section mainly describes the hardware of this switch and gives a physical and functional overview on the certain switch. Dimension The dimension of this Switch is 145 mm (H) x 90.8 mm (W) x 113 mm (D).
Wiring Power Inputs 1. Insert the positive and negative wires into the PWR1 (+,-) and PWR2 (+,-) on the 4-contact terminal block connector. 2. Tighten the screws to prevent the wires from loosening. Wiring Fault Alarm 1. Insert the wires into the left two contacts of the 4-contact terminal block (Fault Alarm Relay). 2. Tighten the screws to prevent the wires from loosening. 3. The relay will detect the power and link failure. 4.
Double-Secure Power Input Fault Alarm The power inputs are designed as a "common negative", which implies that the negative input is connected, but "double-secure" is supported to prevent the un-notified failure of power from one of the negative inputs. If one of the negative power input fails, the system will detect it and the system will trigger the event if the users set the fault alarm or event log for powers.
I-4. DIN-Rail Mounting The DIN-Rail clip is already attached on the rear side of the switch supports EN 50022 standard DIN Rail, in the following diagram includes the dimension of EN 50022 DIN Rail. Follow the steps below to mount the switch on the DIN-Rail track. 1. 2. 3. 4. Insert the upper end of the DIN-Rail clip into the back of the DIN-Rail track from its upper side Lightly push the bottom of the DIN-Rail clip into the track. Check if the DIN-Rail clip is tightly attached to the track.
I-5. Console Connection The Console port is for local management by using a terminal emulator or a computer with terminal emulation software. DB9 connector connect to computer COM port Baud rate: 115200bps 8 data bits, 1 stop bit None Priority None flow control I-6. Connecting Cable The port 1~16 is the copper ports, it requests UTP/STP cable. The port 17 ~ 20 are the SFP slots, purchase the suitable fiber transceiver from your supplier and connect the fiber cable for the link.
II. Preparing for Management This section will guide your how to manage this product via serial console, management web page, and Telnet/SSH interface. The switch provides both out-of-band and in-band managements. Out-of-band Management: You can configure the switch via RS232 console cable without having the switch or your PC connecting to a network. Out-of-band management provides a dedicated and secure way for switch management.
II-1. Preparation for Serial Console Inside the product package, you can find an RS-232 console cable. Before managing your switch via out-of-band management, please attach this cable’s RJ45 connector to your switch’s console port and its RS-232 female connector to your PC’s COM port. To access this switch’s out-of-band management CLI (Command Line Interface), your PC must have terminal emulator software such as HyperTerminal or PuTTY installed.
4. Set the serial port settings as: Baud Rate: 115200, Data Bit: 8, Parity: None, Stop Bit: 1, Row Control: None. 5. The system will prompt you to login the out-of-band management CLI. The default username/password is admin/admin.
II-2. Preparation for Web Interface The management web page allows you to use a web browser (such as Microsoft IE, Google Chrome, or Mozilla Firefox) to configure and monitor the switch from anywhere on the network. Before using the web interface to manage your switch, please verify that your switch and your PC are on the same network. Please follow the steps down below to configure your PC properly: 1. 2. 3. 4. 5.
6. The web browser will prompt you to sign in. The default username/password for the configuration web page is admin/admin. For more information, please refer to Appendix B: IP Configuration for Your PC.
II-3. Preparation for Telnet/SSH Interface Both telnet and SSH (Secure Shell) are network protocols that provide a text-based command line interface (CLI) for in-band system management. However, only SSH provides a secure channel over an un-secured network, where all transmitted data are encrypted. This switch support both telnet and SSH management CLI. In order to access the switch’s CLI via telnet or SSH, both your PC and the switch must be in the same network.
3. If you’re connecting to the switch via SSH for the first time, a “PuTTY Security Alert” window will pop up. Please press “Yes” to continue. This window won’t pop up if you’re using telnet to connect to the in-band management CLI. 4. PuTTY will prompt you to login after the telnet/SSH connection is established. The default username/password is admin/admin.
III. Web Management As mentioned in Chapter II-2 Preparation for Web Interface, This switch provides a web-based management interface. You can make all settings and monitor system status with this management web page. III-1. Web Management - Overview When you log in, the configuration web page will display current system status. 1.
2. Save Configuration After configuring, click the icon to save the configurations to the "startup-config" file. The configurations are retained in the system until a factory reset default is done. 3. Restore Factory Default Removes the configurations saved in the system. After restoring factory default, all the settings will be set to default values. 4. Reboot System Reboots the device and restarts the system. 5. System Logout This option enables you to sign out from the system.
• Changes to “First”, “Previous”, “Next”, or “Last” page. In addition to the above functions, “Refresh” and “Auto Refresh” function are available for all status page including “IPv6 Neighbor Table”, “RSTP Port Status”, “Port Status”, “IGMP Snooping Table”, “VLAN Table”, “Trunking Status”, “LLDP Neighbor Table”, and “MAC Address Table”. • Selecting this checkbox enables the “Auto Refresh” function and deselecting the checkbox disables the “Auto Refresh” function.
III-2. Web Management – Basic Settings III-2-1. BASIC SETTINGS - SYSTEM CONFIGURE SYSTEM INFORMATION • Host Name It is useful to identify the difference between the switches, for example: CoreSwitch01. The max length for the Host Name is 32 alphanumeric characters. • Device Description The Device Description is fixed and defined by the system. It contains the copper port number, fiber port number, and PoE information (if supported).
III-2-2. BASIC SETTINGS – IPV4 SETTINGS Internet Protocol Version 4 (IPv4) is the fourth version of the Internet Protocol. It is used on the packet-switched networks and with connectionless communication. IPv4 has four bytes (32 bits) address and the address space is limited to 4,294,967,296 (232) unique addresses. On the local area network (LAN), the “Private Network” is used. It starts from 192.168.0.0 and the address space contains 65,025 (216) IP addresses.
III-2-3. BASIC SETTINGS – IPV6 SETTINGS Internet Protocol Version 6 (IPv6) is a solution to deal with the address space limitation of IPv4 and it is the most recent version of Internet Protocol. It is intended to replace IPv4. IPv6 is a Layer 3 (Internet Layer) protocol, which is used on the packet-switched networks and with connectionless communication. There are 16 bytes (128 bits) for an IPv6 address and the address space is up to 2128 unique addresses.
IPV6 NEIGHBOR TABLE • IPv6 Address This filed displays the IPv6 address of the neighbor. • MAC Address This filed displays the MAC address of the neighbor. • State The connection state can be “DELAY”, “REACHABLE”, “STALE”, “FAILED”, or “PROBE”.
