Husky HME-423E, HME-421E User Manual

Page 1
HME-421E/423E
Industrial 4 10/100TX + 2 100FX
Extended Temperature
Managed Ethernet Switch
User’s Manual
7-24-2009
Page 2
Husky Series Industrial Ethernet Switch Solutions
HME-421E/423E Industrial Extended Temperature Managed Switch
User’s Manual
Copyright Notice
Copyright © 2009 Ethernet Direct Corp.
All rights reserved.
Reproduction in any form or by any means without Ethernet Direct prior written permission is prohibited.
Page 3
Table of Contents
Chapter 1 Introduction........................................................................................................................................... 1-1
1-1 Overview......................................................................................................................................... 1-1
1-2 Product Features ............................................................................................................................ 1-1
1-3 Package Checklist .......................................................................................................................... 1-2
Chapter 2 Hardware Installation........................................................................................................................... 1-1
2-1 Dimensions and Panel Layout ........................................................................................................ 2-1
2-2 LED Indicators ................................................................................................................................ 2-2
2-3 RJ-45 Ports ..................................................................................................................................... 2-2
2-3.1 RJ-45 Pin Assignments ........................................................................................................ 2-2
2-4 Fiber Ports ...................................................................................................................................... 2-3
2-5 Installing Your Ethernet Direct Switch ............................................................................................. 2-4
2-5.1 Mounting The Switch ............................................................................................................ 2-4
2-5.2 Wiring The Power Inputs ...................................................................................................... 2-5
2-5.3 Wiring The Fault Alarm Contact ........................................................................................... 2-6
2-5.4 Cabling ................................................................................................................................. 2-6
Chapter 3 Configuration Using Console Interface.............................................................................................. 3-1
3-1 Connecting Console Port ................................................................................................................ 3-1
3-2 Login The Console Interface........................................................................................................... 3-1
3-3 CLI Management ............................................................................................................................ 3-1
3-4 Command Levels ............................................................................................................................ 3-2
Chapter 4 Configuration Using a Web Browser.................................................................................................. 4-1
4-1 About Web-based Management Interface ...................................................................................... 4-1
4-2 Preparing for Web-based Management.......................................................................................... 4-1
4-3 System Login .................................................................................................................................. 4-1
4-4 Management Main Screen.............................................................................................................. 4-2
4-5 Basic Settings ................................................................................................................................. 4-2
4-5.1 System Information............................................................................................................... 4-2
4-5.2 Port Statistics........................................................................................................................ 4-3
4-5.3 User Authentication .............................................................................................................. 4-3
4-5.4 Fault Relay Alarm ................................................................................................................. 4-4
4-5.5 IP Configuration.................................................................................................................... 4-4
4-5.6 Updating Firmware by TFTP ................................................................................................ 4-5
4-5.7 Restoring Configurations by TFTP ....................................................................................... 4-5
4-5.8 Backing up Configurations by TFTP..................................................................................... 4-5
4-5.9 Saving Configuration Files ................................................................................................... 4-6
4-5.10 Factory Default.................................................................................................................... 4-6
4-5.11 Rebooting System................................................................................................................4-6
4-6 Advanced Management Settings....................................................................................................4-6
4-6.1 Port Control .......................................................................................................................... 4-6
4-6.2 Rate Limiting......................................................................................................................... 4-7
4-6.3 Port Mirroring........................................................................................................................ 4-8
4-6.4 DHCP Server........................................................................................................................ 4-8
4-6.5 DHCP Client ......................................................................................................................... 4-9
4-6.6 Port and IP Bindings by DHCP Server ................................................................................. 4-9
Page 4
4-6.7 System Event Log .............................................................................................................. 4-10
4-6.7.1 Syslog Configuration.............................................................................................. 4-10
4-6.7.2 SMTP Configuration................................................................................................4-11
4-6.7.3 Event Configuration ............................................................................................... 4-12
4-6.8
SNTP Configuration............................................................................................................ 4-13
4-6.9 IP Security .......................................................................................................................... 4-14
4-6.10 Port Trunking..................................................................................................................... 4-15
4-6.11 VLAN Configuration............................................................................................................ 4-19
4-6.11.1 Port-based VLAN ................................................................................................. 4-19
4-6.11.2 IEEE 802.1Q Tag-based VLAN ............................................................................ 4-21
4-6.11.2.1
4-6.11.2.2 Group Configuration ............................................................................. 4-23
4-6.12
QoS Configuration............................................................................................................. 4-24
4-6.13 IGMP Configuration........................................................................................................... 4-25
4-6.14 SNMP Configuration ......................................................................................................... 4-26
4-6.14.1 Community Strings............................................................................................... 4-26
4-6.14.2 Trap Configuration ............................................................................................... 4-27
4-6.14.3 SNMP v3 Configuration........................................................................................ 4-27
4-6.15
LLDP Configuration........................................................................................................... 4-30
4-6.16 Rapid Spanning Tree Protocol Configuration (RSTP)....................................................... 4-31
4-6.16.1 System Configuration........................................................................................... 4-31
4-6.16.2 Port Configuration ................................................................................................ 4-31
4-6.17
X-Ring Configuration......................................................................................................... 4-32
4-6.18 802.1X/Radius Configuration ............................................................................................ 4-34
4-6.18.1 System Configuration........................................................................................... 4-34
4-6.18.2 Port Configuration ................................................................................................ 4-35
4-6.18.3 Misc Configuration ............................................................................................... 4-35
4-6.19
MAC Address Table........................................................................................................... 4-36
4-6.19.1 Static MAC Address Settings ............................................................................... 4-36
4-6.19.2 MAC Filtering ....................................................................................................... 4-37
4-6.19.3 All MAC Addresses .............................................................................................. 4-37
4-6.19.4 Multicast Filtering ................................................................................................. 4-38
Chapter 5 Network Applications........................................................................................................................... 5-1
5-1 X-Ring Application........................................................................................................................... 5-1
5-2 Couple Ring .................................................................................................................................... 5-1
5-3 Dual Homing ................................................................................................................................... 5-2
5-4 Dual Ring ........................................................................................................................................ 5-4
Appendix A Specifications....................................................................................................................................A-1
Appendix B Troubleshooting................................................................................................................................B-1
Appendix C Command Set Lists...........................................................................................................................C-1
C-1 Commands Set List ........................................................................................................................C-1
C-2 System Commands Set ..................................................................................................................C-1
C-3 Port Commands Set .......................................................................................................................C-2
C-4 Trunk Commands Set .....................................................................................................................C-4
C-5 VLAN Commands Set.....................................................................................................................C-4
C-6 Spanning Tree Commands Set .......................................................................................................C-6
802.1Q Configuration ........................................................................... 4-21
Page 5
C-7 QoS Commands Set .......................................................................................................................C-7
C-8 IGMP Commands Set .....................................................................................................................C-7
C-9 Mac / Filter Table Commands Set...................................................................................................C-8
C-10 SNMP Commands Set..................................................................................................................C-8
C-11 Port Mirroring Commands Set.....................................................................................................C-10
C-12 802.1x Commands Set ...............................................................................................................C-10
C-13 TFTP Commands Set ................................................................................................................. C-11
C-14 SystemLog, SMTP and Event Commands Set........................................................................... C-12
C-15 SNTP Commands Set.................................................................................................................C-13
C-16 X-Ring Commands Set ...............................................................................................................C-13
Page 6
CChhaapptteerr 11
Introduction
Welcome to Husky Series HME-421E/423E Industrial Extended Temperature Managed Ethernet Switch.
This chapter includes the following topics:

z Overview z Product Features z Package Checklist

1-1 Overview
The Husky Series HME-421E/423E is a highly reliable and fault-tolerant Industrial 6-port Managed Ethernet Switch with four 10/100Base-T(X) Ethernet ports and two multi-mode/single-mode ports. With the SC type optic ports, HME-421E/423E transmits data at high speed for long distances up to 2km (multi-mode) or 30km (single-mode). With its high performance, HME-421E/423E provides redundant self-recovery mechanism in less than 10ms on full load which allows you to establish a redundant Ethernet network to build a backup ring topology. With powerful network management functions, HME-421E/423E can be remotely configured by a web browser, and managed by SNMP. Event notification can be defined via SNMP trap, Syslog, relay output or E-mail. Security is enhanced with advanced features like Port base VLAN, Tagged VLAN and IP security. Performance is optimized by Quality of Service and IGMP snooping/querying. The HME-421E/423E is equipped with a terminal block to provide dual power inputs with reverse polarity protection. Its IP-30 housing protection, wide operating temperature of -40 to 80 and DIN-Rail mounting is suitable for an industrial environment.
1-2 Product Features
HME-421E/423E has the following features:
High Performance Network Switching Technology
z Complies with IEEE 802.3, IEEE 802.3u, IEEE 802.3x, IEEE 802.3ad, IEEE 802.1p, IEEE 802.1Q,
IEEE 802.1D, IEEE 802.1x, IEEE 802.1AB
z Provides 4 x 10/100Base-T(X) Ethernet ports with RJ-45 connector z Provides 2 100Base-FX multi-mode SC type fiber port (HME-421E) z Provides 2 100Base-FX single-mode SC type fiber port (HME-423E) z RJ-45 ports support auto MDI/MDI-X crossover z Provides broadcast storm protection z Redundant X-Ring recovery time < 10ms on full load z Supports Dual Homing - RSTP over X-Ring z Supports Couple Ring z SNMP for network management z IGMP Snooping for multicast traffic z QoS/ToS to increase network packet determinism z VLAN for easy network planning z Event notification by email, SNMP trap, syslog & relay output z Online port mirroring for online debugging z Supports IP security z Configurable by web browser z IntraVUE network management software compatible
Robust Industrial Design
z Robust aluminum case complying to IP-30 housing standard z Supports extended temperature -40 to 80 z DIN-Rail, wall mounting installation z High level of immunity to electromagnetic interference & power supply surges typically found in
industrial plant environments or external curb side enclosures
Reliable Power Design
1-1
Page 7
Introduction
z Wide range redundant power design z Equipped with redundant power inputs z Supports 12 to 48VDC redundant power with polarity reverse protection z Removable terminal block
1-3 Package Checklist
HME-421E/423E is shipped with the following items:
z 1 x Husky Series HME-421E/423E Industrial Extended Temperature Managed Ethernet Switch z 1 x User’s manual z 1 x RS-232/RJ-45 cable z 2 x wall-mounting plates and 6 x screws z 1 x DIN-Rail mounting kit (attached to the HME-421E/423E’s back panel by default)
1-2
Page 8
CChhaapptteerr 22
Hardware Installation
This chapter contains information on HME-421E/423E’s dimensions and hardware installation. Topics include:

z Dimensions and Panel Layout

z LED Indicators
z RJ-45 Ports
z Fiber Ports
z Installing Your Ethernet Direct Switch
2-1 Dimensions and Panel Layout
Dimensions of HME-421E/423E Industrial Managed Switch are 72mm (W) x 106mm (D) x 152mm (H).
Front Panel
Side Panel Unit: mm
Back Panel Bottom Panel
2-1
Page 9
Hardware Installations
2-2 LED Indicators
There are diagnostic LEDs located on the front panel of HME-421E/423E. They provide primary information on switch status as described in the table below.
LED Name LED Color LED Function
Green Power is on.
PWR
PWR1
PWR2
Fault
R.M.
LNK/ACT
P1-P4
Off
Green Power is on.
Off
Green Power is on.
Off
Red
Off None of the above mentioned errors occurs.
Green This switch unit is the Ring Master.
Off This switch unit is NOT the Ring Master.
Green The fiber port is linked.
Blinking
Off The fiber port is not linked.
Orange The port is operating in full-duplex mode.
Blinking Orange Collision of packets occurs.
Off
Green The port is connected to a network.
Blinking Green
Off The port is not connected to a network.
Power is off or no power is being supplied to the switch.
Power is off or no power is being supplied to the switch.
Power is off or no power is being supplied to the switch.
One of the following errors occur:
z Power failure z UTP port failure z Fiber port failure
The port is transmitting or receiving packets from a TX device.
The port is in half-duplex mode or no device is attached.
The port is transmitting or receiving packets from a TX device.
2-3 RJ-45 Ports
HME-421E/423E has 4 10/100Mbps auto-sensing ports for 10Base-T or 100Base-TX devices connection. The UTP ports can auto-sense for 10Base-T or 100Base-TX connections. Auto MDI/MDIX function allows HME-421E/423E to connect to another switch or workstation without changing straight through or crossover
cabling. See Cabling section for straight through and crossover cable schematic.
2-3.1 RJ-45 Pin Assignments
RJ-45 pin assignments as described in the table below:
Pin Number Assignment
1 Tx+
2 Tx-
3 Rx+
6 Rx-
2-2
Page 10
Hardware Installations
“+” and “-” signs represent the polarity of the wires that make up each wire pair.
All ports on HME-421E/423E support automatic MDI/MDI-X function, users can use straight-through cables (see figure below) for all network connections to PCs or servers, or to other switches or hubs. When auto MDI/MDI-X is enabled, either type of cable can be used and the interface automatically corrects any incorrect cabling. The table below shows the 10Base-T/100Base-TX MDI and MDI-X port pinouts.
Pin MDI MDI-X
1 TD+ RD+
2 TD+ RD-
3 RD+ TD+
6 RD- TD-
Below are the illustrations of straight through connection and cross over connection.
Straight Through Cable Schematic
Cross Over Cable Schematic
2-4 Fiber Ports
HME-421E and HME-423E are equipped with SC type fiber ports. HME-421E has multi-mode fiber ports with connection distance up to 2km. HME-423E has single-mode fiber ports with connection distance up to 30km.
When you connect the fiber port to another one, please follow the figure below to connect accordingly. Wrong connection will cause the port not working properly.
2-3
Page 11
Hardware Installations
2-5 Installing Your Ethernet Direct Switch

