The naming of copyrighted trademarks in this manual, even when not specially indicated, should
not be taken to mean that these names may be considered as free in the sense of the trademark
and tradename protection law and hence that they may be freely used by anyone.
Manuals and software are protected by copyright. All rights reserved. The copying, reproduction,
translation, conversion into any electronic medium or machine scannable form is not permitted,
either in whole or in part. An exception is the preparation of a backup copy of the software for
your own use. For devices with embedded software, the end-user license agreement on the
enclosed CD applies.
The performance features described here are binding only if they have been expressly agreed
when the contract was made. This document was produced by Hirschmann Automation and
Control GmbH according to the best of the company's knowledge. Hirschmann reserves the right
to change the contents of this document without prior notice. Hirschmann can give no guarantee
in respect of the correctness or accuracy of the information in this document.
Hirschmann can accept no responsibility for damages, resulting from the use of the network
components or the associated operating software. In addition, we refer to the conditions of use
specified in the license contract.
You can get the latest version of this manual on the Internet at the Hirschmann product site
(www.hirschmann-ac.de).
Printed in Germany
Hirschmann Automation and Control GmbH
Stuttgarter Str. 45-51
72654 Neckartenzlingen
Germany
Tel.: +49 1805 141538
Rel. 6.0 1-01-07/2010 13.7.10
Contents
Contents
About this Manual9
Key11
Introduction13
1Access to the user interfaces15
1.1System Monitor16
1.2Command Line Interface18
1.3Web-based Interface21
2Entering the IP Parameters25
2.1IP Parameter Basics27
2.1.1IP address (version 4)27
2.1.2Netmask28
2.1.3Classless Inter-Domain Routing31
2.2Entering IP parameters via CLI33
2.3Entering the IP Parameters via HiDiscovery36
2.4Loading the system configuration from the ACA39
2.5System configuration via BOOTP41
2.6System Configuration via DHCP46
2.7System Configuration via DHCP Option 8249
2.8Web-based IP Configuration50
2.9Faulty Device Replacement52
3Loading/saving settings53
3.1Loading settings54
3.1.1Loading from the local non-volatile memory55
3.1.2Loading from the AutoConfiguration Adapter55
3.1.3Loading from a file56
3.1.4Resetting the configuration to the state on delivery58
3.2Saving settings59
3.2.1Saving locally (and on the ACA)59
Basic Configuration
Release 6.0 07/2010
3
Contents
3.2.2Saving to a file on URL60
3.2.3Saving to a binary file on the PC61
3.2.4Saving as a script on the PC62
4Loading Software Updates63
4.1Loading the Software manually from the ACA65
4.1.1Selecting the software to be loaded66
4.1.2Starting the software67
4.1.3Performing a cold start67
4.2Automatic software update by ACA68
4.3Loading the software from the tftp server70
4.4Loading the Software via File Selection72
5Configuring the Ports73
6Protection from Unauthorized Access77
6.1Protecting the device78
6.2Password for SNMP access 79
6.2.1Description of password for SNMP access79
6.2.2Entering the password for SNMP access80
6.3Telnet/Web/SSH Access84
6.3.1Description of Telnet Access84
6.3.2Description of Web Access84
6.3.3Description of SSH Access85
6.3.4Enabling/disabling Telnet/Web/SSH Access85
6.4Restricted Management Access87
6.5HiDiscovery Access89
6.5.1Description of the HiDiscovery Protocol89
6.5.2Enabling/disabling the HiDiscovery Function89
6.6Port Authentication IEEE 802.1X94
6.6.1Description of Port Authentication according to
IEEE 802.1X94
6.6.2Authentication Process according to IEEE 802.1X95
6.6.3Preparing the Device for the
IEEE 802.1X Port Authentication95
6.6.4IEEE 802.1X Settings96
7Synchronizing the System Time in the Network97
7.1Entering the Time98
Basic Configuration
4
Release 6.0 07/2010
Contents
7.2SNTP100
7.2.1Description of SNTP100
7.2.2Preparing the SNTP Configuration101
7.2.3Configuring SNTP102
7.3Precision Time Protocol106
7.3.1Description of PTP Functions106
7.3.2Preparing the PTP Configuration110
7.3.3Application Example112
7.4Interaction of PTP and SNTP117
8Network Load Control119
8.1Direct Packet Distribution120
8.1.1Store-and-forward120
8.1.2Multi-Address Capability120
8.1.3Aging of Learned Addresses121
8.1.4Entering Static Addresses122
8.1.5Disabling the Direct Packet Distribution123
8.2Multicast Application125
8.2.1Description of the Multicast Application125