III-2-3. BASIC SETTINGS – SYSTEM TIME The System Time represents the date and time. The system uptime defines the passing time after the system boots up. There is no battery on the switch and hence the system time cannot be saved in the system. Users can configure the time zone and system time manually by synchronizing the time with the browser or by enabling the “NTP” service to get the time from a NTP Server.
III-3. Web Management – Redundancy III-3-1. REDUNDANCY – SPANNING T REE The Spanning-Tree Protocol is a standard protocol that is defined in IEEE 802.1D. It is used to build a logical loop-free topology for layer-2 Networks. The basic function of the protocol is to prevent loops and broadcast flooding around the switches.
• Maximum Age A timer that is used to wait for the Hello BPDU from the Root Bridge. If this device receives the BPDU before the timer expires, the timer will be reset. Else, the device will send the topology changed BPDU to notify other devices. The range of Maximum Age is from 6 to 40 seconds. The default Maximum Age is 20 seconds.
CONFIGURE RSTP PORT INFORMATION • • • • • • • No. Port1 to PortN, where N is based on the total port number. Path Cost The cost from the current node to another device. The range of Path Cost is from 0 to 200000000. The default Path Cost is 0. This implies that the Path Cost is decided by the system. Port Priority Used to decide the port to be blocked in the Ring topology. The range of Root Priority is from 0 to 240 and are in multiple of 16. The default Root Priority is 128.
RSTP STATUS • Bridge ID This field shows the unique identity of this node when it is part of a network. It contains 8 bytes the first 2 bytes are for Bridge Priority (configurable) and the remaining 6 bytes are for the MAC Address (unique). • Root Bridge It is elected from the switches in the STP topology via several STP messages (BPDU). The Root Bridge is the node with the lowest Root Priority.
• No. Port 1 to Port N, N is based on the total port number. • Role This field shows the role of the STP port. Root: This is the root port, which is connected to the Root Bridge with the lowest cost. Designated: This is the designated port, which can send the best BPDU on the segment to other connected nodes. Alternate: This is the alternate port, which is blocked. This port can still receive useful BPDU from another bridge. When it receives a useful BPDU, it will help to forward it on the segment.
• Oper. P2P This field shows the link-type of the STP port. P2P means “point-to-point” and Shared means “point-to-multiple”. • Oper. Edge This field shows the edge state of this STP port. CONFIGURE MSTI INFORMATION • Basic Settings 。 Region Name The Region Name is the name of the MST Region. The switches in the same MST Region must be set to the same Region Name. The max length for the Region Name is 32 characters. Note: #, \, ', ", ? are invalid characters.
• Instance Settings 。 Instance No. The Instance No. is from 1 to 15. 。 Included VLAN The configured VLANs are involved in the specific Instance. The format is: 10, 20, 30…. “Comma” is used to separate VLAN IDs. 。 Priority The priority is used to define the “Root Bridge” that is used to communicate with other MSTI Region. The range of the Root Priority is from 0 to 61440 (multiple of 4096). The default Root Priority is 32768.
CONFIGURE MSTI PORT INFORMATION • Instance Selector Select the instance to configure the ports. The Instance No. is from 1 to 15. • No. Port1 to PortN, where N is based on the total port number. • Path Cost The Path Cost is the cost from the current node to another device. The range of the Path Cost is from 0 to 200000000. The default Path Cost is 0. This implies that the Path Cost is decided by the system. • Port Priority This is used to identify the port to be blocked in the Ring topology.
III-3-2. REDUNDANCY – ERPS Ethernet Ring Protection Switching (ERPS) applies the protection switching mechanism for Ethernet traffic in a ring topology. This mechanism is defined in ITU-T G8032. You can avoid the possible loops in a network by implementing the ERPS function. This is done by blocking the flow of traffic to the Ring Protection Link (RPL) for protecting the entire Ethernet ring. When an ERPS is implemented in a ring topology, only one switch is allocated as the owner.
CONFIGURE ERPS INFORMATION For more information, hover the mouse over the icon in the system. • ERPS Ring There are three rings supported on a device. Using the dropdown select to change the ERPS Rings. • Basic Settings 。 ERPS Status “Enable” or “Disable” ERPS protocol running on the switch. By default, the ERPS protocol is enabled. 。 Ring Type Configure the Ring to be a “Major-ring” or a “Sub-ring”. 。 ERPS Port 0 The ERPS Port 0 is also called “West Port”.
The ID is the identifier of the ring. The members in the same ring must be set to the same ERPS Ring ID. The range of the ERPS Ring ID is from 1 to 239. The default ERPS Ring ID is 1. 。 R-APS Channel The R-APS Channel is used to forward ERPS information and is mapped to the VLAN IDs. These VLAN IDs cannot be set as traffic VLANID. The members in the same ring must be set to the same R-APS Channel. The range of the R-APS Channel is from 1 to 4094. The default R-APS Channel is 1000.
ERPS STATUS • ERPS Ring There are three rings supported on a device. Using the dropdown select to change the ERPS Rings. • Basic Information 。 Ring Type The type of the selected ERPS Ring shows “Major-ring”, “Sub-ring with virtual channel”, or “Sub-ring without virtual channel”. 。 ERPS Status The status of ERPS is “Enable” or “Disable” in the selected ERPS Ring. 。 Ring State There are two states for ERPS Rings: Normal and Abnormal.
。 Revertive Mode Show the Revertive Mode is enabled (Yes) or disabled (No). 。 MEL Value The field is the configured MEL value. • Port Status 。 Interface The configured port presents the ERPS port 0/1 in the ERPS protocol. 。 Role Display the configured role for the configured port.
III-4. Web Management – Management III-4-1. MANAGEMENT – SNMP Simple Network Management Protocol (SNMP) is a standard for collecting and structuring information on the managed devices of the IP network. It can also modify some of the information to change the behavior of the devices. SNMP is usually used in monitoring the network. The users can remotely query the information provided by the devices running SNMP. The switches support SNMP v1, v2c, and v3.
CONFIGURE SNMP SERVER INFORMATION • Basic Settings 。 SNMP Version The system enables the SNMP “v1, v2c and v3” authentication by default. The users can enable the SNMP server on only “v1 and v2c” or “v3”. “None” refers to disabling the SNMP server. 。 Read Only Community The community used to access the SNMP server with the “read-only” privilege. The max length for the Read Only Community is 32 characters. Note: #, \, ', ", ? are invalid characters.