Unpack the HME-421E/423E from the packing box. Please refer to Package Checklist section to see if any item is missing or damaged. The installation steps include Mounting The S witch, Wiring The Po wer Inputs,

Wiring The Fault Alarm Contact, and Cabling.
2-5.1 Mounting The Switch
The are two types of mounting options: DIN-Rail mounting, and wall mounting. Users can choose the most suitable mounting installation for your own onsite applications.
2-5.1.1 DIN-Rail Mounting
The DIN-Rail mounting kit is attached to the back panel of HME-421E/423E by default. If not, or users want to disassemble the DIN-Rail mounting kit from the HME-421E/423E, follow the steps below.
To attach the DIN-Rail mounting kit:
1. Screw the DIN-Rail kit to the position shown in the figure below.
2. To detach DIN-Rail kit from the switch, reverse the step 1.
Follow the steps below for mount the switch onto the track.
1. Insert the top of DIN-Rail plate into the track.
2. Lightly push the DIN-Rail plate into the track.
2-4
Page 12
Hardware Installations
3. Check if the DIN-Rail is tightened on the track or not.
4. To remove the switch from the track, reverse steps above.
2-5.1.2 Wall Mounting
Follow the steps below for wall-mounting installation.
1. Remove the DIN-Rail plate from the switch; loosen the screws to remove the DIN-Rail plate.
2. Place the wall mounting plate on the back panel of the switch.
3. Use the screws to screw the wall mounting plates on the switch.
4. Use the hook holes at the corners of the wall mounting plates to place the switch on the wall.
5. To remove the wall mounting plate, reverse the steps above.
2-5.2 Wiring The Power Inputs
Follow the steps below to wire the power inputs.
Be sure to disconnect the power cord before installing and/or wiring your switch. Be sure of the maximum possible current when wiring connections. If the current goes above
the maximum ratings, the wire could overheat and result in serious damage to your switch.
1. Insert the positive and negative wires of your DC supply into the corresponding V+ and V- contacts of the terminal block.
2. Tighten the screws to prevent the DC wires from coming detached.
2-5
Page 13
Hardware Installations
The acceptable wire range is 12 to 24 AWG. After the wiring the power inputs, the PWR LED will light up. Please refer to LED Indicators
section for more information.
2-5.3 Wiring The Fault Alarm Contact
The fault alarm contacts are the two middle terminals located on the terminal block as show in the figure below. It detects errors such as power failure or port break and sends an alarm signal when faults occur. By default, the fault alarm contacts will form a closed circuit under normal operation. The contacts will open when power failures or port breaks are detected. See below steps for wiring the fault alarm contact, and the illustration of how fault alarm contact function works.
1. Insert the wires into the two middle terminals. Tighten the screws to prevent the wires from coming detached.
The acceptable wire range is 12 to 24 AWG.
2-5.4 Cabling
For RJ-45 port connection, prepare twisted-paired, straight through Category 5 cables for Ethernet connection. The linking distance between the switch and the network device must be less than 100 meters (328 ft.).
For single-mode fiber connection, a 9/125µm single-mode fiber cables must be used. The maximum linking distance can be up to 30km.
For multi-mode fiber connection, a 50 or 62.5/125µm multi-mode fiber cable must be used. The maximum linking distance can be up to 2km.
The UTP port (RJ-45) LED(s) on the switch will light up when the cable is connected with the network device. Please refer to the LED Indicators section for more information.
2-6
Page 14
Hardware Installations
Before connecting any network device, make sure network devices support auto MDI/MDI-X. If not support, use the cross over Category 5 cables.
After all wiring and connection are done and the LED lights on the switch’s front panel show normal status, the hardware installation is complete.
2-7
Page 15
CChhaapptteerr 33
Configuration Using Console Interface
This chapter describes how to configure HME-421E/423E using the console interface. The topics include:

z Connecting Console Port

z Login the Console Interface

z CLI Management
3-1 Connecting Console Port
Take out the RS-232/RJ-45 cable that comes with the HME-421E/423E package, connect the RS-232 end to a PC or a terminal, and connect the RJ-45 end to the console port of HME-421E/423E. The linked PC or terminal must support the terminal emulation program.
3-2 Login The Console Interface
After the connection between the PC/terminal and the HME-421E/423E is successfully established, turn on the PC/terminal and run a terminal emulation program or Hyper Terminal to configure its communication parameters to match the following default settings of the console port:
Baud Rate 9600bps Data Bits 8 Parity None Stop Bit 1 Flow Control none
After finishing the parameter settings, click OK. When the blank screen shows up, press Enter key to bring out the login prompt. Key in root (default value) for the both User name and Password (use Enter key to switch), then press Enter key and the Main Menu of console management will appear. Please see below
figure for login screen.
3-3 CLI Management
The system supports the console management – CLI command. After logging into the system, you will see a
3-1
Page 16
Configuration Using Console Interface
command prompt. To enter CLI management interface, type in enable command. Please see below figure
for CLI command interface.
3-4 Command Levels
The table below lists the command levels. For Command Set Lists, please refer to Appendix C.
Modes Access Meth od Prompt Exit Method About This Mode
User EXEC Begin a session
with your switch.
Privileged EXEC
Global Configuration
VLAN database
Interface configuration
Enter the enable
command while in User EXEC mode.
Enter the
configure
command while in privileged EXEC mode.
Enter the vlan
database
command while in privileged EXEC mode.
Enter the interface of fast Ethernet command (with a specific interface) while in global configuration mode.
switch> Enter logout or
quit.
switch# Enter disable to
exit.
switch (config)#
switch (vlan)#
switch (config-if)#
To exit to privileged EXEC
mode, enter exit or end.
To exit to user EXEC mode,
enter exit.
To exit to global configuration
mode, enter exit.
To exit to privileged EXEC
mode, enter exit or end.
The user commands available at the user level are a subset of those available at the privileged level.
Use this mode to
• Perform basic tests.
• Display system information.
The privileged command is the advanced mode.
Use this mode to
• Display advanced function status.
• Save configuration
Use this mode to configure those parameters that are going to be applied to your switch.
Use this mode to configure VLAN-specific parameters.
Use this mode to configure parameters for the switch and Ethernet ports.
3-2
Page 17
CChhaapptteerr 44
Configuration Using a Web Browser
This chapter contains information on how to configure your HME-421E/423E via a web browser. The topics include:

z About Web-based Management Interface

z Preparing for Web-based Management

z System Login
z Management Main Screen
z Basic Settings
z Advanced Management Settings
4-1 About Web-based Management Interface
HME-421E/423E offers an easy-to-use management interface, which allows users to manage the HME-421E/423E via a standard web browser such as IE from anywhere on the network.
This web-based management interface supports Internet Explorer 6.0 or later version. Java Applets is also applied for reducing network bandwidth consumption, enhancing access speed and presenting an easy-viewing screen.
4-2 Preparing for Web-based Management
Before using web-based management interface, install the HME-421E/423E onto the network and make sure that any one of PC on the network can access the HME-421E/423E through a web browser. The default settings of IP address, subnet mask, username, and password of the HME-421E/423E are as follows:
IP Address 192.168.16.1 Subnet Mask 255.255.255.0 Default Gateway 192.168.16.254 User Name root Password root
4-3 System Login
Follow the steps below to login into the web-based management interface.
1. Launch the web browser.
2. Key in the default IP address in the web address box and press Enter.
3. The login window will appear.
4. Key in the user name and the password. The default username and password is root.
5. Press Enter or click OK, the main screen of web-based management interface will then appear. Please refer to the Management Main Screen section for more information.
4-1
Page 18
Configuration Using a Web Browser
4-4 Management Main Screen
See below for the web-based management interface main screen. The function menu is located on the left hand side of this entrance page.
4-5 Basic Settings
This section covers the most commonly used configurations for maintain and control HME-421E/423E.
4-5.1 System Information
This feature allows you to assign the system name and location, and to view the system information.
System Name
System Description
System Location
System Contact
Firmware Version To display the switch’s firmware version. Kernel Version To display the switch’s kernel software version.
MAC Address
Use this feature to assign a name for the switch. The maximum length is 64 bytes.
To display the description of the switch. This is READ ONLY information. It cannot be modified.
Use this feature to specify the physical location of the switch. The maximum length is 64 bytes.
To provide the information of the contact person in case of problems. Use this feature to enter the contact person info responsible for maintain this switch.
To display the unique hardware address assigned by Ethernet Direct (default).
4-2
Page 19
4-5.2 Port Statistics
The feature allows users to view the information of the port statistics.
Port This column shows port number. Type This column shows the current connection speed of the port. Link This column shows the link status, either Up or Down.
This column shows whether the port is enabled or disabled. When the
State
port is disabled, no packet will be transmitted or received by this port. To
enable or disable ports, please refer to Port Control section for more
information.
Tx Good Packet This column shows the number of good packets transmitted by this port.
This column shows the number of bad packets transmitted by this port,
Tx Bad Packet
including undersized packets (less than 64 octets), oversized packets, CRC Align errors, fragmented and jabber packets.
Rx Good Packet This column shows the number of good packets received by this port.
This column shows the number of bad packets received by this port,
Rx Bad Packet
including undersized packets (less than 64 octets), oversized packets, CRC Align errors, fragmented and jabber packets.
Tx Abort Packet This column shows the number of aborted packets while transmitting. Packet Collision This column shows the number of collision packets. Packet Dropped The column shows the number of dropped packets. RX Bcast Packet The column shows the number of broadcast packets. RX Mcast Packet The column shows the number of multicast packets.
Configuration Using a Web Browser
Click on Clear to remove the current values.
4-5.3 User Authentication
This feature allows the administrator to change the web management login user name and password for security reason.
User name Key in the new user name (the default username is root). Password Key in the new password (the default username is root). Confirm password Re-type the new password.
After finishing necessary configurations, click on Apply to save the settings.
4-3
Page 20
Configuration Using a Web Browser
4-5.4 Fault Relay Alarm
The Fault Relay Alarm function provides the Power Failure and Port Link Down/Broken detection. With both power input 1 and power input 2 installed and the check boxes of power 1/power 2 marked, the FAULT LED indicator will then be possible to light up when any one of the power failures occurs. As for the Port Link Down/Broken detection, the FAULT LED indicator will light up when the port failure occurs if the check box beside the port is marked. Please refer to the segment of ‘Wiring the Fault Alarm Contact’ for the failure detection.
Power Failure
Port Link Down/Broken
The FAULT LED on the front panel of the HME-421E/423E will light up when a power failure occurs if this box is checked.
The FAULT LED on the front panel of the HME-421E/423E will light up when a port link is down or broken if this box is checked.
After finishing necessary configurations, click on Apply to save the settings.
4-5.5 IP Configuration
This feature allows users to configure the IP settings and DHCP client function of the HME-421E/423E.
Use this feature to enable or disable the DHCP Client function. When DHCP Client is enabled, the HME-421E/423E will be assigned with an IP address from the network DHCP server. The default IP address will be
DHCP Client
IP Address
Subnet Mask
Gateway DNS1 Use this feature to assign the primary DNS IP address.
DNS2 Use this feature to assign the secondary DNS IP address.
replaced by the DHCP server-assigned IP address. After clicking on
Apply button, a popup window will show up. It is to inform the
administrator that when the DHCP Client is enabled, the current IP will no longer exist, and new one will be assigned by the DHCP server.
Use this feature to assign an IP address to the HME-421E/423E. The administrator will not need to assign an IP address to the HME-421E/423E if the DHCP Client function is enabled, and this column will show the IP address assigned by the DHCP server. The default IP is
192.168.16.1.
Use this feature to assign the subnet mask of the IP address. The administrator will not need to assign the subnet mask if the DHCP Client function is enabled.
Use this feature to assign the network gateway for the industrial switch. The default gateway is 192.168.16.254.
4-4
Page 21
Configuration Using a Web Browser
After finishing necessary configurations, click on Apply to save the settings.
4-5.6 Updatin g Firmware by TFTP
This feature allows the administrator to update the switch firmware. Before updating, make sure the TFTP server is ready and the firmware image is on the TFTP server.
TFTP Server IP Address Use this feature to fill in your TFTP server IP. Firmware File Name Use this feature to fill in the name of the firmware image.
After finishing necessary configurations, click on Apply to save the settings.
4-5.7 Restoring Configurations by TFTP
You can restore EEPROM value from the TFTP server. Before doing so, make sure the image file is already placed on TFTP server. The HME-421E/423E will download the flash image.
TFTP Server IP Address Use this feature to fill in your TFTP server IP. Firmware File Name Use this feature to fill in the correct file name to be restored.
After finishing necessary configurations, click on Apply to save the settings.
4-5.8 Backing up Configurations by TFTP
With this feature, the administrator can save the current configurations from the HME-421E/423E to the TFTP server, and then go to the TFTP restoration configuration page to restore the settings.
TFTP Server IP Address Use this feature to fill in your TFTP server IP. Firmware File Name Use this feature to fill in the file name.
4-5
Page 22
Configuration Using a Web Browser
After finishing necessary configurations, click on Apply to save the settings.
4-5.9 Saving Configuration Files
This feature allows the administrator to save all configurations made for the HME-421E/423E. Click Save to
save all of the HME-421E/423E’s settings to the flash memory.
4-5.10 Factory Default
This feature allows the administrator to reset the HME-421E/423E to the default settings. Click Reset to
reset all configurations to the default value.
4-5.11 Rebooting System
This feature allows the administrator to reboot the HME-421E/423E. Click Reboot to restart the switch.
4-6 Advanced Management Settings
This section covers the instructions on how to configure HME-421E/423E’s advanced management functions.
4-6.1 Port Control
This feature allows the administrator to configure each port’s settings and view the port status.
Port This column is for you to select the port that you want to configure.
This column shows the current port status, and also allows you to enable
State
Negotiation
or disable the port. If the port is disabled, no packet will be transmitted or received by this port.
This feature allows you to configure the negotiation function to be Auto
4-6
Page 23
Speed
Duplex
Flow Control
Security
Configuration Using a Web Browser
or Force. When Auto, the switch will auto-negotiate the speed and the duplex mode with the connected port. When Force, the administrator will have to manually configure the speed in the Speed column and the duplex mode in Duplex column to match with the connected port.
When Negotiation column is configured as Force, this column will be
available for you to choose the port link speed.
When Negotiation column is configured as Force, this column will be
available for you to choose the duplex mode of the port.
This feature allows the administrator to select flow control options. When
Disable, the receiving device will drop the packet if there is too much to process. When Enable, once the device exceeds the input data rate of
another device, the receiving device will send a PAUSE frame which halts the transmission of the sender for a specified period of time.
This feature allows the administrator to configure the security level for
managing this switch. If the security column is configured as On, the port will accept only the first MAC address entry in Static MAC Add ress table
to access this switch and change the switch settings. If the security
column is configured as Off, any MAC address can access the switch
and change the switch settings.
4-6.2 Rate Limiting
This feature allows the administrator to set up every port’s bandwidth rate and packet limitation type.
This feature allows the administrator to select the packet type that needs to be filtered for a certain port. The packet types available for selecting include:
¾ All
Ingress Limit Frame Type
Bandwidth
¾ Broadcast/Multicas t/Flooded Unicast ¾ Broadcast/Multicast ¾ Broadcast o nly
Broadcast/Multicast/Flooded Unicast, Broadcast/Multicast, and Broadcast only are only for ingress packets. The egress rate only
supports All type.
All ports support port ingress and egress rate control. For example, if port 1 runs at 10Mbps, the administrator can set its effective egress rate as 1Mbps, and ingress rate is 500Kbps. The switch performs the ingress rate by packet counter to meet the specified rate.
4-7
Page 24
Configuration Using a Web Browser
¾ Ingress: Enter the port effective ingress rate (The default value is
0).
¾ Egress for All: Enter the port effective egress rate (The default
value is 0).
After finishing necessary configurations, click on Apply to save the settings.
4-6.3 Port Mirroring
The feature allows the administrator to monitor and record the traffic of a specific port. The traffic goes in or out of the monitored ports will be duplicated into the mirror port.
There is only one port can be selected to be destination (mirror) port for monitoring both RX and TX traffic which come from source ports. Or, use
Destination Port
Source Port
one of two ports for monitoring RX traffic only and the other one for TX traffic only. The administrator can connect the mirror port to LAN analyzer.
The port(s) the administrator wants to monitor. All source port(s) traffic will be copied to the destination (mirror) port. The administrator can select up to 7 monitor ports in the switch. The administrator can select multiple source ports by checking the RX or TX boxes.
4-6.4 DHCP Server
DHCP stands for Dynamic Host Configuration Protocol, a protocol for assigning dynamic IP addresses to devices on a network. With dynamic addressing, a device can have a different IP address every time it connects to the network. In some systems, the device's IP address can even be changed while it is still connected. DHCP also supports a mix of static and dynamic IP addresses. Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather than requiring an administrator to manage the task. This means that a new computer can be added to a network without the
4-8
Page 25
Configuration Using a Web Browser
hassle of manually assigning it a unique IP address.
HME-421E/423E offers the DHCP server function. HME-421E/423E will be a DHCP server if the DHCP server function is enabled.
DHCP Server
This feature allows the administrator to enable or disable the HME-421E/423E to be a DHCP server on the local network.
This feature allows the administrator to define the low boundary of the IP
Low IP Address
address range that the DHCP server will assign to devices that request them.
This feature allows the administrator to define the high boundary of the IP
High IP Address
address range that the DHCP server will assign to devices that request them.
Subnet Mask
This feature is to define the subnet mask for the dynamic IP assign range.
Gateway This feature is to define the gateway in your network. DNS
This feature is to define the Domain Name Server IP Address in your network.
It is the time period that system will reset the dynamic IP assignment to
Lease Time (sec)
ensure the dynamic IP will not be occupied for a long time or the server doesn’t know that the dynamic IP is idle.
After finishing necessary configurations, click on Apply to save the settings.
4-6.5 DHCP Client
When the DHCP server function is active, the HME-421E/423E will collect the DHCP client information and display it here.
4-6.6 Port and IP Bindings by DHCP Server
This feature allows the administrator to pre-define a specific IP address within the dynamic IP range to a certain port. When a device connected to this certain port requests for an IP address, this pre-defined IP address will then be assigned to this connected device.
4-9
Page 26
Configuration Using a Web Browser
After finishing necessary configurations, click on Apply to save the settings.
4-6.7 System Event Log
4-6.7.1 Syslog Configuration
This feature allows the administrator to configure the ways of keeping the system log files, and define the system log server IP.
This feature allows the administrator to select the system log mode – client only, server only, or both S/C.
Client only: it means the system log will only be saved in the switch.
Syslog Client Mode
System Log Server IP Address
After finishing necessary configurations, click on Reload to refresh the event log, or click on Clear to erase all current event logs. And then click on Apply to save the settings.
The system log saved in the switch when the Client only mode is selected will be lost once
the switch is restarted.
Server only: it means the system log will only be saved in a connected
PC or server.
Both S/C: it means the system log will be saved in both the switch and
the PC.
This feature allows the administrator to assign the system log server IP.
4-10
Page 27
Configuration Using a Web Browser
4-6.7.2 SMTP Configuration
This feature allows the administrator to set up the mail server IP, mail account, account password, and forwarding email account for receiving the event alert.
Email Alert This feature is to enable or disable the email alert function. SMTP Server IP
Sender
This feature is to set up the mail server IP address (when Email Alert enabled, this function will then be available).
Type in an alias of the switch in complete email address format, e.g. switch101@123.com, to identify where the e-mail alert comes from.
Check the box to enable and configure the email account and password