8.2.2Example of a Multicast Application126
8.2.3Description of IGMP Snooping127
8.2.4Setting IGMP Snooping128
8.2.5Description of GMRP133
8.2.6Setting GMRP 135
8.3Rate Limiter137
8.3.1Description of the Rate Limiter137
8.3.2Rate Limiter Settings (PowerMICE and MACH 4000)138
8.3.3Rate Limiter settings for
RS20/RS30/40, MS20/MS30, RSR20/RSR30,
MACH 100, MACH 1000 and OCTOPUS139
8.4QoS/Priority141
8.4.1Description of Prioritization141
8.4.2VLAN tagging142
8.4.3IP ToS / DiffServ144
8.4.4Management prioritization148
8.4.5Handling of Received Priority Information148
8.4.6Handling of Traffic Classes149
8.4.7Setting prioritization 149
8.5Flow Control154
8.5.1Description of Flow Control154
8.5.2Setting the Flow Control156
8.6VLANs157
Basic Configuration
Release 6.0 07/2010
5
Contents
8.6.1VLAN Description157
8.6.2Examples of VLANs158
9Operation Diagnosis175
9.1Sending Traps176
9.1.1List of SNMP Traps177
9.1.2 SNMP Traps during Boot178
9.1.3Configuring Traps179
9.2Monitoring the Device Status181
9.2.1Configuring the Device Status182
9.2.2Displaying the Device Status183
9.3Out-of-band Signaling184
9.3.1Controlling the Signal Contact185
9.3.2Monitoring the Device Status via the Signal Contact185
9.3.3Monitoring the Device Functions via the Signal
Contact186
9.3.4Monitoring the Fan187
9.4Port Status Indication190
9.5Event Counter at Port Level191
9.5.1Detecting Non-matching Duplex Modes192
9.6Displaying the SFP Status196
9.7TP Cable Diagnosis197
9.8Topology Discovery198
9.8.1Description of Topology Discovery198
9.8.2Displaying the Topology Discovery Results200
9.9Detecting IP Address Conflicts203
9.9.1Description of IP Address Conflicts203
9.9.2Configuring ACD204
9.9.3Displaying ACD205
9.10Detecting Loops206
9.11Reports207
9.12Monitoring Data Traffic at Ports (Port Mirroring)209
9.13Syslog212
Basic Configuration
6
Release 6.0 07/2010
Contents
9.14Event Log215
ASetting up the Configuration Environment217
BGeneral Information239
CIndex247
DFurther Support251
Basic Configuration
Release 6.0 07/2010
7
Contents
Basic Configuration
8
Release 6.0 07/2010
About this Manual
About this Manual
The “Basic Configuration” user manual contains the information you need to
start operating the device. It takes you step by step from the first startup
operation through to the basic settings for operation in your environment.
The following thematic sequence has proven itself in practice:
X Set up device access for operation by entering the IP parameters
X Check the status of the software and update it if necessary
X If a configuration already exists, load/store it
X Configure the ports
X Set up protection from unauthorized access
X Optimize the data transmission with network load control
X Synchronize system time in the network
X Function diagnosis
X Store the newly created configuration to nonvolatile memory
The “Installation” user manual contains a device description, safety
instructions, a description of the display, and the other information that you
need to install the device.
The “Redundancy Configuration” user manual contains the information you
need to select a suitable redundancy procedure and configure that
procedure.
The “Industry Protocols” user manual describes how the device is connected
by means of a communication protocol commonly used in the industry, such
as EtherNet/IP and PROFINET IO.
The "Web-based Interface" reference manual contains detailed information
on using the Web interface to operate the individual functions of the device.
Basic Configuration
Release 6.0 07/2010
9
About this Manual
The "Command Line Interface" reference manual contains detailed
information on using the Command Line Interface to operate the individual
functions of the device.
The Network Management Software HiVision/Industrial HiVision provides
you with additional options for smooth configuration and monitoring:
X Configuration of multiple devices simultaneously.
X Graphical interface with network layouts.
X Auto-topology discovery.
X Event log.
X Event handling.
X Client / Server structure.
X Browser interface
X ActiveX control for SCADA integration
X SNMP/OPC gateway
10
Basic Configuration
Release 6.0 07/2010
Key
Key
The designations used in this manual have the following meanings:
XList
Work step
LinkIndicates a cross-reference with a stored link
Note: A note emphasizes an important fact or draws your
CourierASCII representation in user interface
Execution in the Web-based Interface user interface
Execution in the Command Line Interface user interface
Subheading
attention to a dependency.
