Home
IGS-9084GP User Manual
Contents
1. v Spedfic v Untag_pvid v 1 Unaware Specific v 1 Untag pvid 2 Unaware Specific v 1 Untag pvid v 3 Unaware 4 Unaware v Specific v 1 Untag_pvid v 5 Unaware v Specific 1i Untag pvid v v Spedfic v 1 Untag pvid v 6 Unaware untag pvid Untag pvid Spedfic v 1 Untag pvid w 7 Unaware Specific 1 1 1 w Specific 1 8 Unaware 9 Unaware io unaware Bi peac 1l Untag pvid BB 11 Unaware _ Spedfic v 1 Untag pvid v LI 9 1 98 D I9 09 i DR Mecca e e E i I Specific v 1 Untag pvid 12 Unaware ea C CNN Ethertype for This field specifies the Ether type used for custom S ports This is customer S Ports a global setting for all custom S ports The switch port number to which the following settings will be applied Port can be one of the following types Unaware Customer C port Service S port Custom Service S custom port Port type l 7 If port type is Unaware all frames are classified to the port VLAN ID and tags are not removed Enable ingress filtering on a port by checking the box This parameter affects VLAN ingress processing If in
2. 10 3 1 DIN rail Installation cccccccceccseeceeeceeeseeeeeeseeeseeeeeeeueceeeseeeeeeeeeeseeeneeseeseeeseesaeenes 11 3 2 CAE Mure PII ro NONIS 12 3 3 l ile 14 OA me jo 51g 6 9 6 e 14 Soc FO gt eee eee eee ee eee es ee ese ee 14 3 3 3 Redundant Power Inputs eeessesessssssseseeeeeeene nennen nnn nnn nnn nnn n nnns 14 3 4 O70 9 a 101 0 9 ee 15 DAT G 2 cy eem 15 3 4 2 OR RING O ChaIN 0 cccccceessssssesessnaeeeeeeeeeeeeeeeesssseeesessaaeeeeeeeseeeeeeeesseeeeeeaaaaaees 18 alle rye 21 4 1 Scl 21 ze MEN uie ote amm 21 A2 COnNNgUralONS seisein eiie nee ra E ENE EEEN ERE OE EA EEE EEE EEE EES 21 4 2 OE a ee et te ee ee 23 S P MEM Vise elo m 23 A22 Gela Te B Ez o dc PTT 23 4 3 eres 24 BOM MOC ON em eats 24 4 3 2 Configurations 0 0 cee cc cccccccccccccceeeeeeeeeeeessnseeeeeeeeeeeeeeeseeeeeeeesssseeeeeeeeeeeeeeeeeeeeeeees 24 4 4 PA AR OP NER 25 ST MEME I Vill m 25 AA I IUD M m 28 ORing Industrial Networking Corp 2 AAS NM MMO 31 4 5 Fast Recovery wossteseteeriiedecadecctoectaceducotive stnestensteseieerinaetesadarelenetwnedesaducstacateeaizesiees 32 Jure 34 5 1 Sissi eel MIRI ERI TR RR TERRE 35 DRI SV Ende
3. iD n un amp Uu Be Lr EA H H H hd Link Change Disables or enables the port Only log it Simply sends logs to the log server Shunt Down the Disables the port Port Reboot Device Disables or enables PoE power ORing Industrial Networking Corp 97 DDoS Prevention The switch can monitor ingress packets and perform actions when DDOS attack occurred on this port When network traffic from a specific device increases significantly in a short period of time the switch will lock the IP address of that device to protect the network from attacks You can configure DDoS prevention on this page to achieve maximum protection DDOS Prevention Socket Number Mode Sensibili Packet Type Filte Status y yP Low High t 1 Enabled Normal TCP b 80 80 Destination E _ Running 2 Normal TCP v 80 80 Destination v _ Blocking 1 minute 3 Normal TCP v 80 80 Destination Blocking 10 minute nati Blocking 4 Normal P v 80 80 Destination Shunt Dow M Pot 5 Normal TCP v 80 80 Destination i 6 Normal TCP v 80 80 Destination Konot pews 7 Normal TCP v 80 80 Destination v 8 Normal v TCP v 80 80 Destination v v 9 Normal TCP v 80 80 Destination v 10 Normal TCP v 80 80 Destination v v 11 Normal TCP v 80 80 Destination v Mode Enables
4. Indicates the ingress port to which the ACE will apply Ingress Port Any the ACE applies to any port Port n the ACE applies to this port number where n is the number of ORing Industrial Networking Corp 102 the switch port Policy n the ACE applies to this policy number where n can range from 1 to 8 Indicates the frame type of the ACE These frame types are mutually exclusive Any any frame can match the ACE Ethernet Type only Ethernet type frames can match the ACE The IEEE 802 3 descripts the value of length types should be greater Frame Type than or equal to 1536 decimal equal to 0600 hexadecimal ARP only ARP frames can match the ACE Notice the ARP frames will not match the ACE with Ethernet type IPv4 only IPv4 frames can match the ACE Notice the IPv4 frames will not match the ACE with Ethernet type Specifies the action to take when a frame matches the ACE Permit takes action when the frame matches the ACE Deny drops the frame matching the ACE Specifies the rate limiter in number of base units The allowed range is 1 to 15 Disabled means the rate limiter operation is disabled Frames matching the ACE are copied to the port number specified Port Copy here The allowed range is the same as the switch port number range Disabled means the port copy operation is disabled Specifies the logging operation of the ACE The allowed values are Enabled frames matching the ACE are stored in the
5. ccccccccccscccccccceeeeessseessssssseeeeeeeeeeeeeeeesseeeesessaaaees 71 5 5 4 SNMP Group Configurations ssesesssseeeennennnnn nennen 72 5 5 5 SNMP View Configurations ccccccccccccccccccccceeeseesessessseeeeeeeeeeceeeeeeeeeeesessssaaaes 73 5 5 6 SNMP Access Configurations cccccccccccccccccccccecseseesssssseeeeeeeeeeceeeeeeeeeeeessssssaaees 74 5 6 Trato PHOMUZ ANON RTT 75 5601 COM 06 Qu anne tenner 75 ORing Industrial Networking Corp 3 ORing IGS 9084GP User Manual 562 POL CIASSIIC AUTOM seen easseaantdierrsnnisdeptaanidevinamiiay doen ibdiaWoan ubapiioesind Sn vaws anaa 76 5 6 3 Port Tag REMAKING cc ceessssssseececcccceceeeeeeeasessssesseeeeeececeseeeeeseusaaaaeseeseeeeeeeeeeess 78 Sn E 40 78 Ss MED elec MR UU UU m 80 5 6 6 Scheduling and SNaping ccccceceesssssscccccccccccceceeeeesssssssceeeeeeeeececeeeeeeeessesstsaaes 81 Snc FOT CN OUG m 84 eS odios o NUT 85 5 6 9 DSCP based QoS 0000 cccccsscccessssceecessesseeeeesessseeeceseeaeeeeesseseeecesseaseeeessesaaeees 85 S010 BGP Mai DNE m 86 5 6 11 DSCP Classification ccc cccccccccccssssseeceesesseeeeceesseeeecsessseeeeeseeseeeeesesseeeeeseesaas 87 5612 Q05 O76 9 1 6 Wt Aen nen ene oe enone Pe eee ee eee ee 87 5 59 QOS COUMES saires ane EAE EAEEREN 90 DOA NEG NIU esa EEEE eee eee 90 5 7 ALBIEI e5 c NENNT 91 SW MP NOODI Gersan E A AATA 91
6. IGS 9084GP Industrial Managed Ethernet Switch User Manual Version 1 0 April 2014 www oring networking com ORing Industrial Networking Corp y COPYRIGHT NOTICE Copyright 2014 ORing Industrial Networking Corp All rights reserved No part of this publication may be reproduced in any form without the prior written consent of ORing Industrial Networking Corp TRADEMARKS OhRirng isa registered trademark of ORing Industrial Networking Corp All other trademarks belong to their respective owners REGULATORY COMPLIANCE STATEMENT Product s associated with this publication complies comply with all applicable regulations Please refer to the Technical Specifications section for more details WARRANTY ORing warrants that all ORing products are free from defects in material and workmanship for a specified warranty period from the invoice date 5 years for most products ORing will repair or replace products found by ORing to be defective within this warranty period with shipment expenses apportioned by ORing and the distributor This warranty does not cover product modifications or repairs done by persons other than ORing approved personnel and this warranty does not apply to ORing products that are misused abused improperly installed or damaged by accidents Please refer to the Technical Specifications section for the actual warranty period s of the product s associated with this publication DISCLAIMER
7. 10BASE T Cat 3 4 5 100 ohm UTP 100 m 328 ft RJ 45 100BASE TX Cat 5 100 ohm UTP UTP 100 m 328 ft HJ 45 1000BASE TX Cat 5 Cat 5e 100 ohm UTP UTP 100 m 828ft HJ 45 With 10 100 1000Base T X cables pins 1 and 2 are used for transmitting data and pins 3 and 6 are used for receiving data 10 100 Base T X RJ 45 Pin Assignments RD 1000 Base T RJ 45 Pin Assignments ORing Industrial Networking Corp 15 The series also supports auto MDI MDI X operation You can use a cable to connect the switch to a PC The tables below show the MDI and MDI X port pin outs 10 100 Base T X MDI MDI X Pin Assignments TD transmit RD receive TD transmit RD receive RD receive TD transmit BENT RD receive TD transmit 08 Med Mee 1000Base T X MDI MDI X Pin Assignments Pniumer Mopod Mp 8 sap P e mo Rhe Note and signs represent the polarity of the wires that make up each wire pair ORing Industrial Networking Corp 16 RS 232 console port wiring The IGS 9084GP can be managed via console ports using a RS 232 cable which can be found in the package You can connect the port to a PC via the RS 232 cable with a DB 9 female connector The DB 9 female connector of the RS 232 cable should be connected the PC while the other end of the cable RJ 45 connector should be connected to the console port of the switch PC pin out male ass
8. EN61000 4 8 EN61000 4 11 Warranty 5 years EMS ORing Industrial Networking Corp 167
9. default rw group any NoAuth NoPriv default view w Check to delete the entry It will be deleted during the next save A string identifying the group name that this entry should belong to Group Name The allowed string length is 1 to 32 and only ASCII characters from 33 to 126 are allowed Indicates the security model that this entry should belong to Possible security models include any Accepted any security model v1 v2c usm v1 Reserved for SNMPv1 Security Model v2c Reserved for SNMPv2c usm User based Security Model USM Security Level Indicates the security model that this entry should belong to Possible ORing Industrial Networking Corp 74 security models include NoAuth NoPriv no authentication and no privacy Auth NoPriv Authentication and no privacy Auth Priv Authentication and privacy The name of the MIB view defining the MIB objects for which this Read View Name request may request the current values The allowed string length is 1 to 32 and only ASCII characters from 33 to 126 are allowed The name of the MIB view defining the MIB objects for which this Write View Name request may potentially SET new values The allowed string length is 1 to 32 and only ASCII characters from 33 to 126 are allowed 5 6 Traffic Prioritization 5 6 1 Storm Control A LAN storm occurs when packets flood the LAN creating excessive traffic and degrading network performance Error
10. Add lt ace_id gt lt ace_id_next gt port lt port_list gt policy policy lt policy_bitmask gt lt tagged gt lt vid gt lt tag_prio gt lt dmac_type gt etype etype lt smac gt lt dmac gt arp lt sip gt lt dip gt lt smac gt lt arp_opcode gt lt arp_flags gt Gp sip lt dip gt lt protocol gt lt ip_flags gt icmp sip lt dip gt lt icmp_type gt lt icmp_code gt lt ip_flags gt udp lt sip gt lt dip gt lt sport gt lt dport gt lt ip_flags gt tcp lt sip gt lt dip gt lt sport gt lt dport gt lt ip_flags gt lt tcp_flags gt permitldeny lt rate_limiter gt lt port_redirect gt mirror lt logging gt lt shutdown gt Port State lt port_list gt enableldisable ORing Industrial Networking Corp 154 Security Network DHCP Configuration Mode enableldisable Server lt ip_addr gt Information Mode enableldisable Information Policy replacelkeepldrop Statistics clear Security Network AAA Configuration Timeout lt timeout gt Deadtime dead time RADIUS lt server_index gt enableldisable ip addr string secret lt server_port gt ACCT RADIUS lt server_index gt enableldisable ip addr string secret lt server_port gt Statistics server index STP Version lt stp_version gt Non c
11. Port Enabled Path Cost Priority Admin Edge Auto Edge Restricted Point to Role TCN point Edge vj E F C Forced True BPDU Guard CIST Normal Ports Configuration STP NNI Port Path Cost Priority s Restricted Point to Ad Ed Auto Ed BPDU G d s min ge uto Edge se uar Een 1 Auto 22 Edge E 4 4 a Auto E 2 wto E i28 w Edge Oo B m Auto y 3 O mto iwj 128i Edge sj 4 d n Auto i 4 D auto E j 128 w Edge wj k m o Auto E 5 E ato i 1284 Edge E asa a Auto x 6 O Mto 128i Edge E E a Auto m re zum a rasa m Ei m r1 em z Port The switch port number to which the following settings will be applied STP Enabled Check to enable STP for the port Configures the path cost incurred by the port Auto will set the path cost according to the physical link speed by using the 802 1D recommended values Specific allows you to enter a user defined value The path cost Path Cost Ea is used when establishing an active topology for the network Lower path cost ports are chosen as forwarding ports in favor of higher path cost ports The range of valid values is 1 to 200000000 Configures the priority for ports having identical port costs See above Ooa A flag indicating whether the port is connected directly to edge devices pencage or not no bridges attached Transiting to the forwardi
12. Receive Missing The number of packets received with Circuit ID Circuit ID Receive Missing The number of packets received with the Remote ID option Remote ID missing Receive Bad Circuit ID The number of packets whose Circuit ID do not match the known circuit ID Receive Bad Remote ID The number of packets whose Remote ID do not match the known Remote ID Client Statistics Transmit Transmit Receive Receive Replace Keep Drop to Client Error from Client Agent Option Agent Option Agent Option Agent Option Transmit to Client The number of packets relayed from the server to the client The number of packets with errors when being sent to servers Receive from Client The number of packets received from the server Receive Agent Option The number of received packets containing relay agent information Replace Agent Option The number of packets replaced when received messages contain relay agent information Keep Agent Option The number of packets whose relay agent information is ORing Industrial Networking Corp 48 e Drop Agent Option The number of packets dropped when received messages contain relay agent information 5 3 Port Setting Port Setting allows you to manage individual ports of the switch including traffic power and trunks 5 3 1 Port Control This page shows current port configurations Ports can also be configured here Port Configuration Link Speed Flow Control Maximum Power Curre
13. Any any value is allowed don t care RARP SMAC Match opecifies whether frames will meet the action according to their ARP RARP hardware address length HLN and protocol address length PLN settings IP Ethernet 0 ARP RARP frames where the HLN is equal to Ethernet 0x06 and Length the PLN is equal to IPv4 0x04 must not match this entry 1 ARP RARP frames where the HLN is equal to Ethernet 0x06 and the PLN is equal to IPv4 0x04 must match this entry Any any value is allowed don t care opecifies whether frames will meet the action according to their ARP RARP hardware address space HRD settings ORing Industrial Networking Corp 108 0 ARP RARP frames where the HLD is equal to Ethernet 1 must not match this entry 1 ARP RARP frames where the HLD is equal to Ethernet 1 must match this entry Any any value is allowed don t care Specifies whether frames will meet the action according to their ARP RARP protocol address space PRO settings 0 ARP RARP frames where the PRO is equal to IP 0x800 must not match this entry 1 ARP RARP frames where the PRO is equal to IP 0x800 must match this entry Any any value is allowed don t care ICMP Parameters ICMP Type Filter ICMP Type Value eee tae Specific ICMP Code Value ll Specifies the ICMP filter for the ACE Any no ICMP filter is specified ICMP filter status is don t care ICMP Type Filter Specific if
14. C 800007e5017f000001 default_user NoAuth NoPriv None None None None Add new user Delete Engine ID Check to delete the entry It will be deleted during the next save An octet string identifying the engine ID that this entry should belong to The string must contain an even number between 10 and 64 hexadecimal digits but all zeros and all F s are not allowed The SNMPv3 architecture uses User based Security Model USM for message security and View based Access Control Model VACM for access control For the USM entry the usmUserEnginelD and usmUserName are the entry keys In a simple agent usmUserEnginelD is always that agent s own snmpEnginelD value The value can also take the value of the snmpEnginelD of a remote SNMP engine with which this user can communicate In other words if user engine ID is the same as system engine ID then it is local user otherwise it s remote user A string identifying the user name that this entry should belong to The allowed string length is 1 to 32 and only ASCII characters from 33 to 126 are allowed Indicates the security model that this entry should belong to Possible security models include Security Level NoAuth NoPriv no authentication and none privacy Auth NoPriv Authentication and no privacy Auth Priv Authentication and privacy ORing Industrial Networking Corp 71 The value of security level cannot be modified if the entry already exists which means the value
15. If DHCP retry fails DHCP will stop trying and the configured IP settings will be used Assigns the subnet mask of the IP address If DHCP client function is enabled you do not need to assign the subnet mask Assigns the network gateway for the switch The default gateway IP Router is 192 168 10 254 Provides the managed VLAN ID The allowed range is 1 through VLAN ID A085 DNS Server Enter the IP address of the DNS server in dotted decimal notation Click to save changes Click to undo any changes made locally and revert to previously saved values 5 1 5 IPv6 Settings IPv6 is the next generation IP that uses a 128 bit address standard It is developed to Assigns the IP address of the network in use If DHCP client function is enabled you do not need to assign the IP address IP Address The network DHCP server will assign an IP address to the switch and it will be displayed in this column The default IP is 192 168 10 1 supplement and eventually replace the IPv4 protocol You can configure IPv6 information of the switch on the following page ORing Industrial Networking Corp 38 IPv6 Configuration Configured Current Auto C Configuration a S E E S Address 192 0 2 1 Link Local Address fes80 21e 94ff fe01 6735 Prefix 96 a6 Router Save Reset Check to enable IPv6 auto configuration If the system cannot obtain the stateless address in time the configured IPv6 settings Auto Configu
16. Subnet Mask 255 2 255 255 0 Router 192 168 10 254 DNS 192 168 10 254 Lease Time sec TFTP Server Boot File Name ORing Industrial Networking Corp 45 5 2 2 Dynamic Client List When DHCP server functions are activated the switch will collect DHCP client information and display in the following table DHCP Dynamic Client List No Select Type MAC Address IP Address Surplus Lease Select Clear All Add to static Table 5 2 3 Client List You can assign a specific IP address within the dynamic IP range to a specific port When a device is connected to the port and requests for dynamic IP assigning the switch will assign the IP address that has previously been assigned to the connected device DHCP Client List MAC Address IP Address Add as Static No Select Type MAC Address IP Address Surplus Lease Select Clear All 5 2 4 DHCP Relay DHCP relay is used to forward and transfer DHCP messages between the clients and the server when they are not in the same subnet domain You can configure the function in this page DHCP Relay Configuration Relay Mode Disabled v Relay Server 0 0 0 POUT E Enabled v eee PEN GU E y AEE onI mwas Replace v Relay Mode Indicates the existin
17. When the current connection is HTTPS disabling HTTPS will automatically redirect web browser to an HTTP connection The modes include Enabled enable HTTPS Disabled disable HTTPS Click to save changes Click to undo any changes made locally and revert to previously saved values 5 1 7 SSH SSH Secure Shell is a cryptographic network protocol intended for secure data transmission and remote access by creating a secure channel between two networked PCs You can configure the SSH mode in the following page SSH Configuration Mode Indicates the selected SSH mode The modes include Enabled enable SSH Disabled disable SSH Click to save changes Click to undo any changes made locally and revert to previously saved values ORing Industrial Networking Corp 40 5 1 8 LLDP LLDP Configurations LLDP Link Layer Discovery Protocol provides a method for networked devices to receive and or transmit their information to other connected devices on the network that are also using the protocols and to store the information that is learned about other devices This page allows you to examine and configure current LLDP port settings LLDP Configuration LLDP Parameters The switch port number to which the following settings will be applied Indicates the selected LLDP mode Rx only the switch will not send out LLDP information but LLDP information from its neighbors will be analyzed Tx only the switch
18. converted to a 32 bit binary string and read from left to right all bits following the first zero must also be zero DSCP Differentiated Code Point can be a specific value a range or Any DSCP values are in the range 0 63 including BE CS1 CS7 EF or AF11 AF43 IP Fragment lov4 frame fragmented options include yes no and any oport Source TCP UDP Port 0 65535 or Any specific value or port range applicable for IP protocol UDP TCP Dport Destination TCP UDP Port 0 65535 or Any specific value or port range applicable for IP protocol UDP TCP IPv6 Protocol IP protocol number 0 255 TCP or UDP or Any Source IP IPv6 source address a b c d or Any 32 LS bits SSAP Address valid SSAP Source Service Access Point values can range from 0x00 to OxFF or Any The default value is Any DSAP Address valid DSAP Destination Service Access Point values can range from 0x00 to OxFF or Any The default value is Any Control Valid Control valid values can range from 0x00 to OxFF or Any The default value is Any DSCP Differentiated Code Point can be a specific value a range or Any DSCP values are in the range 0 63 including BE CS1 CS7 EF or AF11 AF43 oport Source TCP UDP port 0 65535 or Any specific value or port range applicable for IP protocol UDP TCP Dport Destination TCP UDP port 0 65535 or Any specific value or port range applicable for IP protocol UDP TCP Action Parameters Class QoS class 0 7
19. that is a dash is used as separator between the lower cased hexadecimal digits The switch only supports the MD5 Challenge authentication method so the RADIUS server must be configured accordingly When authentication is complete the RADIUS server sends a ORing Industrial Networking Corp 124 ORing Port State ORing Industrial Networking Corp IGS 9084GP User Manual success or failure indication which in turn causes the switch to open up or block traffic for that particular client using the Port Security module Only then will frames from the client be forwarded on the switch There are no EAPOL frames involved in this authentication and therefore MAC based authentication has nothing to do with the 802 1X standard The advantage of MAC based authentication over port based 802 1X is that several clients can be connected to the same port e g through a 3rd party switch or a hub and still require individual authentication and that the clients don t need special supplicant software to authenticate The advantage of MAC based authentication over 802 1X based authentication is that the clients do not need special supplicant software to authenticate The disadvantage is that MAC addresses can be spoofed by malicious users equipment whose MAC address is a valid RADIUS user can be used by anyone Also only the MD5 Challenge method is supported The maximum number of clients that can be attached to a port can be limited using th
20. E VLAN VID 5 M E RAZ TPID 8100 ite kG VID 5 TPID 88A8 9000 Series VID 5 TPID 8100 IGS 9084GP User Manual untagged frame obtains a tag based on PVID and is forwarded When the port receives tagged frames 1 If the tagged frame contains a TPID of 0x8100 it will be forwarded 2 If the TPID of tagged frame is not 0x8100 ex Ox88A8 it will be discarded When the port receives untagged frames an untagged frame obtains a tag based on PVID and is forwarded When the port receives tagged frames 1 If the tagged frame contains a TPID of 0x8100 it will be forwarded 2 If the TPID of tagged frame is not 0x88A8 ex 0x8100 it will be discarded transmitted by C port Will be set to 0x8100 The TPID of a frame transmitted by S port will be set to 0x88A8 The TPID of a frame transmitted by o custom port will be set to a self customized value which can be set by the user via Ethertype for Custom S ports QinQ VID PVID TPID 8100 Packet Discarded ORing Industrial Networking Corp 60 No VLAN No VLAN B n VID 8 TPID 8100 VID 8 TPID 8100 p 9000 Series VID 8 TPID 88A8 Packet Discarded No VLAN VID 10 l A TPID 8100 9000 Series U m VID 10 TPID 88A8 Packet Discarded VID 10 TPID 88A8 No VLAN VID 5 TPID 8100 Pat 9000 Series VID 5 TPID 88A8 Packet
21. EH EJ EH El F Delete 1 00 00 00 00 00 00 0 E1 EJ E1 EJ EJ EJ EJ CJ El EJ Bl Add new static entry Checkmarks indicate which ports are members of the entry Port Members Check or uncheck to modify the entry Click to add a new entry to the static MAC table You can specify Adding New Static the VLAN ID MAC address and port members for the new entry Entry Click Save to save the changes MAC Table Each page shows up to 999 entries from the MAC table with a default value of 20 selected by the Entries Per Page input field When first visited the web page will show the first 20 entries from the beginning of the MAC Table The first displayed will be the one with the lowest VLAN ID and the lowest MAC address found in the MAC Table Each page shows up to 999 entries from the MAC table with a default value of 20 selected by the Entries Per Page input field When first visited the web page will show the first 20 entries from the beginning of the MAC Table The first displayed will be the one with the lowest VLAN ID and the lowest MAC address found in the MAC Table The Start from MAC address and VLAN fields allow the user to select the starting point in the MAC table Clicking Refresh will update the displayed table starting from that or the closest next MAC table match In addition the two input fields will upon clicking Refresh assume the value of the first displayed entry allows for continuous refresh with th
22. Forwarding Forwarding Forwarding Forwarding Forwarding Forwarding Forwarding Forwarding The switch port number to which the following settings will be applied The current STP port role of the CIST port The values include CIST Role AlternatePort BackupPort RootPort and DesignatedPort The current STP port state of the CIST port The values include ae Blocking Learning and Forwarding Uptime The time since the bridge port is last initialized Refresh Click to refresh the page immediately Check this box to enable an automatic refresh of the page at Auto refresh regular intervals STP Statistics This page displays the STP port statistics for the currently selected switch STP Statistics Auto refresh Transmitted Received Discarded MSIP RSTP STP TCN MSIP RSTP STP TCN Unknown Illegal No ports enabled ORing Industrial Networking Corp 26 The switch port number to which the following settings will be applied RSTP The number of RSTP configuration BPDUs received transmitted on the port number legacy STP configuration BPDUs received transmitted on the port The number of legacy topology change notification BPDUs received transmitted on the port The number of unknown spanning tree BPDUs received and Discarded Unknown discarded on the port The number of illegal spanning tree BPDUs received and Discarded Illegal discarded on the port Refresh Click to refresh the page immed