Authentication
for authentication (when Email Alert is enabled, this function will then be available).
This feature is to set up the email account, e.g. johnadmin@123.com, to
Mail Account
receive the alert. It must be an existing email account on the mail server, which you set up in SMTP Server IP Address column.
Password Use this feature to set up the email account password. Confirm Password To reconfirm the password.
Rcpt e-mail Address 1-6
This feature is to assign up to 6 e-mail accounts which will also receive the alert.
After finishing necessary configurations, click on Apply to save the settings.
4-11
Page 28
Configuration Using a Web Browser
4-6.7.3 Event Configuration
This feature allows the administrator to pre-define the events which will trigger the system log to document errors occurred and send out alert messages. The administrator can select system log events and SMTP events. In addition, per port log and SMTP events can be selected too.
This feature allows the administrator to select events that will trigger the system to issue logs. Check the box to select the events.
There are four events available to pre-define:
Device cold start: when the device has a cold start action, the system
will issue a log event.
System event selection
Device warm start: when the device has a warm start action, the system
will issue a log event.
Authentication Failure: when the SNMP authentication fails, the system
will issue a log event.
X-Ring topology change: when the Redundant-Ring topology changes,
the system will issue a log event.
This feature allows the administrator to select per port events and per port SMTP events.
There are 3 events available to pre-define:
Link Up: the system will issue a log message when port connection is up.
Port event selection
Link Down: the system will issue a log message when port connection is
down.
Link Up & Link Down: the system will issue a log message when port
connection is up or down.
Disable: it means no event is selected.
4-12
Page 29
Configuration Using a Web Browser
4-6.8 SNTP Configuration
This feature allows the administrator to configure the SNTP (Simple Network Time Protocol) settings. The SNTP enables users to synchronize the switch clock in the Internet.
SNTP Client
This feature is to enable or disable SNTP function to acquire the time from the SNTP server.
This feature is to enable or disable daylight saving time function. When
Daylight Saving Time
daylight saving time function is enabled, it is required to configure the daylight saving time period.
UTC Timezone
This feature is to set the switch location time zone. The following table lists the different location time zones for reference.
Local Time Zone Conversion
from UTC
November Time Zone - 1 hour 11 am CET - Central European
Oscar Time Zone -2 hours 10 am EET - Eastern European,
ADT - Atlantic Daylight -3 hours 9 am BT - Baghdad, USSR Zone 2 +3 hours 3 pm
Time at 12:00 UTC
Local Time Zone Conversion
from UTC
+1 hour 1 pm
FWT - French Winter
MET - Middle European
MEWT - Middle European
Winter
SWT - Swedish Winter
+2 hours 2 pm
USSR Zone 1
Time at 12:00 UTC
AST - Atlantic Standard
EDT - Eastern Daylight
EST - Eastern Standard
CDT - Central Daylight
CST - Central Standard
MDT - Mountain Daylight
MST - Mountain Standard
PDT - Pacific Daylight
-4 hours 8 am ZP4 - USSR Zone 3 +4 hours 4 pm
-5 hours 7 am ZP5 - USSR Zone 4 +5 hours 5 pm
-6 hours 6 am ZP6 - USSR Zone 5 +6 hours 6 pm
-7 hours 5 am WAST - West Australian
Standard
+7 hours 7 pm
4-13
Page 30
Configuration Using a Web Browser
PST - Pacific Standard
ADT - Alaskan Daylight
ALA - Alaskan Standard -9 hours 3 am JST - Japan Standard,
HAW - Hawaiian Standard -10 hours 2 am EAST - East Australian
Nome, Alaska -11 hours 1 am IDLE - International Date
-8 hours 4 am CCT - China Coast, USSR
Zone 7
USSR Zone 8
Standard GST
Guam Standard, USSR
Zone 9
Line
NZST - New Zealand
Standard
NZT - New Zealand
+8 hours 8 pm
+9 hours 9 pm
+10 hours 10 pm
+12 hours Midnight
SNTP Sever URL This feature is to define the SNTP server IP address. Daylight Saving Period Daylight Saving Offset
(mins)
This feature is to set up the Daylight Saving beginning time and Daylight Saving ending time. Both will be different every year.
This feature is to set up the offset time.
Switch Timer This feature displays the switch current time.
After finishing necessary configurations, click on Apply to save the settings.
4-6.9 IP Security
IP security function allows the administrator to grant 10 specific IP addresses the access to the switches through a web browser.
IP Security Mode
Enable HTTP Server
Enable Telnet Server
When this option is enabled, the Enable HTTP Server and Enable Telnet Server check boxes will then be available.
When this option is checked, the IP addresses among Security IP1- IP10 will be allowed to access via HTTP service.
When this option is checked, the IP addresses among Security IP1-IP10 will be allowed to access via telnet service.
This feature allows the administrator to assign up to 10 specific IP
Security IP 1-10
addresses. Only these 10 IP addresses can access and manage the switch through a Web browser.
4-14
Page 31
Configuration Using a Web Browser
After finishing necessary configurations, click on Apply to save the settings.
4-6.10 Port Trunking
Port trunking is the combination of several ports or network cables to expand the connection speed beyond the limits of any one single port or network cable. Link Aggregation Control Protocol (LACP), which is a protocol running on layer 2, provides a standardized means in accordance with IEEE 802.3ad to bundle several physical ports together to form a single logical channel. All the ports within the logical channel or so-called logical aggregator work at the same connection speed and LACP operation requires full-duplex mode.
4-6.10.1 Aggregator Settings
This value is used to identify the active LACP. The switch with the
System Priority
Group ID
LACP
Work Ports
lowest value has the highest priority and is selected as the active LACP peer of the trunk group.
There are 3 trunk groups available for configuration. The
administrator can assign the Group ID to the trunk group.
When enabled, the trunk group is using LACP. A port which joins an LACP trunk group has to make an agreement with its member ports first. Please notice that a trunk group, including member ports distributed between two switches, has to enable the LACP function of the two switches. When disabled, the trunk group is a static trunk group. The advantage of having the LACP disabled is that a port joins the trunk group without any handshaking with its member ports; but member ports won’t know that they should be aggregated together to form a logic trunk group.
This column field allows the administrator to type in the total number of active ports up to four. With LACP trunk group, e.g. you assign four ports to be the members of a trunk group whose work ports column field is set as two; the exceed ports are standby/redundant ports and can be aggregated if working ports fail. If it is a static trunk group (non-LACP), the number of work ports must equal the total number of group member ports.
4-15
Page 32
Configuration Using a Web Browser
To add ports to a trunk group, select the wanted ports on the right hand side column, and click on Add.
To remove ports from a trunk group, selection the wanted ports on the left hand side column, and click on
Remove. After finishing necessary configurations, click on Apply to save the settings.
4-6.10.2 Aggregator Information
The settings in this feature will be different depending on whether LACP is enabled or disabled.
LACP Disabled
When LACP function is disabled in Aggregator Setting, the administrator will see the local static trunk
group information here.
Group Key This is a read-only column field that displays the trunk group ID. Port Member
This is a read-only column field that displays the members of this static trunk group.
4-16
Page 33
Configuration Using a Web Browser
LACP Enabled
When LACP function is enabled in Aggregator Setting, the administrator will see the trunk group
information here.
4-17
Page 34
Configuration Using a Web Browser
4-6.10.3 State Activity
When LACP is enabled, the State Activity feature will be available for configuration. The administrator can mark or unmark the check boxes next to the trunk group member ports to make the port state activity to be active or passive.
Active The port automatically sends LACP protocol packets. Passive
The port does not automatically send LACP protocol packets, and
4-18
Page 35
Configuration Using a Web Browser
responds only if it receives LACP protocol packets from the opposite device.
A link having two passive LACP nodes will not perform dynamic LACP trunk since both ports are waiting for an LACP protocol packet from the opposite device.
4-6.11 VLAN Configuration
A Virtual LAN (VLAN) is a logic networking group consisting of hosts with a common set of requirements that communicate as if they were attached to the broadcast domain, regardless of their physical location. VLAN allows for end stations to be grouped together even if they are not located on the same network switch. Network reconfiguration can be realized through software instead of physically relocating devices.
HME-421E/423E supports both port-based VLAN and IEEE 802.1Q (Tag-based) VLAN. HME-421E/423E
VLAN operation mode if Disable by default.
4-6.11.1 Port-based VLAN
A port-based VLAN is formed by a group of switch ports which are not necessary located on the same switch. A four-byte field in the header is used to identify the VLAN. Packets can go among only members of the same VLAN group. All unselected ports are treated as belonging to another single VLAN. If the port-based VLAN enabled, the VLAN-tagging will be ignored.
In order for an end station to send packets to different VLAN groups, it has to be either capable of tagging packets it sends with VLAN tags, or attached to a VLAN-aware bridge that is capable of classifying and
4-19
Page 36
Configuration Using a Web Browser
tagging the packet with different VLAN ID based on not only default PVID but also other information about the packet, such as the protocol.
Add To add a new VLAN group. The maximum number of VLAN groups is 64. Edit To modify a certain VLAN’s settings. Delete To delete a VLAN group. Next Page To view another VLAN group settings. Group Name To enter the name for this VLAN group.
4-20
Page 37
Configuration Using a Web Browser
After finishing necessary configurations, click on Apply to save the settings.
4-6.11.2 IEEE 802.1Q Tag-based VLAN
Tag-based VLAN is an IEEE 802.1Q standard which allows to create a VLAN across devices from different switch venders. IEEE 802.1Q VLAN uses a technique to insert a “tag” into the Ethernet frames. Tag contains a VLAN Identifier (VID) that indicates the VLAN numbers.
All ports on the switch belong to default VLAN, VID is 1. The default VLAN can’t be deleted. The maximum VLAN group is up to 64.
Virtual Local Area Network (VLAN) can be implemented on the switch to logically create different broadcast domain.
When the 802.1Q VLAN function is enabled, all ports on the switch belong to default VLAN of VID 1, which means they logically are considered as members of the same broadcast domain. The valid VLAN ID number ranges from 1 to 4094. The amount of VLAN groups is up to 256 including default VLAN that cannot be deleted.
Each member port of an 802.1Q VLAN group is on either an Access Link (non VLAN-tagged) or a Trunk Link (VLAN-tagged). All frames on an Access Link carry no VLAN identification, while all frames on a Trunk Link are VLAN-tagged. In addition to above-mentioned 2 types, there is the third mode—Hybrid. A Hybrid Link can carry both VLAN-tagged frames and untagged frames. A single port is supposed to belong to one VLAN group, except it is on a Trunk/Hybrid Link.
The technique of 802.1Q tagging inserts a 4-byte tag, including VLAN ID of the destination port—PVID, in the frame. With the combination of Access/Trunk/Hybrid Links, the communication across switches also can make the packet sent through tagged and untagged ports.
4-6.11.2.1 802.1Q Configuration
VLAN Operation Mode
Select 802.1Q from the drop down list to configure Tag-based VLAN settings.
Only when the VLAN members, whose Untagged VID (PVID) equals to
Management VLAN ID
the value in this column, will have the permission to access the switch.
The default value is 0, meaning this limit is not enabled (all members in
different VLANs can access this switch).
GVRP (GARP VLAN Registration Protocol) is a protocol that facilitates control of virtual local area networks (VLANs) within a larger network.
Enable GVRP
GVRP conforms to the IEEE 802.1Q specification, which defines a method of tagging frames with VLAN configuration data. This allows network devices to dynamically exchange VLAN configuration
4-21
Page 38
information with other devices. For example, with GVRP function enabled on two switches, the switches are able to automatically exchange the information of their VLAN database. Therefore, the administrator doesn’t need to manually configure whether the link is trunk or hybrid, the packets belonging to the same VLAN can communicate across switches. Mark this checkbox to enable GVRP protocol. This checkbox is available while the VLAN Operation Mode is in 802.1Q mode.
Port To select the port you want to configure
This feature allows the administrator to decide a certain port to be an Access Link, a Trunk Link, or a Hybrid Link.
¾ Access Link: A segment which provides the link path for one or more
stations to the VLAN-aware device. An Access Port (untagged port), connected to the access link, has an untagged VID (also called PVID). After an untagged frame gets into the access port, the switch will insert a four-byte tag in the frame. The contents of the last 12-bit of the tag is untagged VID. When this frame is sent out through any of the access port of the same PVID, the switch will remove the tag from the frame to recover it to what it was. Those ports of the same
Link Type
Untagged VID
Tagged VID
untagged VID are considered as the same VLAN group members.
¾ Trunk Link: A segment which provides the link path for one or more
VLAN-aware devices (switches). A Trunk Port, connected to the trunk link, has an understanding of tagged frame, which is used for the communication among VLANs across switches. Which frames of the specified VIDs will be forwarded depend on the values filled in the Tagged VID column field. Please insert a comma between two VIDs.
¾ Hybrid Link: A segment which consists of Access and Trunk links. The
hybrid port has both the features of access and trunk ports. A hybrid port has a PVID belonging to a particular VLAN, and it also forwards the specified tagged-frames for the purpose of VLAN communication across switches.
This column field is available when Link Type is set as Access Link or Hybrid Link. Assign a number ranging from 1 to 4094.
This column field is available when Link Type is set as Trunk Link or Hybrid Link. Assign a number ranging from 1 to 4094.
Configuration Using a Web Browser
After finishing necessary configurations, click on Apply to save the settings.
Since the access port doesn’t have an understanding of tagged frames, the column field of
Tagged VID will not be available when the port is configured as an Access Link.
1. A trunk port doesn’t insert tag into an untagged frame, and therefore the untagged VID column field is not available when the port is configured as a Trunk Link.
2. It’s not necessary to type ‘1’ in the tagged VID. The trunk port will forward the frames of VLAN 1.
3. The trunk port has to be connected to a trunk/hybrid port of the other switch. Both the tagged VID of the two ports have to be the same.
1. It’s not necessary to type ‘1’ in the tagged VID. The hybrid port will forward the frames of VLAN 1.
2. The hybrid port has to be connected to a trunk/hybrid port of the other switch. Both the tagged VID of the two ports have to be the same.
4-22
Page 39
Configuration Using a Web Browser
4-6.11.2.2 Group Configuration
This feature allows the administrator to edit the existing VLAN groups.
Select the VLAN group that you want to modify, and click on Edit. You can modify the VLAN Group Name,
and VLAN ID.
4-23
Page 40
Configuration Using a Web Browser
After finishing necessary configurations, click on Apply to save the settings.
4-6.12 QoS Configuration
Quality of Service (QoS) helps prioritizing traffic. High priority packets will be transmitted or processed first, making sure your network reliability and stability.
QoS Policy
