Hirschmann RS20, RS30, RS40, MS20, MS30 Basic Configuration

...
User Manual
RS20/RS30/RS40, MS20/MS30, OCTOPUS, PowerMICE, RSR20/RSR30, MACH 100, MACH 1000, MACH 4000
Basic Configuration
Release 6.0 07/2010
Technical Support
HAC.Support@Belden.com
The naming of copyrighted trademarks in this manual, even when not specially indicated, should not be taken to mean that these names may be considered as free in the sense of the trademark and tradename protection law and hence that they may be freely used by anyone.
© 2010Hirschmann Automation and Control GmbH
Manuals and software are protected by copyright. All rights reserved. The copying, reproduction, translation, conversion into any electronic medium or machine scannable form is not permitted, either in whole or in part. An exception is the preparation of a backup copy of the software for your own use. For devices with embedded software, the end-user license agreement on the enclosed CD applies.
The performance features described here are binding only if they have been expressly agreed when the contract was made. This document was produced by Hirschmann Automation and Control GmbH according to the best of the company's knowledge. Hirschmann reserves the right to change the contents of this document without prior notice. Hirschmann can give no guarantee in respect of the correctness or accuracy of the information in this document.
Hirschmann can accept no responsibility for damages, resulting from the use of the network components or the associated operating software. In addition, we refer to the conditions of use specified in the license contract.
You can get the latest version of this manual on the Internet at the Hirschmann product site (www.hirschmann-ac.de).
Printed in Germany Hirschmann Automation and Control GmbH Stuttgarter Str. 45-51 72654 Neckartenzlingen Germany Tel.: +49 1805 141538
Rel. 6.0 1-01-07/2010 13.7.10