23. Gigabit Ethernet switch with 8x10 100 1000Base TiX and 4xiO0 0 1000Base X SFP socket Description Location Contact OID 1 3 6 1 4 1 25972 100 0 0 131 Hardware MAC Address 00 1e 94 01 b3 04 System Date 1970 01 01 00 01 34 00 00 System Uptime Od 00 01 34 Kernel Version v9 10 Software Version v1 00 Software Date 2014 04 09711 02 364 08 00 Auto refresh LJ Refresh Enable Location Alert On the left hand side of the management interface shows links to various settings Clicking on the links will bring you to individual configuration pages 5 1 Basic Settings The Basic Settings page allows you to configure the basic functions of the switch 5 1 1 System Information This page shows the general information of the switch System Information Configuration System Name System Description Industrial 12 port managed Gir System Location System Contact Save Reset ORing Industrial Networking Corp 35 w NN An administratively assigned name for the managed node By convention this is the node s fully qualified domain name A domain name is a text string consisting of alphabets A Z a z System Name digits 0 9 and minus sign Space is not allowed to be part of the name The first character must be an alpha character And the first or last character must not be a minus sign The allowed string length is O to 255 System Descripti
24. IP Address TCP UDP Port Number ORing Industrial Networking Corp 50 ORing Destination Address IP Address TCP UDP Number IGS 9084GP User Manual Source MAC Address Calculates the destination port of the frame You can check this box to enable the source MAC address or uncheck to disable By default Source MAC Address is enabled Calculates the destination port of the frame You can check this box to enable the destination MAC address or uncheck to disable By default Destination MAC Address is disabled Calculates the destination port of the frame You can check this box to enable the IP address or uncheck to disable By default IP Address is enabled Calculates the destination port of the frame You can check this box to enable the TCP UDP port number or uncheck to disable By default TCP UDP Port Number is enabled Aggregation Group Configuration Group ID Normal Port Members 45 6 amp 9 10 G 29OO000 0 OooOo 00 000000 oooooo0oon0 IOOO0OOOCOO OOOOOOQOcOQ E li OJ LS 2 ur amp OC 1 QE J4 DR RD C 2 GO Q oe Port Members Indicates the ID of each aggregation group Normal means no aggregation Only one group ID is valid per port Lists each switch port for each group ID Select a radio button to include a port in an aggregation or clear the radio button to remove the port from the aggregation By default no ports belong to an
25. Information in this publication is intended to be accurate ORing shall not be responsible for its use or infringements on third parties as a result of its use There may occasionally be unintentional errors on this publication ORing reserves the right to revise the contents of this publication without notice CONTACT INFORMATION ORing Industrial Networking Corp 3F NO 542 2 Jnongjheng Rd Sindian District New Taipei City 231 Taiwan R O C Tel 886 2 2218 1066 Fax 886 2 2218 1014 Website www oring networking com Technical Support E mail support oring networking com Sales Contact E mail sales oring networking com Headquarters sales oring networking com cn China ORing Industrial Networking Corp 1 Table of Content Getting Es Igor 6 1 1 About the IGS 9084GP Series esssssssssssssssseee nennen nennen nnns 6 1 2 SOIDWAIe TO oe eee ee eee ee ee eee 6 1 3 Hardware Specifications ccccccccccceececeececeececeeceseeeeseceeecessueesseesseeessneesseeenaaees 7 Hardware OVeEVIGW aud uieodi cous socis e vos voco eap cops Ve esI vous ecco vo Deui Verb EAE US VE ese 8 2 1 mis 8 2 1 1 PONS Igor qq iU mTTREEET 8 un o A ee 9 2 2 TODA AIAN Cl M 9 2 2 Rear Panel PEEEEEEEEEEEEEEEEEEEEMMMMM 10 Hardware INStANAUON me
26. MAC based authentication is globally enabled or disabled on the switch If globally disabled all ports are allowed to forward frames If checked clients are reauthenticated after the interval specified by the HReauthentication Period Reauthentication for Reauthentication 802 1X enabled ports can be used to detect if a new device is Enabled plugged into a switch port For MAC based ports reauthentication is only useful if the ORing Industrial Networking Corp 120 ORing Reauthentication Period EAPOL Timeout Age Period Hold Time ORing Industrial Networking Corp IGS 9084GP User Manual RADIUS server configuration has changed It does not involve communication between the switch and the client and therefore does not imply that a client is still present on a port see Age Period below Determines the period in seconds after which a connected client must be re authenticated This is only active if the Reauthentication Enabled checkbox is checked Valid range of the value is 1 to 3600 seconds Determines the time for retransmission of Request Identity EAPOL frames Valid range of the value is 1 to 65535 seconds This has no effect for MAC based ports This setting applies to the following modes i e modes using the Port Security functionality to secure MAC addresses MAC Based Auth When the NAS module uses the Port Security module to secure MAC addresses the Port Security module needs to
27. Mam Command Line Management Besides Web based management the switch also supports CLI management You can use console or telnet to manage the switch by CLI CLI Management by RS 232 Serial Console 115200 8 none 1 none Before configuring RS 232 serial console connect the RS 232 port of the switch to your PC Com port using a RJ45 to DB9 F cable Follow the steps below to access the console via RS 232 serial cable Step 1 On Windows desktop click on Start gt Programs gt Accessories gt Communications gt Hyper Terminal 5 Accessibility Ea Communications T HyperTerminal B Network Time Protocol i Network and Dial up Connections e System Tools gt HyperTerminal k 73 Acrobat Reader 5 0 Address Book EB Calculator B Command Prompt oy NetTime Notepad BD windows update S Pant af BJ windows Explorer En Accessories d E WordPad E Network Associates Documents 3 Startup amp Internet Explorer QE search Programs y Settings dew Run ep Shut Down sms Au otep 2 Input a name for the new connection ORing Industrial Networking Corp 146 Connection Description x Mew Connection Enter a name and choose an icon for the connection M ame con Discannected Auto detect Auto detect SCROLL caps NUM Capture Print echo otep 3 Select a COM port in the drop down list ini x termnial HyperTerminal Fille Edit V
28. Mbps Configures the rate of each queue shaper The default value is Queues Shaper Unit 500 This value is restricted to 100 to 1000000 when the Unit is kbps and it is restricted to 1 to 3300 when the Unit is Mbps Queue Shaper Allows the queue to use excess bandwidth Excess Configures the weight of each queue The default value is 17 Queue Scheduler Hedhi This value is restricted to 1 to 100 This parameter is only shown if eig Scheduler Mode is set to Weighted Queue Scheduler Shows the weight of the queue in percentage This parameter is Percent only shown if Scheduler Mode is set to Weighted Port Shaper Enable Check to enable port shaper for individual switch ports Configures the rate of each port shaper The default value is 500 Port Shaper Rate This value is restricted to 100 to 1000000 when the Unit is kbps and it is restricted to 1 to 3300 when the Unit is Mbps Configures the unit of measurement for each port shaper rate as Port Shaper Unit kbps or Mbps The default value is kbps 5 6 7 Port Scheduler This page provides an overview of QoS Egress Port Schedulers for all switch ports QoS Egress Port Schedulers Weight OO QI OQ Q3 Q4 Qo Mode Strict Priority Strict Priority 3 T E 3 Strict Priority Strict Priority j E Strict Priority Strict Priority e 3 3 Ch Ln to RJ e INNEN NEN The switch port number to which the following settings
29. Multicast fm Security Port Members Delete VLAN ID i VLAN Name EN 17345 6 7 8 9 1011 12 x lel Te lll ld 7 7 fant MMOD oo vLAN20 MIMD OOOO C1 CJ Open all Auto refresh gy System Information gy Front Panel Ethertype for Custom S ports 0Xlss4s E Basic Setting lS M CE VLAN Port Configuration HE Port Setting Redundancy f VLAN l Ingress Filtering Frame Type POEM Ey VLAN Membership E I Private VLAN E SNMP Traffic Prioritization iis sE 3 Multicast Unaware vj Security Unaware x E Waming Unaware Monitor and Diag Unaware M E i Synchronization 7 PoE Unaware ESI ESI Specific 1 Untag pvid vj falls Specific 1 Al Specficiv 1 Untag pvid Al v Specific 1 Untag pvid Al Spedfic v 1 Untag pvid iv Al spedficv 1 Untag pvid TEN ilfuntag pvid il an Specific 1 Untag pvid v All Specific w 1 Untag pvid Factory Default System Reboot 10 Unaware 11 Unaware hel 12 Unaware v o SS ee CE PI ORing Industrial Networking Corp 63 ORing VLAN Hybrid Mode Port 1 VLAN Hybrid mode IGS 9084GP User Manual untagged 10 Tagged 10 20 Below are the switch settings Open all Ez z zm r E s System Information Front Panel Basic Setting DHCP Server Relay Port Setting Redundancy Ey Ports Pri
30. Timezone Timezone offset Log Ea alllinfolwarninglerror clear ORing Industrial Networking Corp 150 DHCP enableldisable Setup lt ip_addr gt ip mask lt ip_router gt lt vid gt Ping lt ip_addr_string gt lt ping_length gt SNTP ip addr string Port Mode lt port_list gt autol Ohdxl LOfdxI LOOhdxl 1O0Ofdxl 1OO0fdxlsfp auto ams i SFP lt port_list gt MAC Flush VLAN Configuration lt port_list gt PVID lt port_list gt lt vid gt Inone FrameType lt port_list gt allltaggedluntagged IngressFilter lt port_list gt enableldisable ORing Industrial Networking Corp 151 tx_tag lt port_list gt untag_pvidluntag_allltag_all N Lo ame Delete lt name gt ame Lookup lt name gt Status lt port_list gt combinedlstaticlnasImstplalllconflicts Private VLAN Security Configuration lt port_list gt Add lt pvlan_id gt lt port_list gt Delete lt pvlan_id gt Lookup lt pvlan_id gt Isolate lt port_list gt enableldisable Switch Switch security setting Network Network security setting AAA Authentication Authorization and Accounting setting Security Switch Password lt password gt Auth Authentication SSH Secure Shell HTTPS Hypertext Transfer Protocol over Secure Socket Layer RMON Remote Network Monitoring Security Switch Authentication h autl Configuration ORing Industria
31. be a member of the same VLAN as the port VLAN ID Determines egress tagging of a port Untag pvid all VLANs Tx Tag except the configured PVID will be tagged Tag all all VLANs are tagged Untag all all VLANs are untagged Introduction of Port Types Below is a detailed description of each port type including Unaware C port S port and S custom port neressaction O Unaware When the port receives untagged frames an The TPID of a frame The function of untagged frame obtains a tag based on PVID transmitted by Unaware can and is forwarded Unaware port will be be used for When the port receives tagged frames set to 0x8100 802 1QinQ 1 If the tagged frame contains a TPID of The final status of the double tag 0x8100 it will become a double tag frame and frame after egressing will be forwarded will also be affected by 2 If the TPID of tagged frame is not 0x8100 the Egress Rule ex Ox88A8 it will be discarded When the port receives untagged frames an The TPID of a frame ORing Industrial Networking Corp 59 ORing S custom port When the port receives untagged frames an untagged frame obtains a tag based on PVID and is forwarded When the port receives tagged frames 1 If the tagged frame contains a TPID of 0x8100 it will be forwarded 2 If the TPID of tagged frame is not 0x88A8 ex 0x8100 it will be discarded Below are the illustrations of different port types
32. clear the counters for all ports 5 3 4 Loop Gourd This feature prevents loop attack When receiving loop packets the port will be disabled automatically preventing the loop attack from affecting other network devices Global Configuration Sinik vent Disable Transmission Time seconds Shutdown Time seconds ORing Industrial Networking Corp 29 Enable Loop Protection Activate loop protection functions as a whole Transmission Time The interval between each loop protection PDU sent on each port The valid value is 1 to 10 seconds Shutdown Time The period in seconds for which a port will be kept disabled when a loop is detected shutting down the port The valid value is 0 to 604800 seconds 7 days A value of zero will keep a port disabled permanently until the device is restarted Port Configuration Port Enable Acti Tx Mode lt gt lc E 1 E Enable 2 Shutdown Port __ Enable 3 Shutdown Port v Enable 4 Shutdown Port __ Enable 5 Shutdown Port _ Enable 6 Shutdown Port vj Enable v Label Description Enale Activate loop protection functions as a whole Configures the action to take when a loop is detected Valid values include Shutdown Port Shutdown Port and Log or Log Only Tx Mode Controls whether the port is actively generating loop protection PDUs or only passively look for looped PDU
33. entries in the View table in this page The entry index keys are View Name and OID Subtree SNMPv3 Views Configuration Delete ViewName View Type OID Subitree E default view included 1 Delete Check to delete the entry It will be deleted during the next save ORing Industrial Networking Corp 73 ORing IGS 9084GP User Manual A string identifying the view name that this entry should belong to View Name The allowed string length is 1 to 32 and only ASCII characters from 33 to 126 are allowed Indicates the view type that this entry should belong to Possible view types include Included an optional flag to indicate that this view subtree should be included View Type Excluded An optional flag to indicate that this view subtree should be excluded Generally if an entry s view type is Excluded it should exist another entry whose view type is Included and its OID subtree oversteps the Excluded entry The OID defining the root of the subtree to add to the named view OID Subtree The allowed OID length is 1 to 128 The allowed string content is digital number or asterisk 5 5 6 SNMP Access Configurations This page allows you to configure SNMPv3 access table The entry index keys are Group Name Security Model and Security Level SNMPv3 Accesses Configuration Delete Group Name Security Model Security Level Read View Name Write View Name F default ro group any NoAuth NoPriv default view v None v
34. in each group The Key value varies with the port ranging from 1 to 65535 Auto will set the key according to the physical link speed 10Mb 1 100Mb 2 1Gb 3 Specific allows you to enter a user defined value Ports with the same key value can join in the same aggregation group while ORing Industrial Networking Corp 92 BEEN ports with different keys cannot Indicates LACP activity status Active will transmit LACP packets every second while Passive will wait for a LACP packet from a partner speak if spoken to Click to save changes Reset Click to undo changes made locally and revert to previous values LACP System Status This page provides a status overview for all LACP instances LACP System Status Auto refresh C Anar ID Partner Partner Last Local iin System ID Key Changed Ports No parts enabled or no existing partners The aggregation ID is associated with the aggregation instance For LLAG the ID is shown as isid aggr id and for GLAGs as aggr id Partner System ID System ID MAC address of the aggregation partner Partner Key The key assigned by the partner to the aggregation ID Last Changed The time since this aggregation changed Local Ports Indicates which ports belong to the aggregation of the switch stack The format is Switch ID Port Click to refresh the page immediately Check to enable an automatic refresh of the page at regular Auto refresh intervals LACP Sta
35. industrial applications MSTP was developed The technology supports multiple spanning trees within a network by grouping and mapping multiple VLANs into different spanning tree instances known as MSTIs to form individual MST regions Each switch is assigned to an MST region Hence each MST region consists of one or more MSTP switches with the same VLANs at least one MST instance and the same MST region name Therefore switches can use different paths in the network to effectively balance loads Port Settings This page allows you to examine and change the configurations of current MSTI ports A MSTI port is a virtual port which is instantiated separately for each active CIST physical port for each MSTI instance configured and applicable for the port The MSTI instance must be selected before MSTI port configuration options are displayed This page contains MSTI port settings for physical and aggregated ports The aggregation settings are stack global MSTI Port Configuration ERE i MSTI v wets ORing Industrial Networking Corp 28 MSTI Normal Ports Configuration Port Path Cost Pot The switch port number of the corresponding STP CIST and MSTI port Configures the path cost incurred by the port Auto will set the path cost according to the physical link speed by using the 802 1D recommended values Specific allows you to enter a user defined value The path cost is used when establishing an
36. links will be activated Compared to STP which recovers a link in 30 to 50 seconds RSTP can shorten the time to 5 to 6 seconds STP Bridge Status This page shows the status for all STP bridge instance STP Bridges Auto refresh L Bridge ID Topology Topology Port Cost Flag Change Last BO 00 00 1E 94 FFE FFE FF 80 00 00 1E 94 FF FF FF g Steady un The bridge instance You can also link to the STP detailed bridge status Bridge ID The bridge ID of this bridge instance Root ID The bridge ID of the currently selected root bridge Root Port The switch port currently assigned the root port role Root path cost For a root bridge this is zero For other bridges it Root Cost is the sum of port path costs on the least cost path to the Root Bridge The current state of the Topology Change Flag for the bridge Topology Flag l Instance Topology Change ad The time since last Topology Change occurred as Refresh Click to refresh the page immediately Check this box to enable an automatic refresh of the page at Auto refresh regular intervals ORing Industrial Networking Corp 25 ORing STP Port Status IGS 9084GP User Manual This page displays the STP port status for the currently selected switch SIP Port Status Auto refresh CIST Role CIST State Uptime Non STP Non STP Non STP Non STP Mon STP Non STP Non STP Mon STP Non STP Non STP Non STP Mon STP Forwarding Forwarding Forwarding Forwarding
37. lt clockinst gt lt port_list gt lt base_delay gt lt incr_delay gt Loop Protect IPMC Querier igmp lt vid gt enableldisable Fastleave igmp lt port_list gt enableldisable ORing Industrial Networking Corp 161 State igmp lt vid gt enableldisable Configuration igmp Router igmp lt port_list gt enableldisable Status igmp lt vid gt Groups igmp lt vid gt Version igmp lt vid gt Fault Alarm PortLinkDown lt port_list gt enableldisable Alarm PowerFailure pwrllpwr2lpwr3 enableldisable Event Configuration Syslog SystemStart enableldisable Syslog PowerStatus enableldisable Syslog SnmpAuthenticationFailure enableldisable Syslog RingTopologyChange enableldisable Syslog Port lt port_list gt disablellinkupllinkdownlboth SMTP Port lt port_list gt disablellinkupllinkdownlboth DHCPServer IMode enableldisable Setup lt ip_start gt lt ip_end gt lt ip_mask gt lt 1p_router gt lt ip_dns gt lt ip_tftp gt lease bootfile Ring Couple Port lt port gt Dualhoming Mode enableldisable ORing Industrial Networking Corp 162 Couple Mode enableldisable Dualhoming Port lt port gt Chain Mode enableldisable IstUplinkPort port 2ndUplinkPort lt port gt EdgePort 1stl2ndlnone RCS Add lt ip_addr gt lt port_list gt web onlweb off te
38. mm 35 5 1 2 Admin amp Password sssssssssssssssseeeeeeneee eene nennen nennen nennen 36 Dice AMENCER 37 Onde MPC WINGS RN 37 SP IPO gt Re Rm 38 ELG PTP ee ee ee eee ee ee ee ee ee ee ee 40 224 40 ke MMP MET 4 oy Fc NODUS MEG NM 44 5 1 10 Backup Restore Configurations cccccccccccccccccececssesesssssseeeeeeeeeeeeeeeeeseeeeessssssaaees 44 om FN S OOT ee nes nr nr ne re 45 5 2 DFGP CS eed nc se AE le faerie de nee Serica vince icone E EAE 45 X MEME eie NOR 45 5 2 2 DYNAMIC Client LIST 46 oU MEC 21018 El ennenen ae ene eee ere ene eee TT ae een ee rte 46 SU MERDA 46 5 3 FOR c 49 JONES oce rie ta E E E E E A E E 49 pes PO TUN ea E EE MIRMME RUD M IUE 50 DO O E NER Rm 55 5 4 VERN a EEE E H 56 541 VLAN MSMDErSNID rid rd E A A ORE Un ERN NERA MN EUR 56 5 4 2 Port Configurations ucsseciixeruscet item RE vt EbXx Mak HENIAY rA RIA IA N DIM XC RN VbITI IA NERS 58 5 4 3 Private VLAN cccccccccssssssssssssssnnsssceeeceeeeeessssessssseensuaseeeeeeeeeseessssessseeeananaess 66 5 5 s 68 5 5 1 SNMP System Configurations ssesssseeeeeeeee nennen 68 5 5 2 SNMP Community Configurations essssssssssssseeeeeeeeneeeneenennns 70 5 5 3 SNMP User Configurations
39. or Default Valid Drop Precedence Level value can be 0 1 or Default J OhRinglndustialNetworking Cop 00 Industrial Networking Corp 89 Valid DSCP value can be 0 63 BE CS1 CS7 EF or AF11 AF43 or Default Default means that the default classified value is not modified by this QCE 5 6 13 QoS Counters This page shows information on the number of packets sent and received at each queue Queuing Counters Auto refresh 1 g 0 g 0 0 g g g 0 g g g g 0 2 g 0 0 g 0 g 0 g g g 0 g g g g 0 3 0 g 0 g 0 g g g g g g g g g 0 g g 0 g 0 g 0 g g g 0 g g g 0 5 0 0 0 0 0 0 0 g g 0 0 g g g 0 0 0 0 0 0 0 g g 0 g 0 0 g 0 g 0 386 g g 0 g g g g g g g QO 493 amp 1307 g 0 g 0 0 0 g g g 0 g QO 2320 9 g 0 g 0 0 g g g 0 o g g g The switch port number to which the following settings will be applied Qn There are 8 QoS queues per port QO is the lowest priority The number of received and transmitted packets per queue 5 6 14 QCL Status This page shows the QCL status by different QCL users Each row describes the QCE that is defined A conflict will occur if a specific QCE is not applied to the hardware due to hardware limitations The maximum number of QCEs is 256 on each switch Combined Auto refresh CI QoS Control List Status User QCE Frame Type Port PERON Conflict Class DPL DSCP No entries ORing Industrial Networking Corp 90 IGS 9084GP User Manual Frame Type Co
40. other will act as the backup path that is activated when the primary path connection fails Ta T m JFORUONR EON un L T i J RSTP i i J Backup f fe seseleces Ms i i r 3 H Main i pathe i eel Switch B switch A En _ iD b T ILIF 5 1 T NE dl FI beet s 1 j TT ilL M4 i E O Ring m 4 a MA M 114 4 P ORing Industrial Networking Corp 19 O Chain When connecting multiple O Rings to meet your expansion demand you can create an O Chain topology through the following steps 1 Select two switches from the chain Switch A amp B that you want to connect to the O Ring and connect them to the switches in the ring Switch C amp D 2 In correspondence to the port connected to the ring configure an edge port for both of the connected switches in the chain by checking the box in the management page see 4 1 2 Configurations 3 Once the setting is completed one of the connections will act as the main path and the other as the backup path Switch A lt ws I Switch C Edge port F ke bid i 1 EU sig Switch D Switch B ORing Industrial Networking Corp 20 ORing IGS 9084GP User Manual Redundancy Redundancy for minimized system downtime is one of the most important concerns for industrial networking devices Hence ORing has developed proprietary redundancy technologies including O Ring O RSTP and Open Ring featuring faster
41. recovery time than existing redundancy technologies widely used in commercial applications such as STP RSTP and MSTP ORing s proprietary redundancy technologies not only support different networking topologies but also assure the reliability of the network 4 1 O Ring 4 1 1 Introduction O Ring is ORing s proprietary redundant ring technology with recovery time of less than 10 milliseconds and up to 250 nodes The ring protocols identify one switch as the master of the network and then automatically block packets from traveling through any of the network s redundant loops In the event that one branch of the ring gets disconnected from the rest of the network the protocol automatically readjusts the ring so that the part of the network that was disconnected can reestablish contact with the rest of the network The O Ring redundant ring technology can protect mission critical applications from network interruptions or temporary malfunction with its fast recover technology IES 3080 Ba cku D Path asst 4 1 2 Configurations O Ring supports two ring topologies Coupling Ring and Dual Homing You can configure the settings in the interface below ORing Industrial Networking Corp 21 ORing IGS 9084GP User Manual O Ring Configuration la Dual Homing Homing Port LinkDown Porta w linkbown Redundant Ring Check to enable O Ring topology Ring Master Only one ring master is allowed in a
42. result of the last auto negotiation You can check the Configured column to use flow control This setting is related to the setting of Configured Link Speed You can enter the maximum frame size allowed for the switch port Maximum Frame in this column including FCS The allowed range is 1518 bytes to 9600 bytes Shows the current power consumption of each port in percentage The Configured column allows you to change power saving parameters for each port Power Control Disabled all power savings functions are disabled ActiPHY link down and power savings enabled PerfectReach link up and power savings enabled Enabled both link up and link down power savings enabled Total Power Usage Total power consumption of the board measured in percentage Click to undo any changes made locally and revert to previously saved values Click to refresh the page Any changes made locally will be undone 5 3 2 Port Trunk A port trunk is a group of ports that have been grouped together to function as one logical path This method provides an economical way for you to increase the bandwidth between the switch and another networking device In addition it is useful when a single physical link between the devices is insufficient to handle the traffic load This page allows you to configure the aggregation hash mode and the aggregation group Aggregation Mode Configuration Hash Code Contributors Source MAC Address Destination MAC Address
43. ring However if more than one switch are set to enable Ring Master the switch with the lowest MAC address will be the active ring master and the others will be backup masters 1 Ring Port The primary port when the switch is ring master 2 4 Ring Port The backup port when the switch is ring master Coupling Ring Coupling Port Dual Homing Check to enable Coupling Ring Coupling Ring can divide a big ring into two smaller rings to avoid network topology changes affecting all switches It is a good method for connecting two rings Ports for connecting multiple rings A coupling ring needs four switches to build an active and a backup link Links formed by the coupling ports will run in active backup mode Check to enable Dual Homing When Dual Homing is enabled the ring will be connected to normal switches through two RSTP links ex backbone Switch The two links work in active backup mode and connect each ring to the normal switches in RSTP mode Apply Click to apply the configurations Note due to heavy loading setting one switch as ring master and coupling ring at the same time is not recommended ORing Industrial Networking Corp 22 ORing IGS 9084GP User Manual 4 2 O Chain 4 2 1 Introduction O Chain is ORing s revolutionary network redundancy technology which enhances network redundancy for any backbone networks providing ease of use and maximum fault recovery swiftness flexibility compatibil