Symbols used:
WLAN access point
Router with firewall
Switch with firewall
Router
Switch
Basic Configuration
Release 6.0 07/2010
11
Key
Bridge
Hub
A random computer
Configuration Computer
Server
PLC Programmable logic
controller
I/O Robot
12
Basic Configuration
Release 6.0 07/2010
Introduction
Introduction
The device has been developed for practical application in a harsh industrial
environment. Accordingly, the installation process has been kept simple.
Thanks to the selected default settings, you only have to enter a few settings
before starting to operate the device.
Note: The changes you make in the dialogs are copied into the volatile
memory of the device when you click on "Set".
To save the changes into the permanent memory of the device select the
non-volatile memory location in the Basic Settings:Load/Save dialog
and click "Save".
Basic Configuration
Release 6.0 07/2010
13
Introduction
14
Basic Configuration
Release 6.0 07/2010
Access to the user interfaces
1Access to the user interfaces
The device has 3 user interfaces, which you can access via different
interfaces:
X System monitor via the V.24 interface (out-of-band)
X Command Line Interface (CLI) via the V.24 connection (out-of-band) as
well as Telnet or SSH (in-band)
X Web-based interface via Ethernet (in-band).
Basic Configuration
Release 6.0 07/2010
15
Access to the user interfaces
1.1System Monitor
The system monitor enables you to
X select the software to be loaded
X perform a software update
X start the selected software
X shut down the system monitor
X delete the configuration saved and
X display the boot code information.
1.1 System Monitor
Opening the system monitor
Use the terminal cable (see accessories) to connect
–the V.24 socket (RJ11) to
–a terminal or a COM port of a PC with terminal emulation based on
VT100
(for the physical connection, see the "Installation" user manual).
Speed9,600 Baud
Data8 bit
Paritynone
Stopbit1 bit
Handshakeoff
Table 1: Data transfer parameters
Start the terminal program on the PC and set up a connection with the
device.
When you boot the device, the message
"Press <1> to enter System Monitor 1"
appears on the terminal.
16
Basic Configuration
Release 6.0 07/2010
Access to the user interfaces
< Device Name (Boot) Release: 1.00 Build: 2005-09-17 15:36 >
Press <1> to enter System Monitor 1 ...
1
1.1 System Monitor
Figure 1: Screen display during the boot process
Press the <1> key within one second to start system monitor 1.
System Monitor
(Selected OS: L3P-01.0.00-K16 (2005-10-31 19:32))
1 Select Boot Operating System
2 Update Operating System
3 Start Selected Operating System
4 End (reset and reboot)
5 Erase main configuration file
sysMon1>
Figure 2: System monitor 1 screen display
Select a menu item by entering the number.
To leave a submenu and return to the main menu of system monitor 1,
press the <ESC> key.
Basic Configuration
Release 6.0 07/2010
17
Access to the user interfaces
1.2 Command Line Interface
1.2Command Line Interface
The Command Line Interface enables you to use the functions of the device
via a local or remote connection.
The Command Line Interface provides IT specialists with a familiar
environment for configuring IT devices.
The script compatibility of the Command Line Interface enables you, among
other things, to feed multiple devices with the same configuration data, to
create and apply partial configurations or to compare 2 configuration by
comparing the script files.
You will find a detailed description of the Command Line Interface in the
"Command Line Interface" reference manual.
You can access the Command Line Interface via
X the V.24 port (out-of-band)
X Telnet (in-band)
X SSH (in-band)
Note: To facilitate making entries, CLI gives you the option of abbreviating
keywords. Type in the beginning of a keyword. When you press the tab key,
CLI completes the keyword.
Opening the Command Line Interface
Connect the device to a terminal or to the COM port of a PC using
terminal emulation based on VT100 and press any key (see on
page 16 “Opening the system monitor“) or
call up the Command Line Interface via Telnet.
A window for entering the user name appears on the screen.
Up to five users can access the Command Line Interface.
18
Basic Configuration
Release 6.0 07/2010
Access to the user interfaces
Copyright (c) 2004-2009 Hirschmann Automation and Control GmbH
All rights reserved
PowerMICE Release L3P-05.1.00
(Build date 2009-10-11 12:13)
System Name: PowerMICE
Mgmt-IP : 10.0.1.105
1.Router-IP: 0.0.0.0
Base-MAC : 00:80:63:51:74:00
System Time: 2009-10-11 13:14:15
User:
1.2 Command Line Interface
Figure 3: Logging in to the Command Line Interface program
Enter a user name. The default setting for the user name is admin .
Press the Enter key.
Enter the password. The default setting for the password is private .
Press the Enter key.
You can change the user name and the password later in the
Command Line Interface.
