The naming of copyrighted trademarks in this manual, even when not specially indicated, should
not be taken to mean that these names may be considered as free in the sense of the trademark
and tradename protection law and hence that they may be freely used by anyone.
Manuals and software are protected by copyright. All rights reserved. The copying, reproduction,
translation, conversion into any electronic medium or machine scannable form is not permitted,
either in whole or in part. An exception is the preparation of a backup copy of the software for
your own use. For devices with embedded software, the end-user license agreement on the
enclosed CD applies.
The performance features described here are binding only if they have been expressly agreed
when the contract was made. This document was produced by Hirschmann Automation and
Control GmbH according to the best of the company's knowledge. Hirschmann reserves the right
to change the contents of this document without prior notice. Hirschmann can give no guarantee
in respect of the correctness or accuracy of the information in this document.
Hirschmann can accept no responsibility for damages, resulting from the use of the network
components or the associated operating software. In addition, we refer to the conditions of use
specified in the license contract.
You can get the latest version of this manual on the Internet at the Hirschmann product site
(www.beldensolutions.com).
Printed in Germany
Hirschmann Automation and Control GmbH
Stuttgarter Str. 45-51
72654 Neckartenzlingen
Germany
Tel.: +49 (0)1805 14-1538
Rel. 201112/2011 - 13.12.11
Page 3
Contents
Contents
About this Manual9
Key11
Introduction13
1Access to the user interfaces15
1.1System Monitor16
1.2Command Line Interface18
1.3Web-based Interface21
2Entering the IP Parameters25
2.1IP Parameter Basics27
2.1.1IP address (version 4)27
2.1.2Netmask28
2.1.3Classless Inter-Domain Routing31
2.2Entering IP parameters via CLI33
2.3Entering the IP Parameters via HiDiscovery36
2.4Loading the system configuration from the ACA39
2.5System configuration via BOOTP41
2.6System Configuration via DHCP46
2.7System Configuration via DHCP Option 8249
2.8Web-based IP Configuration50
2.9Faulty Device Replacement53
3Loading/saving settings55
3.1Loading settings56
3.1.1Loading from the local non-volatile memory57
3.1.2Loading from a file58
3.1.3Resetting the configuration to the state on delivery60
3.1.4Loading from the AutoConfiguration Adapter61
3.1.5Using the offline configurator62
3.2Saving settings64
UM Basic Configuration L3P
Release 7.1 12/2011
3
Page 4
Contents
3.2.1Saving locally (and on the ACA)64
3.2.2Saving in a binary file or a script file on a URL66
3.2.3Saving to a binary file on the PC67
3.2.4Saving as a script on the PC68
3.2.5Saving as an offline configuration file on the PC68
4Loading Software Updates69
4.1Loading the Software manually from the ACA71
4.1.1Selecting the software to be loaded72
4.1.2Starting the software74
4.1.3Performing a cold start74
4.2Automatic software update by ACA75
4.3Loading the software from the tftp server77
4.4Loading the Software via File Selection79
5Configuring the Ports81
6Assistance in the Protection from Unauthorized
Access87
6.1Protecting the device88
6.2Password for SNMP access89
6.2.1Description of password for SNMP access89
6.2.2Entering the password for SNMP access90
6.3Telnet/internet/SSH access94
6.4Restricted Management Access99
6.5HiDiscovery Access101
6.5.1Description of the HiDiscovery Protocol101
6.5.2Enabling/disabling the HiDiscovery function101
6.6Port access control102
6.6.1Description of the port access control102
6.6.2Application Example for Port Access Control103
6.7Port Authentication IEEE 802.1X106
6.7.1Description of Port Authentication according to
IEEE 802.1X106
6.7.2Authentication Process according to IEEE 802.1X107
6.7.3Preparing the Device for the
IEEE 802.1X Port Authentication107
6.7.4IEEE 802.1X Settings108
6.8Access Control Lists (ACL)109
UM Basic Configuration L3P
4
Release 7.1 12/2011
Page 5
Contents
6.8.1Description of prioritizing with ACLs110
6.8.2Description of IP-based ACLs111
6.8.3Description of MAC-based ACLs112
6.8.4Configuring IP ACLs114
6.8.5Configuring MAC ACLs116
6.8.6Configuring Priorities with IP ACLs117
6.8.7Specifying the Sequence of the Rules119
7Synchronizing the System Time in the Network121
7.1Entering the Time122
7.2SNTP125
7.2.1Description of SNTP125
7.2.2Preparing the SNTP Configuration126
7.2.3Configuring SNTP127
7.3Precision Time Protocol131
7.3.1Description of PTP Functions131
7.3.2Preparing the PTP Configuration137
7.3.3Application Example139
7.4Interaction of PTP and SNTP145
8Network Load Control147
8.1Direct Packet Distribution148
8.1.1Store-and-forward148
8.1.2Multi-Address Capability149
8.1.3Aging of Learned Addresses149
8.1.4Entering Static Addresses150
8.1.5Disabling the Direct Packet Distribution152
8.2Multicast Application153
8.2.1Description of the Multicast Application153
8.2.2Example of a Multicast Application154
8.2.3Description of IGMP Snooping155
8.2.4Setting IGMP Snooping156
8.2.5Description of GMRP162
8.2.6Setting GMRP 163
8.3Rate Limiter165
8.3.1Description of the Rate Limiter165
8.3.2Load limiter settings (PowerMICE and MACH 4000)166
8.3.3Load limiter settings166
8.4QoS/Priority168
8.4.1Description of Prioritization168
8.4.2VLAN tagging169
8.4.3IP ToS / DiffServ171
UM Basic Configuration L3P
Release 7.1 12/2011
5
Page 6
Contents
8.4.4Management prioritization174
8.4.5Handling of Received Priority Information175
8.4.6Handling of Traffic Classes175
8.4.7Setting prioritization 178
8.5Flow Control184
8.5.1Description of Flow Control184
8.5.2Setting the Flow Control186
8.6VLANs187
8.6.1VLAN Description187
8.6.2Examples of VLANs188
8.6.3Double VLAN Tagging203
9Operation Diagnosis209
9.1Sending Traps210
9.1.1List of SNMP traps211
9.1.2 SNMP Traps during Boot212
9.1.3Configuring Traps213
9.2Monitoring the Device Status215
9.2.1Configuring the Device Status216
9.2.2Displaying the Device Status217
9.3Out-of-band Signaling218
9.3.1Controlling the Signal Contact219
9.3.2Monitoring the Device Status via the Signal Contact219
9.3.3Monitoring the Device Functions via the Signal
Contact220
9.3.4Monitoring the Fan222
9.4Port Status Indication224
9.5Event Counter at Port Level226
9.5.1Detecting Non-matching Duplex Modes228
9.6Displaying the SFP Status231
9.7TP Cable Diagnosis232
9.8Topology Discovery233
9.8.1Description of Topology-Detection233
9.8.2Displaying the Topology Discovery Results235
9.9Detecting IP Address Conflicts236
9.9.1Description of IP Address Conflicts236
9.9.2Configuring ACD237
9.9.3Displaying ACD237
9.10Detecting Loops238
9.11Reports239
UM Basic Configuration L3P
6
Release 7.1 12/2011
Page 7
Contents
9.12Monitoring Data Traffic at Ports (Port Mirroring)241
9.13Syslog244
9.14Event Log247
10EtherNet/IP249
10.1Integration into a Control System251
10.2EtherNet/IP Parameters255
10.2.1 Identity Object255
10.2.2 TCP/IP Interface Object256
10.2.3 Ethernet Link Object258
10.2.4 Ethernet Switch Agent Object261
10.2.5 RSTP Bridge Object264
10.2.6 RSTP Port Object266
10.2.7 I/O Data268
10.2.8 Assignment of the Ethernet Link Object Instances269
10.2.9 Supported Services270
ASetting up the Configuration Environment271
A.1Setting up a DHCP/BOOTP Server272
A.2Setting up a DHCP Server with Option 82278
A.3TFTP Server for Software Updates282
A.3.1Setting up the tftp Process283
A.3.2Software Access Rights286
A.4Preparing access via SSH287
A.4.1Generating a key287
A.4.2Uploading the key289
A.4.3Access through an SSH290
BGeneral Information293
B.1Management Information Base (MIB)294
B.2Abbreviations used297
B.3Technical Data298
B.4Readers’ Comments299
CIndex301
DFurther Support305
UM Basic Configuration L3P
Release 7.1 12/2011
7
Page 8
Contents
UM Basic Configuration L3P
8
Release 7.1 12/2011
Page 9
About this Manual
About this Manual
The “Basic Configuration” user manual contains the information you need to
start operating the device. It takes you step by step from the first startup
operation through to the basic settings for operation in your environment.
The following thematic sequence has proven itself in practice:
Set up device access for operation by entering the IP parameters
Check the status of the software and update it if necessary
Load/store any existing configuration
Configure the ports
Set up protection from unauthorized access
Optimize the data transmission with network load control
Synchronize system time in the network
Perform an operation diagnosis
Store the newly created configuration in the non-volatile memory.
The “Installation” user manual contains a device description, safety
instructions, a description of the display, and the other information that you
need to install the device.
The “Redundancy Configuration User Manual” document contains the
information you require to select the suitable redundancy procedure and
configure it.
The “Industry Protocols” user manual describes how the device is connected
by means of a communication protocol commonly used in the industry, such
as EtherNet/IP and PROFINET IO.
UM Basic Configuration L3P
Release 7.1 12/2011
9
Page 10
About this Manual
The “Routing Configuration User Manual” document contains the information
you need to start operating the routing function. It takes you step-by-step
from a small router application through to the router configuration of a
complex network.
The manual enables you to configure your router by following the examples.
The “GUI” reference manual contains detailed information on using the
graphical interface to operate the individual functions of the device.
The “Command Line Interface” Reference Manual contains detailed
information on using the Command Line Interface to operate the individual
functions of the device.
The Industrial HiVision Network Management Software provides you with
additional options for smooth configuration and monitoring:
Simultaneous configuration of multiple devices
Graphic interface with network layout
Auto-topology discovery
Event log
Event handling
Client/server structure
Browser interface
ActiveX control for SCADA integration
SNMP/OPC gateway.
Maintenance
Hirschmann are continually working on improving and developing their
software. You should regularly check whether there is a new version of
the software that provides you with additional benefits. You will find
software information and downloads on the product pages of the
Hirschmann website.
10
UM Basic Configuration L3P
Release 7.1 12/2011
Page 11
Key
Key
The designations used in this manual have the following meanings:
List
Work step
LinkCross-reference with link
Note: A note emphasizes an important fact or draws your attention to a dependency.