44. system log Logging Disabled frames matching the ACE are not logged Please note that system log memory capacity and logging rate is limited Specifies the shutdown operation of the ACE The allowed values are Enabled if a frame matches the ACE the ingress port will be disabled Disabled port shutdown is disabled for the ACE Indicates the number of times the ACE matched by a frame ORing Industrial Networking Corp 103 MAC Parameters SMAC Filter J Specific Sem OO 00 00 00 00 0 DMAC Filter Otel OO 00 00 00 00 0 Only displayed when the frame type is Ethernet Type or ARP Specifies the source MAC filter for the ACE SMAC Filter Any no SMAC filter is specified SMAC filter status is don t care Specific if you want to filter a specific source MAC address with the ACE choose this value A field for entering an SMAC value appears When Specific is selected for the SMAC filter you can enter a SMAC Value specific source MAC address The legal format is XX XX XX XX XX XX Frames matching the ACE will use this SMAC value Specifies the destination MAC filter for this ACE Any no DMAC filter is specified DMAC filter status is don t care MC frame must be multicast BC frame must be broadcast DMAC Filter UC frame must be unicast Specific If you want to filter a specific destination MAC address with the ACE choose this value A field for entering a DMAC value appears When Specific is selected for
45. will drop LLDP information received from its neighbors but will send out LLDP information Disabled the switch will not send out LLDP information and will drop LLDP information received from its neighbors Enabled the switch will send out LLDP information and will analyze LLDP information received from its neighbors LLDP Neighbor Information This page provides a status overview for all LLDP neighbors The following table contains information for each port on which an LLDP neighbor is detected The columns include the following information Auto refresh L Local Port Chassis ID Remote Port ID System Name Port Description System Capabilities Management Address Port 8 00 1E 94 12 45 78 7 IGS 9812GP Port 7 Bridge 192 168 10 14 IPv4 ORing Industrial Networking Corp 4 Local Port The port that you use to transmits and receives LLDP frames The identification number of the neighbor sending out the LLDP Chassis ID frames Remote Port ID The identification of the neighbor port System Name The name advertised by the neighbor Port Description The description of the port advertised by the neighbor Description of the neighbor s capabilities The capabilities include 1 Other Repeater Bridge WLAN Access Point System Capabilities moun Telephone DOCSIS Cable Device Station Only 2 3 4 9 6 7 8 9 Reserved When a capability is enabled a will be displayed If the capability is disa
46. zero the default port 1813 is used on the RADIUS accounting server long shared between the RADIUS authentication server and the switch stack The secret is a text string used by RADIUS to encrypt the client and server authenticator field during exchanges between the router and a RADIUS authentication server The router encrypts PPP PAP passwords using this text string The secret up to 29 characters Authentication and Accounting Server Status This page provides information about the status of the RADIUS server configurable on the authentication configuration page ORing Industrial Networking Corp 114 RADIUS Authentication Server Status Overview Auto refresh IP Address Disabled Disabled Disabled Disabled Disabled The RADIUS server number Click to navigate to detailed statistics of the server The IP address and UDP port number in IP Address UDP Port IP Address notation of the server The current status of the server This field has one of the following values Disabled the server is disabled Not Ready the server is enabled but IP communication is not yet up and running Ready the server is enabled IP communications are built and the RADIUS module is ready to accept access attempts Dead X seconds left access attempts are made to this server but it does not reply within the configured timeout The server has temporarily been disabled but will be re enabled when the d
47. 35 IGS 9084GP User Manual Detailed Statistics This page provides detailed traffic statistics for a specific switch port Use the port drop down list to decide the details of which switch port to be displayed The displayed counters include the total number for receive and transmit the size for receive and transmit and the errors for receive and transmit Detailed Statistics Total Receive amp Transmit Detailed Port Statistics Port 1 Receive Total Rx Packets Rx Octets Rx Unicast Rx Multicast Rx Broadcast Rx Pause Receive Sie Counters Rx 64 Bytes Rx 65 127 Bytes Rx 128 255 Bytes Rx 256 511 Bytes Rx 512 1023 Bytes Rx 1024 15276 Bytes Rx 1527 Bytes Receive Queue Counters Receive Error Counters Rx CRC Alignment Rx Undersize Rx Oversize Rx Fragments Rx Jabber Rx Filtered ORing Industrial Networking Corp Porti Auta refresh Transmit Total Tx Packets Tx Octets Tx Unicast Tx Multicast Tx Broadcast Tx Pause Transmit Size Counters Tx 64 Bytes Tx 65 127 Bytes Tx 128 255 Bytes Tx 256 511 Bytes Tx 512 1023 Bytes Tx 1024 1526 Bytes Tx 1527 Bytes Transmit Queue Counters Transmit Error Counters Tx Drops Tx Late Exc Coll 0 0 0 0 0 0 0 0 136 Rx and Tx Packets The number of received and transmitted good and bad packets The number of received and transmitted good and bad bytes Rx and Tx Octets l l including FCS except framing bits The number of received and
48. 5 7 2 VLAN Configurations of IGMP Snooping cc ccccccceeesssssseeeeeeeeeeeeeeeeeeeseeees 92 5 7 3 IGMP Snooping Status ccccccccccccccccsscccsccscsccccccscccccccccccccccccccecccccccccccscccsceees 93 5 7 4 Groups Information of IGMP SNOOPing cc cccccccceseseessssssseeeeeeeeeeeeeeeeeeeeeeens 94 5 8 BS CIA 95 5 8 1 Remote Control Security Configurations ccc ccecccessscceceeeeeeeeeceeeeeeeesessssssaeees 95 902 Device BINON M RRRLET 95 2 0 NN E E AE E eee EA E EE EA EA ee EEE eee 101 5 8 4 Authentication Authorization and Accounting seeseseseeeeeeeeeee 112 Soo RADIU 112 sno So cab e 118 5 9 PAN Ig E T 128 SS MEE LUI o c ere 128 592 ON cu Mie TT 129 S10 MONLO GING DIAG m 132 0A MAG eee ee ee EA E AEA A EEA AEE 132 A FOr ce NERO T T TEM 135 S103 Lodi dfe fine Rm 137 5 10 4 System Log Information sssssseeeeeeeeenenennnnennnnene nennen 138 5 10 5 Cable Diagnostics sssssssssssssseeeeeeeennnnne nennen eene 139 smescNEV deii 139 SEI NM oo ee re 141 5 11 OVMGCMHOMIZAUONM 15 5 6 010 5 lt s0ssaasdanaussewssdesasesausaewnsdesasaasauerawnsdesasieaadesansdeaseeaadeiseosdesaseets 142 ORing Indu
49. AF32 v o w SMAC Specific Qx 00 00 00 DMAC Type UC v Frame Type Ethernet v MAC Parameters Ether Type Specific Value Ox FFFF Port Members Check to include the port in the QCL entry By default all ports are included Key Parameters Key configurations include Tag value of tag can be Any Untag or Tag VID valid value of VLAN ID from 1 to 4095 Any can be a specific value or a range of VIDs PCP Priority Code Point can be specific numbers 0 1 2 3 4 5 6 7 arange 0 1 2 3 4 5 6 7 0 3 4 7 or Any DEI Drop Eligible Indicator can be any of values between 0 and 1 or Any SMAC Source MAC Address can be 24 MS bits OUI or Any DMAC Type Destination MAC type can be unicast UC multicast MC broadcast BC or Any Frame Type can be the following values Any Ethernet LLC SNAP IPv4 and IPv6 Note all frame types are explained below Allow all types of frames Ethernet Valid Ethernet values can range from 0x600 to OxFFFF or Any but ORing Industrial Networking Corp 88 Mn 0x800 IPv4 and Ox86DD IPv6 The default value is PID valid PID a k a ethernet type values can range from 0x00 to OxFFFF or Any The default value is Any IPv4 Protocol IP Protocol Number 0 255 TCP or UDP or Any Source IP specific Source IP address in value mask format or Any IP and mask are in the format of x y z w where x y z and w are decimal numbers between O0 and 255 When the mask is
50. Discarded I LI I I I LI I LI I LI I I I LI LI I I S custom port is used for user defined TPID While Ethertype for Custom S ports is configured to 8123 outgoing packet will bring with TPID 8123 tag A mom m mmm mcm mcm m omm mcm m mcm mm t VID 5 TPID 8123 emmy emonoeooonoo ORing Industrial Networking Corp 61 Examples of VLAN Settings VLAN Access Mode N Switch A Switch B Switch C VLAN 10 9000 Series 9000 Series 9000 Series VLAN 10 VLAN Trunk VOS Los VLAN 20 VLAN 20 10 20 10 20 Switch A Port 7 is VLAN Access mode Untagged 20 Port 8 is VLAN Access mode Untagged 10 Below are the switch settings Open all VLAN Membership Configuration Ey System Information me Basic Setting n o DHCP Server Relay Start from VLAN P with 20 entries per page Port Setting O Redundancy E VLAN Ey VLAN Membership Ey Ports Private VLAN E SNMP I Traffic Prioritization Multicast fl Security for port 1 VLAN trunk setting E Waming Monitor and Diag Synchronization I PoE for port 7 amp pot 8 VLAN Access Port Members Delete VLAN ID E VLAN Name 17345 6 7 8 9 1011 12 Mode BUM gm VLAN Membership lt gt v O lt gt E v lt gt i v 1 lt gt v ES Eo 1 C port v Tagged v Specific v 1 Tag all v E M A
51. Extra fields IP Protocol Filter for defining ICMP parameters will appear For more details of these fields please refer to the help file UDP selects UDP to filter IPv4 UDP protocol frames Extra fields for defining UDP parameters will appear For more details of these fields please refer to the help file TCP selects TCP to filter IPv4 TCP protocol frames Extra fields for ORing Industrial Networking Corp 105 defining TCP parameters will appear For more details of these fields please refer to the help file Specific allows you to enter a specific value The allowed range is 0 IP Protocol Value l to 255 Frames matching the ACE will use this IP protocol value Specifies the time to live settings for the ACE Zero Pv4 frames with a time to live value greater than zero must BT not be able to match this entry Non zero IPv4 frames with a time to live field greater than zero must be able to match this entry Any any value is allowed don t care opecifies the fragment offset settings for the ACE This includes settings of More Fragments MF bit and Fragment Offset FRAG OFFSET for an IPv4 frame No IPv4 frames whose MF bit is set or the FRAG OFFSET field is greater than zero must not be able to match this entry Yes IPv4 frames whose MF bit is set or the FRAG OFFSET field is greater than zero must be able to match this entry IP Fragment Any any value is allowed don t care Specifies the options flag
52. KNRmax value Modbus ORing Industrial Networking Corp 164 Mode enableldisable ORing Industrial Networking Corp 165 ORing Technical Specifications ORing Switch Model Physical Ports 10 100 1000Base T X Ports in RJ 45 Auto MDI MDIX 3000 IGS 9084GP User Manual Technology Ethernet Standards IEEE 802 3 for 10Base T IEEE 802 3u for 100Base TX and 100Base FX IEEE 802 3ab for 1000Base T IEEE 802 z for 1000Base X IEEE 802 3x for Flow control IEEE 802 3ad for LACP Link Aggregation Control Protocol IEEE 802 1p for COS Class of Service IEEE 802 1Q for VLAN Tagging IEEE 802 1w for RSTP Rapid Spanning Tree Protocol IEEE 802 1s for MSTP Multiple Spanning Tree Protocol IEEE 802 1x for Authentication IEEE 802 1AB for LLDP Link Layer Discovery Protocol Switch Properties Switching latency 7 us Switching bandwidth 24Gbps Max Number of Available VLANs 4096 IGMP multicast groups 128 for each VLAN Port rate limiting User Define Security Features Software Features Network Redundancy Device Binding security feature Enable disable ports MAC based port security Port based network access control 802 1x VLAN 802 1Q to segregate and secure network traffic Radius centralized password management SNMPv3 encrypted authentication and access security Https SSH enhance network security STP RSTP MSTP IEEE 802 1D w s Redundant Ring O Ring with recovery tim
53. P based QoS Ingress Port Classification ORing Industrial Networking Corp TI 5 6 3 Port Tag Remaking You can set QoS egress queues on a port such as classifying data and marking it according to its priority and the policies Packets will then travel across the switch s internal paths carrying their assigned QoS tag markers At the egress port these markers are read and used to determine which queue each data packet is forwarded to When the traffic does not conform to the conditions set in a policer command you can remark the traffic QoS Egress Port Tag Remarking Classified Classified Classified Classified Classified Classified Classified Classified Classified Classified Classified Classified The switch port number to which the following settings will be applied Click on the port number to configure tag remarking Shows the tag remarking mode for this port Classified use classified PCP DEI values Default use default PCP DEI values Mapped use mapped versions of QoS class and DP level 5 6 4 Port DSCP DSCP Differentiated Services Code Point is a measure of QoS It can classify data packets by using the 6 bit DS field in the IP header so you can manage each traffic class differently and efficiently thereby achieving optimized use of network bandwidth DSCP enabled routers on the network will read the DSCP value of the data packet and put the packet into different queues before transmission such as high priorit
54. P group These parameters specify what type of authentication and privacy a user within an SNMP group uses Each SNMP group name and security model pair must be unique This page allows you to configure the SNMPv3 group table The entry index keys are Security Model and Security Name ORing Industrial Networking Corp 72 SNMPv3 Groups Configuration Delete Security Model Security Name Group Name public default ro group private default rw group public defa u It_ro_g roup private default rw group default user default rw group Check to delete the entry It will be deleted during the next save Indicates the security model that this entry should belong to Possible security models included Security Model v1 Reserved for SNMPv1 v2c Reserved for SNMPv2c usm User based Security Model USM A string identifying the security name that this entry should belong to Security Name The allowed string length is 1 to 32 and only ASCII characters from 33 to 126 are allowed A string identifying the group name that this entry should belong to Group Name The allowed string length is 1 to 32 and only ASCII characters from 33 to 126 are allowed 5 5 5 SNMP View Configurations The SNMP v3 View table specifies the MIB object access requirements for each View Name You can specify specific areas of the MIB that can be accessed or denied based on the entries or create and delete
55. P snooping learns to forward multicast traffic only to interfaces that are connected to interested receivers This conserves bandwidth by allowing the switch to send multicast traffic to only those interfaces that are connected to hosts that want to receive the traffic instead of flooding the traffic to all interfaces in the VLAN This page allows you to set up IGMP snooping configurations ORing Industrial Networking Corp 9 IGMP Snooping Configuration Global Configuration Snooping Enabled Unregistered IPMCv4 Flooding Enabled Port Related Configuration Port Router Port Fast Leave beh ek DPI beh ek o Snooping Enabled Check to enable global IGMP snooping Unregistered IPMCv4Flooding Check to enable unregistered IPMC traffic flooding enabled Specifies which ports act as router ports A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or Router Port IGMP querier If an aggregation member port is selected as a router port the whole aggregation will act as a router port Fast Leave Check to enable fast leave on the port 5 7 2 VLAN Configurations of IGMP Snooping If a VLAN is not IGMP snooping enabled it floods multicast data and control packets to the entire VLAN in hardware When snooping is enabled IGMP packets are trapped to the CPU Data packets are mirrored to the CPU in addition to being VLAN flooded The CPU then installs hardware resources so tha
56. Q Mode VLAN QinQ mode is usually adopted when there are unknown VLANs as shown in the figure below VLAN X Unknown VLAN BM 2900 BM 2900 VLAN X VLAN Pi VLAN X TRUNK 200 VLAN TRUNK 200 tagged 200 Setting VLAN dX QinQ 200 tagged X tagged 9000 Series Port 1 VLAN Settings Open all Ey System Information Ey Front Panel Basic Setting DHCP Server Relay Port Setting Redundancy E VLAN Ej VLAN Membership gay Ports L Private VLAN SNMP Traffic Prioritization I Multicast Security Open all ga System Information ga Front Panel Basic Setting DHCP SererRelay Port Setting a Redundancy E VLAN Ey VLAN Membership Ey Ports fill Private VLAN i SNMP a Traffic Prioritization Multicast E Security Warming VLAN Membership Configuration Start from VLAN p with entries per page Port Members 1 2 34536 7 8 9 101112 default TT TT d llli 7 A eA ding dd Y JE TE TE IE HL IE JE TET Delete VLAN ID VLAN Name al 200 Auto refresh L Ethertype for Custom S ports 0x esas VLAN Port Configuration Port VLAN Tx Tag Port Type Ingress Filtering Frame Type z Mode ID a I Speefciv 200 Untag al iw Tagged None i Tag al vj m VI Speane 1 Untag_pvia w Als specific 1 Untag_pvid v All v Specific 1 Untag pvid v all v Specific w 1 lUnt
57. Run the ground connection from the ground screw to the grounding surface prior to connecting devices 3 3 2 Fault Relay The two sets of relay contacts of the 6 pin terminal block connector are used to detect user configured events The two wires attached to the fault contacts form an open circuit when a user configured when an event is triggered If a user configured event does not occur the fault circuit remains closed 3 3 3 Redundant Power Inputs The switch has two sets of power inputs power input 1 and power input 2 The top two contacts and the bottom two contacts of the 6 pin terminal block connector on the switch s top panel are used for the two digital inputs Follow the steps below to wire redundant power ORing Industrial Networking Corp 14 Inputs PWR1 FaultRelay PWR2 Step 1 insert the negative positive wires into the V V Bi terminals respectively 1A Q 24V Step 2 to keep the DC wires from pulling loose use a small flat blade screwdriver to tighten the wire clamp screws on l V2 V2 V1 V1 the front of the terminal block connector 3 4 Connection 3 4 1 Cables 1000 100BASE TX 10BASE T Pin Assignments The series provides standard Ethernet ports According to the link type the switch uses CAT 3 4 5 5e UTP cables to connect to any other network devices PCs servers switches routers or hubs Please refer to the following table for cable specifications Cable Types and Specifications
58. S 2 U o all ail IN F i 4 Unt p d m fit SNMP Ware e One ANE ee mE Traffic Prioritization 3 Unaware X M O All M Specific iM 1 Untag_pvid v fit Multicast 4 Unaware Sa L All v Specific v 1 Untag_pvid vj fl Security 5 Unaware v O All v Specific 1 Untag_pvid MUN 6 Unaware wj 4 Untagged Specific 10 Untag_pvid PE Deag 7 Unaware v Untagged v Specific Untag_pvid v Synchronization n o r Unaware v O Untagged Specific 30 Untag_pvid PoE COE CO e D5 5pecnc ee ntag_pvid Ey Factory Default Unaware 3 See e eee eee Ej System Reboot 10 Unaware vi d All v Specific 1 Untag pvid 11 liIinaw ara wl mM Al Uil cnarific el 4l infan nuvid IR ORing Industrial Networking Corp 62 VLAN 1Q Trunk Mode Switch A Switch B Switch C VLAN 10 9000 Series 9000 Series 9000 Series VLAN 10 VLAN Trunk SONA Laun VLAN 20 VLAN 20 10 20 10 20 Switch B Port 1 VLAN 1Qtrunk mode tagged 10 20 Port 2 VLAN 1Qtrunk mode tagged 10 20 Below are the switch settings Open all VLAN Membership Configuration gj System Information Front Panel B Basic Setting l DHCP ServerRelay Start from VLAN with 20 _ entries per page HE Port Setting Redundancy E VLAN Ey VLAN Membership Ey Ports Private VLAN SNMP Traffic Prioritization Add New VLAN E
59. Version dotixAuthLastEapolFrameVersion recently received EAPOL frame MAC based Not applicable 802 1X based The user name supplicant identity carried in the most recently received Response Identity EAPOL frame MAC based Not applicable 5 9 Alerts 5 9 1 Fault Alarm When any selected fault event happens the Fault LED on the switch panel will light up and the electric relay will signal at the same time The following pages allow you to set up alert conditions based on your needs for individual switch ports including actions to be taken during disconnection and power failure ORing Industrial Networking Corp 128 ORing IGS 9084GP User Manual Port Link Down Broken Port Active H 2 3 E 3 6 Fi 8 a e oH Hi BC 5 9 2 System Warning SYSLOG Setting L9 9 598 99 a 981 17898 8T IDE PT ORE I8 Fault Alarm Power Failure PwR 1 PWR 2 SYSLOG is a protocol that allows a device to send event notification messages across IP networks to event message collectors It permits separation of the software that generates messages from the system that stores them and the software that reports and analyzes them As Syslog messages are UDP based the sender and receiver will not be aware of it if the packet is lost due to network disconnection and no UDP packet will be resent Label Server Mode ORing Industrial Networking Corp System Log Configuration Server Mode Disabled S
60. Y Cable Diagnostics is requested Cable Status Port port number Pair the status of the cable pair Length the length in meters of the cable pair 5 10 6 SFP Monitor SFP modules with DDM Digital Diagnostic Monitoring function can measure the temperature of the apparatus helping you monitor the status of connection and detect errors immediately You can manage and set up event alarms through DDM Web interface ORing Industrial Networking Corp 140 ORing IGS 9084GP User Manual SFP Monitor Auto refresh Port No 1 2 3 4 5 a n 8 a N A N A N A N A N A N A N A N A N A N A Warning Temperature 85 Pc 0 100 Event Alarm 5yslog 5 10 7 Ping This command sends ICMP echo request packets to another node on the network Using the ping command you can see if another site on the network can be reached ICMP Ping IP Address Ping Size After you press Start five ICMP packets will be transmitted and the sequence number and roundtrip time will be displayed upon reception of a reply The page refreshes automatically until responses to all packets are received or until a timeout occurs PING6 server 10 10 132 20 64 bytes from 64 bytes from 64 bytes from 64 bytes from 64 bytes from 10 10 132 20 icmp _seq 0 time Oms 10 10 132 20 icmp_seq 1 time Oms 10 10 132 20 icmp_seq 2 time Oms 10 10 132 20 icmp _seq 3 time Om
61. active topology for the network Lower path cost ports are chosen as forwarding ports in favor of higher path cost ports The range of valid values is 1 to 200000000 Configures the priority for ports having identical port costs See above Click to save changes Reset Click to undo any changes made locally and revert to previously saved values Mapping This page allows you to examine and change the configurations of current STP MSTI bridge instance MSTI Configuration Add VLANs separated by spaces or comma Unmapped VLANs are mapped to the CIST The default bridge instance Configuration Identification Z Z Configuration Name 00 1e 94 ff f ff pr Configuration Revision PeR MSTI Mapping MSTI VLANs Mapped ORing Industrial Networking Corp 29 The name which identifies the VLAN to MSTI mapping Bridges must share the name and revision see below as well as the Configuration Name VLAN to MSTI mapping configurations in order to share spanning trees for MSTIs intra region The name should not exceed 32 characters Configuration Revision of the MSTI configuration named above This must be Revision an integer between 0 and 65535 MSTI The bridge instance The CIST is not available for explicit mapping as it will receive the VLANs not explicitly mapped The list of VLANs mapped to the MSTI The VLANs must be separated with commas and or space A VLAN can only be VLANS Mapped mapp
62. ag pvid v wt 1 naware T 4 Unaware 3 Unaware hui I 6 Unaware ey i ORing Industrial Networking Corp 65 VLAN ID Settings When setting the management VLAN only the same VLAN ID port can be used to control the switch 9000ies VLAN Settings Open all IP Configuration Ey System Information Ey Front Panel E Sasic Setting Basic Setting Admin Password Auth Method Configured Current DHCP Client a Renew anise 102 168 102 SS WU Ee ee UGUR EE IP Mask 1255 255 255 0 IP Router IP Setting IPv6 Setting HTTPS S9 LLDP Modbus TCP Backup Restore Upgrade Firmware cea Pi ED ED ES HD ED NN 5 4 3 Private VLAN A private VLAN contains switch ports that can only communicate with a given uplink The restricted ports are called private ports Each private VLAN typically contains many private ports and a single uplink The switch forwards all frames received on a private port out the uplink port regardless of VLAN ID or destination MAC address A port must be a member of both a VLAN and a private VLAN to be able to forward packets This page allows you to configure private VLAN memberships for the switch By default all ports are VLAN unaware and members of VLAN 1 and private VLAN 1 Private VLAN Membership Configuration Port Members Delete PVLANID 1 2 3 45 6 7 8 9 1011 12 1 v v Iv v be v Pe wl iv v v vj Check to del
63. alid The number of EAPOL frames of any type that have been transmitted by the switch The number of EAP initial request frames that have been transmitted by the switch The number of valid EAP Request frames Requests dotixAuthEapolReqFramesTx other than initial request frames that have been transmitted by the switch Start dotixAuthEapolStartFramesRx Logoff dotixAuthEapolLogoffFramesRx Total dotixAuthEapolFramesTx Request ID dotixAuthEapolRegIdFramesTx These backend RADIUS frame counters are available for the Backend Server following administrative states Counters e 802 1X MAC based Auth ORing Industrial Networking Corp 127 ORing Backend Server Counters Direction IEEE Name Access Challenges dotixAuthBackendAccessChallenges Other Requests dotixAuthBackendOtherRequestsToSupplicant Auth successes dotixAuthBackendAuthSuccesses Auth Failures dotixAuthBackendAuthFails dotixAuthBackendResponses Information about the last This administrative states e 802 1X MAC based Auth authenticate information Last Supplicant Client Info Last IEEE Name MAC Address VLAN ID Supplicant Client Info 802 1X based supplicant client is available IGS 9084GP User Manual Description Port based Counts the number of times that the switch receives the first request from the backend server following the first response from the supplicant Indicates that the backend server has communicati
64. below Roe 31 xi d Type the name of a program Folder document or Internet resource and Windows will open it Far au telnet 192 168 10 1 Cancel Browse otep 2 The Login screen will appear Use the keyboard to enter the Username and Password same as the password for Web browser and then press Enter ca Telnet 192 168 10 1 IG5 9H8B4GP Command Line Interface Username Password ORing Industrial Networking Corp 149 IGS 9084GP User Manual Commander Groups Command Groups System settings and reset options IP configuration and Ping Port management MAG address table Uirtual LAH Private WLAN Security management Spanning Tree Protocol Link Aggregation Link Aggregation Control Protocol Link Layer Discovery Protocol Power Over Ethernet Quality of Service Port mirroring Load Save of configuration via TFTP Download of firmware via TFTP TEEEI588 Precision Time Protocol Loop Protection MLD IGHMP Snooping Fault Alarm Configuration Event Selection DHCP Server Configuration Ring Configuration Chain Configuration Remote Control Security Fast HRecovery Configuration SFP Monitor Configuration Device Binding Configuration MRP Configuration Modebus TCP Configuration Fastrecovery SFF DeviceHinding ww Modbus System uu Description lt description gt Password password Username username