Contents

Contents
About this Manual 9
Key 11
Introduction 13
1 Access to the user interfaces 15
1.1 System Monitor 16
1.2 Command Line Interface 18
1.3 Web-based Interface 21
2 Entering the IP Parameters 25
2.1 IP Parameter Basics 27
2.1.1 IP address (version 4) 27
2.1.2 Netmask 28
2.1.3 Classless Inter-Domain Routing 31
2.2 Entering IP parameters via CLI 33
2.3 Entering the IP Parameters via HiDiscovery 36
2.4 Loading the system configuration from the ACA 39
2.5 System configuration via BOOTP 41
2.6 System Configuration via DHCP 46
2.7 System Configuration via DHCP Option 82 49
2.8 Web-based IP Configuration 50
2.9 Faulty Device Replacement 52
3 Loading/saving settings 53
3.1 Loading settings 54
3.1.1 Loading from the local non-volatile memory 55
3.1.2 Loading from the AutoConfiguration Adapter 55
3.1.3 Loading from a file 56
3.1.4 Resetting the configuration to the state on delivery 58
3.2 Saving settings 59
3.2.1 Saving locally (and on the ACA) 59
Basic Configuration
Release 6.0 07/2010
3
Contents
3.2.2 Saving to a file on URL 60
3.2.3 Saving to a binary file on the PC 61
3.2.4 Saving as a script on the PC 62
4 Loading Software Updates 63
4.1 Loading the Software manually from the ACA 65
4.1.1 Selecting the software to be loaded 66
4.1.2 Starting the software 67
4.1.3 Performing a cold start 67
4.2 Automatic software update by ACA 68
4.3 Loading the software from the tftp server 70
4.4 Loading the Software via File Selection 72
5 Configuring the Ports 73
6 Protection from Unauthorized Access 77
6.1 Protecting the device 78
6.2 Password for SNMP access 79
6.2.1 Description of password for SNMP access 79
6.2.2 Entering the password for SNMP access 80
6.3 Telnet/Web/SSH Access 84
6.3.1 Description of Telnet Access 84
6.3.2 Description of Web Access 84
6.3.3 Description of SSH Access 85
6.3.4 Enabling/disabling Telnet/Web/SSH Access 85
6.4 Restricted Management Access 87
6.5 HiDiscovery Access 89
6.5.1 Description of the HiDiscovery Protocol 89
6.5.2 Enabling/disabling the HiDiscovery Function 89
6.6 Port Authentication IEEE 802.1X 94
6.6.1 Description of Port Authentication according to IEEE 802.1X 94
6.6.2 Authentication Process according to IEEE 802.1X 95
6.6.3 Preparing the Device for the IEEE 802.1X Port Authentication 95
6.6.4 IEEE 802.1X Settings 96
7 Synchronizing the System Time in the Network 97
7.1 Entering the Time 98
Basic Configuration
4
Release 6.0 07/2010
Contents
7.2 SNTP 100
7.2.1 Description of SNTP 100
7.2.2 Preparing the SNTP Configuration 101
7.2.3 Configuring SNTP 102
7.3 Precision Time Protocol 106
7.3.1 Description of PTP Functions 106
7.3.2 Preparing the PTP Configuration 110
7.3.3 Application Example 112
7.4 Interaction of PTP and SNTP 117
8 Network Load Control 119
8.1 Direct Packet Distribution 120
8.1.1 Store-and-forward 120
8.1.2 Multi-Address Capability 120
8.1.3 Aging of Learned Addresses 121
8.1.4 Entering Static Addresses 122
8.1.5 Disabling the Direct Packet Distribution 123
8.2 Multicast Application 125
8.2.1 Description of the Multicast Application 125
8.2.2 Example of a Multicast Application 126
8.2.3 Description of IGMP Snooping 127
8.2.4 Setting IGMP Snooping 128
8.2.5 Description of GMRP 133
8.2.6 Setting GMRP 135
8.3 Rate Limiter 137
8.3.1 Description of the Rate Limiter 137
8.3.2 Rate Limiter Settings (PowerMICE and MACH 4000) 138
8.3.3 Rate Limiter settings for RS20/RS30/40, MS20/MS30, RSR20/RSR30, MACH 100, MACH 1000 and OCTOPUS 139
8.4 QoS/Priority 141
8.4.1 Description of Prioritization 141
8.4.2 VLAN tagging 142
8.4.3 IP ToS / DiffServ 144
8.4.4 Management prioritization 148
8.4.5 Handling of Received Priority Information 148
8.4.6 Handling of Traffic Classes 149
8.4.7 Setting prioritization 149
8.5 Flow Control 154
8.5.1 Description of Flow Control 154
8.5.2 Setting the Flow Control 156
8.6 VLANs 157
Basic Configuration
Release 6.0 07/2010
5
Contents
8.6.1 VLAN Description 157
8.6.2 Examples of VLANs 158
9 Operation Diagnosis 175
9.1 Sending Traps 176
9.1.1 List of SNMP Traps 177
9.1.2 SNMP Traps during Boot 178
9.1.3 Configuring Traps 179
9.2 Monitoring the Device Status 181
9.2.1 Configuring the Device Status 182
9.2.2 Displaying the Device Status 183
9.3 Out-of-band Signaling 184
9.3.1 Controlling the Signal Contact 185
9.3.2 Monitoring the Device Status via the Signal Contact 185
9.3.3 Monitoring the Device Functions via the Signal Contact 186
9.3.4 Monitoring the Fan 187
9.4 Port Status Indication 190
9.5 Event Counter at Port Level 191
9.5.1 Detecting Non-matching Duplex Modes 192
9.6 Displaying the SFP Status 196
9.7 TP Cable Diagnosis 197
9.8 Topology Discovery 198
9.8.1 Description of Topology Discovery 198
9.8.2 Displaying the Topology Discovery Results 200
9.9 Detecting IP Address Conflicts 203
9.9.1 Description of IP Address Conflicts 203
9.9.2 Configuring ACD 204
9.9.3 Displaying ACD 205
9.10 Detecting Loops 206
9.11 Reports 207
9.12 Monitoring Data Traffic at Ports (Port Mirroring) 209
9.13 Syslog 212
Basic Configuration
6
Release 6.0 07/2010
Contents
9.14 Event Log 215
A Setting up the Configuration Environment 217
B General Information 239
C Index 247
D Further Support 251
Basic Configuration
Release 6.0 07/2010
7
Contents
Basic Configuration
8
Release 6.0 07/2010