Subheading
CourierASCII representation in user interface
Execution in the Graphical User Interface (Web-based Interface user interface)
Execution in the Command Line Interface user interface
Symbols used:
WLAN access point
Router with firewall
Switch with firewall
Router
Switch
UM Basic Configuration L3P
Release 7.1 12/2011
11
Page 12
Key
Bridge
Hub
A random computer
Configuration Computer
Server
PLC Programmable logic
controller
I/O Robot
12
UM Basic Configuration L3P
Release 7.1 12/2011
Page 13
Introduction
Introduction
The device has been developed for use in a harsh industrial environment.
Accordingly, the installation process has been kept simple. Thanks to the
selected default settings, you only have to enter a few settings before starting
to operate the device.
Note: The changes you make in the dialogs are copied into the volatile
memory of the device when you click on "Set".
To save the changes permanently, select the saving location in the Basic Settings :Load/Save dialog box and click on "Save".
UM Basic Configuration L3P
Release 7.1 12/2011
13
Page 14
Introduction
14
UM Basic Configuration L3P
Release 7.1 12/2011
Page 15
Access to the user interfaces
1Access to the user interfaces
The device has 3 user interfaces, which you can access via different
interfaces:
System monitor via the V.24 interface (out-of-band)
Command Line Interface (CLI) via the V.24 connection (out-of-band) as
well as Telnet or SSH (in-band)
Web-based interface via Ethernet (in-band).
UM Basic Configuration L3P
Release 7.1 12/2011
15
Page 16
Access to the user interfaces
1.1System Monitor
The system monitor enables you to
select the software to be loaded
perform a software update
start the selected software
shut down the system monitor
delete the configuration saved and
display the boot code information.
1.1 System Monitor
Opening the system monitor
Use the terminal cable (see accessories) to connect
–the V.24 socket (RJ11) to
–a terminal or a COM port of a PC with terminal emulation based on
VT100
(for the physical connection, see the "Installation" user manual).
Speed9,600 Baud
Data8 bit
ParityNone
Stopbit1 bit
HandshakeOff
Table 1: Data transfer parameters
Start the terminal program on the PC and set up a connection with the
device.
When you boot the device, the message
"Press <1> to enter System Monitor 1"
appears on the terminal.
16
UM Basic Configuration L3P
Release 7.1 12/2011
Page 17
Access to the user interfaces
< Device Name (Boot) Release: 1.00 Build: 2005-09-17 15:36 >
Press <1> to enter System Monitor 1 ...
1
1.1 System Monitor
Figure 1: Screen display during the boot process
Press the <1> key within one second to start system monitor 1.
System Monitor
(Selected OS: L3P-06.0.00 (2010-09-09 09:09))
1 Select Boot Operating System
2 Update Operating System
3 Start Selected Operating System
4 End (reset and reboot)
5 Erase main configuration file
sysMon1>
Figure 2: System monitor 1 screen display
Select a menu item by entering the number.
To leave a submenu and return to the main menu of system monitor 1,
press the <ESC> key.
UM Basic Configuration L3P
Release 7.1 12/2011
17
Page 18
Access to the user interfaces
1.2 Command Line Interface
1.2Command Line Interface
The Command Line Interface enables you to use the functions of the device
via a local or remote connection.
The Command Line Interface provides IT specialists with a familiar
environment for configuring IT devices.
The script compatibility of the Command Line Interface enables you, among
other things, to feed multiple devices with the same configuration data, to
create and use partial configurations, or to compare 2 configurations using 2
script files.
You will find a detailed description of the Command Line Interface in the
“Command Line Interface” reference manual.
You can access the Command Line Interface via
the V.24 port (out-of-band)
Telnet (in-band)
SSH (in-band)
Note: To facilitate making entries, CLI gives you the option of abbreviating
keywords. Type in the beginning of a keyword. When you press the tab key,
CLI completes the keyword.
18
UM Basic Configuration L3P
Release 7.1 12/2011
Page 19
Access to the user interfaces
1.2 Command Line Interface
Opening the Command Line Interface
Connect the device to a terminal or to a “COM” port of a PC using
terminal emulation based on VT100, and press any key (see on
page 16 “Opening the system monitor”) or
call up the Command Line Interface via Telnet.
A window for entering the user name appears on the screen.
Up to 5 users can access the Command Line Interface.
Copyright (c) 2004-2010 Hirschmann Automation and Control GmbH
All rights reserved
PowerMICE Release L3P-06.0.00
(Build date 2010-09-09 12:13)
System Name: PowerMICE
Mgmt-IP : 10.0.1.105
1.Router-IP: 0.0.0.0
Base-MAC : 00:80:63:51:74:00
System Time: 2010-09-09 13:14:15
User:
Figure 3: Logging in to the Command Line Interface program
Enter a user name. The default setting for the user name is admin .
Press the Enter key.
Enter the password. The default setting for the password is private .
Press the Enter key.
You can change the user name and the password later in the
Command Line Interface.
Please note that these entries are case-sensitive.
The start screen appears.
UM Basic Configuration L3P
Release 7.1 12/2011
19
Page 20
Access to the user interfaces
NOTE: Enter '?' for Command Help. Command help displays all options
that are valid for the 'normal' and 'no' command forms. For
the syntax of a particular command form, please consult the
documentation.
(Hirschmann Product) >
1.2 Command Line Interface
Figure 4: CLI screen after login
20
UM Basic Configuration L3P
Release 7.1 12/2011
Page 21
Access to the user interfaces
1.3 Web-based Interface
1.3Web-based Interface
The user-friendly Web-based interface gives you the option of operating the
device from any location in the network via a standard browser such as
Mozilla Firefox or Microsoft Internet Explorer.
As a universal access tool, the Web browser uses an applet which
communicates with the device via the Simple Network Management Protocol
(SNMP).
The Web-based interface allows you to graphically configure the device.
Opening the Web-based Interface
To open the Web-based interface, you need a Web browser (a program
that can read hypertext), for example Mozilla Firefox version 1 or later, or
Microsoft Internet Explorer version 6 or later.
Note: The Web-based interface uses Java software 6 (“Java™ Runtime
Environment Version 1.6.x”).
Install the software from the enclosed product CD. To do this, you go to
“Additional Software”, select Java Runtime Environment and click on
“Installation”.
UM Basic Configuration L3P
Release 7.1 12/2011
21
Page 22
Access to the user interfaces
Figure 5: Installing Java
1.3 Web-based Interface
Start your Web browser.
Make sure that you have activated JavaScript and Java in the security
settings of your browser.
Establish the connection by entering the IP address of the device
which you want to administer via the Web-based management in the
address field of the Web browser. Enter the address in the following
form:
http://xxx.xxx.xxx.xxx
The login window appears on the screen.
22
UM Basic Configuration L3P
Release 7.1 12/2011
Page 23
Access to the user interfaces
1.3 Web-based Interface
Figure 6: Login window
Select the desired language.
In the drop-down menu, you select
–user, to have read access, or
–admin, to have read and write access
to the device.
The password “public”, with which you have read access, appears in
the password field. If you wish to have write access to the device, then
highlight the contents of the password field and overwrite it with the
password “private” (default setting).
Click on OK.
The website of the device appears on the screen.
Note: The changes you make in the dialogs are copied to the device
when you click on “Write”. Click on “Load” to update the display.
UM Basic Configuration L3P
Release 7.1 12/2011
23
Page 24
Access to the user interfaces
1.3 Web-based Interface
Note: You can block your access to the device by entering an incorrect
configuration.
Activating the function “Cancel configuration change” in the “Load/Save”
dialog enables you to return automatically to the last configuration after a
set time period has elapsed. This gives you back your access to the
device.
24
UM Basic Configuration L3P
Release 7.1 12/2011
Page 25
Entering the IP Parameters
2Entering the IP Parameters
The IP parameters must be entered when the device is installed for the first
time.
The device provides 7 options for entering the IP parameters during the first
installation:
Entry using the Command Line Interface (CLI).
You choose this “out of band” method if
you preconfigure your device outside its operating environment
you do not have network access (“in-band”) to the device
(see page 33 “Entering IP parameters via CLI”).
Entry using the HiDiscovery protocol.
You choose this “in-band” method if the device is already installed in the
network or if you have another Ethernet connection between your PC and
the device
(see page 36 “Entering the IP Parameters via HiDiscovery”).
Configuration using the AutoConfiguration Adapter (ACA).
You choose this method if you are replacing a device with a device of the
same type and have already saved the configuration on an ACA (see
page 39 “Loading the system configuration from the ACA”).
Using BOOTP.
You choose this “in-band” method if you want to configure the installed
device using BOOTP. You need a BOOTP server for this. The BOOTP
server assigns the configuration data to the device using its MAC address
(see page 41 “System configuration via BOOTP”). Because the device is
delivered with “DHCP mode” as the entry for the configuration data
reference, you have to reset this to the BOOTP mode for this method.
Configuration via DHCP.
You choose this “in-band” method if you want to configure the installed
device using DHCP. You need a DHCP server for this. The DHCP server
assigns the configuration data to the device using its MAC address or its
system name (see page 46 “System Configuration via DHCP”).
UM Basic Configuration L3P
Release 7.1 12/2011
25
Page 26
Entering the IP Parameters
Configuration via DHCP Option 82.
You choose this “in-band” method if you want to configure the installed
device using DHCP Option 82. You need a DHCP server with Option 82
for this. The DHCP server assigns the configuration data to the device
using its physical connection (see page 49 “System Configuration via
DHCP Option 82”).
Configuration via the Web-based interface.
If the device already has an IP address and can be reached via the
network, then the Web-based interface provides you with another option
for configuring the IP parameters.
26
UM Basic Configuration L3P
Release 7.1 12/2011
Page 27
Entering the IP Parameters
2.1 IP Parameter Basics
2.1IP Parameter Basics
2.1.1IP address (version 4)
The IP addresses consist of 4 bytes. These 4 bytes are written in decimal
notation, separated by a decimal point.
Since 1992, five classes of IP address have been defined in the RFC 1340.
ClassNetwork
address
A1 byte3 bytes1.0.0.0 to 126.255.255.255
B2 bytes2 bytes128.0.0.0 to 191.255.255.255
C3 bytes1 byte192.0.0.0 to 223.255.255.255
D224.0.0.0 to 239.255.255.255
E240.0.0.0 to 255.255.255.255
Table 2: IP address classes
Host addressAddress range
The network address is the fixed part of the IP address. The worldwide
leading regulatory board for assigning network addresses is the IANA
(Internet Assigned Numbers Authority). If you require an IP address block,
contact your Internet service provider. Internet service providers should
contact their local higher-level organization:
APNIC (Asia Pacific Network Information Center) - Asia/Pacific Region
ARIN (American Registry for Internet Numbers) - Americas and Sub-
Sahara Africa
LACNIC (Regional Latin-American and Caribbean IP Address Registry) –
Latin America and some Caribbean Islands
RIPE NCC (Réseaux IP Européens) - Europe and Surrounding Regions
UM Basic Configuration L3P
Release 7.1 12/2011
27
Page 28
Entering the IP Parameters
Net ID - 7 bits Host ID - 24 bits0
I
I
I
0
I
III
0
III0
Net ID - 14 bits
Net ID - 21 bits
Multicast Group ID - 28 bits
reserved for future use - 28 b its
Class A
Class B
Host ID - 16 bits
Host ID - 8 bit s
Class C
Class D
Class E
2.1 IP Parameter Basics
Figure 7: Bit representation of the IP address
An IP address belongs to class A if its first bit is a zero, i.e. the first decimal
number is less than 128. The IP address belongs to class B if the first bit is a
one and the second bit is a zero, i.e. the first decimal number is between 128
and 191. The IP address belongs to class C if the first two bits are a one, i.e.
the first decimal number is higher than 191.