Priority Type
This feature allows the administrator to select QoS policy.
Use an 8, 4, 2, 1 weighted fair queuing scheme:
The switch will follow 8:4:2:1 proportion to process priority queue from the highest to the lowest. For example: the switch will process 8 highest priority packets first, and then 4 second highest priority packets, and then 2 low priority packets, and then the 1 lowest priority packets.
Use the strict priority scheme:
The switch will process the packets with the highest priority first. The switch won’t continue to process the second highest priority packets until the highest priority ones have been all processed.
This feature allows the administrator to configure each port’s priority type. There are 5 types available:
¾ Port-based: this port priority will follow the default port priority that
administrator has configured: High, middle, low, or lowest
¾ COS only: this port priority will only follow the COS priority rules that
administrator has configured.
¾ TOS only: this port priority will only follow the TOS priority rules that
administrator has configured.
¾ COS first: this port priority will follow the COS priority rules that
administrator has configured first, and then follow other priority rules.
¾ TOS first: this port priority will follow the TOS priority rules that
administrator has configured first, and then follow other priority rules.
Port-based Priority
COS Priority
TOS Priority
This feature allows the administrator to configure each port’s default port priority. There 4 types of priority available: High, Middle, Low, Lowest.
This feature allows the administrator to configure the COS priority level 0 to 7.
The switch provides 0 to 63 TOS priority levels. Each level has 4 types of priority – high, mid, low, and lowest. The default priority value is “Lowest” for each level. When an IP packet is received, the switch will check the TOS level value in the IP packet received. For example: the administrator
4-24
Page 41
Configuration Using a Web Browser
set the TOS level 25 to be high. The port 1 is following the TOS priority policy only. When the packet received by port 1, the switch will check the TOS value of the received IP packet. If the TOS value of received IP packet is 25 (priority = high), and then the packet priority will have the highest priority.
QoS and Rate Limiting function cannot be enabled at the same time.
After finishing necessary configurations, click on Apply to save the settings.
4-6.13 IGMP Configuration
The Internet Group Management Protocol (IGMP) is an internal protocol of the Internet Protocol (IP). IGMP Snooping mode allows the switch to forward multicast packets to appropriate ports. The switch will detect IGMP queries when multicast packets come in and then report back with packets indicating which port is willing to accept the multicast packets. With this function, network traffic can be limited without unwanted packets being sent to certain ports. IGMP has three fundamental types of messages as follows:
Message Description Query
Report
A message sent from the querier (IGMP router or switch) asking for a response from each host belonging to the multicast group.
A message sent by a host to the querier to indicate that the host wants to be or is a member of a given group indicated in the report message.
4-25
Page 42
Configuration Using a Web Browser
Leave Group
A message sent by a host to the querier to indicate that the host has quit to be a member of a specific multicast group.
This feature allows the administrator to enable IGMP protocol and IGMP Query function. The administrator will see the IGMP snooping information in this section -- different multicast group VIDs and member ports, and IP multicast addresses range from 224.0.0.0 through 239.255.255.255.
After finishing necessary configurations, click on Apply to save the settings.
4-6.14 SNMP Configuration
Simple Network Management Protocol (SNMP) is used to monitor exchange of information among devices in a network system. HME-421E/423E supports SNMP v1/v2c/v3.
4-6.14.1 Community Strings
This function is to use community strings for authentication.
Strings This feature allows the administrator to enter a name for the string. RO
RW
RO means Read Only. This feature allows the requests accompanied by this string to display MIB-object information.
RW means Read & Write. This feature allows the requests accompanied by this string to display MIB-object information and to set MIB object.
This feature allows the administrator to select the SNMP version for
Agent Mode
necessary configuration. Click on the version option required, and then
click on Change to validate the settings.
After finishing necessary configurations, click on Apply to save the settings.
4-26
Page 43
Configuration Using a Web Browser
4-6.14.2 Trap Configuration
A trap manager is a management station that receives the trap messages generated by the switch. If no trap manager is defined, no traps will be issued. To define a management station as a trap manager, assign an IP address, enter the SNMP community strings, and select the SNMP trap version.
IP Address
Community Trap Version This feature allows the administrator to select the SNMP version.
After finishing necessary configurations, click on Apply to save the settings.
This feature allows the administrator to enter the IP address of the trap manager.
This feature allows the administrator to enter the community strings for trap stations.
4-6.14.3 SNMP v3 Configuration
SNMPv3 primarily added security and remote configuration enhancements to SNMP, including:
z Message integrity to ensure that a packet has not been tampered with in transit.
z Authentication to verify that the message is from a valid source.
z Encryption of packets to prevent snooping by an unauthorized source.
Please follow the steps below to configure SNMP v3 settings.
4-27
Page 44
Context Table
Configuration Using a Web Browser
Context Name
This feature allows the administrator to enter a name for this context table.
After finishing necessary configurations, click on Apply to save the settings.
User T able
User ID This feature allows the administrator to enter the user name. Authentication
Password
This feature allows the administrator to set up the authentication password.
Privacy Password This feature allows the administrator to set up the privacy password.
After finishing necessary configurations, click on Apply to save the settings.
Group Table
Security Name (User ID)
This feature allows the administrator to assign the user name that was
just set up in the User T ab l e.
Group Name This feature allows the administrator to set up the group name.
After finishing necessary configurations, click on Apply to save the settings.
4-28
Page 45
Configuration Using a Web Browser
Access Table
Context Prefix This feature allows the administrator to enter the context name. Group Name This feature allows the administrator to enter a group name.
This feature allows the administrator to select the access security level.
¾ NoAuthNoPriv.: no account authorization and no data encryption.
Security Level
¾ AuthNoPriv.: account authorization but no data encryption.
¾ AuthPriv.: account authorization and data encryption.
This feature allows the administrator to select the context match rule.
¾ Exact: the context must match the pre-configured settings.
Context Match Rule
¾ Prefix: only the first 5 letters of the context need to match the
pre-configured settings.
Read View Name This feature allows the administrator to enter a read view name. Write View Name This feature allows the administrator to enter a write view name. Notify View Name This feature allows the administrator to enter a notify view name.
After finishing necessary configurations, click on Apply to save the settings. MIBView Table
View Name This feature allows the administrator to set up a view name. Sub-Oid Tree This feature allows the administrator to fill in the Sub OID.
Type
This feature allows the administrator to select the type – excluded or included.
After finishing necessary configurations, click on Apply to save the settings.
4-29
Page 46
Configuration Using a Web Browser
4-6.15 LLDP Configuration
Link Layer Discovery Protocol (LLDP) is defined in the IEEE 802.1AB, which is an emerging standard providing a solution for the configuration issues caused by expanding LANs. LLDP specifically defines a standard for Ethernet network devices such as switches, routers and wireless LAN access points to advertise information about themselves to other nodes on the network and store the information they discover. LLDP runs on all 802 media. The protocol runs over the data-link layer only, allowing two systems running different network layer protocols to learn about each other.
LLDP Protocol This allows the administrator to enable or disable LLDP function. LLDP Interval
This allows the administrator to set the interval of advertising the switch’s information to other nodes on the network.
After finishing necessary configurations, click on Apply to save the settings.
4-30
Page 47
Configuration Using a Web Browser
4-6.16 Rapid Spanning Tree Protocol Configuration (RSTP)
The Rapid Spanning Tree Protocol (RSTP) is an evolution of the Spanning Tree Protocol and provides for faster spanning tree convergence after a topology change. HME-421E/423E also supports STP and will auto detect the connected device whether it is running STP or RSTP protocol.
4-6.16.1 System Configuration
The administrator can view the spanning tree information from the Root Bridge Information column.
This feature allows the administrator to enable or disable the RSTP
RSTP Mode
Priority (0-61440)
Max Age (6-40)
Hello Time (1-10)
Forward Delay Time (4-30)
function. The parameters will be available for configuration after the RSTP function is enabled.
This is the value used to identify the root bridge. The bridge with the lowest value has the highest priority and will be selected as the root. If this value has been changed, the switch must be rebooted for the new settings to be in effect. The value must be multiple of 4096 according to the protocol standard.
This value is the seconds a bridge waits for without receiving spanning tree messages before attempting to reconfigure. Enter a value between 6 and 40.
This value is the time in seconds that controls when the switch sends out the BPDU packet to check RSTP current status. Enter a value between 1 and 10.
This value is the time in seconds a port waits for before changing its Rapid Spanning Tree protocol learning and listening state to the forwarding state. Enter a value between 4 and 30.
After finishing necessary configurations, click on Apply to save the settings.
The administrator must follow the rule to configure the MAX Age, Hello Time, and Forward Delay Time:
2 x (Forward Delay Time value –1) > = Max Age value >= 2 x (Hello Time value +1).
4-6.16.2 Port Configuration
4-31
Page 48
Configuration Using a Web Browser
The administrator can use this interface to configure path cost and priority of every port.
Port Select the port that you want to configure.
This feature allows the administrator to configure the cost of the path to
Path Cost
the other bridge from this transmitting bridge at the specified port. Enter a number between 1 and 200000000.
This feature allows the administrator to configure which port should be
Priority
blocked by priority in LAN. Enter a number between 0 and 240. The value of priority must be the multiple of 16.
Some of the rapid state transactions that are possible within RSTP are dependent upon whether the port concerned can only be connected to exactly one other bridge (i.e. it is served by a point-to-point LAN
Admin P2P
segment), or can be connected to two or more bridges (i.e. it is served by a shared medium LAN segment). This function allows the P2P status of
the link to be manipulated administratively. True is to enable P2P function. False is to disable P2P.
Admin Edge
The port directly connected to end stations cannot create bridging loop in
the network. To configure the port as an edge port, set the port to True. The port includes the STP mathematic calculation. True is not including
Admin Non Stp
STP mathematic calculation. False is including the STP mathematic
calculation.
After finishing necessary configurations, click on Apply to save the settings.
4-6.17 X-Ring Configuration
HME-421E/423E provides redundant self-recovery mechanism named as X-Ring. When compared with the commercial standard redundant technologies like STP or RSTP, the X-Ring can effectively reduce the recovery time to less than 300ms. The Ring Topology must be applied to all the connected switches.
When all switches are connected in a ring topology with X-Ring function enabled, one of the switches will be appointed as “Ring Master.” The ring master will monitor the ring’s health to make sure the ring is working properly. Once a failure is detected by the ring master, the ring master will activate the blocked backup path within milliseconds to replace the faulty primary transmission path to make sure the ring will continue to work.
In the X-Ring topology, every switch should enable X-Ring function and assign two member ports to form the
4-32
Page 49
Configuration Using a Web Browser
ring. Only one switch in the X-Ring group would be set as a backup switch, and one of its two member ports on this backup switch would be blocked, called the backup port, while the other member port is called a working port. Other switches are called working switches and their two member ports are called working ports. When the network connection fails, the backup port will automatically become a working port to resume the connection.
HME-421E/423E has a R.M DIP switch on is front panel that would allow the administrator to configure this switch as the Ring Master or not. When the switch is set to be the Ring Master, the X-Ring configuration screen will display a message saying this switch is the Ring Master. The Ring Master will be responsible for negotiating and placing commands to other switches in the X-Ring group. If by accident there are 2 or more switches are being configured as the Ring Master, then the software will automatically select the switch with the lowest MAC address number as the Ring Master.
HME-421E/423E also supports Couple Ring, a power management function that allows 2 or more X-Ring groups to be connected to each other to offer more advanced redundancy. Dual Homing function is another advanced management feature that HME-421E/423E offers, an advanced redundancy network solution by connecting switches running in different redundant protocols such as IEEE 802.1w Rapid Spanning Tree Protocol and X-Ring to extend the network redundant coverage. HME-421E/423E also comes with a new advanced ring redundancy feature called Dual Ring. Dual Ring can handle 2 rings in the system and has the ability to recover from failure within 20 milliseconds.
Enable Ring
This feature allows the administrator o enable the X-Ring function. Mark the check box to enable the X-Ring function.
This feature allows the administrator to assign two ports as the X-Ring
1st & 2nd Ring Ports
group member ports. One of the ports will be the working port and the other port will be the backup port. The switch will automatically decide which port is the working port and which port is the backup port.
Enable Couple Ring
This feature allows the administrator to enable the Couple Ring function. Mark the check box to enable the Couple Ring function.
Couple Port This feature allows the administrator to assign the member port. Control Port
This feature allows the administrator to set the switch as the master switch in a Couple Ring topology.
This feature allows the administrator to set up one of the ports on the
Enable Dual Homing
switch to be the Dual Homing port. In an X-Ring group, maximum number of Dual Homing ports is one. Dual Homing will only work when the X-Ring function is enabled.
Homing Port
This feature allows the administrator to decide which port to be used as working port in a Dual Homing topology.
This feature allows the administrator o enable the Dual Ring function.
Enable Dual Ring
Mark the check box to enable the Dual Ring function. The difference between Dual Ring and Couple Ring is that Dual Ring only needs a unit to form a redundant connection of two rings.
After finishing necessary configurations, click on Apply to save the settings.
4-33
Page 50
Configuration Using a Web Browser
When the X-Ring function is enabled, RSTP function must be disabled. The X-Ring function and RSTP function cannot be in operation at the same time.