About this Manual

About this Manual
The “Basic Configuration” user manual contains the information you need to start operating the device. It takes you step by step from the first startup operation through to the basic settings for operation in your environment.
The following thematic sequence has proven itself in practice:
X Set up device access for operation by entering the IP parameters
X Check the status of the software and update it if necessary
X If a configuration already exists, load/store it
X Configure the ports
X Set up protection from unauthorized access
X Optimize the data transmission with network load control
X Synchronize system time in the network
X Function diagnosis
X Store the newly created configuration to nonvolatile memory
The “Installation” user manual contains a device description, safety instructions, a description of the display, and the other information that you need to install the device.
The “Redundancy Configuration” user manual contains the information you need to select a suitable redundancy procedure and configure that procedure.
The “Industry Protocols” user manual describes how the device is connected by means of a communication protocol commonly used in the industry, such as EtherNet/IP and PROFINET IO.
The "Web-based Interface" reference manual contains detailed information on using the Web interface to operate the individual functions of the device.
Basic Configuration
Release 6.0 07/2010
9
About this Manual
The "Command Line Interface" reference manual contains detailed information on using the Command Line Interface to operate the individual functions of the device.
The Network Management Software HiVision/Industrial HiVision provides you with additional options for smooth configuration and monitoring:
X Configuration of multiple devices simultaneously. X Graphical interface with network layouts. X Auto-topology discovery. X Event log. X Event handling. X Client / Server structure. X Browser interface X ActiveX control for SCADA integration X SNMP/OPC gateway
10
Basic Configuration
Release 6.0 07/2010
Key
Key
The designations used in this manual have the following meanings:
X List
Work step
Link Indicates a cross-reference with a stored link
Note: A note emphasizes an important fact or draws your
Courier ASCII representation in user interface
Execution in the Web-based Interface user interface Execution in the Command Line Interface user interface
Subheading
attention to a dependency.
Symbols used:
WLAN access point
Router with firewall
Switch with firewall
Router
Switch
Basic Configuration
Release 6.0 07/2010
11
Key
Bridge
Hub
A random computer
Configuration Computer
Server
PLC ­Programmable logic controller
I/O ­Robot
12
Basic Configuration
Release 6.0 07/2010

Introduction

Introduction
The device has been developed for practical application in a harsh industrial environment. Accordingly, the installation process has been kept simple. Thanks to the selected default settings, you only have to enter a few settings before starting to operate the device.
Note: The changes you make in the dialogs are copied into the volatile memory of the device when you click on "Set". To save the changes into the permanent memory of the device select the non-volatile memory location in the Basic Settings:Load/Save dialog and click "Save".
Basic Configuration
Release 6.0 07/2010
13
Introduction
14
Basic Configuration
Release 6.0 07/2010
Access to the user interfaces

1 Access to the user interfaces

The device has 3 user interfaces, which you can access via different interfaces:
X System monitor via the V.24 interface (out-of-band)
X Command Line Interface (CLI) via the V.24 connection (out-of-band) as
well as Telnet or SSH (in-band)
X Web-based interface via Ethernet (in-band).
Basic Configuration
Release 6.0 07/2010
15
Access to the user interfaces
1.1 System Monitor
The system monitor enables you to
X select the software to be loaded
X perform a software update
X start the selected software
X shut down the system monitor
X delete the configuration saved and
X display the boot code information.