Assigning the host address (host id) is the responsibility of the network
operator. He alone is responsible for the uniqueness of the IP addresses he
assigns.
2.1.2Netmask
Routers and gateways subdivide large networks into subnetworks. The
netmask assigns the IP addresses of the individual devices to a particular
subnetwork.
The division into subnetworks with the aid of the netmask is performed in
much the same way as the division of the network addresses (net id) into
classes A to C.
The bits of the host address (host id) that represent the mask are set to one.
The remaining bits of the host address in the netmask are set to zero (see
the following examples).
28
UM Basic Configuration L3P
Release 7.1 12/2011
Page 29
Entering the IP Parameters
Example of a netmask:
Decimal notation
255.255.192.0
Binary notation
11111111.11111111.11000000.00000000
Subnetwork mask bits
Class B
2.1 IP Parameter Basics
Example of IP addresses with subnetwork assignment when the above
subnet mask is applied:
Decimal notation
129.218.65.17
128 < 129 191 › Class B
Binary notation
10000001.11011010.01000001.00010001
Subnetwork 1
Network address
Decimal notation
129.218.129.17
128 < 129 191 › Class B
Binary notation
10000001.11011010.10000001.00010001
Subnetwork 2
Network address
UM Basic Configuration L3P
Release 7.1 12/2011
29
Page 30
Entering the IP Parameters
Romeo
LAN 1
Lorenzo
LAN 2
Juliet
2.1 IP Parameter Basics
Example of how the network mask is used
In a large network it is possible that gateways and routers separate the
management agent from its management station. How does addressing
work in such a case?
Figure 8: Management agent that is separated from its management station by a
router
The management station "Romeo" wants to send data to the
management agent "Juliet". Romeo knows Juliet's IP address and also
knows that the router "Lorenzo" knows the way to Juliet.
Romeo therefore puts his message in an envelope and writes Juliet's IP
address as the destination address. For the source address he writes his
own IP address on the envelope.
Romeo then places this envelope in a second one with Lorenzo's MAC
address as the destination and his own MAC address as the source. This
process is comparable to going from layer 3 to layer 2 of the ISO/OSI base
reference model.
Finally, Romeo puts the entire data packet into the mailbox. This is
comparable to going from layer 2 to layer 1, i.e. to sending the data packet
over the Ethernet.
30
UM Basic Configuration L3P
Release 7.1 12/2011
Page 31
Entering the IP Parameters
2.1 IP Parameter Basics
Lorenzo receives the letter and removes the outer envelope. From the
inner envelope he recognizes that the letter is meant for Juliet. He places
the inner envelope in a new outer envelope and searches his address list
(the ARP table) for Juliet's MAC address. He writes her MAC address on
the outer envelope as the destination address and his own MAC address
as the source address. He then places the entire data packet in the mail
box.
Juliet receives the letter and removes the outer envelope. She finds the
inner envelope with Romeo's IP address. Opening the inner envelope and
reading its contents corresponds to transferring the message to the higher
protocol layers of the SO/OSI layer model.
Juliet would now like to send a reply to Romeo. She places her reply in an
envelope with Romeo's IP address as destination and her own IP address
as source. But where is she to send the answer? For she did not receive
Romeo's MAC address. It was lost when Lorenzo replaced the outer
envelope.
In the MIB, Juliet finds Lorenzo listed under the variable
hmNetGatewayIPAddr as a means of communicating with Romeo. She
therefore puts the envelope with the IP addresses in a further envelope
with Lorenzo's MAC destination address.
The letter now travels back to Romeo via Lorenzo, the same way the first
letter traveled from Romeo to Juliet.
2.1.3Classless Inter-Domain Routing
Class C with a maximum of 254 addresses was too small, and class B with
a maximum of 65,534 addresses was too large for most users. This resulted
in ineffective usage of the class B addresses available.
Class D contains reserved multicast addresses. Class E is reserved for
experimental purposes. A gateway not participating in these experiments
ignores datagrams with these destination addresses.
UM Basic Configuration L3P
Release 7.1 12/2011
31
Page 32
Entering the IP Parameters
IP address, decimal
149.218.112.1
149.218.112.127
CIDR notation: 149.218.112.0/25
Mask bits
Network mask,
decimal
255.255.255.128
IP address, hexadecimal
10010101 11011010 01110000 00000001
10010101 11011010 01110000 01111111
25 mask bits
2.1 IP Parameter Basics
Since 1993, RFC 1519 has been using Classless Inter-Domain Routing
(CIDR) to provide a solution. CIDR overcomes these class boundaries and
supports classless address ranges.
With CIDR, you enter the number of bits that designate the IP address range.
You represent the IP address range in binary form and count the mask bits
that designate the netmask. The netmask indicates the number of bits that
are identical to the network part for the IP addresses in a given address
range. Example:
The combination of a number of class C address ranges is known as
“supernetting”. This enables you to subdivide class B address ranges to a
very fine degree.
32
UM Basic Configuration L3P
Release 7.1 12/2011
Page 33
Entering the IP Parameters
Entering IP addresses
Connect the PC with terminal
program started to the RJ11 socket
Command Line Interface
starts after key press
Log in and change to the
Privileged EXEC Mode
Switch off DHCP,
enter and save IP parameters
End of entering IP addresses
2.2 Entering IP parameters via CLI
2.2Entering IP parameters via
CLI
If you do not configure the system via BOOTP/DHCP, DHCP Option 82, the
HiDiscovery protocol or the AutoConfiguration Adapter (ACA), then you
perform the configuration via the V.24 interface using the CLI.
Figure 9: Flow chart for entering IP addresses
UM Basic Configuration L3P
Release 7.1 12/2011
33
Page 34
Entering the IP Parameters
2.2 Entering IP parameters via CLI
Note: If there is no terminal or PC with terminal emulation available in the
vicinity of the installation location, you can configure the device at your own
workstation, then take it to its final installation location.
Set up a connection to the device (see on page 19 “Opening the
Command Line Interface”).
The start screen appears.
NOTE: Enter '?' for Command Help. Command help displays all options
that are valid for the 'normal' and 'no' command forms. For
the syntax of a particular command form, please consult the
documentation.
(Hirschmann PowerMICE) >
Deactivate DHCP.
Enter the IP parameters.
Local IP address
On delivery, the device has the local IP address 0.0.0.0.
Netmask
If your network has been divided up into subnetworks, and if these are
identified with a netmask, then the netmask is to be entered here.
The default setting of the netmask is 0.0.0.0.
IP address of the gateway
This entry is only required if the device and the management station or
tftp server are located in different subnetworks (see page 30
“Example of how the network mask is used”).
Enter the IP address of the gateway between the subnetwork with the
device and the path to the management station.
The default setting of the IP address is 0.0.0.0.
34
UM Basic Configuration L3P
Release 7.1 12/2011
Page 35
Entering the IP Parameters
2.2 Entering IP parameters via CLI
Save the configuration entered using
copy system:running-config nvram:startup-config.
enableSwitch to the privileged EXEC mode.
network protocol noneDeactivate DHCP.
network parms 10.0.1.23
255.255.255.0
copy system:running-config
nvram:startup-config
Assign the device the IP address 10.0.1.23 and
the netmask 255.255.255.0. You have the option
of also assigning a gateway address.
Save the current configuration to the non-volatile
memory.
After entering the IP parameters, you can easily configure the device via the
Web-based interface (see the “GUI” (Graphical User Interface / Web-based
Interface) reference manual).
UM Basic Configuration L3P
Release 7.1 12/2011
35
Page 36
Entering the IP Parameters
2.3 Entering the IP Parameters via
HiDiscovery
2.3Entering the IP Parameters
via HiDiscovery
The HiDiscovery protocol enables you to assign IP parameters to the device
via the Ethernet.
You can easily configure other parameters via the Web-based interface (see
the "GUI" (Graphical User Interface / Web-based Interface) reference
manual).
Install the HiDiscovery software on your PC. The software is on the CD
supplied with the device.
To install it, you start the installation program on the CD.
Start the HiDiscovery program.
Figure 10: HiDiscovery
36
UM Basic Configuration L3P
Release 7.1 12/2011
Page 37
Entering the IP Parameters
2.3 Entering the IP Parameters via
HiDiscovery
When HiDiscovery is started, HiDiscovery automatically searches the
network for those devices which support the HiDiscovery protocol.
HiDiscovery uses the first network interface found for the PC. If your
computer has several network cards, you can select the one you desire in the
HiDiscovery toolbar.
HiDiscovery displays a line for every device that reacts to the HiDiscovery
protocol.
HiDiscovery enables you to identify the devices displayed.
Select a device line.
Click on the signal symbol in the tool bar to set the LEDs for the selected
device flashing. To switch off the flashing, click on the symbol again.
By double-clicking a line, you open a window in which you can enter the
device name and the IP parameters.
Figure 11: HiDiscovery - assigning IP parameters
Note: When the IP address is entered, the device copies the local
configuration settings (see on page 55 “Loading/saving settings”).
Note: For security reasons, switch off the HiDiscovery function for the device
in the Web-based interface, after you have assigned the IP parameters to the
device (see on page 50 “Web-based IP Configuration”).
UM Basic Configuration L3P
Release 7.1 12/2011
37
Page 38
Entering the IP Parameters
2.3 Entering the IP Parameters via
HiDiscovery
Note: Save the settings so that you will still have the entries after a restart
(see on page 55 “Loading/saving settings”).
38
UM Basic Configuration L3P
Release 7.1 12/2011
Page 39
Entering the IP Parameters
2.4 Loading the system configuration
from the ACA
2.4Loading the system
configuration from the ACA
The AutoConfiguration Adapter (ACA) is a device for
for saving the device configuration data and
saving the device software.
If a device becomes inoperative, the ACA allows the configuration data to be
re-applied to a replacement device of the same type.
When the device is started, it checks to see whether a ACA is present. If an
ACA is present with a valid password and valid software, the device loads the
configuration data from the ACA.