Authentication, Privacy: Access by an account “admin” or “user” with password and the data will be encrypted. 。 Authentication Type Two algorithms are provided - MD5 and SHA for authentication password. 。 Authentication Password A string/key is used to authenticate the SNMP Server and obtain the access permission. It will be hashed by MD5 or SHA before authentication. The min length for the Read-Write Community is 8 characters. The max length for the Read-Write Community is 32 characters. Note: #, \, ', "
CONFIGURE SNMP TRAP INFORMATION • Basic Settings 。 Trap Mode The system enables the SNMP “v1, v2c and v3” authentication by default. Users can enable the SNMP server only on “v1 and v2c” or “v3”. “None” indicates disabling the SNMP server. 。 Inform Retry The SNMP trap will send “Retry” times when the trap set to “v2 Inform” or “v3 Inform” mode. The range of the Inform Retry is from 1 to 100. The default Inform Retry is 5.
Specify the username for authentication with the SNMP trap server. 。 Engine ID The Engine ID is the identifier for the given SNMP application. 。 Security Level No Authentication, No Privacy: Access using the username assigned to the users. Authentication, No Privacy: Access using the username assigned to the users with password. Authentication, Privacy: Access using the username assigned to the users with password and the data will be encrypted.
III-4-2. MANAGEMENT – DHCP DHCP SERVER/CLIENT DHCP, Dynamic Host Configuration Protocol, is a standardized protocol used in the IP networks. The DHCP Server holds an IP address pool and when a DHCP Client request for an IP address, the DHCP Server picks an IP address from the pool and assigns it to the client. DHCP Server also manages other IP information such as Default Gateway and DNS Server. DHCP is very useful to configure the IP information for a number of devices.
CONFIGURE DHCP CLIENT • IPv4 Mode Set the IPv4 Mode to “DHCP Client” to enable the DHCP Client. The system sends a discovery frame to the network and tires to obtain an IP address from the DHCP Server. After enabling the DHCP Client, users need to connect to the Console Port to get the IP address by using “show ip address” on the CLI. • (Apply Button) After configuring above fields, click "Apply" button to make the changes effective.
CONFIGURE DHCP SERVER INFORMATION • Server Status Shows the status of the DHCP server: Down or Up. • Server Mode “Enable” or “Disable” the DHCP Server function. • Start IP Address Set the range of the IP pool. The “Start IP Address” is the starting. “Start IP Address” must be in the same subnet as that of the switch itself. • End IP Address Set the range of IP pool. The “End IP Address” is the end. “End IP Address” must be in the same subnet as that of the switch itself.
CONFIGURE DHCP SERVER BINDING INFORMATION • Binding ID An ID used to identify the binding. The range of the Binding ID is from 1 to 32. • MAC Address The device with the specified MAC Address will be assigned to the static Binding IP Address. • Binding IP Address A static IP Address will be assigned to the specified MAC Address. • : Click the plus icon to add a DHCP Binding row. • : Click the remove icon to delete the DHCP Binding row.
CONFIGURE DHCP RELAY INFORMATION • Relay Basic Settings 。 Relay Mode “Enable” or “Disable” the DHCP Relay function. 。 Relay Option82 “Enable” or “Disable” the DHCP Relay with Option82 tag. 。 Helper Address 1 - 4 The IP Addresses of the DHCP Servers provide IP addresses to the DHCP Clients. A backup of Four Helper Addresses are available during breakdown. • Relay Untrust 。 No. Port1 to PortN, where N is based on the total port number. 。 Untrust Status “Enable” or “Disable” to untrust the specific port.
III-4-3. MANAGEMENT – POE The PoE, or Power over Ethernet, allows switches to provide electric power along with data on the twisted pair Ethernet cables. The Power over Ethernet defined in IEEE 802.3af provides up to 15.4 W and IEEE 802.3at provides up to 25.5 W. It requires category 5 cables or better to support high power levels. PoE is helpful when the AC power is not available or is available with high cost.
CONFIGURE POE KEEP ALIVE • No. Port1 to PortN, where N is based on the total PoE port number. • Detect “Enable” or “Disable” to detect the Powered Device (PD) on the specific port. When the detection is enabled, the system pings the configured IP Address on every Ping Interval. • IP Address The field is the IP Address of the Powered Device (PD). • Ping Interval The Ping Interval is the duration to ping the Powered Device (PD). The range of the Ping Interval is from 1 to 65535 seconds.
CONFIGURE POE SCHEDULE • Port Selector Select the port number to configure the PoE Schedule. Port1 to PortN, where N is based on the total PoE port number. • Schedule Mode “Enable” or “Disable” to provide power by the schedule on the specific port. • Enable (for each day) The week is from Sunday to Saturday. • Week (The x-ray of the table) The week is from Sunday to Saturday. • Hour (The y-ray of the table) The hour is from 00 (00:00) to 23 (23:00).
CONFIGURE POE PRIORITY • Basic Setting 。 Priority Mode Configure the priority mode to provide the power to PDs. There are three modes: Actual, Class, and Static. Actual: Provide the power according to the requirement from the PD. Class: Follow the IEEE 802.3at/af classes to provide power. For example, the PD follows class 4 so the PSE will provide 30 Watt to it. Static: Provide the fixed power that configured in the “Limit” fields by the user to the PDs.
III-4-4. MANAGEMENT – INDUSTRIAL PROTOCOL There are two industrial protocols provided in the switch – EtherNet/IP and Modbus/TCP. EtherNet/IP is an industrial network protocol that linked up the Common Industrial Protocol (CIP) with standard Ethernet.
Modbus Data Mapping Information In the following tables, we assume the total port number is 8. The following table is for Function Code 3 (Holding Registers) / Function Code 6. Address Offset System Information 0x0000 to 0x0008 Data Type Interpretation 1 word HEX Description Port 1 to Port 8 Status 0x0000: Disable 0x0001: Enable Port 1 to Port 8 Status Configuration 0x0000: Disable 0x0001: Enable The following table is for Function Code 4 (Input Registers).