1.1 System Monitor

Opening the system monitor
Use the terminal cable (see accessories) to connect
the V.24 socket (RJ11) to – a terminal or a COM port of a PC with terminal emulation based on
VT100
(for the physical connection, see the "Installation" user manual).
Speed 9,600 Baud Data 8 bit Parity none Stopbit 1 bit Handshake off
Table 1: Data transfer parameters
Start the terminal program on the PC and set up a connection with the
device.
When you boot the device, the message "Press <1> to enter System Monitor 1" appears on the terminal.
16
Basic Configuration
Release 6.0 07/2010
Access to the user interfaces
< Device Name (Boot) Release: 1.00 Build: 2005-09-17 15:36 >
Press <1> to enter System Monitor 1 ... 1
1.1 System Monitor
Figure 1: Screen display during the boot process
Press the <1> key within one second to start system monitor 1.
System Monitor
(Selected OS: L3P-01.0.00-K16 (2005-10-31 19:32))
1 Select Boot Operating System 2 Update Operating System 3 Start Selected Operating System 4 End (reset and reboot) 5 Erase main configuration file
sysMon1>
Figure 2: System monitor 1 screen display
Select a menu item by entering the number.To leave a submenu and return to the main menu of system monitor 1,
press the <ESC> key.
Basic Configuration
Release 6.0 07/2010
17
Access to the user interfaces

1.2 Command Line Interface

1.2 Command Line Interface
The Command Line Interface enables you to use the functions of the device via a local or remote connection. The Command Line Interface provides IT specialists with a familiar environment for configuring IT devices. The script compatibility of the Command Line Interface enables you, among other things, to feed multiple devices with the same configuration data, to create and apply partial configurations or to compare 2 configuration by comparing the script files.
You will find a detailed description of the Command Line Interface in the "Command Line Interface" reference manual.
You can access the Command Line Interface via
X the V.24 port (out-of-band) X Telnet (in-band) X SSH (in-band)
Note: To facilitate making entries, CLI gives you the option of abbreviating keywords. Type in the beginning of a keyword. When you press the tab key, CLI completes the keyword.
Opening the Command Line Interface
Connect the device to a terminal or to the COM port of a PC using
terminal emulation based on VT100 and press any key (see on
page 16 “Opening the system monitor“) or
call up the Command Line Interface via Telnet. A window for entering the user name appears on the screen. Up to five users can access the Command Line Interface.
18
Basic Configuration
Release 6.0 07/2010
Access to the user interfaces
Copyright (c) 2004-2009 Hirschmann Automation and Control GmbH
All rights reserved
PowerMICE Release L3P-05.1.00
(Build date 2009-10-11 12:13)
System Name: PowerMICE Mgmt-IP : 10.0.1.105
1.Router-IP: 0.0.0.0
Base-MAC : 00:80:63:51:74:00 System Time: 2009-10-11 13:14:15
User:
1.2 Command Line Interface
Figure 3: Logging in to the Command Line Interface program
Enter a user name. The default setting for the user name is admin .
Press the Enter key.
Enter the password. The default setting for the password is private .
Press the Enter key. You can change the user name and the password later in the Command Line Interface. Please note that these entries are case-sensitive.
The start screen appears.
Basic Configuration
Release 6.0 07/2010
19
Access to the user interfaces
NOTE: Enter '?' for Command Help. Command help displays all options that are valid for the 'normal' and 'no' command forms. For the syntax of a particular command form, please consult the documentation.
(Hirschmann Product) >
1.2 Command Line Interface
Figure 4: CLI screen after login
20
Basic Configuration
Release 6.0 07/2010
Access to the user interfaces