The password is valid if
the entered password matches the password in the ACA, or
the preset password in the device is entered.
To save the configuration data in the ACA, see “Saving locally (and on the
ACA)” on page 64.
UM Basic Configuration L3P
Release 7.1 12/2011
39
Page 40
Entering the IP Parameters
2
1
4
0
3
1
0
3a
1
0
5
4a
1
2.4 Loading the system configuration
from the ACA
Figure 12: Flow chart of loading configuration data from the ACA
1 – Device start-up
2 – ACA plugged-in?
3 – Password in device and ACA identical?
3a – Default password in device?
4 – Load configuration from ACA,
ACA LEDs flashing synchronously
4a –Load configuration from local memory,
ACA LEDs flashing alternately
5 – Configuration data loaded
40
UM Basic Configuration L3P
Release 7.1 12/2011
Page 41
Entering the IP Parameters
2.5 System configuration via BOOTP
2.5System configuration via
BOOTP
When it is started up via BOOTP (bootstrap protocol), a device receives its
configuration data in accordance with the “BOOTP process” flow chart (see
fig. 13).
Note: In its delivery state, the device gets its configuration data from the
DHCP server.
Activate BOOTP to receive the configuration data (see on page 50 “Web-
based IP Configuration”), or see the CLI:
enableSwitch to the privileged EXEC mode.
network protocol bootpActivate BOOTP.
copy system:running-config
nvram:startup-config
yConfirm save.
Activate BOOTP.
Provide the BOOTP server with the following data for a device:
# /etc/bootptab for BOOTP-daemon bootpd
#
# gw -- gateway
# ha -- hardware address
# ht -- hardware type
# ip -- IP address
# sm -- subnet mask
# tc -- template
Lines that start with a ‘#’ character are comment lines.
The lines under “.global:” make the configuration of several devices easier.
With the template (tc) you allocate the global configuration data (tc=.global:)
to each device .
The direct allocation of hardware address and IP address is performed in the
device lines (switch-0...).
Enter one line for each device.
After ha= enter the hardware address of the device.
After ip= enter the IP address of the device.
In the appendix under “Setting up a DHCP/BOOTP Server” on page 272, you
will find an example for the configuration of a BOOTP/DHCP server.
42
UM Basic Configuration L3P
Release 7.1 12/2011
Page 43
Entering the IP Parameters
2
DHCP
or
BOOTP?
Send
DHCP/
BOOTP
Requests
Reply from
DHCP/BOOTP
server?
Ye s
Ye s
Save IP parameter
and config file URL
locally
initialize IP stack
with IP parameters
No
No*
1
Start-up
Device in initalization
Device runs with
settings from
local flash
Device is manageable
Load default
configuration
2.5 System configuration via BOOTP
Figure 13: Flow chart for the BOOTP/DHCP process, part 1
* see fig. 14
UM Basic Configuration L3P
Release 7.1 12/2011
43
Page 44
Entering the IP Parameters
Load transferred
config file
No
Yes
Load remote
configuration from
URL of DHCP?
No*
Yes
Start tftp process
with config
file URL of DHCP
tftp
successful?
Save transferred
config file local
and set
boot configuration
to local
2
Loading of
configurations data
is complete
2.5 System configuration via BOOTP
Figure 14: Flow chart for the BOOTP/DHCP process, part 2
44
UM Basic Configuration L3P
Release 7.1 12/2011
Page 45
Entering the IP Parameters
2.5 System configuration via BOOTP
Note: The loading process started by DHCP/BOOTP (see on page 41
“System configuration via BOOTP”) shows the selection of “from URL & save
locally” in the “Load” frame. If you get an error message when saving a
configuration, this could be due to an active loading process. DHCP/BOOTP
only finishes a loading process when a valid configuration has been loaded.
If DHCP/BOOTP does not find a valid configuration, then finish the loading
process by loading the local configuration in the “Load” frame.
UM Basic Configuration L3P
Release 7.1 12/2011
45
Page 46
Entering the IP Parameters
2.6 System Configuration via DHCP
2.6System Configuration via
DHCP
The DHCP (Dynamic Host Configuration Protocol) is a further development
of BOOTP, which it has replaced. The DHCP additionally allows the
configuration of a DHCP client via a name instead of via the MAC address.
For the DHCP, this name is known as the “client identifier” in accordance with
RFC 2131.
The device uses the name entered under sysName in the system group of
the MIB II as the client identifier. You can enter this system name directly via
SNMP, the Web-based management (see system dialog), or the Command
Line Interface.
During startup operation, a device receives its configuration data according
to the “DHCP process” flowchart (see fig. 13).
The device sends its system name to the DHCP server. The DHCP server
can then use the system name to allocate an IP address as an alternative to
the MAC address.
In addition to the IP address, the DHCP server sends
–the netmask
–the default gateway (if available)
–the tftp URL of the configuration file (if available).
The device accepts this data as configuration parameters (see on page 50
“Web-based IP Configuration”).
If an IP address was assigned by a DHCP server, it will be permanently
saved locally.
46
UM Basic Configuration L3P
Release 7.1 12/2011
Page 47
Entering the IP Parameters
Option Meaning
1Subnet Mask
2Time Offset
3Router
4Time server
12Host Name
42NTP server
61Client Identifier
66TFTP Server Name
67Bootfile Name
Table 3: DHCP options which the device requests
2.6 System Configuration via DHCP
The advantage of using DHCP instead of BOOTP is that the DHCP server
can restrict the validity of the configuration parameters (“Lease”) to a specific
time period (known as dynamic address allocation). Before this period
(“Lease Duration”) elapses, the DHCP client can attempt to renew this lease.
Alternatively, the client can negotiate a new lease. The DHCP server then
allocates a random free address.
To avoid this, most DHCP servers provide the explicit configuration option of
always assigning a specific client the same IP address based on a unique
hardware ID (known as static address allocation).
On delivery, DHCP is activated.
As long as DHCP is activated, the device attempts to obtain an IP address.
If it cannot find a DHCP server after restarting, it will not have an IP address.
To activate/deactivate DHCP (see on page 50 “Web-based IP
Configuration”).
Note: When using HiVision network management, ensure that DHCP always
allocates the original IP address to each device.
The appendix contains an example configuration of the BOOTP/DHCPserver (see on page 272 “Setting up a DHCP/BOOTP Server”).
UM Basic Configuration L3P
Release 7.1 12/2011
47
Page 48
Entering the IP Parameters
2.6 System Configuration via DHCP
Example of a DHCP-configuration file:
# /etc/dhcpd.conf for DHCP Daemon
#
subnet 10.1.112.0 netmask 255.255.240.0 {
option subnet-mask 255.255.240.0;
option routers 10.1.112.96;
}
#
# Host berta requests IP configuration
# with her MAC address
#
host berta {
hardware ethernet 00:80:63:08:65:42;
fixed-address 10.1.112.82;
}
#
# Host hugo requests IP configuration
# with his client identifier.
#
host hugo {
#
option dhcp-client-identifier "hugo";
option dhcp-client-identifier 00:68:75:67:6f;
fixed-address 10.1.112.83;
server-name "10.1.112.11";
filename "/agent/config.dat";
}
Lines that begin with the #-character contain comments.
The lines that precede the individual devices indicate settings that apply to
the following device.
The fixed-address line assigns a fixed IP address to the device.
Please refer to your DHCP-Server manual for more details.
48
UM Basic Configuration L3P
Release 7.1 12/2011
Page 49
Entering the IP Parameters
PLC
Switch (Option 82)
IP =
10.0.1.100
IP =
10.0.1.100
MAC Address =
00:80:63:10:9a:d7
DHCP Server
IP =
10.0.1.1
Backbone Switch
2.7 System Configuration via DHCP
Option 82
2.7System Configuration via
DHCP Option 82
As with the classic DHCP, on startup an agent receives its configuration data
according to the “BOOTP/DHCP process” flow chart (see fig. 13).
While the system configuration is based on the classic DHCP protocol on the
device being configured (see on page 46 “System Configuration via DHCP”),
Option 82 is based on the network topology. This procedure gives you the
option of assigning the same IP address to any device which is connected to
a particular location (port of a device) on the LAN.
The installation of a DHCP server is described in the chapter “Setting up a
DHCP Server with Option 82” on page 278.
Figure 15: Application example of using Option 82
UM Basic Configuration L3P
Release 7.1 12/2011
49
Page 50
Entering the IP Parameters
2.8 Web-based IP Configuration
2.8Web-based IP Configuration
Use the Basic Settings:Network dialog to define the source from which
the device receives its IP parameters after startup, assign the IP parameters
and VLAN ID, and configure the HiDiscovery access.
50
UM Basic Configuration L3P
Release 7.1 12/2011
Page 51
Entering the IP Parameters
2.8 Web-based IP Configuration
Figure 16: Network parameters dialog
Under “Mode”, you enter where the device gets its IP parameters:
In the BOOTP mode, the configuration is via a BOOTP or DHCP
server on the basis of the MAC address of the device (see page 272
“Setting up a DHCP/BOOTP Server”).
In the DHCP mode, the configuration is via a DHCP server on the
basis of the MAC address or the name of the device (see page 278
“Setting up a DHCP Server with Option 82”).
In the “local” mode the net parameters in the device memory are used.
Enter the parameters on the right according to the selected mode.
You enter the name applicable to the DHCP protocol in the “Name” line in
the system dialog of the Web-based interface.
UM Basic Configuration L3P
Release 7.1 12/2011
51
Page 52
Entering the IP Parameters
2.8 Web-based IP Configuration
The “VLAN” frame enables you to assign a VLAN to the management
CPU of the device. If you enter 0 here as the VLAN ID (not included in the
VLAN standard version), the management CPU will then be accessible
from all VLANs.
The HiDiscovery protocol allows you to allocate an IP address to the
device on the basis of its MAC address. Activate the HiDiscovery protocol
if you want to allocate an IP address to the device from your PC with the
enclosed HiDiscovery software (state on delivery: operation “on”, access
“read-write”).
Note: Save the settings so that you will still have the entries after a restart
(see on page 55 “Loading/saving settings”).
52
UM Basic Configuration L3P
Release 7.1 12/2011
Page 53
Entering the IP Parameters
2.9 Faulty Device Replacement
2.9Faulty Device R eplacement
The device provides 2 plug-and-play solutions for replacing a faulty device
with a device of the same type (faulty device replacement):
Configuring the new device using an AutoConfiguration Adapter (see on
page 39 “Loading the system configuration from the ACA”) or
configuration via DHCP Option 82 (see on page 278 “Setting up a DHCP
Server with Option 82”)
In both cases, when the new device is started, it is given the same
configuration data that the replaced device had.
Note: If you are replacing a device with DIP switches, check the DIP switch
settings to ensure they are the same.