0x0059 1 word HEX 0x005A 1 word HEX 0x0082 1 word HEX Power 2 0x0000: Off 0x0001: On Fault LED Status 0x0000: Boot error 0x0001: Normal 0x0002: Fault DO1 0x0000: Off 0x0001: On Port Information 0x1000 to 0x1008 1 word HEX 0x1100 to 0x1108 1 word HEX 0x1200 to 0x1208 1 word HEX 20 words ASCII Port 1 to Port 8 Status 0x0000: Link down 0x0001: Link up 0x0002: Disable 0xFFFF: No port Port 1 to Port 8 Speed 0x0000: 10M-Half 0x0001: 10M-Full 0x0002: 100M-Half 0x0003: 100M-Full 0xFFFF: No port
0x2180 to 0x218F 2 words Port 1 to Port 8 Rx Bytes Ex: port 1 Rx Btyes Amount = 13248635 Received Modbus response: 0x13248635 Word 0 = 1324 Word 1 = 8635 HEX Configure Industrial Protocols Information • Modbus Mode “Enable” or “Disable” the Modbus/TCP function. • Ethernet/IP Mode “Enable” or “Disable” the Ethernet/IP function. • (Apply Button) After configuring above fields, click "Apply" button to make the changes effective.
III-4-5. MANAGEMENT – UPNP UPnP is Universal Plug and Play, a set of networking protocols that permit the network devices to seamlessly discover each other in the networks. It is promoted by the UPnP Forum, but since 2016, all UPnP efforts are managed by the Open Connectivity Foundation. UPnP extends “plug and play” to connect to a network device without configuration.
III-5. Web Management – L2 Switching III-5-1. L2 SWITCHING – PORT MANAGEMENT Port Management contains a “Description” field that is used to describe the port, “Enable” or “Disable” option to turn on or turn off a specific port, configure the speed-duplex for the port, and Flow Control on the port. In the Port Status page, the users can obtain information such as Link Status, Speed, Duplex, Flow Control, Tx and Rx in Bytes, and PoE status.
determine the speed and duplex. 。 。 。 。 。 Auto: The port follows IEEE 802.3u protocol to auto-negotiate with connected device. 100M-Full: The port transmits frames with 100Mbits per second speed and full duplex. 100M-Half: The port transmits frames with 100Mbits per second speed and half duplex. 10M-Full: The port transmits frames with 10Mbits per second speed and full duplex. 10M-Half: The port transmits frames with 10Mbits per second speed and half duplex.
• DDM Module This section only shows when the SFP DDM is supported on the inserted SFP module. 。 Real Time Value The current operating information including temperature, voltage, current, Tx power, and Rx power. 。 Alarm Warning The default configured threshold for triggering the alarm and system warning. There are 5 types of information (temperature, voltage, current, Tx power, and Rx power) and 4 levels of alarm and warning (high alarm/warning, low alarm/warning).
• Port Selector Select the port number to monitor the RMON information. Port 1 to N, where N is based on the total port number. • Received Packets 。 Rx Octets: the total received traffic in bytes 。 Rx Unicast: the number of received unicast packets 。 Rx Multicast: the number of received multicast packets 。 Rx Broadcast: the number of received broadcast packets 。 Rx Pause: the number of MAC Control packets received on the specific interface with an opcode indicating the PAUSE operation.
• Received Error Counter 。 Rx Collision: the total number of collisions on the Ethernet segment. 。 Rx CRC/Alignment: the total number of received packets that have either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error). 。 Rx Drop: the total number of dropped packets due to lack of resources.
PORT STATUS • Port Port 1 to N, where N is based on the total port number. • Link Status Link Status displays the link state (“Up” or “Down”) of the port. If the port is disabled, it displays “Disabled”. • Speed Speed displays the access speed in bit per second of the port. If the port is linked down, it displays“-“. • Duplex Duplex displays the link-type (Full or Half) of the port. If the port is linked down, it displays“-“. • Flow Control It is the state (On or Off) of the Flow Control.
III-5-2. L2 SWITCHING – IGMP SNOOPING Internet Group Management Protocol (IGMP) is used in communicating among hosts and establishing a multicast group membership on the IPv4 networks (Layer 3). IGMP provides the ability to prune multicast traffic to those who need this kind of traffic and reduce the amount of traffic on the network. However, switches work on the MAC Layer (Layer 2) and are unable to obtain IGMP information.
• Fast-Leave Setting 。 No. Port 1 to N, where N is based on the total port number. 。 Fast-Leave Mode “Enable” or “Disable” the fast-leave function on the specific port. If the fast-leave mode is enabled on the port, the switch will close the multicast stream when receiving a leave message on this port without further action. • (Apply Button) After configuring above fields, click "Apply" button to make the changes effective.
CONFIGURE IGMP SNOOPING QUERIER INFORMATION • Basic Settings 。 Mode “Enable” or “Disable” the IGMP Snooping Querier function. If it is enabled, the system sends IGMP snooping version 1 and 2 queries. 。 Querier Interval This period is the interval to send the IGMP snooping queries. The range of the Querier Interval is from 1 to 3600 seconds. The default Querier Interval is 125 seconds. 。 Query Max Response Time This is a timer to wait for the member response of the IGMP groups.
Configure Unknown Multicast Information • Action Settings 。 Unknown-Multicast Configure the action when the system receives an unknown-multicast packet. Flooding: flood the unknown-multicast packet to all other ports. Discarding: discard the unknown-multicast packet. Router: forward the unknown-multicast packet to the router port. • Router Port Settings 。 No. Port 1 to N, where N is based on the total port number. 。 Router Port Set the specific port to router port or not.
IGMP SNOOPING TABLE • Multicast IP The Multicast IP is the IP address of the multicast group. • Group The group shows the port number, which joined the group.
III-5-3. L2 SWITCHING – 802.1Q VLAN 802.1Q VLAN Virtual Local Area Network (VLAN) is a structure that can ease Network planning. The devices in a VLAN can be located anywhere without the restriction of physical connections, but work like they are on the same physical segment. IEEE 802.1Q defines VLAN tagging conception for the Ethernet frames. VLAN tagging supports frames in the different VLAN groups transmitting on a link (called VLAN trunk). The maximum number of VLANs on the Ethernet network is 4096.
Configure 802.1Q VLAN Information • Management VLAN 。 VLAN ID The VLAN ID is for the native VLAN. Only the ports in the same VLAN as Management VLAN can access the switch configuration console via Ethernet. The range of the VLAN ID is from 1 to 4094. The default Management VLAN ID is 1. • VLAN Member Settings 。 VLAN ID Assigns a unique VLAN ID to this VLAN group. The range of the VLAN ID is from 1 to 4094. 。 Name Assigns a name to this VLAN group to identify the different VLANs. The max.
802.1Q VLAN TABLE • VLAN ID This is the assigned unique VLAN ID for this VLAN group. • VLAN Name This is the assigned VLAN Name for this VLAN group. • Untag Member These ports are assigned as VLAN untagged ports. • Tag Member These ports are assigned as VLAN tagged ports.