4-6.18 802.1X/Radius Configuration

802.1X is an IEEE standard, which provides port-based authentication. It involves communications between a supplicant, authenticator, and authentication server. The supplicant is often software on a client device, such as a laptop, the authenticator is a wired Ethernet switch or wireless access point, and an authentication server is generally a RADIUS database. The authenticator acts like a security guard to a protected network. The supplicant (i.e., client device) is not allowed access through the authenticator to the protected side of the network until the supplicant’s identity is authorized.
4-6.18.1 System Configuration
The administrator can use this interface to enable and configure 802.1X/Radius security function.
IEEE 802.1x Protocol This feature is to enable or disable IEEE 802.1X protocol. Radius Server IP This feature is to assign the RADIUS Server IP address.
Server Port
Accounting Port
Shared Key
NAS, Identifier This feature is to assign the identifier for the RADIUS client.
This feature is to set the UDP destination port for authentication requests to the specified RADIUS Server.
This feature is to set the UDP destination port for accounting requests to the specified RADIUS Server.
This feature is to set an encryption key for authentication with the specified RADIUS server. This key must match the encryption key used on the RADIUS Server.
4-34
Page 51
Configuration Using a Web Browser
After finishing necessary configurations, click on Apply to save the settings.
4-6.18.2 Port Configuration
The administrator can use this interface to enable and configure 802.1X authentication state for each port.
The available state options include Disable, Accept, Reject, and Authorize.
Reject The specified port is required to be held in the unauthorized state. Accept The specified port is required to be held in the authorized state.
The specified port is set to the Authorized or Unauthorized state in
Authorize
Disable
accordance with the outcome of an authentication exchange between the supplicant and the authentication server.
When disabled, the specified port works without complying with 802.1x protocol.
After finishing necessary configurations, click on Apply to save the settings.
4-6.18.3 Misc Configuration
The administrator can use this interface to configure the Misc settings.
Quiet Period
Tx Period
This feature is to set the time period which the port doesn’t try to acquire a supplicant.
This feature is to set the time period the port waits for retransmitting next EAPOL PDU during an authentication session.
4-35
Page 52
Supplicant Timeout
Server Timeout
Max Requests
Reauth Period
Configuration Using a Web Browser
This feature is to set the time period the switch waits for a supplicant response to an EAP request.
This feature is to set the time period the switch waits for a server’s response to an authentication request.
This feature is to set the number of authentication requests that must time out before authentication fails and the authentication session ends.
This feature is to set the time period after which the connected client devices must be re-authenticated.
After finishing necessary configurations, click on Apply to save the settings.
4-6.19 MAC Address Table
MAC address table can help define the authorization levels for certain devices on the network, and further secure the network integrity by preventing unauthorized access.
4-6.19.1 Static MAC Address Settings
You can add a static MAC address that remains in the switch's address table regardless of whether the device is physically connected to the switch. This saves the switch from having to re-learn a device's MAC address when the disconnected or powered-off device is active on the network again. With this interface, you can add/modify/delete a static MAC address.
This feature is to assign the MAC address to a certain port so that the
MAC Address
Port No. This feature is to select the port that the MAC address is assigned to.
packets destined or undestined to this MAC address will still or will not be forwarded regardless of the physical location of the device with this MAC address.
4-36
Page 53
Configuration Using a Web Browser
To delete a MAC address, simply select the MAC address, and then click on Delete.
4-6.19.2 MAC Filtering
By filtering MAC addresses, the switch can easily filter packets from unwanted MAC addresses, and further keep the network intact.
MAC Address Enter the MAC address that you want to filter.
To delete a MAC address, simply select the MAC address, and then click on Delete.
4-6.19.3 All MAC Addresses
You can view all of the MAC addresses learned by the selected port.
This feature is to select the port which you would like to see the MAC
Port No.
addresses assigned to it. The selected port’s static & dynamic MAC address information will then be displayed in the box below.
To clear the current MAC address information on this screen, click on Clear MAC Table.
4-37
Page 54
Configuration Using a Web Browser
4-6.19.4 Multicast Filtering
Multicasting is similar to broadcasting in a way that packets are all being sent to all end stations on a LAN or VLAN. Except multicasting only sends packets to the end stations that want to receive these packets. With multicast filtering, network devices only forward multicast traffic to the ports that are connected to the registered end stations.
IP Address
Member Ports
This feature is to assign a multicast group IP address in the range of
224.0.0.0 to 239.255.255.255.
To include a port into the multicast group, mark the check box next to the ports you want to include.
To delete a multicast group, simply select the multicast group, and then click on Delete.
4-38
Page 55
CChhaapptteerr 55
Network Applications
This chapter contains information on advanced network applications. The topics include:
z X-Ring Application
z Couple Ring Application
z Dual Homing Application
z Dual Ring Application
5-1 X-Ring Application
X-Ring is an advanced industrial redundant technology introduced by Ethernet Direct. When compared with the commercial standard redundant technologies like STP or RSTP, the X-Ring can effectively reduce the recovery time to less than 300ms. The ring topology must be applied to all the connected switches. When all switches are connected in a ring topology with X-Ring function enabled, on of the switches will be appointed as Ring Master. The Ring Master will monitor the ring’s health to make sure the ring is working properly. Once a failure is detected by the Ring Master, the Ring Master will activate the blocked backup path within milliseconds to replace the faulty primary transmission path to make sure the ring topology will continue to work. In addition, there are multiple Ring Masters allowed in the ring connections. Please see below figure 1 for the example of an X-Ring connection.
Figure 1 Example of X-Ring Connection Diagram
5-2 Couple Ring
In the real world implementation, there are cases that require two X-Ring groups to be connected together to ensure redundant protection. Couple Ring technology was introduced by Ethernet for this requirement. With Couple Ring function, each X-Ring group will need to assign two switches with 2 extra ports to achieve the structure. For this reason, the total switches needed for the Couple Ring to work will be four switches, and each switch is assigned with four ports for completing a Couple Ring (including the two X-Ring ports per switch). Please see below figure 2 for example of Couple Ring connection.
5-1
Page 56
Network Applications
Figure 2 Example of Couple Ring Connection
5-3 Dual Homing
Dual Homing provides an advanced redundancy network solution by connecting switches running in different redundancy protocols such as IEEE 802.1w Rapid Spanning Tree Protocol and X-Ring to extend the network redundant coverage. Dual Homing feature can ensure a single or two X-Ring groups with redundant backup when connected to a backbone switch. Redundancy is achieved by connecting two ports from two separate switches using X-Ring ring protocol with two ports of managed switches using other redundancy protocol. An active link where data is transmitted is connected with on port in the switch. The other port connected with another switch is a hot standby link. The hot standby link is being constantly monitored and it will be switched over within seconds once the active link is disconnected or broken. This approach can open up LAN design options and expand device choices. For example, it can permit any industrial PLC devices with Ethernet interfaces to be part of a resilient network. With the implementation of Dual Homing feature, the X-Ring group will be allowed to connect to these backbone core switches and without sacrificing its redundant protections. Below, we show an example of connection diagram on how Dual Homing can be connected with 1 or 2 X-Ring groups.
5-2
Page 57
Network Applications
Figure 3 Example of Dual Homing with 2 X-Ring Groups Connection (Straight Through Connection)
Figure 3 Example of Dual Homing with 2 X-Ring Groups Connection (Cross Through Connection)
In Dual Homing architecture, the RSTP protocol in the upper level switches needs to be enabled.
5-3
Page 58
Network Applications
5-4 Dual Ring
Although Ethernet Direct provides the Dual Homing technology for the industrial customers who may need to connect their switches from a field environment to the centralized backbone, some users may not deploy Cisco or HP switches. In some application cases, customers would like their backbone switches to be the same as those switches in their field environment equipped with industrial-grade protection and yet serve as the backbone network. Considering the needs, Ethernet Direct released new redundant technology called

Dual Ring.