Note: If you want to access the device via SSH, you also need an SSH key.
To transfer the SSH key of the old device to the new one, you have the
following options:
- If you have already created the key and saved it outside the device (e.g. on
your administration workstation), load the saved key onto the new device
(see on page 289 “Uploading the key”).
- Otherwise create a new SSH key and load it onto the new device (see on
page 287 “Preparing access via SSH”). Note that the new device now
identifies itself by means of another key.
UM Basic Configuration L3P
Release 7.1 12/2011
53
Page 54
Entering the IP Parameters
2.9 Faulty Device Replacement
54
UM Basic Configuration L3P
Release 7.1 12/2011
Page 55
Loading/saving settings
3Loading/saving settings
The device saves settings such as the IP parameters and the port
configuration in the temporary memory. These settings are lost when you
switch off or reboot the device.
The device allows you to do the following:
Load settings from a non-volatile memory into the temporary memory
Save settings from the temporary memory in a non-volatile memory
If you change the current configuration (for example, by switching a port off),
the Web-based interface changes the “load/save” symbol in the navigation
tree from a disk symbol to a yellow triangle. After saving the configuration,
the Web-based interface displays the “load/save” symbol as a disk again.
UM Basic Configuration L3P
Release 7.1 12/2011
55
Page 56
Loading/saving settings
3.1 Loading settings
3.1Loading settings
When it is restarted, the device loads its configuration data from the local
non-volatile memory. The prerequisites for this are:
You have not connected an AutoConfiguration Adapter (ACA) and
the IP configuration is “local”.
During a restart, the device also allows you to load settings from the following
sources:
a binary file of the AutoConfiguration Adapter. If an ACA is connected to
the device, the device automatically loads its configuration from the ACA
during the boot procedure.
from a script file of the AutoConfiguration Adapter. If an ACA is connected
to the device, the device automatically loads its configuration from the
script file of the ACA during the boot procedure (see on page 61 “Loading
a script from the ACA”).
Note: Details of times required for a reboot:
The time required for a cold start is the time taken by the device from the
moment power is switched on until it is fully connected and its
Management-CPU is fully accessible.
Depending on the device type and the extent of the configuration settings,
a cold start takes at least about 10 seconds.
Extensive configuration settings will increase the time required for a
reboot, especially if they contain a high number of VLANs. In extreme
cases, a reboot can take up to about 200 seconds.
A warm start is quicker, since in this case the device skips the software
loading from NVRAM.
56
UM Basic Configuration L3P
Release 7.1 12/2011
Page 57
Loading/saving settings
3.1 Loading settings
During operation, the device allows you to load settings from the following
sources:
the local non-volatile memory
a file in the connected network (setting on delivery)
a binary file or an editable and readable script on the PC and
the firmware (restoration of the configuration on delivery).
Note: When loading a configuration, hold off any accesses to the device until
it has loaded the configuration file and applied the new configuration settings.
Depending on the device type and the extent of the configuration settings,
this process can take between 10 and 200 seconds.
3.1.1Loading from the local non-volatile memory
When loading the configuration data locally, the device loads the
configuration data from the local non-volatile memory if no ACA is connected
to the device.
Select the
Basics: Load/Save dialog.
In the “Load” frame, click “from Device”.
Click “Restore”.
enableSwitch to the privileged EXEC mode.
copy nvram:startup-config
system:running-config
The device loads the configuration data from the
local non-volatile memory.
UM Basic Configuration L3P
Release 7.1 12/2011
57
Page 58
Loading/saving settings
3.1 Loading settings
3.1.2Loading from a file
The device allows you to load the configuration data from a file in the
connected network if there is no AutoConfiguration Adapter connected to the
device.
Select the
Basics: Load/Save dialog.
In the “Load” frame, click
“from URL” if you want the device to load the configuration data from a file and
retain the locally saved configuration.
“from URL & save to Switch” if you want the device to load the configuration data
from a file and save this configuration locally.
“via PC” if you want the device to load the configuration data from a file on the PC
and retain the locally saved configuration.
In the “URL” frame, enter the path under which the device will find
the configuration file, if you want to load from the URL.
Click “Restore”.
Note: When restoring a configuration using one of the options in the
“Load” frame, note the following particulars:
The device can restore the configuration from a binary or script file:
–The option “from Device” restores the configuration exclusively from the device-
internal binary file.
–The 3 options “from URL”, “from URL and save to Device” or “via PC” can restore
the configuration both from a binary file and from a script file. The script file can
be an offline configuration file (*.ocf) or a CLI script file (*.cli). The device
determines the file type automatically.
When restoring the configuration from a script file, you first delete
the device configuration so that the default settings are overwritten
correctly. For further information (see on page 60 “Resetting the
configuration to the state on delivery”)
The URL identifies the path to the tftp server from which the device
loads the configuration file. The URL is in the format
tftp://IP address of the tftp server/path name/file name
(e.g. tftp://10.1.112.5/switch/config.dat).
58
UM Basic Configuration L3P
Release 7.1 12/2011
Page 59
Loading/saving settings
3.1 Loading settings
Example of loading from a tftp server
Before downloading a file from the tftp server, you have to save the
configuration file in the corresponding path of the tftp servers with
the file name, e.g. switch/switch_01.cfg (see on page 66
“Saving in a binary file or a script file on a URL”).
In the “URL” line, enter the path of the tftp server, e.g. tftp://
10.1.112.214/switch/switch_01.cfg.
Figure 17: Load/Save dialog
enableSwitch to the privileged EXEC mode.
copy tftp://10.1.112.159/
switch/config.dat
nvram:startup-config
UM Basic Configuration L3P
Release 7.1 12/2011
The device loads the configuration data from a
tftp server in the connected network.
59
Page 60
Loading/saving settings
3.1 Loading settings
Note: The loading process started by DHCP/BOOTP (see on page 41
“System configuration via BOOTP”) shows the selection of “from URL & save
locally” in the “Load” frame. If you get an error message when saving a
configuration, this could be due to an active loading process. DHCP/BOOTP
only finishes a loading process when a valid configuration has been loaded.
If DHCP/BOOTP does not find a valid configuration, then finish the loading
process by loading the local configuration in the “Load” frame.
3.1.3Resetting the configuration to the state on
delivery
The device enables you to
reset the current configuration to the state on delivery. The locally saved
configuration is kept.
reset the device to the state on delivery. After the next restart, the IP
address is also in the state on delivery.
Select the
Basics: Load/Save dialog.
Make your selection in the "Delete" frame.
Click "Delete configuration". The device will delete its configuration
immediately.
Setting in the system monitor
Select 5 “Erase main configuration file”
This menu item allows you to reset the device to its state on delivery. The
device saves configurations other than the original one in its Flash
memory in the configuration file *.cfg.
Press the Enter key to delete the configuration file.
UM Basic Configuration L3P
60
Release 7.1 12/2011
Page 61
Loading/saving settings
3.1 Loading settings
3.1.4Loading from the AutoConfiguration Adapter
Loading a configuration during the boot procedure
If you have connected an ACA to the device, the device automatically
loads its configuration from the ACA during the boot procedure. After the
loading, the device updates its configuration in the local non-volatile
memory with the configuration from the ACA.
Note: During the boot procedure, the configuration on the ACA has
priority over the configuration in the local non-volatile memory.
The chapter “Saving locally (and on the ACA)” on page 64 describes how
you can save a configuration file on an ACA.
Loading a script from the ACA
If the ACA contains a script file, the device automatically loads its
configuration from the script file on the ACA during the boot procedure.
The prerequisites for this are:
The ACA is connected during the boot procedure.
There is no binary configuration in the main directory of the ACA.
The main directory of the ACA contains a file with the name
“autoupdate.txt”.
The file “autoupdate.txt” is a text file and contains a line whose content
has the format script=<file_name>. Here <file_name> stands
for the name of the script file to be loaded, e.g. custom.cli.
The file specified using script=<file_name>, e.g. custom.cli, is
located in the main directory of the ACA and is a valid script file.
If the local non-volatile memory of the device contains a configuration, the
device ignores this.
After applying the script, the device updates the configuration in the local
non-volatile memory with the configuration from the script.
In the process, it also writes the current binary configuration to the ACA.
Note: During the boot procedure, a binary configuration on the ACA has
priority over a script on the ACA.
The chapter “Saving as a script on the PC” on page 68 describes how you
can save a script file on an ACA.
UM Basic Configuration L3P
Release 7.1 12/2011
61
Page 62
Loading/saving settings
3.1 Loading settings
Reporting configuration differences
The device allows you to trigger the following events when the
configuration stored on the ACA does not match the configuration on the
device:
send an alarm (trap) (see on page 213 “Configuring Traps”),
update the device status (see on page 216 “Configuring the Device
Status”),
update the status of the signal contacts (see on page 219 “Controlling
the Signal Contact”).
3.1.5Using the offline configurator
The offline configurator allows you to create configurations for devices in
advance. You create the configuration virtually on your PC and load it onto
your device in a 2nd step.
In this way you can prepare and manage the device configuration efficiently,
thus saving time and effort both when creating the configuration and loading
it to the devices.
For more details on using the offline configurator, see the chapter “Loading
a configuration from the offline configurator” in the “GUI Reference Manual”
(Graphical User Interface / Web-based Interface) document.
Example of using the offline configurator
An IT employee already creates the configuration files for the devices of
a production cell during the planning phase. In doing so, he uses existing
configuration files for a similar production cell and modifies these.
He makes the offline configuration files available to the field service
employee, who mounts the devices on site and then loads the
configuration to the devices. All that is required for this is for the devices
to be reachable and have received an IP address, e.g. via HiDiscovery.
62
UM Basic Configuration L3P
Release 7.1 12/2011
Page 63
Loading/saving settings
3.1 Loading settings
Data format
The offline configurator reads and writes configuration data in an XMLbased format. The file name extension of these files is “.ocf” (Offline
Configurator Format).
You can use the Web-based interface of the devices to load these files
and thus configure your devices very quickly.
The XML format also allows you to use other tools to create, edit and
manage the offline configuration files and thus optimize your
administration processes.
Installation and operating requirements
A requirement for the installation is a PC with a Windows™ XP operating
system (with Service Pack 3) or higher.
You install the offline configurator from the product CD included with the
device. To do so, start the “Setup.exe” installation file from the “ocf_setup”
folder.
The offline configurator - like the Web-based interface - uses Java
software 6 (“Java™ Runtime Environment (JRE) Version 1.6.x”).
If required, you can install it from the product CD. To do this, you go to
“Additional Software”, select Java Runtime Environment and click on
“Installation”.
Using the offline configurator
Start the offline configurator by double-clicking the “Offline Management”
desktop symbol.