Configure 802.1Q VLAN PVID & Accept Type • VLAN PVID 。 No. Port1 to PortN, where N is based on the total port number. 。 PVID Assign a VLAN ID to the frames without a VLAN tag that come into the specific port. • Accept Type 。 No. Port1 to PortN, where N is based on the total port number. 。 Filter Three types of filters are provided: All, Tagged Only, Untagged Only. All: Accept both tagged and untagged frames that come into the port. Tagged Only: Accept only tagged frames that come into the port.
CONFIGURE VLAN Q-IN-Q • Specific Provider Ethertype This is a global configuration and an Ethertype is assigned for all ports, which are configured as “Specific Provider”. This field is locked (disabled) until at least one port is configured to the “Specific Provider” in the “Q-in-Q Port Settings” section. The range of the Provider Ethertype is from 0x0000 to 0xFFFF, but 0x8100 is invalid. The default Provider Ethertype is 0x88A8.
• Q-in-Q Port Settings 。 No. Port1 to PortN, where N is based on the total port number. 。 Mode Set the port to one of the Q-in-Q mode. The Egress is dependent on the connected device and hence the egress action is skipped. Mode Q-in-Q Tunnel Mode Customer Provider Specific Provider • Ingress Untagged Frames: Add TPID: 0x88A8 tag and forward. Tagged Frames: TPID: 0x8100: Add TPID: 0x88A8 tag and forward. TPID: 0x88A8: Forward the frames. Ingress A port set to “Customer” runs typically 802.1Q VLAN.
III-5-4. L2 SWITCHING – Q UALITY OF SERVICE Quality of Service which known as QoS provides a stable and predictable transmitting service. It is useful to manage the bandwidth more efficiently based on the requirement of applications. Users are able to set different priorities for different traffics to satisfy the services which need a fixed bandwidth and have more sensitive of delay. Quality of Service can also optimize the restrict bandwidth resource and control the network traffic of the switches.
Configure QoS Trust Mode and Default CoS • Trust Mode 。 No. Port1 to PortN, where N is based on the total port number. 。 Mode CoS: Class of Service. Use the 3-bit “PRI” field in the VLAN tag. It enables you to assign traffic to 8 different classes from 0 to 7. DSCP: Use 6-bit field “DSCP” in the Type of Service (ToS) tag. It enables you to assign traffic to 64 different types from 0 to 63. • Default CoS 。 No. Port1 to PortN, where N is based on the total port number.
CONFIGURE COS MAPPING • Class / Priority There are 3 bits for the “Class of Service” field called “PRI” in the VLAN tag and there are 8 classes from 0 to 7. • Queue The chipset supports 8 queues from queue 0 to queue 7. The queue 0 is the lowest priority queue and the queue 7 is the highest priority queue.
CONFIGURE TOS MAPPING • DSCP There are 6 bits for the “DSCP” in ToS tag and hence there are 64 classes from 0 to 63. • Queue The chipset supports 8 queues from queue 0 to queue 7. The queue 0 is the least priority queue and the queue 7 is the highest priority queue. The default Queue for each type is displayed in the table: Type Queue • 0-7 0 8-15 1 16-23 2 24-31 3 32-39 4 40-47 5 48-55 6 (Apply Button) After configuring above fields, click "Apply" button to make the changes effective.
III-5-5. L2 SWITCHING – PORT TRUNK Port Trunk is also known as Link Aggregation, and it is a protocol to group links to a trunk. A total of 8 trunk groups are provided. It is a good method to reach load balance and link backup. For example, when port 1 to port 4 are combined to trunk 1 and all ports support 100Tx and set to full-duplex, the bandwidth of the trunk will be 800Mbps. The traffic transmitting on the trunk is distributed to one of the link by the source MAC address to reach the load balance.
• Member Ports Select member ports to be joined in the specified Trunk group. A port can only be in one of the Trunk group. Each Trunk group supports maximum 8 member ports. • (Apply Button) After configuring above fields, click "Apply" button to make the changes effective. PORT TRUNK STATUS • Group The supported trunk groups are from Trunk 1 to Trunk 8. • Type The trunk mode set for this group maybe “LACP” or “Static”. This field displays“-“ if no members are in the group.
III-6. Web Management – Security III-6-1. SECURITY – STORM CONTROL A traffic storm happens when there is excessive packets flood to the LAN and decreases the performance. The Storm Control function is used to prevent the system from breaking down by the broadcast, multicast, or unknown unicast traffic storm. When the Storm Control is enabled on the specific traffic type, the system will monitor the incoming traffic.
III-6-2. SECURITY – 802.1X 802.1X is an IEEE standard defined Port-based Network Access Control. It provides a more secured authentication mechanism for the devices, which would like to connect to a LAN or a WAN. The Port-based Network Access Control protocol is a convenient method for the users because the authentication is per-port and once the port passes the authentication, it is not required to authenticate again when changing to another device, i.e., without security.
Configure 802.1X Port Information • Port Settings 。 No. Port 1 to Port N, where N is based on the total port number. 。 Enable “Enable” or “Disable” 802.1X function on the port. “Yes” means 802.1X is enabled on the port and the port is locked until it passes the authentication. 。 Mode Select the 802.1X mode to “Mac-based” or “Port-based”. Mac-based: Only the MAC Address, which passed the authentication can connect to the networks.
CONFIGURE LOCAL DATABASE INFORMATION • User Name The User Name is used in authentication. The max length for the User Name is 32 characters. Note: #, \, ', ", ? are invalid characters. • Password The Password is used in authentication. The max length for the Password is 20 characters. Note: #, \, ', ", ? are invalid characters. • Confirm Password The Confirm Password field must be the same as Password field. • : Click the plus icon to add a Username/Password row.
Configure RADIUS Server Information • Server IP The Server IP is the IP address of the server. • Service Port The Service Port is the listening port on the RADIUS server. • Shared Key The key is used in establishing the connection between the server and the authenticator before authentication. • (Apply Button) After configuring above fields, click "Apply" button to make the changes effective.
III-6-3. SECURITY – SERVICE CONTROL We provide 4 types of interface which are HTTP, HTTPS, SSH, and Telnet to access the management interface of the switch. Users can configure the authority for each type of service to be enabled or disabled. All services are enabled by default and users can disable unused service to make the system more secure.