The Dual Ring is recommended when the concern is “cost” or small projects with lesser amount of switches. Dual Ring allows the connection up to two ring groups to the central backbone and the configuration will only exist in those switches with minimum 8 ports availability.
Figure 4 Example of Dual Ring Connection Diagram
5-4
Page 59
AAppppeennddiixx AA
Specifications
HME-421E/423E Product Specifications are as follows:
Hardware
Interface
Total Ports 6 ports
RJ-45 ports 4 10/100Base-T(X) auto-negotiation speed, Full/Half duplex, auto
MDI/MDI-X
Fiber ports 2 10/100Base-FX SC type multi-mode (HME-421E)
2 10/100Base-FX SC type single-mode (HME-423E)
LEDs
Alarm Contact 1A@24VDC
Per Port Link/Activity (Green), Full duplex/Collision
(Orange)
Per Unit Power (Green), Power 1 (Green), Power 2
(Green), Fault (Orange), R.M.(Green)
Power Requirements
Power Input 12 to 48VDC redundant power with removable terminal block
Power Consumption 8.4 watts max.
Power Protection Power Reverse Polarity
Physical
Dimensions IP-30 standard, 54mm (W) x 105mm (D) x 135mm (H)
Installation DIN Rail mounting/Wall mounting
Environmental
Operating Temperature Extended: -40 to 80
Storage Temperature -40 to 85
Operating Humidity
Technology
Standard
5% to 95% RH (Non-condensing)
IEEE 802.3 10Base-T Ethernet
IEEE 802.3u 100Base-TX/100Base-FX
IEEE 802.3x Flow Control
IEEE 802.3ad Port trunk with LACP
IEEE802.1D Spanning Tree Protocol
IEEE802.1w Rapid STP
IEEE802.1p Class of Service
IEEE802.1Q VLAN Tagging
IEEE 802.1X User Authentication (Radius)
IEEE 802.1AB LLDP
Protocol Technology CSMA/CD
Switching Architecture Store and Forward
Regulatory Approvals
EMI FCC Class A
A-1
Page 60
EN 61000-4-2
EN 61000-4-3
EN 61000-4-4
EN 61000-4-5
EN 61000-4-6
EMS
EN 61000-4-8
EN 61000-4-11
EN 61000-4-12
EN 61000-6-2
EN 61000-6-4
Safety UL, cUL, CE/EN 60950-1
Shock IEC 60068-2-27
Vibration IEC 60068-2-6
Free Fall IEC 60068-2-32
Class 1 DIV 2 Pending
DNV Pending
Environmental WEEE, RoHS
MTBF 213,754 hrs based on Mil-Hdbk-217F, GB
Warranty 5 years
Specifications
Management Specifications
Redundancy X-Ring with recovery time < 10 ms
STP, RSTP, Dual Homing, Couple Ring, Dual Ring
Management SNMP v1/v2c/v3/Web/Telnet/CLI management
TFTP backup/restore configurations
One default button for system default settings
SNMP Trap Up to 3 Trap stations
Cold start
Port link up
Port link down
Authentication failure
Private Trap for power status
Port alarm configuration
Fault alarm, X-Ring
RFC Standard RFC 1215 Trap
RFC1213 MIBII
RFC 1157 SNMP MIB
RFC 1493 Bridge MIB
RFC 2674 VLAN MIB
RFC 1643
RFC 1757
RSTP MIB
Private MIB
VLAN Port based VLAN and Tag VLAN (256 entries)
VID: 1 to 4094
A-2
Page 61
Static VLAN groups up to 256
GVRP groups up to 256
OoS Port based and IEEE 802.1p
QoS determined by port, per port 4 queues
Tag and IPv4 ToS, IPv4/IPv6 DiffServ
IGMP IGMP v1 and v2 snooping
IGMP groups up to 256
Multicast filtering
Security Port Security: MAC address entries/filter
IP Security: IP address security to prevent unauthorized intruders
Remote Access Security: IEEE802.1X/RADIUS
Port Mirror RX, TX, and Both packet
Bandwidth Control Network packet filtering options
Ingress/Egress control per port
DHCP DHCP Client/DHCP Server
SMTP SMTP Client
Up to 6 E-mail accounts with pre-defined warning events
SNTP SNTP client to synchronize system clock from Internet
Firmware Upgrade By TFTP
Specifications
A-3
Page 62
AAppppeennddiixx BB
Troubleshooting
Make sure you are using the right power cord/adapter (DC 12-48V). Do not use power adapters with DC output higher than 48V. Or it will short circuit the switch.
Select the proper UTP cables to construct your network. Please check that you are using the right cables. Use unshielded twisted-pair (UTP) or shield twisted-pair (STP) cables for RJ-45 connections: 100 Category 3, 4 or 5 cables for 10Mbps connections, and 100 Category 5 cables for 100Mbps. Also be sure that the length of any twisted-pair connection does not exceed 100 meters (328 feet).
Diagnostic LED indicators located on the front panel of the switch can help users to easily monitor the switch.
IF the power indicator does not light on when the power cord is plugged in, you may have a problem with power cord. Then check for loose power connections, power losses or surges at power outlet. IF you still cannot resolve the problem, contact your local dealer for assistance.
If the switch LED indicators are normal, the cables are connected correctly, and the packets still cannot transmit, please check your system’s Ethernet devices’ configuration or status.
B-1
Page 63
C-1 Commands Set List
User EXEC
Privileged EXEC
Global configuration
VLAN database
Interface configuration
E P G V I
C-2 System Commands Set
Commands Level Description Example
show config
show terminal
write memory
system name
[System Name]
system location
[System Location]
system description
[System Description]
system contact
[System Contact]
show system-info
ip address
[Ip-address] [Subnet-mask] [Gateway]
ip dhcp
show ip
no ip dhcp
reload
default admin username
[Username]
admin password
[Password]
show admin
Show switch configuration
E
Show console information
P
Save user configuration
P
into permanent memory (flash rom)
Configure system name switch(config)#system name xxx
G
Set switch system
G
location string
Set switch system
G
description string
Set switch system contact
G
window string
Show system information switch>show system-info
E
Configure the IP address
G
of switch
Enable DHCP client
G
function of switch
Show IP information of
P
switch
Disable DHCP client
G
function of switch
Halt and perform a cold
G
restart
Restore to default switch(config)#default
G
Changes a login
G
username. (maximum 10 words)
Specifies a password
G
(maximum 10 words)
Show administrator
P
information
switch>show config switch#show terminal switch#write memory
switch(config)#system location xxx
switch(config)#system description xxx
switch(config)#system contact xxx
switch(config)#ip address 192.168.1.1
255.255.255.0 192.168.1.254
switch(config)#ip dhcp
switch#show ip
switch(config)#no ip dhcp
switch(config)#reload
switch(config)#admin username xxxxxx
switch(config)#admin password xx xxxx
switch#show admin
AAppppeennddiixx CC
Command Set Lists
C-1
Page 64
dhcpserver enable
Dhcpserver disable
dhcpserver lowip
[Low IP]
dhcpserver highip
[High IP]
dhcpserver subnetmask
[Subnet mask]
dhcpserver gateway
[Gateway]
dhcpserver dnsip
[DNS IP]
dhcpserver leasetime
[Hours]
dhcpserver ipbinding
[IP address]
show dhcpserver
configuration show dhcpserver clients
show dhcpserver ip-binding
no dhcpserver
security enable
security http
security telnet
security ip
[Index(1..10)] [IP Address]
show security
no security
no security http
no security telnet
Enable DHCP Server switch(config)#dhcpserver enable
G
Disable DHCP Server switch(config)#no dhcpserver
G
Configure low IP address
G
for IP pool
Configure high IP address
G
for IP pool
Configure subnet mask
G
for DHCP clients
Configure gateway for
G
DHCP clients
Configure DNS IP for
G
DHCP clients
Configure lease time (in
G
hour)
Set static IP for DHCP
I
clients by port
Show configuration of
P
DHCP server
Show client entries of
P
DHCP server
Show IP-Binding
P
information of DHCP server
Disable DHCP server
G
function
Enable IP security
G
function
Enable IP security of
G
HTTP server
Enable IP security of
G
telnet server
Set the IP security list switch(config)#security ip 1
G
Show the information of
P
IP security
Disable IP security
G
function
Disable IP security of
G
HTTP server
Disable IP security of
G
telnet server
switch(config)#dhcpserver lowip
192.168.1.100 switch(config)#dhcpserver highip
192.168.1.200 switch(config)#dhcpserver subnetmask
255.255.255.0 switch(config)#dhcpserver gateway
192.168.1.254 switch(config)#dhcpserver dnsip
192.168.1.1 switch(config)#dhcpserver leasetime 1
switch(config)#interface fastEthernet 2 switch(config)#dhcpserver ipbinding
192.168.1.1
switch#show dhcpserver configuration
switch#show dhcpserver clients
switch#show dhcpserver ip-binding
switch(config)#no dhcpserver
switch(config)#security enable
switch(config)#security http
switch(config)#security telnet
192.168.1.55 switch#show security
switch(config)#no security
switch(config)#no security http
switch(config)#no security telnet
Command Set Lists
C-3 Port Commands Set
Commands Level Description Example
interface fastEthernet
[Portid]
Choose the port for
G
modification.
C-2
switch(config)#interface fastEthernet 2
Page 65
duplex
[full | half]
speed
[10|100|1000|auto]
no flowcontrol
security enable
no security
Use the duplex
I
configuration command to specify the duplex mode of operation for Fast Ethernet.
Use the speed
I
configuration command to specify the speed mode of operation for Fast Ethernet. The speed can’t be set to 1000Mbps if the port isn’t a giga port.
Disable flow control of
I
interface
Enable security of
I
interface
Disable security of
I
interface
Command Set Lists
switch(config)#interface fastEthernet 2 switch(config-if)#duplex full
switch(config)#interface fastEthernet 2 switch(config-if)#speed 100
switch(config-if)#no flowcontrol
switch(config)#interface fastEthernet 2 switch(config-if)#security enable
switch(config)#interface fastEthernet 2 switch(config-if)#no security
bandwidth type all
bandwidth type
broadcast-multicast-flooded-
unicast
bandwidth type
broadcast-multicast
bandwidth type
broadcast-only
bandwidth in
[Value]
bandwidth out
[Value]
show bandwidth
Set interface ingress limit
I
frame type to “accept all frame”
Set interface ingress limit
I
frame type to “accept broadcast, multicast, and flooded unicast frame”
Set interface ingress limit
I
frame type to “accept broadcast and multicast frame”
Set interface ingress limit
I
frame type to “only accept broadcast frame”
Set interface input
I
bandwidth. Rate Range is from 100 kbps to 102400 kbps or to 256000 kbps for giga ports, and zero means no limit.
Set interface output bandwidth. Rate Range is from 100 kbps to 102400 kbps or to 256000 kbps for giga ports, and zero means no limit.
Show interfaces
I
bandwidth control
switch(config)#interface fastEthernet 2 switch(config-if)#bandwidth type all
switch(config)#interface fastEthernet 2 switch(config-if)#bandwid th type
broadcast-multicast-flooded-unicast
switch(config)#interface fastEthernet 2 switch(config-if)#bandwid th type broadcast-multicast
switch(config)#interface fastEthernet 2 switch(config-if)#bandwid th type broadcast-only
switch(config)#interface fastEthernet 2 switch(config-if)#bandwid t h in 100
switch(config)#interface fastEthernet 2 switch(config-if)#bandwid th out 100
switch(config)#interface fastEthernet 2 switch(config-if)#show bandwidth
state
[Enable | Disable]
Use the state interface
I
configuration command to specify the state mode of operation for Ethernet ports. Use the disable form of this command to disable the port.
switch(config)#interface fastEthernet 2 switch(config-if)#state Disable
C-3
Page 66
show interface configuration
show interface status
show interface accounting
no accounting
I
I
I
I
C-4 Trunk Commands Set
Show interface configuration status
Show interface actual status
Show interface statistic counter
Clear interface accounting information
Command Set Lists
switch(config)#interface fastEthernet 2 switch(config-if)#show interface configuration
switch(config)#interface fastEthernet 2 switch(config-if)#show interface sta tus
switch(config)#interface fastEthernet 2 switch(config-if)#show interface accounting
switch(config)#interface fastEthernet 2 switch(config-if)#no accounting
Commands
aggregator priority
[1~65535]
aggregator activityport
[Group ID]
[Port Numbers]
aggregator group
[GroupID] [Port-list]
lacp workp
[Workport]
aggregator group
[GroupID] [Port-list]
nolacp
show aggregator
Level
G
G
G
G
P
Description Example
Set port group system priority
Set activity port switch(config)#aggregator activityport
Assign a trunk group with LACP active. [GroupID]: 1~3 [Port-list]: Member port list. This parameter could be a port range (ex.1-4) or a port list separate by a comma (ex.2, 3, 6) [Workport]: The amount of work ports. This value could not be less than zero or be large than the amount of member ports.
Assign a static trunk group.
[GroupID]:1~3 [Port-list]: Member port
list. This parameter could be a port range (ex.1-4) or a port list separate by a comma ex.2, 3, 6)
Show the information of trunk group
switch(config)#aggregator priority 22
2
switch(config)#aggregator group 1 1-4 lacp workp 2 or switch(config)#aggregator group 2 1,4,3 lacp workp 3
switch(config)#aggregator group 1 2-4 nolacp or
switch(config)#aggregator group 1
3,1,2 nolacp
switch#show aggregator 1 or switch#show aggregator 2 or switch#show aggregator 3
no aggregator lacp
[GroupID]
no aggregator group
[GroupID]
Disable the LACP
G
function of trunk group
Remove a trunk group switch(config)#no aggreator group 2
G
switch(config)#no aggreator lacp 1
C-5 VLAN Commands Set
Commands Level Description Example
C-4
Page 67
vlan database
Vlanmode
[portbase| 802.1q | gvrp]
no vlan
Ported based VLAN configuration
vlan port-based grpname
[Group Name]
grpid
[GroupID]
port
[PortNumbers]
show vlan [GroupID] or
show vlan
no vlan group
[GroupID]
IEEE 802.1Q VLAN
vlan 8021q name
[GroupName]
vid
[VID]
vlan 8021q port
[PortNumber]
access-link untag
[UntaggedVID]
vlan 8021q port
[PortNumber]
trunk-link tag
[TaggedVID List]
vlan 8021q port
[PortNumber]
hybrid-link untag
[UntaggedVID]
tag
[TaggedVID List]
vlan 8021q trunk
[PortNumber]
access-link untag
[UntaggedVID]
vlan 8021q trunk
[PortNumber]
trunk-link tag
[TaggedVID List]
vlan 8021q trunk
[PortNumber]
P
V
V
V
V
V
V
V
V
V
V
V
V
Command Set Lists
Enter VLAN configure mode
To set switch VLAN mode.
No VLAN Switch(vlan)#no vlan
Add new port based VALN
Show VLAN information switch(vlan)#show vlan 23
Delete port base group ID switch(vlan)#no vlan group 2
Change the name of VLAN group, if the group didn’t exist, this command can’t be applied.
Assign a access link for VLAN by port, if the port belong to a trunk group, this command can’t be applied.
Assign a trunk link for VLAN by port, if the port belong to a trunk group, this command can’t be applied.
Assign a hybrid link for VLAN by port, if the port belong to a trunk group, this command can’t be applied.
Assign a access link for VLAN by trunk group
Assign a trunk link for
VLAN by trunk group
Assign a hybrid link for VLAN by trunk group
switch#vlan database
switch(vlan)#vlanmode portbase
or
switch(vlan)#vlanmode 802.1q
or
switch(vlan)#vlanmode gvrp
switch(vlan)#vlan port-based grpname
test grpid 2 port 2-4
or
switch(vlan)#vlan port-based grpname
test grpid 2 port 2,3,4
switch(vlan)#vlan 8021q name test vid 22
switch(vlan)#vlan 8021q port 3 access-link untag 33
switch(vlan)#vlan 8021q port 3 trunk-link tag 2,3,6,99
or
switch(vlan)#vlan 8021q port 3
trunk-link tag 3-20 switch(vlan)#vlan 8021q port 3
hybrid-link untag 4 tag 3,6,8
or
switch(vlan)#vlan 8021q port 3 hybrid-link untag 5 tag 6-8
switch(vlan)#vlan 8021q trunk 3 access-link untag 33
switch(vlan)#vlan 8021q trunk 3
trunk-link tag 2,3,6,99
or
switch(vlan)#vlan 8021q trunk 3
trunk-link tag 3-20 switch(vlan)#vlan 8021q trunk 3
hybrid-link untag 4 tag 3, 6,8
C-5
Page 68
hybrid-link untag
[UntaggedVID]
tag
[TaggedVID List]
show vlan [GroupID] or show vlan
no vlan group
[GroupID]
Show VLAN information switch(vlan)#show vlan 23
V
V
Delete port base group ID switch(vlan)#no vlan group 2
or
switch(vlan)#vlan 8021q trunk 3
hybrid-link untag 5 tag 6-8
C-6 Spanning Tree Commands Set
Commands Level Description Example
spanning-tree enable
spanning-tree priority
[0~61440]
spanning-tree max-age
[seconds]
spanning-tree hello-time
[seconds]
Enable spanning tree switch(config)#spanning-tree enable
G
Configure spanning tree
G
priority parameter
Use the spanning-tree
G
max-age global configuration command to change the interval between messages the spanning tree receives from the root switch. If a switch does not receive a bridge protocol data unit (BPDU) message from the root switch within this interval, it recomputes the Spanning Tree Protocol (STP) topology.
Use the spanning-tree
G
hello-time global configuration command to specify the interval between hello bridge protocol data units (BPDUs).
switch(config)#spanning-tree priority
32768 switch(config)#spanning-tree max-age
15
switch(config)#spanning-tree hello-time 3
Command Set Lists
spanning-tree forward-time
[seconds]
stp-path-cost
[1~200000000]
Use the spanning-tree
G
forward-time global configuration command to set the forwarding-time for the specified spanning-tree instances. The forwarding time determines how long each of the listening and learning states last before the port begins forwarding.
Use the spanning-tree
I
cost interface configuration command to
switch(config)#spanning-tree
forward-time 20
switch(config)#interface fastEthernet 2 switch(config-if)#stp-p ath-cost 20
C-6
Page 69
stp-path-priority
[Port Priority]
stp-admin-p2p
[Auto|True|False]
stp-admin-edge
[True|False]
stp-admin-non-stp
[True|False]
show spanning-tree
no spanning-tree
set the path cost for Spanning Tree Protocol (STP) calculations. In the event of a loop, spanning tree considers the path cost when selecting an interface to place into the forwarding state.
Use the spanning-tree
I
port-priority interface configuration command to configure a port priority that is used when two switches tie for position as the root switch.
Admin P2P of STP priority
I
on this interface.
Admin Edge of STP
I
priority on this interface.
Admin NonSTP of STP
I
priority on this interface.
Displays a summary of
E
the spanning-tree states.
Disable spanning-tree. switch(config)#no spanning-tree
G
switch(config)#interface fastEthernet 2 switch(config-if)#stp-pa th-priority 128
switch(config)#interface fastEthernet 2 switch(config-if)#stp-admin-p2p Auto
switch(config)#interface fastEthernet 2 switch(config-if)#stp-admin-edge True
switch(config)#interface fastEthernet 2 switch(config-if)#stp-admin-non-stp False
switch>show spanning-tree
Command Set Lists
C-7 QoS Commands Set
Commands Level Description Example
qos policy
[weighted-fair|strict]
qos prioritytype
[port-based|cos-only|tos-onl y|cos-first|tos-first]
qos priority portbased
[Port] [lowest|low|middle|high]
qos priority cos
[Priority][lowest|low|middle|h igh]
qos priority tos
[Priority][lowest|low|middle|h igh]
show qos
no qos
Select QoS policy
G
scheduling
Set up QoS priority type
G
Configure Port-based
G
priority
Configure COS Priority
G
Configure TOS Priority
G
Displays the information
P
of QoS configuration
Disable QoS function
G
switch(config)#qos policy weighted-fair
switch(config)#qos prioritytype
switch(config)#qos priority portbased 1 low
switch(config)#qos priority cos 0 middle
switch(config)#
switch#
switch(config)#
qos priority tos 3 high
show qos
no qos
C-8 IGMP Commands Set
Commands Level Description Example
igmp enable
Enable IGMP snooping
G
function
switch(config)#igmp enable
C-7
Page 70
Igmp-query auto
Igmp-query force
show igmp configuration
no igmp
no igmp-query
Set IGMP query to auto
G
mode
Set IGMP query to force
G
mode
Displays the details of an
P
IGMP configuration.
Disable IGMP snooping
G
function
Disable IGMP query switch#no igmp-query
G
switch(config)#Igmp-query auto
switch(config)#Igmp-query force
switch#show igmp configuration
switch(config)#no igmp
C-9 Mac / Filter Table Commands Set
Commands Level Description Example
mac-address-table static hwaddr
[MAC]
mac-address-table filter hwaddr
[MAC]
show mac-address-table
show mac-address-table static
show mac-address-table filter
no mac-address-table static hwaddr
[MAC]
no mac-address-table filter hwaddr
[MAC]
no mac-address-table
Configure MAC address
I
table of interface (static).
Configure MAC address
G
table(filter)
Show all MAC address
P
table
Show static MAC address
P
table
Show filter MAC address
P
table.
Remove an entry of MAC
I
address table of interface (static)
Remove an entry of MAC
G
address table (filter)
Remove dynamic entry of
G
MAC address table
switch(config)#interface fastEthernet 2 switch(config-if)#mac-address-table
static hwaddr 000012345678 switch(config)#mac-address-table filter
hwaddr 000012348678
switch#show mac-address-table
switch#show mac-address-table static
switch#show mac-address-table filter
switch(config)#interface fastEthernet 2 switch(config-if)#no mac-address-table static hwaddr 000012345678
switch(config)#no mac-address-t able filter hwaddr 000012348678
switch(config)#no mac-address-table
Command Set Lists