1.3 Web-based Interface

1.3 Web-based Interface
The user-friendly Web-based interface gives you the option of operating the device from any location in the network via a standard browser such as Mozilla Firefox or Microsoft Internet Explorer. As a universal access tool, the Web browser uses an applet which communicates with the device via the Simple Network Management Protocol (SNMP). The Web-based interface allows you to graphically configure the device.
Opening the Web-based Interface
To open the Web-based interface, you need a Web browser (a program that can read hypertext), for example Mozilla Firefox version 1 or later, or Microsoft Internet Explorer version 6 or later.
Note: The Web-based interface uses Java software 6 (“Java™ Runtime Environment Version 1.6.x”).
Install the software from the enclosed CD-ROM. To do this, you go to “Additional Software”, select Java Runtime Environment and click on “Installation”.
Figure 5: Installing Java
Basic Configuration
Release 6.0 07/2010
21
Access to the user interfaces
1.3 Web-based Interface
Start your Web browser.Check that you have activated JavaScript and Java in your browser
settings.
Establish the connection by entering the IP address of the device
which you want to administer via the Web-based management in the address field of the Web browser. Enter the address in the following form:
http://xxx.xxx.xxx.xxx
The login window appears on the screen.
Figure 6: Login window
Select the desired language.In the drop-down menu, you select
user, to have read access, or – admin, to have read and write access to the device.
The password "public", with which you have read access, appears in
the password field. If you wish to have write access to the device, then highlight the contents of the password field and overwrite it with the password "private" (default setting).
Click on OK.
Basic Configuration
22
Release 6.0 07/2010
Access to the user interfaces
1.3 Web-based Interface
The website of the device appears on the screen.
Note: The changes you make in the dialogs are copied to the device when you click "Set". Click "Reload" to update the display.
Note: You can block your access to the device by entering an incorrect configuration. Activating the function "Cancel configuration change" in the "Load/Save" dialog enables you to return automatically to the last configuration after a set time period has elapsed. This gives you back your access to the device.
Basic Configuration
Release 6.0 07/2010
23
Access to the user interfaces
1.3 Web-based Interface
24
Basic Configuration
Release 6.0 07/2010
Entering the IP Parameters

2 Entering the IP Parameters

The IP parameters must be entered when the device is installed for the first time.
The device provides 7 options for entering the IP parameters during the first installation:
X Entry using the Command Line Interface (CLI).
You choose this “out of band” method if
X you preconfigure your device outside its operating environment X you do not have network access (“in-band”) to the device
(see page 33 “Entering IP parameters via CLI“).
X Entry using the HiDiscovery protocol.
You choose this “in-band” method if the device is already installed in the network or if you have another Ethernet connection between your PC and the device
(see page 36 “Entering the IP Parameters via HiDiscovery“).
X Configuration using the AutoConfiguration Adapter (ACA).
You choose this method if you are replacing a device with a device of the same type and have already saved the configuration on an ACA(see
page 39 “Loading the system configuration from the ACA“).
X Using BOOTP.
You choose this “in-band” method if you want to configure the installed device using BOOTP. You need a BOOTP server for this. The BOOTP server assigns the configuration data to the device using its MAC address
(see page 41 “System configuration via BOOTP“). Because the device is
delivered with “DHCP mode” as the entry for the configuration data reference, you have to reset this to the BOOTP mode for this method.
X Configuration via DHCP.
You choose this “in-band” method if you want to configure the installed device using DHCP. You need a DHCP server for this. The DHCP server assigns the configuration data to the device using its MAC address or its system name (see page 46 “System Configuration via DHCP“).
Basic Configuration
Release 6.0 07/2010
25
Entering the IP Parameters
X Using DHCP Option 82.
You choose this “in-band” method if you want to configure the installed device using DHCP Option 82. You need a DHCP server with Option 82 for this. The DHCP server assigns the configuration data to the device using its physical connection (see page 49 “System Configuration via
DHCP Option 82“).
X Configuration via the Web-based interface.
If the device already has an IP address and can be reached via the network, then the Web-based interface provides you with another option for configuring the IP parameters.
26
Basic Configuration
Release 6.0 07/2010
Entering the IP Parameters