65. bled a will be displayed Management The neighbors address which can be used to help network Address management This may contain the neighbor s IP address Refresh Click to refresh the page immediately Check to enable an automatic refresh of the page at regular Auto refresh intervals LLDP Statistics This page provides an overview of all LLDP traffic Two types of counters are shown Global counters will apply settings to the whole switch stack while local counters will apply settings to specified switches ORing Industrial Networking Corp 42 Auto refresh L Refresh clear Global Counters Neighbor entries were last changed at 1970 01 01 04 03 03 0000 26 sec ago Total Neighbors Entries Added Total Neighbors Entries Deleted Total Neighbors Entries Dropped Total Neighbors Entries Aged Out LLDP Statistics Local Counters Local Port Tx Frames Rx Frames RxErrors Frames Discarded TLVs Discarded TLVs Unrecognized Org Discarded Age Outs un j e e e e e D OO J Ov Ui I CJ NJ COCOKFAQCONO SO OOoooooon ooo OOOoOOoooooooo OOOoOOoOooooooo OOcooooooooo OOcoooooocoooo OuUoooooooooo OOcoOoooooooooo Global Counters Neighbor entries Shows the time when the last entry was deleted or added were last changed at Total Neighbors Entries Added Total Neighbors Shows the number of new entries added since switch reboot l Shows the number of new entries deleted since switch reboot Entri
66. check for activity on the MAC address in question at regular intervals and free resources if no activity is seen within a given period of time This parameter controls exactly this period and can be set to a number between 10 and 1000000 seconds For ports in MAC based Auth mode reauthentication does not Cause direct communications between the switch and the client so this will not detect whether the client is still attached or not and the only way to free any resources is to age the entry This setting applies to the following modes i e modes using the Port Security functionality to secure MAC addresses MAC Based Auth If a client is denied access either because the RADIUS server denies the client access or because the RADIUS server request times out according to the timeout specified on the Configuration Security AAA page the client is put on hold in Unauthorized state The hold timer does not count during an on going authentication The switch will ignore new frames coming from the client during the hold time The hold time can be set to a number between 10 and 1000000 121 secon 0 O Port 0 The port number for which the configuration below applies If NAS is globally enabled this selection controls the port s authentication mode The following modes are available Force Authorized In this mode the switch will send one EAPOL Success frame when the port link is up and any client on the port will be allowed ne
67. counted as a retransmit as well as a timeout A send to a different server is counted as a Request as well as a timeout Responses radiusAccClientExtResponses r2 radiusAcctClientExtBadAuthenticators Unknown Types radiusAccClientExtUnknownTypes Requests radiusAccClientExtRequests Retransmissions radiusAccClientExtRetransmissions Pending Requests Timeouts radiusAccClientExtTimeouts This section contains information about the state of the server and the latest round trip time RFC4670 Name Description Shows the state of the server It takes one of the following values Disabled The selected server is disabled Not Ready The server is enabled but IP communication is not yet up and Other Info running n Ready The server is enabled IP communication is up and running and the RADIUS module is ready to accept accounting attempts Dead X seconds left Accounting attempts were made to this server but it did not reply within the configured timeout The server has temporarily been disabled but will get re enabled when the dead time expires The number of seconds left before this occurs is displayed in parentheses This state is only reachable when more than one server is enabled The time interval measured in milliseconds between the most recent Response and the Request that matched it from the RADIUS accounting server The granularity of this measurement is 100 ms A value of 0 ms indicates that there hasn t been
68. ctual queue shaper rate e g 800 Mbps Shows disabled or actual port shaper rate e g 800 Mbps 5 6 9 DSCP based QoS This page allows you to configure DSCP based QoS Ingress Classification settings for all ports DSCP Based QoS Ingress Classification DSCP no delB 0 BE O A 2 L1 C 4 O s D ORing Industrial Networking Corp Trust QoS Class DPL 85 DSCP Maximum number of supported DSCP values is 64 Check to trust a specific DSCP value Only frames with trusted DSCP values are mapped to a specific QoS class and drop precedence level Frames with untrusted DSCP values are treated as a non IP frame QoS Class QoS class value can be any number from 0 7 Drop Precedence Level 0 1 5 6 10 DSCP Translation This page allows you to configure basic QoS DSCP translation settings for all switches DSCP translation can apply to Ingress or Egress DSCP Translation Ingress Egress Translate Classify Remap DPO Remap DP1 DSCP V T P V 4 a M QA amp 1 BE BE iii LJ PIJ e c tu m LJ PRI PI Co A To m S lt ii fi sies pn ii LSS S S C51 C51 Be ek D RE DI REL ER Wo co uo uo f DSCP Maximum number of supported DSCP values is 64 and valid DSCP value ranges from 0 to 63 Ingress DSCP can be first translated to new DSCP before using the DSCP for QoS class and DPL map There are two conf
69. disables DDOS prevention Analyzing analyzes packet throughput for initialization Running analysis completes and ready for next move Attacked DDOS attacks occur Device Description This page allows you to configure device description settings Device Description e e RJ e Fo wu ORing Industrial Networking Corp IP Camera IP Phone Access Point Network Video Recorder Device Location Address Description 99 ORing IGS 9084GP User Manual Indicates device types Possible types are no specification IP Camera IP Phone Access Point PC PLC Network Video Recorder Indicates location information of the device The information can be Location Address l used for Google Mapping Description Device descriptions Stream Check Stream check monitors the consistency of real time network traffic from the device bound with Device Type the port When the traffic changes sharply all of a sudden an alert will be issued This page allows you to configure stream check settings Stream Check Mode Action Status Enabled Normal pees ar amp Il 1 4 ES us SS a Ge ow MD m Enables or disables stream monitoring of the port Mode Indicates the action to take when the stream gets low Possible actions are no action Log it simply logs the event ORing Industrial Networking Corp 100 5 8 3 ACL An ACL Access Control List is a li
70. e Port Security Limit Control functionality The current state of the port It can undertake one of the following values Globally Disabled NAS is globally disabled Link Down NAS is globally enabled but there is no link on the port Authorized the port is in Force Authorized or a single supplicant mode and the supplicant is authorized Unauthorized the port is in Force Unauthorized or a single supplicant mode and the supplicant is not successfully authorized by the RADIUS server X Auth Y Unauth the port is in a multi supplicant mode Currently X clients are authorized and Y are unauthorized Two buttons are available for each row The buttons are only enabled when authentication is globally enabled and the port s Admin State is in an EAPOL based or MAC based mode Clicking these buttons will not cause settings changed on the page to take effect Reauthenticate schedules a reauthentication whenever the 125 ORing IGS 9084GP User Manual quiet period of the port runs out EAPOL based authentication For MAC based authentication reauthentication will be attempted immediately The button only has effect on successfully authenticated clients on the port and will not cause the clients to be temporarily unauthorized Reinitialize forces a reinitialization of the clients on the port and hence a reauthentication immediately The clients will transfer to the unauthorized state while the reauthentication is in prog
71. e group that devices and management stations running SNMP belong to It helps define where information is sent A SNMP device or agent may belong to more than one SNMP community It will not respond to requests from management stations that do not belong to one of its communities This page allows you to configure SNMPv3 community table The entry index key is Community SNMPv3 Communities Configuration Delete Community Source IP Source Mask public 0 0 0 0 0 0 0 0 private 0 0 0 0 0 0 0 0 Check to delete the entry It will be deleted during the next save Indicates the community access string to permit access to SNMPv3 Community agent The allowed string length is 1 to 32 and only ASCII characters from 33 to 126 are allowed ORing Industrial Networking Corp 70 SoucelP Indicates the SNMP source address Indicates the SNMP source address mask 5 5 3 SNMP User Configurations Each SNMP user has a specified username a group to which the user belongs authentication password authentication protocol privacy protocol and privacy password When you create a user you must associate it with an SNMP group The user then inherits the security model of the group This page allows you to configure the SNMPv3 user table The entry index keys are Engine ID and User Name SNMPv3 Users Configuration User Security Authentication Authentication Privacy Privacy Name Level Protocol Password Protocol Password
72. e less than 30ms over 250 units TOS Diffserv supported Quality of Service 802 1p for real time traffic VLAN 802 1Q with VLAN tagging IGMP Snooping IP based bandwidth management Application based QoS management DOS DDOS auto prevention Port configuration status statistics monitoring security DHCP Server Client Relay SMTP Client Modbus TCP O Ring Open Ring O Chain MRP MSTP RSTP STP compatible RS 232 Serial Console Port RS 232 in RJ 45 connector with console cable 115200bps 8 N 1 Switch LED indicators Power Indicator PWR 1 2 Green Power LED x 3 R M indicator R M Green indicate system operated in O Ring Master mode ORing Industrial Networking Corp 166 Ring indicator Ring Green indicate system operated in O Ring mode Fault indicator Fault Amber Indicate Amber Indicate unexpected event occurred 0 event occurred 10 100 1000Base T X RJ 45 port Green for Link Act indicator Amber for duplex indicator indicator 100 1000Base X SFP Port Indicator Green for port Link Act Fault contact Power Physical Characteristic 96 4 boc mm x 4 15 D x 6 06 H inch Environmental Storage Temperature 40 to 85 C 40 to 185 F Operating Temperature 40 to 70 C 40 to 158 F Operating Humidity 5 to 95 Non condensing Regulatory approvals EMI FCC Part 15 CISPR EN55022 class A EN61000 4 2 ESD EN61000 4 3 RS EN61000 4 4 EFT EN61000 4 5 Surge EN61000 4 6 CS
73. e same start address The gt gt button will use the last entry of the currently displayed VLAN MAC address pairs as a basis for the next lookup When it reaches the end the text no more entries is shown in the displayed table Use the lt lt button to start over ORing Industrial Networking Corp 134 MAC Address Table Auto refresh CI Start from VLAN and MAC address 00 00 00 00 00 0 with 20 entries per page Port Members VLAN MAC Address CPU 1 2 3 4 5 6 7 8 9 1011 12 Static 00 1E 34 32 83 83 wv Static 00 1E 94 FF FF FF q Static 80 C2 4A 44 06 W v ww SN N NNN NEN NE Static 33 33 FF A8 0A 01 y Static 33 33 FF FF FF FF w 5 10 2 Port Statistics Traffic Overview This page provides an overview of general traffic statistics for all switch ports Port Statistics Overview Auto refresh L Port Packets Bytes Errors Drops Filtered Receive Transmit Receive Transmit Receive Transmit Receive Transmit Receive 11 7980 86946125 9117790 6259918088 0 0 0 0 0 a 08732984 68732987 4957477714 4957477932 24710409 0 0 0 0 0 0 0 0 0 08732985 08732987 4957477883 4957477932 25204638 0 0 0 euuougooocrmudccostkzZuxu D O G O G O GO G O G D O O O O O O O O O O O D O D O O G O G O G oe 0 0 0 0 0 0 a 0 0 0 a 0 a 0 0 t a Dee S The switch port number to which the following settings will be applied The number of received and transmitted packets per port ORing Industrial Networking Corp 1
74. e server and the latest round trip time RFC4668 Name Description Shows the state of the server It takes one of the following values Disabled The selected server is disabled Not Ready The server is enabled but IP communication is not yet up and Other Info running l ae l Ready The server is enabled IP communication is up and running and the RADIUS module is ready to accept access attempts Dead X seconds left Access attempts were made to this server but it did not reply within the configured timeout The server has temporarily been disabled but will get re enabled when the dead time expires The number of seconds left before this occurs is displayed in parentheses This state is only reachable when more than one server is enabled The time interval measured in milliseconds between the most recent Access Reply Access Challenge and the Access Request that matched it from the RADIUS radiusAuthClientExtRoundTripTime authentication server The granularity of this measurement is 100 ms A value of 0 ms indicates that there hasn t been round trip communication with the server yet RADIUS Accounting Statistics for Server 1 Receive Packets Transmit Packets Responses Requests Malformed Responses Retransmissions Bad Authenticators Pending Requests Unknown Types Timeouts Packets Droppec Other Info IP Address 0 0 0 0 1813 State Disabled Round Trip Time 0 ms Dmspin S RADIUS accounting server packet counters The
75. e the drop down list to select which port details to be displayed NAS Statistics Port 2 Port2 Auto refresh D Port State Pieces Force Authorized Port State 3ally Disabled Admin State The port s current administrative state Refer to NAS Admin State for more details regarding each value Port State The current state of the port Refer to NAS Port State for more details regarding each value These supplicant frame counters are available for the following administrative states Force Authorized Force Unauthorized e 802 1X EAPOL Counters Direction IEEE Name Description The number of valid EAPOL frames of any EAPOL C Total dotixAuthEapolFramesRx type that have been received by the switch The number of valid EAP Resp ID frames that OU nte rs Response ID dotixAuthEapolRespIdFramesRx have been received by the switch The number of valid EAPOL response frames Responses dotixAuthEapolRespFramesRx other than Resp ID frames that have been received by the switch The number of EAPOL Start frames that have been received by the switch The number of valid EAPOL logoff frames that have been received by the switch The number of EAPOL frames that have Invalid Type dotixAuthInvalidEapolFramesRx been received by the switch in which the frame type is not recognized The number of EAPOL frames that have Invalid Length dotixAuthEapLengthErrorFramesRx been received by the switch in which the Packet Body Length field is inv
76. ead time expires The number of seconds left before this occurs is displayed in parentheses This state is only reachable when more than one server is enabled RADIUS Accounting Server Status Overview IP Address Status Disabled Disabled Disabled Disabled Disabled DENN The RADIUS server number Click to navigate to detailed statistics of ORing Industrial Networking Corp 115 pd the server ooo The IP address and UDP port number in lt IP Address gt lt UDP Port gt notation of the server IP Address The current status of the server This field has one of the following values Disabled the server is disabled Not Ready the server is enabled but IP communication is not yet up and running Ready the server is enabled IP communication is up and running and the RADIUS module is ready to accept accounting attempts Dead X seconds left accounting attempts are made to this server but it does not reply within the configured timeout The server has temporarily been disabled but will be re enabled when the dead time expires The number of seconds left before this occurs is displayed in parentheses This state is only reachable when more than one server is enabled Authentication and Accounting Server Statistics This page shows the access statistics of the authentication and accounting servers Use the server drop down list to switch between the backend servers to show related details RADIUS Authentica
77. ecurity_model gt lt security_level gt read view name write view name Access Delete index F Access Lookup lt index gt Firmware Load lt ip_addr_string gt lt file_name gt Configuration lt clockinst gt ClockCreate lt clockinst gt devtype lt twostep gt lt protocol gt lt oneway gt lt clockid gt lt tag_enable gt lt vid gt prio ClockDelete lt clockinst gt lt devtype gt DefaultDS lt clockinst gt lt priority1 gt lt priority2 gt lt domain gt CurrentDS lt clockinst gt ParentDS lt clockinst gt Timingproperties lt clockinst gt lt utcoffset gt lt valid gt lt leap59 gt lt leap61 gt lt timetrac gt freqtrac lt ptptimescale gt lt timesource gt PTP PortDataSet lt clockinst gt lt port_list gt lt announceintv gt lt announceto gt lt syncintv gt delaymech lt minpdelayreqintv gt lt delayasymmetry gt lt ingressLatency gt LocalClock lt clockinst gt updatelshowlratio clockratio Filter lt clockinst gt def delay filt period lt dist gt ORing Industrial Networking Corp 160 Servo lt clockinst gt displaystates ap enable ai enable ad enable lt ap gt lt ai gt lt ad gt MasterTableUnicast lt clockinst gt ExtClockMode lt one_pps_mode gt lt ext_enable gt lt clockfreq gt vcxo enable Wireless delay
78. ed to one MSTI An unused MSTI will be left empty ex without any mapped VLANs Click to save changes Click to undo any changes made locally and revert to previously saved values Priority This page allows you to examine and change the configurations of current STP MSTI bridge instance priority MSTI Configuration MSTI Fronty Configuration je MSTI Priority CIST 128 MST1 128 v MST2 128 v MsT3 128 MST4 128 MSTS 128 wj MST6 128 MST7 v Save J Reset Label MSTI The bridge instance CIST is the default instance which is always active Priority Indicates bridge priority The lower the value the higher the priority The bridge ORing Industrial Networking Corp 30 priority MSTI instance number and the 6 byte MAC address of the switch forms a bridge identifier Click to save changes Reset Click to undo any changes made locally and revert to previously saved values 4 4 3 CIST With the ability to cross regional boundaries CIST is used by MSTP to communicate with other MSTP regions and with any RSTP and STP single instance spanning trees in the network Any boundary port that is if it is connected to another region will automatically belongs solely to CIST even if it is assigned to an MSTI All VLANs that are not members of particular MSTIs are members of the CIST Port Settings STP CIST Ports Configuration CIST Aggregated Ports Configuration
79. ers from 33 to 126 are allowed The field only suits to SNMPv1 and SNMPv2c SNMPv3 uses USM for authentication and privacy and the community string will be Write Community associated with SNMPv3 community table Indicates the SNMPv3 engine ID The string must contain an even number between 10 and 64 hexadecimal digits but all zeros and ORing Industrial Networking Corp 68 all F s are not allowed Change of the Engine ID will clear all original local users SNMP Trap Configuration Trap Mode Disabled _ Trap Version SNMP vi Trap Community Trap Destination Address Trap Destination IPv6 Address Trap Authentication Failure nable Trap Link up and Link down Enabled Trap Inform Mode abled Trap Inform Timeout seconds Trap Inform Retry Times Indicates existing SNMP trap mode Possible modes include Trap Mode Enabled enable SNMP trap mode Disabled disable SNMP trap mode Indicates the supported SNMP trap version Possible versions include Trap Version SNMP v1 supports SNMP trap version 1 SNMP v2c supports SNMP trap version 2c SNMP v3 supports SNMP trap version 3 Indicates the community access string when sending SNMP trap Trap Community packets The allowed string length is 0 to 255 and only ASCII characters from 33 to 126 are allowed Trap Destination Indicates the SNMP trap destination address Address Provides the trap destinati
80. ertified release v Port Edge lt port_list gt enableldisable Status msti lt port_list gt ORing Industrial Networking Corp 159 Port Mcheck lt port_list gt Msti Port Configuration lt msti gt lt port_list gt Msti Port Cost lt msti gt lt port_list gt lt path_cost gt Msti Port Priority lt msti gt lt port_list gt lt priority gt Add port list lt aggr_id gt Ager Delete aggr id Port Statistics lt port_list gt Aggr Lookup lt aggr_id gt Mode smacldmacliplport enableldisable LACP Configuration lt port_list gt Role lt port_list gt activelpassive Status lt port_list gt Statistics lt port_list gt clear Mode lt port_list gt enableldisable Key lt port_list gt lt key gt LLDP Configuration lt port_list gt Mode lt port_list gt enableldisable LLDI Statistics lt port_list gt clear 1 Info lt port_list gt PoE PoE Configuration lt port_list gt ORing Industrial Networking Corp 156 Mode lt port_list gt disabledlpoelpoe Priority lt port_list gt lowlhighlcritical Mgmt mode class_conlclass_reslal_conlal_resllldp_resllldp_con Maximum Power lt port_list gt port power Primary Supply supply power QoS QCL Add lt qce_id gt qce id next port list tag vid pcp lt dei gt smac dmac ty
81. erver Address Reset Indicates existing server mode When the mode operation is enabled the syslog message will be sent to syslog server The syslog protocol is based on UDP communications and received on UDP port 514 and the syslog server will not send acknowledgments back to the sender since UDP is a connectionless protocol and it does not provide acknowledgments The syslog packet will 129 ORing IGS 9084GP User Manual always be sent even if the syslog server does not exist Possible modes are Enabled enable server mode Disabled disable server mode SYSLOG Server IP Address Indicates the IPv4 host address of syslog server If the switch provides DNS functions it also can be a host name SMTP Setting SMTP Simple Mail Transfer Protocol is a protocol for transmitting e mails across the Internet By setting up SMTP alert the device will send a notification e mail when a user defined event occurs SMTP Setting SMTP Server Address Sender E mail Address Mail Subject Bl Authentication Recipient E mail Address 1 Recipient E mail Address 2 Recipient E mail Address 3 Recipient E mail Address 4 Recipient E mail Address 5 Recipient E mail Address 6 rn E mail Alarm Enables or disables transmission of system warnings by e mail Sender E mail SMTP server IP address Address Authentication B Username the authent
82. es Deleted Total Neighbors Shows the number of LLDP frames dropped due to full entry table Entries Dropped Total Neighbors l Shows the number of entries deleted due to expired time to live Entries Aged Out Local Counters If a port receives an LLDP frame and the switch s internal table is full the LLDP frame will be counted and discarded This situation is known as too many neighbors in the LLDP standard LLDP Frames Discarded frames require a new entry in the table if Chassis ID or Remote Port ID is not included in the table Entries are removed from the table when a given port links down an LLDP shutdown frame is ORing Industrial Networking Corp 43 ORing IGS 9084GP User Manual re received or when the entry ages out Each LLDP frame can contain multiple pieces of information TLVs Discarded known as TLVs Type Length Value If a TLV is malformed it will be counted and discarded TLVs Unrecognized The number of well formed TLVs but with an unknown type value Org Discarded The number of organizationally TLVs received Each LLDP frame contains information about how long the LLDP information is valid age out time If no new LLDP frame is Age Outs received during the age out time the LLDP information will be removed and the value of the age out counter will be incremented Refresh Click to refresh the page immediately a Click to clear the local counters All counters including global ear coun
83. es receive a bigger slice of bandwidth than those in a lower priority queue QoS Ingress Port Classification Tag Class DSCP Based Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled EX P3 4088 PL LS PETS PERS PESE PEL ES The port number for which the configuration below applies Controls the default QoS class All frames are classified to a QoS class There is a one to one mapping between QoS class queue and priority A QoS class of O zero has the lowest priority If the port is VLAN aware and the frame is tagged then the frame QoS Class is classified to a QoS class that is based on the PCP value in the tag as shown below Otherwise the frame is classified to the default QoS class PCP value 01234567 QoS class 10234567 ORing Industrial Networking Corp 76 ORing DP level Tag Class IGS 9084GP User Manual If the port is VLAN aware the frame is tagged and Tag Class is enabled then the frame is classified to a QoS class that is mapped from the PCP and DEI value in the tag Otherwise the frame is classified to the default QoS class The classified QoS class can be overruled by a QCL entry Note if the default QoS class has been dynamically changed then the actual default QoS class is shown in parentheses after the configured default QoS class Controls the default Drop Precedence L
84. ete the entry It will be deleted during the next save ORing Industrial Networking Corp 66 Private VLAN ID Indicates the ID of this particular private VLAN MAC Address The MAC address for the entry A row of check boxes for each port is displayed for each private VLAN ID You can check the box to include a port in a private Port Members VLAN To remove or exclude the port from the private VLAN make sure the box is unchecked By default no ports are members and all boxes are unchecked Click Add new Private VLAN to add a new private VLAN ID An empty row is added to the table and the private VLAN can be configured as needed The allowed range for a private VLAN ID is the same as the switch port number range Any values outside Adding a New Static this range are not accepted and a warning message appears Entry Click OK to discard the incorrect entry or click Cancel to return to the editing and make a correction The private VLAN is enabled when you click Save The Delete button can be used to undo the addition of new private VLANs A private VLAN is defined as a pairing of a primary VLAN with a secondary VLAN A promiscuous port is a port that can communicate with all other private VLAN port types via the primary VLAN and any associated secondary VLANs whereas isolated ports can communicate only with a promiscuous port Port Isolation Configuration Open in new window Port Number TIGRE CNN A check box is p
85. evel All frames are classified to a DP level If the port is VLAN aware and the frame is tagged then the frame is Classified to a DP level that is equal to the DEI value in the tag Otherwise the frame is classified to the default DP level If the port is VLAN aware the frame is tagged and Tag Class is enabled then the frame is classified to a DP level that is mapped from the PCP and DEI value in the tag Otherwise the frame is classified to the default DP level The classified DP level can be overruled by a QCL entry Controls the default PCP value All frames are classified to a PCP value If the port is VLAN aware and the frame is tagged then the frame is classified to the PCP value in the tag Otherwise the frame is classified to the default PCP value Controls the default DEI value All frames are classified to a DEI value If the port is VLAN aware and the frame is tagged then the frame is classified to the DEI value in the tag Otherwise the frame is classified to the default DEI value Shows the classification mode for tagged frames on this port Disabled Use default QoS class and DP level for tagged frames Enabled Use mapped versions of PCP and DEI for tagged frames Click on the mode to configure the mode and or mapping Note this setting has no effect if the port is VLAN unaware Tagged frames received on VLAN unaware ports are always classified to the default QoS class and DP level DSCP Based Click to enable DSC