For more details on using the offline configurator, see the chapter
“Loading a configuration from the offline configurator” in the “GUI
Reference Manual” (Graphical User Interface / Web-based Interface)
document.
UM Basic Configuration L3P
Release 7.1 12/2011
63
Page 64
Loading/saving settings
3.2 Saving settings
3.2Saving settings
In the “Save” frame, you have the option to
save the current configuration on the device,
save the current configuration in binary form in a file under the specified
URL, or as an editable and readable script,
save the current configuration in binary form or as an editable and
readable CLI script on the PC,
save the current configuration for the offline configurator on the PC in
XML format.
3.2.1Saving locally (and on the ACA)
The device allows you to save the current configuration data in the local nonvolatile memory and in the ACA.
Select the
Basics: Load/Save dialog.
In the "Load" options, click on "From device".
Click on "Save".
The device saves the current configuration data in the local nonvolatile memory and also, if a ACA is connected, in the ACA.
enableSwitch to the privileged EXEC mode.
copy system:running-config
nvram:startup-config
The device saves the current configuration data
in the local non-volatile memory and also, if a
ACA is connected, in the ACA
64
UM Basic Configuration L3P
Release 7.1 12/2011
Page 65
Loading/saving settings
3.2 Saving settings
Note: After you have successfully saved the configuration on the device, the
device sends an alarm (trap) hmConfigurationSavedTrap together with
the information about the AutoConfiguration Adapter (ACA), if one is
connected. When you change the configuration for the first time after saving
it, the device sends a trap hmConfigurationChangedTrap.
Note: The device allows you to trigger the following events when the
configuration stored on the ACA does not match the configuration on the
device:
send an alarm (trap) (see on page 213 “Configuring Traps”),
update the device status (see on page 216 “Configuring the Device
Status”),
update the status of the signal contacts (see on page 219 “Controlling the
Signal Contact”).
Skip ACA21 during the boot phase
The device allows you to skip the ACA21 AutoConfiguration Adapter (if
connected) during the boot phase. In this case, the device ignores the
ACA21 during the boot phase. This shortens the boot phase of the device
by 1 to 4 seconds. If you have enabled this function, ACA21-functionality
becomes available as usual after the boot phase. The device simply skips
the ACA21-loading procedures during the boot phase.
enableSwitch to Privileged EXEC mode.
configureSwitch to Global Configure mode.
#boot skip-aca-on-boot
enable
#boot skip-aca-on-boot
disable
#show boot skip-aca-
on-boot
Skip ACA21 during the boot phase. (Disabled in the asdelivered state).
Include the ACA21 during the boot phase.
Show whether the "Skip ACA21 during boot phase"
function is enabled.
UM Basic Configuration L3P
Release 7.1 12/2011
65
Page 66
Loading/saving settings
3.2 Saving settings
3.2.2Saving in a binary file or a script file on a
URL
The device allows you to save the current configuration data in a file in the
connected network.
Note: The configuration file includes all configuration data, including the
password. Therefore pay attention to the access rights on the tftp server.
Select the
Basics: Load/Save dialog.
In the “Save” frame, choose “to URL (binary)”
to create a binary file, or “to URL (script)”
to create an editable and readable script file.
In the “URL” frame, enter the path under which you want the device
to save the configuration file.
The URL identifies the path to the tftp server on which the device saves
the configuration file. The URL is in the format
tftp://IP address of the tftp server/path name/file name
(e.g. tftp://10.1.112.5/switch/config.dat).
Click "Save".
enableSwitch to the privileged EXEC mode.
copy nvram:startup-config
The device saves the configuration data in a
binary file on a tftp server in the connected
network
The device saves the configuration data in a
script file on a tftp server in the connected
network.
66
UM Basic Configuration L3P
Release 7.1 12/2011
Page 67
Loading/saving settings
3.2 Saving settings
Note: If you save the configuration in a binary file, the device saves all
configuration settings in a binary file.
In contrast to this, the device only saves those configuration settings that
deviate from the default setting when saving to a script file.
When loading script files, these are only intended for overwriting the default
setting of the configuration.
3.2.3Saving to a binary file on the PC
The device allows you to save the current configuration data in a binary file
on your PC.
Select the
Basics: Load/Save dialog.
In the "Save" frame, click "on the PC (binary)".
In the save dialog, enter the name of the file in which you want the
device to save the configuration file.
Click "Save".
UM Basic Configuration L3P
Release 7.1 12/2011
67
Page 68
Loading/saving settings
3.2 Saving settings
3.2.4Saving as a script on the PC
The device allows you to save the current configuration data in an editable
and readable file on your PC.
Select the
Basics: Load/Save dialog.
In the “Save” frame, click “to PC (script)”.
In the save dialog, enter the name of the file in which you want the
device to save the configuration file.
Click "Save".
3.2.5Saving as an offline configuration file on the
PC
The device allows you to save the current configuration data for the offline
configurator in XML form in a file on your PC.
Select the
Basics: Load/Save dialog.
In the “Save” frame, click “to PC (ocf)”.
In the save dialog, enter the name of the file in which you want the
device to save the configuration file.
Click "Save".
68
UM Basic Configuration L3P
Release 7.1 12/2011
Page 69
Loading Software Updates
4Loading Software Updates
Hirschmann is working constantly to improve the performance of their
products. Therefore, on the Hirschmann web page (www.hirschmann-ac.de)
you may find a newer release of the device software than the one installed
on your device.
Checking the installed Software Release
Open the Basic Settings:Software dialog.
This dialog indicates the Release Number of the software installed
in the device.
enableSwitch to Privileged EXEC mode.
show sysinfoShow system information.
Alarm...................................... None
System Description......................... Hirschmann Railswitch
System Name................................ RS-1F1054
System Location............................ Hirschmann Railswitch
System Contact............................. Hirschmann Automation
and Control GmbH
System Up Time............................. 0 days 0 hrs 45 mins
57 secs
System Date and Time (local time zone)..... 2009-11-12 14:15:16
System IP Address.......................... 10.0.1.13
Serial Number.............................. 943434023000001191
Base MAC Address........................... 00:80:63:1F:10:54
Number of MAC Addresses.................... 32 (0x20)
UM Basic Configuration L3P
Release 7.1 12/2011
69
Page 70
Loading Software Updates
Loading the software
The device gives you 4 options for loading the software:
manually from the ACA (out-of-band),
manually from the ACA (out-of-band),
via TFTP from a tftp server (in-band) and
via a file selection dialog from your PC.
Note: The existing configuration of the device is still there after the new
software is installed.
70
UM Basic Configuration L3P
Release 7.1 12/2011
Page 71
Loading Software Updates
4.1 Loading the Software manually
from the ACA
4.1Loading the Software
manually from the ACA
You can connect the AutoConfiguration Adapter (ACA) to a USB port of your
PC like a conventional USB stick and copy the device software into the main
directory of the ACA.
Copy the device software from your computer to the ACA.
Now connect the ACA to the device‘s USB port.
Open the system monitor (see page 16 “Opening the system monitor”).
Select 2 and press the Enter key to copy the software from the ACA into
the local memory of the device.
At the end of the update, the system monitor asks you to press any key to
continue.
Select 3 to start the new software on the device.
The system monitor offers you additional options in connection with the
software on your device:
selecting the software to be loaded
starting the software
performing a cold start
UM Basic Configuration L3P
Release 7.1 12/2011
71
Page 72
Loading Software Updates
4.1 Loading the Software manually
from the ACA
4.1.1Selecting the software to be loaded
In this menu item of the system monitor, you select one of two possible
software releases that you want to load.
The following window appears on the screen:
1 Swap OS images
2 Copy image to backup
3 Test stored images in Flash mem.
4 Test stored images in USB mem.
5 Apply and store selection
6 Cancel selection
Figure 18: Update operating system screen display
72
UM Basic Configuration L3P
Release 7.1 12/2011
Page 73
Loading Software Updates
4.1 Loading the Software manually
from the ACA
Swap OS images
The memory of the device provides space for two images of the software.
This allows you, for example, to load a new version of the software without
deleting the existing version.
Select 1 to load the other software in the next booting process.
Copy image to backup
Select 2 to save a copy of the active software.
Test stored images in flash memory
Select 3 to check whether the images of the software stored in the
flash memory contain valid codes.
Test stored images in USB memory
Select 4 to check whether the images of the software stored in the
ACA contain valid codes.
Apply and store selection
Select 5 to confirm the software selection and to save it.
Cancel selection
Select 6 to leave this dialog without making any changes.
UM Basic Configuration L3P
Release 7.1 12/2011
73
Page 74
Loading Software Updates
4.1 Loading the Software manually
from the ACA
4.1.2Starting the software
This menu item (Start Selected Operating System) of the system monitor
allows you to start the software selected.
4.1.3Performing a cold start
This menu item (End (reset and reboot)) of the system monitor allows you to
reset the hardware of the device and perform a restart.
74
UM Basic Configuration L3P
Release 7.1 12/2011
Page 75
Loading Software Updates
4.2 Automatic software update by
ACA
4.2Automatic software update
by ACA
For a software update via the ACA, first copy the new device software into
the main directory of the AutoConfiguration Adapter. If the version of the
software on the ACA is newer or older than the version on the device, the
device performs a software update.
Note: Software versions with release 06.0.00 and higher in the nonvolatile memory of the device support the software update via the ACA. If
the device software is older, you have the option of loading the software
manually from the ACA (see page 71).
Give the file the name that matches the device type and the software
variant, e.g. rsL2P.bin for device type RS2 with the software variant L2P.
Please note the case-sensitivity here.
If you have copied the software from a product CD or from a Web server
of the manufacturer, the software already has the correct file name.
Also create an empty file with the name “autoupdate.txt” in the main
directory of the ACA. Please note the case-sensitivity here.
Connect the AutoConfiguration Adapter to the device and restart the
device.
The device automatically performs the following steps:
–During the booting process, it checks whether an ACA is connected.
–It checks whether the ACA has a file with the name “autoupdate.txt” in
the main directory.
–It checks whether the ACA has a software file with a name that
matches the device type in the main directory.
–If compares the software version stored on the ACA with the one
stored on the device.
–If these conditions are fulfilled, the device loads the software from the
ACA to its non-volatile memory as the main software.
–The device keeps a backup of the existing software in the non-volatile
memory.
–The device then performs a cold start, during which it loads the new
software from the non-volatile memory.
UM Basic Configuration L3P
Release 7.1 12/2011
75
Page 76
Loading Software Updates
4.2 Automatic software update by
ACA
One of the following messages in the log file indicates the result of the update
process:
In your browser, click on “Reload” so that you can use the Web-based
interface to access the device again after it is booted.
76
UM Basic Configuration L3P
Release 7.1 12/2011
Page 77
Loading Software Updates
4.3 Loading the software from the tftp
server
4.3Loading the software from
the tftp server
For a tftp update, you need a tftp server on which the software to be loaded
is stored (see on page 282 “TFTP Server for Software Updates”).