2.1 IP Parameter Basics

2.1 IP Parameter Basics
2.1.1 IP address (version 4)
The IP addresses consist of 4 bytes. These 4 bytes are written in decimal notation, separated by a decimal point.
Since 1992, five classes of IP address have been defined in the RFC 1340.
Class Network
address
A 1 byte 3 bytes 1.0.0.0 to 126.255.255.255 B 2 bytes 2 bytes 128.0.0.0 to 191.255.255.255 C 3 bytes 1 byte 192.0.0.0 to 223.255.255.255 D 224.0.0.0 to 239.255.255.255 E 240.0.0.0 to 255.255.255.255
Table 2: IP address classes
Host address Address range
The network address is the fixed part of the IP address. The worldwide leading regulatory board for assigning network addresses is the IANA (Internet Assigned Numbers Authority). If you require an IP address block, contact your Internet service provider. Internet service providers should contact their local higher-level organization:
X APNIC (Asia Pacific Network Information Center) - Asia/Pacific Region
X ARIN (American Registry for Internet Numbers) - Americas and Sub-
Sahara Africa
X LACNIC (Regional Latin-American and Caribbean IP Address Registry) –
Latin America and some Caribbean Islands
X RIPE NCC (Réseaux IP Européens) - Europe and Surrounding Regions
Basic Configuration
Release 6.0 07/2010
27
Entering the IP Parameters
Net ID - 7 bits Host ID - 24 bits0
I
I
I
0
I
III
0
III0
Net ID - 14 bits
Net ID - 21 bits
Multicast Group ID - 28 bits
reserved for future use - 28 b its
Class A
Class B
Host ID - 16 bits
Host ID - 8 bit s
Class C
Class D
Class E
2.1 IP Parameter Basics
Figure 7: Bit representation of the IP address
An IP address belongs to class A if its first bit is a zero, i.e. the first decimal number is less than 128. The IP address belongs to class B if the first bit is a one and the second bit is a zero, i.e. the first decimal number is between 128 and 191. The IP address belongs to class C if the first two bits are a one, i.e. the first decimal number is higher than 191.
Assigning the host address (host id) is the responsibility of the network operator. He alone is responsible for the uniqueness of the IP addresses he assigns.
2.1.2 Netmask
Routers and gateways subdivide large networks into subnetworks. The netmask assigns the IP addresses of the individual devices to a particular subnetwork.
The division into subnetworks with the aid of the netmask is performed in much the same way as the division of the network addresses (net id) into classes A to C.
The bits of the host address (host id) that represent the mask are set to one. The remaining bits of the host address in the netmask are set to zero (see the following examples).
28
Basic Configuration
Release 6.0 07/2010
Entering the IP Parameters
255.255.192.0
Decimal notation
11111111.11111111.11000000.00000000
Binary notation
Subnetwork mask bits Class B
129.218.65.17
Decimal notation
10000001.11011010.01000001.00010001
binary notation
128 < 129 191 Class B
Subnetwork 1 Network address
129.218.129.17
Decimal notation
10000001.11011010.10000001.00010001
binary notation
128 < 129 191 Class B
Subnetwork 2 Network address
Example of a netmask:
2.1 IP Parameter Basics
Example of IP addresses with subnetwork assignment when the above subnet mask is applied:
Basic Configuration
Release 6.0 07/2010
29
Entering the IP Parameters
Romeo
LAN 1
Lorenzo
LAN 2
Juliet
2.1 IP Parameter Basics
Example of how the network mask is used
In a large network it is possible that gateways and routers separate the management agent from its management station. How does addressing work in such a case?
Figure 8: Management agent that is separated from its management station by a
router
The management station "Romeo" wants to send data to the management agent "Juliet". Romeo knows Juliet's IP address and also knows that the router "Lorenzo" knows the way to Juliet.
Romeo therefore puts his message in an envelope and writes Juliet's IP address as the destination address. For the source address he writes his own IP address on the envelope.
Romeo then places this envelope in a second one with Lorenzo's MAC address as the destination and his own MAC address as the source. This process is comparable to going from layer 3 to layer 2 of the ISO/OSI base reference model.
Finally, Romeo puts the entire data packet into the mailbox. This is comparable to going from layer 2 to layer 1, i.e. to sending the data packet over the Ethernet.
30
Basic Configuration
Release 6.0 07/2010
Loading...
+ 264 hidden pages