Please note that these entries are case-sensitive.
The start screen appears.
Basic Configuration
Release 6.0 07/2010
19
Access to the user interfaces
NOTE: Enter '?' for Command Help. Command help displays all options
that are valid for the 'normal' and 'no' command forms. For
the syntax of a particular command form, please consult the
documentation.
(Hirschmann Product) >
1.2 Command Line Interface
Figure 4: CLI screen after login
20
Basic Configuration
Release 6.0 07/2010
Access to the user interfaces
1.3 Web-based Interface
1.3Web-based Interface
The user-friendly Web-based interface gives you the option of operating the
device from any location in the network via a standard browser such as
Mozilla Firefox or Microsoft Internet Explorer.
As a universal access tool, the Web browser uses an applet which
communicates with the device via the Simple Network Management Protocol
(SNMP).
The Web-based interface allows you to graphically configure the device.
Opening the Web-based Interface
To open the Web-based interface, you need a Web browser (a program
that can read hypertext), for example Mozilla Firefox version 1 or later, or
Microsoft Internet Explorer version 6 or later.
Note: The Web-based interface uses Java software 6 (“Java™ Runtime
Environment Version 1.6.x”).
Install the software from the enclosed CD-ROM. To do this, you go to
“Additional Software”, select Java Runtime Environment and click on
“Installation”.
Figure 5: Installing Java
Basic Configuration
Release 6.0 07/2010
21
Access to the user interfaces
1.3 Web-based Interface
Start your Web browser.
Check that you have activated JavaScript and Java in your browser
settings.
Establish the connection by entering the IP address of the device
which you want to administer via the Web-based management in the
address field of the Web browser. Enter the address in the following
form:
http://xxx.xxx.xxx.xxx
The login window appears on the screen.
Figure 6: Login window
Select the desired language.
In the drop-down menu, you select
–user, to have read access, or
–admin, to have read and write access
to the device.
The password "public", with which you have read access, appears in
the password field. If you wish to have write access to the device, then
highlight the contents of the password field and overwrite it with the
password "private" (default setting).
Click on OK.
Basic Configuration
22
Release 6.0 07/2010
Access to the user interfaces
1.3 Web-based Interface
The website of the device appears on the screen.
Note: The changes you make in the dialogs are copied to the device
when you click "Set". Click "Reload" to update the display.
Note: You can block your access to the device by entering an incorrect
configuration.
Activating the function "Cancel configuration change" in the "Load/Save"
dialog enables you to return automatically to the last configuration after a
set time period has elapsed. This gives you back your access to the
device.
Basic Configuration
Release 6.0 07/2010
23
Access to the user interfaces
1.3 Web-based Interface
24
Basic Configuration
Release 6.0 07/2010
Entering the IP Parameters
2Entering the IP Parameters
The IP parameters must be entered when the device is installed for the first
time.
The device provides 7 options for entering the IP parameters during the first
installation:
X Entry using the Command Line Interface (CLI).
You choose this “out of band” method if
X you preconfigure your device outside its operating environment
X you do not have network access (“in-band”) to the device
(see page 33 “Entering IP parameters via CLI“).
X Entry using the HiDiscovery protocol.
You choose this “in-band” method if the device is already installed in the
network or if you have another Ethernet connection between your PC and
the device
(see page 36 “Entering the IP Parameters via HiDiscovery“).
X Configuration using the AutoConfiguration Adapter (ACA).
You choose this method if you are replacing a device with a device of the
same type and have already saved the configuration on an ACA(see
page 39 “Loading the system configuration from the ACA“).
X Using BOOTP.
You choose this “in-band” method if you want to configure the installed
device using BOOTP. You need a BOOTP server for this. The BOOTP
server assigns the configuration data to the device using its MAC address
(see page 41 “System configuration via BOOTP“). Because the device is
delivered with “DHCP mode” as the entry for the configuration data
reference, you have to reset this to the BOOTP mode for this method.
X Configuration via DHCP.
You choose this “in-band” method if you want to configure the installed
device using DHCP. You need a DHCP server for this. The DHCP server
assigns the configuration data to the device using its MAC address or its
system name (see page 46 “System Configuration via DHCP“).
Basic Configuration
Release 6.0 07/2010
25
Entering the IP Parameters
X Using DHCP Option 82.
You choose this “in-band” method if you want to configure the installed
device using DHCP Option 82. You need a DHCP server with Option 82
for this. The DHCP server assigns the configuration data to the device
using its physical connection (see page 49 “System Configuration via
DHCP Option 82“).
X Configuration via the Web-based interface.