Select the Basics:Software dialog.
The URL identifies the path to the software stored on the tftp server. The URL
is in the format
tftp://IP address of the tftp server/path name/file name
(e.g. tftp://192.168.1.1/device/device.bin).
UM Basic Configuration L3P
Release 7.1 12/2011
77
Page 78
Loading Software Updates
4.3 Loading the software from the tftp
Enter the path of the device software.
Click on “tftp Update” to load the software from the tftp server to the
device.
server
Figure 19: Software update dialog
After successfully loading it, you activate the new software:
Select the dialog Basic Settings:Restart and perform a cold
start.
In a cold start, the device reloads the software from the permanent
memory, restarts, and performs a self-test.
After booting the device, click “Reload” in your browser to access the
device again.
enableSwitch to the privileged EXEC mode.
copy tftp://10.0.1.159/
product.bin system:image
Transfer the “product.bin” software file to the
device from the tftp server with the IP address
10.0.1.159.
78
UM Basic Configuration L3P
Release 7.1 12/2011
Page 79
Loading Software Updates
4.4 Loading the Software via File Selection
4.4Loading the Software via File
Selection
For an HTTP software update (via a file selection window), the device
software must be on a data carrier that you can access from your
workstation.
Select the Basics:Software dialog.
In the file selection frame, click on “...”.
In the file selection window, select the device software (name type:
*.bin, e.g. device.bin) and click on “Open”.
Click on “Update” to transfer the software to the device.
The end of the update is indicated by one of the following messages:
Update completed successfully.
Update failed. Reason: incorrect file.
Update failed. Reason: error when saving.
File not found (reason: file name not found or does not exist).
Connection error (reason: path without file name).
After the update is completed successfully, you activate the new
software:
Select the Basic settings: Restart dialog and perform a cold
start.
In a cold start, the device reloads the software from the non-volatile
memory, restarts, and performs a self-test.
In your browser, click on “Reload” so that you can access the device
again after it is booted.
UM Basic Configuration L3P
Release 7.1 12/2011
79
Page 80
Loading Software Updates
4.4 Loading the Software via File Selection
80
UM Basic Configuration L3P
Release 7.1 12/2011
Page 81
Configuring the Ports
5Configuring the Ports
The port configuration consists of:
Switching the port on and off
Selecting the operating mode
Activating the display of connection error messages
Configuring Power over ETHERNET.
Switching the port on and off
In the state on delivery, all the ports are switched on. For a higher level of
access security, switch off the ports at which you are not making any
connection.
Select the
Basics:Port Configuration dialog.
In the "Port on" column, select the ports that are connected to
another device.
Selecting the operating mode
In the state on delivery, the ports are set to the “Automatic configuration”
operating mode.
Note: The active automatic configuration has priority over the manual
configuration.
Select the
Basics:Port Configuration dialog.
If the device connected to this port requires a fixed setting
–select the operating mode (transmission rate, duplex mode) in the "Manual
configuration" column and
–deactivate the port in the "Automatic configuration" column.
UM Basic Configuration L3P
Release 7.1 12/2011
81
Page 82
Configuring the Ports
Displaying detected connection errors
In the state on delivery, the device displays a detected connection error
via the signal contact and the LED display. The device allows you to
suppress this display, because you do not want to interpret a switched off
device as an interrupted connection, for example.
Select the
Basics:Port Configuration dialog.
In the "Propagate connection error" column, select the ports for
which you want to have link monitoring.
Configure Power over ETHERNET
If the device is equipped with PoE media modules, it will then allow you to
supply current to devices such as IP phones via the twisted-pair cable.
PoE media modules support Power over ETHERNET according to IEEE
802.3af.
On delivery, the Power over ETHERNET function is activated globally and
on all PoE-capable ports.
Nominal power for MS20/30, MACH 1000 and PowerMICE:
The device provides the nominal power for the sum of all PoE ports plus
a surplus. Because the PoE media module gets its PoE voltage
externally, the device does not know the possible nominal power.
The device therefore assumes a “nominal power” of 60 Watt per PoE
media module for now.
Nominal power for MACH 4000:
The device provides the nominal power for the sum of all PoE ports plus
a surplus. Should the connected devices require more PoE power than is
provided, the device then switches PoE off at the ports. Initially, the device
switches PoE off at the ports with the lowest PoE priority. If multiple ports
have the same priority, the device first switches PoE off at the ports with
the higher port number.
82
UM Basic Configuration L3P
Release 7.1 12/2011
Page 83
Configuring the Ports
Global settings
–For devices with PoE select the
Basic Settings:Power over Ethernet dialog.
–For devices with PoE select the
Basic Settings:Power over Ethernet Plus:Global dialog.
Frame "Operation":
With “Function On/Off” you turn the PoE on or off.
Frame "Configuration":
With “Send Trap” you can get the device to send a trap in the
following cases:
–If a value exceeds/falls below the performance threshold.
–If the PoE supply voltage is switched on/off at at least one port.
Enter the power threshold in “Threshold”. When this value is
exceeded/not achieved, the device will send a trap, provided that
“Send Trap” is enabled. For the power threshold you enter the power
yielded as a percentage of the nominal power.
“Nominal Power” displays the power that the device nominally
provides for all PoE ports together.
“Reserved Power” displays the maximum power that the device
provides to all the connected PoE devices together on the basis of
their classification.
“Delivered Power” shows how large the current power requirement
is at all PoE ports.
The difference between the "nominal" and "reserved" power indicates
how much power is still available to the free PoE+ ports.
UM Basic Configuration L3P
Release 7.1 12/2011
83
Page 84
Configuring the Ports
Port settings
–For devices with PoE select the
Basic Settings:Power over Ethernet dialog.
–For devices with PoE+ select the
Basic Settings:Power over Ethernet Plus:Port dialog.
The table only shows ports that support PoE.
In the “POE on” column, you can enable/disable PoE at this port.
The “Status” column indicates the PoE status of the port.
In the “Priority” column (MACH 4000), set the PoE priority of the port
to “low”, “high” or “critical”.
The "Class" column indicates the class of the connected device:
Class: Maximum delivered power
0: 15.4 W = As-delivered state
1: 4.0 W
2: 7.0 W
3: 15.4 W
4: reserved, treated as Class 0
The column „Consumption [W]“ displays the current power
delivered at the respective port.
The “Name” column indicates the name of the port, see
Basic settings:Port configuration.
Figure 20: Power over Ethernet dialog
84
UM Basic Configuration L3P
Release 7.1 12/2011
Page 85
Configuring the Ports
Switch on PoE power supply
OCTOPUS PoE devices let you switch on the PoE power supply before
loading and starting the software. This means that the connected PoE
devices (powered devices) are supplied with the PoE voltage more
quickly and the start phase of the whole network is shorter.
enableSwitch to Privileged EXEC mode.
configureSwitch to Global Configure mode.
#inlinepower fast-startup
enable
#inlinepower fast-startup
disable
#show inlinepowerShow Power over Ethernet System Information
Switch on Inline Power Fast Startup (disabled in
the as-delivered state).
Switch off Inline Power Fast Startup.
(Fast Startup and other information).
Cold start with detected errors
This function lets you reset the device automatically with a cold start in the
following cases:
if an error is detected
(selftest reboot-on-error enable)
or
only if a serious error is detected
(selftest reboot-on-error seriousOnly)
If the function selftest reboot-on-error seriousOnly is
enabled, the device behaves as follows:
If an error is detected in a subsystem (for example, if an HDX/FDX
mismatch is detected on a port), cold starts of the device are dropped.
However, if an error affecting the function of the entire device is
detected, the device still carries out a cold start.
The device sends an alarm message (for Trap messages, see
page 210)
Note: If the selftest reboot-on-error seriousOnly function is
enabled and the device detects an HDX/FDX mismatch, automatic cold
starts of the device are dropped. In this case, to return the affected port(s)
to a usable condition, open the Basic Settings:Reboot dialog and
carry out a cold start of the device.
enableSwitch to Privileged EXEC mode.
configureSwitch to Global Configure mode.
UM Basic Configuration L3P
Release 7.1 12/2011
85
Page 86
Configuring the Ports
#selftest reboot-on-error
enable
#selftest reboot-on-error
seriousOnly
#selftest reboot-on-error
disable
#show selftestShow status of the "Cold start if error detected"
Switch on the "Cold start if error detected“ function.
Switch on the "Cold start only if serious error
detected“ function.
Switch off the "Cold start if error detected“ function
(enabled in the as-delivered state).
function (Enabled/Disabled/seriousOnly).
86
UM Basic Configuration L3P
Release 7.1 12/2011
Page 87
Assistance in the Protection from Unauthorized Access
6Assistance in the Protection
from Unauthorized Access
The device provides the following functions to help prevent unauthorised
accesses.
Password for SNMP access
Telnet/internet/SSH access can be switched off
Restricted Management access
HiDiscovery function can be switched off
Port access control by IP or MAC address
IEEE 802.1X standard port authentication
Access Control Lists (ACL)
UM Basic Configuration L3P
Release 7.1 12/2011
87
Page 88
Assistance in the Protection from Unauthorized Access
6.1 Protecting the device
6.1Protecting the device
If you want to maximize the protection of the device against unauthorized
access in just a few steps, you can perform some or all of the following steps
on the device:
Deactivate SNMPv1 and SNMPv2 and select a password for SNMPv3
access other than the standard password (see on page 90 “Entering the
password for SNMP access”).
Deactivate Telnet access.
Deactivate web access after you have downloaded the applet for the webbased interface onto your management station. You can start the webbased interface as an independent program and thus have SNMP access
to the device.
If necessary, deactivate SSH access (see on page 96 “Switching Telnet/
Internet/SSH access on/off”).
Deactivate HiDiscovery access.
Note: Retain at least one option to access the device. V.24 access is always
possible, since it cannot be deactivated.
88
UM Basic Configuration L3P
Release 7.1 12/2011
Page 89
Assistance in the Protection from Unauthorized Access
6.2 Password for SNMP access
6.2Password for SNMP access
6.2.1Description of password for SNMP access
A network management station communicates with the device via the Simple
Network Management Protocol (SNMP).
Every SNMP packet contains the IP address of the sending computer and the
password with which the sender of the packet wants to access the device
MIB.
The device receives the SNMP packet and compares the IP address of the
sending computer and the password with the entries in the device MIB.
If the password has the appropriate access right, and if the IP address of the
sending computer has been entered, then the device will allow access.
In the delivery state, the device is accessible via the password "public" (read
only) and "private" (read and write) to every computer.
To help protect your device from unwanted access:
First define a new password with which you can access from your
computer with all rights.
Treat this password as confidential, because everyone who knows the
password can access the device MIB with the IP address of your
computer.
