Table of Contents
1. Introduction ...................................................................................................................................... 1-1
Overview ........................................................................................................................................... 1-2
Package Checklist ............................................................................................................................... 1-2
Features ............................................................................................................................................ 1-2
Industrial Networking Capability .................................................................................................... 1-2
Designed for Industrial Applications ............................................................................................... 1-3
Useful Utility and Remote Configuration ......................................................................................... 1-3
Recommended Software and Accessories ....................................................................................... 1-3
2. Getting Started ................................................................................................................................. 2-1
RS-232 Console Configuration (115200, None, 8, 1, VT100) .................................................................... 2-2
Configuration using a Telnet Console ..................................................................................................... 2-4
Configuration using a Web Browser ....................................................................................................... 2-6
Disabling Telnet and Browser Access ..................................................................................................... 2-7
3. Featured Functions ........................................................................................................................... 3-1
Configuring Basic Settings ................................................................................................................... 3-2
System Identification ................................................................................................................... 3-2
Password ................................................................................................................................... 3-3
Accessible IP ............................................................................................................................... 3-3
Port ........................................................................................................................................... 3-4
Network ..................................................................................................................................... 3-5
Time .......................................................................................................................................... 3-7
Turbo Ring DIP Switch ............................................................................................................... 3-11
System File Update—By Remote TFTP .......................................................................................... 3-13
System File Update—By Local Import/Export ................................................................................ 3-13
System File Update—By Backup Media ......................................................................................... 3-14
Restart..................................................................................................................................... 3-14
Factory Default ......................................................................................................................... 3-15
Using Port Trunking .......................................................................................................................... 3-15
The Port Trunking Concept ......................................................................................................... 3-15
Configuring Port Trunking ........................................................................................................... 3-16
Configuring SNMP ............................................................................................................................. 3-17
Trap Settings ............................................................................................................................ 3-19
SNMP Inform Mode .................................................................................................................... 3-19
Using PoE ........................................................................................................................................ 3-20
Using Communication Redundancy ..................................................................................................... 3-24
The Turbo Ring Concept ............................................................................................................. 3-24
Configuring “Turbo Ring” and “Turbo Ring V2” .............................................................................. 3-28
The Turbo Chain Concept ................................................................................................................... 3-32
Configuring “Turbo Chain” .......................................................................................................... 3-33
The STP/RSTP Concept .............................................................................................................. 3-34
Configuring STP/RSTP ................................................................................................................ 3-38
Using Traffic Prioritization .................................................................................................................. 3-40
The Traffic Prioritization Concept ................................................................................................. 3-41
Configuring Traffic Prioritization .................................................................................................. 3-42
Using Virtual LAN .............................................................................................................................. 3-45
The Virtual LAN (VLAN) Concept .................................................................................................. 3-45
Sample Applications of VLANs using Moxa EDS-P506A-4PoE ........................................................... 3-47
Configuring Virtual LAN .............................................................................................................. 3-48
Using Multicast Filtering ..................................................................................................................... 3-50
The Concept of Multicast Filtering ................................................................................................ 3-50
Configuring IGMP Snooping ........................................................................................................ 3-52
Add Static Multicast MAC ............................................................................................................ 3-54
Configuring GMRP ..................................................................................................................... 3-55
GMRP Table .............................................................................................................................. 3-55
Using Bandwidth Management ............................................................................................................ 3-55
Traffic Rate Limiting Settings ...................................................................................................... 3-56
Using Port Access Control .................................................................................................................. 3-56
Configuring Static Port Lock ........................................................................................................ 3-58
Configuring IEEE 802.1X ............................................................................................................ 3-58
Using Auto Warning .......................................................................................................................... 3-61
Configuring Email Warning ......................................................................................................... 3-61
Event Type ............................................................................................................................... 3-61
Email Setup .............................................................................................................................. 3-63
Configuring Relay Warning ......................................................................................................... 3-64
Event Setup .............................................................................................................................. 3-64
Warning List ............................................................................................................................. 3-65
Using Line-Swap-Fast-Recovery .......................................................................................................... 3-65
Configuring Line-Swap Fast Recovery .......................................................................................... 3-65