User`s manual

Table of Contents
1. Introduction ...................................................................................................................................... 1-1
Overview ........................................................................................................................................... 1-2
Package Checklist ............................................................................................................................... 1-2
Features ............................................................................................................................................ 1-2
Recommended Software and Accessories ............................................................................................... 1-3
2. Getting Started ................................................................................................................................. 2-1
RS-232 Console Configuration (115200, None, 8, 1, VT100) .................................................................... 2-2
Configuration by Telnet Console ........................................................................................................... 2-4
Configuration by Web Browser ............................................................................................................. 2-5
Disabling Telnet and Browser Access ..................................................................................................... 2-6
3. Featured Functions ........................................................................................................................... 3-1
Overview ........................................................................................................................................... 3-2
Configuring Basic Settings ................................................................................................................... 3-2
System Identification ................................................................................................................... 3-2
Password ................................................................................................................................... 3-4
Accessible IP ............................................................................................................................... 3-5
Port ........................................................................................................................................... 3-5
Network ..................................................................................................................................... 3-7
Time .......................................................................................................................................... 3-8
IEEE 1588 PTP ............................................................................................................................ 3-9
How Does an Ethernet Switch Affect 1588 Synchronization? ............................................................. 3-9
System File UpdateBy Remote TFTP .......................................................................................... 3-11
System File UpdateBy Local Import/Export ................................................................................ 3-12
System File UpdateBy Backup Media ......................................................................................... 3-13
Restart..................................................................................................................................... 3-13
Factory Default ......................................................................................................................... 3-13
Using Port Trunking .......................................................................................................................... 3-14
The Port Trunking Concept ......................................................................................................... 3-14
Configuring Port Trunking ........................................................................................................... 3-15
Configuring SNMP ............................................................................................................................. 3-16
SNMP Read/Write Settings.......................................................................................................... 3-17
Trap Settings ............................................................................................................................ 3-18
Private MIB information.............................................................................................................. 3-19
Using Communication Redundancy ..................................................................................................... 3-19
Gigabit Ethernet Redundant Ring Capability (< 50 ms) .................................................................. 3-20
The Turbo Ring Concept ............................................................................................................. 3-20
Configuring “Turbo Ring” and “Turbo Ring V2” .............................................................................. 3-23
The Turbo Chain Concept ........................................................................................................... 3-27
Configuring “Turbo Chain” .......................................................................................................... 3-28
The STP/RSTP Concept .............................................................................................................. 3-30
Configuring STP/RSTP ................................................................................................................ 3-34
Using Traffic Prioritization .................................................................................................................. 3-36
The Traffic Prioritization Concept ................................................................................................. 3-36
Configuring Traffic Prioritization .................................................................................................. 3-38
Using Virtual LAN .............................................................................................................................. 3-41
The Virtual LAN (VLAN) Concept .................................................................................................. 3-41
Sample Applications of VLANs using the EDS-828 .......................................................................... 3-43
Configuring 802.1Q VLAN ........................................................................................................... 3-44
Using Multicast Filtering ..................................................................................................................... 3-45
The Concept of Multicast Filtering ................................................................................................ 3-45
Configuring IGMP Snooping ........................................................................................................ 3-48
Add Static Multicast MAC ............................................................................................................ 3-50
Configuring GMRP ..................................................................................................................... 3-50
Multicast Filtering Behavior ......................................................................................................... 3-51
Using Bandwidth Management ............................................................................................................ 3-52
Configuring Bandwidth Management ............................................................................................ 3-52
Using Port Access Control .................................................................................................................. 3-53
Configuring IEEE 802.1X ............................................................................................................ 3-55
Configuring Static Port Lock ........................................................................................................ 3-57
Using IP Filter .................................................................................................................................. 3-58
Using Auto Warning .......................................................................................................................... 3-58
Configuring Email Warning ......................................................................................................... 3-58
Email Alarm Events Settings ....................................................................................................... 3-59
Email Warning Event Settings ..................................................................................................... 3-60
Configuring Relay Warning ......................................................................................................... 3-61
Relay Alarm Event Settings ........................................................................................................ 3-62
Relay Alarm List ........................................................................................................................ 3-63