86. failure indication Besides forwarding the result to the supplicant the switch uses it to open up or block traffic on the switch port connected to the supplicant Note in an environment where two backend servers are enabled ORing Industrial Networking Corp 122 the server timeout is configured to X seconds using the authentication configuration page and the first server in the list is currently down but not considered dead if the supplicant retransmits EAPOL Start frames at a rate faster than X seconds it will never be authenticated because the switch will cancel on going backend authentication server requests whenever it receives a new EAPOL Start frame from the supplicant Since the server has not failed because the X seconds have not expired the same server will be contacted when the next backend authentication server request from the switch This scenario will loop forever Therefore the server timeout should be smaller than the supplicant s EAPOL Start frame retransmission rate a Single 802 1X In port based 802 1X authentication once a supplicant is successfully authenticated on a port the whole port is opened for network traffic This allows other clients connected to the port for instance through a hub to piggy back on the successfully authenticated client and get network access even though they are not authenticated individually To overcome this security breach use the Single 802 1X variant Single 802 1X is n
87. g DHCP relay mode The modes include Enabled activate DHCP relay When DHCP relay is enabled the ORing Industrial Networking Corp 46 ORing Relay Server Relay Mode Relay Policy Information Information IGS 9084GP User Manual agent forwards and transfers DHCP messages between the clients and the server when they are not in the same subnet domain to prevent the DHCP broadcast message from flooding for security considerations Disabled disable DHCP relay Indicates the DHCP relay server IP address A DHCP relay agent is used to forward and transfer DHCP messages between the clients and the server when they are not in the same subnet domain Indicates the existing DHCP relay information mode The format of DHCP option 82 circuit ID format is vlan_id module_id port_no The first four characters represent the VLAN ID and the fifth and sixth characters are the module ID In stand alone devices the module ID always equals to 0 in stacked devices it means switch ID The last two characters are the port number For example 00030108 means the DHCP message received form VLAN ID 3 switch ID 1 and port No 8 The option 82 remote ID value equals to the switch MAC address The modes include Enabled activate DHCP relay information When DHCP relay information is enabled the agent inserts specific information option 82 into a DHCP message when forwarding to a DHCP server and removes it from a DHCP message when t
88. gress filtering is Ingress Filtering enabled and the ingress port is not a member of the classified VLAN of the frame the frame will be discarded By default ingress filtering is disabled no check mark Determines whether the port accepts all frames or only Frame Type tagged untagged frames This parameter affects VLAN ingress processing If the port only accepts tagged frames untagged ORing Industrial Networking Corp 58 frames received on the port will be discarded By default the field is set to All The allowed values are None or Specific This parameter affects VLAN ingress and egress processing If None is selected a VLAN tag with the classified VLAN ID is inserted in frames transmitted on the port This mode is normally used for ports connected to VLAN aware switches Tx tag should be set to Untag_pvid when this mode is used Port VLAN Mode If Specific the default value is selected a port VLAN ID can be configured see below Untagged frames received on the port are classified to the port VLAN ID If VLAN awareness is disabled all frames received on the port are classified to the port VLAN ID If the classified VLAN ID of a frame transmitted on the port is different from the port VLAN ID a VLAN tag with the classified VLAN ID will be inserted in the frame Configures the VLAN identifier for the port The allowed range of the values is 1 through 4095 The default value is 1 Port VLAN ID Note The port must
89. he administrator or is the physical link state for the attached LANs transitions frequently Configures whether the port connects to a point to point LAN rather than Bombe a shared medium This can be configured automatically or set to true or false manually Transiting to forwarding state is faster for point to point LANs than for shared media Click to undo any changes made locally and revert to previously saved values 4 5 Fast Recovery Fast recovery mode can be set to connect multiple ports to one or more switches The device with fast recovery mode will provide redundant links Fast recovery mode supports 12 priorities Only the first priority will be the active port and the other ports with different priorities will be backup ports ORing Industrial Networking Corp 32 ORing IGS 9084GP User Manual Fast Recovery Mode NIB Noti j ETE Hot included w RIER Not included v emn Active Activate fast recovery mode Ports can be set to 12 priorities Only the port with the highest priority will be the active port 1st Priority is the highest Click to activate the configurations ORing Industrial Networking Corp 33 Management The switch can be controlled via a built in web server which supports Internet Explorer Internet Explorer 5 0 or above versions and other Web browsers such as Chrome Therefore you Can manage and configure the switch easily and remotely You can also upgrade f
90. he switch Check this box to enable an automatic refresh of the page at regular Auto refresh intervals Updates system log entries starting from the current entry ID Flushes all system log entries Updates system log entries starting from the first available entry ID Updates system log entries ending at the last entry currently displayed Updates system log entries starting from the last entry currently gt gt displayed Updates system log entries ending at the last available entry ID 5 10 5 Cable Diagnostics You can perform cable diagnostics for all ports or selected ports to diagnose any cable faults short open etc and feedback a distance to the fault Simply select the port from the drop down list and click Start to run the diagnostics This will take approximately 5 seconds If all ports are selected this can take approximately 15 seconds When completed the page refreshes automatically and you can view the cable diagnostics results in the cable status ORing Industrial Networking Corp 139 table Note that VeriPHY diagnostics is only accurate for cables 7 140 meters long 10 and 100 Mbps ports will be disconnected while running VeriPHY diagnostics Therefore running VeriPHY on a 10 or 100 Mbps management port will cause the switch to stop responding until VeriPHY is completed VeriPHY Cable Diagnostics Cable Status Length A ParB LengthB PairrC LengthC PairD Length D Pot The port for which VeriPH
91. iately Check to enable an automatic refresh of the page at regular Auto refresh intervals STP Bridge Configurations STP Bridge Configuration Basic Settings Protocol Version Forward Delay 15 Max Age Maximum Hop Count Transmit Hold Count 6 The version of the STP protocol Valid values include STP RSTP Protocol Version and MSTP The delay used by STP bridges to transit root and designated Forward Delay ports to forwarding used in STP compatible mode The range of valid values is 4 to 30 seconds The maximum time the information transmitted by the root bridge Max Age is considered valid The range of valid values is 6 to 40 seconds and Max Age must be lt FwdDelay 1 2 Maximum Hop Count This defines the initial value of remaining hops for MSTI ORing Industrial Networking Corp 27 information generated at the boundary of an MSTI region It defines how many bridges a root bridge can distribute its BPDU information to The range of valid values is 4 to 30 seconds and MaxAge must be lt FwdDelay 1 2 The number of BPDUs a bridge port can send per second When Transmit Hold Count exceeded transmission of the next BPDU will be delayed The range of valid values is 1 to 10 BPDUs per second Click to save changes Click to undo any changes made locally and revert to previously saved values 4 4 2 MSTP Since the recovery time of STP and RSTP takes seconds which are unacceptable in some
92. icated because the switch will cancel on going backend authentication server requests whenever it receives a new EAPOL otart frame from the supplicant Since the server has not failed because the X seconds have not expired the same server will be contacted when the next backend authentication server request from the switch This scenario will loop forever Therefore the server timeout should be smaller than the supplicant s EAPOL Start frame retransmission rate Overview of MAC Based Authentication Unlike 802 1X MAC based authentication is not a standard but merely a best practices method adopted by the industry In MAC based authentication users are called clients and the switch acts as the supplicant on behalf of clients The initial frame any kind of frame sent by a client is snooped by the switch which in turn uses the client s MAC address as both username and password in the subsequent EAP exchange with the RADIUS server The 6 byte MAC address is converted to a string in the following form xx xx xx xx xx xx that is a dash is used as separator between the lower cased hexadecimal digits The switch only supports the MD5 Challenge authentication method so the RADIUS server must be configured accordingly When authentication is complete the RADIUS server sends a success or failure indication which in turn causes the switch to open up or block traffic for that particular client using static entries into the MAC Table Only the
93. ication username B Password the authentication password B Confirm Password re enter password Recipient E mail The recipient s e mail address A mail allows for 6 recipients Address Apply Click to activate the configurations ORing Industrial Networking Corp 130 Event Selection The device supports both SYSLOG and SMTP alerts Check the corresponding box to enable the system event warning method you want Please note that the checkboxes will gray out if SYSLOG or SMTP is disabled system Warning Event Selection System Events SYSLOG SMIP System Start Power Status SNMP Authentication Failure Redundant Ring Topolagy Change SYSLOG Disabled Disabled Disabled Disabled E Disabled _ Disabled _ Disabled Disabled Link Up and Link D Down v Link Up Link Down Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled wi Disabled Disabled _ Disabled SE eg qum Disabled _ Ka Disabled System Cold Start Sends out alerts when the system is restarted Power Status Sends out alerts when power is up or down SNMP Authentication Sends out alert when SNMP authentication fails ic fe l li D Go Gh LA a W a inxs B s Pad Failure O Ring Topology Sends out alerts when O Ring topology changes Change Port Event Disable SYSLOG SMTP Link Up event Link Down Link Up amp Link Do
94. iew Call Transfer Help Connect Toes Wr termnial Enter details for the phone number that you want to dial Country region Taiwan 885 i Area cade Phone number SS Connect using od Cancel Discannected Auto detect Auto detect SCROLL caps NUM Capture Print echo E Step 4 A pop up window that indicates COM port properties appears including bits per second data bits parity stop bits and flow control ORing Industrial Networking Corp 147 Prmnig Hwe Prpmuns x nmi xl i xf s Fort Settings Bits per second 115200 Data bits 8 Parity None Stop bits Flow control None Restore Defaults OF Cancel Apply Disconnected Auto detect Auto detect SCROLL caps NUM Capture Print echo E Step 5 The console login screen will appear Use the keyboard to enter the Username and Password same as the password for Web browsers then press Enter I65 98846P Command Line Interface Username Password CLI Management by Telnet You can can use TELNETio configure the switch The default values are IP Address 192 168 10 1 ORing Industrial Networking Corp 148 Subnet Mask 255 255 255 0 Default Gateway 192 168 10 254 User Name admin Password admin Follow the steps below to access console via Telnet Step 1 Telnet to the IP address of the switch from the Run window by inputingcommands or from the MS DOS prompt as
95. ignment RS 232 with DB9 female connector DB9 to RJ 45 Pin 42 RD Pin 2 TD Pin 3 TD Pin 3 RD Pin 3 Pin 5 GD Pin 5 GD Pin 5 DEB Male Shield DEY Female Signal Ground Received Lina Signa Detect q Mn Lum King Indicator al m d DCE Ready 9 Trar amp mitted Data DTE Ready wg 4 m g Clear to Send 7 Clear to Send Transmitted Data Received Data 3 8 7e P di iM Request to Send Received Data 7 Request to Send DTE Ready 4 79 ae 9 5 1 d Received Line Signal Detect 777 DCE Ready Signal Ground Ring Indicator Shield Ml Received by D TE Device S a Recelved by DCE Device f be Transmitted from DTE Device P Transmitted from GCE Device SFP The switch comes with fiber optical ports that utilize SFP connectors The fiber optical ports are in multi mode 0 to 550M 850 nm with 50 125 um 62 5 125 um fiber and single mode with LC connectors Please remember that the TX port of Switch A should be connected to the RX port of Switch B Switch A Switch B Fiber cord ORing Industrial Networking Corp 17 3 4 2 O Ring O Chain O Ring You can connect three or more switches to form a ring topology to gain network redundancy capabilities through the following steps 1 Connect each switch to form a daisy chain using an Ethernet cable 2 Set one of the connected switches to be the master and make sure the port setting of each connected switch on the manageme
96. iguration ugut naaa Disabled Ea n Ow 0 Ch Ln amp LJ WH The switch port number to which the following settings will be applied Drop down list for selecting a mirror mode Rx only only frames received on this port are mirrored to the mirror port Frames transmitted are not mirrored Tx only only frames transmitted from this port are mirrored to the mirror port Frames received are not mirrored Disabled neither transmitted nor recived frames are mirrored Enabled both received and transmitted frames are mirrored to the mirror port Note for a given port a frame is only transmitted once Therefore you cannot mirror Tx frames to the mirror port In this case mode for the selected mirror port is limited to Disabled or Rx nly 5 10 4 System Log Information This page provides switch system log information ORing Industrial Networking Corp 138 System Log Information Auto refresh C The total number of entries is 1 for the given level Start from ID 1 with 20 entries per page ID Level Message Info 1970 01 01 00 01 09 0000 Port 1 Device 192 168 10 66 Alive Check Io The ID gt 1 of the system log entry The level of the system log entry The following level types are supported Info provides general information Warning provides warning for abnormal operation Error provides error message All enables all levels The time of the system log entry The MAC address of t
97. iguration parameters for DSCP Translation 1 Translate Enables ingress translation of DSCP values based on the specified classification method DSCP can be translated to any of 0 63 DSCP values 2 Classify Enable Classification at ingress side as defined in the QOhRingindustialNetwokingCop SSS R35 Industrial Networking Corp 86 re QoS Port DSCP Configuration table Configurable engress parameters include Remap DPO Re maps DPO field to selected DSCP value DPO indicates a drop precedence with a low priority You can select the DSCP value from a selected menu to which you want to remap DSCP value ranges form 0 to 63 Remap DP1 Re maps DP1 field to selected DSCP value DP1 indicates a drop precedence with a high priority You can select the DSCP value from a selected menu to which you want to remap DSCP value ranges form 0 to 63 5 6 11 DSCP Classification This page allows you to configure the mapping of QoS class and Drop Precedence Level to DSCP value DSCP Classification QoS Class DPL DSCP s ow Select the classified DSCP value 0 63 5 6 12 QoS Control List This page shows all the QCE Quality Control Entries for a given QCL You can edit or add new QoS control entries in this page A QCE consists of several parameters These parameters vary with the frame type you select ORing Industrial Networking Corp 87 QCE Configuration Port Members 11 127 13 14 15 16 17 18 19 20 2 mE 28
98. in separate queues for packets from each source and prevent specific traffic to use up all bandwidth This page allows you to configure Scheduler and Shapers for individual ports QoS Egress Port Scheduler and Shaper Strict Priority Strict Priority uses queues based only priority When traffic arrives the device traffic on the ORing Industrial Networking Corp 81 highest priority queue will be transmitted first followed by traffic on lower priorities If there is always some content in the highest priority queue then the other packets in the rest of queues will not be sent until the highest priority queue is empty The SP algorithm is preferred when the received packets contain high priority data such as voice and video Porti Ww QoS Egress Port Scheduler and Shapers Port 1 Queue Shaper Port Shaper Enable Rate Unit Excess Enable Rate Unit Scheduler Mode Two scheduling modes are available Strict Priority or Weighted Queue Shaper mE Enabl Check to enable queue shaper for individual switch ports nable Configures the rate of each queue shaper The default value is Queue Shaper Rate 500 This value is restricted to 100 to 1000000 whn the Unit is kbps and it is restricted to 1 to 3300 when the Unit is Mbps Configures the rate for each queue shaper The default value is Queues Shaper Unit 500 This value is restricted to 100 to 1000000 when the Unit is kbps and it is restricted to 1 to 3300 when the Unit is Mbps ORi
99. in the table by examining the source address of each packet received on a port This is called learning It allows the MAC table to expand dynamically If the learning mode for a given port is grayed out it means another module is in control of the mode and thus the user cannot change the configurations An example of such a module is MAC Based authentication under 802 1 X MAC Table Learning Port Members Learning is done automatically as soon as a frame with unknown SMAC is received Only static MAC entries are learned all other frames are dropped Note make sure the link used for managing the switch is added to the static Mac table before changing to secure learning mode otherwise the management link will be lost and can only be restored by using another non secure port or by connecting to the switch via the serial interface Static MAC Table Configurations This tablet shows the static entries in the MAC table which can contain up to 64 entries Using static MAC address entries can reduce broadcast packets remarkably and are suitable for networks where network devices seldom change You can manage the entries in this page The MAC table is sorted first by VLAN ID and then by MAC address ORing Industrial Networking Corp 133 Static MAC Table Configuration Port Members Delete VLAN ID MAC Address 12 3 45 6 7 8 9 1011 12 L 00 1E 24 98 8g3 g9 mrs rF F F FJ F FJ F Delete 1 00 00 00 00 00 00 F1 EJ EJ EJ EJ EJ EH
100. irmware via a Web browser The Web management function not only reduces network bandwidth consumption but also enhances access speed and provides a user friendly viewing screen Note By default IE5 0 or later version do not allow Java applets to open sockets You need to modify the browser setting separately in order to enable Java applets for network ports Management via Web Browser Follow the steps below to manage your switch via a Web browser System Login 1 Launch an Internet Explorer 2 Type http and the IP address of the switch Press Enter e eal SE 192 168 101 The login screen appears Type in the username and password The default username and password is admin 5 Click Enter or OK button and the main interface of the management page appears Enter Network Password Enter your password to connect to PC SWRD19 admin Domain QRIMG Remember my credentials f Logon failure unknown user name or bad password murum Cancel Note you can use the following default values ORing Industrial Networking Corp 34 IP Address 192 168 10 1 Subnet Mask 255 255 255 0 Default Gateway 192 168 10 254 User Name admin Password admin After logging in you will see the information of the switch as below Information Message Name IGS 80846GP Industrial 12 port managed
101. ity and cost effectiveness in a set of network redundancy topologies The self healing Ethernet technology designed for distributed and complex industrial networks enables the network to recover in less than 10ms for up to 250 switches if at any time a segment of the chain fails O Chain allows multiple redundant rings of different redundancy protocols to join and function together as a large and the most robust network topologies It can create multiple redundant networks beyond the limitations of current redundant ring technologies Edqe Port Edaqe Port O Chain Edqe Port Edaqe Port O Chain 4 2 2 Configurations O Chain is very easy to configure and manage Only one edge port of the edge switch needs to be defined Other switches beside them just need to have O Chain enabled O Chain Uplink Port Edge Port State me O ionn E NN TT Apply ORing Industrial Networking Corp 23 Enable Check to enable O Chain function Ring Port The first port connecting to the ring 1 2 Ring Port The second port connecting to the ring Edge Port An O Chain topology must begin with edge ports The ports with a smaller switch MAC address will serve as the backup link and RM LED will light up 4 3 MRP 4 3 1 Introduction MRP Media Redundancy Protocol is an industry standard for high availability Ethernet networks MRP allowing Ethernet switches in ring configuration to recover from failure rapid
102. knownTypes received from the server on the authentication port and dropped for some other reason The number of RADIUS packets that were Packets Dropped radiusAuthClientExtPacketsDropped received from the server on the authentication port and dropped for some other reason The number of RADIUS Access Request Access Requests radiusAuthClientExtAccessRequests packets sent to the server This does not include retransmissions The number of RADIUS Access Request radiusAuthClientExtAccessRetransmissions packets retransmitted to the RADIUS authentication server The number of RADIUS Access Request packets destined for the server that have not yet timed out or received a response This Pending Requests radiusAuthClientExtPendingRequests variable is incremented when an Access Request is sent and decremented due to receipt of an Access Accept Access Reject Access Challenge timeout or retransmission The number of authentication timeouts to the server After a timeout the client may retry to the same server send to a different server or radiusAuthClientExtTimeouts give up A retry to the same server is counted as a retransmit as well as a timeout A send to a different server is counted as a Request as well as a timeout Access Accepts radiusAuthClientExtAccessAccepts Access Rejects radiusAuthClientExtAccessRejects Access Challenges Bad Authenticators Access Retransmissions This section contains information about the state of th
103. l Networking Corp 152 Method consoleltelnetlsshlweb nonellocallradius enableldisable Security Switch SSH Mode enableldisable MEME Mode enableldisable Security Switch RMON Statistics Add stats 1d data source Statistics Delete stats 1d Statistics Lookup lt stats_id gt History Add history id data source interval lt buckets gt History Delete lt history_id gt l History Lookup lt history_id gt Alarm Add lt alarm_id gt lt interval gt lt alarm_variable gt absoluteldelta lt rising_threshold gt rising event index falling threshold falling event index risinglfallinglboth Alarm Delete alarm 1d 2 Alarm Lookup lt alarm_id gt Security Network Security Network Psec Switch lt port_list gt Port port list Security Network NAS 5 Configuration lt port_list gt ORing Industrial Networking Corp 153 ORing IGS 9084GP User Manual Mode enableldisable i State lt port_list gt autolauthorizedlunauthorizedlmacbased Reauthentication enableldisable ReauthPeriod lt reauth_period gt Statistics lt port_list gt clearleapollradius Security Network ACL Configuration lt port_list gt Action lt port_list gt permitldeny lt rate_limiter gt lt port_redirect gt lt muirror gt lt logging gt shutdown Policy lt port_list gt lt policy gt
104. lnet onltelnet off snmp onlsnmp off Configuration FastReocvery Mode enableldisable EM E _ Port lt port_list gt lt fr_priority gt SFP Isyslo g enableldisable temp lt temperature gt DeviceBinding Port DDOS Low lt port_list gt lt socket_number gt Port DDOS High lt port_list gt lt socket_number gt Port DDOS Filter lt port_list gt sourceldestination ORing Industrial Networking Corp 163 ng Port DDOS Packet lt port_list gt rx totallrx unicastlrx multicastlrx broadcastltcpludp Port DDOS Action lt port_list gt do nothinglblock 1 minlblock 10 minslblocklshutdownlonly loglreboot device Port DDOS Status lt port_list gt Port Alive Mode lt port_list gt enableldisable Port Alive Action lt port_list gt do nothingllink changelshutdownlonly loglreboot device Port Alive Status lt port_list gt Port Stream Mode lt port_list gt enableldisable Port Stream Action lt port_list gt do nothinglonly log Port Stream Status lt port_list gt Port Addr lt port_list gt lt 1p_addr gt lt mac_addr gt Port Alias lt port_list gt lt ip_addr gt Port DeviceType lt port_list gt unknownlip camlip phonelaplpclplcInvr Port Location lt port_list gt device location Port Description lt port_list gt device descriptions MRP Configuration Mode enableldisable Parameter MRP LN
105. locks For more information please refer to Device Type In a unicast Slave Only clock you also need to configure which master clocks to request Announce and Sync messages from For more information please refer to Unicast Slave Configuration VLAN Tag Enable Enables VLAN tagging for PTP frames Note Packets are only tagged if the port is configured for vlan tagging i e Port Type Unaware and PortVLAN mode None and the port is member of the VLAN VLAN identifiers used for tagging the PTP frames Priority code point values used for PTP frames 5 12 Troubleshooting 5 12 1 Factory Defaults This function is to force the switch back to the original factory settings To reset the switch select Reset to Factory Defaults from the drop down list and click Yes Only the IP configuration is retained Factory Defaults Are you sure you want to reset the configuration to Factory Defaults ORing Industrial Networking Corp 144 Yes Click to reset the configuration to factory defaults Nooo Click to return to the Port State page without resetting 5 12 2 System Reboot You can reset the stack switch on this page After reset the system will boot normally as if you have powered on the devices Warm Reset Are you sure you want to perform a Warm Restart Yes Click to reboot device ILI Click to return to the Port State page without rebooting ORing Industrial Networking Corp 145 ORing te c0010 user