III-7. Web Management – Diagnostics III-7-1. DIAGNOSTICS – PORT MIRRORING Port Mirroring is a feature that copies the incoming or outgoing packets on one or more ports to another destination port. It is very useful to monitor the network traffic and analyze the copied traffic. Port Mirroring helps network management to keep a close eye on the network and debug when some issues arise. Configure Port Mirroring Information • Mirroring Mode “Enable” or “Disable” the Port Mirroring function.
III-7-2. DIAGNOSTICS – PING Ping is a tool used to test the reachability of a device on the IP network. Ping is enabled by sending Internet Control Message Protocol (ICMP) request to the target device and waits for the response packet from the target device to check the connection. Ping Another Device with IPv4/IPv6 • Type Ping a connected device with “IPv4” or “IPv6” protocol. • IP Address The IP address of the connected device is verified based on the type. • Count Sets the count times.
III-8. Web Management – Monitoring III-8-1. MONITORING – LLDP LLDP is Link Layer Discovery Protocol and it is a vendor-neutral layer 2 protocol that is defined by IEEE 802.1AB. LLDP is used in advertising identity of the devices, capabilities and neighbors on the LAN. The information from the neighbors enables the switch to quickly identify the devices and interoperate with each other more smoothly and efficiently. The neighbor table shows the information about the device that is next to the port.
LLDP NEIGHBOR TABLE • Local Port The port connected to the LLDP neighbor on the local switch. • Remote System Name This is the system name of the LLDP neighbor. This value is set and provided by the remote device. • Chassis ID The Chassis ID defines the MAC Address of the LLDP neighbor. • Remote Port This field displays the port information received from the LLDP neighbor. • Port ID The Port ID displays the port identity of the connected port on the LLDP neighbor.
III-8-2. MONITORING – SYSTEM WARNING System Warning contains “System Event Log”, “SMTP Settings”, and “Event Selection” for different types of services such as “Fault Alarm”, “System Log”, “SMTP”, and “SNMP Trap”. These logs are very useful for the administrator to manage and debug the system.
SYSTEM EVENT LOG • • Log Text Area The system event information displays if the “Local” system log mode is enabled and the configured events are triggered. (Clear Button) Click the “Clear” button to clear the system event log in the text area. • (Refresh Button) Click the “Refresh” button to refresh the system event log in the text area.
Configure SMTP Information • Server Settings 。 SMTP Status “Enable” or “Disable” the SMTP function. 。 Server Address This is the IP address or URL of the SMTP Server. For example, the SMTP server address provided by Google is “smtp.gmail.com”. 。 Server Port This field is the port listening on the server for the SMTP request. For security, we suggest users configure the server port to 465 for SSL or 587 for TLS. The range of the Service Port is from 1 to 65535. The default Service Port is 25.
Note: #, \, ', ", ? are invalid characters. 。 Password The password is used in authentication with the SMTP server. The max length for the Password is 32 characters. Note: #, \, ', ", ? are invalid characters. • Recipient Settings 。 E-mail Address 1-4 The configured e-mail address will receive the notifications if the SMTP is enabled and the events set on “Event Selection” are triggered. • (Apply Button) After configuring above fields, click "Apply" button to make the changes effective.
CONFIGURE SYSTEM EVENT SELECTION • Event There are 5 events on the System Events. Authentication Failure: Login failed on the web console or CLI. It may be caused due to incorrect username or password. ERPS Change: The ERPS function is working and the topology is changed. Power 1 or 2: The power 1 or 2 is powered off. Cold Start: The system reboots due to interruption of power supply. Warm Start: The system reboots by issuing “reboot” command on CLI or clicking the “reboot icon” on the web console.
Configure Interface Event Selection • Event The events on the “Interface Events” display the link status for each port. Fault Alarm is triggered only during link down and other system log types support both link up and link down. • Fault Alarm The Fault LED will turn on red and relay will turn ON, if the configured events are triggered. By default, the Fault LED is green and relay is turned OFF in the normal situation.
CONFIGURE SFP DDM EVENT SELECTION • Event There are 5 events on the “SFP DDM Events”: Current, Rx Power, Tx Power, Temperature, and Voltage. Enable or Disable the event fault alarm or system warning when the value is higher than the high alarm/warning threshold or the value is lower than the low alarm/warning threshold.
III-9. Web Management – MAC Table MAC address is Media Access Control address, which is used in layer 2 switching. AMAC Address table is maintained by the switch to transmit frames more efficiently. When the switch receives a frame, the system will check the MAC table and forward the frame to the corresponding port. The MAC Address table is built dynamically by the received frames and when the system receives a frame with an unknown MAC address, it floods the frame to all LAN ports in the same VLAN.
MAC ADDRESS TABLE • • VID The VID is the VLAN group ID, which contains the configured MAC Address. MAC Address The MAC Address column displays the learnt or configured MAC Addresses. • Type The Type column displays the type (Learning or Static) of the MAC Address. Learning: The MAC address is learnt from the transmitting frames. Static: The MAC Address is configured by the users or the system. • Source The Source column displays the port(s) to which the MAC Address belongs.
III-10. Web Management – Maintenance III-10-1. MAINTENANCE – AUTHORIZATION The "Username" and "Password" are very important information both in the "Command Line Interface" or "Web Console". Users have to login into the system before doing any configuration. We strongly suggest the users to change at least the password for security when they are going to use this device. We also provide authentication with RADIUS/TACACS+ server from software version 1.0.3.
Configure RADIUS Server Information This section only display when the mode in the Basic Settings is set to “Radius”. • Server IP The IP address of the RADIUS server must in the same subnet as the IP address of the switch. • Server Port The port is listening to the RADIUS service on the RADIUS server. The range of the Server Port is from 1 to 65535. The default Server Port is 1812. • Shared Key The Shared Key is a string that used to build the connection with the RADIUS server.
CONFIGURE TACACS+ SERVER INFORMATION This section only display when the mode in the Basic Settings is set to “Tacacs+”. • Server IP The IP address of the TACSCS+ server must in the same subnet as the IP address of the switch. • Server Port The port is listening to the TACSCS+ service on the TACSCS+ server. The range of the Server Port is from 1 to 65535. The default Server Port is 49. • Shared Key The Shared Key is a string that used to build the connection with the TACSCS+ server.
III-10-2. MAINTENANCE – FIRMWARE UPGRADE For a better performance and wider industrial applications, we constantly develop new features and revise the issues from the users. We suggest the users to upgrade the system to the newest firmware version to have a better user experience. We provide 2 ways to upgrade the firmware from the Web Console, - one is saving the firmware file in the USB stick and another one is save the firmware file on the PC.