C-10 SNMP Commands Set

Commands Level Description Example
snmp system-name
[System Name]
snmp system-location
[System Location]
snmp system-contact
[System Contact]
snmp agent-mode
[v1v2c|v3|v1v2cv3]
snmp community-strings
[Community]
right
[RO/RW]
snmp-server host
[IP address]
Set SNMP agent system
G
name
Set SNMP agent system
G
location
Set SNMP agent system
G
contact
Select the agent mode of
G
SNMP
Add SNMP community
G
string.
Configure SNMP server
G
host information and community string
switch(config)#snmp system-name l2switch
switch(config)#snmp system-location lab
switch(config)#snmp system-contact where
switch(config)#snmp agent-mode v1v2cv3
switch(config)#snmp community-strings public right rw
switch(config)#snmp-server host
192.168.1.50 community public trap-version v1
C-8
Page 71
community
[Community-string]
trap-version
[v1|v2c]
snmpv3 context-name
[Context Name ]
snmpv3 user
[User Name]
group
[Group Name]
password
[Authentication Password] [Privacy Password]
snmpv3 access context-name [Context
Name ]
group
[Group Name ]
security-level
[NoAuthNoPriv|AuthNoPriv| AuthPriv]
match-rule
[Exact|Prifix]
views
[Read View Name] [Write View Name] [Notify View Name]
snmpv3 mibview view
[View Name]
type
[Excluded|Included]
sub-oid
[OID]
show snmp
no snmp community-strings
[Community]
no snmp-server host
[Host-address]
no snmpv3 user
[User Name]
no snmpv3 access context-name [Context
Name ]
group
[Group Name ]
security-level
[NoAuthNoPriv|AuthNoPriv| AuthPriv]
match-rule
[Exact|Prifix]
views
[Read View Name] [Write
Configure the context
G
name
Configure the userprofile
G
for SNMPV3 agent. Privacy password could be empty.
Configure the access
G
table of SNMPV3 agent
Configure the mibview
G
table of SNMPV3 agent
Show SNMP
P
configuration
Remove the specified
G
community.
Remove the SNMP server
G
host.
Remove specified user of
G
SNMPv3 agent.
Remove specified access
G
table of SNMPv3 agent.
Command Set Lists
(remove)
switch(config)#
no snmp-server host
192.168.1.50 switch(config)#snmpv3 context-name
Test switch(config)#snmpv3 user test01
group G1 password AuthPW PrivPW
switch(config)#snmpv3 access context-name Test group G1 security-level AuthPriv
match-rule Exact views V1 V1 V1
switch(config)#snmpv3 mibview view V1 type Excluded sub-oid 1.3.6.1
switch#show snmp
switch(config)#no snmp community-strings public
switch(config)#no snmp-server host
192.168.1.50 switch(config)#no snmpv3 user Test
switch(config)#no snmpv3 access
context-name Test group G1 security-level AuthPr iv match-rule Exact views V1 V1 V1
C-9
Page 72
View Name] [Notify View Name]
no snmpv3 mibview view
[View Name]
type
[Excluded|Included]
sub-oid
[OID]
Remove specified
G
mibview table of SNMPV3 agent.
switch(config)#no snmpv3 mibview
view V1 type Excluded sub-oid 1.3.6.1

C-11 Port Mirroring Commands Set

Commands Level Description Example
monitor
[RX|TX|Both]
monitor rx [Port ID]
monitor tx [Port ID]
show monitor
show monitor
no monitor
Configure source port of
I
monitor function
Set RX destination port of
G
monitor function
Set TX destination port of
G
monitor function
Show port monitor
P
information
Show port monitor
I
information
Disable source port of
I
monitor function
switch(config)#interface fastEthernet 2 switch(config-if)#monitor RX
switch(config)#monitor rx 2
switch(config)#monitor tx 3
switch#show monitor
switch(config)#interface fastEthernet 2 switch(config-if)#show monitor
switch(config)#interface fastEthernet 2 switch(config-if)#no monitor
Command Set Lists

C-12 802.1x Commands Set

Commands Level Description Example
8021x enable
8021x system radiusip
[IP address]
8021x system serverport
[port ID]
8021x system accountport
[port ID]
8021x system sharedkey
[ID]
8021x system nasid
[words]
Use the 802.1x global
G
configuration command to enable 802.1x protocols.
Use the 802.1x system
G
radius IP global configuration command to change the radius server IP.
Use the 802.1x system
G
server port global configuration command to change the radius server port.
Use the 802.1x system
G
account port global configuration command to change the accounting port.
Use the 802.1x system
G
share key global configuration command to change the shared key value.
Use the 802.1x system
G
nasid global configuration
switch(config)# 8021x enable
switch(config)# 8021x system radiusip
192.168.1.1
switch(config)# 8021x system serverport 1812
switch(config)# 8021x system accountport 1813
switch(config)# 8021x system sharedkey 123456
switch(config)# 8021x system nasid test1
C-10
Page 73
command to change the
NAS ID.
8021x misc quietperiod
[sec.]
Use the 802.1x misc quiet
G
period global configuration command to specify the quiet period value of the switch.
Command Set Lists
switch(config)# 8021x misc quietperiod 10
8021x misc txperiod
[sec.]
8021x misc supptimeout
[sec.]
8021x misc servertimeout
[sec.]
8021x misc maxrequest
[number]
8021x misc reauthperiod
[sec.]
8021x portstate
[disable | reject | accept | authorize]
show 8021x
no 8021x
Use the 802.1x misc TX
G
period global configuration command to set the TX period.
Use the 802.1x misc supp
G
timeout global configuration command to set the supplicant timeout.
Use the 802.1x misc
G
server timeout global configuration command to set the server timeout.
Use the 802.1x misc max
G
request global configuration command to set the MAX requests.
Use the 802.1x misc
G
reauth period global configuration command to set the reauth period.
Use the 802.1x port state
I
interface configuration command to set the state of the selected port.
Display a summary of the
E
802.1x properties and also the port sates.
Disable 802.1x function. switch(config)#no 8021x
G
switch(config)# 8021x misc txperiod 5
switch(config)# 8021x misc supptimeout 20
switch(config)#8021x misc servertimeout 20
switch(config)# 8021x misc maxrequest 3
switch(config)# 8021x misc reauthperiod 3000
switch(config)#interface fastethernet 3 switch(config-if)#8021x port state accept
switch>show 8021x

C-13 TFTP Commands Set

Commands Level Description Defaults Example
backup flash:backup_cfg
restore flash:restore_cfg
upgrade flash:upgrade_fw
Save configuration to TFTP
G
and need to specify the IP of TFTP server and the file name of image.
Get configuration from TFTP
G
server, and specify the IP of TFTP server and the file name of image.
Upgrade firmware by TFTP,
G
and specify the IP of TFTP server and the file name of image.
switch(config)#backup flash:backup_cfg
switch(config)#restore flash:restore_cfg
switch(config)#upgrade flash:upgrade_fw
C-11
Page 74

C-14 SystemLog, SMTP and Event Commands Set

Commands Level Description Example
systemlog ip
[IP address]
Set System log server IP
G
address.
switch(config)# systemlog ip
192.168.1.100
Command Set Lists
systemlog mode
[client|server|both]
show systemlog
show systemlog
no systemlog
smtp enable
smtp serverip
[IP address]
smtp authentication
smtp account
[account]
smtp password
[password]
smtp rcptemail
[Index] [Email address]
show smtp
no smtp
event device-cold-start
[Systemlog|SMTP|Both]
event authentication-failure
[Systemlog|SMTP|Both]
event ring-topology-change
[Systemlog|SMTP|Both]
event systemlog
[Link-UP|Link-Down|Both]
event smtp
[Link-UP|Link-Down|Both]
show event
no event device-cold-start
no event authentication-failure
no event ring-topology-change
no event systemlog
no event smpt
show systemlog
Specify the log mode. switch(config)# systemlog mode both
G
Display system log. Switch>show systemlog
E
Show system log client &
P
server information.
Disable systemlog
G
function.
Enable SMTP function. switch(config)#smtp enable
G
Configure SMTP server
G
IP.
Enable SMTP
G
authentication.
Configure authentication
G
account.
Configure authentication
G
password.
Configure Rcpt e-mail
G
Address.
Show the information of
P
SMTP.
Disable SMTP function. switch(config)#no smtp
G
Set cold start event type. switch(config)#event device-cold-start
G
Set Authentication failure
G
event type.
Set X-ring topology
G
changed event type.
Set port event for system
I
log.
Set port event for SMTP. switch(config)#interface fastethernet 3
I
Show event selection. switch#show event
P
Disable cold start event
G
type.
Disable Authentication
G
failure event type.
Disable X-ring topology
G
changed event type.
Disable port event for
I
system log.
Disable port event for
I
SMTP.
Show system log client &
P
server information.
switch#show systemlog
switch(config)#no systemlog
switch(config)#smtp serverip
192.168.1.5 switch(config)#smtp authentication
switch(config)#smtp account John
switch(config)#smtp pass word 1234
switch(config)#smtp rcptemail 1
Alert@test.com
switch#show smtp
both switch(config)#event
authentication-failure both switch(config)#event
ring-topology-change both
switch(config)#interface fastethernet 3 switch(config-if)#event systemlog both
switch(config-if)#event smtp both
switch(config)#no event device-cold-start
Switch(config)#no event authentication-failure
switch(config)#no event ring-topology-change
switch(config)#interface fastethernet 3 switch(config-if)#no event systemlog
switch(config)#interface fastethernet 3 switch(config-if)#no event smtp
switch#show systemlog
C-12
Page 75

C-15 SNTP Commands Set

Commands Level Description Example
sntp enable
Enable SNTP function. switch(config)#sntp enable
G
Command Set Lists
sntp daylight
sntp daylight-period
[Start time] [End time]
sntp daylight-offset
[Minute]
sntp ip
[IP]
sntp timezone
[Timezone]
show sntp
show sntp timezone
no sntp
no sntp daylight
Enable daylight saving
G
time. If SNTP function is inactive, this command can’t be applied.
Set period of daylight
G
saving time. If SNTP function is inactive, this command can’t be applied.
Parameter format: [yyyymmdd-hh:mm]
Set offset of daylight
G
saving time. If SNTP function is inactive, this command can’t be applied.
Set SNTP server IP, if
G
SNTP function is inactive, this command can’t be applied.
Set timezone index, use
G
“show sntp timzezone” command to get more information of index number.
Show SNTP information. switch#show sntp
P
Show index number of
P
time zone list.
Disable SNTP function. switch(config)#no sntp
G
Disable daylight saving
G
time.
switch(config)#sntp daylight
switch(config)# sntp daylight-period 20060101-01:01 20060202-01:01
switch(config)#sntp daylight-offse t 3
switch(config)#sntp ip 192.169.1.1
switch(config)#sntp timezone 22
switch#show sntp timezone
switch(config)#no sntp daylight

C-16 X-Ring Commands Set

Commands Level Description Example
ring enable
ring master
ring couplering
ring dualhoming
ring ringport
[1st Ring Port] [2nd Ring Port]
ring couplingport
[Coupling Port]
ring controlport
[Control Port]
Enable X-Ring. switch(config)#ring enable
G
Enable Ring Master. switch(config)#ring master
G
Enable Couple Ring. switch(config)#ring couplering
G
Enable Dual Homing switch(config)#ring dualhoming
G
Configure 1st/2nd Ring
G
Port.
Configure Coupling Port. switch(config)#ring couplingport 1
G
Configure Control Port. switch(config)#ring controlport 2
G
C-13
switch(config)#ring ringport 7 8
Page 76
ring homingport
[Dual Homing Port]
show ring
no ring
no ring master
no ring couplering
no ring dualhoming
Configure Dual Homing
G
switch(config)#ring homingport 3
Port.
Show the information of X
P
switch#show ring
- Ring.
Disable X-Ring. switch(config)#no ring
G
Disable Ring Master. switch(config)# no ring master
G
Disable Couple Ring. switch(config)# no ring couplering
G
Disable Dual Homing. switch(config)# no ring dualhoming
G
Command Set Lists
C-14
Page 77
Loading...