106. lt protocol gt ip flags icmp lt sip gt lt dip gt lt icmp_type gt lt icmp_code gt lt ip_flags gt udp lt sip gt lt dip gt lt sport gt lt dport gt lt ip_flags gt tcp lt sip gt lt dip gt lt sport gt lt dport gt ip flags lt tcp_flags gt permitldeny lt rate_limiter gt lt port_copy gt lt logging gt lt shutdown gt Delete lt ace_id gt Lookup lt ace_id gt Clear Mirror Port lt port gt ldisable Mode lt port_list gt enableldisablelrxltx Save lt ip_server gt lt file_name gt Load ip server file name check Configuration lt port_list gt Config Firmware Trap Inform Retry Times lt retries gt Trap Probe Security Engine ID enableldisable Trap Security Engine ID lt engineid gt M Engine ID lt engineid gt Community Add community lt ip_addr gt ip mask Community Delete index Community Lookup index Trap Security Name security name ORing Industrial Networking Corp 159 PTP User Add lt engineid gt user name MDS5ISHA lt auth_password gt DES lt priv_password gt User Delete lt index gt User Changekey lt engineid gt lt user_name gt lt auth_password gt lt priv_password gt User Lookup lt index gt Group Add lt security_model gt lt security_name gt lt group_name gt Access Add lt group_name gt lt s
107. ly to ensure seamless data transmission A MRP ring IEC 62439 can support up to 50 devices and will enable a back up link in 80ms adjustable to max 200ms 500ms 4 3 2 Configurations MRP Enable E Manager W React on Link Change ist Ring Port Port 7 v LinkDown 2nd Ring Port Port 8 Forwarding Enable Enables the MRP function Manager Every MRP topology needs a MRP manager One MRP topology can only have a Manager If two or more switches are set to be Manager the MRP topology will fail React on Link Change Faster mode Enabling this function will cause MRP topology to Advanced mode converge more rapidly This function only can be set in MRP manager switch 1 Ring Port Chooses the port which connects to the MRP ring 27 Ring Port Chooses the port which connects to the MRP ring ORing Industrial Networking Corp 24 4 4 STP RSTP MSTP 4 4 1 STP RSTP STP Spanning Tree Protocol and its advanced versions RSTP Rapid Spanning Tree Protocol and MSTP Multiple Spanning Tree Protocol are designed to prevent network loops and provide network redundancy Network loops occur frequently in large networks as when two or more paths run to the same destination broadcast packets may get in to an infinite loop and hence causing congestion in the network STP can identify the best path to the destination and block all other paths The blocked links will stay connected but inactive When the best path fails the blocked
108. mes received on the port are stored in the system log Logging Disabled frames received on the port are not logged The default value is Disabled Please note that system log memory capacity and logging rate is limited opecifies the shutdown operation of this port The allowed values are Enabled if a frame is received on the port the port will be disabled Disabled port shut down is disabled The default value is Disabled Counts the number of frames that match this ACE ORing Industrial Networking Corp 101 Rate Limiters This page allows you to define the rate limits applied to a port ACL Rate Limiter Configuration Rate LimiterID Rate pps ga s ch Lr E WW ho Lr ra be 4 474 4 4 474 4 4 4 4 Rate Limiter ID The rate limiter ID for the settings contained in the same row The rate unit is packet per second pps which can be configured as 1 2 4 8 16 32 64 128 256 512 1K 2K 4K 8K 16K 32K 64K 128K 256K 512K or 1024K The 1 kpps is actually 1002 1 pps ACL Control List An ACE Access Control Entry is an element in an access control list ACL An ACL can have zero or more ACEs Each ACE controls or monitors access to an object based on user defined configurations Each ACE consists of several parameters which vary with the frame type you have selected ACE Configuration Ingress Port LEE Action EEUE IPvd ilies Disabled Port Copy Logging Shutdown Counter
109. must be set correctly at the time of entry creation Indicates the authentication protocol that this entry should belong to Possible authentication protocols include None no authentication protocol MD5 an optional flag to indicate that this user is using MD5 Authentication authentication protocol Protocol SHA an optional flag to indicate that this user is using SHA authentication protocol The value of security level cannot be modified if the entry already exists which means the value must be set correctly at the time of entry creation A string identifying the authentication pass phrase For MD5 Authentication authentication protocol the allowed string length is 8 to 32 For SHA Password authentication protocol the allowed string length is 8 to 40 Only ASCII characters from 33 to 126 are allowed Indicates the privacy protocol that this entry should belong to Possible privacy protocols include Privacy Protocol None no privacy protocol DES an optional flag to indicate that this user is using DES authentication protocol A string identifying the privacy pass phrase The allowed string length Privacy Password is 8 to 32 and only ASCII characters from 33 to 126 are allowed 5 5 4 SNMP Group Configurations An SNMP group is an access control policy for you to add users Each SNMP group is configured with a security model and is associated with an SNMP view A user within an SNMP group should match the security model of the SNM
110. n the front panel SFPpots 4 x 100 1000Base X ports Copper ports 8 x 10 100 1000Base T X ports nnd ul a Reset l R Th 11 H ae fs PR Power system LED be Power 1 LED I ss q PWRZ 4 S R M Power 2 LED aj Ring ig G10 d baci R M Ring Master LED Ring status LED Consol e Console port eb p Link action LED for Gigabit GT 9 IE a Ethernet ports E E 10 P j ds 9 Duplex LED for Gigabit i B Ethernet ports E d 42 10 Gigabit Ethernet ports G4 G3 E a d 11 SFP port E a 12 Link Act LED for SFP port G2 G1 B d P i rOOH QUT Fault indicator pr I ao de eS qu ORing Industrial Networking Corp 8 2 1 2 LED On oystem operated in O Ring mode Green Blinking Ring structure is broken Errors occur power failure or ports Amber disconnected 10 100 1000Base T X Fast Ethernet ports Port is Linked LNK ACT Green Blinking Transmitting data SFP ports Port is linked LNK ACT Green Blinking Transmitting data 2 2 Top Panel Below are the top panel components of IGS 9084GP 1 Terminal blocks PWR1 PWR2 2 Ground wire ORing Industrial Networking Corp 9 2 2 Rear Panel On the rear panel of the switch sit three sets of screw holes The two sets placed in triangular patterns on both ends of the rear panel are used for wall mounting and the set of four holes in the middle are used for Din rail installation For more information on installation please refe
111. n will frames from the client be forwarded on the switch ORing Industrial Networking Corp 119 There are no EAPOL frames involved in this authentication and therefore MAC based authentication has nothing to do with the 802 1X standard The advantage of MAC based authentication over 802 1X is that several clients can be connected to the same port e g through a 3rd party switch or a hub and still require individual authentication and that the clients do npt need special supplicant software to authenticate The disadvantage is that MAC addresses can be spoofed by malicious users equipment whose MAC address is a valid RADIUS user can be used by anyone and only the MD5 Challenge method is supported 802 1X and MAC Based authentication configurations consist of two sections system and port wide Network Access Server Configuration System Configuration Mode Disabled Reauthentication Enabled _ Reauthentication Period 36 seconds lemer 30 seconds EAPOL Timeout g Aging Period 300 i seconds Hold Time 10 seconds Port Configuration Adman State IE Globally Disabled Reauthenticate Ba Force Authorized v Force Unauthorized Globally Disabled 802 1X E Globally Disabled Reauthenticate Reinitialize MAC based Auth E Globally Disabled un amp LJ kJ Lr Force Authorized Globally Disabled Reauthenticate Reinitialize LONE NN Indicates if 802 1X and
112. nflict 5 Multicast 5 7 1 IGMP Snooping IGMP Internet Group Management Protocol snooping monitors the IGMP traffic between Indicates the QCL user Indicates the index of QCE Indicates the type of frame to look for incoming frames Possible frame types are Any the QCE will match all frame type Ethernet Only Ethernet frames with Ether Type 0x600 OxFFFF are allowed LLC Only LLC frames are allowed SNAP Only SNAP frames are allowed IPv4 the QCE will match only IPV4 frames IPv6 the QCE will match only IPV6 frames Indicates the classification action taken on ingress frame if parameters configured are matched with the frame s content There are three action fields Class DPL and DSCP Class Classified QoS if a frame matches the QCE it will be put in the queue DPL Drop Precedence Level if a frame matches the QCE then DP level will set to a value displayed under DPL column DSCP if a frame matches the QCE then DSCP will be classified with the value displayed under DSCP column Displays the conflict status of QCL entries As hardware resources are shared by multiple applications resources required to add a QCE may not be available In that case it shows conflict status as Yes otherwise it is always No Please note that conflict can be resolved by releasing the hardware resources required to add the QCL entry by pressing Resolve Conflict button hosts and multicast routers The switch uses what IGM
113. ng Industrial Networking Corp 82 Queue Shaper Allows the queue to use excess bandwidth Excess Port Shaper Enable Check to enable port shaper for individual switch ports Configures the rate of each port shaper The default value is 500 Port Shaper Rate This value is restricted to 100 to 1000000 when the Unit is kbps and it is restricted to 1 to 3300 when the Unit is Mbps Configures the unit of measurement for each port shaper rate as Port Shaper Unit kbps or Mbps The default value is kbps Weighted Weighted scheduling will deliver traffic on a rotating basis It can guarantee each queue s minimum bandwidth based on their bandwidth weight when there is traffic congestion Only when a port has more traffic than it can handle will this mode be activated A queue Is given an amount of bandwidth regardless of the incoming traffic on that port Queue with larger weights will have more guaranteed bandwidth than others with smaller weights Porti wj QoS Egress Port Scheduler and Shapers Port 1 Port Shaper Enable Rate Unit ORing Industrial Networking Corp 83 Scheduler Mode Two scheduling modes are available Strict Priority or Weighted Queue Shaper Enabl Check to enable queue shaper for individual switch ports nable Configures the rate of each queue shaper The default value is Queue Shaper Rate 500 This value is restricted to 100 to 1000000 when the Unit is kbps and it is restricted to 1 to 3300 when the Unit is
114. ng state is faster setate flag for edge ports operEdge set to true than other ports ORing Industrial Networking Corp 31 AdminEdde Configures the operEdge flag to start as set or cleared the initial operEdge state when a port is initialized Check to enable the bridge to detect edges at the bridge port AutoEdge automatically This allows operEdge to be derived from whether BPDUs are received on the port or not When enabled the port will not be selected as root port for CIST or any MSTI even if it has the best spanning tree priority vector Such a port will be selected as an alternate port after the root port has been X08 selected If set spanning trees will lose connectivity It can be set by a network administrator to prevent bridges outside a core region of the network from influencing the active spanning tree topology because those bridges are not under the full control of the administrator This feature is also known as Root Guard When enabled the port will not propagate received topology change notifications and topology changes to other ports If set it will cause temporary disconnection after changes in an active spanning trees topology as a result of persistent incorrectly learned station location Restricted TCN information It is set by a network administrator to prevent bridges outside a core region of the network from causing address flushing in that region because those bridges are not under the full control of t
115. nge if you want to filter a specific TCP UDP source range filter with the ACE you can enter a specific TCP UDP source range A field for entering a TCP UDP source value appears When Specific is selected for the TCP UDP source filter you can TCP UDP Source enter a specific TCP UDP source value The allowed range is 0 to No 65535 A frame matching the ACE will use this TCP UDP source value When Range is selected for the TCP UDP source filter you can enter TCP UDP Source a specific TCP UDP source range value The allowed range is O to Range 65535 A frame matching the ACE will use this TCP UDP source value Specifies the TCP UDP destination filter for the ACE TCP UDP Any no TCP UDP destination filter is specified TCP UDP Destination Filter destination filter status is don t care Specific if you want to filter a specific TCP UDP destination filter ORing Industrial Networking Corp 110 with the ACE you can enter a specific TCP UDP destination value A field for entering a TCP UDP destination value appears Range if you want to filter a specific range TCP UDP destination filter with the ACE you can enter a specific TCP UDP destination range A field for entering a TCP UDP destination value appears When Specific is selected for the TCP UDP destination filter you TCP UDP can enter a specific TCP UDP destination value The allowed range Destination is 0 to 65535 A frame matching the ACE will use this TCP UDP de
116. nt Configured Current Rx Current Tx Configured Frame Size Control lt gt K lt gt E Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Down Auto IEEE I Down Auto Down Auto Down Auto 100fdx Auto Down Aut lGfdx lGfdx Down JESSE RRE 153 M RE D c amp n tin amp LJ M e H e Down e Down SRA KR KKK AKA AK AX OX KKK KK KK AR RK L3 jel Ejere ee PL E PLE ERES is e Down The switch port number to which the following settings will be applied The current link state is shown by different colors Green indicates the link is up and red means the link is down Current Link Speed Indicates the current link speed of the port The drop down list provides available link speed options for a given switch port Configured a Auto selects the highest soeed supported by the link partner pee Disabled disables switch port configuration lt gt configures all ports When Auto is selected for the speed the flow control will be Flow Control negotiated to the capacity advertised by the link partner ORing Industrial Networking Corp 49 When a fixed speed setting is selected that is what is used Current Rx indicates whether pause frames on the port are obeyed and Current Tx indicates whether pause frames on the port are transmitted The Rx and Tx settings are determined by the
117. nt and the authentication server Frames sent between the supplicant and the switch are special 802 1X frames known as EAPOL EAP Over LANs frames which encapsulate EAP PDUs RFC3748 Frames sent between the switch and the RADIUS server are RADIUS packets RADIUS packets also encapsulate EAP PDUs together with other attributes like the switch s IP address name and the supplicant s port number on the switch EAP is very flexible as it allows for different authentication methods like MD5 Challenge PEAP and TLS The important thing is that the authenticator the switch does not need to know which authentication method the supplicant and the authentication server are using or how many information exchange frames are needed for a particular method The switch simply encapsulates the EAP part of the frame into the relevant type EAPOL or RADIUS and forwards it When authentication is complete the RADIUS server sends a special packet containing a success or failure indication Besides forwarding the result to the supplicant the switch uses it to open up or block traffic on the switch port connected to the supplicant Note in an environment where two backend servers are enabled the server timeout is configured to X seconds using the authentication configuration page and the first server in the list is currently down but not considered dead if the supplicant retransmits EAPOL Start frames at a rate faster than X seconds it will never be authent
118. nt page corresponds to the physical ports connected For information about the port setting please refer to 4 1 2 Configurations 3 Connect the last switch to the first switch to form a ring topology Coupling Ring If you already have two O Ring topologies and would like to connect the rings you can form them into a coupling ring All you need to do is select two switches from each ring to be connected for example switch A and B from Ring 1 and switch C and D from ring 2 Decide which port on each switch to be used as the coupling port and then link them together for example port 1 of switch A to port 2 of switch C and port 1 of switch B to port 2 of switch D Then enable Coupling Ring option by checking the checkbox on the management page and select the coupling ring in correspond dance to the connected port For more information on port setting please refer to 4 1 2 Configurations Once the setting is completed one of the connections will act as the main path while the other will act as the backup path ORing Industrial Networking Corp 18 Switch D Soan Main Pathe Backup Path Switch A Switch C Dual Homing If you want to connect your ring topology to a RSTP network environment you can use dual homing Choose two switches Switch A amp B from the ring for connecting to the switches in the RSTP network core switches The connection of one of the switches Switch A or B will act as the primary path while the
119. ology which binds the IP MAC address of a device with a specified Ethernet port If the IP MAC address of the device connected to the Ethernet port does not conform to the binding requirements the device will be locked for security concerns Device binding also provides security functions via alive checking streaming check and DoS DDosS prevention Device Binding iian Enable v Alive Check Stream Check Midas na Device Active Status Active Status Active Status IP Address MAC Address 2 4 LEE LEE 3 shutdown I amme E 7 93 ORing Industrial Networking Corp 95 Indicates the device binding operation for each port Possible modes are disable Scan scans IP MAC automatically but no binding function Binding enables binding Under this mode any IP MAC that does not match the entry will not be allowed to access the network Shutdown shuts down the port No Link Alive Check Check to enable alive check When enabled switch will ping the Active device continually Indicates alive check status Possible statuses are disable Alive Check Got Reply receive ping reply from device meaning the device is still Status alive Lost Reply not receiving ping reply from device meaning the device might have been dead Stream Check Check to enable stream check When enabled the switch will detect Indicates stream check status Possible sta
120. on Description of the device The physical location of the node e g telephone closet 3rd System Location floor The allowed string length is O to 255 and only ASCII characters from 32 to 126 are allowed The textual identification of the contact person for this managed node together with information on how to contact this person System Contact The allowed string length is O to 255 and only ASCII characters from 32 to 126 are allowed Provides the time zone offset from UTC GMT System Timezone The offset is given in minutes east of GMT The valid range is from 720 to 720 minutes Click to save changes Click to undo any changes made locally and revert to previously saved values 5 1 2 Admin amp Password This page allows you to configure the system password required to access the web pages or offset minutes log in from CLI System Password Username admin Old Password New Password Confirm New Password Old Password The existing password If this is incorrect you cannot set the new password ORing Industrial Networking Corp 36 New Password The new system password The allowed string length is O to 31 and only ASCII characters from 32 to 126 are allowed Confirm New Re type the new password Password Click to save changes 5 1 3 Authentication This page allows you to configure how a user is authenticated when he she logs into the switch via one of the management interfaces Authentica
121. on IPv6 address of this switch IPv6 address consists of 128 bits represented as eight groups of four IN hexadecimal digits with a colon separating each field For Trap Destination example in fe80 215 c5ff fe03 4dc7 the symbol is a special IPv6 Address syntax that can be used as a shorthand way of representing multiple 16 bit groups of contiguous zeros but it can only appear once It also uses a following legally IPv4 address For example 192 1 2 34 ORing Industrial Networking Corp 69 T Indicates the SNMP entity is permitted to generate authentication rap failure traps Possible modes include Authentication l Enabled enable SNMP trap authentication failure TRIS Disabled disable SNMP trap authentication failure Indicates the SNMP trap link up and link down mode Possible Trap Link up and modes include Link down Enabled enable SNMP trap link up and link down mode Disabled disable SNMP trap link up and link down mode Indicates the SNMP trap inform mode Possible modes include Trap Inform Mode Enabled enable SNMP trap inform mode Disabled disable SNMP trap inform mode Trap Inform Configures the SNMP trap inform timeout The allowed range is O to Trap Inform Retry Configures the retry times for SNMP trap inform The allowed range 5 5 2 SNMP Community Configurations You can define access to the SNMP data on your devices by creating one or more SNMP communities An SNMP community is th
122. on to the RADIUS server to document the transaction the RADIUS server may store or forward this information as needed to support billing for the services provided RADIUS Authentication Server Configuration Enabled IP Address The RADIUS authentication server number for which the configuration below applies Enabled Check to enable the RADIUS authentication server The IP address or hostname of the RADIUS authentication server IP IP Address address is expressed in dotted decimal notation Pot 0 The UDP port to use on the RADIUS authentication server If the port ORing Industrial Networking Corp 113 is set to O zero the default port 1812 is used on the RADIUS authentication server The secret is a text string used by RADIUS to encrypt the client and server authenticator field during exchanges between the router and a RADIUS authentication server The router encrypts PPP PAP passwords using this text string The secret up to 29 characters long shared between the RADIUS authentication server and the switch stack RADIUS Accounting Server Configuration IP Address A Secret The RADIUS accounting server number for which the configuration below applies Enabled Check to enable the RADIUS accounting server The IP address or hostname of the RADIUS accounting server IP IP Address address is expressed in dotted decimal notation The UDP port to use on the RADIUS accounting server If the port is set to O
123. on with the switch MAC based Counts all Access Challenges received from the backend server for this port left most table or client right most table Port based Counts the number of times that the switch sends an EAP Request packet following the first to the supplicant Indicates that the backend server chose an EAP method MAC based Not applicable Port and MAC based Counts the number of times that the switch receives a success indication Indicates that the supplicant client has successfully authenticated to the backend server Port and MAC based Counts the number of times that the switch receives a failure message This indicates that the supplicant client has not authenticated to the backend server Port based Counts the number of times that the switch attempts to send a supplicant s first response packet to the backend server Indicates the switch attempted communication with the backend server Possible retransmissions are not counted MAC based Counts all the backend server packets sent from the switch towards the backend server for a given port left most table or client right most table Possible retransmissions are not counted that attempts to for the following Description dotixAuthLastEapolFrameSource The MAC address of the last supplicant client The VLAN ID on which the last frame from the last supplicant client was received The protocol version number carried in the most
124. or disables DDOS prevention of the port Indicates the level of DDOS detection Possible levels are Low low sensibility Sensibility Normal normal sensibility Medium medium sensibility High high sensibility Indicates the types of DDoS attack packets to be monitored Possible types are RX Total all ingress packets RX Unicast unicast ingress packets Packet Type RX Multicast multicast ingress packets RX Broadcast broadcast ingress packets TCP TCP ingress packets UDP UDP ingress packets If packet type is UDP or TCP please specify the socket number here The socket number can be a range from low to high If the Socket Number socket number is only one please fill the same number in the low and high fields If packet type is UDP or TCP please choose the socket direction Destination Source Indicates the action to take when DDOS attacks occur Possible ORing Industrial Networking Corp 98 ORing IGS 9084GP User Manual actions are no action Blocking 1 minute blocks the forwarding for 1 minute and log the event Blocking 10 minute blocks the forwarding for 10 minutes and log the event Blocking blocks and logs the event Shunt Down the Port shuts down the port No Link and logs the event Only Log it simply logs the event Reboot Device if PoE is supported the device can be rebooted The event will be logged Indicates the DDOS prevention status Possible statuses are
125. ort at the same time Each supplicant is authenticated individually and secured in the MAC table using the Port Security module In Multi 802 1X it is not possible to use the multicast BPDU MAC address as the destination MAC address for EAPOL frames sent from the switch to the supplicant since that would cause all supplicants attached to the port to reply to requests sent from the switch Instead the switch uses the supplicant s MAC address which is obtained from the first EAPOL Start or EAPOL Response Identity frame sent by the supplicant An exception to this is when no supplicants are attached In this case the switch sends EAPOL Request Identity frames using the BPDU multicast MAC address as destination to wake up any supplicants that might be on the port The maximum number of supplicants that can be attached to a port can be limited using the Port Security Limit Control functionality MAC based Auth Unlike port based 802 1X MAC based authentication is not a standard but merely a best practices method adopted by the industry In MAC based authentication users are called clients and the switch acts as the supplicant on behalf of clients The initial frame any kind of frame sent by a client is snooped by the switch which in turn uses the client s MAC address as both username and password in the subsequent EAP exchange with the RADIUS server The 6 byte MAC address is converted to a string in the following form xx xx xx xx xx xx