UPGRADE FIRMWARE PROCESS - UPLOADING FIRMWARE FILE The following steps are performed when the system starts to upgrade after the "Apply" button is clicked: 1. Uploading the firmware image The progress bar displays the uploading percentage. 2. Verifying the uploaded file When the file is 100% uploaded, the system starts to verify the uploaded file to make sure it is valid. By default, the firmware image is encrypted to prevent the attack on man-in-the-middle.
Upgrade Firmware Version - Copy Firmware File from USB • Image File Name Enter the name of the firmware image in the USB. The system will try to identify the file with specified file name to upload it to the system. • (Upload Button) After entering the firmware image name, click "Upload" button to copy it from the USB to the system. UPGRADE FIRMWARE PROCESS - COPY FIRMWARE FILE FROM USB 1. Copying the firmware image from USB to switch The system will also check if the USB is inserted and file exists.
4. Rebooting the system The system will reboot automatically if the firmware is upgraded without any issue. The progress bar displays the rebooting progress.
III-10-3. MAINTENANCE – CONFIG BACKUP In the normal application, there are several switches in the Network and they might be configured to the same features. To facilitate this, the users can configure one of the switches and save the configuration file to local host (for example: users' PC) or USB sticks and then restore the configurations on another switch via "Config Restore" function. Configuration file in the USB can also have a way to fast replace the device when it is damage.
III-10-4. MAINTENANCE – CONFIG RESTORE We suggest users to save/backup the configurations after a series of settings. If another device needs the same configurations, users can use the Config Restore function to restore it. RESTORE CONFIGURATION FILE • Restore from Localhost 。 File Name Select the configuration file, which is saved in the Localhost. • Restore from USB Please ensure there is a USB stick inserted into the USB port.
III-10-5. MAINTENANCE – USB AUTO-LOAD &AUTO-BACKUP Configure USB Auto-Load and Auto-Backup • USB Auto-Load “Enable” or “Disable” the USB Auto-Load function. If “USB Auto-Load” is enabled, the system will search the configuration file named “startup-config” in the USB and load it when rebooting. • USB Auto-Backup “Enable” or “Disable” USB Auto-Backup function.
Appendix A: IP Configuration for Your PC This appendix describes how to set the IP address of your PC so you can connect to product configuration webpage. The configuration webpage allows you to set system variables or monitor system status. The following section will guide you to set the IP address properly in a Microsoft Windows 8 environment. Setting IP address in other Microsoft operating system (such as Windows Vista or Windows 7) is quite the same and can be related. 1.
3. An Ethernet Status window will pop up. Please click on the Properties button as shown in the figure down below. 4. An Ethernet Properties window will pop up. Please double click on the Internet Protocol Version 4 (TCP/IPv4). 5. An Internet Protocol Version 4 (TCP/IPv4) Properties window will pop up. Please set your PC’s IP address and subnet mask as shown in the figure down below. By default, your product’s IP address should be 192.168.2.1.
112
Appendix B: CLI Command Reference The following are the commands that the users can use in the CLI mode. Please check if the mode is correct before issuing the command.
SYSTEM GROUP Command erase startup-config exec-timeout [MINUTE] [SECOND] hostname [HOSTNAME] reboot system contact [CONTACT] system location [LOCATION] username [USER_ID] [PASSWORD] show exec-timeout show hostname show environment power [1|2] show event status relay show system contact show system description show system location show system mac show system uptime show system version firmware show transceiver ddm show transceiver info show transceiver raw show username no exec-timeout no hostname no system
IPV6 GROUP Command ipv6 address add [IPV6_ADDR] ipv6 enable ipv6 neighbor flush ipv6 ping [IPV6_ADDR] [ | ] show ipv6 show ipv6 address show ipv6 default address show ipv6 neighbor no ipv6 no ipv6 address add [IPV6_ADDR/PREFIX_LEN] Explanation Add an address and netmask of IPv6 Enable IPv6 protocol Issue a neighbor flush command of IPv6 Configure Configure Configure Mode Issue an IPv6 ping command Configure Display IPv6 protocol state Display IPv6 addresses D
STP GROUP Command spanning-tree forward-time [4-30] spanning-tree hello-time [1-10] spanning-tree max-age [6-40] spanning-tree mode [rstp] spanning-tree mst instance [1-15] vlan [VLAN_LIST] spanning-tree mst name [NAME] spanning-tree mst revision [0-65535] spanning-tree mst [1-15] priority[0-61440] spanning-tree priority [0-61440] spanning-tree cost [0-200000000] spanning-tree edge [admin-edge|admin-non-edge] spanning-tree link-type [point-to-multiple|point-to-point] spanning-tree mst [1-15] cost [0-2000000
ERPS GROUP Command ethernet redundancy erps-ring [ 1 | 2 | 3 ] aps-channel [1 - 4094] disable enable erps-ring [ 1 | 2 | 3 ] ext-command clear ext-command fs ext-command ms id [1 - 239] mel [0 - 7] revertive ring-port 0 [1(lan1) - N(lanN)] ring-port 1 [1(lan1) - N(lanN)] role port0 [o(owner) | n(neigh) | i(interconn)] role port1 [o(owner) | n(neigh) | i(interconn)] timer guard [10 - 2000] timerhold-off [0 - 10000] timer wtr [1 - 12] type [m(major-ring) | s(sub-ring)] virtaul-channel major-ring channel-id [1
SNMP GROUP Command snmp server community ro [COMMUNITY] snmp server community rw [COMMUNITY] snmp server enable snmp server enable v1-v2c-only snmp server enablev3-only snmp server v3 auth admin [md5| sha] [PASSWORD] snmp server v3 auth user [md5| sha] [PASSWORD] snmp server v3 encryption admin [des| aes] [PASSWORD] snmp server v3 encryption user [des| aes] [PASSWORD] snmp server v3 level admin [auth| noauth| priv] snmp server v3 level user [auth| noauth| priv] snmp trap community [COMMUNITY] snmp trap host
no snmp trap inform timeout no snmp trap v3 auth no snmp trap v3 encryption no snmp trap v3 engine-ID no snmp trap v3 level no snmp trap v3 user no snmp trap version Default snmp inform timeout Default SNMPv3 authentication type and passphrase Default SNMPv3 encryption type and passphrase Default snmp trap engine ID Default SNMPv3 trap security level Default SNMPv3 trap user Default snmp trap version 119 Configure Configure Configure Configure Configure Configure Configure