If the device already has an IP address and can be reached via the
network, then the Web-based interface provides you with another option
for configuring the IP parameters.
26
Basic Configuration
Release 6.0 07/2010
Entering the IP Parameters
2.1 IP Parameter Basics
2.1IP Parameter Basics
2.1.1IP address (version 4)
The IP addresses consist of 4 bytes. These 4 bytes are written in decimal
notation, separated by a decimal point.
Since 1992, five classes of IP address have been defined in the RFC 1340.
ClassNetwork
address
A1 byte3 bytes1.0.0.0 to 126.255.255.255
B2 bytes2 bytes128.0.0.0 to 191.255.255.255
C3 bytes1 byte192.0.0.0 to 223.255.255.255
D224.0.0.0 to 239.255.255.255
E240.0.0.0 to 255.255.255.255
Table 2: IP address classes
Host addressAddress range
The network address is the fixed part of the IP address. The worldwide
leading regulatory board for assigning network addresses is the IANA
(Internet Assigned Numbers Authority). If you require an IP address block,
contact your Internet service provider. Internet service providers should
contact their local higher-level organization:
X APNIC (Asia Pacific Network Information Center) - Asia/Pacific Region
X ARIN (American Registry for Internet Numbers) - Americas and Sub-
Sahara Africa
X LACNIC (Regional Latin-American and Caribbean IP Address Registry) –
Latin America and some Caribbean Islands
X RIPE NCC (Réseaux IP Européens) - Europe and Surrounding Regions
Basic Configuration
Release 6.0 07/2010
27
Entering the IP Parameters
Net ID - 7 bits Host ID - 24 bits0
I
I
I
0
I
III
0
III0
Net ID - 14 bits
Net ID - 21 bits
Multicast Group ID - 28 bits
reserved for future use - 28 b its
Class A
Class B
Host ID - 16 bits
Host ID - 8 bit s
Class C
Class D
Class E
2.1 IP Parameter Basics
Figure 7: Bit representation of the IP address
An IP address belongs to class A if its first bit is a zero, i.e. the first decimal
number is less than 128. The IP address belongs to class B if the first bit is a
one and the second bit is a zero, i.e. the first decimal number is between 128
and 191. The IP address belongs to class C if the first two bits are a one, i.e.
the first decimal number is higher than 191.
Assigning the host address (host id) is the responsibility of the network
operator. He alone is responsible for the uniqueness of the IP addresses he
assigns.
2.1.2Netmask
Routers and gateways subdivide large networks into subnetworks. The
netmask assigns the IP addresses of the individual devices to a particular
subnetwork.
The division into subnetworks with the aid of the netmask is performed in
much the same way as the division of the network addresses (net id) into
classes A to C.
The bits of the host address (host id) that represent the mask are set to one.
The remaining bits of the host address in the netmask are set to zero (see
the following examples).
28
Basic Configuration
Release 6.0 07/2010
Entering the IP Parameters
255.255.192.0
Decimal notation
11111111.11111111.11000000.00000000
Binary notation
Subnetwork mask bits
Class B
129.218.65.17
Decimal notation
10000001.11011010.01000001.00010001
binary notation
128 < 129 ≤ 191 ➝ Class B
Subnetwork 1
Network address
129.218.129.17
Decimal notation
10000001.11011010.10000001.00010001
binary notation
128 < 129 ≤ 191 ➝ Class B
Subnetwork 2
Network address
Example of a netmask:
2.1 IP Parameter Basics
Example of IP addresses with subnetwork assignment when the above
subnet mask is applied:
Basic Configuration
Release 6.0 07/2010
29
Entering the IP Parameters
Romeo
LAN 1
Lorenzo
LAN 2
Juliet
2.1 IP Parameter Basics
Example of how the network mask is used
In a large network it is possible that gateways and routers separate the
management agent from its management station. How does addressing
work in such a case?
Figure 8: Management agent that is separated from its management station by a
router
The management station "Romeo" wants to send data to the
management agent "Juliet". Romeo knows Juliet's IP address and also
knows that the router "Lorenzo" knows the way to Juliet.
Romeo therefore puts his message in an envelope and writes Juliet's IP
address as the destination address. For the source address he writes his
own IP address on the envelope.
Romeo then places this envelope in a second one with Lorenzo's MAC
address as the destination and his own MAC address as the source. This
process is comparable to going from layer 3 to layer 2 of the ISO/OSI base
reference model.
Finally, Romeo puts the entire data packet into the mailbox. This is
comparable to going from layer 2 to layer 1, i.e. to sending the data packet
over the Ethernet.
30
Basic Configuration
Release 6.0 07/2010
Loading...
+ 264 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.