126. ot yet an IEEE standard but features many of the same characteristics as port based 802 1 X In Single 802 1 X at most one supplicant can get authenticated on the port at a time Normal EAPOL frames are used in the communications between the supplicant and the switch If more than one supplicant are connected to a port the one that comes first when the port s link is connected will be the first one considered If that supplicant does not provide valid credentials within a certain amount of time the chance will be given to another supplicant Once a supplicant is successfully authenticated only that supplicant will be allowed access This is the most secure of all the supported modes In this mode the Port Security module is used to secure a supplicant s MAC address once successfully authenticated b Multi 802 1X In port based 802 1X authentication once a supplicant is successfully authenticated on a port the whole port is opened for network traffic This allows other clients connected to the port for ORing Industrial Networking Corp 123 instance through a hub to piggy back on the successfully authenticated client and get network access even though they are not authenticated individually To overcome this security breach use the Multi 802 1X variant Multi 802 1X is not yet an IEEE standard but features many of the same characteristics as port based 802 1X In Multi 802 1X one or more supplicants can be authenticated on the same p
127. otation When Network is selected for the destination IP filter you can enter a specific DIP mask in dotted decimal notation ARP Parameters Request Reply RARP SMAC Match Sender IP Filter IP Ethernet Length Sender IP Address IP Sender IP Mask 255 255 255 0 Ethernet Target IP Filter Fo meee 192 168 1 254 Target IP Mask 2925 255 255 0 i m 1 dm a ARP RARP Other ARP SMAC Match 1 a 1 bal v 1 al Specifies the available ARP RARP opcode OP flag for the ACE Any no ARP RARP OP flag is specified OP is don t care ARP RARP ARP frame must have ARP RARP opcode set to ARP RARP frame must have ARP RARP opcode set to RARP Other frame has unknown ARP RARP Opcode flag Specifies the available ARP RARP opcode OP flag for the ACE Any no ARP RARP OP flag is specified OP is don t care Request Reply Request frame must have ARP Request or RARP Request OP flag set Reply frame must have ARP Reply or RARP Reply OP flag Specifies the sender IP filter for the ACE Any no sender IP filter is specified sender IP filter is don t care Sender IP Filter Host sender IP filter is set to Host Specify the sender IP address in the SIP Address field that appears Network sender IP filter is set to Network Specify the sender IP ORing Industrial Networking Corp 107 address and sender IP mask in the SIP Address and SIP Mask fields that appear When Host or Network is selected for the sender IP filter y
128. ou can Sender IP Address enter a specific sender IP address in dotted decimal notation When Network is selected for the sender IP filter you can enter a sender IP Mask specific sender IP mask in dotted decimal notation Specifies the target IP filter for the specific ACE Any no target IP filter is specified target IP filter is don t care Host target IP filter is set to Host Specify the target IP address in Target IP Filter the Target IP Address field that appears Network target IP filter is set to Network Specify the target IP address and target IP mask in the Target IP Address and Target IP Mask fields that appear When Host or Network is selected for the target IP filter you can Target IP Address 7 enter a specific target IP address in dotted decimal notation When Network is selected for the target IP filter you can enter a Target IP Mask 7 specific target IP mask in dotted decimal notation Specifies whether frames will meet the action according to their sender hardware address field SHA settings ARP SMAC Match 0 ARP frames where SHA is not equal to the SMAC address 1 ARP frames where SHA is equal to the SMAC address Any any value is allowed don t care opecifies whether frames will meet the action according to their target hardware address field THA settings 0 RARP frames where THA is not equal to the SMAC address 1 RARP frames where THA is equal to the SMAC address
129. pe etype lt etype gt LLC lt DSAP gt lt SSAP gt lt control gt SNAP lt PID gt ipv4 lt protocol gt sip lt dscp gt lt fragment gt lt sport gt lt dport gt ipv6 lt protocol gt lt sip_v6 gt lt dscp gt lt sport gt lt dport gt lt class gt lt dp gt lt classified_dscp gt QCL Delete lt qce_id gt QCL Lookup lt qce_id gt QCL Status combinedlstaticlconflicts QCL Refresh Mirror Configuration lt port_list gt Port lt port gt ldisable Mode lt port_list gt enableldisablelrxltx ORing Industrial Networking Corp 157 Dot1x Dotlx Period lt reauth_period gt 1 Holdtime hold time IGMP Configuration lt port_list gt Mode enableldisable E Status lt vid gt ACL Configuration lt port_list gt Action lt port_list gt permitldeny lt rate_limiter gt lt port_copy gt logging lt shutdown gt Policy lt port_list gt lt policy gt Rate lt rate_limiter_list gt lt packet_rate gt ORing Industrial Networking Corp 158 Add lt ace_id gt lt ace_id_next gt switch port lt port gt policy lt policy gt lt vid gt lt tag_prio gt lt dmac_type gt etype lt etype gt lt smac gt lt dmac gt arp lt sip gt lt dip gt lt smac gt arp opcode lt arp_flags gt Gp lt sip gt lt dip gt
130. r to 3 1 Din rail Installation 1 Wall mount screw holes 2 Din rail screw holes LODAD II F GF FFF OIF VY YY iY VV VV VM YE VV VV VV SV ORing Industrial Networking Corp 10 Hardware Installation 3 1 DIN rail Installation The device comes with a DIN rail kit to allow you to fasten the switch to a DIN rail in any environments Dimension Unit 2mm DIN Rail Measurement Installing the switch on the DIN rail is easy First screw the Din rail kit onto the back of the switch right in the middle of the back panel Then slide the switch onto a DIN rail from the Din rail kit and make sure the switch clicks into the rail firmly EEE PEF EFEFEF PPE ORing Industrial Networking Corp 11 3 2 Wall Mounting Besides Din rail the switch can be fixed to the wall via a wall mount panel which can be found in the package Dimension Unit mm Wall Mounting Measurement To mount the switch onto the wall follow the steps 1 Screw the two pieces of wall mount kits onto both ends of the rear panel of the switch A total of six screws are required as shown below 2 Use the switch with wall mount plates attached as a guide to mark the correct locations of the four screws 3 Insert four screw heads through the large parts of the keyhole shaped apertures and then ORing Industrial Networking Corp 12 slide the switch downwards Tighten the fo
131. ransferring to a DHCP client It only works when DHCP relay mode is enabled Disabled disable DHCP relay information Indicates the policies to be enforced when receiving DHCP relay information When DHCP relay information mode is enabled if the agent receives a DHCP message that already contains relay agent information it will enforce the policy The Replace option is invalid when relay information mode is disabled The policies includes Replace replace the original relay information when a DHCP message containing the information is received Keep keep the original relay information when a DHCP message containing the information is received Drop drop the package when a DHCP message containing the information is received The relay statistics shows the information of relayed packets of the switch ORing Industrial Networking Corp 47 Auto refresh DHCP Relay Statistics Server Statistics ues Receive TE L Receive Transmit Recerve Mega Receive Receive Receive Transmit Missing ae EH Bad to from Missing Missing Bad pian Server SAL Server Poem Circuit ID Remote ID Circuit ID Option ID Label Description Transmit to Sever The number of packets relayed from the client to the server Transmit Error The number of packets with errors when being sent to clients Receive from Server The number of packets received from the server Receive Missing Agent The number of packets received without agent information Option
132. ration will be used The router may delay responding to a router solicitation for a few seconds therefore the total time needed to complete auto configuration may be much longer opecify an IPv6 address for the switch IPv6 address consists of 128 bits represented as eight groups of four hexadecimal digits with a colon separating each field For example in Addas fe80 215 c5ff fe03 4dc7 the symbol is a special syntax that can be used as a shorthand way of representing multiple 16 bit groups of contiguous zeros but it can appear only once It can also represent a legally valid IPv4 address For example 1 1192 1 2 34 Prete Specify an IPv6 prefix for the switch The allowed range is 1 to 128 Specify an IPv6 address for the switch IPv6 address consists of 128 bits represented as eight groups of four hexadecimal digits with a colon separating each field For example in fe80 215 c5ff fe03 4dc7 the symbol is a special syntax that can be used as a shorthand way of representing multiple 16 bit groups of contiguous zeros but it can appear only once It can also represent a legally valid IPv4 address For example 1 1192 1 2 34 Click to save changes Click to undo any changes made locally and revert to previously saved values ORing Industrial Networking Corp 39 5 1 6 HTTPS You can configure the HTTPS mode in the following page HTTPS Configuration Stem Disabled v Indicates the selected HTTPS mode
133. re are five receive Packet Counters and four transmit counters ORing Industrial Networking Corp 117 Direction RFC4670 Name Description The number of RADIUS packets valid or invalid received from the server The number of malformed RADIUS packets received EL i from the server Malformed packets include packets R cum radiusAccClientExtMalformedResponses with an invalid length Bad authenticators or or unknown types are not included as malformed access responses The number of RADIUS packets containing invalid authenticators received from the server The number of RADIUS packets of unknown types that were received from the server on the accounting port The number of RADIUS packets that were received from Packets Dropped radiusAccClientExtPacketsDropped the server on the accounting port and dropped for some other reason The number of RADIUS packets sent to the server This does not include retransmissions The number of RADIUS packets retransmitted to the RADIUS accounting server The number of RADIUS packets destined for the server that have not yet timed out or received a response radiusAccClientExtPendingRequests This variable is incremented when a Request is sent and decremented due to receipt of a Response timeout or retransmission The number of accounting timeouts to the server After a timeout the client may retry to the same server send to a different server or give up A retry to the same server is
134. ress NAS Status This page shows the information on current NAS port statuses Network Access Server Switch Status Auto refresh Admin State Port State Last Source Last ID Force Authorized Force Authorized Force Authorized Force Authorized Force Authorized Globally Disabled Globally Disabled Globally Disabled Globally Disabled Globally Disabled ch Lr 4 G3 RJ E Force Authorized Globally Disabled The switch port number Click to navigate to detailed 802 1X statistics of each port The port s current administrative state Refer to NAS Admin State Admin State l l for more details regarding each value The current state of the port Refer to NAS Port State for more Port State details regarding each value The source MAC address carried in the most recently received EAPOL frame for EAPOL based authentication and the most MAC based recently received frame from a new client for authentication Last ID ORing Industrial Networking Corp The user name supplicant identity carried in the most recently Identity EAPOL frame for EAPOL based authentication and the source MAC address from the most recently received Response received frame from a new client for MAC based authentication 126 This page provides detailed IEEE 802 1X statistics for a specific switch port using port based authentication For MAC based ports only the statistics of selected backend server statistics will be shown Us
135. rial Networking Corp 80 re fps and is restricted to 1 to 3300 when the Unit is Mbps or kfps Configures the unit of measurement for each policer rate as kbps Mbps fps or kfps The default value is kbps If Flow Control is enabled and the port is in Flow Control mode Flow Control MM then pause frames are sent instead of being discarded Queue Policing QoS Ingress Queue Policers Queue 0 Queue1 Queue Queue3 Queue4 Queue gt Queue Queue E Rate Unit Enable Enable Enable Enable Enable Enable Enable M sooj lt gt Mj 500 kbps Iri Ej soo kbes vio Ej soo kbes vL Ej soo kbes vE Ej soo kbes vE un e o N bje pjd bjb bfe bjb bjb bjd bjb bjb bik eek DPI D bk 99 PE I UP be ek DPI UP Port o The port number for which the configuration below applies Enable E Check to enable queue policer for individual switch ports Configures the unit of measurement for each queue policer rate as kbps or Mbps The default value is kbps Configures the rate of each queue policer The default value is 500 This value is restricted to 100 to 1000000 when the Unit is kbps and is restricted to 1 to 3300 when the Unit is Mbps This field is only shown if at least one of the queue policers is enabled This field is only shown if at least one of the queue policers is enabled 5 6 6 Scheduling and Shaping Port scheduling can solve performance degradation during network congestions The schedulers allow switches to mainta
136. rier Queries Queries V1 Reports V2 Reports V3 Reports V2 Leaves ID Version Version Status Transmitted Received Received Received Received Received v3 DISABLE 0 Router Port Port Status 1 2 3 4 5 6 ORing Industrial Networking Corp 93 V1 Reports l l The number of received V1 reports Receive V2 Reports l The number of received V2 reports Receive V3 Reports The number of received V3 reports Receive Reres Cektovetesn ine page imediatdy 5 7 4 Groups Information of IGMP Snooping Information about entries in the IGMP Group Table is shown in this page The IGMP Group Table is sorted first by VLAN ID and then by group IGMP Snooping Group Information Auto refresh Refresh laz Start from VLAN a and group address 224 0 0 0 with 20 entries per page Port Members VLAN ID Groups 1 2345678910 11 12 13 14 15 16 17 18 19 20 No more entries VLAN ID The VLAN ID of the group Groups The group address of the group displayed ORing Industrial Networking Corp 94 ORing IGS 9084GP User Manual 5 8 Security 5 8 1 Remote Control Security Configurations Remote Control Security allows you to limit remote access to the management interface When enabled requests of the client which is not in the allowed list will be rejected Remote Control Security Configuration Web Telnet SNMP Aw L ooo L1 D wet 5 8 2 Device Binding Device binding is ORing s proprietary techn
137. rnal VCXO rate adjustment False disable external VCXO rate adjustment Clock Frequency The box allows you to set clock frequency The range of values is 1 25000000 1 25MHz PTP Ciock Configuration Port List Delete ok Device 5534567891011 1 13 1415 16 17 18 19 20 Instance Type No Clock Instances Present Add New PTP Clock Clock Instance Indicates the instance of a particular clock instance 0 3 illl v Device Type Indicates the type of the clock instance There are five device types Ord Bound ordinary boundary clock P2p Transp peer to peer transparent clock E2e Transp end to end transparent clock Master Only master only Slave Only slave only Port List oet check mark for each port configured for this Clock Instance 2 Step Flag otatic member defined by the system true if two step Sync events and Pdelay Resp events are used ORing Industrial Networking Corp 143 Clock Identity Shows a unique clock identifier One Way If true one way measurements are used This parameter applies only to a slave In one way mode no delay measurements are performed i e this is applicable only if frequency synchronization is needed The master always responds to delay requests Protocol Transport protocol used by the PTP protocol engine Ethernet PTP over Ethernet multicast ip multi PTP over IPv4 multicast ip4uni PTP over IPv4 unicast Note IPv4 unicast protocol only works in Master Only and Slave Only c
138. round trip communication with the server yet Round Trip radiusAccClientExtRoundTripTime Time 5 8 6 NAS 802 1x A NAS Network Access Server is an access gateway between an external communications network and an internal network For example when the user dials into the ISP he she will be given access to the Internet after being authorized by the access server The authentication between the client and the server include IEEE 802 1X and MAC based The IEEE 802 1X standard defines a port based access control procedure that prevents unauthorized access to a network by requiring users to first submit credentials for authentication One or more backend servers RADIUS determine whether the user is allowed access to the network MAC based authentication allows for authentication of more than one user on the same port and does not require the users to have special 802 1X software installed on their system The switch uses the users MAC addresses to authenticate against the backend server As intruders can create counterfeit MAC addresses MAC based authentication is less secure than 802 1X authentication Overview of 802 1X Port Based Authentication In an 802 1X network environment the user is called the supplicant the switch is the authenticator and the RADIUS server is the authentication server The switch acts as the ORing Industrial Networking Corp 118 man in the middle forwarding requests and responses between the supplica
139. rovided for each port of a private VLAN When checked port isolation is enabled for that port Port Members NM When unchecked port isolation is disabled for that port By default port isolation is disabled for all ports ORing Industrial Networking Corp 67 5 5 SNMP SNMP Simple Network Management Protocol is a protocol for managing devices on IP networks It is mainly used network management systems to monitor the operational status of networked devices In an event triggered situation traps and notifications will be sent to administrators 5 5 1 SNMP System Configurations SNMP System Configuration Mode Enabled Version Sea public Teele private Engine ID Indicates existing SNMP mode Possible modes include Enabled enable SNMP mode Disabled disable SNMP mode Indicates the supported SNMP version Possible versions include SNMP v1 supports SNMP version 1 SNMP v2c supports SNMP version 2c SNMP v3 supports SNMP version 3 Version Indicates the read community string to permit access to SNMP agent The allowed string length is 0 to 255 and only ASCII characters from 33 to 126 are allowed The field only suits to SNMPv1 and SNMPv2c SNMPv3 uses USM for authentication and privacy and the community string will be Read Community associated with SNMPv3 community table Indicates the write community string to permit access to SNMP agent The allowed string length is 0 to 255 and only ASCII charact
140. rval the request is transmitted again This algorithm causes the RADIUS server to be queried up to 3 times before it is considered to be dead The dead time which can be set to a number between O and 3600 ORing Industrial Networking Corp 112 seconds is the period during which the switch will not send new requests to a server that has failed to respond to a previous request This will stop the switch from continually trying to contact a server that it has already determined as dead Setting the dead time to a value greater than O zero will enable this feature but only if more than one server has been configured 5 8 5 RADIUS Authentication and Accounting Server When a user requests network connection a RADIUS client which receives the request will perform an initial access negotiation with the user to obtain identity password information The client then passes the information to a RADIUS server as part of an authentication authorization request The RADIUS server matches data from the authentication authorization request with information in a trusted database If a match is found and the user s credentials are correct the RADIUS server sends an accept message to the client to grant access If a match is not found or a problem is found with the user s credentials the server returns a reject message to deny access The NAD then establishes or terminates the user s connection The NAD may then forward accounting informati
141. s 5 4 1 VLAN Membership A VLAN Virtual LAN is a logical LAN based on a physical LAN with links that does not consist of a physical wired or wireless connection between two computing devices but is implemented using methods of network virtualization A VLAN can be created by partitioning a physical LAN into multiple logical LANs using a VLAN ID You can assign switch ports to a VLAN and add new VLANs in this page ORing Industrial Networking Corp 56 VLAN Membership Configuration Start from VLAN 1 with 20 i entries per page Port Members Delete VLAN ID VLAN Name 172 24150607 89 1011 12 default MAAA A 4 4 Checkmarks indicate which ports are members of the entry Port Members Check or uncheck as needed to modify the entry Click to add a new VLAN ID An empty row is added to the table and the VLAN can be configured as needed Valid values for a VLAN ID are 1 through 4095 Ada NES VEAN After clicking Save the new VLAN will be enabled on the selected switch stack but contains no port members A VLAN without any port members on any stack will be deleted when you click Save Click Delete to undo the addition of new VLANSs ORing Industrial Networking Corp 57 5 4 2 Port Configurations This page allows you to set up VLAN ports individually Auto refresh O Ethertype for Custom S ports Ox ssas VLAN Port Configuration Port VLAN Mode Port Type Ingress Filtering Frame Type i lt gt a le
142. s 10 10 132 20 icmp_seq 4 time Oms Sent 5 packets received 5 OK 0 bad ORing Industrial Networking Corp 141 ORing IGS 9084GP User Manual You can configure the following properties of the issued ICMP packets IP Address The destination IP Address PingSize The payload size of the ICMP packet Values range from 8 to 1400 bytes IPv6 Ping IPv6 Address Ping Size PING6 server 192 168 10 1 sendto sendto sendto sendto sendto Sent 5 packets received 0 OK 0 bad 5 11 Synchronization PTP External Clock Mode PTP External Clock Mode is a protocol for synchronizing clocks throughout a computer network On a local area network it achieves clock accuracy in the sub microsecond range making it suitable for measurement and control systems PTP External Clock Mode eee Disable bd External Enable VCXO Enable Clock Frequency One pps mode The box allows you to select One pps mode configurations The following values are possible Output enable the 1 pps clock output ORing Industrial Networking Corp 142 Input enable the 1 pps clock input Disable disable the 1 pps clock in out put External Enable The box allows you to configure external clock output The following values are possible True enable external clock output False disable external clock output VCXO Enable The box allows you to configure the external VCXO rate adjustment The following values are possible True enable exte
143. s in the protocol stack implementation mistakes in network configuration or users issuing a denial of service attack can cause a storm Storm control prevents traffic on a LAN from being disrupted by a broadcast multicast or unicast storm ona port In this page you can specify the rate at which packets are received for unicast multicast and broadcast traffic The unit of the rate can be either pps packets per second or kpps kilopackets per second Note frames sent to the CPU of the switch are always limited to approximately 4 kpps For example broadcasts in the management VLAN are limited to this rate The management VLAN is configured on the IP setup page storm Control Configuration Frame Type Status Rate pps Unicast 1K Multicast F lik Broadcast C 1K Frame types supported by the Storm Control function including Frame Type Unicast Multicast and Broadcast Status Enables or disables the given frame type The rate is packet per second pps configure the rate as 1K 2K ORing Industrial Networking Corp 75 ORing IGS 9084GP User Manual 4K 8K 16K 32K 64K 128K 256K 512K or 1024K The 1 kpps is actually 1002 1 pps 5 6 2 Port Classification QoS Quality of Service is a method to achieve efficient bandwidth utilization between devices by prioritizing frames according to individual requirements and transmit the frames based on their importance Frames in higher priority queu
144. settings for the ACE No IPv4 frames whose options flag is set must not be able to match IP Option this entry Yes IPv4 frames whose options flag is set must be able to match this entry Any any value is allowed don t care opecifies the source IP filter for this ACE Any no source IP filter is specified Source IP filter is don t care Host source IP filter is set to Host Specify the source IP address in the SIP Address field that appears Network source IP filter is set to Network Specify the source IP address and source IP mask in the SIP Address and SIP Mask fields that appear When Host or Network is selected for the source IP filter you can SIP Address uH l enter a specific SIP address in dotted decimal notation When Network is selected for the source IP filter you can enter a specific SIP mask in dotted decimal notation Specifies the destination IP filter for the ACE Any no destination IP filter is specified destination IP filter is ORing Industrial Networking Corp 106 don t care Host destination IP filter is set to Host Specify the destination IP address in the DIP Address field that appears Network destination IP filter is set to Network Specify the destination IP address and destination IP mask in the DIP Address and DIP Mask fields that appear When Host or Network is selected for the destination IP filter you DIP Address 7 can enter a specific DIP address in dotted decimal n
145. st of permissions attached to an object An ACL specifies which users or system processes are authorized to access the objects and what operations are allowed on given objects Port Configuration ACL Ports Configuration Action Rate Limiter Port Copy Ip Logging Shutdown Counter 1 1 Permit v Disabled v Disabled v Disabled v Disabled 108498 2 1 Permit v Disabled v Disabled v Disabled v Disabled v 0 3 1 Permit v Disabled v Disabled v Disabled Disabled 68732984 4 iw Permit v Disabled v Disabled v Disabled v Disabled v 0 5 ji Permit Disabled v Disabled Disabled v Disabled 0 6 15 Permit iw Disabled il Disabled Disabled Disabled 68732984 7 19 Permit iv Disabled Disabled Disabled v Disabled v o 8 1 Permit Disabled Disabled Disabled Disabled o bz Select to apply a policy to the port The allowed values are 1 to 8 Policy ID The default value is 1 Select to Permit to permit or Deny to deny forwarding The default value is Permit Select a rate limiter for the port The allowed values are Disabled or Rate Limiter ID numbers from 1 to 15 The default value is Disabled Port C Select which port frames are copied to The allowed values are ort Copy Disabled or a specific port number The default value is Disabled opecifies the logging operation of the port The allowed values are Enabled fra