DHCP GROUP Command boot host dhcp dhcp relay information option dhcp relay server [server_number: 1-4] [server_IP] dhcp relay untrust dhcp server binding [bind_ID: 1 - 32] [MAC] [IP_TO_BIND] dhcp server default-gateway [IP_ADDR] dhcp server included-address [START_OF_IP] [END_OF_IP] dhcp server lease [60-2592000] dhcp server name-server [IP_ADDR] dhcp service relay enable dhcp service server enable show boot host dhcp show dhcp relay information option show dhcp relay server [server_number: 1-4] show dhcp r
UPNP GROUP Command upnp advertisement interval [300-86400] upnp enable show upnp show upnp advertisement interval no upnp no upnp advertisement interval PORT GROUP Command flowcontrol [on | off] name [PORT_NAME] shutdown speed_duplex [10 | 100] [full | half] show interface all link summary show administrate show flowcontrol show link duplex show link rx show link speed show link state show link summary show link tx show name show speed_duplex show transceiver no flowcontrol no name no shutdown no speed_dupl
POE GROUP Command power inline budget[0-5000] power inline mode [actual | class | static] power inline force power inline limit [4-35] power inline never power inline priority [1-3] keepalive enable keepalive hold-time keepalive ip keepalive time schedule enable schedule [Sunday-Saturday] open-time [time] show power inline budget show power inline mode show power inline operation show power inline status show power inline status show keepalive table show power inline status show keepalive show keepalive hol
IGMP SNOOPING GROUP Command igmp snooping enable igmp snooping last-member count [2-10] igmp snooping last-member interval [1-25] igmp snooping querier enable igmp snooping query interval [1-3600] igmp snooping query max-respond-time [1-12] igmp snooping query version [VLAN_ID] [STATE:0|1] [VERSION:1|2|3] igmp snooping router-port [PORT_LIST] igmp snooping unknown-multicast [f|d|r] show igmp snooping all show igmp snooping mdb show igmp snooping query-version show igmp snooping router-port show igmp snoopin
QOS GROUP Command qos fair-queue weight [W0] [W1] [W2] [W3] [W4] [W5] [W6] [W7] qos map cos [priority:0-7] to tx-queue [0-7] qos map dscp [0-63] to tx-queue [0-7] qos queue-schedule [strict | wrr] qos default cos [0-7] qos trust [cos | dscp] show qos fair-queue weight show qos map cos show qos map cos [0-7] show qos map dscp show qos map dscp [0-63] show qos queue-schedule show qos default cos show qos trust no qos fair-queue weight no qos map cos [0-7] no qos map dscp [0-63] no qos queue-schedule no qos d
STORM CONTROL GROUP Command storm-control broadcast enable storm-control broadcast level [low | mid | high] storm-control multicast enable storm-control multicast level [low | mid | high] storm-control unknown-unicast enable storm-control unknown-unicast level [low | mid | high] show storm-control broadcast show storm-control broadcast level show storm-control multicast show storm-control multicast level show storm-control unknown-unicast show storm-control unknown-unicast level no storm-control broadcast n
PORT MIRROR GROUP Command mirror destination [DEST_PORT] mirror enable mirror source [rx | tx | both] [PORT_LIST] show mirror show mirror destination show mirror source no mirror no mirror destination no mirror source Explanation Set mirror interface of destination Enable port mirror Set mirror interface of source Show port mirror enable/disable state Show port mirror destination configuration Show port mirror source configuration Disable port mirror Delete port mirror Destination configuration Delete port
SMTP GROUP Command smtp authentication enable smtp authentication password [PASSWORD] smtp authentication username [USER_NAME] smtp enable smtp receive [1-4] [RECEIVER_ADDRESS] smtp sender [SMTP_SENDER_ADDRESS] smtp server address [SMTP_SERVER_ADDRESS] smtp server port [SMTP_SERVER_PORT] smtp subject [SUBJECT] show smtp authentication state show smtp authentication username show smtp receive [1-4] show smtp sender show smtp server address show smtp server port show smtp state show smtp subject no smtp authe
event syslog warm-start show event alarm ddm [lanX-lanY] [current | rx_power | temperature | tx_power | voltage] show event alarm digital-input show event alarm interface [lan1-lanN] down show event alarm [power1|power2] show event smtp auth-failure show event smtp cold-start show event smtp ddm [lanX-lanY] [current | rx_power | temperature | tx_power | voltage] show event smtp digital-input show event smtp interface [lan1-lanN] down show event smtp interface [lan1-lanN] up show event smtp [power1|power2] s
no event syslog [power1|power2] no event syslog warm-start Unregister an event of power 1 or 2 failure Unregister an event of warm-start MAC ADDRESS TABLE GROUP Command clear mac address-table dynamic mac address add [VID: 1-4094] [MAC_ADDR] [PORT] show mac address no mac address [VID: 1-4094] [MAC_ADDR] Explanation Flush dynamic MAC addresses in MAC table Set a MAC address to MAC table Display MAC table Remove a MAC address from FDB Configure Configure Mode Configure Configure Configure Configure US
Revision History Version Ver 1.0 Date 2017/08/10 Ver 1.1 2018/08/21 Remark 1. First version 1. Adding power wiring section 2.
COPYRIGHT Copyright Edimax Technology Co., Ltd. all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission from Edimax Technology Co., Ltd. Edimax Technology Co., Ltd.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
EU Declaration of Conformity English: This equipment is in compliance with the essential requirements and other relevant provisions of Directive 2014/30/EU. Français: Cet équipement est conforme aux exigences essentielles et autres dispositions de la directive 2014/30/EU. Čeština: Toto zařízení je v souladu se základními požadavky a ostatními příslušnými ustanoveními směrnic 2014/30/EU. Polski: Urządzenie jest zgodne z ogólnymi wymaganiami oraz szczególnymi warunkami określonymi Dyrektywą UE 2014/30/EU.
Declaration of Conformity We, Edimax Technology Co., Ltd., declare under our sole responsibility, that the equipment described below complies with the requirements of the European R&TTE directives. Equipment: Industrial Ethernet Switch Model No.: IGS-5416P The following European standards for essential requirements have been followed: Directives 2014/30/EU EMC : EN 55032:2012 / AC: 2013 CISPR 32: 2012 EN 61000-3-2:2014 EN 61000-3-3:2013 EN 55024:2010 + A1: 2015 Edimax Technology Europe B.V.
Notice According to GNU General Public License Version 2 This product includes software that is subject to the GNU General Public License version 2. The program is free software and distributed without any warranty of the author. We offer, valid for at least three years, to give you, for a charge no more than the costs of physically performing source distribution, a complete machine-readable copy of the corresponding source code.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.