Limit the access rights of the known passwords or delete their entries.
UM Basic Configuration L3P
Release 7.1 12/2011
89
Page 90
Assistance in the Protection from Un-
6.2 Password for SNMP access
authorized Access
6.2.2Entering the password for SNMP access
Select the Security:Password/SNMP Access dialog.
This dialog gives you the option of changing the read and read/write
passwords for access to the device via the Web-based interface, via the
CLI, and via SNMPv3 (SNMP version 3).
Set different passwords for the read password and the read/write
password so that a user that only has read access (user name “user”)
does not know, or cannot guess, the password for read/write access
(user name “admin”).
If you set identical passwords, when you attempt to write this data the
device reports a general error.
The Web-based interface and the user interface (CLI) use the same
passwords as SNMPv3 for the users “admin” and “user”.
Note: Passwords are case-sensitive.
Select “Modify Read-Only Password (User)” to enter the read
password.
Enter the new read password in the “New Password” line and repeat
your entry in the “Please retype” line.
Select “Modify Read-Write Password (Admin)” to enter the read/
write password.
Enter the read/write password and repeat your entry.
"Data encryption" encrypts the data of the Web-based management
that is transferred between your PC and the device with SNMPv3.
You can set the "Data encryption" differently for access with a read
password and access with a read/write password.
90
UM Basic Configuration L3P
Release 7.1 12/2011
Page 91
Assistance in the Protection from Unauthorized Access
6.2 Password for SNMP access
Figure 21: Password/SNMP Access dialog
Note: If you do not know a password with “read/write” access, you will
not have write access to the device.
Note: For security reasons, the device does not display the passwords.
Make a note of every change. You cannot access the device without a
valid password.
Note: For security reasons, SNMPv3 encrypts the password. With the
“SNMPv1” or “SNMPv2” setting in the dialog Security:SNMPv1/v2 access, the device transfers the password unencrypted, so that this
can also be read.
Note: Use between 5 and 32 characters for the password in SNMPv3,
since many applications do not accept shorter passwords.
UM Basic Configuration L3P
Release 7.1 12/2011
91
Page 92
Assistance in the Protection from Un-
6.2 Password for SNMP access
authorized Access
Select the Security:SNMPv1/v2 access dialog.
With this dialog you can select the access via SNMPv1 or SNMPv2.
In the state on delivery, both protocols are activated. You can thus
manage the device with HiVision and communicate with earlier
versions of SNMP.
If you select SNMPv1 or SNMPv2, you can specify in the table via which
IP addresses the device may be accessed, and what kinds of
passwords are to be used.
Up to 8 entries can be made in the table.
For security reasons, the read password and the read/write password
must not be identical.
Please note that passwords are case-sensitive.
IndexSerial number for this table entry
PasswordPassword with which this computer can access the
device. This password is independent of the SNMPv2
password.
IP AddressIP address of the computer that can access the device.
IP MaskIP mask for the IP address
Access
Mode
The access mode determines whether the computer has
read-only or read-write access.
ActiveEnable/disable this table entry.
92
UM Basic Configuration L3P
Release 7.1 12/2011
Page 93
Assistance in the Protection from Unauthorized Access
6.2 Password for SNMP access
Figure 22: SNMPv1/v2 access dialog
To create a new line in the table click “Create”.
To delete an entry, select the line in the table and click “Remove”.
UM Basic Configuration L3P
Release 7.1 12/2011
93
Page 94
Assistance in the Protection from Unauthorized Access
6.3 Telnet/internet/SSH access
6.3Telnet/internet/SSH access
6.3.1Description of Telnet Access
The Telnet server of the device allows you to configure the device using the
Command Line Interface (in-band). You can deactivate the Telnet server to
inactivate Telnet access to the device.
The server is activated in its state on delivery.
After the Telnet server has been deactivated, you will no longer be able to
access the device via a new Telnet connection. If a Telnet connection already
exists, it is retained.
Note: The Command Line Interface (out-of-band) and the
Security:Telnet/Web access dialog in the Web-based interface allow
you to reactivate the Telnet server.
94
UM Basic Configuration L3P
Release 7.1 12/2011
Page 95
Assistance in the Protection from Un-
6.3 Telnet/internet/SSH access
authorized Access
6.3.2Description of Web Access
The device's Web server allows you to configure the device by using the
Web-based interface. You can deactivate the Web server to prevent Web
access to the device.
The server is activated in its state on delivery.
After the Web server has been switched off, it is no longer possible to log in
via a Web browser. The login in the open browser window remains active.
6.3.3Description of SSH Access
The device's SSH server allows you to configure the device using the
Command Line Interface (in-band). You can deactivate the SSH server to
prevent SSH access to the device.
The server is deactivated in its state on delivery.
After the SSH server has been deactivated, you will no longer be able to
access the device via a new SSH connection. If an SSH connection already
exists, it is retained.
Note: The Command Line Interface (out-of-band) and the
Security:Telnet/Web access dialog in the Web-based interface allow
you to reactivate the SSH server.
Note: To be able to access the device via SSH, you require a key that has to
be installed on the device (see the "Basic Configuration User Manual”).
UM Basic Configuration L3P
Release 7.1 12/2011
95
Page 96
Assistance in the Protection from Un-
6.3 Telnet/internet/SSH access
authorized Access
6.3.4Switching Telnet/Internet/SSH access on/off
The web server copies a Java applet for the web-based interface to your
computer. The applet then communicates with the device by SNMPv3
(Simple Network Management Protocol). The web-server of the device
allows you to configure the device through the web-based interface. You can
switch off the web server in order to prevent the applet being copied.
Select the Security:Telnet/Web/SHH access dialog.
Disable the server to which you want to refuse access.
enableSwitch to the privileged EXEC mode.
configureSwitch to the Configuration mode.
lineconfigSwitch to the configuration mode for CLI.
transport input telnetEnable Telnet server.
no transport input telnetDisable Telnet server.
exitSwitch to the Configuration mode.
exitSwitch to the privileged EXEC mode.
ip http serverEnable Web server.
no ip http serverDisable Web server.
ip sshEnable SSH function on switch
no ip sshDisable SSH function on switch
6.3.5Web access through HTTPS
The HTTPS communication protocol (HyperText Transfer Protocol Secure)
helps protect data transfers from interception. The device uses the HTTPS
protocol to encrypt and authenticate the communications between web
server and browser.
UM Basic Configuration L3P
96
Release 7.1 12/2011
Page 97
Assistance in the Protection from Un-
6.3 Telnet/internet/SSH access
authorized Access
The web server uses HTTP to load a Java applet for the web-based interface
onto your computer. This applet then communicates with the device by
SNMP (Simple Network Management Protocol). If you have enabled the
Web Server (HTTPS) function, the Java applet establishes an HTTPS
connection to the device. The device creates an HTTPS tunnel through the
SNMP. It uses DES encoding on 56 bits. You can upload HTTPS certificates
to the device.
Certificate
An X.509/PEM Standard certificate (Public Key Infrastructure) is required
for the encryption. In the as-delivered state, a self-generated certificate is
already present on the device.
You can create an X509/PEM certificate using the following CLI
command: # ip https certgen
You can upload a new certificate using the following CLI command:
You can switch the HTTPS server off and on again using the following
CLI command sequence:
# no ip https server
# ip https server
Note: If you upload a new certificate, reboot the device or the HTTPS
server in order to activate the certificate.
HTTPS connection
Note: The standard port for HTTPS connection is 443. If you change the
number of the HTTPS port, reboot the device or the HTTPS server in
order to make the change effective.
You can change the HTTPS port number using the following CLI-
command (where <port_no> is the number of the HTTPS port):
#ip https port <port_no>
Note: If you want to use HTTPS, switch on both HTTPS and HTTP. This
is required in order to load the applet. In the as-delivered state, HTTPS is
switched off.
UM Basic Configuration L3P
Release 7.1 12/2011
97
Page 98
Assistance in the Protection from Un-
6.3 Telnet/internet/SSH access
authorized Access
Open the Security:Telnet/Internet/SSH Access dialog.
Tick the boxes Telnet Server active, Web Server(http)
and Web Server(https). In the HTTPS Port Number box, enter
the value 443.
To access the device by HTTPS, enter HTTPS instead of HTTP in
your browser, followed by the IP address of the device.
enableSwitch to Privileged EXEC mode.
# ip https serverSwitch on HTTPS-server.
# ip https port <port_no>Set the HTTPS port number for a secure HTTP
connection.
- As-delivered state: 443.
- Value range: 1-65535
# no ip https server
# ip https server
# show ip httpsOptional: Show the status of the HTTPS server
# ip https certgenCreate X509/PEM certificate.
# copy tftp://<server_ip>/
<path_to_pem>
nvram:httpscert
# no ip https server
# ip https server
If you change the HTTPS port number, switch the
HTTPS server off and then on again in order to
make the change effective.
and HTTPS port number.
Upload an X509/PEM certificate for HTTPS using
TFTP.
After uploading the HTTPS certificate, switch the
HTTPS server off and then on again in order to
activate the certificate.
The device uses HTTPS protocol and establishes a new connection.
When the session is ended and the user logs out, the device terminates
the connection.
Note: The device allows you to open HTTPS- and HTTP connections at
the same time. The maximum number of HTTP(S) connections that can
be open at the same time is 16.
UM Basic Configuration L3P
98
Release 7.1 12/2011
Page 99
Assistance in the Protection from Un-
6.4 Restricted Management Access
authorized Access
6.4Restricted Management
Access
The device allows you to differentiate the management access to the device
based on IP address ranges, and to differentiate these based on
management services (http, snmp, telnet, ssh). You thus have the option to
set finely differentiated management access rights.
If you only want the device, which is located, for example, in a production
plant, to be managed from the network of the IT department via the Web
interface, but also want the administrator to be able to access it remotely via
SSH, you can achieve this with the “Restricted management access”
function.
You can configure this function using the Web-based interface or the CLI.
The Web-based interface provides you with an easy configuration option.
Make sure you do not unintentionally block your access to the device. The
CLI access to the device via V.24 provided at all times is excluded from the
function and cannot be restricted.
In the following example, the IT network has the address range 192.168.1.0/
24 and the remote access is from a mobile phone network with the IP
address range 109.237.176.0 - 109.237.176.255.
The device is always ready for the SSH access (see on page 287 “Preparing
access via SSH”) and the SSH client application already knows the
Table 4: Example parameter for the restricted management access
enableSwitch to the privileged EXEC mode.
show network mgmt-accessDisplay the current configuration.
network mgmt-access addCreate an entry for the IT network. This is given
the smallest free ID - in the example, 2.
UM Basic Configuration L3P
Release 7.1 12/2011
99
Page 100
Assistance in the Protection from Unauthorized Access