146. stination value Number When Range is selected for the TCP UDP destination filter you can TCP UDP enter a specific TCP UDP destination range value The allowed Destination Range range is 0 to 65535 A frame matching the ACE will use this TCP UDP destination value Specifies the TCP FIN no more data from sender value for the ACE 0 TCP frames where the FIN field is set must not be able to match TCP FIN this entry 1 TCP frames where the FIN field is set must be able to match this entry Any any value is allowed don t care Specifies the TCP SYN synchronize sequence numbers value for the ACE 0 TCP frames where the SYN field is set must not be able to match TCP SYN this entry 1 TCP frames where the SYN field is set must be able to match this entry Any any value is allowed don t care opecifies the TCP PSH push function value for the ACE 0 TCP frames where the PSH field is set must not be able to match this entry TCP PSH 1 TCP frames where the PSH field is set must be able to match this entry Any any value is allowed don t care opecifies the TCP ACK acknowledgment field significant value for the ACE TCP ACK 0 TCP frames where the ACK field is set must not be able to match this entry ORing Industrial Networking Corp 111 1 TCP frames where the ACK field is set must be able to match this entry Any any value is allowed don t care opecifies the TCP URG urgent poin
147. strial Networking Corp 4 912 TrouDIESNOOUNO NT 144 5 12 1 Factory Defaults sessosrssrnciceiesnissrinenineai nnan a A E A ANE EER 144 5 12 2 SV SIC IC DO O Feir aca teet iubebo tont u De cuiininininiee ede RIP NECI NUNSd Ee eE 145 Command Line Management eere eere einen nennen ennt 146 ORing Industrial Networking Corp Getting Started 1 1 About the IGS 9084GP The IGS 9084GP is a managed industrial Ethernet switch with eight 10 100 1000Base IT X ports and four 100 1000Base X SFP ports The switch supports Ethernet Redundancy protocol O Ring recovery time lt 30ms over 250 units of connection and MSTP RSTP STP compatible to protect mission critical applications from network interruptions or temporary malfunctions with fast recovery technology With a wide operating temperature from 40 C to 70 C the device can be managed centrally via ORing s proprietary Open Vision platform as well as via Web based interfaces Telnet and console CLI The switch is one of the most reliable choices for highly managed and fiber Ethernet applications 1 2 Software Features B Supports O Ring recovery time 30ms over 250 units of connection and MSTP RSTP STP compatible for Ethernet Redundancy Open Ring support for other vendors ring technologies in open architecture O Chain allows for multiple redundant network rings Supports standard IEC 62439 2 MRP Media Redundancy Protocol function Supports IEEE 1588
148. t subsequent data packets can be switched to desired ports in hardware without going to the CPU Each page shows up to 99 entries from the VLAN table depending on the value in the Entries Per Page field By default the page will show the first 20 entries from the beginning of the VLAN table The first displayed will be the one with the lowest VLAN ID found in the VLAN Table ORing Industrial Networking Corp 92 ORing IGS 9084GP User Manual The VLAN field allows the user to select the starting point in the VLAN Table Clicking Refresh will update the displayed table starting from that or the next closest VLAN Table match The gt gt button will use the last entry of the currently displayed entry as a basis for the next lookup When the end is reached the text No more entries is shown in the displayed table Use the lt lt button to start over IGMP Snooping VLAN Configuration Start from VLAN 1 with 120 entries per page Delete VLANID Snooping Enabled IGMP Querier L 1 Delet Check to delete the entry The designated entry will be deleted during elete the next save VLAN ID The VLAN ID of the entry IGMP Snooping Check to enable IGMP snooping for individual VLAN Up to 32 Enable VLANs can be selected IGMP Querier Check to enable the IGMP Querier in the VLAN 5 7 3 IGMP Snooping Status This page provides IGMP snooping status Auto refresh IGMP Snooping Status Statistics VLAN Querier Host Que
149. ter field significant value for the ACE 0 TCP frames where the URG field is set must not be able to match TCP URG this entry 1 TCP frames where the URG field is set must be able to match this entry Any any value is allowed don t care 5 8 4 Authentication Authorization and Accounting An AAA server is an application that provides authentication authorization and accounting services for attempted access to a network An AAA server can reside in a dedicated computer an Ethernet switch an access point or a network access server The current standard by which devices or applications communicate with an AAA server is RADIUS Remote Authentication Dial In User Service RADIUS is a protocol used between the switch and the authentication server This page allows you to configure common settings for an authentication server Authentication Server Configuration Common Server Configuration Timeout seconds Dead Time seconds The timeout which can be set to a number between 3 and 3600 seconds is the maximum time to wait for a reply from a server If the server does not reply within this time frame we will consider it to be dead and continue with the next enabled server if any RADIUS servers are using the UDP protocol which is unreliable by Timeout design In order to cope with lost frames the timeout interval is divided into 3 subintervals of equal length If a reply is not received within the subinte
150. ters are cleared upon reboot Check to enable an automatic refresh of the page at regular Auto refresh intervals 5 1 9 Modbus TCP Modbus TCP uses TCP IP and Ethernet to carry the data of the Modbus message structure between compatible devices The protocol is commonly used in SCADA systems for communications between a human machine interface HMI and programmable logic controllers This page enables you to enable and disable Modbus TCP support of the switch MODBUS Configuration Mode w Dmm S Shows the existing status of the Modbus TCP function 5 1 10 Backup Restore Configurations You can save view or load switch configurations through the following pages The configuration file is in XML format ORing Industrial Networking Corp 44 Configuration Save Save configuration Configuration Upload 5 1 11 Firmware Update This page allows you to update the firmware of the switch Firmware Update 5 2 DHCP Server The switch provides DHCP server functions By enabling DHCP the switch will become a DHCP server and dynamically assigns IP addresses and related IP information to network clients 5 2 1 Basic Settings This page allows you to set up DHCP settings for the switch You can check the Enabled checkbox to activate the function Once the box is checked you will be able to input information in each column DHCP Server Configuration Enabled SU ME 192 168 10 100 BOE 192 168 10 200
151. the DMAC filter you can enter a specific destination MAC address The legal format is DMAC Value XX XX XX XX XX XX Frames matching the ACE will use this DMAC value VLAN Parameters VLAN ID Filter an ic VLAN ID Tag Priority ORing Industrial Networking Corp 104 Specifies the VLAN ID filter for the ACE Any no VLAN ID filter is specified VLAN ID filter status is VLAN ID Filter don t care Specific if you want to filter a specific VLAN ID with the ACE choose this value A field for entering a VLAN ID number appears When Specific is selected for the VLAN ID filter you can enter a VLAN ID specific VLAN ID number The allowed range is 1 to 4095 Frames matching the ACE will use this VLAN ID value opecifies the tag priority for the ACE A frame matching the ACE will Tag Priority use this tag priority The allowed number range is 0 to 7 Any means that no tag priority is specified tag priority is don t care IP Parameters IP Protocol Filter IP Protocol Value 6 IP TTL Mon zero IP Fragment IP Option SIP Filter Network SIP Address SIP Mask DIP Filter Network DIP Address DIP Mask Specifies the IP protocol filter for the ACE Any no IP protocol filter is specified don t care Specific if you want to filter a specific IP protocol filter with the ACE choose this value A field for entering an IP protocol filter appears ICMP selects ICMP to filter IPv4 ICMP protocol frames
152. tion Method Configuration Client Authentication Method Fallback console local telnet local ssh local web local Save Reset The management client for which the configuration below applies Authentication Method can be set to one of the following values a None authentication is disabled and login is not possible Authentication Method Local local user database on the switch is used for authentication Radius a remote RADIUS server is used for authentication Check to enable fallback to local authentication If none of the configured authentication servers are active the local user database is used for authentication This is only possible if Authentication Method is set to a value other than none or local Click to undo any changes made locally and revert to previously saved values 5 1 4 IP Settings This page allows you to configure IP information for the switch You can specify configure the settings manually by disabling DHCP Client After inputting the values click Renew and the ORing Industrial Networking Corp 37 new values will be applied which will be displayed under Current IP Configuration Configured Current DHCP Client anew IP Address 192 168 10 1 192 168 10 1 IP Mask 52 255 255 J2252 255 255 0 IP Router 0 0 0 0 VLAN ID DNS Server 0 0 0 0 0 0 0 0 Enable the DHCP client by checking this box If DHCP fails or the DHCP Client configured IP address is zero DHCP will retry
153. tion Statistics for Server 1 Server 1 v Auto refresh I Receive Packets Transmit Packets Access Accepts Access Requests Access Rejects Access Retransmissions Access Challenges Pending Requests Malformed Access Responses Timeouts Bad Authenticators Unknown Types Packets Dropped Other Info IP Address 0 0 0 0 1812 State Disabled Round Trip Time 0 ms RADIUS authentication server packet counters There are seven Packet Counters D B receive and four transmit counters ORing Industrial Networking Corp 116 ORing IGS 9084GP User Manual Direction RFC4668 Name Description The number of RADIUS Access Accept packets valid or invalid received from the server The number of RADIUS Access Reject packets valid or invalid received from the server The number of RADIUS Access Challenge radiusAuthClientExtAccessChallenges packets valid or invalid received from the server The number of malformed RADIUS Access Ea ar eue issu d be s raph alformed packets include packets with an reaz radiusAuthClientExtMalformedAccessResponses E en gth Ba d authenticators or Message Authenticator attributes or unknown types are not included as malformed access responses The number of RADIUS Access Response E s packets containing invalid authenticators or radiusAuthClientExtBadAuthenticators Message Authenticator attributes received from the server The number of RADIUS packets that were Unknown Types radiusAuthClientExtUn
154. transmitted good and bad unicast Rx and Tx Unicast packets Rx and Tx The number of received and transmitted good and bad multicast Multicast packets Rx and Tx The number of received and transmitted good and bad broadcast Broadcast packets The number of MAC Control frames received or transmitted on this Rx and Tx Pause oo port that have an opcode indicating a PAUSE operation The number of frames dropped due to insufficient receive buffer or Rx Drops l egress congestion Rx The number of frames received with CRC or alignment errors CRC Alignment 1 Short frames are frames smaller than 64 bytes 2 Long frames are frames longer than the maximum frame length configured for this port 5 10 3 Port Mirroring Port mirroring function will copy the traffic of one port to another port on the same switch to allow the network analyzer attached to the mirror port to monitor and analyze packets The function is useful for troubleshooting To solve network problems selected traffic can be copied or mirrored to a mirror port where a frame analyzer can be attached to analyze the frame flow The traffic to be copied to the mirror port can be all frames received on a given port also known as ingress or source mirroring or all frames transmitted on a given port also known as egress or destination mirroring The port to which the monitored traffic is copied is called mirror port ORing Industrial Networking Corp 137 Mirror Conf
155. tus This page provides an overview of the LACP status for all ports ORing Industrial Networking Corp 53 LACP Status Auto refresh C Partner Partner system ID Port D 0 Ch on 4 LJ RJ re Switch port number Yes means LACP is enabled and the port link is up No means LACP is not enabled or the port link is down Backup means the port cannot join in the aggregation group unless other ports are removed The LACP status is disabled Key The key assigned to the port Only ports with the same key can be aggregated Aggr ID The aggregation ID assigned to the aggregation group Partner Port The partner s port number associated with the port Refresh Click to refresh the page immediately Check to enable an automatic refresh of the page at regular Partner System ID The partner s system ID MAC address Auto refresh intervals LACP Statistics This page provides an overview of the LACP statistics for all ports ORing Industrial Networking Corp 54 LACP Statistics Auto refresh L LACP Port C LACP Discarded Transmitted Received Unknown Illegal eoo DOODO de D O DO O D D O G O ODGODU O G a g g 0 g 0 g 0 g 0 g D DO D O O O DO DO O O Pon Swtonponmumber 0000000 The number of unknown or illegal LACP frames discarded at each port Refresh Click to refresh the page immediately Check to enable an automatic refresh of the page at regular Auto refresh intervals Click to
156. tuses are Stream Check disable Status Normal the stream is normal Low the stream is getting low DDoS Prevention Check to enable DDOS prevention When enabled the switch will Indicates DDOS prevention status Possible statuses are disable DDoS Prevention Status Analyzing analyzes packet throughput for initialization Running analysis completes and ready for next move Attacked DDOS attacks occur Device IP Address Specifies IP address of the device Device MAC opecifies MAC address of the device Address Advanced Configurations Alias IP Address This page provides alias IP address configuration Some devices might have more than one IP addresses You could specify other IP addresses here ORing Industrial Networking Corp 96 ORing IGS 9084GP User Manual Alias IP Address Alias IP Address 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 C n fe Uu M e Label Description opecifies alias IP address Keep 0 0 0 0 if the device does not have Alias IP Address an alias IP address Alive Check Alive Checking monitors the real time status of the device connected to the port Alive checking packets will be sent to the device to probe if the device is running If the switch receives no response from the device actions will be taken according to your configurations Alive Check Action H Status Link Change Only Lag it Shunt Down the Port Reboot Device
157. twork access without authentication Force Unauthorized In this mode the switch will send one EAPOL Failure frame when the port link is up and any client on the port will be disallowed network access Port based 802 1X In an 802 1X network environment the user is called the supplicant the switch is the authenticator and the RADIUS server is the authentication server The authenticator acts as the man in the middle forwarding requests and responses between the supplicant and the authentication server Frames sent between the supplicant and the switch are special 802 1X frames Admin State known as EAPOL EAP Over LANs frames which encapsulate EAP PDUs RFC3748 Frames sent between the switch and the RADIUS server is RADIUS packets RADIUS packets also encapsulate EAP PDUs together with other attributes like the switch s IP address name and the supplicant s port number on the switch EAP is very flexible as it allows for different authentication methods like MD5 Challenge PEAP and TLS The important thing is that the authenticator the switch does not need to know which authentication method the supplicant and the authentication server are using or how many information exchange frames are needed for a particular method The switch simply encapsulates the EAP part of the frame into the relevant type EAPOL or RADIUS and forwards it When authentication is complete the RADIUS server sends a special packet containing a success or
158. ur screws for added stability ORing Industrial Networking Corp 13 WARNING Do not disconnect modules or wires unless power has been switched off or the area is known to be non hazardous The devices may only be connected to the supply voltage shown on the type plate ATTENTION Be sure to disconnect the power cord before installing and or wiring your switches Calculate the maximum possible current in each power wire and common wire Observe all electrical codes dictating the maximum current allowable for each wire size If the current goes above the maximum ratings the wiring could overheat causing serious damage to your equipment Use separate paths to route wiring for power and devices If power wiring and device wiring paths must cross make sure the wires are perpendicular at the intersection point Do not run signal or communications wiring and power wiring through the same wire conduit To avoid interference wires with different signal characteristics should be routed separately You can use the type of signal transmitted through a wire to determine which wires should be kept separate The rule of thumb is that wiring sharing similar electrical characteristics can be bundled together You should separate input wiring from output wiring It is advised to label the wiring to all devices in the system 3 3 1 Grounding Grounding and wire routing help limit the effects of noise due to electromagnetic interference EMI
159. v2 clock synchronization Supports IPV6 new Internet protocol version Supports Modbus TCP protocol Supports IEEE 802 3az Energy Efficient Ethernet technology Provides HT TPS SSH protocol for higher network security Supports SMTP client Supports IP based bandwidth management Supports application based QoS management Supports Device Binding security function Supports DOS DDOS auto prevention IGMP v2 v3 IGMP snooping support for filtering multicast traffic Supports SNMP v1 v2c v3 amp RMON amp 802 1Q VLAN network management Supports ACL TACACS and 802 1x user authentication for security Supports 9 6K Bytes Jumbo frame Supports multiple notifications for incidents Supports management via Web based interfaces Telnet console CLI and Windows utility Open Vision configuration B Supports LLDP protocol ORing Industrial Networking Corp 6 1 3 Hardware Specifications 8 x 10 100 1000Base T X Ethernet ports 4 x 100 1000Base X SFP ports 1 x Console port Redundant DC power inputs Rigid IP 30 housing design DIN Rail and wall mounting supported Operating temperature 40 to 70 C Storage temperature 40 to 85 C Operating humidity 5 to 95 non condensing Casing IP 30 Dimensions 96 4 W x 105 5 D x 154 H mm 3 8 x 4 15 x 6 06 inch ORing Industrial Networking Corp ORing IGS 9084GP User Manual Hardware Overview 2 1 Front Panel 2 1 1 Ports and Connectors The series provides the following ports o
160. vate VLAN o e f zr SNMP Traffic Prioritization Multicast Security Open all System Information Front Panel Basic Setting DHCP Server Relay Port Setting E Redundancy VLAN a a ooog B B BM ia i gy VLAN Membership gay Ports P Private VLAN SNMP I Traffic Prioritization Multicast Security Waming Monitor and Diag Synchronization PoE r3 E Fg Factory Default System Reboot VLAN Membership Configuration Start from VLAN 1 fi with 20 20 entries per page Port Members Delete VLAN ID 1 10 NTSFUISRSUIRBES Auto refresh L Ethertype for Custom S ports 0x ssas VLAN Port Configuration 1234567 8 9 101112 default AAAA A A 1 a ano MOQ E CJ CJ Port VLAN Ingress Filtering Frame SEN Mode Specific All Specific All v Specific m Al Specific Al vj Specific iv Spec cific ic WI Specific B ai v Specific Specific All v Specific aise Unaware wj Unaware 10 Unaware 11 Unaware C 99 1199 99 49 98 IP 98 17 P EPI DT 12 Unaware ORing Industrial Networking Corp eere L 31 ekam pvid T ap Untag_pvid 1 Untag pvid v l Untag pvid pvid ij Untag Fr pvid 1 untag pvid vj Untag pvid lUntag pvid zi Py srk Aiea MAR ke 1 64 ORing IGS 9084GP User Manual VLAN Qin
161. will be ORing Industrial Networking Corp 84 IGS 9084GP User Manual applied Click on the port number to configure the schedulers Shows the scheduling mode for this port Shows the weight for this queue and port 5 6 8 Port Shaping Port shaping enables you to limit traffic on a port thereby controlling the amount of traffic passing through the port With port shaping you can shape the aggregate traffic through an interface to a rate that is less than the line rate for that interface When configuring port shaping on an interface you specify a value indicating the maximum amount of traffic allowable for the interface This value must be less than the maximum bandwidth for that interface QoS Egress Port Shapers Shapers Q4 Q5 ch on J to RJ e disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled The switch port number to which the following settings will be applied Click on the port number to configure the shapers Shows disabled or a
162. wn Apply Click to activate the configurations ORing Industrial Networking Corp 131 9 10 Monitor and Diag 5 10 1 MAC Table A MAC address tablet is a table in a network switch that maps MAC addresses to ports The switch uses the table to determine which port the incoming packet should be forwarded to Entries in a MAC address table fall into two types dynamic and static entries Entries in a static MAC table are added or removed manually and cannot age out by themselves Entries in a dynamic MAC tablet will age out after a configured aging time Such entries can be added by learning or manual configuration MAC Address Table Configuration Aging Configuration Disable Automatic Aging i Age Time 30 seconds MAC Table Learning Port Members Port Members 6 B 9 1011 12 P m F ol rm Aging Configuration Aging enables the switch to track only active MAC addresses on the network and flush out MAC addresses that are no longer used thereby keeping the table current By default aged entries are removed after 300 seconds You can configure aging time by entering a value in the Age Time box in seconds The allowed range is 10 to 1000000 seconds You can also disable the automatic aging of dynamic entries by checking Disable Automatic Aging ORing Industrial Networking Corp 132 MAC Table Learning The switch can add the address and port on which the packet was received to the MAC table if the address does not exist
163. writing can be one of the following options Disable no Egress rewrite Enable rewrite enabled without remapping Remap DP Unaware DSCP from the analyzer is remapped and the frame is remarked with a remapped DSCP value The ORing Industrial Networking Corp 79 remapped DSCP value is always taken from the DSCP Translation gt Egress Remap DP0 table Remap DP Aware DSCP from the analyzer is remapped and the frame is remarked with a remapped DSCP value Depending on the DP level of the frame the remapped DSCP value is either taken from the DSCP Translation gt Egress Remap DP0 table or from the DSCP Translation gt Egress Remap DP1 table 5 6 5 Policing Policing is a traffic regulation mechanism for limiting the rate of traffic streams thereby controlling the maximum rate of traffic sent or received on an interface When the traffic rate exceeds the configured maximum rate policing drops or remarks the excess traffic This page allows you to configure Policer for all switch ports Port Policing QoS Ingress Port Policers Port Enabled Rate Unit Flow Control a PU 9 99 D 0990 98 809 eee D 99 4990 98 DI 998 1791 Oe oo The port number for which the configuration below applies Check to enable the policer for individual switch ports Configures the rate of each policer The default value is 500 This value is restricted to 100 to 1000000 when the Unit is kbps or ORing Indust
164. y aggregation group Only full duplex ports can join an aggregation and the ports must be in the same speed in each group ORing Industrial Networking Corp 51 5 3 3 LACP LACP Link Aggregation Control Protocol trunks are similar to static port trunks but they are more flexible because LACP is compliant with the IEEE 802 3ad standard Hence it is interoperable with equipment from other vendors that also comply with the standard This page allows you to enable LACP functions to group ports together to form single virtual links and change associated settings thereby increasing the bandwidth between the switch and other LACP compatible devices LACP Port Configuration LACP Enabled ey Role j adive wj Active vj Active s Active Active v Active v Active Active W 1 2 3 A J o i g c Active _ M Active Active wj i JH L9 98 ee 989 DRUSI eo 98 na Indicates the ID of each aggregation group Normal indicates there is M EAEE LACP Enabled Lists each switch port for each group ID Check to include a port in an aggregation or clear the box to remove the port from the aggregation By default no ports belong to any aggregation group Only full duplex ports can join an aggregation and the ports must be in the same speed
165. y and most efficient transmission With such QoS functions you can ensure low latency for critical traffic This page allows you to configure DSCP settings for each port ORing Industrial Networking Corp 78 QoS Port DSCP Configuration Bank Ingress Egress Lc iMt iat ANE A lt gt I lt gt Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable R Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable Disable 1 2 3 d 5 o Fi 8 g HAHHA i H na LN 98 I Se ESI PT CRI PRI ERN x Shows the list of ports for which you can configure DSCP Ingress and Egress settings In Ingress settings you can change ingress translation and classification settings for individual ports There are two configuration parameters available in Ingress Translate check to enable the function Classify includes four values Disable no Ingress DSCP classification DSCP 0 classify if incoming or translated if enabled DSCP is 0 Selected classify only selected DSCP whose classification is enabled as specified in DSCP Translation window for the specific DSCP All classify all DSCP Port egress re
166. you want to filter a specific ICMP filter with the ACE you can enter a specific ICMP value A field for entering an ICMP value appears When Specific is selected for the ICMP filter you can enter a ICMP Type Value specific ICMP value The allowed range is 0 to 255 Aframe matching the ACE will use this ICMP value opecifies the ICMP code filter for the ACE Any no ICMP code filter is specified ICMP code filter status is don t care ICMP Code Filter p Specific if you want to filter a specific ICMP code filter with the ACE you can enter a specific ICMP code value A field for entering an ICMP code value appears ICMP Code Value When Specific is selected for the ICMP code filter you can enter a ORing Industrial Networking Corp 109 specific ICMP code value The allowed range is 0 to 255 A frame matching the ACE will use this ICMP code value TCP Parameters ee eel Specific Source Port No Dest Port Filter Specific SS UDP Parameters TCP FIN TCP SYN Stee amelie Specific v TCP RST Source Port No TCP PSH Dest Port Filter 5t ge 80 65535 TCP URG ND Specifies the TCP UDP source filter for the ACE Any no TCP UDP source filter is specified TCP UDP source filter status is don t care Specific if you want to filter a specific TCP UDP source filter with the TCP UDP Source Fil ACE you can enter a specific TCP UDP source value A field for ilter entering a TCP UDP source value appears Ra
Download Pdf Manuals
Related Search
Related Contents
Pelco C2400M-B User's Manual Chamberlain WD832KEV User's Manual M700 & M500 Manual Two.cdr Compte rendu de la réunion du 12 novembre 2008 Installations- und Bedienungsanleitung Installation APP0392-01 Sony NH-D100 User's Manual Sinoiseries Le glossaire deRFsoftware Programming User Manual Instalação do EchoView Copyright © All rights reserved.
Failed to retrieve file